Hay
Date
July 10, 2025, 9:07 a.m.

Environment
qemu-arm64
qemu-x86_64

[   29.711176] ==================================================================
[   29.711227] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8
[   29.711272] Read of size 1 at addr fff00000c9af0500 by task kunit_try_catch/227
[   29.711321] 
[   29.711380] CPU: 0 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   29.711469] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.711494] Hardware name: linux,dummy-virt (DT)
[   29.711530] Call trace:
[   29.711551]  show_stack+0x20/0x38 (C)
[   29.711597]  dump_stack_lvl+0x8c/0xd0
[   29.711640]  print_report+0x118/0x5d0
[   29.711683]  kasan_report+0xdc/0x128
[   29.711725]  __asan_report_load1_noabort+0x20/0x30
[   29.711771]  ksize_uaf+0x598/0x5f8
[   29.711814]  kunit_try_run_case+0x170/0x3f0
[   29.711862]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.711914]  kthread+0x328/0x630
[   29.711967]  ret_from_fork+0x10/0x20
[   29.712014] 
[   29.712031] Allocated by task 227:
[   29.712057]  kasan_save_stack+0x3c/0x68
[   29.712098]  kasan_save_track+0x20/0x40
[   29.712147]  kasan_save_alloc_info+0x40/0x58
[   29.712185]  __kasan_kmalloc+0xd4/0xd8
[   29.712271]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.712372]  ksize_uaf+0xb8/0x5f8
[   29.712406]  kunit_try_run_case+0x170/0x3f0
[   29.712643]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.712692]  kthread+0x328/0x630
[   29.712725]  ret_from_fork+0x10/0x20
[   29.712761] 
[   29.712780] Freed by task 227:
[   29.712806]  kasan_save_stack+0x3c/0x68
[   29.712844]  kasan_save_track+0x20/0x40
[   29.712882]  kasan_save_free_info+0x4c/0x78
[   29.712919]  __kasan_slab_free+0x6c/0x98
[   29.712956]  kfree+0x214/0x3c8
[   29.712990]  ksize_uaf+0x11c/0x5f8
[   29.713034]  kunit_try_run_case+0x170/0x3f0
[   29.713223]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.713424]  kthread+0x328/0x630
[   29.713536]  ret_from_fork+0x10/0x20
[   29.713572] 
[   29.713660] The buggy address belongs to the object at fff00000c9af0500
[   29.713660]  which belongs to the cache kmalloc-128 of size 128
[   29.713922] The buggy address is located 0 bytes inside of
[   29.713922]  freed 128-byte region [fff00000c9af0500, fff00000c9af0580)
[   29.715250] 
[   29.715281] The buggy address belongs to the physical page:
[   29.715315] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109af0
[   29.715367] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.715416] page_type: f5(slab)
[   29.715454] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   29.715508] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.715550] page dumped because: kasan: bad access detected
[   29.715581] 
[   29.715600] Memory state around the buggy address:
[   29.715630]  fff00000c9af0400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.715674]  fff00000c9af0480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.715718] >fff00000c9af0500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.715758]                    ^
[   29.715783]  fff00000c9af0580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.715826]  fff00000c9af0600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.715866] ==================================================================
[   29.706215] ==================================================================
[   29.706272] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8
[   29.706318] Read of size 1 at addr fff00000c9af0500 by task kunit_try_catch/227
[   29.706373] 
[   29.706401] CPU: 0 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   29.706617] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.706694] Hardware name: linux,dummy-virt (DT)
[   29.706861] Call trace:
[   29.706918]  show_stack+0x20/0x38 (C)
[   29.706985]  dump_stack_lvl+0x8c/0xd0
[   29.707029]  print_report+0x118/0x5d0
[   29.707124]  kasan_report+0xdc/0x128
[   29.707179]  __kasan_check_byte+0x54/0x70
[   29.707227]  ksize+0x30/0x88
[   29.707269]  ksize_uaf+0x168/0x5f8
[   29.707313]  kunit_try_run_case+0x170/0x3f0
[   29.707359]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.707412]  kthread+0x328/0x630
[   29.707454]  ret_from_fork+0x10/0x20
[   29.707504] 
[   29.707522] Allocated by task 227:
[   29.707550]  kasan_save_stack+0x3c/0x68
[   29.707590]  kasan_save_track+0x20/0x40
[   29.707640]  kasan_save_alloc_info+0x40/0x58
[   29.707678]  __kasan_kmalloc+0xd4/0xd8
[   29.707716]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.707755]  ksize_uaf+0xb8/0x5f8
[   29.707792]  kunit_try_run_case+0x170/0x3f0
[   29.707830]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.707882]  kthread+0x328/0x630
[   29.708014]  ret_from_fork+0x10/0x20
[   29.708096] 
[   29.708153] Freed by task 227:
[   29.708181]  kasan_save_stack+0x3c/0x68
[   29.708325]  kasan_save_track+0x20/0x40
[   29.708364]  kasan_save_free_info+0x4c/0x78
[   29.708402]  __kasan_slab_free+0x6c/0x98
[   29.708439]  kfree+0x214/0x3c8
[   29.708472]  ksize_uaf+0x11c/0x5f8
[   29.708547]  kunit_try_run_case+0x170/0x3f0
[   29.708720]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.708794]  kthread+0x328/0x630
[   29.708827]  ret_from_fork+0x10/0x20
[   29.708903] 
[   29.708992] The buggy address belongs to the object at fff00000c9af0500
[   29.708992]  which belongs to the cache kmalloc-128 of size 128
[   29.709053] The buggy address is located 0 bytes inside of
[   29.709053]  freed 128-byte region [fff00000c9af0500, fff00000c9af0580)
[   29.709550] 
[   29.709709] The buggy address belongs to the physical page:
[   29.709745] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109af0
[   29.709800] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.709848] page_type: f5(slab)
[   29.709886] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   29.709938] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.709980] page dumped because: kasan: bad access detected
[   29.710012] 
[   29.710031] Memory state around the buggy address:
[   29.710062]  fff00000c9af0400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.710107]  fff00000c9af0480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.710169] >fff00000c9af0500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.710289]                    ^
[   29.710349]  fff00000c9af0580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.710417]  fff00000c9af0600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.710476] ==================================================================
[   29.716100] ==================================================================
[   29.716161] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8
[   29.716216] Read of size 1 at addr fff00000c9af0578 by task kunit_try_catch/227
[   29.716450] 
[   29.716478] CPU: 0 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT 
[   29.716564] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.716598] Hardware name: linux,dummy-virt (DT)
[   29.716735] Call trace:
[   29.716791]  show_stack+0x20/0x38 (C)
[   29.716885]  dump_stack_lvl+0x8c/0xd0
[   29.716994]  print_report+0x118/0x5d0
[   29.717138]  kasan_report+0xdc/0x128
[   29.717186]  __asan_report_load1_noabort+0x20/0x30
[   29.717234]  ksize_uaf+0x544/0x5f8
[   29.717277]  kunit_try_run_case+0x170/0x3f0
[   29.717325]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.717379]  kthread+0x328/0x630
[   29.717420]  ret_from_fork+0x10/0x20
[   29.717464] 
[   29.717482] Allocated by task 227:
[   29.717507]  kasan_save_stack+0x3c/0x68
[   29.717549]  kasan_save_track+0x20/0x40
[   29.717588]  kasan_save_alloc_info+0x40/0x58
[   29.717626]  __kasan_kmalloc+0xd4/0xd8
[   29.717664]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.717705]  ksize_uaf+0xb8/0x5f8
[   29.717738]  kunit_try_run_case+0x170/0x3f0
[   29.717778]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.717824]  kthread+0x328/0x630
[   29.717856]  ret_from_fork+0x10/0x20
[   29.717892] 
[   29.717910] Freed by task 227:
[   29.717935]  kasan_save_stack+0x3c/0x68
[   29.717973]  kasan_save_track+0x20/0x40
[   29.718017]  kasan_save_free_info+0x4c/0x78
[   29.718762]  __kasan_slab_free+0x6c/0x98
[   29.718957]  kfree+0x214/0x3c8
[   29.719022]  ksize_uaf+0x11c/0x5f8
[   29.719075]  kunit_try_run_case+0x170/0x3f0
[   29.719115]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.719172]  kthread+0x328/0x630
[   29.719203]  ret_from_fork+0x10/0x20
[   29.719239] 
[   29.719258] The buggy address belongs to the object at fff00000c9af0500
[   29.719258]  which belongs to the cache kmalloc-128 of size 128
[   29.719343] The buggy address is located 120 bytes inside of
[   29.719343]  freed 128-byte region [fff00000c9af0500, fff00000c9af0580)
[   29.719409] 
[   29.719428] The buggy address belongs to the physical page:
[   29.719458] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109af0
[   29.719514] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.719562] page_type: f5(slab)
[   29.719596] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   29.719771] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.719872] page dumped because: kasan: bad access detected
[   29.719905] 
[   29.719922] Memory state around the buggy address:
[   29.719971]  fff00000c9af0400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.720016]  fff00000c9af0480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.720060] >fff00000c9af0500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.720099]                                                                 ^
[   29.720151]  fff00000c9af0580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.720207]  fff00000c9af0600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.720248] ==================================================================

[   25.589466] ==================================================================
[   25.590155] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5e4/0x6c0
[   25.590969] Read of size 1 at addr ffff88810583a778 by task kunit_try_catch/244
[   25.591622] 
[   25.591807] CPU: 0 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT(voluntary) 
[   25.591859] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.591871] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.591892] Call Trace:
[   25.591905]  <TASK>
[   25.591923]  dump_stack_lvl+0x73/0xb0
[   25.591965]  print_report+0xd1/0x610
[   25.591987]  ? __virt_addr_valid+0x1db/0x2d0
[   25.592013]  ? ksize_uaf+0x5e4/0x6c0
[   25.592033]  ? kasan_complete_mode_report_info+0x64/0x200
[   25.592058]  ? ksize_uaf+0x5e4/0x6c0
[   25.592078]  kasan_report+0x141/0x180
[   25.592099]  ? ksize_uaf+0x5e4/0x6c0
[   25.592124]  __asan_report_load1_noabort+0x18/0x20
[   25.592147]  ksize_uaf+0x5e4/0x6c0
[   25.592167]  ? __pfx_ksize_uaf+0x10/0x10
[   25.592189]  ? __schedule+0x10cc/0x2b60
[   25.592211]  ? __pfx_read_tsc+0x10/0x10
[   25.592235]  ? ktime_get_ts64+0x86/0x230
[   25.592261]  kunit_try_run_case+0x1a5/0x480
[   25.592284]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.592304]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.592326]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.592349]  ? __kthread_parkme+0x82/0x180
[   25.592370]  ? preempt_count_sub+0x50/0x80
[   25.592393]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.592414]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.592439]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.592463]  kthread+0x337/0x6f0
[   25.592484]  ? trace_preempt_on+0x20/0xc0
[   25.592570]  ? __pfx_kthread+0x10/0x10
[   25.592591]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.592613]  ? calculate_sigpending+0x7b/0xa0
[   25.592636]  ? __pfx_kthread+0x10/0x10
[   25.592658]  ret_from_fork+0x116/0x1d0
[   25.592677]  ? __pfx_kthread+0x10/0x10
[   25.592709]  ret_from_fork_asm+0x1a/0x30
[   25.592740]  </TASK>
[   25.592752] 
[   25.604410] Allocated by task 244:
[   25.604691]  kasan_save_stack+0x45/0x70
[   25.605035]  kasan_save_track+0x18/0x40
[   25.605375]  kasan_save_alloc_info+0x3b/0x50
[   25.605641]  __kasan_kmalloc+0xb7/0xc0
[   25.605823]  __kmalloc_cache_noprof+0x189/0x420
[   25.606230]  ksize_uaf+0xaa/0x6c0
[   25.606542]  kunit_try_run_case+0x1a5/0x480
[   25.607053]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.607282]  kthread+0x337/0x6f0
[   25.607400]  ret_from_fork+0x116/0x1d0
[   25.607605]  ret_from_fork_asm+0x1a/0x30
[   25.608048] 
[   25.608226] Freed by task 244:
[   25.608502]  kasan_save_stack+0x45/0x70
[   25.608931]  kasan_save_track+0x18/0x40
[   25.609288]  kasan_save_free_info+0x3f/0x60
[   25.609677]  __kasan_slab_free+0x56/0x70
[   25.609909]  kfree+0x222/0x3f0
[   25.610028]  ksize_uaf+0x12c/0x6c0
[   25.610149]  kunit_try_run_case+0x1a5/0x480
[   25.610289]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.610460]  kthread+0x337/0x6f0
[   25.610771]  ret_from_fork+0x116/0x1d0
[   25.611140]  ret_from_fork_asm+0x1a/0x30
[   25.611662] 
[   25.611863] The buggy address belongs to the object at ffff88810583a700
[   25.611863]  which belongs to the cache kmalloc-128 of size 128
[   25.613087] The buggy address is located 120 bytes inside of
[   25.613087]  freed 128-byte region [ffff88810583a700, ffff88810583a780)
[   25.614179] 
[   25.614336] The buggy address belongs to the physical page:
[   25.614978] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10583a
[   25.615338] flags: 0x200000000000000(node=0|zone=2)
[   25.615523] page_type: f5(slab)
[   25.615884] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   25.616549] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.617259] page dumped because: kasan: bad access detected
[   25.617683] 
[   25.617762] Memory state around the buggy address:
[   25.618227]  ffff88810583a600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.618676]  ffff88810583a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.619090] >ffff88810583a700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.619736]                                                                 ^
[   25.620408]  ffff88810583a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.621160]  ffff88810583a800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.621561] ==================================================================
[   25.556857] ==================================================================
[   25.557888] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5fe/0x6c0
[   25.558664] Read of size 1 at addr ffff88810583a700 by task kunit_try_catch/244
[   25.559421] 
[   25.559541] CPU: 0 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT(voluntary) 
[   25.559593] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.559605] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.559629] Call Trace:
[   25.559648]  <TASK>
[   25.559667]  dump_stack_lvl+0x73/0xb0
[   25.559712]  print_report+0xd1/0x610
[   25.559734]  ? __virt_addr_valid+0x1db/0x2d0
[   25.559758]  ? ksize_uaf+0x5fe/0x6c0
[   25.559778]  ? kasan_complete_mode_report_info+0x64/0x200
[   25.559804]  ? ksize_uaf+0x5fe/0x6c0
[   25.559824]  kasan_report+0x141/0x180
[   25.559853]  ? ksize_uaf+0x5fe/0x6c0
[   25.559877]  __asan_report_load1_noabort+0x18/0x20
[   25.559953]  ksize_uaf+0x5fe/0x6c0
[   25.559973]  ? __pfx_ksize_uaf+0x10/0x10
[   25.559995]  ? __schedule+0x10cc/0x2b60
[   25.560018]  ? __pfx_read_tsc+0x10/0x10
[   25.560041]  ? ktime_get_ts64+0x86/0x230
[   25.560069]  kunit_try_run_case+0x1a5/0x480
[   25.560092]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.560111]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.560134]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.560157]  ? __kthread_parkme+0x82/0x180
[   25.560177]  ? preempt_count_sub+0x50/0x80
[   25.560200]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.560223]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.560247]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.560272]  kthread+0x337/0x6f0
[   25.560293]  ? trace_preempt_on+0x20/0xc0
[   25.560315]  ? __pfx_kthread+0x10/0x10
[   25.560337]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.560358]  ? calculate_sigpending+0x7b/0xa0
[   25.560382]  ? __pfx_kthread+0x10/0x10
[   25.560403]  ret_from_fork+0x116/0x1d0
[   25.560422]  ? __pfx_kthread+0x10/0x10
[   25.560443]  ret_from_fork_asm+0x1a/0x30
[   25.560473]  </TASK>
[   25.560485] 
[   25.572739] Allocated by task 244:
[   25.573124]  kasan_save_stack+0x45/0x70
[   25.573464]  kasan_save_track+0x18/0x40
[   25.573916]  kasan_save_alloc_info+0x3b/0x50
[   25.574176]  __kasan_kmalloc+0xb7/0xc0
[   25.574305]  __kmalloc_cache_noprof+0x189/0x420
[   25.574458]  ksize_uaf+0xaa/0x6c0
[   25.574861]  kunit_try_run_case+0x1a5/0x480
[   25.575243]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.575806]  kthread+0x337/0x6f0
[   25.576137]  ret_from_fork+0x116/0x1d0
[   25.576484]  ret_from_fork_asm+0x1a/0x30
[   25.576857] 
[   25.576963] Freed by task 244:
[   25.577123]  kasan_save_stack+0x45/0x70
[   25.577260]  kasan_save_track+0x18/0x40
[   25.577390]  kasan_save_free_info+0x3f/0x60
[   25.577554]  __kasan_slab_free+0x56/0x70
[   25.577905]  kfree+0x222/0x3f0
[   25.578246]  ksize_uaf+0x12c/0x6c0
[   25.578596]  kunit_try_run_case+0x1a5/0x480
[   25.579172]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.579902]  kthread+0x337/0x6f0
[   25.580210]  ret_from_fork+0x116/0x1d0
[   25.580540]  ret_from_fork_asm+0x1a/0x30
[   25.580980] 
[   25.581136] The buggy address belongs to the object at ffff88810583a700
[   25.581136]  which belongs to the cache kmalloc-128 of size 128
[   25.581506] The buggy address is located 0 bytes inside of
[   25.581506]  freed 128-byte region [ffff88810583a700, ffff88810583a780)
[   25.582152] 
[   25.582313] The buggy address belongs to the physical page:
[   25.582947] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10583a
[   25.583463] flags: 0x200000000000000(node=0|zone=2)
[   25.583640] page_type: f5(slab)
[   25.583775] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   25.584477] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.585230] page dumped because: kasan: bad access detected
[   25.585555] 
[   25.585622] Memory state around the buggy address:
[   25.585785]  ffff88810583a600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.586409]  ffff88810583a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.587142] >ffff88810583a700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.587929]                    ^
[   25.588094]  ffff88810583a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.588307]  ffff88810583a800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.588534] ==================================================================
[   25.523063] ==================================================================
[   25.524305] BUG: KASAN: slab-use-after-free in ksize_uaf+0x19d/0x6c0
[   25.524640] Read of size 1 at addr ffff88810583a700 by task kunit_try_catch/244
[   25.525438] 
[   25.525684] CPU: 0 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250710 #1 PREEMPT(voluntary) 
[   25.525749] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.525761] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.525843] Call Trace:
[   25.525858]  <TASK>
[   25.525878]  dump_stack_lvl+0x73/0xb0
[   25.525945]  print_report+0xd1/0x610
[   25.525971]  ? __virt_addr_valid+0x1db/0x2d0
[   25.525996]  ? ksize_uaf+0x19d/0x6c0
[   25.526016]  ? kasan_complete_mode_report_info+0x64/0x200
[   25.526041]  ? ksize_uaf+0x19d/0x6c0
[   25.526061]  kasan_report+0x141/0x180
[   25.526082]  ? ksize_uaf+0x19d/0x6c0
[   25.526105]  ? ksize_uaf+0x19d/0x6c0
[   25.526125]  __kasan_check_byte+0x3d/0x50
[   25.526146]  ksize+0x20/0x60
[   25.526170]  ksize_uaf+0x19d/0x6c0
[   25.526191]  ? __pfx_ksize_uaf+0x10/0x10
[   25.526211]  ? __schedule+0x10cc/0x2b60
[   25.526234]  ? __pfx_read_tsc+0x10/0x10
[   25.526256]  ? ktime_get_ts64+0x86/0x230
[   25.526282]  kunit_try_run_case+0x1a5/0x480
[   25.526304]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.526324]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.526346]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.526368]  ? __kthread_parkme+0x82/0x180
[   25.526389]  ? preempt_count_sub+0x50/0x80
[   25.526412]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.526434]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.526457]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.526482]  kthread+0x337/0x6f0
[   25.526516]  ? trace_preempt_on+0x20/0xc0
[   25.526539]  ? __pfx_kthread+0x10/0x10
[   25.526559]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.526580]  ? calculate_sigpending+0x7b/0xa0
[   25.526604]  ? __pfx_kthread+0x10/0x10
[   25.526625]  ret_from_fork+0x116/0x1d0
[   25.526644]  ? __pfx_kthread+0x10/0x10
[   25.526664]  ret_from_fork_asm+0x1a/0x30
[   25.526694]  </TASK>
[   25.526720] 
[   25.538727] Allocated by task 244:
[   25.539133]  kasan_save_stack+0x45/0x70
[   25.539513]  kasan_save_track+0x18/0x40
[   25.539984]  kasan_save_alloc_info+0x3b/0x50
[   25.540393]  __kasan_kmalloc+0xb7/0xc0
[   25.540826]  __kmalloc_cache_noprof+0x189/0x420
[   25.541117]  ksize_uaf+0xaa/0x6c0
[   25.541238]  kunit_try_run_case+0x1a5/0x480
[   25.541377]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.541688]  kthread+0x337/0x6f0
[   25.542011]  ret_from_fork+0x116/0x1d0
[   25.542478]  ret_from_fork_asm+0x1a/0x30
[   25.542929] 
[   25.543115] Freed by task 244:
[   25.543415]  kasan_save_stack+0x45/0x70
[   25.543859]  kasan_save_track+0x18/0x40
[   25.544234]  kasan_save_free_info+0x3f/0x60
[   25.544416]  __kasan_slab_free+0x56/0x70
[   25.544887]  kfree+0x222/0x3f0
[   25.545201]  ksize_uaf+0x12c/0x6c0
[   25.545387]  kunit_try_run_case+0x1a5/0x480
[   25.545711]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.546335]  kthread+0x337/0x6f0
[   25.546586]  ret_from_fork+0x116/0x1d0
[   25.546818]  ret_from_fork_asm+0x1a/0x30
[   25.547261] 
[   25.547415] The buggy address belongs to the object at ffff88810583a700
[   25.547415]  which belongs to the cache kmalloc-128 of size 128
[   25.548306] The buggy address is located 0 bytes inside of
[   25.548306]  freed 128-byte region [ffff88810583a700, ffff88810583a780)
[   25.549183] 
[   25.549260] The buggy address belongs to the physical page:
[   25.549430] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10583a
[   25.550094] flags: 0x200000000000000(node=0|zone=2)
[   25.550551] page_type: f5(slab)
[   25.550926] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   25.551683] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.552105] page dumped because: kasan: bad access detected
[   25.552274] 
[   25.552337] Memory state around the buggy address:
[   25.552487]  ffff88810583a600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.553246]  ffff88810583a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.553971] >ffff88810583a700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.554588]                    ^
[   25.554935]  ffff88810583a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.555468]  ffff88810583a800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.556043] ==================================================================