Hay
Date
July 10, 2025, 6:10 p.m.

Environment
qemu-arm64
qemu-x86_64

[   17.165588] ==================================================================
[   17.165659] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8
[   17.165711] Read of size 1 at addr fff00000c5a20400 by task kunit_try_catch/196
[   17.165761] 
[   17.165798] CPU: 1 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   17.165879] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.166231] Hardware name: linux,dummy-virt (DT)
[   17.166451] Call trace:
[   17.166484]  show_stack+0x20/0x38 (C)
[   17.166856]  dump_stack_lvl+0x8c/0xd0
[   17.167181]  print_report+0x118/0x608
[   17.167447]  kasan_report+0xdc/0x128
[   17.167522]  __asan_report_load1_noabort+0x20/0x30
[   17.167732]  ksize_uaf+0x598/0x5f8
[   17.167990]  kunit_try_run_case+0x170/0x3f0
[   17.168075]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.168236]  kthread+0x328/0x630
[   17.168406]  ret_from_fork+0x10/0x20
[   17.168511] 
[   17.168529] Allocated by task 196:
[   17.168714]  kasan_save_stack+0x3c/0x68
[   17.168935]  kasan_save_track+0x20/0x40
[   17.169099]  kasan_save_alloc_info+0x40/0x58
[   17.169368]  __kasan_kmalloc+0xd4/0xd8
[   17.169456]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.169497]  ksize_uaf+0xb8/0x5f8
[   17.169566]  kunit_try_run_case+0x170/0x3f0
[   17.169864]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.170096]  kthread+0x328/0x630
[   17.170214]  ret_from_fork+0x10/0x20
[   17.170414] 
[   17.170440] Freed by task 196:
[   17.170469]  kasan_save_stack+0x3c/0x68
[   17.170541]  kasan_save_track+0x20/0x40
[   17.170736]  kasan_save_free_info+0x4c/0x78
[   17.170922]  __kasan_slab_free+0x6c/0x98
[   17.171027]  kfree+0x214/0x3c8
[   17.171091]  ksize_uaf+0x11c/0x5f8
[   17.171224]  kunit_try_run_case+0x170/0x3f0
[   17.171264]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.171502]  kthread+0x328/0x630
[   17.171670]  ret_from_fork+0x10/0x20
[   17.171876] 
[   17.172234] The buggy address belongs to the object at fff00000c5a20400
[   17.172234]  which belongs to the cache kmalloc-128 of size 128
[   17.172610] The buggy address is located 0 bytes inside of
[   17.172610]  freed 128-byte region [fff00000c5a20400, fff00000c5a20480)
[   17.172791] 
[   17.172932] The buggy address belongs to the physical page:
[   17.172975] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a20
[   17.173205] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.173368] page_type: f5(slab)
[   17.173520] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.173629] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.173748] page dumped because: kasan: bad access detected
[   17.173852] 
[   17.173870] Memory state around the buggy address:
[   17.174131]  fff00000c5a20300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.174237]  fff00000c5a20380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.174463] >fff00000c5a20400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.174570]                    ^
[   17.174704]  fff00000c5a20480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.174845]  fff00000c5a20500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.174887] ==================================================================
[   17.176234] ==================================================================
[   17.176289] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8
[   17.176357] Read of size 1 at addr fff00000c5a20478 by task kunit_try_catch/196
[   17.176409] 
[   17.176440] CPU: 1 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   17.176524] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.176550] Hardware name: linux,dummy-virt (DT)
[   17.176580] Call trace:
[   17.176601]  show_stack+0x20/0x38 (C)
[   17.176648]  dump_stack_lvl+0x8c/0xd0
[   17.176697]  print_report+0x118/0x608
[   17.176743]  kasan_report+0xdc/0x128
[   17.176790]  __asan_report_load1_noabort+0x20/0x30
[   17.176843]  ksize_uaf+0x544/0x5f8
[   17.176887]  kunit_try_run_case+0x170/0x3f0
[   17.176940]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.176994]  kthread+0x328/0x630
[   17.177038]  ret_from_fork+0x10/0x20
[   17.177085] 
[   17.177102] Allocated by task 196:
[   17.177130]  kasan_save_stack+0x3c/0x68
[   17.177172]  kasan_save_track+0x20/0x40
[   17.177211]  kasan_save_alloc_info+0x40/0x58
[   17.177252]  __kasan_kmalloc+0xd4/0xd8
[   17.177289]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.177331]  ksize_uaf+0xb8/0x5f8
[   17.177403]  kunit_try_run_case+0x170/0x3f0
[   17.177451]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.177534]  kthread+0x328/0x630
[   17.177569]  ret_from_fork+0x10/0x20
[   17.177604] 
[   17.177624] Freed by task 196:
[   17.177650]  kasan_save_stack+0x3c/0x68
[   17.177718]  kasan_save_track+0x20/0x40
[   17.177784]  kasan_save_free_info+0x4c/0x78
[   17.177902]  __kasan_slab_free+0x6c/0x98
[   17.177987]  kfree+0x214/0x3c8
[   17.178021]  ksize_uaf+0x11c/0x5f8
[   17.178070]  kunit_try_run_case+0x170/0x3f0
[   17.178108]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.178422]  kthread+0x328/0x630
[   17.178611]  ret_from_fork+0x10/0x20
[   17.178729] 
[   17.178875] The buggy address belongs to the object at fff00000c5a20400
[   17.178875]  which belongs to the cache kmalloc-128 of size 128
[   17.179000] The buggy address is located 120 bytes inside of
[   17.179000]  freed 128-byte region [fff00000c5a20400, fff00000c5a20480)
[   17.179151] 
[   17.179218] The buggy address belongs to the physical page:
[   17.179305] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a20
[   17.179408] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.179454] page_type: f5(slab)
[   17.179547] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.179854] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.180002] page dumped because: kasan: bad access detected
[   17.180120] 
[   17.180199] Memory state around the buggy address:
[   17.180371]  fff00000c5a20300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.180489]  fff00000c5a20380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.180665] >fff00000c5a20400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.180742]                                                                 ^
[   17.180906]  fff00000c5a20480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.180986]  fff00000c5a20500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.181032] ==================================================================
[   17.152564] ==================================================================
[   17.152627] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8
[   17.152683] Read of size 1 at addr fff00000c5a20400 by task kunit_try_catch/196
[   17.153465] 
[   17.153518] CPU: 1 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   17.154113] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.154210] Hardware name: linux,dummy-virt (DT)
[   17.154406] Call trace:
[   17.154680]  show_stack+0x20/0x38 (C)
[   17.154754]  dump_stack_lvl+0x8c/0xd0
[   17.154976]  print_report+0x118/0x608
[   17.155313]  kasan_report+0xdc/0x128
[   17.155409]  __kasan_check_byte+0x54/0x70
[   17.155535]  ksize+0x30/0x88
[   17.156031]  ksize_uaf+0x168/0x5f8
[   17.156459]  kunit_try_run_case+0x170/0x3f0
[   17.156697]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.157016]  kthread+0x328/0x630
[   17.157269]  ret_from_fork+0x10/0x20
[   17.157328] 
[   17.157357] Allocated by task 196:
[   17.157734]  kasan_save_stack+0x3c/0x68
[   17.157808]  kasan_save_track+0x20/0x40
[   17.157937]  kasan_save_alloc_info+0x40/0x58
[   17.158005]  __kasan_kmalloc+0xd4/0xd8
[   17.158309]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.158399]  ksize_uaf+0xb8/0x5f8
[   17.158437]  kunit_try_run_case+0x170/0x3f0
[   17.158836]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.159052]  kthread+0x328/0x630
[   17.159119]  ret_from_fork+0x10/0x20
[   17.159503] 
[   17.159617] Freed by task 196:
[   17.159742]  kasan_save_stack+0x3c/0x68
[   17.159956]  kasan_save_track+0x20/0x40
[   17.160182]  kasan_save_free_info+0x4c/0x78
[   17.160311]  __kasan_slab_free+0x6c/0x98
[   17.160650]  kfree+0x214/0x3c8
[   17.160855]  ksize_uaf+0x11c/0x5f8
[   17.160896]  kunit_try_run_case+0x170/0x3f0
[   17.161203]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.161260]  kthread+0x328/0x630
[   17.161386]  ret_from_fork+0x10/0x20
[   17.161428] 
[   17.161458] The buggy address belongs to the object at fff00000c5a20400
[   17.161458]  which belongs to the cache kmalloc-128 of size 128
[   17.161536] The buggy address is located 0 bytes inside of
[   17.161536]  freed 128-byte region [fff00000c5a20400, fff00000c5a20480)
[   17.161608] 
[   17.161631] The buggy address belongs to the physical page:
[   17.161661] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a20
[   17.161728] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.161780] page_type: f5(slab)
[   17.161830] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.161881] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.162397] page dumped because: kasan: bad access detected
[   17.162455] 
[   17.162515] Memory state around the buggy address:
[   17.162656]  fff00000c5a20300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.162843]  fff00000c5a20380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.163141] >fff00000c5a20400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.163397]                    ^
[   17.163537]  fff00000c5a20480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.163689]  fff00000c5a20500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.163942] ==================================================================

[   12.975817] ==================================================================
[   12.976563] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5fe/0x6c0
[   12.976848] Read of size 1 at addr ffff888102791800 by task kunit_try_catch/213
[   12.977301] 
[   12.977707] CPU: 1 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.977751] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.977761] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.977780] Call Trace:
[   12.977942]  <TASK>
[   12.977956]  dump_stack_lvl+0x73/0xb0
[   12.977986]  print_report+0xd1/0x650
[   12.978007]  ? __virt_addr_valid+0x1db/0x2d0
[   12.978042]  ? ksize_uaf+0x5fe/0x6c0
[   12.978061]  ? kasan_complete_mode_report_info+0x64/0x200
[   12.978084]  ? ksize_uaf+0x5fe/0x6c0
[   12.978104]  kasan_report+0x141/0x180
[   12.978125]  ? ksize_uaf+0x5fe/0x6c0
[   12.978149]  __asan_report_load1_noabort+0x18/0x20
[   12.978173]  ksize_uaf+0x5fe/0x6c0
[   12.978193]  ? __pfx_ksize_uaf+0x10/0x10
[   12.978214]  ? __schedule+0x10cc/0x2b60
[   12.978234]  ? __pfx_read_tsc+0x10/0x10
[   12.978254]  ? ktime_get_ts64+0x86/0x230
[   12.978277]  kunit_try_run_case+0x1a5/0x480
[   12.978300]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.978322]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.978345]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.978368]  ? __kthread_parkme+0x82/0x180
[   12.978388]  ? preempt_count_sub+0x50/0x80
[   12.978411]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.978434]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.978458]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.978483]  kthread+0x337/0x6f0
[   12.978501]  ? trace_preempt_on+0x20/0xc0
[   12.978522]  ? __pfx_kthread+0x10/0x10
[   12.978542]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.978563]  ? calculate_sigpending+0x7b/0xa0
[   12.978586]  ? __pfx_kthread+0x10/0x10
[   12.978607]  ret_from_fork+0x116/0x1d0
[   12.978624]  ? __pfx_kthread+0x10/0x10
[   12.978644]  ret_from_fork_asm+0x1a/0x30
[   12.978673]  </TASK>
[   12.978683] 
[   12.988719] Allocated by task 213:
[   12.989295]  kasan_save_stack+0x45/0x70
[   12.989501]  kasan_save_track+0x18/0x40
[   12.989790]  kasan_save_alloc_info+0x3b/0x50
[   12.990115]  __kasan_kmalloc+0xb7/0xc0
[   12.990329]  __kmalloc_cache_noprof+0x189/0x420
[   12.990494]  ksize_uaf+0xaa/0x6c0
[   12.990668]  kunit_try_run_case+0x1a5/0x480
[   12.990852]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.991412]  kthread+0x337/0x6f0
[   12.991571]  ret_from_fork+0x116/0x1d0
[   12.991755]  ret_from_fork_asm+0x1a/0x30
[   12.992253] 
[   12.992344] Freed by task 213:
[   12.992657]  kasan_save_stack+0x45/0x70
[   12.992972]  kasan_save_track+0x18/0x40
[   12.993193]  kasan_save_free_info+0x3f/0x60
[   12.993661]  __kasan_slab_free+0x56/0x70
[   12.993858]  kfree+0x222/0x3f0
[   12.994094]  ksize_uaf+0x12c/0x6c0
[   12.994245]  kunit_try_run_case+0x1a5/0x480
[   12.994447]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.994684]  kthread+0x337/0x6f0
[   12.994841]  ret_from_fork+0x116/0x1d0
[   12.995015]  ret_from_fork_asm+0x1a/0x30
[   12.995208] 
[   12.995295] The buggy address belongs to the object at ffff888102791800
[   12.995295]  which belongs to the cache kmalloc-128 of size 128
[   12.995785] The buggy address is located 0 bytes inside of
[   12.995785]  freed 128-byte region [ffff888102791800, ffff888102791880)
[   12.997252] 
[   12.997541] The buggy address belongs to the physical page:
[   12.997794] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102791
[   12.998312] flags: 0x200000000000000(node=0|zone=2)
[   12.998610] page_type: f5(slab)
[   12.998785] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.999387] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.999800] page dumped because: kasan: bad access detected
[   13.000261] 
[   13.000362] Memory state around the buggy address:
[   13.000551]  ffff888102791700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.001092]  ffff888102791780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.001485] >ffff888102791800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.002116]                    ^
[   13.002283]  ffff888102791880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.002674]  ffff888102791900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.003190] ==================================================================
[   12.952748] ==================================================================
[   12.953558] BUG: KASAN: slab-use-after-free in ksize_uaf+0x19d/0x6c0
[   12.954098] Read of size 1 at addr ffff888102791800 by task kunit_try_catch/213
[   12.954394] 
[   12.954486] CPU: 1 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.954531] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.954543] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.954563] Call Trace:
[   12.954575]  <TASK>
[   12.954593]  dump_stack_lvl+0x73/0xb0
[   12.954624]  print_report+0xd1/0x650
[   12.954645]  ? __virt_addr_valid+0x1db/0x2d0
[   12.954669]  ? ksize_uaf+0x19d/0x6c0
[   12.954688]  ? kasan_complete_mode_report_info+0x64/0x200
[   12.954711]  ? ksize_uaf+0x19d/0x6c0
[   12.954731]  kasan_report+0x141/0x180
[   12.954752]  ? ksize_uaf+0x19d/0x6c0
[   12.954775]  ? ksize_uaf+0x19d/0x6c0
[   12.954795]  __kasan_check_byte+0x3d/0x50
[   12.955112]  ksize+0x20/0x60
[   12.955137]  ksize_uaf+0x19d/0x6c0
[   12.955157]  ? __pfx_ksize_uaf+0x10/0x10
[   12.955179]  ? __schedule+0x10cc/0x2b60
[   12.955200]  ? __pfx_read_tsc+0x10/0x10
[   12.955221]  ? ktime_get_ts64+0x86/0x230
[   12.955246]  kunit_try_run_case+0x1a5/0x480
[   12.955271]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.955293]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.955317]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.955340]  ? __kthread_parkme+0x82/0x180
[   12.955361]  ? preempt_count_sub+0x50/0x80
[   12.955384]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.955408]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.955432]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.955456]  kthread+0x337/0x6f0
[   12.955474]  ? trace_preempt_on+0x20/0xc0
[   12.955496]  ? __pfx_kthread+0x10/0x10
[   12.955516]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.955538]  ? calculate_sigpending+0x7b/0xa0
[   12.955561]  ? __pfx_kthread+0x10/0x10
[   12.955582]  ret_from_fork+0x116/0x1d0
[   12.955600]  ? __pfx_kthread+0x10/0x10
[   12.955620]  ret_from_fork_asm+0x1a/0x30
[   12.955650]  </TASK>
[   12.955661] 
[   12.962878] Allocated by task 213:
[   12.963010]  kasan_save_stack+0x45/0x70
[   12.963167]  kasan_save_track+0x18/0x40
[   12.963300]  kasan_save_alloc_info+0x3b/0x50
[   12.963546]  __kasan_kmalloc+0xb7/0xc0
[   12.963729]  __kmalloc_cache_noprof+0x189/0x420
[   12.964167]  ksize_uaf+0xaa/0x6c0
[   12.964344]  kunit_try_run_case+0x1a5/0x480
[   12.964490]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.964667]  kthread+0x337/0x6f0
[   12.964885]  ret_from_fork+0x116/0x1d0
[   12.965279]  ret_from_fork_asm+0x1a/0x30
[   12.965482] 
[   12.965577] Freed by task 213:
[   12.965732]  kasan_save_stack+0x45/0x70
[   12.966075]  kasan_save_track+0x18/0x40
[   12.966251]  kasan_save_free_info+0x3f/0x60
[   12.966448]  __kasan_slab_free+0x56/0x70
[   12.966617]  kfree+0x222/0x3f0
[   12.966765]  ksize_uaf+0x12c/0x6c0
[   12.967068]  kunit_try_run_case+0x1a5/0x480
[   12.967238]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.967457]  kthread+0x337/0x6f0
[   12.967616]  ret_from_fork+0x116/0x1d0
[   12.967807]  ret_from_fork_asm+0x1a/0x30
[   12.968141] 
[   12.968238] The buggy address belongs to the object at ffff888102791800
[   12.968238]  which belongs to the cache kmalloc-128 of size 128
[   12.968600] The buggy address is located 0 bytes inside of
[   12.968600]  freed 128-byte region [ffff888102791800, ffff888102791880)
[   12.968942] 
[   12.969024] The buggy address belongs to the physical page:
[   12.969280] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102791
[   12.969789] flags: 0x200000000000000(node=0|zone=2)
[   12.970165] page_type: f5(slab)
[   12.970333] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.970571] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.970795] page dumped because: kasan: bad access detected
[   12.971325] 
[   12.971422] Memory state around the buggy address:
[   12.971690]  ffff888102791700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.972134]  ffff888102791780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.972417] >ffff888102791800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.972639]                    ^
[   12.972757]  ffff888102791880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.974065]  ffff888102791900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.975134] ==================================================================
[   13.004892] ==================================================================
[   13.005210] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5e4/0x6c0
[   13.005515] Read of size 1 at addr ffff888102791878 by task kunit_try_catch/213
[   13.005786] 
[   13.006147] CPU: 1 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   13.006191] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.006202] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.006221] Call Trace:
[   13.006235]  <TASK>
[   13.006248]  dump_stack_lvl+0x73/0xb0
[   13.006278]  print_report+0xd1/0x650
[   13.006299]  ? __virt_addr_valid+0x1db/0x2d0
[   13.006321]  ? ksize_uaf+0x5e4/0x6c0
[   13.006341]  ? kasan_complete_mode_report_info+0x64/0x200
[   13.006364]  ? ksize_uaf+0x5e4/0x6c0
[   13.006384]  kasan_report+0x141/0x180
[   13.006405]  ? ksize_uaf+0x5e4/0x6c0
[   13.006429]  __asan_report_load1_noabort+0x18/0x20
[   13.006454]  ksize_uaf+0x5e4/0x6c0
[   13.006473]  ? __pfx_ksize_uaf+0x10/0x10
[   13.006494]  ? __schedule+0x10cc/0x2b60
[   13.006516]  ? __pfx_read_tsc+0x10/0x10
[   13.006536]  ? ktime_get_ts64+0x86/0x230
[   13.006559]  kunit_try_run_case+0x1a5/0x480
[   13.006582]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.006605]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.006628]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.006651]  ? __kthread_parkme+0x82/0x180
[   13.006671]  ? preempt_count_sub+0x50/0x80
[   13.006694]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.006717]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.006741]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.006766]  kthread+0x337/0x6f0
[   13.006784]  ? trace_preempt_on+0x20/0xc0
[   13.007027]  ? __pfx_kthread+0x10/0x10
[   13.007069]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.007091]  ? calculate_sigpending+0x7b/0xa0
[   13.007114]  ? __pfx_kthread+0x10/0x10
[   13.007134]  ret_from_fork+0x116/0x1d0
[   13.007153]  ? __pfx_kthread+0x10/0x10
[   13.007173]  ret_from_fork_asm+0x1a/0x30
[   13.007202]  </TASK>
[   13.007213] 
[   13.014208] Allocated by task 213:
[   13.014375]  kasan_save_stack+0x45/0x70
[   13.014555]  kasan_save_track+0x18/0x40
[   13.014732]  kasan_save_alloc_info+0x3b/0x50
[   13.014917]  __kasan_kmalloc+0xb7/0xc0
[   13.015260]  __kmalloc_cache_noprof+0x189/0x420
[   13.015434]  ksize_uaf+0xaa/0x6c0
[   13.015604]  kunit_try_run_case+0x1a5/0x480
[   13.015814]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.016543]  kthread+0x337/0x6f0
[   13.016679]  ret_from_fork+0x116/0x1d0
[   13.018168]  ret_from_fork_asm+0x1a/0x30
[   13.018369] 
[   13.018449] Freed by task 213:
[   13.018587]  kasan_save_stack+0x45/0x70
[   13.018781]  kasan_save_track+0x18/0x40
[   13.018961]  kasan_save_free_info+0x3f/0x60
[   13.019170]  __kasan_slab_free+0x56/0x70
[   13.021300]  kfree+0x222/0x3f0
[   13.021435]  ksize_uaf+0x12c/0x6c0
[   13.021562]  kunit_try_run_case+0x1a5/0x480
[   13.021708]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.021884]  kthread+0x337/0x6f0
[   13.022013]  ret_from_fork+0x116/0x1d0
[   13.022156]  ret_from_fork_asm+0x1a/0x30
[   13.022296] 
[   13.022367] The buggy address belongs to the object at ffff888102791800
[   13.022367]  which belongs to the cache kmalloc-128 of size 128
[   13.022723] The buggy address is located 120 bytes inside of
[   13.022723]  freed 128-byte region [ffff888102791800, ffff888102791880)
[   13.024568] 
[   13.025341] The buggy address belongs to the physical page:
[   13.026198] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102791
[   13.026663] flags: 0x200000000000000(node=0|zone=2)
[   13.027102] page_type: f5(slab)
[   13.027387] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   13.027833] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.028434] page dumped because: kasan: bad access detected
[   13.028656] 
[   13.028744] Memory state around the buggy address:
[   13.029059]  ffff888102791700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.029374]  ffff888102791780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.029967] >ffff888102791800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.030276]                                                                 ^
[   13.030586]  ffff888102791880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.030942]  ffff888102791900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.031390] ==================================================================