Hay
Date
June 26, 2025, 11:12 a.m.

Environment
e850-96
qemu-arm64
qemu-x86_64

[   37.084243] ==================================================================
[   37.093567] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   37.100683] Read of size 1 at addr ffff000806481240 by task kunit_try_catch/280
[   37.107973] 
[   37.109460] CPU: 0 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   37.109516] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.109532] Hardware name: WinLink E850-96 board (DT)
[   37.109555] Call trace:
[   37.109569]  show_stack+0x20/0x38 (C)
[   37.109605]  dump_stack_lvl+0x8c/0xd0
[   37.109644]  print_report+0x118/0x608
[   37.109676]  kasan_report+0xdc/0x128
[   37.109706]  __asan_report_load1_noabort+0x20/0x30
[   37.109741]  mempool_uaf_helper+0x314/0x340
[   37.109777]  mempool_slab_uaf+0xc0/0x118
[   37.109806]  kunit_try_run_case+0x170/0x3f0
[   37.109845]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.109886]  kthread+0x328/0x630
[   37.109921]  ret_from_fork+0x10/0x20
[   37.109959] 
[   37.176202] Allocated by task 280:
[   37.179591]  kasan_save_stack+0x3c/0x68
[   37.183406]  kasan_save_track+0x20/0x40
[   37.187226]  kasan_save_alloc_info+0x40/0x58
[   37.191479]  __kasan_mempool_unpoison_object+0xbc/0x180
[   37.196687]  remove_element+0x16c/0x1f8
[   37.200506]  mempool_alloc_preallocated+0x58/0xc0
[   37.205195]  mempool_uaf_helper+0xa4/0x340
[   37.209273]  mempool_slab_uaf+0xc0/0x118
[   37.213180]  kunit_try_run_case+0x170/0x3f0
[   37.217347]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.222815]  kthread+0x328/0x630
[   37.226027]  ret_from_fork+0x10/0x20
[   37.229586] 
[   37.231061] Freed by task 280:
[   37.234101]  kasan_save_stack+0x3c/0x68
[   37.237919]  kasan_save_track+0x20/0x40
[   37.241738]  kasan_save_free_info+0x4c/0x78
[   37.245905]  __kasan_mempool_poison_object+0xc0/0x150
[   37.250940]  mempool_free+0x28c/0x328
[   37.254585]  mempool_uaf_helper+0x104/0x340
[   37.258753]  mempool_slab_uaf+0xc0/0x118
[   37.262658]  kunit_try_run_case+0x170/0x3f0
[   37.266825]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.272293]  kthread+0x328/0x630
[   37.275505]  ret_from_fork+0x10/0x20
[   37.279064] 
[   37.280541] The buggy address belongs to the object at ffff000806481240
[   37.280541]  which belongs to the cache test_cache of size 123
[   37.292955] The buggy address is located 0 bytes inside of
[   37.292955]  freed 123-byte region [ffff000806481240, ffff0008064812bb)
[   37.305019] 
[   37.306498] The buggy address belongs to the physical page:
[   37.312054] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886481
[   37.320040] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.326549] page_type: f5(slab)
[   37.329687] raw: 0bfffe0000000000 ffff00080177bcc0 dead000000000122 0000000000000000
[   37.337403] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   37.345122] page dumped because: kasan: bad access detected
[   37.350679] 
[   37.352155] Memory state around the buggy address:
[   37.356932]  ffff000806481100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.364137]  ffff000806481180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   37.371341] >ffff000806481200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   37.378542]                                            ^
[   37.383841]  ffff000806481280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.391046]  ffff000806481300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.398248] ==================================================================
[   36.495655] ==================================================================
[   36.501129] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   36.508244] Read of size 1 at addr ffff000802d03000 by task kunit_try_catch/276
[   36.515534] 
[   36.517021] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   36.517071] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.517088] Hardware name: WinLink E850-96 board (DT)
[   36.517114] Call trace:
[   36.517130]  show_stack+0x20/0x38 (C)
[   36.517166]  dump_stack_lvl+0x8c/0xd0
[   36.517204]  print_report+0x118/0x608
[   36.517238]  kasan_report+0xdc/0x128
[   36.517272]  __asan_report_load1_noabort+0x20/0x30
[   36.517311]  mempool_uaf_helper+0x314/0x340
[   36.517346]  mempool_kmalloc_uaf+0xc4/0x120
[   36.517380]  kunit_try_run_case+0x170/0x3f0
[   36.517417]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.517457]  kthread+0x328/0x630
[   36.517497]  ret_from_fork+0x10/0x20
[   36.517535] 
[   36.584023] Allocated by task 276:
[   36.587411]  kasan_save_stack+0x3c/0x68
[   36.591227]  kasan_save_track+0x20/0x40
[   36.595047]  kasan_save_alloc_info+0x40/0x58
[   36.599300]  __kasan_mempool_unpoison_object+0x11c/0x180
[   36.604595]  remove_element+0x130/0x1f8
[   36.608415]  mempool_alloc_preallocated+0x58/0xc0
[   36.613102]  mempool_uaf_helper+0xa4/0x340
[   36.617182]  mempool_kmalloc_uaf+0xc4/0x120
[   36.621350]  kunit_try_run_case+0x170/0x3f0
[   36.625515]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.630984]  kthread+0x328/0x630
[   36.634196]  ret_from_fork+0x10/0x20
[   36.637754] 
[   36.639232] Freed by task 276:
[   36.642270]  kasan_save_stack+0x3c/0x68
[   36.646087]  kasan_save_track+0x20/0x40
[   36.649907]  kasan_save_free_info+0x4c/0x78
[   36.654074]  __kasan_mempool_poison_object+0xc0/0x150
[   36.659108]  mempool_free+0x28c/0x328
[   36.662754]  mempool_uaf_helper+0x104/0x340
[   36.666921]  mempool_kmalloc_uaf+0xc4/0x120
[   36.671087]  kunit_try_run_case+0x170/0x3f0
[   36.675255]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.680722]  kthread+0x328/0x630
[   36.683934]  ret_from_fork+0x10/0x20
[   36.687493] 
[   36.688970] The buggy address belongs to the object at ffff000802d03000
[   36.688970]  which belongs to the cache kmalloc-128 of size 128
[   36.701472] The buggy address is located 0 bytes inside of
[   36.701472]  freed 128-byte region [ffff000802d03000, ffff000802d03080)
[   36.713534] 
[   36.715014] The buggy address belongs to the physical page:
[   36.720571] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882d02
[   36.728555] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   36.736194] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   36.743136] page_type: f5(slab)
[   36.746274] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   36.753992] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.761719] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   36.769530] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.777343] head: 0bfffe0000000001 fffffdffe00b4081 00000000ffffffff 00000000ffffffff
[   36.785155] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   36.792960] page dumped because: kasan: bad access detected
[   36.798516] 
[   36.799991] Memory state around the buggy address:
[   36.804773]  ffff000802d02f00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   36.811974]  ffff000802d02f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.819181] >ffff000802d03000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   36.826380]                    ^
[   36.829596]  ffff000802d03080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.836800]  ffff000802d03100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   36.844003] ==================================================================

[   20.046182] ==================================================================
[   20.046248] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   20.046307] Read of size 1 at addr fff00000c7a61240 by task kunit_try_catch/233
[   20.046357] 
[   20.046391] CPU: 0 UID: 0 PID: 233 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   20.046478] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.047623] Hardware name: linux,dummy-virt (DT)
[   20.047711] Call trace:
[   20.047744]  show_stack+0x20/0x38 (C)
[   20.047869]  dump_stack_lvl+0x8c/0xd0
[   20.048200]  print_report+0x118/0x608
[   20.048431]  kasan_report+0xdc/0x128
[   20.048508]  __asan_report_load1_noabort+0x20/0x30
[   20.048560]  mempool_uaf_helper+0x314/0x340
[   20.048610]  mempool_slab_uaf+0xc0/0x118
[   20.048710]  kunit_try_run_case+0x170/0x3f0
[   20.049160]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.049645]  kthread+0x328/0x630
[   20.050144]  ret_from_fork+0x10/0x20
[   20.050472] 
[   20.050507] Allocated by task 233:
[   20.050539]  kasan_save_stack+0x3c/0x68
[   20.050585]  kasan_save_track+0x20/0x40
[   20.050927]  kasan_save_alloc_info+0x40/0x58
[   20.051227]  __kasan_mempool_unpoison_object+0xbc/0x180
[   20.051274]  remove_element+0x16c/0x1f8
[   20.051644]  mempool_alloc_preallocated+0x58/0xc0
[   20.051696]  mempool_uaf_helper+0xa4/0x340
[   20.051738]  mempool_slab_uaf+0xc0/0x118
[   20.051950]  kunit_try_run_case+0x170/0x3f0
[   20.052007]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.052363]  kthread+0x328/0x630
[   20.052435]  ret_from_fork+0x10/0x20
[   20.052766] 
[   20.052898] Freed by task 233:
[   20.053093]  kasan_save_stack+0x3c/0x68
[   20.053253]  kasan_save_track+0x20/0x40
[   20.053380]  kasan_save_free_info+0x4c/0x78
[   20.053509]  __kasan_mempool_poison_object+0xc0/0x150
[   20.053770]  mempool_free+0x28c/0x328
[   20.054072]  mempool_uaf_helper+0x104/0x340
[   20.054208]  mempool_slab_uaf+0xc0/0x118
[   20.054460]  kunit_try_run_case+0x170/0x3f0
[   20.054575]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.054621]  kthread+0x328/0x630
[   20.055060]  ret_from_fork+0x10/0x20
[   20.055474] 
[   20.055538] The buggy address belongs to the object at fff00000c7a61240
[   20.055538]  which belongs to the cache test_cache of size 123
[   20.055875] The buggy address is located 0 bytes inside of
[   20.055875]  freed 123-byte region [fff00000c7a61240, fff00000c7a612bb)
[   20.055947] 
[   20.055967] The buggy address belongs to the physical page:
[   20.055998] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a61
[   20.056236] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.056392] page_type: f5(slab)
[   20.056451] raw: 0bfffe0000000000 fff00000c59d6b40 dead000000000122 0000000000000000
[   20.056723] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   20.056833] page dumped because: kasan: bad access detected
[   20.056876] 
[   20.056894] Memory state around the buggy address:
[   20.057438]  fff00000c7a61100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.057749]  fff00000c7a61180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.057956] >fff00000c7a61200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   20.058002]                                            ^
[   20.058038]  fff00000c7a61280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.058521]  fff00000c7a61300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.058581] ==================================================================
[   20.000950] ==================================================================
[   20.001027] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   20.001097] Read of size 1 at addr fff00000c791d100 by task kunit_try_catch/229
[   20.001150] 
[   20.001191] CPU: 1 UID: 0 PID: 229 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   20.001278] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.001307] Hardware name: linux,dummy-virt (DT)
[   20.001342] Call trace:
[   20.001365]  show_stack+0x20/0x38 (C)
[   20.001416]  dump_stack_lvl+0x8c/0xd0
[   20.001467]  print_report+0x118/0x608
[   20.001513]  kasan_report+0xdc/0x128
[   20.001557]  __asan_report_load1_noabort+0x20/0x30
[   20.001609]  mempool_uaf_helper+0x314/0x340
[   20.001658]  mempool_kmalloc_uaf+0xc4/0x120
[   20.001706]  kunit_try_run_case+0x170/0x3f0
[   20.001757]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.001811]  kthread+0x328/0x630
[   20.001887]  ret_from_fork+0x10/0x20
[   20.001938] 
[   20.001957] Allocated by task 229:
[   20.001985]  kasan_save_stack+0x3c/0x68
[   20.002025]  kasan_save_track+0x20/0x40
[   20.002062]  kasan_save_alloc_info+0x40/0x58
[   20.002100]  __kasan_mempool_unpoison_object+0x11c/0x180
[   20.002142]  remove_element+0x130/0x1f8
[   20.002185]  mempool_alloc_preallocated+0x58/0xc0
[   20.002226]  mempool_uaf_helper+0xa4/0x340
[   20.002267]  mempool_kmalloc_uaf+0xc4/0x120
[   20.002305]  kunit_try_run_case+0x170/0x3f0
[   20.002345]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.002391]  kthread+0x328/0x630
[   20.002426]  ret_from_fork+0x10/0x20
[   20.002462] 
[   20.002481] Freed by task 229:
[   20.002507]  kasan_save_stack+0x3c/0x68
[   20.002542]  kasan_save_track+0x20/0x40
[   20.002578]  kasan_save_free_info+0x4c/0x78
[   20.002615]  __kasan_mempool_poison_object+0xc0/0x150
[   20.002658]  mempool_free+0x28c/0x328
[   20.002695]  mempool_uaf_helper+0x104/0x340
[   20.002735]  mempool_kmalloc_uaf+0xc4/0x120
[   20.002773]  kunit_try_run_case+0x170/0x3f0
[   20.002812]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.002867]  kthread+0x328/0x630
[   20.002902]  ret_from_fork+0x10/0x20
[   20.002937] 
[   20.002958] The buggy address belongs to the object at fff00000c791d100
[   20.002958]  which belongs to the cache kmalloc-128 of size 128
[   20.003018] The buggy address is located 0 bytes inside of
[   20.003018]  freed 128-byte region [fff00000c791d100, fff00000c791d180)
[   20.003080] 
[   20.003101] The buggy address belongs to the physical page:
[   20.003132] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10791d
[   20.003192] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.003244] page_type: f5(slab)
[   20.003286] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.003339] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.003382] page dumped because: kasan: bad access detected
[   20.003414] 
[   20.003432] Memory state around the buggy address:
[   20.003464]  fff00000c791d000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.003510]  fff00000c791d080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.003557] >fff00000c791d100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.003599]                    ^
[   20.003627]  fff00000c791d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.003672]  fff00000c791d200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.003714] ==================================================================

[   12.516531] ==================================================================
[   12.517298] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x392/0x400
[   12.517609] Read of size 1 at addr ffff888102f7b240 by task kunit_try_catch/250
[   12.518104] 
[   12.518245] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT(voluntary) 
[   12.518319] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.518331] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.518355] Call Trace:
[   12.518369]  <TASK>
[   12.518400]  dump_stack_lvl+0x73/0xb0
[   12.518430]  print_report+0xd1/0x650
[   12.518454]  ? __virt_addr_valid+0x1db/0x2d0
[   12.518478]  ? mempool_uaf_helper+0x392/0x400
[   12.518501]  ? kasan_complete_mode_report_info+0x64/0x200
[   12.518523]  ? mempool_uaf_helper+0x392/0x400
[   12.518555]  kasan_report+0x141/0x180
[   12.518577]  ? mempool_uaf_helper+0x392/0x400
[   12.518603]  __asan_report_load1_noabort+0x18/0x20
[   12.518635]  mempool_uaf_helper+0x392/0x400
[   12.518658]  ? __pfx_mempool_uaf_helper+0x10/0x10
[   12.518685]  ? finish_task_switch.isra.0+0x153/0x700
[   12.518714]  mempool_slab_uaf+0xea/0x140
[   12.518734]  ? __pfx_mempool_slab_uaf+0x10/0x10
[   12.518753]  ? dequeue_task_fair+0x166/0x4e0
[   12.518776]  ? __pfx_mempool_alloc_slab+0x10/0x10
[   12.518799]  ? __pfx_mempool_free_slab+0x10/0x10
[   12.518821]  ? __pfx_read_tsc+0x10/0x10
[   12.518892]  ? ktime_get_ts64+0x86/0x230
[   12.518941]  kunit_try_run_case+0x1a5/0x480
[   12.518969]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.518991]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.519017]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.519049]  ? __kthread_parkme+0x82/0x180
[   12.519072]  ? preempt_count_sub+0x50/0x80
[   12.519097]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.519132]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.519155]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.519177]  kthread+0x337/0x6f0
[   12.519194]  ? trace_preempt_on+0x20/0xc0
[   12.519219]  ? __pfx_kthread+0x10/0x10
[   12.519236]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.519257]  ? calculate_sigpending+0x7b/0xa0
[   12.519280]  ? __pfx_kthread+0x10/0x10
[   12.519297]  ret_from_fork+0x41/0x80
[   12.519318]  ? __pfx_kthread+0x10/0x10
[   12.519336]  ret_from_fork_asm+0x1a/0x30
[   12.519368]  </TASK>
[   12.519380] 
[   12.527809] Allocated by task 250:
[   12.528004]  kasan_save_stack+0x45/0x70
[   12.528157]  kasan_save_track+0x18/0x40
[   12.528298]  kasan_save_alloc_info+0x3b/0x50
[   12.528731]  __kasan_mempool_unpoison_object+0x1bb/0x200
[   12.529058]  remove_element+0x11e/0x190
[   12.529254]  mempool_alloc_preallocated+0x4d/0x90
[   12.529469]  mempool_uaf_helper+0x96/0x400
[   12.529688]  mempool_slab_uaf+0xea/0x140
[   12.530008]  kunit_try_run_case+0x1a5/0x480
[   12.530196]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.530416]  kthread+0x337/0x6f0
[   12.530588]  ret_from_fork+0x41/0x80
[   12.530751]  ret_from_fork_asm+0x1a/0x30
[   12.530951] 
[   12.531021] Freed by task 250:
[   12.531132]  kasan_save_stack+0x45/0x70
[   12.531266]  kasan_save_track+0x18/0x40
[   12.531401]  kasan_save_free_info+0x3f/0x60
[   12.531685]  __kasan_mempool_poison_object+0x131/0x1d0
[   12.531937]  mempool_free+0x2ec/0x380
[   12.532354]  mempool_uaf_helper+0x11a/0x400
[   12.532655]  mempool_slab_uaf+0xea/0x140
[   12.533037]  kunit_try_run_case+0x1a5/0x480
[   12.533261]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.533626]  kthread+0x337/0x6f0
[   12.533772]  ret_from_fork+0x41/0x80
[   12.533939]  ret_from_fork_asm+0x1a/0x30
[   12.534078] 
[   12.534174] The buggy address belongs to the object at ffff888102f7b240
[   12.534174]  which belongs to the cache test_cache of size 123
[   12.535824] The buggy address is located 0 bytes inside of
[   12.535824]  freed 123-byte region [ffff888102f7b240, ffff888102f7b2bb)
[   12.536804] 
[   12.536935] The buggy address belongs to the physical page:
[   12.537376] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102f7b
[   12.537871] flags: 0x200000000000000(node=0|zone=2)
[   12.538319] page_type: f5(slab)
[   12.538488] raw: 0200000000000000 ffff88810128f780 dead000000000122 0000000000000000
[   12.539106] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   12.539440] page dumped because: kasan: bad access detected
[   12.539843] 
[   12.539957] Memory state around the buggy address:
[   12.540477]  ffff888102f7b100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   12.541021]  ffff888102f7b180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.541515] >ffff888102f7b200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   12.542116]                                            ^
[   12.542370]  ffff888102f7b280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   12.542642]  ffff888102f7b300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.543218] ==================================================================
[   12.461496] ==================================================================
[   12.462070] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x392/0x400
[   12.462459] Read of size 1 at addr ffff8881029f9900 by task kunit_try_catch/246
[   12.462803] 
[   12.462910] CPU: 0 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT(voluntary) 
[   12.462985] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.462998] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.463021] Call Trace:
[   12.463035]  <TASK>
[   12.463092]  dump_stack_lvl+0x73/0xb0
[   12.463127]  print_report+0xd1/0x650
[   12.463164]  ? __virt_addr_valid+0x1db/0x2d0
[   12.463188]  ? mempool_uaf_helper+0x392/0x400
[   12.463211]  ? kasan_complete_mode_report_info+0x64/0x200
[   12.463235]  ? mempool_uaf_helper+0x392/0x400
[   12.463286]  kasan_report+0x141/0x180
[   12.463309]  ? mempool_uaf_helper+0x392/0x400
[   12.463337]  __asan_report_load1_noabort+0x18/0x20
[   12.463369]  mempool_uaf_helper+0x392/0x400
[   12.463393]  ? __pfx_mempool_uaf_helper+0x10/0x10
[   12.463415]  ? dequeue_entities+0x852/0x1740
[   12.463442]  ? finish_task_switch.isra.0+0x153/0x700
[   12.463471]  mempool_kmalloc_uaf+0xef/0x140
[   12.463496]  ? __pfx_mempool_kmalloc_uaf+0x10/0x10
[   12.463518]  ? dequeue_task_fair+0x166/0x4e0
[   12.463540]  ? __pfx_mempool_kmalloc+0x10/0x10
[   12.463562]  ? __pfx_mempool_kfree+0x10/0x10
[   12.463615]  ? __pfx_read_tsc+0x10/0x10
[   12.463636]  ? ktime_get_ts64+0x86/0x230
[   12.463674]  kunit_try_run_case+0x1a5/0x480
[   12.463701]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.463723]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.463748]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.463771]  ? __kthread_parkme+0x82/0x180
[   12.463890]  ? preempt_count_sub+0x50/0x80
[   12.463939]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.463965]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.463990]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.464012]  kthread+0x337/0x6f0
[   12.464030]  ? trace_preempt_on+0x20/0xc0
[   12.464055]  ? __pfx_kthread+0x10/0x10
[   12.464073]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.464095]  ? calculate_sigpending+0x7b/0xa0
[   12.464117]  ? __pfx_kthread+0x10/0x10
[   12.464135]  ret_from_fork+0x41/0x80
[   12.464156]  ? __pfx_kthread+0x10/0x10
[   12.464174]  ret_from_fork_asm+0x1a/0x30
[   12.464206]  </TASK>
[   12.464217] 
[   12.473405] Allocated by task 246:
[   12.473659]  kasan_save_stack+0x45/0x70
[   12.473876]  kasan_save_track+0x18/0x40
[   12.474125]  kasan_save_alloc_info+0x3b/0x50
[   12.474410]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   12.474812]  remove_element+0x11e/0x190
[   12.474984]  mempool_alloc_preallocated+0x4d/0x90
[   12.475143]  mempool_uaf_helper+0x96/0x400
[   12.475316]  mempool_kmalloc_uaf+0xef/0x140
[   12.475498]  kunit_try_run_case+0x1a5/0x480
[   12.475827]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.476073]  kthread+0x337/0x6f0
[   12.476194]  ret_from_fork+0x41/0x80
[   12.476431]  ret_from_fork_asm+0x1a/0x30
[   12.476905] 
[   12.477021] Freed by task 246:
[   12.477234]  kasan_save_stack+0x45/0x70
[   12.477419]  kasan_save_track+0x18/0x40
[   12.477556]  kasan_save_free_info+0x3f/0x60
[   12.477700]  __kasan_mempool_poison_object+0x131/0x1d0
[   12.477904]  mempool_free+0x2ec/0x380
[   12.478136]  mempool_uaf_helper+0x11a/0x400
[   12.478362]  mempool_kmalloc_uaf+0xef/0x140
[   12.478588]  kunit_try_run_case+0x1a5/0x480
[   12.478754]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.479111]  kthread+0x337/0x6f0
[   12.479285]  ret_from_fork+0x41/0x80
[   12.479485]  ret_from_fork_asm+0x1a/0x30
[   12.479758] 
[   12.479859] The buggy address belongs to the object at ffff8881029f9900
[   12.479859]  which belongs to the cache kmalloc-128 of size 128
[   12.480396] The buggy address is located 0 bytes inside of
[   12.480396]  freed 128-byte region [ffff8881029f9900, ffff8881029f9980)
[   12.480847] 
[   12.480984] The buggy address belongs to the physical page:
[   12.481421] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9
[   12.481796] flags: 0x200000000000000(node=0|zone=2)
[   12.482044] page_type: f5(slab)
[   12.482340] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.482722] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.482987] page dumped because: kasan: bad access detected
[   12.483251] 
[   12.483344] Memory state around the buggy address:
[   12.483554]  ffff8881029f9800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.483844]  ffff8881029f9880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.484149] >ffff8881029f9900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.484451]                    ^
[   12.484857]  ffff8881029f9980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.485144]  ffff8881029f9a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.485359] ==================================================================