Hay
Date
July 1, 2025, 3:08 p.m.

Environment
qemu-arm64
qemu-x86_64

[   17.257910] ==================================================================
[   17.257972] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8
[   17.258022] Read of size 1 at addr fff00000c5733c00 by task kunit_try_catch/197
[   17.258071] 
[   17.258130] CPU: 1 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   17.258214] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.258242] Hardware name: linux,dummy-virt (DT)
[   17.258273] Call trace:
[   17.258295]  show_stack+0x20/0x38 (C)
[   17.258357]  dump_stack_lvl+0x8c/0xd0
[   17.258405]  print_report+0x118/0x608
[   17.258450]  kasan_report+0xdc/0x128
[   17.258495]  __kasan_check_byte+0x54/0x70
[   17.258542]  ksize+0x30/0x88
[   17.258635]  ksize_uaf+0x168/0x5f8
[   17.259204]  kunit_try_run_case+0x170/0x3f0
[   17.259342]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.259396]  kthread+0x328/0x630
[   17.259754]  ret_from_fork+0x10/0x20
[   17.259844] 
[   17.260149] Allocated by task 197:
[   17.260196]  kasan_save_stack+0x3c/0x68
[   17.260319]  kasan_save_track+0x20/0x40
[   17.260389]  kasan_save_alloc_info+0x40/0x58
[   17.260517]  __kasan_kmalloc+0xd4/0xd8
[   17.260557]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.260652]  ksize_uaf+0xb8/0x5f8
[   17.261007]  kunit_try_run_case+0x170/0x3f0
[   17.261141]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.261218]  kthread+0x328/0x630
[   17.261325]  ret_from_fork+0x10/0x20
[   17.261386] 
[   17.261458] Freed by task 197:
[   17.261577]  kasan_save_stack+0x3c/0x68
[   17.261617]  kasan_save_track+0x20/0x40
[   17.261674]  kasan_save_free_info+0x4c/0x78
[   17.261721]  __kasan_slab_free+0x6c/0x98
[   17.261874]  kfree+0x214/0x3c8
[   17.262055]  ksize_uaf+0x11c/0x5f8
[   17.262182]  kunit_try_run_case+0x170/0x3f0
[   17.262296]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.262421]  kthread+0x328/0x630
[   17.262480]  ret_from_fork+0x10/0x20
[   17.262596] 
[   17.262645] The buggy address belongs to the object at fff00000c5733c00
[   17.262645]  which belongs to the cache kmalloc-128 of size 128
[   17.262738] The buggy address is located 0 bytes inside of
[   17.262738]  freed 128-byte region [fff00000c5733c00, fff00000c5733c80)
[   17.263074] 
[   17.263355] The buggy address belongs to the physical page:
[   17.263436] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105733
[   17.263574] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.263663] page_type: f5(slab)
[   17.263777] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.263875] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.264012] page dumped because: kasan: bad access detected
[   17.264082] 
[   17.264130] Memory state around the buggy address:
[   17.264227]  fff00000c5733b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.264300]  fff00000c5733b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.264611] >fff00000c5733c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.264687]                    ^
[   17.264740]  fff00000c5733c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.264876]  fff00000c5733d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.264979] ==================================================================
[   17.266027] ==================================================================
[   17.266132] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8
[   17.266219] Read of size 1 at addr fff00000c5733c00 by task kunit_try_catch/197
[   17.266271] 
[   17.266428] CPU: 1 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   17.266603] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.266826] Hardware name: linux,dummy-virt (DT)
[   17.266869] Call trace:
[   17.266910]  show_stack+0x20/0x38 (C)
[   17.266976]  dump_stack_lvl+0x8c/0xd0
[   17.267028]  print_report+0x118/0x608
[   17.267074]  kasan_report+0xdc/0x128
[   17.267119]  __asan_report_load1_noabort+0x20/0x30
[   17.267245]  ksize_uaf+0x598/0x5f8
[   17.267291]  kunit_try_run_case+0x170/0x3f0
[   17.267357]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.267457]  kthread+0x328/0x630
[   17.267501]  ret_from_fork+0x10/0x20
[   17.267549] 
[   17.267812] Allocated by task 197:
[   17.267870]  kasan_save_stack+0x3c/0x68
[   17.267970]  kasan_save_track+0x20/0x40
[   17.268039]  kasan_save_alloc_info+0x40/0x58
[   17.268082]  __kasan_kmalloc+0xd4/0xd8
[   17.268178]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.268232]  ksize_uaf+0xb8/0x5f8
[   17.268312]  kunit_try_run_case+0x170/0x3f0
[   17.268452]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.268504]  kthread+0x328/0x630
[   17.268583]  ret_from_fork+0x10/0x20
[   17.268836] 
[   17.268905] Freed by task 197:
[   17.268945]  kasan_save_stack+0x3c/0x68
[   17.268988]  kasan_save_track+0x20/0x40
[   17.269091]  kasan_save_free_info+0x4c/0x78
[   17.269134]  __kasan_slab_free+0x6c/0x98
[   17.269172]  kfree+0x214/0x3c8
[   17.269206]  ksize_uaf+0x11c/0x5f8
[   17.269304]  kunit_try_run_case+0x170/0x3f0
[   17.269406]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.269594]  kthread+0x328/0x630
[   17.269635]  ret_from_fork+0x10/0x20
[   17.269671] 
[   17.269694] The buggy address belongs to the object at fff00000c5733c00
[   17.269694]  which belongs to the cache kmalloc-128 of size 128
[   17.269934] The buggy address is located 0 bytes inside of
[   17.269934]  freed 128-byte region [fff00000c5733c00, fff00000c5733c80)
[   17.270050] 
[   17.270109] The buggy address belongs to the physical page:
[   17.270249] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105733
[   17.270337] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.270637] page_type: f5(slab)
[   17.270693] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.270967] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.271044] page dumped because: kasan: bad access detected
[   17.271099] 
[   17.271146] Memory state around the buggy address:
[   17.271286]  fff00000c5733b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.271370]  fff00000c5733b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.271704] >fff00000c5733c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.271868]                    ^
[   17.271939]  fff00000c5733c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.272104]  fff00000c5733d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.272196] ==================================================================
[   17.273235] ==================================================================
[   17.273303] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8
[   17.273353] Read of size 1 at addr fff00000c5733c78 by task kunit_try_catch/197
[   17.273722] 
[   17.273880] CPU: 1 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   17.274051] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.274112] Hardware name: linux,dummy-virt (DT)
[   17.274187] Call trace:
[   17.274289]  show_stack+0x20/0x38 (C)
[   17.274378]  dump_stack_lvl+0x8c/0xd0
[   17.274448]  print_report+0x118/0x608
[   17.274808]  kasan_report+0xdc/0x128
[   17.274877]  __asan_report_load1_noabort+0x20/0x30
[   17.274989]  ksize_uaf+0x544/0x5f8
[   17.275041]  kunit_try_run_case+0x170/0x3f0
[   17.275086]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.275137]  kthread+0x328/0x630
[   17.275179]  ret_from_fork+0x10/0x20
[   17.275233] 
[   17.275252] Allocated by task 197:
[   17.275287]  kasan_save_stack+0x3c/0x68
[   17.275340]  kasan_save_track+0x20/0x40
[   17.275377]  kasan_save_alloc_info+0x40/0x58
[   17.275431]  __kasan_kmalloc+0xd4/0xd8
[   17.275473]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.275512]  ksize_uaf+0xb8/0x5f8
[   17.275561]  kunit_try_run_case+0x170/0x3f0
[   17.275958]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.276049]  kthread+0x328/0x630
[   17.276137]  ret_from_fork+0x10/0x20
[   17.276228] 
[   17.276298] Freed by task 197:
[   17.276435]  kasan_save_stack+0x3c/0x68
[   17.276492]  kasan_save_track+0x20/0x40
[   17.276555]  kasan_save_free_info+0x4c/0x78
[   17.276890]  __kasan_slab_free+0x6c/0x98
[   17.276968]  kfree+0x214/0x3c8
[   17.277086]  ksize_uaf+0x11c/0x5f8
[   17.277164]  kunit_try_run_case+0x170/0x3f0
[   17.277312]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.277396]  kthread+0x328/0x630
[   17.277457]  ret_from_fork+0x10/0x20
[   17.277495] 
[   17.277514] The buggy address belongs to the object at fff00000c5733c00
[   17.277514]  which belongs to the cache kmalloc-128 of size 128
[   17.277585] The buggy address is located 120 bytes inside of
[   17.277585]  freed 128-byte region [fff00000c5733c00, fff00000c5733c80)
[   17.278521] 
[   17.278596] The buggy address belongs to the physical page:
[   17.278919] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105733
[   17.278996] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.279134] page_type: f5(slab)
[   17.279215] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.279679] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.279953] page dumped because: kasan: bad access detected
[   17.280041] 
[   17.280076] Memory state around the buggy address:
[   17.280188]  fff00000c5733b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.280302]  fff00000c5733b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.280368] >fff00000c5733c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.280458]                                                                 ^
[   17.280555]  fff00000c5733c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.280654]  fff00000c5733d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.281356] ==================================================================

[   12.112403] ==================================================================
[   12.112785] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5fe/0x6c0
[   12.113075] Read of size 1 at addr ffff8881033ae300 by task kunit_try_catch/213
[   12.113394] 
[   12.113492] CPU: 0 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   12.113533] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.113544] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.113564] Call Trace:
[   12.113579]  <TASK>
[   12.113595]  dump_stack_lvl+0x73/0xb0
[   12.113621]  print_report+0xd1/0x650
[   12.113809]  ? __virt_addr_valid+0x1db/0x2d0
[   12.113842]  ? ksize_uaf+0x5fe/0x6c0
[   12.113861]  ? kasan_complete_mode_report_info+0x64/0x200
[   12.113882]  ? ksize_uaf+0x5fe/0x6c0
[   12.113902]  kasan_report+0x141/0x180
[   12.113922]  ? ksize_uaf+0x5fe/0x6c0
[   12.113946]  __asan_report_load1_noabort+0x18/0x20
[   12.113969]  ksize_uaf+0x5fe/0x6c0
[   12.113989]  ? __pfx_ksize_uaf+0x10/0x10
[   12.114009]  ? __schedule+0x10cc/0x2b60
[   12.114045]  ? __pfx_read_tsc+0x10/0x10
[   12.114065]  ? ktime_get_ts64+0x86/0x230
[   12.114088]  kunit_try_run_case+0x1a5/0x480
[   12.114110]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.114131]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.114153]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.114175]  ? __kthread_parkme+0x82/0x180
[   12.114194]  ? preempt_count_sub+0x50/0x80
[   12.114217]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.114239]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.114261]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.114282]  kthread+0x337/0x6f0
[   12.114300]  ? trace_preempt_on+0x20/0xc0
[   12.114322]  ? __pfx_kthread+0x10/0x10
[   12.114355]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.114375]  ? calculate_sigpending+0x7b/0xa0
[   12.114398]  ? __pfx_kthread+0x10/0x10
[   12.114418]  ret_from_fork+0x116/0x1d0
[   12.114435]  ? __pfx_kthread+0x10/0x10
[   12.114455]  ret_from_fork_asm+0x1a/0x30
[   12.114484]  </TASK>
[   12.114496] 
[   12.121615] Allocated by task 213:
[   12.121815]  kasan_save_stack+0x45/0x70
[   12.121960]  kasan_save_track+0x18/0x40
[   12.122107]  kasan_save_alloc_info+0x3b/0x50
[   12.122254]  __kasan_kmalloc+0xb7/0xc0
[   12.122407]  __kmalloc_cache_noprof+0x189/0x420
[   12.122627]  ksize_uaf+0xaa/0x6c0
[   12.123091]  kunit_try_run_case+0x1a5/0x480
[   12.123322]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.123571]  kthread+0x337/0x6f0
[   12.123920]  ret_from_fork+0x116/0x1d0
[   12.124131]  ret_from_fork_asm+0x1a/0x30
[   12.124317] 
[   12.124394] Freed by task 213:
[   12.124537]  kasan_save_stack+0x45/0x70
[   12.124792]  kasan_save_track+0x18/0x40
[   12.124990]  kasan_save_free_info+0x3f/0x60
[   12.125171]  __kasan_slab_free+0x56/0x70
[   12.125369]  kfree+0x222/0x3f0
[   12.125541]  ksize_uaf+0x12c/0x6c0
[   12.125670]  kunit_try_run_case+0x1a5/0x480
[   12.125816]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.125988]  kthread+0x337/0x6f0
[   12.126158]  ret_from_fork+0x116/0x1d0
[   12.126340]  ret_from_fork_asm+0x1a/0x30
[   12.126792] 
[   12.126901] The buggy address belongs to the object at ffff8881033ae300
[   12.126901]  which belongs to the cache kmalloc-128 of size 128
[   12.127293] The buggy address is located 0 bytes inside of
[   12.127293]  freed 128-byte region [ffff8881033ae300, ffff8881033ae380)
[   12.128002] 
[   12.128114] The buggy address belongs to the physical page:
[   12.128359] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ae
[   12.128747] flags: 0x200000000000000(node=0|zone=2)
[   12.128954] page_type: f5(slab)
[   12.129135] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.129424] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.129793] page dumped because: kasan: bad access detected
[   12.130003] 
[   12.130113] Memory state around the buggy address:
[   12.130309]  ffff8881033ae200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.130602]  ffff8881033ae280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.131093] >ffff8881033ae300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.131365]                    ^
[   12.131482]  ffff8881033ae380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.131724]  ffff8881033ae400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.132234] ==================================================================
[   12.132831] ==================================================================
[   12.133189] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5e4/0x6c0
[   12.133421] Read of size 1 at addr ffff8881033ae378 by task kunit_try_catch/213
[   12.134007] 
[   12.134153] CPU: 0 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   12.134197] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.134209] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.134230] Call Trace:
[   12.134248]  <TASK>
[   12.134264]  dump_stack_lvl+0x73/0xb0
[   12.134293]  print_report+0xd1/0x650
[   12.134314]  ? __virt_addr_valid+0x1db/0x2d0
[   12.134337]  ? ksize_uaf+0x5e4/0x6c0
[   12.134356]  ? kasan_complete_mode_report_info+0x64/0x200
[   12.134377]  ? ksize_uaf+0x5e4/0x6c0
[   12.134397]  kasan_report+0x141/0x180
[   12.134418]  ? ksize_uaf+0x5e4/0x6c0
[   12.134442]  __asan_report_load1_noabort+0x18/0x20
[   12.134465]  ksize_uaf+0x5e4/0x6c0
[   12.134484]  ? __pfx_ksize_uaf+0x10/0x10
[   12.134504]  ? __schedule+0x10cc/0x2b60
[   12.134525]  ? __pfx_read_tsc+0x10/0x10
[   12.134545]  ? ktime_get_ts64+0x86/0x230
[   12.134568]  kunit_try_run_case+0x1a5/0x480
[   12.134590]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.134611]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.134633]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.134654]  ? __kthread_parkme+0x82/0x180
[   12.134673]  ? preempt_count_sub+0x50/0x80
[   12.134695]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.134717]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.134910]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.134942]  kthread+0x337/0x6f0
[   12.134962]  ? trace_preempt_on+0x20/0xc0
[   12.134985]  ? __pfx_kthread+0x10/0x10
[   12.135004]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.135039]  ? calculate_sigpending+0x7b/0xa0
[   12.135062]  ? __pfx_kthread+0x10/0x10
[   12.135083]  ret_from_fork+0x116/0x1d0
[   12.135100]  ? __pfx_kthread+0x10/0x10
[   12.135119]  ret_from_fork_asm+0x1a/0x30
[   12.135149]  </TASK>
[   12.135161] 
[   12.142054] Allocated by task 213:
[   12.142217]  kasan_save_stack+0x45/0x70
[   12.142361]  kasan_save_track+0x18/0x40
[   12.142535]  kasan_save_alloc_info+0x3b/0x50
[   12.142910]  __kasan_kmalloc+0xb7/0xc0
[   12.143111]  __kmalloc_cache_noprof+0x189/0x420
[   12.143312]  ksize_uaf+0xaa/0x6c0
[   12.143473]  kunit_try_run_case+0x1a5/0x480
[   12.143674]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.143886]  kthread+0x337/0x6f0
[   12.144006]  ret_from_fork+0x116/0x1d0
[   12.144153]  ret_from_fork_asm+0x1a/0x30
[   12.144290] 
[   12.144358] Freed by task 213:
[   12.144468]  kasan_save_stack+0x45/0x70
[   12.144600]  kasan_save_track+0x18/0x40
[   12.144731]  kasan_save_free_info+0x3f/0x60
[   12.144936]  __kasan_slab_free+0x56/0x70
[   12.145138]  kfree+0x222/0x3f0
[   12.145298]  ksize_uaf+0x12c/0x6c0
[   12.145469]  kunit_try_run_case+0x1a5/0x480
[   12.145863]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.146150]  kthread+0x337/0x6f0
[   12.146316]  ret_from_fork+0x116/0x1d0
[   12.146463]  ret_from_fork_asm+0x1a/0x30
[   12.146604] 
[   12.146848] The buggy address belongs to the object at ffff8881033ae300
[   12.146848]  which belongs to the cache kmalloc-128 of size 128
[   12.147394] The buggy address is located 120 bytes inside of
[   12.147394]  freed 128-byte region [ffff8881033ae300, ffff8881033ae380)
[   12.147947] 
[   12.148046] The buggy address belongs to the physical page:
[   12.148259] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ae
[   12.148496] flags: 0x200000000000000(node=0|zone=2)
[   12.148657] page_type: f5(slab)
[   12.148965] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.149325] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.149666] page dumped because: kasan: bad access detected
[   12.149927] 
[   12.150034] Memory state around the buggy address:
[   12.150242]  ffff8881033ae200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.150822]  ffff8881033ae280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.151057] >ffff8881033ae300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.151377]                                                                 ^
[   12.151733]  ffff8881033ae380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.152029]  ffff8881033ae400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.152281] ==================================================================
[   12.091975] ==================================================================
[   12.092518] BUG: KASAN: slab-use-after-free in ksize_uaf+0x19d/0x6c0
[   12.093065] Read of size 1 at addr ffff8881033ae300 by task kunit_try_catch/213
[   12.093387] 
[   12.093497] CPU: 0 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   12.093545] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.093557] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.093579] Call Trace:
[   12.093591]  <TASK>
[   12.093612]  dump_stack_lvl+0x73/0xb0
[   12.093644]  print_report+0xd1/0x650
[   12.093731]  ? __virt_addr_valid+0x1db/0x2d0
[   12.093756]  ? ksize_uaf+0x19d/0x6c0
[   12.093776]  ? kasan_complete_mode_report_info+0x64/0x200
[   12.093797]  ? ksize_uaf+0x19d/0x6c0
[   12.093816]  kasan_report+0x141/0x180
[   12.093836]  ? ksize_uaf+0x19d/0x6c0
[   12.093858]  ? ksize_uaf+0x19d/0x6c0
[   12.093878]  __kasan_check_byte+0x3d/0x50
[   12.093899]  ksize+0x20/0x60
[   12.093920]  ksize_uaf+0x19d/0x6c0
[   12.093939]  ? __pfx_ksize_uaf+0x10/0x10
[   12.093959]  ? __schedule+0x10cc/0x2b60
[   12.093981]  ? __pfx_read_tsc+0x10/0x10
[   12.094001]  ? ktime_get_ts64+0x86/0x230
[   12.094039]  kunit_try_run_case+0x1a5/0x480
[   12.094064]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.094085]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.094108]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.094129]  ? __kthread_parkme+0x82/0x180
[   12.094149]  ? preempt_count_sub+0x50/0x80
[   12.094172]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.094194]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.094215]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.094236]  kthread+0x337/0x6f0
[   12.094254]  ? trace_preempt_on+0x20/0xc0
[   12.094276]  ? __pfx_kthread+0x10/0x10
[   12.094295]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.094314]  ? calculate_sigpending+0x7b/0xa0
[   12.094337]  ? __pfx_kthread+0x10/0x10
[   12.094357]  ret_from_fork+0x116/0x1d0
[   12.094374]  ? __pfx_kthread+0x10/0x10
[   12.094392]  ret_from_fork_asm+0x1a/0x30
[   12.094422]  </TASK>
[   12.094434] 
[   12.101846] Allocated by task 213:
[   12.102055]  kasan_save_stack+0x45/0x70
[   12.102252]  kasan_save_track+0x18/0x40
[   12.102413]  kasan_save_alloc_info+0x3b/0x50
[   12.102561]  __kasan_kmalloc+0xb7/0xc0
[   12.102691]  __kmalloc_cache_noprof+0x189/0x420
[   12.102909]  ksize_uaf+0xaa/0x6c0
[   12.103090]  kunit_try_run_case+0x1a5/0x480
[   12.103313]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.103544]  kthread+0x337/0x6f0
[   12.103775]  ret_from_fork+0x116/0x1d0
[   12.103973]  ret_from_fork_asm+0x1a/0x30
[   12.104185] 
[   12.104273] Freed by task 213:
[   12.104418]  kasan_save_stack+0x45/0x70
[   12.104556]  kasan_save_track+0x18/0x40
[   12.104688]  kasan_save_free_info+0x3f/0x60
[   12.105128]  __kasan_slab_free+0x56/0x70
[   12.105351]  kfree+0x222/0x3f0
[   12.105518]  ksize_uaf+0x12c/0x6c0
[   12.105823]  kunit_try_run_case+0x1a5/0x480
[   12.106014]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.106197]  kthread+0x337/0x6f0
[   12.106316]  ret_from_fork+0x116/0x1d0
[   12.106446]  ret_from_fork_asm+0x1a/0x30
[   12.106613] 
[   12.106708] The buggy address belongs to the object at ffff8881033ae300
[   12.106708]  which belongs to the cache kmalloc-128 of size 128
[   12.107244] The buggy address is located 0 bytes inside of
[   12.107244]  freed 128-byte region [ffff8881033ae300, ffff8881033ae380)
[   12.107733] 
[   12.107839] The buggy address belongs to the physical page:
[   12.108091] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ae
[   12.108371] flags: 0x200000000000000(node=0|zone=2)
[   12.108537] page_type: f5(slab)
[   12.108658] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.109238] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.109635] page dumped because: kasan: bad access detected
[   12.110055] 
[   12.110154] Memory state around the buggy address:
[   12.110381]  ffff8881033ae200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.110666]  ffff8881033ae280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.110893] >ffff8881033ae300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.111190]                    ^
[   12.111352]  ffff8881033ae380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.111648]  ffff8881033ae400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.111932] ==================================================================