Hay
Date
Nov. 22, 2024, 6:35 a.m.

Environment
qemu-arm64
qemu-x86_64

[   34.583606] ==================================================================
[   34.584940] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x600
[   34.586458] Read of size 1 at addr fff00000c6357b00 by task kunit_try_catch/185
[   34.587656] 
[   34.588018] CPU: 1 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241122 #1
[   34.589230] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.590001] Hardware name: linux,dummy-virt (DT)
[   34.591349] Call trace:
[   34.591765]  show_stack+0x20/0x38 (C)
[   34.592356]  dump_stack_lvl+0x8c/0xd0
[   34.592889]  print_report+0x118/0x5e0
[   34.594006]  kasan_report+0xc8/0x118
[   34.594635]  __kasan_check_byte+0x54/0x70
[   34.595263]  ksize+0x30/0x88
[   34.595748]  ksize_uaf+0x168/0x600
[   34.596465]  kunit_try_run_case+0x14c/0x3d0
[   34.597132]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.598625]  kthread+0x24c/0x2d0
[   34.599109]  ret_from_fork+0x10/0x20
[   34.599607] 
[   34.599874] Allocated by task 185:
[   34.601103]  kasan_save_stack+0x3c/0x68
[   34.601998]  kasan_save_track+0x20/0x40
[   34.602816]  kasan_save_alloc_info+0x40/0x58
[   34.603668]  __kasan_kmalloc+0xd4/0xd8
[   34.604349]  __kmalloc_cache_noprof+0x15c/0x3c8
[   34.605183]  ksize_uaf+0xb8/0x600
[   34.605627]  kunit_try_run_case+0x14c/0x3d0
[   34.606398]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.608504]  kthread+0x24c/0x2d0
[   34.609248]  ret_from_fork+0x10/0x20
[   34.609735] 
[   34.610208] Freed by task 185:
[   34.610793]  kasan_save_stack+0x3c/0x68
[   34.611419]  kasan_save_track+0x20/0x40
[   34.612112]  kasan_save_free_info+0x4c/0x78
[   34.612871]  __kasan_slab_free+0x6c/0x98
[   34.613980]  kfree+0x114/0x3d0
[   34.614977]  ksize_uaf+0x11c/0x600
[   34.615761]  kunit_try_run_case+0x14c/0x3d0
[   34.616321]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.617055]  kthread+0x24c/0x2d0
[   34.618068]  ret_from_fork+0x10/0x20
[   34.618697] 
[   34.619051] The buggy address belongs to the object at fff00000c6357b00
[   34.619051]  which belongs to the cache kmalloc-128 of size 128
[   34.621046] The buggy address is located 0 bytes inside of
[   34.621046]  freed 128-byte region [fff00000c6357b00, fff00000c6357b80)
[   34.622456] 
[   34.622863] The buggy address belongs to the physical page:
[   34.623601] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106357
[   34.624911] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.626135] page_type: f5(slab)
[   34.627097] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   34.628082] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   34.629481] page dumped because: kasan: bad access detected
[   34.630338] 
[   34.630709] Memory state around the buggy address:
[   34.631654]  fff00000c6357a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   34.632813]  fff00000c6357a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.634004] >fff00000c6357b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.635046]                    ^
[   34.635658]  fff00000c6357b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.636723]  fff00000c6357c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.637645] ==================================================================
[   34.640313] ==================================================================
[   34.641067] BUG: KASAN: slab-use-after-free in ksize_uaf+0x59c/0x600
[   34.642476] Read of size 1 at addr fff00000c6357b00 by task kunit_try_catch/185
[   34.644275] 
[   34.645040] CPU: 0 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241122 #1
[   34.646409] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.647368] Hardware name: linux,dummy-virt (DT)
[   34.648305] Call trace:
[   34.649074]  show_stack+0x20/0x38 (C)
[   34.649733]  dump_stack_lvl+0x8c/0xd0
[   34.650279]  print_report+0x118/0x5e0
[   34.650869]  kasan_report+0xc8/0x118
[   34.652277]  __asan_report_load1_noabort+0x20/0x30
[   34.653082]  ksize_uaf+0x59c/0x600
[   34.653529]  kunit_try_run_case+0x14c/0x3d0
[   34.654008]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.655387]  kthread+0x24c/0x2d0
[   34.656149]  ret_from_fork+0x10/0x20
[   34.657105] 
[   34.657431] Allocated by task 185:
[   34.657931]  kasan_save_stack+0x3c/0x68
[   34.659100]  kasan_save_track+0x20/0x40
[   34.659721]  kasan_save_alloc_info+0x40/0x58
[   34.660264]  __kasan_kmalloc+0xd4/0xd8
[   34.661232]  __kmalloc_cache_noprof+0x15c/0x3c8
[   34.662195]  ksize_uaf+0xb8/0x600
[   34.662722]  kunit_try_run_case+0x14c/0x3d0
[   34.664315]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.665823]  kthread+0x24c/0x2d0
[   34.666590]  ret_from_fork+0x10/0x20
[   34.666919] 
[   34.667084] Freed by task 185:
[   34.667323]  kasan_save_stack+0x3c/0x68
[   34.667730]  kasan_save_track+0x20/0x40
[   34.668343]  kasan_save_free_info+0x4c/0x78
[   34.669709]  __kasan_slab_free+0x6c/0x98
[   34.670830]  kfree+0x114/0x3d0
[   34.671217]  ksize_uaf+0x11c/0x600
[   34.671625]  kunit_try_run_case+0x14c/0x3d0
[   34.672195]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.673240]  kthread+0x24c/0x2d0
[   34.674068]  ret_from_fork+0x10/0x20
[   34.675067] 
[   34.675707] The buggy address belongs to the object at fff00000c6357b00
[   34.675707]  which belongs to the cache kmalloc-128 of size 128
[   34.677305] The buggy address is located 0 bytes inside of
[   34.677305]  freed 128-byte region [fff00000c6357b00, fff00000c6357b80)
[   34.678631] 
[   34.678931] The buggy address belongs to the physical page:
[   34.679975] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106357
[   34.682427] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.683874] page_type: f5(slab)
[   34.684735] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   34.686321] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   34.687907] page dumped because: kasan: bad access detected
[   34.688724] 
[   34.689365] Memory state around the buggy address:
[   34.690322]  fff00000c6357a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   34.691502]  fff00000c6357a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.692325] >fff00000c6357b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.693624]                    ^
[   34.694142]  fff00000c6357b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.694893]  fff00000c6357c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.696347] ==================================================================
[   34.699394] ==================================================================
[   34.702943] BUG: KASAN: slab-use-after-free in ksize_uaf+0x548/0x600
[   34.705580] Read of size 1 at addr fff00000c6357b78 by task kunit_try_catch/185
[   34.710154] 
[   34.710529] CPU: 0 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241122 #1
[   34.711965] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.714862] Hardware name: linux,dummy-virt (DT)
[   34.716293] Call trace:
[   34.716687]  show_stack+0x20/0x38 (C)
[   34.718342]  dump_stack_lvl+0x8c/0xd0
[   34.719193]  print_report+0x118/0x5e0
[   34.719893]  kasan_report+0xc8/0x118
[   34.720493]  __asan_report_load1_noabort+0x20/0x30
[   34.721145]  ksize_uaf+0x548/0x600
[   34.721704]  kunit_try_run_case+0x14c/0x3d0
[   34.722325]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.723531]  kthread+0x24c/0x2d0
[   34.723946]  ret_from_fork+0x10/0x20
[   34.725148] 
[   34.725873] Allocated by task 185:
[   34.726982]  kasan_save_stack+0x3c/0x68
[   34.727899]  kasan_save_track+0x20/0x40
[   34.728497]  kasan_save_alloc_info+0x40/0x58
[   34.729599]  __kasan_kmalloc+0xd4/0xd8
[   34.730847]  __kmalloc_cache_noprof+0x15c/0x3c8
[   34.732338]  ksize_uaf+0xb8/0x600
[   34.733236]  kunit_try_run_case+0x14c/0x3d0
[   34.734799]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.736303]  kthread+0x24c/0x2d0
[   34.737213]  ret_from_fork+0x10/0x20
[   34.737787] 
[   34.738071] Freed by task 185:
[   34.738472]  kasan_save_stack+0x3c/0x68
[   34.739571]  kasan_save_track+0x20/0x40
[   34.740760]  kasan_save_free_info+0x4c/0x78
[   34.742274]  __kasan_slab_free+0x6c/0x98
[   34.743072]  kfree+0x114/0x3d0
[   34.743815]  ksize_uaf+0x11c/0x600
[   34.744878]  kunit_try_run_case+0x14c/0x3d0
[   34.745369]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.746090]  kthread+0x24c/0x2d0
[   34.747116]  ret_from_fork+0x10/0x20
[   34.747698] 
[   34.747942] The buggy address belongs to the object at fff00000c6357b00
[   34.747942]  which belongs to the cache kmalloc-128 of size 128
[   34.750829] The buggy address is located 120 bytes inside of
[   34.750829]  freed 128-byte region [fff00000c6357b00, fff00000c6357b80)
[   34.753048] 
[   34.753419] The buggy address belongs to the physical page:
[   34.754520] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106357
[   34.755852] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.756955] page_type: f5(slab)
[   34.757483] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   34.758718] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   34.760213] page dumped because: kasan: bad access detected
[   34.761199] 
[   34.761639] Memory state around the buggy address:
[   34.762578]  fff00000c6357a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.764656]  fff00000c6357a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.765497] >fff00000c6357b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.767261]                                                                 ^
[   34.768576]  fff00000c6357b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.769864]  fff00000c6357c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.770877] ==================================================================

[   25.969309] ==================================================================
[   25.970488] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5e6/0x6c0
[   25.970917] Read of size 1 at addr ffff888102a0b578 by task kunit_try_catch/204
[   25.971581] 
[   25.971843] CPU: 1 UID: 0 PID: 204 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241122 #1
[   25.972537] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.972962] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.974037] Call Trace:
[   25.975011]  <TASK>
[   25.975775]  dump_stack_lvl+0x73/0xb0
[   25.976244]  print_report+0xd1/0x640
[   25.976756]  ? __virt_addr_valid+0x1db/0x2d0
[   25.977038]  ? kasan_complete_mode_report_info+0x64/0x200
[   25.977762]  kasan_report+0x102/0x140
[   25.978165]  ? ksize_uaf+0x5e6/0x6c0
[   25.978550]  ? ksize_uaf+0x5e6/0x6c0
[   25.979412]  __asan_report_load1_noabort+0x18/0x20
[   25.979730]  ksize_uaf+0x5e6/0x6c0
[   25.980560]  ? __pfx_ksize_uaf+0x10/0x10
[   25.981185]  ? __pfx_ksize_uaf+0x10/0x10
[   25.981915]  kunit_try_run_case+0x1b3/0x490
[   25.982885]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.983278]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   25.983863]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.984996]  ? __kthread_parkme+0x82/0x160
[   25.985354]  ? preempt_count_sub+0x50/0x80
[   25.985968]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.986404]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.987114]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.987899]  kthread+0x257/0x310
[   25.988251]  ? __pfx_kthread+0x10/0x10
[   25.988968]  ret_from_fork+0x41/0x80
[   25.989559]  ? __pfx_kthread+0x10/0x10
[   25.990138]  ret_from_fork_asm+0x1a/0x30
[   25.990606]  </TASK>
[   25.991180] 
[   25.991420] Allocated by task 204:
[   25.992174]  kasan_save_stack+0x3d/0x60
[   25.992571]  kasan_save_track+0x18/0x40
[   25.992920]  kasan_save_alloc_info+0x3b/0x50
[   25.993638]  __kasan_kmalloc+0xb7/0xc0
[   25.994211]  __kmalloc_cache_noprof+0x184/0x410
[   25.994628]  ksize_uaf+0xab/0x6c0
[   25.995311]  kunit_try_run_case+0x1b3/0x490
[   25.996092]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.996734]  kthread+0x257/0x310
[   25.997110]  ret_from_fork+0x41/0x80
[   25.997774]  ret_from_fork_asm+0x1a/0x30
[   25.998358] 
[   25.998723] Freed by task 204:
[   25.999021]  kasan_save_stack+0x3d/0x60
[   25.999981]  kasan_save_track+0x18/0x40
[   26.000574]  kasan_save_free_info+0x3f/0x60
[   26.001155]  __kasan_slab_free+0x56/0x70
[   26.001660]  kfree+0x123/0x3f0
[   26.002051]  ksize_uaf+0x12d/0x6c0
[   26.002783]  kunit_try_run_case+0x1b3/0x490
[   26.003190]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.003974]  kthread+0x257/0x310
[   26.004491]  ret_from_fork+0x41/0x80
[   26.005053]  ret_from_fork_asm+0x1a/0x30
[   26.005506] 
[   26.005897] The buggy address belongs to the object at ffff888102a0b500
[   26.005897]  which belongs to the cache kmalloc-128 of size 128
[   26.007027] The buggy address is located 120 bytes inside of
[   26.007027]  freed 128-byte region [ffff888102a0b500, ffff888102a0b580)
[   26.008223] 
[   26.008714] The buggy address belongs to the physical page:
[   26.009751] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b
[   26.010653] flags: 0x200000000000000(node=0|zone=2)
[   26.011330] page_type: f5(slab)
[   26.011920] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   26.012875] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   26.013481] page dumped because: kasan: bad access detected
[   26.014077] 
[   26.014798] Memory state around the buggy address:
[   26.015205]  ffff888102a0b400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.016043]  ffff888102a0b480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.016965] >ffff888102a0b500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.017542]                                                                 ^
[   26.018134]  ffff888102a0b580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.019410]  ffff888102a0b600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.019887] ==================================================================
[   25.925298] ==================================================================
[   25.925994] BUG: KASAN: slab-use-after-free in ksize_uaf+0x600/0x6c0
[   25.926586] Read of size 1 at addr ffff888102a0b500 by task kunit_try_catch/204
[   25.928159] 
[   25.928461] CPU: 1 UID: 0 PID: 204 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241122 #1
[   25.929322] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.929668] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.930315] Call Trace:
[   25.930633]  <TASK>
[   25.930934]  dump_stack_lvl+0x73/0xb0
[   25.931412]  print_report+0xd1/0x640
[   25.931747]  ? __virt_addr_valid+0x1db/0x2d0
[   25.932159]  ? kasan_complete_mode_report_info+0x64/0x200
[   25.932520]  kasan_report+0x102/0x140
[   25.932785]  ? ksize_uaf+0x600/0x6c0
[   25.933202]  ? ksize_uaf+0x600/0x6c0
[   25.933667]  __asan_report_load1_noabort+0x18/0x20
[   25.934202]  ksize_uaf+0x600/0x6c0
[   25.934636]  ? __pfx_ksize_uaf+0x10/0x10
[   25.935079]  ? __pfx_ksize_uaf+0x10/0x10
[   25.935568]  kunit_try_run_case+0x1b3/0x490
[   25.935915]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.936415]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   25.936810]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.937241]  ? __kthread_parkme+0x82/0x160
[   25.937575]  ? preempt_count_sub+0x50/0x80
[   25.938053]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.938508]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.938948]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.939325]  kthread+0x257/0x310
[   25.939588]  ? __pfx_kthread+0x10/0x10
[   25.939876]  ret_from_fork+0x41/0x80
[   25.940307]  ? __pfx_kthread+0x10/0x10
[   25.940732]  ret_from_fork_asm+0x1a/0x30
[   25.941195]  </TASK>
[   25.941513] 
[   25.941728] Allocated by task 204:
[   25.942126]  kasan_save_stack+0x3d/0x60
[   25.942546]  kasan_save_track+0x18/0x40
[   25.944525]  kasan_save_alloc_info+0x3b/0x50
[   25.944993]  __kasan_kmalloc+0xb7/0xc0
[   25.945406]  __kmalloc_cache_noprof+0x184/0x410
[   25.945856]  ksize_uaf+0xab/0x6c0
[   25.946238]  kunit_try_run_case+0x1b3/0x490
[   25.946600]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.948602]  kthread+0x257/0x310
[   25.948882]  ret_from_fork+0x41/0x80
[   25.949140]  ret_from_fork_asm+0x1a/0x30
[   25.949418] 
[   25.949621] Freed by task 204:
[   25.950009]  kasan_save_stack+0x3d/0x60
[   25.950477]  kasan_save_track+0x18/0x40
[   25.950903]  kasan_save_free_info+0x3f/0x60
[   25.951368]  __kasan_slab_free+0x56/0x70
[   25.951780]  kfree+0x123/0x3f0
[   25.952138]  ksize_uaf+0x12d/0x6c0
[   25.952515]  kunit_try_run_case+0x1b3/0x490
[   25.952792]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.953130]  kthread+0x257/0x310
[   25.953425]  ret_from_fork+0x41/0x80
[   25.953845]  ret_from_fork_asm+0x1a/0x30
[   25.954325] 
[   25.954539] The buggy address belongs to the object at ffff888102a0b500
[   25.954539]  which belongs to the cache kmalloc-128 of size 128
[   25.955640] The buggy address is located 0 bytes inside of
[   25.955640]  freed 128-byte region [ffff888102a0b500, ffff888102a0b580)
[   25.956609] 
[   25.956769] The buggy address belongs to the physical page:
[   25.957324] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b
[   25.957989] flags: 0x200000000000000(node=0|zone=2)
[   25.958355] page_type: f5(slab)
[   25.958721] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   25.959224] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   25.959642] page dumped because: kasan: bad access detected
[   25.960156] 
[   25.960411] Memory state around the buggy address:
[   25.960870]  ffff888102a0b400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.961542]  ffff888102a0b480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.962126] >ffff888102a0b500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.962536]                    ^
[   25.962863]  ffff888102a0b580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.963520]  ffff888102a0b600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.964058] ==================================================================
[   25.883503] ==================================================================
[   25.884528] BUG: KASAN: slab-use-after-free in ksize_uaf+0x19e/0x6c0
[   25.885165] Read of size 1 at addr ffff888102a0b500 by task kunit_try_catch/204
[   25.886084] 
[   25.886284] CPU: 1 UID: 0 PID: 204 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241122 #1
[   25.887910] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.888197] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.888930] Call Trace:
[   25.889183]  <TASK>
[   25.889667]  dump_stack_lvl+0x73/0xb0
[   25.890168]  print_report+0xd1/0x640
[   25.890851]  ? __virt_addr_valid+0x1db/0x2d0
[   25.891444]  ? kasan_complete_mode_report_info+0x64/0x200
[   25.891905]  kasan_report+0x102/0x140
[   25.892178]  ? ksize_uaf+0x19e/0x6c0
[   25.892605]  ? ksize_uaf+0x19e/0x6c0
[   25.892917]  ? ksize_uaf+0x19e/0x6c0
[   25.893409]  __kasan_check_byte+0x3d/0x50
[   25.893848]  ksize+0x20/0x60
[   25.894233]  ksize_uaf+0x19e/0x6c0
[   25.894608]  ? __pfx_ksize_uaf+0x10/0x10
[   25.895000]  ? __pfx_ksize_uaf+0x10/0x10
[   25.895490]  kunit_try_run_case+0x1b3/0x490
[   25.895960]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.896552]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   25.897154]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.897849]  ? __kthread_parkme+0x82/0x160
[   25.898392]  ? preempt_count_sub+0x50/0x80
[   25.898757]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.899232]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.899982]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.900631]  kthread+0x257/0x310
[   25.901103]  ? __pfx_kthread+0x10/0x10
[   25.901655]  ret_from_fork+0x41/0x80
[   25.902168]  ? __pfx_kthread+0x10/0x10
[   25.902694]  ret_from_fork_asm+0x1a/0x30
[   25.903298]  </TASK>
[   25.903645] 
[   25.903811] Allocated by task 204:
[   25.904084]  kasan_save_stack+0x3d/0x60
[   25.904513]  kasan_save_track+0x18/0x40
[   25.904995]  kasan_save_alloc_info+0x3b/0x50
[   25.905459]  __kasan_kmalloc+0xb7/0xc0
[   25.905919]  __kmalloc_cache_noprof+0x184/0x410
[   25.906317]  ksize_uaf+0xab/0x6c0
[   25.906564]  kunit_try_run_case+0x1b3/0x490
[   25.907018]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.907638]  kthread+0x257/0x310
[   25.908030]  ret_from_fork+0x41/0x80
[   25.908385]  ret_from_fork_asm+0x1a/0x30
[   25.908691] 
[   25.908935] Freed by task 204:
[   25.909343]  kasan_save_stack+0x3d/0x60
[   25.909759]  kasan_save_track+0x18/0x40
[   25.910238]  kasan_save_free_info+0x3f/0x60
[   25.910741]  __kasan_slab_free+0x56/0x70
[   25.911367]  kfree+0x123/0x3f0
[   25.911990]  ksize_uaf+0x12d/0x6c0
[   25.912852]  kunit_try_run_case+0x1b3/0x490
[   25.913450]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.913786]  kthread+0x257/0x310
[   25.914054]  ret_from_fork+0x41/0x80
[   25.914366]  ret_from_fork_asm+0x1a/0x30
[   25.914714] 
[   25.914961] The buggy address belongs to the object at ffff888102a0b500
[   25.914961]  which belongs to the cache kmalloc-128 of size 128
[   25.915790] The buggy address is located 0 bytes inside of
[   25.915790]  freed 128-byte region [ffff888102a0b500, ffff888102a0b580)
[   25.916491] 
[   25.916655] The buggy address belongs to the physical page:
[   25.917155] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0b
[   25.917886] flags: 0x200000000000000(node=0|zone=2)
[   25.918428] page_type: f5(slab)
[   25.918772] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   25.919435] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   25.919980] page dumped because: kasan: bad access detected
[   25.920524] 
[   25.920696] Memory state around the buggy address:
[   25.921090]  ffff888102a0b400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.921687]  ffff888102a0b480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.922230] >ffff888102a0b500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.922729]                    ^
[   25.922980]  ffff888102a0b580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.923392]  ffff888102a0b600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.923787] ==================================================================