Hay
Date
June 5, 2025, 7:08 a.m.

Environment
qemu-arm64
qemu-x86_64

[   25.585970] ==================================================================
[   25.586091] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8
[   25.586199] Read of size 1 at addr fff00000c6419800 by task kunit_try_catch/196
[   25.586315] 
[   25.586403] CPU: 0 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   25.588031] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.588115] Hardware name: linux,dummy-virt (DT)
[   25.588201] Call trace:
[   25.588258]  show_stack+0x20/0x38 (C)
[   25.588419]  dump_stack_lvl+0x8c/0xd0
[   25.588550]  print_report+0x118/0x608
[   25.588672]  kasan_report+0xdc/0x128
[   25.588796]  __kasan_check_byte+0x54/0x70
[   25.588917]  ksize+0x30/0x88
[   25.589021]  ksize_uaf+0x168/0x5f8
[   25.589124]  kunit_try_run_case+0x170/0x3f0
[   25.589238]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.589405]  kthread+0x328/0x630
[   25.589697]  ret_from_fork+0x10/0x20
[   25.590018] 
[   25.591202] Allocated by task 196:
[   25.591283]  kasan_save_stack+0x3c/0x68
[   25.595237]  kasan_save_track+0x20/0x40
[   25.595384]  kasan_save_alloc_info+0x40/0x58
[   25.595603]  __kasan_kmalloc+0xd4/0xd8
[   25.595733]  __kmalloc_cache_noprof+0x16c/0x3c0
[   25.597372]  ksize_uaf+0xb8/0x5f8
[   25.597524]  kunit_try_run_case+0x170/0x3f0
[   25.597638]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.597760]  kthread+0x328/0x630
[   25.597889]  ret_from_fork+0x10/0x20
[   25.598478] 
[   25.598534] Freed by task 196:
[   25.598630]  kasan_save_stack+0x3c/0x68
[   25.598738]  kasan_save_track+0x20/0x40
[   25.598846]  kasan_save_free_info+0x4c/0x78
[   25.598953]  __kasan_slab_free+0x6c/0x98
[   25.599060]  kfree+0x214/0x3c8
[   25.599144]  ksize_uaf+0x11c/0x5f8
[   25.599240]  kunit_try_run_case+0x170/0x3f0
[   25.599367]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.599480]  kthread+0x328/0x630
[   25.599567]  ret_from_fork+0x10/0x20
[   25.599668] 
[   25.599718] The buggy address belongs to the object at fff00000c6419800
[   25.599718]  which belongs to the cache kmalloc-128 of size 128
[   25.599883] The buggy address is located 0 bytes inside of
[   25.599883]  freed 128-byte region [fff00000c6419800, fff00000c6419880)
[   25.600042] 
[   25.600309] The buggy address belongs to the physical page:
[   25.600409] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106419
[   25.601731] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.601970] page_type: f5(slab)
[   25.602071] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   25.602212] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.602325] page dumped because: kasan: bad access detected
[   25.602428] 
[   25.602491] Memory state around the buggy address:
[   25.602573]  fff00000c6419700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.602679]  fff00000c6419780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.602789] >fff00000c6419800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.603758]                    ^
[   25.603988]  fff00000c6419880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.604117]  fff00000c6419900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.604228] ==================================================================
[   25.607539] ==================================================================
[   25.607651] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8
[   25.607756] Read of size 1 at addr fff00000c6419800 by task kunit_try_catch/196
[   25.608014] 
[   25.608124] CPU: 0 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   25.608363] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.608563] Hardware name: linux,dummy-virt (DT)
[   25.608675] Call trace:
[   25.608822]  show_stack+0x20/0x38 (C)
[   25.609154]  dump_stack_lvl+0x8c/0xd0
[   25.609410]  print_report+0x118/0x608
[   25.609617]  kasan_report+0xdc/0x128
[   25.609765]  __asan_report_load1_noabort+0x20/0x30
[   25.610049]  ksize_uaf+0x598/0x5f8
[   25.610235]  kunit_try_run_case+0x170/0x3f0
[   25.610395]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.610553]  kthread+0x328/0x630
[   25.610774]  ret_from_fork+0x10/0x20
[   25.610967] 
[   25.611430] Allocated by task 196:
[   25.611765]  kasan_save_stack+0x3c/0x68
[   25.612350]  kasan_save_track+0x20/0x40
[   25.612723]  kasan_save_alloc_info+0x40/0x58
[   25.613237]  __kasan_kmalloc+0xd4/0xd8
[   25.613669]  __kmalloc_cache_noprof+0x16c/0x3c0
[   25.613844]  ksize_uaf+0xb8/0x5f8
[   25.613931]  kunit_try_run_case+0x170/0x3f0
[   25.614034]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.614142]  kthread+0x328/0x630
[   25.614220]  ret_from_fork+0x10/0x20
[   25.615879] 
[   25.616325] Freed by task 196:
[   25.616574]  kasan_save_stack+0x3c/0x68
[   25.616672]  kasan_save_track+0x20/0x40
[   25.616768]  kasan_save_free_info+0x4c/0x78
[   25.616879]  __kasan_slab_free+0x6c/0x98
[   25.616978]  kfree+0x214/0x3c8
[   25.618537]  ksize_uaf+0x11c/0x5f8
[   25.618638]  kunit_try_run_case+0x170/0x3f0
[   25.619290]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.619554]  kthread+0x328/0x630
[   25.619765]  ret_from_fork+0x10/0x20
[   25.620190] 
[   25.620403] The buggy address belongs to the object at fff00000c6419800
[   25.620403]  which belongs to the cache kmalloc-128 of size 128
[   25.620666] The buggy address is located 0 bytes inside of
[   25.620666]  freed 128-byte region [fff00000c6419800, fff00000c6419880)
[   25.620834] 
[   25.621466] The buggy address belongs to the physical page:
[   25.622167] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106419
[   25.622562] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.622821] page_type: f5(slab)
[   25.623635] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   25.623798] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.624666] page dumped because: kasan: bad access detected
[   25.624762] 
[   25.624832] Memory state around the buggy address:
[   25.624907]  fff00000c6419700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.625278]  fff00000c6419780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.625517] >fff00000c6419800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.625639]                    ^
[   25.626032]  fff00000c6419880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.626138]  fff00000c6419900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.626238] ==================================================================
[   25.631790] ==================================================================
[   25.632512] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8
[   25.633629] Read of size 1 at addr fff00000c6419878 by task kunit_try_catch/196
[   25.633735] 
[   25.633803] CPU: 0 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   25.633912] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.633947] Hardware name: linux,dummy-virt (DT)
[   25.633987] Call trace:
[   25.634017]  show_stack+0x20/0x38 (C)
[   25.634080]  dump_stack_lvl+0x8c/0xd0
[   25.634138]  print_report+0x118/0x608
[   25.634197]  kasan_report+0xdc/0x128
[   25.634252]  __asan_report_load1_noabort+0x20/0x30
[   25.634311]  ksize_uaf+0x544/0x5f8
[   25.634621]  kunit_try_run_case+0x170/0x3f0
[   25.634766]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.634934]  kthread+0x328/0x630
[   25.635249]  ret_from_fork+0x10/0x20
[   25.635907] 
[   25.636010] Allocated by task 196:
[   25.636436]  kasan_save_stack+0x3c/0x68
[   25.636836]  kasan_save_track+0x20/0x40
[   25.636948]  kasan_save_alloc_info+0x40/0x58
[   25.637051]  __kasan_kmalloc+0xd4/0xd8
[   25.637179]  __kmalloc_cache_noprof+0x16c/0x3c0
[   25.637323]  ksize_uaf+0xb8/0x5f8
[   25.637577]  kunit_try_run_case+0x170/0x3f0
[   25.637681]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.637828]  kthread+0x328/0x630
[   25.637988]  ret_from_fork+0x10/0x20
[   25.638092] 
[   25.638253] Freed by task 196:
[   25.638323]  kasan_save_stack+0x3c/0x68
[   25.638440]  kasan_save_track+0x20/0x40
[   25.638537]  kasan_save_free_info+0x4c/0x78
[   25.638647]  __kasan_slab_free+0x6c/0x98
[   25.638886]  kfree+0x214/0x3c8
[   25.639033]  ksize_uaf+0x11c/0x5f8
[   25.639118]  kunit_try_run_case+0x170/0x3f0
[   25.639221]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.639585]  kthread+0x328/0x630
[   25.639695]  ret_from_fork+0x10/0x20
[   25.640123] 
[   25.640419] The buggy address belongs to the object at fff00000c6419800
[   25.640419]  which belongs to the cache kmalloc-128 of size 128
[   25.640726] The buggy address is located 120 bytes inside of
[   25.640726]  freed 128-byte region [fff00000c6419800, fff00000c6419880)
[   25.640898] 
[   25.640950] The buggy address belongs to the physical page:
[   25.641033] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106419
[   25.641161] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.641683] page_type: f5(slab)
[   25.641885] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   25.642107] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.642219] page dumped because: kasan: bad access detected
[   25.642467] 
[   25.642547] Memory state around the buggy address:
[   25.642866]  fff00000c6419700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.642984]  fff00000c6419780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.643264] >fff00000c6419800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.643425]                                                                 ^
[   25.643538]  fff00000c6419880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.643646]  fff00000c6419900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.643762] ==================================================================


[   11.868331] ==================================================================
[   11.868746] BUG: KASAN: slab-use-after-free in ksize_uaf+0x19d/0x6c0
[   11.869197] Read of size 1 at addr ffff888102b2d500 by task kunit_try_catch/213
[   11.870038] 
[   11.870287] CPU: 0 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT(voluntary) 
[   11.870333] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.870344] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.870364] Call Trace:
[   11.870375]  <TASK>
[   11.870390]  dump_stack_lvl+0x73/0xb0
[   11.870417]  print_report+0xd1/0x650
[   11.870438]  ? __virt_addr_valid+0x1db/0x2d0
[   11.870462]  ? ksize_uaf+0x19d/0x6c0
[   11.870481]  ? kasan_complete_mode_report_info+0x64/0x200
[   11.870503]  ? ksize_uaf+0x19d/0x6c0
[   11.870524]  kasan_report+0x141/0x180
[   11.870545]  ? ksize_uaf+0x19d/0x6c0
[   11.870568]  ? ksize_uaf+0x19d/0x6c0
[   11.870588]  __kasan_check_byte+0x3d/0x50
[   11.870609]  ksize+0x20/0x60
[   11.870628]  ksize_uaf+0x19d/0x6c0
[   11.870647]  ? __pfx_ksize_uaf+0x10/0x10
[   11.870668]  ? __schedule+0x10cc/0x2b60
[   11.870691]  ? __pfx_read_tsc+0x10/0x10
[   11.870712]  ? ktime_get_ts64+0x86/0x230
[   11.870735]  kunit_try_run_case+0x1a5/0x480
[   11.870755]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.870774]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.870798]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.870821]  ? __kthread_parkme+0x82/0x180
[   11.870841]  ? preempt_count_sub+0x50/0x80
[   11.870864]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.870884]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.870919]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.870952]  kthread+0x337/0x6f0
[   11.870970]  ? trace_preempt_on+0x20/0xc0
[   11.870992]  ? __pfx_kthread+0x10/0x10
[   11.871013]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.871035]  ? calculate_sigpending+0x7b/0xa0
[   11.871058]  ? __pfx_kthread+0x10/0x10
[   11.871079]  ret_from_fork+0x116/0x1d0
[   11.871096]  ? __pfx_kthread+0x10/0x10
[   11.871116]  ret_from_fork_asm+0x1a/0x30
[   11.871145]  </TASK>
[   11.871155] 
[   11.885422] Allocated by task 213:
[   11.885621]  kasan_save_stack+0x45/0x70
[   11.885800]  kasan_save_track+0x18/0x40
[   11.886208]  kasan_save_alloc_info+0x3b/0x50
[   11.886756]  __kasan_kmalloc+0xb7/0xc0
[   11.887158]  __kmalloc_cache_noprof+0x189/0x420
[   11.887683]  ksize_uaf+0xaa/0x6c0
[   11.887811]  kunit_try_run_case+0x1a5/0x480
[   11.887981]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.888164]  kthread+0x337/0x6f0
[   11.888285]  ret_from_fork+0x116/0x1d0
[   11.888416]  ret_from_fork_asm+0x1a/0x30
[   11.888554] 
[   11.888670] Freed by task 213:
[   11.889062]  kasan_save_stack+0x45/0x70
[   11.889473]  kasan_save_track+0x18/0x40
[   11.889856]  kasan_save_free_info+0x3f/0x60
[   11.890328]  __kasan_slab_free+0x56/0x70
[   11.890725]  kfree+0x222/0x3f0
[   11.891284]  ksize_uaf+0x12c/0x6c0
[   11.891611]  kunit_try_run_case+0x1a5/0x480
[   11.892005]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.892545]  kthread+0x337/0x6f0
[   11.892909]  ret_from_fork+0x116/0x1d0
[   11.893311]  ret_from_fork_asm+0x1a/0x30
[   11.893661] 
[   11.893735] The buggy address belongs to the object at ffff888102b2d500
[   11.893735]  which belongs to the cache kmalloc-128 of size 128
[   11.894524] The buggy address is located 0 bytes inside of
[   11.894524]  freed 128-byte region [ffff888102b2d500, ffff888102b2d580)
[   11.895647] 
[   11.895836] The buggy address belongs to the physical page:
[   11.896295] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b2d
[   11.896788] flags: 0x200000000000000(node=0|zone=2)
[   11.897070] page_type: f5(slab)
[   11.897381] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   11.898194] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.898759] page dumped because: kasan: bad access detected
[   11.898954] 
[   11.899113] Memory state around the buggy address:
[   11.899573]  ffff888102b2d400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   11.900295]  ffff888102b2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.900753] >ffff888102b2d500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   11.901130]                    ^
[   11.901513]  ffff888102b2d580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.902322]  ffff888102b2d600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.902536] ==================================================================
[   11.930570] ==================================================================
[   11.930794] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5e4/0x6c0
[   11.931420] Read of size 1 at addr ffff888102b2d578 by task kunit_try_catch/213
[   11.931920] 
[   11.932551] CPU: 0 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT(voluntary) 
[   11.932596] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.932607] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.932627] Call Trace:
[   11.932642]  <TASK>
[   11.932656]  dump_stack_lvl+0x73/0xb0
[   11.932683]  print_report+0xd1/0x650
[   11.932704]  ? __virt_addr_valid+0x1db/0x2d0
[   11.932726]  ? ksize_uaf+0x5e4/0x6c0
[   11.932746]  ? kasan_complete_mode_report_info+0x64/0x200
[   11.932768]  ? ksize_uaf+0x5e4/0x6c0
[   11.932789]  kasan_report+0x141/0x180
[   11.932810]  ? ksize_uaf+0x5e4/0x6c0
[   11.932835]  __asan_report_load1_noabort+0x18/0x20
[   11.932858]  ksize_uaf+0x5e4/0x6c0
[   11.932878]  ? __pfx_ksize_uaf+0x10/0x10
[   11.932914]  ? __schedule+0x10cc/0x2b60
[   11.932937]  ? __pfx_read_tsc+0x10/0x10
[   11.932969]  ? ktime_get_ts64+0x86/0x230
[   11.932992]  kunit_try_run_case+0x1a5/0x480
[   11.933013]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.933032]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.933059]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.933083]  ? __kthread_parkme+0x82/0x180
[   11.933101]  ? preempt_count_sub+0x50/0x80
[   11.933125]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.933145]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.933168]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.933192]  kthread+0x337/0x6f0
[   11.933210]  ? trace_preempt_on+0x20/0xc0
[   11.933231]  ? __pfx_kthread+0x10/0x10
[   11.933251]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.933273]  ? calculate_sigpending+0x7b/0xa0
[   11.933295]  ? __pfx_kthread+0x10/0x10
[   11.933316]  ret_from_fork+0x116/0x1d0
[   11.933334]  ? __pfx_kthread+0x10/0x10
[   11.933354]  ret_from_fork_asm+0x1a/0x30
[   11.933384]  </TASK>
[   11.933393] 
[   11.942072] Allocated by task 213:
[   11.942399]  kasan_save_stack+0x45/0x70
[   11.942551]  kasan_save_track+0x18/0x40
[   11.942695]  kasan_save_alloc_info+0x3b/0x50
[   11.942846]  __kasan_kmalloc+0xb7/0xc0
[   11.942991]  __kmalloc_cache_noprof+0x189/0x420
[   11.943148]  ksize_uaf+0xaa/0x6c0
[   11.943271]  kunit_try_run_case+0x1a5/0x480
[   11.943412]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.943586]  kthread+0x337/0x6f0
[   11.943705]  ret_from_fork+0x116/0x1d0
[   11.943836]  ret_from_fork_asm+0x1a/0x30
[   11.944831] 
[   11.945160] Freed by task 213:
[   11.945676]  kasan_save_stack+0x45/0x70
[   11.946320]  kasan_save_track+0x18/0x40
[   11.946890]  kasan_save_free_info+0x3f/0x60
[   11.947516]  __kasan_slab_free+0x56/0x70
[   11.948270]  kfree+0x222/0x3f0
[   11.948763]  ksize_uaf+0x12c/0x6c0
[   11.949443]  kunit_try_run_case+0x1a5/0x480
[   11.950170]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.950884]  kthread+0x337/0x6f0
[   11.951384]  ret_from_fork+0x116/0x1d0
[   11.951916]  ret_from_fork_asm+0x1a/0x30
[   11.952574] 
[   11.952937] The buggy address belongs to the object at ffff888102b2d500
[   11.952937]  which belongs to the cache kmalloc-128 of size 128
[   11.954423] The buggy address is located 120 bytes inside of
[   11.954423]  freed 128-byte region [ffff888102b2d500, ffff888102b2d580)
[   11.954919] 
[   11.955007] The buggy address belongs to the physical page:
[   11.955255] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b2d
[   11.955563] flags: 0x200000000000000(node=0|zone=2)
[   11.955804] page_type: f5(slab)
[   11.956530] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   11.957056] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.957571] page dumped because: kasan: bad access detected
[   11.957985] 
[   11.958085] Memory state around the buggy address:
[   11.958462]  ffff888102b2d400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   11.958865]  ffff888102b2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.959305] >ffff888102b2d500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   11.959716]                                                                 ^
[   11.960134]  ffff888102b2d580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.960457]  ffff888102b2d600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.961066] ==================================================================
[   11.903334] ==================================================================
[   11.903974] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5fe/0x6c0
[   11.904606] Read of size 1 at addr ffff888102b2d500 by task kunit_try_catch/213
[   11.905295] 
[   11.905526] CPU: 0 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT(voluntary) 
[   11.905572] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.905583] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.905602] Call Trace:
[   11.905614]  <TASK>
[   11.905627]  dump_stack_lvl+0x73/0xb0
[   11.905651]  print_report+0xd1/0x650
[   11.905672]  ? __virt_addr_valid+0x1db/0x2d0
[   11.905694]  ? ksize_uaf+0x5fe/0x6c0
[   11.905715]  ? kasan_complete_mode_report_info+0x64/0x200
[   11.905737]  ? ksize_uaf+0x5fe/0x6c0
[   11.905758]  kasan_report+0x141/0x180
[   11.905779]  ? ksize_uaf+0x5fe/0x6c0
[   11.905804]  __asan_report_load1_noabort+0x18/0x20
[   11.905828]  ksize_uaf+0x5fe/0x6c0
[   11.905848]  ? __pfx_ksize_uaf+0x10/0x10
[   11.905869]  ? __schedule+0x10cc/0x2b60
[   11.905901]  ? __pfx_read_tsc+0x10/0x10
[   11.905922]  ? ktime_get_ts64+0x86/0x230
[   11.906093]  kunit_try_run_case+0x1a5/0x480
[   11.906123]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.906142]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.906167]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.906190]  ? __kthread_parkme+0x82/0x180
[   11.906210]  ? preempt_count_sub+0x50/0x80
[   11.906232]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.906253]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.906276]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.906299]  kthread+0x337/0x6f0
[   11.906318]  ? trace_preempt_on+0x20/0xc0
[   11.906340]  ? __pfx_kthread+0x10/0x10
[   11.906360]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.906382]  ? calculate_sigpending+0x7b/0xa0
[   11.906404]  ? __pfx_kthread+0x10/0x10
[   11.906425]  ret_from_fork+0x116/0x1d0
[   11.906442]  ? __pfx_kthread+0x10/0x10
[   11.906462]  ret_from_fork_asm+0x1a/0x30
[   11.906491]  </TASK>
[   11.906500] 
[   11.915633] Allocated by task 213:
[   11.915818]  kasan_save_stack+0x45/0x70
[   11.915980]  kasan_save_track+0x18/0x40
[   11.916116]  kasan_save_alloc_info+0x3b/0x50
[   11.916328]  __kasan_kmalloc+0xb7/0xc0
[   11.916517]  __kmalloc_cache_noprof+0x189/0x420
[   11.916806]  ksize_uaf+0xaa/0x6c0
[   11.916938]  kunit_try_run_case+0x1a5/0x480
[   11.917086]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.917277]  kthread+0x337/0x6f0
[   11.917452]  ret_from_fork+0x116/0x1d0
[   11.917642]  ret_from_fork_asm+0x1a/0x30
[   11.918150] 
[   11.918244] Freed by task 213:
[   11.918357]  kasan_save_stack+0x45/0x70
[   11.918501]  kasan_save_track+0x18/0x40
[   11.920473]  kasan_save_free_info+0x3f/0x60
[   11.920636]  __kasan_slab_free+0x56/0x70
[   11.920774]  kfree+0x222/0x3f0
[   11.920909]  ksize_uaf+0x12c/0x6c0
[   11.921036]  kunit_try_run_case+0x1a5/0x480
[   11.921182]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.921520]  kthread+0x337/0x6f0
[   11.921646]  ret_from_fork+0x116/0x1d0
[   11.921830]  ret_from_fork_asm+0x1a/0x30
[   11.922213] 
[   11.922291] The buggy address belongs to the object at ffff888102b2d500
[   11.922291]  which belongs to the cache kmalloc-128 of size 128
[   11.922976] The buggy address is located 0 bytes inside of
[   11.922976]  freed 128-byte region [ffff888102b2d500, ffff888102b2d580)
[   11.923321] 
[   11.923705] The buggy address belongs to the physical page:
[   11.924101] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b2d
[   11.924464] flags: 0x200000000000000(node=0|zone=2)
[   11.924698] page_type: f5(slab)
[   11.924853] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   11.925149] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.925378] page dumped because: kasan: bad access detected
[   11.925553] 
[   11.927924] Memory state around the buggy address:
[   11.928348]  ffff888102b2d400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   11.928815]  ffff888102b2d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.929343] >ffff888102b2d500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   11.929558]                    ^
[   11.929675]  ffff888102b2d580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.929885]  ffff888102b2d600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.930119] ==================================================================