Hay
Date
July 14, 2025, 10:38 a.m.

Environment
e850-96
qemu-arm64
qemu-x86_64

[   52.348121] ==================================================================
[   52.348302] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   52.352459] Read of size 1 at addr ffff000800dac400 by task kunit_try_catch/311
[   52.359750] 
[   52.361236] CPU: 7 UID: 0 PID: 311 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   52.361293] Tainted: [B]=BAD_PAGE, [N]=TEST
[   52.361311] Hardware name: WinLink E850-96 board (DT)
[   52.361335] Call trace:
[   52.361348]  show_stack+0x20/0x38 (C)
[   52.361386]  dump_stack_lvl+0x8c/0xd0
[   52.361422]  print_report+0x118/0x5d0
[   52.361450]  kasan_report+0xdc/0x128
[   52.361478]  __asan_report_load1_noabort+0x20/0x30
[   52.361515]  mempool_uaf_helper+0x314/0x340
[   52.361549]  mempool_kmalloc_uaf+0xc4/0x120
[   52.361583]  kunit_try_run_case+0x170/0x3f0
[   52.361621]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.361653]  kthread+0x328/0x630
[   52.361683]  ret_from_fork+0x10/0x20
[   52.361718] 
[   52.429453] Allocated by task 311:
[   52.432840]  kasan_save_stack+0x3c/0x68
[   52.436659]  kasan_save_track+0x20/0x40
[   52.440476]  kasan_save_alloc_info+0x40/0x58
[   52.444730]  __kasan_mempool_unpoison_object+0x11c/0x180
[   52.450025]  remove_element+0x130/0x1f8
[   52.453844]  mempool_alloc_preallocated+0x58/0xc0
[   52.458532]  mempool_uaf_helper+0xa4/0x340
[   52.462611]  mempool_kmalloc_uaf+0xc4/0x120
[   52.466779]  kunit_try_run_case+0x170/0x3f0
[   52.470946]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.476414]  kthread+0x328/0x630
[   52.479625]  ret_from_fork+0x10/0x20
[   52.483184] 
[   52.484661] Freed by task 311:
[   52.487700]  kasan_save_stack+0x3c/0x68
[   52.491517]  kasan_save_track+0x20/0x40
[   52.495337]  kasan_save_free_info+0x4c/0x78
[   52.499503]  __kasan_mempool_poison_object+0xc0/0x150
[   52.504538]  mempool_free+0x28c/0x328
[   52.508184]  mempool_uaf_helper+0x104/0x340
[   52.512350]  mempool_kmalloc_uaf+0xc4/0x120
[   52.516517]  kunit_try_run_case+0x170/0x3f0
[   52.520685]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.526152]  kthread+0x328/0x630
[   52.529364]  ret_from_fork+0x10/0x20
[   52.532923] 
[   52.534400] The buggy address belongs to the object at ffff000800dac400
[   52.534400]  which belongs to the cache kmalloc-128 of size 128
[   52.546902] The buggy address is located 0 bytes inside of
[   52.546902]  freed 128-byte region [ffff000800dac400, ffff000800dac480)
[   52.558964] 
[   52.560444] The buggy address belongs to the physical page:
[   52.566001] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880dac
[   52.573983] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   52.581623] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   52.588566] page_type: f5(slab)
[   52.591704] raw: 0bfffe0000000040 ffff000800002a00 dead000000000100 dead000000000122
[   52.599422] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   52.607148] head: 0bfffe0000000040 ffff000800002a00 dead000000000100 dead000000000122
[   52.614960] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   52.622772] head: 0bfffe0000000001 fffffdffe0036b01 00000000ffffffff 00000000ffffffff
[   52.630584] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   52.638391] page dumped because: kasan: bad access detected
[   52.643945] 
[   52.645422] Memory state around the buggy address:
[   52.650203]  ffff000800dac300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   52.657404]  ffff000800dac380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.664612] >ffff000800dac400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   52.671810]                    ^
[   52.675025]  ffff000800dac480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.682230]  ffff000800dac500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   52.689432] ==================================================================
[   52.930736] ==================================================================
[   52.940212] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   52.947327] Read of size 1 at addr ffff000808765240 by task kunit_try_catch/315
[   52.954618] 
[   52.956106] CPU: 3 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   52.956161] Tainted: [B]=BAD_PAGE, [N]=TEST
[   52.956178] Hardware name: WinLink E850-96 board (DT)
[   52.956200] Call trace:
[   52.956214]  show_stack+0x20/0x38 (C)
[   52.956250]  dump_stack_lvl+0x8c/0xd0
[   52.956285]  print_report+0x118/0x5d0
[   52.956313]  kasan_report+0xdc/0x128
[   52.956341]  __asan_report_load1_noabort+0x20/0x30
[   52.956376]  mempool_uaf_helper+0x314/0x340
[   52.956407]  mempool_slab_uaf+0xc0/0x118
[   52.956442]  kunit_try_run_case+0x170/0x3f0
[   52.956481]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.956514]  kthread+0x328/0x630
[   52.956542]  ret_from_fork+0x10/0x20
[   52.956580] 
[   53.024063] Allocated by task 315:
[   53.027450]  kasan_save_stack+0x3c/0x68
[   53.031266]  kasan_save_track+0x20/0x40
[   53.035085]  kasan_save_alloc_info+0x40/0x58
[   53.039339]  __kasan_mempool_unpoison_object+0xbc/0x180
[   53.044547]  remove_element+0x16c/0x1f8
[   53.048366]  mempool_alloc_preallocated+0x58/0xc0
[   53.053054]  mempool_uaf_helper+0xa4/0x340
[   53.057134]  mempool_slab_uaf+0xc0/0x118
[   53.061040]  kunit_try_run_case+0x170/0x3f0
[   53.065206]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.070675]  kthread+0x328/0x630
[   53.073887]  ret_from_fork+0x10/0x20
[   53.077446] 
[   53.078923] Freed by task 315:
[   53.081960]  kasan_save_stack+0x3c/0x68
[   53.085779]  kasan_save_track+0x20/0x40
[   53.089599]  kasan_save_free_info+0x4c/0x78
[   53.093765]  __kasan_mempool_poison_object+0xc0/0x150
[   53.098800]  mempool_free+0x28c/0x328
[   53.102446]  mempool_uaf_helper+0x104/0x340
[   53.106612]  mempool_slab_uaf+0xc0/0x118
[   53.110518]  kunit_try_run_case+0x170/0x3f0
[   53.114685]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.120154]  kthread+0x328/0x630
[   53.123365]  ret_from_fork+0x10/0x20
[   53.126924] 
[   53.128400] The buggy address belongs to the object at ffff000808765240
[   53.128400]  which belongs to the cache test_cache of size 123
[   53.140815] The buggy address is located 0 bytes inside of
[   53.140815]  freed 123-byte region [ffff000808765240, ffff0008087652bb)
[   53.152879] 
[   53.154357] The buggy address belongs to the physical page:
[   53.159915] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888765
[   53.167899] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   53.174409] page_type: f5(slab)
[   53.177542] raw: 0bfffe0000000000 ffff0008019bc280 dead000000000122 0000000000000000
[   53.185264] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   53.192983] page dumped because: kasan: bad access detected
[   53.198538] 
[   53.200013] Memory state around the buggy address:
[   53.204794]  ffff000808765100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.211996]  ffff000808765180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   53.219201] >ffff000808765200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   53.226402]                                            ^
[   53.231700]  ffff000808765280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.238906]  ffff000808765300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.246107] ==================================================================

[   31.682718] ==================================================================
[   31.682811] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   31.682891] Read of size 1 at addr fff00000c85fc200 by task kunit_try_catch/258
[   31.682944] 
[   31.682987] CPU: 0 UID: 0 PID: 258 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   31.683096] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.683125] Hardware name: linux,dummy-virt (DT)
[   31.683160] Call trace:
[   31.683185]  show_stack+0x20/0x38 (C)
[   31.683237]  dump_stack_lvl+0x8c/0xd0
[   31.683287]  print_report+0x118/0x5d0
[   31.683330]  kasan_report+0xdc/0x128
[   31.683373]  __asan_report_load1_noabort+0x20/0x30
[   31.683421]  mempool_uaf_helper+0x314/0x340
[   31.683467]  mempool_kmalloc_uaf+0xc4/0x120
[   31.683514]  kunit_try_run_case+0x170/0x3f0
[   31.683567]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.683616]  kthread+0x328/0x630
[   31.683658]  ret_from_fork+0x10/0x20
[   31.683705] 
[   31.683725] Allocated by task 258:
[   31.683753]  kasan_save_stack+0x3c/0x68
[   31.683795]  kasan_save_track+0x20/0x40
[   31.683832]  kasan_save_alloc_info+0x40/0x58
[   31.683871]  __kasan_mempool_unpoison_object+0x11c/0x180
[   31.683912]  remove_element+0x130/0x1f8
[   31.683950]  mempool_alloc_preallocated+0x58/0xc0
[   31.683990]  mempool_uaf_helper+0xa4/0x340
[   31.684027]  mempool_kmalloc_uaf+0xc4/0x120
[   31.684075]  kunit_try_run_case+0x170/0x3f0
[   31.684113]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.684155]  kthread+0x328/0x630
[   31.684204]  ret_from_fork+0x10/0x20
[   31.684242] 
[   31.684274] Freed by task 258:
[   31.684301]  kasan_save_stack+0x3c/0x68
[   31.684339]  kasan_save_track+0x20/0x40
[   31.684378]  kasan_save_free_info+0x4c/0x78
[   31.684414]  __kasan_mempool_poison_object+0xc0/0x150
[   31.684457]  mempool_free+0x28c/0x328
[   31.684494]  mempool_uaf_helper+0x104/0x340
[   31.684531]  mempool_kmalloc_uaf+0xc4/0x120
[   31.684570]  kunit_try_run_case+0x170/0x3f0
[   31.684608]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.684650]  kthread+0x328/0x630
[   31.684682]  ret_from_fork+0x10/0x20
[   31.684719] 
[   31.684739] The buggy address belongs to the object at fff00000c85fc200
[   31.684739]  which belongs to the cache kmalloc-128 of size 128
[   31.684798] The buggy address is located 0 bytes inside of
[   31.684798]  freed 128-byte region [fff00000c85fc200, fff00000c85fc280)
[   31.684857] 
[   31.684881] The buggy address belongs to the physical page:
[   31.684913] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085fc
[   31.684970] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.685022] page_type: f5(slab)
[   31.685075] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   31.685125] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.685166] page dumped because: kasan: bad access detected
[   31.685198] 
[   31.685216] Memory state around the buggy address:
[   31.685250]  fff00000c85fc100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.685292]  fff00000c85fc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.685334] >fff00000c85fc200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.685374]                    ^
[   31.685402]  fff00000c85fc280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.685445]  fff00000c85fc300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.685483] ==================================================================
[   31.711947] ==================================================================
[   31.712020] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   31.712090] Read of size 1 at addr fff00000c85de240 by task kunit_try_catch/262
[   31.712140] 
[   31.712178] CPU: 0 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   31.713208] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.713347] Hardware name: linux,dummy-virt (DT)
[   31.713503] Call trace:
[   31.713556]  show_stack+0x20/0x38 (C)
[   31.713638]  dump_stack_lvl+0x8c/0xd0
[   31.714425]  print_report+0x118/0x5d0
[   31.714508]  kasan_report+0xdc/0x128
[   31.714555]  __asan_report_load1_noabort+0x20/0x30
[   31.714660]  mempool_uaf_helper+0x314/0x340
[   31.714723]  mempool_slab_uaf+0xc0/0x118
[   31.714770]  kunit_try_run_case+0x170/0x3f0
[   31.714819]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.714878]  kthread+0x328/0x630
[   31.714936]  ret_from_fork+0x10/0x20
[   31.714993] 
[   31.715013] Allocated by task 262:
[   31.715064]  kasan_save_stack+0x3c/0x68
[   31.715111]  kasan_save_track+0x20/0x40
[   31.715151]  kasan_save_alloc_info+0x40/0x58
[   31.715189]  __kasan_mempool_unpoison_object+0xbc/0x180
[   31.715231]  remove_element+0x16c/0x1f8
[   31.715279]  mempool_alloc_preallocated+0x58/0xc0
[   31.715325]  mempool_uaf_helper+0xa4/0x340
[   31.715372]  mempool_slab_uaf+0xc0/0x118
[   31.715416]  kunit_try_run_case+0x170/0x3f0
[   31.715454]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.715496]  kthread+0x328/0x630
[   31.715528]  ret_from_fork+0x10/0x20
[   31.715582] 
[   31.715602] Freed by task 262:
[   31.715635]  kasan_save_stack+0x3c/0x68
[   31.715674]  kasan_save_track+0x20/0x40
[   31.715721]  kasan_save_free_info+0x4c/0x78
[   31.715758]  __kasan_mempool_poison_object+0xc0/0x150
[   31.715810]  mempool_free+0x28c/0x328
[   31.715847]  mempool_uaf_helper+0x104/0x340
[   31.715885]  mempool_slab_uaf+0xc0/0x118
[   31.715921]  kunit_try_run_case+0x170/0x3f0
[   31.715975]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.716023]  kthread+0x328/0x630
[   31.716087]  ret_from_fork+0x10/0x20
[   31.716479] 
[   31.716504] The buggy address belongs to the object at fff00000c85de240
[   31.716504]  which belongs to the cache test_cache of size 123
[   31.717312] The buggy address is located 0 bytes inside of
[   31.717312]  freed 123-byte region [fff00000c85de240, fff00000c85de2bb)
[   31.717596] 
[   31.717638] The buggy address belongs to the physical page:
[   31.718132] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085de
[   31.718244] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.718434] page_type: f5(slab)
[   31.718522] raw: 0bfffe0000000000 fff00000c5687b40 dead000000000122 0000000000000000
[   31.718681] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   31.718782] page dumped because: kasan: bad access detected
[   31.719164] 
[   31.719225] Memory state around the buggy address:
[   31.719309]  fff00000c85de100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.719482]  fff00000c85de180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.719528] >fff00000c85de200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   31.719960]                                            ^
[   31.720014]  fff00000c85de280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.720376]  fff00000c85de300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.720501] ==================================================================

[   25.908804] ==================================================================
[   25.909435] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x392/0x400
[   25.909816] Read of size 1 at addr ffff888103eb6240 by task kunit_try_catch/280
[   25.910102] 
[   25.910277] CPU: 0 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) 
[   25.910333] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   25.910347] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.910370] Call Trace:
[   25.910385]  <TASK>
[   25.910405]  dump_stack_lvl+0x73/0xb0
[   25.910437]  print_report+0xd1/0x610
[   25.910459]  ? __virt_addr_valid+0x1db/0x2d0
[   25.910484]  ? mempool_uaf_helper+0x392/0x400
[   25.910505]  ? kasan_complete_mode_report_info+0x64/0x200
[   25.910530]  ? mempool_uaf_helper+0x392/0x400
[   25.910552]  kasan_report+0x141/0x180
[   25.910574]  ? mempool_uaf_helper+0x392/0x400
[   25.910599]  __asan_report_load1_noabort+0x18/0x20
[   25.910622]  mempool_uaf_helper+0x392/0x400
[   25.910644]  ? __pfx_mempool_uaf_helper+0x10/0x10
[   25.910681]  ? finish_task_switch.isra.0+0x153/0x700
[   25.910708]  mempool_slab_uaf+0xea/0x140
[   25.910731]  ? __pfx_mempool_slab_uaf+0x10/0x10
[   25.910756]  ? __pfx_mempool_alloc_slab+0x10/0x10
[   25.910780]  ? __pfx_mempool_free_slab+0x10/0x10
[   25.910804]  ? __pfx_read_tsc+0x10/0x10
[   25.910826]  ? ktime_get_ts64+0x86/0x230
[   25.910850]  kunit_try_run_case+0x1a5/0x480
[   25.910874]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.910893]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.910917]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.910940]  ? __kthread_parkme+0x82/0x180
[   25.910961]  ? preempt_count_sub+0x50/0x80
[   25.910983]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.911060]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.911085]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.911109]  kthread+0x337/0x6f0
[   25.911130]  ? trace_preempt_on+0x20/0xc0
[   25.911152]  ? __pfx_kthread+0x10/0x10
[   25.911173]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.911194]  ? calculate_sigpending+0x7b/0xa0
[   25.911218]  ? __pfx_kthread+0x10/0x10
[   25.911239]  ret_from_fork+0x116/0x1d0
[   25.911257]  ? __pfx_kthread+0x10/0x10
[   25.911278]  ret_from_fork_asm+0x1a/0x30
[   25.911308]  </TASK>
[   25.911319] 
[   25.920472] Allocated by task 280:
[   25.920643]  kasan_save_stack+0x45/0x70
[   25.920817]  kasan_save_track+0x18/0x40
[   25.920948]  kasan_save_alloc_info+0x3b/0x50
[   25.921263]  __kasan_mempool_unpoison_object+0x1bb/0x200
[   25.922222]  remove_element+0x11e/0x190
[   25.922456]  mempool_alloc_preallocated+0x4d/0x90
[   25.922736]  mempool_uaf_helper+0x96/0x400
[   25.922972]  mempool_slab_uaf+0xea/0x140
[   25.923177]  kunit_try_run_case+0x1a5/0x480
[   25.923394]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.923627]  kthread+0x337/0x6f0
[   25.923808]  ret_from_fork+0x116/0x1d0
[   25.923936]  ret_from_fork_asm+0x1a/0x30
[   25.924069] 
[   25.924175] Freed by task 280:
[   25.924329]  kasan_save_stack+0x45/0x70
[   25.924516]  kasan_save_track+0x18/0x40
[   25.924644]  kasan_save_free_info+0x3f/0x60
[   25.925001]  __kasan_mempool_poison_object+0x131/0x1d0
[   25.925305]  mempool_free+0x2ec/0x380
[   25.925450]  mempool_uaf_helper+0x11a/0x400
[   25.925678]  mempool_slab_uaf+0xea/0x140
[   25.925882]  kunit_try_run_case+0x1a5/0x480
[   25.926063]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.926236]  kthread+0x337/0x6f0
[   25.926559]  ret_from_fork+0x116/0x1d0
[   25.926839]  ret_from_fork_asm+0x1a/0x30
[   25.926984] 
[   25.927049] The buggy address belongs to the object at ffff888103eb6240
[   25.927049]  which belongs to the cache test_cache of size 123
[   25.927516] The buggy address is located 0 bytes inside of
[   25.927516]  freed 123-byte region [ffff888103eb6240, ffff888103eb62bb)
[   25.928828] 
[   25.928927] The buggy address belongs to the physical page:
[   25.929745] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eb6
[   25.930233] flags: 0x200000000000000(node=0|zone=2)
[   25.930477] page_type: f5(slab)
[   25.930884] raw: 0200000000000000 ffff888103eb1280 dead000000000122 0000000000000000
[   25.931449] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   25.931925] page dumped because: kasan: bad access detected
[   25.932389] 
[   25.932467] Memory state around the buggy address:
[   25.932676]  ffff888103eb6100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.933022]  ffff888103eb6180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.933641] >ffff888103eb6200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   25.934152]                                            ^
[   25.934365]  ffff888103eb6280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.934879]  ffff888103eb6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.935683] ==================================================================
[   25.841295] ==================================================================
[   25.843092] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x392/0x400
[   25.844371] Read of size 1 at addr ffff888103e99500 by task kunit_try_catch/276
[   25.845680] 
[   25.846170] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) 
[   25.846249] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   25.846265] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.846337] Call Trace:
[   25.846356]  <TASK>
[   25.846378]  dump_stack_lvl+0x73/0xb0
[   25.846422]  print_report+0xd1/0x610
[   25.846469]  ? __virt_addr_valid+0x1db/0x2d0
[   25.846496]  ? mempool_uaf_helper+0x392/0x400
[   25.846518]  ? kasan_complete_mode_report_info+0x64/0x200
[   25.846544]  ? mempool_uaf_helper+0x392/0x400
[   25.846566]  kasan_report+0x141/0x180
[   25.846587]  ? mempool_uaf_helper+0x392/0x400
[   25.846613]  __asan_report_load1_noabort+0x18/0x20
[   25.846637]  mempool_uaf_helper+0x392/0x400
[   25.846668]  ? __pfx_mempool_uaf_helper+0x10/0x10
[   25.846690]  ? dequeue_entities+0x23f/0x1630
[   25.846716]  ? __kasan_check_write+0x18/0x20
[   25.846755]  ? __pfx_sched_clock_cpu+0x10/0x10
[   25.846777]  ? finish_task_switch.isra.0+0x153/0x700
[   25.846804]  mempool_kmalloc_uaf+0xef/0x140
[   25.846825]  ? __pfx_mempool_kmalloc_uaf+0x10/0x10
[   25.846849]  ? __pfx_mempool_kmalloc+0x10/0x10
[   25.846874]  ? __pfx_mempool_kfree+0x10/0x10
[   25.846898]  ? __pfx_read_tsc+0x10/0x10
[   25.846920]  ? ktime_get_ts64+0x86/0x230
[   25.846976]  kunit_try_run_case+0x1a5/0x480
[   25.847001]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.847021]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.847046]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.847069]  ? __kthread_parkme+0x82/0x180
[   25.847090]  ? preempt_count_sub+0x50/0x80
[   25.847113]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.847135]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.847160]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.847184]  kthread+0x337/0x6f0
[   25.847205]  ? trace_preempt_on+0x20/0xc0
[   25.847228]  ? __pfx_kthread+0x10/0x10
[   25.847249]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.847270]  ? calculate_sigpending+0x7b/0xa0
[   25.847293]  ? __pfx_kthread+0x10/0x10
[   25.847315]  ret_from_fork+0x116/0x1d0
[   25.847333]  ? __pfx_kthread+0x10/0x10
[   25.847353]  ret_from_fork_asm+0x1a/0x30
[   25.847385]  </TASK>
[   25.847396] 
[   25.862285] Allocated by task 276:
[   25.862497]  kasan_save_stack+0x45/0x70
[   25.862710]  kasan_save_track+0x18/0x40
[   25.863154]  kasan_save_alloc_info+0x3b/0x50
[   25.863310]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   25.863539]  remove_element+0x11e/0x190
[   25.863964]  mempool_alloc_preallocated+0x4d/0x90
[   25.864206]  mempool_uaf_helper+0x96/0x400
[   25.864587]  mempool_kmalloc_uaf+0xef/0x140
[   25.864924]  kunit_try_run_case+0x1a5/0x480
[   25.865285]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.865627]  kthread+0x337/0x6f0
[   25.865828]  ret_from_fork+0x116/0x1d0
[   25.866240]  ret_from_fork_asm+0x1a/0x30
[   25.866379] 
[   25.866600] Freed by task 276:
[   25.866727]  kasan_save_stack+0x45/0x70
[   25.867023]  kasan_save_track+0x18/0x40
[   25.867468]  kasan_save_free_info+0x3f/0x60
[   25.867782]  __kasan_mempool_poison_object+0x131/0x1d0
[   25.868174]  mempool_free+0x2ec/0x380
[   25.868557]  mempool_uaf_helper+0x11a/0x400
[   25.869248]  mempool_kmalloc_uaf+0xef/0x140
[   25.869447]  kunit_try_run_case+0x1a5/0x480
[   25.869912]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.870266]  kthread+0x337/0x6f0
[   25.870555]  ret_from_fork+0x116/0x1d0
[   25.870729]  ret_from_fork_asm+0x1a/0x30
[   25.870920] 
[   25.871160] The buggy address belongs to the object at ffff888103e99500
[   25.871160]  which belongs to the cache kmalloc-128 of size 128
[   25.871623] The buggy address is located 0 bytes inside of
[   25.871623]  freed 128-byte region [ffff888103e99500, ffff888103e99580)
[   25.872241] 
[   25.872340] The buggy address belongs to the physical page:
[   25.872534] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103e99
[   25.872932] flags: 0x200000000000000(node=0|zone=2)
[   25.873377] page_type: f5(slab)
[   25.873507] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   25.873905] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.874202] page dumped because: kasan: bad access detected
[   25.874672] 
[   25.875245] Memory state around the buggy address:
[   25.875428]  ffff888103e99400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.875786]  ffff888103e99480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.876042] >ffff888103e99500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.876451]                    ^
[   25.876651]  ffff888103e99580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.877128]  ffff888103e99600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.877431] ==================================================================