Hay
Date
July 11, 2025, 11:09 p.m.

Environment
qemu-arm64
qemu-x86_64

[   17.043879] ==================================================================
[   17.044294] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8
[   17.044340] Read of size 1 at addr fff00000c6f3fa78 by task kunit_try_catch/197
[   17.044391] 
[   17.044421] CPU: 0 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   17.044502] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.045149] Hardware name: linux,dummy-virt (DT)
[   17.045246] Call trace:
[   17.045268]  show_stack+0x20/0x38 (C)
[   17.045318]  dump_stack_lvl+0x8c/0xd0
[   17.045373]  print_report+0x118/0x608
[   17.045727]  kasan_report+0xdc/0x128
[   17.046209]  __asan_report_load1_noabort+0x20/0x30
[   17.046504]  ksize_uaf+0x544/0x5f8
[   17.046549]  kunit_try_run_case+0x170/0x3f0
[   17.046896]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.047469]  kthread+0x328/0x630
[   17.047515]  ret_from_fork+0x10/0x20
[   17.047690] 
[   17.047716] Allocated by task 197:
[   17.047744]  kasan_save_stack+0x3c/0x68
[   17.047851]  kasan_save_track+0x20/0x40
[   17.047889]  kasan_save_alloc_info+0x40/0x58
[   17.047929]  __kasan_kmalloc+0xd4/0xd8
[   17.048146]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.048194]  ksize_uaf+0xb8/0x5f8
[   17.048227]  kunit_try_run_case+0x170/0x3f0
[   17.048264]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.048622]  kthread+0x328/0x630
[   17.049019]  ret_from_fork+0x10/0x20
[   17.049070] 
[   17.049089] Freed by task 197:
[   17.049117]  kasan_save_stack+0x3c/0x68
[   17.049153]  kasan_save_track+0x20/0x40
[   17.049190]  kasan_save_free_info+0x4c/0x78
[   17.049227]  __kasan_slab_free+0x6c/0x98
[   17.049265]  kfree+0x214/0x3c8
[   17.049879]  ksize_uaf+0x11c/0x5f8
[   17.049925]  kunit_try_run_case+0x170/0x3f0
[   17.049962]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.050240]  kthread+0x328/0x630
[   17.050273]  ret_from_fork+0x10/0x20
[   17.050310] 
[   17.050332] The buggy address belongs to the object at fff00000c6f3fa00
[   17.050332]  which belongs to the cache kmalloc-128 of size 128
[   17.050765] The buggy address is located 120 bytes inside of
[   17.050765]  freed 128-byte region [fff00000c6f3fa00, fff00000c6f3fa80)
[   17.051530] 
[   17.051831] The buggy address belongs to the physical page:
[   17.052160] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106f3f
[   17.052301] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.052891] page_type: f5(slab)
[   17.052933] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.052984] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.053696] page dumped because: kasan: bad access detected
[   17.053995] 
[   17.054134] Memory state around the buggy address:
[   17.054170]  fff00000c6f3f900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.054218]  fff00000c6f3f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.054261] >fff00000c6f3fa00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.054298]                                                                 ^
[   17.054338]  fff00000c6f3fa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.055489]  fff00000c6f3fb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.055936] ==================================================================
[   17.032941] ==================================================================
[   17.032993] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8
[   17.033039] Read of size 1 at addr fff00000c6f3fa00 by task kunit_try_catch/197
[   17.033089] 
[   17.033121] CPU: 0 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   17.033204] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.033228] Hardware name: linux,dummy-virt (DT)
[   17.033257] Call trace:
[   17.033279]  show_stack+0x20/0x38 (C)
[   17.034919]  dump_stack_lvl+0x8c/0xd0
[   17.035078]  print_report+0x118/0x608
[   17.035217]  kasan_report+0xdc/0x128
[   17.035402]  __asan_report_load1_noabort+0x20/0x30
[   17.035490]  ksize_uaf+0x598/0x5f8
[   17.035535]  kunit_try_run_case+0x170/0x3f0
[   17.035590]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.036200]  kthread+0x328/0x630
[   17.036260]  ret_from_fork+0x10/0x20
[   17.036308] 
[   17.036329] Allocated by task 197:
[   17.036356]  kasan_save_stack+0x3c/0x68
[   17.036398]  kasan_save_track+0x20/0x40
[   17.036434]  kasan_save_alloc_info+0x40/0x58
[   17.036986]  __kasan_kmalloc+0xd4/0xd8
[   17.037032]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.037090]  ksize_uaf+0xb8/0x5f8
[   17.037197]  kunit_try_run_case+0x170/0x3f0
[   17.037269]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.037669]  kthread+0x328/0x630
[   17.037706]  ret_from_fork+0x10/0x20
[   17.037741] 
[   17.038172] Freed by task 197:
[   17.038213]  kasan_save_stack+0x3c/0x68
[   17.038262]  kasan_save_track+0x20/0x40
[   17.038300]  kasan_save_free_info+0x4c/0x78
[   17.038337]  __kasan_slab_free+0x6c/0x98
[   17.038374]  kfree+0x214/0x3c8
[   17.038407]  ksize_uaf+0x11c/0x5f8
[   17.038440]  kunit_try_run_case+0x170/0x3f0
[   17.038477]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.038961]  kthread+0x328/0x630
[   17.039002]  ret_from_fork+0x10/0x20
[   17.039037] 
[   17.039332] The buggy address belongs to the object at fff00000c6f3fa00
[   17.039332]  which belongs to the cache kmalloc-128 of size 128
[   17.039687] The buggy address is located 0 bytes inside of
[   17.039687]  freed 128-byte region [fff00000c6f3fa00, fff00000c6f3fa80)
[   17.039769] 
[   17.039789] The buggy address belongs to the physical page:
[   17.039967] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106f3f
[   17.040279] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.040330] page_type: f5(slab)
[   17.040695] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.041072] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.041156] page dumped because: kasan: bad access detected
[   17.041376] 
[   17.041618] Memory state around the buggy address:
[   17.041869]  fff00000c6f3f900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.042254]  fff00000c6f3f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.042345] >fff00000c6f3fa00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.042557]                    ^
[   17.042591]  fff00000c6f3fa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.042851]  fff00000c6f3fb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.042892] ==================================================================
[   17.022452] ==================================================================
[   17.022583] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8
[   17.022645] Read of size 1 at addr fff00000c6f3fa00 by task kunit_try_catch/197
[   17.022695] 
[   17.022870] CPU: 0 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   17.023224] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.023259] Hardware name: linux,dummy-virt (DT)
[   17.023292] Call trace:
[   17.023393]  show_stack+0x20/0x38 (C)
[   17.023498]  dump_stack_lvl+0x8c/0xd0
[   17.023547]  print_report+0x118/0x608
[   17.023647]  kasan_report+0xdc/0x128
[   17.023697]  __kasan_check_byte+0x54/0x70
[   17.024051]  ksize+0x30/0x88
[   17.024442]  ksize_uaf+0x168/0x5f8
[   17.024665]  kunit_try_run_case+0x170/0x3f0
[   17.024715]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.025070]  kthread+0x328/0x630
[   17.025139]  ret_from_fork+0x10/0x20
[   17.025187] 
[   17.025207] Allocated by task 197:
[   17.025236]  kasan_save_stack+0x3c/0x68
[   17.025762]  kasan_save_track+0x20/0x40
[   17.025901]  kasan_save_alloc_info+0x40/0x58
[   17.026027]  __kasan_kmalloc+0xd4/0xd8
[   17.026063]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.026439]  ksize_uaf+0xb8/0x5f8
[   17.026485]  kunit_try_run_case+0x170/0x3f0
[   17.026622]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.026994]  kthread+0x328/0x630
[   17.027054]  ret_from_fork+0x10/0x20
[   17.027347] 
[   17.027370] Freed by task 197:
[   17.027400]  kasan_save_stack+0x3c/0x68
[   17.027441]  kasan_save_track+0x20/0x40
[   17.027479]  kasan_save_free_info+0x4c/0x78
[   17.027517]  __kasan_slab_free+0x6c/0x98
[   17.027802]  kfree+0x214/0x3c8
[   17.027874]  ksize_uaf+0x11c/0x5f8
[   17.027912]  kunit_try_run_case+0x170/0x3f0
[   17.027954]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.028426]  kthread+0x328/0x630
[   17.028668]  ret_from_fork+0x10/0x20
[   17.028825] 
[   17.028898] The buggy address belongs to the object at fff00000c6f3fa00
[   17.028898]  which belongs to the cache kmalloc-128 of size 128
[   17.029175] The buggy address is located 0 bytes inside of
[   17.029175]  freed 128-byte region [fff00000c6f3fa00, fff00000c6f3fa80)
[   17.029514] 
[   17.029539] The buggy address belongs to the physical page:
[   17.029572] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106f3f
[   17.029929] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.030087] page_type: f5(slab)
[   17.030130] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.030548] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.030601] page dumped because: kasan: bad access detected
[   17.030653] 
[   17.030794] Memory state around the buggy address:
[   17.030832]  fff00000c6f3f900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.030886]  fff00000c6f3f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.030929] >fff00000c6f3fa00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.030969]                    ^
[   17.031488]  fff00000c6f3fa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.031612]  fff00000c6f3fb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.032035] ==================================================================

[   12.847593] ==================================================================
[   12.848197] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5fe/0x6c0
[   12.848482] Read of size 1 at addr ffff8881029f2f00 by task kunit_try_catch/213
[   12.848792] 
[   12.848878] CPU: 1 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.848931] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.848942] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.848961] Call Trace:
[   12.848972]  <TASK>
[   12.848986]  dump_stack_lvl+0x73/0xb0
[   12.849015]  print_report+0xd1/0x650
[   12.849037]  ? __virt_addr_valid+0x1db/0x2d0
[   12.849060]  ? ksize_uaf+0x5fe/0x6c0
[   12.849079]  ? kasan_complete_mode_report_info+0x64/0x200
[   12.849102]  ? ksize_uaf+0x5fe/0x6c0
[   12.849123]  kasan_report+0x141/0x180
[   12.849145]  ? ksize_uaf+0x5fe/0x6c0
[   12.849171]  __asan_report_load1_noabort+0x18/0x20
[   12.849195]  ksize_uaf+0x5fe/0x6c0
[   12.849215]  ? __pfx_ksize_uaf+0x10/0x10
[   12.849239]  ? __pfx_ksize_uaf+0x10/0x10
[   12.849266]  kunit_try_run_case+0x1a5/0x480
[   12.849292]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.849315]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.849339]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.849362]  ? __kthread_parkme+0x82/0x180
[   12.849383]  ? preempt_count_sub+0x50/0x80
[   12.849408]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.849432]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.849456]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.849480]  kthread+0x337/0x6f0
[   12.849518]  ? trace_preempt_on+0x20/0xc0
[   12.849541]  ? __pfx_kthread+0x10/0x10
[   12.849561]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.849581]  ? calculate_sigpending+0x7b/0xa0
[   12.849606]  ? __pfx_kthread+0x10/0x10
[   12.849627]  ret_from_fork+0x116/0x1d0
[   12.849646]  ? __pfx_kthread+0x10/0x10
[   12.849666]  ret_from_fork_asm+0x1a/0x30
[   12.849699]  </TASK>
[   12.849708] 
[   12.856567] Allocated by task 213:
[   12.856698]  kasan_save_stack+0x45/0x70
[   12.857129]  kasan_save_track+0x18/0x40
[   12.857336]  kasan_save_alloc_info+0x3b/0x50
[   12.857554]  __kasan_kmalloc+0xb7/0xc0
[   12.857759]  __kmalloc_cache_noprof+0x189/0x420
[   12.857992]  ksize_uaf+0xaa/0x6c0
[   12.858190]  kunit_try_run_case+0x1a5/0x480
[   12.858352]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.858535]  kthread+0x337/0x6f0
[   12.858654]  ret_from_fork+0x116/0x1d0
[   12.858929]  ret_from_fork_asm+0x1a/0x30
[   12.859195] 
[   12.859342] Freed by task 213:
[   12.859604]  kasan_save_stack+0x45/0x70
[   12.859825]  kasan_save_track+0x18/0x40
[   12.859974]  kasan_save_free_info+0x3f/0x60
[   12.860492]  __kasan_slab_free+0x56/0x70
[   12.860656]  kfree+0x222/0x3f0
[   12.860773]  ksize_uaf+0x12c/0x6c0
[   12.860896]  kunit_try_run_case+0x1a5/0x480
[   12.861201]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.861453]  kthread+0x337/0x6f0
[   12.861622]  ret_from_fork+0x116/0x1d0
[   12.862069]  ret_from_fork_asm+0x1a/0x30
[   12.862279] 
[   12.862373] The buggy address belongs to the object at ffff8881029f2f00
[   12.862373]  which belongs to the cache kmalloc-128 of size 128
[   12.863469] The buggy address is located 0 bytes inside of
[   12.863469]  freed 128-byte region [ffff8881029f2f00, ffff8881029f2f80)
[   12.864903] 
[   12.865375] The buggy address belongs to the physical page:
[   12.865878] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f2
[   12.866144] flags: 0x200000000000000(node=0|zone=2)
[   12.866307] page_type: f5(slab)
[   12.866430] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.866663] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.866888] page dumped because: kasan: bad access detected
[   12.867344] 
[   12.867531] Memory state around the buggy address:
[   12.867983]  ffff8881029f2e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.868666]  ffff8881029f2e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.869601] >ffff8881029f2f00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.870448]                    ^
[   12.870901]  ffff8881029f2f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.871723]  ffff8881029f3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.872548] ==================================================================
[   12.827326] ==================================================================
[   12.827800] BUG: KASAN: slab-use-after-free in ksize_uaf+0x19d/0x6c0
[   12.828125] Read of size 1 at addr ffff8881029f2f00 by task kunit_try_catch/213
[   12.828443] 
[   12.828545] CPU: 1 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.828588] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.828600] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.828618] Call Trace:
[   12.828630]  <TASK>
[   12.828644]  dump_stack_lvl+0x73/0xb0
[   12.828673]  print_report+0xd1/0x650
[   12.828696]  ? __virt_addr_valid+0x1db/0x2d0
[   12.828719]  ? ksize_uaf+0x19d/0x6c0
[   12.828738]  ? kasan_complete_mode_report_info+0x64/0x200
[   12.828912]  ? ksize_uaf+0x19d/0x6c0
[   12.828959]  kasan_report+0x141/0x180
[   12.828983]  ? ksize_uaf+0x19d/0x6c0
[   12.829008]  ? ksize_uaf+0x19d/0x6c0
[   12.829077]  __kasan_check_byte+0x3d/0x50
[   12.829100]  ksize+0x20/0x60
[   12.829121]  ksize_uaf+0x19d/0x6c0
[   12.829141]  ? __pfx_ksize_uaf+0x10/0x10
[   12.829164]  ? __pfx_ksize_uaf+0x10/0x10
[   12.829189]  kunit_try_run_case+0x1a5/0x480
[   12.829213]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.829236]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.829260]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.829283]  ? __kthread_parkme+0x82/0x180
[   12.829303]  ? preempt_count_sub+0x50/0x80
[   12.829327]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.829352]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.829376]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.829401]  kthread+0x337/0x6f0
[   12.829419]  ? trace_preempt_on+0x20/0xc0
[   12.829442]  ? __pfx_kthread+0x10/0x10
[   12.829462]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.829483]  ? calculate_sigpending+0x7b/0xa0
[   12.829507]  ? __pfx_kthread+0x10/0x10
[   12.829528]  ret_from_fork+0x116/0x1d0
[   12.829546]  ? __pfx_kthread+0x10/0x10
[   12.829566]  ret_from_fork_asm+0x1a/0x30
[   12.829598]  </TASK>
[   12.829608] 
[   12.836628] Allocated by task 213:
[   12.836787]  kasan_save_stack+0x45/0x70
[   12.836974]  kasan_save_track+0x18/0x40
[   12.837178]  kasan_save_alloc_info+0x3b/0x50
[   12.837338]  __kasan_kmalloc+0xb7/0xc0
[   12.837469]  __kmalloc_cache_noprof+0x189/0x420
[   12.837625]  ksize_uaf+0xaa/0x6c0
[   12.837818]  kunit_try_run_case+0x1a5/0x480
[   12.838042]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.838358]  kthread+0x337/0x6f0
[   12.838538]  ret_from_fork+0x116/0x1d0
[   12.838723]  ret_from_fork_asm+0x1a/0x30
[   12.839055] 
[   12.839140] Freed by task 213:
[   12.839252]  kasan_save_stack+0x45/0x70
[   12.839387]  kasan_save_track+0x18/0x40
[   12.839522]  kasan_save_free_info+0x3f/0x60
[   12.839728]  __kasan_slab_free+0x56/0x70
[   12.840243]  kfree+0x222/0x3f0
[   12.840423]  ksize_uaf+0x12c/0x6c0
[   12.840580]  kunit_try_run_case+0x1a5/0x480
[   12.840745]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.841029]  kthread+0x337/0x6f0
[   12.841187]  ret_from_fork+0x116/0x1d0
[   12.841353]  ret_from_fork_asm+0x1a/0x30
[   12.841506] 
[   12.841602] The buggy address belongs to the object at ffff8881029f2f00
[   12.841602]  which belongs to the cache kmalloc-128 of size 128
[   12.842086] The buggy address is located 0 bytes inside of
[   12.842086]  freed 128-byte region [ffff8881029f2f00, ffff8881029f2f80)
[   12.842430] 
[   12.842504] The buggy address belongs to the physical page:
[   12.842754] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f2
[   12.843127] flags: 0x200000000000000(node=0|zone=2)
[   12.843358] page_type: f5(slab)
[   12.843691] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.844163] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.844397] page dumped because: kasan: bad access detected
[   12.844566] 
[   12.844634] Memory state around the buggy address:
[   12.845131]  ffff8881029f2e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.845459]  ffff8881029f2e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.845779] >ffff8881029f2f00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.846112]                    ^
[   12.846262]  ffff8881029f2f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.846516]  ffff8881029f3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.846730] ==================================================================
[   12.873442] ==================================================================
[   12.874470] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5e4/0x6c0
[   12.874689] Read of size 1 at addr ffff8881029f2f78 by task kunit_try_catch/213
[   12.875546] 
[   12.875844] CPU: 1 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.875887] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.875899] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.876017] Call Trace:
[   12.876034]  <TASK>
[   12.876048]  dump_stack_lvl+0x73/0xb0
[   12.876078]  print_report+0xd1/0x650
[   12.876099]  ? __virt_addr_valid+0x1db/0x2d0
[   12.876121]  ? ksize_uaf+0x5e4/0x6c0
[   12.876141]  ? kasan_complete_mode_report_info+0x64/0x200
[   12.876164]  ? ksize_uaf+0x5e4/0x6c0
[   12.876184]  kasan_report+0x141/0x180
[   12.876205]  ? ksize_uaf+0x5e4/0x6c0
[   12.876230]  __asan_report_load1_noabort+0x18/0x20
[   12.876254]  ksize_uaf+0x5e4/0x6c0
[   12.876274]  ? __pfx_ksize_uaf+0x10/0x10
[   12.876297]  ? __pfx_ksize_uaf+0x10/0x10
[   12.876322]  kunit_try_run_case+0x1a5/0x480
[   12.876345]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.876367]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.876390]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.876413]  ? __kthread_parkme+0x82/0x180
[   12.876433]  ? preempt_count_sub+0x50/0x80
[   12.876456]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.876479]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.876504]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.876528]  kthread+0x337/0x6f0
[   12.876547]  ? trace_preempt_on+0x20/0xc0
[   12.876569]  ? __pfx_kthread+0x10/0x10
[   12.876589]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.876610]  ? calculate_sigpending+0x7b/0xa0
[   12.876633]  ? __pfx_kthread+0x10/0x10
[   12.876654]  ret_from_fork+0x116/0x1d0
[   12.876673]  ? __pfx_kthread+0x10/0x10
[   12.876692]  ret_from_fork_asm+0x1a/0x30
[   12.876724]  </TASK>
[   12.876733] 
[   12.887445] Allocated by task 213:
[   12.887620]  kasan_save_stack+0x45/0x70
[   12.888114]  kasan_save_track+0x18/0x40
[   12.888357]  kasan_save_alloc_info+0x3b/0x50
[   12.888646]  __kasan_kmalloc+0xb7/0xc0
[   12.888976]  __kmalloc_cache_noprof+0x189/0x420
[   12.889284]  ksize_uaf+0xaa/0x6c0
[   12.889453]  kunit_try_run_case+0x1a5/0x480
[   12.889649]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.890146]  kthread+0x337/0x6f0
[   12.890558]  ret_from_fork+0x116/0x1d0
[   12.890874]  ret_from_fork_asm+0x1a/0x30
[   12.891402] 
[   12.891503] Freed by task 213:
[   12.891653]  kasan_save_stack+0x45/0x70
[   12.892057]  kasan_save_track+0x18/0x40
[   12.892505]  kasan_save_free_info+0x3f/0x60
[   12.892876]  __kasan_slab_free+0x56/0x70
[   12.893461]  kfree+0x222/0x3f0
[   12.893687]  ksize_uaf+0x12c/0x6c0
[   12.893994]  kunit_try_run_case+0x1a5/0x480
[   12.894348]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.894584]  kthread+0x337/0x6f0
[   12.894744]  ret_from_fork+0x116/0x1d0
[   12.895233]  ret_from_fork_asm+0x1a/0x30
[   12.895547] 
[   12.895773] The buggy address belongs to the object at ffff8881029f2f00
[   12.895773]  which belongs to the cache kmalloc-128 of size 128
[   12.896412] The buggy address is located 120 bytes inside of
[   12.896412]  freed 128-byte region [ffff8881029f2f00, ffff8881029f2f80)
[   12.897279] 
[   12.897379] The buggy address belongs to the physical page:
[   12.897836] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f2
[   12.898398] flags: 0x200000000000000(node=0|zone=2)
[   12.898628] page_type: f5(slab)
[   12.899033] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.899542] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.900341] page dumped because: kasan: bad access detected
[   12.900566] 
[   12.900650] Memory state around the buggy address:
[   12.901090]  ffff8881029f2e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.901726]  ffff8881029f2e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.902278] >ffff8881029f2f00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.902725]                                                                 ^
[   12.903192]  ffff8881029f2f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.903628]  ffff8881029f3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.904168] ==================================================================