Hay
Date
May 23, 2025, 11:07 p.m.

Environment
qemu-arm64
qemu-x86_64

[   28.112306] ==================================================================
[   28.112467] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8
[   28.112607] Read of size 1 at addr fff00000c775a000 by task kunit_try_catch/198
[   28.112751] 
[   28.112840] CPU: 0 UID: 0 PID: 198 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT 
[   28.113098] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.113219] Hardware name: linux,dummy-virt (DT)
[   28.113350] Call trace:
[   28.113440]  show_stack+0x20/0x38 (C)
[   28.113877]  dump_stack_lvl+0x8c/0xd0
[   28.114333]  print_report+0x118/0x608
[   28.114634]  kasan_report+0xdc/0x128
[   28.114811]  __asan_report_load1_noabort+0x20/0x30
[   28.114972]  ksize_uaf+0x598/0x5f8
[   28.115088]  kunit_try_run_case+0x170/0x3f0
[   28.115222]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.115470]  kthread+0x328/0x630
[   28.115617]  ret_from_fork+0x10/0x20
[   28.115755] 
[   28.115817] Allocated by task 198:
[   28.115975]  kasan_save_stack+0x3c/0x68
[   28.116094]  kasan_save_track+0x20/0x40
[   28.116198]  kasan_save_alloc_info+0x40/0x58
[   28.116500]  __kasan_kmalloc+0xd4/0xd8
[   28.116664]  __kmalloc_cache_noprof+0x15c/0x3c0
[   28.116815]  ksize_uaf+0xb8/0x5f8
[   28.116959]  kunit_try_run_case+0x170/0x3f0
[   28.117074]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.117248]  kthread+0x328/0x630
[   28.117350]  ret_from_fork+0x10/0x20
[   28.117442] 
[   28.117510] Freed by task 198:
[   28.117576]  kasan_save_stack+0x3c/0x68
[   28.117679]  kasan_save_track+0x20/0x40
[   28.117811]  kasan_save_free_info+0x4c/0x78
[   28.117947]  __kasan_slab_free+0x6c/0x98
[   28.118149]  kfree+0x214/0x3c8
[   28.118297]  ksize_uaf+0x11c/0x5f8
[   28.118412]  kunit_try_run_case+0x170/0x3f0
[   28.118599]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.118745]  kthread+0x328/0x630
[   28.118888]  ret_from_fork+0x10/0x20
[   28.119023] 
[   28.119141] The buggy address belongs to the object at fff00000c775a000
[   28.119141]  which belongs to the cache kmalloc-128 of size 128
[   28.119394] The buggy address is located 0 bytes inside of
[   28.119394]  freed 128-byte region [fff00000c775a000, fff00000c775a080)
[   28.119692] 
[   28.119760] The buggy address belongs to the physical page:
[   28.119989] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10775a
[   28.120303] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.120598] page_type: f5(slab)
[   28.120734] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   28.120883] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   28.121010] page dumped because: kasan: bad access detected
[   28.121106] 
[   28.121296] Memory state around the buggy address:
[   28.121977]  fff00000c7759f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   28.122430]  fff00000c7759f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   28.122772] >fff00000c775a000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   28.123138]                    ^
[   28.123267]  fff00000c775a080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.123984]  fff00000c775a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.124335] ==================================================================
[   28.099435] ==================================================================
[   28.099693] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8
[   28.099940] Read of size 1 at addr fff00000c775a000 by task kunit_try_catch/198
[   28.100101] 
[   28.100198] CPU: 0 UID: 0 PID: 198 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT 
[   28.100466] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.100556] Hardware name: linux,dummy-virt (DT)
[   28.100878] Call trace:
[   28.100952]  show_stack+0x20/0x38 (C)
[   28.101089]  dump_stack_lvl+0x8c/0xd0
[   28.101215]  print_report+0x118/0x608
[   28.101378]  kasan_report+0xdc/0x128
[   28.101622]  __kasan_check_byte+0x54/0x70
[   28.101853]  ksize+0x30/0x88
[   28.102248]  ksize_uaf+0x168/0x5f8
[   28.102391]  kunit_try_run_case+0x170/0x3f0
[   28.102564]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.102726]  kthread+0x328/0x630
[   28.102859]  ret_from_fork+0x10/0x20
[   28.103069] 
[   28.103147] Allocated by task 198:
[   28.103322]  kasan_save_stack+0x3c/0x68
[   28.103582]  kasan_save_track+0x20/0x40
[   28.103977]  kasan_save_alloc_info+0x40/0x58
[   28.104211]  __kasan_kmalloc+0xd4/0xd8
[   28.104417]  __kmalloc_cache_noprof+0x15c/0x3c0
[   28.104628]  ksize_uaf+0xb8/0x5f8
[   28.104827]  kunit_try_run_case+0x170/0x3f0
[   28.105023]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.105231]  kthread+0x328/0x630
[   28.105347]  ret_from_fork+0x10/0x20
[   28.105441] 
[   28.105500] Freed by task 198:
[   28.105562]  kasan_save_stack+0x3c/0x68
[   28.105666]  kasan_save_track+0x20/0x40
[   28.106227]  kasan_save_free_info+0x4c/0x78
[   28.106459]  __kasan_slab_free+0x6c/0x98
[   28.106588]  kfree+0x214/0x3c8
[   28.106734]  ksize_uaf+0x11c/0x5f8
[   28.106860]  kunit_try_run_case+0x170/0x3f0
[   28.107000]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.107173]  kthread+0x328/0x630
[   28.107324]  ret_from_fork+0x10/0x20
[   28.107502] 
[   28.107565] The buggy address belongs to the object at fff00000c775a000
[   28.107565]  which belongs to the cache kmalloc-128 of size 128
[   28.107739] The buggy address is located 0 bytes inside of
[   28.107739]  freed 128-byte region [fff00000c775a000, fff00000c775a080)
[   28.107927] 
[   28.107979] The buggy address belongs to the physical page:
[   28.108074] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10775a
[   28.108247] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.108390] page_type: f5(slab)
[   28.108805] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   28.109051] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   28.109217] page dumped because: kasan: bad access detected
[   28.109332] 
[   28.109429] Memory state around the buggy address:
[   28.109515]  fff00000c7759f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   28.109582]  fff00000c7759f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   28.109660] >fff00000c775a000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   28.109792]                    ^
[   28.109910]  fff00000c775a080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.110027]  fff00000c775a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.110117] ==================================================================
[   28.126742] ==================================================================
[   28.126883] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8
[   28.127027] Read of size 1 at addr fff00000c775a078 by task kunit_try_catch/198
[   28.127173] 
[   28.127270] CPU: 0 UID: 0 PID: 198 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT 
[   28.127593] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.128031] Hardware name: linux,dummy-virt (DT)
[   28.128180] Call trace:
[   28.128370]  show_stack+0x20/0x38 (C)
[   28.128538]  dump_stack_lvl+0x8c/0xd0
[   28.129727]  print_report+0x118/0x608
[   28.129910]  kasan_report+0xdc/0x128
[   28.130007]  __asan_report_load1_noabort+0x20/0x30
[   28.130078]  ksize_uaf+0x544/0x5f8
[   28.130145]  kunit_try_run_case+0x170/0x3f0
[   28.130213]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.130292]  kthread+0x328/0x630
[   28.130355]  ret_from_fork+0x10/0x20
[   28.130426] 
[   28.130479] Allocated by task 198:
[   28.130570]  kasan_save_stack+0x3c/0x68
[   28.130749]  kasan_save_track+0x20/0x40
[   28.130865]  kasan_save_alloc_info+0x40/0x58
[   28.131045]  __kasan_kmalloc+0xd4/0xd8
[   28.131213]  __kmalloc_cache_noprof+0x15c/0x3c0
[   28.131392]  ksize_uaf+0xb8/0x5f8
[   28.131905]  kunit_try_run_case+0x170/0x3f0
[   28.132046]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.132116]  kthread+0x328/0x630
[   28.132175]  ret_from_fork+0x10/0x20
[   28.132301] 
[   28.132389] Freed by task 198:
[   28.132520]  kasan_save_stack+0x3c/0x68
[   28.132681]  kasan_save_track+0x20/0x40
[   28.132832]  kasan_save_free_info+0x4c/0x78
[   28.132993]  __kasan_slab_free+0x6c/0x98
[   28.133151]  kfree+0x214/0x3c8
[   28.133266]  ksize_uaf+0x11c/0x5f8
[   28.133565]  kunit_try_run_case+0x170/0x3f0
[   28.133701]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.134301]  kthread+0x328/0x630
[   28.134778]  ret_from_fork+0x10/0x20
[   28.134894] 
[   28.134953] The buggy address belongs to the object at fff00000c775a000
[   28.134953]  which belongs to the cache kmalloc-128 of size 128
[   28.135130] The buggy address is located 120 bytes inside of
[   28.135130]  freed 128-byte region [fff00000c775a000, fff00000c775a080)
[   28.135324] 
[   28.135403] The buggy address belongs to the physical page:
[   28.135515] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10775a
[   28.137079] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.137772] page_type: f5(slab)
[   28.138098] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   28.138362] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   28.138704] page dumped because: kasan: bad access detected
[   28.139313] 
[   28.139405] Memory state around the buggy address:
[   28.140018]  fff00000c7759f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   28.140147]  fff00000c7759f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   28.140268] >fff00000c775a000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   28.141030]                                                                 ^
[   28.141788]  fff00000c775a080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.142387]  fff00000c775a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.142546] ==================================================================

[   13.138317] ==================================================================
[   13.138846] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5fe/0x6c0
[   13.139326] Read of size 1 at addr ffff888102a2d700 by task kunit_try_catch/215
[   13.139663] 
[   13.139781] CPU: 1 UID: 0 PID: 215 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT(voluntary) 
[   13.139827] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.139838] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.139860] Call Trace:
[   13.139877]  <TASK>
[   13.139894]  dump_stack_lvl+0x73/0xb0
[   13.139922]  print_report+0xd1/0x650
[   13.139945]  ? __virt_addr_valid+0x1db/0x2d0
[   13.139978]  ? ksize_uaf+0x5fe/0x6c0
[   13.139999]  ? kasan_complete_mode_report_info+0x64/0x200
[   13.140022]  ? ksize_uaf+0x5fe/0x6c0
[   13.140328]  kasan_report+0x141/0x180
[   13.140353]  ? ksize_uaf+0x5fe/0x6c0
[   13.140390]  __asan_report_load1_noabort+0x18/0x20
[   13.140410]  ksize_uaf+0x5fe/0x6c0
[   13.140431]  ? __pfx_ksize_uaf+0x10/0x10
[   13.140452]  ? __schedule+0x10cc/0x2b30
[   13.140483]  ? __pfx_read_tsc+0x10/0x10
[   13.140502]  ? ktime_get_ts64+0x86/0x230
[   13.140527]  kunit_try_run_case+0x1a5/0x480
[   13.140561]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.140582]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.140605]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.140627]  ? __kthread_parkme+0x82/0x180
[   13.140648]  ? preempt_count_sub+0x50/0x80
[   13.140672]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.140694]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.140715]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.140737]  kthread+0x337/0x6f0
[   13.140753]  ? trace_preempt_on+0x20/0xc0
[   13.140776]  ? __pfx_kthread+0x10/0x10
[   13.140794]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.140815]  ? calculate_sigpending+0x7b/0xa0
[   13.140836]  ? __pfx_kthread+0x10/0x10
[   13.140853]  ret_from_fork+0x41/0x80
[   13.140873]  ? __pfx_kthread+0x10/0x10
[   13.140890]  ret_from_fork_asm+0x1a/0x30
[   13.140921]  </TASK>
[   13.140932] 
[   13.149026] Allocated by task 215:
[   13.149255]  kasan_save_stack+0x45/0x70
[   13.149509]  kasan_save_track+0x18/0x40
[   13.149681]  kasan_save_alloc_info+0x3b/0x50
[   13.149875]  __kasan_kmalloc+0xb7/0xc0
[   13.150009]  __kmalloc_cache_noprof+0x189/0x420
[   13.150215]  ksize_uaf+0xaa/0x6c0
[   13.150410]  kunit_try_run_case+0x1a5/0x480
[   13.150701]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.151086]  kthread+0x337/0x6f0
[   13.151257]  ret_from_fork+0x41/0x80
[   13.151493]  ret_from_fork_asm+0x1a/0x30
[   13.151691] 
[   13.151800] Freed by task 215:
[   13.152065]  kasan_save_stack+0x45/0x70
[   13.152233]  kasan_save_track+0x18/0x40
[   13.152446]  kasan_save_free_info+0x3f/0x60
[   13.152655]  __kasan_slab_free+0x56/0x70
[   13.152807]  kfree+0x222/0x3f0
[   13.152924]  ksize_uaf+0x12c/0x6c0
[   13.153049]  kunit_try_run_case+0x1a5/0x480
[   13.153322]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.153572]  kthread+0x337/0x6f0
[   13.153736]  ret_from_fork+0x41/0x80
[   13.153890]  ret_from_fork_asm+0x1a/0x30
[   13.154029] 
[   13.154100] The buggy address belongs to the object at ffff888102a2d700
[   13.154100]  which belongs to the cache kmalloc-128 of size 128
[   13.155005] The buggy address is located 0 bytes inside of
[   13.155005]  freed 128-byte region [ffff888102a2d700, ffff888102a2d780)
[   13.155632] 
[   13.155720] The buggy address belongs to the physical page:
[   13.156029] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2d
[   13.156466] flags: 0x200000000000000(node=0|zone=2)
[   13.156647] page_type: f5(slab)
[   13.156838] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   13.157232] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.157601] page dumped because: kasan: bad access detected
[   13.157838] 
[   13.157997] Memory state around the buggy address:
[   13.158227]  ffff888102a2d600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.158563]  ffff888102a2d680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.158931] >ffff888102a2d700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.159184]                    ^
[   13.159311]  ffff888102a2d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.159634]  ffff888102a2d800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.159950] ==================================================================
[   13.103707] ==================================================================
[   13.105073] BUG: KASAN: slab-use-after-free in ksize_uaf+0x19d/0x6c0
[   13.105689] Read of size 1 at addr ffff888102a2d700 by task kunit_try_catch/215
[   13.107045] 
[   13.107314] CPU: 1 UID: 0 PID: 215 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT(voluntary) 
[   13.107368] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.107381] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.107404] Call Trace:
[   13.107423]  <TASK>
[   13.107443]  dump_stack_lvl+0x73/0xb0
[   13.107474]  print_report+0xd1/0x650
[   13.107496]  ? __virt_addr_valid+0x1db/0x2d0
[   13.107519]  ? ksize_uaf+0x19d/0x6c0
[   13.107539]  ? kasan_complete_mode_report_info+0x64/0x200
[   13.107560]  ? ksize_uaf+0x19d/0x6c0
[   13.107581]  kasan_report+0x141/0x180
[   13.107603]  ? ksize_uaf+0x19d/0x6c0
[   13.107626]  ? ksize_uaf+0x19d/0x6c0
[   13.107647]  __kasan_check_byte+0x3d/0x50
[   13.107669]  ksize+0x20/0x60
[   13.107690]  ksize_uaf+0x19d/0x6c0
[   13.107710]  ? __pfx_ksize_uaf+0x10/0x10
[   13.107732]  ? __schedule+0x10cc/0x2b30
[   13.107754]  ? __pfx_read_tsc+0x10/0x10
[   13.107773]  ? ktime_get_ts64+0x86/0x230
[   13.107798]  kunit_try_run_case+0x1a5/0x480
[   13.107822]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.107843]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.107865]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.107887]  ? __kthread_parkme+0x82/0x180
[   13.107909]  ? preempt_count_sub+0x50/0x80
[   13.107934]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.107956]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.107977]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.107999]  kthread+0x337/0x6f0
[   13.108015]  ? trace_preempt_on+0x20/0xc0
[   13.108039]  ? __pfx_kthread+0x10/0x10
[   13.108056]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.108076]  ? calculate_sigpending+0x7b/0xa0
[   13.108098]  ? __pfx_kthread+0x10/0x10
[   13.108115]  ret_from_fork+0x41/0x80
[   13.108135]  ? __pfx_kthread+0x10/0x10
[   13.108152]  ret_from_fork_asm+0x1a/0x30
[   13.108183]  </TASK>
[   13.108195] 
[   13.121216] Allocated by task 215:
[   13.121473]  kasan_save_stack+0x45/0x70
[   13.121865]  kasan_save_track+0x18/0x40
[   13.122180]  kasan_save_alloc_info+0x3b/0x50
[   13.122341]  __kasan_kmalloc+0xb7/0xc0
[   13.122542]  __kmalloc_cache_noprof+0x189/0x420
[   13.123086]  ksize_uaf+0xaa/0x6c0
[   13.123454]  kunit_try_run_case+0x1a5/0x480
[   13.123897]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.124378]  kthread+0x337/0x6f0
[   13.124523]  ret_from_fork+0x41/0x80
[   13.124948]  ret_from_fork_asm+0x1a/0x30
[   13.125235] 
[   13.125319] Freed by task 215:
[   13.125443]  kasan_save_stack+0x45/0x70
[   13.125710]  kasan_save_track+0x18/0x40
[   13.125900]  kasan_save_free_info+0x3f/0x60
[   13.126388]  __kasan_slab_free+0x56/0x70
[   13.126743]  kfree+0x222/0x3f0
[   13.127088]  ksize_uaf+0x12c/0x6c0
[   13.127288]  kunit_try_run_case+0x1a5/0x480
[   13.127638]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.127814]  kthread+0x337/0x6f0
[   13.128010]  ret_from_fork+0x41/0x80
[   13.128400]  ret_from_fork_asm+0x1a/0x30
[   13.128811] 
[   13.129080] The buggy address belongs to the object at ffff888102a2d700
[   13.129080]  which belongs to the cache kmalloc-128 of size 128
[   13.130241] The buggy address is located 0 bytes inside of
[   13.130241]  freed 128-byte region [ffff888102a2d700, ffff888102a2d780)
[   13.130709] 
[   13.130786] The buggy address belongs to the physical page:
[   13.131183] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2d
[   13.132000] flags: 0x200000000000000(node=0|zone=2)
[   13.132528] page_type: f5(slab)
[   13.132864] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   13.133600] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.133831] page dumped because: kasan: bad access detected
[   13.134348] 
[   13.134514] Memory state around the buggy address:
[   13.135043]  ffff888102a2d600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.135876]  ffff888102a2d680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.136361] >ffff888102a2d700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.136681]                    ^
[   13.136837]  ffff888102a2d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.137224]  ffff888102a2d800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.137511] ==================================================================
[   13.160861] ==================================================================
[   13.161215] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5e4/0x6c0
[   13.161440] Read of size 1 at addr ffff888102a2d778 by task kunit_try_catch/215
[   13.161809] 
[   13.162036] CPU: 1 UID: 0 PID: 215 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7 #1 PREEMPT(voluntary) 
[   13.162081] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.162125] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.162145] Call Trace:
[   13.162155]  <TASK>
[   13.162169]  dump_stack_lvl+0x73/0xb0
[   13.162228]  print_report+0xd1/0x650
[   13.162261]  ? __virt_addr_valid+0x1db/0x2d0
[   13.162300]  ? ksize_uaf+0x5e4/0x6c0
[   13.162349]  ? kasan_complete_mode_report_info+0x64/0x200
[   13.162371]  ? ksize_uaf+0x5e4/0x6c0
[   13.162392]  kasan_report+0x141/0x180
[   13.162457]  ? ksize_uaf+0x5e4/0x6c0
[   13.162483]  __asan_report_load1_noabort+0x18/0x20
[   13.162503]  ksize_uaf+0x5e4/0x6c0
[   13.162534]  ? __pfx_ksize_uaf+0x10/0x10
[   13.162555]  ? __schedule+0x10cc/0x2b30
[   13.162576]  ? __pfx_read_tsc+0x10/0x10
[   13.162594]  ? ktime_get_ts64+0x86/0x230
[   13.162618]  kunit_try_run_case+0x1a5/0x480
[   13.162641]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.162661]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.162691]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.162712]  ? __kthread_parkme+0x82/0x180
[   13.162734]  ? preempt_count_sub+0x50/0x80
[   13.162758]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.162781]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.162802]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.162824]  kthread+0x337/0x6f0
[   13.162840]  ? trace_preempt_on+0x20/0xc0
[   13.162862]  ? __pfx_kthread+0x10/0x10
[   13.162879]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.162977]  ? calculate_sigpending+0x7b/0xa0
[   13.162998]  ? __pfx_kthread+0x10/0x10
[   13.163016]  ret_from_fork+0x41/0x80
[   13.163048]  ? __pfx_kthread+0x10/0x10
[   13.163065]  ret_from_fork_asm+0x1a/0x30
[   13.163095]  </TASK>
[   13.163106] 
[   13.174579] Allocated by task 215:
[   13.174796]  kasan_save_stack+0x45/0x70
[   13.175016]  kasan_save_track+0x18/0x40
[   13.175509]  kasan_save_alloc_info+0x3b/0x50
[   13.175701]  __kasan_kmalloc+0xb7/0xc0
[   13.175893]  __kmalloc_cache_noprof+0x189/0x420
[   13.176157]  ksize_uaf+0xaa/0x6c0
[   13.176342]  kunit_try_run_case+0x1a5/0x480
[   13.176665]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.176892]  kthread+0x337/0x6f0
[   13.177058]  ret_from_fork+0x41/0x80
[   13.177733]  ret_from_fork_asm+0x1a/0x30
[   13.178094] 
[   13.178201] Freed by task 215:
[   13.178530]  kasan_save_stack+0x45/0x70
[   13.178915]  kasan_save_track+0x18/0x40
[   13.179305]  kasan_save_free_info+0x3f/0x60
[   13.179699]  __kasan_slab_free+0x56/0x70
[   13.180148]  kfree+0x222/0x3f0
[   13.180290]  ksize_uaf+0x12c/0x6c0
[   13.180823]  kunit_try_run_case+0x1a5/0x480
[   13.181435]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.181727]  kthread+0x337/0x6f0
[   13.181867]  ret_from_fork+0x41/0x80
[   13.182056]  ret_from_fork_asm+0x1a/0x30
[   13.182210] 
[   13.182319] The buggy address belongs to the object at ffff888102a2d700
[   13.182319]  which belongs to the cache kmalloc-128 of size 128
[   13.183506] The buggy address is located 120 bytes inside of
[   13.183506]  freed 128-byte region [ffff888102a2d700, ffff888102a2d780)
[   13.184287] 
[   13.184385] The buggy address belongs to the physical page:
[   13.184876] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a2d
[   13.185429] flags: 0x200000000000000(node=0|zone=2)
[   13.185669] page_type: f5(slab)
[   13.185842] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   13.186153] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.187138] page dumped because: kasan: bad access detected
[   13.187397] 
[   13.187523] Memory state around the buggy address:
[   13.187751]  ffff888102a2d600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.188271]  ffff888102a2d680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.188814] >ffff888102a2d700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.189374]                                                                 ^
[   13.189871]  ffff888102a2d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.190492]  ffff888102a2d800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.191290] ==================================================================