Hay
Date
June 23, 2025, 7:07 a.m.

Environment
qemu-arm64
qemu-x86_64

[   33.372348] ==================================================================
[   33.372470] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8
[   33.372595] Read of size 1 at addr fff00000c63f7500 by task kunit_try_catch/208
[   33.372704] 
[   33.372774] CPU: 1 UID: 0 PID: 208 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   33.372968] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.373065] Hardware name: linux,dummy-virt (DT)
[   33.373152] Call trace:
[   33.373218]  show_stack+0x20/0x38 (C)
[   33.373359]  dump_stack_lvl+0x8c/0xd0
[   33.373717]  print_report+0x118/0x608
[   33.373857]  kasan_report+0xdc/0x128
[   33.373993]  __kasan_check_byte+0x54/0x70
[   33.374342]  ksize+0x30/0x88
[   33.374463]  ksize_uaf+0x168/0x5f8
[   33.374689]  kunit_try_run_case+0x170/0x3f0
[   33.374826]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.375014]  kthread+0x328/0x630
[   33.375281]  ret_from_fork+0x10/0x20
[   33.375417] 
[   33.375464] Allocated by task 208:
[   33.375541]  kasan_save_stack+0x3c/0x68
[   33.375700]  kasan_save_track+0x20/0x40
[   33.375843]  kasan_save_alloc_info+0x40/0x58
[   33.375963]  __kasan_kmalloc+0xd4/0xd8
[   33.376220]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.376332]  ksize_uaf+0xb8/0x5f8
[   33.376427]  kunit_try_run_case+0x170/0x3f0
[   33.376543]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.376936]  kthread+0x328/0x630
[   33.377439]  ret_from_fork+0x10/0x20
[   33.377535] 
[   33.378176] Freed by task 208:
[   33.378267]  kasan_save_stack+0x3c/0x68
[   33.378366]  kasan_save_track+0x20/0x40
[   33.378459]  kasan_save_free_info+0x4c/0x78
[   33.379284]  __kasan_slab_free+0x6c/0x98
[   33.379425]  kfree+0x214/0x3c8
[   33.379521]  ksize_uaf+0x11c/0x5f8
[   33.379746]  kunit_try_run_case+0x170/0x3f0
[   33.379841]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.380360]  kthread+0x328/0x630
[   33.380452]  ret_from_fork+0x10/0x20
[   33.380901] 
[   33.381070] The buggy address belongs to the object at fff00000c63f7500
[   33.381070]  which belongs to the cache kmalloc-128 of size 128
[   33.381939] The buggy address is located 0 bytes inside of
[   33.381939]  freed 128-byte region [fff00000c63f7500, fff00000c63f7580)
[   33.382645] 
[   33.382697] The buggy address belongs to the physical page:
[   33.382767] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063f7
[   33.382839] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.382900] page_type: f5(slab)
[   33.382946] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.383007] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.383257] page dumped because: kasan: bad access detected
[   33.383534] 
[   33.383685] Memory state around the buggy address:
[   33.383834]  fff00000c63f7400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.383946]  fff00000c63f7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.384327] >fff00000c63f7500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.384745]                    ^
[   33.384964]  fff00000c63f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.385084]  fff00000c63f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.385897] ==================================================================
[   33.401168] ==================================================================
[   33.401276] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8
[   33.401397] Read of size 1 at addr fff00000c63f7578 by task kunit_try_catch/208
[   33.401509] 
[   33.401580] CPU: 1 UID: 0 PID: 208 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   33.401776] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.401842] Hardware name: linux,dummy-virt (DT)
[   33.401910] Call trace:
[   33.401961]  show_stack+0x20/0x38 (C)
[   33.403370]  dump_stack_lvl+0x8c/0xd0
[   33.403659]  print_report+0x118/0x608
[   33.403786]  kasan_report+0xdc/0x128
[   33.403908]  __asan_report_load1_noabort+0x20/0x30
[   33.404066]  ksize_uaf+0x544/0x5f8
[   33.404253]  kunit_try_run_case+0x170/0x3f0
[   33.404419]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.404641]  kthread+0x328/0x630
[   33.404831]  ret_from_fork+0x10/0x20
[   33.405073] 
[   33.405235] Allocated by task 208:
[   33.405311]  kasan_save_stack+0x3c/0x68
[   33.405421]  kasan_save_track+0x20/0x40
[   33.405514]  kasan_save_alloc_info+0x40/0x58
[   33.405605]  __kasan_kmalloc+0xd4/0xd8
[   33.405690]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.405783]  ksize_uaf+0xb8/0x5f8
[   33.405864]  kunit_try_run_case+0x170/0x3f0
[   33.406017]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.406245]  kthread+0x328/0x630
[   33.406337]  ret_from_fork+0x10/0x20
[   33.406506] 
[   33.406609] Freed by task 208:
[   33.406723]  kasan_save_stack+0x3c/0x68
[   33.406845]  kasan_save_track+0x20/0x40
[   33.406945]  kasan_save_free_info+0x4c/0x78
[   33.407121]  __kasan_slab_free+0x6c/0x98
[   33.407318]  kfree+0x214/0x3c8
[   33.407419]  ksize_uaf+0x11c/0x5f8
[   33.407586]  kunit_try_run_case+0x170/0x3f0
[   33.407887]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.408049]  kthread+0x328/0x630
[   33.408284]  ret_from_fork+0x10/0x20
[   33.408381] 
[   33.408428] The buggy address belongs to the object at fff00000c63f7500
[   33.408428]  which belongs to the cache kmalloc-128 of size 128
[   33.408615] The buggy address is located 120 bytes inside of
[   33.408615]  freed 128-byte region [fff00000c63f7500, fff00000c63f7580)
[   33.409044] 
[   33.409103] The buggy address belongs to the physical page:
[   33.409188] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063f7
[   33.409571] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.410288] page_type: f5(slab)
[   33.411346] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.411746] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.412098] page dumped because: kasan: bad access detected
[   33.412283] 
[   33.412332] Memory state around the buggy address:
[   33.412420]  fff00000c63f7400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.412535]  fff00000c63f7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.413305] >fff00000c63f7500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.414323]                                                                 ^
[   33.414691]  fff00000c63f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.415282]  fff00000c63f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.415622] ==================================================================
[   33.388375] ==================================================================
[   33.388495] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8
[   33.388607] Read of size 1 at addr fff00000c63f7500 by task kunit_try_catch/208
[   33.388718] 
[   33.388789] CPU: 1 UID: 0 PID: 208 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   33.388980] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.389062] Hardware name: linux,dummy-virt (DT)
[   33.389148] Call trace:
[   33.389210]  show_stack+0x20/0x38 (C)
[   33.389408]  dump_stack_lvl+0x8c/0xd0
[   33.389637]  print_report+0x118/0x608
[   33.389781]  kasan_report+0xdc/0x128
[   33.389911]  __asan_report_load1_noabort+0x20/0x30
[   33.390129]  ksize_uaf+0x598/0x5f8
[   33.390352]  kunit_try_run_case+0x170/0x3f0
[   33.390475]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.390862]  kthread+0x328/0x630
[   33.390981]  ret_from_fork+0x10/0x20
[   33.391167] 
[   33.391227] Allocated by task 208:
[   33.391345]  kasan_save_stack+0x3c/0x68
[   33.391478]  kasan_save_track+0x20/0x40
[   33.391587]  kasan_save_alloc_info+0x40/0x58
[   33.391713]  __kasan_kmalloc+0xd4/0xd8
[   33.392047]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.392156]  ksize_uaf+0xb8/0x5f8
[   33.392245]  kunit_try_run_case+0x170/0x3f0
[   33.392367]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.392502]  kthread+0x328/0x630
[   33.392586]  ret_from_fork+0x10/0x20
[   33.392686] 
[   33.392815] Freed by task 208:
[   33.393011]  kasan_save_stack+0x3c/0x68
[   33.393133]  kasan_save_track+0x20/0x40
[   33.393251]  kasan_save_free_info+0x4c/0x78
[   33.393386]  __kasan_slab_free+0x6c/0x98
[   33.393798]  kfree+0x214/0x3c8
[   33.393907]  ksize_uaf+0x11c/0x5f8
[   33.394104]  kunit_try_run_case+0x170/0x3f0
[   33.394341]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.394527]  kthread+0x328/0x630
[   33.394673]  ret_from_fork+0x10/0x20
[   33.394797] 
[   33.394848] The buggy address belongs to the object at fff00000c63f7500
[   33.394848]  which belongs to the cache kmalloc-128 of size 128
[   33.395073] The buggy address is located 0 bytes inside of
[   33.395073]  freed 128-byte region [fff00000c63f7500, fff00000c63f7580)
[   33.395364] 
[   33.395435] The buggy address belongs to the physical page:
[   33.395522] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063f7
[   33.395698] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.395818] page_type: f5(slab)
[   33.395907] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.396043] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.396143] page dumped because: kasan: bad access detected
[   33.396236] 
[   33.396291] Memory state around the buggy address:
[   33.396378]  fff00000c63f7400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.396825]  fff00000c63f7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.396964] >fff00000c63f7500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.397477]                    ^
[   33.397555]  fff00000c63f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.397659]  fff00000c63f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.397762] ==================================================================

[   22.302785] ==================================================================
[   22.303207] BUG: KASAN: slab-use-after-free in ksize_uaf+0x19d/0x6c0
[   22.303401] Read of size 1 at addr ffff888102b4ee00 by task kunit_try_catch/225
[   22.303677] 
[   22.303847] CPU: 1 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) 
[   22.303921] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.303941] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.303970] Call Trace:
[   22.303988]  <TASK>
[   22.304011]  dump_stack_lvl+0x73/0xb0
[   22.304055]  print_report+0xd1/0x650
[   22.304089]  ? __virt_addr_valid+0x1db/0x2d0
[   22.304126]  ? ksize_uaf+0x19d/0x6c0
[   22.304161]  ? kasan_complete_mode_report_info+0x64/0x200
[   22.304204]  ? ksize_uaf+0x19d/0x6c0
[   22.304241]  kasan_report+0x141/0x180
[   22.304280]  ? ksize_uaf+0x19d/0x6c0
[   22.304322]  ? ksize_uaf+0x19d/0x6c0
[   22.304358]  __kasan_check_byte+0x3d/0x50
[   22.304413]  ksize+0x20/0x60
[   22.304456]  ksize_uaf+0x19d/0x6c0
[   22.304488]  ? __pfx_ksize_uaf+0x10/0x10
[   22.304517]  ? __schedule+0x10cc/0x2b60
[   22.304551]  ? __pfx_read_tsc+0x10/0x10
[   22.304584]  ? ktime_get_ts64+0x86/0x230
[   22.304623]  kunit_try_run_case+0x1a5/0x480
[   22.304663]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.304700]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.304735]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.304766]  ? __kthread_parkme+0x82/0x180
[   22.304794]  ? preempt_count_sub+0x50/0x80
[   22.304827]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.304860]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.304896]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.304935]  kthread+0x337/0x6f0
[   22.304967]  ? trace_preempt_on+0x20/0xc0
[   22.305006]  ? __pfx_kthread+0x10/0x10
[   22.305037]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.305060]  ? calculate_sigpending+0x7b/0xa0
[   22.305086]  ? __pfx_kthread+0x10/0x10
[   22.305108]  ret_from_fork+0x116/0x1d0
[   22.305124]  ? __pfx_kthread+0x10/0x10
[   22.305141]  ret_from_fork_asm+0x1a/0x30
[   22.305168]  </TASK>
[   22.305180] 
[   22.314337] Allocated by task 225:
[   22.314780]  kasan_save_stack+0x45/0x70
[   22.315213]  kasan_save_track+0x18/0x40
[   22.315579]  kasan_save_alloc_info+0x3b/0x50
[   22.315968]  __kasan_kmalloc+0xb7/0xc0
[   22.316287]  __kmalloc_cache_noprof+0x189/0x420
[   22.316673]  ksize_uaf+0xaa/0x6c0
[   22.316986]  kunit_try_run_case+0x1a5/0x480
[   22.317194]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.317529]  kthread+0x337/0x6f0
[   22.317790]  ret_from_fork+0x116/0x1d0
[   22.318197]  ret_from_fork_asm+0x1a/0x30
[   22.318637] 
[   22.318804] Freed by task 225:
[   22.319106]  kasan_save_stack+0x45/0x70
[   22.319427]  kasan_save_track+0x18/0x40
[   22.319581]  kasan_save_free_info+0x3f/0x60
[   22.319761]  __kasan_slab_free+0x56/0x70
[   22.320103]  kfree+0x222/0x3f0
[   22.320575]  ksize_uaf+0x12c/0x6c0
[   22.320822]  kunit_try_run_case+0x1a5/0x480
[   22.321154]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.321562]  kthread+0x337/0x6f0
[   22.321852]  ret_from_fork+0x116/0x1d0
[   22.322182]  ret_from_fork_asm+0x1a/0x30
[   22.322523] 
[   22.322649] The buggy address belongs to the object at ffff888102b4ee00
[   22.322649]  which belongs to the cache kmalloc-128 of size 128
[   22.323231] The buggy address is located 0 bytes inside of
[   22.323231]  freed 128-byte region [ffff888102b4ee00, ffff888102b4ee80)
[   22.323649] 
[   22.323806] The buggy address belongs to the physical page:
[   22.324094] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4e
[   22.324525] flags: 0x200000000000000(node=0|zone=2)
[   22.324868] page_type: f5(slab)
[   22.325115] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   22.325513] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.325896] page dumped because: kasan: bad access detected
[   22.326168] 
[   22.326263] Memory state around the buggy address:
[   22.326626]  ffff888102b4ed00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.327130]  ffff888102b4ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.327440] >ffff888102b4ee00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.327816]                    ^
[   22.328085]  ffff888102b4ee80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.328364]  ffff888102b4ef00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.328797] ==================================================================
[   22.356028] ==================================================================
[   22.356631] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5e4/0x6c0
[   22.357052] Read of size 1 at addr ffff888102b4ee78 by task kunit_try_catch/225
[   22.357277] 
[   22.357392] CPU: 1 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) 
[   22.357470] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.357494] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.357528] Call Trace:
[   22.357554]  <TASK>
[   22.357579]  dump_stack_lvl+0x73/0xb0
[   22.357626]  print_report+0xd1/0x650
[   22.357664]  ? __virt_addr_valid+0x1db/0x2d0
[   22.357742]  ? ksize_uaf+0x5e4/0x6c0
[   22.357773]  ? kasan_complete_mode_report_info+0x64/0x200
[   22.357813]  ? ksize_uaf+0x5e4/0x6c0
[   22.357865]  kasan_report+0x141/0x180
[   22.357905]  ? ksize_uaf+0x5e4/0x6c0
[   22.357951]  __asan_report_load1_noabort+0x18/0x20
[   22.357994]  ksize_uaf+0x5e4/0x6c0
[   22.358041]  ? __pfx_ksize_uaf+0x10/0x10
[   22.358084]  ? __schedule+0x10cc/0x2b60
[   22.358127]  ? __pfx_read_tsc+0x10/0x10
[   22.358168]  ? ktime_get_ts64+0x86/0x230
[   22.358217]  kunit_try_run_case+0x1a5/0x480
[   22.358263]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.358305]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.358347]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.358405]  ? __kthread_parkme+0x82/0x180
[   22.358448]  ? preempt_count_sub+0x50/0x80
[   22.358494]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.358539]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.358583]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.358626]  kthread+0x337/0x6f0
[   22.358664]  ? trace_preempt_on+0x20/0xc0
[   22.358696]  ? __pfx_kthread+0x10/0x10
[   22.358715]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.358734]  ? calculate_sigpending+0x7b/0xa0
[   22.358763]  ? __pfx_kthread+0x10/0x10
[   22.358782]  ret_from_fork+0x116/0x1d0
[   22.358799]  ? __pfx_kthread+0x10/0x10
[   22.358817]  ret_from_fork_asm+0x1a/0x30
[   22.358858]  </TASK>
[   22.358870] 
[   22.369268] Allocated by task 225:
[   22.369619]  kasan_save_stack+0x45/0x70
[   22.369946]  kasan_save_track+0x18/0x40
[   22.370225]  kasan_save_alloc_info+0x3b/0x50
[   22.370606]  __kasan_kmalloc+0xb7/0xc0
[   22.370943]  __kmalloc_cache_noprof+0x189/0x420
[   22.371263]  ksize_uaf+0xaa/0x6c0
[   22.371556]  kunit_try_run_case+0x1a5/0x480
[   22.371718]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.372195]  kthread+0x337/0x6f0
[   22.372553]  ret_from_fork+0x116/0x1d0
[   22.372792]  ret_from_fork_asm+0x1a/0x30
[   22.372974] 
[   22.373057] Freed by task 225:
[   22.373275]  kasan_save_stack+0x45/0x70
[   22.373572]  kasan_save_track+0x18/0x40
[   22.373918]  kasan_save_free_info+0x3f/0x60
[   22.374335]  __kasan_slab_free+0x56/0x70
[   22.374607]  kfree+0x222/0x3f0
[   22.374913]  ksize_uaf+0x12c/0x6c0
[   22.375168]  kunit_try_run_case+0x1a5/0x480
[   22.375337]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.375531]  kthread+0x337/0x6f0
[   22.375666]  ret_from_fork+0x116/0x1d0
[   22.375960]  ret_from_fork_asm+0x1a/0x30
[   22.376445] 
[   22.376627] The buggy address belongs to the object at ffff888102b4ee00
[   22.376627]  which belongs to the cache kmalloc-128 of size 128
[   22.377433] The buggy address is located 120 bytes inside of
[   22.377433]  freed 128-byte region [ffff888102b4ee00, ffff888102b4ee80)
[   22.378292] 
[   22.378482] The buggy address belongs to the physical page:
[   22.378750] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4e
[   22.379046] flags: 0x200000000000000(node=0|zone=2)
[   22.379389] page_type: f5(slab)
[   22.379783] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   22.380244] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.380788] page dumped because: kasan: bad access detected
[   22.381151] 
[   22.381235] Memory state around the buggy address:
[   22.381451]  ffff888102b4ed00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.382096]  ffff888102b4ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.382438] >ffff888102b4ee00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.382973]                                                                 ^
[   22.383431]  ffff888102b4ee80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.383824]  ffff888102b4ef00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.384182] ==================================================================
[   22.330094] ==================================================================
[   22.330398] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5fe/0x6c0
[   22.331078] Read of size 1 at addr ffff888102b4ee00 by task kunit_try_catch/225
[   22.331710] 
[   22.332443] CPU: 1 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) 
[   22.332534] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.332565] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.332597] Call Trace:
[   22.332636]  <TASK>
[   22.332663]  dump_stack_lvl+0x73/0xb0
[   22.332716]  print_report+0xd1/0x650
[   22.332751]  ? __virt_addr_valid+0x1db/0x2d0
[   22.332785]  ? ksize_uaf+0x5fe/0x6c0
[   22.332817]  ? kasan_complete_mode_report_info+0x64/0x200
[   22.332891]  ? ksize_uaf+0x5fe/0x6c0
[   22.332927]  kasan_report+0x141/0x180
[   22.332963]  ? ksize_uaf+0x5fe/0x6c0
[   22.333008]  __asan_report_load1_noabort+0x18/0x20
[   22.333047]  ksize_uaf+0x5fe/0x6c0
[   22.333097]  ? __pfx_ksize_uaf+0x10/0x10
[   22.333134]  ? __schedule+0x10cc/0x2b60
[   22.333173]  ? __pfx_read_tsc+0x10/0x10
[   22.333203]  ? ktime_get_ts64+0x86/0x230
[   22.333226]  kunit_try_run_case+0x1a5/0x480
[   22.333247]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.333265]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.333283]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.333301]  ? __kthread_parkme+0x82/0x180
[   22.333318]  ? preempt_count_sub+0x50/0x80
[   22.333338]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.333357]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.333376]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.333415]  kthread+0x337/0x6f0
[   22.333431]  ? trace_preempt_on+0x20/0xc0
[   22.333450]  ? __pfx_kthread+0x10/0x10
[   22.333466]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.333483]  ? calculate_sigpending+0x7b/0xa0
[   22.333503]  ? __pfx_kthread+0x10/0x10
[   22.333520]  ret_from_fork+0x116/0x1d0
[   22.333535]  ? __pfx_kthread+0x10/0x10
[   22.333552]  ret_from_fork_asm+0x1a/0x30
[   22.333578]  </TASK>
[   22.333589] 
[   22.340697] Allocated by task 225:
[   22.341019]  kasan_save_stack+0x45/0x70
[   22.341320]  kasan_save_track+0x18/0x40
[   22.341607]  kasan_save_alloc_info+0x3b/0x50
[   22.341940]  __kasan_kmalloc+0xb7/0xc0
[   22.342238]  __kmalloc_cache_noprof+0x189/0x420
[   22.342576]  ksize_uaf+0xaa/0x6c0
[   22.342866]  kunit_try_run_case+0x1a5/0x480
[   22.343191]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.343574]  kthread+0x337/0x6f0
[   22.343741]  ret_from_fork+0x116/0x1d0
[   22.343992]  ret_from_fork_asm+0x1a/0x30
[   22.344150] 
[   22.344247] Freed by task 225:
[   22.344496]  kasan_save_stack+0x45/0x70
[   22.344770]  kasan_save_track+0x18/0x40
[   22.345060]  kasan_save_free_info+0x3f/0x60
[   22.345339]  __kasan_slab_free+0x56/0x70
[   22.345550]  kfree+0x222/0x3f0
[   22.345682]  ksize_uaf+0x12c/0x6c0
[   22.345985]  kunit_try_run_case+0x1a5/0x480
[   22.346308]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.346486]  kthread+0x337/0x6f0
[   22.346613]  ret_from_fork+0x116/0x1d0
[   22.346753]  ret_from_fork_asm+0x1a/0x30
[   22.346930] 
[   22.347016] The buggy address belongs to the object at ffff888102b4ee00
[   22.347016]  which belongs to the cache kmalloc-128 of size 128
[   22.347346] The buggy address is located 0 bytes inside of
[   22.347346]  freed 128-byte region [ffff888102b4ee00, ffff888102b4ee80)
[   22.348128] 
[   22.348280] The buggy address belongs to the physical page:
[   22.348659] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b4e
[   22.349175] flags: 0x200000000000000(node=0|zone=2)
[   22.349541] page_type: f5(slab)
[   22.349802] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   22.350274] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.350770] page dumped because: kasan: bad access detected
[   22.350994] 
[   22.351076] Memory state around the buggy address:
[   22.351238]  ffff888102b4ed00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.351707]  ffff888102b4ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.352196] >ffff888102b4ee00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.352669]                    ^
[   22.352953]  ffff888102b4ee80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.353170]  ffff888102b4ef00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.353389] ==================================================================