Hay
Date
July 8, 2025, 11:10 a.m.

Environment
qemu-arm64
qemu-x86_64

[   31.367364] ==================================================================
[   31.367423] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8
[   31.367471] Read of size 1 at addr fff00000c9a9c800 by task kunit_try_catch/227
[   31.367519] 
[   31.367572] CPU: 0 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   31.367667] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.367694] Hardware name: linux,dummy-virt (DT)
[   31.367755] Call trace:
[   31.367797]  show_stack+0x20/0x38 (C)
[   31.367844]  dump_stack_lvl+0x8c/0xd0
[   31.367907]  print_report+0x118/0x5d0
[   31.367954]  kasan_report+0xdc/0x128
[   31.368001]  __kasan_check_byte+0x54/0x70
[   31.368049]  ksize+0x30/0x88
[   31.368143]  ksize_uaf+0x168/0x5f8
[   31.368187]  kunit_try_run_case+0x170/0x3f0
[   31.368269]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.368333]  kthread+0x328/0x630
[   31.368383]  ret_from_fork+0x10/0x20
[   31.368430] 
[   31.368447] Allocated by task 227:
[   31.368483]  kasan_save_stack+0x3c/0x68
[   31.368534]  kasan_save_track+0x20/0x40
[   31.368600]  kasan_save_alloc_info+0x40/0x58
[   31.368673]  __kasan_kmalloc+0xd4/0xd8
[   31.368713]  __kmalloc_cache_noprof+0x16c/0x3c0
[   31.368780]  ksize_uaf+0xb8/0x5f8
[   31.368817]  kunit_try_run_case+0x170/0x3f0
[   31.369019]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.369071]  kthread+0x328/0x630
[   31.369115]  ret_from_fork+0x10/0x20
[   31.369151] 
[   31.369171] Freed by task 227:
[   31.369196]  kasan_save_stack+0x3c/0x68
[   31.369248]  kasan_save_track+0x20/0x40
[   31.369353]  kasan_save_free_info+0x4c/0x78
[   31.369436]  __kasan_slab_free+0x6c/0x98
[   31.369550]  kfree+0x214/0x3c8
[   31.369610]  ksize_uaf+0x11c/0x5f8
[   31.369669]  kunit_try_run_case+0x170/0x3f0
[   31.369762]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.369842]  kthread+0x328/0x630
[   31.369899]  ret_from_fork+0x10/0x20
[   31.370000] 
[   31.370050] The buggy address belongs to the object at fff00000c9a9c800
[   31.370050]  which belongs to the cache kmalloc-128 of size 128
[   31.370157] The buggy address is located 0 bytes inside of
[   31.370157]  freed 128-byte region [fff00000c9a9c800, fff00000c9a9c880)
[   31.370279] 
[   31.370343] The buggy address belongs to the physical page:
[   31.370419] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a9c
[   31.370510] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.370559] page_type: f5(slab)
[   31.370612] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   31.370831] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.370878] page dumped because: kasan: bad access detected
[   31.370910] 
[   31.370927] Memory state around the buggy address:
[   31.371012]  fff00000c9a9c700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.371078]  fff00000c9a9c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.371190] >fff00000c9a9c800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.371263]                    ^
[   31.371324]  fff00000c9a9c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.371391]  fff00000c9a9c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.371526] ==================================================================
[   31.371991] ==================================================================
[   31.372039] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8
[   31.372086] Read of size 1 at addr fff00000c9a9c800 by task kunit_try_catch/227
[   31.372133] 
[   31.372400] CPU: 0 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   31.372491] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.372559] Hardware name: linux,dummy-virt (DT)
[   31.372630] Call trace:
[   31.372724]  show_stack+0x20/0x38 (C)
[   31.372798]  dump_stack_lvl+0x8c/0xd0
[   31.372884]  print_report+0x118/0x5d0
[   31.372997]  kasan_report+0xdc/0x128
[   31.373076]  __asan_report_load1_noabort+0x20/0x30
[   31.373226]  ksize_uaf+0x598/0x5f8
[   31.373309]  kunit_try_run_case+0x170/0x3f0
[   31.373393]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.373456]  kthread+0x328/0x630
[   31.373499]  ret_from_fork+0x10/0x20
[   31.373677] 
[   31.373696] Allocated by task 227:
[   31.373724]  kasan_save_stack+0x3c/0x68
[   31.373767]  kasan_save_track+0x20/0x40
[   31.373806]  kasan_save_alloc_info+0x40/0x58
[   31.373844]  __kasan_kmalloc+0xd4/0xd8
[   31.373971]  __kmalloc_cache_noprof+0x16c/0x3c0
[   31.374069]  ksize_uaf+0xb8/0x5f8
[   31.374134]  kunit_try_run_case+0x170/0x3f0
[   31.374230]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.374310]  kthread+0x328/0x630
[   31.374350]  ret_from_fork+0x10/0x20
[   31.374387] 
[   31.374411] Freed by task 227:
[   31.374442]  kasan_save_stack+0x3c/0x68
[   31.374481]  kasan_save_track+0x20/0x40
[   31.374520]  kasan_save_free_info+0x4c/0x78
[   31.374567]  __kasan_slab_free+0x6c/0x98
[   31.374611]  kfree+0x214/0x3c8
[   31.374655]  ksize_uaf+0x11c/0x5f8
[   31.374700]  kunit_try_run_case+0x170/0x3f0
[   31.374750]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.374802]  kthread+0x328/0x630
[   31.374842]  ret_from_fork+0x10/0x20
[   31.374879] 
[   31.374897] The buggy address belongs to the object at fff00000c9a9c800
[   31.374897]  which belongs to the cache kmalloc-128 of size 128
[   31.374954] The buggy address is located 0 bytes inside of
[   31.374954]  freed 128-byte region [fff00000c9a9c800, fff00000c9a9c880)
[   31.375016] 
[   31.375035] The buggy address belongs to the physical page:
[   31.375066] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a9c
[   31.375116] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.375174] page_type: f5(slab)
[   31.375220] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   31.375269] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.375307] page dumped because: kasan: bad access detected
[   31.375339] 
[   31.375356] Memory state around the buggy address:
[   31.375387]  fff00000c9a9c700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.375428]  fff00000c9a9c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.375512] >fff00000c9a9c800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.375548]                    ^
[   31.375576]  fff00000c9a9c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.375618]  fff00000c9a9c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.375655] ==================================================================
[   31.376173] ==================================================================
[   31.376280] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8
[   31.376328] Read of size 1 at addr fff00000c9a9c878 by task kunit_try_catch/227
[   31.376385] 
[   31.376464] CPU: 0 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   31.376548] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.376594] Hardware name: linux,dummy-virt (DT)
[   31.376623] Call trace:
[   31.376646]  show_stack+0x20/0x38 (C)
[   31.376694]  dump_stack_lvl+0x8c/0xd0
[   31.376886]  print_report+0x118/0x5d0
[   31.377005]  kasan_report+0xdc/0x128
[   31.377098]  __asan_report_load1_noabort+0x20/0x30
[   31.377246]  ksize_uaf+0x544/0x5f8
[   31.377309]  kunit_try_run_case+0x170/0x3f0
[   31.377366]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.377444]  kthread+0x328/0x630
[   31.377579]  ret_from_fork+0x10/0x20
[   31.377657] 
[   31.377704] Allocated by task 227:
[   31.377732]  kasan_save_stack+0x3c/0x68
[   31.377813]  kasan_save_track+0x20/0x40
[   31.377885]  kasan_save_alloc_info+0x40/0x58
[   31.377924]  __kasan_kmalloc+0xd4/0xd8
[   31.377976]  __kmalloc_cache_noprof+0x16c/0x3c0
[   31.378050]  ksize_uaf+0xb8/0x5f8
[   31.378103]  kunit_try_run_case+0x170/0x3f0
[   31.378143]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.378189]  kthread+0x328/0x630
[   31.378266]  ret_from_fork+0x10/0x20
[   31.378305] 
[   31.378323] Freed by task 227:
[   31.378349]  kasan_save_stack+0x3c/0x68
[   31.378389]  kasan_save_track+0x20/0x40
[   31.378427]  kasan_save_free_info+0x4c/0x78
[   31.378464]  __kasan_slab_free+0x6c/0x98
[   31.378509]  kfree+0x214/0x3c8
[   31.378648]  ksize_uaf+0x11c/0x5f8
[   31.378720]  kunit_try_run_case+0x170/0x3f0
[   31.378787]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.378903]  kthread+0x328/0x630
[   31.378967]  ret_from_fork+0x10/0x20
[   31.379051] 
[   31.379109] The buggy address belongs to the object at fff00000c9a9c800
[   31.379109]  which belongs to the cache kmalloc-128 of size 128
[   31.379251] The buggy address is located 120 bytes inside of
[   31.379251]  freed 128-byte region [fff00000c9a9c800, fff00000c9a9c880)
[   31.379333] 
[   31.379443] The buggy address belongs to the physical page:
[   31.379490] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a9c
[   31.379560] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.379623] page_type: f5(slab)
[   31.379659] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   31.379843] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.379883] page dumped because: kasan: bad access detected
[   31.379915] 
[   31.379932] Memory state around the buggy address:
[   31.380005]  fff00000c9a9c700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.380130]  fff00000c9a9c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.380220] >fff00000c9a9c800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.380287]                                                                 ^
[   31.380346]  fff00000c9a9c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.380444]  fff00000c9a9c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.380492] ==================================================================

[   23.873988] ==================================================================
[   23.874390] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5e4/0x6c0
[   23.874667] Read of size 1 at addr ffff8881062af178 by task kunit_try_catch/244
[   23.874928] 
[   23.875380] CPU: 1 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) 
[   23.875435] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.875511] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.875533] Call Trace:
[   23.875553]  <TASK>
[   23.875572]  dump_stack_lvl+0x73/0xb0
[   23.875605]  print_report+0xd1/0x610
[   23.875627]  ? __virt_addr_valid+0x1db/0x2d0
[   23.875652]  ? ksize_uaf+0x5e4/0x6c0
[   23.875673]  ? kasan_complete_mode_report_info+0x64/0x200
[   23.875701]  ? ksize_uaf+0x5e4/0x6c0
[   23.875725]  kasan_report+0x141/0x180
[   23.875747]  ? ksize_uaf+0x5e4/0x6c0
[   23.875788]  __asan_report_load1_noabort+0x18/0x20
[   23.875815]  ksize_uaf+0x5e4/0x6c0
[   23.875919]  ? __pfx_ksize_uaf+0x10/0x10
[   23.875942]  ? __schedule+0x10cc/0x2b60
[   23.875971]  ? __pfx_read_tsc+0x10/0x10
[   23.875996]  ? ktime_get_ts64+0x86/0x230
[   23.876022]  kunit_try_run_case+0x1a5/0x480
[   23.876045]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.876065]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.876086]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.876115]  ? __kthread_parkme+0x82/0x180
[   23.876137]  ? preempt_count_sub+0x50/0x80
[   23.876161]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.876182]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.876209]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.876236]  kthread+0x337/0x6f0
[   23.876270]  ? trace_preempt_on+0x20/0xc0
[   23.876295]  ? __pfx_kthread+0x10/0x10
[   23.876317]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.876345]  ? calculate_sigpending+0x7b/0xa0
[   23.876372]  ? __pfx_kthread+0x10/0x10
[   23.876395]  ret_from_fork+0x116/0x1d0
[   23.876414]  ? __pfx_kthread+0x10/0x10
[   23.876437]  ret_from_fork_asm+0x1a/0x30
[   23.876471]  </TASK>
[   23.876482] 
[   23.885338] Allocated by task 244:
[   23.885716]  kasan_save_stack+0x45/0x70
[   23.886224]  kasan_save_track+0x18/0x40
[   23.886584]  kasan_save_alloc_info+0x3b/0x50
[   23.886966]  __kasan_kmalloc+0xb7/0xc0
[   23.887418]  __kmalloc_cache_noprof+0x189/0x420
[   23.887652]  ksize_uaf+0xaa/0x6c0
[   23.887813]  kunit_try_run_case+0x1a5/0x480
[   23.888229]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.888658]  kthread+0x337/0x6f0
[   23.888988]  ret_from_fork+0x116/0x1d0
[   23.889178]  ret_from_fork_asm+0x1a/0x30
[   23.889372] 
[   23.889459] Freed by task 244:
[   23.889601]  kasan_save_stack+0x45/0x70
[   23.890094]  kasan_save_track+0x18/0x40
[   23.890308]  kasan_save_free_info+0x3f/0x60
[   23.890721]  __kasan_slab_free+0x56/0x70
[   23.891208]  kfree+0x222/0x3f0
[   23.891518]  ksize_uaf+0x12c/0x6c0
[   23.891833]  kunit_try_run_case+0x1a5/0x480
[   23.892235]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.892626]  kthread+0x337/0x6f0
[   23.892945]  ret_from_fork+0x116/0x1d0
[   23.893149]  ret_from_fork_asm+0x1a/0x30
[   23.893337] 
[   23.893424] The buggy address belongs to the object at ffff8881062af100
[   23.893424]  which belongs to the cache kmalloc-128 of size 128
[   23.894251] The buggy address is located 120 bytes inside of
[   23.894251]  freed 128-byte region [ffff8881062af100, ffff8881062af180)
[   23.895304] 
[   23.895425] The buggy address belongs to the physical page:
[   23.896034] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1062af
[   23.896454] flags: 0x200000000000000(node=0|zone=2)
[   23.896667] page_type: f5(slab)
[   23.897108] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   23.897573] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.898085] page dumped because: kasan: bad access detected
[   23.898676] 
[   23.898949] Memory state around the buggy address:
[   23.899183]  ffff8881062af000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.899480]  ffff8881062af080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.899979] >ffff8881062af100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.900424]                                                                 ^
[   23.901007]  ffff8881062af180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.901696]  ffff8881062af200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.902387] ==================================================================
[   23.820734] ==================================================================
[   23.821216] BUG: KASAN: slab-use-after-free in ksize_uaf+0x19d/0x6c0
[   23.821580] Read of size 1 at addr ffff8881062af100 by task kunit_try_catch/244
[   23.821881] 
[   23.822110] CPU: 1 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) 
[   23.822171] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.822184] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.822207] Call Trace:
[   23.822222]  <TASK>
[   23.822255]  dump_stack_lvl+0x73/0xb0
[   23.822327]  print_report+0xd1/0x610
[   23.822352]  ? __virt_addr_valid+0x1db/0x2d0
[   23.822378]  ? ksize_uaf+0x19d/0x6c0
[   23.822399]  ? kasan_complete_mode_report_info+0x64/0x200
[   23.822429]  ? ksize_uaf+0x19d/0x6c0
[   23.822472]  kasan_report+0x141/0x180
[   23.822495]  ? ksize_uaf+0x19d/0x6c0
[   23.822521]  ? ksize_uaf+0x19d/0x6c0
[   23.822543]  __kasan_check_byte+0x3d/0x50
[   23.822566]  ksize+0x20/0x60
[   23.822595]  ksize_uaf+0x19d/0x6c0
[   23.822617]  ? __pfx_ksize_uaf+0x10/0x10
[   23.822639]  ? __schedule+0x10cc/0x2b60
[   23.822669]  ? __pfx_read_tsc+0x10/0x10
[   23.822712]  ? ktime_get_ts64+0x86/0x230
[   23.822740]  kunit_try_run_case+0x1a5/0x480
[   23.822934]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.822957]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.822979]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.823008]  ? __kthread_parkme+0x82/0x180
[   23.823031]  ? preempt_count_sub+0x50/0x80
[   23.823055]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.823078]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.823105]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.823132]  kthread+0x337/0x6f0
[   23.823153]  ? trace_preempt_on+0x20/0xc0
[   23.823179]  ? __pfx_kthread+0x10/0x10
[   23.823202]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.823229]  ? calculate_sigpending+0x7b/0xa0
[   23.823270]  ? __pfx_kthread+0x10/0x10
[   23.823293]  ret_from_fork+0x116/0x1d0
[   23.823313]  ? __pfx_kthread+0x10/0x10
[   23.823335]  ret_from_fork_asm+0x1a/0x30
[   23.823371]  </TASK>
[   23.823383] 
[   23.831543] Allocated by task 244:
[   23.831743]  kasan_save_stack+0x45/0x70
[   23.832010]  kasan_save_track+0x18/0x40
[   23.832174]  kasan_save_alloc_info+0x3b/0x50
[   23.832414]  __kasan_kmalloc+0xb7/0xc0
[   23.832595]  __kmalloc_cache_noprof+0x189/0x420
[   23.832840]  ksize_uaf+0xaa/0x6c0
[   23.833085]  kunit_try_run_case+0x1a5/0x480
[   23.833417]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.833660]  kthread+0x337/0x6f0
[   23.834067]  ret_from_fork+0x116/0x1d0
[   23.834197]  ret_from_fork_asm+0x1a/0x30
[   23.834341] 
[   23.834426] Freed by task 244:
[   23.834616]  kasan_save_stack+0x45/0x70
[   23.835060]  kasan_save_track+0x18/0x40
[   23.835272]  kasan_save_free_info+0x3f/0x60
[   23.835478]  __kasan_slab_free+0x56/0x70
[   23.835633]  kfree+0x222/0x3f0
[   23.835742]  ksize_uaf+0x12c/0x6c0
[   23.836538]  kunit_try_run_case+0x1a5/0x480
[   23.837135]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.837894]  kthread+0x337/0x6f0
[   23.838260]  ret_from_fork+0x116/0x1d0
[   23.838396]  ret_from_fork_asm+0x1a/0x30
[   23.838533] 
[   23.838599] The buggy address belongs to the object at ffff8881062af100
[   23.838599]  which belongs to the cache kmalloc-128 of size 128
[   23.839356] The buggy address is located 0 bytes inside of
[   23.839356]  freed 128-byte region [ffff8881062af100, ffff8881062af180)
[   23.840434] 
[   23.840528] The buggy address belongs to the physical page:
[   23.840712] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1062af
[   23.841253] flags: 0x200000000000000(node=0|zone=2)
[   23.841486] page_type: f5(slab)
[   23.841769] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   23.842198] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.842519] page dumped because: kasan: bad access detected
[   23.842742] 
[   23.843131] Memory state around the buggy address:
[   23.843428]  ffff8881062af000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.843673]  ffff8881062af080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.844355] >ffff8881062af100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.844632]                    ^
[   23.844775]  ffff8881062af180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.845210]  ffff8881062af200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.845505] ==================================================================
[   23.846054] ==================================================================
[   23.846806] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5fe/0x6c0
[   23.847074] Read of size 1 at addr ffff8881062af100 by task kunit_try_catch/244
[   23.847389] 
[   23.847738] CPU: 1 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) 
[   23.847821] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.847834] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.847856] Call Trace:
[   23.847871]  <TASK>
[   23.847889]  dump_stack_lvl+0x73/0xb0
[   23.847921]  print_report+0xd1/0x610
[   23.847945]  ? __virt_addr_valid+0x1db/0x2d0
[   23.847970]  ? ksize_uaf+0x5fe/0x6c0
[   23.847991]  ? kasan_complete_mode_report_info+0x64/0x200
[   23.848020]  ? ksize_uaf+0x5fe/0x6c0
[   23.848042]  kasan_report+0x141/0x180
[   23.848229]  ? ksize_uaf+0x5fe/0x6c0
[   23.848269]  __asan_report_load1_noabort+0x18/0x20
[   23.848296]  ksize_uaf+0x5fe/0x6c0
[   23.848318]  ? __pfx_ksize_uaf+0x10/0x10
[   23.848340]  ? __schedule+0x10cc/0x2b60
[   23.848370]  ? __pfx_read_tsc+0x10/0x10
[   23.848396]  ? ktime_get_ts64+0x86/0x230
[   23.848422]  kunit_try_run_case+0x1a5/0x480
[   23.848445]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.848465]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.848487]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.848516]  ? __kthread_parkme+0x82/0x180
[   23.848537]  ? preempt_count_sub+0x50/0x80
[   23.848562]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.848584]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.848610]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.848637]  kthread+0x337/0x6f0
[   23.848658]  ? trace_preempt_on+0x20/0xc0
[   23.848683]  ? __pfx_kthread+0x10/0x10
[   23.848705]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.848733]  ? calculate_sigpending+0x7b/0xa0
[   23.848839]  ? __pfx_kthread+0x10/0x10
[   23.848866]  ret_from_fork+0x116/0x1d0
[   23.848887]  ? __pfx_kthread+0x10/0x10
[   23.848909]  ret_from_fork_asm+0x1a/0x30
[   23.848943]  </TASK>
[   23.848955] 
[   23.858387] Allocated by task 244:
[   23.858590]  kasan_save_stack+0x45/0x70
[   23.858778]  kasan_save_track+0x18/0x40
[   23.858903]  kasan_save_alloc_info+0x3b/0x50
[   23.859277]  __kasan_kmalloc+0xb7/0xc0
[   23.859488]  __kmalloc_cache_noprof+0x189/0x420
[   23.859837]  ksize_uaf+0xaa/0x6c0
[   23.860054]  kunit_try_run_case+0x1a5/0x480
[   23.860433]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.861116]  kthread+0x337/0x6f0
[   23.861381]  ret_from_fork+0x116/0x1d0
[   23.861569]  ret_from_fork_asm+0x1a/0x30
[   23.862204] 
[   23.862386] Freed by task 244:
[   23.862535]  kasan_save_stack+0x45/0x70
[   23.862737]  kasan_save_track+0x18/0x40
[   23.863372]  kasan_save_free_info+0x3f/0x60
[   23.863590]  __kasan_slab_free+0x56/0x70
[   23.863726]  kfree+0x222/0x3f0
[   23.863932]  ksize_uaf+0x12c/0x6c0
[   23.864093]  kunit_try_run_case+0x1a5/0x480
[   23.864482]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.864703]  kthread+0x337/0x6f0
[   23.865329]  ret_from_fork+0x116/0x1d0
[   23.865516]  ret_from_fork_asm+0x1a/0x30
[   23.865910] 
[   23.866182] The buggy address belongs to the object at ffff8881062af100
[   23.866182]  which belongs to the cache kmalloc-128 of size 128
[   23.866851] The buggy address is located 0 bytes inside of
[   23.866851]  freed 128-byte region [ffff8881062af100, ffff8881062af180)
[   23.867694] 
[   23.867970] The buggy address belongs to the physical page:
[   23.868177] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1062af
[   23.868545] flags: 0x200000000000000(node=0|zone=2)
[   23.868783] page_type: f5(slab)
[   23.869300] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   23.869790] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.870207] page dumped because: kasan: bad access detected
[   23.870648] 
[   23.870752] Memory state around the buggy address:
[   23.871212]  ffff8881062af000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.871604]  ffff8881062af080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.872113] >ffff8881062af100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.872422]                    ^
[   23.872565]  ffff8881062af180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.873052]  ffff8881062af200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.873360] ==================================================================