Hay
Date
July 23, 2025, 3:10 a.m.

Environment
qemu-arm64
qemu-x86_64

[   31.299890] ==================================================================
[   31.299972] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8
[   31.300111] Read of size 1 at addr fff00000c99bcf78 by task kunit_try_catch/229
[   31.300189] 
[   31.300249] CPU: 0 UID: 0 PID: 229 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   31.300427] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   31.300460] Hardware name: linux,dummy-virt (DT)
[   31.300492] Call trace:
[   31.300515]  show_stack+0x20/0x38 (C)
[   31.300850]  dump_stack_lvl+0x8c/0xd0
[   31.300967]  print_report+0x118/0x5e8
[   31.301087]  kasan_report+0xdc/0x128
[   31.301191]  __asan_report_load1_noabort+0x20/0x30
[   31.301281]  ksize_uaf+0x544/0x5f8
[   31.301407]  kunit_try_run_case+0x170/0x3f0
[   31.301451]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.301503]  kthread+0x328/0x630
[   31.301789]  ret_from_fork+0x10/0x20
[   31.301941] 
[   31.302012] Allocated by task 229:
[   31.302081]  kasan_save_stack+0x3c/0x68
[   31.302247]  kasan_save_track+0x20/0x40
[   31.302352]  kasan_save_alloc_info+0x40/0x58
[   31.302722]  __kasan_kmalloc+0xd4/0xd8
[   31.302797]  __kmalloc_cache_noprof+0x16c/0x3c0
[   31.302916]  ksize_uaf+0xb8/0x5f8
[   31.302974]  kunit_try_run_case+0x170/0x3f0
[   31.303496]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.303882]  kthread+0x328/0x630
[   31.303977]  ret_from_fork+0x10/0x20
[   31.304044] 
[   31.304088] Freed by task 229:
[   31.304153]  kasan_save_stack+0x3c/0x68
[   31.304227]  kasan_save_track+0x20/0x40
[   31.304281]  kasan_save_free_info+0x4c/0x78
[   31.304421]  __kasan_slab_free+0x6c/0x98
[   31.304621]  kfree+0x214/0x3c8
[   31.304768]  ksize_uaf+0x11c/0x5f8
[   31.304807]  kunit_try_run_case+0x170/0x3f0
[   31.304843]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.305138]  kthread+0x328/0x630
[   31.305318]  ret_from_fork+0x10/0x20
[   31.305402] 
[   31.305805] The buggy address belongs to the object at fff00000c99bcf00
[   31.305805]  which belongs to the cache kmalloc-128 of size 128
[   31.305879] The buggy address is located 120 bytes inside of
[   31.305879]  freed 128-byte region [fff00000c99bcf00, fff00000c99bcf80)
[   31.306124] 
[   31.306333] The buggy address belongs to the physical page:
[   31.306458] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1099bc
[   31.306594] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.306692] page_type: f5(slab)
[   31.306795] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   31.306846] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.307053] page dumped because: kasan: bad access detected
[   31.307240] 
[   31.307284] Memory state around the buggy address:
[   31.307349]  fff00000c99bce00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.307679]  fff00000c99bce80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.307771] >fff00000c99bcf00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.307921]                                                                 ^
[   31.307996]  fff00000c99bcf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.308099]  fff00000c99bd000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.308138] ==================================================================
[   31.279873] ==================================================================
[   31.280164] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8
[   31.280444] Read of size 1 at addr fff00000c99bcf00 by task kunit_try_catch/229
[   31.280514] 
[   31.281403] CPU: 0 UID: 0 PID: 229 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   31.281524] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   31.281591] Hardware name: linux,dummy-virt (DT)
[   31.281644] Call trace:
[   31.281676]  show_stack+0x20/0x38 (C)
[   31.281755]  dump_stack_lvl+0x8c/0xd0
[   31.281940]  print_report+0x118/0x5e8
[   31.281997]  kasan_report+0xdc/0x128
[   31.282040]  __kasan_check_byte+0x54/0x70
[   31.282084]  ksize+0x30/0x88
[   31.282129]  ksize_uaf+0x168/0x5f8
[   31.282173]  kunit_try_run_case+0x170/0x3f0
[   31.282219]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.282270]  kthread+0x328/0x630
[   31.282310]  ret_from_fork+0x10/0x20
[   31.282362] 
[   31.282381] Allocated by task 229:
[   31.282410]  kasan_save_stack+0x3c/0x68
[   31.282450]  kasan_save_track+0x20/0x40
[   31.282486]  kasan_save_alloc_info+0x40/0x58
[   31.282523]  __kasan_kmalloc+0xd4/0xd8
[   31.282558]  __kmalloc_cache_noprof+0x16c/0x3c0
[   31.282609]  ksize_uaf+0xb8/0x5f8
[   31.282682]  kunit_try_run_case+0x170/0x3f0
[   31.282764]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.282870]  kthread+0x328/0x630
[   31.282911]  ret_from_fork+0x10/0x20
[   31.282946] 
[   31.282964] Freed by task 229:
[   31.282991]  kasan_save_stack+0x3c/0x68
[   31.283067]  kasan_save_track+0x20/0x40
[   31.283198]  kasan_save_free_info+0x4c/0x78
[   31.283237]  __kasan_slab_free+0x6c/0x98
[   31.283281]  kfree+0x214/0x3c8
[   31.283326]  ksize_uaf+0x11c/0x5f8
[   31.283363]  kunit_try_run_case+0x170/0x3f0
[   31.283401]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.283444]  kthread+0x328/0x630
[   31.283477]  ret_from_fork+0x10/0x20
[   31.283514] 
[   31.283532] The buggy address belongs to the object at fff00000c99bcf00
[   31.283532]  which belongs to the cache kmalloc-128 of size 128
[   31.283591] The buggy address is located 0 bytes inside of
[   31.283591]  freed 128-byte region [fff00000c99bcf00, fff00000c99bcf80)
[   31.283674] 
[   31.283777] The buggy address belongs to the physical page:
[   31.283846] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1099bc
[   31.284677] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.284740] page_type: f5(slab)
[   31.284787] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   31.284839] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.285525] page dumped because: kasan: bad access detected
[   31.286126] 
[   31.286175] Memory state around the buggy address:
[   31.286212]  fff00000c99bce00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.286256]  fff00000c99bce80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.286826] >fff00000c99bcf00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.287240]                    ^
[   31.287293]  fff00000c99bcf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.287337]  fff00000c99bd000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.287875] ==================================================================
[   31.289784] ==================================================================
[   31.289867] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8
[   31.290225] Read of size 1 at addr fff00000c99bcf00 by task kunit_try_catch/229
[   31.290368] 
[   31.290411] CPU: 0 UID: 0 PID: 229 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc7-next-20250723 #1 PREEMPT 
[   31.290503] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   31.290586] Hardware name: linux,dummy-virt (DT)
[   31.290681] Call trace:
[   31.290729]  show_stack+0x20/0x38 (C)
[   31.290853]  dump_stack_lvl+0x8c/0xd0
[   31.290916]  print_report+0x118/0x5e8
[   31.290960]  kasan_report+0xdc/0x128
[   31.291009]  __asan_report_load1_noabort+0x20/0x30
[   31.291054]  ksize_uaf+0x598/0x5f8
[   31.291098]  kunit_try_run_case+0x170/0x3f0
[   31.291144]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.291505]  kthread+0x328/0x630
[   31.291589]  ret_from_fork+0x10/0x20
[   31.291710] 
[   31.291734] Allocated by task 229:
[   31.291762]  kasan_save_stack+0x3c/0x68
[   31.291812]  kasan_save_track+0x20/0x40
[   31.291856]  kasan_save_alloc_info+0x40/0x58
[   31.291892]  __kasan_kmalloc+0xd4/0xd8
[   31.292185]  __kmalloc_cache_noprof+0x16c/0x3c0
[   31.292251]  ksize_uaf+0xb8/0x5f8
[   31.292554]  kunit_try_run_case+0x170/0x3f0
[   31.292771]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.292870]  kthread+0x328/0x630
[   31.293013]  ret_from_fork+0x10/0x20
[   31.293090] 
[   31.293184] Freed by task 229:
[   31.293215]  kasan_save_stack+0x3c/0x68
[   31.293254]  kasan_save_track+0x20/0x40
[   31.293297]  kasan_save_free_info+0x4c/0x78
[   31.293344]  __kasan_slab_free+0x6c/0x98
[   31.293754]  kfree+0x214/0x3c8
[   31.293856]  ksize_uaf+0x11c/0x5f8
[   31.293954]  kunit_try_run_case+0x170/0x3f0
[   31.294097]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.294196]  kthread+0x328/0x630
[   31.294305]  ret_from_fork+0x10/0x20
[   31.294363] 
[   31.294383] The buggy address belongs to the object at fff00000c99bcf00
[   31.294383]  which belongs to the cache kmalloc-128 of size 128
[   31.294816] The buggy address is located 0 bytes inside of
[   31.294816]  freed 128-byte region [fff00000c99bcf00, fff00000c99bcf80)
[   31.294917] 
[   31.294992] The buggy address belongs to the physical page:
[   31.295084] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1099bc
[   31.295339] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.295568] page_type: f5(slab)
[   31.295631] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   31.296007] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.296061] page dumped because: kasan: bad access detected
[   31.296373] 
[   31.296437] Memory state around the buggy address:
[   31.296525]  fff00000c99bce00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.296592]  fff00000c99bce80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.296727] >fff00000c99bcf00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.296837]                    ^
[   31.296880]  fff00000c99bcf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.297000]  fff00000c99bd000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.297039] ==================================================================

[   25.690357] ==================================================================
[   25.690797] BUG: KASAN: slab-use-after-free in ksize_uaf+0x19d/0x6c0
[   25.691211] Read of size 1 at addr ffff888104657f00 by task kunit_try_catch/245
[   25.691458] 
[   25.691572] CPU: 1 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250723 #1 PREEMPT(voluntary) 
[   25.691735] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.691748] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.691770] Call Trace:
[   25.691783]  <TASK>
[   25.691801]  dump_stack_lvl+0x73/0xb0
[   25.691832]  print_report+0xd1/0x640
[   25.691856]  ? __virt_addr_valid+0x1db/0x2d0
[   25.691880]  ? ksize_uaf+0x19d/0x6c0
[   25.691900]  ? kasan_complete_mode_report_info+0x64/0x200
[   25.691926]  ? ksize_uaf+0x19d/0x6c0
[   25.691947]  kasan_report+0x141/0x180
[   25.691969]  ? ksize_uaf+0x19d/0x6c0
[   25.691992]  ? ksize_uaf+0x19d/0x6c0
[   25.692013]  __kasan_check_byte+0x3d/0x50
[   25.692045]  ksize+0x20/0x60
[   25.692067]  ksize_uaf+0x19d/0x6c0
[   25.692088]  ? __pfx_ksize_uaf+0x10/0x10
[   25.692109]  ? __schedule+0x10da/0x2b60
[   25.692134]  ? __pfx_read_tsc+0x10/0x10
[   25.692168]  ? ktime_get_ts64+0x86/0x230
[   25.692193]  kunit_try_run_case+0x1a5/0x480
[   25.692218]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.692241]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.692266]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.692291]  ? __kthread_parkme+0x82/0x180
[   25.692311]  ? preempt_count_sub+0x50/0x80
[   25.692334]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.692358]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.692432]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.692457]  kthread+0x337/0x6f0
[   25.692477]  ? trace_preempt_on+0x20/0xc0
[   25.692501]  ? __pfx_kthread+0x10/0x10
[   25.692521]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.692545]  ? calculate_sigpending+0x7b/0xa0
[   25.692569]  ? __pfx_kthread+0x10/0x10
[   25.692590]  ret_from_fork+0x116/0x1d0
[   25.692610]  ? __pfx_kthread+0x10/0x10
[   25.692630]  ret_from_fork_asm+0x1a/0x30
[   25.692662]  </TASK>
[   25.692673] 
[   25.700373] Allocated by task 245:
[   25.700600]  kasan_save_stack+0x45/0x70
[   25.700771]  kasan_save_track+0x18/0x40
[   25.700903]  kasan_save_alloc_info+0x3b/0x50
[   25.701053]  __kasan_kmalloc+0xb7/0xc0
[   25.701194]  __kmalloc_cache_noprof+0x189/0x420
[   25.701349]  ksize_uaf+0xaa/0x6c0
[   25.701512]  kunit_try_run_case+0x1a5/0x480
[   25.701714]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.702081]  kthread+0x337/0x6f0
[   25.702251]  ret_from_fork+0x116/0x1d0
[   25.702432]  ret_from_fork_asm+0x1a/0x30
[   25.702622] 
[   25.702965] Freed by task 245:
[   25.703121]  kasan_save_stack+0x45/0x70
[   25.703273]  kasan_save_track+0x18/0x40
[   25.703585]  kasan_save_free_info+0x3f/0x60
[   25.703777]  __kasan_slab_free+0x56/0x70
[   25.704055]  kfree+0x222/0x3f0
[   25.704200]  ksize_uaf+0x12c/0x6c0
[   25.704418]  kunit_try_run_case+0x1a5/0x480
[   25.704614]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.704842]  kthread+0x337/0x6f0
[   25.705014]  ret_from_fork+0x116/0x1d0
[   25.705182]  ret_from_fork_asm+0x1a/0x30
[   25.705357] 
[   25.705493] The buggy address belongs to the object at ffff888104657f00
[   25.705493]  which belongs to the cache kmalloc-128 of size 128
[   25.705941] The buggy address is located 0 bytes inside of
[   25.705941]  freed 128-byte region [ffff888104657f00, ffff888104657f80)
[   25.706496] 
[   25.706607] The buggy address belongs to the physical page:
[   25.706867] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104657
[   25.707229] flags: 0x200000000000000(node=0|zone=2)
[   25.707532] page_type: f5(slab)
[   25.707690] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   25.708031] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.708264] page dumped because: kasan: bad access detected
[   25.708432] 
[   25.708495] Memory state around the buggy address:
[   25.708647]  ffff888104657e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.708860]  ffff888104657e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.709071] >ffff888104657f00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.709386]                    ^
[   25.709660]  ffff888104657f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.709996]  ffff888104658000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.710320] ==================================================================
[   25.733404] ==================================================================
[   25.734333] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5e4/0x6c0
[   25.734652] Read of size 1 at addr ffff888104657f78 by task kunit_try_catch/245
[   25.734983] 
[   25.735091] CPU: 1 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250723 #1 PREEMPT(voluntary) 
[   25.735141] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.735165] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.735186] Call Trace:
[   25.735206]  <TASK>
[   25.735225]  dump_stack_lvl+0x73/0xb0
[   25.735253]  print_report+0xd1/0x640
[   25.735276]  ? __virt_addr_valid+0x1db/0x2d0
[   25.735300]  ? ksize_uaf+0x5e4/0x6c0
[   25.735320]  ? kasan_complete_mode_report_info+0x64/0x200
[   25.735346]  ? ksize_uaf+0x5e4/0x6c0
[   25.735366]  kasan_report+0x141/0x180
[   25.735388]  ? ksize_uaf+0x5e4/0x6c0
[   25.735413]  __asan_report_load1_noabort+0x18/0x20
[   25.735436]  ksize_uaf+0x5e4/0x6c0
[   25.735457]  ? __pfx_ksize_uaf+0x10/0x10
[   25.735478]  ? __schedule+0x10da/0x2b60
[   25.735502]  ? __pfx_read_tsc+0x10/0x10
[   25.735524]  ? ktime_get_ts64+0x86/0x230
[   25.735548]  kunit_try_run_case+0x1a5/0x480
[   25.735572]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.735594]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.735622]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.735647]  ? __kthread_parkme+0x82/0x180
[   25.735668]  ? preempt_count_sub+0x50/0x80
[   25.735691]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.735715]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.735738]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.735761]  kthread+0x337/0x6f0
[   25.735781]  ? trace_preempt_on+0x20/0xc0
[   25.735806]  ? __pfx_kthread+0x10/0x10
[   25.735899]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.735928]  ? calculate_sigpending+0x7b/0xa0
[   25.735952]  ? __pfx_kthread+0x10/0x10
[   25.735974]  ret_from_fork+0x116/0x1d0
[   25.735994]  ? __pfx_kthread+0x10/0x10
[   25.736015]  ret_from_fork_asm+0x1a/0x30
[   25.736046]  </TASK>
[   25.736057] 
[   25.744351] Allocated by task 245:
[   25.744554]  kasan_save_stack+0x45/0x70
[   25.744699]  kasan_save_track+0x18/0x40
[   25.744828]  kasan_save_alloc_info+0x3b/0x50
[   25.745287]  __kasan_kmalloc+0xb7/0xc0
[   25.745707]  __kmalloc_cache_noprof+0x189/0x420
[   25.745968]  ksize_uaf+0xaa/0x6c0
[   25.746129]  kunit_try_run_case+0x1a5/0x480
[   25.746283]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.746764]  kthread+0x337/0x6f0
[   25.746919]  ret_from_fork+0x116/0x1d0
[   25.747050]  ret_from_fork_asm+0x1a/0x30
[   25.747196] 
[   25.747262] Freed by task 245:
[   25.747369]  kasan_save_stack+0x45/0x70
[   25.747500]  kasan_save_track+0x18/0x40
[   25.747807]  kasan_save_free_info+0x3f/0x60
[   25.748106]  __kasan_slab_free+0x56/0x70
[   25.748310]  kfree+0x222/0x3f0
[   25.748465]  ksize_uaf+0x12c/0x6c0
[   25.748634]  kunit_try_run_case+0x1a5/0x480
[   25.748835]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.749455]  kthread+0x337/0x6f0
[   25.749611]  ret_from_fork+0x116/0x1d0
[   25.749742]  ret_from_fork_asm+0x1a/0x30
[   25.749877] 
[   25.749942] The buggy address belongs to the object at ffff888104657f00
[   25.749942]  which belongs to the cache kmalloc-128 of size 128
[   25.750794] The buggy address is located 120 bytes inside of
[   25.750794]  freed 128-byte region [ffff888104657f00, ffff888104657f80)
[   25.751354] 
[   25.751424] The buggy address belongs to the physical page:
[   25.751598] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104657
[   25.751838] flags: 0x200000000000000(node=0|zone=2)
[   25.751996] page_type: f5(slab)
[   25.752111] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   25.752344] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.752783] page dumped because: kasan: bad access detected
[   25.753023] 
[   25.753109] Memory state around the buggy address:
[   25.753336]  ffff888104657e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.753640]  ffff888104657e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.753940] >ffff888104657f00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.754255]                                                                 ^
[   25.754555]  ffff888104657f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.754828]  ffff888104658000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.755028] ==================================================================
[   25.710980] ==================================================================
[   25.711725] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5fe/0x6c0
[   25.712136] Read of size 1 at addr ffff888104657f00 by task kunit_try_catch/245
[   25.712545] 
[   25.712641] CPU: 1 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250723 #1 PREEMPT(voluntary) 
[   25.712690] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.712703] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.712725] Call Trace:
[   25.712740]  <TASK>
[   25.712758]  dump_stack_lvl+0x73/0xb0
[   25.712787]  print_report+0xd1/0x640
[   25.712809]  ? __virt_addr_valid+0x1db/0x2d0
[   25.712833]  ? ksize_uaf+0x5fe/0x6c0
[   25.712853]  ? kasan_complete_mode_report_info+0x64/0x200
[   25.712879]  ? ksize_uaf+0x5fe/0x6c0
[   25.712900]  kasan_report+0x141/0x180
[   25.712922]  ? ksize_uaf+0x5fe/0x6c0
[   25.712947]  __asan_report_load1_noabort+0x18/0x20
[   25.712972]  ksize_uaf+0x5fe/0x6c0
[   25.712993]  ? __pfx_ksize_uaf+0x10/0x10
[   25.713014]  ? __schedule+0x10da/0x2b60
[   25.713038]  ? __pfx_read_tsc+0x10/0x10
[   25.713061]  ? ktime_get_ts64+0x86/0x230
[   25.713085]  kunit_try_run_case+0x1a5/0x480
[   25.713109]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.713131]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.713168]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.713193]  ? __kthread_parkme+0x82/0x180
[   25.713212]  ? preempt_count_sub+0x50/0x80
[   25.713235]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.713259]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.713282]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.713305]  kthread+0x337/0x6f0
[   25.713325]  ? trace_preempt_on+0x20/0xc0
[   25.713350]  ? __pfx_kthread+0x10/0x10
[   25.713370]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.713443]  ? calculate_sigpending+0x7b/0xa0
[   25.713467]  ? __pfx_kthread+0x10/0x10
[   25.713489]  ret_from_fork+0x116/0x1d0
[   25.713509]  ? __pfx_kthread+0x10/0x10
[   25.713529]  ret_from_fork_asm+0x1a/0x30
[   25.713560]  </TASK>
[   25.713572] 
[   25.721095] Allocated by task 245:
[   25.721269]  kasan_save_stack+0x45/0x70
[   25.721417]  kasan_save_track+0x18/0x40
[   25.721801]  kasan_save_alloc_info+0x3b/0x50
[   25.722008]  __kasan_kmalloc+0xb7/0xc0
[   25.722171]  __kmalloc_cache_noprof+0x189/0x420
[   25.722390]  ksize_uaf+0xaa/0x6c0
[   25.722518]  kunit_try_run_case+0x1a5/0x480
[   25.722712]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.722934]  kthread+0x337/0x6f0
[   25.723102]  ret_from_fork+0x116/0x1d0
[   25.723271]  ret_from_fork_asm+0x1a/0x30
[   25.723440] 
[   25.723530] Freed by task 245:
[   25.723644]  kasan_save_stack+0x45/0x70
[   25.723775]  kasan_save_track+0x18/0x40
[   25.723904]  kasan_save_free_info+0x3f/0x60
[   25.724044]  __kasan_slab_free+0x56/0x70
[   25.724185]  kfree+0x222/0x3f0
[   25.724298]  ksize_uaf+0x12c/0x6c0
[   25.724417]  kunit_try_run_case+0x1a5/0x480
[   25.724556]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.724724]  kthread+0x337/0x6f0
[   25.724839]  ret_from_fork+0x116/0x1d0
[   25.724964]  ret_from_fork_asm+0x1a/0x30
[   25.725098] 
[   25.725470] The buggy address belongs to the object at ffff888104657f00
[   25.725470]  which belongs to the cache kmalloc-128 of size 128
[   25.726102] The buggy address is located 0 bytes inside of
[   25.726102]  freed 128-byte region [ffff888104657f00, ffff888104657f80)
[   25.726973] 
[   25.727122] The buggy address belongs to the physical page:
[   25.727381] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104657
[   25.728063] flags: 0x200000000000000(node=0|zone=2)
[   25.728311] page_type: f5(slab)
[   25.728762] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   25.729121] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.729589] page dumped because: kasan: bad access detected
[   25.729849] 
[   25.729916] Memory state around the buggy address:
[   25.730263]  ffff888104657e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.730680]  ffff888104657e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.730896] >ffff888104657f00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.731574]                    ^
[   25.731716]  ffff888104657f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.732077]  ffff888104658000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.732840] ==================================================================