Hay
Date
July 8, 2025, 4:38 p.m.

Environment
qemu-arm64
qemu-x86_64

[   18.052688] ==================================================================
[   18.052744] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8
[   18.052798] Read of size 1 at addr fff00000c63d6800 by task kunit_try_catch/198
[   18.052848] 
[   18.052896] CPU: 1 UID: 0 PID: 198 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   18.052987] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.053016] Hardware name: linux,dummy-virt (DT)
[   18.053047] Call trace:
[   18.053068]  show_stack+0x20/0x38 (C)
[   18.053116]  dump_stack_lvl+0x8c/0xd0
[   18.053163]  print_report+0x118/0x608
[   18.053216]  kasan_report+0xdc/0x128
[   18.053260]  __kasan_check_byte+0x54/0x70
[   18.053306]  ksize+0x30/0x88
[   18.053358]  ksize_uaf+0x168/0x5f8
[   18.053448]  kunit_try_run_case+0x170/0x3f0
[   18.053613]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.053799]  kthread+0x328/0x630
[   18.054061]  ret_from_fork+0x10/0x20
[   18.054143] 
[   18.054167] Allocated by task 198:
[   18.054197]  kasan_save_stack+0x3c/0x68
[   18.054237]  kasan_save_track+0x20/0x40
[   18.054276]  kasan_save_alloc_info+0x40/0x58
[   18.054364]  __kasan_kmalloc+0xd4/0xd8
[   18.054424]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.054463]  ksize_uaf+0xb8/0x5f8
[   18.054500]  kunit_try_run_case+0x170/0x3f0
[   18.054541]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.054587]  kthread+0x328/0x630
[   18.054727]  ret_from_fork+0x10/0x20
[   18.054856] 
[   18.054915] Freed by task 198:
[   18.054973]  kasan_save_stack+0x3c/0x68
[   18.055097]  kasan_save_track+0x20/0x40
[   18.055183]  kasan_save_free_info+0x4c/0x78
[   18.055283]  __kasan_slab_free+0x6c/0x98
[   18.055369]  kfree+0x214/0x3c8
[   18.055417]  ksize_uaf+0x11c/0x5f8
[   18.055480]  kunit_try_run_case+0x170/0x3f0
[   18.055557]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.055617]  kthread+0x328/0x630
[   18.055695]  ret_from_fork+0x10/0x20
[   18.055760] 
[   18.055780] The buggy address belongs to the object at fff00000c63d6800
[   18.055780]  which belongs to the cache kmalloc-128 of size 128
[   18.055839] The buggy address is located 0 bytes inside of
[   18.055839]  freed 128-byte region [fff00000c63d6800, fff00000c63d6880)
[   18.055897] 
[   18.056062] The buggy address belongs to the physical page:
[   18.056121] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063d6
[   18.056183] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.056237] page_type: f5(slab)
[   18.056293] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.056359] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.056450] page dumped because: kasan: bad access detected
[   18.056524] 
[   18.056576] Memory state around the buggy address:
[   18.056690]  fff00000c63d6700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.056786]  fff00000c63d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.056841] >fff00000c63d6800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.056879]                    ^
[   18.056905]  fff00000c63d6880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.057081]  fff00000c63d6900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.057119] ==================================================================
[   18.057908] ==================================================================
[   18.057959] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8
[   18.058027] Read of size 1 at addr fff00000c63d6800 by task kunit_try_catch/198
[   18.058076] 
[   18.058103] CPU: 1 UID: 0 PID: 198 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   18.058185] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.058216] Hardware name: linux,dummy-virt (DT)
[   18.058248] Call trace:
[   18.058269]  show_stack+0x20/0x38 (C)
[   18.058314]  dump_stack_lvl+0x8c/0xd0
[   18.058505]  print_report+0x118/0x608
[   18.058552]  kasan_report+0xdc/0x128
[   18.058602]  __asan_report_load1_noabort+0x20/0x30
[   18.058654]  ksize_uaf+0x598/0x5f8
[   18.058845]  kunit_try_run_case+0x170/0x3f0
[   18.058921]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.059008]  kthread+0x328/0x630
[   18.059081]  ret_from_fork+0x10/0x20
[   18.059186] 
[   18.059235] Allocated by task 198:
[   18.059283]  kasan_save_stack+0x3c/0x68
[   18.059324]  kasan_save_track+0x20/0x40
[   18.059438]  kasan_save_alloc_info+0x40/0x58
[   18.059481]  __kasan_kmalloc+0xd4/0xd8
[   18.059517]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.059575]  ksize_uaf+0xb8/0x5f8
[   18.059630]  kunit_try_run_case+0x170/0x3f0
[   18.059788]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.059841]  kthread+0x328/0x630
[   18.059970]  ret_from_fork+0x10/0x20
[   18.060075] 
[   18.060180] Freed by task 198:
[   18.060241]  kasan_save_stack+0x3c/0x68
[   18.060294]  kasan_save_track+0x20/0x40
[   18.060400]  kasan_save_free_info+0x4c/0x78
[   18.060528]  __kasan_slab_free+0x6c/0x98
[   18.060605]  kfree+0x214/0x3c8
[   18.060799]  ksize_uaf+0x11c/0x5f8
[   18.060835]  kunit_try_run_case+0x170/0x3f0
[   18.060874]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.060918]  kthread+0x328/0x630
[   18.060953]  ret_from_fork+0x10/0x20
[   18.060988] 
[   18.061694] The buggy address belongs to the object at fff00000c63d6800
[   18.061694]  which belongs to the cache kmalloc-128 of size 128
[   18.061952] The buggy address is located 0 bytes inside of
[   18.061952]  freed 128-byte region [fff00000c63d6800, fff00000c63d6880)
[   18.062067] 
[   18.062143] The buggy address belongs to the physical page:
[   18.062238] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063d6
[   18.062314] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.062396] page_type: f5(slab)
[   18.062435] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.062639] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.062777] page dumped because: kasan: bad access detected
[   18.062853] 
[   18.062933] Memory state around the buggy address:
[   18.063011]  fff00000c63d6700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.063084]  fff00000c63d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.063504] >fff00000c63d6800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.063572]                    ^
[   18.063620]  fff00000c63d6880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.063684]  fff00000c63d6900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.063767] ==================================================================
[   18.065495] ==================================================================
[   18.065727] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8
[   18.065777] Read of size 1 at addr fff00000c63d6878 by task kunit_try_catch/198
[   18.065932] 
[   18.065969] CPU: 1 UID: 0 PID: 198 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT 
[   18.066113] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.066161] Hardware name: linux,dummy-virt (DT)
[   18.066196] Call trace:
[   18.066218]  show_stack+0x20/0x38 (C)
[   18.066277]  dump_stack_lvl+0x8c/0xd0
[   18.066342]  print_report+0x118/0x608
[   18.066395]  kasan_report+0xdc/0x128
[   18.066448]  __asan_report_load1_noabort+0x20/0x30
[   18.066507]  ksize_uaf+0x544/0x5f8
[   18.066553]  kunit_try_run_case+0x170/0x3f0
[   18.066602]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.066656]  kthread+0x328/0x630
[   18.066701]  ret_from_fork+0x10/0x20
[   18.066748] 
[   18.066770] Allocated by task 198:
[   18.066799]  kasan_save_stack+0x3c/0x68
[   18.066843]  kasan_save_track+0x20/0x40
[   18.066881]  kasan_save_alloc_info+0x40/0x58
[   18.066923]  __kasan_kmalloc+0xd4/0xd8
[   18.066960]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.067007]  ksize_uaf+0xb8/0x5f8
[   18.067044]  kunit_try_run_case+0x170/0x3f0
[   18.067084]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.067129]  kthread+0x328/0x630
[   18.067166]  ret_from_fork+0x10/0x20
[   18.067202] 
[   18.067220] Freed by task 198:
[   18.067254]  kasan_save_stack+0x3c/0x68
[   18.067291]  kasan_save_track+0x20/0x40
[   18.067327]  kasan_save_free_info+0x4c/0x78
[   18.067375]  __kasan_slab_free+0x6c/0x98
[   18.067411]  kfree+0x214/0x3c8
[   18.067443]  ksize_uaf+0x11c/0x5f8
[   18.067479]  kunit_try_run_case+0x170/0x3f0
[   18.067516]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.067561]  kthread+0x328/0x630
[   18.067843]  ret_from_fork+0x10/0x20
[   18.067918] 
[   18.067957] The buggy address belongs to the object at fff00000c63d6800
[   18.067957]  which belongs to the cache kmalloc-128 of size 128
[   18.068044] The buggy address is located 120 bytes inside of
[   18.068044]  freed 128-byte region [fff00000c63d6800, fff00000c63d6880)
[   18.068115] 
[   18.068137] The buggy address belongs to the physical page:
[   18.068167] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063d6
[   18.068345] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.068499] page_type: f5(slab)
[   18.068544] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.068625] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.068681] page dumped because: kasan: bad access detected
[   18.068769] 
[   18.068819] Memory state around the buggy address:
[   18.068859]  fff00000c63d6700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.068904]  fff00000c63d6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.068946] >fff00000c63d6800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.068991]                                                                 ^
[   18.069034]  fff00000c63d6880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.069075]  fff00000c63d6900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.069223] ==================================================================

[   11.803363] ==================================================================
[   11.803752] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5fe/0x6c0
[   11.804103] Read of size 1 at addr ffff8881029cab00 by task kunit_try_catch/216
[   11.804413] 
[   11.804528] CPU: 1 UID: 0 PID: 216 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT(voluntary) 
[   11.804570] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.804581] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.804601] Call Trace:
[   11.804615]  <TASK>
[   11.804627]  dump_stack_lvl+0x73/0xb0
[   11.804651]  print_report+0xd1/0x650
[   11.804675]  ? __virt_addr_valid+0x1db/0x2d0
[   11.804697]  ? ksize_uaf+0x5fe/0x6c0
[   11.804714]  ? kasan_complete_mode_report_info+0x64/0x200
[   11.804737]  ? ksize_uaf+0x5fe/0x6c0
[   11.804755]  kasan_report+0x141/0x180
[   11.804778]  ? ksize_uaf+0x5fe/0x6c0
[   11.804800]  __asan_report_load1_noabort+0x18/0x20
[   11.804822]  ksize_uaf+0x5fe/0x6c0
[   11.804839]  ? __pfx_ksize_uaf+0x10/0x10
[   11.804858]  ? __schedule+0x10cc/0x2b60
[   11.804894]  ? __pfx_read_tsc+0x10/0x10
[   11.804913]  ? ktime_get_ts64+0x86/0x230
[   11.804996]  kunit_try_run_case+0x1a5/0x480
[   11.805022]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.805041]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.805065]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.805090]  ? __kthread_parkme+0x82/0x180
[   11.805111]  ? preempt_count_sub+0x50/0x80
[   11.805137]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.805157]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.805180]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.805204]  kthread+0x337/0x6f0
[   11.805221]  ? trace_preempt_on+0x20/0xc0
[   11.805245]  ? __pfx_kthread+0x10/0x10
[   11.805263]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.805286]  ? calculate_sigpending+0x7b/0xa0
[   11.805307]  ? __pfx_kthread+0x10/0x10
[   11.805326]  ret_from_fork+0x41/0x80
[   11.805347]  ? __pfx_kthread+0x10/0x10
[   11.805365]  ret_from_fork_asm+0x1a/0x30
[   11.805395]  </TASK>
[   11.805406] 
[   11.813262] Allocated by task 216:
[   11.813403]  kasan_save_stack+0x45/0x70
[   11.813553]  kasan_save_track+0x18/0x40
[   11.813691]  kasan_save_alloc_info+0x3b/0x50
[   11.813944]  __kasan_kmalloc+0xb7/0xc0
[   11.814328]  __kmalloc_cache_noprof+0x189/0x420
[   11.814571]  ksize_uaf+0xaa/0x6c0
[   11.814730]  kunit_try_run_case+0x1a5/0x480
[   11.815020]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.815280]  kthread+0x337/0x6f0
[   11.815447]  ret_from_fork+0x41/0x80
[   11.815608]  ret_from_fork_asm+0x1a/0x30
[   11.815811] 
[   11.815919] Freed by task 216:
[   11.816046]  kasan_save_stack+0x45/0x70
[   11.816314]  kasan_save_track+0x18/0x40
[   11.816532]  kasan_save_free_info+0x3f/0x60
[   11.816728]  __kasan_slab_free+0x56/0x70
[   11.818143]  kfree+0x222/0x3f0
[   11.818290]  ksize_uaf+0x12c/0x6c0
[   11.818414]  kunit_try_run_case+0x1a5/0x480
[   11.818556]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.818750]  kthread+0x337/0x6f0
[   11.818933]  ret_from_fork+0x41/0x80
[   11.819121]  ret_from_fork_asm+0x1a/0x30
[   11.819358] 
[   11.820846] The buggy address belongs to the object at ffff8881029cab00
[   11.820846]  which belongs to the cache kmalloc-128 of size 128
[   11.821461] The buggy address is located 0 bytes inside of
[   11.821461]  freed 128-byte region [ffff8881029cab00, ffff8881029cab80)
[   11.821805] 
[   11.821890] The buggy address belongs to the physical page:
[   11.822259] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ca
[   11.822590] flags: 0x200000000000000(node=0|zone=2)
[   11.822831] page_type: f5(slab)
[   11.824750] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   11.825022] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.825253] page dumped because: kasan: bad access detected
[   11.825426] 
[   11.825499] Memory state around the buggy address:
[   11.825656]  ffff8881029caa00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   11.825887]  ffff8881029caa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.827513] >ffff8881029cab00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   11.828534]                    ^
[   11.829778]  ffff8881029cab80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.830839]  ffff8881029cac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.831370] ==================================================================
[   11.832350] ==================================================================
[   11.834371] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5e4/0x6c0
[   11.835000] Read of size 1 at addr ffff8881029cab78 by task kunit_try_catch/216
[   11.835986] 
[   11.836096] CPU: 1 UID: 0 PID: 216 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT(voluntary) 
[   11.836142] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.836154] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.836175] Call Trace:
[   11.836192]  <TASK>
[   11.836209]  dump_stack_lvl+0x73/0xb0
[   11.836236]  print_report+0xd1/0x650
[   11.836260]  ? __virt_addr_valid+0x1db/0x2d0
[   11.836282]  ? ksize_uaf+0x5e4/0x6c0
[   11.836299]  ? kasan_complete_mode_report_info+0x64/0x200
[   11.836322]  ? ksize_uaf+0x5e4/0x6c0
[   11.836340]  kasan_report+0x141/0x180
[   11.836364]  ? ksize_uaf+0x5e4/0x6c0
[   11.836386]  __asan_report_load1_noabort+0x18/0x20
[   11.836407]  ksize_uaf+0x5e4/0x6c0
[   11.836425]  ? __pfx_ksize_uaf+0x10/0x10
[   11.836444]  ? __schedule+0x10cc/0x2b60
[   11.836467]  ? __pfx_read_tsc+0x10/0x10
[   11.836486]  ? ktime_get_ts64+0x86/0x230
[   11.836511]  kunit_try_run_case+0x1a5/0x480
[   11.836534]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.836556]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.836581]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.836607]  ? __kthread_parkme+0x82/0x180
[   11.836629]  ? preempt_count_sub+0x50/0x80
[   11.836734]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.836768]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.836792]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.836815]  kthread+0x337/0x6f0
[   11.836832]  ? trace_preempt_on+0x20/0xc0
[   11.836855]  ? __pfx_kthread+0x10/0x10
[   11.836883]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.836914]  ? calculate_sigpending+0x7b/0xa0
[   11.836936]  ? __pfx_kthread+0x10/0x10
[   11.836954]  ret_from_fork+0x41/0x80
[   11.836974]  ? __pfx_kthread+0x10/0x10
[   11.836993]  ret_from_fork_asm+0x1a/0x30
[   11.837023]  </TASK>
[   11.837034] 
[   11.850207] Allocated by task 216:
[   11.850531]  kasan_save_stack+0x45/0x70
[   11.850784]  kasan_save_track+0x18/0x40
[   11.851144]  kasan_save_alloc_info+0x3b/0x50
[   11.851554]  __kasan_kmalloc+0xb7/0xc0
[   11.851904]  __kmalloc_cache_noprof+0x189/0x420
[   11.852386]  ksize_uaf+0xaa/0x6c0
[   11.852677]  kunit_try_run_case+0x1a5/0x480
[   11.852824]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.853372]  kthread+0x337/0x6f0
[   11.853699]  ret_from_fork+0x41/0x80
[   11.854209]  ret_from_fork_asm+0x1a/0x30
[   11.854588] 
[   11.854762] Freed by task 216:
[   11.855085]  kasan_save_stack+0x45/0x70
[   11.855363]  kasan_save_track+0x18/0x40
[   11.855790]  kasan_save_free_info+0x3f/0x60
[   11.856093]  __kasan_slab_free+0x56/0x70
[   11.856391]  kfree+0x222/0x3f0
[   11.856511]  ksize_uaf+0x12c/0x6c0
[   11.856816]  kunit_try_run_case+0x1a5/0x480
[   11.857289]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.858062]  kthread+0x337/0x6f0
[   11.858266]  ret_from_fork+0x41/0x80
[   11.858401]  ret_from_fork_asm+0x1a/0x30
[   11.858604] 
[   11.858806] The buggy address belongs to the object at ffff8881029cab00
[   11.858806]  which belongs to the cache kmalloc-128 of size 128
[   11.860127] The buggy address is located 120 bytes inside of
[   11.860127]  freed 128-byte region [ffff8881029cab00, ffff8881029cab80)
[   11.860862] 
[   11.861106] The buggy address belongs to the physical page:
[   11.861619] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ca
[   11.862321] flags: 0x200000000000000(node=0|zone=2)
[   11.862494] page_type: f5(slab)
[   11.862832] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   11.863619] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.864573] page dumped because: kasan: bad access detected
[   11.865068] 
[   11.865150] Memory state around the buggy address:
[   11.865383]  ffff8881029caa00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   11.866249]  ffff8881029caa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.866653] >ffff8881029cab00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   11.867152]                                                                 ^
[   11.867373]  ffff8881029cab80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.867618]  ffff8881029cac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.868282] ==================================================================
[   11.782431] ==================================================================
[   11.783122] BUG: KASAN: slab-use-after-free in ksize_uaf+0x19d/0x6c0
[   11.783396] Read of size 1 at addr ffff8881029cab00 by task kunit_try_catch/216
[   11.783723] 
[   11.783834] CPU: 1 UID: 0 PID: 216 Comm: kunit_try_catch Tainted: G    B            N  6.15.6-rc1 #1 PREEMPT(voluntary) 
[   11.783902] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.783914] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.783937] Call Trace:
[   11.783950]  <TASK>
[   11.783965]  dump_stack_lvl+0x73/0xb0
[   11.783993]  print_report+0xd1/0x650
[   11.784017]  ? __virt_addr_valid+0x1db/0x2d0
[   11.784040]  ? ksize_uaf+0x19d/0x6c0
[   11.784058]  ? kasan_complete_mode_report_info+0x64/0x200
[   11.784081]  ? ksize_uaf+0x19d/0x6c0
[   11.784100]  kasan_report+0x141/0x180
[   11.784123]  ? ksize_uaf+0x19d/0x6c0
[   11.784144]  ? ksize_uaf+0x19d/0x6c0
[   11.784162]  __kasan_check_byte+0x3d/0x50
[   11.784185]  ksize+0x20/0x60
[   11.784208]  ksize_uaf+0x19d/0x6c0
[   11.784226]  ? __pfx_ksize_uaf+0x10/0x10
[   11.784245]  ? __schedule+0x10cc/0x2b60
[   11.784269]  ? __pfx_read_tsc+0x10/0x10
[   11.784290]  ? ktime_get_ts64+0x86/0x230
[   11.784316]  kunit_try_run_case+0x1a5/0x480
[   11.784338]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.784357]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.784382]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.784407]  ? __kthread_parkme+0x82/0x180
[   11.784429]  ? preempt_count_sub+0x50/0x80
[   11.784454]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.784475]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.784499]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.784585]  kthread+0x337/0x6f0
[   11.784605]  ? trace_preempt_on+0x20/0xc0
[   11.784630]  ? __pfx_kthread+0x10/0x10
[   11.784648]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.784671]  ? calculate_sigpending+0x7b/0xa0
[   11.784693]  ? __pfx_kthread+0x10/0x10
[   11.784712]  ret_from_fork+0x41/0x80
[   11.784732]  ? __pfx_kthread+0x10/0x10
[   11.784751]  ret_from_fork_asm+0x1a/0x30
[   11.784781]  </TASK>
[   11.784792] 
[   11.792291] Allocated by task 216:
[   11.792483]  kasan_save_stack+0x45/0x70
[   11.792708]  kasan_save_track+0x18/0x40
[   11.792921]  kasan_save_alloc_info+0x3b/0x50
[   11.793160]  __kasan_kmalloc+0xb7/0xc0
[   11.793364]  __kmalloc_cache_noprof+0x189/0x420
[   11.793592]  ksize_uaf+0xaa/0x6c0
[   11.793719]  kunit_try_run_case+0x1a5/0x480
[   11.794150]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.794344]  kthread+0x337/0x6f0
[   11.794517]  ret_from_fork+0x41/0x80
[   11.794705]  ret_from_fork_asm+0x1a/0x30
[   11.794988] 
[   11.795065] Freed by task 216:
[   11.795179]  kasan_save_stack+0x45/0x70
[   11.795322]  kasan_save_track+0x18/0x40
[   11.795459]  kasan_save_free_info+0x3f/0x60
[   11.795669]  __kasan_slab_free+0x56/0x70
[   11.795869]  kfree+0x222/0x3f0
[   11.796101]  ksize_uaf+0x12c/0x6c0
[   11.796277]  kunit_try_run_case+0x1a5/0x480
[   11.796485]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.796755]  kthread+0x337/0x6f0
[   11.797032]  ret_from_fork+0x41/0x80
[   11.797210]  ret_from_fork_asm+0x1a/0x30
[   11.797405] 
[   11.797482] The buggy address belongs to the object at ffff8881029cab00
[   11.797482]  which belongs to the cache kmalloc-128 of size 128
[   11.797917] The buggy address is located 0 bytes inside of
[   11.797917]  freed 128-byte region [ffff8881029cab00, ffff8881029cab80)
[   11.798676] 
[   11.798778] The buggy address belongs to the physical page:
[   11.798969] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ca
[   11.799212] flags: 0x200000000000000(node=0|zone=2)
[   11.799375] page_type: f5(slab)
[   11.799558] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   11.799920] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.800253] page dumped because: kasan: bad access detected
[   11.800426] 
[   11.800496] Memory state around the buggy address:
[   11.800652]  ffff8881029caa00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   11.800896]  ffff8881029caa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.801408] >ffff8881029cab00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   11.801729]                    ^
[   11.802086]  ffff8881029cab80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.802422]  ffff8881029cac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.802952] ==================================================================