Hay
Date
May 26, 2025, 9:10 a.m.

Environment
qemu-arm64
qemu-x86_64

[   17.918610] ==================================================================
[   17.918968] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8
[   17.919083] Read of size 1 at addr fff00000c78c2378 by task kunit_try_catch/196
[   17.919212] 
[   17.919274] CPU: 0 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   17.919442] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.919490] Hardware name: linux,dummy-virt (DT)
[   17.919544] Call trace:
[   17.919590]  show_stack+0x20/0x38 (C)
[   17.919695]  dump_stack_lvl+0x8c/0xd0
[   17.919824]  print_report+0x118/0x608
[   17.919923]  kasan_report+0xdc/0x128
[   17.920074]  __asan_report_load1_noabort+0x20/0x30
[   17.920228]  ksize_uaf+0x544/0x5f8
[   17.920382]  kunit_try_run_case+0x170/0x3f0
[   17.920561]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.920688]  kthread+0x328/0x630
[   17.920787]  ret_from_fork+0x10/0x20
[   17.920889] 
[   17.920928] Allocated by task 196:
[   17.920990]  kasan_save_stack+0x3c/0x68
[   17.921072]  kasan_save_track+0x20/0x40
[   17.921176]  kasan_save_alloc_info+0x40/0x58
[   17.921343]  __kasan_kmalloc+0xd4/0xd8
[   17.921571]  __kmalloc_cache_noprof+0x15c/0x3c0
[   17.921670]  ksize_uaf+0xb8/0x5f8
[   17.922012]  kunit_try_run_case+0x170/0x3f0
[   17.922137]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.922882]  kthread+0x328/0x630
[   17.923122]  ret_from_fork+0x10/0x20
[   17.923864] 
[   17.924147] Freed by task 196:
[   17.924212]  kasan_save_stack+0x3c/0x68
[   17.924675]  kasan_save_track+0x20/0x40
[   17.924764]  kasan_save_free_info+0x4c/0x78
[   17.924851]  __kasan_slab_free+0x6c/0x98
[   17.925993]  kfree+0x214/0x3c8
[   17.926578]  ksize_uaf+0x11c/0x5f8
[   17.926839]  kunit_try_run_case+0x170/0x3f0
[   17.926919]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.926997]  kthread+0x328/0x630
[   17.927062]  ret_from_fork+0x10/0x20
[   17.927875] 
[   17.928062] The buggy address belongs to the object at fff00000c78c2300
[   17.928062]  which belongs to the cache kmalloc-128 of size 128
[   17.928824] The buggy address is located 120 bytes inside of
[   17.928824]  freed 128-byte region [fff00000c78c2300, fff00000c78c2380)
[   17.929329] 
[   17.929483] The buggy address belongs to the physical page:
[   17.929574] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078c2
[   17.929806] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.930187] page_type: f5(slab)
[   17.930412] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.930623] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.930712] page dumped because: kasan: bad access detected
[   17.931055] 
[   17.931100] Memory state around the buggy address:
[   17.931173]  fff00000c78c2200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.931276]  fff00000c78c2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.931378] >fff00000c78c2300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.931456]                                                                 ^
[   17.931550]  fff00000c78c2380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.931645]  fff00000c78c2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.931740] ==================================================================
[   17.909113] ==================================================================
[   17.909818] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8
[   17.910267] Read of size 1 at addr fff00000c78c2300 by task kunit_try_catch/196
[   17.910658] 
[   17.910752] CPU: 0 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   17.911042] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.911101] Hardware name: linux,dummy-virt (DT)
[   17.911170] Call trace:
[   17.911226]  show_stack+0x20/0x38 (C)
[   17.911367]  dump_stack_lvl+0x8c/0xd0
[   17.911484]  print_report+0x118/0x608
[   17.911584]  kasan_report+0xdc/0x128
[   17.911671]  __asan_report_load1_noabort+0x20/0x30
[   17.911771]  ksize_uaf+0x598/0x5f8
[   17.911846]  kunit_try_run_case+0x170/0x3f0
[   17.911959]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.912093]  kthread+0x328/0x630
[   17.912196]  ret_from_fork+0x10/0x20
[   17.912357] 
[   17.912393] Allocated by task 196:
[   17.912457]  kasan_save_stack+0x3c/0x68
[   17.912538]  kasan_save_track+0x20/0x40
[   17.912850]  kasan_save_alloc_info+0x40/0x58
[   17.912937]  __kasan_kmalloc+0xd4/0xd8
[   17.913024]  __kmalloc_cache_noprof+0x15c/0x3c0
[   17.913383]  ksize_uaf+0xb8/0x5f8
[   17.913533]  kunit_try_run_case+0x170/0x3f0
[   17.913612]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.913698]  kthread+0x328/0x630
[   17.913762]  ret_from_fork+0x10/0x20
[   17.914022] 
[   17.914098] Freed by task 196:
[   17.914168]  kasan_save_stack+0x3c/0x68
[   17.914246]  kasan_save_track+0x20/0x40
[   17.914333]  kasan_save_free_info+0x4c/0x78
[   17.914411]  __kasan_slab_free+0x6c/0x98
[   17.914477]  kfree+0x214/0x3c8
[   17.914548]  ksize_uaf+0x11c/0x5f8
[   17.914621]  kunit_try_run_case+0x170/0x3f0
[   17.914700]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.914804]  kthread+0x328/0x630
[   17.914877]  ret_from_fork+0x10/0x20
[   17.914954] 
[   17.914998] The buggy address belongs to the object at fff00000c78c2300
[   17.914998]  which belongs to the cache kmalloc-128 of size 128
[   17.915129] The buggy address is located 0 bytes inside of
[   17.915129]  freed 128-byte region [fff00000c78c2300, fff00000c78c2380)
[   17.915262] 
[   17.915307] The buggy address belongs to the physical page:
[   17.915387] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078c2
[   17.915494] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.915956] page_type: f5(slab)
[   17.916112] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.916259] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.916384] page dumped because: kasan: bad access detected
[   17.916456] 
[   17.916496] Memory state around the buggy address:
[   17.916558]  fff00000c78c2200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.916675]  fff00000c78c2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.916767] >fff00000c78c2300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.917004]                    ^
[   17.917114]  fff00000c78c2380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.917211]  fff00000c78c2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.917299] ==================================================================
[   17.897406] ==================================================================
[   17.897556] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8
[   17.898039] Read of size 1 at addr fff00000c78c2300 by task kunit_try_catch/196
[   17.898198] 
[   17.898295] CPU: 0 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   17.898558] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.898628] Hardware name: linux,dummy-virt (DT)
[   17.898705] Call trace:
[   17.898791]  show_stack+0x20/0x38 (C)
[   17.898970]  dump_stack_lvl+0x8c/0xd0
[   17.899110]  print_report+0x118/0x608
[   17.899206]  kasan_report+0xdc/0x128
[   17.899332]  __kasan_check_byte+0x54/0x70
[   17.899717]  ksize+0x30/0x88
[   17.900078]  ksize_uaf+0x168/0x5f8
[   17.900199]  kunit_try_run_case+0x170/0x3f0
[   17.900339]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.900479]  kthread+0x328/0x630
[   17.900603]  ret_from_fork+0x10/0x20
[   17.900745] 
[   17.900789] Allocated by task 196:
[   17.900862]  kasan_save_stack+0x3c/0x68
[   17.900999]  kasan_save_track+0x20/0x40
[   17.901114]  kasan_save_alloc_info+0x40/0x58
[   17.901233]  __kasan_kmalloc+0xd4/0xd8
[   17.901333]  __kmalloc_cache_noprof+0x15c/0x3c0
[   17.901409]  ksize_uaf+0xb8/0x5f8
[   17.901481]  kunit_try_run_case+0x170/0x3f0
[   17.901828]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.901984]  kthread+0x328/0x630
[   17.902215]  ret_from_fork+0x10/0x20
[   17.902262] 
[   17.902284] Freed by task 196:
[   17.902333]  kasan_save_stack+0x3c/0x68
[   17.902437]  kasan_save_track+0x20/0x40
[   17.902547]  kasan_save_free_info+0x4c/0x78
[   17.902633]  __kasan_slab_free+0x6c/0x98
[   17.902709]  kfree+0x214/0x3c8
[   17.902815]  ksize_uaf+0x11c/0x5f8
[   17.902904]  kunit_try_run_case+0x170/0x3f0
[   17.902975]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.903057]  kthread+0x328/0x630
[   17.903119]  ret_from_fork+0x10/0x20
[   17.903223] 
[   17.903262] The buggy address belongs to the object at fff00000c78c2300
[   17.903262]  which belongs to the cache kmalloc-128 of size 128
[   17.903629] The buggy address is located 0 bytes inside of
[   17.903629]  freed 128-byte region [fff00000c78c2300, fff00000c78c2380)
[   17.903778] 
[   17.903843] The buggy address belongs to the physical page:
[   17.903954] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078c2
[   17.904093] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.904327] page_type: f5(slab)
[   17.904571] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.904707] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.905016] page dumped because: kasan: bad access detected
[   17.905235] 
[   17.905387] Memory state around the buggy address:
[   17.905684]  fff00000c78c2200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.906034]  fff00000c78c2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.906164] >fff00000c78c2300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.906248]                    ^
[   17.906642]  fff00000c78c2380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.906847]  fff00000c78c2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.906938] ==================================================================


[   11.471326] ==================================================================
[   11.472417] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5fe/0x6c0
[   11.472642] Read of size 1 at addr ffff888102a7ae00 by task kunit_try_catch/214
[   11.473766] 
[   11.474158] CPU: 1 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT(voluntary) 
[   11.474211] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.474236] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.474257] Call Trace:
[   11.474271]  <TASK>
[   11.474286]  dump_stack_lvl+0x73/0xb0
[   11.474320]  print_report+0xd1/0x650
[   11.474342]  ? __virt_addr_valid+0x1db/0x2d0
[   11.474364]  ? ksize_uaf+0x5fe/0x6c0
[   11.474393]  ? kasan_complete_mode_report_info+0x64/0x200
[   11.474415]  ? ksize_uaf+0x5fe/0x6c0
[   11.474436]  kasan_report+0x141/0x180
[   11.474457]  ? ksize_uaf+0x5fe/0x6c0
[   11.474483]  __asan_report_load1_noabort+0x18/0x20
[   11.474502]  ksize_uaf+0x5fe/0x6c0
[   11.474523]  ? __pfx_ksize_uaf+0x10/0x10
[   11.474544]  ? __schedule+0x10cc/0x2b60
[   11.474567]  ? __pfx_read_tsc+0x10/0x10
[   11.474586]  ? ktime_get_ts64+0x86/0x230
[   11.474609]  kunit_try_run_case+0x1a5/0x480
[   11.474629]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.474648]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.474671]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.474695]  ? __kthread_parkme+0x82/0x180
[   11.474744]  ? preempt_count_sub+0x50/0x80
[   11.474767]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.474788]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.474811]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.474835]  kthread+0x337/0x6f0
[   11.474853]  ? trace_preempt_on+0x20/0xc0
[   11.474875]  ? __pfx_kthread+0x10/0x10
[   11.474895]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.474918]  ? calculate_sigpending+0x7b/0xa0
[   11.474940]  ? __pfx_kthread+0x10/0x10
[   11.474961]  ret_from_fork+0x116/0x1d0
[   11.474979]  ? __pfx_kthread+0x10/0x10
[   11.474998]  ret_from_fork_asm+0x1a/0x30
[   11.475077]  </TASK>
[   11.475088] 
[   11.489923] Allocated by task 214:
[   11.490317]  kasan_save_stack+0x45/0x70
[   11.490609]  kasan_save_track+0x18/0x40
[   11.490995]  kasan_save_alloc_info+0x3b/0x50
[   11.491396]  __kasan_kmalloc+0xb7/0xc0
[   11.491602]  __kmalloc_cache_noprof+0x189/0x420
[   11.492115]  ksize_uaf+0xaa/0x6c0
[   11.492427]  kunit_try_run_case+0x1a5/0x480
[   11.492574]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.492764]  kthread+0x337/0x6f0
[   11.492887]  ret_from_fork+0x116/0x1d0
[   11.493030]  ret_from_fork_asm+0x1a/0x30
[   11.493434] 
[   11.493661] Freed by task 214:
[   11.494097]  kasan_save_stack+0x45/0x70
[   11.494552]  kasan_save_track+0x18/0x40
[   11.494913]  kasan_save_free_info+0x3f/0x60
[   11.495122]  __kasan_slab_free+0x56/0x70
[   11.495563]  kfree+0x222/0x3f0
[   11.495859]  ksize_uaf+0x12c/0x6c0
[   11.496269]  kunit_try_run_case+0x1a5/0x480
[   11.496525]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.497005]  kthread+0x337/0x6f0
[   11.497411]  ret_from_fork+0x116/0x1d0
[   11.497741]  ret_from_fork_asm+0x1a/0x30
[   11.498141] 
[   11.498213] The buggy address belongs to the object at ffff888102a7ae00
[   11.498213]  which belongs to the cache kmalloc-128 of size 128
[   11.499072] The buggy address is located 0 bytes inside of
[   11.499072]  freed 128-byte region [ffff888102a7ae00, ffff888102a7ae80)
[   11.500269] 
[   11.500460] The buggy address belongs to the physical page:
[   11.500773] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a7a
[   11.501554] flags: 0x200000000000000(node=0|zone=2)
[   11.501731] page_type: f5(slab)
[   11.502030] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   11.502942] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.503325] page dumped because: kasan: bad access detected
[   11.503508] 
[   11.503590] Memory state around the buggy address:
[   11.503746]  ffff888102a7ad00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   11.504491]  ffff888102a7ad80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.505237] >ffff888102a7ae00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   11.505693]                    ^
[   11.505908]  ffff888102a7ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.506482]  ffff888102a7af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.506699] ==================================================================
[   11.507936] ==================================================================
[   11.508735] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5e4/0x6c0
[   11.509412] Read of size 1 at addr ffff888102a7ae78 by task kunit_try_catch/214
[   11.509886] 
[   11.509976] CPU: 1 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT(voluntary) 
[   11.510019] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.510035] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.510055] Call Trace:
[   11.510066]  <TASK>
[   11.510082]  dump_stack_lvl+0x73/0xb0
[   11.510109]  print_report+0xd1/0x650
[   11.510132]  ? __virt_addr_valid+0x1db/0x2d0
[   11.510154]  ? ksize_uaf+0x5e4/0x6c0
[   11.510174]  ? kasan_complete_mode_report_info+0x64/0x200
[   11.510196]  ? ksize_uaf+0x5e4/0x6c0
[   11.510217]  kasan_report+0x141/0x180
[   11.510239]  ? ksize_uaf+0x5e4/0x6c0
[   11.510264]  __asan_report_load1_noabort+0x18/0x20
[   11.510284]  ksize_uaf+0x5e4/0x6c0
[   11.510304]  ? __pfx_ksize_uaf+0x10/0x10
[   11.510325]  ? __schedule+0x10cc/0x2b60
[   11.510349]  ? __pfx_read_tsc+0x10/0x10
[   11.510369]  ? ktime_get_ts64+0x86/0x230
[   11.510407]  kunit_try_run_case+0x1a5/0x480
[   11.510427]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.510446]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.510470]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.510494]  ? __kthread_parkme+0x82/0x180
[   11.510513]  ? preempt_count_sub+0x50/0x80
[   11.510537]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.510557]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.510580]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.510604]  kthread+0x337/0x6f0
[   11.510622]  ? trace_preempt_on+0x20/0xc0
[   11.510645]  ? __pfx_kthread+0x10/0x10
[   11.510665]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.510687]  ? calculate_sigpending+0x7b/0xa0
[   11.510711]  ? __pfx_kthread+0x10/0x10
[   11.510731]  ret_from_fork+0x116/0x1d0
[   11.510799]  ? __pfx_kthread+0x10/0x10
[   11.510820]  ret_from_fork_asm+0x1a/0x30
[   11.510862]  </TASK>
[   11.510872] 
[   11.518387] Allocated by task 214:
[   11.518715]  kasan_save_stack+0x45/0x70
[   11.518981]  kasan_save_track+0x18/0x40
[   11.519277]  kasan_save_alloc_info+0x3b/0x50
[   11.519618]  __kasan_kmalloc+0xb7/0xc0
[   11.519859]  __kmalloc_cache_noprof+0x189/0x420
[   11.520072]  ksize_uaf+0xaa/0x6c0
[   11.520252]  kunit_try_run_case+0x1a5/0x480
[   11.520472]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.520710]  kthread+0x337/0x6f0
[   11.520905]  ret_from_fork+0x116/0x1d0
[   11.521096]  ret_from_fork_asm+0x1a/0x30
[   11.521329] 
[   11.521435] Freed by task 214:
[   11.521625]  kasan_save_stack+0x45/0x70
[   11.521798]  kasan_save_track+0x18/0x40
[   11.522010]  kasan_save_free_info+0x3f/0x60
[   11.522410]  __kasan_slab_free+0x56/0x70
[   11.522724]  kfree+0x222/0x3f0
[   11.522847]  ksize_uaf+0x12c/0x6c0
[   11.522973]  kunit_try_run_case+0x1a5/0x480
[   11.523116]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.523370]  kthread+0x337/0x6f0
[   11.523553]  ret_from_fork+0x116/0x1d0
[   11.523739]  ret_from_fork_asm+0x1a/0x30
[   11.524070] 
[   11.524146] The buggy address belongs to the object at ffff888102a7ae00
[   11.524146]  which belongs to the cache kmalloc-128 of size 128
[   11.524588] The buggy address is located 120 bytes inside of
[   11.524588]  freed 128-byte region [ffff888102a7ae00, ffff888102a7ae80)
[   11.525492] 
[   11.525613] The buggy address belongs to the physical page:
[   11.525844] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a7a
[   11.526343] flags: 0x200000000000000(node=0|zone=2)
[   11.526601] page_type: f5(slab)
[   11.526807] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   11.527189] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.527677] page dumped because: kasan: bad access detected
[   11.528017] 
[   11.528218] Memory state around the buggy address:
[   11.528454]  ffff888102a7ad00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   11.528768]  ffff888102a7ad80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.529141] >ffff888102a7ae00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   11.529477]                                                                 ^
[   11.529818]  ffff888102a7ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.530171]  ffff888102a7af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.530460] ==================================================================
[   11.446445] ==================================================================
[   11.446975] BUG: KASAN: slab-use-after-free in ksize_uaf+0x19d/0x6c0
[   11.447477] Read of size 1 at addr ffff888102a7ae00 by task kunit_try_catch/214
[   11.447806] 
[   11.447905] CPU: 1 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT(voluntary) 
[   11.447949] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.447961] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.447981] Call Trace:
[   11.447992]  <TASK>
[   11.448007]  dump_stack_lvl+0x73/0xb0
[   11.448034]  print_report+0xd1/0x650
[   11.448056]  ? __virt_addr_valid+0x1db/0x2d0
[   11.448078]  ? ksize_uaf+0x19d/0x6c0
[   11.448098]  ? kasan_complete_mode_report_info+0x64/0x200
[   11.448120]  ? ksize_uaf+0x19d/0x6c0
[   11.448141]  kasan_report+0x141/0x180
[   11.448162]  ? ksize_uaf+0x19d/0x6c0
[   11.448186]  ? ksize_uaf+0x19d/0x6c0
[   11.448206]  __kasan_check_byte+0x3d/0x50
[   11.448228]  ksize+0x20/0x60
[   11.448248]  ksize_uaf+0x19d/0x6c0
[   11.448269]  ? __pfx_ksize_uaf+0x10/0x10
[   11.448291]  ? __schedule+0x10cc/0x2b60
[   11.448314]  ? __pfx_read_tsc+0x10/0x10
[   11.448334]  ? ktime_get_ts64+0x86/0x230
[   11.448358]  kunit_try_run_case+0x1a5/0x480
[   11.448388]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.448407]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.448431]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.448455]  ? __kthread_parkme+0x82/0x180
[   11.448474]  ? preempt_count_sub+0x50/0x80
[   11.448497]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.448517]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.448540]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.448563]  kthread+0x337/0x6f0
[   11.448582]  ? trace_preempt_on+0x20/0xc0
[   11.448604]  ? __pfx_kthread+0x10/0x10
[   11.448624]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.448646]  ? calculate_sigpending+0x7b/0xa0
[   11.448668]  ? __pfx_kthread+0x10/0x10
[   11.448689]  ret_from_fork+0x116/0x1d0
[   11.448707]  ? __pfx_kthread+0x10/0x10
[   11.448778]  ret_from_fork_asm+0x1a/0x30
[   11.448808]  </TASK>
[   11.448818] 
[   11.456309] Allocated by task 214:
[   11.456491]  kasan_save_stack+0x45/0x70
[   11.456662]  kasan_save_track+0x18/0x40
[   11.456890]  kasan_save_alloc_info+0x3b/0x50
[   11.457160]  __kasan_kmalloc+0xb7/0xc0
[   11.457298]  __kmalloc_cache_noprof+0x189/0x420
[   11.457494]  ksize_uaf+0xaa/0x6c0
[   11.457669]  kunit_try_run_case+0x1a5/0x480
[   11.457903]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.458414]  kthread+0x337/0x6f0
[   11.458578]  ret_from_fork+0x116/0x1d0
[   11.458712]  ret_from_fork_asm+0x1a/0x30
[   11.458893] 
[   11.458990] Freed by task 214:
[   11.459286]  kasan_save_stack+0x45/0x70
[   11.459491]  kasan_save_track+0x18/0x40
[   11.459687]  kasan_save_free_info+0x3f/0x60
[   11.459947]  __kasan_slab_free+0x56/0x70
[   11.460188]  kfree+0x222/0x3f0
[   11.460347]  ksize_uaf+0x12c/0x6c0
[   11.460587]  kunit_try_run_case+0x1a5/0x480
[   11.460827]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.461031]  kthread+0x337/0x6f0
[   11.461225]  ret_from_fork+0x116/0x1d0
[   11.461414]  ret_from_fork_asm+0x1a/0x30
[   11.461641] 
[   11.461780] The buggy address belongs to the object at ffff888102a7ae00
[   11.461780]  which belongs to the cache kmalloc-128 of size 128
[   11.462347] The buggy address is located 0 bytes inside of
[   11.462347]  freed 128-byte region [ffff888102a7ae00, ffff888102a7ae80)
[   11.462710] 
[   11.462829] The buggy address belongs to the physical page:
[   11.463083] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a7a
[   11.463677] flags: 0x200000000000000(node=0|zone=2)
[   11.464081] page_type: f5(slab)
[   11.464300] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   11.464715] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.464972] page dumped because: kasan: bad access detected
[   11.465146] 
[   11.465275] Memory state around the buggy address:
[   11.465545]  ffff888102a7ad00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   11.465946]  ffff888102a7ad80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.466334] >ffff888102a7ae00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   11.466611]                    ^
[   11.467420]  ffff888102a7ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.467940]  ffff888102a7af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.468800] ==================================================================