Hay
Date
May 12, 2025, 6:12 p.m.

Environment
qemu-arm64
qemu-x86_64

[   19.292292] ==================================================================
[   19.293173] BUG: KASAN: slab-use-after-free in ksize_uaf+0x548/0x600
[   19.293931] Read of size 1 at addr fff00000c59c2a78 by task kunit_try_catch/185
[   19.294208] 
[   19.294340] CPU: 1 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   19.294443] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.294496] Hardware name: linux,dummy-virt (DT)
[   19.294594] Call trace:
[   19.294647]  show_stack+0x20/0x38 (C)
[   19.294769]  dump_stack_lvl+0x8c/0xd0
[   19.294861]  print_report+0x118/0x608
[   19.294949]  kasan_report+0xdc/0x128
[   19.295052]  __asan_report_load1_noabort+0x20/0x30
[   19.295149]  ksize_uaf+0x548/0x600
[   19.295226]  kunit_try_run_case+0x170/0x3f0
[   19.295334]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.295442]  kthread+0x318/0x620
[   19.295522]  ret_from_fork+0x10/0x20
[   19.295617] 
[   19.303060] Allocated by task 185:
[   19.303319]  kasan_save_stack+0x3c/0x68
[   19.303719]  kasan_save_track+0x20/0x40
[   19.304112]  kasan_save_alloc_info+0x40/0x58
[   19.304530]  __kasan_kmalloc+0xd4/0xd8
[   19.305896]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.306201]  ksize_uaf+0xb8/0x600
[   19.306359]  kunit_try_run_case+0x170/0x3f0
[   19.307036]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.308853]  kthread+0x318/0x620
[   19.309320]  ret_from_fork+0x10/0x20
[   19.309923] 
[   19.310132] Freed by task 185:
[   19.310592]  kasan_save_stack+0x3c/0x68
[   19.311907]  kasan_save_track+0x20/0x40
[   19.312170]  kasan_save_free_info+0x4c/0x78
[   19.312411]  __kasan_slab_free+0x6c/0x98
[   19.312636]  kfree+0x214/0x3c8
[   19.312842]  ksize_uaf+0x11c/0x600
[   19.313050]  kunit_try_run_case+0x170/0x3f0
[   19.313285]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.313564]  kthread+0x318/0x620
[   19.315232]  ret_from_fork+0x10/0x20
[   19.315546] 
[   19.315768] The buggy address belongs to the object at fff00000c59c2a00
[   19.315768]  which belongs to the cache kmalloc-128 of size 128
[   19.317095] The buggy address is located 120 bytes inside of
[   19.317095]  freed 128-byte region [fff00000c59c2a00, fff00000c59c2a80)
[   19.318042] 
[   19.318366] The buggy address belongs to the physical page:
[   19.319049] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c2
[   19.320454] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.321204] page_type: f5(slab)
[   19.321764] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.322586] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.323189] page dumped because: kasan: bad access detected
[   19.323609] 
[   19.324186] Memory state around the buggy address:
[   19.324905]  fff00000c59c2900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.325603]  fff00000c59c2980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.326353] >fff00000c59c2a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.327167]                                                                 ^
[   19.327744]  fff00000c59c2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.328270]  fff00000c59c2b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.329785] ==================================================================
[   19.259123] ==================================================================
[   19.260101] BUG: KASAN: slab-use-after-free in ksize_uaf+0x59c/0x600
[   19.260673] Read of size 1 at addr fff00000c59c2a00 by task kunit_try_catch/185
[   19.261267] 
[   19.261578] CPU: 1 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   19.261816] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.261892] Hardware name: linux,dummy-virt (DT)
[   19.261965] Call trace:
[   19.262023]  show_stack+0x20/0x38 (C)
[   19.262178]  dump_stack_lvl+0x8c/0xd0
[   19.262301]  print_report+0x118/0x608
[   19.262378]  kasan_report+0xdc/0x128
[   19.262430]  __asan_report_load1_noabort+0x20/0x30
[   19.262489]  ksize_uaf+0x59c/0x600
[   19.262859]  kunit_try_run_case+0x170/0x3f0
[   19.262968]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.263071]  kthread+0x318/0x620
[   19.263166]  ret_from_fork+0x10/0x20
[   19.263272] 
[   19.265526] Allocated by task 185:
[   19.265683]  kasan_save_stack+0x3c/0x68
[   19.266208]  kasan_save_track+0x20/0x40
[   19.266865]  kasan_save_alloc_info+0x40/0x58
[   19.268570]  __kasan_kmalloc+0xd4/0xd8
[   19.269203]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.269804]  ksize_uaf+0xb8/0x600
[   19.270366]  kunit_try_run_case+0x170/0x3f0
[   19.271111]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.271976]  kthread+0x318/0x620
[   19.272345]  ret_from_fork+0x10/0x20
[   19.272675] 
[   19.272859] Freed by task 185:
[   19.273101]  kasan_save_stack+0x3c/0x68
[   19.273342]  kasan_save_track+0x20/0x40
[   19.273573]  kasan_save_free_info+0x4c/0x78
[   19.273864]  __kasan_slab_free+0x6c/0x98
[   19.274209]  kfree+0x214/0x3c8
[   19.275806]  ksize_uaf+0x11c/0x600
[   19.276243]  kunit_try_run_case+0x170/0x3f0
[   19.276852]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.277468]  kthread+0x318/0x620
[   19.277985]  ret_from_fork+0x10/0x20
[   19.278503] 
[   19.278885] The buggy address belongs to the object at fff00000c59c2a00
[   19.278885]  which belongs to the cache kmalloc-128 of size 128
[   19.279884] The buggy address is located 0 bytes inside of
[   19.279884]  freed 128-byte region [fff00000c59c2a00, fff00000c59c2a80)
[   19.280484] 
[   19.280625] The buggy address belongs to the physical page:
[   19.280907] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c2
[   19.281268] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.281580] page_type: f5(slab)
[   19.282913] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.283483] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.284556] page dumped because: kasan: bad access detected
[   19.285122] 
[   19.285418] Memory state around the buggy address:
[   19.285912]  fff00000c59c2900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.287499]  fff00000c59c2980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.288128] >fff00000c59c2a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.288807]                    ^
[   19.289289]  fff00000c59c2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.289950]  fff00000c59c2b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.290462] ==================================================================
[   19.223047] ==================================================================
[   19.224264] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x600
[   19.224985] Read of size 1 at addr fff00000c59c2a00 by task kunit_try_catch/185
[   19.225556] 
[   19.225823] CPU: 1 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   19.226016] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.226098] Hardware name: linux,dummy-virt (DT)
[   19.226181] Call trace:
[   19.226246]  show_stack+0x20/0x38 (C)
[   19.226407]  dump_stack_lvl+0x8c/0xd0
[   19.226543]  print_report+0x118/0x608
[   19.226671]  kasan_report+0xdc/0x128
[   19.226799]  __kasan_check_byte+0x54/0x70
[   19.226898]  ksize+0x30/0x88
[   19.226954]  ksize_uaf+0x168/0x600
[   19.227005]  kunit_try_run_case+0x170/0x3f0
[   19.227061]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.227119]  kthread+0x318/0x620
[   19.227167]  ret_from_fork+0x10/0x20
[   19.227223] 
[   19.231449] Allocated by task 185:
[   19.231902]  kasan_save_stack+0x3c/0x68
[   19.232454]  kasan_save_track+0x20/0x40
[   19.233009]  kasan_save_alloc_info+0x40/0x58
[   19.233515]  __kasan_kmalloc+0xd4/0xd8
[   19.233792]  __kmalloc_cache_noprof+0x15c/0x3c0
[   19.234079]  ksize_uaf+0xb8/0x600
[   19.234335]  kunit_try_run_case+0x170/0x3f0
[   19.234805]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.235447]  kthread+0x318/0x620
[   19.235914]  ret_from_fork+0x10/0x20
[   19.236383] 
[   19.236667] Freed by task 185:
[   19.237081]  kasan_save_stack+0x3c/0x68
[   19.237475]  kasan_save_track+0x20/0x40
[   19.237846]  kasan_save_free_info+0x4c/0x78
[   19.238198]  __kasan_slab_free+0x6c/0x98
[   19.238701]  kfree+0x214/0x3c8
[   19.239165]  ksize_uaf+0x11c/0x600
[   19.239610]  kunit_try_run_case+0x170/0x3f0
[   19.240163]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.240791]  kthread+0x318/0x620
[   19.241218]  ret_from_fork+0x10/0x20
[   19.241648] 
[   19.241922] The buggy address belongs to the object at fff00000c59c2a00
[   19.241922]  which belongs to the cache kmalloc-128 of size 128
[   19.242752] The buggy address is located 0 bytes inside of
[   19.242752]  freed 128-byte region [fff00000c59c2a00, fff00000c59c2a80)
[   19.243700] 
[   19.244049] The buggy address belongs to the physical page:
[   19.244627] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c2
[   19.245134] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.245732] page_type: f5(slab)
[   19.246192] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.247183] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.248001] page dumped because: kasan: bad access detected
[   19.248679] 
[   19.249001] Memory state around the buggy address:
[   19.249463]  fff00000c59c2900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.252373]  fff00000c59c2980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.253115] >fff00000c59c2a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.253699]                    ^
[   19.254003]  fff00000c59c2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.256297]  fff00000c59c2b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.257096] ==================================================================

[   12.925287] ==================================================================
[   12.925637] BUG: KASAN: slab-use-after-free in ksize_uaf+0x600/0x6c0
[   12.925959] Read of size 1 at addr ffff888101b0ed00 by task kunit_try_catch/204
[   12.926365] 
[   12.926458] CPU: 1 UID: 0 PID: 204 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   12.926504] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.926516] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.926538] Call Trace:
[   12.926563]  <TASK>
[   12.926583]  dump_stack_lvl+0x73/0xb0
[   12.926613]  print_report+0xd1/0x650
[   12.926635]  ? __virt_addr_valid+0x1db/0x2d0
[   12.926658]  ? ksize_uaf+0x600/0x6c0
[   12.926677]  ? kasan_complete_mode_report_info+0x64/0x200
[   12.926702]  ? ksize_uaf+0x600/0x6c0
[   12.926721]  kasan_report+0x140/0x180
[   12.926742]  ? ksize_uaf+0x600/0x6c0
[   12.926766]  __asan_report_load1_noabort+0x18/0x20
[   12.926788]  ksize_uaf+0x600/0x6c0
[   12.926807]  ? __pfx_ksize_uaf+0x10/0x10
[   12.926827]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   12.926861]  ? trace_hardirqs_on+0x37/0xe0
[   12.926884]  ? __pfx_read_tsc+0x10/0x10
[   12.926905]  ? ktime_get_ts64+0x86/0x230
[   12.926930]  kunit_try_run_case+0x1a6/0x480
[   12.926952]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.926974]  ? queued_spin_lock_slowpath+0x117/0xb40
[   12.927100]  ? __kthread_parkme+0x82/0x160
[   12.927125]  ? preempt_count_sub+0x50/0x80
[   12.927150]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.927172]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.927197]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.927223]  kthread+0x324/0x6e0
[   12.927243]  ? trace_preempt_on+0x20/0xc0
[   12.927266]  ? __pfx_kthread+0x10/0x10
[   12.927287]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.927311]  ? calculate_sigpending+0x7b/0xa0
[   12.927333]  ? __pfx_kthread+0x10/0x10
[   12.927354]  ret_from_fork+0x41/0x80
[   12.927373]  ? __pfx_kthread+0x10/0x10
[   12.927394]  ret_from_fork_asm+0x1a/0x30
[   12.927426]  </TASK>
[   12.927436] 
[   12.934775] Allocated by task 204:
[   12.934978]  kasan_save_stack+0x45/0x70
[   12.935260]  kasan_save_track+0x18/0x40
[   12.935451]  kasan_save_alloc_info+0x3b/0x50
[   12.935653]  __kasan_kmalloc+0xb7/0xc0
[   12.935805]  __kmalloc_cache_noprof+0x18a/0x420
[   12.936202]  ksize_uaf+0xab/0x6c0
[   12.936356]  kunit_try_run_case+0x1a6/0x480
[   12.936556]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.936790]  kthread+0x324/0x6e0
[   12.936931]  ret_from_fork+0x41/0x80
[   12.937189]  ret_from_fork_asm+0x1a/0x30
[   12.937396] 
[   12.937493] Freed by task 204:
[   12.937657]  kasan_save_stack+0x45/0x70
[   12.937867]  kasan_save_track+0x18/0x40
[   12.938162]  kasan_save_free_info+0x3f/0x60
[   12.938341]  __kasan_slab_free+0x56/0x70
[   12.938524]  kfree+0x224/0x3f0
[   12.938694]  ksize_uaf+0x12d/0x6c0
[   12.938883]  kunit_try_run_case+0x1a6/0x480
[   12.939193]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.939432]  kthread+0x324/0x6e0
[   12.939580]  ret_from_fork+0x41/0x80
[   12.939749]  ret_from_fork_asm+0x1a/0x30
[   12.939938] 
[   12.940269] The buggy address belongs to the object at ffff888101b0ed00
[   12.940269]  which belongs to the cache kmalloc-128 of size 128
[   12.940743] The buggy address is located 0 bytes inside of
[   12.940743]  freed 128-byte region [ffff888101b0ed00, ffff888101b0ed80)
[   12.941199] 
[   12.941280] The buggy address belongs to the physical page:
[   12.941507] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b0e
[   12.941876] flags: 0x200000000000000(node=0|zone=2)
[   12.942256] page_type: f5(slab)
[   12.942434] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.942775] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.943218] page dumped because: kasan: bad access detected
[   12.943434] 
[   12.943528] Memory state around the buggy address:
[   12.943737]  ffff888101b0ec00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.944289]  ffff888101b0ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.944521] >ffff888101b0ed00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.944747]                    ^
[   12.944926]  ffff888101b0ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.945364]  ffff888101b0ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.945697] ==================================================================
[   12.946275] ==================================================================
[   12.946633] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5e6/0x6c0
[   12.946933] Read of size 1 at addr ffff888101b0ed78 by task kunit_try_catch/204
[   12.947341] 
[   12.947446] CPU: 1 UID: 0 PID: 204 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   12.947490] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.947502] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.947523] Call Trace:
[   12.947542]  <TASK>
[   12.947561]  dump_stack_lvl+0x73/0xb0
[   12.947589]  print_report+0xd1/0x650
[   12.947610]  ? __virt_addr_valid+0x1db/0x2d0
[   12.947632]  ? ksize_uaf+0x5e6/0x6c0
[   12.947651]  ? kasan_complete_mode_report_info+0x64/0x200
[   12.947675]  ? ksize_uaf+0x5e6/0x6c0
[   12.947695]  kasan_report+0x140/0x180
[   12.947716]  ? ksize_uaf+0x5e6/0x6c0
[   12.947740]  __asan_report_load1_noabort+0x18/0x20
[   12.947763]  ksize_uaf+0x5e6/0x6c0
[   12.947782]  ? __pfx_ksize_uaf+0x10/0x10
[   12.947801]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   12.947824]  ? trace_hardirqs_on+0x37/0xe0
[   12.947859]  ? __pfx_read_tsc+0x10/0x10
[   12.947880]  ? ktime_get_ts64+0x86/0x230
[   12.947905]  kunit_try_run_case+0x1a6/0x480
[   12.947928]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.947950]  ? queued_spin_lock_slowpath+0x117/0xb40
[   12.947971]  ? __kthread_parkme+0x82/0x160
[   12.948254]  ? preempt_count_sub+0x50/0x80
[   12.948289]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.948312]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.948337]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.948363]  kthread+0x324/0x6e0
[   12.948385]  ? trace_preempt_on+0x20/0xc0
[   12.948408]  ? __pfx_kthread+0x10/0x10
[   12.948429]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.948452]  ? calculate_sigpending+0x7b/0xa0
[   12.948474]  ? __pfx_kthread+0x10/0x10
[   12.948496]  ret_from_fork+0x41/0x80
[   12.948514]  ? __pfx_kthread+0x10/0x10
[   12.948535]  ret_from_fork_asm+0x1a/0x30
[   12.948566]  </TASK>
[   12.948577] 
[   12.955691] Allocated by task 204:
[   12.955869]  kasan_save_stack+0x45/0x70
[   12.956305]  kasan_save_track+0x18/0x40
[   12.956465]  kasan_save_alloc_info+0x3b/0x50
[   12.956616]  __kasan_kmalloc+0xb7/0xc0
[   12.956748]  __kmalloc_cache_noprof+0x18a/0x420
[   12.956933]  ksize_uaf+0xab/0x6c0
[   12.957215]  kunit_try_run_case+0x1a6/0x480
[   12.957470]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.957737]  kthread+0x324/0x6e0
[   12.957930]  ret_from_fork+0x41/0x80
[   12.958257]  ret_from_fork_asm+0x1a/0x30
[   12.958464] 
[   12.958560] Freed by task 204:
[   12.958721]  kasan_save_stack+0x45/0x70
[   12.958901]  kasan_save_track+0x18/0x40
[   12.959171]  kasan_save_free_info+0x3f/0x60
[   12.959329]  __kasan_slab_free+0x56/0x70
[   12.959466]  kfree+0x224/0x3f0
[   12.959585]  ksize_uaf+0x12d/0x6c0
[   12.959711]  kunit_try_run_case+0x1a6/0x480
[   12.959926]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.960519]  kthread+0x324/0x6e0
[   12.960712]  ret_from_fork+0x41/0x80
[   12.960905]  ret_from_fork_asm+0x1a/0x30
[   12.961164] 
[   12.961240] The buggy address belongs to the object at ffff888101b0ed00
[   12.961240]  which belongs to the cache kmalloc-128 of size 128
[   12.961781] The buggy address is located 120 bytes inside of
[   12.961781]  freed 128-byte region [ffff888101b0ed00, ffff888101b0ed80)
[   12.962394] 
[   12.962495] The buggy address belongs to the physical page:
[   12.962724] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b0e
[   12.963146] flags: 0x200000000000000(node=0|zone=2)
[   12.963352] page_type: f5(slab)
[   12.963525] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.963797] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.964337] page dumped because: kasan: bad access detected
[   12.964588] 
[   12.964662] Memory state around the buggy address:
[   12.964881]  ffff888101b0ec00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.965268]  ffff888101b0ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.965551] >ffff888101b0ed00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.965852]                                                                 ^
[   12.966249]  ffff888101b0ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.966498]  ffff888101b0ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.966779] ==================================================================
[   12.901085] ==================================================================
[   12.901502] BUG: KASAN: slab-use-after-free in ksize_uaf+0x19e/0x6c0
[   12.901729] Read of size 1 at addr ffff888101b0ed00 by task kunit_try_catch/204
[   12.902004] 
[   12.902192] CPU: 1 UID: 0 PID: 204 Comm: kunit_try_catch Tainted: G    B            N 6.14.7-rc1 #1
[   12.902240] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.902251] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.902273] Call Trace:
[   12.902287]  <TASK>
[   12.902307]  dump_stack_lvl+0x73/0xb0
[   12.902336]  print_report+0xd1/0x650
[   12.902357]  ? __virt_addr_valid+0x1db/0x2d0
[   12.902380]  ? ksize_uaf+0x19e/0x6c0
[   12.902399]  ? kasan_complete_mode_report_info+0x64/0x200
[   12.902424]  ? ksize_uaf+0x19e/0x6c0
[   12.902444]  kasan_report+0x140/0x180
[   12.902464]  ? ksize_uaf+0x19e/0x6c0
[   12.902486]  ? ksize_uaf+0x19e/0x6c0
[   12.902505]  __kasan_check_byte+0x3d/0x50
[   12.902526]  ksize+0x20/0x60
[   12.902545]  ksize_uaf+0x19e/0x6c0
[   12.902564]  ? __pfx_ksize_uaf+0x10/0x10
[   12.902583]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   12.902605]  ? trace_hardirqs_on+0x37/0xe0
[   12.902629]  ? __pfx_read_tsc+0x10/0x10
[   12.902650]  ? ktime_get_ts64+0x86/0x230
[   12.902676]  kunit_try_run_case+0x1a6/0x480
[   12.902699]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.902721]  ? queued_spin_lock_slowpath+0x117/0xb40
[   12.902742]  ? __kthread_parkme+0x82/0x160
[   12.902765]  ? preempt_count_sub+0x50/0x80
[   12.902789]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.902811]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.902848]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.902873]  kthread+0x324/0x6e0
[   12.902894]  ? trace_preempt_on+0x20/0xc0
[   12.902915]  ? __pfx_kthread+0x10/0x10
[   12.902937]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.902960]  ? calculate_sigpending+0x7b/0xa0
[   12.902981]  ? __pfx_kthread+0x10/0x10
[   12.903003]  ret_from_fork+0x41/0x80
[   12.903775]  ? __pfx_kthread+0x10/0x10
[   12.903825]  ret_from_fork_asm+0x1a/0x30
[   12.903872]  </TASK>
[   12.903885] 
[   12.913817] Allocated by task 204:
[   12.914140]  kasan_save_stack+0x45/0x70
[   12.914369]  kasan_save_track+0x18/0x40
[   12.914550]  kasan_save_alloc_info+0x3b/0x50
[   12.914753]  __kasan_kmalloc+0xb7/0xc0
[   12.914902]  __kmalloc_cache_noprof+0x18a/0x420
[   12.915201]  ksize_uaf+0xab/0x6c0
[   12.915359]  kunit_try_run_case+0x1a6/0x480
[   12.915566]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.915819]  kthread+0x324/0x6e0
[   12.916190]  ret_from_fork+0x41/0x80
[   12.916400]  ret_from_fork_asm+0x1a/0x30
[   12.916598] 
[   12.916685] Freed by task 204:
[   12.916818]  kasan_save_stack+0x45/0x70
[   12.917122]  kasan_save_track+0x18/0x40
[   12.917298]  kasan_save_free_info+0x3f/0x60
[   12.917476]  __kasan_slab_free+0x56/0x70
[   12.917616]  kfree+0x224/0x3f0
[   12.917783]  ksize_uaf+0x12d/0x6c0
[   12.917970]  kunit_try_run_case+0x1a6/0x480
[   12.918283]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.918467]  kthread+0x324/0x6e0
[   12.918591]  ret_from_fork+0x41/0x80
[   12.918720]  ret_from_fork_asm+0x1a/0x30
[   12.918874] 
[   12.918961] The buggy address belongs to the object at ffff888101b0ed00
[   12.918961]  which belongs to the cache kmalloc-128 of size 128
[   12.919574] The buggy address is located 0 bytes inside of
[   12.919574]  freed 128-byte region [ffff888101b0ed00, ffff888101b0ed80)
[   12.920309] 
[   12.920414] The buggy address belongs to the physical page:
[   12.920665] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b0e
[   12.920961] flags: 0x200000000000000(node=0|zone=2)
[   12.921218] page_type: f5(slab)
[   12.921377] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.921733] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.922201] page dumped because: kasan: bad access detected
[   12.922459] 
[   12.922553] Memory state around the buggy address:
[   12.922762]  ffff888101b0ec00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.923153]  ffff888101b0ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.923443] >ffff888101b0ed00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.923725]                    ^
[   12.923865]  ffff888101b0ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.924397]  ffff888101b0ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.924678] ==================================================================