Hay
Date
July 19, 2025, 11:11 a.m.

Environment
qemu-arm64
qemu-x86_64

[   15.571769] ==================================================================
[   15.571822] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8
[   15.571869] Read of size 1 at addr fff00000c6e65100 by task kunit_try_catch/197
[   15.571919] 
[   15.571949] CPU: 1 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   15.572028] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.572055] Hardware name: linux,dummy-virt (DT)
[   15.572084] Call trace:
[   15.572106]  show_stack+0x20/0x38 (C)
[   15.572153]  dump_stack_lvl+0x8c/0xd0
[   15.572198]  print_report+0x118/0x5d0
[   15.572245]  kasan_report+0xdc/0x128
[   15.572288]  __asan_report_load1_noabort+0x20/0x30
[   15.572338]  ksize_uaf+0x598/0x5f8
[   15.572382]  kunit_try_run_case+0x170/0x3f0
[   15.572429]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.572480]  kthread+0x328/0x630
[   15.572520]  ret_from_fork+0x10/0x20
[   15.573011] 
[   15.573068] Allocated by task 197:
[   15.573132]  kasan_save_stack+0x3c/0x68
[   15.573186]  kasan_save_track+0x20/0x40
[   15.573232]  kasan_save_alloc_info+0x40/0x58
[   15.573274]  __kasan_kmalloc+0xd4/0xd8
[   15.573338]  __kmalloc_cache_noprof+0x16c/0x3c0
[   15.573378]  ksize_uaf+0xb8/0x5f8
[   15.573414]  kunit_try_run_case+0x170/0x3f0
[   15.573458]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.573502]  kthread+0x328/0x630
[   15.573704]  ret_from_fork+0x10/0x20
[   15.573895] 
[   15.573935] Freed by task 197:
[   15.574033]  kasan_save_stack+0x3c/0x68
[   15.574099]  kasan_save_track+0x20/0x40
[   15.574196]  kasan_save_free_info+0x4c/0x78
[   15.574285]  __kasan_slab_free+0x6c/0x98
[   15.574359]  kfree+0x214/0x3c8
[   15.574452]  ksize_uaf+0x11c/0x5f8
[   15.574510]  kunit_try_run_case+0x170/0x3f0
[   15.574641]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.574688]  kthread+0x328/0x630
[   15.574721]  ret_from_fork+0x10/0x20
[   15.574769] 
[   15.574789] The buggy address belongs to the object at fff00000c6e65100
[   15.574789]  which belongs to the cache kmalloc-128 of size 128
[   15.574847] The buggy address is located 0 bytes inside of
[   15.574847]  freed 128-byte region [fff00000c6e65100, fff00000c6e65180)
[   15.574909] 
[   15.574928] The buggy address belongs to the physical page:
[   15.574959] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e65
[   15.575140] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   15.575217] page_type: f5(slab)
[   15.575289] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   15.575354] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.575461] page dumped because: kasan: bad access detected
[   15.575570] 
[   15.575662] Memory state around the buggy address:
[   15.575740]  fff00000c6e65000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.575828]  fff00000c6e65080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.575905] >fff00000c6e65100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.575958]                    ^
[   15.576001]  fff00000c6e65180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.576044]  fff00000c6e65200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.576097] ==================================================================
[   15.576751] ==================================================================
[   15.576803] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8
[   15.576864] Read of size 1 at addr fff00000c6e65178 by task kunit_try_catch/197
[   15.576914] 
[   15.576942] CPU: 1 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   15.577195] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.577255] Hardware name: linux,dummy-virt (DT)
[   15.577289] Call trace:
[   15.577320]  show_stack+0x20/0x38 (C)
[   15.577369]  dump_stack_lvl+0x8c/0xd0
[   15.577416]  print_report+0x118/0x5d0
[   15.577471]  kasan_report+0xdc/0x128
[   15.577518]  __asan_report_load1_noabort+0x20/0x30
[   15.577583]  ksize_uaf+0x544/0x5f8
[   15.577626]  kunit_try_run_case+0x170/0x3f0
[   15.577672]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.577735]  kthread+0x328/0x630
[   15.577813]  ret_from_fork+0x10/0x20
[   15.577889] 
[   15.577960] Allocated by task 197:
[   15.578000]  kasan_save_stack+0x3c/0x68
[   15.578059]  kasan_save_track+0x20/0x40
[   15.578095]  kasan_save_alloc_info+0x40/0x58
[   15.578135]  __kasan_kmalloc+0xd4/0xd8
[   15.578170]  __kmalloc_cache_noprof+0x16c/0x3c0
[   15.578365]  ksize_uaf+0xb8/0x5f8
[   15.578437]  kunit_try_run_case+0x170/0x3f0
[   15.578576]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.578674]  kthread+0x328/0x630
[   15.578731]  ret_from_fork+0x10/0x20
[   15.578795] 
[   15.578843] Freed by task 197:
[   15.578892]  kasan_save_stack+0x3c/0x68
[   15.578955]  kasan_save_track+0x20/0x40
[   15.579043]  kasan_save_free_info+0x4c/0x78
[   15.579852]  __kasan_slab_free+0x6c/0x98
[   15.579902]  kfree+0x214/0x3c8
[   15.579938]  ksize_uaf+0x11c/0x5f8
[   15.579971]  kunit_try_run_case+0x170/0x3f0
[   15.580018]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.580062]  kthread+0x328/0x630
[   15.580094]  ret_from_fork+0x10/0x20
[   15.580133] 
[   15.580153] The buggy address belongs to the object at fff00000c6e65100
[   15.580153]  which belongs to the cache kmalloc-128 of size 128
[   15.580213] The buggy address is located 120 bytes inside of
[   15.580213]  freed 128-byte region [fff00000c6e65100, fff00000c6e65180)
[   15.580276] 
[   15.580296] The buggy address belongs to the physical page:
[   15.580326] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e65
[   15.580376] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   15.580423] page_type: f5(slab)
[   15.580459] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   15.580509] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.581750] page dumped because: kasan: bad access detected
[   15.582383] 
[   15.582432] Memory state around the buggy address:
[   15.582469]  fff00000c6e65000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.582516]  fff00000c6e65080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.583023] >fff00000c6e65100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.583063]                                                                 ^
[   15.583106]  fff00000c6e65180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.583355]  fff00000c6e65200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.583696] ==================================================================
[   15.566937] ==================================================================
[   15.567001] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8
[   15.567055] Read of size 1 at addr fff00000c6e65100 by task kunit_try_catch/197
[   15.567106] 
[   15.567138] CPU: 1 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   15.567221] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.567248] Hardware name: linux,dummy-virt (DT)
[   15.567279] Call trace:
[   15.567303]  show_stack+0x20/0x38 (C)
[   15.567350]  dump_stack_lvl+0x8c/0xd0
[   15.567396]  print_report+0x118/0x5d0
[   15.567442]  kasan_report+0xdc/0x128
[   15.567488]  __kasan_check_byte+0x54/0x70
[   15.567549]  ksize+0x30/0x88
[   15.567591]  ksize_uaf+0x168/0x5f8
[   15.567636]  kunit_try_run_case+0x170/0x3f0
[   15.567684]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.567735]  kthread+0x328/0x630
[   15.567778]  ret_from_fork+0x10/0x20
[   15.567823] 
[   15.567843] Allocated by task 197:
[   15.567870]  kasan_save_stack+0x3c/0x68
[   15.567908]  kasan_save_track+0x20/0x40
[   15.567947]  kasan_save_alloc_info+0x40/0x58
[   15.567987]  __kasan_kmalloc+0xd4/0xd8
[   15.568024]  __kmalloc_cache_noprof+0x16c/0x3c0
[   15.568062]  ksize_uaf+0xb8/0x5f8
[   15.568130]  kunit_try_run_case+0x170/0x3f0
[   15.568176]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.568219]  kthread+0x328/0x630
[   15.568250]  ret_from_fork+0x10/0x20
[   15.568287] 
[   15.568305] Freed by task 197:
[   15.568331]  kasan_save_stack+0x3c/0x68
[   15.568367]  kasan_save_track+0x20/0x40
[   15.568404]  kasan_save_free_info+0x4c/0x78
[   15.568442]  __kasan_slab_free+0x6c/0x98
[   15.568479]  kfree+0x214/0x3c8
[   15.568511]  ksize_uaf+0x11c/0x5f8
[   15.568564]  kunit_try_run_case+0x170/0x3f0
[   15.568618]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.568774]  kthread+0x328/0x630
[   15.568947]  ret_from_fork+0x10/0x20
[   15.569046] 
[   15.569065] The buggy address belongs to the object at fff00000c6e65100
[   15.569065]  which belongs to the cache kmalloc-128 of size 128
[   15.569307] The buggy address is located 0 bytes inside of
[   15.569307]  freed 128-byte region [fff00000c6e65100, fff00000c6e65180)
[   15.569480] 
[   15.569519] The buggy address belongs to the physical page:
[   15.569947] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e65
[   15.570268] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   15.570318] page_type: f5(slab)
[   15.570360] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   15.570416] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.570458] page dumped because: kasan: bad access detected
[   15.570738] 
[   15.570804] Memory state around the buggy address:
[   15.570841]  fff00000c6e65000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.570931]  fff00000c6e65080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.570998] >fff00000c6e65100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.571096]                    ^
[   15.571128]  fff00000c6e65180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.571174]  fff00000c6e65200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.571223] ==================================================================

[   12.549599] ==================================================================
[   12.549943] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5fe/0x6c0
[   12.550215] Read of size 1 at addr ffff8881027e4500 by task kunit_try_catch/214
[   12.550529] 
[   12.550631] CPU: 0 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.550674] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.550684] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.550705] Call Trace:
[   12.550717]  <TASK>
[   12.550731]  dump_stack_lvl+0x73/0xb0
[   12.550758]  print_report+0xd1/0x610
[   12.550779]  ? __virt_addr_valid+0x1db/0x2d0
[   12.550800]  ? ksize_uaf+0x5fe/0x6c0
[   12.550820]  ? kasan_complete_mode_report_info+0x64/0x200
[   12.550841]  ? ksize_uaf+0x5fe/0x6c0
[   12.550861]  kasan_report+0x141/0x180
[   12.550882]  ? ksize_uaf+0x5fe/0x6c0
[   12.550906]  __asan_report_load1_noabort+0x18/0x20
[   12.550930]  ksize_uaf+0x5fe/0x6c0
[   12.550950]  ? __pfx_ksize_uaf+0x10/0x10
[   12.550971]  ? __schedule+0x10cc/0x2b60
[   12.550992]  ? __pfx_read_tsc+0x10/0x10
[   12.551012]  ? ktime_get_ts64+0x86/0x230
[   12.551036]  kunit_try_run_case+0x1a5/0x480
[   12.551058]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.551080]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.551103]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.551125]  ? __kthread_parkme+0x82/0x180
[   12.551167]  ? preempt_count_sub+0x50/0x80
[   12.551192]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.551215]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.551237]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.551262]  kthread+0x337/0x6f0
[   12.551281]  ? trace_preempt_on+0x20/0xc0
[   12.551548]  ? __pfx_kthread+0x10/0x10
[   12.551568]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.551588]  ? calculate_sigpending+0x7b/0xa0
[   12.551613]  ? __pfx_kthread+0x10/0x10
[   12.551635]  ret_from_fork+0x116/0x1d0
[   12.551654]  ? __pfx_kthread+0x10/0x10
[   12.551673]  ret_from_fork_asm+0x1a/0x30
[   12.551702]  </TASK>
[   12.551712] 
[   12.558583] Allocated by task 214:
[   12.558762]  kasan_save_stack+0x45/0x70
[   12.558947]  kasan_save_track+0x18/0x40
[   12.559112]  kasan_save_alloc_info+0x3b/0x50
[   12.559323]  __kasan_kmalloc+0xb7/0xc0
[   12.559483]  __kmalloc_cache_noprof+0x189/0x420
[   12.559696]  ksize_uaf+0xaa/0x6c0
[   12.559840]  kunit_try_run_case+0x1a5/0x480
[   12.560033]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.560263]  kthread+0x337/0x6f0
[   12.560386]  ret_from_fork+0x116/0x1d0
[   12.560530]  ret_from_fork_asm+0x1a/0x30
[   12.560723] 
[   12.560825] Freed by task 214:
[   12.560985]  kasan_save_stack+0x45/0x70
[   12.561206]  kasan_save_track+0x18/0x40
[   12.561399]  kasan_save_free_info+0x3f/0x60
[   12.561590]  __kasan_slab_free+0x56/0x70
[   12.561775]  kfree+0x222/0x3f0
[   12.561927]  ksize_uaf+0x12c/0x6c0
[   12.562102]  kunit_try_run_case+0x1a5/0x480
[   12.562299]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.562549]  kthread+0x337/0x6f0
[   12.562704]  ret_from_fork+0x116/0x1d0
[   12.562878]  ret_from_fork_asm+0x1a/0x30
[   12.563055] 
[   12.563159] The buggy address belongs to the object at ffff8881027e4500
[   12.563159]  which belongs to the cache kmalloc-128 of size 128
[   12.563655] The buggy address is located 0 bytes inside of
[   12.563655]  freed 128-byte region [ffff8881027e4500, ffff8881027e4580)
[   12.564121] 
[   12.564240] The buggy address belongs to the physical page:
[   12.564460] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027e4
[   12.564786] flags: 0x200000000000000(node=0|zone=2)
[   12.565001] page_type: f5(slab)
[   12.565129] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.565381] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.565676] page dumped because: kasan: bad access detected
[   12.565928] 
[   12.566017] Memory state around the buggy address:
[   12.566269]  ffff8881027e4400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.566590]  ffff8881027e4480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.566831] >ffff8881027e4500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.567103]                    ^
[   12.567295]  ffff8881027e4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.567622]  ffff8881027e4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.567890] ==================================================================
[   12.526522] ==================================================================
[   12.526947] BUG: KASAN: slab-use-after-free in ksize_uaf+0x19d/0x6c0
[   12.527373] Read of size 1 at addr ffff8881027e4500 by task kunit_try_catch/214
[   12.527688] 
[   12.527785] CPU: 0 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.527830] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.527841] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.527863] Call Trace:
[   12.527875]  <TASK>
[   12.527891]  dump_stack_lvl+0x73/0xb0
[   12.527923]  print_report+0xd1/0x610
[   12.527944]  ? __virt_addr_valid+0x1db/0x2d0
[   12.527968]  ? ksize_uaf+0x19d/0x6c0
[   12.527988]  ? kasan_complete_mode_report_info+0x64/0x200
[   12.528010]  ? ksize_uaf+0x19d/0x6c0
[   12.528030]  kasan_report+0x141/0x180
[   12.528050]  ? ksize_uaf+0x19d/0x6c0
[   12.528073]  ? ksize_uaf+0x19d/0x6c0
[   12.528092]  __kasan_check_byte+0x3d/0x50
[   12.528168]  ksize+0x20/0x60
[   12.528188]  ksize_uaf+0x19d/0x6c0
[   12.528208]  ? __pfx_ksize_uaf+0x10/0x10
[   12.528229]  ? __schedule+0x10cc/0x2b60
[   12.528251]  ? __pfx_read_tsc+0x10/0x10
[   12.528272]  ? ktime_get_ts64+0x86/0x230
[   12.528296]  kunit_try_run_case+0x1a5/0x480
[   12.528321]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.528343]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.528366]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.528388]  ? __kthread_parkme+0x82/0x180
[   12.528408]  ? preempt_count_sub+0x50/0x80
[   12.528433]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.528456]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.528478]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.528514]  kthread+0x337/0x6f0
[   12.528533]  ? trace_preempt_on+0x20/0xc0
[   12.528556]  ? __pfx_kthread+0x10/0x10
[   12.528575]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.528596]  ? calculate_sigpending+0x7b/0xa0
[   12.528621]  ? __pfx_kthread+0x10/0x10
[   12.528641]  ret_from_fork+0x116/0x1d0
[   12.528659]  ? __pfx_kthread+0x10/0x10
[   12.528679]  ret_from_fork_asm+0x1a/0x30
[   12.528709]  </TASK>
[   12.528719] 
[   12.536263] Allocated by task 214:
[   12.536402]  kasan_save_stack+0x45/0x70
[   12.536618]  kasan_save_track+0x18/0x40
[   12.536810]  kasan_save_alloc_info+0x3b/0x50
[   12.536964]  __kasan_kmalloc+0xb7/0xc0
[   12.537096]  __kmalloc_cache_noprof+0x189/0x420
[   12.537253]  ksize_uaf+0xaa/0x6c0
[   12.537428]  kunit_try_run_case+0x1a5/0x480
[   12.537630]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.537859]  kthread+0x337/0x6f0
[   12.538016]  ret_from_fork+0x116/0x1d0
[   12.538208]  ret_from_fork_asm+0x1a/0x30
[   12.538392] 
[   12.538480] Freed by task 214:
[   12.538812]  kasan_save_stack+0x45/0x70
[   12.538958]  kasan_save_track+0x18/0x40
[   12.539231]  kasan_save_free_info+0x3f/0x60
[   12.539447]  __kasan_slab_free+0x56/0x70
[   12.539655]  kfree+0x222/0x3f0
[   12.539824]  ksize_uaf+0x12c/0x6c0
[   12.540002]  kunit_try_run_case+0x1a5/0x480
[   12.540293]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.540548]  kthread+0x337/0x6f0
[   12.540704]  ret_from_fork+0x116/0x1d0
[   12.540835]  ret_from_fork_asm+0x1a/0x30
[   12.541010] 
[   12.541192] The buggy address belongs to the object at ffff8881027e4500
[   12.541192]  which belongs to the cache kmalloc-128 of size 128
[   12.541720] The buggy address is located 0 bytes inside of
[   12.541720]  freed 128-byte region [ffff8881027e4500, ffff8881027e4580)
[   12.542382] 
[   12.542459] The buggy address belongs to the physical page:
[   12.542645] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027e4
[   12.542887] flags: 0x200000000000000(node=0|zone=2)
[   12.543134] page_type: f5(slab)
[   12.543325] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.543672] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.544000] page dumped because: kasan: bad access detected
[   12.544335] 
[   12.544433] Memory state around the buggy address:
[   12.544654]  ffff8881027e4400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.544871]  ffff8881027e4480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.545162] >ffff8881027e4500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.545489]                    ^
[   12.545666]  ffff8881027e4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.545980]  ffff8881027e4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.546517] ==================================================================
[   12.568928] ==================================================================
[   12.569292] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5e4/0x6c0
[   12.569582] Read of size 1 at addr ffff8881027e4578 by task kunit_try_catch/214
[   12.569818] 
[   12.569907] CPU: 0 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.569949] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.569960] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.569980] Call Trace:
[   12.569998]  <TASK>
[   12.570014]  dump_stack_lvl+0x73/0xb0
[   12.570040]  print_report+0xd1/0x610
[   12.570061]  ? __virt_addr_valid+0x1db/0x2d0
[   12.570083]  ? ksize_uaf+0x5e4/0x6c0
[   12.570102]  ? kasan_complete_mode_report_info+0x64/0x200
[   12.570124]  ? ksize_uaf+0x5e4/0x6c0
[   12.570165]  kasan_report+0x141/0x180
[   12.570186]  ? ksize_uaf+0x5e4/0x6c0
[   12.570216]  __asan_report_load1_noabort+0x18/0x20
[   12.570239]  ksize_uaf+0x5e4/0x6c0
[   12.570259]  ? __pfx_ksize_uaf+0x10/0x10
[   12.570280]  ? __schedule+0x10cc/0x2b60
[   12.570301]  ? __pfx_read_tsc+0x10/0x10
[   12.570321]  ? ktime_get_ts64+0x86/0x230
[   12.570345]  kunit_try_run_case+0x1a5/0x480
[   12.570367]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.570389]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.570413]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.570435]  ? __kthread_parkme+0x82/0x180
[   12.570455]  ? preempt_count_sub+0x50/0x80
[   12.570478]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.570510]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.570533]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.570556]  kthread+0x337/0x6f0
[   12.570574]  ? trace_preempt_on+0x20/0xc0
[   12.570596]  ? __pfx_kthread+0x10/0x10
[   12.570616]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.570636]  ? calculate_sigpending+0x7b/0xa0
[   12.570659]  ? __pfx_kthread+0x10/0x10
[   12.570679]  ret_from_fork+0x116/0x1d0
[   12.570697]  ? __pfx_kthread+0x10/0x10
[   12.570717]  ret_from_fork_asm+0x1a/0x30
[   12.570746]  </TASK>
[   12.570755] 
[   12.577402] Allocated by task 214:
[   12.577588]  kasan_save_stack+0x45/0x70
[   12.577763]  kasan_save_track+0x18/0x40
[   12.577898]  kasan_save_alloc_info+0x3b/0x50
[   12.578087]  __kasan_kmalloc+0xb7/0xc0
[   12.578305]  __kmalloc_cache_noprof+0x189/0x420
[   12.578537]  ksize_uaf+0xaa/0x6c0
[   12.578706]  kunit_try_run_case+0x1a5/0x480
[   12.578874]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.579114]  kthread+0x337/0x6f0
[   12.579278]  ret_from_fork+0x116/0x1d0
[   12.579453]  ret_from_fork_asm+0x1a/0x30
[   12.579639] 
[   12.579726] Freed by task 214:
[   12.579879]  kasan_save_stack+0x45/0x70
[   12.580043]  kasan_save_track+0x18/0x40
[   12.580236]  kasan_save_free_info+0x3f/0x60
[   12.580383]  __kasan_slab_free+0x56/0x70
[   12.580581]  kfree+0x222/0x3f0
[   12.580725]  ksize_uaf+0x12c/0x6c0
[   12.580887]  kunit_try_run_case+0x1a5/0x480
[   12.581059]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.581336]  kthread+0x337/0x6f0
[   12.581478]  ret_from_fork+0x116/0x1d0
[   12.581616]  ret_from_fork_asm+0x1a/0x30
[   12.581753] 
[   12.581821] The buggy address belongs to the object at ffff8881027e4500
[   12.581821]  which belongs to the cache kmalloc-128 of size 128
[   12.582201] The buggy address is located 120 bytes inside of
[   12.582201]  freed 128-byte region [ffff8881027e4500, ffff8881027e4580)
[   12.584069] 
[   12.584473] The buggy address belongs to the physical page:
[   12.585224] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027e4
[   12.586254] flags: 0x200000000000000(node=0|zone=2)
[   12.586910] page_type: f5(slab)
[   12.587462] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.588418] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.589328] page dumped because: kasan: bad access detected
[   12.590118] 
[   12.590462] Memory state around the buggy address:
[   12.591085]  ffff8881027e4400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.591371]  ffff8881027e4480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.591603] >ffff8881027e4500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.591819]                                                                 ^
[   12.592034]  ffff8881027e4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.592251]  ffff8881027e4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.592758] ==================================================================