Hay
Date
July 5, 2025, 11:09 a.m.

Environment
qemu-arm64
qemu-x86_64

[   19.331912] ==================================================================
[   19.332024] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8
[   19.332132] Read of size 1 at addr fff00000c56f1e00 by task kunit_try_catch/197
[   19.332243] 
[   19.332310] CPU: 0 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   19.332511] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.332572] Hardware name: linux,dummy-virt (DT)
[   19.332640] Call trace:
[   19.332687]  show_stack+0x20/0x38 (C)
[   19.332788]  dump_stack_lvl+0x8c/0xd0
[   19.332887]  print_report+0x118/0x608
[   19.332995]  kasan_report+0xdc/0x128
[   19.333095]  __asan_report_load1_noabort+0x20/0x30
[   19.333206]  ksize_uaf+0x598/0x5f8
[   19.333302]  kunit_try_run_case+0x170/0x3f0
[   19.334257]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.334403]  kthread+0x328/0x630
[   19.334554]  ret_from_fork+0x10/0x20
[   19.334683] 
[   19.334734] Allocated by task 197:
[   19.334799]  kasan_save_stack+0x3c/0x68
[   19.334895]  kasan_save_track+0x20/0x40
[   19.334982]  kasan_save_alloc_info+0x40/0x58
[   19.335066]  __kasan_kmalloc+0xd4/0xd8
[   19.335133]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.335199]  ksize_uaf+0xb8/0x5f8
[   19.335269]  kunit_try_run_case+0x170/0x3f0
[   19.335344]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.335456]  kthread+0x328/0x630
[   19.335539]  ret_from_fork+0x10/0x20
[   19.335615] 
[   19.335661] Freed by task 197:
[   19.335722]  kasan_save_stack+0x3c/0x68
[   19.335805]  kasan_save_track+0x20/0x40
[   19.335888]  kasan_save_free_info+0x4c/0x78
[   19.335975]  __kasan_slab_free+0x6c/0x98
[   19.336060]  kfree+0x214/0x3c8
[   19.336136]  ksize_uaf+0x11c/0x5f8
[   19.336230]  kunit_try_run_case+0x170/0x3f0
[   19.336314]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.336455]  kthread+0x328/0x630
[   19.336524]  ret_from_fork+0x10/0x20
[   19.336605] 
[   19.336654] The buggy address belongs to the object at fff00000c56f1e00
[   19.336654]  which belongs to the cache kmalloc-128 of size 128
[   19.336815] The buggy address is located 0 bytes inside of
[   19.336815]  freed 128-byte region [fff00000c56f1e00, fff00000c56f1e80)
[   19.336957] 
[   19.337006] The buggy address belongs to the physical page:
[   19.337083] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056f1
[   19.337191] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.337334] page_type: f5(slab)
[   19.337470] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.337633] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.337759] page dumped because: kasan: bad access detected
[   19.337857] 
[   19.337915] Memory state around the buggy address:
[   19.338012]  fff00000c56f1d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.338152]  fff00000c56f1d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.338239] >fff00000c56f1e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.338318]                    ^
[   19.338400]  fff00000c56f1e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.338549]  fff00000c56f1f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.338643] ==================================================================
[   19.319599] ==================================================================
[   19.319728] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8
[   19.319885] Read of size 1 at addr fff00000c56f1e00 by task kunit_try_catch/197
[   19.320012] 
[   19.320081] CPU: 0 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   19.320256] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.320321] Hardware name: linux,dummy-virt (DT)
[   19.320406] Call trace:
[   19.321346]  show_stack+0x20/0x38 (C)
[   19.321639]  dump_stack_lvl+0x8c/0xd0
[   19.322170]  print_report+0x118/0x608
[   19.322271]  kasan_report+0xdc/0x128
[   19.322633]  __kasan_check_byte+0x54/0x70
[   19.322769]  ksize+0x30/0x88
[   19.322861]  ksize_uaf+0x168/0x5f8
[   19.322954]  kunit_try_run_case+0x170/0x3f0
[   19.323227]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.323373]  kthread+0x328/0x630
[   19.323481]  ret_from_fork+0x10/0x20
[   19.323596] 
[   19.323642] Allocated by task 197:
[   19.323708]  kasan_save_stack+0x3c/0x68
[   19.323818]  kasan_save_track+0x20/0x40
[   19.323915]  kasan_save_alloc_info+0x40/0x58
[   19.324305]  __kasan_kmalloc+0xd4/0xd8
[   19.324605]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.324720]  ksize_uaf+0xb8/0x5f8
[   19.324810]  kunit_try_run_case+0x170/0x3f0
[   19.324911]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.325164]  kthread+0x328/0x630
[   19.325286]  ret_from_fork+0x10/0x20
[   19.325720] 
[   19.325776] Freed by task 197:
[   19.325842]  kasan_save_stack+0x3c/0x68
[   19.326126]  kasan_save_track+0x20/0x40
[   19.326210]  kasan_save_free_info+0x4c/0x78
[   19.326445]  __kasan_slab_free+0x6c/0x98
[   19.326660]  kfree+0x214/0x3c8
[   19.326778]  ksize_uaf+0x11c/0x5f8
[   19.326964]  kunit_try_run_case+0x170/0x3f0
[   19.327280]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.327449]  kthread+0x328/0x630
[   19.327545]  ret_from_fork+0x10/0x20
[   19.327617] 
[   19.327663] The buggy address belongs to the object at fff00000c56f1e00
[   19.327663]  which belongs to the cache kmalloc-128 of size 128
[   19.327873] The buggy address is located 0 bytes inside of
[   19.327873]  freed 128-byte region [fff00000c56f1e00, fff00000c56f1e80)
[   19.328127] 
[   19.328197] The buggy address belongs to the physical page:
[   19.328265] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056f1
[   19.328704] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.328821] page_type: f5(slab)
[   19.329025] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.329139] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.329411] page dumped because: kasan: bad access detected
[   19.329485] 
[   19.329609] Memory state around the buggy address:
[   19.329791]  fff00000c56f1d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.329890]  fff00000c56f1d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.329986] >fff00000c56f1e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.330064]                    ^
[   19.330126]  fff00000c56f1e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.330220]  fff00000c56f1f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.330603] ==================================================================
[   19.340454] ==================================================================
[   19.340585] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8
[   19.340687] Read of size 1 at addr fff00000c56f1e78 by task kunit_try_catch/197
[   19.340789] 
[   19.340875] CPU: 0 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   19.341095] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.341177] Hardware name: linux,dummy-virt (DT)
[   19.341253] Call trace:
[   19.341303]  show_stack+0x20/0x38 (C)
[   19.341416]  dump_stack_lvl+0x8c/0xd0
[   19.341521]  print_report+0x118/0x608
[   19.341624]  kasan_report+0xdc/0x128
[   19.341724]  __asan_report_load1_noabort+0x20/0x30
[   19.341829]  ksize_uaf+0x544/0x5f8
[   19.341928]  kunit_try_run_case+0x170/0x3f0
[   19.342034]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.342143]  kthread+0x328/0x630
[   19.342283]  ret_from_fork+0x10/0x20
[   19.342399] 
[   19.342448] Allocated by task 197:
[   19.342524]  kasan_save_stack+0x3c/0x68
[   19.342660]  kasan_save_track+0x20/0x40
[   19.342751]  kasan_save_alloc_info+0x40/0x58
[   19.342854]  __kasan_kmalloc+0xd4/0xd8
[   19.342925]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.343004]  ksize_uaf+0xb8/0x5f8
[   19.343110]  kunit_try_run_case+0x170/0x3f0
[   19.343206]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.343295]  kthread+0x328/0x630
[   19.343372]  ret_from_fork+0x10/0x20
[   19.343465] 
[   19.343514] Freed by task 197:
[   19.343610]  kasan_save_stack+0x3c/0x68
[   19.343715]  kasan_save_track+0x20/0x40
[   19.343867]  kasan_save_free_info+0x4c/0x78
[   19.343913]  __kasan_slab_free+0x6c/0x98
[   19.343953]  kfree+0x214/0x3c8
[   19.344009]  ksize_uaf+0x11c/0x5f8
[   19.344097]  kunit_try_run_case+0x170/0x3f0
[   19.344181]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.344278]  kthread+0x328/0x630
[   19.344349]  ret_from_fork+0x10/0x20
[   19.344460] 
[   19.344522] The buggy address belongs to the object at fff00000c56f1e00
[   19.344522]  which belongs to the cache kmalloc-128 of size 128
[   19.344676] The buggy address is located 120 bytes inside of
[   19.344676]  freed 128-byte region [fff00000c56f1e00, fff00000c56f1e80)
[   19.344798] 
[   19.344862] The buggy address belongs to the physical page:
[   19.344963] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056f1
[   19.345119] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.345254] page_type: f5(slab)
[   19.345369] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.345484] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.345575] page dumped because: kasan: bad access detected
[   19.345657] 
[   19.345699] Memory state around the buggy address:
[   19.345762]  fff00000c56f1d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.345870]  fff00000c56f1d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.345998] >fff00000c56f1e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.346072]                                                                 ^
[   19.346159]  fff00000c56f1e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.346292]  fff00000c56f1f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.346392] ==================================================================

[   14.155744] ==================================================================
[   14.156614] BUG: KASAN: slab-use-after-free in ksize_uaf+0x19d/0x6c0
[   14.157175] Read of size 1 at addr ffff888103332300 by task kunit_try_catch/213
[   14.157559] 
[   14.157732] CPU: 1 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.157789] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.157804] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.157832] Call Trace:
[   14.157848]  <TASK>
[   14.157887]  dump_stack_lvl+0x73/0xb0
[   14.157923]  print_report+0xd1/0x650
[   14.157950]  ? __virt_addr_valid+0x1db/0x2d0
[   14.157977]  ? ksize_uaf+0x19d/0x6c0
[   14.158001]  ? kasan_complete_mode_report_info+0x64/0x200
[   14.158027]  ? ksize_uaf+0x19d/0x6c0
[   14.158080]  kasan_report+0x141/0x180
[   14.158123]  ? ksize_uaf+0x19d/0x6c0
[   14.158151]  ? ksize_uaf+0x19d/0x6c0
[   14.158174]  __kasan_check_byte+0x3d/0x50
[   14.158200]  ksize+0x20/0x60
[   14.158224]  ksize_uaf+0x19d/0x6c0
[   14.158247]  ? __pfx_ksize_uaf+0x10/0x10
[   14.158272]  ? __schedule+0x10cc/0x2b60
[   14.158298]  ? __pfx_read_tsc+0x10/0x10
[   14.158323]  ? ktime_get_ts64+0x86/0x230
[   14.158351]  kunit_try_run_case+0x1a5/0x480
[   14.158381]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.158406]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.158441]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.158468]  ? __kthread_parkme+0x82/0x180
[   14.158491]  ? preempt_count_sub+0x50/0x80
[   14.158519]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.158545]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.158571]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.158597]  kthread+0x337/0x6f0
[   14.158619]  ? trace_preempt_on+0x20/0xc0
[   14.158659]  ? __pfx_kthread+0x10/0x10
[   14.158683]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.158706]  ? calculate_sigpending+0x7b/0xa0
[   14.158734]  ? __pfx_kthread+0x10/0x10
[   14.158759]  ret_from_fork+0x116/0x1d0
[   14.158791]  ? __pfx_kthread+0x10/0x10
[   14.158814]  ret_from_fork_asm+0x1a/0x30
[   14.158851]  </TASK>
[   14.158864] 
[   14.170286] Allocated by task 213:
[   14.170661]  kasan_save_stack+0x45/0x70
[   14.170911]  kasan_save_track+0x18/0x40
[   14.171110]  kasan_save_alloc_info+0x3b/0x50
[   14.171348]  __kasan_kmalloc+0xb7/0xc0
[   14.171538]  __kmalloc_cache_noprof+0x189/0x420
[   14.171790]  ksize_uaf+0xaa/0x6c0
[   14.172326]  kunit_try_run_case+0x1a5/0x480
[   14.172541]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.172847]  kthread+0x337/0x6f0
[   14.173325]  ret_from_fork+0x116/0x1d0
[   14.173621]  ret_from_fork_asm+0x1a/0x30
[   14.174015] 
[   14.174120] Freed by task 213:
[   14.174456]  kasan_save_stack+0x45/0x70
[   14.174689]  kasan_save_track+0x18/0x40
[   14.175085]  kasan_save_free_info+0x3f/0x60
[   14.175293]  __kasan_slab_free+0x56/0x70
[   14.175497]  kfree+0x222/0x3f0
[   14.175680]  ksize_uaf+0x12c/0x6c0
[   14.176163]  kunit_try_run_case+0x1a5/0x480
[   14.176486]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.176903]  kthread+0x337/0x6f0
[   14.177289]  ret_from_fork+0x116/0x1d0
[   14.177501]  ret_from_fork_asm+0x1a/0x30
[   14.177845] 
[   14.177940] The buggy address belongs to the object at ffff888103332300
[   14.177940]  which belongs to the cache kmalloc-128 of size 128
[   14.178543] The buggy address is located 0 bytes inside of
[   14.178543]  freed 128-byte region [ffff888103332300, ffff888103332380)
[   14.179416] 
[   14.179737] The buggy address belongs to the physical page:
[   14.180250] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103332
[   14.180558] flags: 0x200000000000000(node=0|zone=2)
[   14.180853] page_type: f5(slab)
[   14.181212] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   14.181796] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   14.182069] page dumped because: kasan: bad access detected
[   14.182387] 
[   14.183095] Memory state around the buggy address:
[   14.183320]  ffff888103332200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.183684]  ffff888103332280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.184031] >ffff888103332300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.184284]                    ^
[   14.184425]  ffff888103332380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.184863]  ffff888103332400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.185124] ==================================================================
[   14.223163] ==================================================================
[   14.223626] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5e4/0x6c0
[   14.223970] Read of size 1 at addr ffff888103332378 by task kunit_try_catch/213
[   14.224953] 
[   14.225228] CPU: 1 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.225284] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.225298] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.225324] Call Trace:
[   14.225340]  <TASK>
[   14.225361]  dump_stack_lvl+0x73/0xb0
[   14.225396]  print_report+0xd1/0x650
[   14.225422]  ? __virt_addr_valid+0x1db/0x2d0
[   14.225449]  ? ksize_uaf+0x5e4/0x6c0
[   14.225473]  ? kasan_complete_mode_report_info+0x64/0x200
[   14.225498]  ? ksize_uaf+0x5e4/0x6c0
[   14.225522]  kasan_report+0x141/0x180
[   14.225547]  ? ksize_uaf+0x5e4/0x6c0
[   14.225576]  __asan_report_load1_noabort+0x18/0x20
[   14.225604]  ksize_uaf+0x5e4/0x6c0
[   14.225627]  ? __pfx_ksize_uaf+0x10/0x10
[   14.225669]  ? __schedule+0x10cc/0x2b60
[   14.225695]  ? __pfx_read_tsc+0x10/0x10
[   14.225721]  ? ktime_get_ts64+0x86/0x230
[   14.225749]  kunit_try_run_case+0x1a5/0x480
[   14.225778]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.225803]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.225830]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.225857]  ? __kthread_parkme+0x82/0x180
[   14.225880]  ? preempt_count_sub+0x50/0x80
[   14.225908]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.225934]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.225960]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.225986]  kthread+0x337/0x6f0
[   14.226008]  ? trace_preempt_on+0x20/0xc0
[   14.226035]  ? __pfx_kthread+0x10/0x10
[   14.226058]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.226082]  ? calculate_sigpending+0x7b/0xa0
[   14.226110]  ? __pfx_kthread+0x10/0x10
[   14.226135]  ret_from_fork+0x116/0x1d0
[   14.226155]  ? __pfx_kthread+0x10/0x10
[   14.226179]  ret_from_fork_asm+0x1a/0x30
[   14.226214]  </TASK>
[   14.226227] 
[   14.236371] Allocated by task 213:
[   14.236546]  kasan_save_stack+0x45/0x70
[   14.237100]  kasan_save_track+0x18/0x40
[   14.237337]  kasan_save_alloc_info+0x3b/0x50
[   14.237579]  __kasan_kmalloc+0xb7/0xc0
[   14.238448]  __kmalloc_cache_noprof+0x189/0x420
[   14.238927]  ksize_uaf+0xaa/0x6c0
[   14.239303]  kunit_try_run_case+0x1a5/0x480
[   14.239555]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.239808]  kthread+0x337/0x6f0
[   14.240022]  ret_from_fork+0x116/0x1d0
[   14.240252]  ret_from_fork_asm+0x1a/0x30
[   14.240428] 
[   14.240515] Freed by task 213:
[   14.240722]  kasan_save_stack+0x45/0x70
[   14.241029]  kasan_save_track+0x18/0x40
[   14.241193]  kasan_save_free_info+0x3f/0x60
[   14.241440]  __kasan_slab_free+0x56/0x70
[   14.241689]  kfree+0x222/0x3f0
[   14.241874]  ksize_uaf+0x12c/0x6c0
[   14.242070]  kunit_try_run_case+0x1a5/0x480
[   14.242322]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.242575]  kthread+0x337/0x6f0
[   14.242800]  ret_from_fork+0x116/0x1d0
[   14.243028]  ret_from_fork_asm+0x1a/0x30
[   14.243242] 
[   14.243351] The buggy address belongs to the object at ffff888103332300
[   14.243351]  which belongs to the cache kmalloc-128 of size 128
[   14.243933] The buggy address is located 120 bytes inside of
[   14.243933]  freed 128-byte region [ffff888103332300, ffff888103332380)
[   14.244502] 
[   14.244594] The buggy address belongs to the physical page:
[   14.244840] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103332
[   14.245314] flags: 0x200000000000000(node=0|zone=2)
[   14.245513] page_type: f5(slab)
[   14.246314] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   14.246775] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   14.247145] page dumped because: kasan: bad access detected
[   14.247841] 
[   14.247941] Memory state around the buggy address:
[   14.248434]  ffff888103332200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.249107]  ffff888103332280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.249477] >ffff888103332300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.249902]                                                                 ^
[   14.250254]  ffff888103332380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.250616]  ffff888103332400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.251401] ==================================================================
[   14.186637] ==================================================================
[   14.187019] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5fe/0x6c0
[   14.187301] Read of size 1 at addr ffff888103332300 by task kunit_try_catch/213
[   14.187585] 
[   14.189773] CPU: 1 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.189840] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.189855] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.189881] Call Trace:
[   14.189900]  <TASK>
[   14.189925]  dump_stack_lvl+0x73/0xb0
[   14.189964]  print_report+0xd1/0x650
[   14.189990]  ? __virt_addr_valid+0x1db/0x2d0
[   14.190020]  ? ksize_uaf+0x5fe/0x6c0
[   14.190043]  ? kasan_complete_mode_report_info+0x64/0x200
[   14.190068]  ? ksize_uaf+0x5fe/0x6c0
[   14.190092]  kasan_report+0x141/0x180
[   14.190117]  ? ksize_uaf+0x5fe/0x6c0
[   14.190146]  __asan_report_load1_noabort+0x18/0x20
[   14.190173]  ksize_uaf+0x5fe/0x6c0
[   14.190197]  ? __pfx_ksize_uaf+0x10/0x10
[   14.190223]  ? __schedule+0x10cc/0x2b60
[   14.190248]  ? __pfx_read_tsc+0x10/0x10
[   14.190273]  ? ktime_get_ts64+0x86/0x230
[   14.190303]  kunit_try_run_case+0x1a5/0x480
[   14.190332]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.190357]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.190384]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.190409]  ? __kthread_parkme+0x82/0x180
[   14.190440]  ? preempt_count_sub+0x50/0x80
[   14.190467]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.190493]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.190518]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.190544]  kthread+0x337/0x6f0
[   14.190566]  ? trace_preempt_on+0x20/0xc0
[   14.190592]  ? __pfx_kthread+0x10/0x10
[   14.190615]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.190639]  ? calculate_sigpending+0x7b/0xa0
[   14.191274]  ? __pfx_kthread+0x10/0x10
[   14.191311]  ret_from_fork+0x116/0x1d0
[   14.191336]  ? __pfx_kthread+0x10/0x10
[   14.191359]  ret_from_fork_asm+0x1a/0x30
[   14.191397]  </TASK>
[   14.191410] 
[   14.205070] Allocated by task 213:
[   14.205360]  kasan_save_stack+0x45/0x70
[   14.205786]  kasan_save_track+0x18/0x40
[   14.206141]  kasan_save_alloc_info+0x3b/0x50
[   14.206385]  __kasan_kmalloc+0xb7/0xc0
[   14.206601]  __kmalloc_cache_noprof+0x189/0x420
[   14.207170]  ksize_uaf+0xaa/0x6c0
[   14.207513]  kunit_try_run_case+0x1a5/0x480
[   14.207971]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.208440]  kthread+0x337/0x6f0
[   14.208898]  ret_from_fork+0x116/0x1d0
[   14.209151]  ret_from_fork_asm+0x1a/0x30
[   14.209369] 
[   14.209477] Freed by task 213:
[   14.209921]  kasan_save_stack+0x45/0x70
[   14.210215]  kasan_save_track+0x18/0x40
[   14.210633]  kasan_save_free_info+0x3f/0x60
[   14.211049]  __kasan_slab_free+0x56/0x70
[   14.211279]  kfree+0x222/0x3f0
[   14.211460]  ksize_uaf+0x12c/0x6c0
[   14.211666]  kunit_try_run_case+0x1a5/0x480
[   14.211931]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.212212]  kthread+0x337/0x6f0
[   14.212355]  ret_from_fork+0x116/0x1d0
[   14.212583]  ret_from_fork_asm+0x1a/0x30
[   14.212811] 
[   14.212899] The buggy address belongs to the object at ffff888103332300
[   14.212899]  which belongs to the cache kmalloc-128 of size 128
[   14.213692] The buggy address is located 0 bytes inside of
[   14.213692]  freed 128-byte region [ffff888103332300, ffff888103332380)
[   14.214401] 
[   14.214530] The buggy address belongs to the physical page:
[   14.215251] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103332
[   14.215937] flags: 0x200000000000000(node=0|zone=2)
[   14.216324] page_type: f5(slab)
[   14.216490] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   14.217174] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   14.217679] page dumped because: kasan: bad access detected
[   14.218021] 
[   14.218121] Memory state around the buggy address:
[   14.218407]  ffff888103332200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.218766]  ffff888103332280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.219128] >ffff888103332300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.219476]                    ^
[   14.220125]  ffff888103332380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.220469]  ffff888103332400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.220848] ==================================================================