Hay
Date
July 13, 2025, 11:09 p.m.

Environment
qemu-arm64
qemu-x86_64

[   16.124812] ==================================================================
[   16.124874] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8
[   16.124922] Read of size 1 at addr fff00000c5866778 by task kunit_try_catch/197
[   16.124972] 
[   16.125001] CPU: 0 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.125377] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.125418] Hardware name: linux,dummy-virt (DT)
[   16.125450] Call trace:
[   16.125473]  show_stack+0x20/0x38 (C)
[   16.125523]  dump_stack_lvl+0x8c/0xd0
[   16.125579]  print_report+0x118/0x5d0
[   16.125625]  kasan_report+0xdc/0x128
[   16.125669]  __asan_report_load1_noabort+0x20/0x30
[   16.125721]  ksize_uaf+0x544/0x5f8
[   16.125764]  kunit_try_run_case+0x170/0x3f0
[   16.125809]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.125862]  kthread+0x328/0x630
[   16.125904]  ret_from_fork+0x10/0x20
[   16.125950] 
[   16.125968] Allocated by task 197:
[   16.125995]  kasan_save_stack+0x3c/0x68
[   16.126035]  kasan_save_track+0x20/0x40
[   16.126073]  kasan_save_alloc_info+0x40/0x58
[   16.126114]  __kasan_kmalloc+0xd4/0xd8
[   16.126149]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.126187]  ksize_uaf+0xb8/0x5f8
[   16.126239]  kunit_try_run_case+0x170/0x3f0
[   16.126275]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.126317]  kthread+0x328/0x630
[   16.126350]  ret_from_fork+0x10/0x20
[   16.126384] 
[   16.126403] Freed by task 197:
[   16.126427]  kasan_save_stack+0x3c/0x68
[   16.126462]  kasan_save_track+0x20/0x40
[   16.126499]  kasan_save_free_info+0x4c/0x78
[   16.126577]  __kasan_slab_free+0x6c/0x98
[   16.126627]  kfree+0x214/0x3c8
[   16.126663]  ksize_uaf+0x11c/0x5f8
[   16.126697]  kunit_try_run_case+0x170/0x3f0
[   16.126735]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.126779]  kthread+0x328/0x630
[   16.126819]  ret_from_fork+0x10/0x20
[   16.126863] 
[   16.126884] The buggy address belongs to the object at fff00000c5866700
[   16.126884]  which belongs to the cache kmalloc-128 of size 128
[   16.126943] The buggy address is located 120 bytes inside of
[   16.126943]  freed 128-byte region [fff00000c5866700, fff00000c5866780)
[   16.127005] 
[   16.127024] The buggy address belongs to the physical page:
[   16.127068] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105866
[   16.127121] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.127167] page_type: f5(slab)
[   16.127215] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.127266] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.127308] page dumped because: kasan: bad access detected
[   16.127338] 
[   16.127357] Memory state around the buggy address:
[   16.127386]  fff00000c5866600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.127438]  fff00000c5866680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.127481] >fff00000c5866700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.127519]                                                                 ^
[   16.127562]  fff00000c5866780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.127605]  fff00000c5866800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.127643] ==================================================================
[   16.115952] ==================================================================
[   16.116005] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8
[   16.116053] Read of size 1 at addr fff00000c5866700 by task kunit_try_catch/197
[   16.116371] 
[   16.116966] CPU: 0 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.117189] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.117247] Hardware name: linux,dummy-virt (DT)
[   16.117306] Call trace:
[   16.117343]  show_stack+0x20/0x38 (C)
[   16.117406]  dump_stack_lvl+0x8c/0xd0
[   16.117453]  print_report+0x118/0x5d0
[   16.117500]  kasan_report+0xdc/0x128
[   16.117554]  __asan_report_load1_noabort+0x20/0x30
[   16.117606]  ksize_uaf+0x598/0x5f8
[   16.117665]  kunit_try_run_case+0x170/0x3f0
[   16.117717]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.117786]  kthread+0x328/0x630
[   16.117827]  ret_from_fork+0x10/0x20
[   16.117879] 
[   16.117899] Allocated by task 197:
[   16.117926]  kasan_save_stack+0x3c/0x68
[   16.117967]  kasan_save_track+0x20/0x40
[   16.118005]  kasan_save_alloc_info+0x40/0x58
[   16.118055]  __kasan_kmalloc+0xd4/0xd8
[   16.118096]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.118143]  ksize_uaf+0xb8/0x5f8
[   16.118186]  kunit_try_run_case+0x170/0x3f0
[   16.118477]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.119055]  kthread+0x328/0x630
[   16.119176]  ret_from_fork+0x10/0x20
[   16.119244] 
[   16.119291] Freed by task 197:
[   16.119352]  kasan_save_stack+0x3c/0x68
[   16.119432]  kasan_save_track+0x20/0x40
[   16.119515]  kasan_save_free_info+0x4c/0x78
[   16.119567]  __kasan_slab_free+0x6c/0x98
[   16.119836]  kfree+0x214/0x3c8
[   16.119920]  ksize_uaf+0x11c/0x5f8
[   16.120004]  kunit_try_run_case+0x170/0x3f0
[   16.120088]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.120141]  kthread+0x328/0x630
[   16.120355]  ret_from_fork+0x10/0x20
[   16.120505] 
[   16.120554] The buggy address belongs to the object at fff00000c5866700
[   16.120554]  which belongs to the cache kmalloc-128 of size 128
[   16.120702] The buggy address is located 0 bytes inside of
[   16.120702]  freed 128-byte region [fff00000c5866700, fff00000c5866780)
[   16.120794] 
[   16.120814] The buggy address belongs to the physical page:
[   16.120957] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105866
[   16.121129] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.121242] page_type: f5(slab)
[   16.121308] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.121374] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.121643] page dumped because: kasan: bad access detected
[   16.121731] 
[   16.121826] Memory state around the buggy address:
[   16.121874]  fff00000c5866600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.121920]  fff00000c5866680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.122190] >fff00000c5866700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.122284]                    ^
[   16.122350]  fff00000c5866780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.122421]  fff00000c5866800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.122476] ==================================================================
[   16.107383] ==================================================================
[   16.107456] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8
[   16.107508] Read of size 1 at addr fff00000c5866700 by task kunit_try_catch/197
[   16.107823] 
[   16.107928] CPU: 0 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.108032] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.108069] Hardware name: linux,dummy-virt (DT)
[   16.108117] Call trace:
[   16.108225]  show_stack+0x20/0x38 (C)
[   16.108300]  dump_stack_lvl+0x8c/0xd0
[   16.108355]  print_report+0x118/0x5d0
[   16.108401]  kasan_report+0xdc/0x128
[   16.108445]  __kasan_check_byte+0x54/0x70
[   16.108492]  ksize+0x30/0x88
[   16.108782]  ksize_uaf+0x168/0x5f8
[   16.109037]  kunit_try_run_case+0x170/0x3f0
[   16.109191]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.109363]  kthread+0x328/0x630
[   16.109446]  ret_from_fork+0x10/0x20
[   16.109774] 
[   16.109820] Allocated by task 197:
[   16.109881]  kasan_save_stack+0x3c/0x68
[   16.110004]  kasan_save_track+0x20/0x40
[   16.110072]  kasan_save_alloc_info+0x40/0x58
[   16.110234]  __kasan_kmalloc+0xd4/0xd8
[   16.110315]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.110567]  ksize_uaf+0xb8/0x5f8
[   16.110877]  kunit_try_run_case+0x170/0x3f0
[   16.110945]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.111097]  kthread+0x328/0x630
[   16.111175]  ret_from_fork+0x10/0x20
[   16.111318] 
[   16.111364] Freed by task 197:
[   16.111395]  kasan_save_stack+0x3c/0x68
[   16.111477]  kasan_save_track+0x20/0x40
[   16.111762]  kasan_save_free_info+0x4c/0x78
[   16.111946]  __kasan_slab_free+0x6c/0x98
[   16.112041]  kfree+0x214/0x3c8
[   16.112075]  ksize_uaf+0x11c/0x5f8
[   16.112108]  kunit_try_run_case+0x170/0x3f0
[   16.112148]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.112483]  kthread+0x328/0x630
[   16.112544]  ret_from_fork+0x10/0x20
[   16.112671] 
[   16.112721] The buggy address belongs to the object at fff00000c5866700
[   16.112721]  which belongs to the cache kmalloc-128 of size 128
[   16.112807] The buggy address is located 0 bytes inside of
[   16.112807]  freed 128-byte region [fff00000c5866700, fff00000c5866780)
[   16.113050] 
[   16.113074] The buggy address belongs to the physical page:
[   16.113107] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105866
[   16.113280] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.113419] page_type: f5(slab)
[   16.113507] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.113600] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.113720] page dumped because: kasan: bad access detected
[   16.113780] 
[   16.113830] Memory state around the buggy address:
[   16.113932]  fff00000c5866600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.113996]  fff00000c5866680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.114039] >fff00000c5866700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.114569]                    ^
[   16.114639]  fff00000c5866780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.114719]  fff00000c5866800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.114768] ==================================================================

[   16.851291] ==================================================================
[   16.851404] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8
[   16.851544] Read of size 1 at addr fff00000c5aae700 by task kunit_try_catch/197
[   16.851630] 
[   16.851718] CPU: 1 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.851839] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.851864] Hardware name: linux,dummy-virt (DT)
[   16.852109] Call trace:
[   16.852136]  show_stack+0x20/0x38 (C)
[   16.852200]  dump_stack_lvl+0x8c/0xd0
[   16.852359]  print_report+0x118/0x5d0
[   16.852426]  kasan_report+0xdc/0x128
[   16.852511]  __kasan_check_byte+0x54/0x70
[   16.852645]  ksize+0x30/0x88
[   16.852767]  ksize_uaf+0x168/0x5f8
[   16.852873]  kunit_try_run_case+0x170/0x3f0
[   16.852919]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.852990]  kthread+0x328/0x630
[   16.853332]  ret_from_fork+0x10/0x20
[   16.853476] 
[   16.853565] Allocated by task 197:
[   16.853652]  kasan_save_stack+0x3c/0x68
[   16.853693]  kasan_save_track+0x20/0x40
[   16.853771]  kasan_save_alloc_info+0x40/0x58
[   16.854046]  __kasan_kmalloc+0xd4/0xd8
[   16.854138]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.854272]  ksize_uaf+0xb8/0x5f8
[   16.854388]  kunit_try_run_case+0x170/0x3f0
[   16.854427]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.854574]  kthread+0x328/0x630
[   16.854611]  ret_from_fork+0x10/0x20
[   16.854647] 
[   16.854666] Freed by task 197:
[   16.854787]  kasan_save_stack+0x3c/0x68
[   16.854904]  kasan_save_track+0x20/0x40
[   16.854990]  kasan_save_free_info+0x4c/0x78
[   16.855083]  __kasan_slab_free+0x6c/0x98
[   16.855151]  kfree+0x214/0x3c8
[   16.855194]  ksize_uaf+0x11c/0x5f8
[   16.855229]  kunit_try_run_case+0x170/0x3f0
[   16.855463]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.855561]  kthread+0x328/0x630
[   16.855613]  ret_from_fork+0x10/0x20
[   16.855708] 
[   16.855825] The buggy address belongs to the object at fff00000c5aae700
[   16.855825]  which belongs to the cache kmalloc-128 of size 128
[   16.855901] The buggy address is located 0 bytes inside of
[   16.855901]  freed 128-byte region [fff00000c5aae700, fff00000c5aae780)
[   16.855976] 
[   16.855997] The buggy address belongs to the physical page:
[   16.856029] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105aae
[   16.856263] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.856410] page_type: f5(slab)
[   16.856512] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.856595] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.856638] page dumped because: kasan: bad access detected
[   16.856668] 
[   16.856686] Memory state around the buggy address:
[   16.856719]  fff00000c5aae600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.856763]  fff00000c5aae680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.856954] >fff00000c5aae700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.857013]                    ^
[   16.857041]  fff00000c5aae780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.857084]  fff00000c5aae800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.857123] ==================================================================
[   16.864483] ==================================================================
[   16.864539] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8
[   16.864585] Read of size 1 at addr fff00000c5aae778 by task kunit_try_catch/197
[   16.864846] 
[   16.864914] CPU: 1 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.865057] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.865104] Hardware name: linux,dummy-virt (DT)
[   16.865141] Call trace:
[   16.865191]  show_stack+0x20/0x38 (C)
[   16.865316]  dump_stack_lvl+0x8c/0xd0
[   16.865401]  print_report+0x118/0x5d0
[   16.865482]  kasan_report+0xdc/0x128
[   16.865546]  __asan_report_load1_noabort+0x20/0x30
[   16.865598]  ksize_uaf+0x544/0x5f8
[   16.865638]  kunit_try_run_case+0x170/0x3f0
[   16.865859]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.866032]  kthread+0x328/0x630
[   16.866083]  ret_from_fork+0x10/0x20
[   16.866148] 
[   16.866216] Allocated by task 197:
[   16.866265]  kasan_save_stack+0x3c/0x68
[   16.866343]  kasan_save_track+0x20/0x40
[   16.866409]  kasan_save_alloc_info+0x40/0x58
[   16.866450]  __kasan_kmalloc+0xd4/0xd8
[   16.866486]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.866687]  ksize_uaf+0xb8/0x5f8
[   16.866747]  kunit_try_run_case+0x170/0x3f0
[   16.866817]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.866890]  kthread+0x328/0x630
[   16.866924]  ret_from_fork+0x10/0x20
[   16.866961] 
[   16.866980] Freed by task 197:
[   16.867035]  kasan_save_stack+0x3c/0x68
[   16.867103]  kasan_save_track+0x20/0x40
[   16.867218]  kasan_save_free_info+0x4c/0x78
[   16.867263]  __kasan_slab_free+0x6c/0x98
[   16.867300]  kfree+0x214/0x3c8
[   16.867359]  ksize_uaf+0x11c/0x5f8
[   16.867395]  kunit_try_run_case+0x170/0x3f0
[   16.867625]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.867798]  kthread+0x328/0x630
[   16.867923]  ret_from_fork+0x10/0x20
[   16.868077] 
[   16.868156] The buggy address belongs to the object at fff00000c5aae700
[   16.868156]  which belongs to the cache kmalloc-128 of size 128
[   16.868311] The buggy address is located 120 bytes inside of
[   16.868311]  freed 128-byte region [fff00000c5aae700, fff00000c5aae780)
[   16.868501] 
[   16.868550] The buggy address belongs to the physical page:
[   16.868582] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105aae
[   16.868634] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.868682] page_type: f5(slab)
[   16.868965] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.869050] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.869091] page dumped because: kasan: bad access detected
[   16.869323] 
[   16.869449] Memory state around the buggy address:
[   16.869621]  fff00000c5aae600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.869727]  fff00000c5aae680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.869844] >fff00000c5aae700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.869973]                                                                 ^
[   16.870058]  fff00000c5aae780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.870102]  fff00000c5aae800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.870401] ==================================================================
[   16.858106] ==================================================================
[   16.858157] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8
[   16.858217] Read of size 1 at addr fff00000c5aae700 by task kunit_try_catch/197
[   16.858272] 
[   16.858303] CPU: 1 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.858392] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.858418] Hardware name: linux,dummy-virt (DT)
[   16.858449] Call trace:
[   16.858479]  show_stack+0x20/0x38 (C)
[   16.858526]  dump_stack_lvl+0x8c/0xd0
[   16.858570]  print_report+0x118/0x5d0
[   16.858616]  kasan_report+0xdc/0x128
[   16.858659]  __asan_report_load1_noabort+0x20/0x30
[   16.858711]  ksize_uaf+0x598/0x5f8
[   16.858756]  kunit_try_run_case+0x170/0x3f0
[   16.858803]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.858864]  kthread+0x328/0x630
[   16.858905]  ret_from_fork+0x10/0x20
[   16.858952] 
[   16.858969] Allocated by task 197:
[   16.858996]  kasan_save_stack+0x3c/0x68
[   16.859045]  kasan_save_track+0x20/0x40
[   16.859089]  kasan_save_alloc_info+0x40/0x58
[   16.859129]  __kasan_kmalloc+0xd4/0xd8
[   16.859166]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.859705]  ksize_uaf+0xb8/0x5f8
[   16.859780]  kunit_try_run_case+0x170/0x3f0
[   16.859960]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.860008]  kthread+0x328/0x630
[   16.860042]  ret_from_fork+0x10/0x20
[   16.860078] 
[   16.860098] Freed by task 197:
[   16.860232]  kasan_save_stack+0x3c/0x68
[   16.860345]  kasan_save_track+0x20/0x40
[   16.860556]  kasan_save_free_info+0x4c/0x78
[   16.860671]  __kasan_slab_free+0x6c/0x98
[   16.860709]  kfree+0x214/0x3c8
[   16.860766]  ksize_uaf+0x11c/0x5f8
[   16.860831]  kunit_try_run_case+0x170/0x3f0
[   16.860869]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.861049]  kthread+0x328/0x630
[   16.861094]  ret_from_fork+0x10/0x20
[   16.861216] 
[   16.861310] The buggy address belongs to the object at fff00000c5aae700
[   16.861310]  which belongs to the cache kmalloc-128 of size 128
[   16.861470] The buggy address is located 0 bytes inside of
[   16.861470]  freed 128-byte region [fff00000c5aae700, fff00000c5aae780)
[   16.861542] 
[   16.861823] The buggy address belongs to the physical page:
[   16.861931] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105aae
[   16.862028] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.862116] page_type: f5(slab)
[   16.862224] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.862331] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.862455] page dumped because: kasan: bad access detected
[   16.862488] 
[   16.862507] Memory state around the buggy address:
[   16.862746]  fff00000c5aae600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.862882]  fff00000c5aae680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.863002] >fff00000c5aae700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.863109]                    ^
[   16.863139]  fff00000c5aae780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.863193]  fff00000c5aae800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.863418] ==================================================================

[   13.161812] ==================================================================
[   13.162737] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5fe/0x6c0
[   13.163459] Read of size 1 at addr ffff8881026b2e00 by task kunit_try_catch/213
[   13.164003] 
[   13.164098] CPU: 0 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   13.164141] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.164152] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.164172] Call Trace:
[   13.164184]  <TASK>
[   13.164198]  dump_stack_lvl+0x73/0xb0
[   13.164227]  print_report+0xd1/0x610
[   13.164248]  ? __virt_addr_valid+0x1db/0x2d0
[   13.164270]  ? ksize_uaf+0x5fe/0x6c0
[   13.164297]  ? kasan_complete_mode_report_info+0x64/0x200
[   13.164320]  ? ksize_uaf+0x5fe/0x6c0
[   13.164341]  kasan_report+0x141/0x180
[   13.164362]  ? ksize_uaf+0x5fe/0x6c0
[   13.164387]  __asan_report_load1_noabort+0x18/0x20
[   13.164413]  ksize_uaf+0x5fe/0x6c0
[   13.164433]  ? __pfx_ksize_uaf+0x10/0x10
[   13.164469]  ? __schedule+0x10cc/0x2b60
[   13.164491]  ? __pfx_read_tsc+0x10/0x10
[   13.164511]  ? ktime_get_ts64+0x86/0x230
[   13.164535]  kunit_try_run_case+0x1a5/0x480
[   13.164559]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.164583]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.164607]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.164630]  ? __kthread_parkme+0x82/0x180
[   13.164650]  ? preempt_count_sub+0x50/0x80
[   13.164674]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.164698]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.164722]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.164747]  kthread+0x337/0x6f0
[   13.164766]  ? trace_preempt_on+0x20/0xc0
[   13.164789]  ? __pfx_kthread+0x10/0x10
[   13.164930]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.164952]  ? calculate_sigpending+0x7b/0xa0
[   13.164975]  ? __pfx_kthread+0x10/0x10
[   13.164996]  ret_from_fork+0x116/0x1d0
[   13.165015]  ? __pfx_kthread+0x10/0x10
[   13.165035]  ret_from_fork_asm+0x1a/0x30
[   13.165065]  </TASK>
[   13.165075] 
[   13.174336] Allocated by task 213:
[   13.174538]  kasan_save_stack+0x45/0x70
[   13.174704]  kasan_save_track+0x18/0x40
[   13.174986]  kasan_save_alloc_info+0x3b/0x50
[   13.175465]  __kasan_kmalloc+0xb7/0xc0
[   13.175690]  __kmalloc_cache_noprof+0x189/0x420
[   13.175982]  ksize_uaf+0xaa/0x6c0
[   13.176148]  kunit_try_run_case+0x1a5/0x480
[   13.176537]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.176937]  kthread+0x337/0x6f0
[   13.177180]  ret_from_fork+0x116/0x1d0
[   13.177484]  ret_from_fork_asm+0x1a/0x30
[   13.177667] 
[   13.177842] Freed by task 213:
[   13.178083]  kasan_save_stack+0x45/0x70
[   13.178425]  kasan_save_track+0x18/0x40
[   13.178614]  kasan_save_free_info+0x3f/0x60
[   13.178976]  __kasan_slab_free+0x56/0x70
[   13.179164]  kfree+0x222/0x3f0
[   13.179325]  ksize_uaf+0x12c/0x6c0
[   13.179503]  kunit_try_run_case+0x1a5/0x480
[   13.179813]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.180049]  kthread+0x337/0x6f0
[   13.180220]  ret_from_fork+0x116/0x1d0
[   13.180384]  ret_from_fork_asm+0x1a/0x30
[   13.180617] 
[   13.181053] The buggy address belongs to the object at ffff8881026b2e00
[   13.181053]  which belongs to the cache kmalloc-128 of size 128
[   13.181608] The buggy address is located 0 bytes inside of
[   13.181608]  freed 128-byte region [ffff8881026b2e00, ffff8881026b2e80)
[   13.182303] 
[   13.182546] The buggy address belongs to the physical page:
[   13.182777] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026b2
[   13.183344] flags: 0x200000000000000(node=0|zone=2)
[   13.183614] page_type: f5(slab)
[   13.183905] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   13.184311] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.184782] page dumped because: kasan: bad access detected
[   13.185015] 
[   13.185095] Memory state around the buggy address:
[   13.185298]  ffff8881026b2d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.185874]  ffff8881026b2d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.186240] >ffff8881026b2e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.186550]                    ^
[   13.186736]  ffff8881026b2e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.187309]  ffff8881026b2f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.187778] ==================================================================
[   13.188331] ==================================================================
[   13.188902] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5e4/0x6c0
[   13.189157] Read of size 1 at addr ffff8881026b2e78 by task kunit_try_catch/213
[   13.189501] 
[   13.189799] CPU: 0 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   13.189842] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.189853] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.189932] Call Trace:
[   13.189997]  <TASK>
[   13.190011]  dump_stack_lvl+0x73/0xb0
[   13.190039]  print_report+0xd1/0x610
[   13.190060]  ? __virt_addr_valid+0x1db/0x2d0
[   13.190082]  ? ksize_uaf+0x5e4/0x6c0
[   13.190102]  ? kasan_complete_mode_report_info+0x64/0x200
[   13.190125]  ? ksize_uaf+0x5e4/0x6c0
[   13.190145]  kasan_report+0x141/0x180
[   13.190166]  ? ksize_uaf+0x5e4/0x6c0
[   13.190191]  __asan_report_load1_noabort+0x18/0x20
[   13.190216]  ksize_uaf+0x5e4/0x6c0
[   13.190236]  ? __pfx_ksize_uaf+0x10/0x10
[   13.190257]  ? __schedule+0x10cc/0x2b60
[   13.190278]  ? __pfx_read_tsc+0x10/0x10
[   13.190390]  ? ktime_get_ts64+0x86/0x230
[   13.190425]  kunit_try_run_case+0x1a5/0x480
[   13.190462]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.190485]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.190509]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.190533]  ? __kthread_parkme+0x82/0x180
[   13.190552]  ? preempt_count_sub+0x50/0x80
[   13.190595]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.190620]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.190644]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.190670]  kthread+0x337/0x6f0
[   13.190689]  ? trace_preempt_on+0x20/0xc0
[   13.190711]  ? __pfx_kthread+0x10/0x10
[   13.190731]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.190753]  ? calculate_sigpending+0x7b/0xa0
[   13.190776]  ? __pfx_kthread+0x10/0x10
[   13.190797]  ret_from_fork+0x116/0x1d0
[   13.190815]  ? __pfx_kthread+0x10/0x10
[   13.190835]  ret_from_fork_asm+0x1a/0x30
[   13.190865]  </TASK>
[   13.190874] 
[   13.200055] Allocated by task 213:
[   13.200217]  kasan_save_stack+0x45/0x70
[   13.200404]  kasan_save_track+0x18/0x40
[   13.200959]  kasan_save_alloc_info+0x3b/0x50
[   13.201217]  __kasan_kmalloc+0xb7/0xc0
[   13.201465]  __kmalloc_cache_noprof+0x189/0x420
[   13.201745]  ksize_uaf+0xaa/0x6c0
[   13.201914]  kunit_try_run_case+0x1a5/0x480
[   13.202075]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.202309]  kthread+0x337/0x6f0
[   13.202472]  ret_from_fork+0x116/0x1d0
[   13.202924]  ret_from_fork_asm+0x1a/0x30
[   13.203193] 
[   13.203343] Freed by task 213:
[   13.203517]  kasan_save_stack+0x45/0x70
[   13.203881]  kasan_save_track+0x18/0x40
[   13.204034]  kasan_save_free_info+0x3f/0x60
[   13.204242]  __kasan_slab_free+0x56/0x70
[   13.204656]  kfree+0x222/0x3f0
[   13.204809]  ksize_uaf+0x12c/0x6c0
[   13.205056]  kunit_try_run_case+0x1a5/0x480
[   13.205238]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.205750]  kthread+0x337/0x6f0
[   13.205881]  ret_from_fork+0x116/0x1d0
[   13.206076]  ret_from_fork_asm+0x1a/0x30
[   13.206374] 
[   13.206577] The buggy address belongs to the object at ffff8881026b2e00
[   13.206577]  which belongs to the cache kmalloc-128 of size 128
[   13.207092] The buggy address is located 120 bytes inside of
[   13.207092]  freed 128-byte region [ffff8881026b2e00, ffff8881026b2e80)
[   13.207778] 
[   13.207949] The buggy address belongs to the physical page:
[   13.208251] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026b2
[   13.208796] flags: 0x200000000000000(node=0|zone=2)
[   13.209036] page_type: f5(slab)
[   13.209189] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   13.209714] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.210056] page dumped because: kasan: bad access detected
[   13.210289] 
[   13.210383] Memory state around the buggy address:
[   13.210894]  ffff8881026b2d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.211197]  ffff8881026b2d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.211593] >ffff8881026b2e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.212018]                                                                 ^
[   13.212558]  ffff8881026b2e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.212971]  ffff8881026b2f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.213386] ==================================================================
[   13.130310] ==================================================================
[   13.131065] BUG: KASAN: slab-use-after-free in ksize_uaf+0x19d/0x6c0
[   13.131372] Read of size 1 at addr ffff8881026b2e00 by task kunit_try_catch/213
[   13.131882] 
[   13.132309] CPU: 0 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   13.132479] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.132493] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.132512] Call Trace:
[   13.132524]  <TASK>
[   13.132538]  dump_stack_lvl+0x73/0xb0
[   13.132583]  print_report+0xd1/0x610
[   13.132606]  ? __virt_addr_valid+0x1db/0x2d0
[   13.132629]  ? ksize_uaf+0x19d/0x6c0
[   13.132649]  ? kasan_complete_mode_report_info+0x64/0x200
[   13.132672]  ? ksize_uaf+0x19d/0x6c0
[   13.132692]  kasan_report+0x141/0x180
[   13.132714]  ? ksize_uaf+0x19d/0x6c0
[   13.132736]  ? ksize_uaf+0x19d/0x6c0
[   13.132756]  __kasan_check_byte+0x3d/0x50
[   13.132778]  ksize+0x20/0x60
[   13.132797]  ksize_uaf+0x19d/0x6c0
[   13.132817]  ? __pfx_ksize_uaf+0x10/0x10
[   13.132838]  ? __schedule+0x10cc/0x2b60
[   13.132860]  ? __pfx_read_tsc+0x10/0x10
[   13.132880]  ? ktime_get_ts64+0x86/0x230
[   13.132903]  kunit_try_run_case+0x1a5/0x480
[   13.132927]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.132950]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.132974]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.132997]  ? __kthread_parkme+0x82/0x180
[   13.133018]  ? preempt_count_sub+0x50/0x80
[   13.133041]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.133065]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.133089]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.133114]  kthread+0x337/0x6f0
[   13.133133]  ? trace_preempt_on+0x20/0xc0
[   13.133155]  ? __pfx_kthread+0x10/0x10
[   13.133175]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.133196]  ? calculate_sigpending+0x7b/0xa0
[   13.133220]  ? __pfx_kthread+0x10/0x10
[   13.133241]  ret_from_fork+0x116/0x1d0
[   13.133259]  ? __pfx_kthread+0x10/0x10
[   13.133279]  ret_from_fork_asm+0x1a/0x30
[   13.133309]  </TASK>
[   13.133319] 
[   13.145887] Allocated by task 213:
[   13.146052]  kasan_save_stack+0x45/0x70
[   13.146258]  kasan_save_track+0x18/0x40
[   13.146443]  kasan_save_alloc_info+0x3b/0x50
[   13.147659]  __kasan_kmalloc+0xb7/0xc0
[   13.148286]  __kmalloc_cache_noprof+0x189/0x420
[   13.148490]  ksize_uaf+0xaa/0x6c0
[   13.148617]  kunit_try_run_case+0x1a5/0x480
[   13.148763]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.148940]  kthread+0x337/0x6f0
[   13.149060]  ret_from_fork+0x116/0x1d0
[   13.149191]  ret_from_fork_asm+0x1a/0x30
[   13.149331] 
[   13.149403] Freed by task 213:
[   13.150284]  kasan_save_stack+0x45/0x70
[   13.150541]  kasan_save_track+0x18/0x40
[   13.150741]  kasan_save_free_info+0x3f/0x60
[   13.150950]  __kasan_slab_free+0x56/0x70
[   13.151153]  kfree+0x222/0x3f0
[   13.151357]  ksize_uaf+0x12c/0x6c0
[   13.151710]  kunit_try_run_case+0x1a5/0x480
[   13.151903]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.152097]  kthread+0x337/0x6f0
[   13.152217]  ret_from_fork+0x116/0x1d0
[   13.152353]  ret_from_fork_asm+0x1a/0x30
[   13.152633] 
[   13.152740] The buggy address belongs to the object at ffff8881026b2e00
[   13.152740]  which belongs to the cache kmalloc-128 of size 128
[   13.153298] The buggy address is located 0 bytes inside of
[   13.153298]  freed 128-byte region [ffff8881026b2e00, ffff8881026b2e80)
[   13.154305] 
[   13.154486] The buggy address belongs to the physical page:
[   13.154884] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026b2
[   13.155227] flags: 0x200000000000000(node=0|zone=2)
[   13.155978] page_type: f5(slab)
[   13.156135] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   13.156429] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.156931] page dumped because: kasan: bad access detected
[   13.157304] 
[   13.157390] Memory state around the buggy address:
[   13.157696]  ffff8881026b2d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.158309]  ffff8881026b2d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.158845] >ffff8881026b2e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.159540]                    ^
[   13.159959]  ffff8881026b2e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.160183]  ffff8881026b2f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.160495] ==================================================================

[   13.363091] ==================================================================
[   13.363431] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5fe/0x6c0
[   13.363906] Read of size 1 at addr ffff888102594600 by task kunit_try_catch/214
[   13.364173] 
[   13.364326] CPU: 0 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   13.364368] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.364379] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.364399] Call Trace:
[   13.364410]  <TASK>
[   13.364424]  dump_stack_lvl+0x73/0xb0
[   13.364456]  print_report+0xd1/0x610
[   13.364479]  ? __virt_addr_valid+0x1db/0x2d0
[   13.364501]  ? ksize_uaf+0x5fe/0x6c0
[   13.364531]  ? kasan_complete_mode_report_info+0x64/0x200
[   13.364555]  ? ksize_uaf+0x5fe/0x6c0
[   13.364575]  kasan_report+0x141/0x180
[   13.364597]  ? ksize_uaf+0x5fe/0x6c0
[   13.364622]  __asan_report_load1_noabort+0x18/0x20
[   13.364647]  ksize_uaf+0x5fe/0x6c0
[   13.364667]  ? __pfx_ksize_uaf+0x10/0x10
[   13.364688]  ? __schedule+0x10cc/0x2b60
[   13.364712]  ? __pfx_read_tsc+0x10/0x10
[   13.364732]  ? ktime_get_ts64+0x86/0x230
[   13.364757]  kunit_try_run_case+0x1a5/0x480
[   13.364782]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.364805]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.364830]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.364854]  ? __kthread_parkme+0x82/0x180
[   13.364875]  ? preempt_count_sub+0x50/0x80
[   13.364899]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.364923]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.364948]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.364973]  kthread+0x337/0x6f0
[   13.364992]  ? trace_preempt_on+0x20/0xc0
[   13.365015]  ? __pfx_kthread+0x10/0x10
[   13.365035]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.365077]  ? calculate_sigpending+0x7b/0xa0
[   13.365102]  ? __pfx_kthread+0x10/0x10
[   13.365123]  ret_from_fork+0x116/0x1d0
[   13.365142]  ? __pfx_kthread+0x10/0x10
[   13.365163]  ret_from_fork_asm+0x1a/0x30
[   13.365193]  </TASK>
[   13.365202] 
[   13.377995] Allocated by task 214:
[   13.378276]  kasan_save_stack+0x45/0x70
[   13.378700]  kasan_save_track+0x18/0x40
[   13.379129]  kasan_save_alloc_info+0x3b/0x50
[   13.379569]  __kasan_kmalloc+0xb7/0xc0
[   13.379717]  __kmalloc_cache_noprof+0x189/0x420
[   13.379873]  ksize_uaf+0xaa/0x6c0
[   13.379994]  kunit_try_run_case+0x1a5/0x480
[   13.380424]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.380942]  kthread+0x337/0x6f0
[   13.381306]  ret_from_fork+0x116/0x1d0
[   13.381687]  ret_from_fork_asm+0x1a/0x30
[   13.382089] 
[   13.382321] Freed by task 214:
[   13.382633]  kasan_save_stack+0x45/0x70
[   13.382786]  kasan_save_track+0x18/0x40
[   13.382922]  kasan_save_free_info+0x3f/0x60
[   13.383082]  __kasan_slab_free+0x56/0x70
[   13.383493]  kfree+0x222/0x3f0
[   13.383804]  ksize_uaf+0x12c/0x6c0
[   13.384180]  kunit_try_run_case+0x1a5/0x480
[   13.384588]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.385087]  kthread+0x337/0x6f0
[   13.385442]  ret_from_fork+0x116/0x1d0
[   13.385813]  ret_from_fork_asm+0x1a/0x30
[   13.386188] 
[   13.386262] The buggy address belongs to the object at ffff888102594600
[   13.386262]  which belongs to the cache kmalloc-128 of size 128
[   13.386621] The buggy address is located 0 bytes inside of
[   13.386621]  freed 128-byte region [ffff888102594600, ffff888102594680)
[   13.386975] 
[   13.387048] The buggy address belongs to the physical page:
[   13.387259] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102594
[   13.387587] flags: 0x200000000000000(node=0|zone=2)
[   13.387825] page_type: f5(slab)
[   13.387973] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   13.388313] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.388542] page dumped because: kasan: bad access detected
[   13.388779] 
[   13.388872] Memory state around the buggy address:
[   13.389163]  ffff888102594500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.389488]  ffff888102594580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.389880] >ffff888102594600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.390221]                    ^
[   13.390401]  ffff888102594680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.390729]  ffff888102594700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.391020] ==================================================================
[   13.335760] ==================================================================
[   13.336379] BUG: KASAN: slab-use-after-free in ksize_uaf+0x19d/0x6c0
[   13.336676] Read of size 1 at addr ffff888102594600 by task kunit_try_catch/214
[   13.337060] 
[   13.337159] CPU: 0 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   13.337201] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.337212] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.337230] Call Trace:
[   13.337242]  <TASK>
[   13.337257]  dump_stack_lvl+0x73/0xb0
[   13.337289]  print_report+0xd1/0x610
[   13.337311]  ? __virt_addr_valid+0x1db/0x2d0
[   13.337334]  ? ksize_uaf+0x19d/0x6c0
[   13.337355]  ? kasan_complete_mode_report_info+0x64/0x200
[   13.337378]  ? ksize_uaf+0x19d/0x6c0
[   13.337410]  kasan_report+0x141/0x180
[   13.337444]  ? ksize_uaf+0x19d/0x6c0
[   13.337467]  ? ksize_uaf+0x19d/0x6c0
[   13.337488]  __kasan_check_byte+0x3d/0x50
[   13.337521]  ksize+0x20/0x60
[   13.337542]  ksize_uaf+0x19d/0x6c0
[   13.337563]  ? __pfx_ksize_uaf+0x10/0x10
[   13.337585]  ? __schedule+0x10cc/0x2b60
[   13.337608]  ? __pfx_read_tsc+0x10/0x10
[   13.337629]  ? ktime_get_ts64+0x86/0x230
[   13.337652]  kunit_try_run_case+0x1a5/0x480
[   13.337677]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.337748]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.337774]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.337800]  ? __kthread_parkme+0x82/0x180
[   13.337820]  ? preempt_count_sub+0x50/0x80
[   13.337844]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.337868]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.337893]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.337919]  kthread+0x337/0x6f0
[   13.337938]  ? trace_preempt_on+0x20/0xc0
[   13.337962]  ? __pfx_kthread+0x10/0x10
[   13.337982]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.338005]  ? calculate_sigpending+0x7b/0xa0
[   13.338030]  ? __pfx_kthread+0x10/0x10
[   13.338062]  ret_from_fork+0x116/0x1d0
[   13.338081]  ? __pfx_kthread+0x10/0x10
[   13.338102]  ret_from_fork_asm+0x1a/0x30
[   13.338132]  </TASK>
[   13.338142] 
[   13.345733] Allocated by task 214:
[   13.346071]  kasan_save_stack+0x45/0x70
[   13.346318]  kasan_save_track+0x18/0x40
[   13.346552]  kasan_save_alloc_info+0x3b/0x50
[   13.346929]  __kasan_kmalloc+0xb7/0xc0
[   13.347115]  __kmalloc_cache_noprof+0x189/0x420
[   13.347338]  ksize_uaf+0xaa/0x6c0
[   13.347466]  kunit_try_run_case+0x1a5/0x480
[   13.347707]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.347990]  kthread+0x337/0x6f0
[   13.348616]  ret_from_fork+0x116/0x1d0
[   13.348871]  ret_from_fork_asm+0x1a/0x30
[   13.349044] 
[   13.349163] Freed by task 214:
[   13.349346]  kasan_save_stack+0x45/0x70
[   13.349546]  kasan_save_track+0x18/0x40
[   13.350176]  kasan_save_free_info+0x3f/0x60
[   13.350408]  __kasan_slab_free+0x56/0x70
[   13.350587]  kfree+0x222/0x3f0
[   13.352714]  ksize_uaf+0x12c/0x6c0
[   13.352888]  kunit_try_run_case+0x1a5/0x480
[   13.353117]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.354029]  kthread+0x337/0x6f0
[   13.354245]  ret_from_fork+0x116/0x1d0
[   13.354412]  ret_from_fork_asm+0x1a/0x30
[   13.354594] 
[   13.354680] The buggy address belongs to the object at ffff888102594600
[   13.354680]  which belongs to the cache kmalloc-128 of size 128
[   13.356546] The buggy address is located 0 bytes inside of
[   13.356546]  freed 128-byte region [ffff888102594600, ffff888102594680)
[   13.356905] 
[   13.356979] The buggy address belongs to the physical page:
[   13.357163] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102594
[   13.357397] flags: 0x200000000000000(node=0|zone=2)
[   13.357555] page_type: f5(slab)
[   13.357673] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   13.358467] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.358722] page dumped because: kasan: bad access detected
[   13.358975] 
[   13.359515] Memory state around the buggy address:
[   13.359681]  ffff888102594500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.359975]  ffff888102594580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.360264] >ffff888102594600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.360514]                    ^
[   13.361118]  ffff888102594680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.361464]  ffff888102594700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.361796] ==================================================================
[   13.391855] ==================================================================
[   13.392246] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5e4/0x6c0
[   13.392469] Read of size 1 at addr ffff888102594678 by task kunit_try_catch/214
[   13.393034] 
[   13.393190] CPU: 0 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   13.393268] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.393281] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.393301] Call Trace:
[   13.393328]  <TASK>
[   13.393344]  dump_stack_lvl+0x73/0xb0
[   13.393376]  print_report+0xd1/0x610
[   13.393398]  ? __virt_addr_valid+0x1db/0x2d0
[   13.393421]  ? ksize_uaf+0x5e4/0x6c0
[   13.393441]  ? kasan_complete_mode_report_info+0x64/0x200
[   13.393464]  ? ksize_uaf+0x5e4/0x6c0
[   13.393485]  kasan_report+0x141/0x180
[   13.393506]  ? ksize_uaf+0x5e4/0x6c0
[   13.393564]  __asan_report_load1_noabort+0x18/0x20
[   13.393589]  ksize_uaf+0x5e4/0x6c0
[   13.393647]  ? __pfx_ksize_uaf+0x10/0x10
[   13.393680]  ? __schedule+0x10cc/0x2b60
[   13.393713]  ? __pfx_read_tsc+0x10/0x10
[   13.393735]  ? ktime_get_ts64+0x86/0x230
[   13.393759]  kunit_try_run_case+0x1a5/0x480
[   13.393784]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.393807]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.393832]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.393856]  ? __kthread_parkme+0x82/0x180
[   13.393877]  ? preempt_count_sub+0x50/0x80
[   13.393901]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.393925]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.393949]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.393974]  kthread+0x337/0x6f0
[   13.393993]  ? trace_preempt_on+0x20/0xc0
[   13.394017]  ? __pfx_kthread+0x10/0x10
[   13.394037]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.394068]  ? calculate_sigpending+0x7b/0xa0
[   13.394093]  ? __pfx_kthread+0x10/0x10
[   13.394134]  ret_from_fork+0x116/0x1d0
[   13.394154]  ? __pfx_kthread+0x10/0x10
[   13.394174]  ret_from_fork_asm+0x1a/0x30
[   13.394206]  </TASK>
[   13.394216] 
[   13.401092] Allocated by task 214:
[   13.401293]  kasan_save_stack+0x45/0x70
[   13.401496]  kasan_save_track+0x18/0x40
[   13.401690]  kasan_save_alloc_info+0x3b/0x50
[   13.401846]  __kasan_kmalloc+0xb7/0xc0
[   13.402122]  __kmalloc_cache_noprof+0x189/0x420
[   13.402376]  ksize_uaf+0xaa/0x6c0
[   13.402521]  kunit_try_run_case+0x1a5/0x480
[   13.402765]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.402947]  kthread+0x337/0x6f0
[   13.403079]  ret_from_fork+0x116/0x1d0
[   13.403233]  ret_from_fork_asm+0x1a/0x30
[   13.403374] 
[   13.403447] Freed by task 214:
[   13.403605]  kasan_save_stack+0x45/0x70
[   13.403850]  kasan_save_track+0x18/0x40
[   13.404048]  kasan_save_free_info+0x3f/0x60
[   13.404291]  __kasan_slab_free+0x56/0x70
[   13.404492]  kfree+0x222/0x3f0
[   13.404657]  ksize_uaf+0x12c/0x6c0
[   13.404896]  kunit_try_run_case+0x1a5/0x480
[   13.405203]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.405460]  kthread+0x337/0x6f0
[   13.405628]  ret_from_fork+0x116/0x1d0
[   13.405825]  ret_from_fork_asm+0x1a/0x30
[   13.405966] 
[   13.406037] The buggy address belongs to the object at ffff888102594600
[   13.406037]  which belongs to the cache kmalloc-128 of size 128
[   13.406507] The buggy address is located 120 bytes inside of
[   13.406507]  freed 128-byte region [ffff888102594600, ffff888102594680)
[   13.407097] 
[   13.407215] The buggy address belongs to the physical page:
[   13.407529] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102594
[   13.407982] flags: 0x200000000000000(node=0|zone=2)
[   13.408271] page_type: f5(slab)
[   13.408397] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   13.408628] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.408853] page dumped because: kasan: bad access detected
[   13.409023] 
[   13.409102] Memory state around the buggy address:
[   13.409273]  ffff888102594500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.409488]  ffff888102594580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.409706] >ffff888102594600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.410003]                                                                 ^
[   13.410320]  ffff888102594680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.410632]  ffff888102594700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.410986] ==================================================================