Hay
Date
July 18, 2025, 2:09 p.m.

Environment
qemu-arm64
qemu-x86_64

[   19.010875] ==================================================================
[   19.010973] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   19.011113] Read of size 1 at addr fff00000c78e9000 by task kunit_try_catch/227
[   19.011202] 
[   19.011619] CPU: 0 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.011793] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.011932] Hardware name: linux,dummy-virt (DT)
[   19.012033] Call trace:
[   19.012063]  show_stack+0x20/0x38 (C)
[   19.012120]  dump_stack_lvl+0x8c/0xd0
[   19.012558]  print_report+0x118/0x5d0
[   19.012720]  kasan_report+0xdc/0x128
[   19.012791]  __asan_report_load1_noabort+0x20/0x30
[   19.012856]  mempool_uaf_helper+0x314/0x340
[   19.013348]  mempool_kmalloc_uaf+0xc4/0x120
[   19.013431]  kunit_try_run_case+0x170/0x3f0
[   19.013495]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.013547]  kthread+0x328/0x630
[   19.013592]  ret_from_fork+0x10/0x20
[   19.013652] 
[   19.013671] Allocated by task 227:
[   19.013715]  kasan_save_stack+0x3c/0x68
[   19.013769]  kasan_save_track+0x20/0x40
[   19.013807]  kasan_save_alloc_info+0x40/0x58
[   19.013868]  __kasan_mempool_unpoison_object+0x11c/0x180
[   19.014227]  remove_element+0x130/0x1f8
[   19.014323]  mempool_alloc_preallocated+0x58/0xc0
[   19.014413]  mempool_uaf_helper+0xa4/0x340
[   19.014494]  mempool_kmalloc_uaf+0xc4/0x120
[   19.014920]  kunit_try_run_case+0x170/0x3f0
[   19.015174]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.015246]  kthread+0x328/0x630
[   19.015348]  ret_from_fork+0x10/0x20
[   19.015529] 
[   19.015607] Freed by task 227:
[   19.016172]  kasan_save_stack+0x3c/0x68
[   19.016525]  kasan_save_track+0x20/0x40
[   19.016596]  kasan_save_free_info+0x4c/0x78
[   19.016678]  __kasan_mempool_poison_object+0xc0/0x150
[   19.016740]  mempool_free+0x28c/0x328
[   19.016885]  mempool_uaf_helper+0x104/0x340
[   19.017034]  mempool_kmalloc_uaf+0xc4/0x120
[   19.017085]  kunit_try_run_case+0x170/0x3f0
[   19.017169]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.017384]  kthread+0x328/0x630
[   19.017577]  ret_from_fork+0x10/0x20
[   19.017714] 
[   19.017738] The buggy address belongs to the object at fff00000c78e9000
[   19.017738]  which belongs to the cache kmalloc-128 of size 128
[   19.018004] The buggy address is located 0 bytes inside of
[   19.018004]  freed 128-byte region [fff00000c78e9000, fff00000c78e9080)
[   19.018178] 
[   19.018233] The buggy address belongs to the physical page:
[   19.018281] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078e9
[   19.018610] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.018687] page_type: f5(slab)
[   19.018902] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.019141] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.019373] page dumped because: kasan: bad access detected
[   19.019459] 
[   19.019610] Memory state around the buggy address:
[   19.019711]  fff00000c78e8f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.019766]  fff00000c78e8f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.019809] >fff00000c78e9000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.020169]                    ^
[   19.020250]  fff00000c78e9080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.020352]  fff00000c78e9100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.020431] ==================================================================
[   19.050771] ==================================================================
[   19.051035] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   19.051106] Read of size 1 at addr fff00000c78e5240 by task kunit_try_catch/231
[   19.051521] 
[   19.051607] CPU: 0 UID: 0 PID: 231 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.051869] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.051944] Hardware name: linux,dummy-virt (DT)
[   19.052084] Call trace:
[   19.052118]  show_stack+0x20/0x38 (C)
[   19.052185]  dump_stack_lvl+0x8c/0xd0
[   19.052301]  print_report+0x118/0x5d0
[   19.052352]  kasan_report+0xdc/0x128
[   19.052397]  __asan_report_load1_noabort+0x20/0x30
[   19.052766]  mempool_uaf_helper+0x314/0x340
[   19.052830]  mempool_slab_uaf+0xc0/0x118
[   19.052918]  kunit_try_run_case+0x170/0x3f0
[   19.053000]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.053071]  kthread+0x328/0x630
[   19.053145]  ret_from_fork+0x10/0x20
[   19.053255] 
[   19.053542] Allocated by task 231:
[   19.053605]  kasan_save_stack+0x3c/0x68
[   19.053692]  kasan_save_track+0x20/0x40
[   19.053758]  kasan_save_alloc_info+0x40/0x58
[   19.053824]  __kasan_mempool_unpoison_object+0xbc/0x180
[   19.054115]  remove_element+0x16c/0x1f8
[   19.054253]  mempool_alloc_preallocated+0x58/0xc0
[   19.054330]  mempool_uaf_helper+0xa4/0x340
[   19.054396]  mempool_slab_uaf+0xc0/0x118
[   19.054519]  kunit_try_run_case+0x170/0x3f0
[   19.054680]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.054807]  kthread+0x328/0x630
[   19.054915]  ret_from_fork+0x10/0x20
[   19.055259] 
[   19.055339] Freed by task 231:
[   19.055392]  kasan_save_stack+0x3c/0x68
[   19.055458]  kasan_save_track+0x20/0x40
[   19.055630]  kasan_save_free_info+0x4c/0x78
[   19.055820]  __kasan_mempool_poison_object+0xc0/0x150
[   19.055901]  mempool_free+0x28c/0x328
[   19.055998]  mempool_uaf_helper+0x104/0x340
[   19.056039]  mempool_slab_uaf+0xc0/0x118
[   19.056723]  kunit_try_run_case+0x170/0x3f0
[   19.056818]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.056879]  kthread+0x328/0x630
[   19.056912]  ret_from_fork+0x10/0x20
[   19.056950] 
[   19.056993] The buggy address belongs to the object at fff00000c78e5240
[   19.056993]  which belongs to the cache test_cache of size 123
[   19.057222] The buggy address is located 0 bytes inside of
[   19.057222]  freed 123-byte region [fff00000c78e5240, fff00000c78e52bb)
[   19.057598] 
[   19.057687] The buggy address belongs to the physical page:
[   19.057856] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078e5
[   19.058009] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.058112] page_type: f5(slab)
[   19.058163] raw: 0bfffe0000000000 fff00000c78af3c0 dead000000000122 0000000000000000
[   19.058368] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   19.058533] page dumped because: kasan: bad access detected
[   19.058625] 
[   19.058929] Memory state around the buggy address:
[   19.059027]  fff00000c78e5100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.059079]  fff00000c78e5180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.059125] >fff00000c78e5200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   19.059202]                                            ^
[   19.059249]  fff00000c78e5280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.059473]  fff00000c78e5300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.059517] ==================================================================

[   18.648005] ==================================================================
[   18.648111] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   18.648213] Read of size 1 at addr fff00000c7a4e100 by task kunit_try_catch/227
[   18.648271] 
[   18.648311] CPU: 1 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.648486] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.648835] Hardware name: linux,dummy-virt (DT)
[   18.648886] Call trace:
[   18.648965]  show_stack+0x20/0x38 (C)
[   18.649037]  dump_stack_lvl+0x8c/0xd0
[   18.649117]  print_report+0x118/0x5d0
[   18.649166]  kasan_report+0xdc/0x128
[   18.649211]  __asan_report_load1_noabort+0x20/0x30
[   18.649261]  mempool_uaf_helper+0x314/0x340
[   18.649308]  mempool_kmalloc_uaf+0xc4/0x120
[   18.649502]  kunit_try_run_case+0x170/0x3f0
[   18.649588]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.649693]  kthread+0x328/0x630
[   18.649767]  ret_from_fork+0x10/0x20
[   18.649831] 
[   18.649921] Allocated by task 227:
[   18.649979]  kasan_save_stack+0x3c/0x68
[   18.651008]  kasan_save_track+0x20/0x40
[   18.651067]  kasan_save_alloc_info+0x40/0x58
[   18.651109]  __kasan_mempool_unpoison_object+0x11c/0x180
[   18.651445]  remove_element+0x130/0x1f8
[   18.651521]  mempool_alloc_preallocated+0x58/0xc0
[   18.651664]  mempool_uaf_helper+0xa4/0x340
[   18.651767]  mempool_kmalloc_uaf+0xc4/0x120
[   18.651817]  kunit_try_run_case+0x170/0x3f0
[   18.652276]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.652541]  kthread+0x328/0x630
[   18.652575]  ret_from_fork+0x10/0x20
[   18.653264] 
[   18.653293] Freed by task 227:
[   18.653335]  kasan_save_stack+0x3c/0x68
[   18.654012]  kasan_save_track+0x20/0x40
[   18.654402]  kasan_save_free_info+0x4c/0x78
[   18.654717]  __kasan_mempool_poison_object+0xc0/0x150
[   18.655393]  mempool_free+0x28c/0x328
[   18.655570]  mempool_uaf_helper+0x104/0x340
[   18.655607]  mempool_kmalloc_uaf+0xc4/0x120
[   18.655647]  kunit_try_run_case+0x170/0x3f0
[   18.656276]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.656821]  kthread+0x328/0x630
[   18.656998]  ret_from_fork+0x10/0x20
[   18.657039] 
[   18.657531] The buggy address belongs to the object at fff00000c7a4e100
[   18.657531]  which belongs to the cache kmalloc-128 of size 128
[   18.658015] The buggy address is located 0 bytes inside of
[   18.658015]  freed 128-byte region [fff00000c7a4e100, fff00000c7a4e180)
[   18.658725] 
[   18.659109] The buggy address belongs to the physical page:
[   18.659147] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a4e
[   18.661461] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.661529] page_type: f5(slab)
[   18.661687] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.662327] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.663551] page dumped because: kasan: bad access detected
[   18.663603] 
[   18.663657] Memory state around the buggy address:
[   18.663694]  fff00000c7a4e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.663903]  fff00000c7a4e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.664053] >fff00000c7a4e100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.664546]                    ^
[   18.665173]  fff00000c7a4e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.665237]  fff00000c7a4e200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.665501] ==================================================================
[   18.699249] ==================================================================
[   18.699313] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   18.699749] Read of size 1 at addr fff00000c7a5b240 by task kunit_try_catch/231
[   18.700165] 
[   18.700214] CPU: 1 UID: 0 PID: 231 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.700316] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.700363] Hardware name: linux,dummy-virt (DT)
[   18.700397] Call trace:
[   18.700429]  show_stack+0x20/0x38 (C)
[   18.700481]  dump_stack_lvl+0x8c/0xd0
[   18.701965]  print_report+0x118/0x5d0
[   18.702514]  kasan_report+0xdc/0x128
[   18.703063]  __asan_report_load1_noabort+0x20/0x30
[   18.703260]  mempool_uaf_helper+0x314/0x340
[   18.703315]  mempool_slab_uaf+0xc0/0x118
[   18.703417]  kunit_try_run_case+0x170/0x3f0
[   18.704110]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.704234]  kthread+0x328/0x630
[   18.704380]  ret_from_fork+0x10/0x20
[   18.704552] 
[   18.704692] Allocated by task 231:
[   18.704726]  kasan_save_stack+0x3c/0x68
[   18.704791]  kasan_save_track+0x20/0x40
[   18.705042]  kasan_save_alloc_info+0x40/0x58
[   18.705211]  __kasan_mempool_unpoison_object+0xbc/0x180
[   18.705356]  remove_element+0x16c/0x1f8
[   18.705425]  mempool_alloc_preallocated+0x58/0xc0
[   18.705794]  mempool_uaf_helper+0xa4/0x340
[   18.705863]  mempool_slab_uaf+0xc0/0x118
[   18.705935]  kunit_try_run_case+0x170/0x3f0
[   18.706059]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.706128]  kthread+0x328/0x630
[   18.706477]  ret_from_fork+0x10/0x20
[   18.706923] 
[   18.707004] Freed by task 231:
[   18.707036]  kasan_save_stack+0x3c/0x68
[   18.707357]  kasan_save_track+0x20/0x40
[   18.707437]  kasan_save_free_info+0x4c/0x78
[   18.707520]  __kasan_mempool_poison_object+0xc0/0x150
[   18.707566]  mempool_free+0x28c/0x328
[   18.707907]  mempool_uaf_helper+0x104/0x340
[   18.707962]  mempool_slab_uaf+0xc0/0x118
[   18.708000]  kunit_try_run_case+0x170/0x3f0
[   18.708038]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.708082]  kthread+0x328/0x630
[   18.708115]  ret_from_fork+0x10/0x20
[   18.708156] 
[   18.708177] The buggy address belongs to the object at fff00000c7a5b240
[   18.708177]  which belongs to the cache test_cache of size 123
[   18.708240] The buggy address is located 0 bytes inside of
[   18.708240]  freed 123-byte region [fff00000c7a5b240, fff00000c7a5b2bb)
[   18.708308] 
[   18.708338] The buggy address belongs to the physical page:
[   18.708372] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a5b
[   18.708424] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.708474] page_type: f5(slab)
[   18.708519] raw: 0bfffe0000000000 fff00000c598d8c0 dead000000000122 0000000000000000
[   18.708569] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   18.708607] page dumped because: kasan: bad access detected
[   18.708645] 
[   18.708662] Memory state around the buggy address:
[   18.708697]  fff00000c7a5b100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.708737]  fff00000c7a5b180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.708872] >fff00000c7a5b200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   18.708947]                                            ^
[   18.708985]  fff00000c7a5b280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.709428]  fff00000c7a5b300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.709494] ==================================================================

[   18.620521] ==================================================================
[   18.620674] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   18.620760] Read of size 1 at addr fff00000c7711240 by task kunit_try_catch/231
[   18.620812] 
[   18.620847] CPU: 1 UID: 0 PID: 231 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.620930] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.620955] Hardware name: linux,dummy-virt (DT)
[   18.620987] Call trace:
[   18.621047]  show_stack+0x20/0x38 (C)
[   18.621102]  dump_stack_lvl+0x8c/0xd0
[   18.621193]  print_report+0x118/0x5d0
[   18.621240]  kasan_report+0xdc/0x128
[   18.621283]  __asan_report_load1_noabort+0x20/0x30
[   18.621340]  mempool_uaf_helper+0x314/0x340
[   18.621385]  mempool_slab_uaf+0xc0/0x118
[   18.621428]  kunit_try_run_case+0x170/0x3f0
[   18.621474]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.621554]  kthread+0x328/0x630
[   18.621595]  ret_from_fork+0x10/0x20
[   18.621697] 
[   18.621771] Allocated by task 231:
[   18.621828]  kasan_save_stack+0x3c/0x68
[   18.621869]  kasan_save_track+0x20/0x40
[   18.621914]  kasan_save_alloc_info+0x40/0x58
[   18.621955]  __kasan_mempool_unpoison_object+0xbc/0x180
[   18.622110]  remove_element+0x16c/0x1f8
[   18.622199]  mempool_alloc_preallocated+0x58/0xc0
[   18.622278]  mempool_uaf_helper+0xa4/0x340
[   18.622315]  mempool_slab_uaf+0xc0/0x118
[   18.622399]  kunit_try_run_case+0x170/0x3f0
[   18.622486]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.622530]  kthread+0x328/0x630
[   18.622628]  ret_from_fork+0x10/0x20
[   18.622665] 
[   18.622683] Freed by task 231:
[   18.622709]  kasan_save_stack+0x3c/0x68
[   18.622781]  kasan_save_track+0x20/0x40
[   18.622826]  kasan_save_free_info+0x4c/0x78
[   18.623015]  __kasan_mempool_poison_object+0xc0/0x150
[   18.623061]  mempool_free+0x28c/0x328
[   18.623095]  mempool_uaf_helper+0x104/0x340
[   18.623142]  mempool_slab_uaf+0xc0/0x118
[   18.623241]  kunit_try_run_case+0x170/0x3f0
[   18.623333]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.623474]  kthread+0x328/0x630
[   18.623593]  ret_from_fork+0x10/0x20
[   18.623785] 
[   18.623890] The buggy address belongs to the object at fff00000c7711240
[   18.623890]  which belongs to the cache test_cache of size 123
[   18.624052] The buggy address is located 0 bytes inside of
[   18.624052]  freed 123-byte region [fff00000c7711240, fff00000c77112bb)
[   18.624206] 
[   18.624229] The buggy address belongs to the physical page:
[   18.624260] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107711
[   18.624323] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.624373] page_type: f5(slab)
[   18.624573] raw: 0bfffe0000000000 fff00000c1bfc640 dead000000000122 0000000000000000
[   18.624622] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   18.624662] page dumped because: kasan: bad access detected
[   18.624800] 
[   18.624906] Memory state around the buggy address:
[   18.624990]  fff00000c7711100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.625180]  fff00000c7711180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.625252] >fff00000c7711200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   18.625380]                                            ^
[   18.625475]  fff00000c7711280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.625626]  fff00000c7711300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.625703] ==================================================================
[   18.600680] ==================================================================
[   18.600769] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   18.600839] Read of size 1 at addr fff00000c472cf00 by task kunit_try_catch/227
[   18.600889] 
[   18.600947] CPU: 1 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.601035] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.601070] Hardware name: linux,dummy-virt (DT)
[   18.601112] Call trace:
[   18.601136]  show_stack+0x20/0x38 (C)
[   18.601189]  dump_stack_lvl+0x8c/0xd0
[   18.601241]  print_report+0x118/0x5d0
[   18.601303]  kasan_report+0xdc/0x128
[   18.601362]  __asan_report_load1_noabort+0x20/0x30
[   18.601413]  mempool_uaf_helper+0x314/0x340
[   18.601459]  mempool_kmalloc_uaf+0xc4/0x120
[   18.601504]  kunit_try_run_case+0x170/0x3f0
[   18.601553]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.601615]  kthread+0x328/0x630
[   18.601659]  ret_from_fork+0x10/0x20
[   18.601726] 
[   18.601747] Allocated by task 227:
[   18.601778]  kasan_save_stack+0x3c/0x68
[   18.601820]  kasan_save_track+0x20/0x40
[   18.601928]  kasan_save_alloc_info+0x40/0x58
[   18.602018]  __kasan_mempool_unpoison_object+0x11c/0x180
[   18.602086]  remove_element+0x130/0x1f8
[   18.602125]  mempool_alloc_preallocated+0x58/0xc0
[   18.602163]  mempool_uaf_helper+0xa4/0x340
[   18.602200]  mempool_kmalloc_uaf+0xc4/0x120
[   18.602237]  kunit_try_run_case+0x170/0x3f0
[   18.602275]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.602317]  kthread+0x328/0x630
[   18.602350]  ret_from_fork+0x10/0x20
[   18.602386] 
[   18.602430] Freed by task 227:
[   18.602458]  kasan_save_stack+0x3c/0x68
[   18.602494]  kasan_save_track+0x20/0x40
[   18.602529]  kasan_save_free_info+0x4c/0x78
[   18.602569]  __kasan_mempool_poison_object+0xc0/0x150
[   18.602722]  mempool_free+0x28c/0x328
[   18.602760]  mempool_uaf_helper+0x104/0x340
[   18.602798]  mempool_kmalloc_uaf+0xc4/0x120
[   18.602868]  kunit_try_run_case+0x170/0x3f0
[   18.603001]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.603137]  kthread+0x328/0x630
[   18.603276]  ret_from_fork+0x10/0x20
[   18.603382] 
[   18.603491] The buggy address belongs to the object at fff00000c472cf00
[   18.603491]  which belongs to the cache kmalloc-128 of size 128
[   18.603553] The buggy address is located 0 bytes inside of
[   18.603553]  freed 128-byte region [fff00000c472cf00, fff00000c472cf80)
[   18.603613] 
[   18.603633] The buggy address belongs to the physical page:
[   18.603665] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10472c
[   18.603768] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.603821] page_type: f5(slab)
[   18.603882] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.603932] raw: 0000000000000000 0000000000100010 00000000f5000000 0000000000000000
[   18.603972] page dumped because: kasan: bad access detected
[   18.604005] 
[   18.604025] Memory state around the buggy address:
[   18.604056]  fff00000c472ce00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.604130]  fff00000c472ce80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.604206] >fff00000c472cf00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.604315]                    ^
[   18.604438]  fff00000c472cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.604512]  fff00000c472d000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.604622] ==================================================================

[   13.740310] ==================================================================
[   13.741049] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x392/0x400
[   13.741405] Read of size 1 at addr ffff888102e24d00 by task kunit_try_catch/244
[   13.742168] 
[   13.742326] CPU: 0 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   13.742374] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.742385] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.742409] Call Trace:
[   13.742421]  <TASK>
[   13.742439]  dump_stack_lvl+0x73/0xb0
[   13.742472]  print_report+0xd1/0x610
[   13.742494]  ? __virt_addr_valid+0x1db/0x2d0
[   13.742520]  ? mempool_uaf_helper+0x392/0x400
[   13.742541]  ? kasan_complete_mode_report_info+0x64/0x200
[   13.742564]  ? mempool_uaf_helper+0x392/0x400
[   13.742707]  kasan_report+0x141/0x180
[   13.742730]  ? mempool_uaf_helper+0x392/0x400
[   13.742757]  __asan_report_load1_noabort+0x18/0x20
[   13.742844]  mempool_uaf_helper+0x392/0x400
[   13.742866]  ? __pfx_mempool_uaf_helper+0x10/0x10
[   13.742902]  ? __kasan_check_write+0x18/0x20
[   13.742922]  ? __pfx_sched_clock_cpu+0x10/0x10
[   13.742946]  ? finish_task_switch.isra.0+0x153/0x700
[   13.742974]  mempool_kmalloc_uaf+0xef/0x140
[   13.743014]  ? __pfx_mempool_kmalloc_uaf+0x10/0x10
[   13.743040]  ? __pfx_mempool_kmalloc+0x10/0x10
[   13.743064]  ? __pfx_mempool_kfree+0x10/0x10
[   13.743089]  ? __pfx_read_tsc+0x10/0x10
[   13.743110]  ? ktime_get_ts64+0x86/0x230
[   13.743135]  kunit_try_run_case+0x1a5/0x480
[   13.743162]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.743184]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.743210]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.743236]  ? __kthread_parkme+0x82/0x180
[   13.743259]  ? preempt_count_sub+0x50/0x80
[   13.743283]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.743306]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.743330]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.743354]  kthread+0x337/0x6f0
[   13.743373]  ? trace_preempt_on+0x20/0xc0
[   13.743398]  ? __pfx_kthread+0x10/0x10
[   13.743418]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.743440]  ? calculate_sigpending+0x7b/0xa0
[   13.743465]  ? __pfx_kthread+0x10/0x10
[   13.743486]  ret_from_fork+0x116/0x1d0
[   13.743505]  ? __pfx_kthread+0x10/0x10
[   13.743525]  ret_from_fork_asm+0x1a/0x30
[   13.743561]  </TASK>
[   13.743573] 
[   13.752734] Allocated by task 244:
[   13.752953]  kasan_save_stack+0x45/0x70
[   13.753121]  kasan_save_track+0x18/0x40
[   13.753308]  kasan_save_alloc_info+0x3b/0x50
[   13.753511]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   13.753794]  remove_element+0x11e/0x190
[   13.754044]  mempool_alloc_preallocated+0x4d/0x90
[   13.754238]  mempool_uaf_helper+0x96/0x400
[   13.754433]  mempool_kmalloc_uaf+0xef/0x140
[   13.754701]  kunit_try_run_case+0x1a5/0x480
[   13.754959]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.755182]  kthread+0x337/0x6f0
[   13.755353]  ret_from_fork+0x116/0x1d0
[   13.755628]  ret_from_fork_asm+0x1a/0x30
[   13.755808] 
[   13.755926] Freed by task 244:
[   13.756109]  kasan_save_stack+0x45/0x70
[   13.756282]  kasan_save_track+0x18/0x40
[   13.756475]  kasan_save_free_info+0x3f/0x60
[   13.756934]  __kasan_mempool_poison_object+0x131/0x1d0
[   13.757266]  mempool_free+0x2ec/0x380
[   13.757463]  mempool_uaf_helper+0x11a/0x400
[   13.757609]  mempool_kmalloc_uaf+0xef/0x140
[   13.757755]  kunit_try_run_case+0x1a5/0x480
[   13.757908]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.758083]  kthread+0x337/0x6f0
[   13.758217]  ret_from_fork+0x116/0x1d0
[   13.758492]  ret_from_fork_asm+0x1a/0x30
[   13.758746] 
[   13.758849] The buggy address belongs to the object at ffff888102e24d00
[   13.758849]  which belongs to the cache kmalloc-128 of size 128
[   13.759684] The buggy address is located 0 bytes inside of
[   13.759684]  freed 128-byte region [ffff888102e24d00, ffff888102e24d80)
[   13.760225] 
[   13.760299] The buggy address belongs to the physical page:
[   13.760475] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102e24
[   13.761230] flags: 0x200000000000000(node=0|zone=2)
[   13.761473] page_type: f5(slab)
[   13.761766] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   13.762114] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.762432] page dumped because: kasan: bad access detected
[   13.762778] 
[   13.762908] Memory state around the buggy address:
[   13.763120]  ffff888102e24c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.763449]  ffff888102e24c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.763823] >ffff888102e24d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.764220]                    ^
[   13.764337]  ffff888102e24d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.764912]  ffff888102e24e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.765377] ==================================================================
[   13.793118] ==================================================================
[   13.793608] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x392/0x400
[   13.793987] Read of size 1 at addr ffff8881029b0240 by task kunit_try_catch/248
[   13.794337] 
[   13.794444] CPU: 1 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   13.794491] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.794504] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.794527] Call Trace:
[   13.794539]  <TASK>
[   13.794556]  dump_stack_lvl+0x73/0xb0
[   13.794645]  print_report+0xd1/0x610
[   13.794686]  ? __virt_addr_valid+0x1db/0x2d0
[   13.794712]  ? mempool_uaf_helper+0x392/0x400
[   13.794735]  ? kasan_complete_mode_report_info+0x64/0x200
[   13.794758]  ? mempool_uaf_helper+0x392/0x400
[   13.794787]  kasan_report+0x141/0x180
[   13.794809]  ? mempool_uaf_helper+0x392/0x400
[   13.794838]  __asan_report_load1_noabort+0x18/0x20
[   13.794870]  mempool_uaf_helper+0x392/0x400
[   13.794911]  ? __pfx_mempool_uaf_helper+0x10/0x10
[   13.794933]  ? update_load_avg+0x1be/0x21b0
[   13.794963]  ? finish_task_switch.isra.0+0x153/0x700
[   13.794990]  mempool_slab_uaf+0xea/0x140
[   13.795014]  ? __pfx_mempool_slab_uaf+0x10/0x10
[   13.795041]  ? __pfx_mempool_alloc_slab+0x10/0x10
[   13.795067]  ? __pfx_mempool_free_slab+0x10/0x10
[   13.795093]  ? __pfx_read_tsc+0x10/0x10
[   13.795124]  ? ktime_get_ts64+0x86/0x230
[   13.795150]  kunit_try_run_case+0x1a5/0x480
[   13.795177]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.795211]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.795237]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.795262]  ? __kthread_parkme+0x82/0x180
[   13.795283]  ? preempt_count_sub+0x50/0x80
[   13.795316]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.795340]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.795365]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.795400]  kthread+0x337/0x6f0
[   13.795420]  ? trace_preempt_on+0x20/0xc0
[   13.795444]  ? __pfx_kthread+0x10/0x10
[   13.795465]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.795487]  ? calculate_sigpending+0x7b/0xa0
[   13.795513]  ? __pfx_kthread+0x10/0x10
[   13.795574]  ret_from_fork+0x116/0x1d0
[   13.795596]  ? __pfx_kthread+0x10/0x10
[   13.795617]  ret_from_fork_asm+0x1a/0x30
[   13.795651]  </TASK>
[   13.795662] 
[   13.804765] Allocated by task 248:
[   13.804975]  kasan_save_stack+0x45/0x70
[   13.805127]  kasan_save_track+0x18/0x40
[   13.805394]  kasan_save_alloc_info+0x3b/0x50
[   13.805720]  __kasan_mempool_unpoison_object+0x1bb/0x200
[   13.805914]  remove_element+0x11e/0x190
[   13.806183]  mempool_alloc_preallocated+0x4d/0x90
[   13.806410]  mempool_uaf_helper+0x96/0x400
[   13.806689]  mempool_slab_uaf+0xea/0x140
[   13.806914]  kunit_try_run_case+0x1a5/0x480
[   13.807189]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.807431]  kthread+0x337/0x6f0
[   13.807554]  ret_from_fork+0x116/0x1d0
[   13.807689]  ret_from_fork_asm+0x1a/0x30
[   13.807829] 
[   13.807910] Freed by task 248:
[   13.808024]  kasan_save_stack+0x45/0x70
[   13.808216]  kasan_save_track+0x18/0x40
[   13.808406]  kasan_save_free_info+0x3f/0x60
[   13.808818]  __kasan_mempool_poison_object+0x131/0x1d0
[   13.809164]  mempool_free+0x2ec/0x380
[   13.809301]  mempool_uaf_helper+0x11a/0x400
[   13.809447]  mempool_slab_uaf+0xea/0x140
[   13.809756]  kunit_try_run_case+0x1a5/0x480
[   13.809983]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.810477]  kthread+0x337/0x6f0
[   13.810822]  ret_from_fork+0x116/0x1d0
[   13.811039]  ret_from_fork_asm+0x1a/0x30
[   13.811230] 
[   13.811303] The buggy address belongs to the object at ffff8881029b0240
[   13.811303]  which belongs to the cache test_cache of size 123
[   13.811663] The buggy address is located 0 bytes inside of
[   13.811663]  freed 123-byte region [ffff8881029b0240, ffff8881029b02bb)
[   13.812187] 
[   13.812284] The buggy address belongs to the physical page:
[   13.812567] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b0
[   13.813116] flags: 0x200000000000000(node=0|zone=2)
[   13.813290] page_type: f5(slab)
[   13.813414] raw: 0200000000000000 ffff8881029ad000 dead000000000122 0000000000000000
[   13.813996] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   13.814337] page dumped because: kasan: bad access detected
[   13.814594] 
[   13.814685] Memory state around the buggy address:
[   13.814890]  ffff8881029b0100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.815402]  ffff8881029b0180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.815842] >ffff8881029b0200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   13.816107]                                            ^
[   13.816280]  ffff8881029b0280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.816497]  ffff8881029b0300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.817068] ==================================================================

[   13.568554] ==================================================================
[   13.569019] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x392/0x400
[   13.569781] Read of size 1 at addr ffff8881026ef100 by task kunit_try_catch/245
[   13.570126] 
[   13.570250] CPU: 1 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   13.570298] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.570310] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.570333] Call Trace:
[   13.570345]  <TASK>
[   13.570363]  dump_stack_lvl+0x73/0xb0
[   13.570396]  print_report+0xd1/0x610
[   13.570421]  ? __virt_addr_valid+0x1db/0x2d0
[   13.570459]  ? mempool_uaf_helper+0x392/0x400
[   13.570482]  ? kasan_complete_mode_report_info+0x64/0x200
[   13.570575]  ? mempool_uaf_helper+0x392/0x400
[   13.570601]  kasan_report+0x141/0x180
[   13.570624]  ? mempool_uaf_helper+0x392/0x400
[   13.570881]  __asan_report_load1_noabort+0x18/0x20
[   13.570907]  mempool_uaf_helper+0x392/0x400
[   13.570932]  ? __pfx_mempool_uaf_helper+0x10/0x10
[   13.570958]  ? __pfx_sched_clock_cpu+0x10/0x10
[   13.570982]  ? finish_task_switch.isra.0+0x153/0x700
[   13.571009]  mempool_kmalloc_uaf+0xef/0x140
[   13.571033]  ? __pfx_mempool_kmalloc_uaf+0x10/0x10
[   13.571058]  ? __pfx_mempool_kmalloc+0x10/0x10
[   13.571083]  ? __pfx_mempool_kfree+0x10/0x10
[   13.571109]  ? __pfx_read_tsc+0x10/0x10
[   13.571130]  ? ktime_get_ts64+0x86/0x230
[   13.571156]  kunit_try_run_case+0x1a5/0x480
[   13.571183]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.571205]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.571231]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.571254]  ? __kthread_parkme+0x82/0x180
[   13.571276]  ? preempt_count_sub+0x50/0x80
[   13.571300]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.571323]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.571348]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.571375]  kthread+0x337/0x6f0
[   13.571397]  ? trace_preempt_on+0x20/0xc0
[   13.571449]  ? __pfx_kthread+0x10/0x10
[   13.571470]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.571492]  ? calculate_sigpending+0x7b/0xa0
[   13.571517]  ? __pfx_kthread+0x10/0x10
[   13.571539]  ret_from_fork+0x116/0x1d0
[   13.571558]  ? __pfx_kthread+0x10/0x10
[   13.571590]  ret_from_fork_asm+0x1a/0x30
[   13.571626]  </TASK>
[   13.571636] 
[   13.584787] Allocated by task 245:
[   13.584984]  kasan_save_stack+0x45/0x70
[   13.585187]  kasan_save_track+0x18/0x40
[   13.585359]  kasan_save_alloc_info+0x3b/0x50
[   13.585958]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   13.586304]  remove_element+0x11e/0x190
[   13.586724]  mempool_alloc_preallocated+0x4d/0x90
[   13.587079]  mempool_uaf_helper+0x96/0x400
[   13.587394]  mempool_kmalloc_uaf+0xef/0x140
[   13.587837]  kunit_try_run_case+0x1a5/0x480
[   13.588058]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.588304]  kthread+0x337/0x6f0
[   13.588479]  ret_from_fork+0x116/0x1d0
[   13.588961]  ret_from_fork_asm+0x1a/0x30
[   13.589147] 
[   13.589398] Freed by task 245:
[   13.589790]  kasan_save_stack+0x45/0x70
[   13.590092]  kasan_save_track+0x18/0x40
[   13.590243]  kasan_save_free_info+0x3f/0x60
[   13.590526]  __kasan_mempool_poison_object+0x131/0x1d0
[   13.590901]  mempool_free+0x2ec/0x380
[   13.591063]  mempool_uaf_helper+0x11a/0x400
[   13.591273]  mempool_kmalloc_uaf+0xef/0x140
[   13.591499]  kunit_try_run_case+0x1a5/0x480
[   13.591873]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.592166]  kthread+0x337/0x6f0
[   13.592352]  ret_from_fork+0x116/0x1d0
[   13.592513]  ret_from_fork_asm+0x1a/0x30
[   13.592698] 
[   13.592801] The buggy address belongs to the object at ffff8881026ef100
[   13.592801]  which belongs to the cache kmalloc-128 of size 128
[   13.593284] The buggy address is located 0 bytes inside of
[   13.593284]  freed 128-byte region [ffff8881026ef100, ffff8881026ef180)
[   13.594028] 
[   13.594113] The buggy address belongs to the physical page:
[   13.594343] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ef
[   13.594739] flags: 0x200000000000000(node=0|zone=2)
[   13.595059] page_type: f5(slab)
[   13.595230] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   13.595576] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.595796] page dumped because: kasan: bad access detected
[   13.596182] 
[   13.596280] Memory state around the buggy address:
[   13.597002]  ffff8881026ef000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.597326]  ffff8881026ef080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.597851] >ffff8881026ef100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.598181]                    ^
[   13.598345]  ffff8881026ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.598899]  ffff8881026ef200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.599139] ==================================================================
[   13.628106] ==================================================================
[   13.628678] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x392/0x400
[   13.628991] Read of size 1 at addr ffff8881026f1240 by task kunit_try_catch/249
[   13.629378] 
[   13.629538] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   13.629646] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.629659] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.629682] Call Trace:
[   13.629695]  <TASK>
[   13.629712]  dump_stack_lvl+0x73/0xb0
[   13.629744]  print_report+0xd1/0x610
[   13.629768]  ? __virt_addr_valid+0x1db/0x2d0
[   13.629792]  ? mempool_uaf_helper+0x392/0x400
[   13.629815]  ? kasan_complete_mode_report_info+0x64/0x200
[   13.629838]  ? mempool_uaf_helper+0x392/0x400
[   13.629860]  kasan_report+0x141/0x180
[   13.629883]  ? mempool_uaf_helper+0x392/0x400
[   13.629911]  __asan_report_load1_noabort+0x18/0x20
[   13.629935]  mempool_uaf_helper+0x392/0x400
[   13.629958]  ? __pfx_mempool_uaf_helper+0x10/0x10
[   13.629980]  ? update_load_avg+0x1be/0x21b0
[   13.630008]  ? finish_task_switch.isra.0+0x153/0x700
[   13.630035]  mempool_slab_uaf+0xea/0x140
[   13.630059]  ? __pfx_mempool_slab_uaf+0x10/0x10
[   13.630085]  ? __pfx_mempool_alloc_slab+0x10/0x10
[   13.630112]  ? __pfx_mempool_free_slab+0x10/0x10
[   13.630138]  ? __pfx_read_tsc+0x10/0x10
[   13.630161]  ? ktime_get_ts64+0x86/0x230
[   13.630186]  kunit_try_run_case+0x1a5/0x480
[   13.630213]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.630235]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.630261]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.630285]  ? __kthread_parkme+0x82/0x180
[   13.630307]  ? preempt_count_sub+0x50/0x80
[   13.630331]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.630355]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.630379]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.630403]  kthread+0x337/0x6f0
[   13.630445]  ? trace_preempt_on+0x20/0xc0
[   13.630470]  ? __pfx_kthread+0x10/0x10
[   13.630490]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.630512]  ? calculate_sigpending+0x7b/0xa0
[   13.630538]  ? __pfx_kthread+0x10/0x10
[   13.630559]  ret_from_fork+0x116/0x1d0
[   13.630578]  ? __pfx_kthread+0x10/0x10
[   13.630598]  ret_from_fork_asm+0x1a/0x30
[   13.630633]  </TASK>
[   13.630643] 
[   13.638932] Allocated by task 249:
[   13.639071]  kasan_save_stack+0x45/0x70
[   13.639222]  kasan_save_track+0x18/0x40
[   13.639413]  kasan_save_alloc_info+0x3b/0x50
[   13.639635]  __kasan_mempool_unpoison_object+0x1bb/0x200
[   13.639889]  remove_element+0x11e/0x190
[   13.640294]  mempool_alloc_preallocated+0x4d/0x90
[   13.640595]  mempool_uaf_helper+0x96/0x400
[   13.640769]  mempool_slab_uaf+0xea/0x140
[   13.640940]  kunit_try_run_case+0x1a5/0x480
[   13.641088]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.641291]  kthread+0x337/0x6f0
[   13.641704]  ret_from_fork+0x116/0x1d0
[   13.641922]  ret_from_fork_asm+0x1a/0x30
[   13.642128] 
[   13.642223] Freed by task 249:
[   13.642380]  kasan_save_stack+0x45/0x70
[   13.642554]  kasan_save_track+0x18/0x40
[   13.642767]  kasan_save_free_info+0x3f/0x60
[   13.642956]  __kasan_mempool_poison_object+0x131/0x1d0
[   13.643125]  mempool_free+0x2ec/0x380
[   13.643258]  mempool_uaf_helper+0x11a/0x400
[   13.643404]  mempool_slab_uaf+0xea/0x140
[   13.643553]  kunit_try_run_case+0x1a5/0x480
[   13.643826]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.644365]  kthread+0x337/0x6f0
[   13.644656]  ret_from_fork+0x116/0x1d0
[   13.644843]  ret_from_fork_asm+0x1a/0x30
[   13.645036] 
[   13.645137] The buggy address belongs to the object at ffff8881026f1240
[   13.645137]  which belongs to the cache test_cache of size 123
[   13.645519] The buggy address is located 0 bytes inside of
[   13.645519]  freed 123-byte region [ffff8881026f1240, ffff8881026f12bb)
[   13.645942] 
[   13.646047] The buggy address belongs to the physical page:
[   13.646307] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f1
[   13.647034] flags: 0x200000000000000(node=0|zone=2)
[   13.647281] page_type: f5(slab)
[   13.647464] raw: 0200000000000000 ffff8881015eab40 dead000000000122 0000000000000000
[   13.647916] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   13.648219] page dumped because: kasan: bad access detected
[   13.648404] 
[   13.648552] Memory state around the buggy address:
[   13.648780]  ffff8881026f1100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.649112]  ffff8881026f1180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.649367] >ffff8881026f1200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   13.650039]                                            ^
[   13.650263]  ffff8881026f1280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.650648]  ffff8881026f1300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.650901] ==================================================================

[   13.853858] ==================================================================
[   13.854796] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x392/0x400
[   13.855853] Read of size 1 at addr ffff8881029c8240 by task kunit_try_catch/248
[   13.856422] 
[   13.856529] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   13.856583] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.856597] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.856621] Call Trace:
[   13.856639]  <TASK>
[   13.856660]  dump_stack_lvl+0x73/0xb0
[   13.856699]  print_report+0xd1/0x610
[   13.856723]  ? __virt_addr_valid+0x1db/0x2d0
[   13.856748]  ? mempool_uaf_helper+0x392/0x400
[   13.856771]  ? kasan_complete_mode_report_info+0x64/0x200
[   13.856793]  ? mempool_uaf_helper+0x392/0x400
[   13.856816]  kasan_report+0x141/0x180
[   13.856837]  ? mempool_uaf_helper+0x392/0x400
[   13.856871]  __asan_report_load1_noabort+0x18/0x20
[   13.856896]  mempool_uaf_helper+0x392/0x400
[   13.856919]  ? __pfx_mempool_uaf_helper+0x10/0x10
[   13.856943]  ? __pfx_sched_clock_cpu+0x10/0x10
[   13.856967]  ? finish_task_switch.isra.0+0x153/0x700
[   13.856993]  mempool_slab_uaf+0xea/0x140
[   13.857040]  ? __pfx_mempool_slab_uaf+0x10/0x10
[   13.857065]  ? __pfx_mempool_alloc_slab+0x10/0x10
[   13.857091]  ? __pfx_mempool_free_slab+0x10/0x10
[   13.857117]  ? __pfx_read_tsc+0x10/0x10
[   13.857139]  ? ktime_get_ts64+0x86/0x230
[   13.857164]  kunit_try_run_case+0x1a5/0x480
[   13.857191]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.857212]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.857238]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.857288]  ? __kthread_parkme+0x82/0x180
[   13.857310]  ? preempt_count_sub+0x50/0x80
[   13.857334]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.857358]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.857381]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.857406]  kthread+0x337/0x6f0
[   13.857425]  ? trace_preempt_on+0x20/0xc0
[   13.857449]  ? __pfx_kthread+0x10/0x10
[   13.857469]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.857490]  ? calculate_sigpending+0x7b/0xa0
[   13.857515]  ? __pfx_kthread+0x10/0x10
[   13.857536]  ret_from_fork+0x116/0x1d0
[   13.857555]  ? __pfx_kthread+0x10/0x10
[   13.857574]  ret_from_fork_asm+0x1a/0x30
[   13.857606]  </TASK>
[   13.857618] 
[   13.875508] Allocated by task 248:
[   13.876123]  kasan_save_stack+0x45/0x70
[   13.876671]  kasan_save_track+0x18/0x40
[   13.876825]  kasan_save_alloc_info+0x3b/0x50
[   13.876987]  __kasan_mempool_unpoison_object+0x1bb/0x200
[   13.878204]  remove_element+0x11e/0x190
[   13.878628]  mempool_alloc_preallocated+0x4d/0x90
[   13.879089]  mempool_uaf_helper+0x96/0x400
[   13.879681]  mempool_slab_uaf+0xea/0x140
[   13.880167]  kunit_try_run_case+0x1a5/0x480
[   13.880645]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.880832]  kthread+0x337/0x6f0
[   13.880963]  ret_from_fork+0x116/0x1d0
[   13.881646]  ret_from_fork_asm+0x1a/0x30
[   13.882343] 
[   13.882512] Freed by task 248:
[   13.883028]  kasan_save_stack+0x45/0x70
[   13.883939]  kasan_save_track+0x18/0x40
[   13.884464]  kasan_save_free_info+0x3f/0x60
[   13.884622]  __kasan_mempool_poison_object+0x131/0x1d0
[   13.884789]  mempool_free+0x2ec/0x380
[   13.884930]  mempool_uaf_helper+0x11a/0x400
[   13.885259]  mempool_slab_uaf+0xea/0x140
[   13.886070]  kunit_try_run_case+0x1a5/0x480
[   13.886589]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.887379]  kthread+0x337/0x6f0
[   13.887851]  ret_from_fork+0x116/0x1d0
[   13.888404]  ret_from_fork_asm+0x1a/0x30
[   13.889306] 
[   13.889391] The buggy address belongs to the object at ffff8881029c8240
[   13.889391]  which belongs to the cache test_cache of size 123
[   13.889743] The buggy address is located 0 bytes inside of
[   13.889743]  freed 123-byte region [ffff8881029c8240, ffff8881029c82bb)
[   13.890092] 
[   13.890166] The buggy address belongs to the physical page:
[   13.890338] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029c8
[   13.891535] flags: 0x200000000000000(node=0|zone=2)
[   13.892109] page_type: f5(slab)
[   13.892435] raw: 0200000000000000 ffff8881034193c0 dead000000000122 0000000000000000
[   13.893449] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   13.894380] page dumped because: kasan: bad access detected
[   13.895482] 
[   13.895920] Memory state around the buggy address:
[   13.896631]  ffff8881029c8100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.897423]  ffff8881029c8180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.897999] >ffff8881029c8200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   13.898736]                                            ^
[   13.899559]  ffff8881029c8280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.899790]  ffff8881029c8300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.900685] ==================================================================
[   13.787332] ==================================================================
[   13.788527] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x392/0x400
[   13.789088] Read of size 1 at addr ffff8881029c5000 by task kunit_try_catch/244
[   13.789311] 
[   13.789409] CPU: 0 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   13.789471] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.789484] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.789508] Call Trace:
[   13.789523]  <TASK>
[   13.789582]  dump_stack_lvl+0x73/0xb0
[   13.789621]  print_report+0xd1/0x610
[   13.789646]  ? __virt_addr_valid+0x1db/0x2d0
[   13.789671]  ? mempool_uaf_helper+0x392/0x400
[   13.789695]  ? kasan_complete_mode_report_info+0x64/0x200
[   13.789718]  ? mempool_uaf_helper+0x392/0x400
[   13.789740]  kasan_report+0x141/0x180
[   13.789763]  ? mempool_uaf_helper+0x392/0x400
[   13.789790]  __asan_report_load1_noabort+0x18/0x20
[   13.789815]  mempool_uaf_helper+0x392/0x400
[   13.789839]  ? __pfx_mempool_uaf_helper+0x10/0x10
[   13.789862]  ? kasan_save_track+0x18/0x40
[   13.789881]  ? kasan_save_alloc_info+0x3b/0x50
[   13.789903]  ? kasan_save_stack+0x45/0x70
[   13.789928]  mempool_kmalloc_uaf+0xef/0x140
[   13.789949]  ? __pfx_mempool_kmalloc_uaf+0x10/0x10
[   13.789975]  ? __pfx_mempool_kmalloc+0x10/0x10
[   13.790001]  ? __pfx_mempool_kfree+0x10/0x10
[   13.790037]  ? __pfx_read_tsc+0x10/0x10
[   13.790059]  ? ktime_get_ts64+0x86/0x230
[   13.790086]  kunit_try_run_case+0x1a5/0x480
[   13.790113]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.790135]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.790161]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.790185]  ? __kthread_parkme+0x82/0x180
[   13.790207]  ? preempt_count_sub+0x50/0x80
[   13.790232]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.790256]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.790280]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.790304]  kthread+0x337/0x6f0
[   13.790324]  ? trace_preempt_on+0x20/0xc0
[   13.790349]  ? __pfx_kthread+0x10/0x10
[   13.790369]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.790390]  ? calculate_sigpending+0x7b/0xa0
[   13.790416]  ? __pfx_kthread+0x10/0x10
[   13.790460]  ret_from_fork+0x116/0x1d0
[   13.790480]  ? __pfx_kthread+0x10/0x10
[   13.790501]  ret_from_fork_asm+0x1a/0x30
[   13.790532]  </TASK>
[   13.790543] 
[   13.803378] Allocated by task 244:
[   13.803622]  kasan_save_stack+0x45/0x70
[   13.804038]  kasan_save_track+0x18/0x40
[   13.804173]  kasan_save_alloc_info+0x3b/0x50
[   13.804601]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   13.805053]  remove_element+0x11e/0x190
[   13.805194]  mempool_alloc_preallocated+0x4d/0x90
[   13.805349]  mempool_uaf_helper+0x96/0x400
[   13.805684]  mempool_kmalloc_uaf+0xef/0x140
[   13.806075]  kunit_try_run_case+0x1a5/0x480
[   13.806481]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.807062]  kthread+0x337/0x6f0
[   13.807401]  ret_from_fork+0x116/0x1d0
[   13.807776]  ret_from_fork_asm+0x1a/0x30
[   13.808165] 
[   13.808243] Freed by task 244:
[   13.808357]  kasan_save_stack+0x45/0x70
[   13.808670]  kasan_save_track+0x18/0x40
[   13.809047]  kasan_save_free_info+0x3f/0x60
[   13.809437]  __kasan_mempool_poison_object+0x131/0x1d0
[   13.809898]  mempool_free+0x2ec/0x380
[   13.810081]  mempool_uaf_helper+0x11a/0x400
[   13.810225]  mempool_kmalloc_uaf+0xef/0x140
[   13.810366]  kunit_try_run_case+0x1a5/0x480
[   13.810739]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.811225]  kthread+0x337/0x6f0
[   13.811573]  ret_from_fork+0x116/0x1d0
[   13.811923]  ret_from_fork_asm+0x1a/0x30
[   13.812304] 
[   13.812505] The buggy address belongs to the object at ffff8881029c5000
[   13.812505]  which belongs to the cache kmalloc-128 of size 128
[   13.813386] The buggy address is located 0 bytes inside of
[   13.813386]  freed 128-byte region [ffff8881029c5000, ffff8881029c5080)
[   13.814071] 
[   13.814151] The buggy address belongs to the physical page:
[   13.814321] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029c5
[   13.814620] flags: 0x200000000000000(node=0|zone=2)
[   13.814968] page_type: f5(slab)
[   13.815156] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   13.815448] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.815808] page dumped because: kasan: bad access detected
[   13.816028] 
[   13.816119] Memory state around the buggy address:
[   13.816322]  ffff8881029c4f00: 00 00 00 00 00 00 00 00 00 00 00 00 fc fc fc fc
[   13.816647]  ffff8881029c4f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.816922] >ffff8881029c5000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.817211]                    ^
[   13.817372]  ffff8881029c5080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.817646]  ffff8881029c5100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.817955] ==================================================================