Hay
Date
July 18, 2025, 2:09 p.m.

Environment
qemu-arm64
qemu-x86_64

[   17.293708] ==================================================================
[   17.294147] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8
[   17.294238] Read of size 1 at addr fff00000c7892500 by task kunit_try_catch/196
[   17.294470] 
[   17.294523] CPU: 1 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.294643] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.294780] Hardware name: linux,dummy-virt (DT)
[   17.294889] Call trace:
[   17.294917]  show_stack+0x20/0x38 (C)
[   17.295021]  dump_stack_lvl+0x8c/0xd0
[   17.295082]  print_report+0x118/0x5d0
[   17.295447]  kasan_report+0xdc/0x128
[   17.295647]  __asan_report_load1_noabort+0x20/0x30
[   17.295834]  ksize_uaf+0x598/0x5f8
[   17.295910]  kunit_try_run_case+0x170/0x3f0
[   17.296038]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.296210]  kthread+0x328/0x630
[   17.296285]  ret_from_fork+0x10/0x20
[   17.296336] 
[   17.296354] Allocated by task 196:
[   17.296593]  kasan_save_stack+0x3c/0x68
[   17.296927]  kasan_save_track+0x20/0x40
[   17.297123]  kasan_save_alloc_info+0x40/0x58
[   17.297180]  __kasan_kmalloc+0xd4/0xd8
[   17.297430]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.297596]  ksize_uaf+0xb8/0x5f8
[   17.298110]  kunit_try_run_case+0x170/0x3f0
[   17.298168]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.298867]  kthread+0x328/0x630
[   17.298983]  ret_from_fork+0x10/0x20
[   17.299111] 
[   17.299132] Freed by task 196:
[   17.299408]  kasan_save_stack+0x3c/0x68
[   17.299487]  kasan_save_track+0x20/0x40
[   17.299806]  kasan_save_free_info+0x4c/0x78
[   17.299951]  __kasan_slab_free+0x6c/0x98
[   17.300073]  kfree+0x214/0x3c8
[   17.300247]  ksize_uaf+0x11c/0x5f8
[   17.300503]  kunit_try_run_case+0x170/0x3f0
[   17.300674]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.300794]  kthread+0x328/0x630
[   17.300957]  ret_from_fork+0x10/0x20
[   17.301116] 
[   17.301187] The buggy address belongs to the object at fff00000c7892500
[   17.301187]  which belongs to the cache kmalloc-128 of size 128
[   17.301629] The buggy address is located 0 bytes inside of
[   17.301629]  freed 128-byte region [fff00000c7892500, fff00000c7892580)
[   17.301738] 
[   17.301916] The buggy address belongs to the physical page:
[   17.302404] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107892
[   17.302563] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.302680] page_type: f5(slab)
[   17.302757] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.302925] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.302967] page dumped because: kasan: bad access detected
[   17.303194] 
[   17.303234] Memory state around the buggy address:
[   17.303371]  fff00000c7892400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.303615]  fff00000c7892480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.303828] >fff00000c7892500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.303892]                    ^
[   17.303929]  fff00000c7892580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.303972]  fff00000c7892600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.304199] ==================================================================
[   17.286061] ==================================================================
[   17.286169] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8
[   17.286578] Read of size 1 at addr fff00000c7892500 by task kunit_try_catch/196
[   17.286631] 
[   17.286697] CPU: 1 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.286787] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.286832] Hardware name: linux,dummy-virt (DT)
[   17.287184] Call trace:
[   17.287217]  show_stack+0x20/0x38 (C)
[   17.287453]  dump_stack_lvl+0x8c/0xd0
[   17.287688]  print_report+0x118/0x5d0
[   17.288103]  kasan_report+0xdc/0x128
[   17.288700]  __kasan_check_byte+0x54/0x70
[   17.288786]  ksize+0x30/0x88
[   17.288853]  ksize_uaf+0x168/0x5f8
[   17.288897]  kunit_try_run_case+0x170/0x3f0
[   17.288990]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.289045]  kthread+0x328/0x630
[   17.289091]  ret_from_fork+0x10/0x20
[   17.289162] 
[   17.289181] Allocated by task 196:
[   17.289230]  kasan_save_stack+0x3c/0x68
[   17.289290]  kasan_save_track+0x20/0x40
[   17.289338]  kasan_save_alloc_info+0x40/0x58
[   17.289378]  __kasan_kmalloc+0xd4/0xd8
[   17.289422]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.289463]  ksize_uaf+0xb8/0x5f8
[   17.289528]  kunit_try_run_case+0x170/0x3f0
[   17.289580]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.289633]  kthread+0x328/0x630
[   17.289665]  ret_from_fork+0x10/0x20
[   17.289702] 
[   17.289736] Freed by task 196:
[   17.289771]  kasan_save_stack+0x3c/0x68
[   17.289809]  kasan_save_track+0x20/0x40
[   17.289874]  kasan_save_free_info+0x4c/0x78
[   17.289915]  __kasan_slab_free+0x6c/0x98
[   17.289951]  kfree+0x214/0x3c8
[   17.289995]  ksize_uaf+0x11c/0x5f8
[   17.290029]  kunit_try_run_case+0x170/0x3f0
[   17.290077]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.290122]  kthread+0x328/0x630
[   17.290154]  ret_from_fork+0x10/0x20
[   17.290192] 
[   17.290213] The buggy address belongs to the object at fff00000c7892500
[   17.290213]  which belongs to the cache kmalloc-128 of size 128
[   17.290271] The buggy address is located 0 bytes inside of
[   17.290271]  freed 128-byte region [fff00000c7892500, fff00000c7892580)
[   17.290343] 
[   17.290365] The buggy address belongs to the physical page:
[   17.290408] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107892
[   17.290472] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.290530] page_type: f5(slab)
[   17.290594] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.290645] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.290688] page dumped because: kasan: bad access detected
[   17.290731] 
[   17.290748] Memory state around the buggy address:
[   17.290790]  fff00000c7892400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.291070]  fff00000c7892480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.291877] >fff00000c7892500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.291997]                    ^
[   17.292221]  fff00000c7892580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.292271]  fff00000c7892600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.292310] ==================================================================
[   17.306608] ==================================================================
[   17.306687] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8
[   17.306768] Read of size 1 at addr fff00000c7892578 by task kunit_try_catch/196
[   17.306820] 
[   17.306993] CPU: 1 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.307123] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.307169] Hardware name: linux,dummy-virt (DT)
[   17.307534] Call trace:
[   17.307803]  show_stack+0x20/0x38 (C)
[   17.307906]  dump_stack_lvl+0x8c/0xd0
[   17.307967]  print_report+0x118/0x5d0
[   17.308018]  kasan_report+0xdc/0x128
[   17.308380]  __asan_report_load1_noabort+0x20/0x30
[   17.308892]  ksize_uaf+0x544/0x5f8
[   17.309032]  kunit_try_run_case+0x170/0x3f0
[   17.309129]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.309263]  kthread+0x328/0x630
[   17.309400]  ret_from_fork+0x10/0x20
[   17.309513] 
[   17.309535] Allocated by task 196:
[   17.309749]  kasan_save_stack+0x3c/0x68
[   17.310165]  kasan_save_track+0x20/0x40
[   17.310431]  kasan_save_alloc_info+0x40/0x58
[   17.310761]  __kasan_kmalloc+0xd4/0xd8
[   17.310815]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.311206]  ksize_uaf+0xb8/0x5f8
[   17.311750]  kunit_try_run_case+0x170/0x3f0
[   17.311806]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.311861]  kthread+0x328/0x630
[   17.311897]  ret_from_fork+0x10/0x20
[   17.312199] 
[   17.312327] Freed by task 196:
[   17.312368]  kasan_save_stack+0x3c/0x68
[   17.312595]  kasan_save_track+0x20/0x40
[   17.312828]  kasan_save_free_info+0x4c/0x78
[   17.312894]  __kasan_slab_free+0x6c/0x98
[   17.312931]  kfree+0x214/0x3c8
[   17.312967]  ksize_uaf+0x11c/0x5f8
[   17.313029]  kunit_try_run_case+0x170/0x3f0
[   17.313068]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.313112]  kthread+0x328/0x630
[   17.313168]  ret_from_fork+0x10/0x20
[   17.313220] 
[   17.313243] The buggy address belongs to the object at fff00000c7892500
[   17.313243]  which belongs to the cache kmalloc-128 of size 128
[   17.313313] The buggy address is located 120 bytes inside of
[   17.313313]  freed 128-byte region [fff00000c7892500, fff00000c7892580)
[   17.313384] 
[   17.313407] The buggy address belongs to the physical page:
[   17.313440] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107892
[   17.313513] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.313566] page_type: f5(slab)
[   17.313617] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.313669] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.313711] page dumped because: kasan: bad access detected
[   17.313744] 
[   17.313764] Memory state around the buggy address:
[   17.313816]  fff00000c7892400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.313871]  fff00000c7892480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.313925] >fff00000c7892500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.313961]                                                                 ^
[   17.314009]  fff00000c7892580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.314050]  fff00000c7892600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.314098] ==================================================================

[   16.883190] ==================================================================
[   16.883595] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8
[   16.883675] Read of size 1 at addr fff00000c5b7de00 by task kunit_try_catch/196
[   16.883727] 
[   16.883769] CPU: 1 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.884113] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.884171] Hardware name: linux,dummy-virt (DT)
[   16.884204] Call trace:
[   16.884232]  show_stack+0x20/0x38 (C)
[   16.884569]  dump_stack_lvl+0x8c/0xd0
[   16.884779]  print_report+0x118/0x5d0
[   16.884993]  kasan_report+0xdc/0x128
[   16.885535]  __kasan_check_byte+0x54/0x70
[   16.885617]  ksize+0x30/0x88
[   16.885764]  ksize_uaf+0x168/0x5f8
[   16.885834]  kunit_try_run_case+0x170/0x3f0
[   16.886155]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.886256]  kthread+0x328/0x630
[   16.886647]  ret_from_fork+0x10/0x20
[   16.886885] 
[   16.886953] Allocated by task 196:
[   16.887040]  kasan_save_stack+0x3c/0x68
[   16.887143]  kasan_save_track+0x20/0x40
[   16.887211]  kasan_save_alloc_info+0x40/0x58
[   16.887664]  __kasan_kmalloc+0xd4/0xd8
[   16.887741]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.887807]  ksize_uaf+0xb8/0x5f8
[   16.887843]  kunit_try_run_case+0x170/0x3f0
[   16.887880]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.887925]  kthread+0x328/0x630
[   16.887957]  ret_from_fork+0x10/0x20
[   16.887996] 
[   16.888025] Freed by task 196:
[   16.888053]  kasan_save_stack+0x3c/0x68
[   16.888105]  kasan_save_track+0x20/0x40
[   16.888160]  kasan_save_free_info+0x4c/0x78
[   16.888199]  __kasan_slab_free+0x6c/0x98
[   16.888237]  kfree+0x214/0x3c8
[   16.888268]  ksize_uaf+0x11c/0x5f8
[   16.888309]  kunit_try_run_case+0x170/0x3f0
[   16.888368]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.888423]  kthread+0x328/0x630
[   16.888456]  ret_from_fork+0x10/0x20
[   16.888765] 
[   16.888790] The buggy address belongs to the object at fff00000c5b7de00
[   16.888790]  which belongs to the cache kmalloc-128 of size 128
[   16.889367] The buggy address is located 0 bytes inside of
[   16.889367]  freed 128-byte region [fff00000c5b7de00, fff00000c5b7de80)
[   16.889449] 
[   16.889818] The buggy address belongs to the physical page:
[   16.889882] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b7d
[   16.889969] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.890178] page_type: f5(slab)
[   16.890429] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.890493] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.890535] page dumped because: kasan: bad access detected
[   16.890838] 
[   16.890917] Memory state around the buggy address:
[   16.891056]  fff00000c5b7dd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.891179]  fff00000c5b7dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.891262] >fff00000c5b7de00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.891580]                    ^
[   16.891642]  fff00000c5b7de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.891728]  fff00000c5b7df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.891797] ==================================================================
[   16.895670] ==================================================================
[   16.895724] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8
[   16.895772] Read of size 1 at addr fff00000c5b7de00 by task kunit_try_catch/196
[   16.896202] 
[   16.896341] CPU: 1 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.896467] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.896638] Hardware name: linux,dummy-virt (DT)
[   16.896673] Call trace:
[   16.896822]  show_stack+0x20/0x38 (C)
[   16.897035]  dump_stack_lvl+0x8c/0xd0
[   16.897147]  print_report+0x118/0x5d0
[   16.897197]  kasan_report+0xdc/0x128
[   16.897260]  __asan_report_load1_noabort+0x20/0x30
[   16.897328]  ksize_uaf+0x598/0x5f8
[   16.897372]  kunit_try_run_case+0x170/0x3f0
[   16.897419]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.897471]  kthread+0x328/0x630
[   16.897511]  ret_from_fork+0x10/0x20
[   16.897568] 
[   16.897594] Allocated by task 196:
[   16.897642]  kasan_save_stack+0x3c/0x68
[   16.897700]  kasan_save_track+0x20/0x40
[   16.897737]  kasan_save_alloc_info+0x40/0x58
[   16.897785]  __kasan_kmalloc+0xd4/0xd8
[   16.897820]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.897859]  ksize_uaf+0xb8/0x5f8
[   16.897896]  kunit_try_run_case+0x170/0x3f0
[   16.897947]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.897992]  kthread+0x328/0x630
[   16.898025]  ret_from_fork+0x10/0x20
[   16.898060] 
[   16.898079] Freed by task 196:
[   16.898115]  kasan_save_stack+0x3c/0x68
[   16.898152]  kasan_save_track+0x20/0x40
[   16.898189]  kasan_save_free_info+0x4c/0x78
[   16.898226]  __kasan_slab_free+0x6c/0x98
[   16.898264]  kfree+0x214/0x3c8
[   16.898306]  ksize_uaf+0x11c/0x5f8
[   16.898813]  kunit_try_run_case+0x170/0x3f0
[   16.898897]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.899097]  kthread+0x328/0x630
[   16.899313]  ret_from_fork+0x10/0x20
[   16.899379] 
[   16.899429] The buggy address belongs to the object at fff00000c5b7de00
[   16.899429]  which belongs to the cache kmalloc-128 of size 128
[   16.899635] The buggy address is located 0 bytes inside of
[   16.899635]  freed 128-byte region [fff00000c5b7de00, fff00000c5b7de80)
[   16.899795] 
[   16.899845] The buggy address belongs to the physical page:
[   16.900125] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b7d
[   16.900224] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.900403] page_type: f5(slab)
[   16.900451] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.900629] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.900694] page dumped because: kasan: bad access detected
[   16.900827] 
[   16.900970] Memory state around the buggy address:
[   16.901172]  fff00000c5b7dd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.901378]  fff00000c5b7dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.901519] >fff00000c5b7de00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.901658]                    ^
[   16.901719]  fff00000c5b7de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.901793]  fff00000c5b7df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.901901] ==================================================================
[   16.902972] ==================================================================
[   16.903312] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8
[   16.903477] Read of size 1 at addr fff00000c5b7de78 by task kunit_try_catch/196
[   16.903561] 
[   16.903595] CPU: 1 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.903744] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.903772] Hardware name: linux,dummy-virt (DT)
[   16.903828] Call trace:
[   16.903860]  show_stack+0x20/0x38 (C)
[   16.904147]  dump_stack_lvl+0x8c/0xd0
[   16.904305]  print_report+0x118/0x5d0
[   16.904479]  kasan_report+0xdc/0x128
[   16.904566]  __asan_report_load1_noabort+0x20/0x30
[   16.904677]  ksize_uaf+0x544/0x5f8
[   16.904723]  kunit_try_run_case+0x170/0x3f0
[   16.904769]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.904821]  kthread+0x328/0x630
[   16.905159]  ret_from_fork+0x10/0x20
[   16.905253] 
[   16.905301] Allocated by task 196:
[   16.905490]  kasan_save_stack+0x3c/0x68
[   16.905643]  kasan_save_track+0x20/0x40
[   16.906048]  kasan_save_alloc_info+0x40/0x58
[   16.906138]  __kasan_kmalloc+0xd4/0xd8
[   16.906225]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.906442]  ksize_uaf+0xb8/0x5f8
[   16.906529]  kunit_try_run_case+0x170/0x3f0
[   16.906685]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.906732]  kthread+0x328/0x630
[   16.906797]  ret_from_fork+0x10/0x20
[   16.907112] 
[   16.907150] Freed by task 196:
[   16.907207]  kasan_save_stack+0x3c/0x68
[   16.907346]  kasan_save_track+0x20/0x40
[   16.907444]  kasan_save_free_info+0x4c/0x78
[   16.907595]  __kasan_slab_free+0x6c/0x98
[   16.907647]  kfree+0x214/0x3c8
[   16.907708]  ksize_uaf+0x11c/0x5f8
[   16.908060]  kunit_try_run_case+0x170/0x3f0
[   16.908126]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.908272]  kthread+0x328/0x630
[   16.908377]  ret_from_fork+0x10/0x20
[   16.908581] 
[   16.908613] The buggy address belongs to the object at fff00000c5b7de00
[   16.908613]  which belongs to the cache kmalloc-128 of size 128
[   16.908687] The buggy address is located 120 bytes inside of
[   16.908687]  freed 128-byte region [fff00000c5b7de00, fff00000c5b7de80)
[   16.909070] 
[   16.909114] The buggy address belongs to the physical page:
[   16.909243] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b7d
[   16.909342] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.909475] page_type: f5(slab)
[   16.909580] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.910033] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.910197] page dumped because: kasan: bad access detected
[   16.910255] 
[   16.910404] Memory state around the buggy address:
[   16.910492]  fff00000c5b7dd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.910565]  fff00000c5b7dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.910885] >fff00000c5b7de00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.910989]                                                                 ^
[   16.911066]  fff00000c5b7de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.911154]  fff00000c5b7df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.911295] ==================================================================

[   16.863650] ==================================================================
[   16.863728] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8
[   16.863780] Read of size 1 at addr fff00000c771d500 by task kunit_try_catch/196
[   16.863829] 
[   16.863865] CPU: 0 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.863947] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.863974] Hardware name: linux,dummy-virt (DT)
[   16.864303] Call trace:
[   16.864340]  show_stack+0x20/0x38 (C)
[   16.864394]  dump_stack_lvl+0x8c/0xd0
[   16.864442]  print_report+0x118/0x5d0
[   16.864532]  kasan_report+0xdc/0x128
[   16.864579]  __kasan_check_byte+0x54/0x70
[   16.864626]  ksize+0x30/0x88
[   16.864667]  ksize_uaf+0x168/0x5f8
[   16.864878]  kunit_try_run_case+0x170/0x3f0
[   16.864969]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.865065]  kthread+0x328/0x630
[   16.865174]  ret_from_fork+0x10/0x20
[   16.865254] 
[   16.865274] Allocated by task 196:
[   16.865358]  kasan_save_stack+0x3c/0x68
[   16.865491]  kasan_save_track+0x20/0x40
[   16.865601]  kasan_save_alloc_info+0x40/0x58
[   16.865780]  __kasan_kmalloc+0xd4/0xd8
[   16.865847]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.865888]  ksize_uaf+0xb8/0x5f8
[   16.865921]  kunit_try_run_case+0x170/0x3f0
[   16.865959]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.866232]  kthread+0x328/0x630
[   16.866321]  ret_from_fork+0x10/0x20
[   16.866358] 
[   16.866433] Freed by task 196:
[   16.866569]  kasan_save_stack+0x3c/0x68
[   16.866623]  kasan_save_track+0x20/0x40
[   16.866772]  kasan_save_free_info+0x4c/0x78
[   16.866879]  __kasan_slab_free+0x6c/0x98
[   16.866927]  kfree+0x214/0x3c8
[   16.866961]  ksize_uaf+0x11c/0x5f8
[   16.867006]  kunit_try_run_case+0x170/0x3f0
[   16.867102]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.867158]  kthread+0x328/0x630
[   16.867222]  ret_from_fork+0x10/0x20
[   16.867259] 
[   16.867280] The buggy address belongs to the object at fff00000c771d500
[   16.867280]  which belongs to the cache kmalloc-128 of size 128
[   16.867481] The buggy address is located 0 bytes inside of
[   16.867481]  freed 128-byte region [fff00000c771d500, fff00000c771d580)
[   16.867542] 
[   16.867563] The buggy address belongs to the physical page:
[   16.867594] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10771d
[   16.867854] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.867951] page_type: f5(slab)
[   16.868059] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.868143] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.868196] page dumped because: kasan: bad access detected
[   16.868261] 
[   16.868348] Memory state around the buggy address:
[   16.868404]  fff00000c771d400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.868464]  fff00000c771d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.868542] >fff00000c771d500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.868580]                    ^
[   16.868610]  fff00000c771d580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.868653]  fff00000c771d600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.868819] ==================================================================
[   16.878217] ==================================================================
[   16.878272] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8
[   16.878319] Read of size 1 at addr fff00000c771d578 by task kunit_try_catch/196
[   16.878369] 
[   16.878400] CPU: 0 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.878481] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.878508] Hardware name: linux,dummy-virt (DT)
[   16.878538] Call trace:
[   16.878561]  show_stack+0x20/0x38 (C)
[   16.878621]  dump_stack_lvl+0x8c/0xd0
[   16.878667]  print_report+0x118/0x5d0
[   16.878728]  kasan_report+0xdc/0x128
[   16.878772]  __asan_report_load1_noabort+0x20/0x30
[   16.878839]  ksize_uaf+0x544/0x5f8
[   16.878889]  kunit_try_run_case+0x170/0x3f0
[   16.878935]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.878997]  kthread+0x328/0x630
[   16.879040]  ret_from_fork+0x10/0x20
[   16.879093] 
[   16.879112] Allocated by task 196:
[   16.879140]  kasan_save_stack+0x3c/0x68
[   16.879180]  kasan_save_track+0x20/0x40
[   16.879218]  kasan_save_alloc_info+0x40/0x58
[   16.879258]  __kasan_kmalloc+0xd4/0xd8
[   16.879293]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.879331]  ksize_uaf+0xb8/0x5f8
[   16.879364]  kunit_try_run_case+0x170/0x3f0
[   16.879401]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.879442]  kthread+0x328/0x630
[   16.879474]  ret_from_fork+0x10/0x20
[   16.879510] 
[   16.879527] Freed by task 196:
[   16.879552]  kasan_save_stack+0x3c/0x68
[   16.879597]  kasan_save_track+0x20/0x40
[   16.879634]  kasan_save_free_info+0x4c/0x78
[   16.879673]  __kasan_slab_free+0x6c/0x98
[   16.879709]  kfree+0x214/0x3c8
[   16.880337]  ksize_uaf+0x11c/0x5f8
[   16.880406]  kunit_try_run_case+0x170/0x3f0
[   16.880444]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.880488]  kthread+0x328/0x630
[   16.880664]  ret_from_fork+0x10/0x20
[   16.880702] 
[   16.880738] The buggy address belongs to the object at fff00000c771d500
[   16.880738]  which belongs to the cache kmalloc-128 of size 128
[   16.880846] The buggy address is located 120 bytes inside of
[   16.880846]  freed 128-byte region [fff00000c771d500, fff00000c771d580)
[   16.881004] 
[   16.881093] The buggy address belongs to the physical page:
[   16.881191] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10771d
[   16.881275] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.881327] page_type: f5(slab)
[   16.881365] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.881450] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.881581] page dumped because: kasan: bad access detected
[   16.881682] 
[   16.881737] Memory state around the buggy address:
[   16.881824]  fff00000c771d400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.881907]  fff00000c771d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.882035] >fff00000c771d500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.882083]                                                                 ^
[   16.882173]  fff00000c771d580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.882215]  fff00000c771d600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.882450] ==================================================================
[   16.870006] ==================================================================
[   16.870061] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8
[   16.870108] Read of size 1 at addr fff00000c771d500 by task kunit_try_catch/196
[   16.870339] 
[   16.870418] CPU: 0 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.870506] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.870552] Hardware name: linux,dummy-virt (DT)
[   16.870609] Call trace:
[   16.870686]  show_stack+0x20/0x38 (C)
[   16.870750]  dump_stack_lvl+0x8c/0xd0
[   16.870882]  print_report+0x118/0x5d0
[   16.871006]  kasan_report+0xdc/0x128
[   16.871073]  __asan_report_load1_noabort+0x20/0x30
[   16.871185]  ksize_uaf+0x598/0x5f8
[   16.871249]  kunit_try_run_case+0x170/0x3f0
[   16.871330]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.871381]  kthread+0x328/0x630
[   16.871605]  ret_from_fork+0x10/0x20
[   16.871655] 
[   16.871673] Allocated by task 196:
[   16.871702]  kasan_save_stack+0x3c/0x68
[   16.871998]  kasan_save_track+0x20/0x40
[   16.872123]  kasan_save_alloc_info+0x40/0x58
[   16.872166]  __kasan_kmalloc+0xd4/0xd8
[   16.872265]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.872336]  ksize_uaf+0xb8/0x5f8
[   16.872371]  kunit_try_run_case+0x170/0x3f0
[   16.872459]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.872585]  kthread+0x328/0x630
[   16.872663]  ret_from_fork+0x10/0x20
[   16.872742] 
[   16.872762] Freed by task 196:
[   16.872867]  kasan_save_stack+0x3c/0x68
[   16.872906]  kasan_save_track+0x20/0x40
[   16.872944]  kasan_save_free_info+0x4c/0x78
[   16.872983]  __kasan_slab_free+0x6c/0x98
[   16.873021]  kfree+0x214/0x3c8
[   16.873466]  ksize_uaf+0x11c/0x5f8
[   16.873866]  kunit_try_run_case+0x170/0x3f0
[   16.873951]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.874074]  kthread+0x328/0x630
[   16.874220]  ret_from_fork+0x10/0x20
[   16.874345] 
[   16.874472] The buggy address belongs to the object at fff00000c771d500
[   16.874472]  which belongs to the cache kmalloc-128 of size 128
[   16.874532] The buggy address is located 0 bytes inside of
[   16.874532]  freed 128-byte region [fff00000c771d500, fff00000c771d580)
[   16.874831] 
[   16.874859] The buggy address belongs to the physical page:
[   16.874980] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10771d
[   16.875071] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.875506] page_type: f5(slab)
[   16.875634] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.875757] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.875845] page dumped because: kasan: bad access detected
[   16.875919] 
[   16.875940] Memory state around the buggy address:
[   16.875973]  fff00000c771d400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.876031]  fff00000c771d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.876077] >fff00000c771d500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.876410]                    ^
[   16.876692]  fff00000c771d580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.876965]  fff00000c771d600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.877071] ==================================================================

[   12.755243] ==================================================================
[   12.755645] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5e4/0x6c0
[   12.755956] Read of size 1 at addr ffff888102988878 by task kunit_try_catch/213
[   12.756864] 
[   12.757016] CPU: 1 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.757060] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.757071] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.757092] Call Trace:
[   12.757107]  <TASK>
[   12.757123]  dump_stack_lvl+0x73/0xb0
[   12.757153]  print_report+0xd1/0x610
[   12.757175]  ? __virt_addr_valid+0x1db/0x2d0
[   12.757198]  ? ksize_uaf+0x5e4/0x6c0
[   12.757217]  ? kasan_complete_mode_report_info+0x64/0x200
[   12.757239]  ? ksize_uaf+0x5e4/0x6c0
[   12.757260]  kasan_report+0x141/0x180
[   12.757281]  ? ksize_uaf+0x5e4/0x6c0
[   12.757307]  __asan_report_load1_noabort+0x18/0x20
[   12.757330]  ksize_uaf+0x5e4/0x6c0
[   12.757351]  ? __pfx_ksize_uaf+0x10/0x10
[   12.757372]  ? __schedule+0x10cc/0x2b60
[   12.757394]  ? __pfx_read_tsc+0x10/0x10
[   12.757414]  ? ktime_get_ts64+0x86/0x230
[   12.757438]  kunit_try_run_case+0x1a5/0x480
[   12.757484]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.757507]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.757531]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.757554]  ? __kthread_parkme+0x82/0x180
[   12.757573]  ? preempt_count_sub+0x50/0x80
[   12.757612]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.757636]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.757673]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.757696]  kthread+0x337/0x6f0
[   12.757714]  ? trace_preempt_on+0x20/0xc0
[   12.757737]  ? __pfx_kthread+0x10/0x10
[   12.757757]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.757777]  ? calculate_sigpending+0x7b/0xa0
[   12.757801]  ? __pfx_kthread+0x10/0x10
[   12.757822]  ret_from_fork+0x116/0x1d0
[   12.757839]  ? __pfx_kthread+0x10/0x10
[   12.757859]  ret_from_fork_asm+0x1a/0x30
[   12.757900]  </TASK>
[   12.757910] 
[   12.764870] Allocated by task 213:
[   12.765080]  kasan_save_stack+0x45/0x70
[   12.765281]  kasan_save_track+0x18/0x40
[   12.765470]  kasan_save_alloc_info+0x3b/0x50
[   12.765680]  __kasan_kmalloc+0xb7/0xc0
[   12.765865]  __kmalloc_cache_noprof+0x189/0x420
[   12.766120]  ksize_uaf+0xaa/0x6c0
[   12.766294]  kunit_try_run_case+0x1a5/0x480
[   12.766481]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.766747]  kthread+0x337/0x6f0
[   12.766912]  ret_from_fork+0x116/0x1d0
[   12.767060]  ret_from_fork_asm+0x1a/0x30
[   12.767196] 
[   12.767264] Freed by task 213:
[   12.767372]  kasan_save_stack+0x45/0x70
[   12.767566]  kasan_save_track+0x18/0x40
[   12.767772]  kasan_save_free_info+0x3f/0x60
[   12.768032]  __kasan_slab_free+0x56/0x70
[   12.768244]  kfree+0x222/0x3f0
[   12.768406]  ksize_uaf+0x12c/0x6c0
[   12.768578]  kunit_try_run_case+0x1a5/0x480
[   12.768809]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.769094]  kthread+0x337/0x6f0
[   12.769229]  ret_from_fork+0x116/0x1d0
[   12.769436]  ret_from_fork_asm+0x1a/0x30
[   12.769623] 
[   12.769725] The buggy address belongs to the object at ffff888102988800
[   12.769725]  which belongs to the cache kmalloc-128 of size 128
[   12.770238] The buggy address is located 120 bytes inside of
[   12.770238]  freed 128-byte region [ffff888102988800, ffff888102988880)
[   12.770779] 
[   12.770861] The buggy address belongs to the physical page:
[   12.771167] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102988
[   12.771490] flags: 0x200000000000000(node=0|zone=2)
[   12.771748] page_type: f5(slab)
[   12.771901] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.772295] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.772584] page dumped because: kasan: bad access detected
[   12.772841] 
[   12.772955] Memory state around the buggy address:
[   12.773188]  ffff888102988700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.773448]  ffff888102988780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.773663] >ffff888102988800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.773875]                                                                 ^
[   12.774238]  ffff888102988880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.774552]  ffff888102988900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.774870] ==================================================================
[   12.709240] ==================================================================
[   12.710334] BUG: KASAN: slab-use-after-free in ksize_uaf+0x19d/0x6c0
[   12.710915] Read of size 1 at addr ffff888102988800 by task kunit_try_catch/213
[   12.711875] 
[   12.712219] CPU: 1 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.712274] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.712286] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.712307] Call Trace:
[   12.712319]  <TASK>
[   12.712372]  dump_stack_lvl+0x73/0xb0
[   12.712409]  print_report+0xd1/0x610
[   12.712433]  ? __virt_addr_valid+0x1db/0x2d0
[   12.712456]  ? ksize_uaf+0x19d/0x6c0
[   12.712476]  ? kasan_complete_mode_report_info+0x64/0x200
[   12.712498]  ? ksize_uaf+0x19d/0x6c0
[   12.712518]  kasan_report+0x141/0x180
[   12.712540]  ? ksize_uaf+0x19d/0x6c0
[   12.712563]  ? ksize_uaf+0x19d/0x6c0
[   12.712583]  __kasan_check_byte+0x3d/0x50
[   12.712605]  ksize+0x20/0x60
[   12.712624]  ksize_uaf+0x19d/0x6c0
[   12.712644]  ? __pfx_ksize_uaf+0x10/0x10
[   12.712665]  ? __schedule+0x10cc/0x2b60
[   12.712686]  ? __pfx_read_tsc+0x10/0x10
[   12.712707]  ? ktime_get_ts64+0x86/0x230
[   12.712731]  kunit_try_run_case+0x1a5/0x480
[   12.712756]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.712777]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.712800]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.712824]  ? __kthread_parkme+0x82/0x180
[   12.712843]  ? preempt_count_sub+0x50/0x80
[   12.712867]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.712890]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.712925]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.712948]  kthread+0x337/0x6f0
[   12.712987]  ? trace_preempt_on+0x20/0xc0
[   12.713011]  ? __pfx_kthread+0x10/0x10
[   12.713031]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.713052]  ? calculate_sigpending+0x7b/0xa0
[   12.713075]  ? __pfx_kthread+0x10/0x10
[   12.713096]  ret_from_fork+0x116/0x1d0
[   12.713114]  ? __pfx_kthread+0x10/0x10
[   12.713133]  ret_from_fork_asm+0x1a/0x30
[   12.713165]  </TASK>
[   12.713175] 
[   12.724114] Allocated by task 213:
[   12.724292]  kasan_save_stack+0x45/0x70
[   12.724458]  kasan_save_track+0x18/0x40
[   12.724595]  kasan_save_alloc_info+0x3b/0x50
[   12.724790]  __kasan_kmalloc+0xb7/0xc0
[   12.725050]  __kmalloc_cache_noprof+0x189/0x420
[   12.725278]  ksize_uaf+0xaa/0x6c0
[   12.725448]  kunit_try_run_case+0x1a5/0x480
[   12.725682]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.725921]  kthread+0x337/0x6f0
[   12.726149]  ret_from_fork+0x116/0x1d0
[   12.726337]  ret_from_fork_asm+0x1a/0x30
[   12.726537] 
[   12.726630] Freed by task 213:
[   12.726769]  kasan_save_stack+0x45/0x70
[   12.726918]  kasan_save_track+0x18/0x40
[   12.727076]  kasan_save_free_info+0x3f/0x60
[   12.727225]  __kasan_slab_free+0x56/0x70
[   12.727417]  kfree+0x222/0x3f0
[   12.727580]  ksize_uaf+0x12c/0x6c0
[   12.727779]  kunit_try_run_case+0x1a5/0x480
[   12.728061]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.728342]  kthread+0x337/0x6f0
[   12.728535]  ret_from_fork+0x116/0x1d0
[   12.728727]  ret_from_fork_asm+0x1a/0x30
[   12.728935] 
[   12.729048] The buggy address belongs to the object at ffff888102988800
[   12.729048]  which belongs to the cache kmalloc-128 of size 128
[   12.729519] The buggy address is located 0 bytes inside of
[   12.729519]  freed 128-byte region [ffff888102988800, ffff888102988880)
[   12.730054] 
[   12.730133] The buggy address belongs to the physical page:
[   12.730411] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102988
[   12.730768] flags: 0x200000000000000(node=0|zone=2)
[   12.731046] page_type: f5(slab)
[   12.731206] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.731530] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.731848] page dumped because: kasan: bad access detected
[   12.732138] 
[   12.732232] Memory state around the buggy address:
[   12.732442]  ffff888102988700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.732748]  ffff888102988780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.733049] >ffff888102988800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.733375]                    ^
[   12.733528]  ffff888102988880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.733808]  ffff888102988900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.734175] ==================================================================
[   12.735392] ==================================================================
[   12.735804] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5fe/0x6c0
[   12.736188] Read of size 1 at addr ffff888102988800 by task kunit_try_catch/213
[   12.736532] 
[   12.736650] CPU: 1 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.736697] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.736708] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.736729] Call Trace:
[   12.736741]  <TASK>
[   12.736757]  dump_stack_lvl+0x73/0xb0
[   12.736786]  print_report+0xd1/0x610
[   12.736811]  ? __virt_addr_valid+0x1db/0x2d0
[   12.736834]  ? ksize_uaf+0x5fe/0x6c0
[   12.736854]  ? kasan_complete_mode_report_info+0x64/0x200
[   12.736877]  ? ksize_uaf+0x5fe/0x6c0
[   12.736909]  kasan_report+0x141/0x180
[   12.736932]  ? ksize_uaf+0x5fe/0x6c0
[   12.736959]  __asan_report_load1_noabort+0x18/0x20
[   12.737020]  ksize_uaf+0x5fe/0x6c0
[   12.737040]  ? __pfx_ksize_uaf+0x10/0x10
[   12.737061]  ? __schedule+0x10cc/0x2b60
[   12.737083]  ? __pfx_read_tsc+0x10/0x10
[   12.737102]  ? ktime_get_ts64+0x86/0x230
[   12.737127]  kunit_try_run_case+0x1a5/0x480
[   12.737151]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.737172]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.737196]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.737219]  ? __kthread_parkme+0x82/0x180
[   12.737239]  ? preempt_count_sub+0x50/0x80
[   12.737263]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.737286]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.737309]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.737332]  kthread+0x337/0x6f0
[   12.737351]  ? trace_preempt_on+0x20/0xc0
[   12.737374]  ? __pfx_kthread+0x10/0x10
[   12.737393]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.737414]  ? calculate_sigpending+0x7b/0xa0
[   12.737456]  ? __pfx_kthread+0x10/0x10
[   12.737477]  ret_from_fork+0x116/0x1d0
[   12.737494]  ? __pfx_kthread+0x10/0x10
[   12.737514]  ret_from_fork_asm+0x1a/0x30
[   12.737563]  </TASK>
[   12.737574] 
[   12.744551] Allocated by task 213:
[   12.744724]  kasan_save_stack+0x45/0x70
[   12.744864]  kasan_save_track+0x18/0x40
[   12.745062]  kasan_save_alloc_info+0x3b/0x50
[   12.745295]  __kasan_kmalloc+0xb7/0xc0
[   12.745509]  __kmalloc_cache_noprof+0x189/0x420
[   12.745756]  ksize_uaf+0xaa/0x6c0
[   12.745922]  kunit_try_run_case+0x1a5/0x480
[   12.746095]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.746373]  kthread+0x337/0x6f0
[   12.746550]  ret_from_fork+0x116/0x1d0
[   12.746731]  ret_from_fork_asm+0x1a/0x30
[   12.746877] 
[   12.747023] Freed by task 213:
[   12.747180]  kasan_save_stack+0x45/0x70
[   12.747373]  kasan_save_track+0x18/0x40
[   12.747540]  kasan_save_free_info+0x3f/0x60
[   12.747718]  __kasan_slab_free+0x56/0x70
[   12.747944]  kfree+0x222/0x3f0
[   12.748147]  ksize_uaf+0x12c/0x6c0
[   12.748296]  kunit_try_run_case+0x1a5/0x480
[   12.748512]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.748787]  kthread+0x337/0x6f0
[   12.748983]  ret_from_fork+0x116/0x1d0
[   12.749167]  ret_from_fork_asm+0x1a/0x30
[   12.749362] 
[   12.749454] The buggy address belongs to the object at ffff888102988800
[   12.749454]  which belongs to the cache kmalloc-128 of size 128
[   12.749931] The buggy address is located 0 bytes inside of
[   12.749931]  freed 128-byte region [ffff888102988800, ffff888102988880)
[   12.750475] 
[   12.750562] The buggy address belongs to the physical page:
[   12.750734] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102988
[   12.751091] flags: 0x200000000000000(node=0|zone=2)
[   12.751329] page_type: f5(slab)
[   12.751495] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.751827] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.752191] page dumped because: kasan: bad access detected
[   12.752439] 
[   12.752530] Memory state around the buggy address:
[   12.752749]  ffff888102988700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.753100]  ffff888102988780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.753332] >ffff888102988800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.753545]                    ^
[   12.753659]  ffff888102988880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.753876]  ffff888102988900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.754242] ==================================================================

[   12.526712] ==================================================================
[   12.526991] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5fe/0x6c0
[   12.527209] Read of size 1 at addr ffff8881026cea00 by task kunit_try_catch/214
[   12.527453] 
[   12.527573] CPU: 1 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.527617] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.527628] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.527648] Call Trace:
[   12.527918]  <TASK>
[   12.527942]  dump_stack_lvl+0x73/0xb0
[   12.527974]  print_report+0xd1/0x610
[   12.527997]  ? __virt_addr_valid+0x1db/0x2d0
[   12.528140]  ? ksize_uaf+0x5fe/0x6c0
[   12.528162]  ? kasan_complete_mode_report_info+0x64/0x200
[   12.528184]  ? ksize_uaf+0x5fe/0x6c0
[   12.528204]  kasan_report+0x141/0x180
[   12.528226]  ? ksize_uaf+0x5fe/0x6c0
[   12.528252]  __asan_report_load1_noabort+0x18/0x20
[   12.528568]  ksize_uaf+0x5fe/0x6c0
[   12.528591]  ? __pfx_ksize_uaf+0x10/0x10
[   12.528613]  ? __schedule+0x10cc/0x2b60
[   12.528636]  ? __pfx_read_tsc+0x10/0x10
[   12.528656]  ? ktime_get_ts64+0x86/0x230
[   12.528680]  kunit_try_run_case+0x1a5/0x480
[   12.528703]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.528725]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.528749]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.528773]  ? __kthread_parkme+0x82/0x180
[   12.528792]  ? preempt_count_sub+0x50/0x80
[   12.528816]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.528840]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.528863]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.528886]  kthread+0x337/0x6f0
[   12.528904]  ? trace_preempt_on+0x20/0xc0
[   12.528926]  ? __pfx_kthread+0x10/0x10
[   12.528946]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.528966]  ? calculate_sigpending+0x7b/0xa0
[   12.528990]  ? __pfx_kthread+0x10/0x10
[   12.529011]  ret_from_fork+0x116/0x1d0
[   12.529028]  ? __pfx_kthread+0x10/0x10
[   12.529048]  ret_from_fork_asm+0x1a/0x30
[   12.529080]  </TASK>
[   12.529090] 
[   12.542789] Allocated by task 214:
[   12.542982]  kasan_save_stack+0x45/0x70
[   12.543194]  kasan_save_track+0x18/0x40
[   12.543385]  kasan_save_alloc_info+0x3b/0x50
[   12.543762]  __kasan_kmalloc+0xb7/0xc0
[   12.543954]  __kmalloc_cache_noprof+0x189/0x420
[   12.544165]  ksize_uaf+0xaa/0x6c0
[   12.544285]  kunit_try_run_case+0x1a5/0x480
[   12.544662]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.544885]  kthread+0x337/0x6f0
[   12.545032]  ret_from_fork+0x116/0x1d0
[   12.545228]  ret_from_fork_asm+0x1a/0x30
[   12.545401] 
[   12.545512] Freed by task 214:
[   12.545730]  kasan_save_stack+0x45/0x70
[   12.545903]  kasan_save_track+0x18/0x40
[   12.546033]  kasan_save_free_info+0x3f/0x60
[   12.546174]  __kasan_slab_free+0x56/0x70
[   12.546306]  kfree+0x222/0x3f0
[   12.546455]  ksize_uaf+0x12c/0x6c0
[   12.546628]  kunit_try_run_case+0x1a5/0x480
[   12.546940]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.547334]  kthread+0x337/0x6f0
[   12.547735]  ret_from_fork+0x116/0x1d0
[   12.547923]  ret_from_fork_asm+0x1a/0x30
[   12.548102] 
[   12.548174] The buggy address belongs to the object at ffff8881026cea00
[   12.548174]  which belongs to the cache kmalloc-128 of size 128
[   12.548977] The buggy address is located 0 bytes inside of
[   12.548977]  freed 128-byte region [ffff8881026cea00, ffff8881026cea80)
[   12.549591] 
[   12.549671] The buggy address belongs to the physical page:
[   12.549899] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce
[   12.550230] flags: 0x200000000000000(node=0|zone=2)
[   12.550419] page_type: f5(slab)
[   12.550703] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.551008] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.551260] page dumped because: kasan: bad access detected
[   12.551432] 
[   12.551513] Memory state around the buggy address:
[   12.551734]  ffff8881026ce900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.552065]  ffff8881026ce980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.552375] >ffff8881026cea00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.552893]                    ^
[   12.553069]  ffff8881026cea80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.553379]  ffff8881026ceb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.553718] ==================================================================
[   12.554287] ==================================================================
[   12.554548] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5e4/0x6c0
[   12.554757] Read of size 1 at addr ffff8881026cea78 by task kunit_try_catch/214
[   12.555024] 
[   12.555135] CPU: 1 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.555177] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.555187] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.555303] Call Trace:
[   12.555322]  <TASK>
[   12.555339]  dump_stack_lvl+0x73/0xb0
[   12.555368]  print_report+0xd1/0x610
[   12.555390]  ? __virt_addr_valid+0x1db/0x2d0
[   12.555468]  ? ksize_uaf+0x5e4/0x6c0
[   12.555489]  ? kasan_complete_mode_report_info+0x64/0x200
[   12.555511]  ? ksize_uaf+0x5e4/0x6c0
[   12.555532]  kasan_report+0x141/0x180
[   12.555553]  ? ksize_uaf+0x5e4/0x6c0
[   12.555579]  __asan_report_load1_noabort+0x18/0x20
[   12.555603]  ksize_uaf+0x5e4/0x6c0
[   12.555622]  ? __pfx_ksize_uaf+0x10/0x10
[   12.555644]  ? __schedule+0x10cc/0x2b60
[   12.555666]  ? __pfx_read_tsc+0x10/0x10
[   12.555686]  ? ktime_get_ts64+0x86/0x230
[   12.555711]  kunit_try_run_case+0x1a5/0x480
[   12.555735]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.555756]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.555780]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.555803]  ? __kthread_parkme+0x82/0x180
[   12.555823]  ? preempt_count_sub+0x50/0x80
[   12.555847]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.555871]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.555894]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.555918]  kthread+0x337/0x6f0
[   12.555938]  ? trace_preempt_on+0x20/0xc0
[   12.555960]  ? __pfx_kthread+0x10/0x10
[   12.555980]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.556001]  ? calculate_sigpending+0x7b/0xa0
[   12.556024]  ? __pfx_kthread+0x10/0x10
[   12.556045]  ret_from_fork+0x116/0x1d0
[   12.556062]  ? __pfx_kthread+0x10/0x10
[   12.556082]  ret_from_fork_asm+0x1a/0x30
[   12.556114]  </TASK>
[   12.556123] 
[   12.563157] Allocated by task 214:
[   12.563633]  kasan_save_stack+0x45/0x70
[   12.564051]  kasan_save_track+0x18/0x40
[   12.564240]  kasan_save_alloc_info+0x3b/0x50
[   12.564646]  __kasan_kmalloc+0xb7/0xc0
[   12.564840]  __kmalloc_cache_noprof+0x189/0x420
[   12.565057]  ksize_uaf+0xaa/0x6c0
[   12.565237]  kunit_try_run_case+0x1a5/0x480
[   12.565479]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.565826]  kthread+0x337/0x6f0
[   12.565953]  ret_from_fork+0x116/0x1d0
[   12.566087]  ret_from_fork_asm+0x1a/0x30
[   12.566285] 
[   12.566382] Freed by task 214:
[   12.566766]  kasan_save_stack+0x45/0x70
[   12.566932]  kasan_save_track+0x18/0x40
[   12.567099]  kasan_save_free_info+0x3f/0x60
[   12.567282]  __kasan_slab_free+0x56/0x70
[   12.567532]  kfree+0x222/0x3f0
[   12.567698]  ksize_uaf+0x12c/0x6c0
[   12.567840]  kunit_try_run_case+0x1a5/0x480
[   12.568006]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.568237]  kthread+0x337/0x6f0
[   12.568389]  ret_from_fork+0x116/0x1d0
[   12.568743]  ret_from_fork_asm+0x1a/0x30
[   12.568924] 
[   12.569021] The buggy address belongs to the object at ffff8881026cea00
[   12.569021]  which belongs to the cache kmalloc-128 of size 128
[   12.569374] The buggy address is located 120 bytes inside of
[   12.569374]  freed 128-byte region [ffff8881026cea00, ffff8881026cea80)
[   12.569800] 
[   12.569897] The buggy address belongs to the physical page:
[   12.570212] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce
[   12.570573] flags: 0x200000000000000(node=0|zone=2)
[   12.570874] page_type: f5(slab)
[   12.571106] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.571333] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.572056] page dumped because: kasan: bad access detected
[   12.572276] 
[   12.572368] Memory state around the buggy address:
[   12.572757]  ffff8881026ce900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.573079]  ffff8881026ce980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.573351] >ffff8881026cea00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.573760]                                                                 ^
[   12.574041]  ffff8881026cea80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.574326]  ffff8881026ceb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.574652] ==================================================================
[   12.497102] ==================================================================
[   12.498862] BUG: KASAN: slab-use-after-free in ksize_uaf+0x19d/0x6c0
[   12.499334] Read of size 1 at addr ffff8881026cea00 by task kunit_try_catch/214
[   12.500171] 
[   12.500491] CPU: 1 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.500544] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.500555] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.500577] Call Trace:
[   12.500590]  <TASK>
[   12.500608]  dump_stack_lvl+0x73/0xb0
[   12.500640]  print_report+0xd1/0x610
[   12.500662]  ? __virt_addr_valid+0x1db/0x2d0
[   12.500686]  ? ksize_uaf+0x19d/0x6c0
[   12.500709]  ? kasan_complete_mode_report_info+0x64/0x200
[   12.500732]  ? ksize_uaf+0x19d/0x6c0
[   12.500752]  kasan_report+0x141/0x180
[   12.500774]  ? ksize_uaf+0x19d/0x6c0
[   12.500797]  ? ksize_uaf+0x19d/0x6c0
[   12.500817]  __kasan_check_byte+0x3d/0x50
[   12.500838]  ksize+0x20/0x60
[   12.500858]  ksize_uaf+0x19d/0x6c0
[   12.500879]  ? __pfx_ksize_uaf+0x10/0x10
[   12.500900]  ? __schedule+0x10cc/0x2b60
[   12.500923]  ? __pfx_read_tsc+0x10/0x10
[   12.500943]  ? ktime_get_ts64+0x86/0x230
[   12.500969]  kunit_try_run_case+0x1a5/0x480
[   12.500994]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.501015]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.501039]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.501063]  ? __kthread_parkme+0x82/0x180
[   12.501083]  ? preempt_count_sub+0x50/0x80
[   12.501107]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.501135]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.501159]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.501182]  kthread+0x337/0x6f0
[   12.501200]  ? trace_preempt_on+0x20/0xc0
[   12.501223]  ? __pfx_kthread+0x10/0x10
[   12.501243]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.501264]  ? calculate_sigpending+0x7b/0xa0
[   12.501288]  ? __pfx_kthread+0x10/0x10
[   12.501308]  ret_from_fork+0x116/0x1d0
[   12.501326]  ? __pfx_kthread+0x10/0x10
[   12.501346]  ret_from_fork_asm+0x1a/0x30
[   12.501377]  </TASK>
[   12.501387] 
[   12.512269] Allocated by task 214:
[   12.512783]  kasan_save_stack+0x45/0x70
[   12.512967]  kasan_save_track+0x18/0x40
[   12.513296]  kasan_save_alloc_info+0x3b/0x50
[   12.513644]  __kasan_kmalloc+0xb7/0xc0
[   12.513954]  __kmalloc_cache_noprof+0x189/0x420
[   12.514160]  ksize_uaf+0xaa/0x6c0
[   12.514328]  kunit_try_run_case+0x1a5/0x480
[   12.514805]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.515143]  kthread+0x337/0x6f0
[   12.515393]  ret_from_fork+0x116/0x1d0
[   12.515825]  ret_from_fork_asm+0x1a/0x30
[   12.516085] 
[   12.516162] Freed by task 214:
[   12.516611]  kasan_save_stack+0x45/0x70
[   12.516760]  kasan_save_track+0x18/0x40
[   12.516979]  kasan_save_free_info+0x3f/0x60
[   12.517264]  __kasan_slab_free+0x56/0x70
[   12.517759]  kfree+0x222/0x3f0
[   12.518065]  ksize_uaf+0x12c/0x6c0
[   12.518224]  kunit_try_run_case+0x1a5/0x480
[   12.518719]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.518952]  kthread+0x337/0x6f0
[   12.519106]  ret_from_fork+0x116/0x1d0
[   12.519292]  ret_from_fork_asm+0x1a/0x30
[   12.519487] 
[   12.519563] The buggy address belongs to the object at ffff8881026cea00
[   12.519563]  which belongs to the cache kmalloc-128 of size 128
[   12.520069] The buggy address is located 0 bytes inside of
[   12.520069]  freed 128-byte region [ffff8881026cea00, ffff8881026cea80)
[   12.520556] 
[   12.520670] The buggy address belongs to the physical page:
[   12.520977] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ce
[   12.521225] flags: 0x200000000000000(node=0|zone=2)
[   12.521388] page_type: f5(slab)
[   12.521543] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.521874] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.522207] page dumped because: kasan: bad access detected
[   12.522622] 
[   12.522709] Memory state around the buggy address:
[   12.522869]  ffff8881026ce900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.523193]  ffff8881026ce980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.523541] >ffff8881026cea00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.523783]                    ^
[   12.523946]  ffff8881026cea80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.524201]  ffff8881026ceb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.524648] ==================================================================

[   12.657794] ==================================================================
[   12.659199] BUG: KASAN: slab-use-after-free in ksize_uaf+0x19d/0x6c0
[   12.660117] Read of size 1 at addr ffff888102b7d500 by task kunit_try_catch/213
[   12.660763] 
[   12.661038] CPU: 1 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.661092] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.661104] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.661126] Call Trace:
[   12.661141]  <TASK>
[   12.661161]  dump_stack_lvl+0x73/0xb0
[   12.661220]  print_report+0xd1/0x610
[   12.661343]  ? __virt_addr_valid+0x1db/0x2d0
[   12.661369]  ? ksize_uaf+0x19d/0x6c0
[   12.661389]  ? kasan_complete_mode_report_info+0x64/0x200
[   12.661411]  ? ksize_uaf+0x19d/0x6c0
[   12.661432]  kasan_report+0x141/0x180
[   12.661453]  ? ksize_uaf+0x19d/0x6c0
[   12.661476]  ? ksize_uaf+0x19d/0x6c0
[   12.661496]  __kasan_check_byte+0x3d/0x50
[   12.661518]  ksize+0x20/0x60
[   12.661539]  ksize_uaf+0x19d/0x6c0
[   12.661558]  ? __pfx_ksize_uaf+0x10/0x10
[   12.661579]  ? __schedule+0x10cc/0x2b60
[   12.661602]  ? __pfx_read_tsc+0x10/0x10
[   12.661623]  ? ktime_get_ts64+0x86/0x230
[   12.661648]  kunit_try_run_case+0x1a5/0x480
[   12.661674]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.661696]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.661720]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.661743]  ? __kthread_parkme+0x82/0x180
[   12.661764]  ? preempt_count_sub+0x50/0x80
[   12.661789]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.661812]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.661835]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.661858]  kthread+0x337/0x6f0
[   12.661877]  ? trace_preempt_on+0x20/0xc0
[   12.661900]  ? __pfx_kthread+0x10/0x10
[   12.661919]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.661941]  ? calculate_sigpending+0x7b/0xa0
[   12.661966]  ? __pfx_kthread+0x10/0x10
[   12.661986]  ret_from_fork+0x116/0x1d0
[   12.662005]  ? __pfx_kthread+0x10/0x10
[   12.662034]  ret_from_fork_asm+0x1a/0x30
[   12.662066]  </TASK>
[   12.662077] 
[   12.677126] Allocated by task 213:
[   12.677327]  kasan_save_stack+0x45/0x70
[   12.677668]  kasan_save_track+0x18/0x40
[   12.678082]  kasan_save_alloc_info+0x3b/0x50
[   12.678538]  __kasan_kmalloc+0xb7/0xc0
[   12.678924]  __kmalloc_cache_noprof+0x189/0x420
[   12.679233]  ksize_uaf+0xaa/0x6c0
[   12.679387]  kunit_try_run_case+0x1a5/0x480
[   12.679653]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.680284]  kthread+0x337/0x6f0
[   12.680814]  ret_from_fork+0x116/0x1d0
[   12.681302]  ret_from_fork_asm+0x1a/0x30
[   12.681802] 
[   12.682033] Freed by task 213:
[   12.682420]  kasan_save_stack+0x45/0x70
[   12.682709]  kasan_save_track+0x18/0x40
[   12.682847]  kasan_save_free_info+0x3f/0x60
[   12.682995]  __kasan_slab_free+0x56/0x70
[   12.683476]  kfree+0x222/0x3f0
[   12.683865]  ksize_uaf+0x12c/0x6c0
[   12.684260]  kunit_try_run_case+0x1a5/0x480
[   12.684731]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.685405]  kthread+0x337/0x6f0
[   12.685539]  ret_from_fork+0x116/0x1d0
[   12.685671]  ret_from_fork_asm+0x1a/0x30
[   12.685812] 
[   12.685885] The buggy address belongs to the object at ffff888102b7d500
[   12.685885]  which belongs to the cache kmalloc-128 of size 128
[   12.686958] The buggy address is located 0 bytes inside of
[   12.686958]  freed 128-byte region [ffff888102b7d500, ffff888102b7d580)
[   12.688258] 
[   12.688536] The buggy address belongs to the physical page:
[   12.689155] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b7d
[   12.689909] flags: 0x200000000000000(node=0|zone=2)
[   12.690342] page_type: f5(slab)
[   12.690698] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.691210] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.692103] page dumped because: kasan: bad access detected
[   12.692340] 
[   12.692410] Memory state around the buggy address:
[   12.692959]  ffff888102b7d400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.693646]  ffff888102b7d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.693871] >ffff888102b7d500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.694119]                    ^
[   12.694241]  ffff888102b7d580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.694564]  ffff888102b7d600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.695456] ==================================================================
[   12.734987] ==================================================================
[   12.735697] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5e4/0x6c0
[   12.735919] Read of size 1 at addr ffff888102b7d578 by task kunit_try_catch/213
[   12.736531] 
[   12.736797] CPU: 1 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.736844] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.736860] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.736882] Call Trace:
[   12.736895]  <TASK>
[   12.736912]  dump_stack_lvl+0x73/0xb0
[   12.736964]  print_report+0xd1/0x610
[   12.736987]  ? __virt_addr_valid+0x1db/0x2d0
[   12.737019]  ? ksize_uaf+0x5e4/0x6c0
[   12.737105]  ? kasan_complete_mode_report_info+0x64/0x200
[   12.737142]  ? ksize_uaf+0x5e4/0x6c0
[   12.737162]  kasan_report+0x141/0x180
[   12.737184]  ? ksize_uaf+0x5e4/0x6c0
[   12.737209]  __asan_report_load1_noabort+0x18/0x20
[   12.737233]  ksize_uaf+0x5e4/0x6c0
[   12.737253]  ? __pfx_ksize_uaf+0x10/0x10
[   12.737274]  ? __schedule+0x10cc/0x2b60
[   12.737296]  ? __pfx_read_tsc+0x10/0x10
[   12.737316]  ? ktime_get_ts64+0x86/0x230
[   12.737342]  kunit_try_run_case+0x1a5/0x480
[   12.737365]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.737386]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.737411]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.737449]  ? __kthread_parkme+0x82/0x180
[   12.737470]  ? preempt_count_sub+0x50/0x80
[   12.737494]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.737517]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.737541]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.737565]  kthread+0x337/0x6f0
[   12.737584]  ? trace_preempt_on+0x20/0xc0
[   12.737609]  ? __pfx_kthread+0x10/0x10
[   12.737629]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.737652]  ? calculate_sigpending+0x7b/0xa0
[   12.737676]  ? __pfx_kthread+0x10/0x10
[   12.737697]  ret_from_fork+0x116/0x1d0
[   12.737715]  ? __pfx_kthread+0x10/0x10
[   12.737735]  ret_from_fork_asm+0x1a/0x30
[   12.737765]  </TASK>
[   12.737775] 
[   12.751345] Allocated by task 213:
[   12.751556]  kasan_save_stack+0x45/0x70
[   12.751713]  kasan_save_track+0x18/0x40
[   12.751849]  kasan_save_alloc_info+0x3b/0x50
[   12.751997]  __kasan_kmalloc+0xb7/0xc0
[   12.752644]  __kmalloc_cache_noprof+0x189/0x420
[   12.753174]  ksize_uaf+0xaa/0x6c0
[   12.753576]  kunit_try_run_case+0x1a5/0x480
[   12.754053]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.754685]  kthread+0x337/0x6f0
[   12.755133]  ret_from_fork+0x116/0x1d0
[   12.755324]  ret_from_fork_asm+0x1a/0x30
[   12.755617] 
[   12.755775] Freed by task 213:
[   12.756215]  kasan_save_stack+0x45/0x70
[   12.756654]  kasan_save_track+0x18/0x40
[   12.756815]  kasan_save_free_info+0x3f/0x60
[   12.756969]  __kasan_slab_free+0x56/0x70
[   12.757607]  kfree+0x222/0x3f0
[   12.757950]  ksize_uaf+0x12c/0x6c0
[   12.758387]  kunit_try_run_case+0x1a5/0x480
[   12.758809]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.758991]  kthread+0x337/0x6f0
[   12.759461]  ret_from_fork+0x116/0x1d0
[   12.759867]  ret_from_fork_asm+0x1a/0x30
[   12.760347] 
[   12.760433] The buggy address belongs to the object at ffff888102b7d500
[   12.760433]  which belongs to the cache kmalloc-128 of size 128
[   12.761502] The buggy address is located 120 bytes inside of
[   12.761502]  freed 128-byte region [ffff888102b7d500, ffff888102b7d580)
[   12.762282] 
[   12.762510] The buggy address belongs to the physical page:
[   12.763097] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b7d
[   12.763637] flags: 0x200000000000000(node=0|zone=2)
[   12.763810] page_type: f5(slab)
[   12.763933] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.764662] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.765404] page dumped because: kasan: bad access detected
[   12.765940] 
[   12.766152] Memory state around the buggy address:
[   12.766415]  ffff888102b7d400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.766639]  ffff888102b7d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.766857] >ffff888102b7d500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.767439]                                                                 ^
[   12.768152]  ffff888102b7d580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.768883]  ffff888102b7d600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.769673] ==================================================================
[   12.696640] ==================================================================
[   12.698390] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5fe/0x6c0
[   12.699152] Read of size 1 at addr ffff888102b7d500 by task kunit_try_catch/213
[   12.699949] 
[   12.700258] CPU: 1 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.700310] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.700322] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.700343] Call Trace:
[   12.700356]  <TASK>
[   12.700374]  dump_stack_lvl+0x73/0xb0
[   12.700406]  print_report+0xd1/0x610
[   12.700438]  ? __virt_addr_valid+0x1db/0x2d0
[   12.700461]  ? ksize_uaf+0x5fe/0x6c0
[   12.700481]  ? kasan_complete_mode_report_info+0x64/0x200
[   12.700504]  ? ksize_uaf+0x5fe/0x6c0
[   12.700524]  kasan_report+0x141/0x180
[   12.700545]  ? ksize_uaf+0x5fe/0x6c0
[   12.700570]  __asan_report_load1_noabort+0x18/0x20
[   12.700594]  ksize_uaf+0x5fe/0x6c0
[   12.700613]  ? __pfx_ksize_uaf+0x10/0x10
[   12.700634]  ? __schedule+0x10cc/0x2b60
[   12.700656]  ? __pfx_read_tsc+0x10/0x10
[   12.700677]  ? ktime_get_ts64+0x86/0x230
[   12.700701]  kunit_try_run_case+0x1a5/0x480
[   12.700725]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.700747]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.700771]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.700793]  ? __kthread_parkme+0x82/0x180
[   12.700814]  ? preempt_count_sub+0x50/0x80
[   12.700838]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.700871]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.700894]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.700918]  kthread+0x337/0x6f0
[   12.700937]  ? trace_preempt_on+0x20/0xc0
[   12.700960]  ? __pfx_kthread+0x10/0x10
[   12.700979]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.701000]  ? calculate_sigpending+0x7b/0xa0
[   12.701279]  ? __pfx_kthread+0x10/0x10
[   12.701301]  ret_from_fork+0x116/0x1d0
[   12.701321]  ? __pfx_kthread+0x10/0x10
[   12.701341]  ret_from_fork_asm+0x1a/0x30
[   12.701372]  </TASK>
[   12.701382] 
[   12.714718] Allocated by task 213:
[   12.715104]  kasan_save_stack+0x45/0x70
[   12.715570]  kasan_save_track+0x18/0x40
[   12.715716]  kasan_save_alloc_info+0x3b/0x50
[   12.715867]  __kasan_kmalloc+0xb7/0xc0
[   12.716000]  __kmalloc_cache_noprof+0x189/0x420
[   12.716687]  ksize_uaf+0xaa/0x6c0
[   12.717098]  kunit_try_run_case+0x1a5/0x480
[   12.717934]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.718623]  kthread+0x337/0x6f0
[   12.718807]  ret_from_fork+0x116/0x1d0
[   12.718943]  ret_from_fork_asm+0x1a/0x30
[   12.719268] 
[   12.719471] Freed by task 213:
[   12.719839]  kasan_save_stack+0x45/0x70
[   12.720247]  kasan_save_track+0x18/0x40
[   12.720744]  kasan_save_free_info+0x3f/0x60
[   12.721253]  __kasan_slab_free+0x56/0x70
[   12.721645]  kfree+0x222/0x3f0
[   12.721770]  ksize_uaf+0x12c/0x6c0
[   12.721897]  kunit_try_run_case+0x1a5/0x480
[   12.722404]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.722943]  kthread+0x337/0x6f0
[   12.723374]  ret_from_fork+0x116/0x1d0
[   12.723818]  ret_from_fork_asm+0x1a/0x30
[   12.724237] 
[   12.724524] The buggy address belongs to the object at ffff888102b7d500
[   12.724524]  which belongs to the cache kmalloc-128 of size 128
[   12.725544] The buggy address is located 0 bytes inside of
[   12.725544]  freed 128-byte region [ffff888102b7d500, ffff888102b7d580)
[   12.726102] 
[   12.726401] The buggy address belongs to the physical page:
[   12.726981] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b7d
[   12.727816] flags: 0x200000000000000(node=0|zone=2)
[   12.727992] page_type: f5(slab)
[   12.728438] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   12.729201] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.729728] page dumped because: kasan: bad access detected
[   12.729906] 
[   12.729977] Memory state around the buggy address:
[   12.730509]  ffff888102b7d400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.731285]  ffff888102b7d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.732050] >ffff888102b7d500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.732452]                    ^
[   12.732805]  ffff888102b7d580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.733496]  ffff888102b7d600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.734158] ==================================================================