Hay
Date
July 10, 2025, 11:10 p.m.

Environment
qemu-arm64
qemu-x86_64

[   16.152245] ==================================================================
[   16.152717] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8
[   16.153156] Read of size 1 at addr fff00000c63f3a00 by task kunit_try_catch/196
[   16.153207] 
[   16.153241] CPU: 1 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   16.153323] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.153348] Hardware name: linux,dummy-virt (DT)
[   16.153378] Call trace:
[   16.153886]  show_stack+0x20/0x38 (C)
[   16.153971]  dump_stack_lvl+0x8c/0xd0
[   16.154028]  print_report+0x118/0x608
[   16.154104]  kasan_report+0xdc/0x128
[   16.154608]  __asan_report_load1_noabort+0x20/0x30
[   16.154666]  ksize_uaf+0x598/0x5f8
[   16.154711]  kunit_try_run_case+0x170/0x3f0
[   16.154760]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.154815]  kthread+0x328/0x630
[   16.154857]  ret_from_fork+0x10/0x20
[   16.154905] 
[   16.154924] Allocated by task 196:
[   16.155473]  kasan_save_stack+0x3c/0x68
[   16.155704]  kasan_save_track+0x20/0x40
[   16.156284]  kasan_save_alloc_info+0x40/0x58
[   16.156333]  __kasan_kmalloc+0xd4/0xd8
[   16.156370]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.156764]  ksize_uaf+0xb8/0x5f8
[   16.156807]  kunit_try_run_case+0x170/0x3f0
[   16.156915]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.157120]  kthread+0x328/0x630
[   16.157165]  ret_from_fork+0x10/0x20
[   16.157201] 
[   16.157220] Freed by task 196:
[   16.157717]  kasan_save_stack+0x3c/0x68
[   16.158140]  kasan_save_track+0x20/0x40
[   16.158358]  kasan_save_free_info+0x4c/0x78
[   16.158399]  __kasan_slab_free+0x6c/0x98
[   16.158645]  kfree+0x214/0x3c8
[   16.158996]  ksize_uaf+0x11c/0x5f8
[   16.159203]  kunit_try_run_case+0x170/0x3f0
[   16.159251]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.159682]  kthread+0x328/0x630
[   16.159811]  ret_from_fork+0x10/0x20
[   16.160069] 
[   16.160105] The buggy address belongs to the object at fff00000c63f3a00
[   16.160105]  which belongs to the cache kmalloc-128 of size 128
[   16.160209] The buggy address is located 0 bytes inside of
[   16.160209]  freed 128-byte region [fff00000c63f3a00, fff00000c63f3a80)
[   16.160272] 
[   16.160649] The buggy address belongs to the physical page:
[   16.160906] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063f3
[   16.161165] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.161411] page_type: f5(slab)
[   16.161741] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.161872] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.161915] page dumped because: kasan: bad access detected
[   16.161947] 
[   16.162186] Memory state around the buggy address:
[   16.162227]  fff00000c63f3900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.162530]  fff00000c63f3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.162757] >fff00000c63f3a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.163017]                    ^
[   16.163225]  fff00000c63f3a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.163664]  fff00000c63f3b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.163709] ==================================================================
[   16.166399] ==================================================================
[   16.166540] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8
[   16.166635] Read of size 1 at addr fff00000c63f3a78 by task kunit_try_catch/196
[   16.166686] 
[   16.166720] CPU: 1 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   16.166937] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.166974] Hardware name: linux,dummy-virt (DT)
[   16.167349] Call trace:
[   16.167374]  show_stack+0x20/0x38 (C)
[   16.167729]  dump_stack_lvl+0x8c/0xd0
[   16.168008]  print_report+0x118/0x608
[   16.168335]  kasan_report+0xdc/0x128
[   16.168596]  __asan_report_load1_noabort+0x20/0x30
[   16.168650]  ksize_uaf+0x544/0x5f8
[   16.168696]  kunit_try_run_case+0x170/0x3f0
[   16.168747]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.169517]  kthread+0x328/0x630
[   16.169707]  ret_from_fork+0x10/0x20
[   16.170302] 
[   16.170333] Allocated by task 196:
[   16.170363]  kasan_save_stack+0x3c/0x68
[   16.170409]  kasan_save_track+0x20/0x40
[   16.170446]  kasan_save_alloc_info+0x40/0x58
[   16.170488]  __kasan_kmalloc+0xd4/0xd8
[   16.170525]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.171242]  ksize_uaf+0xb8/0x5f8
[   16.171739]  kunit_try_run_case+0x170/0x3f0
[   16.172053]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.172115]  kthread+0x328/0x630
[   16.172402]  ret_from_fork+0x10/0x20
[   16.172577] 
[   16.172719] Freed by task 196:
[   16.172752]  kasan_save_stack+0x3c/0x68
[   16.172794]  kasan_save_track+0x20/0x40
[   16.173135]  kasan_save_free_info+0x4c/0x78
[   16.173195]  __kasan_slab_free+0x6c/0x98
[   16.173456]  kfree+0x214/0x3c8
[   16.173534]  ksize_uaf+0x11c/0x5f8
[   16.173771]  kunit_try_run_case+0x170/0x3f0
[   16.173899]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.174055]  kthread+0x328/0x630
[   16.174108]  ret_from_fork+0x10/0x20
[   16.174147] 
[   16.174167] The buggy address belongs to the object at fff00000c63f3a00
[   16.174167]  which belongs to the cache kmalloc-128 of size 128
[   16.174234] The buggy address is located 120 bytes inside of
[   16.174234]  freed 128-byte region [fff00000c63f3a00, fff00000c63f3a80)
[   16.174406] 
[   16.174466] The buggy address belongs to the physical page:
[   16.174541] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063f3
[   16.174615] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.174947] page_type: f5(slab)
[   16.175051] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.175793] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.177100] page dumped because: kasan: bad access detected
[   16.177268] 
[   16.177313] Memory state around the buggy address:
[   16.177692]  fff00000c63f3900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.179563]  fff00000c63f3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.180116] >fff00000c63f3a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.180222]                                                                 ^
[   16.180352]  fff00000c63f3a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.180492]  fff00000c63f3b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.180562] ==================================================================
[   16.143548] ==================================================================
[   16.143612] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8
[   16.143670] Read of size 1 at addr fff00000c63f3a00 by task kunit_try_catch/196
[   16.143720] 
[   16.143754] CPU: 1 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   16.143838] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.143864] Hardware name: linux,dummy-virt (DT)
[   16.143895] Call trace:
[   16.143919]  show_stack+0x20/0x38 (C)
[   16.143966]  dump_stack_lvl+0x8c/0xd0
[   16.144016]  print_report+0x118/0x608
[   16.144063]  kasan_report+0xdc/0x128
[   16.144126]  __kasan_check_byte+0x54/0x70
[   16.144173]  ksize+0x30/0x88
[   16.144215]  ksize_uaf+0x168/0x5f8
[   16.144260]  kunit_try_run_case+0x170/0x3f0
[   16.144308]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.144360]  kthread+0x328/0x630
[   16.144404]  ret_from_fork+0x10/0x20
[   16.144451] 
[   16.144471] Allocated by task 196:
[   16.144498]  kasan_save_stack+0x3c/0x68
[   16.144537]  kasan_save_track+0x20/0x40
[   16.144576]  kasan_save_alloc_info+0x40/0x58
[   16.144617]  __kasan_kmalloc+0xd4/0xd8
[   16.144654]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.144693]  ksize_uaf+0xb8/0x5f8
[   16.144727]  kunit_try_run_case+0x170/0x3f0
[   16.144765]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.144809]  kthread+0x328/0x630
[   16.144841]  ret_from_fork+0x10/0x20
[   16.144878] 
[   16.144896] Freed by task 196:
[   16.144922]  kasan_save_stack+0x3c/0x68
[   16.144958]  kasan_save_track+0x20/0x40
[   16.144996]  kasan_save_free_info+0x4c/0x78
[   16.145034]  __kasan_slab_free+0x6c/0x98
[   16.145072]  kfree+0x214/0x3c8
[   16.145861]  ksize_uaf+0x11c/0x5f8
[   16.145992]  kunit_try_run_case+0x170/0x3f0
[   16.146063]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.146167]  kthread+0x328/0x630
[   16.146218]  ret_from_fork+0x10/0x20
[   16.146265] 
[   16.146286] The buggy address belongs to the object at fff00000c63f3a00
[   16.146286]  which belongs to the cache kmalloc-128 of size 128
[   16.146374] The buggy address is located 0 bytes inside of
[   16.146374]  freed 128-byte region [fff00000c63f3a00, fff00000c63f3a80)
[   16.146434] 
[   16.146475] The buggy address belongs to the physical page:
[   16.146532] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063f3
[   16.146585] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.146634] page_type: f5(slab)
[   16.146696] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.146758] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.146817] page dumped because: kasan: bad access detected
[   16.146849] 
[   16.146868] Memory state around the buggy address:
[   16.146909]  fff00000c63f3900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.146966]  fff00000c63f3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.147016] >fff00000c63f3a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.147055]                    ^
[   16.147507]  fff00000c63f3a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.147560]  fff00000c63f3b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.147601] ==================================================================

[   13.247561] ==================================================================
[   13.247924] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5e4/0x6c0
[   13.248243] Read of size 1 at addr ffff888102d5f878 by task kunit_try_catch/213
[   13.248739] 
[   13.248837] CPU: 1 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   13.248877] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.248888] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.248907] Call Trace:
[   13.248919]  <TASK>
[   13.248932]  dump_stack_lvl+0x73/0xb0
[   13.248960]  print_report+0xd1/0x650
[   13.248982]  ? __virt_addr_valid+0x1db/0x2d0
[   13.249003]  ? ksize_uaf+0x5e4/0x6c0
[   13.249022]  ? kasan_complete_mode_report_info+0x64/0x200
[   13.249045]  ? ksize_uaf+0x5e4/0x6c0
[   13.249066]  kasan_report+0x141/0x180
[   13.249087]  ? ksize_uaf+0x5e4/0x6c0
[   13.249111]  __asan_report_load1_noabort+0x18/0x20
[   13.249136]  ksize_uaf+0x5e4/0x6c0
[   13.249155]  ? __pfx_ksize_uaf+0x10/0x10
[   13.249176]  ? __schedule+0x10cc/0x2b60
[   13.249199]  ? __pfx_read_tsc+0x10/0x10
[   13.249219]  ? ktime_get_ts64+0x86/0x230
[   13.249242]  kunit_try_run_case+0x1a5/0x480
[   13.249265]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.249287]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.249310]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.249334]  ? __kthread_parkme+0x82/0x180
[   13.249354]  ? preempt_count_sub+0x50/0x80
[   13.249390]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.249414]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.249438]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.249462]  kthread+0x337/0x6f0
[   13.249480]  ? trace_preempt_on+0x20/0xc0
[   13.249503]  ? __pfx_kthread+0x10/0x10
[   13.249523]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.249558]  ? calculate_sigpending+0x7b/0xa0
[   13.249582]  ? __pfx_kthread+0x10/0x10
[   13.249602]  ret_from_fork+0x116/0x1d0
[   13.249620]  ? __pfx_kthread+0x10/0x10
[   13.249640]  ret_from_fork_asm+0x1a/0x30
[   13.249670]  </TASK>
[   13.249679] 
[   13.256882] Allocated by task 213:
[   13.257058]  kasan_save_stack+0x45/0x70
[   13.257256]  kasan_save_track+0x18/0x40
[   13.257501]  kasan_save_alloc_info+0x3b/0x50
[   13.257709]  __kasan_kmalloc+0xb7/0xc0
[   13.257894]  __kmalloc_cache_noprof+0x189/0x420
[   13.258075]  ksize_uaf+0xaa/0x6c0
[   13.258250]  kunit_try_run_case+0x1a5/0x480
[   13.258644]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.258864]  kthread+0x337/0x6f0
[   13.258986]  ret_from_fork+0x116/0x1d0
[   13.259118]  ret_from_fork_asm+0x1a/0x30
[   13.259256] 
[   13.259326] Freed by task 213:
[   13.259500]  kasan_save_stack+0x45/0x70
[   13.259698]  kasan_save_track+0x18/0x40
[   13.259891]  kasan_save_free_info+0x3f/0x60
[   13.260330]  __kasan_slab_free+0x56/0x70
[   13.260539]  kfree+0x222/0x3f0
[   13.260766]  ksize_uaf+0x12c/0x6c0
[   13.260960]  kunit_try_run_case+0x1a5/0x480
[   13.261147]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.261445]  kthread+0x337/0x6f0
[   13.261592]  ret_from_fork+0x116/0x1d0
[   13.261773]  ret_from_fork_asm+0x1a/0x30
[   13.261911] 
[   13.261980] The buggy address belongs to the object at ffff888102d5f800
[   13.261980]  which belongs to the cache kmalloc-128 of size 128
[   13.262399] The buggy address is located 120 bytes inside of
[   13.262399]  freed 128-byte region [ffff888102d5f800, ffff888102d5f880)
[   13.262930] 
[   13.263024] The buggy address belongs to the physical page:
[   13.263513] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102d5f
[   13.263917] flags: 0x200000000000000(node=0|zone=2)
[   13.264154] page_type: f5(slab)
[   13.264278] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   13.265712] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.266680] page dumped because: kasan: bad access detected
[   13.266861] 
[   13.266932] Memory state around the buggy address:
[   13.267087]  ffff888102d5f700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.267303]  ffff888102d5f780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.268004] >ffff888102d5f800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.268718]                                                                 ^
[   13.269344]  ffff888102d5f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.270030]  ffff888102d5f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.270771] ==================================================================
[   13.184668] ==================================================================
[   13.185471] BUG: KASAN: slab-use-after-free in ksize_uaf+0x19d/0x6c0
[   13.185915] Read of size 1 at addr ffff888102d5f800 by task kunit_try_catch/213
[   13.186144] 
[   13.186232] CPU: 1 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   13.186274] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.186285] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.186304] Call Trace:
[   13.186316]  <TASK>
[   13.186330]  dump_stack_lvl+0x73/0xb0
[   13.186374]  print_report+0xd1/0x650
[   13.186396]  ? __virt_addr_valid+0x1db/0x2d0
[   13.186418]  ? ksize_uaf+0x19d/0x6c0
[   13.186533]  ? kasan_complete_mode_report_info+0x64/0x200
[   13.186561]  ? ksize_uaf+0x19d/0x6c0
[   13.186582]  kasan_report+0x141/0x180
[   13.186604]  ? ksize_uaf+0x19d/0x6c0
[   13.186627]  ? ksize_uaf+0x19d/0x6c0
[   13.187008]  __kasan_check_byte+0x3d/0x50
[   13.187035]  ksize+0x20/0x60
[   13.187058]  ksize_uaf+0x19d/0x6c0
[   13.187079]  ? __pfx_ksize_uaf+0x10/0x10
[   13.187101]  ? __schedule+0x10cc/0x2b60
[   13.187125]  ? __pfx_read_tsc+0x10/0x10
[   13.187146]  ? ktime_get_ts64+0x86/0x230
[   13.187170]  kunit_try_run_case+0x1a5/0x480
[   13.187193]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.187216]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.187240]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.187264]  ? __kthread_parkme+0x82/0x180
[   13.187284]  ? preempt_count_sub+0x50/0x80
[   13.187307]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.187331]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.187355]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.187400]  kthread+0x337/0x6f0
[   13.187419]  ? trace_preempt_on+0x20/0xc0
[   13.187442]  ? __pfx_kthread+0x10/0x10
[   13.187463]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.187484]  ? calculate_sigpending+0x7b/0xa0
[   13.187508]  ? __pfx_kthread+0x10/0x10
[   13.187529]  ret_from_fork+0x116/0x1d0
[   13.187547]  ? __pfx_kthread+0x10/0x10
[   13.187567]  ret_from_fork_asm+0x1a/0x30
[   13.187597]  </TASK>
[   13.187607] 
[   13.199581] Allocated by task 213:
[   13.199922]  kasan_save_stack+0x45/0x70
[   13.200299]  kasan_save_track+0x18/0x40
[   13.200713]  kasan_save_alloc_info+0x3b/0x50
[   13.200871]  __kasan_kmalloc+0xb7/0xc0
[   13.201006]  __kmalloc_cache_noprof+0x189/0x420
[   13.201164]  ksize_uaf+0xaa/0x6c0
[   13.201286]  kunit_try_run_case+0x1a5/0x480
[   13.201510]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.202083]  kthread+0x337/0x6f0
[   13.202420]  ret_from_fork+0x116/0x1d0
[   13.202939]  ret_from_fork_asm+0x1a/0x30
[   13.203314] 
[   13.203570] Freed by task 213:
[   13.203863]  kasan_save_stack+0x45/0x70
[   13.204226]  kasan_save_track+0x18/0x40
[   13.204691]  kasan_save_free_info+0x3f/0x60
[   13.204887]  __kasan_slab_free+0x56/0x70
[   13.205027]  kfree+0x222/0x3f0
[   13.205142]  ksize_uaf+0x12c/0x6c0
[   13.205266]  kunit_try_run_case+0x1a5/0x480
[   13.205749]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.206232]  kthread+0x337/0x6f0
[   13.207196]  ret_from_fork+0x116/0x1d0
[   13.207661]  ret_from_fork_asm+0x1a/0x30
[   13.208065] 
[   13.208211] The buggy address belongs to the object at ffff888102d5f800
[   13.208211]  which belongs to the cache kmalloc-128 of size 128
[   13.209137] The buggy address is located 0 bytes inside of
[   13.209137]  freed 128-byte region [ffff888102d5f800, ffff888102d5f880)
[   13.209590] 
[   13.209820] The buggy address belongs to the physical page:
[   13.210790] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102d5f
[   13.211520] flags: 0x200000000000000(node=0|zone=2)
[   13.212028] page_type: f5(slab)
[   13.212340] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   13.212834] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.213082] page dumped because: kasan: bad access detected
[   13.213255] 
[   13.213324] Memory state around the buggy address:
[   13.213508]  ffff888102d5f700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.214735]  ffff888102d5f780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.215366] >ffff888102d5f800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.216089]                    ^
[   13.216518]  ffff888102d5f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.217227]  ffff888102d5f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.217999] ==================================================================
[   13.218534] ==================================================================
[   13.218773] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5fe/0x6c0
[   13.218987] Read of size 1 at addr ffff888102d5f800 by task kunit_try_catch/213
[   13.219210] 
[   13.219295] CPU: 1 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   13.219334] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.219345] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.219394] Call Trace:
[   13.219410]  <TASK>
[   13.219426]  dump_stack_lvl+0x73/0xb0
[   13.219455]  print_report+0xd1/0x650
[   13.219477]  ? __virt_addr_valid+0x1db/0x2d0
[   13.219499]  ? ksize_uaf+0x5fe/0x6c0
[   13.219518]  ? kasan_complete_mode_report_info+0x64/0x200
[   13.219541]  ? ksize_uaf+0x5fe/0x6c0
[   13.219561]  kasan_report+0x141/0x180
[   13.219582]  ? ksize_uaf+0x5fe/0x6c0
[   13.219606]  __asan_report_load1_noabort+0x18/0x20
[   13.219631]  ksize_uaf+0x5fe/0x6c0
[   13.219650]  ? __pfx_ksize_uaf+0x10/0x10
[   13.219671]  ? __schedule+0x10cc/0x2b60
[   13.219705]  ? __pfx_read_tsc+0x10/0x10
[   13.219725]  ? ktime_get_ts64+0x86/0x230
[   13.219749]  kunit_try_run_case+0x1a5/0x480
[   13.219773]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.219796]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.219820]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.219843]  ? __kthread_parkme+0x82/0x180
[   13.219863]  ? preempt_count_sub+0x50/0x80
[   13.219886]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.219910]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.219934]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.219958]  kthread+0x337/0x6f0
[   13.219976]  ? trace_preempt_on+0x20/0xc0
[   13.220000]  ? __pfx_kthread+0x10/0x10
[   13.220020]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.220041]  ? calculate_sigpending+0x7b/0xa0
[   13.220064]  ? __pfx_kthread+0x10/0x10
[   13.220085]  ret_from_fork+0x116/0x1d0
[   13.220102]  ? __pfx_kthread+0x10/0x10
[   13.220122]  ret_from_fork_asm+0x1a/0x30
[   13.220153]  </TASK>
[   13.220162] 
[   13.234583] Allocated by task 213:
[   13.234759]  kasan_save_stack+0x45/0x70
[   13.234907]  kasan_save_track+0x18/0x40
[   13.235043]  kasan_save_alloc_info+0x3b/0x50
[   13.235191]  __kasan_kmalloc+0xb7/0xc0
[   13.235321]  __kmalloc_cache_noprof+0x189/0x420
[   13.235797]  ksize_uaf+0xaa/0x6c0
[   13.236110]  kunit_try_run_case+0x1a5/0x480
[   13.236532]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.237056]  kthread+0x337/0x6f0
[   13.237503]  ret_from_fork+0x116/0x1d0
[   13.237869]  ret_from_fork_asm+0x1a/0x30
[   13.238222] 
[   13.238397] Freed by task 213:
[   13.238746]  kasan_save_stack+0x45/0x70
[   13.239093]  kasan_save_track+0x18/0x40
[   13.239492]  kasan_save_free_info+0x3f/0x60
[   13.239827]  __kasan_slab_free+0x56/0x70
[   13.239974]  kfree+0x222/0x3f0
[   13.240091]  ksize_uaf+0x12c/0x6c0
[   13.240223]  kunit_try_run_case+0x1a5/0x480
[   13.240391]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.240567]  kthread+0x337/0x6f0
[   13.240838]  ret_from_fork+0x116/0x1d0
[   13.241083]  ret_from_fork_asm+0x1a/0x30
[   13.241252] 
[   13.241323] The buggy address belongs to the object at ffff888102d5f800
[   13.241323]  which belongs to the cache kmalloc-128 of size 128
[   13.241869] The buggy address is located 0 bytes inside of
[   13.241869]  freed 128-byte region [ffff888102d5f800, ffff888102d5f880)
[   13.242778] 
[   13.242870] The buggy address belongs to the physical page:
[   13.243087] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102d5f
[   13.243411] flags: 0x200000000000000(node=0|zone=2)
[   13.243734] page_type: f5(slab)
[   13.243852] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   13.244217] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.244678] page dumped because: kasan: bad access detected
[   13.244953] 
[   13.245038] Memory state around the buggy address:
[   13.245239]  ffff888102d5f700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.245490]  ffff888102d5f780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.245812] >ffff888102d5f800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.246094]                    ^
[   13.246210]  ffff888102d5f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.246725]  ffff888102d5f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.247118] ==================================================================