Hay
Date
July 11, 2025, 10:11 a.m.

Environment
e850-96
qemu-arm64
qemu-x86_64

[   48.697141] ==================================================================
[   48.706786] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8
[   48.713118] Read of size 1 at addr ffff00080193b000 by task kunit_try_catch/280
[   48.720408] 
[   48.721896] CPU: 2 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   48.721959] Tainted: [B]=BAD_PAGE, [N]=TEST
[   48.721976] Hardware name: WinLink E850-96 board (DT)
[   48.722001] Call trace:
[   48.722015]  show_stack+0x20/0x38 (C)
[   48.722050]  dump_stack_lvl+0x8c/0xd0
[   48.722085]  print_report+0x118/0x5d0
[   48.722115]  kasan_report+0xdc/0x128
[   48.722143]  __kasan_check_byte+0x54/0x70
[   48.722181]  ksize+0x30/0x88
[   48.722216]  ksize_uaf+0x168/0x5f8
[   48.722249]  kunit_try_run_case+0x170/0x3f0
[   48.722288]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.722322]  kthread+0x328/0x630
[   48.722349]  ret_from_fork+0x10/0x20
[   48.722387] 
[   48.787249] Allocated by task 280:
[   48.790634]  kasan_save_stack+0x3c/0x68
[   48.794454]  kasan_save_track+0x20/0x40
[   48.798272]  kasan_save_alloc_info+0x40/0x58
[   48.802525]  __kasan_kmalloc+0xd4/0xd8
[   48.806257]  __kmalloc_cache_noprof+0x16c/0x3c0
[   48.810771]  ksize_uaf+0xb8/0x5f8
[   48.814070]  kunit_try_run_case+0x170/0x3f0
[   48.818236]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.823708]  kthread+0x328/0x630
[   48.826917]  ret_from_fork+0x10/0x20
[   48.830476] 
[   48.831952] Freed by task 280:
[   48.834990]  kasan_save_stack+0x3c/0x68
[   48.838809]  kasan_save_track+0x20/0x40
[   48.842630]  kasan_save_free_info+0x4c/0x78
[   48.846795]  __kasan_slab_free+0x6c/0x98
[   48.850701]  kfree+0x214/0x3c8
[   48.853740]  ksize_uaf+0x11c/0x5f8
[   48.857125]  kunit_try_run_case+0x170/0x3f0
[   48.861291]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.866760]  kthread+0x328/0x630
[   48.869972]  ret_from_fork+0x10/0x20
[   48.873531] 
[   48.875008] The buggy address belongs to the object at ffff00080193b000
[   48.875008]  which belongs to the cache kmalloc-128 of size 128
[   48.887512] The buggy address is located 0 bytes inside of
[   48.887512]  freed 128-byte region [ffff00080193b000, ffff00080193b080)
[   48.899573] 
[   48.901051] The buggy address belongs to the physical page:
[   48.906609] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88193a
[   48.914591] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   48.922230] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   48.929174] page_type: f5(slab)
[   48.932310] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   48.940030] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   48.947756] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   48.955567] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   48.963380] head: 0bfffe0000000001 fffffdffe0064e81 00000000ffffffff 00000000ffffffff
[   48.971192] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   48.978998] page dumped because: kasan: bad access detected
[   48.984553] 
[   48.986029] Memory state around the buggy address:
[   48.990810]  ffff00080193af00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   48.998012]  ffff00080193af80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.005218] >ffff00080193b000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   49.012418]                    ^
[   49.015633]  ffff00080193b080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.022838]  ffff00080193b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.030041] ==================================================================
[   49.037366] ==================================================================
[   49.044455] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8
[   49.050786] Read of size 1 at addr ffff00080193b000 by task kunit_try_catch/280
[   49.058077] 
[   49.059559] CPU: 2 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   49.059612] Tainted: [B]=BAD_PAGE, [N]=TEST
[   49.059627] Hardware name: WinLink E850-96 board (DT)
[   49.059649] Call trace:
[   49.059662]  show_stack+0x20/0x38 (C)
[   49.059696]  dump_stack_lvl+0x8c/0xd0
[   49.059729]  print_report+0x118/0x5d0
[   49.059755]  kasan_report+0xdc/0x128
[   49.059782]  __asan_report_load1_noabort+0x20/0x30
[   49.059814]  ksize_uaf+0x598/0x5f8
[   49.059844]  kunit_try_run_case+0x170/0x3f0
[   49.059882]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.059914]  kthread+0x328/0x630
[   49.059944]  ret_from_fork+0x10/0x20
[   49.059979] 
[   49.122833] Allocated by task 280:
[   49.126221]  kasan_save_stack+0x3c/0x68
[   49.130037]  kasan_save_track+0x20/0x40
[   49.133857]  kasan_save_alloc_info+0x40/0x58
[   49.138110]  __kasan_kmalloc+0xd4/0xd8
[   49.141843]  __kmalloc_cache_noprof+0x16c/0x3c0
[   49.146357]  ksize_uaf+0xb8/0x5f8
[   49.149655]  kunit_try_run_case+0x170/0x3f0
[   49.153822]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.159292]  kthread+0x328/0x630
[   49.162502]  ret_from_fork+0x10/0x20
[   49.166061] 
[   49.167537] Freed by task 280:
[   49.170575]  kasan_save_stack+0x3c/0x68
[   49.174394]  kasan_save_track+0x20/0x40
[   49.178213]  kasan_save_free_info+0x4c/0x78
[   49.182381]  __kasan_slab_free+0x6c/0x98
[   49.186287]  kfree+0x214/0x3c8
[   49.189325]  ksize_uaf+0x11c/0x5f8
[   49.192710]  kunit_try_run_case+0x170/0x3f0
[   49.196877]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.202345]  kthread+0x328/0x630
[   49.205557]  ret_from_fork+0x10/0x20
[   49.209116] 
[   49.210593] The buggy address belongs to the object at ffff00080193b000
[   49.210593]  which belongs to the cache kmalloc-128 of size 128
[   49.223092] The buggy address is located 0 bytes inside of
[   49.223092]  freed 128-byte region [ffff00080193b000, ffff00080193b080)
[   49.235157] 
[   49.236636] The buggy address belongs to the physical page:
[   49.242193] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88193a
[   49.250176] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   49.257815] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   49.264759] page_type: f5(slab)
[   49.267897] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   49.275615] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   49.283341] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   49.291152] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   49.298966] head: 0bfffe0000000001 fffffdffe0064e81 00000000ffffffff 00000000ffffffff
[   49.306778] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   49.314583] page dumped because: kasan: bad access detected
[   49.320139] 
[   49.321614] Memory state around the buggy address:
[   49.326394]  ffff00080193af00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   49.333597]  ffff00080193af80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.340803] >ffff00080193b000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   49.348003]                    ^
[   49.351219]  ffff00080193b080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.358423]  ffff00080193b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.365624] ==================================================================
[   49.373019] ==================================================================
[   49.380042] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8
[   49.386371] Read of size 1 at addr ffff00080193b078 by task kunit_try_catch/280
[   49.393662] 
[   49.395146] CPU: 2 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   49.395196] Tainted: [B]=BAD_PAGE, [N]=TEST
[   49.395212] Hardware name: WinLink E850-96 board (DT)
[   49.395234] Call trace:
[   49.395246]  show_stack+0x20/0x38 (C)
[   49.395282]  dump_stack_lvl+0x8c/0xd0
[   49.395314]  print_report+0x118/0x5d0
[   49.395340]  kasan_report+0xdc/0x128
[   49.395368]  __asan_report_load1_noabort+0x20/0x30
[   49.395399]  ksize_uaf+0x544/0x5f8
[   49.395429]  kunit_try_run_case+0x170/0x3f0
[   49.395465]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.395498]  kthread+0x328/0x630
[   49.395528]  ret_from_fork+0x10/0x20
[   49.395563] 
[   49.458418] Allocated by task 280:
[   49.461807]  kasan_save_stack+0x3c/0x68
[   49.465624]  kasan_save_track+0x20/0x40
[   49.469442]  kasan_save_alloc_info+0x40/0x58
[   49.473695]  __kasan_kmalloc+0xd4/0xd8
[   49.477428]  __kmalloc_cache_noprof+0x16c/0x3c0
[   49.481942]  ksize_uaf+0xb8/0x5f8
[   49.485240]  kunit_try_run_case+0x170/0x3f0
[   49.489407]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.494877]  kthread+0x328/0x630
[   49.498088]  ret_from_fork+0x10/0x20
[   49.501647] 
[   49.503122] Freed by task 280:
[   49.506160]  kasan_save_stack+0x3c/0x68
[   49.509980]  kasan_save_track+0x20/0x40
[   49.513799]  kasan_save_free_info+0x4c/0x78
[   49.517965]  __kasan_slab_free+0x6c/0x98
[   49.521872]  kfree+0x214/0x3c8
[   49.524909]  ksize_uaf+0x11c/0x5f8
[   49.528295]  kunit_try_run_case+0x170/0x3f0
[   49.532462]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.537931]  kthread+0x328/0x630
[   49.541142]  ret_from_fork+0x10/0x20
[   49.544701] 
[   49.546178] The buggy address belongs to the object at ffff00080193b000
[   49.546178]  which belongs to the cache kmalloc-128 of size 128
[   49.558677] The buggy address is located 120 bytes inside of
[   49.558677]  freed 128-byte region [ffff00080193b000, ffff00080193b080)
[   49.570916] 
[   49.572395] The buggy address belongs to the physical page:
[   49.577950] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88193a
[   49.585935] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   49.593574] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   49.600518] page_type: f5(slab)
[   49.603654] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   49.611373] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   49.619100] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   49.626911] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   49.634724] head: 0bfffe0000000001 fffffdffe0064e81 00000000ffffffff 00000000ffffffff
[   49.642536] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   49.650342] page dumped because: kasan: bad access detected
[   49.655897] 
[   49.657373] Memory state around the buggy address:
[   49.662153]  ffff00080193af00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   49.669356]  ffff00080193af80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.676562] >ffff00080193b000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   49.683762]                                                                 ^
[   49.690883]  ffff00080193b080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.698088]  ffff00080193b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.705289] ==================================================================

[   30.719097] ==================================================================
[   30.719297] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8
[   30.719380] Read of size 1 at addr fff00000c91b3d00 by task kunit_try_catch/227
[   30.719433] 
[   30.719469] CPU: 1 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   30.719667] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.719697] Hardware name: linux,dummy-virt (DT)
[   30.719730] Call trace:
[   30.719756]  show_stack+0x20/0x38 (C)
[   30.719822]  dump_stack_lvl+0x8c/0xd0
[   30.719918]  print_report+0x118/0x5d0
[   30.719963]  kasan_report+0xdc/0x128
[   30.720022]  __kasan_check_byte+0x54/0x70
[   30.720073]  ksize+0x30/0x88
[   30.720145]  ksize_uaf+0x168/0x5f8
[   30.720189]  kunit_try_run_case+0x170/0x3f0
[   30.720257]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.721456]  kthread+0x328/0x630
[   30.721512]  ret_from_fork+0x10/0x20
[   30.721564] 
[   30.721582] Allocated by task 227:
[   30.721611]  kasan_save_stack+0x3c/0x68
[   30.721654]  kasan_save_track+0x20/0x40
[   30.721692]  kasan_save_alloc_info+0x40/0x58
[   30.721730]  __kasan_kmalloc+0xd4/0xd8
[   30.721768]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.721810]  ksize_uaf+0xb8/0x5f8
[   30.721845]  kunit_try_run_case+0x170/0x3f0
[   30.721884]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.721924]  kthread+0x328/0x630
[   30.721957]  ret_from_fork+0x10/0x20
[   30.721992] 
[   30.722012] Freed by task 227:
[   30.722039]  kasan_save_stack+0x3c/0x68
[   30.722077]  kasan_save_track+0x20/0x40
[   30.722115]  kasan_save_free_info+0x4c/0x78
[   30.722152]  __kasan_slab_free+0x6c/0x98
[   30.722190]  kfree+0x214/0x3c8
[   30.722225]  ksize_uaf+0x11c/0x5f8
[   30.722260]  kunit_try_run_case+0x170/0x3f0
[   30.722300]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.722396]  kthread+0x328/0x630
[   30.722454]  ret_from_fork+0x10/0x20
[   30.722500] 
[   30.722519] The buggy address belongs to the object at fff00000c91b3d00
[   30.722519]  which belongs to the cache kmalloc-128 of size 128
[   30.722584] The buggy address is located 0 bytes inside of
[   30.722584]  freed 128-byte region [fff00000c91b3d00, fff00000c91b3d80)
[   30.722695] 
[   30.722779] The buggy address belongs to the physical page:
[   30.722858] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091b3
[   30.722913] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.722963] page_type: f5(slab)
[   30.723015] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.723073] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.723318] page dumped because: kasan: bad access detected
[   30.723362] 
[   30.723380] Memory state around the buggy address:
[   30.723425]  fff00000c91b3c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.723467]  fff00000c91b3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.723520] >fff00000c91b3d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.723557]                    ^
[   30.723591]  fff00000c91b3d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.723635]  fff00000c91b3e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.723674] ==================================================================
[   30.724610] ==================================================================
[   30.724666] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8
[   30.724718] Read of size 1 at addr fff00000c91b3d00 by task kunit_try_catch/227
[   30.724767] 
[   30.724797] CPU: 1 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   30.724910] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.724957] Hardware name: linux,dummy-virt (DT)
[   30.725016] Call trace:
[   30.725055]  show_stack+0x20/0x38 (C)
[   30.725110]  dump_stack_lvl+0x8c/0xd0
[   30.725158]  print_report+0x118/0x5d0
[   30.725200]  kasan_report+0xdc/0x128
[   30.725243]  __asan_report_load1_noabort+0x20/0x30
[   30.725291]  ksize_uaf+0x598/0x5f8
[   30.725365]  kunit_try_run_case+0x170/0x3f0
[   30.725429]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.725479]  kthread+0x328/0x630
[   30.725604]  ret_from_fork+0x10/0x20
[   30.725731] 
[   30.725789] Allocated by task 227:
[   30.725831]  kasan_save_stack+0x3c/0x68
[   30.725907]  kasan_save_track+0x20/0x40
[   30.726000]  kasan_save_alloc_info+0x40/0x58
[   30.726055]  __kasan_kmalloc+0xd4/0xd8
[   30.726134]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.726188]  ksize_uaf+0xb8/0x5f8
[   30.726235]  kunit_try_run_case+0x170/0x3f0
[   30.726365]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.726446]  kthread+0x328/0x630
[   30.726506]  ret_from_fork+0x10/0x20
[   30.726629] 
[   30.726668] Freed by task 227:
[   30.726694]  kasan_save_stack+0x3c/0x68
[   30.726733]  kasan_save_track+0x20/0x40
[   30.726770]  kasan_save_free_info+0x4c/0x78
[   30.726809]  __kasan_slab_free+0x6c/0x98
[   30.726872]  kfree+0x214/0x3c8
[   30.726907]  ksize_uaf+0x11c/0x5f8
[   30.726943]  kunit_try_run_case+0x170/0x3f0
[   30.726981]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.727027]  kthread+0x328/0x630
[   30.727058]  ret_from_fork+0x10/0x20
[   30.727101] 
[   30.727119] The buggy address belongs to the object at fff00000c91b3d00
[   30.727119]  which belongs to the cache kmalloc-128 of size 128
[   30.727177] The buggy address is located 0 bytes inside of
[   30.727177]  freed 128-byte region [fff00000c91b3d00, fff00000c91b3d80)
[   30.727237] 
[   30.727269] The buggy address belongs to the physical page:
[   30.727348] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091b3
[   30.727413] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.727516] page_type: f5(slab)
[   30.727564] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.727660] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.727766] page dumped because: kasan: bad access detected
[   30.727845] 
[   30.727900] Memory state around the buggy address:
[   30.727989]  fff00000c91b3c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.728340]  fff00000c91b3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.728385] >fff00000c91b3d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.728557]                    ^
[   30.728584]  fff00000c91b3d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.728626]  fff00000c91b3e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.728747] ==================================================================
[   30.729997] ==================================================================
[   30.730053] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8
[   30.730104] Read of size 1 at addr fff00000c91b3d78 by task kunit_try_catch/227
[   30.730155] 
[   30.730196] CPU: 1 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   30.730305] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.730349] Hardware name: linux,dummy-virt (DT)
[   30.730398] Call trace:
[   30.730438]  show_stack+0x20/0x38 (C)
[   30.730536]  dump_stack_lvl+0x8c/0xd0
[   30.730602]  print_report+0x118/0x5d0
[   30.730646]  kasan_report+0xdc/0x128
[   30.730724]  __asan_report_load1_noabort+0x20/0x30
[   30.730791]  ksize_uaf+0x544/0x5f8
[   30.730857]  kunit_try_run_case+0x170/0x3f0
[   30.730949]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.731002]  kthread+0x328/0x630
[   30.731079]  ret_from_fork+0x10/0x20
[   30.731129] 
[   30.731180] Allocated by task 227:
[   30.731227]  kasan_save_stack+0x3c/0x68
[   30.731274]  kasan_save_track+0x20/0x40
[   30.731330]  kasan_save_alloc_info+0x40/0x58
[   30.731408]  __kasan_kmalloc+0xd4/0xd8
[   30.731454]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.731497]  ksize_uaf+0xb8/0x5f8
[   30.731533]  kunit_try_run_case+0x170/0x3f0
[   30.731591]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.731734]  kthread+0x328/0x630
[   30.731823]  ret_from_fork+0x10/0x20
[   30.731902] 
[   30.731941] Freed by task 227:
[   30.732006]  kasan_save_stack+0x3c/0x68
[   30.732066]  kasan_save_track+0x20/0x40
[   30.732118]  kasan_save_free_info+0x4c/0x78
[   30.732157]  __kasan_slab_free+0x6c/0x98
[   30.732195]  kfree+0x214/0x3c8
[   30.732239]  ksize_uaf+0x11c/0x5f8
[   30.732274]  kunit_try_run_case+0x170/0x3f0
[   30.732314]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.732366]  kthread+0x328/0x630
[   30.732398]  ret_from_fork+0x10/0x20
[   30.732434] 
[   30.732452] The buggy address belongs to the object at fff00000c91b3d00
[   30.732452]  which belongs to the cache kmalloc-128 of size 128
[   30.732509] The buggy address is located 120 bytes inside of
[   30.732509]  freed 128-byte region [fff00000c91b3d00, fff00000c91b3d80)
[   30.732570] 
[   30.732589] The buggy address belongs to the physical page:
[   30.732629] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091b3
[   30.732680] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.732740] page_type: f5(slab)
[   30.732779] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.732829] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.732867] page dumped because: kasan: bad access detected
[   30.732908] 
[   30.732926] Memory state around the buggy address:
[   30.732957]  fff00000c91b3c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.733000]  fff00000c91b3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.733042] >fff00000c91b3d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.733087]                                                                 ^
[   30.733128]  fff00000c91b3d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.733169]  fff00000c91b3e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.733207] ==================================================================

[   24.222017] ==================================================================
[   24.223311] BUG: KASAN: slab-use-after-free in ksize_uaf+0x19d/0x6c0
[   24.223762] Read of size 1 at addr ffff888104cac400 by task kunit_try_catch/246
[   24.225144] 
[   24.225664] CPU: 0 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) 
[   24.225940] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.225957] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.225980] Call Trace:
[   24.225994]  <TASK>
[   24.226014]  dump_stack_lvl+0x73/0xb0
[   24.226051]  print_report+0xd1/0x610
[   24.226076]  ? __virt_addr_valid+0x1db/0x2d0
[   24.226103]  ? ksize_uaf+0x19d/0x6c0
[   24.226124]  ? kasan_complete_mode_report_info+0x64/0x200
[   24.226149]  ? ksize_uaf+0x19d/0x6c0
[   24.226170]  kasan_report+0x141/0x180
[   24.226191]  ? ksize_uaf+0x19d/0x6c0
[   24.226213]  ? ksize_uaf+0x19d/0x6c0
[   24.226233]  __kasan_check_byte+0x3d/0x50
[   24.226254]  ksize+0x20/0x60
[   24.226292]  ksize_uaf+0x19d/0x6c0
[   24.226312]  ? __pfx_ksize_uaf+0x10/0x10
[   24.226335]  ? __pfx_ksize_uaf+0x10/0x10
[   24.226359]  kunit_try_run_case+0x1a5/0x480
[   24.226381]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.226401]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.226433]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.226458]  ? __kthread_parkme+0x82/0x180
[   24.226480]  ? preempt_count_sub+0x50/0x80
[   24.226503]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.226525]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.226550]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.226575]  kthread+0x337/0x6f0
[   24.226595]  ? trace_preempt_on+0x20/0xc0
[   24.226618]  ? __pfx_kthread+0x10/0x10
[   24.226639]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.226660]  ? calculate_sigpending+0x7b/0xa0
[   24.226685]  ? __pfx_kthread+0x10/0x10
[   24.226707]  ret_from_fork+0x116/0x1d0
[   24.226727]  ? __pfx_kthread+0x10/0x10
[   24.226757]  ret_from_fork_asm+0x1a/0x30
[   24.226788]  </TASK>
[   24.226800] 
[   24.237522] Allocated by task 246:
[   24.237691]  kasan_save_stack+0x45/0x70
[   24.237886]  kasan_save_track+0x18/0x40
[   24.238053]  kasan_save_alloc_info+0x3b/0x50
[   24.238239]  __kasan_kmalloc+0xb7/0xc0
[   24.238827]  __kmalloc_cache_noprof+0x189/0x420
[   24.239256]  ksize_uaf+0xaa/0x6c0
[   24.239554]  kunit_try_run_case+0x1a5/0x480
[   24.239754]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.239979]  kthread+0x337/0x6f0
[   24.240130]  ret_from_fork+0x116/0x1d0
[   24.240344]  ret_from_fork_asm+0x1a/0x30
[   24.240535] 
[   24.240619] Freed by task 246:
[   24.240768]  kasan_save_stack+0x45/0x70
[   24.240935]  kasan_save_track+0x18/0x40
[   24.241103]  kasan_save_free_info+0x3f/0x60
[   24.241431]  __kasan_slab_free+0x56/0x70
[   24.241627]  kfree+0x222/0x3f0
[   24.241782]  ksize_uaf+0x12c/0x6c0
[   24.241935]  kunit_try_run_case+0x1a5/0x480
[   24.242111]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.242402]  kthread+0x337/0x6f0
[   24.242553]  ret_from_fork+0x116/0x1d0
[   24.242713]  ret_from_fork_asm+0x1a/0x30
[   24.242857] 
[   24.242923] The buggy address belongs to the object at ffff888104cac400
[   24.242923]  which belongs to the cache kmalloc-128 of size 128
[   24.243275] The buggy address is located 0 bytes inside of
[   24.243275]  freed 128-byte region [ffff888104cac400, ffff888104cac480)
[   24.243608] 
[   24.243680] The buggy address belongs to the physical page:
[   24.244041] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104cac
[   24.244551] flags: 0x200000000000000(node=0|zone=2)
[   24.244793] page_type: f5(slab)
[   24.244960] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   24.245278] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.245865] page dumped because: kasan: bad access detected
[   24.246066] 
[   24.246132] Memory state around the buggy address:
[   24.246282]  ffff888104cac300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.246489]  ffff888104cac380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.246694] >ffff888104cac400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.246909]                    ^
[   24.247265]  ffff888104cac480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.247644]  ffff888104cac500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.248210] ==================================================================
[   24.280914] ==================================================================
[   24.281238] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5e4/0x6c0
[   24.281765] Read of size 1 at addr ffff888104cac478 by task kunit_try_catch/246
[   24.282069] 
[   24.282175] CPU: 0 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) 
[   24.282226] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.282238] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.282259] Call Trace:
[   24.282613]  <TASK>
[   24.282635]  dump_stack_lvl+0x73/0xb0
[   24.282670]  print_report+0xd1/0x610
[   24.282701]  ? __virt_addr_valid+0x1db/0x2d0
[   24.282724]  ? ksize_uaf+0x5e4/0x6c0
[   24.282754]  ? kasan_complete_mode_report_info+0x64/0x200
[   24.282779]  ? ksize_uaf+0x5e4/0x6c0
[   24.282799]  kasan_report+0x141/0x180
[   24.282820]  ? ksize_uaf+0x5e4/0x6c0
[   24.282845]  __asan_report_load1_noabort+0x18/0x20
[   24.282868]  ksize_uaf+0x5e4/0x6c0
[   24.282888]  ? __pfx_ksize_uaf+0x10/0x10
[   24.282912]  ? __pfx_ksize_uaf+0x10/0x10
[   24.282936]  kunit_try_run_case+0x1a5/0x480
[   24.282957]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.282979]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.283003]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.283025]  ? __kthread_parkme+0x82/0x180
[   24.283046]  ? preempt_count_sub+0x50/0x80
[   24.283070]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.283091]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.283116]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.283140]  kthread+0x337/0x6f0
[   24.283160]  ? trace_preempt_on+0x20/0xc0
[   24.283183]  ? __pfx_kthread+0x10/0x10
[   24.283203]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.283224]  ? calculate_sigpending+0x7b/0xa0
[   24.283248]  ? __pfx_kthread+0x10/0x10
[   24.283339]  ret_from_fork+0x116/0x1d0
[   24.283362]  ? __pfx_kthread+0x10/0x10
[   24.283382]  ret_from_fork_asm+0x1a/0x30
[   24.283413]  </TASK>
[   24.283424] 
[   24.291937] Allocated by task 246:
[   24.292345]  kasan_save_stack+0x45/0x70
[   24.292649]  kasan_save_track+0x18/0x40
[   24.292988]  kasan_save_alloc_info+0x3b/0x50
[   24.293397]  __kasan_kmalloc+0xb7/0xc0
[   24.293704]  __kmalloc_cache_noprof+0x189/0x420
[   24.293925]  ksize_uaf+0xaa/0x6c0
[   24.294086]  kunit_try_run_case+0x1a5/0x480
[   24.294508]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.294792]  kthread+0x337/0x6f0
[   24.295049]  ret_from_fork+0x116/0x1d0
[   24.295456]  ret_from_fork_asm+0x1a/0x30
[   24.295826] 
[   24.295927] Freed by task 246:
[   24.296065]  kasan_save_stack+0x45/0x70
[   24.296239]  kasan_save_track+0x18/0x40
[   24.296619]  kasan_save_free_info+0x3f/0x60
[   24.297019]  __kasan_slab_free+0x56/0x70
[   24.297206]  kfree+0x222/0x3f0
[   24.297517]  ksize_uaf+0x12c/0x6c0
[   24.297802]  kunit_try_run_case+0x1a5/0x480
[   24.298008]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.298237]  kthread+0x337/0x6f0
[   24.298665]  ret_from_fork+0x116/0x1d0
[   24.298969]  ret_from_fork_asm+0x1a/0x30
[   24.299258] 
[   24.299372] The buggy address belongs to the object at ffff888104cac400
[   24.299372]  which belongs to the cache kmalloc-128 of size 128
[   24.300086] The buggy address is located 120 bytes inside of
[   24.300086]  freed 128-byte region [ffff888104cac400, ffff888104cac480)
[   24.301260] 
[   24.301538] The buggy address belongs to the physical page:
[   24.301950] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104cac
[   24.302637] flags: 0x200000000000000(node=0|zone=2)
[   24.302874] page_type: f5(slab)
[   24.303026] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   24.303592] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.304088] page dumped because: kasan: bad access detected
[   24.304543] 
[   24.304637] Memory state around the buggy address:
[   24.304854]  ffff888104cac300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.305144]  ffff888104cac380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.306013] >ffff888104cac400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.306573]                                                                 ^
[   24.306968]  ffff888104cac480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.307259]  ffff888104cac500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.307981] ==================================================================
[   24.250056] ==================================================================
[   24.250986] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5fe/0x6c0
[   24.251265] Read of size 1 at addr ffff888104cac400 by task kunit_try_catch/246
[   24.251817] 
[   24.252086] CPU: 0 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) 
[   24.252140] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.252152] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.252173] Call Trace:
[   24.252191]  <TASK>
[   24.252208]  dump_stack_lvl+0x73/0xb0
[   24.252240]  print_report+0xd1/0x610
[   24.252261]  ? __virt_addr_valid+0x1db/0x2d0
[   24.252285]  ? ksize_uaf+0x5fe/0x6c0
[   24.252305]  ? kasan_complete_mode_report_info+0x64/0x200
[   24.252335]  ? ksize_uaf+0x5fe/0x6c0
[   24.252368]  kasan_report+0x141/0x180
[   24.252390]  ? ksize_uaf+0x5fe/0x6c0
[   24.252584]  __asan_report_load1_noabort+0x18/0x20
[   24.252614]  ksize_uaf+0x5fe/0x6c0
[   24.252635]  ? __pfx_ksize_uaf+0x10/0x10
[   24.252658]  ? __pfx_ksize_uaf+0x10/0x10
[   24.252682]  kunit_try_run_case+0x1a5/0x480
[   24.252704]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.252724]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.252772]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.252808]  ? __kthread_parkme+0x82/0x180
[   24.252841]  ? preempt_count_sub+0x50/0x80
[   24.252864]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.252886]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.252910]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.252934]  kthread+0x337/0x6f0
[   24.252954]  ? trace_preempt_on+0x20/0xc0
[   24.252977]  ? __pfx_kthread+0x10/0x10
[   24.252998]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.253019]  ? calculate_sigpending+0x7b/0xa0
[   24.253044]  ? __pfx_kthread+0x10/0x10
[   24.253067]  ret_from_fork+0x116/0x1d0
[   24.253086]  ? __pfx_kthread+0x10/0x10
[   24.253107]  ret_from_fork_asm+0x1a/0x30
[   24.253137]  </TASK>
[   24.253148] 
[   24.263246] Allocated by task 246:
[   24.263414]  kasan_save_stack+0x45/0x70
[   24.263604]  kasan_save_track+0x18/0x40
[   24.264168]  kasan_save_alloc_info+0x3b/0x50
[   24.264380]  __kasan_kmalloc+0xb7/0xc0
[   24.264717]  __kmalloc_cache_noprof+0x189/0x420
[   24.265330]  ksize_uaf+0xaa/0x6c0
[   24.265844]  kunit_try_run_case+0x1a5/0x480
[   24.266057]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.266297]  kthread+0x337/0x6f0
[   24.266697]  ret_from_fork+0x116/0x1d0
[   24.266938]  ret_from_fork_asm+0x1a/0x30
[   24.267291] 
[   24.267547] Freed by task 246:
[   24.267843]  kasan_save_stack+0x45/0x70
[   24.268031]  kasan_save_track+0x18/0x40
[   24.268204]  kasan_save_free_info+0x3f/0x60
[   24.268723]  __kasan_slab_free+0x56/0x70
[   24.269040]  kfree+0x222/0x3f0
[   24.269549]  ksize_uaf+0x12c/0x6c0
[   24.269923]  kunit_try_run_case+0x1a5/0x480
[   24.270111]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.270535]  kthread+0x337/0x6f0
[   24.270863]  ret_from_fork+0x116/0x1d0
[   24.271039]  ret_from_fork_asm+0x1a/0x30
[   24.271214] 
[   24.271549] The buggy address belongs to the object at ffff888104cac400
[   24.271549]  which belongs to the cache kmalloc-128 of size 128
[   24.272308] The buggy address is located 0 bytes inside of
[   24.272308]  freed 128-byte region [ffff888104cac400, ffff888104cac480)
[   24.273118] 
[   24.273215] The buggy address belongs to the physical page:
[   24.273862] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104cac
[   24.274200] flags: 0x200000000000000(node=0|zone=2)
[   24.274809] page_type: f5(slab)
[   24.275100] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   24.275816] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.276251] page dumped because: kasan: bad access detected
[   24.276682] 
[   24.276784] Memory state around the buggy address:
[   24.276984]  ffff888104cac300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.277267]  ffff888104cac380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.278377] >ffff888104cac400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.278684]                    ^
[   24.278849]  ffff888104cac480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.279143]  ffff888104cac500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.279931] ==================================================================