Hay
Date
July 18, 2025, 11:11 p.m.

Environment
qemu-arm64
qemu-x86_64

[   15.662409] ==================================================================
[   15.662465] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8
[   15.662514] Read of size 1 at addr fff00000c3f56278 by task kunit_try_catch/196
[   15.662567] 
[   15.662600] CPU: 1 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   15.663019] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.663137] Hardware name: linux,dummy-virt (DT)
[   15.663492] Call trace:
[   15.663559]  show_stack+0x20/0x38 (C)
[   15.663682]  dump_stack_lvl+0x8c/0xd0
[   15.663738]  print_report+0x118/0x5d0
[   15.663790]  kasan_report+0xdc/0x128
[   15.663839]  __asan_report_load1_noabort+0x20/0x30
[   15.664358]  ksize_uaf+0x544/0x5f8
[   15.664555]  kunit_try_run_case+0x170/0x3f0
[   15.664831]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.665026]  kthread+0x328/0x630
[   15.665082]  ret_from_fork+0x10/0x20
[   15.665132] 
[   15.665152] Allocated by task 196:
[   15.665353]  kasan_save_stack+0x3c/0x68
[   15.665601]  kasan_save_track+0x20/0x40
[   15.666021]  kasan_save_alloc_info+0x40/0x58
[   15.666166]  __kasan_kmalloc+0xd4/0xd8
[   15.666349]  __kmalloc_cache_noprof+0x16c/0x3c0
[   15.666721]  ksize_uaf+0xb8/0x5f8
[   15.666836]  kunit_try_run_case+0x170/0x3f0
[   15.666882]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.667252]  kthread+0x328/0x630
[   15.667321]  ret_from_fork+0x10/0x20
[   15.667370] 
[   15.667392] Freed by task 196:
[   15.667471]  kasan_save_stack+0x3c/0x68
[   15.667537]  kasan_save_track+0x20/0x40
[   15.667582]  kasan_save_free_info+0x4c/0x78
[   15.667627]  __kasan_slab_free+0x6c/0x98
[   15.667667]  kfree+0x214/0x3c8
[   15.667715]  ksize_uaf+0x11c/0x5f8
[   15.667752]  kunit_try_run_case+0x170/0x3f0
[   15.667791]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.667846]  kthread+0x328/0x630
[   15.667880]  ret_from_fork+0x10/0x20
[   15.667927] 
[   15.667953] The buggy address belongs to the object at fff00000c3f56200
[   15.667953]  which belongs to the cache kmalloc-128 of size 128
[   15.668015] The buggy address is located 120 bytes inside of
[   15.668015]  freed 128-byte region [fff00000c3f56200, fff00000c3f56280)
[   15.668078] 
[   15.668098] The buggy address belongs to the physical page:
[   15.668149] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f56
[   15.668210] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   15.668258] page_type: f5(slab)
[   15.668297] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   15.668642] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.668781] page dumped because: kasan: bad access detected
[   15.668854] 
[   15.669478] Memory state around the buggy address:
[   15.669592]  fff00000c3f56100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.669641]  fff00000c3f56180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.669687] >fff00000c3f56200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.670085]                                                                 ^
[   15.670422]  fff00000c3f56280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.670581]  fff00000c3f56300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.670650] ==================================================================
[   15.651121] ==================================================================
[   15.651183] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8
[   15.651240] Read of size 1 at addr fff00000c3f56200 by task kunit_try_catch/196
[   15.651486] 
[   15.651530] CPU: 1 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   15.651831] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.651945] Hardware name: linux,dummy-virt (DT)
[   15.652104] Call trace:
[   15.652172]  show_stack+0x20/0x38 (C)
[   15.652324]  dump_stack_lvl+0x8c/0xd0
[   15.652389]  print_report+0x118/0x5d0
[   15.652604]  kasan_report+0xdc/0x128
[   15.652837]  __asan_report_load1_noabort+0x20/0x30
[   15.652908]  ksize_uaf+0x598/0x5f8
[   15.652962]  kunit_try_run_case+0x170/0x3f0
[   15.653085]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.653193]  kthread+0x328/0x630
[   15.653246]  ret_from_fork+0x10/0x20
[   15.653516] 
[   15.653598] Allocated by task 196:
[   15.653737]  kasan_save_stack+0x3c/0x68
[   15.653932]  kasan_save_track+0x20/0x40
[   15.654022]  kasan_save_alloc_info+0x40/0x58
[   15.654183]  __kasan_kmalloc+0xd4/0xd8
[   15.654238]  __kmalloc_cache_noprof+0x16c/0x3c0
[   15.654286]  ksize_uaf+0xb8/0x5f8
[   15.654321]  kunit_try_run_case+0x170/0x3f0
[   15.654519]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.654799]  kthread+0x328/0x630
[   15.655039]  ret_from_fork+0x10/0x20
[   15.655173] 
[   15.655197] Freed by task 196:
[   15.655262]  kasan_save_stack+0x3c/0x68
[   15.655541]  kasan_save_track+0x20/0x40
[   15.655662]  kasan_save_free_info+0x4c/0x78
[   15.655914]  __kasan_slab_free+0x6c/0x98
[   15.656091]  kfree+0x214/0x3c8
[   15.656153]  ksize_uaf+0x11c/0x5f8
[   15.656231]  kunit_try_run_case+0x170/0x3f0
[   15.656494]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.656621]  kthread+0x328/0x630
[   15.656800]  ret_from_fork+0x10/0x20
[   15.656982] 
[   15.657054] The buggy address belongs to the object at fff00000c3f56200
[   15.657054]  which belongs to the cache kmalloc-128 of size 128
[   15.657278] The buggy address is located 0 bytes inside of
[   15.657278]  freed 128-byte region [fff00000c3f56200, fff00000c3f56280)
[   15.657522] 
[   15.657711] The buggy address belongs to the physical page:
[   15.657865] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f56
[   15.658113] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   15.658348] page_type: f5(slab)
[   15.658414] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   15.658918] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.659228] page dumped because: kasan: bad access detected
[   15.659299] 
[   15.659383] Memory state around the buggy address:
[   15.659438]  fff00000c3f56100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.659531]  fff00000c3f56180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.660191] >fff00000c3f56200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.660299]                    ^
[   15.660593]  fff00000c3f56280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.660974]  fff00000c3f56300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.661200] ==================================================================
[   15.642848] ==================================================================
[   15.642969] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8
[   15.643031] Read of size 1 at addr fff00000c3f56200 by task kunit_try_catch/196
[   15.643083] 
[   15.643121] CPU: 1 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   15.643208] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.643238] Hardware name: linux,dummy-virt (DT)
[   15.643270] Call trace:
[   15.643312]  show_stack+0x20/0x38 (C)
[   15.643378]  dump_stack_lvl+0x8c/0xd0
[   15.643428]  print_report+0x118/0x5d0
[   15.643477]  kasan_report+0xdc/0x128
[   15.643536]  __kasan_check_byte+0x54/0x70
[   15.643593]  ksize+0x30/0x88
[   15.643638]  ksize_uaf+0x168/0x5f8
[   15.643694]  kunit_try_run_case+0x170/0x3f0
[   15.643744]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.643806]  kthread+0x328/0x630
[   15.643850]  ret_from_fork+0x10/0x20
[   15.643899] 
[   15.643919] Allocated by task 196:
[   15.643956]  kasan_save_stack+0x3c/0x68
[   15.644000]  kasan_save_track+0x20/0x40
[   15.644041]  kasan_save_alloc_info+0x40/0x58
[   15.644085]  __kasan_kmalloc+0xd4/0xd8
[   15.644129]  __kmalloc_cache_noprof+0x16c/0x3c0
[   15.644180]  ksize_uaf+0xb8/0x5f8
[   15.644218]  kunit_try_run_case+0x170/0x3f0
[   15.644256]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.644312]  kthread+0x328/0x630
[   15.645098]  ret_from_fork+0x10/0x20
[   15.645222] 
[   15.645252] Freed by task 196:
[   15.645315]  kasan_save_stack+0x3c/0x68
[   15.645536]  kasan_save_track+0x20/0x40
[   15.645670]  kasan_save_free_info+0x4c/0x78
[   15.645716]  __kasan_slab_free+0x6c/0x98
[   15.645756]  kfree+0x214/0x3c8
[   15.645792]  ksize_uaf+0x11c/0x5f8
[   15.646236]  kunit_try_run_case+0x170/0x3f0
[   15.646382]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.646499]  kthread+0x328/0x630
[   15.646594]  ret_from_fork+0x10/0x20
[   15.646684] 
[   15.646805] The buggy address belongs to the object at fff00000c3f56200
[   15.646805]  which belongs to the cache kmalloc-128 of size 128
[   15.646885] The buggy address is located 0 bytes inside of
[   15.646885]  freed 128-byte region [fff00000c3f56200, fff00000c3f56280)
[   15.647285] 
[   15.647393] The buggy address belongs to the physical page:
[   15.647531] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f56
[   15.647690] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   15.647811] page_type: f5(slab)
[   15.647852] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   15.648288] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.648392] page dumped because: kasan: bad access detected
[   15.648522] 
[   15.648603] Memory state around the buggy address:
[   15.648746]  fff00000c3f56100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.648821]  fff00000c3f56180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.648887] >fff00000c3f56200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.649180]                    ^
[   15.649393]  fff00000c3f56280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.649582]  fff00000c3f56300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.649672] ==================================================================

[   12.704428] ==================================================================
[   12.704749] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5fe/0x6c0
[   12.705299] Read of size 1 at addr ffff8881029ce400 by task kunit_try_catch/215
[   12.705665] 
[   12.705775] CPU: 0 UID: 0 PID: 215 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.705815] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.705825] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.705844] Call Trace:
[   12.705855]  <TASK>
[   12.705867]  dump_stack_lvl+0x73/0xb0
[   12.705895]  print_report+0xd1/0x610
[   12.705916]  ? __virt_addr_valid+0x1db/0x2d0
[   12.705937]  ? ksize_uaf+0x5fe/0x6c0
[   12.705957]  ? kasan_complete_mode_report_info+0x64/0x200
[   12.705979]  ? ksize_uaf+0x5fe/0x6c0
[   12.705999]  kasan_report+0x141/0x180
[   12.706020]  ? ksize_uaf+0x5fe/0x6c0
[   12.706044]  __asan_report_load1_noabort+0x18/0x20
[   12.706068]  ksize_uaf+0x5fe/0x6c0
[   12.706087]  ? __pfx_ksize_uaf+0x10/0x10
[   12.706108]  ? __schedule+0x10cc/0x2b60
[   12.706129]  ? __pfx_read_tsc+0x10/0x10
[   12.706149]  ? ktime_get_ts64+0x86/0x230
[   12.706172]  kunit_try_run_case+0x1a5/0x480
[   12.706195]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.706218]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.706240]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.706263]  ? __kthread_parkme+0x82/0x180
[   12.706293]  ? preempt_count_sub+0x50/0x80
[   12.706317]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.706340]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.706363]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.706386]  kthread+0x337/0x6f0
[   12.706404]  ? trace_preempt_on+0x20/0xc0
[   12.706426]  ? __pfx_kthread+0x10/0x10
[   12.706445]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.706465]  ? calculate_sigpending+0x7b/0xa0
[   12.706487]  ? __pfx_kthread+0x10/0x10
[   12.706507]  ret_from_fork+0x116/0x1d0
[   12.706525]  ? __pfx_kthread+0x10/0x10
[   12.706544]  ret_from_fork_asm+0x1a/0x30
[   12.706573]  </TASK>
[   12.706582] 
[   12.713148] Allocated by task 215:
[   12.713291]  kasan_save_stack+0x45/0x70
[   12.713430]  kasan_save_track+0x18/0x40
[   12.713624]  kasan_save_alloc_info+0x3b/0x50
[   12.713829]  __kasan_kmalloc+0xb7/0xc0
[   12.714014]  __kmalloc_cache_noprof+0x189/0x420
[   12.714186]  ksize_uaf+0xaa/0x6c0
[   12.714319]  kunit_try_run_case+0x1a5/0x480
[   12.714478]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.714736]  kthread+0x337/0x6f0
[   12.714901]  ret_from_fork+0x116/0x1d0
[   12.715092]  ret_from_fork_asm+0x1a/0x30
[   12.715296] 
[   12.715392] Freed by task 215:
[   12.715591]  kasan_save_stack+0x45/0x70
[   12.715775]  kasan_save_track+0x18/0x40
[   12.715941]  kasan_save_free_info+0x3f/0x60
[   12.716117]  __kasan_slab_free+0x56/0x70
[   12.716320]  kfree+0x222/0x3f0
[   12.716441]  ksize_uaf+0x12c/0x6c0
[   12.716625]  kunit_try_run_case+0x1a5/0x480
[   12.716800]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.717010]  kthread+0x337/0x6f0
[   12.717129]  ret_from_fork+0x116/0x1d0
[   12.717260]  ret_from_fork_asm+0x1a/0x30
[   12.717409] 
[   12.717478] The buggy address belongs to the object at ffff8881029ce400
[   12.717478]  which belongs to the cache kmalloc-128 of size 128
[   12.717830] The buggy address is located 0 bytes inside of
[   12.717830]  freed 128-byte region [ffff8881029ce400, ffff8881029ce480)
[   12.718174] 
[   12.718244] The buggy address belongs to the physical page:
[   12.718493] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ce
[   12.719037] flags: 0x200000000000000(node=0|zone=2)
[   12.719273] page_type: f5(slab)
[   12.719453] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.720022] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.720357] page dumped because: kasan: bad access detected
[   12.720600] 
[   12.720689] Memory state around the buggy address:
[   12.720874]  ffff8881029ce300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.721095]  ffff8881029ce380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.721318] >ffff8881029ce400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.721532]                    ^
[   12.721644]  ffff8881029ce480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.721856]  ffff8881029ce500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.722169] ==================================================================
[   12.723495] ==================================================================
[   12.723851] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5e4/0x6c0
[   12.724456] Read of size 1 at addr ffff8881029ce478 by task kunit_try_catch/215
[   12.724812] 
[   12.724924] CPU: 0 UID: 0 PID: 215 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.724970] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.724981] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.724999] Call Trace:
[   12.725013]  <TASK>
[   12.725026]  dump_stack_lvl+0x73/0xb0
[   12.725052]  print_report+0xd1/0x610
[   12.725072]  ? __virt_addr_valid+0x1db/0x2d0
[   12.725093]  ? ksize_uaf+0x5e4/0x6c0
[   12.725112]  ? kasan_complete_mode_report_info+0x64/0x200
[   12.725135]  ? ksize_uaf+0x5e4/0x6c0
[   12.725155]  kasan_report+0x141/0x180
[   12.725176]  ? ksize_uaf+0x5e4/0x6c0
[   12.725200]  __asan_report_load1_noabort+0x18/0x20
[   12.725224]  ksize_uaf+0x5e4/0x6c0
[   12.725244]  ? __pfx_ksize_uaf+0x10/0x10
[   12.725265]  ? __schedule+0x10cc/0x2b60
[   12.725298]  ? __pfx_read_tsc+0x10/0x10
[   12.725317]  ? ktime_get_ts64+0x86/0x230
[   12.725340]  kunit_try_run_case+0x1a5/0x480
[   12.725363]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.725384]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.725407]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.725429]  ? __kthread_parkme+0x82/0x180
[   12.725448]  ? preempt_count_sub+0x50/0x80
[   12.725470]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.725493]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.725516]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.725539]  kthread+0x337/0x6f0
[   12.725558]  ? trace_preempt_on+0x20/0xc0
[   12.725579]  ? __pfx_kthread+0x10/0x10
[   12.725598]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.725619]  ? calculate_sigpending+0x7b/0xa0
[   12.725641]  ? __pfx_kthread+0x10/0x10
[   12.725661]  ret_from_fork+0x116/0x1d0
[   12.725678]  ? __pfx_kthread+0x10/0x10
[   12.725697]  ret_from_fork_asm+0x1a/0x30
[   12.725726]  </TASK>
[   12.725735] 
[   12.732716] Allocated by task 215:
[   12.732972]  kasan_save_stack+0x45/0x70
[   12.733152]  kasan_save_track+0x18/0x40
[   12.733341]  kasan_save_alloc_info+0x3b/0x50
[   12.733572]  __kasan_kmalloc+0xb7/0xc0
[   12.733709]  __kmalloc_cache_noprof+0x189/0x420
[   12.733931]  ksize_uaf+0xaa/0x6c0
[   12.734072]  kunit_try_run_case+0x1a5/0x480
[   12.734216]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.734401]  kthread+0x337/0x6f0
[   12.734695]  ret_from_fork+0x116/0x1d0
[   12.734887]  ret_from_fork_asm+0x1a/0x30
[   12.735089] 
[   12.735182] Freed by task 215:
[   12.735347]  kasan_save_stack+0x45/0x70
[   12.735550]  kasan_save_track+0x18/0x40
[   12.735706]  kasan_save_free_info+0x3f/0x60
[   12.735915]  __kasan_slab_free+0x56/0x70
[   12.736116]  kfree+0x222/0x3f0
[   12.736274]  ksize_uaf+0x12c/0x6c0
[   12.736406]  kunit_try_run_case+0x1a5/0x480
[   12.736702]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.737015]  kthread+0x337/0x6f0
[   12.737138]  ret_from_fork+0x116/0x1d0
[   12.737335]  ret_from_fork_asm+0x1a/0x30
[   12.737532] 
[   12.737599] The buggy address belongs to the object at ffff8881029ce400
[   12.737599]  which belongs to the cache kmalloc-128 of size 128
[   12.737941] The buggy address is located 120 bytes inside of
[   12.737941]  freed 128-byte region [ffff8881029ce400, ffff8881029ce480)
[   12.738292] 
[   12.738414] The buggy address belongs to the physical page:
[   12.738925] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ce
[   12.739266] flags: 0x200000000000000(node=0|zone=2)
[   12.739551] page_type: f5(slab)
[   12.739712] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.740035] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.740256] page dumped because: kasan: bad access detected
[   12.740428] 
[   12.740596] Memory state around the buggy address:
[   12.740820]  ffff8881029ce300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.741149]  ffff8881029ce380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.741453] >ffff8881029ce400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.741696]                                                                 ^
[   12.741932]  ffff8881029ce480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.742232]  ffff8881029ce500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.742597] ==================================================================
[   12.683171] ==================================================================
[   12.683957] BUG: KASAN: slab-use-after-free in ksize_uaf+0x19d/0x6c0
[   12.684206] Read of size 1 at addr ffff8881029ce400 by task kunit_try_catch/215
[   12.684973] 
[   12.685158] CPU: 0 UID: 0 PID: 215 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.685203] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.685214] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.685235] Call Trace:
[   12.685246]  <TASK>
[   12.685262]  dump_stack_lvl+0x73/0xb0
[   12.685308]  print_report+0xd1/0x610
[   12.685331]  ? __virt_addr_valid+0x1db/0x2d0
[   12.685354]  ? ksize_uaf+0x19d/0x6c0
[   12.685373]  ? kasan_complete_mode_report_info+0x64/0x200
[   12.685395]  ? ksize_uaf+0x19d/0x6c0
[   12.685415]  kasan_report+0x141/0x180
[   12.685437]  ? ksize_uaf+0x19d/0x6c0
[   12.685469]  ? ksize_uaf+0x19d/0x6c0
[   12.685490]  __kasan_check_byte+0x3d/0x50
[   12.685512]  ksize+0x20/0x60
[   12.685532]  ksize_uaf+0x19d/0x6c0
[   12.685551]  ? __pfx_ksize_uaf+0x10/0x10
[   12.685572]  ? __schedule+0x10cc/0x2b60
[   12.685594]  ? __pfx_read_tsc+0x10/0x10
[   12.685614]  ? ktime_get_ts64+0x86/0x230
[   12.685639]  kunit_try_run_case+0x1a5/0x480
[   12.685663]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.685684]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.685708]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.685730]  ? __kthread_parkme+0x82/0x180
[   12.685750]  ? preempt_count_sub+0x50/0x80
[   12.685774]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.685797]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.685820]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.685843]  kthread+0x337/0x6f0
[   12.685861]  ? trace_preempt_on+0x20/0xc0
[   12.685883]  ? __pfx_kthread+0x10/0x10
[   12.685902]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.685923]  ? calculate_sigpending+0x7b/0xa0
[   12.685948]  ? __pfx_kthread+0x10/0x10
[   12.685968]  ret_from_fork+0x116/0x1d0
[   12.685986]  ? __pfx_kthread+0x10/0x10
[   12.686005]  ret_from_fork_asm+0x1a/0x30
[   12.686035]  </TASK>
[   12.686044] 
[   12.694511] Allocated by task 215:
[   12.694692]  kasan_save_stack+0x45/0x70
[   12.694895]  kasan_save_track+0x18/0x40
[   12.695083]  kasan_save_alloc_info+0x3b/0x50
[   12.695275]  __kasan_kmalloc+0xb7/0xc0
[   12.695448]  __kmalloc_cache_noprof+0x189/0x420
[   12.695652]  ksize_uaf+0xaa/0x6c0
[   12.695773]  kunit_try_run_case+0x1a5/0x480
[   12.695918]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.696093]  kthread+0x337/0x6f0
[   12.696212]  ret_from_fork+0x116/0x1d0
[   12.696404]  ret_from_fork_asm+0x1a/0x30
[   12.696608] 
[   12.696699] Freed by task 215:
[   12.696852]  kasan_save_stack+0x45/0x70
[   12.697046]  kasan_save_track+0x18/0x40
[   12.697232]  kasan_save_free_info+0x3f/0x60
[   12.697445]  __kasan_slab_free+0x56/0x70
[   12.697642]  kfree+0x222/0x3f0
[   12.697757]  ksize_uaf+0x12c/0x6c0
[   12.697881]  kunit_try_run_case+0x1a5/0x480
[   12.698051]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.698313]  kthread+0x337/0x6f0
[   12.698490]  ret_from_fork+0x116/0x1d0
[   12.698673]  ret_from_fork_asm+0x1a/0x30
[   12.698865] 
[   12.698959] The buggy address belongs to the object at ffff8881029ce400
[   12.698959]  which belongs to the cache kmalloc-128 of size 128
[   12.699436] The buggy address is located 0 bytes inside of
[   12.699436]  freed 128-byte region [ffff8881029ce400, ffff8881029ce480)
[   12.699894] 
[   12.699968] The buggy address belongs to the physical page:
[   12.700200] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ce
[   12.700528] flags: 0x200000000000000(node=0|zone=2)
[   12.700741] page_type: f5(slab)
[   12.700905] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.701199] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.701436] page dumped because: kasan: bad access detected
[   12.701695] 
[   12.701787] Memory state around the buggy address:
[   12.702005]  ffff8881029ce300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.702261]  ffff8881029ce380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.702682] >ffff8881029ce400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.702961]                    ^
[   12.703103]  ffff8881029ce480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.703373]  ffff8881029ce500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.703732] ==================================================================