Hay
Date
June 8, 2025, 11:09 p.m.

Environment
e850-96
qemu-arm64
qemu-x86_64
rk3399-rock-pi-4b

[   31.517821] ==================================================================
[   31.527671] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8
[   31.534007] Read of size 1 at addr ffff000801e28500 by task kunit_try_catch/243
[   31.541295] 
[   31.542782] CPU: 7 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   31.542840] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.542857] Hardware name: WinLink E850-96 board (DT)
[   31.542877] Call trace:
[   31.542894]  show_stack+0x20/0x38 (C)
[   31.542930]  dump_stack_lvl+0x8c/0xd0
[   31.542965]  print_report+0x118/0x608
[   31.543003]  kasan_report+0xdc/0x128
[   31.543035]  __kasan_check_byte+0x54/0x70
[   31.543069]  ksize+0x30/0x88
[   31.543101]  ksize_uaf+0x168/0x5f8
[   31.543132]  kunit_try_run_case+0x170/0x3f0
[   31.543169]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.543208]  kthread+0x328/0x630
[   31.543236]  ret_from_fork+0x10/0x20
[   31.543273] 
[   31.606919] Allocated by task 243:
[   31.610308]  kasan_save_stack+0x3c/0x68
[   31.614125]  kasan_save_track+0x20/0x40
[   31.617945]  kasan_save_alloc_info+0x40/0x58
[   31.622197]  __kasan_kmalloc+0xd4/0xd8
[   31.625929]  __kmalloc_cache_noprof+0x16c/0x3c0
[   31.630443]  ksize_uaf+0xb8/0x5f8
[   31.633743]  kunit_try_run_case+0x170/0x3f0
[   31.637910]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.643377]  kthread+0x328/0x630
[   31.646589]  ret_from_fork+0x10/0x20
[   31.650149] 
[   31.651623] Freed by task 243:
[   31.654663]  kasan_save_stack+0x3c/0x68
[   31.658481]  kasan_save_track+0x20/0x40
[   31.662300]  kasan_save_free_info+0x4c/0x78
[   31.666467]  __kasan_slab_free+0x6c/0x98
[   31.670373]  kfree+0x214/0x3c8
[   31.673411]  ksize_uaf+0x11c/0x5f8
[   31.676797]  kunit_try_run_case+0x170/0x3f0
[   31.680963]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.686435]  kthread+0x328/0x630
[   31.689644]  ret_from_fork+0x10/0x20
[   31.693203] 
[   31.694682] The buggy address belongs to the object at ffff000801e28500
[   31.694682]  which belongs to the cache kmalloc-128 of size 128
[   31.707181] The buggy address is located 0 bytes inside of
[   31.707181]  freed 128-byte region [ffff000801e28500, ffff000801e28580)
[   31.719245] 
[   31.720722] The buggy address belongs to the physical page:
[   31.726279] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881e28
[   31.734263] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.741904] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.748847] page_type: f5(slab)
[   31.751984] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   31.759702] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   31.767430] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   31.775239] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   31.783053] head: 0bfffe0000000001 fffffdffe0078a01 00000000ffffffff 00000000ffffffff
[   31.790864] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   31.798671] page dumped because: kasan: bad access detected
[   31.804225] 
[   31.805700] Memory state around the buggy address:
[   31.810483]  ffff000801e28400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.817686]  ffff000801e28480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.824889] >ffff000801e28500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.832090]                    ^
[   31.835305]  ffff000801e28580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.842511]  ffff000801e28600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.849714] ==================================================================
[   31.857047] ==================================================================
[   31.864128] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8
[   31.870457] Read of size 1 at addr ffff000801e28500 by task kunit_try_catch/243
[   31.877749] 
[   31.879235] CPU: 7 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   31.879286] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.879303] Hardware name: WinLink E850-96 board (DT)
[   31.879323] Call trace:
[   31.879338]  show_stack+0x20/0x38 (C)
[   31.879373]  dump_stack_lvl+0x8c/0xd0
[   31.879411]  print_report+0x118/0x608
[   31.879444]  kasan_report+0xdc/0x128
[   31.879478]  __asan_report_load1_noabort+0x20/0x30
[   31.879515]  ksize_uaf+0x598/0x5f8
[   31.879543]  kunit_try_run_case+0x170/0x3f0
[   31.879578]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.879615]  kthread+0x328/0x630
[   31.879645]  ret_from_fork+0x10/0x20
[   31.879682] 
[   31.941289] Allocated by task 243:
[   31.944675]  kasan_save_stack+0x3c/0x68
[   31.948494]  kasan_save_track+0x20/0x40
[   31.952313]  kasan_save_alloc_info+0x40/0x58
[   31.956567]  __kasan_kmalloc+0xd4/0xd8
[   31.960300]  __kmalloc_cache_noprof+0x16c/0x3c0
[   31.964813]  ksize_uaf+0xb8/0x5f8
[   31.968112]  kunit_try_run_case+0x170/0x3f0
[   31.972279]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.977747]  kthread+0x328/0x630
[   31.980960]  ret_from_fork+0x10/0x20
[   31.984518] 
[   31.985994] Freed by task 243:
[   31.989033]  kasan_save_stack+0x3c/0x68
[   31.992851]  kasan_save_track+0x20/0x40
[   31.996670]  kasan_save_free_info+0x4c/0x78
[   32.000837]  __kasan_slab_free+0x6c/0x98
[   32.004743]  kfree+0x214/0x3c8
[   32.007781]  ksize_uaf+0x11c/0x5f8
[   32.011167]  kunit_try_run_case+0x170/0x3f0
[   32.015333]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.020803]  kthread+0x328/0x630
[   32.024014]  ret_from_fork+0x10/0x20
[   32.027574] 
[   32.029050] The buggy address belongs to the object at ffff000801e28500
[   32.029050]  which belongs to the cache kmalloc-128 of size 128
[   32.041550] The buggy address is located 0 bytes inside of
[   32.041550]  freed 128-byte region [ffff000801e28500, ffff000801e28580)
[   32.053615] 
[   32.055092] The buggy address belongs to the physical page:
[   32.060650] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881e28
[   32.068634] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.076273] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.083216] page_type: f5(slab)
[   32.086351] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   32.094071] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.101798] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   32.109610] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.117423] head: 0bfffe0000000001 fffffdffe0078a01 00000000ffffffff 00000000ffffffff
[   32.125235] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   32.133040] page dumped because: kasan: bad access detected
[   32.138595] 
[   32.140071] Memory state around the buggy address:
[   32.144849]  ffff000801e28400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.152054]  ffff000801e28480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.159259] >ffff000801e28500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.166459]                    ^
[   32.169675]  ffff000801e28580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.176881]  ffff000801e28600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.184081] ==================================================================
[   32.191400] ==================================================================
[   32.198497] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8
[   32.204827] Read of size 1 at addr ffff000801e28578 by task kunit_try_catch/243
[   32.212119] 
[   32.213604] CPU: 7 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   32.213656] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.213674] Hardware name: WinLink E850-96 board (DT)
[   32.213693] Call trace:
[   32.213706]  show_stack+0x20/0x38 (C)
[   32.213741]  dump_stack_lvl+0x8c/0xd0
[   32.213779]  print_report+0x118/0x608
[   32.213813]  kasan_report+0xdc/0x128
[   32.213845]  __asan_report_load1_noabort+0x20/0x30
[   32.213881]  ksize_uaf+0x544/0x5f8
[   32.213911]  kunit_try_run_case+0x170/0x3f0
[   32.213947]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.213985]  kthread+0x328/0x630
[   32.214011]  ret_from_fork+0x10/0x20
[   32.214044] 
[   32.275659] Allocated by task 243:
[   32.279046]  kasan_save_stack+0x3c/0x68
[   32.282867]  kasan_save_track+0x20/0x40
[   32.286684]  kasan_save_alloc_info+0x40/0x58
[   32.290937]  __kasan_kmalloc+0xd4/0xd8
[   32.294669]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.299183]  ksize_uaf+0xb8/0x5f8
[   32.302483]  kunit_try_run_case+0x170/0x3f0
[   32.306650]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.312117]  kthread+0x328/0x630
[   32.315329]  ret_from_fork+0x10/0x20
[   32.318888] 
[   32.320364] Freed by task 243:
[   32.323403]  kasan_save_stack+0x3c/0x68
[   32.327221]  kasan_save_track+0x20/0x40
[   32.331040]  kasan_save_free_info+0x4c/0x78
[   32.335207]  __kasan_slab_free+0x6c/0x98
[   32.339114]  kfree+0x214/0x3c8
[   32.342151]  ksize_uaf+0x11c/0x5f8
[   32.345536]  kunit_try_run_case+0x170/0x3f0
[   32.349703]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.355174]  kthread+0x328/0x630
[   32.358384]  ret_from_fork+0x10/0x20
[   32.361943] 
[   32.363419] The buggy address belongs to the object at ffff000801e28500
[   32.363419]  which belongs to the cache kmalloc-128 of size 128
[   32.375920] The buggy address is located 120 bytes inside of
[   32.375920]  freed 128-byte region [ffff000801e28500, ffff000801e28580)
[   32.388158] 
[   32.389637] The buggy address belongs to the physical page:
[   32.395193] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881e28
[   32.403178] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.410817] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.417759] page_type: f5(slab)
[   32.420895] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   32.428615] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.436342] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   32.444153] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.451966] head: 0bfffe0000000001 fffffdffe0078a01 00000000ffffffff 00000000ffffffff
[   32.459778] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   32.467584] page dumped because: kasan: bad access detected
[   32.473139] 
[   32.474614] Memory state around the buggy address:
[   32.479393]  ffff000801e28400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.486598]  ffff000801e28480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.493802] >ffff000801e28500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.501003]                                                                 ^
[   32.508125]  ffff000801e28580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.515331]  ffff000801e28600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.522532] ==================================================================

[   25.796923] ==================================================================
[   25.797140] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8
[   25.797281] Read of size 1 at addr fff00000c6507a00 by task kunit_try_catch/196
[   25.797396] 
[   25.797479] CPU: 0 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   25.797674] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.797740] Hardware name: linux,dummy-virt (DT)
[   25.797821] Call trace:
[   25.797886]  show_stack+0x20/0x38 (C)
[   25.798040]  dump_stack_lvl+0x8c/0xd0
[   25.798258]  print_report+0x118/0x608
[   25.798397]  kasan_report+0xdc/0x128
[   25.798527]  __kasan_check_byte+0x54/0x70
[   25.799189]  ksize+0x30/0x88
[   25.799497]  ksize_uaf+0x168/0x5f8
[   25.799680]  kunit_try_run_case+0x170/0x3f0
[   25.799977]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.800178]  kthread+0x328/0x630
[   25.800294]  ret_from_fork+0x10/0x20
[   25.800426] 
[   25.800569] Allocated by task 196:
[   25.800778]  kasan_save_stack+0x3c/0x68
[   25.800979]  kasan_save_track+0x20/0x40
[   25.801091]  kasan_save_alloc_info+0x40/0x58
[   25.801279]  __kasan_kmalloc+0xd4/0xd8
[   25.801390]  __kmalloc_cache_noprof+0x16c/0x3c0
[   25.801849]  ksize_uaf+0xb8/0x5f8
[   25.802099]  kunit_try_run_case+0x170/0x3f0
[   25.802216]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.802535]  kthread+0x328/0x630
[   25.802730]  ret_from_fork+0x10/0x20
[   25.802883] 
[   25.802987] Freed by task 196:
[   25.803163]  kasan_save_stack+0x3c/0x68
[   25.803272]  kasan_save_track+0x20/0x40
[   25.803380]  kasan_save_free_info+0x4c/0x78
[   25.803515]  __kasan_slab_free+0x6c/0x98
[   25.803712]  kfree+0x214/0x3c8
[   25.803859]  ksize_uaf+0x11c/0x5f8
[   25.803976]  kunit_try_run_case+0x170/0x3f0
[   25.804129]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.804259]  kthread+0x328/0x630
[   25.804354]  ret_from_fork+0x10/0x20
[   25.804888] 
[   25.804983] The buggy address belongs to the object at fff00000c6507a00
[   25.804983]  which belongs to the cache kmalloc-128 of size 128
[   25.805122] The buggy address is located 0 bytes inside of
[   25.805122]  freed 128-byte region [fff00000c6507a00, fff00000c6507a80)
[   25.805265] 
[   25.805385] The buggy address belongs to the physical page:
[   25.805589] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106507
[   25.805758] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.806136] page_type: f5(slab)
[   25.806488] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   25.807006] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.807289] page dumped because: kasan: bad access detected
[   25.807374] 
[   25.807455] Memory state around the buggy address:
[   25.807535]  fff00000c6507900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.807691]  fff00000c6507980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.807811] >fff00000c6507a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.807914]                    ^
[   25.808201]  fff00000c6507a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.808849]  fff00000c6507b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.809043] ==================================================================
[   25.810361] ==================================================================
[   25.810497] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8
[   25.810698] Read of size 1 at addr fff00000c6507a00 by task kunit_try_catch/196
[   25.810895] 
[   25.810987] CPU: 0 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   25.811314] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.811386] Hardware name: linux,dummy-virt (DT)
[   25.811537] Call trace:
[   25.811629]  show_stack+0x20/0x38 (C)
[   25.811825]  dump_stack_lvl+0x8c/0xd0
[   25.812032]  print_report+0x118/0x608
[   25.812360]  kasan_report+0xdc/0x128
[   25.812490]  __asan_report_load1_noabort+0x20/0x30
[   25.812792]  ksize_uaf+0x598/0x5f8
[   25.812962]  kunit_try_run_case+0x170/0x3f0
[   25.813110]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.813305]  kthread+0x328/0x630
[   25.813432]  ret_from_fork+0x10/0x20
[   25.813693] 
[   25.813831] Allocated by task 196:
[   25.813959]  kasan_save_stack+0x3c/0x68
[   25.814141]  kasan_save_track+0x20/0x40
[   25.814265]  kasan_save_alloc_info+0x40/0x58
[   25.814462]  __kasan_kmalloc+0xd4/0xd8
[   25.814703]  __kmalloc_cache_noprof+0x16c/0x3c0
[   25.814851]  ksize_uaf+0xb8/0x5f8
[   25.815140]  kunit_try_run_case+0x170/0x3f0
[   25.815255]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.815370]  kthread+0x328/0x630
[   25.815492]  ret_from_fork+0x10/0x20
[   25.815602] 
[   25.815661] Freed by task 196:
[   25.816021]  kasan_save_stack+0x3c/0x68
[   25.816459]  kasan_save_track+0x20/0x40
[   25.816876]  kasan_save_free_info+0x4c/0x78
[   25.817004]  __kasan_slab_free+0x6c/0x98
[   25.817604]  kfree+0x214/0x3c8
[   25.817846]  ksize_uaf+0x11c/0x5f8
[   25.818012]  kunit_try_run_case+0x170/0x3f0
[   25.818124]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.818235]  kthread+0x328/0x630
[   25.818360]  ret_from_fork+0x10/0x20
[   25.818629] 
[   25.818706] The buggy address belongs to the object at fff00000c6507a00
[   25.818706]  which belongs to the cache kmalloc-128 of size 128
[   25.818849] The buggy address is located 0 bytes inside of
[   25.818849]  freed 128-byte region [fff00000c6507a00, fff00000c6507a80)
[   25.819036] 
[   25.819187] The buggy address belongs to the physical page:
[   25.819269] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106507
[   25.819752] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.820127] page_type: f5(slab)
[   25.820309] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   25.820435] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.820544] page dumped because: kasan: bad access detected
[   25.820627] 
[   25.820704] Memory state around the buggy address:
[   25.820802]  fff00000c6507900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.821119]  fff00000c6507980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.821229] >fff00000c6507a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.821320]                    ^
[   25.821461]  fff00000c6507a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.821746]  fff00000c6507b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.822168] ==================================================================
[   25.823497] ==================================================================
[   25.823692] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8
[   25.823882] Read of size 1 at addr fff00000c6507a78 by task kunit_try_catch/196
[   25.824021] 
[   25.824092] CPU: 0 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   25.824288] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.824352] Hardware name: linux,dummy-virt (DT)
[   25.824424] Call trace:
[   25.824485]  show_stack+0x20/0x38 (C)
[   25.824616]  dump_stack_lvl+0x8c/0xd0
[   25.824739]  print_report+0x118/0x608
[   25.824858]  kasan_report+0xdc/0x128
[   25.824996]  __asan_report_load1_noabort+0x20/0x30
[   25.825124]  ksize_uaf+0x544/0x5f8
[   25.825232]  kunit_try_run_case+0x170/0x3f0
[   25.825354]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.825482]  kthread+0x328/0x630
[   25.825597]  ret_from_fork+0x10/0x20
[   25.825713] 
[   25.825755] Allocated by task 196:
[   25.825857]  kasan_save_stack+0x3c/0x68
[   25.826052]  kasan_save_track+0x20/0x40
[   25.826201]  kasan_save_alloc_info+0x40/0x58
[   25.826376]  __kasan_kmalloc+0xd4/0xd8
[   25.826529]  __kmalloc_cache_noprof+0x16c/0x3c0
[   25.826700]  ksize_uaf+0xb8/0x5f8
[   25.826876]  kunit_try_run_case+0x170/0x3f0
[   25.827188]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.827394]  kthread+0x328/0x630
[   25.827489]  ret_from_fork+0x10/0x20
[   25.827679] 
[   25.827726] Freed by task 196:
[   25.827928]  kasan_save_stack+0x3c/0x68
[   25.828071]  kasan_save_track+0x20/0x40
[   25.828173]  kasan_save_free_info+0x4c/0x78
[   25.828314]  __kasan_slab_free+0x6c/0x98
[   25.829391]  kfree+0x214/0x3c8
[   25.829520]  ksize_uaf+0x11c/0x5f8
[   25.829608]  kunit_try_run_case+0x170/0x3f0
[   25.829717]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.829832]  kthread+0x328/0x630
[   25.829917]  ret_from_fork+0x10/0x20
[   25.830030] 
[   25.830079] The buggy address belongs to the object at fff00000c6507a00
[   25.830079]  which belongs to the cache kmalloc-128 of size 128
[   25.830217] The buggy address is located 120 bytes inside of
[   25.830217]  freed 128-byte region [fff00000c6507a00, fff00000c6507a80)
[   25.830364] 
[   25.830425] The buggy address belongs to the physical page:
[   25.830519] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106507
[   25.830673] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.830814] page_type: f5(slab)
[   25.830925] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   25.831236] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.831354] page dumped because: kasan: bad access detected
[   25.831446] 
[   25.831599] Memory state around the buggy address:
[   25.831834]  fff00000c6507900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.831965]  fff00000c6507980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.832146] >fff00000c6507a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.832245]                                                                 ^
[   25.832363]  fff00000c6507a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.832492]  fff00000c6507b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.832684] ==================================================================

[   26.082418] ==================================================================
[   26.082563] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8
[   26.083196] Read of size 1 at addr fff00000c7747800 by task kunit_try_catch/196
[   26.083319] 
[   26.083395] CPU: 0 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   26.083612] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.083680] Hardware name: linux,dummy-virt (DT)
[   26.083750] Call trace:
[   26.083814]  show_stack+0x20/0x38 (C)
[   26.083969]  dump_stack_lvl+0x8c/0xd0
[   26.085094]  print_report+0x118/0x608
[   26.085247]  kasan_report+0xdc/0x128
[   26.085378]  __kasan_check_byte+0x54/0x70
[   26.085505]  ksize+0x30/0x88
[   26.085627]  ksize_uaf+0x168/0x5f8
[   26.085753]  kunit_try_run_case+0x170/0x3f0
[   26.086073]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.086209]  kthread+0x328/0x630
[   26.086311]  ret_from_fork+0x10/0x20
[   26.086429] 
[   26.086475] Allocated by task 196:
[   26.086541]  kasan_save_stack+0x3c/0x68
[   26.086642]  kasan_save_track+0x20/0x40
[   26.086733]  kasan_save_alloc_info+0x40/0x58
[   26.086873]  __kasan_kmalloc+0xd4/0xd8
[   26.087122]  __kmalloc_cache_noprof+0x16c/0x3c0
[   26.087412]  ksize_uaf+0xb8/0x5f8
[   26.087538]  kunit_try_run_case+0x170/0x3f0
[   26.088026]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.088194]  kthread+0x328/0x630
[   26.088280]  ret_from_fork+0x10/0x20
[   26.088378] 
[   26.088429] Freed by task 196:
[   26.088504]  kasan_save_stack+0x3c/0x68
[   26.088608]  kasan_save_track+0x20/0x40
[   26.088783]  kasan_save_free_info+0x4c/0x78
[   26.088912]  __kasan_slab_free+0x6c/0x98
[   26.089006]  kfree+0x214/0x3c8
[   26.089521]  ksize_uaf+0x11c/0x5f8
[   26.089617]  kunit_try_run_case+0x170/0x3f0
[   26.089710]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.089816]  kthread+0x328/0x630
[   26.089917]  ret_from_fork+0x10/0x20
[   26.090001] 
[   26.090045] The buggy address belongs to the object at fff00000c7747800
[   26.090045]  which belongs to the cache kmalloc-128 of size 128
[   26.090181] The buggy address is located 0 bytes inside of
[   26.090181]  freed 128-byte region [fff00000c7747800, fff00000c7747880)
[   26.090336] 
[   26.090397] The buggy address belongs to the physical page:
[   26.090468] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107747
[   26.090595] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.090714] page_type: f5(slab)
[   26.090805] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   26.090945] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.091041] page dumped because: kasan: bad access detected
[   26.091112] 
[   26.091155] Memory state around the buggy address:
[   26.091230]  fff00000c7747700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.091339]  fff00000c7747780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.091449] >fff00000c7747800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.091551]                    ^
[   26.091637]  fff00000c7747880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.091751]  fff00000c7747900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.095172] ==================================================================
[   26.115012] ==================================================================
[   26.115117] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8
[   26.115221] Read of size 1 at addr fff00000c7747878 by task kunit_try_catch/196
[   26.115339] 
[   26.115403] CPU: 0 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   26.115597] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.115661] Hardware name: linux,dummy-virt (DT)
[   26.115729] Call trace:
[   26.115792]  show_stack+0x20/0x38 (C)
[   26.116039]  dump_stack_lvl+0x8c/0xd0
[   26.116942]  print_report+0x118/0x608
[   26.117164]  kasan_report+0xdc/0x128
[   26.117414]  __asan_report_load1_noabort+0x20/0x30
[   26.117599]  ksize_uaf+0x544/0x5f8
[   26.117722]  kunit_try_run_case+0x170/0x3f0
[   26.117861]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.117995]  kthread+0x328/0x630
[   26.118301]  ret_from_fork+0x10/0x20
[   26.118869] 
[   26.118920] Allocated by task 196:
[   26.119026]  kasan_save_stack+0x3c/0x68
[   26.119187]  kasan_save_track+0x20/0x40
[   26.119437]  kasan_save_alloc_info+0x40/0x58
[   26.119616]  __kasan_kmalloc+0xd4/0xd8
[   26.119718]  __kmalloc_cache_noprof+0x16c/0x3c0
[   26.119892]  ksize_uaf+0xb8/0x5f8
[   26.120409]  kunit_try_run_case+0x170/0x3f0
[   26.121372]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.121494]  kthread+0x328/0x630
[   26.121592]  ret_from_fork+0x10/0x20
[   26.121691] 
[   26.121738] Freed by task 196:
[   26.121802]  kasan_save_stack+0x3c/0x68
[   26.123069]  kasan_save_track+0x20/0x40
[   26.124279]  kasan_save_free_info+0x4c/0x78
[   26.125169]  __kasan_slab_free+0x6c/0x98
[   26.125739]  kfree+0x214/0x3c8
[   26.125852]  ksize_uaf+0x11c/0x5f8
[   26.125946]  kunit_try_run_case+0x170/0x3f0
[   26.127553]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.127820]  kthread+0x328/0x630
[   26.128509]  ret_from_fork+0x10/0x20
[   26.129514] 
[   26.129993] The buggy address belongs to the object at fff00000c7747800
[   26.129993]  which belongs to the cache kmalloc-128 of size 128
[   26.130142] The buggy address is located 120 bytes inside of
[   26.130142]  freed 128-byte region [fff00000c7747800, fff00000c7747880)
[   26.131237] 
[   26.131323] The buggy address belongs to the physical page:
[   26.131808] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107747
[   26.131974] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.132093] page_type: f5(slab)
[   26.134129] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   26.134424] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.135674] page dumped because: kasan: bad access detected
[   26.135859] 
[   26.135963] Memory state around the buggy address:
[   26.136128]  fff00000c7747700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.136306]  fff00000c7747780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.136457] >fff00000c7747800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.136677]                                                                 ^
[   26.136850]  fff00000c7747880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.136978]  fff00000c7747900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.137087] ==================================================================
[   26.096576] ==================================================================
[   26.096678] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8
[   26.096775] Read of size 1 at addr fff00000c7747800 by task kunit_try_catch/196
[   26.098937] 
[   26.099107] CPU: 0 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   26.099551] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.099647] Hardware name: linux,dummy-virt (DT)
[   26.099729] Call trace:
[   26.099982]  show_stack+0x20/0x38 (C)
[   26.100121]  dump_stack_lvl+0x8c/0xd0
[   26.100758]  print_report+0x118/0x608
[   26.100939]  kasan_report+0xdc/0x128
[   26.101445]  __asan_report_load1_noabort+0x20/0x30
[   26.101580]  ksize_uaf+0x598/0x5f8
[   26.101972]  kunit_try_run_case+0x170/0x3f0
[   26.102858]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.103016]  kthread+0x328/0x630
[   26.103148]  ret_from_fork+0x10/0x20
[   26.103339] 
[   26.103394] Allocated by task 196:
[   26.103481]  kasan_save_stack+0x3c/0x68
[   26.103585]  kasan_save_track+0x20/0x40
[   26.104426]  kasan_save_alloc_info+0x40/0x58
[   26.104554]  __kasan_kmalloc+0xd4/0xd8
[   26.105119]  __kmalloc_cache_noprof+0x16c/0x3c0
[   26.105237]  ksize_uaf+0xb8/0x5f8
[   26.105450]  kunit_try_run_case+0x170/0x3f0
[   26.105622]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.105753]  kthread+0x328/0x630
[   26.105889]  ret_from_fork+0x10/0x20
[   26.105986] 
[   26.106043] Freed by task 196:
[   26.106240]  kasan_save_stack+0x3c/0x68
[   26.106342]  kasan_save_track+0x20/0x40
[   26.106690]  kasan_save_free_info+0x4c/0x78
[   26.107245]  __kasan_slab_free+0x6c/0x98
[   26.107356]  kfree+0x214/0x3c8
[   26.107603]  ksize_uaf+0x11c/0x5f8
[   26.107861]  kunit_try_run_case+0x170/0x3f0
[   26.107966]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.108072]  kthread+0x328/0x630
[   26.108155]  ret_from_fork+0x10/0x20
[   26.108258] 
[   26.108389] The buggy address belongs to the object at fff00000c7747800
[   26.108389]  which belongs to the cache kmalloc-128 of size 128
[   26.108775] The buggy address is located 0 bytes inside of
[   26.108775]  freed 128-byte region [fff00000c7747800, fff00000c7747880)
[   26.109381] 
[   26.109457] The buggy address belongs to the physical page:
[   26.109610] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107747
[   26.109779] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.109923] page_type: f5(slab)
[   26.110058] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   26.110191] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.110298] page dumped because: kasan: bad access detected
[   26.110756] 
[   26.110898] Memory state around the buggy address:
[   26.111091]  fff00000c7747700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.111203]  fff00000c7747780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.111312] >fff00000c7747800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.111408]                    ^
[   26.111473]  fff00000c7747880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.111604]  fff00000c7747900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.111729] ==================================================================

[   19.795061] ==================================================================
[   19.797160] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5fe/0x6c0
[   19.797464] Read of size 1 at addr ffff8881039c8100 by task kunit_try_catch/214
[   19.798341] 
[   19.799080] CPU: 0 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   19.799221] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.799262] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.799369] Call Trace:
[   19.799425]  <TASK>
[   19.799645]  dump_stack_lvl+0x73/0xb0
[   19.800118]  print_report+0xd1/0x650
[   19.800297]  ? __virt_addr_valid+0x1db/0x2d0
[   19.800364]  ? ksize_uaf+0x5fe/0x6c0
[   19.800399]  ? kasan_complete_mode_report_info+0x64/0x200
[   19.800437]  ? ksize_uaf+0x5fe/0x6c0
[   19.800470]  kasan_report+0x141/0x180
[   19.800531]  ? ksize_uaf+0x5fe/0x6c0
[   19.800670]  __asan_report_load1_noabort+0x18/0x20
[   19.800728]  ksize_uaf+0x5fe/0x6c0
[   19.800763]  ? __pfx_ksize_uaf+0x10/0x10
[   19.800799]  ? __schedule+0x10cc/0x2b60
[   19.800835]  ? __pfx_read_tsc+0x10/0x10
[   19.800869]  ? ktime_get_ts64+0x86/0x230
[   19.800907]  kunit_try_run_case+0x1a5/0x480
[   19.800950]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.800989]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.801026]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.801064]  ? __kthread_parkme+0x82/0x180
[   19.801096]  ? preempt_count_sub+0x50/0x80
[   19.801131]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.801171]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.801210]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.801293]  kthread+0x337/0x6f0
[   19.801328]  ? trace_preempt_on+0x20/0xc0
[   19.801365]  ? __pfx_kthread+0x10/0x10
[   19.801397]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.801432]  ? calculate_sigpending+0x7b/0xa0
[   19.801472]  ? __pfx_kthread+0x10/0x10
[   19.801529]  ret_from_fork+0x116/0x1d0
[   19.801599]  ? __pfx_kthread+0x10/0x10
[   19.801693]  ret_from_fork_asm+0x1a/0x30
[   19.801743]  </TASK>
[   19.801759] 
[   19.822173] Allocated by task 214:
[   19.822669]  kasan_save_stack+0x45/0x70
[   19.823385]  kasan_save_track+0x18/0x40
[   19.824339]  kasan_save_alloc_info+0x3b/0x50
[   19.825009]  __kasan_kmalloc+0xb7/0xc0
[   19.825493]  __kmalloc_cache_noprof+0x189/0x420
[   19.826256]  ksize_uaf+0xaa/0x6c0
[   19.826884]  kunit_try_run_case+0x1a5/0x480
[   19.827351]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.828525]  kthread+0x337/0x6f0
[   19.829216]  ret_from_fork+0x116/0x1d0
[   19.829911]  ret_from_fork_asm+0x1a/0x30
[   19.830567] 
[   19.830984] Freed by task 214:
[   19.831375]  kasan_save_stack+0x45/0x70
[   19.832076]  kasan_save_track+0x18/0x40
[   19.832579]  kasan_save_free_info+0x3f/0x60
[   19.833667]  __kasan_slab_free+0x56/0x70
[   19.834243]  kfree+0x222/0x3f0
[   19.834881]  ksize_uaf+0x12c/0x6c0
[   19.835262]  kunit_try_run_case+0x1a5/0x480
[   19.836024]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.836731]  kthread+0x337/0x6f0
[   19.837488]  ret_from_fork+0x116/0x1d0
[   19.838388]  ret_from_fork_asm+0x1a/0x30
[   19.839201] 
[   19.839668] The buggy address belongs to the object at ffff8881039c8100
[   19.839668]  which belongs to the cache kmalloc-128 of size 128
[   19.840800] The buggy address is located 0 bytes inside of
[   19.840800]  freed 128-byte region [ffff8881039c8100, ffff8881039c8180)
[   19.841198] 
[   19.841291] The buggy address belongs to the physical page:
[   19.841489] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c8
[   19.843059] flags: 0x200000000000000(node=0|zone=2)
[   19.844354] page_type: f5(slab)
[   19.845426] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   19.846200] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.847531] page dumped because: kasan: bad access detected
[   19.848164] 
[   19.848398] Memory state around the buggy address:
[   19.848945]  ffff8881039c8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.849657]  ffff8881039c8080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.850190] >ffff8881039c8100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.851483]                    ^
[   19.851979]  ffff8881039c8180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.853339]  ffff8881039c8200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.854048] ==================================================================
[   19.723474] ==================================================================
[   19.724345] BUG: KASAN: slab-use-after-free in ksize_uaf+0x19d/0x6c0
[   19.725934] Read of size 1 at addr ffff8881039c8100 by task kunit_try_catch/214
[   19.726946] 
[   19.727442] CPU: 0 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   19.727798] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.727832] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.727886] Call Trace:
[   19.727926]  <TASK>
[   19.727972]  dump_stack_lvl+0x73/0xb0
[   19.728072]  print_report+0xd1/0x650
[   19.728143]  ? __virt_addr_valid+0x1db/0x2d0
[   19.728185]  ? ksize_uaf+0x19d/0x6c0
[   19.728216]  ? kasan_complete_mode_report_info+0x64/0x200
[   19.728285]  ? ksize_uaf+0x19d/0x6c0
[   19.728320]  kasan_report+0x141/0x180
[   19.728350]  ? ksize_uaf+0x19d/0x6c0
[   19.728383]  ? ksize_uaf+0x19d/0x6c0
[   19.728411]  __kasan_check_byte+0x3d/0x50
[   19.728441]  ksize+0x20/0x60
[   19.728469]  ksize_uaf+0x19d/0x6c0
[   19.728520]  ? __pfx_ksize_uaf+0x10/0x10
[   19.728618]  ? __schedule+0x10cc/0x2b60
[   19.728698]  ? __pfx_read_tsc+0x10/0x10
[   19.728733]  ? ktime_get_ts64+0x86/0x230
[   19.728768]  kunit_try_run_case+0x1a5/0x480
[   19.728807]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.728841]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.728874]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.728906]  ? __kthread_parkme+0x82/0x180
[   19.728934]  ? preempt_count_sub+0x50/0x80
[   19.728965]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.729000]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.729032]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.729065]  kthread+0x337/0x6f0
[   19.729092]  ? trace_preempt_on+0x20/0xc0
[   19.729124]  ? __pfx_kthread+0x10/0x10
[   19.729152]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.729181]  ? calculate_sigpending+0x7b/0xa0
[   19.729215]  ? __pfx_kthread+0x10/0x10
[   19.729261]  ret_from_fork+0x116/0x1d0
[   19.729300]  ? __pfx_kthread+0x10/0x10
[   19.729329]  ret_from_fork_asm+0x1a/0x30
[   19.729372]  </TASK>
[   19.729387] 
[   19.752047] Allocated by task 214:
[   19.752892]  kasan_save_stack+0x45/0x70
[   19.753494]  kasan_save_track+0x18/0x40
[   19.754750]  kasan_save_alloc_info+0x3b/0x50
[   19.755287]  __kasan_kmalloc+0xb7/0xc0
[   19.755962]  __kmalloc_cache_noprof+0x189/0x420
[   19.756803]  ksize_uaf+0xaa/0x6c0
[   19.757212]  kunit_try_run_case+0x1a5/0x480
[   19.758132]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.759028]  kthread+0x337/0x6f0
[   19.759459]  ret_from_fork+0x116/0x1d0
[   19.759908]  ret_from_fork_asm+0x1a/0x30
[   19.760442] 
[   19.761231] Freed by task 214:
[   19.761785]  kasan_save_stack+0x45/0x70
[   19.762620]  kasan_save_track+0x18/0x40
[   19.763205]  kasan_save_free_info+0x3f/0x60
[   19.763955]  __kasan_slab_free+0x56/0x70
[   19.764472]  kfree+0x222/0x3f0
[   19.765145]  ksize_uaf+0x12c/0x6c0
[   19.765550]  kunit_try_run_case+0x1a5/0x480
[   19.766659]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.767206]  kthread+0x337/0x6f0
[   19.767878]  ret_from_fork+0x116/0x1d0
[   19.768279]  ret_from_fork_asm+0x1a/0x30
[   19.769030] 
[   19.769663] The buggy address belongs to the object at ffff8881039c8100
[   19.769663]  which belongs to the cache kmalloc-128 of size 128
[   19.771198] The buggy address is located 0 bytes inside of
[   19.771198]  freed 128-byte region [ffff8881039c8100, ffff8881039c8180)
[   19.772070] 
[   19.772316] The buggy address belongs to the physical page:
[   19.773000] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c8
[   19.774313] flags: 0x200000000000000(node=0|zone=2)
[   19.774664] page_type: f5(slab)
[   19.774923] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   19.777701] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.778130] page dumped because: kasan: bad access detected
[   19.778514] 
[   19.779457] Memory state around the buggy address:
[   19.783049]  ffff8881039c8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.785679]  ffff8881039c8080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.788614] >ffff8881039c8100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.790569]                    ^
[   19.791377]  ffff8881039c8180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.792144]  ffff8881039c8200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.793209] ==================================================================
[   19.855977] ==================================================================
[   19.857843] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5e4/0x6c0
[   19.858401] Read of size 1 at addr ffff8881039c8178 by task kunit_try_catch/214
[   19.860063] 
[   19.860327] CPU: 0 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   19.860457] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.860495] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.860579] Call Trace:
[   19.860621]  <TASK>
[   19.860667]  dump_stack_lvl+0x73/0xb0
[   19.860781]  print_report+0xd1/0x650
[   19.860865]  ? __virt_addr_valid+0x1db/0x2d0
[   19.860942]  ? ksize_uaf+0x5e4/0x6c0
[   19.861015]  ? kasan_complete_mode_report_info+0x64/0x200
[   19.861087]  ? ksize_uaf+0x5e4/0x6c0
[   19.861159]  kasan_report+0x141/0x180
[   19.861201]  ? ksize_uaf+0x5e4/0x6c0
[   19.861242]  __asan_report_load1_noabort+0x18/0x20
[   19.861307]  ksize_uaf+0x5e4/0x6c0
[   19.861340]  ? __pfx_ksize_uaf+0x10/0x10
[   19.861372]  ? __schedule+0x10cc/0x2b60
[   19.861406]  ? __pfx_read_tsc+0x10/0x10
[   19.861437]  ? ktime_get_ts64+0x86/0x230
[   19.861469]  kunit_try_run_case+0x1a5/0x480
[   19.861540]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.861613]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.861694]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.861756]  ? __kthread_parkme+0x82/0x180
[   19.861789]  ? preempt_count_sub+0x50/0x80
[   19.861821]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.861857]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.861892]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.861926]  kthread+0x337/0x6f0
[   19.861952]  ? trace_preempt_on+0x20/0xc0
[   19.861985]  ? __pfx_kthread+0x10/0x10
[   19.862012]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.862044]  ? calculate_sigpending+0x7b/0xa0
[   19.862078]  ? __pfx_kthread+0x10/0x10
[   19.862107]  ret_from_fork+0x116/0x1d0
[   19.862132]  ? __pfx_kthread+0x10/0x10
[   19.862162]  ret_from_fork_asm+0x1a/0x30
[   19.862203]  </TASK>
[   19.862216] 
[   19.878908] Allocated by task 214:
[   19.879327]  kasan_save_stack+0x45/0x70
[   19.880414]  kasan_save_track+0x18/0x40
[   19.880892]  kasan_save_alloc_info+0x3b/0x50
[   19.881529]  __kasan_kmalloc+0xb7/0xc0
[   19.881862]  __kmalloc_cache_noprof+0x189/0x420
[   19.882566]  ksize_uaf+0xaa/0x6c0
[   19.883047]  kunit_try_run_case+0x1a5/0x480
[   19.884285]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.884863]  kthread+0x337/0x6f0
[   19.885185]  ret_from_fork+0x116/0x1d0
[   19.885645]  ret_from_fork_asm+0x1a/0x30
[   19.886040] 
[   19.886257] Freed by task 214:
[   19.888350]  kasan_save_stack+0x45/0x70
[   19.889442]  kasan_save_track+0x18/0x40
[   19.889875]  kasan_save_free_info+0x3f/0x60
[   19.890289]  __kasan_slab_free+0x56/0x70
[   19.890743]  kfree+0x222/0x3f0
[   19.891146]  ksize_uaf+0x12c/0x6c0
[   19.891596]  kunit_try_run_case+0x1a5/0x480
[   19.892031]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.892434]  kthread+0x337/0x6f0
[   19.893950]  ret_from_fork+0x116/0x1d0
[   19.894336]  ret_from_fork_asm+0x1a/0x30
[   19.894921] 
[   19.895169] The buggy address belongs to the object at ffff8881039c8100
[   19.895169]  which belongs to the cache kmalloc-128 of size 128
[   19.896200] The buggy address is located 120 bytes inside of
[   19.896200]  freed 128-byte region [ffff8881039c8100, ffff8881039c8180)
[   19.897267] 
[   19.897534] The buggy address belongs to the physical page:
[   19.898178] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c8
[   19.899731] flags: 0x200000000000000(node=0|zone=2)
[   19.900316] page_type: f5(slab)
[   19.900698] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   19.901224] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.902107] page dumped because: kasan: bad access detected
[   19.902603] 
[   19.903533] Memory state around the buggy address:
[   19.904133]  ffff8881039c8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.904903]  ffff8881039c8080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.905876] >ffff8881039c8100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.906395]                                                                 ^
[   19.906985]  ffff8881039c8180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.907555]  ffff8881039c8200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.908899] ==================================================================

[   18.802680] ==================================================================
[   18.803323] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5e4/0x6c0
[   18.804175] Read of size 1 at addr ffff8881032f7978 by task kunit_try_catch/214
[   18.804962] 
[   18.805336] CPU: 0 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   18.805447] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.805487] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.805541] Call Trace:
[   18.805632]  <TASK>
[   18.805677]  dump_stack_lvl+0x73/0xb0
[   18.805856]  print_report+0xd1/0x650
[   18.805962]  ? __virt_addr_valid+0x1db/0x2d0
[   18.806037]  ? ksize_uaf+0x5e4/0x6c0
[   18.806126]  ? kasan_complete_mode_report_info+0x64/0x200
[   18.806180]  ? ksize_uaf+0x5e4/0x6c0
[   18.806214]  kasan_report+0x141/0x180
[   18.806246]  ? ksize_uaf+0x5e4/0x6c0
[   18.806292]  __asan_report_load1_noabort+0x18/0x20
[   18.806329]  ksize_uaf+0x5e4/0x6c0
[   18.806358]  ? __pfx_ksize_uaf+0x10/0x10
[   18.806388]  ? __schedule+0x10cc/0x2b60
[   18.806418]  ? __pfx_read_tsc+0x10/0x10
[   18.806446]  ? ktime_get_ts64+0x86/0x230
[   18.806477]  kunit_try_run_case+0x1a5/0x480
[   18.806510]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.806543]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.806575]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.806607]  ? __kthread_parkme+0x82/0x180
[   18.806635]  ? preempt_count_sub+0x50/0x80
[   18.806664]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.806698]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.806730]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.806763]  kthread+0x337/0x6f0
[   18.806789]  ? trace_preempt_on+0x20/0xc0
[   18.806819]  ? __pfx_kthread+0x10/0x10
[   18.806846]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.806893]  ? calculate_sigpending+0x7b/0xa0
[   18.806937]  ? __pfx_kthread+0x10/0x10
[   18.806967]  ret_from_fork+0x116/0x1d0
[   18.806993]  ? __pfx_kthread+0x10/0x10
[   18.807021]  ret_from_fork_asm+0x1a/0x30
[   18.807060]  </TASK>
[   18.807073] 
[   18.825029] Allocated by task 214:
[   18.825859]  kasan_save_stack+0x45/0x70
[   18.826402]  kasan_save_track+0x18/0x40
[   18.826961]  kasan_save_alloc_info+0x3b/0x50
[   18.827695]  __kasan_kmalloc+0xb7/0xc0
[   18.828117]  __kmalloc_cache_noprof+0x189/0x420
[   18.828894]  ksize_uaf+0xaa/0x6c0
[   18.829366]  kunit_try_run_case+0x1a5/0x480
[   18.829780]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.830315]  kthread+0x337/0x6f0
[   18.830634]  ret_from_fork+0x116/0x1d0
[   18.831183]  ret_from_fork_asm+0x1a/0x30
[   18.831769] 
[   18.832027] Freed by task 214:
[   18.832437]  kasan_save_stack+0x45/0x70
[   18.832803]  kasan_save_track+0x18/0x40
[   18.833383]  kasan_save_free_info+0x3f/0x60
[   18.833830]  __kasan_slab_free+0x56/0x70
[   18.834551]  kfree+0x222/0x3f0
[   18.834937]  ksize_uaf+0x12c/0x6c0
[   18.835713]  kunit_try_run_case+0x1a5/0x480
[   18.836203]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.836807]  kthread+0x337/0x6f0
[   18.837431]  ret_from_fork+0x116/0x1d0
[   18.837794]  ret_from_fork_asm+0x1a/0x30
[   18.838492] 
[   18.838713] The buggy address belongs to the object at ffff8881032f7900
[   18.838713]  which belongs to the cache kmalloc-128 of size 128
[   18.839868] The buggy address is located 120 bytes inside of
[   18.839868]  freed 128-byte region [ffff8881032f7900, ffff8881032f7980)
[   18.840968] 
[   18.841406] The buggy address belongs to the physical page:
[   18.841839] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1032f7
[   18.842773] flags: 0x200000000000000(node=0|zone=2)
[   18.843321] page_type: f5(slab)
[   18.843488] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   18.843748] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.844596] page dumped because: kasan: bad access detected
[   18.844970] 
[   18.845367] Memory state around the buggy address:
[   18.845798]  ffff8881032f7800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.846605]  ffff8881032f7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.847233] >ffff8881032f7900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.847821]                                                                 ^
[   18.848355]  ffff8881032f7980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.849037]  ffff8881032f7a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.849625] ==================================================================
[   18.756031] ==================================================================
[   18.756469] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5fe/0x6c0
[   18.758307] Read of size 1 at addr ffff8881032f7900 by task kunit_try_catch/214
[   18.758842] 
[   18.759146] CPU: 0 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   18.759306] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.759339] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.759369] Call Trace:
[   18.759400]  <TASK>
[   18.759439]  dump_stack_lvl+0x73/0xb0
[   18.759488]  print_report+0xd1/0x650
[   18.759520]  ? __virt_addr_valid+0x1db/0x2d0
[   18.759553]  ? ksize_uaf+0x5fe/0x6c0
[   18.759581]  ? kasan_complete_mode_report_info+0x64/0x200
[   18.759611]  ? ksize_uaf+0x5fe/0x6c0
[   18.759639]  kasan_report+0x141/0x180
[   18.759669]  ? ksize_uaf+0x5fe/0x6c0
[   18.759703]  __asan_report_load1_noabort+0x18/0x20
[   18.759737]  ksize_uaf+0x5fe/0x6c0
[   18.759764]  ? __pfx_ksize_uaf+0x10/0x10
[   18.759794]  ? __schedule+0x10cc/0x2b60
[   18.759825]  ? __pfx_read_tsc+0x10/0x10
[   18.759853]  ? ktime_get_ts64+0x86/0x230
[   18.759906]  kunit_try_run_case+0x1a5/0x480
[   18.759945]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.759978]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.760011]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.760044]  ? __kthread_parkme+0x82/0x180
[   18.760070]  ? preempt_count_sub+0x50/0x80
[   18.760107]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.760186]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.760262]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.760340]  kthread+0x337/0x6f0
[   18.760408]  ? trace_preempt_on+0x20/0xc0
[   18.760472]  ? __pfx_kthread+0x10/0x10
[   18.760503]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.760534]  ? calculate_sigpending+0x7b/0xa0
[   18.760569]  ? __pfx_kthread+0x10/0x10
[   18.760598]  ret_from_fork+0x116/0x1d0
[   18.760622]  ? __pfx_kthread+0x10/0x10
[   18.760650]  ret_from_fork_asm+0x1a/0x30
[   18.760691]  </TASK>
[   18.760705] 
[   18.777225] Allocated by task 214:
[   18.777931]  kasan_save_stack+0x45/0x70
[   18.778469]  kasan_save_track+0x18/0x40
[   18.778641]  kasan_save_alloc_info+0x3b/0x50
[   18.778818]  __kasan_kmalloc+0xb7/0xc0
[   18.779091]  __kmalloc_cache_noprof+0x189/0x420
[   18.779801]  ksize_uaf+0xaa/0x6c0
[   18.780256]  kunit_try_run_case+0x1a5/0x480
[   18.780661]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.781263]  kthread+0x337/0x6f0
[   18.781558]  ret_from_fork+0x116/0x1d0
[   18.781961]  ret_from_fork_asm+0x1a/0x30
[   18.782385] 
[   18.782615] Freed by task 214:
[   18.783137]  kasan_save_stack+0x45/0x70
[   18.783569]  kasan_save_track+0x18/0x40
[   18.784089]  kasan_save_free_info+0x3f/0x60
[   18.784489]  __kasan_slab_free+0x56/0x70
[   18.784845]  kfree+0x222/0x3f0
[   18.785434]  ksize_uaf+0x12c/0x6c0
[   18.785918]  kunit_try_run_case+0x1a5/0x480
[   18.786515]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.787071]  kthread+0x337/0x6f0
[   18.787500]  ret_from_fork+0x116/0x1d0
[   18.788013]  ret_from_fork_asm+0x1a/0x30
[   18.788493] 
[   18.788787] The buggy address belongs to the object at ffff8881032f7900
[   18.788787]  which belongs to the cache kmalloc-128 of size 128
[   18.789858] The buggy address is located 0 bytes inside of
[   18.789858]  freed 128-byte region [ffff8881032f7900, ffff8881032f7980)
[   18.790998] 
[   18.791271] The buggy address belongs to the physical page:
[   18.791983] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1032f7
[   18.792734] flags: 0x200000000000000(node=0|zone=2)
[   18.793334] page_type: f5(slab)
[   18.793690] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   18.794441] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.795253] page dumped because: kasan: bad access detected
[   18.795817] 
[   18.796143] Memory state around the buggy address:
[   18.796562]  ffff8881032f7800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.797329]  ffff8881032f7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.798031] >ffff8881032f7900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.798756]                    ^
[   18.799055]  ffff8881032f7980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.799820]  ffff8881032f7a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.800507] ==================================================================
[   18.708473] ==================================================================
[   18.709631] BUG: KASAN: slab-use-after-free in ksize_uaf+0x19d/0x6c0
[   18.710500] Read of size 1 at addr ffff8881032f7900 by task kunit_try_catch/214
[   18.711079] 
[   18.711336] CPU: 0 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   18.711459] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.711496] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.711555] Call Trace:
[   18.711591]  <TASK>
[   18.711634]  dump_stack_lvl+0x73/0xb0
[   18.711722]  print_report+0xd1/0x650
[   18.711781]  ? __virt_addr_valid+0x1db/0x2d0
[   18.711816]  ? ksize_uaf+0x19d/0x6c0
[   18.711845]  ? kasan_complete_mode_report_info+0x64/0x200
[   18.711937]  ? ksize_uaf+0x19d/0x6c0
[   18.712040]  kasan_report+0x141/0x180
[   18.712182]  ? ksize_uaf+0x19d/0x6c0
[   18.712265]  ? ksize_uaf+0x19d/0x6c0
[   18.712339]  __kasan_check_byte+0x3d/0x50
[   18.712437]  ksize+0x20/0x60
[   18.712537]  ksize_uaf+0x19d/0x6c0
[   18.712611]  ? __pfx_ksize_uaf+0x10/0x10
[   18.712648]  ? __schedule+0x10cc/0x2b60
[   18.712683]  ? __pfx_read_tsc+0x10/0x10
[   18.712713]  ? ktime_get_ts64+0x86/0x230
[   18.712747]  kunit_try_run_case+0x1a5/0x480
[   18.712783]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.712816]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.712848]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.712903]  ? __kthread_parkme+0x82/0x180
[   18.712935]  ? preempt_count_sub+0x50/0x80
[   18.712968]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.713002]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.713035]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.713068]  kthread+0x337/0x6f0
[   18.713094]  ? trace_preempt_on+0x20/0xc0
[   18.713177]  ? __pfx_kthread+0x10/0x10
[   18.713209]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.713239]  ? calculate_sigpending+0x7b/0xa0
[   18.713274]  ? __pfx_kthread+0x10/0x10
[   18.713302]  ret_from_fork+0x116/0x1d0
[   18.713328]  ? __pfx_kthread+0x10/0x10
[   18.713357]  ret_from_fork_asm+0x1a/0x30
[   18.713396]  </TASK>
[   18.713410] 
[   18.728534] Allocated by task 214:
[   18.728815]  kasan_save_stack+0x45/0x70
[   18.729308]  kasan_save_track+0x18/0x40
[   18.729741]  kasan_save_alloc_info+0x3b/0x50
[   18.730546]  __kasan_kmalloc+0xb7/0xc0
[   18.730860]  __kmalloc_cache_noprof+0x189/0x420
[   18.731453]  ksize_uaf+0xaa/0x6c0
[   18.731896]  kunit_try_run_case+0x1a5/0x480
[   18.732455]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.732993]  kthread+0x337/0x6f0
[   18.733395]  ret_from_fork+0x116/0x1d0
[   18.733861]  ret_from_fork_asm+0x1a/0x30
[   18.734393] 
[   18.734595] Freed by task 214:
[   18.734924]  kasan_save_stack+0x45/0x70
[   18.735398]  kasan_save_track+0x18/0x40
[   18.735858]  kasan_save_free_info+0x3f/0x60
[   18.736222]  __kasan_slab_free+0x56/0x70
[   18.736544]  kfree+0x222/0x3f0
[   18.736831]  ksize_uaf+0x12c/0x6c0
[   18.737310]  kunit_try_run_case+0x1a5/0x480
[   18.737759]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.738453]  kthread+0x337/0x6f0
[   18.738841]  ret_from_fork+0x116/0x1d0
[   18.739333]  ret_from_fork_asm+0x1a/0x30
[   18.739796] 
[   18.740045] The buggy address belongs to the object at ffff8881032f7900
[   18.740045]  which belongs to the cache kmalloc-128 of size 128
[   18.742246] The buggy address is located 0 bytes inside of
[   18.742246]  freed 128-byte region [ffff8881032f7900, ffff8881032f7980)
[   18.743074] 
[   18.744649] The buggy address belongs to the physical page:
[   18.745213] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1032f7
[   18.746011] flags: 0x200000000000000(node=0|zone=2)
[   18.746677] page_type: f5(slab)
[   18.747083] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   18.747945] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.748711] page dumped because: kasan: bad access detected
[   18.749444] 
[   18.749626] Memory state around the buggy address:
[   18.750005]  ffff8881032f7800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.751229]  ffff8881032f7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.751985] >ffff8881032f7900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.752715]                    ^
[   18.753401]  ffff8881032f7980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.753981]  ffff8881032f7a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.754789] ==================================================================

[   20.972050] ==================================================================
[   20.972724] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8
[   20.973331] Read of size 1 at addr ffff00000cea4300 by task kunit_try_catch/249
[   20.973998] 
[   20.974155] CPU: 3 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   20.974192] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.974202] Hardware name: Radxa ROCK Pi 4B (DT)
[   20.974215] Call trace:
[   20.974224]  show_stack+0x20/0x38 (C)
[   20.974249]  dump_stack_lvl+0x8c/0xd0
[   20.974275]  print_report+0x118/0x608
[   20.974299]  kasan_report+0xdc/0x128
[   20.974322]  __asan_report_load1_noabort+0x20/0x30
[   20.974348]  ksize_uaf+0x598/0x5f8
[   20.974369]  kunit_try_run_case+0x170/0x3f0
[   20.974393]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.974420]  kthread+0x328/0x630
[   20.974439]  ret_from_fork+0x10/0x20
[   20.974463] 
[   20.979931] Allocated by task 249:
[   20.980250]  kasan_save_stack+0x3c/0x68
[   20.980616]  kasan_save_track+0x20/0x40
[   20.980980]  kasan_save_alloc_info+0x40/0x58
[   20.981384]  __kasan_kmalloc+0xd4/0xd8
[   20.981739]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.982164]  ksize_uaf+0xb8/0x5f8
[   20.982481]  kunit_try_run_case+0x170/0x3f0
[   20.982875]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.983384]  kthread+0x328/0x630
[   20.983691]  ret_from_fork+0x10/0x20
[   20.984029] 
[   20.984176] Freed by task 249:
[   20.984463]  kasan_save_stack+0x3c/0x68
[   20.984827]  kasan_save_track+0x20/0x40
[   20.985190]  kasan_save_free_info+0x4c/0x78
[   20.985585]  __kasan_slab_free+0x6c/0x98
[   20.985956]  kfree+0x214/0x3c8
[   20.986248]  ksize_uaf+0x11c/0x5f8
[   20.986572]  kunit_try_run_case+0x170/0x3f0
[   20.986965]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.987474]  kthread+0x328/0x630
[   20.987781]  ret_from_fork+0x10/0x20
[   20.988119] 
[   20.988267] The buggy address belongs to the object at ffff00000cea4300
[   20.988267]  which belongs to the cache kmalloc-128 of size 128
[   20.989385] The buggy address is located 0 bytes inside of
[   20.989385]  freed 128-byte region [ffff00000cea4300, ffff00000cea4380)
[   20.990468] 
[   20.990616] The buggy address belongs to the physical page:
[   20.991122] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xcea4
[   20.991834] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   20.992433] page_type: f5(slab)
[   20.992736] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000
[   20.993439] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.994136] page dumped because: kasan: bad access detected
[   20.994641] 
[   20.994788] Memory state around the buggy address:
[   20.995227]  ffff00000cea4200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.995882]  ffff00000cea4280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.996537] >ffff00000cea4300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.997188]                    ^
[   20.997490]  ffff00000cea4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.998144]  ffff00000cea4400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.998797] ==================================================================
[   20.999875] ==================================================================
[   21.000547] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8
[   21.001140] Read of size 1 at addr ffff00000cea4378 by task kunit_try_catch/249
[   21.001805] 
[   21.001959] CPU: 4 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   21.001995] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.002005] Hardware name: Radxa ROCK Pi 4B (DT)
[   21.002017] Call trace:
[   21.002025]  show_stack+0x20/0x38 (C)
[   21.002050]  dump_stack_lvl+0x8c/0xd0
[   21.002074]  print_report+0x118/0x608
[   21.002096]  kasan_report+0xdc/0x128
[   21.002117]  __asan_report_load1_noabort+0x20/0x30
[   21.002141]  ksize_uaf+0x544/0x5f8
[   21.002159]  kunit_try_run_case+0x170/0x3f0
[   21.002183]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.002207]  kthread+0x328/0x630
[   21.002224]  ret_from_fork+0x10/0x20
[   21.002245] 
[   21.007704] Allocated by task 249:
[   21.008021]  kasan_save_stack+0x3c/0x68
[   21.008385]  kasan_save_track+0x20/0x40
[   21.008745]  kasan_save_alloc_info+0x40/0x58
[   21.009146]  __kasan_kmalloc+0xd4/0xd8
[   21.009499]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.009920]  ksize_uaf+0xb8/0x5f8
[   21.010233]  kunit_try_run_case+0x170/0x3f0
[   21.010624]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.011132]  kthread+0x328/0x630
[   21.011435]  ret_from_fork+0x10/0x20
[   21.011771] 
[   21.011918] Freed by task 249:
[   21.012202]  kasan_save_stack+0x3c/0x68
[   21.012562]  kasan_save_track+0x20/0x40
[   21.012923]  kasan_save_free_info+0x4c/0x78
[   21.013316]  __kasan_slab_free+0x6c/0x98
[   21.013684]  kfree+0x214/0x3c8
[   21.013973]  ksize_uaf+0x11c/0x5f8
[   21.014295]  kunit_try_run_case+0x170/0x3f0
[   21.014685]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.015192]  kthread+0x328/0x630
[   21.015495]  ret_from_fork+0x10/0x20
[   21.015832] 
[   21.015977] The buggy address belongs to the object at ffff00000cea4300
[   21.015977]  which belongs to the cache kmalloc-128 of size 128
[   21.017094] The buggy address is located 120 bytes inside of
[   21.017094]  freed 128-byte region [ffff00000cea4300, ffff00000cea4380)
[   21.018190] 
[   21.018336] The buggy address belongs to the physical page:
[   21.018840] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xcea4
[   21.019551] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   21.020147] page_type: f5(slab)
[   21.020447] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000
[   21.021148] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.021844] page dumped because: kasan: bad access detected
[   21.022347] 
[   21.022491] Memory state around the buggy address:
[   21.022929]  ffff00000cea4200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.023581]  ffff00000cea4280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.024232] >ffff00000cea4300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.024880]                                                                 ^
[   21.025524]  ffff00000cea4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.026174]  ffff00000cea4400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.026824] ==================================================================
[   20.943134] ==================================================================
[   20.944225] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8
[   20.944835] Read of size 1 at addr ffff00000cea4300 by task kunit_try_catch/249
[   20.945517] 
[   20.945683] CPU: 3 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   20.945733] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.945748] Hardware name: Radxa ROCK Pi 4B (DT)
[   20.945765] Call trace:
[   20.945776]  show_stack+0x20/0x38 (C)
[   20.945813]  dump_stack_lvl+0x8c/0xd0
[   20.945849]  print_report+0x118/0x608
[   20.945883]  kasan_report+0xdc/0x128
[   20.945915]  __kasan_check_byte+0x54/0x70
[   20.945948]  ksize+0x30/0x88
[   20.945976]  ksize_uaf+0x168/0x5f8
[   20.946004]  kunit_try_run_case+0x170/0x3f0
[   20.946039]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.946077]  kthread+0x328/0x630
[   20.946104]  ret_from_fork+0x10/0x20
[   20.946136] 
[   20.951838] Allocated by task 249:
[   20.952163]  kasan_save_stack+0x3c/0x68
[   20.952542]  kasan_save_track+0x20/0x40
[   20.952917]  kasan_save_alloc_info+0x40/0x58
[   20.953334]  __kasan_kmalloc+0xd4/0xd8
[   20.953701]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.954138]  ksize_uaf+0xb8/0x5f8
[   20.954465]  kunit_try_run_case+0x170/0x3f0
[   20.954872]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.955395]  kthread+0x328/0x630
[   20.955710]  ret_from_fork+0x10/0x20
[   20.956061] 
[   20.956214] Freed by task 249:
[   20.956507]  kasan_save_stack+0x3c/0x68
[   20.956883]  kasan_save_track+0x20/0x40
[   20.957258]  kasan_save_free_info+0x4c/0x78
[   20.957667]  __kasan_slab_free+0x6c/0x98
[   20.958049]  kfree+0x214/0x3c8
[   20.958352]  ksize_uaf+0x11c/0x5f8
[   20.958686]  kunit_try_run_case+0x170/0x3f0
[   20.959091]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.959615]  kthread+0x328/0x630
[   20.959931]  ret_from_fork+0x10/0x20
[   20.960280] 
[   20.960433] The buggy address belongs to the object at ffff00000cea4300
[   20.960433]  which belongs to the cache kmalloc-128 of size 128
[   20.961565] The buggy address is located 0 bytes inside of
[   20.961565]  freed 128-byte region [ffff00000cea4300, ffff00000cea4380)
[   20.962662] 
[   20.962816] The buggy address belongs to the physical page:
[   20.963331] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xcea4
[   20.964054] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   20.964666] page_type: f5(slab)
[   20.964979] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000
[   20.965694] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.966402] page dumped because: kasan: bad access detected
[   20.966916] 
[   20.967068] Memory state around the buggy address:
[   20.967516]  ffff00000cea4200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.968181]  ffff00000cea4280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.968846] >ffff00000cea4300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.969507]                    ^
[   20.969818]  ffff00000cea4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.970483]  ffff00000cea4400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.971145] ==================================================================