Hay
Date
June 2, 2025, 2:10 p.m.

Environment
qemu-arm64
qemu-x86_64

[   20.529409] ==================================================================
[   20.529976] BUG: KASAN: slab-use-after-free in ksize_uaf+0x578/0x5d0
[   20.530529] Read of size 1 at addr fff00000c6492d00 by task kunit_try_catch/183
[   20.530961] 
[   20.531576] CPU: 1 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   20.531804] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.531877] Hardware name: linux,dummy-virt (DT)
[   20.531957] Call trace:
[   20.532010]  dump_backtrace+0x9c/0x128
[   20.532894]  show_stack+0x20/0x38
[   20.532962]  dump_stack_lvl+0x8c/0xd0
[   20.533014]  print_report+0x118/0x5f0
[   20.533057]  kasan_report+0xdc/0x128
[   20.533099]  __asan_report_load1_noabort+0x20/0x30
[   20.533145]  ksize_uaf+0x578/0x5d0
[   20.533189]  kunit_try_run_case+0x170/0x3f0
[   20.533233]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.533319]  kthread+0x24c/0x2d0
[   20.533363]  ret_from_fork+0x10/0x20
[   20.533411] 
[   20.538819] Allocated by task 183:
[   20.539535]  kasan_save_stack+0x3c/0x68
[   20.540171]  kasan_save_track+0x20/0x40
[   20.540619]  kasan_save_alloc_info+0x40/0x58
[   20.541128]  __kasan_kmalloc+0xd4/0xd8
[   20.541523]  __kmalloc_cache_noprof+0x154/0x320
[   20.542072]  ksize_uaf+0xb8/0x5d0
[   20.542545]  kunit_try_run_case+0x170/0x3f0
[   20.542907]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.543752]  kthread+0x24c/0x2d0
[   20.544151]  ret_from_fork+0x10/0x20
[   20.544567] 
[   20.544885] Freed by task 183:
[   20.545221]  kasan_save_stack+0x3c/0x68
[   20.545732]  kasan_save_track+0x20/0x40
[   20.546191]  kasan_save_free_info+0x4c/0x78
[   20.546733]  __kasan_slab_free+0x6c/0x98
[   20.547553]  kfree+0x110/0x3b8
[   20.547958]  ksize_uaf+0x120/0x5d0
[   20.548205]  kunit_try_run_case+0x170/0x3f0
[   20.548477]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.548853]  kthread+0x24c/0x2d0
[   20.549326]  ret_from_fork+0x10/0x20
[   20.549809] 
[   20.550346] The buggy address belongs to the object at fff00000c6492d00
[   20.550346]  which belongs to the cache kmalloc-128 of size 128
[   20.551898] The buggy address is located 0 bytes inside of
[   20.551898]  freed 128-byte region [fff00000c6492d00, fff00000c6492d80)
[   20.552786] 
[   20.553060] The buggy address belongs to the physical page:
[   20.553674] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106492
[   20.554274] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.554848] page_type: f5(slab)
[   20.555598] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.556285] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   20.556816] page dumped because: kasan: bad access detected
[   20.557318] 
[   20.557603] Memory state around the buggy address:
[   20.557989]  fff00000c6492c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.558639]  fff00000c6492c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.559169] >fff00000c6492d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.560011]                    ^
[   20.560445]  fff00000c6492d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.561084]  fff00000c6492e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.561661] ==================================================================
[   20.493577] ==================================================================
[   20.494341] BUG: KASAN: slab-use-after-free in ksize_uaf+0x174/0x5d0
[   20.495138] Read of size 1 at addr fff00000c6492d00 by task kunit_try_catch/183
[   20.496223] 
[   20.496597] CPU: 1 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   20.496834] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.496920] Hardware name: linux,dummy-virt (DT)
[   20.497004] Call trace:
[   20.497060]  dump_backtrace+0x9c/0x128
[   20.497143]  show_stack+0x20/0x38
[   20.497188]  dump_stack_lvl+0x8c/0xd0
[   20.497256]  print_report+0x118/0x5f0
[   20.497325]  kasan_report+0xdc/0x128
[   20.497368]  __kasan_check_byte+0x54/0x70
[   20.497411]  ksize+0x30/0x88
[   20.497451]  ksize_uaf+0x174/0x5d0
[   20.497508]  kunit_try_run_case+0x170/0x3f0
[   20.497559]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.497611]  kthread+0x24c/0x2d0
[   20.497653]  ret_from_fork+0x10/0x20
[   20.497701] 
[   20.503536] Allocated by task 183:
[   20.504041]  kasan_save_stack+0x3c/0x68
[   20.504505]  kasan_save_track+0x20/0x40
[   20.504998]  kasan_save_alloc_info+0x40/0x58
[   20.505540]  __kasan_kmalloc+0xd4/0xd8
[   20.506007]  __kmalloc_cache_noprof+0x154/0x320
[   20.506438]  ksize_uaf+0xb8/0x5d0
[   20.506925]  kunit_try_run_case+0x170/0x3f0
[   20.507724]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.508266]  kthread+0x24c/0x2d0
[   20.508694]  ret_from_fork+0x10/0x20
[   20.509114] 
[   20.509421] Freed by task 183:
[   20.509806]  kasan_save_stack+0x3c/0x68
[   20.510249]  kasan_save_track+0x20/0x40
[   20.510755]  kasan_save_free_info+0x4c/0x78
[   20.511568]  __kasan_slab_free+0x6c/0x98
[   20.511968]  kfree+0x110/0x3b8
[   20.512443]  ksize_uaf+0x120/0x5d0
[   20.512839]  kunit_try_run_case+0x170/0x3f0
[   20.513282]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.513882]  kthread+0x24c/0x2d0
[   20.514284]  ret_from_fork+0x10/0x20
[   20.514759] 
[   20.515035] The buggy address belongs to the object at fff00000c6492d00
[   20.515035]  which belongs to the cache kmalloc-128 of size 128
[   20.516102] The buggy address is located 0 bytes inside of
[   20.516102]  freed 128-byte region [fff00000c6492d00, fff00000c6492d80)
[   20.517014] 
[   20.517342] The buggy address belongs to the physical page:
[   20.517869] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106492
[   20.518659] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.519310] page_type: f5(slab)
[   20.520120] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.520800] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   20.521314] page dumped because: kasan: bad access detected
[   20.521885] 
[   20.522166] Memory state around the buggy address:
[   20.522627]  fff00000c6492c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.523278]  fff00000c6492c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.524088] >fff00000c6492d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.524640]                    ^
[   20.525072]  fff00000c6492d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.525639]  fff00000c6492e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.526161] ==================================================================
[   20.564889] ==================================================================
[   20.565334] BUG: KASAN: slab-use-after-free in ksize_uaf+0x53c/0x5d0
[   20.565896] Read of size 1 at addr fff00000c6492d78 by task kunit_try_catch/183
[   20.566461] 
[   20.566770] CPU: 1 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   20.566969] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.567039] Hardware name: linux,dummy-virt (DT)
[   20.567542] Call trace:
[   20.567632]  dump_backtrace+0x9c/0x128
[   20.567753]  show_stack+0x20/0x38
[   20.567801]  dump_stack_lvl+0x8c/0xd0
[   20.567849]  print_report+0x118/0x5f0
[   20.567893]  kasan_report+0xdc/0x128
[   20.567935]  __asan_report_load1_noabort+0x20/0x30
[   20.567983]  ksize_uaf+0x53c/0x5d0
[   20.568025]  kunit_try_run_case+0x170/0x3f0
[   20.568074]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.568124]  kthread+0x24c/0x2d0
[   20.568165]  ret_from_fork+0x10/0x20
[   20.568213] 
[   20.573405] Allocated by task 183:
[   20.573897]  kasan_save_stack+0x3c/0x68
[   20.574453]  kasan_save_track+0x20/0x40
[   20.574957]  kasan_save_alloc_info+0x40/0x58
[   20.575869]  __kasan_kmalloc+0xd4/0xd8
[   20.576323]  __kmalloc_cache_noprof+0x154/0x320
[   20.576921]  ksize_uaf+0xb8/0x5d0
[   20.577385]  kunit_try_run_case+0x170/0x3f0
[   20.577848]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.578388]  kthread+0x24c/0x2d0
[   20.578843]  ret_from_fork+0x10/0x20
[   20.579527] 
[   20.579841] Freed by task 183:
[   20.580208]  kasan_save_stack+0x3c/0x68
[   20.580654]  kasan_save_track+0x20/0x40
[   20.581125]  kasan_save_free_info+0x4c/0x78
[   20.581541]  __kasan_slab_free+0x6c/0x98
[   20.582043]  kfree+0x110/0x3b8
[   20.582391]  ksize_uaf+0x120/0x5d0
[   20.582877]  kunit_try_run_case+0x170/0x3f0
[   20.583546]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.584202]  kthread+0x24c/0x2d0
[   20.584598]  ret_from_fork+0x10/0x20
[   20.585033] 
[   20.585321] The buggy address belongs to the object at fff00000c6492d00
[   20.585321]  which belongs to the cache kmalloc-128 of size 128
[   20.586286] The buggy address is located 120 bytes inside of
[   20.586286]  freed 128-byte region [fff00000c6492d00, fff00000c6492d80)
[   20.588261] 
[   20.588582] The buggy address belongs to the physical page:
[   20.588988] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106492
[   20.589761] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.590424] page_type: f5(slab)
[   20.590885] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.591629] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   20.592463] page dumped because: kasan: bad access detected
[   20.592965] 
[   20.593229] Memory state around the buggy address:
[   20.593786]  fff00000c6492c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.594321]  fff00000c6492c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.594987] >fff00000c6492d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.595536]                                                                 ^
[   20.596320]  fff00000c6492d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.596941]  fff00000c6492e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.597595] ==================================================================

[   12.545736] ==================================================================
[   12.546203] BUG: KASAN: slab-use-after-free in ksize_uaf+0x19e/0x6c0
[   12.546800] Read of size 1 at addr ffff88810261ce00 by task kunit_try_catch/201
[   12.547267] 
[   12.547450] CPU: 0 UID: 0 PID: 201 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   12.547540] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.547563] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.547598] Call Trace:
[   12.547623]  <TASK>
[   12.547651]  dump_stack_lvl+0x73/0xb0
[   12.547740]  print_report+0xd1/0x640
[   12.547783]  ? __virt_addr_valid+0x1db/0x2d0
[   12.547822]  ? ksize_uaf+0x19e/0x6c0
[   12.547853]  ? kasan_complete_mode_report_info+0x64/0x200
[   12.547893]  ? ksize_uaf+0x19e/0x6c0
[   12.547939]  kasan_report+0x140/0x180
[   12.547980]  ? ksize_uaf+0x19e/0x6c0
[   12.548018]  ? ksize_uaf+0x19e/0x6c0
[   12.548083]  __kasan_check_byte+0x3d/0x50
[   12.548129]  ksize+0x20/0x60
[   12.548162]  ksize_uaf+0x19e/0x6c0
[   12.548182]  ? __pfx_ksize_uaf+0x10/0x10
[   12.548200]  ? __schedule+0xc49/0x27a0
[   12.548220]  ? __pfx_read_tsc+0x10/0x10
[   12.548238]  ? ktime_get_ts64+0x84/0x230
[   12.548265]  kunit_try_run_case+0x1a6/0x480
[   12.548286]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.548304]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   12.548324]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.548347]  ? __kthread_parkme+0x82/0x160
[   12.548365]  ? preempt_count_sub+0x50/0x80
[   12.548388]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.548406]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.548429]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.548453]  kthread+0x257/0x310
[   12.548470]  ? __pfx_kthread+0x10/0x10
[   12.548488]  ret_from_fork+0x41/0x80
[   12.548506]  ? __pfx_kthread+0x10/0x10
[   12.548524]  ret_from_fork_asm+0x1a/0x30
[   12.548552]  </TASK>
[   12.548563] 
[   12.555834] Allocated by task 201:
[   12.556145]  kasan_save_stack+0x45/0x70
[   12.556465]  kasan_save_track+0x18/0x40
[   12.556749]  kasan_save_alloc_info+0x3b/0x50
[   12.557081]  __kasan_kmalloc+0xb7/0xc0
[   12.557355]  __kmalloc_cache_noprof+0x168/0x350
[   12.557685]  ksize_uaf+0xab/0x6c0
[   12.557934]  kunit_try_run_case+0x1a6/0x480
[   12.558237]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.558576]  kthread+0x257/0x310
[   12.558749]  ret_from_fork+0x41/0x80
[   12.558917]  ret_from_fork_asm+0x1a/0x30
[   12.559202] 
[   12.559348] Freed by task 201:
[   12.559580]  kasan_save_stack+0x45/0x70
[   12.559867]  kasan_save_track+0x18/0x40
[   12.560167]  kasan_save_free_info+0x3f/0x60
[   12.560455]  __kasan_slab_free+0x56/0x70
[   12.560753]  kfree+0x123/0x3d0
[   12.560943]  ksize_uaf+0x12d/0x6c0
[   12.561193]  kunit_try_run_case+0x1a6/0x480
[   12.561433]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.561731]  kthread+0x257/0x310
[   12.561948]  ret_from_fork+0x41/0x80
[   12.562170]  ret_from_fork_asm+0x1a/0x30
[   12.562344] 
[   12.562446] The buggy address belongs to the object at ffff88810261ce00
[   12.562446]  which belongs to the cache kmalloc-128 of size 128
[   12.562998] The buggy address is located 0 bytes inside of
[   12.562998]  freed 128-byte region [ffff88810261ce00, ffff88810261ce80)
[   12.563785] 
[   12.563940] The buggy address belongs to the physical page:
[   12.564317] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261c
[   12.564832] flags: 0x200000000000000(node=0|zone=2)
[   12.565163] page_type: f5(slab)
[   12.565395] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.565724] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   12.566135] page dumped because: kasan: bad access detected
[   12.566472] 
[   12.566599] Memory state around the buggy address:
[   12.566906]  ffff88810261cd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   12.567315]  ffff88810261cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.567562] >ffff88810261ce00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.567797]                    ^
[   12.567947]  ffff88810261ce80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.568208]  ffff88810261cf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.568436] ==================================================================
[   12.595859] ==================================================================
[   12.596393] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5e6/0x6c0
[   12.597100] Read of size 1 at addr ffff88810261ce78 by task kunit_try_catch/201
[   12.597364] 
[   12.597525] CPU: 0 UID: 0 PID: 201 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   12.597601] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.597624] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.597671] Call Trace:
[   12.597699]  <TASK>
[   12.597728]  dump_stack_lvl+0x73/0xb0
[   12.597785]  print_report+0xd1/0x640
[   12.597829]  ? __virt_addr_valid+0x1db/0x2d0
[   12.597876]  ? ksize_uaf+0x5e6/0x6c0
[   12.597925]  ? kasan_complete_mode_report_info+0x64/0x200
[   12.597972]  ? ksize_uaf+0x5e6/0x6c0
[   12.598013]  kasan_report+0x140/0x180
[   12.598093]  ? ksize_uaf+0x5e6/0x6c0
[   12.598147]  __asan_report_load1_noabort+0x18/0x20
[   12.598195]  ksize_uaf+0x5e6/0x6c0
[   12.598235]  ? __pfx_ksize_uaf+0x10/0x10
[   12.598278]  ? __schedule+0xc49/0x27a0
[   12.598323]  ? __pfx_read_tsc+0x10/0x10
[   12.598364]  ? ktime_get_ts64+0x84/0x230
[   12.598422]  kunit_try_run_case+0x1a6/0x480
[   12.598469]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.598512]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   12.598555]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.598601]  ? __kthread_parkme+0x82/0x160
[   12.598642]  ? preempt_count_sub+0x50/0x80
[   12.598702]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.598746]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.598798]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.598840]  kthread+0x257/0x310
[   12.598870]  ? __pfx_kthread+0x10/0x10
[   12.598904]  ret_from_fork+0x41/0x80
[   12.598938]  ? __pfx_kthread+0x10/0x10
[   12.598968]  ret_from_fork_asm+0x1a/0x30
[   12.599012]  </TASK>
[   12.599031] 
[   12.606787] Allocated by task 201:
[   12.607024]  kasan_save_stack+0x45/0x70
[   12.607257]  kasan_save_track+0x18/0x40
[   12.607518]  kasan_save_alloc_info+0x3b/0x50
[   12.607837]  __kasan_kmalloc+0xb7/0xc0
[   12.608036]  __kmalloc_cache_noprof+0x168/0x350
[   12.608286]  ksize_uaf+0xab/0x6c0
[   12.608481]  kunit_try_run_case+0x1a6/0x480
[   12.608729]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.608930]  kthread+0x257/0x310
[   12.609116]  ret_from_fork+0x41/0x80
[   12.609281]  ret_from_fork_asm+0x1a/0x30
[   12.609448] 
[   12.609546] Freed by task 201:
[   12.609689]  kasan_save_stack+0x45/0x70
[   12.609976]  kasan_save_track+0x18/0x40
[   12.610345]  kasan_save_free_info+0x3f/0x60
[   12.610678]  __kasan_slab_free+0x56/0x70
[   12.610990]  kfree+0x123/0x3d0
[   12.611270]  ksize_uaf+0x12d/0x6c0
[   12.611512]  kunit_try_run_case+0x1a6/0x480
[   12.611824]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.612217]  kthread+0x257/0x310
[   12.612476]  ret_from_fork+0x41/0x80
[   12.612735]  ret_from_fork_asm+0x1a/0x30
[   12.613011] 
[   12.613187] The buggy address belongs to the object at ffff88810261ce00
[   12.613187]  which belongs to the cache kmalloc-128 of size 128
[   12.613615] The buggy address is located 120 bytes inside of
[   12.613615]  freed 128-byte region [ffff88810261ce00, ffff88810261ce80)
[   12.613994] 
[   12.614170] The buggy address belongs to the physical page:
[   12.614512] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261c
[   12.614985] flags: 0x200000000000000(node=0|zone=2)
[   12.615354] page_type: f5(slab)
[   12.615620] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.616019] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   12.616291] page dumped because: kasan: bad access detected
[   12.616478] 
[   12.616576] Memory state around the buggy address:
[   12.616763]  ffff88810261cd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   12.617001]  ffff88810261cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.617259] >ffff88810261ce00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.617487]                                                                 ^
[   12.617919]  ffff88810261ce80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.618423]  ffff88810261cf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.618912] ==================================================================
[   12.569146] ==================================================================
[   12.569681] BUG: KASAN: slab-use-after-free in ksize_uaf+0x600/0x6c0
[   12.570117] Read of size 1 at addr ffff88810261ce00 by task kunit_try_catch/201
[   12.570594] 
[   12.571184] CPU: 0 UID: 0 PID: 201 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   12.571277] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.571301] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.571337] Call Trace:
[   12.571365]  <TASK>
[   12.571394]  dump_stack_lvl+0x73/0xb0
[   12.571451]  print_report+0xd1/0x640
[   12.571497]  ? __virt_addr_valid+0x1db/0x2d0
[   12.571544]  ? ksize_uaf+0x600/0x6c0
[   12.571580]  ? kasan_complete_mode_report_info+0x64/0x200
[   12.571622]  ? ksize_uaf+0x600/0x6c0
[   12.571670]  kasan_report+0x140/0x180
[   12.571711]  ? ksize_uaf+0x600/0x6c0
[   12.571751]  __asan_report_load1_noabort+0x18/0x20
[   12.571785]  ksize_uaf+0x600/0x6c0
[   12.571812]  ? __pfx_ksize_uaf+0x10/0x10
[   12.571845]  ? __schedule+0xc49/0x27a0
[   12.571884]  ? __pfx_read_tsc+0x10/0x10
[   12.571919]  ? ktime_get_ts64+0x84/0x230
[   12.571968]  kunit_try_run_case+0x1a6/0x480
[   12.572003]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.572037]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   12.572110]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.572150]  ? __kthread_parkme+0x82/0x160
[   12.572184]  ? preempt_count_sub+0x50/0x80
[   12.572227]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.572265]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.572308]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.572349]  kthread+0x257/0x310
[   12.572379]  ? __pfx_kthread+0x10/0x10
[   12.572412]  ret_from_fork+0x41/0x80
[   12.572446]  ? __pfx_kthread+0x10/0x10
[   12.572478]  ret_from_fork_asm+0x1a/0x30
[   12.572530]  </TASK>
[   12.572552] 
[   12.579342] Allocated by task 201:
[   12.579513]  kasan_save_stack+0x45/0x70
[   12.579713]  kasan_save_track+0x18/0x40
[   12.579972]  kasan_save_alloc_info+0x3b/0x50
[   12.580281]  __kasan_kmalloc+0xb7/0xc0
[   12.580537]  __kmalloc_cache_noprof+0x168/0x350
[   12.580845]  ksize_uaf+0xab/0x6c0
[   12.581131]  kunit_try_run_case+0x1a6/0x480
[   12.581445]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.581820]  kthread+0x257/0x310
[   12.582101]  ret_from_fork+0x41/0x80
[   12.582388]  ret_from_fork_asm+0x1a/0x30
[   12.582678] 
[   12.582825] Freed by task 201:
[   12.583081]  kasan_save_stack+0x45/0x70
[   12.583387]  kasan_save_track+0x18/0x40
[   12.583665]  kasan_save_free_info+0x3f/0x60
[   12.583947]  __kasan_slab_free+0x56/0x70
[   12.584267]  kfree+0x123/0x3d0
[   12.584465]  ksize_uaf+0x12d/0x6c0
[   12.584599]  kunit_try_run_case+0x1a6/0x480
[   12.584909]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.585251]  kthread+0x257/0x310
[   12.585402]  ret_from_fork+0x41/0x80
[   12.585651]  ret_from_fork_asm+0x1a/0x30
[   12.585935] 
[   12.586119] The buggy address belongs to the object at ffff88810261ce00
[   12.586119]  which belongs to the cache kmalloc-128 of size 128
[   12.586607] The buggy address is located 0 bytes inside of
[   12.586607]  freed 128-byte region [ffff88810261ce00, ffff88810261ce80)
[   12.587208] 
[   12.587356] The buggy address belongs to the physical page:
[   12.587600] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10261c
[   12.588084] flags: 0x200000000000000(node=0|zone=2)
[   12.588326] page_type: f5(slab)
[   12.588541] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.588810] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   12.589075] page dumped because: kasan: bad access detected
[   12.589265] 
[   12.589363] Memory state around the buggy address:
[   12.589543]  ffff88810261cd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   12.589907]  ffff88810261cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.590430] >ffff88810261ce00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.590925]                    ^
[   12.591204]  ffff88810261ce80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.591685]  ffff88810261cf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.592178] ==================================================================