Hay
Date
July 12, 2025, 11:09 a.m.

Environment
qemu-arm64
qemu-x86_64

[   19.818611] ==================================================================
[   19.818811] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8
[   19.818980] Read of size 1 at addr fff00000c599f278 by task kunit_try_catch/197
[   19.819143] 
[   19.819224] CPU: 0 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.819435] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.819522] Hardware name: linux,dummy-virt (DT)
[   19.819624] Call trace:
[   19.819688]  show_stack+0x20/0x38 (C)
[   19.819850]  dump_stack_lvl+0x8c/0xd0
[   19.819992]  print_report+0x118/0x608
[   19.820096]  kasan_report+0xdc/0x128
[   19.820198]  __asan_report_load1_noabort+0x20/0x30
[   19.820312]  ksize_uaf+0x544/0x5f8
[   19.820414]  kunit_try_run_case+0x170/0x3f0
[   19.820522]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.820640]  kthread+0x328/0x630
[   19.820732]  ret_from_fork+0x10/0x20
[   19.820843] 
[   19.820879] Allocated by task 197:
[   19.820928]  kasan_save_stack+0x3c/0x68
[   19.821017]  kasan_save_track+0x20/0x40
[   19.821097]  kasan_save_alloc_info+0x40/0x58
[   19.821206]  __kasan_kmalloc+0xd4/0xd8
[   19.821288]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.821371]  ksize_uaf+0xb8/0x5f8
[   19.821444]  kunit_try_run_case+0x170/0x3f0
[   19.821525]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.821619]  kthread+0x328/0x630
[   19.821688]  ret_from_fork+0x10/0x20
[   19.821764] 
[   19.821810] Freed by task 197:
[   19.821941]  kasan_save_stack+0x3c/0x68
[   19.822061]  kasan_save_track+0x20/0x40
[   19.822145]  kasan_save_free_info+0x4c/0x78
[   19.822228]  __kasan_slab_free+0x6c/0x98
[   19.822302]  kfree+0x214/0x3c8
[   19.822401]  ksize_uaf+0x11c/0x5f8
[   19.822494]  kunit_try_run_case+0x170/0x3f0
[   19.822594]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.822723]  kthread+0x328/0x630
[   19.822803]  ret_from_fork+0x10/0x20
[   19.822904] 
[   19.822952] The buggy address belongs to the object at fff00000c599f200
[   19.822952]  which belongs to the cache kmalloc-128 of size 128
[   19.823116] The buggy address is located 120 bytes inside of
[   19.823116]  freed 128-byte region [fff00000c599f200, fff00000c599f280)
[   19.823296] 
[   19.823359] The buggy address belongs to the physical page:
[   19.823446] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10599f
[   19.823563] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.823663] page_type: f5(slab)
[   19.823766] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.823889] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.823967] page dumped because: kasan: bad access detected
[   19.824026] 
[   19.824059] Memory state around the buggy address:
[   19.824160]  fff00000c599f100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.824258]  fff00000c599f180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.824393] >fff00000c599f200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.824496]                                                                 ^
[   19.824626]  fff00000c599f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.824719]  fff00000c599f300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.824845] ==================================================================
[   19.795845] ==================================================================
[   19.795986] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8
[   19.796393] Read of size 1 at addr fff00000c599f200 by task kunit_try_catch/197
[   19.796520] 
[   19.796604] CPU: 0 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.796810] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.796889] Hardware name: linux,dummy-virt (DT)
[   19.796961] Call trace:
[   19.797016]  show_stack+0x20/0x38 (C)
[   19.797143]  dump_stack_lvl+0x8c/0xd0
[   19.797255]  print_report+0x118/0x608
[   19.797368]  kasan_report+0xdc/0x128
[   19.797478]  __kasan_check_byte+0x54/0x70
[   19.797592]  ksize+0x30/0x88
[   19.797691]  ksize_uaf+0x168/0x5f8
[   19.797789]  kunit_try_run_case+0x170/0x3f0
[   19.797894]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.798002]  kthread+0x328/0x630
[   19.798101]  ret_from_fork+0x10/0x20
[   19.798208] 
[   19.798248] Allocated by task 197:
[   19.798313]  kasan_save_stack+0x3c/0x68
[   19.798404]  kasan_save_track+0x20/0x40
[   19.798487]  kasan_save_alloc_info+0x40/0x58
[   19.798587]  __kasan_kmalloc+0xd4/0xd8
[   19.799278]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.799478]  ksize_uaf+0xb8/0x5f8
[   19.799568]  kunit_try_run_case+0x170/0x3f0
[   19.799765]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.800118]  kthread+0x328/0x630
[   19.800295]  ret_from_fork+0x10/0x20
[   19.800432] 
[   19.800493] Freed by task 197:
[   19.800683]  kasan_save_stack+0x3c/0x68
[   19.800936]  kasan_save_track+0x20/0x40
[   19.801173]  kasan_save_free_info+0x4c/0x78
[   19.801358]  __kasan_slab_free+0x6c/0x98
[   19.801707]  kfree+0x214/0x3c8
[   19.801798]  ksize_uaf+0x11c/0x5f8
[   19.801902]  kunit_try_run_case+0x170/0x3f0
[   19.802064]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.802215]  kthread+0x328/0x630
[   19.802421]  ret_from_fork+0x10/0x20
[   19.802671] 
[   19.802743] The buggy address belongs to the object at fff00000c599f200
[   19.802743]  which belongs to the cache kmalloc-128 of size 128
[   19.803150] The buggy address is located 0 bytes inside of
[   19.803150]  freed 128-byte region [fff00000c599f200, fff00000c599f280)
[   19.803386] 
[   19.803696] The buggy address belongs to the physical page:
[   19.803765] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10599f
[   19.803901] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.804175] page_type: f5(slab)
[   19.804349] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.804500] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.804595] page dumped because: kasan: bad access detected
[   19.804674] 
[   19.804716] Memory state around the buggy address:
[   19.804793]  fff00000c599f100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.804912]  fff00000c599f180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.805013] >fff00000c599f200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.805106]                    ^
[   19.805182]  fff00000c599f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.805285]  fff00000c599f300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.805380] ==================================================================
[   19.808209] ==================================================================
[   19.808271] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8
[   19.808328] Read of size 1 at addr fff00000c599f200 by task kunit_try_catch/197
[   19.808380] 
[   19.808411] CPU: 0 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.808497] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.808524] Hardware name: linux,dummy-virt (DT)
[   19.808555] Call trace:
[   19.808577]  show_stack+0x20/0x38 (C)
[   19.808628]  dump_stack_lvl+0x8c/0xd0
[   19.808675]  print_report+0x118/0x608
[   19.808731]  kasan_report+0xdc/0x128
[   19.808782]  __asan_report_load1_noabort+0x20/0x30
[   19.808879]  ksize_uaf+0x598/0x5f8
[   19.808975]  kunit_try_run_case+0x170/0x3f0
[   19.809193]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.809474]  kthread+0x328/0x630
[   19.809637]  ret_from_fork+0x10/0x20
[   19.809868] 
[   19.809909] Allocated by task 197:
[   19.809974]  kasan_save_stack+0x3c/0x68
[   19.810048]  kasan_save_track+0x20/0x40
[   19.810120]  kasan_save_alloc_info+0x40/0x58
[   19.810195]  __kasan_kmalloc+0xd4/0xd8
[   19.810273]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.810354]  ksize_uaf+0xb8/0x5f8
[   19.810426]  kunit_try_run_case+0x170/0x3f0
[   19.810509]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.810626]  kthread+0x328/0x630
[   19.810700]  ret_from_fork+0x10/0x20
[   19.811213] 
[   19.811278] Freed by task 197:
[   19.811434]  kasan_save_stack+0x3c/0x68
[   19.811699]  kasan_save_track+0x20/0x40
[   19.811816]  kasan_save_free_info+0x4c/0x78
[   19.812056]  __kasan_slab_free+0x6c/0x98
[   19.812196]  kfree+0x214/0x3c8
[   19.812392]  ksize_uaf+0x11c/0x5f8
[   19.812483]  kunit_try_run_case+0x170/0x3f0
[   19.812680]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.813080]  kthread+0x328/0x630
[   19.813258]  ret_from_fork+0x10/0x20
[   19.813505] 
[   19.813546] The buggy address belongs to the object at fff00000c599f200
[   19.813546]  which belongs to the cache kmalloc-128 of size 128
[   19.813733] The buggy address is located 0 bytes inside of
[   19.813733]  freed 128-byte region [fff00000c599f200, fff00000c599f280)
[   19.813873] 
[   19.813913] The buggy address belongs to the physical page:
[   19.813976] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10599f
[   19.814561] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.814697] page_type: f5(slab)
[   19.814938] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.815306] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.815573] page dumped because: kasan: bad access detected
[   19.815787] 
[   19.815856] Memory state around the buggy address:
[   19.815982]  fff00000c599f100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.816222]  fff00000c599f180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.816361] >fff00000c599f200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.816456]                    ^
[   19.816524]  fff00000c599f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.817015]  fff00000c599f300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.817283] ==================================================================

[   13.138286] ==================================================================
[   13.139071] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5e4/0x6c0
[   13.139291] Read of size 1 at addr ffff888102655578 by task kunit_try_catch/214
[   13.139513] 
[   13.139601] CPU: 1 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   13.139642] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.139653] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.139672] Call Trace:
[   13.139685]  <TASK>
[   13.139700]  dump_stack_lvl+0x73/0xb0
[   13.139728]  print_report+0xd1/0x650
[   13.139764]  ? __virt_addr_valid+0x1db/0x2d0
[   13.139787]  ? ksize_uaf+0x5e4/0x6c0
[   13.139807]  ? kasan_complete_mode_report_info+0x64/0x200
[   13.139830]  ? ksize_uaf+0x5e4/0x6c0
[   13.139851]  kasan_report+0x141/0x180
[   13.139872]  ? ksize_uaf+0x5e4/0x6c0
[   13.139897]  __asan_report_load1_noabort+0x18/0x20
[   13.139921]  ksize_uaf+0x5e4/0x6c0
[   13.139941]  ? __pfx_ksize_uaf+0x10/0x10
[   13.139962]  ? __schedule+0x10cc/0x2b60
[   13.140200]  ? __pfx_read_tsc+0x10/0x10
[   13.140225]  ? ktime_get_ts64+0x86/0x230
[   13.140250]  kunit_try_run_case+0x1a5/0x480
[   13.140273]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.140296]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.140320]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.140344]  ? __kthread_parkme+0x82/0x180
[   13.140364]  ? preempt_count_sub+0x50/0x80
[   13.140387]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.140411]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.140435]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.140460]  kthread+0x337/0x6f0
[   13.140479]  ? trace_preempt_on+0x20/0xc0
[   13.140502]  ? __pfx_kthread+0x10/0x10
[   13.140522]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.140543]  ? calculate_sigpending+0x7b/0xa0
[   13.140567]  ? __pfx_kthread+0x10/0x10
[   13.140588]  ret_from_fork+0x116/0x1d0
[   13.140605]  ? __pfx_kthread+0x10/0x10
[   13.140626]  ret_from_fork_asm+0x1a/0x30
[   13.140765]  </TASK>
[   13.140777] 
[   13.150628] Allocated by task 214:
[   13.151252]  kasan_save_stack+0x45/0x70
[   13.151461]  kasan_save_track+0x18/0x40
[   13.151638]  kasan_save_alloc_info+0x3b/0x50
[   13.152085]  __kasan_kmalloc+0xb7/0xc0
[   13.152270]  __kmalloc_cache_noprof+0x189/0x420
[   13.152478]  ksize_uaf+0xaa/0x6c0
[   13.152638]  kunit_try_run_case+0x1a5/0x480
[   13.153160]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.153485]  kthread+0x337/0x6f0
[   13.153634]  ret_from_fork+0x116/0x1d0
[   13.154090]  ret_from_fork_asm+0x1a/0x30
[   13.154236] 
[   13.154334] Freed by task 214:
[   13.154495]  kasan_save_stack+0x45/0x70
[   13.154661]  kasan_save_track+0x18/0x40
[   13.155336]  kasan_save_free_info+0x3f/0x60
[   13.155547]  __kasan_slab_free+0x56/0x70
[   13.155933]  kfree+0x222/0x3f0
[   13.156107]  ksize_uaf+0x12c/0x6c0
[   13.156255]  kunit_try_run_case+0x1a5/0x480
[   13.156469]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.156972]  kthread+0x337/0x6f0
[   13.157233]  ret_from_fork+0x116/0x1d0
[   13.157419]  ret_from_fork_asm+0x1a/0x30
[   13.157859] 
[   13.157946] The buggy address belongs to the object at ffff888102655500
[   13.157946]  which belongs to the cache kmalloc-128 of size 128
[   13.158578] The buggy address is located 120 bytes inside of
[   13.158578]  freed 128-byte region [ffff888102655500, ffff888102655580)
[   13.159296] 
[   13.159394] The buggy address belongs to the physical page:
[   13.159636] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102655
[   13.159978] flags: 0x200000000000000(node=0|zone=2)
[   13.160208] page_type: f5(slab)
[   13.160357] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   13.160650] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.161600] page dumped because: kasan: bad access detected
[   13.162075] 
[   13.162153] Memory state around the buggy address:
[   13.162468]  ffff888102655400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.163019]  ffff888102655480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.163420] >ffff888102655500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.163895]                                                                 ^
[   13.164183]  ffff888102655580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.164473]  ffff888102655600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.165148] ==================================================================
[   13.107001] ==================================================================
[   13.107556] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5fe/0x6c0
[   13.107965] Read of size 1 at addr ffff888102655500 by task kunit_try_catch/214
[   13.108292] 
[   13.108383] CPU: 1 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   13.108427] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.108438] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.108459] Call Trace:
[   13.108472]  <TASK>
[   13.108489]  dump_stack_lvl+0x73/0xb0
[   13.108519]  print_report+0xd1/0x650
[   13.108542]  ? __virt_addr_valid+0x1db/0x2d0
[   13.108566]  ? ksize_uaf+0x5fe/0x6c0
[   13.108585]  ? kasan_complete_mode_report_info+0x64/0x200
[   13.108608]  ? ksize_uaf+0x5fe/0x6c0
[   13.108628]  kasan_report+0x141/0x180
[   13.108649]  ? ksize_uaf+0x5fe/0x6c0
[   13.109092]  __asan_report_load1_noabort+0x18/0x20
[   13.109120]  ksize_uaf+0x5fe/0x6c0
[   13.109140]  ? __pfx_ksize_uaf+0x10/0x10
[   13.109162]  ? __schedule+0x10cc/0x2b60
[   13.109184]  ? __pfx_read_tsc+0x10/0x10
[   13.109205]  ? ktime_get_ts64+0x86/0x230
[   13.109230]  kunit_try_run_case+0x1a5/0x480
[   13.109255]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.109277]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.109301]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.109325]  ? __kthread_parkme+0x82/0x180
[   13.109345]  ? preempt_count_sub+0x50/0x80
[   13.109370]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.109394]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.109418]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.109443]  kthread+0x337/0x6f0
[   13.109461]  ? trace_preempt_on+0x20/0xc0
[   13.109485]  ? __pfx_kthread+0x10/0x10
[   13.109505]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.109526]  ? calculate_sigpending+0x7b/0xa0
[   13.109550]  ? __pfx_kthread+0x10/0x10
[   13.109571]  ret_from_fork+0x116/0x1d0
[   13.109589]  ? __pfx_kthread+0x10/0x10
[   13.109609]  ret_from_fork_asm+0x1a/0x30
[   13.109640]  </TASK>
[   13.109650] 
[   13.119109] Allocated by task 214:
[   13.119270]  kasan_save_stack+0x45/0x70
[   13.119470]  kasan_save_track+0x18/0x40
[   13.119901]  kasan_save_alloc_info+0x3b/0x50
[   13.120116]  __kasan_kmalloc+0xb7/0xc0
[   13.120275]  __kmalloc_cache_noprof+0x189/0x420
[   13.120625]  ksize_uaf+0xaa/0x6c0
[   13.121078]  kunit_try_run_case+0x1a5/0x480
[   13.121388]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.121623]  kthread+0x337/0x6f0
[   13.121966]  ret_from_fork+0x116/0x1d0
[   13.122270]  ret_from_fork_asm+0x1a/0x30
[   13.122473] 
[   13.122557] Freed by task 214:
[   13.123011]  kasan_save_stack+0x45/0x70
[   13.123160]  kasan_save_track+0x18/0x40
[   13.123296]  kasan_save_free_info+0x3f/0x60
[   13.123452]  __kasan_slab_free+0x56/0x70
[   13.123900]  kfree+0x222/0x3f0
[   13.124027]  ksize_uaf+0x12c/0x6c0
[   13.124171]  kunit_try_run_case+0x1a5/0x480
[   13.124823]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.125457]  kthread+0x337/0x6f0
[   13.125883]  ret_from_fork+0x116/0x1d0
[   13.126384]  ret_from_fork_asm+0x1a/0x30
[   13.126917] 
[   13.127133] The buggy address belongs to the object at ffff888102655500
[   13.127133]  which belongs to the cache kmalloc-128 of size 128
[   13.127971] The buggy address is located 0 bytes inside of
[   13.127971]  freed 128-byte region [ffff888102655500, ffff888102655580)
[   13.129226] 
[   13.129307] The buggy address belongs to the physical page:
[   13.129482] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102655
[   13.129821] flags: 0x200000000000000(node=0|zone=2)
[   13.130549] page_type: f5(slab)
[   13.130896] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   13.131742] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.132512] page dumped because: kasan: bad access detected
[   13.133298] 
[   13.133393] Memory state around the buggy address:
[   13.133551]  ffff888102655400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.134111]  ffff888102655480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.135046] >ffff888102655500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.135795]                    ^
[   13.136284]  ffff888102655580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.136545]  ffff888102655600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.137327] ==================================================================
[   13.079008] ==================================================================
[   13.079862] BUG: KASAN: slab-use-after-free in ksize_uaf+0x19d/0x6c0
[   13.080167] Read of size 1 at addr ffff888102655500 by task kunit_try_catch/214
[   13.080558] 
[   13.080655] CPU: 1 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   13.081168] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.081182] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.081203] Call Trace:
[   13.081215]  <TASK>
[   13.081232]  dump_stack_lvl+0x73/0xb0
[   13.081265]  print_report+0xd1/0x650
[   13.081288]  ? __virt_addr_valid+0x1db/0x2d0
[   13.081312]  ? ksize_uaf+0x19d/0x6c0
[   13.081332]  ? kasan_complete_mode_report_info+0x64/0x200
[   13.081354]  ? ksize_uaf+0x19d/0x6c0
[   13.081375]  kasan_report+0x141/0x180
[   13.081396]  ? ksize_uaf+0x19d/0x6c0
[   13.081419]  ? ksize_uaf+0x19d/0x6c0
[   13.081439]  __kasan_check_byte+0x3d/0x50
[   13.081461]  ksize+0x20/0x60
[   13.081481]  ksize_uaf+0x19d/0x6c0
[   13.081501]  ? __pfx_ksize_uaf+0x10/0x10
[   13.081522]  ? __schedule+0x10cc/0x2b60
[   13.081545]  ? __pfx_read_tsc+0x10/0x10
[   13.081565]  ? ktime_get_ts64+0x86/0x230
[   13.081589]  kunit_try_run_case+0x1a5/0x480
[   13.081614]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.081637]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.081692]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.081715]  ? __kthread_parkme+0x82/0x180
[   13.081736]  ? preempt_count_sub+0x50/0x80
[   13.081772]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.081796]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.081820]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.081845]  kthread+0x337/0x6f0
[   13.081864]  ? trace_preempt_on+0x20/0xc0
[   13.081887]  ? __pfx_kthread+0x10/0x10
[   13.081907]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.081929]  ? calculate_sigpending+0x7b/0xa0
[   13.081953]  ? __pfx_kthread+0x10/0x10
[   13.081974]  ret_from_fork+0x116/0x1d0
[   13.081992]  ? __pfx_kthread+0x10/0x10
[   13.082012]  ret_from_fork_asm+0x1a/0x30
[   13.082043]  </TASK>
[   13.082054] 
[   13.092353] Allocated by task 214:
[   13.092542]  kasan_save_stack+0x45/0x70
[   13.092913]  kasan_save_track+0x18/0x40
[   13.093076]  kasan_save_alloc_info+0x3b/0x50
[   13.093271]  __kasan_kmalloc+0xb7/0xc0
[   13.093451]  __kmalloc_cache_noprof+0x189/0x420
[   13.093652]  ksize_uaf+0xaa/0x6c0
[   13.094282]  kunit_try_run_case+0x1a5/0x480
[   13.094484]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.094763]  kthread+0x337/0x6f0
[   13.095174]  ret_from_fork+0x116/0x1d0
[   13.095336]  ret_from_fork_asm+0x1a/0x30
[   13.095542] 
[   13.095640] Freed by task 214:
[   13.096046]  kasan_save_stack+0x45/0x70
[   13.096313]  kasan_save_track+0x18/0x40
[   13.096833]  kasan_save_free_info+0x3f/0x60
[   13.097143]  __kasan_slab_free+0x56/0x70
[   13.097333]  kfree+0x222/0x3f0
[   13.097486]  ksize_uaf+0x12c/0x6c0
[   13.097899]  kunit_try_run_case+0x1a5/0x480
[   13.098117]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.098332]  kthread+0x337/0x6f0
[   13.098497]  ret_from_fork+0x116/0x1d0
[   13.098660]  ret_from_fork_asm+0x1a/0x30
[   13.099136] 
[   13.099219] The buggy address belongs to the object at ffff888102655500
[   13.099219]  which belongs to the cache kmalloc-128 of size 128
[   13.100050] The buggy address is located 0 bytes inside of
[   13.100050]  freed 128-byte region [ffff888102655500, ffff888102655580)
[   13.100514] 
[   13.100621] The buggy address belongs to the physical page:
[   13.100942] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102655
[   13.101312] flags: 0x200000000000000(node=0|zone=2)
[   13.101534] page_type: f5(slab)
[   13.101689] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   13.102433] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.102866] page dumped because: kasan: bad access detected
[   13.103280] 
[   13.103357] Memory state around the buggy address:
[   13.103583]  ffff888102655400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.104327]  ffff888102655480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.104944] >ffff888102655500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.105249]                    ^
[   13.105401]  ffff888102655580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.105885]  ffff888102655600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.106167] ==================================================================