Hay
Date
July 18, 2025, 1:09 p.m.

Environment
qemu-arm64
qemu-x86_64

[   31.746860] ==================================================================
[   31.746982] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8
[   31.747131] Read of size 1 at addr fff00000c3efde00 by task kunit_try_catch/227
[   31.747186] 
[   31.747217] CPU: 0 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   31.747558] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.747589] Hardware name: linux,dummy-virt (DT)
[   31.747622] Call trace:
[   31.747772]  show_stack+0x20/0x38 (C)
[   31.747983]  dump_stack_lvl+0x8c/0xd0
[   31.748183]  print_report+0x118/0x5e8
[   31.748253]  kasan_report+0xdc/0x128
[   31.748423]  __kasan_check_byte+0x54/0x70
[   31.748579]  ksize+0x30/0x88
[   31.748648]  ksize_uaf+0x168/0x5f8
[   31.748792]  kunit_try_run_case+0x170/0x3f0
[   31.748877]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.749018]  kthread+0x328/0x630
[   31.749098]  ret_from_fork+0x10/0x20
[   31.749220] 
[   31.749239] Allocated by task 227:
[   31.749291]  kasan_save_stack+0x3c/0x68
[   31.749577]  kasan_save_track+0x20/0x40
[   31.749647]  kasan_save_alloc_info+0x40/0x58
[   31.749685]  __kasan_kmalloc+0xd4/0xd8
[   31.749722]  __kmalloc_cache_noprof+0x16c/0x3c0
[   31.749821]  ksize_uaf+0xb8/0x5f8
[   31.749860]  kunit_try_run_case+0x170/0x3f0
[   31.749902]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.749961]  kthread+0x328/0x630
[   31.749994]  ret_from_fork+0x10/0x20
[   31.750045] 
[   31.750070] Freed by task 227:
[   31.750353]  kasan_save_stack+0x3c/0x68
[   31.750469]  kasan_save_track+0x20/0x40
[   31.750619]  kasan_save_free_info+0x4c/0x78
[   31.750685]  __kasan_slab_free+0x6c/0x98
[   31.751017]  kfree+0x214/0x3c8
[   31.751075]  ksize_uaf+0x11c/0x5f8
[   31.751144]  kunit_try_run_case+0x170/0x3f0
[   31.751486]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.751567]  kthread+0x328/0x630
[   31.751652]  ret_from_fork+0x10/0x20
[   31.751755] 
[   31.751799] The buggy address belongs to the object at fff00000c3efde00
[   31.751799]  which belongs to the cache kmalloc-128 of size 128
[   31.751976] The buggy address is located 0 bytes inside of
[   31.751976]  freed 128-byte region [fff00000c3efde00, fff00000c3efde80)
[   31.752092] 
[   31.752329] The buggy address belongs to the physical page:
[   31.752428] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103efd
[   31.752584] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.752670] page_type: f5(slab)
[   31.752727] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122
[   31.752859] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.752983] page dumped because: kasan: bad access detected
[   31.753043] 
[   31.753106] Memory state around the buggy address:
[   31.753194]  fff00000c3efdd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.753265]  fff00000c3efdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.753307] >fff00000c3efde00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.753584]                    ^
[   31.753670]  fff00000c3efde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.753757]  fff00000c3efdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.753846] ==================================================================
[   31.754478] ==================================================================
[   31.754742] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8
[   31.754951] Read of size 1 at addr fff00000c3efde00 by task kunit_try_catch/227
[   31.755027] 
[   31.755086] CPU: 0 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   31.755215] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.755253] Hardware name: linux,dummy-virt (DT)
[   31.755284] Call trace:
[   31.755313]  show_stack+0x20/0x38 (C)
[   31.755525]  dump_stack_lvl+0x8c/0xd0
[   31.755686]  print_report+0x118/0x5e8
[   31.755817]  kasan_report+0xdc/0x128
[   31.755926]  __asan_report_load1_noabort+0x20/0x30
[   31.756012]  ksize_uaf+0x598/0x5f8
[   31.756198]  kunit_try_run_case+0x170/0x3f0
[   31.756245]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.756294]  kthread+0x328/0x630
[   31.756631]  ret_from_fork+0x10/0x20
[   31.756697] 
[   31.756717] Allocated by task 227:
[   31.756783]  kasan_save_stack+0x3c/0x68
[   31.756825]  kasan_save_track+0x20/0x40
[   31.756859]  kasan_save_alloc_info+0x40/0x58
[   31.756897]  __kasan_kmalloc+0xd4/0xd8
[   31.756941]  __kmalloc_cache_noprof+0x16c/0x3c0
[   31.756982]  ksize_uaf+0xb8/0x5f8
[   31.757016]  kunit_try_run_case+0x170/0x3f0
[   31.757051]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.757320]  kthread+0x328/0x630
[   31.757441]  ret_from_fork+0x10/0x20
[   31.757522] 
[   31.757604] Freed by task 227:
[   31.757685]  kasan_save_stack+0x3c/0x68
[   31.757735]  kasan_save_track+0x20/0x40
[   31.758061]  kasan_save_free_info+0x4c/0x78
[   31.758152]  __kasan_slab_free+0x6c/0x98
[   31.758205]  kfree+0x214/0x3c8
[   31.758258]  ksize_uaf+0x11c/0x5f8
[   31.758512]  kunit_try_run_case+0x170/0x3f0
[   31.758682]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.758732]  kthread+0x328/0x630
[   31.758982]  ret_from_fork+0x10/0x20
[   31.759181] 
[   31.759234] The buggy address belongs to the object at fff00000c3efde00
[   31.759234]  which belongs to the cache kmalloc-128 of size 128
[   31.759357] The buggy address is located 0 bytes inside of
[   31.759357]  freed 128-byte region [fff00000c3efde00, fff00000c3efde80)
[   31.759514] 
[   31.759565] The buggy address belongs to the physical page:
[   31.759846] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103efd
[   31.759990] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.760183] page_type: f5(slab)
[   31.760256] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122
[   31.760392] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.760469] page dumped because: kasan: bad access detected
[   31.760615] 
[   31.760653] Memory state around the buggy address:
[   31.760688]  fff00000c3efdd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.760733]  fff00000c3efdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.760775] >fff00000c3efde00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.761095]                    ^
[   31.761149]  fff00000c3efde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.761214]  fff00000c3efdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.761316] ==================================================================
[   31.761905] ==================================================================
[   31.761954] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8
[   31.762003] Read of size 1 at addr fff00000c3efde78 by task kunit_try_catch/227
[   31.762087] 
[   31.762118] CPU: 0 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT 
[   31.762202] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.762237] Hardware name: linux,dummy-virt (DT)
[   31.762266] Call trace:
[   31.762289]  show_stack+0x20/0x38 (C)
[   31.762342]  dump_stack_lvl+0x8c/0xd0
[   31.762390]  print_report+0x118/0x5e8
[   31.762433]  kasan_report+0xdc/0x128
[   31.762473]  __asan_report_load1_noabort+0x20/0x30
[   31.762521]  ksize_uaf+0x544/0x5f8
[   31.762563]  kunit_try_run_case+0x170/0x3f0
[   31.762614]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.762665]  kthread+0x328/0x630
[   31.762710]  ret_from_fork+0x10/0x20
[   31.762754] 
[   31.762773] Allocated by task 227:
[   31.762810]  kasan_save_stack+0x3c/0x68
[   31.762847]  kasan_save_track+0x20/0x40
[   31.762890]  kasan_save_alloc_info+0x40/0x58
[   31.762930]  __kasan_kmalloc+0xd4/0xd8
[   31.762964]  __kmalloc_cache_noprof+0x16c/0x3c0
[   31.763004]  ksize_uaf+0xb8/0x5f8
[   31.763039]  kunit_try_run_case+0x170/0x3f0
[   31.763076]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.763128]  kthread+0x328/0x630
[   31.763431]  ret_from_fork+0x10/0x20
[   31.763584] 
[   31.763622] Freed by task 227:
[   31.763799]  kasan_save_stack+0x3c/0x68
[   31.763954]  kasan_save_track+0x20/0x40
[   31.764131]  kasan_save_free_info+0x4c/0x78
[   31.764218]  __kasan_slab_free+0x6c/0x98
[   31.764580]  kfree+0x214/0x3c8
[   31.764651]  ksize_uaf+0x11c/0x5f8
[   31.765189]  kunit_try_run_case+0x170/0x3f0
[   31.765496]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.765573]  kthread+0x328/0x630
[   31.765637]  ret_from_fork+0x10/0x20
[   31.765727] 
[   31.765819] The buggy address belongs to the object at fff00000c3efde00
[   31.765819]  which belongs to the cache kmalloc-128 of size 128
[   31.765939] The buggy address is located 120 bytes inside of
[   31.765939]  freed 128-byte region [fff00000c3efde00, fff00000c3efde80)
[   31.766003] 
[   31.766026] The buggy address belongs to the physical page:
[   31.766208] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103efd
[   31.766330] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.766653] page_type: f5(slab)
[   31.766964] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122
[   31.767030] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.767385] page dumped because: kasan: bad access detected
[   31.767448] 
[   31.767498] Memory state around the buggy address:
[   31.767767]  fff00000c3efdd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.767833]  fff00000c3efdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.767884] >fff00000c3efde00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.767993]                                                                 ^
[   31.768068]  fff00000c3efde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.768189]  fff00000c3efdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.768257] ==================================================================


[   25.314132] ==================================================================
[   25.315499] BUG: KASAN: slab-use-after-free in ksize_uaf+0x19d/0x6c0
[   25.316249] Read of size 1 at addr ffff8881053b7300 by task kunit_try_catch/244
[   25.317261] 
[   25.317616] CPU: 0 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) 
[   25.317671] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.317684] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.317707] Call Trace:
[   25.317719]  <TASK>
[   25.317737]  dump_stack_lvl+0x73/0xb0
[   25.317772]  print_report+0xd1/0x640
[   25.317794]  ? __virt_addr_valid+0x1db/0x2d0
[   25.317819]  ? ksize_uaf+0x19d/0x6c0
[   25.317933]  ? kasan_complete_mode_report_info+0x64/0x200
[   25.317961]  ? ksize_uaf+0x19d/0x6c0
[   25.317981]  kasan_report+0x141/0x180
[   25.318002]  ? ksize_uaf+0x19d/0x6c0
[   25.318025]  ? ksize_uaf+0x19d/0x6c0
[   25.318044]  __kasan_check_byte+0x3d/0x50
[   25.318065]  ksize+0x20/0x60
[   25.318086]  ksize_uaf+0x19d/0x6c0
[   25.318106]  ? __pfx_ksize_uaf+0x10/0x10
[   25.318126]  ? __schedule+0x10da/0x2b60
[   25.318149]  ? __pfx_read_tsc+0x10/0x10
[   25.318171]  ? ktime_get_ts64+0x86/0x230
[   25.318196]  kunit_try_run_case+0x1a5/0x480
[   25.318237]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.318259]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.318292]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.318324]  ? __kthread_parkme+0x82/0x180
[   25.318344]  ? preempt_count_sub+0x50/0x80
[   25.318367]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.318389]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.318411]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.318433]  kthread+0x337/0x6f0
[   25.318452]  ? trace_preempt_on+0x20/0xc0
[   25.318475]  ? __pfx_kthread+0x10/0x10
[   25.318494]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.318523]  ? calculate_sigpending+0x7b/0xa0
[   25.318546]  ? __pfx_kthread+0x10/0x10
[   25.318566]  ret_from_fork+0x116/0x1d0
[   25.318584]  ? __pfx_kthread+0x10/0x10
[   25.318604]  ret_from_fork_asm+0x1a/0x30
[   25.318640]  </TASK>
[   25.318652] 
[   25.332663] Allocated by task 244:
[   25.332858]  kasan_save_stack+0x45/0x70
[   25.333263]  kasan_save_track+0x18/0x40
[   25.333480]  kasan_save_alloc_info+0x3b/0x50
[   25.333685]  __kasan_kmalloc+0xb7/0xc0
[   25.333869]  __kmalloc_cache_noprof+0x189/0x420
[   25.334084]  ksize_uaf+0xaa/0x6c0
[   25.334246]  kunit_try_run_case+0x1a5/0x480
[   25.334686]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.335237]  kthread+0x337/0x6f0
[   25.335394]  ret_from_fork+0x116/0x1d0
[   25.335816]  ret_from_fork_asm+0x1a/0x30
[   25.336110] 
[   25.336182] Freed by task 244:
[   25.336338]  kasan_save_stack+0x45/0x70
[   25.336467]  kasan_save_track+0x18/0x40
[   25.336693]  kasan_save_free_info+0x3f/0x60
[   25.337123]  __kasan_slab_free+0x56/0x70
[   25.337561]  kfree+0x222/0x3f0
[   25.337905]  ksize_uaf+0x12c/0x6c0
[   25.338332]  kunit_try_run_case+0x1a5/0x480
[   25.338821]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.338987]  kthread+0x337/0x6f0
[   25.339096]  ret_from_fork+0x116/0x1d0
[   25.339225]  ret_from_fork_asm+0x1a/0x30
[   25.339350] 
[   25.339417] The buggy address belongs to the object at ffff8881053b7300
[   25.339417]  which belongs to the cache kmalloc-128 of size 128
[   25.339848] The buggy address is located 0 bytes inside of
[   25.339848]  freed 128-byte region [ffff8881053b7300, ffff8881053b7380)
[   25.340300] 
[   25.340368] The buggy address belongs to the physical page:
[   25.340611] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053b7
[   25.340938] flags: 0x200000000000000(node=0|zone=2)
[   25.341138] page_type: f5(slab)
[   25.341285] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   25.341698] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.342027] page dumped because: kasan: bad access detected
[   25.342252] 
[   25.342318] Memory state around the buggy address:
[   25.342528]  ffff8881053b7200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.342799]  ffff8881053b7280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.343073] >ffff8881053b7300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.343424]                    ^
[   25.343563]  ffff8881053b7380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.344083]  ffff8881053b7400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.344358] ==================================================================
[   25.346033] ==================================================================
[   25.346514] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5fe/0x6c0
[   25.346902] Read of size 1 at addr ffff8881053b7300 by task kunit_try_catch/244
[   25.347154] 
[   25.347251] CPU: 0 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) 
[   25.347298] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.347310] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.347332] Call Trace:
[   25.347351]  <TASK>
[   25.347368]  dump_stack_lvl+0x73/0xb0
[   25.347399]  print_report+0xd1/0x640
[   25.347421]  ? __virt_addr_valid+0x1db/0x2d0
[   25.347443]  ? ksize_uaf+0x5fe/0x6c0
[   25.347462]  ? kasan_complete_mode_report_info+0x64/0x200
[   25.347486]  ? ksize_uaf+0x5fe/0x6c0
[   25.347506]  kasan_report+0x141/0x180
[   25.347526]  ? ksize_uaf+0x5fe/0x6c0
[   25.347550]  __asan_report_load1_noabort+0x18/0x20
[   25.347573]  ksize_uaf+0x5fe/0x6c0
[   25.347592]  ? __pfx_ksize_uaf+0x10/0x10
[   25.347612]  ? __schedule+0x10da/0x2b60
[   25.347635]  ? __pfx_read_tsc+0x10/0x10
[   25.347656]  ? ktime_get_ts64+0x86/0x230
[   25.347680]  kunit_try_run_case+0x1a5/0x480
[   25.347703]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.347723]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.347757]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.347861]  ? __kthread_parkme+0x82/0x180
[   25.347882]  ? preempt_count_sub+0x50/0x80
[   25.347905]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.347927]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.347950]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.347971]  kthread+0x337/0x6f0
[   25.347990]  ? trace_preempt_on+0x20/0xc0
[   25.348012]  ? __pfx_kthread+0x10/0x10
[   25.348031]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.348061]  ? calculate_sigpending+0x7b/0xa0
[   25.348084]  ? __pfx_kthread+0x10/0x10
[   25.348104]  ret_from_fork+0x116/0x1d0
[   25.348122]  ? __pfx_kthread+0x10/0x10
[   25.348141]  ret_from_fork_asm+0x1a/0x30
[   25.348171]  </TASK>
[   25.348181] 
[   25.354963] Allocated by task 244:
[   25.355130]  kasan_save_stack+0x45/0x70
[   25.355320]  kasan_save_track+0x18/0x40
[   25.355471]  kasan_save_alloc_info+0x3b/0x50
[   25.355652]  __kasan_kmalloc+0xb7/0xc0
[   25.356019]  __kmalloc_cache_noprof+0x189/0x420
[   25.356249]  ksize_uaf+0xaa/0x6c0
[   25.356417]  kunit_try_run_case+0x1a5/0x480
[   25.356603]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.356880]  kthread+0x337/0x6f0
[   25.357036]  ret_from_fork+0x116/0x1d0
[   25.357207]  ret_from_fork_asm+0x1a/0x30
[   25.357389] 
[   25.357451] Freed by task 244:
[   25.357601]  kasan_save_stack+0x45/0x70
[   25.357759]  kasan_save_track+0x18/0x40
[   25.357976]  kasan_save_free_info+0x3f/0x60
[   25.358173]  __kasan_slab_free+0x56/0x70
[   25.358343]  kfree+0x222/0x3f0
[   25.358502]  ksize_uaf+0x12c/0x6c0
[   25.358661]  kunit_try_run_case+0x1a5/0x480
[   25.358909]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.359122]  kthread+0x337/0x6f0
[   25.359288]  ret_from_fork+0x116/0x1d0
[   25.359473]  ret_from_fork_asm+0x1a/0x30
[   25.359634] 
[   25.359698] The buggy address belongs to the object at ffff8881053b7300
[   25.359698]  which belongs to the cache kmalloc-128 of size 128
[   25.360280] The buggy address is located 0 bytes inside of
[   25.360280]  freed 128-byte region [ffff8881053b7300, ffff8881053b7380)
[   25.360720] 
[   25.361035] The buggy address belongs to the physical page:
[   25.361267] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053b7
[   25.361576] flags: 0x200000000000000(node=0|zone=2)
[   25.361887] page_type: f5(slab)
[   25.362034] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   25.362348] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.362568] page dumped because: kasan: bad access detected
[   25.362738] 
[   25.362874] Memory state around the buggy address:
[   25.363034]  ffff8881053b7200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.363319]  ffff8881053b7280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.363632] >ffff8881053b7300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.364015]                    ^
[   25.364181]  ffff8881053b7380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.364498]  ffff8881053b7400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.364769] ==================================================================
[   25.365986] ==================================================================
[   25.366354] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5e4/0x6c0
[   25.366655] Read of size 1 at addr ffff8881053b7378 by task kunit_try_catch/244
[   25.366989] 
[   25.367096] CPU: 0 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250718 #1 PREEMPT(voluntary) 
[   25.367141] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.367152] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.367172] Call Trace:
[   25.367189]  <TASK>
[   25.367204]  dump_stack_lvl+0x73/0xb0
[   25.367244]  print_report+0xd1/0x640
[   25.367264]  ? __virt_addr_valid+0x1db/0x2d0
[   25.367286]  ? ksize_uaf+0x5e4/0x6c0
[   25.367305]  ? kasan_complete_mode_report_info+0x64/0x200
[   25.367329]  ? ksize_uaf+0x5e4/0x6c0
[   25.367348]  kasan_report+0x141/0x180
[   25.367368]  ? ksize_uaf+0x5e4/0x6c0
[   25.367392]  __asan_report_load1_noabort+0x18/0x20
[   25.367414]  ksize_uaf+0x5e4/0x6c0
[   25.367434]  ? __pfx_ksize_uaf+0x10/0x10
[   25.367454]  ? __schedule+0x10da/0x2b60
[   25.367476]  ? __pfx_read_tsc+0x10/0x10
[   25.367496]  ? ktime_get_ts64+0x86/0x230
[   25.367519]  kunit_try_run_case+0x1a5/0x480
[   25.367541]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.367562]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.367594]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.367625]  ? __kthread_parkme+0x82/0x180
[   25.367644]  ? preempt_count_sub+0x50/0x80
[   25.367666]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.367688]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.367710]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.367731]  kthread+0x337/0x6f0
[   25.367749]  ? trace_preempt_on+0x20/0xc0
[   25.367773]  ? __pfx_kthread+0x10/0x10
[   25.367794]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.367825]  ? calculate_sigpending+0x7b/0xa0
[   25.367848]  ? __pfx_kthread+0x10/0x10
[   25.367868]  ret_from_fork+0x116/0x1d0
[   25.367885]  ? __pfx_kthread+0x10/0x10
[   25.367904]  ret_from_fork_asm+0x1a/0x30
[   25.367934]  </TASK>
[   25.367944] 
[   25.377035] Allocated by task 244:
[   25.377657]  kasan_save_stack+0x45/0x70
[   25.378094]  kasan_save_track+0x18/0x40
[   25.378267]  kasan_save_alloc_info+0x3b/0x50
[   25.378479]  __kasan_kmalloc+0xb7/0xc0
[   25.378666]  __kmalloc_cache_noprof+0x189/0x420
[   25.378859]  ksize_uaf+0xaa/0x6c0
[   25.379023]  kunit_try_run_case+0x1a5/0x480
[   25.379230]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.379463]  kthread+0x337/0x6f0
[   25.379612]  ret_from_fork+0x116/0x1d0
[   25.379785]  ret_from_fork_asm+0x1a/0x30
[   25.379970] 
[   25.380046] Freed by task 244:
[   25.380205]  kasan_save_stack+0x45/0x70
[   25.380640]  kasan_save_track+0x18/0x40
[   25.380776]  kasan_save_free_info+0x3f/0x60
[   25.381010]  __kasan_slab_free+0x56/0x70
[   25.381185]  kfree+0x222/0x3f0
[   25.381361]  ksize_uaf+0x12c/0x6c0
[   25.381547]  kunit_try_run_case+0x1a5/0x480
[   25.381769]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.382102]  kthread+0x337/0x6f0
[   25.382277]  ret_from_fork+0x116/0x1d0
[   25.382439]  ret_from_fork_asm+0x1a/0x30
[   25.382642] 
[   25.382759] The buggy address belongs to the object at ffff8881053b7300
[   25.382759]  which belongs to the cache kmalloc-128 of size 128
[   25.383348] The buggy address is located 120 bytes inside of
[   25.383348]  freed 128-byte region [ffff8881053b7300, ffff8881053b7380)
[   25.383913] 
[   25.384032] The buggy address belongs to the physical page:
[   25.384260] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1053b7
[   25.384599] flags: 0x200000000000000(node=0|zone=2)
[   25.385059] page_type: f5(slab)
[   25.385214] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   25.385565] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.385978] page dumped because: kasan: bad access detected
[   25.386262] 
[   25.386349] Memory state around the buggy address:
[   25.386566]  ffff8881053b7200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.386931]  ffff8881053b7280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.387214] >ffff8881053b7300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.387542]                                                                 ^
[   25.387908]  ffff8881053b7380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.388233]  ffff8881053b7400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.388543] ==================================================================