Hay
Date
June 24, 2025, 11:37 a.m.

Environment
dragonboard-845c
qemu-arm64
qemu-x86_64

[   41.553421] ==================================================================
[   41.565067] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8
[   41.571514] Read of size 1 at addr ffff0000822c2a00 by task kunit_try_catch/294
[   41.578926] 
[   41.580463] CPU: 3 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   41.580493] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.580502] Hardware name: Thundercomm Dragonboard 845c (DT)
[   41.580514] Call trace:
[   41.580522]  show_stack+0x20/0x38 (C)
[   41.580541]  dump_stack_lvl+0x8c/0xd0
[   41.580560]  print_report+0x118/0x608
[   41.580579]  kasan_report+0xdc/0x128
[   41.580599]  __kasan_check_byte+0x54/0x70
[   41.580619]  ksize+0x30/0x88
[   41.580639]  ksize_uaf+0x168/0x5f8
[   41.580655]  kunit_try_run_case+0x170/0x3f0
[   41.580675]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.580698]  kthread+0x328/0x630
[   41.580714]  ret_from_fork+0x10/0x20
[   41.580732] 
[   41.647781] Allocated by task 294:
[   41.651245]  kasan_save_stack+0x3c/0x68
[   41.655148]  kasan_save_track+0x20/0x40
[   41.659058]  kasan_save_alloc_info+0x40/0x58
[   41.663396]  __kasan_kmalloc+0xd4/0xd8
[   41.667219]  __kmalloc_cache_noprof+0x16c/0x3c0
[   41.671828]  ksize_uaf+0xb8/0x5f8
[   41.675211]  kunit_try_run_case+0x170/0x3f0
[   41.679467]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.685038]  kthread+0x328/0x630
[   41.688331]  ret_from_fork+0x10/0x20
[   41.691971] 
[   41.693500] Freed by task 294:
[   41.696613]  kasan_save_stack+0x3c/0x68
[   41.700525]  kasan_save_track+0x20/0x40
[   41.704434]  kasan_save_free_info+0x4c/0x78
[   41.708689]  __kasan_slab_free+0x6c/0x98
[   41.712686]  kfree+0x214/0x3c8
[   41.715806]  ksize_uaf+0x11c/0x5f8
[   41.719272]  kunit_try_run_case+0x170/0x3f0
[   41.723526]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.729097]  kthread+0x328/0x630
[   41.732389]  ret_from_fork+0x10/0x20
[   41.736029] 
[   41.737558] The buggy address belongs to the object at ffff0000822c2a00
[   41.737558]  which belongs to the cache kmalloc-128 of size 128
[   41.750214] The buggy address is located 0 bytes inside of
[   41.750214]  freed 128-byte region [ffff0000822c2a00, ffff0000822c2a80)
[   41.762440] 
[   41.763977] The buggy address belongs to the physical page:
[   41.769629] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022c2
[   41.777735] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   41.785494] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   41.792550] page_type: f5(slab)
[   41.795755] raw: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000
[   41.803601] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   41.811449] head: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000
[   41.819382] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   41.827315] head: 0bfffe0000000001 fffffdffc208b081 00000000ffffffff 00000000ffffffff
[   41.835248] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   41.843173] page dumped because: kasan: bad access detected
[   41.848821] 
[   41.850350] Memory state around the buggy address:
[   41.855211]  ffff0000822c2900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   41.862527]  ffff0000822c2980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.869843] >ffff0000822c2a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   41.877157]                    ^
[   41.880446]  ffff0000822c2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.887760]  ffff0000822c2b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.895075] ==================================================================
[   41.902448] ==================================================================
[   41.909763] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8
[   41.916203] Read of size 1 at addr ffff0000822c2a00 by task kunit_try_catch/294
[   41.923618] 
[   41.925149] CPU: 3 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   41.925179] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.925189] Hardware name: Thundercomm Dragonboard 845c (DT)
[   41.925200] Call trace:
[   41.925207]  show_stack+0x20/0x38 (C)
[   41.925225]  dump_stack_lvl+0x8c/0xd0
[   41.925246]  print_report+0x118/0x608
[   41.925265]  kasan_report+0xdc/0x128
[   41.925286]  __asan_report_load1_noabort+0x20/0x30
[   41.925305]  ksize_uaf+0x598/0x5f8
[   41.925323]  kunit_try_run_case+0x170/0x3f0
[   41.925341]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.925365]  kthread+0x328/0x630
[   41.925380]  ret_from_fork+0x10/0x20
[   41.925399] 
[   41.990316] Allocated by task 294:
[   41.993778]  kasan_save_stack+0x3c/0x68
[   41.997689]  kasan_save_track+0x20/0x40
[   42.001599]  kasan_save_alloc_info+0x40/0x58
[   42.005939]  __kasan_kmalloc+0xd4/0xd8
[   42.009762]  __kmalloc_cache_noprof+0x16c/0x3c0
[   42.014363]  ksize_uaf+0xb8/0x5f8
[   42.017743]  kunit_try_run_case+0x170/0x3f0
[   42.021999]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.027569]  kthread+0x328/0x630
[   42.030854]  ret_from_fork+0x10/0x20
[   42.034492] 
[   42.036026] Freed by task 294:
[   42.039132]  kasan_save_stack+0x3c/0x68
[   42.043042]  kasan_save_track+0x20/0x40
[   42.046952]  kasan_save_free_info+0x4c/0x78
[   42.051201]  __kasan_slab_free+0x6c/0x98
[   42.055197]  kfree+0x214/0x3c8
[   42.058309]  ksize_uaf+0x11c/0x5f8
[   42.061776]  kunit_try_run_case+0x170/0x3f0
[   42.066031]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.071601]  kthread+0x328/0x630
[   42.074885]  ret_from_fork+0x10/0x20
[   42.078523] 
[   42.080056] The buggy address belongs to the object at ffff0000822c2a00
[   42.080056]  which belongs to the cache kmalloc-128 of size 128
[   42.092723] The buggy address is located 0 bytes inside of
[   42.092723]  freed 128-byte region [ffff0000822c2a00, ffff0000822c2a80)
[   42.104949] 
[   42.106479] The buggy address belongs to the physical page:
[   42.112122] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022c2
[   42.120227] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   42.127984] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   42.135045] page_type: f5(slab)
[   42.138248] raw: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000
[   42.146096] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   42.153940] head: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000
[   42.161874] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   42.169807] head: 0bfffe0000000001 fffffdffc208b081 00000000ffffffff 00000000ffffffff
[   42.177740] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   42.185668] page dumped because: kasan: bad access detected
[   42.191317] 
[   42.192844] Memory state around the buggy address:
[   42.197708]  ffff0000822c2900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   42.205022]  ffff0000822c2980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.212338] >ffff0000822c2a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   42.219650]                    ^
[   42.222930]  ffff0000822c2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.230244]  ffff0000822c2b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.237556] ==================================================================
[   42.245727] ==================================================================
[   42.253057] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8
[   42.259504] Read of size 1 at addr ffff0000822c2a78 by task kunit_try_catch/294
[   42.266907] 
[   42.268442] CPU: 4 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   42.268472] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.268482] Hardware name: Thundercomm Dragonboard 845c (DT)
[   42.268493] Call trace:
[   42.268499]  show_stack+0x20/0x38 (C)
[   42.268517]  dump_stack_lvl+0x8c/0xd0
[   42.268537]  print_report+0x118/0x608
[   42.268555]  kasan_report+0xdc/0x128
[   42.268574]  __asan_report_load1_noabort+0x20/0x30
[   42.268590]  ksize_uaf+0x544/0x5f8
[   42.268606]  kunit_try_run_case+0x170/0x3f0
[   42.268624]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.268644]  kthread+0x328/0x630
[   42.268658]  ret_from_fork+0x10/0x20
[   42.268675] 
[   42.333535] Allocated by task 294:
[   42.336989]  kasan_save_stack+0x3c/0x68
[   42.340895]  kasan_save_track+0x20/0x40
[   42.344800]  kasan_save_alloc_info+0x40/0x58
[   42.349135]  __kasan_kmalloc+0xd4/0xd8
[   42.352950]  __kmalloc_cache_noprof+0x16c/0x3c0
[   42.357547]  ksize_uaf+0xb8/0x5f8
[   42.360919]  kunit_try_run_case+0x170/0x3f0
[   42.365168]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.370735]  kthread+0x328/0x630
[   42.374018]  ret_from_fork+0x10/0x20
[   42.377649] 
[   42.379181] Freed by task 294:
[   42.382287]  kasan_save_stack+0x3c/0x68
[   42.386192]  kasan_save_track+0x20/0x40
[   42.390096]  kasan_save_free_info+0x4c/0x78
[   42.394344]  __kasan_slab_free+0x6c/0x98
[   42.398335]  kfree+0x214/0x3c8
[   42.401444]  ksize_uaf+0x11c/0x5f8
[   42.404901]  kunit_try_run_case+0x170/0x3f0
[   42.409151]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.414716]  kthread+0x328/0x630
[   42.417998]  ret_from_fork+0x10/0x20
[   42.421629] 
[   42.423161] The buggy address belongs to the object at ffff0000822c2a00
[   42.423161]  which belongs to the cache kmalloc-128 of size 128
[   42.435811] The buggy address is located 120 bytes inside of
[   42.435811]  freed 128-byte region [ffff0000822c2a00, ffff0000822c2a80)
[   42.448207] 
[   42.449731] The buggy address belongs to the physical page:
[   42.455372] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022c2
[   42.463471] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   42.471225] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   42.478275] page_type: f5(slab)
[   42.481471] raw: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000
[   42.489314] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   42.497155] head: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000
[   42.505083] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   42.513010] head: 0bfffe0000000001 fffffdffc208b081 00000000ffffffff 00000000ffffffff
[   42.520936] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   42.528859] page dumped because: kasan: bad access detected
[   42.534503] 
[   42.536032] Memory state around the buggy address:
[   42.540883]  ffff0000822c2900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   42.548199]  ffff0000822c2980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.555514] >ffff0000822c2a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   42.562821]                                                                 ^
[   42.570038]  ffff0000822c2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.577343]  ffff0000822c2b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.584657] ==================================================================

[   33.405260] ==================================================================
[   33.405363] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8
[   33.405468] Read of size 1 at addr fff00000c7732600 by task kunit_try_catch/207
[   33.405581] 
[   33.405648] CPU: 0 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   33.405848] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.406326] Hardware name: linux,dummy-virt (DT)
[   33.407596] Call trace:
[   33.408168]  show_stack+0x20/0x38 (C)
[   33.408775]  dump_stack_lvl+0x8c/0xd0
[   33.409070]  print_report+0x118/0x608
[   33.409212]  kasan_report+0xdc/0x128
[   33.409856]  __asan_report_load1_noabort+0x20/0x30
[   33.410641]  ksize_uaf+0x598/0x5f8
[   33.410855]  kunit_try_run_case+0x170/0x3f0
[   33.411004]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.411250]  kthread+0x328/0x630
[   33.411471]  ret_from_fork+0x10/0x20
[   33.411619] 
[   33.411664] Allocated by task 207:
[   33.411737]  kasan_save_stack+0x3c/0x68
[   33.411833]  kasan_save_track+0x20/0x40
[   33.411951]  kasan_save_alloc_info+0x40/0x58
[   33.412071]  __kasan_kmalloc+0xd4/0xd8
[   33.412182]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.412453]  ksize_uaf+0xb8/0x5f8
[   33.412668]  kunit_try_run_case+0x170/0x3f0
[   33.412769]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.412874]  kthread+0x328/0x630
[   33.412981]  ret_from_fork+0x10/0x20
[   33.413092] 
[   33.413147] Freed by task 207:
[   33.413226]  kasan_save_stack+0x3c/0x68
[   33.413874]  kasan_save_track+0x20/0x40
[   33.414046]  kasan_save_free_info+0x4c/0x78
[   33.414174]  __kasan_slab_free+0x6c/0x98
[   33.414306]  kfree+0x214/0x3c8
[   33.414527]  ksize_uaf+0x11c/0x5f8
[   33.414708]  kunit_try_run_case+0x170/0x3f0
[   33.414949]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.415149]  kthread+0x328/0x630
[   33.415322]  ret_from_fork+0x10/0x20
[   33.415426] 
[   33.415482] The buggy address belongs to the object at fff00000c7732600
[   33.415482]  which belongs to the cache kmalloc-128 of size 128
[   33.415662] The buggy address is located 0 bytes inside of
[   33.415662]  freed 128-byte region [fff00000c7732600, fff00000c7732680)
[   33.416104] 
[   33.416149] The buggy address belongs to the physical page:
[   33.416216] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107732
[   33.416342] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.416557] page_type: f5(slab)
[   33.416654] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.416790] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.416904] page dumped because: kasan: bad access detected
[   33.417009] 
[   33.417084] Memory state around the buggy address:
[   33.417164]  fff00000c7732500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.417268]  fff00000c7732580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.417372] >fff00000c7732600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.417494]                    ^
[   33.417565]  fff00000c7732680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.417666]  fff00000c7732700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.417758] ==================================================================
[   33.418986] ==================================================================
[   33.419094] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8
[   33.419277] Read of size 1 at addr fff00000c7732678 by task kunit_try_catch/207
[   33.419376] 
[   33.419450] CPU: 0 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   33.419569] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.419603] Hardware name: linux,dummy-virt (DT)
[   33.419679] Call trace:
[   33.419727]  show_stack+0x20/0x38 (C)
[   33.419792]  dump_stack_lvl+0x8c/0xd0
[   33.419847]  print_report+0x118/0x608
[   33.419931]  kasan_report+0xdc/0x128
[   33.419995]  __asan_report_load1_noabort+0x20/0x30
[   33.420054]  ksize_uaf+0x544/0x5f8
[   33.420106]  kunit_try_run_case+0x170/0x3f0
[   33.420165]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.420226]  kthread+0x328/0x630
[   33.420279]  ret_from_fork+0x10/0x20
[   33.420334] 
[   33.420356] Allocated by task 207:
[   33.420391]  kasan_save_stack+0x3c/0x68
[   33.420443]  kasan_save_track+0x20/0x40
[   33.420490]  kasan_save_alloc_info+0x40/0x58
[   33.420535]  __kasan_kmalloc+0xd4/0xd8
[   33.420580]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.420630]  ksize_uaf+0xb8/0x5f8
[   33.420672]  kunit_try_run_case+0x170/0x3f0
[   33.420719]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.420772]  kthread+0x328/0x630
[   33.420812]  ret_from_fork+0x10/0x20
[   33.420857] 
[   33.420880] Freed by task 207:
[   33.420986]  kasan_save_stack+0x3c/0x68
[   33.421089]  kasan_save_track+0x20/0x40
[   33.421192]  kasan_save_free_info+0x4c/0x78
[   33.421357]  __kasan_slab_free+0x6c/0x98
[   33.421481]  kfree+0x214/0x3c8
[   33.421673]  ksize_uaf+0x11c/0x5f8
[   33.422210]  kunit_try_run_case+0x170/0x3f0
[   33.423168]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.423657]  kthread+0x328/0x630
[   33.424002]  ret_from_fork+0x10/0x20
[   33.424109] 
[   33.424156] The buggy address belongs to the object at fff00000c7732600
[   33.424156]  which belongs to the cache kmalloc-128 of size 128
[   33.424337] The buggy address is located 120 bytes inside of
[   33.424337]  freed 128-byte region [fff00000c7732600, fff00000c7732680)
[   33.424484] 
[   33.424536] The buggy address belongs to the physical page:
[   33.424608] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107732
[   33.425248] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.426079] page_type: f5(slab)
[   33.426459] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.427118] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.427511] page dumped because: kasan: bad access detected
[   33.427614] 
[   33.427665] Memory state around the buggy address:
[   33.427800]  fff00000c7732500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.428014]  fff00000c7732580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.428149] >fff00000c7732600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.428320]                                                                 ^
[   33.428573]  fff00000c7732680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.428727]  fff00000c7732700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.428949] ==================================================================
[   33.387870] ==================================================================
[   33.388012] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8
[   33.388139] Read of size 1 at addr fff00000c7732600 by task kunit_try_catch/207
[   33.388261] 
[   33.388332] CPU: 0 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   33.390960] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.391209] Hardware name: linux,dummy-virt (DT)
[   33.391316] Call trace:
[   33.391380]  show_stack+0x20/0x38 (C)
[   33.391508]  dump_stack_lvl+0x8c/0xd0
[   33.391882]  print_report+0x118/0x608
[   33.392055]  kasan_report+0xdc/0x128
[   33.392179]  __kasan_check_byte+0x54/0x70
[   33.392338]  ksize+0x30/0x88
[   33.392476]  ksize_uaf+0x168/0x5f8
[   33.392594]  kunit_try_run_case+0x170/0x3f0
[   33.392754]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.392939]  kthread+0x328/0x630
[   33.393056]  ret_from_fork+0x10/0x20
[   33.393183] 
[   33.393232] Allocated by task 207:
[   33.393307]  kasan_save_stack+0x3c/0x68
[   33.393789]  kasan_save_track+0x20/0x40
[   33.393948]  kasan_save_alloc_info+0x40/0x58
[   33.394087]  __kasan_kmalloc+0xd4/0xd8
[   33.394208]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.394334]  ksize_uaf+0xb8/0x5f8
[   33.394444]  kunit_try_run_case+0x170/0x3f0
[   33.394554]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.394663]  kthread+0x328/0x630
[   33.394764]  ret_from_fork+0x10/0x20
[   33.394864] 
[   33.394929] Freed by task 207:
[   33.395007]  kasan_save_stack+0x3c/0x68
[   33.395309]  kasan_save_track+0x20/0x40
[   33.395420]  kasan_save_free_info+0x4c/0x78
[   33.395612]  __kasan_slab_free+0x6c/0x98
[   33.395826]  kfree+0x214/0x3c8
[   33.396019]  ksize_uaf+0x11c/0x5f8
[   33.396216]  kunit_try_run_case+0x170/0x3f0
[   33.396812]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.397278]  kthread+0x328/0x630
[   33.397670]  ret_from_fork+0x10/0x20
[   33.398008] 
[   33.398206] The buggy address belongs to the object at fff00000c7732600
[   33.398206]  which belongs to the cache kmalloc-128 of size 128
[   33.398343] The buggy address is located 0 bytes inside of
[   33.398343]  freed 128-byte region [fff00000c7732600, fff00000c7732680)
[   33.398932] 
[   33.399042] The buggy address belongs to the physical page:
[   33.399240] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107732
[   33.399480] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.399661] page_type: f5(slab)
[   33.399944] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.400186] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.400343] page dumped because: kasan: bad access detected
[   33.400563] 
[   33.400706] Memory state around the buggy address:
[   33.400915]  fff00000c7732500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.401033]  fff00000c7732580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.401228] >fff00000c7732600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.401322]                    ^
[   33.401461]  fff00000c7732680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.401572]  fff00000c7732700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.401666] ==================================================================

[   29.738362] ==================================================================
[   29.738998] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5fe/0x6c0
[   29.739455] Read of size 1 at addr ffff888100aaea00 by task kunit_try_catch/226
[   29.740639] 
[   29.740847] CPU: 1 UID: 0 PID: 226 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT(voluntary) 
[   29.740958] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.740980] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.741007] Call Trace:
[   29.741024]  <TASK>
[   29.741047]  dump_stack_lvl+0x73/0xb0
[   29.741102]  print_report+0xd1/0x650
[   29.741151]  ? __virt_addr_valid+0x1db/0x2d0
[   29.741187]  ? ksize_uaf+0x5fe/0x6c0
[   29.741215]  ? kasan_complete_mode_report_info+0x64/0x200
[   29.741248]  ? ksize_uaf+0x5fe/0x6c0
[   29.741275]  kasan_report+0x141/0x180
[   29.741303]  ? ksize_uaf+0x5fe/0x6c0
[   29.741335]  __asan_report_load1_noabort+0x18/0x20
[   29.741366]  ksize_uaf+0x5fe/0x6c0
[   29.741392]  ? __pfx_ksize_uaf+0x10/0x10
[   29.741420]  ? __schedule+0x10cc/0x2b60
[   29.741451]  ? __pfx_read_tsc+0x10/0x10
[   29.741478]  ? ktime_get_ts64+0x86/0x230
[   29.741509]  kunit_try_run_case+0x1a5/0x480
[   29.741559]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.741611]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.741665]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.741716]  ? __kthread_parkme+0x82/0x180
[   29.741759]  ? preempt_count_sub+0x50/0x80
[   29.741810]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.741861]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.741912]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.741965]  kthread+0x337/0x6f0
[   29.742069]  ? trace_preempt_on+0x20/0xc0
[   29.742137]  ? __pfx_kthread+0x10/0x10
[   29.742196]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.742262]  ? calculate_sigpending+0x7b/0xa0
[   29.742328]  ? __pfx_kthread+0x10/0x10
[   29.742389]  ret_from_fork+0x116/0x1d0
[   29.742446]  ? __pfx_kthread+0x10/0x10
[   29.742497]  ret_from_fork_asm+0x1a/0x30
[   29.742591]  </TASK>
[   29.742618] 
[   29.755863] Allocated by task 226:
[   29.756453]  kasan_save_stack+0x45/0x70
[   29.756732]  kasan_save_track+0x18/0x40
[   29.757118]  kasan_save_alloc_info+0x3b/0x50
[   29.757697]  __kasan_kmalloc+0xb7/0xc0
[   29.758264]  __kmalloc_cache_noprof+0x189/0x420
[   29.758783]  ksize_uaf+0xaa/0x6c0
[   29.759261]  kunit_try_run_case+0x1a5/0x480
[   29.759481]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.760211]  kthread+0x337/0x6f0
[   29.760512]  ret_from_fork+0x116/0x1d0
[   29.760969]  ret_from_fork_asm+0x1a/0x30
[   29.761456] 
[   29.761917] Freed by task 226:
[   29.762364]  kasan_save_stack+0x45/0x70
[   29.762753]  kasan_save_track+0x18/0x40
[   29.763299]  kasan_save_free_info+0x3f/0x60
[   29.763672]  __kasan_slab_free+0x56/0x70
[   29.764136]  kfree+0x222/0x3f0
[   29.764517]  ksize_uaf+0x12c/0x6c0
[   29.764769]  kunit_try_run_case+0x1a5/0x480
[   29.765292]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.765860]  kthread+0x337/0x6f0
[   29.766301]  ret_from_fork+0x116/0x1d0
[   29.766980]  ret_from_fork_asm+0x1a/0x30
[   29.767354] 
[   29.767572] The buggy address belongs to the object at ffff888100aaea00
[   29.767572]  which belongs to the cache kmalloc-128 of size 128
[   29.768523] The buggy address is located 0 bytes inside of
[   29.768523]  freed 128-byte region [ffff888100aaea00, ffff888100aaea80)
[   29.769468] 
[   29.769700] The buggy address belongs to the physical page:
[   29.770405] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aae
[   29.770999] flags: 0x200000000000000(node=0|zone=2)
[   29.771569] page_type: f5(slab)
[   29.771909] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   29.773433] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.773785] page dumped because: kasan: bad access detected
[   29.774279] 
[   29.774608] Memory state around the buggy address:
[   29.775505]  ffff888100aae900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.775854]  ffff888100aae980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.776589] >ffff888100aaea00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.777425]                    ^
[   29.777632]  ffff888100aaea80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.778341]  ffff888100aaeb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.779390] ==================================================================
[   29.780870] ==================================================================
[   29.781893] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5e4/0x6c0
[   29.782431] Read of size 1 at addr ffff888100aaea78 by task kunit_try_catch/226
[   29.783202] 
[   29.783366] CPU: 1 UID: 0 PID: 226 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT(voluntary) 
[   29.783685] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.783704] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.783728] Call Trace:
[   29.783764]  <TASK>
[   29.783793]  dump_stack_lvl+0x73/0xb0
[   29.783849]  print_report+0xd1/0x650
[   29.783880]  ? __virt_addr_valid+0x1db/0x2d0
[   29.783911]  ? ksize_uaf+0x5e4/0x6c0
[   29.783938]  ? kasan_complete_mode_report_info+0x64/0x200
[   29.783971]  ? ksize_uaf+0x5e4/0x6c0
[   29.783998]  kasan_report+0x141/0x180
[   29.784026]  ? ksize_uaf+0x5e4/0x6c0
[   29.784091]  __asan_report_load1_noabort+0x18/0x20
[   29.784164]  ksize_uaf+0x5e4/0x6c0
[   29.784258]  ? __pfx_ksize_uaf+0x10/0x10
[   29.784318]  ? __schedule+0x10cc/0x2b60
[   29.784386]  ? __pfx_read_tsc+0x10/0x10
[   29.784439]  ? ktime_get_ts64+0x86/0x230
[   29.784494]  kunit_try_run_case+0x1a5/0x480
[   29.784533]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.784587]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.784620]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.784675]  ? __kthread_parkme+0x82/0x180
[   29.784703]  ? preempt_count_sub+0x50/0x80
[   29.784733]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.784764]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.784795]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.784826]  kthread+0x337/0x6f0
[   29.784851]  ? trace_preempt_on+0x20/0xc0
[   29.784882]  ? __pfx_kthread+0x10/0x10
[   29.784908]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.784936]  ? calculate_sigpending+0x7b/0xa0
[   29.784966]  ? __pfx_kthread+0x10/0x10
[   29.784993]  ret_from_fork+0x116/0x1d0
[   29.785018]  ? __pfx_kthread+0x10/0x10
[   29.785044]  ret_from_fork_asm+0x1a/0x30
[   29.785110]  </TASK>
[   29.785135] 
[   29.801686] Allocated by task 226:
[   29.802628]  kasan_save_stack+0x45/0x70
[   29.802998]  kasan_save_track+0x18/0x40
[   29.803523]  kasan_save_alloc_info+0x3b/0x50
[   29.804241]  __kasan_kmalloc+0xb7/0xc0
[   29.804653]  __kmalloc_cache_noprof+0x189/0x420
[   29.804957]  ksize_uaf+0xaa/0x6c0
[   29.805375]  kunit_try_run_case+0x1a5/0x480
[   29.805605]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.806591]  kthread+0x337/0x6f0
[   29.807180]  ret_from_fork+0x116/0x1d0
[   29.807758]  ret_from_fork_asm+0x1a/0x30
[   29.808182] 
[   29.808680] Freed by task 226:
[   29.809008]  kasan_save_stack+0x45/0x70
[   29.809414]  kasan_save_track+0x18/0x40
[   29.809741]  kasan_save_free_info+0x3f/0x60
[   29.810029]  __kasan_slab_free+0x56/0x70
[   29.810779]  kfree+0x222/0x3f0
[   29.811253]  ksize_uaf+0x12c/0x6c0
[   29.811488]  kunit_try_run_case+0x1a5/0x480
[   29.812333]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.812945]  kthread+0x337/0x6f0
[   29.813493]  ret_from_fork+0x116/0x1d0
[   29.813960]  ret_from_fork_asm+0x1a/0x30
[   29.814335] 
[   29.814557] The buggy address belongs to the object at ffff888100aaea00
[   29.814557]  which belongs to the cache kmalloc-128 of size 128
[   29.815198] The buggy address is located 120 bytes inside of
[   29.815198]  freed 128-byte region [ffff888100aaea00, ffff888100aaea80)
[   29.816531] 
[   29.816748] The buggy address belongs to the physical page:
[   29.817247] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aae
[   29.817834] flags: 0x200000000000000(node=0|zone=2)
[   29.818127] page_type: f5(slab)
[   29.818444] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   29.819022] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.819633] page dumped because: kasan: bad access detected
[   29.819983] 
[   29.820166] Memory state around the buggy address:
[   29.820800]  ffff888100aae900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.821436]  ffff888100aae980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.821934] >ffff888100aaea00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.822621]                                                                 ^
[   29.823294]  ffff888100aaea80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.823976]  ffff888100aaeb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.825010] ==================================================================
[   29.693585] ==================================================================
[   29.694663] BUG: KASAN: slab-use-after-free in ksize_uaf+0x19d/0x6c0
[   29.695309] Read of size 1 at addr ffff888100aaea00 by task kunit_try_catch/226
[   29.695785] 
[   29.696029] CPU: 1 UID: 0 PID: 226 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT(voluntary) 
[   29.696269] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.696302] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.696345] Call Trace:
[   29.696375]  <TASK>
[   29.696414]  dump_stack_lvl+0x73/0xb0
[   29.696529]  print_report+0xd1/0x650
[   29.696659]  ? __virt_addr_valid+0x1db/0x2d0
[   29.696731]  ? ksize_uaf+0x19d/0x6c0
[   29.696787]  ? kasan_complete_mode_report_info+0x64/0x200
[   29.696856]  ? ksize_uaf+0x19d/0x6c0
[   29.696909]  kasan_report+0x141/0x180
[   29.696954]  ? ksize_uaf+0x19d/0x6c0
[   29.696987]  ? ksize_uaf+0x19d/0x6c0
[   29.697015]  __kasan_check_byte+0x3d/0x50
[   29.697044]  ksize+0x20/0x60
[   29.697135]  ksize_uaf+0x19d/0x6c0
[   29.697181]  ? __pfx_ksize_uaf+0x10/0x10
[   29.697212]  ? __schedule+0x10cc/0x2b60
[   29.697245]  ? __pfx_read_tsc+0x10/0x10
[   29.697274]  ? ktime_get_ts64+0x86/0x230
[   29.697307]  kunit_try_run_case+0x1a5/0x480
[   29.697341]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.697371]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.697402]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.697433]  ? __kthread_parkme+0x82/0x180
[   29.697461]  ? preempt_count_sub+0x50/0x80
[   29.697491]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.697521]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.697572]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.697605]  kthread+0x337/0x6f0
[   29.697631]  ? trace_preempt_on+0x20/0xc0
[   29.697674]  ? __pfx_kthread+0x10/0x10
[   29.697702]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.697731]  ? calculate_sigpending+0x7b/0xa0
[   29.697762]  ? __pfx_kthread+0x10/0x10
[   29.697789]  ret_from_fork+0x116/0x1d0
[   29.697813]  ? __pfx_kthread+0x10/0x10
[   29.697840]  ret_from_fork_asm+0x1a/0x30
[   29.697879]  </TASK>
[   29.697894] 
[   29.711937] Allocated by task 226:
[   29.712530]  kasan_save_stack+0x45/0x70
[   29.713213]  kasan_save_track+0x18/0x40
[   29.713690]  kasan_save_alloc_info+0x3b/0x50
[   29.714380]  __kasan_kmalloc+0xb7/0xc0
[   29.714880]  __kmalloc_cache_noprof+0x189/0x420
[   29.715450]  ksize_uaf+0xaa/0x6c0
[   29.716084]  kunit_try_run_case+0x1a5/0x480
[   29.716685]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.717234]  kthread+0x337/0x6f0
[   29.717666]  ret_from_fork+0x116/0x1d0
[   29.717976]  ret_from_fork_asm+0x1a/0x30
[   29.718608] 
[   29.718877] Freed by task 226:
[   29.719115]  kasan_save_stack+0x45/0x70
[   29.719732]  kasan_save_track+0x18/0x40
[   29.720172]  kasan_save_free_info+0x3f/0x60
[   29.720944]  __kasan_slab_free+0x56/0x70
[   29.721425]  kfree+0x222/0x3f0
[   29.721880]  ksize_uaf+0x12c/0x6c0
[   29.722355]  kunit_try_run_case+0x1a5/0x480
[   29.722849]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.723469]  kthread+0x337/0x6f0
[   29.723911]  ret_from_fork+0x116/0x1d0
[   29.724271]  ret_from_fork_asm+0x1a/0x30
[   29.724686] 
[   29.724893] The buggy address belongs to the object at ffff888100aaea00
[   29.724893]  which belongs to the cache kmalloc-128 of size 128
[   29.726250] The buggy address is located 0 bytes inside of
[   29.726250]  freed 128-byte region [ffff888100aaea00, ffff888100aaea80)
[   29.727379] 
[   29.727558] The buggy address belongs to the physical page:
[   29.728289] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aae
[   29.728755] flags: 0x200000000000000(node=0|zone=2)
[   29.729249] page_type: f5(slab)
[   29.729498] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   29.730267] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.730965] page dumped because: kasan: bad access detected
[   29.731353] 
[   29.731570] Memory state around the buggy address:
[   29.731863]  ffff888100aae900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.732491]  ffff888100aae980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.733402] >ffff888100aaea00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.734244]                    ^
[   29.734507]  ffff888100aaea80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.735296]  ffff888100aaeb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.735917] ==================================================================