Hay
Date
July 20, 2025, 11:12 p.m.

Environment
qemu-arm64
qemu-x86_64

[   16.859478] ==================================================================
[   16.859549] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8
[   16.859601] Read of size 1 at addr fff00000c3edda00 by task kunit_try_catch/196
[   16.860138] 
[   16.860229] CPU: 1 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   16.860323] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.860469] Hardware name: linux,dummy-virt (DT)
[   16.860536] Call trace:
[   16.860561]  show_stack+0x20/0x38 (C)
[   16.860785]  dump_stack_lvl+0x8c/0xd0
[   16.860989]  print_report+0x118/0x5d0
[   16.861088]  kasan_report+0xdc/0x128
[   16.861279]  __asan_report_load1_noabort+0x20/0x30
[   16.861434]  ksize_uaf+0x598/0x5f8
[   16.861479]  kunit_try_run_case+0x170/0x3f0
[   16.861643]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.861805]  kthread+0x328/0x630
[   16.861919]  ret_from_fork+0x10/0x20
[   16.862099] 
[   16.862342] Allocated by task 196:
[   16.862396]  kasan_save_stack+0x3c/0x68
[   16.862504]  kasan_save_track+0x20/0x40
[   16.862545]  kasan_save_alloc_info+0x40/0x58
[   16.862586]  __kasan_kmalloc+0xd4/0xd8
[   16.862622]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.862683]  ksize_uaf+0xb8/0x5f8
[   16.862719]  kunit_try_run_case+0x170/0x3f0
[   16.862764]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.862808]  kthread+0x328/0x630
[   16.862842]  ret_from_fork+0x10/0x20
[   16.862879] 
[   16.862917] Freed by task 196:
[   16.862946]  kasan_save_stack+0x3c/0x68
[   16.862983]  kasan_save_track+0x20/0x40
[   16.863020]  kasan_save_free_info+0x4c/0x78
[   16.863074]  __kasan_slab_free+0x6c/0x98
[   16.863112]  kfree+0x214/0x3c8
[   16.863155]  ksize_uaf+0x11c/0x5f8
[   16.863188]  kunit_try_run_case+0x170/0x3f0
[   16.863226]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.863269]  kthread+0x328/0x630
[   16.863309]  ret_from_fork+0x10/0x20
[   16.863345] 
[   16.863364] The buggy address belongs to the object at fff00000c3edda00
[   16.863364]  which belongs to the cache kmalloc-128 of size 128
[   16.863438] The buggy address is located 0 bytes inside of
[   16.863438]  freed 128-byte region [fff00000c3edda00, fff00000c3edda80)
[   16.863509] 
[   16.863540] The buggy address belongs to the physical page:
[   16.863573] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103edd
[   16.863639] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.863697] page_type: f5(slab)
[   16.863735] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.863786] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.863828] page dumped because: kasan: bad access detected
[   16.863878] 
[   16.863912] Memory state around the buggy address:
[   16.864262]  fff00000c3edd900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.864422]  fff00000c3edd980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.864540] >fff00000c3edda00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.865090]                    ^
[   16.865206]  fff00000c3edda80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.865265]  fff00000c3eddb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.865462] ==================================================================
[   16.867126] ==================================================================
[   16.867248] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8
[   16.867343] Read of size 1 at addr fff00000c3edda78 by task kunit_try_catch/196
[   16.867433] 
[   16.867468] CPU: 1 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   16.867714] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.867941] Hardware name: linux,dummy-virt (DT)
[   16.867984] Call trace:
[   16.868016]  show_stack+0x20/0x38 (C)
[   16.868074]  dump_stack_lvl+0x8c/0xd0
[   16.868157]  print_report+0x118/0x5d0
[   16.868280]  kasan_report+0xdc/0x128
[   16.868589]  __asan_report_load1_noabort+0x20/0x30
[   16.868657]  ksize_uaf+0x544/0x5f8
[   16.868712]  kunit_try_run_case+0x170/0x3f0
[   16.868983]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.869190]  kthread+0x328/0x630
[   16.869276]  ret_from_fork+0x10/0x20
[   16.869330] 
[   16.869348] Allocated by task 196:
[   16.869446]  kasan_save_stack+0x3c/0x68
[   16.869491]  kasan_save_track+0x20/0x40
[   16.869547]  kasan_save_alloc_info+0x40/0x58
[   16.869628]  __kasan_kmalloc+0xd4/0xd8
[   16.869742]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.870106]  ksize_uaf+0xb8/0x5f8
[   16.870182]  kunit_try_run_case+0x170/0x3f0
[   16.870260]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.870517]  kthread+0x328/0x630
[   16.870682]  ret_from_fork+0x10/0x20
[   16.870792] 
[   16.870814] Freed by task 196:
[   16.870843]  kasan_save_stack+0x3c/0x68
[   16.870882]  kasan_save_track+0x20/0x40
[   16.871207]  kasan_save_free_info+0x4c/0x78
[   16.871379]  __kasan_slab_free+0x6c/0x98
[   16.871575]  kfree+0x214/0x3c8
[   16.871667]  ksize_uaf+0x11c/0x5f8
[   16.871702]  kunit_try_run_case+0x170/0x3f0
[   16.871739]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.871785]  kthread+0x328/0x630
[   16.871817]  ret_from_fork+0x10/0x20
[   16.871856] 
[   16.871891] The buggy address belongs to the object at fff00000c3edda00
[   16.871891]  which belongs to the cache kmalloc-128 of size 128
[   16.871973] The buggy address is located 120 bytes inside of
[   16.871973]  freed 128-byte region [fff00000c3edda00, fff00000c3edda80)
[   16.872052] 
[   16.872073] The buggy address belongs to the physical page:
[   16.872127] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103edd
[   16.872190] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.872242] page_type: f5(slab)
[   16.872280] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.872331] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.872374] page dumped because: kasan: bad access detected
[   16.872407] 
[   16.872426] Memory state around the buggy address:
[   16.872476]  fff00000c3edd900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.872715]  fff00000c3edd980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.872965] >fff00000c3edda00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.873071]                                                                 ^
[   16.873136]  fff00000c3edda80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.873200]  fff00000c3eddb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.873572] ==================================================================
[   16.848599] ==================================================================
[   16.848716] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8
[   16.848832] Read of size 1 at addr fff00000c3edda00 by task kunit_try_catch/196
[   16.848952] 
[   16.848995] CPU: 1 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   16.849220] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.849301] Hardware name: linux,dummy-virt (DT)
[   16.849427] Call trace:
[   16.849569]  show_stack+0x20/0x38 (C)
[   16.849660]  dump_stack_lvl+0x8c/0xd0
[   16.849709]  print_report+0x118/0x5d0
[   16.850059]  kasan_report+0xdc/0x128
[   16.850206]  __kasan_check_byte+0x54/0x70
[   16.850333]  ksize+0x30/0x88
[   16.850553]  ksize_uaf+0x168/0x5f8
[   16.850598]  kunit_try_run_case+0x170/0x3f0
[   16.850657]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.850709]  kthread+0x328/0x630
[   16.850752]  ret_from_fork+0x10/0x20
[   16.850802] 
[   16.850820] Allocated by task 196:
[   16.851124]  kasan_save_stack+0x3c/0x68
[   16.851359]  kasan_save_track+0x20/0x40
[   16.851496]  kasan_save_alloc_info+0x40/0x58
[   16.851977]  __kasan_kmalloc+0xd4/0xd8
[   16.852067]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.852120]  ksize_uaf+0xb8/0x5f8
[   16.852198]  kunit_try_run_case+0x170/0x3f0
[   16.852238]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.852284]  kthread+0x328/0x630
[   16.852317]  ret_from_fork+0x10/0x20
[   16.852355] 
[   16.852376] Freed by task 196:
[   16.852430]  kasan_save_stack+0x3c/0x68
[   16.852488]  kasan_save_track+0x20/0x40
[   16.852525]  kasan_save_free_info+0x4c/0x78
[   16.852565]  __kasan_slab_free+0x6c/0x98
[   16.852607]  kfree+0x214/0x3c8
[   16.852650]  ksize_uaf+0x11c/0x5f8
[   16.852699]  kunit_try_run_case+0x170/0x3f0
[   16.852743]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.852788]  kthread+0x328/0x630
[   16.852819]  ret_from_fork+0x10/0x20
[   16.852858] 
[   16.852888] The buggy address belongs to the object at fff00000c3edda00
[   16.852888]  which belongs to the cache kmalloc-128 of size 128
[   16.853560] The buggy address is located 0 bytes inside of
[   16.853560]  freed 128-byte region [fff00000c3edda00, fff00000c3edda80)
[   16.853851] 
[   16.854115] The buggy address belongs to the physical page:
[   16.854200] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103edd
[   16.854816] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.854879] page_type: f5(slab)
[   16.855310] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.855425] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.855538] page dumped because: kasan: bad access detected
[   16.855619] 
[   16.855778] Memory state around the buggy address:
[   16.855850]  fff00000c3edd900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.856100]  fff00000c3edd980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.856460] >fff00000c3edda00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.856541]                    ^
[   16.856595]  fff00000c3edda80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.856753]  fff00000c3eddb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.856848] ==================================================================

[   16.788822] ==================================================================
[   16.788918] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8
[   16.789038] Read of size 1 at addr fff00000c58dce00 by task kunit_try_catch/196
[   16.789347] 
[   16.789426] CPU: 1 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   16.789534] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.789606] Hardware name: linux,dummy-virt (DT)
[   16.789716] Call trace:
[   16.789775]  show_stack+0x20/0x38 (C)
[   16.789878]  dump_stack_lvl+0x8c/0xd0
[   16.789933]  print_report+0x118/0x5d0
[   16.790000]  kasan_report+0xdc/0x128
[   16.790355]  __kasan_check_byte+0x54/0x70
[   16.790503]  ksize+0x30/0x88
[   16.790599]  ksize_uaf+0x168/0x5f8
[   16.790721]  kunit_try_run_case+0x170/0x3f0
[   16.790828]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.790930]  kthread+0x328/0x630
[   16.791025]  ret_from_fork+0x10/0x20
[   16.791368] 
[   16.791471] Allocated by task 196:
[   16.791551]  kasan_save_stack+0x3c/0x68
[   16.791648]  kasan_save_track+0x20/0x40
[   16.791807]  kasan_save_alloc_info+0x40/0x58
[   16.791896]  __kasan_kmalloc+0xd4/0xd8
[   16.791943]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.791984]  ksize_uaf+0xb8/0x5f8
[   16.792018]  kunit_try_run_case+0x170/0x3f0
[   16.792066]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.792111]  kthread+0x328/0x630
[   16.792143]  ret_from_fork+0x10/0x20
[   16.792189] 
[   16.792219] Freed by task 196:
[   16.792245]  kasan_save_stack+0x3c/0x68
[   16.792287]  kasan_save_track+0x20/0x40
[   16.792324]  kasan_save_free_info+0x4c/0x78
[   16.792366]  __kasan_slab_free+0x6c/0x98
[   16.792403]  kfree+0x214/0x3c8
[   16.792447]  ksize_uaf+0x11c/0x5f8
[   16.792491]  kunit_try_run_case+0x170/0x3f0
[   16.792535]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.792593]  kthread+0x328/0x630
[   16.792635]  ret_from_fork+0x10/0x20
[   16.792670] 
[   16.792689] The buggy address belongs to the object at fff00000c58dce00
[   16.792689]  which belongs to the cache kmalloc-128 of size 128
[   16.792749] The buggy address is located 0 bytes inside of
[   16.792749]  freed 128-byte region [fff00000c58dce00, fff00000c58dce80)
[   16.792813] 
[   16.792833] The buggy address belongs to the physical page:
[   16.793146] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058dc
[   16.793295] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.793409] page_type: f5(slab)
[   16.793466] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.793537] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.793678] page dumped because: kasan: bad access detected
[   16.793724] 
[   16.793742] Memory state around the buggy address:
[   16.793799]  fff00000c58dcd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.793845]  fff00000c58dcd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.793920] >fff00000c58dce00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.793960]                    ^
[   16.793988]  fff00000c58dce80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.794068]  fff00000c58dcf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.794233] ==================================================================
[   16.800509] ==================================================================
[   16.800555] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8
[   16.800853] Read of size 1 at addr fff00000c58dce78 by task kunit_try_catch/196
[   16.801038] 
[   16.801090] CPU: 1 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   16.801217] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.801285] Hardware name: linux,dummy-virt (DT)
[   16.801316] Call trace:
[   16.801338]  show_stack+0x20/0x38 (C)
[   16.801526]  dump_stack_lvl+0x8c/0xd0
[   16.801683]  print_report+0x118/0x5d0
[   16.801871]  kasan_report+0xdc/0x128
[   16.802014]  __asan_report_load1_noabort+0x20/0x30
[   16.802106]  ksize_uaf+0x544/0x5f8
[   16.802211]  kunit_try_run_case+0x170/0x3f0
[   16.802317]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.802402]  kthread+0x328/0x630
[   16.802466]  ret_from_fork+0x10/0x20
[   16.802553] 
[   16.802595] Allocated by task 196:
[   16.802654]  kasan_save_stack+0x3c/0x68
[   16.802760]  kasan_save_track+0x20/0x40
[   16.802842]  kasan_save_alloc_info+0x40/0x58
[   16.802881]  __kasan_kmalloc+0xd4/0xd8
[   16.802968]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.803010]  ksize_uaf+0xb8/0x5f8
[   16.803044]  kunit_try_run_case+0x170/0x3f0
[   16.803083]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.803312]  kthread+0x328/0x630
[   16.803422]  ret_from_fork+0x10/0x20
[   16.803548] 
[   16.803648] Freed by task 196:
[   16.803755]  kasan_save_stack+0x3c/0x68
[   16.803843]  kasan_save_track+0x20/0x40
[   16.803985]  kasan_save_free_info+0x4c/0x78
[   16.804097]  __kasan_slab_free+0x6c/0x98
[   16.804159]  kfree+0x214/0x3c8
[   16.804195]  ksize_uaf+0x11c/0x5f8
[   16.804441]  kunit_try_run_case+0x170/0x3f0
[   16.804520]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.804661]  kthread+0x328/0x630
[   16.804730]  ret_from_fork+0x10/0x20
[   16.804803] 
[   16.804894] The buggy address belongs to the object at fff00000c58dce00
[   16.804894]  which belongs to the cache kmalloc-128 of size 128
[   16.805050] The buggy address is located 120 bytes inside of
[   16.805050]  freed 128-byte region [fff00000c58dce00, fff00000c58dce80)
[   16.805149] 
[   16.805197] The buggy address belongs to the physical page:
[   16.805229] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058dc
[   16.805299] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.805697] page_type: f5(slab)
[   16.805755] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.806099] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.806239] page dumped because: kasan: bad access detected
[   16.806355] 
[   16.806442] Memory state around the buggy address:
[   16.806556]  fff00000c58dcd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.806640]  fff00000c58dcd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.806686] >fff00000c58dce00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.806957]                                                                 ^
[   16.807048]  fff00000c58dce80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.807163]  fff00000c58dcf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.807253] ==================================================================
[   16.795350] ==================================================================
[   16.795401] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8
[   16.795589] Read of size 1 at addr fff00000c58dce00 by task kunit_try_catch/196
[   16.795696] 
[   16.795763] CPU: 1 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   16.795864] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.795949] Hardware name: linux,dummy-virt (DT)
[   16.795998] Call trace:
[   16.796047]  show_stack+0x20/0x38 (C)
[   16.796097]  dump_stack_lvl+0x8c/0xd0
[   16.796160]  print_report+0x118/0x5d0
[   16.796225]  kasan_report+0xdc/0x128
[   16.796328]  __asan_report_load1_noabort+0x20/0x30
[   16.796381]  ksize_uaf+0x598/0x5f8
[   16.796425]  kunit_try_run_case+0x170/0x3f0
[   16.796472]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.796651]  kthread+0x328/0x630
[   16.796805]  ret_from_fork+0x10/0x20
[   16.796911] 
[   16.796971] Allocated by task 196:
[   16.797005]  kasan_save_stack+0x3c/0x68
[   16.797083]  kasan_save_track+0x20/0x40
[   16.797194]  kasan_save_alloc_info+0x40/0x58
[   16.797257]  __kasan_kmalloc+0xd4/0xd8
[   16.797295]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.797334]  ksize_uaf+0xb8/0x5f8
[   16.797368]  kunit_try_run_case+0x170/0x3f0
[   16.797407]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.797451]  kthread+0x328/0x630
[   16.797605]  ret_from_fork+0x10/0x20
[   16.797703] 
[   16.797735] Freed by task 196:
[   16.797879]  kasan_save_stack+0x3c/0x68
[   16.798059]  kasan_save_track+0x20/0x40
[   16.798149]  kasan_save_free_info+0x4c/0x78
[   16.798235]  __kasan_slab_free+0x6c/0x98
[   16.798361]  kfree+0x214/0x3c8
[   16.798429]  ksize_uaf+0x11c/0x5f8
[   16.798559]  kunit_try_run_case+0x170/0x3f0
[   16.798626]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.798870]  kthread+0x328/0x630
[   16.799198]  ret_from_fork+0x10/0x20
[   16.799296] 
[   16.799358] The buggy address belongs to the object at fff00000c58dce00
[   16.799358]  which belongs to the cache kmalloc-128 of size 128
[   16.799429] The buggy address is located 0 bytes inside of
[   16.799429]  freed 128-byte region [fff00000c58dce00, fff00000c58dce80)
[   16.799500] 
[   16.799519] The buggy address belongs to the physical page:
[   16.799565] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058dc
[   16.799630] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.799678] page_type: f5(slab)
[   16.799729] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.799788] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.799828] page dumped because: kasan: bad access detected
[   16.799872] 
[   16.799890] Memory state around the buggy address:
[   16.799923]  fff00000c58dcd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.799975]  fff00000c58dcd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.800021] >fff00000c58dce00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.800071]                    ^
[   16.800099]  fff00000c58dce80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.800152]  fff00000c58dcf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.800206] ==================================================================

[   13.119737] ==================================================================
[   13.120776] BUG: KASAN: slab-use-after-free in ksize_uaf+0x19d/0x6c0
[   13.121003] Read of size 1 at addr ffff88810313a800 by task kunit_try_catch/214
[   13.121240] 
[   13.121331] CPU: 0 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   13.121374] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.121386] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.121448] Call Trace:
[   13.121462]  <TASK>
[   13.121478]  dump_stack_lvl+0x73/0xb0
[   13.121507]  print_report+0xd1/0x610
[   13.121529]  ? __virt_addr_valid+0x1db/0x2d0
[   13.121552]  ? ksize_uaf+0x19d/0x6c0
[   13.121579]  ? kasan_complete_mode_report_info+0x64/0x200
[   13.121600]  ? ksize_uaf+0x19d/0x6c0
[   13.121621]  kasan_report+0x141/0x180
[   13.121642]  ? ksize_uaf+0x19d/0x6c0
[   13.121666]  ? ksize_uaf+0x19d/0x6c0
[   13.121686]  __kasan_check_byte+0x3d/0x50
[   13.121707]  ksize+0x20/0x60
[   13.121727]  ksize_uaf+0x19d/0x6c0
[   13.121747]  ? __pfx_ksize_uaf+0x10/0x10
[   13.121768]  ? __schedule+0x2079/0x2b60
[   13.121790]  ? __pfx_read_tsc+0x10/0x10
[   13.121830]  ? ktime_get_ts64+0x86/0x230
[   13.121855]  kunit_try_run_case+0x1a5/0x480
[   13.121890]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.121912]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.121935]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.121958]  ? __kthread_parkme+0x82/0x180
[   13.121978]  ? preempt_count_sub+0x50/0x80
[   13.122002]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.122042]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.122064]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.122087]  kthread+0x337/0x6f0
[   13.122106]  ? trace_preempt_on+0x20/0xc0
[   13.122129]  ? __pfx_kthread+0x10/0x10
[   13.122149]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.122169]  ? calculate_sigpending+0x7b/0xa0
[   13.122192]  ? __pfx_kthread+0x10/0x10
[   13.122213]  ret_from_fork+0x116/0x1d0
[   13.122230]  ? __pfx_kthread+0x10/0x10
[   13.122251]  ret_from_fork_asm+0x1a/0x30
[   13.122292]  </TASK>
[   13.122302] 
[   13.136466] Allocated by task 214:
[   13.136932]  kasan_save_stack+0x45/0x70
[   13.137438]  kasan_save_track+0x18/0x40
[   13.137923]  kasan_save_alloc_info+0x3b/0x50
[   13.138515]  __kasan_kmalloc+0xb7/0xc0
[   13.138915]  __kmalloc_cache_noprof+0x189/0x420
[   13.139621]  ksize_uaf+0xaa/0x6c0
[   13.139995]  kunit_try_run_case+0x1a5/0x480
[   13.140458]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.140773]  kthread+0x337/0x6f0
[   13.141179]  ret_from_fork+0x116/0x1d0
[   13.141576]  ret_from_fork_asm+0x1a/0x30
[   13.141729] 
[   13.141801] Freed by task 214:
[   13.141912]  kasan_save_stack+0x45/0x70
[   13.142147]  kasan_save_track+0x18/0x40
[   13.142622]  kasan_save_free_info+0x3f/0x60
[   13.143058]  __kasan_slab_free+0x56/0x70
[   13.143552]  kfree+0x222/0x3f0
[   13.143899]  ksize_uaf+0x12c/0x6c0
[   13.144439]  kunit_try_run_case+0x1a5/0x480
[   13.144885]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.145063]  kthread+0x337/0x6f0
[   13.145477]  ret_from_fork+0x116/0x1d0
[   13.145894]  ret_from_fork_asm+0x1a/0x30
[   13.146362] 
[   13.146526] The buggy address belongs to the object at ffff88810313a800
[   13.146526]  which belongs to the cache kmalloc-128 of size 128
[   13.147471] The buggy address is located 0 bytes inside of
[   13.147471]  freed 128-byte region [ffff88810313a800, ffff88810313a880)
[   13.148328] 
[   13.148417] The buggy address belongs to the physical page:
[   13.148587] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10313a
[   13.148830] flags: 0x200000000000000(node=0|zone=2)
[   13.148992] page_type: f5(slab)
[   13.149497] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   13.150293] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.151080] page dumped because: kasan: bad access detected
[   13.151627] 
[   13.151823] Memory state around the buggy address:
[   13.152337]  ffff88810313a700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.153115]  ffff88810313a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.153724] >ffff88810313a800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.153941]                    ^
[   13.154264]  ffff88810313a880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.154954]  ffff88810313a900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.155809] ==================================================================
[   13.156767] ==================================================================
[   13.157010] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5fe/0x6c0
[   13.157225] Read of size 1 at addr ffff88810313a800 by task kunit_try_catch/214
[   13.157634] 
[   13.157858] CPU: 0 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   13.157909] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.157921] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.157942] Call Trace:
[   13.157958]  <TASK>
[   13.157976]  dump_stack_lvl+0x73/0xb0
[   13.158004]  print_report+0xd1/0x610
[   13.158077]  ? __virt_addr_valid+0x1db/0x2d0
[   13.158110]  ? ksize_uaf+0x5fe/0x6c0
[   13.158131]  ? kasan_complete_mode_report_info+0x64/0x200
[   13.158152]  ? ksize_uaf+0x5fe/0x6c0
[   13.158174]  kasan_report+0x141/0x180
[   13.158195]  ? ksize_uaf+0x5fe/0x6c0
[   13.158221]  __asan_report_load1_noabort+0x18/0x20
[   13.158245]  ksize_uaf+0x5fe/0x6c0
[   13.158265]  ? __pfx_ksize_uaf+0x10/0x10
[   13.158286]  ? __schedule+0x2079/0x2b60
[   13.158308]  ? __pfx_read_tsc+0x10/0x10
[   13.158329]  ? ktime_get_ts64+0x86/0x230
[   13.158355]  kunit_try_run_case+0x1a5/0x480
[   13.158379]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.158410]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.158434]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.158457]  ? __kthread_parkme+0x82/0x180
[   13.158477]  ? preempt_count_sub+0x50/0x80
[   13.158501]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.158524]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.158546]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.158569]  kthread+0x337/0x6f0
[   13.158588]  ? trace_preempt_on+0x20/0xc0
[   13.158627]  ? __pfx_kthread+0x10/0x10
[   13.158648]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.158668]  ? calculate_sigpending+0x7b/0xa0
[   13.158703]  ? __pfx_kthread+0x10/0x10
[   13.158724]  ret_from_fork+0x116/0x1d0
[   13.158742]  ? __pfx_kthread+0x10/0x10
[   13.158762]  ret_from_fork_asm+0x1a/0x30
[   13.158793]  </TASK>
[   13.158803] 
[   13.171366] Allocated by task 214:
[   13.171723]  kasan_save_stack+0x45/0x70
[   13.171875]  kasan_save_track+0x18/0x40
[   13.172021]  kasan_save_alloc_info+0x3b/0x50
[   13.172172]  __kasan_kmalloc+0xb7/0xc0
[   13.172306]  __kmalloc_cache_noprof+0x189/0x420
[   13.172482]  ksize_uaf+0xaa/0x6c0
[   13.172642]  kunit_try_run_case+0x1a5/0x480
[   13.172900]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.173436]  kthread+0x337/0x6f0
[   13.173581]  ret_from_fork+0x116/0x1d0
[   13.173839]  ret_from_fork_asm+0x1a/0x30
[   13.173985] 
[   13.174057] Freed by task 214:
[   13.174168]  kasan_save_stack+0x45/0x70
[   13.174304]  kasan_save_track+0x18/0x40
[   13.174451]  kasan_save_free_info+0x3f/0x60
[   13.174599]  __kasan_slab_free+0x56/0x70
[   13.174736]  kfree+0x222/0x3f0
[   13.174852]  ksize_uaf+0x12c/0x6c0
[   13.174977]  kunit_try_run_case+0x1a5/0x480
[   13.175217]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.175415]  kthread+0x337/0x6f0
[   13.175538]  ret_from_fork+0x116/0x1d0
[   13.175671]  ret_from_fork_asm+0x1a/0x30
[   13.175811] 
[   13.175883] The buggy address belongs to the object at ffff88810313a800
[   13.175883]  which belongs to the cache kmalloc-128 of size 128
[   13.176390] The buggy address is located 0 bytes inside of
[   13.176390]  freed 128-byte region [ffff88810313a800, ffff88810313a880)
[   13.177084] 
[   13.177183] The buggy address belongs to the physical page:
[   13.177632] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10313a
[   13.177989] flags: 0x200000000000000(node=0|zone=2)
[   13.178229] page_type: f5(slab)
[   13.178353] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   13.178778] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.179554] page dumped because: kasan: bad access detected
[   13.179877] 
[   13.179967] Memory state around the buggy address:
[   13.180209]  ffff88810313a700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.180445]  ffff88810313a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.180836] >ffff88810313a800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.181249]                    ^
[   13.181447]  ffff88810313a880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.181672]  ffff88810313a900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.182057] ==================================================================
[   13.182490] ==================================================================
[   13.183154] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5e4/0x6c0
[   13.183544] Read of size 1 at addr ffff88810313a878 by task kunit_try_catch/214
[   13.183999] 
[   13.184252] CPU: 0 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   13.184297] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.184309] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.184341] Call Trace:
[   13.184358]  <TASK>
[   13.184373]  dump_stack_lvl+0x73/0xb0
[   13.184411]  print_report+0xd1/0x610
[   13.184432]  ? __virt_addr_valid+0x1db/0x2d0
[   13.184463]  ? ksize_uaf+0x5e4/0x6c0
[   13.184484]  ? kasan_complete_mode_report_info+0x64/0x200
[   13.184505]  ? ksize_uaf+0x5e4/0x6c0
[   13.184536]  kasan_report+0x141/0x180
[   13.184558]  ? ksize_uaf+0x5e4/0x6c0
[   13.184584]  __asan_report_load1_noabort+0x18/0x20
[   13.184607]  ksize_uaf+0x5e4/0x6c0
[   13.184628]  ? __pfx_ksize_uaf+0x10/0x10
[   13.184658]  ? __schedule+0x2079/0x2b60
[   13.184684]  ? __pfx_read_tsc+0x10/0x10
[   13.184704]  ? ktime_get_ts64+0x86/0x230
[   13.184741]  kunit_try_run_case+0x1a5/0x480
[   13.184777]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.184799]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.184822]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.184844]  ? __kthread_parkme+0x82/0x180
[   13.184873]  ? preempt_count_sub+0x50/0x80
[   13.184896]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.184920]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.184952]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.184975]  kthread+0x337/0x6f0
[   13.184994]  ? trace_preempt_on+0x20/0xc0
[   13.185017]  ? __pfx_kthread+0x10/0x10
[   13.185037]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.185058]  ? calculate_sigpending+0x7b/0xa0
[   13.185081]  ? __pfx_kthread+0x10/0x10
[   13.185102]  ret_from_fork+0x116/0x1d0
[   13.185120]  ? __pfx_kthread+0x10/0x10
[   13.185140]  ret_from_fork_asm+0x1a/0x30
[   13.185171]  </TASK>
[   13.185181] 
[   13.193392] Allocated by task 214:
[   13.193542]  kasan_save_stack+0x45/0x70
[   13.193784]  kasan_save_track+0x18/0x40
[   13.194005]  kasan_save_alloc_info+0x3b/0x50
[   13.194165]  __kasan_kmalloc+0xb7/0xc0
[   13.194299]  __kmalloc_cache_noprof+0x189/0x420
[   13.194468]  ksize_uaf+0xaa/0x6c0
[   13.194593]  kunit_try_run_case+0x1a5/0x480
[   13.194741]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.194916]  kthread+0x337/0x6f0
[   13.195037]  ret_from_fork+0x116/0x1d0
[   13.195170]  ret_from_fork_asm+0x1a/0x30
[   13.195309] 
[   13.195414] Freed by task 214:
[   13.195737]  kasan_save_stack+0x45/0x70
[   13.195937]  kasan_save_track+0x18/0x40
[   13.196298]  kasan_save_free_info+0x3f/0x60
[   13.196521]  __kasan_slab_free+0x56/0x70
[   13.196724]  kfree+0x222/0x3f0
[   13.196908]  ksize_uaf+0x12c/0x6c0
[   13.197188]  kunit_try_run_case+0x1a5/0x480
[   13.197421]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.197775]  kthread+0x337/0x6f0
[   13.197915]  ret_from_fork+0x116/0x1d0
[   13.198101]  ret_from_fork_asm+0x1a/0x30
[   13.198301] 
[   13.198408] The buggy address belongs to the object at ffff88810313a800
[   13.198408]  which belongs to the cache kmalloc-128 of size 128
[   13.199192] The buggy address is located 120 bytes inside of
[   13.199192]  freed 128-byte region [ffff88810313a800, ffff88810313a880)
[   13.199578] 
[   13.199738] The buggy address belongs to the physical page:
[   13.199994] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10313a
[   13.200553] flags: 0x200000000000000(node=0|zone=2)
[   13.200825] page_type: f5(slab)
[   13.200971] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   13.201466] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.201780] page dumped because: kasan: bad access detected
[   13.201960] 
[   13.202072] Memory state around the buggy address:
[   13.202308]  ffff88810313a700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.202693]  ffff88810313a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.202984] >ffff88810313a800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.203389]                                                                 ^
[   13.203747]  ffff88810313a880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.204185]  ffff88810313a900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.204492] ==================================================================

[   13.274673] ==================================================================
[   13.275133] BUG: KASAN: slab-use-after-free in ksize_uaf+0x19d/0x6c0
[   13.275613] Read of size 1 at addr ffff888102a51200 by task kunit_try_catch/213
[   13.275905] 
[   13.276006] CPU: 0 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   13.276054] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.276065] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.276086] Call Trace:
[   13.276099]  <TASK>
[   13.276117]  dump_stack_lvl+0x73/0xb0
[   13.276158]  print_report+0xd1/0x610
[   13.276181]  ? __virt_addr_valid+0x1db/0x2d0
[   13.276205]  ? ksize_uaf+0x19d/0x6c0
[   13.276225]  ? kasan_complete_mode_report_info+0x64/0x200
[   13.276246]  ? ksize_uaf+0x19d/0x6c0
[   13.276266]  kasan_report+0x141/0x180
[   13.276287]  ? ksize_uaf+0x19d/0x6c0
[   13.276335]  ? ksize_uaf+0x19d/0x6c0
[   13.276356]  __kasan_check_byte+0x3d/0x50
[   13.276377]  ksize+0x20/0x60
[   13.276397]  ksize_uaf+0x19d/0x6c0
[   13.276417]  ? __pfx_ksize_uaf+0x10/0x10
[   13.276438]  ? __schedule+0x10c6/0x2b60
[   13.276460]  ? __pfx_read_tsc+0x10/0x10
[   13.276481]  ? ktime_get_ts64+0x86/0x230
[   13.276504]  kunit_try_run_case+0x1a5/0x480
[   13.276529]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.276550]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.276574]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.276596]  ? __kthread_parkme+0x82/0x180
[   13.276617]  ? preempt_count_sub+0x50/0x80
[   13.276640]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.276663]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.276686]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.276708]  kthread+0x337/0x6f0
[   13.276727]  ? trace_preempt_on+0x20/0xc0
[   13.276750]  ? __pfx_kthread+0x10/0x10
[   13.276770]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.276791]  ? calculate_sigpending+0x7b/0xa0
[   13.276816]  ? __pfx_kthread+0x10/0x10
[   13.276838]  ret_from_fork+0x116/0x1d0
[   13.276855]  ? __pfx_kthread+0x10/0x10
[   13.276875]  ret_from_fork_asm+0x1a/0x30
[   13.276905]  </TASK>
[   13.276916] 
[   13.283554] Allocated by task 213:
[   13.283722]  kasan_save_stack+0x45/0x70
[   13.283887]  kasan_save_track+0x18/0x40
[   13.284067]  kasan_save_alloc_info+0x3b/0x50
[   13.284249]  __kasan_kmalloc+0xb7/0xc0
[   13.284447]  __kmalloc_cache_noprof+0x189/0x420
[   13.284643]  ksize_uaf+0xaa/0x6c0
[   13.284794]  kunit_try_run_case+0x1a5/0x480
[   13.284975]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.285153]  kthread+0x337/0x6f0
[   13.285272]  ret_from_fork+0x116/0x1d0
[   13.285426]  ret_from_fork_asm+0x1a/0x30
[   13.285571] 
[   13.285666] Freed by task 213:
[   13.285823]  kasan_save_stack+0x45/0x70
[   13.286011]  kasan_save_track+0x18/0x40
[   13.286211]  kasan_save_free_info+0x3f/0x60
[   13.286444]  __kasan_slab_free+0x56/0x70
[   13.286639]  kfree+0x222/0x3f0
[   13.286802]  ksize_uaf+0x12c/0x6c0
[   13.286978]  kunit_try_run_case+0x1a5/0x480
[   13.287164]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.287434]  kthread+0x337/0x6f0
[   13.287591]  ret_from_fork+0x116/0x1d0
[   13.287753]  ret_from_fork_asm+0x1a/0x30
[   13.287914] 
[   13.287987] The buggy address belongs to the object at ffff888102a51200
[   13.287987]  which belongs to the cache kmalloc-128 of size 128
[   13.288370] The buggy address is located 0 bytes inside of
[   13.288370]  freed 128-byte region [ffff888102a51200, ffff888102a51280)
[   13.288708] 
[   13.288786] The buggy address belongs to the physical page:
[   13.289031] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a51
[   13.289413] flags: 0x200000000000000(node=0|zone=2)
[   13.289662] page_type: f5(slab)
[   13.289837] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   13.290183] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.290517] page dumped because: kasan: bad access detected
[   13.290714] 
[   13.290785] Memory state around the buggy address:
[   13.290939]  ffff888102a51100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.291158]  ffff888102a51180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.291395] >ffff888102a51200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.291698]                    ^
[   13.291862]  ffff888102a51280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.292185]  ffff888102a51300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.292539] ==================================================================
[   13.293226] ==================================================================
[   13.293964] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5fe/0x6c0
[   13.294282] Read of size 1 at addr ffff888102a51200 by task kunit_try_catch/213
[   13.294604] 
[   13.294708] CPU: 0 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   13.294752] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.294763] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.294785] Call Trace:
[   13.294801]  <TASK>
[   13.294816]  dump_stack_lvl+0x73/0xb0
[   13.294843]  print_report+0xd1/0x610
[   13.294864]  ? __virt_addr_valid+0x1db/0x2d0
[   13.294886]  ? ksize_uaf+0x5fe/0x6c0
[   13.294907]  ? kasan_complete_mode_report_info+0x64/0x200
[   13.294928]  ? ksize_uaf+0x5fe/0x6c0
[   13.294948]  kasan_report+0x141/0x180
[   13.294969]  ? ksize_uaf+0x5fe/0x6c0
[   13.294993]  __asan_report_load1_noabort+0x18/0x20
[   13.295016]  ksize_uaf+0x5fe/0x6c0
[   13.295036]  ? __pfx_ksize_uaf+0x10/0x10
[   13.295057]  ? __schedule+0x10c6/0x2b60
[   13.295080]  ? __pfx_read_tsc+0x10/0x10
[   13.295100]  ? ktime_get_ts64+0x86/0x230
[   13.295124]  kunit_try_run_case+0x1a5/0x480
[   13.295156]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.295178]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.295201]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.295223]  ? __kthread_parkme+0x82/0x180
[   13.295243]  ? preempt_count_sub+0x50/0x80
[   13.295267]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.295291]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.295335]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.295358]  kthread+0x337/0x6f0
[   13.295377]  ? trace_preempt_on+0x20/0xc0
[   13.295400]  ? __pfx_kthread+0x10/0x10
[   13.295420]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.295440]  ? calculate_sigpending+0x7b/0xa0
[   13.295465]  ? __pfx_kthread+0x10/0x10
[   13.295486]  ret_from_fork+0x116/0x1d0
[   13.295504]  ? __pfx_kthread+0x10/0x10
[   13.295523]  ret_from_fork_asm+0x1a/0x30
[   13.295553]  </TASK>
[   13.295563] 
[   13.302269] Allocated by task 213:
[   13.302467]  kasan_save_stack+0x45/0x70
[   13.302650]  kasan_save_track+0x18/0x40
[   13.302837]  kasan_save_alloc_info+0x3b/0x50
[   13.303042]  __kasan_kmalloc+0xb7/0xc0
[   13.303221]  __kmalloc_cache_noprof+0x189/0x420
[   13.303432]  ksize_uaf+0xaa/0x6c0
[   13.303615]  kunit_try_run_case+0x1a5/0x480
[   13.303796]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.304010]  kthread+0x337/0x6f0
[   13.304192]  ret_from_fork+0x116/0x1d0
[   13.304390]  ret_from_fork_asm+0x1a/0x30
[   13.304559] 
[   13.304656] Freed by task 213:
[   13.304773]  kasan_save_stack+0x45/0x70
[   13.304964]  kasan_save_track+0x18/0x40
[   13.305133]  kasan_save_free_info+0x3f/0x60
[   13.305313]  __kasan_slab_free+0x56/0x70
[   13.305451]  kfree+0x222/0x3f0
[   13.305570]  ksize_uaf+0x12c/0x6c0
[   13.305697]  kunit_try_run_case+0x1a5/0x480
[   13.305845]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.306021]  kthread+0x337/0x6f0
[   13.306143]  ret_from_fork+0x116/0x1d0
[   13.306380]  ret_from_fork_asm+0x1a/0x30
[   13.306580] 
[   13.306676] The buggy address belongs to the object at ffff888102a51200
[   13.306676]  which belongs to the cache kmalloc-128 of size 128
[   13.307220] The buggy address is located 0 bytes inside of
[   13.307220]  freed 128-byte region [ffff888102a51200, ffff888102a51280)
[   13.307708] 
[   13.307783] The buggy address belongs to the physical page:
[   13.307960] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a51
[   13.308214] flags: 0x200000000000000(node=0|zone=2)
[   13.308482] page_type: f5(slab)
[   13.308656] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   13.309007] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.309379] page dumped because: kasan: bad access detected
[   13.309637] 
[   13.309734] Memory state around the buggy address:
[   13.309944]  ffff888102a51100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.310241]  ffff888102a51180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.310538] >ffff888102a51200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.310839]                    ^
[   13.310984]  ffff888102a51280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.311279]  ffff888102a51300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.311571] ==================================================================
[   13.312413] ==================================================================
[   13.312743] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5e4/0x6c0
[   13.312968] Read of size 1 at addr ffff888102a51278 by task kunit_try_catch/213
[   13.313296] 
[   13.313412] CPU: 0 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   13.313456] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.313467] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.313488] Call Trace:
[   13.313506]  <TASK>
[   13.313523]  dump_stack_lvl+0x73/0xb0
[   13.313550]  print_report+0xd1/0x610
[   13.313571]  ? __virt_addr_valid+0x1db/0x2d0
[   13.313593]  ? ksize_uaf+0x5e4/0x6c0
[   13.313612]  ? kasan_complete_mode_report_info+0x64/0x200
[   13.313634]  ? ksize_uaf+0x5e4/0x6c0
[   13.313653]  kasan_report+0x141/0x180
[   13.313674]  ? ksize_uaf+0x5e4/0x6c0
[   13.313698]  __asan_report_load1_noabort+0x18/0x20
[   13.313721]  ksize_uaf+0x5e4/0x6c0
[   13.313740]  ? __pfx_ksize_uaf+0x10/0x10
[   13.313761]  ? __schedule+0x10c6/0x2b60
[   13.313782]  ? __pfx_read_tsc+0x10/0x10
[   13.313802]  ? ktime_get_ts64+0x86/0x230
[   13.313826]  kunit_try_run_case+0x1a5/0x480
[   13.313850]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.313871]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.313894]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.313916]  ? __kthread_parkme+0x82/0x180
[   13.313936]  ? preempt_count_sub+0x50/0x80
[   13.313959]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.313981]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.314003]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.314025]  kthread+0x337/0x6f0
[   13.314044]  ? trace_preempt_on+0x20/0xc0
[   13.314066]  ? __pfx_kthread+0x10/0x10
[   13.314085]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.314105]  ? calculate_sigpending+0x7b/0xa0
[   13.314130]  ? __pfx_kthread+0x10/0x10
[   13.314672]  ret_from_fork+0x116/0x1d0
[   13.314701]  ? __pfx_kthread+0x10/0x10
[   13.314722]  ret_from_fork_asm+0x1a/0x30
[   13.314752]  </TASK>
[   13.314762] 
[   13.321339] Allocated by task 213:
[   13.321469]  kasan_save_stack+0x45/0x70
[   13.321615]  kasan_save_track+0x18/0x40
[   13.321752]  kasan_save_alloc_info+0x3b/0x50
[   13.321904]  __kasan_kmalloc+0xb7/0xc0
[   13.322038]  __kmalloc_cache_noprof+0x189/0x420
[   13.322227]  ksize_uaf+0xaa/0x6c0
[   13.322428]  kunit_try_run_case+0x1a5/0x480
[   13.322646]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.322913]  kthread+0x337/0x6f0
[   13.323085]  ret_from_fork+0x116/0x1d0
[   13.323280]  ret_from_fork_asm+0x1a/0x30
[   13.323497] 
[   13.323592] Freed by task 213:
[   13.323747]  kasan_save_stack+0x45/0x70
[   13.323940]  kasan_save_track+0x18/0x40
[   13.324130]  kasan_save_free_info+0x3f/0x60
[   13.324385]  __kasan_slab_free+0x56/0x70
[   13.324585]  kfree+0x222/0x3f0
[   13.324748]  ksize_uaf+0x12c/0x6c0
[   13.324924]  kunit_try_run_case+0x1a5/0x480
[   13.325072]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.325258]  kthread+0x337/0x6f0
[   13.325407]  ret_from_fork+0x116/0x1d0
[   13.325541]  ret_from_fork_asm+0x1a/0x30
[   13.325680] 
[   13.325752] The buggy address belongs to the object at ffff888102a51200
[   13.325752]  which belongs to the cache kmalloc-128 of size 128
[   13.326256] The buggy address is located 120 bytes inside of
[   13.326256]  freed 128-byte region [ffff888102a51200, ffff888102a51280)
[   13.326814] 
[   13.326913] The buggy address belongs to the physical page:
[   13.327172] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a51
[   13.327551] flags: 0x200000000000000(node=0|zone=2)
[   13.327789] page_type: f5(slab)
[   13.327961] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   13.328342] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.328680] page dumped because: kasan: bad access detected
[   13.328892] 
[   13.328983] Memory state around the buggy address:
[   13.329166]  ffff888102a51100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.329481]  ffff888102a51180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.329762] >ffff888102a51200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.330010]                                                                 ^
[   13.330323]  ffff888102a51280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.330621]  ffff888102a51300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.330845] ==================================================================