Hay
Date
June 17, 2025, 6:35 a.m.

Environment
qemu-arm64
qemu-x86_64

[   17.143872] ==================================================================
[   17.144568] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8
[   17.144772] Read of size 1 at addr fff00000c748ac78 by task kunit_try_catch/205
[   17.144836] 
[   17.144871] CPU: 1 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT 
[   17.144972] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.144999] Hardware name: linux,dummy-virt (DT)
[   17.145179] Call trace:
[   17.145215]  show_stack+0x20/0x38 (C)
[   17.145300]  dump_stack_lvl+0x8c/0xd0
[   17.145763]  print_report+0x118/0x608
[   17.145838]  kasan_report+0xdc/0x128
[   17.145990]  __asan_report_load1_noabort+0x20/0x30
[   17.146056]  ksize_uaf+0x544/0x5f8
[   17.146117]  kunit_try_run_case+0x170/0x3f0
[   17.146520]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.146647]  kthread+0x328/0x630
[   17.146747]  ret_from_fork+0x10/0x20
[   17.146834] 
[   17.146977] Allocated by task 205:
[   17.147016]  kasan_save_stack+0x3c/0x68
[   17.147129]  kasan_save_track+0x20/0x40
[   17.147186]  kasan_save_alloc_info+0x40/0x58
[   17.147225]  __kasan_kmalloc+0xd4/0xd8
[   17.147273]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.147315]  ksize_uaf+0xb8/0x5f8
[   17.147367]  kunit_try_run_case+0x170/0x3f0
[   17.147407]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.147461]  kthread+0x328/0x630
[   17.147495]  ret_from_fork+0x10/0x20
[   17.147532] 
[   17.147550] Freed by task 205:
[   17.147578]  kasan_save_stack+0x3c/0x68
[   17.147617]  kasan_save_track+0x20/0x40
[   17.147662]  kasan_save_free_info+0x4c/0x78
[   17.147700]  __kasan_slab_free+0x6c/0x98
[   17.147739]  kfree+0x214/0x3c8
[   17.147798]  ksize_uaf+0x11c/0x5f8
[   17.147844]  kunit_try_run_case+0x170/0x3f0
[   17.147883]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.147937]  kthread+0x328/0x630
[   17.147992]  ret_from_fork+0x10/0x20
[   17.148030] 
[   17.148048] The buggy address belongs to the object at fff00000c748ac00
[   17.148048]  which belongs to the cache kmalloc-128 of size 128
[   17.148126] The buggy address is located 120 bytes inside of
[   17.148126]  freed 128-byte region [fff00000c748ac00, fff00000c748ac80)
[   17.148195] 
[   17.148223] The buggy address belongs to the physical page:
[   17.148260] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10748a
[   17.148324] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.148372] page_type: f5(slab)
[   17.148412] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.148465] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.148507] page dumped because: kasan: bad access detected
[   17.148539] 
[   17.148564] Memory state around the buggy address:
[   17.148596]  fff00000c748ab00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.148641]  fff00000c748ab80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.148684] >fff00000c748ac00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.148721]                                                                 ^
[   17.148777]  fff00000c748ac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.148825]  fff00000c748ad00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.148879] ==================================================================
[   17.133659] ==================================================================
[   17.133746] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8
[   17.134219] Read of size 1 at addr fff00000c748ac00 by task kunit_try_catch/205
[   17.134289] 
[   17.134558] CPU: 1 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT 
[   17.134829] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.134883] Hardware name: linux,dummy-virt (DT)
[   17.134950] Call trace:
[   17.135037]  show_stack+0x20/0x38 (C)
[   17.135117]  dump_stack_lvl+0x8c/0xd0
[   17.135259]  print_report+0x118/0x608
[   17.135328]  kasan_report+0xdc/0x128
[   17.135808]  __asan_report_load1_noabort+0x20/0x30
[   17.135904]  ksize_uaf+0x598/0x5f8
[   17.136059]  kunit_try_run_case+0x170/0x3f0
[   17.136137]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.136383]  kthread+0x328/0x630
[   17.136580]  ret_from_fork+0x10/0x20
[   17.136640] 
[   17.136948] Allocated by task 205:
[   17.137095]  kasan_save_stack+0x3c/0x68
[   17.137282]  kasan_save_track+0x20/0x40
[   17.137371]  kasan_save_alloc_info+0x40/0x58
[   17.137540]  __kasan_kmalloc+0xd4/0xd8
[   17.137601]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.137687]  ksize_uaf+0xb8/0x5f8
[   17.137892]  kunit_try_run_case+0x170/0x3f0
[   17.138102]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.138220]  kthread+0x328/0x630
[   17.138392]  ret_from_fork+0x10/0x20
[   17.138467] 
[   17.138660] Freed by task 205:
[   17.138694]  kasan_save_stack+0x3c/0x68
[   17.138947]  kasan_save_track+0x20/0x40
[   17.139024]  kasan_save_free_info+0x4c/0x78
[   17.139186]  __kasan_slab_free+0x6c/0x98
[   17.139349]  kfree+0x214/0x3c8
[   17.139428]  ksize_uaf+0x11c/0x5f8
[   17.139512]  kunit_try_run_case+0x170/0x3f0
[   17.139646]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.139706]  kthread+0x328/0x630
[   17.139973]  ret_from_fork+0x10/0x20
[   17.140242] 
[   17.140335] The buggy address belongs to the object at fff00000c748ac00
[   17.140335]  which belongs to the cache kmalloc-128 of size 128
[   17.140430] The buggy address is located 0 bytes inside of
[   17.140430]  freed 128-byte region [fff00000c748ac00, fff00000c748ac80)
[   17.140577] 
[   17.140639] The buggy address belongs to the physical page:
[   17.140697] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10748a
[   17.141028] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.141199] page_type: f5(slab)
[   17.141343] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.141434] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.141596] page dumped because: kasan: bad access detected
[   17.141666] 
[   17.141684] Memory state around the buggy address:
[   17.142074]  fff00000c748ab00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.142140]  fff00000c748ab80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.142275] >fff00000c748ac00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.142362]                    ^
[   17.142416]  fff00000c748ac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.142547]  fff00000c748ad00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.142630] ==================================================================
[   17.123886] ==================================================================
[   17.123973] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8
[   17.124039] Read of size 1 at addr fff00000c748ac00 by task kunit_try_catch/205
[   17.124093] 
[   17.124131] CPU: 1 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT 
[   17.124240] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.124270] Hardware name: linux,dummy-virt (DT)
[   17.124302] Call trace:
[   17.124329]  show_stack+0x20/0x38 (C)
[   17.124381]  dump_stack_lvl+0x8c/0xd0
[   17.124444]  print_report+0x118/0x608
[   17.124501]  kasan_report+0xdc/0x128
[   17.124548]  __kasan_check_byte+0x54/0x70
[   17.124597]  ksize+0x30/0x88
[   17.124642]  ksize_uaf+0x168/0x5f8
[   17.124686]  kunit_try_run_case+0x170/0x3f0
[   17.124737]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.124800]  kthread+0x328/0x630
[   17.124845]  ret_from_fork+0x10/0x20
[   17.124903] 
[   17.125438] Allocated by task 205:
[   17.125494]  kasan_save_stack+0x3c/0x68
[   17.125960]  kasan_save_track+0x20/0x40
[   17.126029]  kasan_save_alloc_info+0x40/0x58
[   17.126579]  __kasan_kmalloc+0xd4/0xd8
[   17.126946]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.127251]  ksize_uaf+0xb8/0x5f8
[   17.127400]  kunit_try_run_case+0x170/0x3f0
[   17.127537]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.127806]  kthread+0x328/0x630
[   17.127850]  ret_from_fork+0x10/0x20
[   17.128226] 
[   17.128306] Freed by task 205:
[   17.128355]  kasan_save_stack+0x3c/0x68
[   17.128457]  kasan_save_track+0x20/0x40
[   17.128806]  kasan_save_free_info+0x4c/0x78
[   17.129032]  __kasan_slab_free+0x6c/0x98
[   17.129318]  kfree+0x214/0x3c8
[   17.129509]  ksize_uaf+0x11c/0x5f8
[   17.129601]  kunit_try_run_case+0x170/0x3f0
[   17.129667]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.129777]  kthread+0x328/0x630
[   17.129842]  ret_from_fork+0x10/0x20
[   17.130041] 
[   17.130073] The buggy address belongs to the object at fff00000c748ac00
[   17.130073]  which belongs to the cache kmalloc-128 of size 128
[   17.130326] The buggy address is located 0 bytes inside of
[   17.130326]  freed 128-byte region [fff00000c748ac00, fff00000c748ac80)
[   17.130416] 
[   17.130481] The buggy address belongs to the physical page:
[   17.130545] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10748a
[   17.130616] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.130970] page_type: f5(slab)
[   17.131136] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.131212] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.131350] page dumped because: kasan: bad access detected
[   17.131411] 
[   17.131589] Memory state around the buggy address:
[   17.131750]  fff00000c748ab00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.131991]  fff00000c748ab80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.132077] >fff00000c748ac00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.132199]                    ^
[   17.132248]  fff00000c748ac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.132293]  fff00000c748ad00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.132471] ==================================================================

[   18.726719] ==================================================================
[   18.727767] BUG: KASAN: slab-use-after-free in ksize_uaf+0x19d/0x6c0
[   18.728757] Read of size 1 at addr ffff888103393c00 by task kunit_try_catch/223
[   18.729666] 
[   18.730207] CPU: 0 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) 
[   18.730349] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.730387] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.730444] Call Trace:
[   18.730484]  <TASK>
[   18.730529]  dump_stack_lvl+0x73/0xb0
[   18.730614]  print_report+0xd1/0x650
[   18.730690]  ? __virt_addr_valid+0x1db/0x2d0
[   18.730765]  ? ksize_uaf+0x19d/0x6c0
[   18.730854]  ? kasan_complete_mode_report_info+0x64/0x200
[   18.730932]  ? ksize_uaf+0x19d/0x6c0
[   18.731003]  kasan_report+0x141/0x180
[   18.731078]  ? ksize_uaf+0x19d/0x6c0
[   18.731122]  ? ksize_uaf+0x19d/0x6c0
[   18.731166]  __kasan_check_byte+0x3d/0x50
[   18.731207]  ksize+0x20/0x60
[   18.731268]  ksize_uaf+0x19d/0x6c0
[   18.731344]  ? __pfx_ksize_uaf+0x10/0x10
[   18.731412]  ? __schedule+0x10cc/0x2b60
[   18.731444]  ? __pfx_read_tsc+0x10/0x10
[   18.731476]  ? ktime_get_ts64+0x86/0x230
[   18.731508]  kunit_try_run_case+0x1a5/0x480
[   18.731553]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.731588]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.731620]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.731655]  ? __kthread_parkme+0x82/0x180
[   18.731683]  ? preempt_count_sub+0x50/0x80
[   18.731713]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.731745]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.731775]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.731806]  kthread+0x337/0x6f0
[   18.731854]  ? trace_preempt_on+0x20/0xc0
[   18.731894]  ? __pfx_kthread+0x10/0x10
[   18.731922]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.731956]  ? calculate_sigpending+0x7b/0xa0
[   18.731990]  ? __pfx_kthread+0x10/0x10
[   18.732018]  ret_from_fork+0x116/0x1d0
[   18.732043]  ? __pfx_kthread+0x10/0x10
[   18.732070]  ret_from_fork_asm+0x1a/0x30
[   18.732112]  </TASK>
[   18.732129] 
[   18.750535] Allocated by task 223:
[   18.751450]  kasan_save_stack+0x45/0x70
[   18.751878]  kasan_save_track+0x18/0x40
[   18.752412]  kasan_save_alloc_info+0x3b/0x50
[   18.752875]  __kasan_kmalloc+0xb7/0xc0
[   18.753278]  __kmalloc_cache_noprof+0x189/0x420
[   18.753732]  ksize_uaf+0xaa/0x6c0
[   18.754096]  kunit_try_run_case+0x1a5/0x480
[   18.754527]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.755545]  kthread+0x337/0x6f0
[   18.755922]  ret_from_fork+0x116/0x1d0
[   18.756423]  ret_from_fork_asm+0x1a/0x30
[   18.756812] 
[   18.757056] Freed by task 223:
[   18.757585]  kasan_save_stack+0x45/0x70
[   18.757984]  kasan_save_track+0x18/0x40
[   18.758699]  kasan_save_free_info+0x3f/0x60
[   18.759115]  __kasan_slab_free+0x56/0x70
[   18.759688]  kfree+0x222/0x3f0
[   18.760096]  ksize_uaf+0x12c/0x6c0
[   18.760594]  kunit_try_run_case+0x1a5/0x480
[   18.761032]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.761676]  kthread+0x337/0x6f0
[   18.762021]  ret_from_fork+0x116/0x1d0
[   18.762431]  ret_from_fork_asm+0x1a/0x30
[   18.763157] 
[   18.763629] The buggy address belongs to the object at ffff888103393c00
[   18.763629]  which belongs to the cache kmalloc-128 of size 128
[   18.764742] The buggy address is located 0 bytes inside of
[   18.764742]  freed 128-byte region [ffff888103393c00, ffff888103393c80)
[   18.765802] 
[   18.766054] The buggy address belongs to the physical page:
[   18.766764] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103393
[   18.767784] flags: 0x200000000000000(node=0|zone=2)
[   18.768434] page_type: f5(slab)
[   18.768765] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   18.769461] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.770111] page dumped because: kasan: bad access detected
[   18.770947] 
[   18.771184] Memory state around the buggy address:
[   18.771756]  ffff888103393b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.772335]  ffff888103393b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.772895] >ffff888103393c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.773486]                    ^
[   18.773780]  ffff888103393c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.774428]  ffff888103393d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.774960] ==================================================================
[   18.776561] ==================================================================
[   18.777137] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5fe/0x6c0
[   18.778345] Read of size 1 at addr ffff888103393c00 by task kunit_try_catch/223
[   18.778894] 
[   18.779134] CPU: 0 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) 
[   18.779438] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.779475] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.779530] Call Trace:
[   18.779576]  <TASK>
[   18.779619]  dump_stack_lvl+0x73/0xb0
[   18.779700]  print_report+0xd1/0x650
[   18.779774]  ? __virt_addr_valid+0x1db/0x2d0
[   18.779865]  ? ksize_uaf+0x5fe/0x6c0
[   18.779934]  ? kasan_complete_mode_report_info+0x64/0x200
[   18.780004]  ? ksize_uaf+0x5fe/0x6c0
[   18.780074]  kasan_report+0x141/0x180
[   18.780149]  ? ksize_uaf+0x5fe/0x6c0
[   18.780549]  __asan_report_load1_noabort+0x18/0x20
[   18.780637]  ksize_uaf+0x5fe/0x6c0
[   18.780709]  ? __pfx_ksize_uaf+0x10/0x10
[   18.780778]  ? __schedule+0x10cc/0x2b60
[   18.780862]  ? __pfx_read_tsc+0x10/0x10
[   18.780923]  ? ktime_get_ts64+0x86/0x230
[   18.781001]  kunit_try_run_case+0x1a5/0x480
[   18.781075]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.781147]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.781345]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.781408]  ? __kthread_parkme+0x82/0x180
[   18.781440]  ? preempt_count_sub+0x50/0x80
[   18.781473]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.781506]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.781539]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.781572]  kthread+0x337/0x6f0
[   18.781598]  ? trace_preempt_on+0x20/0xc0
[   18.781629]  ? __pfx_kthread+0x10/0x10
[   18.781657]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.781689]  ? calculate_sigpending+0x7b/0xa0
[   18.781723]  ? __pfx_kthread+0x10/0x10
[   18.781751]  ret_from_fork+0x116/0x1d0
[   18.781776]  ? __pfx_kthread+0x10/0x10
[   18.781803]  ret_from_fork_asm+0x1a/0x30
[   18.781868]  </TASK>
[   18.781885] 
[   18.796080] Allocated by task 223:
[   18.796745]  kasan_save_stack+0x45/0x70
[   18.797152]  kasan_save_track+0x18/0x40
[   18.797588]  kasan_save_alloc_info+0x3b/0x50
[   18.797940]  __kasan_kmalloc+0xb7/0xc0
[   18.798468]  __kmalloc_cache_noprof+0x189/0x420
[   18.798950]  ksize_uaf+0xaa/0x6c0
[   18.799495]  kunit_try_run_case+0x1a5/0x480
[   18.799932]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.800678]  kthread+0x337/0x6f0
[   18.800955]  ret_from_fork+0x116/0x1d0
[   18.801302]  ret_from_fork_asm+0x1a/0x30
[   18.801681] 
[   18.801892] Freed by task 223:
[   18.802208]  kasan_save_stack+0x45/0x70
[   18.802715]  kasan_save_track+0x18/0x40
[   18.803116]  kasan_save_free_info+0x3f/0x60
[   18.803681]  __kasan_slab_free+0x56/0x70
[   18.804074]  kfree+0x222/0x3f0
[   18.804726]  ksize_uaf+0x12c/0x6c0
[   18.805028]  kunit_try_run_case+0x1a5/0x480
[   18.805451]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.805882]  kthread+0x337/0x6f0
[   18.806222]  ret_from_fork+0x116/0x1d0
[   18.806584]  ret_from_fork_asm+0x1a/0x30
[   18.807052] 
[   18.807452] The buggy address belongs to the object at ffff888103393c00
[   18.807452]  which belongs to the cache kmalloc-128 of size 128
[   18.808732] The buggy address is located 0 bytes inside of
[   18.808732]  freed 128-byte region [ffff888103393c00, ffff888103393c80)
[   18.809845] 
[   18.810048] The buggy address belongs to the physical page:
[   18.810590] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103393
[   18.811201] flags: 0x200000000000000(node=0|zone=2)
[   18.811784] page_type: f5(slab)
[   18.812133] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   18.812970] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.813711] page dumped because: kasan: bad access detected
[   18.814180] 
[   18.814523] Memory state around the buggy address:
[   18.814979]  ffff888103393b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.815781]  ffff888103393b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.816739] >ffff888103393c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.817286]                    ^
[   18.817544]  ffff888103393c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.818397]  ffff888103393d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.818804] ==================================================================
[   18.821627] ==================================================================
[   18.822207] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5e4/0x6c0
[   18.823426] Read of size 1 at addr ffff888103393c78 by task kunit_try_catch/223
[   18.824030] 
[   18.824359] CPU: 0 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) 
[   18.824483] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.824517] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.824570] Call Trace:
[   18.824615]  <TASK>
[   18.824661]  dump_stack_lvl+0x73/0xb0
[   18.824740]  print_report+0xd1/0x650
[   18.824810]  ? __virt_addr_valid+0x1db/0x2d0
[   18.824905]  ? ksize_uaf+0x5e4/0x6c0
[   18.824976]  ? kasan_complete_mode_report_info+0x64/0x200
[   18.825047]  ? ksize_uaf+0x5e4/0x6c0
[   18.825738]  kasan_report+0x141/0x180
[   18.827202]  ? ksize_uaf+0x5e4/0x6c0
[   18.827283]  __asan_report_load1_noabort+0x18/0x20
[   18.827355]  ksize_uaf+0x5e4/0x6c0
[   18.827420]  ? __pfx_ksize_uaf+0x10/0x10
[   18.827481]  ? __schedule+0x10cc/0x2b60
[   18.827531]  ? __pfx_read_tsc+0x10/0x10
[   18.827597]  ? ktime_get_ts64+0x86/0x230
[   18.827661]  kunit_try_run_case+0x1a5/0x480
[   18.827720]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.827774]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.827824]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.827922]  ? __kthread_parkme+0x82/0x180
[   18.827994]  ? preempt_count_sub+0x50/0x80
[   18.828066]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.828121]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.828176]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.828240]  kthread+0x337/0x6f0
[   18.828310]  ? trace_preempt_on+0x20/0xc0
[   18.828383]  ? __pfx_kthread+0x10/0x10
[   18.828436]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.828496]  ? calculate_sigpending+0x7b/0xa0
[   18.828562]  ? __pfx_kthread+0x10/0x10
[   18.828623]  ret_from_fork+0x116/0x1d0
[   18.828679]  ? __pfx_kthread+0x10/0x10
[   18.828739]  ret_from_fork_asm+0x1a/0x30
[   18.828818]  </TASK>
[   18.828877] 
[   18.849140] Allocated by task 223:
[   18.849640]  kasan_save_stack+0x45/0x70
[   18.850050]  kasan_save_track+0x18/0x40
[   18.850727]  kasan_save_alloc_info+0x3b/0x50
[   18.851124]  __kasan_kmalloc+0xb7/0xc0
[   18.851627]  __kmalloc_cache_noprof+0x189/0x420
[   18.852028]  ksize_uaf+0xaa/0x6c0
[   18.852422]  kunit_try_run_case+0x1a5/0x480
[   18.852723]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.853216]  kthread+0x337/0x6f0
[   18.853586]  ret_from_fork+0x116/0x1d0
[   18.854037]  ret_from_fork_asm+0x1a/0x30
[   18.854329] 
[   18.854825] Freed by task 223:
[   18.855171]  kasan_save_stack+0x45/0x70
[   18.855687]  kasan_save_track+0x18/0x40
[   18.856087]  kasan_save_free_info+0x3f/0x60
[   18.856815]  __kasan_slab_free+0x56/0x70
[   18.857146]  kfree+0x222/0x3f0
[   18.857399]  ksize_uaf+0x12c/0x6c0
[   18.857744]  kunit_try_run_case+0x1a5/0x480
[   18.858174]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.858965]  kthread+0x337/0x6f0
[   18.859400]  ret_from_fork+0x116/0x1d0
[   18.859707]  ret_from_fork_asm+0x1a/0x30
[   18.860104] 
[   18.860267] The buggy address belongs to the object at ffff888103393c00
[   18.860267]  which belongs to the cache kmalloc-128 of size 128
[   18.861009] The buggy address is located 120 bytes inside of
[   18.861009]  freed 128-byte region [ffff888103393c00, ffff888103393c80)
[   18.862155] 
[   18.862318] The buggy address belongs to the physical page:
[   18.862642] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103393
[   18.863276] flags: 0x200000000000000(node=0|zone=2)
[   18.863722] page_type: f5(slab)
[   18.864073] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   18.864925] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.865991] page dumped because: kasan: bad access detected
[   18.866324] 
[   18.866537] Memory state around the buggy address:
[   18.867159]  ffff888103393b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.867751]  ffff888103393b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.869193] >ffff888103393c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.870041]                                                                 ^
[   18.870576]  ffff888103393c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.872129]  ffff888103393d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.872816] ==================================================================