Hay
Date
July 9, 2025, 12:11 a.m.

Environment
qemu-arm64
qemu-x86_64

[   19.964956] ==================================================================
[   19.965027] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8
[   19.965106] Read of size 1 at addr fff00000c64b5378 by task kunit_try_catch/197
[   19.965162] 
[   19.965200] CPU: 1 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.965313] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.965339] Hardware name: linux,dummy-virt (DT)
[   19.965389] Call trace:
[   19.965444]  show_stack+0x20/0x38 (C)
[   19.965551]  dump_stack_lvl+0x8c/0xd0
[   19.965606]  print_report+0x118/0x608
[   19.965663]  kasan_report+0xdc/0x128
[   19.965711]  __asan_report_load1_noabort+0x20/0x30
[   19.965762]  ksize_uaf+0x544/0x5f8
[   19.966058]  kunit_try_run_case+0x170/0x3f0
[   19.966115]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.966169]  kthread+0x328/0x630
[   19.966229]  ret_from_fork+0x10/0x20
[   19.966285] 
[   19.966305] Allocated by task 197:
[   19.966386]  kasan_save_stack+0x3c/0x68
[   19.966440]  kasan_save_track+0x20/0x40
[   19.966496]  kasan_save_alloc_info+0x40/0x58
[   19.966559]  __kasan_kmalloc+0xd4/0xd8
[   19.966633]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.966701]  ksize_uaf+0xb8/0x5f8
[   19.966748]  kunit_try_run_case+0x170/0x3f0
[   19.966788]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.966833]  kthread+0x328/0x630
[   19.966873]  ret_from_fork+0x10/0x20
[   19.966910] 
[   19.966939] Freed by task 197:
[   19.966967]  kasan_save_stack+0x3c/0x68
[   19.967004]  kasan_save_track+0x20/0x40
[   19.967043]  kasan_save_free_info+0x4c/0x78
[   19.967083]  __kasan_slab_free+0x6c/0x98
[   19.967121]  kfree+0x214/0x3c8
[   19.967158]  ksize_uaf+0x11c/0x5f8
[   19.967192]  kunit_try_run_case+0x170/0x3f0
[   19.967240]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.967285]  kthread+0x328/0x630
[   19.967322]  ret_from_fork+0x10/0x20
[   19.967367] 
[   19.967386] The buggy address belongs to the object at fff00000c64b5300
[   19.967386]  which belongs to the cache kmalloc-128 of size 128
[   19.967453] The buggy address is located 120 bytes inside of
[   19.967453]  freed 128-byte region [fff00000c64b5300, fff00000c64b5380)
[   19.967515] 
[   19.967534] The buggy address belongs to the physical page:
[   19.967565] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064b5
[   19.967617] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.967665] page_type: f5(slab)
[   19.967703] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.967753] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.967793] page dumped because: kasan: bad access detected
[   19.967824] 
[   19.967860] Memory state around the buggy address:
[   19.967911]  fff00000c64b5200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.967955]  fff00000c64b5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.968004] >fff00000c64b5300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.968110]                                                                 ^
[   19.968184]  fff00000c64b5380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.968228]  fff00000c64b5400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.968291] ==================================================================
[   19.959346] ==================================================================
[   19.959445] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8
[   19.959511] Read of size 1 at addr fff00000c64b5300 by task kunit_try_catch/197
[   19.959578] 
[   19.959607] CPU: 1 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.959692] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.959719] Hardware name: linux,dummy-virt (DT)
[   19.959751] Call trace:
[   19.960054]  show_stack+0x20/0x38 (C)
[   19.960104]  dump_stack_lvl+0x8c/0xd0
[   19.960184]  print_report+0x118/0x608
[   19.960251]  kasan_report+0xdc/0x128
[   19.960314]  __asan_report_load1_noabort+0x20/0x30
[   19.960377]  ksize_uaf+0x598/0x5f8
[   19.960431]  kunit_try_run_case+0x170/0x3f0
[   19.960479]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.960533]  kthread+0x328/0x630
[   19.960577]  ret_from_fork+0x10/0x20
[   19.960625] 
[   19.960643] Allocated by task 197:
[   19.960671]  kasan_save_stack+0x3c/0x68
[   19.960712]  kasan_save_track+0x20/0x40
[   19.960751]  kasan_save_alloc_info+0x40/0x58
[   19.961090]  __kasan_kmalloc+0xd4/0xd8
[   19.961167]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.961277]  ksize_uaf+0xb8/0x5f8
[   19.961326]  kunit_try_run_case+0x170/0x3f0
[   19.961425]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.961543]  kthread+0x328/0x630
[   19.961604]  ret_from_fork+0x10/0x20
[   19.961723] 
[   19.961761] Freed by task 197:
[   19.961787]  kasan_save_stack+0x3c/0x68
[   19.961851]  kasan_save_track+0x20/0x40
[   19.962157]  kasan_save_free_info+0x4c/0x78
[   19.962226]  __kasan_slab_free+0x6c/0x98
[   19.962361]  kfree+0x214/0x3c8
[   19.962428]  ksize_uaf+0x11c/0x5f8
[   19.962543]  kunit_try_run_case+0x170/0x3f0
[   19.962622]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.962696]  kthread+0x328/0x630
[   19.962787]  ret_from_fork+0x10/0x20
[   19.962857] 
[   19.962908] The buggy address belongs to the object at fff00000c64b5300
[   19.962908]  which belongs to the cache kmalloc-128 of size 128
[   19.963037] The buggy address is located 0 bytes inside of
[   19.963037]  freed 128-byte region [fff00000c64b5300, fff00000c64b5380)
[   19.963111] 
[   19.963131] The buggy address belongs to the physical page:
[   19.963163] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064b5
[   19.963497] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.963584] page_type: f5(slab)
[   19.963667] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.963743] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.963855] page dumped because: kasan: bad access detected
[   19.963923] 
[   19.963982] Memory state around the buggy address:
[   19.964063]  fff00000c64b5200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.964134]  fff00000c64b5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.964187] >fff00000c64b5300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.964231]                    ^
[   19.964271]  fff00000c64b5380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.964315]  fff00000c64b5400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.964353] ==================================================================
[   19.955252] ==================================================================
[   19.955312] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8
[   19.955597] Read of size 1 at addr fff00000c64b5300 by task kunit_try_catch/197
[   19.955649] 
[   19.955679] CPU: 1 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.955769] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.955797] Hardware name: linux,dummy-virt (DT)
[   19.955844] Call trace:
[   19.955883]  show_stack+0x20/0x38 (C)
[   19.955934]  dump_stack_lvl+0x8c/0xd0
[   19.955981]  print_report+0x118/0x608
[   19.956030]  kasan_report+0xdc/0x128
[   19.956150]  __kasan_check_byte+0x54/0x70
[   19.956236]  ksize+0x30/0x88
[   19.956368]  ksize_uaf+0x168/0x5f8
[   19.956434]  kunit_try_run_case+0x170/0x3f0
[   19.956484]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.956538]  kthread+0x328/0x630
[   19.956601]  ret_from_fork+0x10/0x20
[   19.956650] 
[   19.956668] Allocated by task 197:
[   19.956697]  kasan_save_stack+0x3c/0x68
[   19.956739]  kasan_save_track+0x20/0x40
[   19.956778]  kasan_save_alloc_info+0x40/0x58
[   19.956819]  __kasan_kmalloc+0xd4/0xd8
[   19.956856]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.956897]  ksize_uaf+0xb8/0x5f8
[   19.956934]  kunit_try_run_case+0x170/0x3f0
[   19.957026]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.957108]  kthread+0x328/0x630
[   19.957166]  ret_from_fork+0x10/0x20
[   19.957221] 
[   19.957283] Freed by task 197:
[   19.957423]  kasan_save_stack+0x3c/0x68
[   19.957500]  kasan_save_track+0x20/0x40
[   19.957608]  kasan_save_free_info+0x4c/0x78
[   19.957661]  __kasan_slab_free+0x6c/0x98
[   19.957701]  kfree+0x214/0x3c8
[   19.957735]  ksize_uaf+0x11c/0x5f8
[   19.957771]  kunit_try_run_case+0x170/0x3f0
[   19.957819]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.957864]  kthread+0x328/0x630
[   19.957897]  ret_from_fork+0x10/0x20
[   19.957941] 
[   19.957961] The buggy address belongs to the object at fff00000c64b5300
[   19.957961]  which belongs to the cache kmalloc-128 of size 128
[   19.958027] The buggy address is located 0 bytes inside of
[   19.958027]  freed 128-byte region [fff00000c64b5300, fff00000c64b5380)
[   19.958099] 
[   19.958119] The buggy address belongs to the physical page:
[   19.958159] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064b5
[   19.958219] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.958268] page_type: f5(slab)
[   19.958315] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.958376] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.958426] page dumped because: kasan: bad access detected
[   19.958457] 
[   19.958475] Memory state around the buggy address:
[   19.958507]  fff00000c64b5200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.958550]  fff00000c64b5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.958593] >fff00000c64b5300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.958631]                    ^
[   19.958657]  fff00000c64b5380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.958700]  fff00000c64b5400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.958739] ==================================================================

[   13.129371] ==================================================================
[   13.129829] BUG: KASAN: slab-use-after-free in ksize_uaf+0x19d/0x6c0
[   13.130336] Read of size 1 at addr ffff888102a9ed00 by task kunit_try_catch/213
[   13.130923] 
[   13.131319] CPU: 1 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   13.131371] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.131383] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.131405] Call Trace:
[   13.131417]  <TASK>
[   13.131436]  dump_stack_lvl+0x73/0xb0
[   13.131471]  print_report+0xd1/0x650
[   13.131494]  ? __virt_addr_valid+0x1db/0x2d0
[   13.131611]  ? ksize_uaf+0x19d/0x6c0
[   13.131633]  ? kasan_complete_mode_report_info+0x64/0x200
[   13.131656]  ? ksize_uaf+0x19d/0x6c0
[   13.131677]  kasan_report+0x141/0x180
[   13.131699]  ? ksize_uaf+0x19d/0x6c0
[   13.131722]  ? ksize_uaf+0x19d/0x6c0
[   13.131742]  __kasan_check_byte+0x3d/0x50
[   13.131764]  ksize+0x20/0x60
[   13.131785]  ksize_uaf+0x19d/0x6c0
[   13.131805]  ? __pfx_ksize_uaf+0x10/0x10
[   13.131827]  ? __schedule+0x10cc/0x2b60
[   13.131850]  ? __pfx_read_tsc+0x10/0x10
[   13.131872]  ? ktime_get_ts64+0x86/0x230
[   13.131898]  kunit_try_run_case+0x1a5/0x480
[   13.131937]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.132301]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.132334]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.132358]  ? __kthread_parkme+0x82/0x180
[   13.132380]  ? preempt_count_sub+0x50/0x80
[   13.132405]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.132431]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.132456]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.132481]  kthread+0x337/0x6f0
[   13.132500]  ? trace_preempt_on+0x20/0xc0
[   13.132525]  ? __pfx_kthread+0x10/0x10
[   13.132545]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.132566]  ? calculate_sigpending+0x7b/0xa0
[   13.132591]  ? __pfx_kthread+0x10/0x10
[   13.132612]  ret_from_fork+0x116/0x1d0
[   13.132631]  ? __pfx_kthread+0x10/0x10
[   13.132651]  ret_from_fork_asm+0x1a/0x30
[   13.132683]  </TASK>
[   13.132694] 
[   13.144640] Allocated by task 213:
[   13.144942]  kasan_save_stack+0x45/0x70
[   13.145189]  kasan_save_track+0x18/0x40
[   13.145782]  kasan_save_alloc_info+0x3b/0x50
[   13.146046]  __kasan_kmalloc+0xb7/0xc0
[   13.146522]  __kmalloc_cache_noprof+0x189/0x420
[   13.146759]  ksize_uaf+0xaa/0x6c0
[   13.147114]  kunit_try_run_case+0x1a5/0x480
[   13.147516]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.147781]  kthread+0x337/0x6f0
[   13.148122]  ret_from_fork+0x116/0x1d0
[   13.148602]  ret_from_fork_asm+0x1a/0x30
[   13.148799] 
[   13.148888] Freed by task 213:
[   13.149359]  kasan_save_stack+0x45/0x70
[   13.149549]  kasan_save_track+0x18/0x40
[   13.150019]  kasan_save_free_info+0x3f/0x60
[   13.150221]  __kasan_slab_free+0x56/0x70
[   13.150541]  kfree+0x222/0x3f0
[   13.150726]  ksize_uaf+0x12c/0x6c0
[   13.151134]  kunit_try_run_case+0x1a5/0x480
[   13.151471]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.151729]  kthread+0x337/0x6f0
[   13.151900]  ret_from_fork+0x116/0x1d0
[   13.152440]  ret_from_fork_asm+0x1a/0x30
[   13.152654] 
[   13.152898] The buggy address belongs to the object at ffff888102a9ed00
[   13.152898]  which belongs to the cache kmalloc-128 of size 128
[   13.154095] The buggy address is located 0 bytes inside of
[   13.154095]  freed 128-byte region [ffff888102a9ed00, ffff888102a9ed80)
[   13.154834] 
[   13.155151] The buggy address belongs to the physical page:
[   13.155514] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a9e
[   13.155849] flags: 0x200000000000000(node=0|zone=2)
[   13.156294] page_type: f5(slab)
[   13.156643] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   13.157208] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.157756] page dumped because: kasan: bad access detected
[   13.158024] 
[   13.158352] Memory state around the buggy address:
[   13.158596]  ffff888102a9ec00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.158854]  ffff888102a9ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.159574] >ffff888102a9ed00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.159851]                    ^
[   13.160067]  ffff888102a9ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.160588]  ffff888102a9ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.160987] ==================================================================
[   13.194153] ==================================================================
[   13.194649] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5e4/0x6c0
[   13.194908] Read of size 1 at addr ffff888102a9ed78 by task kunit_try_catch/213
[   13.195416] 
[   13.195529] CPU: 1 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   13.195574] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.195597] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.195617] Call Trace:
[   13.195636]  <TASK>
[   13.195655]  dump_stack_lvl+0x73/0xb0
[   13.195687]  print_report+0xd1/0x650
[   13.195720]  ? __virt_addr_valid+0x1db/0x2d0
[   13.195743]  ? ksize_uaf+0x5e4/0x6c0
[   13.195763]  ? kasan_complete_mode_report_info+0x64/0x200
[   13.195797]  ? ksize_uaf+0x5e4/0x6c0
[   13.195818]  kasan_report+0x141/0x180
[   13.195839]  ? ksize_uaf+0x5e4/0x6c0
[   13.195864]  __asan_report_load1_noabort+0x18/0x20
[   13.195889]  ksize_uaf+0x5e4/0x6c0
[   13.195908]  ? __pfx_ksize_uaf+0x10/0x10
[   13.195944]  ? __schedule+0x10cc/0x2b60
[   13.196048]  ? __pfx_read_tsc+0x10/0x10
[   13.196084]  ? ktime_get_ts64+0x86/0x230
[   13.196110]  kunit_try_run_case+0x1a5/0x480
[   13.196136]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.196170]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.196195]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.196218]  ? __kthread_parkme+0x82/0x180
[   13.196239]  ? preempt_count_sub+0x50/0x80
[   13.196263]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.196297]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.196321]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.196357]  kthread+0x337/0x6f0
[   13.196376]  ? trace_preempt_on+0x20/0xc0
[   13.196400]  ? __pfx_kthread+0x10/0x10
[   13.196420]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.196441]  ? calculate_sigpending+0x7b/0xa0
[   13.196466]  ? __pfx_kthread+0x10/0x10
[   13.196486]  ret_from_fork+0x116/0x1d0
[   13.196506]  ? __pfx_kthread+0x10/0x10
[   13.196526]  ret_from_fork_asm+0x1a/0x30
[   13.196557]  </TASK>
[   13.196568] 
[   13.204359] Allocated by task 213:
[   13.204579]  kasan_save_stack+0x45/0x70
[   13.204810]  kasan_save_track+0x18/0x40
[   13.205071]  kasan_save_alloc_info+0x3b/0x50
[   13.205225]  __kasan_kmalloc+0xb7/0xc0
[   13.205502]  __kmalloc_cache_noprof+0x189/0x420
[   13.205752]  ksize_uaf+0xaa/0x6c0
[   13.205915]  kunit_try_run_case+0x1a5/0x480
[   13.206129]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.206503]  kthread+0x337/0x6f0
[   13.206715]  ret_from_fork+0x116/0x1d0
[   13.207023]  ret_from_fork_asm+0x1a/0x30
[   13.207220] 
[   13.207364] Freed by task 213:
[   13.207529]  kasan_save_stack+0x45/0x70
[   13.207700]  kasan_save_track+0x18/0x40
[   13.207881]  kasan_save_free_info+0x3f/0x60
[   13.208101]  __kasan_slab_free+0x56/0x70
[   13.208383]  kfree+0x222/0x3f0
[   13.208574]  ksize_uaf+0x12c/0x6c0
[   13.208726]  kunit_try_run_case+0x1a5/0x480
[   13.208869]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.209054]  kthread+0x337/0x6f0
[   13.209173]  ret_from_fork+0x116/0x1d0
[   13.209324]  ret_from_fork_asm+0x1a/0x30
[   13.210817] 
[   13.210920] The buggy address belongs to the object at ffff888102a9ed00
[   13.210920]  which belongs to the cache kmalloc-128 of size 128
[   13.211707] The buggy address is located 120 bytes inside of
[   13.211707]  freed 128-byte region [ffff888102a9ed00, ffff888102a9ed80)
[   13.212593] 
[   13.212690] The buggy address belongs to the physical page:
[   13.212938] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a9e
[   13.213264] flags: 0x200000000000000(node=0|zone=2)
[   13.213484] page_type: f5(slab)
[   13.213645] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   13.214572] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.215333] page dumped because: kasan: bad access detected
[   13.215818] 
[   13.216069] Memory state around the buggy address:
[   13.216543]  ffff888102a9ec00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.217304]  ffff888102a9ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.217906] >ffff888102a9ed00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.218685]                                                                 ^
[   13.219071]  ffff888102a9ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.219759]  ffff888102a9ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.220240] ==================================================================
[   13.162006] ==================================================================
[   13.162318] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5fe/0x6c0
[   13.162617] Read of size 1 at addr ffff888102a9ed00 by task kunit_try_catch/213
[   13.163492] 
[   13.163708] CPU: 1 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   13.163844] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.163858] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.163878] Call Trace:
[   13.163897]  <TASK>
[   13.163917]  dump_stack_lvl+0x73/0xb0
[   13.164227]  print_report+0xd1/0x650
[   13.164251]  ? __virt_addr_valid+0x1db/0x2d0
[   13.164274]  ? ksize_uaf+0x5fe/0x6c0
[   13.164294]  ? kasan_complete_mode_report_info+0x64/0x200
[   13.164317]  ? ksize_uaf+0x5fe/0x6c0
[   13.164338]  kasan_report+0x141/0x180
[   13.164359]  ? ksize_uaf+0x5fe/0x6c0
[   13.164384]  __asan_report_load1_noabort+0x18/0x20
[   13.164408]  ksize_uaf+0x5fe/0x6c0
[   13.164428]  ? __pfx_ksize_uaf+0x10/0x10
[   13.164450]  ? __schedule+0x10cc/0x2b60
[   13.164472]  ? __pfx_read_tsc+0x10/0x10
[   13.164494]  ? ktime_get_ts64+0x86/0x230
[   13.164520]  kunit_try_run_case+0x1a5/0x480
[   13.164545]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.164567]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.164591]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.164615]  ? __kthread_parkme+0x82/0x180
[   13.164636]  ? preempt_count_sub+0x50/0x80
[   13.164659]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.164683]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.164708]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.164732]  kthread+0x337/0x6f0
[   13.164751]  ? trace_preempt_on+0x20/0xc0
[   13.164775]  ? __pfx_kthread+0x10/0x10
[   13.164796]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.164817]  ? calculate_sigpending+0x7b/0xa0
[   13.164841]  ? __pfx_kthread+0x10/0x10
[   13.164862]  ret_from_fork+0x116/0x1d0
[   13.164881]  ? __pfx_kthread+0x10/0x10
[   13.164901]  ret_from_fork_asm+0x1a/0x30
[   13.165015]  </TASK>
[   13.165029] 
[   13.175913] Allocated by task 213:
[   13.176460]  kasan_save_stack+0x45/0x70
[   13.176707]  kasan_save_track+0x18/0x40
[   13.177109]  kasan_save_alloc_info+0x3b/0x50
[   13.177306]  __kasan_kmalloc+0xb7/0xc0
[   13.177801]  __kmalloc_cache_noprof+0x189/0x420
[   13.178134]  ksize_uaf+0xaa/0x6c0
[   13.178275]  kunit_try_run_case+0x1a5/0x480
[   13.178513]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.178900]  kthread+0x337/0x6f0
[   13.179424]  ret_from_fork+0x116/0x1d0
[   13.179603]  ret_from_fork_asm+0x1a/0x30
[   13.179755] 
[   13.180043] Freed by task 213:
[   13.180298]  kasan_save_stack+0x45/0x70
[   13.180451]  kasan_save_track+0x18/0x40
[   13.180649]  kasan_save_free_info+0x3f/0x60
[   13.180871]  __kasan_slab_free+0x56/0x70
[   13.181530]  kfree+0x222/0x3f0
[   13.181704]  ksize_uaf+0x12c/0x6c0
[   13.181842]  kunit_try_run_case+0x1a5/0x480
[   13.182135]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.182641]  kthread+0x337/0x6f0
[   13.182832]  ret_from_fork+0x116/0x1d0
[   13.183049]  ret_from_fork_asm+0x1a/0x30
[   13.183632] 
[   13.183708] The buggy address belongs to the object at ffff888102a9ed00
[   13.183708]  which belongs to the cache kmalloc-128 of size 128
[   13.184303] The buggy address is located 0 bytes inside of
[   13.184303]  freed 128-byte region [ffff888102a9ed00, ffff888102a9ed80)
[   13.186696] 
[   13.186795] The buggy address belongs to the physical page:
[   13.186979] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a9e
[   13.187216] flags: 0x200000000000000(node=0|zone=2)
[   13.187378] page_type: f5(slab)
[   13.187536] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   13.187842] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.189705] page dumped because: kasan: bad access detected
[   13.190235] 
[   13.190314] Memory state around the buggy address:
[   13.190475]  ffff888102a9ec00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.190696]  ffff888102a9ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.190918] >ffff888102a9ed00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.191168]                    ^
[   13.191285]  ffff888102a9ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.191498]  ffff888102a9ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.191708] ==================================================================