Hay
Date
June 17, 2025, 3:40 p.m.

Environment
qemu-arm64
qemu-x86_64

[   22.229378] ==================================================================
[   22.229514] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8
[   22.229822] Read of size 1 at addr fff00000c794b578 by task kunit_try_catch/198
[   22.230012] 
[   22.230104] CPU: 0 UID: 0 PID: 198 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT 
[   22.230289] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.230352] Hardware name: linux,dummy-virt (DT)
[   22.230629] Call trace:
[   22.230687]  show_stack+0x20/0x38 (C)
[   22.230815]  dump_stack_lvl+0x8c/0xd0
[   22.230926]  print_report+0x118/0x608
[   22.231031]  kasan_report+0xdc/0x128
[   22.231134]  __asan_report_load1_noabort+0x20/0x30
[   22.231332]  ksize_uaf+0x544/0x5f8
[   22.231520]  kunit_try_run_case+0x170/0x3f0
[   22.231715]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.231865]  kthread+0x328/0x630
[   22.232009]  ret_from_fork+0x10/0x20
[   22.232187] 
[   22.232309] Allocated by task 198:
[   22.232388]  kasan_save_stack+0x3c/0x68
[   22.232483]  kasan_save_track+0x20/0x40
[   22.232817]  kasan_save_alloc_info+0x40/0x58
[   22.232920]  __kasan_kmalloc+0xd4/0xd8
[   22.233180]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.233425]  ksize_uaf+0xb8/0x5f8
[   22.233704]  kunit_try_run_case+0x170/0x3f0
[   22.233874]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.233992]  kthread+0x328/0x630
[   22.234075]  ret_from_fork+0x10/0x20
[   22.234147] 
[   22.234182] Freed by task 198:
[   22.234241]  kasan_save_stack+0x3c/0x68
[   22.234330]  kasan_save_track+0x20/0x40
[   22.234422]  kasan_save_free_info+0x4c/0x78
[   22.234519]  __kasan_slab_free+0x6c/0x98
[   22.235248]  kfree+0x214/0x3c8
[   22.235551]  ksize_uaf+0x11c/0x5f8
[   22.236026]  kunit_try_run_case+0x170/0x3f0
[   22.236144]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.236201]  kthread+0x328/0x630
[   22.236243]  ret_from_fork+0x10/0x20
[   22.236283] 
[   22.236309] The buggy address belongs to the object at fff00000c794b500
[   22.236309]  which belongs to the cache kmalloc-128 of size 128
[   22.236379] The buggy address is located 120 bytes inside of
[   22.236379]  freed 128-byte region [fff00000c794b500, fff00000c794b580)
[   22.236447] 
[   22.236471] The buggy address belongs to the physical page:
[   22.236508] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10794b
[   22.236565] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.236625] page_type: f5(slab)
[   22.236673] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   22.236747] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.236801] page dumped because: kasan: bad access detected
[   22.236836] 
[   22.236861] Memory state around the buggy address:
[   22.236899]  fff00000c794b400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.236947]  fff00000c794b480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.236992] >fff00000c794b500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.237033]                                                                 ^
[   22.237080]  fff00000c794b580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.237125]  fff00000c794b600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.237166] ==================================================================
[   22.218516] ==================================================================
[   22.218752] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8
[   22.218885] Read of size 1 at addr fff00000c794b500 by task kunit_try_catch/198
[   22.218982] 
[   22.219066] CPU: 0 UID: 0 PID: 198 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT 
[   22.219325] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.219412] Hardware name: linux,dummy-virt (DT)
[   22.219488] Call trace:
[   22.219547]  show_stack+0x20/0x38 (C)
[   22.219661]  dump_stack_lvl+0x8c/0xd0
[   22.219792]  print_report+0x118/0x608
[   22.219914]  kasan_report+0xdc/0x128
[   22.220067]  __asan_report_load1_noabort+0x20/0x30
[   22.220194]  ksize_uaf+0x598/0x5f8
[   22.220314]  kunit_try_run_case+0x170/0x3f0
[   22.220473]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.220653]  kthread+0x328/0x630
[   22.220782]  ret_from_fork+0x10/0x20
[   22.220883] 
[   22.220928] Allocated by task 198:
[   22.220989]  kasan_save_stack+0x3c/0x68
[   22.221104]  kasan_save_track+0x20/0x40
[   22.221414]  kasan_save_alloc_info+0x40/0x58
[   22.221627]  __kasan_kmalloc+0xd4/0xd8
[   22.221933]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.222147]  ksize_uaf+0xb8/0x5f8
[   22.222228]  kunit_try_run_case+0x170/0x3f0
[   22.222313]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.222417]  kthread+0x328/0x630
[   22.222683]  ret_from_fork+0x10/0x20
[   22.222787] 
[   22.222835] Freed by task 198:
[   22.222906]  kasan_save_stack+0x3c/0x68
[   22.223036]  kasan_save_track+0x20/0x40
[   22.223117]  kasan_save_free_info+0x4c/0x78
[   22.223211]  __kasan_slab_free+0x6c/0x98
[   22.223311]  kfree+0x214/0x3c8
[   22.223419]  ksize_uaf+0x11c/0x5f8
[   22.223518]  kunit_try_run_case+0x170/0x3f0
[   22.223637]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.223763]  kthread+0x328/0x630
[   22.223885]  ret_from_fork+0x10/0x20
[   22.224057] 
[   22.224191] The buggy address belongs to the object at fff00000c794b500
[   22.224191]  which belongs to the cache kmalloc-128 of size 128
[   22.224337] The buggy address is located 0 bytes inside of
[   22.224337]  freed 128-byte region [fff00000c794b500, fff00000c794b580)
[   22.224476] 
[   22.224527] The buggy address belongs to the physical page:
[   22.224862] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10794b
[   22.225085] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.225227] page_type: f5(slab)
[   22.225317] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   22.225431] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.225774] page dumped because: kasan: bad access detected
[   22.225881] 
[   22.226011] Memory state around the buggy address:
[   22.226096]  fff00000c794b400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.226278]  fff00000c794b480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.226402] >fff00000c794b500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.226546]                    ^
[   22.226669]  fff00000c794b580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.226847]  fff00000c794b600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.227048] ==================================================================
[   22.202977] ==================================================================
[   22.203331] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8
[   22.203797] Read of size 1 at addr fff00000c794b500 by task kunit_try_catch/198
[   22.203927] 
[   22.204293] CPU: 0 UID: 0 PID: 198 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT 
[   22.204791] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.205005] Hardware name: linux,dummy-virt (DT)
[   22.205089] Call trace:
[   22.205154]  show_stack+0x20/0x38 (C)
[   22.205633]  dump_stack_lvl+0x8c/0xd0
[   22.205901]  print_report+0x118/0x608
[   22.206155]  kasan_report+0xdc/0x128
[   22.206426]  __kasan_check_byte+0x54/0x70
[   22.206560]  ksize+0x30/0x88
[   22.206670]  ksize_uaf+0x168/0x5f8
[   22.207235]  kunit_try_run_case+0x170/0x3f0
[   22.207454]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.207919]  kthread+0x328/0x630
[   22.208063]  ret_from_fork+0x10/0x20
[   22.208287] 
[   22.208336] Allocated by task 198:
[   22.208411]  kasan_save_stack+0x3c/0x68
[   22.208516]  kasan_save_track+0x20/0x40
[   22.208613]  kasan_save_alloc_info+0x40/0x58
[   22.208712]  __kasan_kmalloc+0xd4/0xd8
[   22.208804]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.208900]  ksize_uaf+0xb8/0x5f8
[   22.208995]  kunit_try_run_case+0x170/0x3f0
[   22.209099]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.209211]  kthread+0x328/0x630
[   22.210001]  ret_from_fork+0x10/0x20
[   22.210128] 
[   22.210266] Freed by task 198:
[   22.210394]  kasan_save_stack+0x3c/0x68
[   22.210680]  kasan_save_track+0x20/0x40
[   22.210795]  kasan_save_free_info+0x4c/0x78
[   22.210892]  __kasan_slab_free+0x6c/0x98
[   22.210976]  kfree+0x214/0x3c8
[   22.211194]  ksize_uaf+0x11c/0x5f8
[   22.211423]  kunit_try_run_case+0x170/0x3f0
[   22.211665]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.212057]  kthread+0x328/0x630
[   22.212209]  ret_from_fork+0x10/0x20
[   22.212297] 
[   22.212355] The buggy address belongs to the object at fff00000c794b500
[   22.212355]  which belongs to the cache kmalloc-128 of size 128
[   22.212510] The buggy address is located 0 bytes inside of
[   22.212510]  freed 128-byte region [fff00000c794b500, fff00000c794b580)
[   22.212666] 
[   22.212717] The buggy address belongs to the physical page:
[   22.212812] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10794b
[   22.212947] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.213510] page_type: f5(slab)
[   22.213713] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   22.213994] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.214135] page dumped because: kasan: bad access detected
[   22.214304] 
[   22.214425] Memory state around the buggy address:
[   22.214642]  fff00000c794b400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.214936]  fff00000c794b480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.215061] >fff00000c794b500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.215163]                    ^
[   22.215238]  fff00000c794b580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.215346]  fff00000c794b600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.215443] ==================================================================

[   20.123264] ==================================================================
[   20.126513] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5fe/0x6c0
[   20.129358] Read of size 1 at addr ffff888102ed7500 by task kunit_try_catch/216
[   20.130255] 
[   20.131304] CPU: 1 UID: 0 PID: 216 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT(voluntary) 
[   20.131430] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.131465] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.131516] Call Trace:
[   20.131563]  <TASK>
[   20.131610]  dump_stack_lvl+0x73/0xb0
[   20.131693]  print_report+0xd1/0x650
[   20.131756]  ? __virt_addr_valid+0x1db/0x2d0
[   20.131812]  ? ksize_uaf+0x5fe/0x6c0
[   20.131871]  ? kasan_complete_mode_report_info+0x64/0x200
[   20.131944]  ? ksize_uaf+0x5fe/0x6c0
[   20.132002]  kasan_report+0x141/0x180
[   20.132059]  ? ksize_uaf+0x5fe/0x6c0
[   20.132128]  __asan_report_load1_noabort+0x18/0x20
[   20.132178]  ksize_uaf+0x5fe/0x6c0
[   20.132236]  ? __pfx_ksize_uaf+0x10/0x10
[   20.132698]  ? __schedule+0x10cc/0x2b60
[   20.132780]  ? __pfx_read_tsc+0x10/0x10
[   20.132841]  ? ktime_get_ts64+0x86/0x230
[   20.132911]  kunit_try_run_case+0x1a5/0x480
[   20.133513]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.133574]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   20.133634]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.133690]  ? __kthread_parkme+0x82/0x180
[   20.133744]  ? preempt_count_sub+0x50/0x80
[   20.133802]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.133859]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.133914]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.134107]  kthread+0x337/0x6f0
[   20.134158]  ? trace_preempt_on+0x20/0xc0
[   20.134215]  ? __pfx_kthread+0x10/0x10
[   20.134258]  ? _raw_spin_unlock_irq+0x47/0x80
[   20.134352]  ? calculate_sigpending+0x7b/0xa0
[   20.134424]  ? __pfx_kthread+0x10/0x10
[   20.134487]  ret_from_fork+0x41/0x80
[   20.134557]  ? __pfx_kthread+0x10/0x10
[   20.134619]  ret_from_fork_asm+0x1a/0x30
[   20.134698]  </TASK>
[   20.134732] 
[   20.153311] Allocated by task 216:
[   20.153764]  kasan_save_stack+0x45/0x70
[   20.154696]  kasan_save_track+0x18/0x40
[   20.155453]  kasan_save_alloc_info+0x3b/0x50
[   20.155930]  __kasan_kmalloc+0xb7/0xc0
[   20.156522]  __kmalloc_cache_noprof+0x189/0x420
[   20.157738]  ksize_uaf+0xaa/0x6c0
[   20.158092]  kunit_try_run_case+0x1a5/0x480
[   20.158822]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.159636]  kthread+0x337/0x6f0
[   20.159787]  ret_from_fork+0x41/0x80
[   20.159959]  ret_from_fork_asm+0x1a/0x30
[   20.160560] 
[   20.161039] Freed by task 216:
[   20.162419]  kasan_save_stack+0x45/0x70
[   20.162745]  kasan_save_track+0x18/0x40
[   20.163549]  kasan_save_free_info+0x3f/0x60
[   20.163914]  __kasan_slab_free+0x56/0x70
[   20.165049]  kfree+0x222/0x3f0
[   20.165600]  ksize_uaf+0x12c/0x6c0
[   20.165902]  kunit_try_run_case+0x1a5/0x480
[   20.167224]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.167608]  kthread+0x337/0x6f0
[   20.168000]  ret_from_fork+0x41/0x80
[   20.168864]  ret_from_fork_asm+0x1a/0x30
[   20.169572] 
[   20.169821] The buggy address belongs to the object at ffff888102ed7500
[   20.169821]  which belongs to the cache kmalloc-128 of size 128
[   20.171684] The buggy address is located 0 bytes inside of
[   20.171684]  freed 128-byte region [ffff888102ed7500, ffff888102ed7580)
[   20.173738] 
[   20.174179] The buggy address belongs to the physical page:
[   20.175579] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ed7
[   20.176386] flags: 0x200000000000000(node=0|zone=2)
[   20.176877] page_type: f5(slab)
[   20.177647] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   20.178575] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.179462] page dumped because: kasan: bad access detected
[   20.179895] 
[   20.180156] Memory state around the buggy address:
[   20.181281]  ffff888102ed7400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.181960]  ffff888102ed7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.182752] >ffff888102ed7500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.182994]                    ^
[   20.183918]  ffff888102ed7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.184462]  ffff888102ed7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.185030] ==================================================================
[   20.062256] ==================================================================
[   20.063632] BUG: KASAN: slab-use-after-free in ksize_uaf+0x19d/0x6c0
[   20.064216] Read of size 1 at addr ffff888102ed7500 by task kunit_try_catch/216
[   20.066274] 
[   20.066742] CPU: 1 UID: 0 PID: 216 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT(voluntary) 
[   20.066875] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.066899] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.066939] Call Trace:
[   20.066981]  <TASK>
[   20.067282]  dump_stack_lvl+0x73/0xb0
[   20.067366]  print_report+0xd1/0x650
[   20.067408]  ? __virt_addr_valid+0x1db/0x2d0
[   20.067446]  ? ksize_uaf+0x19d/0x6c0
[   20.067479]  ? kasan_complete_mode_report_info+0x64/0x200
[   20.067515]  ? ksize_uaf+0x19d/0x6c0
[   20.067549]  kasan_report+0x141/0x180
[   20.067583]  ? ksize_uaf+0x19d/0x6c0
[   20.067621]  ? ksize_uaf+0x19d/0x6c0
[   20.067653]  __kasan_check_byte+0x3d/0x50
[   20.067687]  ksize+0x20/0x60
[   20.067719]  ksize_uaf+0x19d/0x6c0
[   20.067752]  ? __pfx_ksize_uaf+0x10/0x10
[   20.067785]  ? __schedule+0x10cc/0x2b60
[   20.067820]  ? __pfx_read_tsc+0x10/0x10
[   20.067854]  ? ktime_get_ts64+0x86/0x230
[   20.067915]  kunit_try_run_case+0x1a5/0x480
[   20.068238]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.068315]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   20.068360]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.068398]  ? __kthread_parkme+0x82/0x180
[   20.068434]  ? preempt_count_sub+0x50/0x80
[   20.068473]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.068510]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.068546]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.068582]  kthread+0x337/0x6f0
[   20.068608]  ? trace_preempt_on+0x20/0xc0
[   20.068646]  ? __pfx_kthread+0x10/0x10
[   20.068674]  ? _raw_spin_unlock_irq+0x47/0x80
[   20.068707]  ? calculate_sigpending+0x7b/0xa0
[   20.068740]  ? __pfx_kthread+0x10/0x10
[   20.068768]  ret_from_fork+0x41/0x80
[   20.068803]  ? __pfx_kthread+0x10/0x10
[   20.068832]  ret_from_fork_asm+0x1a/0x30
[   20.068880]  </TASK>
[   20.068896] 
[   20.092392] Allocated by task 216:
[   20.093005]  kasan_save_stack+0x45/0x70
[   20.093702]  kasan_save_track+0x18/0x40
[   20.093878]  kasan_save_alloc_info+0x3b/0x50
[   20.094074]  __kasan_kmalloc+0xb7/0xc0
[   20.094240]  __kmalloc_cache_noprof+0x189/0x420
[   20.094966]  ksize_uaf+0xaa/0x6c0
[   20.095884]  kunit_try_run_case+0x1a5/0x480
[   20.096370]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.096860]  kthread+0x337/0x6f0
[   20.097515]  ret_from_fork+0x41/0x80
[   20.097836]  ret_from_fork_asm+0x1a/0x30
[   20.098245] 
[   20.098658] Freed by task 216:
[   20.098994]  kasan_save_stack+0x45/0x70
[   20.099454]  kasan_save_track+0x18/0x40
[   20.099964]  kasan_save_free_info+0x3f/0x60
[   20.100328]  __kasan_slab_free+0x56/0x70
[   20.100767]  kfree+0x222/0x3f0
[   20.101139]  ksize_uaf+0x12c/0x6c0
[   20.102119]  kunit_try_run_case+0x1a5/0x480
[   20.102552]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.103014]  kthread+0x337/0x6f0
[   20.103406]  ret_from_fork+0x41/0x80
[   20.103810]  ret_from_fork_asm+0x1a/0x30
[   20.104454] 
[   20.104650] The buggy address belongs to the object at ffff888102ed7500
[   20.104650]  which belongs to the cache kmalloc-128 of size 128
[   20.105686] The buggy address is located 0 bytes inside of
[   20.105686]  freed 128-byte region [ffff888102ed7500, ffff888102ed7580)
[   20.107998] 
[   20.108945] The buggy address belongs to the physical page:
[   20.109427] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ed7
[   20.110112] flags: 0x200000000000000(node=0|zone=2)
[   20.110583] page_type: f5(slab)
[   20.110939] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   20.112570] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.112827] page dumped because: kasan: bad access detected
[   20.113335] 
[   20.113920] Memory state around the buggy address:
[   20.114434]  ffff888102ed7400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.115653]  ffff888102ed7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.116307] >ffff888102ed7500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.117511]                    ^
[   20.118062]  ffff888102ed7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.118884]  ffff888102ed7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.120183] ==================================================================
[   20.187074] ==================================================================
[   20.188483] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5e4/0x6c0
[   20.189104] Read of size 1 at addr ffff888102ed7578 by task kunit_try_catch/216
[   20.190836] 
[   20.191187] CPU: 1 UID: 0 PID: 216 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT(voluntary) 
[   20.191328] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.191363] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.191416] Call Trace:
[   20.191468]  <TASK>
[   20.191518]  dump_stack_lvl+0x73/0xb0
[   20.191585]  print_report+0xd1/0x650
[   20.191624]  ? __virt_addr_valid+0x1db/0x2d0
[   20.191659]  ? ksize_uaf+0x5e4/0x6c0
[   20.191691]  ? kasan_complete_mode_report_info+0x64/0x200
[   20.191724]  ? ksize_uaf+0x5e4/0x6c0
[   20.191757]  kasan_report+0x141/0x180
[   20.191791]  ? ksize_uaf+0x5e4/0x6c0
[   20.191832]  __asan_report_load1_noabort+0x18/0x20
[   20.191865]  ksize_uaf+0x5e4/0x6c0
[   20.191916]  ? __pfx_ksize_uaf+0x10/0x10
[   20.191960]  ? __schedule+0x10cc/0x2b60
[   20.192489]  ? __pfx_read_tsc+0x10/0x10
[   20.192527]  ? ktime_get_ts64+0x86/0x230
[   20.192569]  kunit_try_run_case+0x1a5/0x480
[   20.192610]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.192647]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   20.192686]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.192722]  ? __kthread_parkme+0x82/0x180
[   20.192757]  ? preempt_count_sub+0x50/0x80
[   20.192794]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.192831]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.192867]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.192901]  kthread+0x337/0x6f0
[   20.192928]  ? trace_preempt_on+0x20/0xc0
[   20.192990]  ? __pfx_kthread+0x10/0x10
[   20.193062]  ? _raw_spin_unlock_irq+0x47/0x80
[   20.193140]  ? calculate_sigpending+0x7b/0xa0
[   20.193193]  ? __pfx_kthread+0x10/0x10
[   20.193223]  ret_from_fork+0x41/0x80
[   20.193259]  ? __pfx_kthread+0x10/0x10
[   20.193307]  ret_from_fork_asm+0x1a/0x30
[   20.193361]  </TASK>
[   20.193379] 
[   20.214425] Allocated by task 216:
[   20.214845]  kasan_save_stack+0x45/0x70
[   20.215320]  kasan_save_track+0x18/0x40
[   20.215734]  kasan_save_alloc_info+0x3b/0x50
[   20.216154]  __kasan_kmalloc+0xb7/0xc0
[   20.217500]  __kmalloc_cache_noprof+0x189/0x420
[   20.217965]  ksize_uaf+0xaa/0x6c0
[   20.218396]  kunit_try_run_case+0x1a5/0x480
[   20.218822]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.219346]  kthread+0x337/0x6f0
[   20.219856]  ret_from_fork+0x41/0x80
[   20.220198]  ret_from_fork_asm+0x1a/0x30
[   20.220611] 
[   20.221660] Freed by task 216:
[   20.222488]  kasan_save_stack+0x45/0x70
[   20.223441]  kasan_save_track+0x18/0x40
[   20.223977]  kasan_save_free_info+0x3f/0x60
[   20.224396]  __kasan_slab_free+0x56/0x70
[   20.224785]  kfree+0x222/0x3f0
[   20.225122]  ksize_uaf+0x12c/0x6c0
[   20.226213]  kunit_try_run_case+0x1a5/0x480
[   20.227218]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.228378]  kthread+0x337/0x6f0
[   20.228654]  ret_from_fork+0x41/0x80
[   20.228992]  ret_from_fork_asm+0x1a/0x30
[   20.229385] 
[   20.229550] The buggy address belongs to the object at ffff888102ed7500
[   20.229550]  which belongs to the cache kmalloc-128 of size 128
[   20.231274] The buggy address is located 120 bytes inside of
[   20.231274]  freed 128-byte region [ffff888102ed7500, ffff888102ed7580)
[   20.233253] 
[   20.233477] The buggy address belongs to the physical page:
[   20.234422] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ed7
[   20.235352] flags: 0x200000000000000(node=0|zone=2)
[   20.235922] page_type: f5(slab)
[   20.236819] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   20.237606] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.238214] page dumped because: kasan: bad access detected
[   20.239537] 
[   20.239734] Memory state around the buggy address:
[   20.240724]  ffff888102ed7400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.241558]  ffff888102ed7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.242066] >ffff888102ed7500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.243567]                                                                 ^
[   20.244528]  ffff888102ed7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.245323]  ffff888102ed7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.245910] ==================================================================