Hay
Date
June 17, 2025, 3:39 p.m.

Environment
qemu-arm64
qemu-x86_64

[   94.143099] ==================================================================
[   94.144065] BUG: KASAN: slab-use-after-free in ksize_uaf+0x10c/0x2f0
[   94.144880] Read of size 1 at addr ffff0000c60b6f78 by task kunit_try_catch/193
[   94.145646] 
[   94.145852] CPU: 0 PID: 193 Comm: kunit_try_catch Tainted: G    B            N 6.6.94-rc1 #1
[   94.146823] Hardware name: linux,dummy-virt (DT)
[   94.147334] Call trace:
[   94.147867]  dump_backtrace+0x9c/0x128
[   94.148334]  show_stack+0x20/0x38
[   94.148756]  dump_stack_lvl+0x60/0xb0
[   94.149221]  print_report+0xf8/0x5e8
[   94.150026]  kasan_report+0xdc/0x128
[   94.150554]  __asan_load1+0x60/0x70
[   94.151106]  ksize_uaf+0x10c/0x2f0
[   94.151499]  kunit_try_run_case+0x114/0x298
[   94.152027]  kunit_generic_run_threadfn_adapter+0x38/0x60
[   94.152750]  kthread+0x18c/0x1a8
[   94.153140]  ret_from_fork+0x10/0x20
[   94.153586] 
[   94.153784] Allocated by task 193:
[   94.154142]  kasan_save_stack+0x3c/0x68
[   94.154658]  kasan_set_track+0x2c/0x40
[   94.155344]  kasan_save_alloc_info+0x24/0x38
[   94.155889]  __kasan_kmalloc+0xd4/0xd8
[   94.156294]  kmalloc_trace+0x68/0x130
[   94.156728]  ksize_uaf+0x9c/0x2f0
[   94.157082]  kunit_try_run_case+0x114/0x298
[   94.157630]  kunit_generic_run_threadfn_adapter+0x38/0x60
[   94.158257]  kthread+0x18c/0x1a8
[   94.158677]  ret_from_fork+0x10/0x20
[   94.159183] 
[   94.159591] Freed by task 193:
[   94.160056]  kasan_save_stack+0x3c/0x68
[   94.160476]  kasan_set_track+0x2c/0x40
[   94.160906]  kasan_save_free_info+0x38/0x60
[   94.161477]  __kasan_slab_free+0x100/0x170
[   94.161967]  __kmem_cache_free+0x178/0x2c8
[   94.162469]  kfree+0x74/0x138
[   94.163799]  ksize_uaf+0xb8/0x2f0
[   94.164422]  kunit_try_run_case+0x114/0x298
[   94.164981]  kunit_generic_run_threadfn_adapter+0x38/0x60
[   94.165515]  kthread+0x18c/0x1a8
[   94.165903]  ret_from_fork+0x10/0x20
[   94.166394] 
[   94.166623] The buggy address belongs to the object at ffff0000c60b6f00
[   94.166623]  which belongs to the cache kmalloc-128 of size 128
[   94.167615] The buggy address is located 120 bytes inside of
[   94.167615]  freed 128-byte region [ffff0000c60b6f00, ffff0000c60b6f80)
[   94.168992] 
[   94.169223] The buggy address belongs to the physical page:
[   94.169815] page:00000000abb31ec0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1060b6
[   94.170604] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[   94.171308] page_type: 0xffffffff()
[   94.171793] raw: 0bfffc0000000800 ffff0000c00018c0 dead000000000122 0000000000000000
[   94.172785] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   94.173545] page dumped because: kasan: bad access detected
[   94.174152] 
[   94.174452] Memory state around the buggy address:
[   94.175297]  ffff0000c60b6e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   94.176087]  ffff0000c60b6e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   94.176851] >ffff0000c60b6f00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   94.177505]                                                                 ^
[   94.178203]  ffff0000c60b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   94.179139]  ffff0000c60b7000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   94.179745] ==================================================================
[   94.106315] ==================================================================
[   94.107174] BUG: KASAN: slab-use-after-free in ksize_uaf+0xe8/0x2f0
[   94.108305] Read of size 1 at addr ffff0000c60b6f00 by task kunit_try_catch/193
[   94.109291] 
[   94.109553] CPU: 0 PID: 193 Comm: kunit_try_catch Tainted: G    B            N 6.6.94-rc1 #1
[   94.110301] Hardware name: linux,dummy-virt (DT)
[   94.110805] Call trace:
[   94.111236]  dump_backtrace+0x9c/0x128
[   94.111788]  show_stack+0x20/0x38
[   94.112230]  dump_stack_lvl+0x60/0xb0
[   94.112689]  print_report+0xf8/0x5e8
[   94.113150]  kasan_report+0xdc/0x128
[   94.113537]  __asan_load1+0x60/0x70
[   94.114056]  ksize_uaf+0xe8/0x2f0
[   94.114555]  kunit_try_run_case+0x114/0x298
[   94.115009]  kunit_generic_run_threadfn_adapter+0x38/0x60
[   94.115782]  kthread+0x18c/0x1a8
[   94.116243]  ret_from_fork+0x10/0x20
[   94.116740] 
[   94.116971] Allocated by task 193:
[   94.117331]  kasan_save_stack+0x3c/0x68
[   94.117841]  kasan_set_track+0x2c/0x40
[   94.118331]  kasan_save_alloc_info+0x24/0x38
[   94.118833]  __kasan_kmalloc+0xd4/0xd8
[   94.119216]  kmalloc_trace+0x68/0x130
[   94.119599]  ksize_uaf+0x9c/0x2f0
[   94.120124]  kunit_try_run_case+0x114/0x298
[   94.120725]  kunit_generic_run_threadfn_adapter+0x38/0x60
[   94.121351]  kthread+0x18c/0x1a8
[   94.121774]  ret_from_fork+0x10/0x20
[   94.122274] 
[   94.122505] Freed by task 193:
[   94.123150]  kasan_save_stack+0x3c/0x68
[   94.123670]  kasan_set_track+0x2c/0x40
[   94.124250]  kasan_save_free_info+0x38/0x60
[   94.124778]  __kasan_slab_free+0x100/0x170
[   94.125334]  __kmem_cache_free+0x178/0x2c8
[   94.125838]  kfree+0x74/0x138
[   94.126201]  ksize_uaf+0xb8/0x2f0
[   94.126620]  kunit_try_run_case+0x114/0x298
[   94.127129]  kunit_generic_run_threadfn_adapter+0x38/0x60
[   94.127633]  kthread+0x18c/0x1a8
[   94.127961]  ret_from_fork+0x10/0x20
[   94.128327] 
[   94.128533] The buggy address belongs to the object at ffff0000c60b6f00
[   94.128533]  which belongs to the cache kmalloc-128 of size 128
[   94.129232] The buggy address is located 0 bytes inside of
[   94.129232]  freed 128-byte region [ffff0000c60b6f00, ffff0000c60b6f80)
[   94.130648] 
[   94.130980] The buggy address belongs to the physical page:
[   94.131532] page:00000000abb31ec0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1060b6
[   94.132553] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[   94.133376] page_type: 0xffffffff()
[   94.134039] raw: 0bfffc0000000800 ffff0000c00018c0 dead000000000122 0000000000000000
[   94.134838] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   94.135568] page dumped because: kasan: bad access detected
[   94.136250] 
[   94.136627] Memory state around the buggy address:
[   94.137310]  ffff0000c60b6e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   94.138040]  ffff0000c60b6e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   94.138684] >ffff0000c60b6f00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   94.139650]                    ^
[   94.140151]  ffff0000c60b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   94.140923]  ffff0000c60b7000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   94.141710] ==================================================================
[   94.068573] ==================================================================
[   94.069540] BUG: KASAN: slab-use-after-free in ksize_uaf+0xc8/0x2f0
[   94.070267] Read of size 1 at addr ffff0000c60b6f00 by task kunit_try_catch/193
[   94.071166] 
[   94.071638] CPU: 0 PID: 193 Comm: kunit_try_catch Tainted: G    B            N 6.6.94-rc1 #1
[   94.072638] Hardware name: linux,dummy-virt (DT)
[   94.073010] Call trace:
[   94.073401]  dump_backtrace+0x9c/0x128
[   94.073910]  show_stack+0x20/0x38
[   94.074420]  dump_stack_lvl+0x60/0xb0
[   94.074881]  print_report+0xf8/0x5e8
[   94.075296]  kasan_report+0xdc/0x128
[   94.075796]  __kasan_check_byte+0x54/0x70
[   94.076336]  ksize+0x30/0x88
[   94.076725]  ksize_uaf+0xc8/0x2f0
[   94.077175]  kunit_try_run_case+0x114/0x298
[   94.077694]  kunit_generic_run_threadfn_adapter+0x38/0x60
[   94.078272]  kthread+0x18c/0x1a8
[   94.078649]  ret_from_fork+0x10/0x20
[   94.079059] 
[   94.079282] Allocated by task 193:
[   94.079672]  kasan_save_stack+0x3c/0x68
[   94.080206]  kasan_set_track+0x2c/0x40
[   94.080663]  kasan_save_alloc_info+0x24/0x38
[   94.081177]  __kasan_kmalloc+0xd4/0xd8
[   94.081653]  kmalloc_trace+0x68/0x130
[   94.082065]  ksize_uaf+0x9c/0x2f0
[   94.082542]  kunit_try_run_case+0x114/0x298
[   94.083123]  kunit_generic_run_threadfn_adapter+0x38/0x60
[   94.083806]  kthread+0x18c/0x1a8
[   94.084256]  ret_from_fork+0x10/0x20
[   94.084695] 
[   94.084935] Freed by task 193:
[   94.085302]  kasan_save_stack+0x3c/0x68
[   94.085827]  kasan_set_track+0x2c/0x40
[   94.086318]  kasan_save_free_info+0x38/0x60
[   94.087209]  __kasan_slab_free+0x100/0x170
[   94.087716]  __kmem_cache_free+0x178/0x2c8
[   94.088172]  kfree+0x74/0x138
[   94.088537]  ksize_uaf+0xb8/0x2f0
[   94.088960]  kunit_try_run_case+0x114/0x298
[   94.090442]  kunit_generic_run_threadfn_adapter+0x38/0x60
[   94.091172]  kthread+0x18c/0x1a8
[   94.091672]  ret_from_fork+0x10/0x20
[   94.092285] 
[   94.092538] The buggy address belongs to the object at ffff0000c60b6f00
[   94.092538]  which belongs to the cache kmalloc-128 of size 128
[   94.093610] The buggy address is located 0 bytes inside of
[   94.093610]  freed 128-byte region [ffff0000c60b6f00, ffff0000c60b6f80)
[   94.094627] 
[   94.094908] The buggy address belongs to the physical page:
[   94.095764] page:00000000abb31ec0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1060b6
[   94.096454] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[   94.097077] page_type: 0xffffffff()
[   94.097620] raw: 0bfffc0000000800 ffff0000c00018c0 dead000000000122 0000000000000000
[   94.098136] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   94.098950] page dumped because: kasan: bad access detected
[   94.099465] 
[   94.099743] Memory state around the buggy address:
[   94.100318]  ffff0000c60b6e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   94.101116]  ffff0000c60b6e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   94.101752] >ffff0000c60b6f00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   94.102474]                    ^
[   94.102906]  ffff0000c60b6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   94.103628]  ffff0000c60b7000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   94.104300] ==================================================================


[   35.222677] ==================================================================
[   35.223494] BUG: KASAN: slab-use-after-free in ksize_uaf+0x140/0x310
[   35.224253] Read of size 1 at addr ffff888102897b78 by task kunit_try_catch/208
[   35.224915] 
[   35.225158] CPU: 1 PID: 208 Comm: kunit_try_catch Tainted: G    B            N 6.6.94-rc1 #1
[   35.225998] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   35.226642] Call Trace:
[   35.226874]  <TASK>
[   35.227132]  dump_stack_lvl+0x4e/0x90
[   35.227567]  print_report+0xd2/0x650
[   35.228057]  ? __virt_addr_valid+0x156/0x1e0
[   35.228619]  ? ksize_uaf+0x140/0x310
[   35.228929]  ? kasan_complete_mode_report_info+0x64/0x200
[   35.229218]  ? ksize_uaf+0x140/0x310
[   35.229416]  kasan_report+0x147/0x180
[   35.229632]  ? ksize_uaf+0x140/0x310
[   35.229880]  __asan_load1+0x66/0x70
[   35.230303]  ksize_uaf+0x140/0x310
[   35.230787]  ? __pfx_ksize_uaf+0x10/0x10
[   35.231091]  ? __schedule+0x715/0x11a0
[   35.231294]  ? ktime_get_ts64+0x118/0x140
[   35.231516]  kunit_try_run_case+0x120/0x290
[   35.231774]  ? __pfx_kunit_try_run_case+0x10/0x10
[   35.232034]  ? __kasan_check_write+0x18/0x20
[   35.232500]  ? trace_preempt_on+0x20/0xa0
[   35.233063]  ? __kthread_parkme+0x4f/0xd0
[   35.233584]  ? preempt_count_sub+0x50/0x80
[   35.233850]  ? __pfx_kunit_try_run_case+0x10/0x10
[   35.234101]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   35.234401]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   35.235055]  kthread+0x19e/0x1e0
[   35.235434]  ? __pfx_kthread+0x10/0x10
[   35.235776]  ret_from_fork+0x41/0x70
[   35.236267]  ? __pfx_kthread+0x10/0x10
[   35.236597]  ret_from_fork_asm+0x1b/0x30
[   35.237006]  </TASK>
[   35.237259] 
[   35.237522] Allocated by task 208:
[   35.237918]  kasan_save_stack+0x44/0x70
[   35.238417]  kasan_set_track+0x29/0x40
[   35.238710]  kasan_save_alloc_info+0x22/0x30
[   35.238957]  __kasan_kmalloc+0xb7/0xc0
[   35.239154]  kmalloc_trace+0x4c/0xb0
[   35.239356]  ksize_uaf+0x9d/0x310
[   35.240128]  kunit_try_run_case+0x120/0x290
[   35.240722]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   35.241319]  kthread+0x19e/0x1e0
[   35.241783]  ret_from_fork+0x41/0x70
[   35.242206]  ret_from_fork_asm+0x1b/0x30
[   35.242720] 
[   35.242988] Freed by task 208:
[   35.243322]  kasan_save_stack+0x44/0x70
[   35.243904]  kasan_set_track+0x29/0x40
[   35.244330]  kasan_save_free_info+0x2f/0x50
[   35.245319]  ____kasan_slab_free+0x172/0x1d0
[   35.245886]  __kasan_slab_free+0x16/0x20
[   35.246097]  __kmem_cache_free+0x190/0x310
[   35.246304]  kfree+0x7c/0x120
[   35.246721]  ksize_uaf+0xbd/0x310
[   35.247120]  kunit_try_run_case+0x120/0x290
[   35.247641]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   35.248230]  kthread+0x19e/0x1e0
[   35.248671]  ret_from_fork+0x41/0x70
[   35.249228]  ret_from_fork_asm+0x1b/0x30
[   35.249743] 
[   35.250395] The buggy address belongs to the object at ffff888102897b00
[   35.250395]  which belongs to the cache kmalloc-128 of size 128
[   35.251527] The buggy address is located 120 bytes inside of
[   35.251527]  freed 128-byte region [ffff888102897b00, ffff888102897b80)
[   35.252098] 
[   35.252212] The buggy address belongs to the physical page:
[   35.252666] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102897
[   35.253743] flags: 0x200000000000800(slab|node=0|zone=2)
[   35.254311] page_type: 0xffffffff()
[   35.255132] raw: 0200000000000800 ffff8881000418c0 dead000000000122 0000000000000000
[   35.256088] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   35.256769] page dumped because: kasan: bad access detected
[   35.257277] 
[   35.257465] Memory state around the buggy address:
[   35.258003]  ffff888102897a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   35.258657]  ffff888102897a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.259154] >ffff888102897b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   35.260069]                                                                 ^
[   35.260881]  ffff888102897b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.261649]  ffff888102897c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.262231] ==================================================================
[   35.136334] ==================================================================
[   35.137528] BUG: KASAN: slab-use-after-free in ksize_uaf+0xd4/0x310
[   35.138026] Read of size 1 at addr ffff888102897b00 by task kunit_try_catch/208
[   35.138528] 
[   35.138873] CPU: 1 PID: 208 Comm: kunit_try_catch Tainted: G    B            N 6.6.94-rc1 #1
[   35.139499] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   35.140113] Call Trace:
[   35.140323]  <TASK>
[   35.140653]  dump_stack_lvl+0x4e/0x90
[   35.141417]  print_report+0xd2/0x650
[   35.141721]  ? __virt_addr_valid+0x156/0x1e0
[   35.142034]  ? ksize_uaf+0xd4/0x310
[   35.142266]  ? kasan_complete_mode_report_info+0x64/0x200
[   35.142672]  ? ksize_uaf+0xd4/0x310
[   35.142981]  kasan_report+0x147/0x180
[   35.143292]  ? ksize_uaf+0xd4/0x310
[   35.143790]  ? ksize_uaf+0xd4/0x310
[   35.144202]  __kasan_check_byte+0x3d/0x50
[   35.144574]  ksize+0x20/0x60
[   35.145056]  ksize_uaf+0xd4/0x310
[   35.145783]  ? __pfx_ksize_uaf+0x10/0x10
[   35.146115]  ? __schedule+0x715/0x11a0
[   35.146416]  ? ktime_get_ts64+0x118/0x140
[   35.146882]  kunit_try_run_case+0x120/0x290
[   35.147216]  ? __pfx_kunit_try_run_case+0x10/0x10
[   35.147711]  ? __kasan_check_write+0x18/0x20
[   35.148069]  ? trace_preempt_on+0x20/0xa0
[   35.148379]  ? __kthread_parkme+0x4f/0xd0
[   35.148844]  ? preempt_count_sub+0x50/0x80
[   35.149190]  ? __pfx_kunit_try_run_case+0x10/0x10
[   35.149643]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   35.150079]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   35.150905]  kthread+0x19e/0x1e0
[   35.151175]  ? __pfx_kthread+0x10/0x10
[   35.151558]  ret_from_fork+0x41/0x70
[   35.151784]  ? __pfx_kthread+0x10/0x10
[   35.152234]  ret_from_fork_asm+0x1b/0x30
[   35.152648]  </TASK>
[   35.152838] 
[   35.152996] Allocated by task 208:
[   35.153257]  kasan_save_stack+0x44/0x70
[   35.153640]  kasan_set_track+0x29/0x40
[   35.154042]  kasan_save_alloc_info+0x22/0x30
[   35.154636]  __kasan_kmalloc+0xb7/0xc0
[   35.155154]  kmalloc_trace+0x4c/0xb0
[   35.155949]  ksize_uaf+0x9d/0x310
[   35.156155]  kunit_try_run_case+0x120/0x290
[   35.156487]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   35.157120]  kthread+0x19e/0x1e0
[   35.157617]  ret_from_fork+0x41/0x70
[   35.158143]  ret_from_fork_asm+0x1b/0x30
[   35.158694] 
[   35.158972] Freed by task 208:
[   35.159345]  kasan_save_stack+0x44/0x70
[   35.159898]  kasan_set_track+0x29/0x40
[   35.160113]  kasan_save_free_info+0x2f/0x50
[   35.160362]  ____kasan_slab_free+0x172/0x1d0
[   35.161244]  __kasan_slab_free+0x16/0x20
[   35.161784]  __kmem_cache_free+0x190/0x310
[   35.162250]  kfree+0x7c/0x120
[   35.162660]  ksize_uaf+0xbd/0x310
[   35.163118]  kunit_try_run_case+0x120/0x290
[   35.163596]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   35.164101]  kthread+0x19e/0x1e0
[   35.164301]  ret_from_fork+0x41/0x70
[   35.164761]  ret_from_fork_asm+0x1b/0x30
[   35.165234] 
[   35.165794] The buggy address belongs to the object at ffff888102897b00
[   35.165794]  which belongs to the cache kmalloc-128 of size 128
[   35.167239] The buggy address is located 0 bytes inside of
[   35.167239]  freed 128-byte region [ffff888102897b00, ffff888102897b80)
[   35.167958] 
[   35.168162] The buggy address belongs to the physical page:
[   35.168887] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102897
[   35.169915] flags: 0x200000000000800(slab|node=0|zone=2)
[   35.170186] page_type: 0xffffffff()
[   35.170799] raw: 0200000000000800 ffff8881000418c0 dead000000000122 0000000000000000
[   35.171740] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   35.172496] page dumped because: kasan: bad access detected
[   35.173148] 
[   35.173340] Memory state around the buggy address:
[   35.173963]  ffff888102897a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   35.174578]  ffff888102897a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.175145] >ffff888102897b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   35.175983]                    ^
[   35.176350]  ffff888102897b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.177262]  ffff888102897c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.178151] ==================================================================
[   35.179341] ==================================================================
[   35.180068] BUG: KASAN: slab-use-after-free in ksize_uaf+0x108/0x310
[   35.180485] Read of size 1 at addr ffff888102897b00 by task kunit_try_catch/208
[   35.181269] 
[   35.181545] CPU: 1 PID: 208 Comm: kunit_try_catch Tainted: G    B            N 6.6.94-rc1 #1
[   35.182451] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   35.183175] Call Trace:
[   35.183325]  <TASK>
[   35.183660]  dump_stack_lvl+0x4e/0x90
[   35.184175]  print_report+0xd2/0x650
[   35.185035]  ? __virt_addr_valid+0x156/0x1e0
[   35.185546]  ? ksize_uaf+0x108/0x310
[   35.186113]  ? kasan_complete_mode_report_info+0x64/0x200
[   35.186742]  ? ksize_uaf+0x108/0x310
[   35.187029]  kasan_report+0x147/0x180
[   35.187244]  ? ksize_uaf+0x108/0x310
[   35.187661]  __asan_load1+0x66/0x70
[   35.188168]  ksize_uaf+0x108/0x310
[   35.188700]  ? __pfx_ksize_uaf+0x10/0x10
[   35.189169]  ? __schedule+0x715/0x11a0
[   35.190037]  ? ktime_get_ts64+0x118/0x140
[   35.190585]  kunit_try_run_case+0x120/0x290
[   35.191089]  ? __pfx_kunit_try_run_case+0x10/0x10
[   35.191346]  ? __kasan_check_write+0x18/0x20
[   35.191917]  ? trace_preempt_on+0x20/0xa0
[   35.192432]  ? __kthread_parkme+0x4f/0xd0
[   35.192777]  ? preempt_count_sub+0x50/0x80
[   35.193030]  ? __pfx_kunit_try_run_case+0x10/0x10
[   35.193288]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   35.194065]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   35.195105]  kthread+0x19e/0x1e0
[   35.195521]  ? __pfx_kthread+0x10/0x10
[   35.196072]  ret_from_fork+0x41/0x70
[   35.196577]  ? __pfx_kthread+0x10/0x10
[   35.197049]  ret_from_fork_asm+0x1b/0x30
[   35.197613]  </TASK>
[   35.197917] 
[   35.198110] Allocated by task 208:
[   35.198318]  kasan_save_stack+0x44/0x70
[   35.198840]  kasan_set_track+0x29/0x40
[   35.199284]  kasan_save_alloc_info+0x22/0x30
[   35.199925]  __kasan_kmalloc+0xb7/0xc0
[   35.200137]  kmalloc_trace+0x4c/0xb0
[   35.200328]  ksize_uaf+0x9d/0x310
[   35.200789]  kunit_try_run_case+0x120/0x290
[   35.201297]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   35.201987]  kthread+0x19e/0x1e0
[   35.202443]  ret_from_fork+0x41/0x70
[   35.202876]  ret_from_fork_asm+0x1b/0x30
[   35.203303] 
[   35.203498] Freed by task 208:
[   35.203912]  kasan_save_stack+0x44/0x70
[   35.204328]  kasan_set_track+0x29/0x40
[   35.204983]  kasan_save_free_info+0x2f/0x50
[   35.205229]  ____kasan_slab_free+0x172/0x1d0
[   35.205693]  __kasan_slab_free+0x16/0x20
[   35.206148]  __kmem_cache_free+0x190/0x310
[   35.206644]  kfree+0x7c/0x120
[   35.207076]  ksize_uaf+0xbd/0x310
[   35.207524]  kunit_try_run_case+0x120/0x290
[   35.208084]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   35.208706]  kthread+0x19e/0x1e0
[   35.208928]  ret_from_fork+0x41/0x70
[   35.209121]  ret_from_fork_asm+0x1b/0x30
[   35.209329] 
[   35.210127] The buggy address belongs to the object at ffff888102897b00
[   35.210127]  which belongs to the cache kmalloc-128 of size 128
[   35.211610] The buggy address is located 0 bytes inside of
[   35.211610]  freed 128-byte region [ffff888102897b00, ffff888102897b80)
[   35.212963] 
[   35.213220] The buggy address belongs to the physical page:
[   35.213916] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102897
[   35.214322] flags: 0x200000000000800(slab|node=0|zone=2)
[   35.214980] page_type: 0xffffffff()
[   35.215375] raw: 0200000000000800 ffff8881000418c0 dead000000000122 0000000000000000
[   35.216241] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   35.217130] page dumped because: kasan: bad access detected
[   35.217666] 
[   35.217887] Memory state around the buggy address:
[   35.218307]  ffff888102897a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   35.218943]  ffff888102897a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.219248] >ffff888102897b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   35.219608]                    ^
[   35.220046]  ffff888102897b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.220848]  ffff888102897c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.221680] ==================================================================