Hay
Date
July 3, 2025, 10:10 a.m.

Environment
dragonboard-845c
qemu-arm64
qemu-x86_64

[   44.083669] ==================================================================
[   44.090987] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8
[   44.097437] Read of size 1 at addr ffff000082240200 by task kunit_try_catch/305
[   44.104845] 
[   44.106379] CPU: 3 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT 
[   44.106410] Tainted: [B]=BAD_PAGE, [N]=TEST
[   44.106419] Hardware name: Thundercomm Dragonboard 845c (DT)
[   44.106431] Call trace:
[   44.106438]  show_stack+0x20/0x38 (C)
[   44.106458]  dump_stack_lvl+0x8c/0xd0
[   44.106480]  print_report+0x118/0x608
[   44.106499]  kasan_report+0xdc/0x128
[   44.106518]  __asan_report_load1_noabort+0x20/0x30
[   44.106536]  ksize_uaf+0x598/0x5f8
[   44.106552]  kunit_try_run_case+0x170/0x3f0
[   44.106573]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.106596]  kthread+0x328/0x630
[   44.106612]  ret_from_fork+0x10/0x20
[   44.106630] 
[   44.171536] Allocated by task 305:
[   44.174997]  kasan_save_stack+0x3c/0x68
[   44.178900]  kasan_save_track+0x20/0x40
[   44.182809]  kasan_save_alloc_info+0x40/0x58
[   44.187146]  __kasan_kmalloc+0xd4/0xd8
[   44.190968]  __kmalloc_cache_noprof+0x16c/0x3c0
[   44.195578]  ksize_uaf+0xb8/0x5f8
[   44.198959]  kunit_try_run_case+0x170/0x3f0
[   44.203215]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.208787]  kthread+0x328/0x630
[   44.212076]  ret_from_fork+0x10/0x20
[   44.215716] 
[   44.217246] Freed by task 305:
[   44.220358]  kasan_save_stack+0x3c/0x68
[   44.224269]  kasan_save_track+0x20/0x40
[   44.228180]  kasan_save_free_info+0x4c/0x78
[   44.232432]  __kasan_slab_free+0x6c/0x98
[   44.236428]  kfree+0x214/0x3c8
[   44.239540]  ksize_uaf+0x11c/0x5f8
[   44.243007]  kunit_try_run_case+0x170/0x3f0
[   44.247260]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.252830]  kthread+0x328/0x630
[   44.256124]  ret_from_fork+0x10/0x20
[   44.259764] 
[   44.261291] The buggy address belongs to the object at ffff000082240200
[   44.261291]  which belongs to the cache kmalloc-128 of size 128
[   44.273958] The buggy address is located 0 bytes inside of
[   44.273958]  freed 128-byte region [ffff000082240200, ffff000082240280)
[   44.286181] 
[   44.287718] The buggy address belongs to the physical page:
[   44.293367] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102240
[   44.301483] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   44.309244] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   44.316301] page_type: f5(slab)
[   44.319509] raw: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000
[   44.327355] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   44.335203] head: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000
[   44.343137] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   44.351072] head: 0bfffe0000000001 fffffdffc2089001 00000000ffffffff 00000000ffffffff
[   44.359006] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   44.366934] page dumped because: kasan: bad access detected
[   44.372582] 
[   44.374111] Memory state around the buggy address:
[   44.378973]  ffff000082240100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   44.386289]  ffff000082240180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.393604] >ffff000082240200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   44.400916]                    ^
[   44.404203]  ffff000082240280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.411521]  ffff000082240300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.418834] ==================================================================
[   44.427005] ==================================================================
[   44.434324] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8
[   44.440772] Read of size 1 at addr ffff000082240278 by task kunit_try_catch/305
[   44.448182] 
[   44.449712] CPU: 4 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT 
[   44.449743] Tainted: [B]=BAD_PAGE, [N]=TEST
[   44.449751] Hardware name: Thundercomm Dragonboard 845c (DT)
[   44.449763] Call trace:
[   44.449770]  show_stack+0x20/0x38 (C)
[   44.449788]  dump_stack_lvl+0x8c/0xd0
[   44.449807]  print_report+0x118/0x608
[   44.449825]  kasan_report+0xdc/0x128
[   44.449844]  __asan_report_load1_noabort+0x20/0x30
[   44.449861]  ksize_uaf+0x544/0x5f8
[   44.449877]  kunit_try_run_case+0x170/0x3f0
[   44.449896]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.449916]  kthread+0x328/0x630
[   44.449929]  ret_from_fork+0x10/0x20
[   44.449947] 
[   44.514800] Allocated by task 305:
[   44.518255]  kasan_save_stack+0x3c/0x68
[   44.522162]  kasan_save_track+0x20/0x40
[   44.526068]  kasan_save_alloc_info+0x40/0x58
[   44.530407]  __kasan_kmalloc+0xd4/0xd8
[   44.534226]  __kmalloc_cache_noprof+0x16c/0x3c0
[   44.538825]  ksize_uaf+0xb8/0x5f8
[   44.542197]  kunit_try_run_case+0x170/0x3f0
[   44.546447]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.552012]  kthread+0x328/0x630
[   44.555296]  ret_from_fork+0x10/0x20
[   44.558931] 
[   44.560462] Freed by task 305:
[   44.563568]  kasan_save_stack+0x3c/0x68
[   44.567474]  kasan_save_track+0x20/0x40
[   44.571378]  kasan_save_free_info+0x4c/0x78
[   44.575626]  __kasan_slab_free+0x6c/0x98
[   44.579619]  kfree+0x214/0x3c8
[   44.582733]  ksize_uaf+0x11c/0x5f8
[   44.586190]  kunit_try_run_case+0x170/0x3f0
[   44.590443]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.596005]  kthread+0x328/0x630
[   44.599288]  ret_from_fork+0x10/0x20
[   44.602923] 
[   44.604453] The buggy address belongs to the object at ffff000082240200
[   44.604453]  which belongs to the cache kmalloc-128 of size 128
[   44.617110] The buggy address is located 120 bytes inside of
[   44.617110]  freed 128-byte region [ffff000082240200, ffff000082240280)
[   44.629499] 
[   44.631034] The buggy address belongs to the physical page:
[   44.636677] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102240
[   44.644782] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   44.652538] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   44.659587] page_type: f5(slab)
[   44.662789] raw: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000
[   44.670634] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   44.678477] head: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000
[   44.686405] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   44.694334] head: 0bfffe0000000001 fffffdffc2089001 00000000ffffffff 00000000ffffffff
[   44.702262] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   44.710185] page dumped because: kasan: bad access detected
[   44.715822] 
[   44.717346] Memory state around the buggy address:
[   44.722197]  ffff000082240100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   44.729513]  ffff000082240180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.736830] >ffff000082240200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   44.744146]                                                                 ^
[   44.751362]  ffff000082240280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.758674]  ffff000082240300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.765989] ==================================================================
[   43.734638] ==================================================================
[   43.746285] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8
[   43.752731] Read of size 1 at addr ffff000082240200 by task kunit_try_catch/305
[   43.760147] 
[   43.761682] CPU: 3 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT 
[   43.761714] Tainted: [B]=BAD_PAGE, [N]=TEST
[   43.761723] Hardware name: Thundercomm Dragonboard 845c (DT)
[   43.761736] Call trace:
[   43.761743]  show_stack+0x20/0x38 (C)
[   43.761762]  dump_stack_lvl+0x8c/0xd0
[   43.761784]  print_report+0x118/0x608
[   43.761804]  kasan_report+0xdc/0x128
[   43.761823]  __kasan_check_byte+0x54/0x70
[   43.761842]  ksize+0x30/0x88
[   43.761863]  ksize_uaf+0x168/0x5f8
[   43.761879]  kunit_try_run_case+0x170/0x3f0
[   43.761897]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.761920]  kthread+0x328/0x630
[   43.761934]  ret_from_fork+0x10/0x20
[   43.761953] 
[   43.829008] Allocated by task 305:
[   43.832474]  kasan_save_stack+0x3c/0x68
[   43.836380]  kasan_save_track+0x20/0x40
[   43.840285]  kasan_save_alloc_info+0x40/0x58
[   43.844631]  __kasan_kmalloc+0xd4/0xd8
[   43.848448]  __kmalloc_cache_noprof+0x16c/0x3c0
[   43.853055]  ksize_uaf+0xb8/0x5f8
[   43.856430]  kunit_try_run_case+0x170/0x3f0
[   43.860690]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.866260]  kthread+0x328/0x630
[   43.869547]  ret_from_fork+0x10/0x20
[   43.873192] 
[   43.874722] Freed by task 305:
[   43.877830]  kasan_save_stack+0x3c/0x68
[   43.881736]  kasan_save_track+0x20/0x40
[   43.885641]  kasan_save_free_info+0x4c/0x78
[   43.889899]  __kasan_slab_free+0x6c/0x98
[   43.893890]  kfree+0x214/0x3c8
[   43.897005]  ksize_uaf+0x11c/0x5f8
[   43.900476]  kunit_try_run_case+0x170/0x3f0
[   43.904737]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.910305]  kthread+0x328/0x630
[   43.913591]  ret_from_fork+0x10/0x20
[   43.917235] 
[   43.918765] The buggy address belongs to the object at ffff000082240200
[   43.918765]  which belongs to the cache kmalloc-128 of size 128
[   43.931429] The buggy address is located 0 bytes inside of
[   43.931429]  freed 128-byte region [ffff000082240200, ffff000082240280)
[   43.943650] 
[   43.945181] The buggy address belongs to the physical page:
[   43.950826] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102240
[   43.958933] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   43.966692] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   43.973750] page_type: f5(slab)
[   43.976951] raw: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000
[   43.984799] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   43.992649] head: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000
[   44.000584] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   44.008517] head: 0bfffe0000000001 fffffdffc2089001 00000000ffffffff 00000000ffffffff
[   44.016450] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   44.024379] page dumped because: kasan: bad access detected
[   44.030026] 
[   44.031557] Memory state around the buggy address:
[   44.036416]  ffff000082240100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   44.043732]  ffff000082240180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.051049] >ffff000082240200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   44.058364]                    ^
[   44.061650]  ffff000082240280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.068968]  ffff000082240300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.076281] ==================================================================

[   31.334948] ==================================================================
[   31.335298] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8
[   31.335382] Read of size 1 at addr fff00000c9ae3500 by task kunit_try_catch/228
[   31.335482] 
[   31.335517] CPU: 0 UID: 0 PID: 228 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT 
[   31.335660] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.335689] Hardware name: linux,dummy-virt (DT)
[   31.335913] Call trace:
[   31.335954]  show_stack+0x20/0x38 (C)
[   31.336016]  dump_stack_lvl+0x8c/0xd0
[   31.336211]  print_report+0x118/0x608
[   31.336294]  kasan_report+0xdc/0x128
[   31.336588]  __kasan_check_byte+0x54/0x70
[   31.336750]  ksize+0x30/0x88
[   31.336796]  ksize_uaf+0x168/0x5f8
[   31.336849]  kunit_try_run_case+0x170/0x3f0
[   31.337299]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.337464]  kthread+0x328/0x630
[   31.337644]  ret_from_fork+0x10/0x20
[   31.337736] 
[   31.338017] Allocated by task 228:
[   31.338194]  kasan_save_stack+0x3c/0x68
[   31.338354]  kasan_save_track+0x20/0x40
[   31.338538]  kasan_save_alloc_info+0x40/0x58
[   31.338613]  __kasan_kmalloc+0xd4/0xd8
[   31.338651]  __kmalloc_cache_noprof+0x16c/0x3c0
[   31.338885]  ksize_uaf+0xb8/0x5f8
[   31.339048]  kunit_try_run_case+0x170/0x3f0
[   31.339821]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.339989]  kthread+0x328/0x630
[   31.340055]  ret_from_fork+0x10/0x20
[   31.340110] 
[   31.340266] Freed by task 228:
[   31.340384]  kasan_save_stack+0x3c/0x68
[   31.340750]  kasan_save_track+0x20/0x40
[   31.340829]  kasan_save_free_info+0x4c/0x78
[   31.341138]  __kasan_slab_free+0x6c/0x98
[   31.341454]  kfree+0x214/0x3c8
[   31.341689]  ksize_uaf+0x11c/0x5f8
[   31.341887]  kunit_try_run_case+0x170/0x3f0
[   31.342313]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.342666]  kthread+0x328/0x630
[   31.342727]  ret_from_fork+0x10/0x20
[   31.342767] 
[   31.342790] The buggy address belongs to the object at fff00000c9ae3500
[   31.342790]  which belongs to the cache kmalloc-128 of size 128
[   31.343014] The buggy address is located 0 bytes inside of
[   31.343014]  freed 128-byte region [fff00000c9ae3500, fff00000c9ae3580)
[   31.343096] 
[   31.343116] The buggy address belongs to the physical page:
[   31.343158] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ae3
[   31.343332] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.343394] page_type: f5(slab)
[   31.343436] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   31.343509] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.343552] page dumped because: kasan: bad access detected
[   31.343584] 
[   31.343613] Memory state around the buggy address:
[   31.343656]  fff00000c9ae3400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.343699]  fff00000c9ae3480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.343750] >fff00000c9ae3500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.343787]                    ^
[   31.343825]  fff00000c9ae3580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.344342]  fff00000c9ae3600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.344498] ==================================================================
[   31.359479] ==================================================================
[   31.359531] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8
[   31.359579] Read of size 1 at addr fff00000c9ae3578 by task kunit_try_catch/228
[   31.359653] 
[   31.359692] CPU: 0 UID: 0 PID: 228 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT 
[   31.359780] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.359817] Hardware name: linux,dummy-virt (DT)
[   31.360302] Call trace:
[   31.360351]  show_stack+0x20/0x38 (C)
[   31.360633]  dump_stack_lvl+0x8c/0xd0
[   31.361032]  print_report+0x118/0x608
[   31.361253]  kasan_report+0xdc/0x128
[   31.361341]  __asan_report_load1_noabort+0x20/0x30
[   31.361524]  ksize_uaf+0x544/0x5f8
[   31.361855]  kunit_try_run_case+0x170/0x3f0
[   31.361979]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.362156]  kthread+0x328/0x630
[   31.362376]  ret_from_fork+0x10/0x20
[   31.362687] 
[   31.362860] Allocated by task 228:
[   31.362936]  kasan_save_stack+0x3c/0x68
[   31.363111]  kasan_save_track+0x20/0x40
[   31.363303]  kasan_save_alloc_info+0x40/0x58
[   31.363378]  __kasan_kmalloc+0xd4/0xd8
[   31.363609]  __kmalloc_cache_noprof+0x16c/0x3c0
[   31.364037]  ksize_uaf+0xb8/0x5f8
[   31.364094]  kunit_try_run_case+0x170/0x3f0
[   31.364495]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.364682]  kthread+0x328/0x630
[   31.364870]  ret_from_fork+0x10/0x20
[   31.364975] 
[   31.365000] Freed by task 228:
[   31.365037]  kasan_save_stack+0x3c/0x68
[   31.365079]  kasan_save_track+0x20/0x40
[   31.365118]  kasan_save_free_info+0x4c/0x78
[   31.365435]  __kasan_slab_free+0x6c/0x98
[   31.365629]  kfree+0x214/0x3c8
[   31.365719]  ksize_uaf+0x11c/0x5f8
[   31.365986]  kunit_try_run_case+0x170/0x3f0
[   31.366051]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.366314]  kthread+0x328/0x630
[   31.366569]  ret_from_fork+0x10/0x20
[   31.366675] 
[   31.366867] The buggy address belongs to the object at fff00000c9ae3500
[   31.366867]  which belongs to the cache kmalloc-128 of size 128
[   31.367130] The buggy address is located 120 bytes inside of
[   31.367130]  freed 128-byte region [fff00000c9ae3500, fff00000c9ae3580)
[   31.367607] 
[   31.367706] The buggy address belongs to the physical page:
[   31.367907] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ae3
[   31.367985] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.368222] page_type: f5(slab)
[   31.368431] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   31.368507] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.368829] page dumped because: kasan: bad access detected
[   31.368881] 
[   31.368925] Memory state around the buggy address:
[   31.369030]  fff00000c9ae3400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.369455]  fff00000c9ae3480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.369708] >fff00000c9ae3500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.369883]                                                                 ^
[   31.369983]  fff00000c9ae3580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.370186]  fff00000c9ae3600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.370414] ==================================================================
[   31.349133] ==================================================================
[   31.349192] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8
[   31.349246] Read of size 1 at addr fff00000c9ae3500 by task kunit_try_catch/228
[   31.349775] 
[   31.349993] CPU: 0 UID: 0 PID: 228 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT 
[   31.350239] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.350632] Hardware name: linux,dummy-virt (DT)
[   31.350690] Call trace:
[   31.350715]  show_stack+0x20/0x38 (C)
[   31.350880]  dump_stack_lvl+0x8c/0xd0
[   31.350937]  print_report+0x118/0x608
[   31.351155]  kasan_report+0xdc/0x128
[   31.351459]  __asan_report_load1_noabort+0x20/0x30
[   31.351565]  ksize_uaf+0x598/0x5f8
[   31.351617]  kunit_try_run_case+0x170/0x3f0
[   31.351738]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.351961]  kthread+0x328/0x630
[   31.352070]  ret_from_fork+0x10/0x20
[   31.352220] 
[   31.352246] Allocated by task 228:
[   31.352306]  kasan_save_stack+0x3c/0x68
[   31.352676]  kasan_save_track+0x20/0x40
[   31.352936]  kasan_save_alloc_info+0x40/0x58
[   31.353189]  __kasan_kmalloc+0xd4/0xd8
[   31.353314]  __kmalloc_cache_noprof+0x16c/0x3c0
[   31.353470]  ksize_uaf+0xb8/0x5f8
[   31.353574]  kunit_try_run_case+0x170/0x3f0
[   31.353733]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.353868]  kthread+0x328/0x630
[   31.354305]  ret_from_fork+0x10/0x20
[   31.354377] 
[   31.354616] Freed by task 228:
[   31.354830]  kasan_save_stack+0x3c/0x68
[   31.354918]  kasan_save_track+0x20/0x40
[   31.355135]  kasan_save_free_info+0x4c/0x78
[   31.355289]  __kasan_slab_free+0x6c/0x98
[   31.355386]  kfree+0x214/0x3c8
[   31.355786]  ksize_uaf+0x11c/0x5f8
[   31.355861]  kunit_try_run_case+0x170/0x3f0
[   31.356024]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.356209]  kthread+0x328/0x630
[   31.356269]  ret_from_fork+0x10/0x20
[   31.356334] 
[   31.356687] The buggy address belongs to the object at fff00000c9ae3500
[   31.356687]  which belongs to the cache kmalloc-128 of size 128
[   31.356942] The buggy address is located 0 bytes inside of
[   31.356942]  freed 128-byte region [fff00000c9ae3500, fff00000c9ae3580)
[   31.357130] 
[   31.357231] The buggy address belongs to the physical page:
[   31.357597] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ae3
[   31.357903] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.358051] page_type: f5(slab)
[   31.358323] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   31.358395] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.358437] page dumped because: kasan: bad access detected
[   31.358467] 
[   31.358485] Memory state around the buggy address:
[   31.358518]  fff00000c9ae3400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.358600]  fff00000c9ae3480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.358653] >fff00000c9ae3500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.358695]                    ^
[   31.358750]  fff00000c9ae3580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.358792]  fff00000c9ae3600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.358831] ==================================================================

[   23.648523] ==================================================================
[   23.648829] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5fe/0x6c0
[   23.649105] Read of size 1 at addr ffff888105540100 by task kunit_try_catch/245
[   23.650262] 
[   23.650448] CPU: 1 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT(voluntary) 
[   23.650570] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.650583] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.650604] Call Trace:
[   23.650622]  <TASK>
[   23.650638]  dump_stack_lvl+0x73/0xb0
[   23.650668]  print_report+0xd1/0x650
[   23.650689]  ? __virt_addr_valid+0x1db/0x2d0
[   23.650712]  ? ksize_uaf+0x5fe/0x6c0
[   23.650731]  ? kasan_complete_mode_report_info+0x64/0x200
[   23.650756]  ? ksize_uaf+0x5fe/0x6c0
[   23.650775]  kasan_report+0x141/0x180
[   23.650796]  ? ksize_uaf+0x5fe/0x6c0
[   23.650820]  __asan_report_load1_noabort+0x18/0x20
[   23.650843]  ksize_uaf+0x5fe/0x6c0
[   23.650862]  ? __pfx_ksize_uaf+0x10/0x10
[   23.650882]  ? __schedule+0x10cc/0x2b60
[   23.650907]  ? __pfx_read_tsc+0x10/0x10
[   23.650928]  ? ktime_get_ts64+0x86/0x230
[   23.650952]  kunit_try_run_case+0x1a5/0x480
[   23.650978]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.651000]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.651021]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.651045]  ? __kthread_parkme+0x82/0x180
[   23.651065]  ? preempt_count_sub+0x50/0x80
[   23.651088]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.651111]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.651134]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.651230]  kthread+0x337/0x6f0
[   23.651252]  ? trace_preempt_on+0x20/0xc0
[   23.651275]  ? __pfx_kthread+0x10/0x10
[   23.651295]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.651318]  ? calculate_sigpending+0x7b/0xa0
[   23.651341]  ? __pfx_kthread+0x10/0x10
[   23.651363]  ret_from_fork+0x116/0x1d0
[   23.651381]  ? __pfx_kthread+0x10/0x10
[   23.651401]  ret_from_fork_asm+0x1a/0x30
[   23.651431]  </TASK>
[   23.651442] 
[   23.659965] Allocated by task 245:
[   23.660094]  kasan_save_stack+0x45/0x70
[   23.660523]  kasan_save_track+0x18/0x40
[   23.660672]  kasan_save_alloc_info+0x3b/0x50
[   23.660874]  __kasan_kmalloc+0xb7/0xc0
[   23.661224]  __kmalloc_cache_noprof+0x189/0x420
[   23.661399]  ksize_uaf+0xaa/0x6c0
[   23.661581]  kunit_try_run_case+0x1a5/0x480
[   23.661755]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.661979]  kthread+0x337/0x6f0
[   23.662132]  ret_from_fork+0x116/0x1d0
[   23.662279]  ret_from_fork_asm+0x1a/0x30
[   23.662781] 
[   23.662861] Freed by task 245:
[   23.662984]  kasan_save_stack+0x45/0x70
[   23.663333]  kasan_save_track+0x18/0x40
[   23.663544]  kasan_save_free_info+0x3f/0x60
[   23.663845]  __kasan_slab_free+0x56/0x70
[   23.663984]  kfree+0x222/0x3f0
[   23.664202]  ksize_uaf+0x12c/0x6c0
[   23.664429]  kunit_try_run_case+0x1a5/0x480
[   23.664713]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.664913]  kthread+0x337/0x6f0
[   23.665072]  ret_from_fork+0x116/0x1d0
[   23.665239]  ret_from_fork_asm+0x1a/0x30
[   23.665660] 
[   23.665757] The buggy address belongs to the object at ffff888105540100
[   23.665757]  which belongs to the cache kmalloc-128 of size 128
[   23.666295] The buggy address is located 0 bytes inside of
[   23.666295]  freed 128-byte region [ffff888105540100, ffff888105540180)
[   23.666907] 
[   23.667004] The buggy address belongs to the physical page:
[   23.667331] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105540
[   23.667661] flags: 0x200000000000000(node=0|zone=2)
[   23.667860] page_type: f5(slab)
[   23.668005] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   23.668599] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.668866] page dumped because: kasan: bad access detected
[   23.669214] 
[   23.669357] Memory state around the buggy address:
[   23.669544]  ffff888105540000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.669981]  ffff888105540080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.670404] >ffff888105540100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.670770]                    ^
[   23.670981]  ffff888105540180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.671311]  ffff888105540200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.671776] ==================================================================
[   23.620053] ==================================================================
[   23.620554] BUG: KASAN: slab-use-after-free in ksize_uaf+0x19d/0x6c0
[   23.620765] Read of size 1 at addr ffff888105540100 by task kunit_try_catch/245
[   23.620980] 
[   23.621059] CPU: 1 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT(voluntary) 
[   23.621107] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.621119] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.621140] Call Trace:
[   23.621152]  <TASK>
[   23.621169]  dump_stack_lvl+0x73/0xb0
[   23.621224]  print_report+0xd1/0x650
[   23.621245]  ? __virt_addr_valid+0x1db/0x2d0
[   23.621267]  ? ksize_uaf+0x19d/0x6c0
[   23.621286]  ? kasan_complete_mode_report_info+0x64/0x200
[   23.621338]  ? ksize_uaf+0x19d/0x6c0
[   23.621359]  kasan_report+0x141/0x180
[   23.621379]  ? ksize_uaf+0x19d/0x6c0
[   23.621402]  ? ksize_uaf+0x19d/0x6c0
[   23.621421]  __kasan_check_byte+0x3d/0x50
[   23.621442]  ksize+0x20/0x60
[   23.621474]  ksize_uaf+0x19d/0x6c0
[   23.621494]  ? __pfx_ksize_uaf+0x10/0x10
[   23.621514]  ? __schedule+0x10cc/0x2b60
[   23.621539]  ? __pfx_read_tsc+0x10/0x10
[   23.621559]  ? ktime_get_ts64+0x86/0x230
[   23.621582]  kunit_try_run_case+0x1a5/0x480
[   23.621608]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.621631]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.621651]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.621676]  ? __kthread_parkme+0x82/0x180
[   23.621695]  ? preempt_count_sub+0x50/0x80
[   23.621718]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.621742]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.621764]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.621788]  kthread+0x337/0x6f0
[   23.621807]  ? trace_preempt_on+0x20/0xc0
[   23.621828]  ? __pfx_kthread+0x10/0x10
[   23.621853]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.621875]  ? calculate_sigpending+0x7b/0xa0
[   23.621899]  ? __pfx_kthread+0x10/0x10
[   23.621920]  ret_from_fork+0x116/0x1d0
[   23.621938]  ? __pfx_kthread+0x10/0x10
[   23.621958]  ret_from_fork_asm+0x1a/0x30
[   23.621989]  </TASK>
[   23.622001] 
[   23.633061] Allocated by task 245:
[   23.633210]  kasan_save_stack+0x45/0x70
[   23.633559]  kasan_save_track+0x18/0x40
[   23.633892]  kasan_save_alloc_info+0x3b/0x50
[   23.634277]  __kasan_kmalloc+0xb7/0xc0
[   23.634635]  __kmalloc_cache_noprof+0x189/0x420
[   23.635034]  ksize_uaf+0xaa/0x6c0
[   23.635356]  kunit_try_run_case+0x1a5/0x480
[   23.635741]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.636234]  kthread+0x337/0x6f0
[   23.636536]  ret_from_fork+0x116/0x1d0
[   23.636871]  ret_from_fork_asm+0x1a/0x30
[   23.637241] 
[   23.637390] Freed by task 245:
[   23.637663]  kasan_save_stack+0x45/0x70
[   23.638017]  kasan_save_track+0x18/0x40
[   23.638317]  kasan_save_free_info+0x3f/0x60
[   23.638465]  __kasan_slab_free+0x56/0x70
[   23.638593]  kfree+0x222/0x3f0
[   23.638701]  ksize_uaf+0x12c/0x6c0
[   23.638817]  kunit_try_run_case+0x1a5/0x480
[   23.638954]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.639119]  kthread+0x337/0x6f0
[   23.639361]  ret_from_fork+0x116/0x1d0
[   23.639688]  ret_from_fork_asm+0x1a/0x30
[   23.640025] 
[   23.640173] The buggy address belongs to the object at ffff888105540100
[   23.640173]  which belongs to the cache kmalloc-128 of size 128
[   23.641231] The buggy address is located 0 bytes inside of
[   23.641231]  freed 128-byte region [ffff888105540100, ffff888105540180)
[   23.642231] 
[   23.642400] The buggy address belongs to the physical page:
[   23.642873] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105540
[   23.643747] flags: 0x200000000000000(node=0|zone=2)
[   23.644232] page_type: f5(slab)
[   23.644535] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   23.644825] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.645052] page dumped because: kasan: bad access detected
[   23.645225] 
[   23.645288] Memory state around the buggy address:
[   23.645512]  ffff888105540000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.645816]  ffff888105540080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.646114] >ffff888105540100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.646399]                    ^
[   23.646780]  ffff888105540180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.647079]  ffff888105540200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.647708] ==================================================================
[   23.672400] ==================================================================
[   23.672712] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5e4/0x6c0
[   23.672973] Read of size 1 at addr ffff888105540178 by task kunit_try_catch/245
[   23.673632] 
[   23.673721] CPU: 1 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT(voluntary) 
[   23.673767] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.673779] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.673799] Call Trace:
[   23.673812]  <TASK>
[   23.673827]  dump_stack_lvl+0x73/0xb0
[   23.673867]  print_report+0xd1/0x650
[   23.673888]  ? __virt_addr_valid+0x1db/0x2d0
[   23.674061]  ? ksize_uaf+0x5e4/0x6c0
[   23.674084]  ? kasan_complete_mode_report_info+0x64/0x200
[   23.674109]  ? ksize_uaf+0x5e4/0x6c0
[   23.674131]  kasan_report+0x141/0x180
[   23.674153]  ? ksize_uaf+0x5e4/0x6c0
[   23.674178]  __asan_report_load1_noabort+0x18/0x20
[   23.674201]  ksize_uaf+0x5e4/0x6c0
[   23.674221]  ? __pfx_ksize_uaf+0x10/0x10
[   23.674241]  ? __schedule+0x10cc/0x2b60
[   23.674266]  ? __pfx_read_tsc+0x10/0x10
[   23.674286]  ? ktime_get_ts64+0x86/0x230
[   23.674309]  kunit_try_run_case+0x1a5/0x480
[   23.674333]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.674356]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.674375]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.674400]  ? __kthread_parkme+0x82/0x180
[   23.674420]  ? preempt_count_sub+0x50/0x80
[   23.674443]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.674481]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.674606]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.674630]  kthread+0x337/0x6f0
[   23.674649]  ? trace_preempt_on+0x20/0xc0
[   23.674671]  ? __pfx_kthread+0x10/0x10
[   23.674691]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.674714]  ? calculate_sigpending+0x7b/0xa0
[   23.674738]  ? __pfx_kthread+0x10/0x10
[   23.674759]  ret_from_fork+0x116/0x1d0
[   23.674777]  ? __pfx_kthread+0x10/0x10
[   23.674797]  ret_from_fork_asm+0x1a/0x30
[   23.674827]  </TASK>
[   23.674838] 
[   23.683099] Allocated by task 245:
[   23.683278]  kasan_save_stack+0x45/0x70
[   23.683837]  kasan_save_track+0x18/0x40
[   23.684016]  kasan_save_alloc_info+0x3b/0x50
[   23.684370]  __kasan_kmalloc+0xb7/0xc0
[   23.684558]  __kmalloc_cache_noprof+0x189/0x420
[   23.684904]  ksize_uaf+0xaa/0x6c0
[   23.685047]  kunit_try_run_case+0x1a5/0x480
[   23.685385]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.685606]  kthread+0x337/0x6f0
[   23.685874]  ret_from_fork+0x116/0x1d0
[   23.686049]  ret_from_fork_asm+0x1a/0x30
[   23.686341] 
[   23.686437] Freed by task 245:
[   23.686576]  kasan_save_stack+0x45/0x70
[   23.686774]  kasan_save_track+0x18/0x40
[   23.686955]  kasan_save_free_info+0x3f/0x60
[   23.687126]  __kasan_slab_free+0x56/0x70
[   23.687597]  kfree+0x222/0x3f0
[   23.687809]  ksize_uaf+0x12c/0x6c0
[   23.687951]  kunit_try_run_case+0x1a5/0x480
[   23.688156]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.688561]  kthread+0x337/0x6f0
[   23.688734]  ret_from_fork+0x116/0x1d0
[   23.688892]  ret_from_fork_asm+0x1a/0x30
[   23.689194] 
[   23.689340] The buggy address belongs to the object at ffff888105540100
[   23.689340]  which belongs to the cache kmalloc-128 of size 128
[   23.689831] The buggy address is located 120 bytes inside of
[   23.689831]  freed 128-byte region [ffff888105540100, ffff888105540180)
[   23.690307] 
[   23.690686] The buggy address belongs to the physical page:
[   23.690926] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105540
[   23.691367] flags: 0x200000000000000(node=0|zone=2)
[   23.691673] page_type: f5(slab)
[   23.691800] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   23.692127] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.692682] page dumped because: kasan: bad access detected
[   23.692909] 
[   23.693123] Memory state around the buggy address:
[   23.693342]  ffff888105540000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.693778]  ffff888105540080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.694086] >ffff888105540100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.694511]                                                                 ^
[   23.694806]  ffff888105540180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.695184]  ffff888105540200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.695584] ==================================================================