Hay
Date
July 2, 2025, 11:09 p.m.

Environment
qemu-arm64
qemu-x86_64

[   18.403348] ==================================================================
[   18.403593] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8
[   18.403654] Read of size 1 at addr fff00000c706f500 by task kunit_try_catch/196
[   18.404116] 
[   18.404192] CPU: 0 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   18.404276] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.404303] Hardware name: linux,dummy-virt (DT)
[   18.404473] Call trace:
[   18.404517]  show_stack+0x20/0x38 (C)
[   18.404571]  dump_stack_lvl+0x8c/0xd0
[   18.404635]  print_report+0x118/0x608
[   18.404681]  kasan_report+0xdc/0x128
[   18.405072]  __asan_report_load1_noabort+0x20/0x30
[   18.405183]  ksize_uaf+0x598/0x5f8
[   18.405288]  kunit_try_run_case+0x170/0x3f0
[   18.405426]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.405527]  kthread+0x328/0x630
[   18.405704]  ret_from_fork+0x10/0x20
[   18.405916] 
[   18.405960] Allocated by task 196:
[   18.406127]  kasan_save_stack+0x3c/0x68
[   18.406197]  kasan_save_track+0x20/0x40
[   18.406509]  kasan_save_alloc_info+0x40/0x58
[   18.406648]  __kasan_kmalloc+0xd4/0xd8
[   18.406745]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.406799]  ksize_uaf+0xb8/0x5f8
[   18.406837]  kunit_try_run_case+0x170/0x3f0
[   18.407168]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.407301]  kthread+0x328/0x630
[   18.407378]  ret_from_fork+0x10/0x20
[   18.407608] 
[   18.407729] Freed by task 196:
[   18.407797]  kasan_save_stack+0x3c/0x68
[   18.407957]  kasan_save_track+0x20/0x40
[   18.408117]  kasan_save_free_info+0x4c/0x78
[   18.408160]  __kasan_slab_free+0x6c/0x98
[   18.408292]  kfree+0x214/0x3c8
[   18.408334]  ksize_uaf+0x11c/0x5f8
[   18.408367]  kunit_try_run_case+0x170/0x3f0
[   18.408405]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.408465]  kthread+0x328/0x630
[   18.408525]  ret_from_fork+0x10/0x20
[   18.408569] 
[   18.408600] The buggy address belongs to the object at fff00000c706f500
[   18.408600]  which belongs to the cache kmalloc-128 of size 128
[   18.408658] The buggy address is located 0 bytes inside of
[   18.408658]  freed 128-byte region [fff00000c706f500, fff00000c706f580)
[   18.408719] 
[   18.408745] The buggy address belongs to the physical page:
[   18.408794] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10706f
[   18.408861] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.408918] page_type: f5(slab)
[   18.408960] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.409010] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.409059] page dumped because: kasan: bad access detected
[   18.409092] 
[   18.409119] Memory state around the buggy address:
[   18.409156]  fff00000c706f400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.409199]  fff00000c706f480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.409251] >fff00000c706f500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.409298]                    ^
[   18.409325]  fff00000c706f580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.409368]  fff00000c706f600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.409415] ==================================================================
[   18.392479] ==================================================================
[   18.392538] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8
[   18.392604] Read of size 1 at addr fff00000c706f500 by task kunit_try_catch/196
[   18.392654] 
[   18.392686] CPU: 0 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   18.393172] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.393310] Hardware name: linux,dummy-virt (DT)
[   18.393416] Call trace:
[   18.393477]  show_stack+0x20/0x38 (C)
[   18.393560]  dump_stack_lvl+0x8c/0xd0
[   18.393617]  print_report+0x118/0x608
[   18.393663]  kasan_report+0xdc/0x128
[   18.394109]  __kasan_check_byte+0x54/0x70
[   18.394208]  ksize+0x30/0x88
[   18.394307]  ksize_uaf+0x168/0x5f8
[   18.394559]  kunit_try_run_case+0x170/0x3f0
[   18.394645]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.395028]  kthread+0x328/0x630
[   18.395108]  ret_from_fork+0x10/0x20
[   18.395194] 
[   18.395289] Allocated by task 196:
[   18.395369]  kasan_save_stack+0x3c/0x68
[   18.395457]  kasan_save_track+0x20/0x40
[   18.395506]  kasan_save_alloc_info+0x40/0x58
[   18.395544]  __kasan_kmalloc+0xd4/0xd8
[   18.395807]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.395983]  ksize_uaf+0xb8/0x5f8
[   18.396188]  kunit_try_run_case+0x170/0x3f0
[   18.396385]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.396433]  kthread+0x328/0x630
[   18.396465]  ret_from_fork+0x10/0x20
[   18.396536] 
[   18.396593] Freed by task 196:
[   18.397315]  kasan_save_stack+0x3c/0x68
[   18.397693]  kasan_save_track+0x20/0x40
[   18.397775]  kasan_save_free_info+0x4c/0x78
[   18.397856]  __kasan_slab_free+0x6c/0x98
[   18.397968]  kfree+0x214/0x3c8
[   18.398063]  ksize_uaf+0x11c/0x5f8
[   18.398115]  kunit_try_run_case+0x170/0x3f0
[   18.398190]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.398284]  kthread+0x328/0x630
[   18.398635]  ret_from_fork+0x10/0x20
[   18.398703] 
[   18.398770] The buggy address belongs to the object at fff00000c706f500
[   18.398770]  which belongs to the cache kmalloc-128 of size 128
[   18.399252] The buggy address is located 0 bytes inside of
[   18.399252]  freed 128-byte region [fff00000c706f500, fff00000c706f580)
[   18.399613] 
[   18.399764] The buggy address belongs to the physical page:
[   18.399870] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10706f
[   18.399969] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.400061] page_type: f5(slab)
[   18.400102] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.400151] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.400193] page dumped because: kasan: bad access detected
[   18.400225] 
[   18.400242] Memory state around the buggy address:
[   18.400283]  fff00000c706f400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.400343]  fff00000c706f480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.400396] >fff00000c706f500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.400443]                    ^
[   18.400491]  fff00000c706f580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.400552]  fff00000c706f600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.400599] ==================================================================
[   18.410465] ==================================================================
[   18.410781] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8
[   18.410996] Read of size 1 at addr fff00000c706f578 by task kunit_try_catch/196
[   18.411057] 
[   18.411094] CPU: 0 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   18.411182] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.411209] Hardware name: linux,dummy-virt (DT)
[   18.411412] Call trace:
[   18.411483]  show_stack+0x20/0x38 (C)
[   18.411537]  dump_stack_lvl+0x8c/0xd0
[   18.411702]  print_report+0x118/0x608
[   18.411765]  kasan_report+0xdc/0x128
[   18.411810]  __asan_report_load1_noabort+0x20/0x30
[   18.411867]  ksize_uaf+0x544/0x5f8
[   18.411911]  kunit_try_run_case+0x170/0x3f0
[   18.411956]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.412009]  kthread+0x328/0x630
[   18.412589]  ret_from_fork+0x10/0x20
[   18.412673] 
[   18.412725] Allocated by task 196:
[   18.412878]  kasan_save_stack+0x3c/0x68
[   18.412977]  kasan_save_track+0x20/0x40
[   18.413129]  kasan_save_alloc_info+0x40/0x58
[   18.413236]  __kasan_kmalloc+0xd4/0xd8
[   18.413276]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.413461]  ksize_uaf+0xb8/0x5f8
[   18.413636]  kunit_try_run_case+0x170/0x3f0
[   18.413785]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.413883]  kthread+0x328/0x630
[   18.413984]  ret_from_fork+0x10/0x20
[   18.414125] 
[   18.414298] Freed by task 196:
[   18.414354]  kasan_save_stack+0x3c/0x68
[   18.414724]  kasan_save_track+0x20/0x40
[   18.414808]  kasan_save_free_info+0x4c/0x78
[   18.414968]  __kasan_slab_free+0x6c/0x98
[   18.415072]  kfree+0x214/0x3c8
[   18.415213]  ksize_uaf+0x11c/0x5f8
[   18.415311]  kunit_try_run_case+0x170/0x3f0
[   18.415368]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.415419]  kthread+0x328/0x630
[   18.415816]  ret_from_fork+0x10/0x20
[   18.415878] 
[   18.415988] The buggy address belongs to the object at fff00000c706f500
[   18.415988]  which belongs to the cache kmalloc-128 of size 128
[   18.416103] The buggy address is located 120 bytes inside of
[   18.416103]  freed 128-byte region [fff00000c706f500, fff00000c706f580)
[   18.416312] 
[   18.416572] The buggy address belongs to the physical page:
[   18.416847] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10706f
[   18.416981] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.417135] page_type: f5(slab)
[   18.417203] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.417267] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.417372] page dumped because: kasan: bad access detected
[   18.417450] 
[   18.417471] Memory state around the buggy address:
[   18.417863]  fff00000c706f400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.417934]  fff00000c706f480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.418051] >fff00000c706f500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.418160]                                                                 ^
[   18.418324]  fff00000c706f580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.418410]  fff00000c706f600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.418501] ==================================================================

[   11.864305] ==================================================================
[   11.864805] BUG: KASAN: slab-use-after-free in ksize_uaf+0x19d/0x6c0
[   11.865328] Read of size 1 at addr ffff888102c8b200 by task kunit_try_catch/215
[   11.865780] 
[   11.866266] CPU: 1 UID: 0 PID: 215 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   11.866317] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.866328] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.866350] Call Trace:
[   11.866361]  <TASK>
[   11.866394]  dump_stack_lvl+0x73/0xb0
[   11.866427]  print_report+0xd1/0x650
[   11.866450]  ? __virt_addr_valid+0x1db/0x2d0
[   11.866474]  ? ksize_uaf+0x19d/0x6c0
[   11.866494]  ? kasan_complete_mode_report_info+0x64/0x200
[   11.866517]  ? ksize_uaf+0x19d/0x6c0
[   11.866538]  kasan_report+0x141/0x180
[   11.866559]  ? ksize_uaf+0x19d/0x6c0
[   11.866583]  ? ksize_uaf+0x19d/0x6c0
[   11.866602]  __kasan_check_byte+0x3d/0x50
[   11.866624]  ksize+0x20/0x60
[   11.866645]  ksize_uaf+0x19d/0x6c0
[   11.866666]  ? __pfx_ksize_uaf+0x10/0x10
[   11.866687]  ? __schedule+0x10cc/0x2b60
[   11.866708]  ? __pfx_read_tsc+0x10/0x10
[   11.866729]  ? ktime_get_ts64+0x86/0x230
[   11.866753]  kunit_try_run_case+0x1a5/0x480
[   11.866778]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.866799]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.866824]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.866846]  ? __kthread_parkme+0x82/0x180
[   11.866867]  ? preempt_count_sub+0x50/0x80
[   11.866890]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.866913]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.866934]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.866955]  kthread+0x337/0x6f0
[   11.866973]  ? trace_preempt_on+0x20/0xc0
[   11.866995]  ? __pfx_kthread+0x10/0x10
[   11.867015]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.867034]  ? calculate_sigpending+0x7b/0xa0
[   11.867058]  ? __pfx_kthread+0x10/0x10
[   11.867077]  ret_from_fork+0x116/0x1d0
[   11.867095]  ? __pfx_kthread+0x10/0x10
[   11.867114]  ret_from_fork_asm+0x1a/0x30
[   11.867144]  </TASK>
[   11.867154] 
[   11.878140] Allocated by task 215:
[   11.878310]  kasan_save_stack+0x45/0x70
[   11.878755]  kasan_save_track+0x18/0x40
[   11.879025]  kasan_save_alloc_info+0x3b/0x50
[   11.879196]  __kasan_kmalloc+0xb7/0xc0
[   11.879497]  __kmalloc_cache_noprof+0x189/0x420
[   11.880044]  ksize_uaf+0xaa/0x6c0
[   11.880327]  kunit_try_run_case+0x1a5/0x480
[   11.880542]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.881094]  kthread+0x337/0x6f0
[   11.881348]  ret_from_fork+0x116/0x1d0
[   11.881531]  ret_from_fork_asm+0x1a/0x30
[   11.881989] 
[   11.882230] Freed by task 215:
[   11.882380]  kasan_save_stack+0x45/0x70
[   11.882770]  kasan_save_track+0x18/0x40
[   11.882940]  kasan_save_free_info+0x3f/0x60
[   11.883288]  __kasan_slab_free+0x56/0x70
[   11.883506]  kfree+0x222/0x3f0
[   11.884018]  ksize_uaf+0x12c/0x6c0
[   11.884192]  kunit_try_run_case+0x1a5/0x480
[   11.884348]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.884658]  kthread+0x337/0x6f0
[   11.885234]  ret_from_fork+0x116/0x1d0
[   11.885410]  ret_from_fork_asm+0x1a/0x30
[   11.885853] 
[   11.885950] The buggy address belongs to the object at ffff888102c8b200
[   11.885950]  which belongs to the cache kmalloc-128 of size 128
[   11.886476] The buggy address is located 0 bytes inside of
[   11.886476]  freed 128-byte region [ffff888102c8b200, ffff888102c8b280)
[   11.887408] 
[   11.887502] The buggy address belongs to the physical page:
[   11.888092] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c8b
[   11.888559] flags: 0x200000000000000(node=0|zone=2)
[   11.888951] page_type: f5(slab)
[   11.889119] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   11.889470] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.890133] page dumped because: kasan: bad access detected
[   11.890467] 
[   11.890545] Memory state around the buggy address:
[   11.891024]  ffff888102c8b100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   11.891321]  ffff888102c8b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.891842] >ffff888102c8b200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   11.892199]                    ^
[   11.892382]  ffff888102c8b280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.892975]  ffff888102c8b300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.893364] ==================================================================
[   11.893962] ==================================================================
[   11.894209] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5fe/0x6c0
[   11.894530] Read of size 1 at addr ffff888102c8b200 by task kunit_try_catch/215
[   11.895022] 
[   11.895116] CPU: 1 UID: 0 PID: 215 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   11.895160] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.895171] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.895191] Call Trace:
[   11.895211]  <TASK>
[   11.895230]  dump_stack_lvl+0x73/0xb0
[   11.895258]  print_report+0xd1/0x650
[   11.895281]  ? __virt_addr_valid+0x1db/0x2d0
[   11.895303]  ? ksize_uaf+0x5fe/0x6c0
[   11.895322]  ? kasan_complete_mode_report_info+0x64/0x200
[   11.895343]  ? ksize_uaf+0x5fe/0x6c0
[   11.895362]  kasan_report+0x141/0x180
[   11.895886]  ? ksize_uaf+0x5fe/0x6c0
[   11.895923]  __asan_report_load1_noabort+0x18/0x20
[   11.895948]  ksize_uaf+0x5fe/0x6c0
[   11.895969]  ? __pfx_ksize_uaf+0x10/0x10
[   11.895989]  ? __schedule+0x10cc/0x2b60
[   11.896010]  ? __pfx_read_tsc+0x10/0x10
[   11.896030]  ? ktime_get_ts64+0x86/0x230
[   11.896053]  kunit_try_run_case+0x1a5/0x480
[   11.896077]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.896098]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.896119]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.896140]  ? __kthread_parkme+0x82/0x180
[   11.896160]  ? preempt_count_sub+0x50/0x80
[   11.896183]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.896205]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.896227]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.896248]  kthread+0x337/0x6f0
[   11.896266]  ? trace_preempt_on+0x20/0xc0
[   11.896289]  ? __pfx_kthread+0x10/0x10
[   11.896308]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.896327]  ? calculate_sigpending+0x7b/0xa0
[   11.896350]  ? __pfx_kthread+0x10/0x10
[   11.896382]  ret_from_fork+0x116/0x1d0
[   11.896400]  ? __pfx_kthread+0x10/0x10
[   11.896419]  ret_from_fork_asm+0x1a/0x30
[   11.896448]  </TASK>
[   11.896459] 
[   11.906278] Allocated by task 215:
[   11.906461]  kasan_save_stack+0x45/0x70
[   11.906952]  kasan_save_track+0x18/0x40
[   11.907138]  kasan_save_alloc_info+0x3b/0x50
[   11.907332]  __kasan_kmalloc+0xb7/0xc0
[   11.907531]  __kmalloc_cache_noprof+0x189/0x420
[   11.908159]  ksize_uaf+0xaa/0x6c0
[   11.908323]  kunit_try_run_case+0x1a5/0x480
[   11.908622]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.908960]  kthread+0x337/0x6f0
[   11.909126]  ret_from_fork+0x116/0x1d0
[   11.909299]  ret_from_fork_asm+0x1a/0x30
[   11.909493] 
[   11.909945] Freed by task 215:
[   11.910104]  kasan_save_stack+0x45/0x70
[   11.910262]  kasan_save_track+0x18/0x40
[   11.910568]  kasan_save_free_info+0x3f/0x60
[   11.910869]  __kasan_slab_free+0x56/0x70
[   11.911166]  kfree+0x222/0x3f0
[   11.911329]  ksize_uaf+0x12c/0x6c0
[   11.911502]  kunit_try_run_case+0x1a5/0x480
[   11.911905]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.912127]  kthread+0x337/0x6f0
[   11.912293]  ret_from_fork+0x116/0x1d0
[   11.912481]  ret_from_fork_asm+0x1a/0x30
[   11.912654] 
[   11.913207] The buggy address belongs to the object at ffff888102c8b200
[   11.913207]  which belongs to the cache kmalloc-128 of size 128
[   11.913718] The buggy address is located 0 bytes inside of
[   11.913718]  freed 128-byte region [ffff888102c8b200, ffff888102c8b280)
[   11.914381] 
[   11.914489] The buggy address belongs to the physical page:
[   11.915014] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c8b
[   11.915338] flags: 0x200000000000000(node=0|zone=2)
[   11.915579] page_type: f5(slab)
[   11.915913] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   11.916247] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.916574] page dumped because: kasan: bad access detected
[   11.916798] 
[   11.917249] Memory state around the buggy address:
[   11.917472]  ffff888102c8b100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   11.918033]  ffff888102c8b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.918433] >ffff888102c8b200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   11.918742]                    ^
[   11.919012]  ffff888102c8b280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.919304]  ffff888102c8b300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.919612] ==================================================================
[   11.920571] ==================================================================
[   11.920999] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5e4/0x6c0
[   11.921602] Read of size 1 at addr ffff888102c8b278 by task kunit_try_catch/215
[   11.922028] 
[   11.922265] CPU: 1 UID: 0 PID: 215 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   11.922388] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.922458] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.922479] Call Trace:
[   11.922545]  <TASK>
[   11.922563]  dump_stack_lvl+0x73/0xb0
[   11.922644]  print_report+0xd1/0x650
[   11.922666]  ? __virt_addr_valid+0x1db/0x2d0
[   11.922688]  ? ksize_uaf+0x5e4/0x6c0
[   11.922707]  ? kasan_complete_mode_report_info+0x64/0x200
[   11.922728]  ? ksize_uaf+0x5e4/0x6c0
[   11.922747]  kasan_report+0x141/0x180
[   11.922768]  ? ksize_uaf+0x5e4/0x6c0
[   11.922792]  __asan_report_load1_noabort+0x18/0x20
[   11.922814]  ksize_uaf+0x5e4/0x6c0
[   11.922834]  ? __pfx_ksize_uaf+0x10/0x10
[   11.922854]  ? __schedule+0x10cc/0x2b60
[   11.922875]  ? __pfx_read_tsc+0x10/0x10
[   11.922894]  ? ktime_get_ts64+0x86/0x230
[   11.922917]  kunit_try_run_case+0x1a5/0x480
[   11.922940]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.922960]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.922981]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.923002]  ? __kthread_parkme+0x82/0x180
[   11.923022]  ? preempt_count_sub+0x50/0x80
[   11.923044]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.923066]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.923087]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.923109]  kthread+0x337/0x6f0
[   11.923127]  ? trace_preempt_on+0x20/0xc0
[   11.923150]  ? __pfx_kthread+0x10/0x10
[   11.923169]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.923189]  ? calculate_sigpending+0x7b/0xa0
[   11.923211]  ? __pfx_kthread+0x10/0x10
[   11.923231]  ret_from_fork+0x116/0x1d0
[   11.923249]  ? __pfx_kthread+0x10/0x10
[   11.923267]  ret_from_fork_asm+0x1a/0x30
[   11.923296]  </TASK>
[   11.923307] 
[   11.933284] Allocated by task 215:
[   11.933743]  kasan_save_stack+0x45/0x70
[   11.933957]  kasan_save_track+0x18/0x40
[   11.934129]  kasan_save_alloc_info+0x3b/0x50
[   11.934326]  __kasan_kmalloc+0xb7/0xc0
[   11.934524]  __kmalloc_cache_noprof+0x189/0x420
[   11.934737]  ksize_uaf+0xaa/0x6c0
[   11.935432]  kunit_try_run_case+0x1a5/0x480
[   11.935838]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.936083]  kthread+0x337/0x6f0
[   11.936228]  ret_from_fork+0x116/0x1d0
[   11.936721]  ret_from_fork_asm+0x1a/0x30
[   11.937017] 
[   11.937095] Freed by task 215:
[   11.937386]  kasan_save_stack+0x45/0x70
[   11.937570]  kasan_save_track+0x18/0x40
[   11.937985]  kasan_save_free_info+0x3f/0x60
[   11.938265]  __kasan_slab_free+0x56/0x70
[   11.938460]  kfree+0x222/0x3f0
[   11.938629]  ksize_uaf+0x12c/0x6c0
[   11.939033]  kunit_try_run_case+0x1a5/0x480
[   11.939229]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.939755]  kthread+0x337/0x6f0
[   11.939917]  ret_from_fork+0x116/0x1d0
[   11.940099]  ret_from_fork_asm+0x1a/0x30
[   11.940279] 
[   11.940383] The buggy address belongs to the object at ffff888102c8b200
[   11.940383]  which belongs to the cache kmalloc-128 of size 128
[   11.941268] The buggy address is located 120 bytes inside of
[   11.941268]  freed 128-byte region [ffff888102c8b200, ffff888102c8b280)
[   11.941857] 
[   11.942121] The buggy address belongs to the physical page:
[   11.942320] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c8b
[   11.942852] flags: 0x200000000000000(node=0|zone=2)
[   11.943040] page_type: f5(slab)
[   11.943283] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   11.943610] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.944130] page dumped because: kasan: bad access detected
[   11.944364] 
[   11.944539] Memory state around the buggy address:
[   11.944932]  ffff888102c8b100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   11.945312]  ffff888102c8b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.945631] >ffff888102c8b200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   11.946085]                                                                 ^
[   11.946400]  ffff888102c8b280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.947046]  ffff888102c8b300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.947460] ==================================================================