Hay
Date
Nov. 26, 2024, 6:09 a.m.

Environment
qemu-arm64
qemu-x86_64

[   32.021508] ==================================================================
[   32.023192] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x600
[   32.023912] Read of size 1 at addr fff00000c5e72800 by task kunit_try_catch/185
[   32.024863] 
[   32.025296] CPU: 0 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   32.026746] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.027348] Hardware name: linux,dummy-virt (DT)
[   32.028328] Call trace:
[   32.028737]  show_stack+0x20/0x38 (C)
[   32.029489]  dump_stack_lvl+0x8c/0xd0
[   32.030568]  print_report+0x118/0x5e0
[   32.031071]  kasan_report+0xc8/0x118
[   32.031711]  __kasan_check_byte+0x54/0x70
[   32.032347]  ksize+0x30/0x88
[   32.032931]  ksize_uaf+0x168/0x600
[   32.033560]  kunit_try_run_case+0x14c/0x3d0
[   32.034689]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.035385]  kthread+0x24c/0x2d0
[   32.035967]  ret_from_fork+0x10/0x20
[   32.036567] 
[   32.036907] Allocated by task 185:
[   32.037349]  kasan_save_stack+0x3c/0x68
[   32.038421]  kasan_save_track+0x20/0x40
[   32.039059]  kasan_save_alloc_info+0x40/0x58
[   32.039647]  __kasan_kmalloc+0xd4/0xd8
[   32.040264]  __kmalloc_cache_noprof+0x15c/0x3c8
[   32.040849]  ksize_uaf+0xb8/0x600
[   32.041430]  kunit_try_run_case+0x14c/0x3d0
[   32.042514]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.043217]  kthread+0x24c/0x2d0
[   32.043750]  ret_from_fork+0x10/0x20
[   32.044300] 
[   32.044684] Freed by task 185:
[   32.045187]  kasan_save_stack+0x3c/0x68
[   32.046248]  kasan_save_track+0x20/0x40
[   32.046780]  kasan_save_free_info+0x4c/0x78
[   32.047435]  __kasan_slab_free+0x6c/0x98
[   32.048388]  kfree+0x114/0x3d0
[   32.048875]  ksize_uaf+0x11c/0x600
[   32.049395]  kunit_try_run_case+0x14c/0x3d0
[   32.050556]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.051250]  kthread+0x24c/0x2d0
[   32.051749]  ret_from_fork+0x10/0x20
[   32.052271] 
[   32.053057] The buggy address belongs to the object at fff00000c5e72800
[   32.053057]  which belongs to the cache kmalloc-128 of size 128
[   32.054807] The buggy address is located 0 bytes inside of
[   32.054807]  freed 128-byte region [fff00000c5e72800, fff00000c5e72880)
[   32.056012] 
[   32.056387] The buggy address belongs to the physical page:
[   32.056941] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e72
[   32.058394] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.059239] page_type: f5(slab)
[   32.059753] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.060616] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   32.061544] page dumped because: kasan: bad access detected
[   32.062322] 
[   32.063105] Memory state around the buggy address:
[   32.063776]  fff00000c5e72700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   32.064618]  fff00000c5e72780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.065424] >fff00000c5e72800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.066753]                    ^
[   32.067294]  fff00000c5e72880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.068115]  fff00000c5e72900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.068895] ==================================================================
[   32.127164] ==================================================================
[   32.128057] BUG: KASAN: slab-use-after-free in ksize_uaf+0x548/0x600
[   32.128695] Read of size 1 at addr fff00000c5e72878 by task kunit_try_catch/185
[   32.129763] 
[   32.130163] CPU: 0 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   32.132108] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.132638] Hardware name: linux,dummy-virt (DT)
[   32.133283] Call trace:
[   32.133821]  show_stack+0x20/0x38 (C)
[   32.134422]  dump_stack_lvl+0x8c/0xd0
[   32.135128]  print_report+0x118/0x5e0
[   32.135889]  kasan_report+0xc8/0x118
[   32.136595]  __asan_report_load1_noabort+0x20/0x30
[   32.137405]  ksize_uaf+0x548/0x600
[   32.138153]  kunit_try_run_case+0x14c/0x3d0
[   32.139148]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.139862]  kthread+0x24c/0x2d0
[   32.140786]  ret_from_fork+0x10/0x20
[   32.141494] 
[   32.142212] Allocated by task 185:
[   32.143325]  kasan_save_stack+0x3c/0x68
[   32.144142]  kasan_save_track+0x20/0x40
[   32.144792]  kasan_save_alloc_info+0x40/0x58
[   32.145487]  __kasan_kmalloc+0xd4/0xd8
[   32.146582]  __kmalloc_cache_noprof+0x15c/0x3c8
[   32.147100]  ksize_uaf+0xb8/0x600
[   32.147691]  kunit_try_run_case+0x14c/0x3d0
[   32.148364]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.149203]  kthread+0x24c/0x2d0
[   32.149868]  ret_from_fork+0x10/0x20
[   32.150948] 
[   32.151284] Freed by task 185:
[   32.151824]  kasan_save_stack+0x3c/0x68
[   32.152423]  kasan_save_track+0x20/0x40
[   32.153072]  kasan_save_free_info+0x4c/0x78
[   32.154140]  __kasan_slab_free+0x6c/0x98
[   32.155003]  kfree+0x114/0x3d0
[   32.155435]  ksize_uaf+0x11c/0x600
[   32.155876]  kunit_try_run_case+0x14c/0x3d0
[   32.156843]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.157580]  kthread+0x24c/0x2d0
[   32.158065]  ret_from_fork+0x10/0x20
[   32.159079] 
[   32.159601] The buggy address belongs to the object at fff00000c5e72800
[   32.159601]  which belongs to the cache kmalloc-128 of size 128
[   32.161249] The buggy address is located 120 bytes inside of
[   32.161249]  freed 128-byte region [fff00000c5e72800, fff00000c5e72880)
[   32.163491] 
[   32.163823] The buggy address belongs to the physical page:
[   32.164612] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e72
[   32.165643] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.166872] page_type: f5(slab)
[   32.167495] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.168578] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   32.169487] page dumped because: kasan: bad access detected
[   32.170110] 
[   32.170479] Memory state around the buggy address:
[   32.171187]  fff00000c5e72700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.172509]  fff00000c5e72780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.174086] >fff00000c5e72800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.175148]                                                                 ^
[   32.175961]  fff00000c5e72880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.176824]  fff00000c5e72900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.178028] ==================================================================
[   32.073268] ==================================================================
[   32.074169] BUG: KASAN: slab-use-after-free in ksize_uaf+0x59c/0x600
[   32.074861] Read of size 1 at addr fff00000c5e72800 by task kunit_try_catch/185
[   32.076942] 
[   32.077329] CPU: 0 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   32.078598] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.079685] Hardware name: linux,dummy-virt (DT)
[   32.080634] Call trace:
[   32.081131]  show_stack+0x20/0x38 (C)
[   32.082502]  dump_stack_lvl+0x8c/0xd0
[   32.083452]  print_report+0x118/0x5e0
[   32.084110]  kasan_report+0xc8/0x118
[   32.084740]  __asan_report_load1_noabort+0x20/0x30
[   32.085519]  ksize_uaf+0x59c/0x600
[   32.086518]  kunit_try_run_case+0x14c/0x3d0
[   32.087252]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.088108]  kthread+0x24c/0x2d0
[   32.088807]  ret_from_fork+0x10/0x20
[   32.089355] 
[   32.089736] Allocated by task 185:
[   32.090294]  kasan_save_stack+0x3c/0x68
[   32.090796]  kasan_save_track+0x20/0x40
[   32.091425]  kasan_save_alloc_info+0x40/0x58
[   32.092915]  __kasan_kmalloc+0xd4/0xd8
[   32.093290]  __kmalloc_cache_noprof+0x15c/0x3c8
[   32.094006]  ksize_uaf+0xb8/0x600
[   32.094458]  kunit_try_run_case+0x14c/0x3d0
[   32.095599]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.096375]  kthread+0x24c/0x2d0
[   32.096977]  ret_from_fork+0x10/0x20
[   32.097487] 
[   32.098687] Freed by task 185:
[   32.099340]  kasan_save_stack+0x3c/0x68
[   32.099870]  kasan_save_track+0x20/0x40
[   32.100506]  kasan_save_free_info+0x4c/0x78
[   32.101136]  __kasan_slab_free+0x6c/0x98
[   32.102062]  kfree+0x114/0x3d0
[   32.102675]  ksize_uaf+0x11c/0x600
[   32.103265]  kunit_try_run_case+0x14c/0x3d0
[   32.103923]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.104607]  kthread+0x24c/0x2d0
[   32.105181]  ret_from_fork+0x10/0x20
[   32.106553] 
[   32.106918] The buggy address belongs to the object at fff00000c5e72800
[   32.106918]  which belongs to the cache kmalloc-128 of size 128
[   32.108600] The buggy address is located 0 bytes inside of
[   32.108600]  freed 128-byte region [fff00000c5e72800, fff00000c5e72880)
[   32.110338] 
[   32.110777] The buggy address belongs to the physical page:
[   32.111465] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e72
[   32.112692] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.113436] page_type: f5(slab)
[   32.113987] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.115490] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   32.116370] page dumped because: kasan: bad access detected
[   32.117264] 
[   32.117743] Memory state around the buggy address:
[   32.118625]  fff00000c5e72700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.119937]  fff00000c5e72780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.120815] >fff00000c5e72800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.121641]                    ^
[   32.122294]  fff00000c5e72880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.123243]  fff00000c5e72900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.124713] ==================================================================

[   32.091015] ==================================================================
[   32.091893] BUG: KASAN: slab-use-after-free in ksize_uaf+0x59c/0x600
[   32.092729] Read of size 1 at addr fff00000c5915300 by task kunit_try_catch/185
[   32.093525] 
[   32.094374] CPU: 0 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   32.095473] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.096074] Hardware name: linux,dummy-virt (DT)
[   32.097837] Call trace:
[   32.098274]  show_stack+0x20/0x38 (C)
[   32.098794]  dump_stack_lvl+0x8c/0xd0
[   32.099459]  print_report+0x118/0x5e0
[   32.099987]  kasan_report+0xc8/0x118
[   32.101017]  __asan_report_load1_noabort+0x20/0x30
[   32.101681]  ksize_uaf+0x59c/0x600
[   32.102178]  kunit_try_run_case+0x14c/0x3d0
[   32.102878]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.103559]  kthread+0x24c/0x2d0
[   32.104218]  ret_from_fork+0x10/0x20
[   32.105442] 
[   32.105734] Allocated by task 185:
[   32.106611]  kasan_save_stack+0x3c/0x68
[   32.107351]  kasan_save_track+0x20/0x40
[   32.107879]  kasan_save_alloc_info+0x40/0x58
[   32.108512]  __kasan_kmalloc+0xd4/0xd8
[   32.109504]  __kmalloc_cache_noprof+0x15c/0x3c8
[   32.110155]  ksize_uaf+0xb8/0x600
[   32.110689]  kunit_try_run_case+0x14c/0x3d0
[   32.111403]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.112139]  kthread+0x24c/0x2d0
[   32.113212]  ret_from_fork+0x10/0x20
[   32.113935] 
[   32.114227] Freed by task 185:
[   32.114825]  kasan_save_stack+0x3c/0x68
[   32.115544]  kasan_save_track+0x20/0x40
[   32.116217]  kasan_save_free_info+0x4c/0x78
[   32.117263]  __kasan_slab_free+0x6c/0x98
[   32.117856]  kfree+0x114/0x3d0
[   32.118418]  ksize_uaf+0x11c/0x600
[   32.119015]  kunit_try_run_case+0x14c/0x3d0
[   32.119538]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.120555]  kthread+0x24c/0x2d0
[   32.121616]  ret_from_fork+0x10/0x20
[   32.122460] 
[   32.122826] The buggy address belongs to the object at fff00000c5915300
[   32.122826]  which belongs to the cache kmalloc-128 of size 128
[   32.124014] The buggy address is located 0 bytes inside of
[   32.124014]  freed 128-byte region [fff00000c5915300, fff00000c5915380)
[   32.125922] 
[   32.126322] The buggy address belongs to the physical page:
[   32.126958] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105915
[   32.127897] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.128863] page_type: f5(slab)
[   32.129869] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.130680] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   32.131849] page dumped because: kasan: bad access detected
[   32.133317] 
[   32.133619] Memory state around the buggy address:
[   32.134513]  fff00000c5915200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.135463]  fff00000c5915280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.136264] >fff00000c5915300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.137242]                    ^
[   32.137641]  fff00000c5915380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.138469]  fff00000c5915400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.139402] ==================================================================
[   32.140955] ==================================================================
[   32.141861] BUG: KASAN: slab-use-after-free in ksize_uaf+0x548/0x600
[   32.142787] Read of size 1 at addr fff00000c5915378 by task kunit_try_catch/185
[   32.143687] 
[   32.144164] CPU: 0 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   32.145542] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.146165] Hardware name: linux,dummy-virt (DT)
[   32.146842] Call trace:
[   32.147933]  show_stack+0x20/0x38 (C)
[   32.148800]  dump_stack_lvl+0x8c/0xd0
[   32.149315]  print_report+0x118/0x5e0
[   32.150237]  kasan_report+0xc8/0x118
[   32.150864]  __asan_report_load1_noabort+0x20/0x30
[   32.151711]  ksize_uaf+0x548/0x600
[   32.152761]  kunit_try_run_case+0x14c/0x3d0
[   32.153475]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.154457]  kthread+0x24c/0x2d0
[   32.154826]  ret_from_fork+0x10/0x20
[   32.155499] 
[   32.155919] Allocated by task 185:
[   32.156439]  kasan_save_stack+0x3c/0x68
[   32.157357]  kasan_save_track+0x20/0x40
[   32.158123]  kasan_save_alloc_info+0x40/0x58
[   32.158798]  __kasan_kmalloc+0xd4/0xd8
[   32.159382]  __kmalloc_cache_noprof+0x15c/0x3c8
[   32.160072]  ksize_uaf+0xb8/0x600
[   32.160541]  kunit_try_run_case+0x14c/0x3d0
[   32.161204]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.161896]  kthread+0x24c/0x2d0
[   32.163248]  ret_from_fork+0x10/0x20
[   32.163765] 
[   32.164148] Freed by task 185:
[   32.165129]  kasan_save_stack+0x3c/0x68
[   32.165696]  kasan_save_track+0x20/0x40
[   32.166325]  kasan_save_free_info+0x4c/0x78
[   32.166934]  __kasan_slab_free+0x6c/0x98
[   32.167515]  kfree+0x114/0x3d0
[   32.168212]  ksize_uaf+0x11c/0x600
[   32.169669]  kunit_try_run_case+0x14c/0x3d0
[   32.170251]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.171069]  kthread+0x24c/0x2d0
[   32.171592]  ret_from_fork+0x10/0x20
[   32.172207] 
[   32.172559] The buggy address belongs to the object at fff00000c5915300
[   32.172559]  which belongs to the cache kmalloc-128 of size 128
[   32.174470] The buggy address is located 120 bytes inside of
[   32.174470]  freed 128-byte region [fff00000c5915300, fff00000c5915380)
[   32.176311] 
[   32.176820] The buggy address belongs to the physical page:
[   32.177563] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105915
[   32.178464] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.179359] page_type: f5(slab)
[   32.179870] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.180482] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   32.180854] page dumped because: kasan: bad access detected
[   32.182094] 
[   32.182500] Memory state around the buggy address:
[   32.183232]  fff00000c5915200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.184179]  fff00000c5915280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.186113] >fff00000c5915300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.187271]                                                                 ^
[   32.188469]  fff00000c5915380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.189639]  fff00000c5915400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.190373] ==================================================================
[   32.038917] ==================================================================
[   32.040073] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x600
[   32.040884] Read of size 1 at addr fff00000c5915300 by task kunit_try_catch/185
[   32.042321] 
[   32.042664] CPU: 0 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   32.043858] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.044884] Hardware name: linux,dummy-virt (DT)
[   32.046090] Call trace:
[   32.046552]  show_stack+0x20/0x38 (C)
[   32.047291]  dump_stack_lvl+0x8c/0xd0
[   32.047962]  print_report+0x118/0x5e0
[   32.048721]  kasan_report+0xc8/0x118
[   32.049217]  __kasan_check_byte+0x54/0x70
[   32.049798]  ksize+0x30/0x88
[   32.050547]  ksize_uaf+0x168/0x600
[   32.051045]  kunit_try_run_case+0x14c/0x3d0
[   32.051768]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.052592]  kthread+0x24c/0x2d0
[   32.053575]  ret_from_fork+0x10/0x20
[   32.054191] 
[   32.054606] Allocated by task 185:
[   32.055146]  kasan_save_stack+0x3c/0x68
[   32.055757]  kasan_save_track+0x20/0x40
[   32.056321]  kasan_save_alloc_info+0x40/0x58
[   32.057043]  __kasan_kmalloc+0xd4/0xd8
[   32.057654]  __kmalloc_cache_noprof+0x15c/0x3c8
[   32.058233]  ksize_uaf+0xb8/0x600
[   32.058692]  kunit_try_run_case+0x14c/0x3d0
[   32.060037]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.061028]  kthread+0x24c/0x2d0
[   32.061759]  ret_from_fork+0x10/0x20
[   32.062433] 
[   32.062852] Freed by task 185:
[   32.063542]  kasan_save_stack+0x3c/0x68
[   32.064290]  kasan_save_track+0x20/0x40
[   32.065018]  kasan_save_free_info+0x4c/0x78
[   32.065508]  __kasan_slab_free+0x6c/0x98
[   32.066269]  kfree+0x114/0x3d0
[   32.066958]  ksize_uaf+0x11c/0x600
[   32.067623]  kunit_try_run_case+0x14c/0x3d0
[   32.068455]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.069309]  kthread+0x24c/0x2d0
[   32.070247]  ret_from_fork+0x10/0x20
[   32.070789] 
[   32.071220] The buggy address belongs to the object at fff00000c5915300
[   32.071220]  which belongs to the cache kmalloc-128 of size 128
[   32.072574] The buggy address is located 0 bytes inside of
[   32.072574]  freed 128-byte region [fff00000c5915300, fff00000c5915380)
[   32.074682] 
[   32.075117] The buggy address belongs to the physical page:
[   32.075773] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105915
[   32.076845] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.078055] page_type: f5(slab)
[   32.078631] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.079597] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   32.081209] page dumped because: kasan: bad access detected
[   32.081985] 
[   32.082385] Memory state around the buggy address:
[   32.083049]  fff00000c5915200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.084004]  fff00000c5915280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.084891] >fff00000c5915300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.086015]                    ^
[   32.086536]  fff00000c5915380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.087323]  fff00000c5915400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.088147] ==================================================================

[   26.196817] ==================================================================
[   26.197217] BUG: KASAN: slab-use-after-free in ksize_uaf+0x19e/0x6c0
[   26.197217] Read of size 1 at addr ffff88810293c500 by task kunit_try_catch/205
[   26.197217] 
[   26.197217] CPU: 1 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   26.197217] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.197217] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.197217] Call Trace:
[   26.197217]  <TASK>
[   26.197217]  dump_stack_lvl+0x73/0xb0
[   26.197217]  print_report+0xd1/0x640
[   26.197217]  ? __virt_addr_valid+0x1db/0x2d0
[   26.197217]  ? kasan_complete_mode_report_info+0x64/0x200
[   26.197217]  kasan_report+0x102/0x140
[   26.197217]  ? ksize_uaf+0x19e/0x6c0
[   26.197217]  ? ksize_uaf+0x19e/0x6c0
[   26.197217]  ? ksize_uaf+0x19e/0x6c0
[   26.197217]  __kasan_check_byte+0x3d/0x50
[   26.197217]  ksize+0x20/0x60
[   26.197217]  ksize_uaf+0x19e/0x6c0
[   26.197217]  ? __pfx_ksize_uaf+0x10/0x10
[   26.197217]  ? __schedule+0xc3e/0x2790
[   26.197217]  ? ktime_get_ts64+0x84/0x230
[   26.197217]  kunit_try_run_case+0x1b3/0x490
[   26.197217]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.197217]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   26.197217]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.197217]  ? __kthread_parkme+0x82/0x160
[   26.197217]  ? preempt_count_sub+0x50/0x80
[   26.197217]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.197217]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.197217]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.197217]  kthread+0x257/0x310
[   26.197217]  ? __pfx_kthread+0x10/0x10
[   26.197217]  ret_from_fork+0x41/0x80
[   26.197217]  ? __pfx_kthread+0x10/0x10
[   26.197217]  ret_from_fork_asm+0x1a/0x30
[   26.197217]  </TASK>
[   26.197217] 
[   26.197217] Allocated by task 205:
[   26.197217]  kasan_save_stack+0x3d/0x60
[   26.197217]  kasan_save_track+0x18/0x40
[   26.197217]  kasan_save_alloc_info+0x3b/0x50
[   26.197217]  __kasan_kmalloc+0xb7/0xc0
[   26.197217]  __kmalloc_cache_noprof+0x184/0x410
[   26.197217]  ksize_uaf+0xab/0x6c0
[   26.197217]  kunit_try_run_case+0x1b3/0x490
[   26.197217]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.197217]  kthread+0x257/0x310
[   26.197217]  ret_from_fork+0x41/0x80
[   26.197217]  ret_from_fork_asm+0x1a/0x30
[   26.197217] 
[   26.197217] Freed by task 205:
[   26.197217]  kasan_save_stack+0x3d/0x60
[   26.197217]  kasan_save_track+0x18/0x40
[   26.197217]  kasan_save_free_info+0x3f/0x60
[   26.197217]  __kasan_slab_free+0x56/0x70
[   26.197217]  kfree+0x123/0x3f0
[   26.197217]  ksize_uaf+0x12d/0x6c0
[   26.197217]  kunit_try_run_case+0x1b3/0x490
[   26.197217]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.197217]  kthread+0x257/0x310
[   26.197217]  ret_from_fork+0x41/0x80
[   26.197217]  ret_from_fork_asm+0x1a/0x30
[   26.197217] 
[   26.197217] The buggy address belongs to the object at ffff88810293c500
[   26.197217]  which belongs to the cache kmalloc-128 of size 128
[   26.197217] The buggy address is located 0 bytes inside of
[   26.197217]  freed 128-byte region [ffff88810293c500, ffff88810293c580)
[   26.197217] 
[   26.197217] The buggy address belongs to the physical page:
[   26.197217] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10293c
[   26.197217] flags: 0x200000000000000(node=0|zone=2)
[   26.197217] page_type: f5(slab)
[   26.197217] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   26.197217] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   26.197217] page dumped because: kasan: bad access detected
[   26.197217] 
[   26.197217] Memory state around the buggy address:
[   26.197217]  ffff88810293c400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   26.197217]  ffff88810293c480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.197217] >ffff88810293c500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.197217]                    ^
[   26.197217]  ffff88810293c580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.197217]  ffff88810293c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.197217] ==================================================================
[   26.255446] ==================================================================
[   26.256187] BUG: KASAN: slab-use-after-free in ksize_uaf+0x600/0x6c0
[   26.256187] Read of size 1 at addr ffff88810293c500 by task kunit_try_catch/205
[   26.256187] 
[   26.256187] CPU: 1 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   26.256187] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.256187] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.256187] Call Trace:
[   26.256187]  <TASK>
[   26.256187]  dump_stack_lvl+0x73/0xb0
[   26.256187]  print_report+0xd1/0x640
[   26.256187]  ? __virt_addr_valid+0x1db/0x2d0
[   26.256187]  ? kasan_complete_mode_report_info+0x64/0x200
[   26.256187]  kasan_report+0x102/0x140
[   26.256187]  ? ksize_uaf+0x600/0x6c0
[   26.256187]  ? ksize_uaf+0x600/0x6c0
[   26.256187]  __asan_report_load1_noabort+0x18/0x20
[   26.256187]  ksize_uaf+0x600/0x6c0
[   26.256187]  ? __pfx_ksize_uaf+0x10/0x10
[   26.256187]  ? __schedule+0xc3e/0x2790
[   26.256187]  ? ktime_get_ts64+0x84/0x230
[   26.256187]  kunit_try_run_case+0x1b3/0x490
[   26.256187]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.256187]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   26.256187]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.256187]  ? __kthread_parkme+0x82/0x160
[   26.256187]  ? preempt_count_sub+0x50/0x80
[   26.256187]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.256187]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.256187]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.256187]  kthread+0x257/0x310
[   26.256187]  ? __pfx_kthread+0x10/0x10
[   26.256187]  ret_from_fork+0x41/0x80
[   26.256187]  ? __pfx_kthread+0x10/0x10
[   26.256187]  ret_from_fork_asm+0x1a/0x30
[   26.256187]  </TASK>
[   26.256187] 
[   26.256187] Allocated by task 205:
[   26.256187]  kasan_save_stack+0x3d/0x60
[   26.256187]  kasan_save_track+0x18/0x40
[   26.256187]  kasan_save_alloc_info+0x3b/0x50
[   26.256187]  __kasan_kmalloc+0xb7/0xc0
[   26.256187]  __kmalloc_cache_noprof+0x184/0x410
[   26.256187]  ksize_uaf+0xab/0x6c0
[   26.256187]  kunit_try_run_case+0x1b3/0x490
[   26.256187]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.256187]  kthread+0x257/0x310
[   26.256187]  ret_from_fork+0x41/0x80
[   26.256187]  ret_from_fork_asm+0x1a/0x30
[   26.256187] 
[   26.256187] Freed by task 205:
[   26.256187]  kasan_save_stack+0x3d/0x60
[   26.256187]  kasan_save_track+0x18/0x40
[   26.256187]  kasan_save_free_info+0x3f/0x60
[   26.256187]  __kasan_slab_free+0x56/0x70
[   26.256187]  kfree+0x123/0x3f0
[   26.256187]  ksize_uaf+0x12d/0x6c0
[   26.256187]  kunit_try_run_case+0x1b3/0x490
[   26.256187]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.256187]  kthread+0x257/0x310
[   26.256187]  ret_from_fork+0x41/0x80
[   26.256187]  ret_from_fork_asm+0x1a/0x30
[   26.256187] 
[   26.256187] The buggy address belongs to the object at ffff88810293c500
[   26.256187]  which belongs to the cache kmalloc-128 of size 128
[   26.256187] The buggy address is located 0 bytes inside of
[   26.256187]  freed 128-byte region [ffff88810293c500, ffff88810293c580)
[   26.256187] 
[   26.256187] The buggy address belongs to the physical page:
[   26.256187] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10293c
[   26.256187] flags: 0x200000000000000(node=0|zone=2)
[   26.256187] page_type: f5(slab)
[   26.256187] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   26.256187] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   26.256187] page dumped because: kasan: bad access detected
[   26.256187] 
[   26.256187] Memory state around the buggy address:
[   26.256187]  ffff88810293c400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.256187]  ffff88810293c480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.256187] >ffff88810293c500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.256187]                    ^
[   26.256187]  ffff88810293c580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.256187]  ffff88810293c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.256187] ==================================================================
[   26.314540] ==================================================================
[   26.315151] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5e6/0x6c0
[   26.315151] Read of size 1 at addr ffff88810293c578 by task kunit_try_catch/205
[   26.315151] 
[   26.315151] CPU: 1 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   26.315151] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.315151] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.315151] Call Trace:
[   26.315151]  <TASK>
[   26.315151]  dump_stack_lvl+0x73/0xb0
[   26.315151]  print_report+0xd1/0x640
[   26.315151]  ? __virt_addr_valid+0x1db/0x2d0
[   26.315151]  ? kasan_complete_mode_report_info+0x64/0x200
[   26.315151]  kasan_report+0x102/0x140
[   26.315151]  ? ksize_uaf+0x5e6/0x6c0
[   26.315151]  ? ksize_uaf+0x5e6/0x6c0
[   26.315151]  __asan_report_load1_noabort+0x18/0x20
[   26.315151]  ksize_uaf+0x5e6/0x6c0
[   26.315151]  ? __pfx_ksize_uaf+0x10/0x10
[   26.315151]  ? __schedule+0xc3e/0x2790
[   26.315151]  ? ktime_get_ts64+0x84/0x230
[   26.315151]  kunit_try_run_case+0x1b3/0x490
[   26.315151]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.315151]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   26.315151]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.315151]  ? __kthread_parkme+0x82/0x160
[   26.315151]  ? preempt_count_sub+0x50/0x80
[   26.315151]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.315151]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.315151]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.315151]  kthread+0x257/0x310
[   26.315151]  ? __pfx_kthread+0x10/0x10
[   26.315151]  ret_from_fork+0x41/0x80
[   26.315151]  ? __pfx_kthread+0x10/0x10
[   26.315151]  ret_from_fork_asm+0x1a/0x30
[   26.315151]  </TASK>
[   26.315151] 
[   26.315151] Allocated by task 205:
[   26.315151]  kasan_save_stack+0x3d/0x60
[   26.315151]  kasan_save_track+0x18/0x40
[   26.315151]  kasan_save_alloc_info+0x3b/0x50
[   26.315151]  __kasan_kmalloc+0xb7/0xc0
[   26.315151]  __kmalloc_cache_noprof+0x184/0x410
[   26.315151]  ksize_uaf+0xab/0x6c0
[   26.315151]  kunit_try_run_case+0x1b3/0x490
[   26.315151]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.315151]  kthread+0x257/0x310
[   26.315151]  ret_from_fork+0x41/0x80
[   26.315151]  ret_from_fork_asm+0x1a/0x30
[   26.315151] 
[   26.315151] Freed by task 205:
[   26.315151]  kasan_save_stack+0x3d/0x60
[   26.315151]  kasan_save_track+0x18/0x40
[   26.315151]  kasan_save_free_info+0x3f/0x60
[   26.315151]  __kasan_slab_free+0x56/0x70
[   26.315151]  kfree+0x123/0x3f0
[   26.315151]  ksize_uaf+0x12d/0x6c0
[   26.315151]  kunit_try_run_case+0x1b3/0x490
[   26.315151]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.315151]  kthread+0x257/0x310
[   26.315151]  ret_from_fork+0x41/0x80
[   26.315151]  ret_from_fork_asm+0x1a/0x30
[   26.315151] 
[   26.315151] The buggy address belongs to the object at ffff88810293c500
[   26.315151]  which belongs to the cache kmalloc-128 of size 128
[   26.315151] The buggy address is located 120 bytes inside of
[   26.315151]  freed 128-byte region [ffff88810293c500, ffff88810293c580)
[   26.315151] 
[   26.315151] The buggy address belongs to the physical page:
[   26.315151] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10293c
[   26.315151] flags: 0x200000000000000(node=0|zone=2)
[   26.315151] page_type: f5(slab)
[   26.315151] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   26.315151] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   26.315151] page dumped because: kasan: bad access detected
[   26.315151] 
[   26.315151] Memory state around the buggy address:
[   26.315151]  ffff88810293c400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.315151]  ffff88810293c480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.315151] >ffff88810293c500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.315151]                                                                 ^
[   26.315151]  ffff88810293c580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.315151]  ffff88810293c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.315151] ==================================================================

[   21.208205] ==================================================================
[   21.209258] BUG: KASAN: slab-use-after-free in ksize_uaf+0x19e/0x6c0
[   21.210179] Read of size 1 at addr ffff888102961500 by task kunit_try_catch/203
[   21.210936] 
[   21.211130] CPU: 1 UID: 0 PID: 203 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   21.213004] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.213655] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.214655] Call Trace:
[   21.214886]  <TASK>
[   21.215173]  dump_stack_lvl+0x73/0xb0
[   21.215957]  print_report+0xd1/0x640
[   21.216461]  ? __virt_addr_valid+0x1db/0x2d0
[   21.217551]  ? kasan_complete_mode_report_info+0x64/0x200
[   21.218517]  kasan_report+0x102/0x140
[   21.218944]  ? ksize_uaf+0x19e/0x6c0
[   21.219611]  ? ksize_uaf+0x19e/0x6c0
[   21.220092]  ? ksize_uaf+0x19e/0x6c0
[   21.220481]  __kasan_check_byte+0x3d/0x50
[   21.220972]  ksize+0x20/0x60
[   21.221348]  ksize_uaf+0x19e/0x6c0
[   21.221734]  ? __pfx_ksize_uaf+0x10/0x10
[   21.222023]  ? __schedule+0xc3e/0x2790
[   21.222460]  ? __pfx_read_tsc+0x10/0x10
[   21.223345]  ? ktime_get_ts64+0x84/0x230
[   21.223917]  kunit_try_run_case+0x1b3/0x490
[   21.224433]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.224923]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   21.225543]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.226544]  ? __kthread_parkme+0x82/0x160
[   21.226985]  ? preempt_count_sub+0x50/0x80
[   21.227293]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.228360]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.229612]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.230448]  kthread+0x257/0x310
[   21.230918]  ? __pfx_kthread+0x10/0x10
[   21.231508]  ret_from_fork+0x41/0x80
[   21.231847]  ? __pfx_kthread+0x10/0x10
[   21.232222]  ret_from_fork_asm+0x1a/0x30
[   21.232871]  </TASK>
[   21.233154] 
[   21.233544] Allocated by task 203:
[   21.233805]  kasan_save_stack+0x3d/0x60
[   21.234100]  kasan_save_track+0x18/0x40
[   21.235034]  kasan_save_alloc_info+0x3b/0x50
[   21.235658]  __kasan_kmalloc+0xb7/0xc0
[   21.235998]  __kmalloc_cache_noprof+0x184/0x410
[   21.236585]  ksize_uaf+0xab/0x6c0
[   21.237529]  kunit_try_run_case+0x1b3/0x490
[   21.238070]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.238535]  kthread+0x257/0x310
[   21.238881]  ret_from_fork+0x41/0x80
[   21.239397]  ret_from_fork_asm+0x1a/0x30
[   21.239891] 
[   21.240967] Freed by task 203:
[   21.241198]  kasan_save_stack+0x3d/0x60
[   21.242107]  kasan_save_track+0x18/0x40
[   21.242512]  kasan_save_free_info+0x3f/0x60
[   21.242936]  __kasan_slab_free+0x56/0x70
[   21.244173]  kfree+0x123/0x3f0
[   21.244551]  ksize_uaf+0x12d/0x6c0
[   21.245113]  kunit_try_run_case+0x1b3/0x490
[   21.246399]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.246886]  kthread+0x257/0x310
[   21.247635]  ret_from_fork+0x41/0x80
[   21.248257]  ret_from_fork_asm+0x1a/0x30
[   21.248931] 
[   21.249309] The buggy address belongs to the object at ffff888102961500
[   21.249309]  which belongs to the cache kmalloc-128 of size 128
[   21.250592] The buggy address is located 0 bytes inside of
[   21.250592]  freed 128-byte region [ffff888102961500, ffff888102961580)
[   21.252354] 
[   21.252682] The buggy address belongs to the physical page:
[   21.253257] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102961
[   21.253917] flags: 0x200000000000000(node=0|zone=2)
[   21.254451] page_type: f5(slab)
[   21.254943] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   21.255749] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   21.256534] page dumped because: kasan: bad access detected
[   21.256952] 
[   21.257185] Memory state around the buggy address:
[   21.258038]  ffff888102961400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.258601]  ffff888102961480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.259924] >ffff888102961500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.260710]                    ^
[   21.261045]  ffff888102961580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.261574]  ffff888102961600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.262097] ==================================================================
[   21.311625] ==================================================================
[   21.312233] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5e6/0x6c0
[   21.312823] Read of size 1 at addr ffff888102961578 by task kunit_try_catch/203
[   21.313423] 
[   21.314146] CPU: 1 UID: 0 PID: 203 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   21.315045] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.315807] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.316876] Call Trace:
[   21.317122]  <TASK>
[   21.317329]  dump_stack_lvl+0x73/0xb0
[   21.317745]  print_report+0xd1/0x640
[   21.318181]  ? __virt_addr_valid+0x1db/0x2d0
[   21.318892]  ? kasan_complete_mode_report_info+0x64/0x200
[   21.319639]  kasan_report+0x102/0x140
[   21.320270]  ? ksize_uaf+0x5e6/0x6c0
[   21.320758]  ? ksize_uaf+0x5e6/0x6c0
[   21.321397]  __asan_report_load1_noabort+0x18/0x20
[   21.322792]  ksize_uaf+0x5e6/0x6c0
[   21.323255]  ? __pfx_ksize_uaf+0x10/0x10
[   21.323878]  ? __schedule+0xc3e/0x2790
[   21.324623]  ? __pfx_read_tsc+0x10/0x10
[   21.325319]  ? ktime_get_ts64+0x84/0x230
[   21.325840]  kunit_try_run_case+0x1b3/0x490
[   21.326315]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.327480]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   21.328187]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.328662]  ? __kthread_parkme+0x82/0x160
[   21.329218]  ? preempt_count_sub+0x50/0x80
[   21.329703]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.330356]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.331126]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.331745]  kthread+0x257/0x310
[   21.332645]  ? __pfx_kthread+0x10/0x10
[   21.333296]  ret_from_fork+0x41/0x80
[   21.333807]  ? __pfx_kthread+0x10/0x10
[   21.334258]  ret_from_fork_asm+0x1a/0x30
[   21.334967]  </TASK>
[   21.335502] 
[   21.335811] Allocated by task 203:
[   21.336285]  kasan_save_stack+0x3d/0x60
[   21.336815]  kasan_save_track+0x18/0x40
[   21.337766]  kasan_save_alloc_info+0x3b/0x50
[   21.338297]  __kasan_kmalloc+0xb7/0xc0
[   21.338604]  __kmalloc_cache_noprof+0x184/0x410
[   21.338896]  ksize_uaf+0xab/0x6c0
[   21.339136]  kunit_try_run_case+0x1b3/0x490
[   21.339850]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.340570]  kthread+0x257/0x310
[   21.341154]  ret_from_fork+0x41/0x80
[   21.341644]  ret_from_fork_asm+0x1a/0x30
[   21.342262] 
[   21.342543] Freed by task 203:
[   21.342922]  kasan_save_stack+0x3d/0x60
[   21.343870]  kasan_save_track+0x18/0x40
[   21.344634]  kasan_save_free_info+0x3f/0x60
[   21.345323]  __kasan_slab_free+0x56/0x70
[   21.345760]  kfree+0x123/0x3f0
[   21.346170]  ksize_uaf+0x12d/0x6c0
[   21.346618]  kunit_try_run_case+0x1b3/0x490
[   21.347185]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.347900]  kthread+0x257/0x310
[   21.348912]  ret_from_fork+0x41/0x80
[   21.349471]  ret_from_fork_asm+0x1a/0x30
[   21.350099] 
[   21.350377] The buggy address belongs to the object at ffff888102961500
[   21.350377]  which belongs to the cache kmalloc-128 of size 128
[   21.351289] The buggy address is located 120 bytes inside of
[   21.351289]  freed 128-byte region [ffff888102961500, ffff888102961580)
[   21.352520] 
[   21.352795] The buggy address belongs to the physical page:
[   21.353865] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102961
[   21.354837] flags: 0x200000000000000(node=0|zone=2)
[   21.355540] page_type: f5(slab)
[   21.355831] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   21.356370] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   21.357243] page dumped because: kasan: bad access detected
[   21.357783] 
[   21.358006] Memory state around the buggy address:
[   21.358482]  ffff888102961400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.359867]  ffff888102961480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.360699] >ffff888102961500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.361372]                                                                 ^
[   21.362217]  ffff888102961580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.362862]  ffff888102961600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.363892] ==================================================================
[   21.265807] ==================================================================
[   21.266705] BUG: KASAN: slab-use-after-free in ksize_uaf+0x600/0x6c0
[   21.267656] Read of size 1 at addr ffff888102961500 by task kunit_try_catch/203
[   21.268351] 
[   21.268913] CPU: 1 UID: 0 PID: 203 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   21.270322] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.270630] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.271591] Call Trace:
[   21.272169]  <TASK>
[   21.272674]  dump_stack_lvl+0x73/0xb0
[   21.273290]  print_report+0xd1/0x640
[   21.273746]  ? __virt_addr_valid+0x1db/0x2d0
[   21.274205]  ? kasan_complete_mode_report_info+0x64/0x200
[   21.275162]  kasan_report+0x102/0x140
[   21.275782]  ? ksize_uaf+0x600/0x6c0
[   21.275965]  ? ksize_uaf+0x600/0x6c0
[   21.277189]  __asan_report_load1_noabort+0x18/0x20
[   21.277616]  ksize_uaf+0x600/0x6c0
[   21.278091]  ? __pfx_ksize_uaf+0x10/0x10
[   21.278646]  ? __schedule+0xc3e/0x2790
[   21.279269]  ? __pfx_read_tsc+0x10/0x10
[   21.279817]  ? ktime_get_ts64+0x84/0x230
[   21.280403]  kunit_try_run_case+0x1b3/0x490
[   21.280919]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.282159]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   21.283021]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.283754]  ? __kthread_parkme+0x82/0x160
[   21.284193]  ? preempt_count_sub+0x50/0x80
[   21.284858]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.285628]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.286085]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.286682]  kthread+0x257/0x310
[   21.287087]  ? __pfx_kthread+0x10/0x10
[   21.287699]  ret_from_fork+0x41/0x80
[   21.287972]  ? __pfx_kthread+0x10/0x10
[   21.288307]  ret_from_fork_asm+0x1a/0x30
[   21.288775]  </TASK>
[   21.289052] 
[   21.289256] Allocated by task 203:
[   21.289478]  kasan_save_stack+0x3d/0x60
[   21.289928]  kasan_save_track+0x18/0x40
[   21.290398]  kasan_save_alloc_info+0x3b/0x50
[   21.291049]  __kasan_kmalloc+0xb7/0xc0
[   21.291301]  __kmalloc_cache_noprof+0x184/0x410
[   21.291759]  ksize_uaf+0xab/0x6c0
[   21.292317]  kunit_try_run_case+0x1b3/0x490
[   21.292672]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.293343]  kthread+0x257/0x310
[   21.293719]  ret_from_fork+0x41/0x80
[   21.294238]  ret_from_fork_asm+0x1a/0x30
[   21.294719] 
[   21.294935] Freed by task 203:
[   21.295396]  kasan_save_stack+0x3d/0x60
[   21.295733]  kasan_save_track+0x18/0x40
[   21.296006]  kasan_save_free_info+0x3f/0x60
[   21.296288]  __kasan_slab_free+0x56/0x70
[   21.296774]  kfree+0x123/0x3f0
[   21.297288]  ksize_uaf+0x12d/0x6c0
[   21.297708]  kunit_try_run_case+0x1b3/0x490
[   21.298189]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.298752]  kthread+0x257/0x310
[   21.299227]  ret_from_fork+0x41/0x80
[   21.299770]  ret_from_fork_asm+0x1a/0x30
[   21.300242] 
[   21.300541] The buggy address belongs to the object at ffff888102961500
[   21.300541]  which belongs to the cache kmalloc-128 of size 128
[   21.301463] The buggy address is located 0 bytes inside of
[   21.301463]  freed 128-byte region [ffff888102961500, ffff888102961580)
[   21.302090] 
[   21.302368] The buggy address belongs to the physical page:
[   21.302926] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102961
[   21.303752] flags: 0x200000000000000(node=0|zone=2)
[   21.304395] page_type: f5(slab)
[   21.304842] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   21.305537] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   21.306064] page dumped because: kasan: bad access detected
[   21.306368] 
[   21.306558] Memory state around the buggy address:
[   21.307097]  ffff888102961400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.307768]  ffff888102961480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.308421] >ffff888102961500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.308989]                    ^
[   21.309341]  ffff888102961580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.309845]  ffff888102961600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.310547] ==================================================================