Hay
Date
April 22, 2025, 11:09 a.m.

Environment
qemu-arm64
qemu-x86_64
rk3399-rock-pi-4b

[   18.096869] ==================================================================
[   18.096986] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8
[   18.097095] Read of size 1 at addr fff00000c62d4d78 by task kunit_try_catch/198
[   18.097208] 
[   18.097287] CPU: 1 UID: 0 PID: 198 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   18.097488] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.099940] Hardware name: linux,dummy-virt (DT)
[   18.100146] Call trace:
[   18.100221]  show_stack+0x20/0x38 (C)
[   18.100874]  dump_stack_lvl+0x8c/0xd0
[   18.100988]  print_report+0x118/0x608
[   18.101084]  kasan_report+0xdc/0x128
[   18.101177]  __asan_report_load1_noabort+0x20/0x30
[   18.101290]  ksize_uaf+0x544/0x5f8
[   18.101390]  kunit_try_run_case+0x170/0x3f0
[   18.101504]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.101652]  kthread+0x328/0x630
[   18.101754]  ret_from_fork+0x10/0x20
[   18.101864] 
[   18.101905] Allocated by task 198:
[   18.101967]  kasan_save_stack+0x3c/0x68
[   18.102055]  kasan_save_track+0x20/0x40
[   18.103678]  kasan_save_alloc_info+0x40/0x58
[   18.103954]  __kasan_kmalloc+0xd4/0xd8
[   18.104521]  __kmalloc_cache_noprof+0x15c/0x3c0
[   18.104843]  ksize_uaf+0xb8/0x5f8
[   18.105062]  kunit_try_run_case+0x170/0x3f0
[   18.105195]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.105946]  kthread+0x328/0x630
[   18.106174]  ret_from_fork+0x10/0x20
[   18.106274] 
[   18.106319] Freed by task 198:
[   18.106854]  kasan_save_stack+0x3c/0x68
[   18.107183]  kasan_save_track+0x20/0x40
[   18.107876]  kasan_save_free_info+0x4c/0x78
[   18.108130]  __kasan_slab_free+0x6c/0x98
[   18.108277]  kfree+0x214/0x3c8
[   18.108463]  ksize_uaf+0x11c/0x5f8
[   18.108555]  kunit_try_run_case+0x170/0x3f0
[   18.108645]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.108734]  kthread+0x328/0x630
[   18.108806]  ret_from_fork+0x10/0x20
[   18.108885] 
[   18.108931] The buggy address belongs to the object at fff00000c62d4d00
[   18.108931]  which belongs to the cache kmalloc-128 of size 128
[   18.109065] The buggy address is located 120 bytes inside of
[   18.109065]  freed 128-byte region [fff00000c62d4d00, fff00000c62d4d80)
[   18.109903] 
[   18.110306] The buggy address belongs to the physical page:
[   18.110642] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1062d4
[   18.110788] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.110921] page_type: f5(slab)
[   18.111039] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.111157] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.111249] page dumped because: kasan: bad access detected
[   18.111322] 
[   18.111364] Memory state around the buggy address:
[   18.111439]  fff00000c62d4c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.111551]  fff00000c62d4c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.111688] >fff00000c62d4d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.111821]                                                                 ^
[   18.111922]  fff00000c62d4d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.112057]  fff00000c62d4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.112147] ==================================================================
[   18.076992] ==================================================================
[   18.077107] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8
[   18.077520] Read of size 1 at addr fff00000c62d4d00 by task kunit_try_catch/198
[   18.077681] 
[   18.077801] CPU: 1 UID: 0 PID: 198 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   18.078063] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.078155] Hardware name: linux,dummy-virt (DT)
[   18.078226] Call trace:
[   18.078275]  show_stack+0x20/0x38 (C)
[   18.078384]  dump_stack_lvl+0x8c/0xd0
[   18.078482]  print_report+0x118/0x608
[   18.078589]  kasan_report+0xdc/0x128
[   18.078697]  __asan_report_load1_noabort+0x20/0x30
[   18.078830]  ksize_uaf+0x598/0x5f8
[   18.079455]  kunit_try_run_case+0x170/0x3f0
[   18.079547]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.079672]  kthread+0x328/0x630
[   18.079780]  ret_from_fork+0x10/0x20
[   18.079896] 
[   18.079936] Allocated by task 198:
[   18.079989]  kasan_save_stack+0x3c/0x68
[   18.080058]  kasan_save_track+0x20/0x40
[   18.080127]  kasan_save_alloc_info+0x40/0x58
[   18.080206]  __kasan_kmalloc+0xd4/0xd8
[   18.080282]  __kmalloc_cache_noprof+0x15c/0x3c0
[   18.080371]  ksize_uaf+0xb8/0x5f8
[   18.080672]  kunit_try_run_case+0x170/0x3f0
[   18.080939]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.081567]  kthread+0x328/0x630
[   18.081935]  ret_from_fork+0x10/0x20
[   18.082253] 
[   18.082386] Freed by task 198:
[   18.082454]  kasan_save_stack+0x3c/0x68
[   18.083163]  kasan_save_track+0x20/0x40
[   18.083552]  kasan_save_free_info+0x4c/0x78
[   18.083634]  __kasan_slab_free+0x6c/0x98
[   18.083704]  kfree+0x214/0x3c8
[   18.083771]  ksize_uaf+0x11c/0x5f8
[   18.083848]  kunit_try_run_case+0x170/0x3f0
[   18.085306]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.085726]  kthread+0x328/0x630
[   18.086303]  ret_from_fork+0x10/0x20
[   18.086807] 
[   18.086870] The buggy address belongs to the object at fff00000c62d4d00
[   18.086870]  which belongs to the cache kmalloc-128 of size 128
[   18.087455] The buggy address is located 0 bytes inside of
[   18.087455]  freed 128-byte region [fff00000c62d4d00, fff00000c62d4d80)
[   18.088056] 
[   18.088105] The buggy address belongs to the physical page:
[   18.088172] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1062d4
[   18.088820] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.089234] page_type: f5(slab)
[   18.089321] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.089922] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.090467] page dumped because: kasan: bad access detected
[   18.090553] 
[   18.090597] Memory state around the buggy address:
[   18.090668]  fff00000c62d4c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.090774]  fff00000c62d4c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.090875] >fff00000c62d4d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.090967]                    ^
[   18.091031]  fff00000c62d4d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.091136]  fff00000c62d4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.091232] ==================================================================
[   18.066866] ==================================================================
[   18.067004] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8
[   18.067428] Read of size 1 at addr fff00000c62d4d00 by task kunit_try_catch/198
[   18.067938] 
[   18.068035] CPU: 1 UID: 0 PID: 198 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   18.068229] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.068284] Hardware name: linux,dummy-virt (DT)
[   18.068354] Call trace:
[   18.068405]  show_stack+0x20/0x38 (C)
[   18.068518]  dump_stack_lvl+0x8c/0xd0
[   18.068633]  print_report+0x118/0x608
[   18.068732]  kasan_report+0xdc/0x128
[   18.069180]  __kasan_check_byte+0x54/0x70
[   18.069547]  ksize+0x30/0x88
[   18.069650]  ksize_uaf+0x168/0x5f8
[   18.069752]  kunit_try_run_case+0x170/0x3f0
[   18.069848]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.069952]  kthread+0x328/0x630
[   18.070039]  ret_from_fork+0x10/0x20
[   18.070140] 
[   18.070185] Allocated by task 198:
[   18.070246]  kasan_save_stack+0x3c/0x68
[   18.070324]  kasan_save_track+0x20/0x40
[   18.070394]  kasan_save_alloc_info+0x40/0x58
[   18.070463]  __kasan_kmalloc+0xd4/0xd8
[   18.070587]  __kmalloc_cache_noprof+0x15c/0x3c0
[   18.070668]  ksize_uaf+0xb8/0x5f8
[   18.071154]  kunit_try_run_case+0x170/0x3f0
[   18.071265]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.071403]  kthread+0x328/0x630
[   18.071490]  ret_from_fork+0x10/0x20
[   18.071631] 
[   18.071696] Freed by task 198:
[   18.071781]  kasan_save_stack+0x3c/0x68
[   18.071896]  kasan_save_track+0x20/0x40
[   18.072001]  kasan_save_free_info+0x4c/0x78
[   18.072085]  __kasan_slab_free+0x6c/0x98
[   18.072152]  kfree+0x214/0x3c8
[   18.072238]  ksize_uaf+0x11c/0x5f8
[   18.072302]  kunit_try_run_case+0x170/0x3f0
[   18.072380]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.072520]  kthread+0x328/0x630
[   18.072630]  ret_from_fork+0x10/0x20
[   18.072697] 
[   18.072736] The buggy address belongs to the object at fff00000c62d4d00
[   18.072736]  which belongs to the cache kmalloc-128 of size 128
[   18.073109] The buggy address is located 0 bytes inside of
[   18.073109]  freed 128-byte region [fff00000c62d4d00, fff00000c62d4d80)
[   18.073258] 
[   18.073304] The buggy address belongs to the physical page:
[   18.073380] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1062d4
[   18.073517] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.073663] page_type: f5(slab)
[   18.073768] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.073874] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.073965] page dumped because: kasan: bad access detected
[   18.074042] 
[   18.074093] Memory state around the buggy address:
[   18.074163]  fff00000c62d4c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.074611]  fff00000c62d4c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.074766] >fff00000c62d4d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.074891]                    ^
[   18.074980]  fff00000c62d4d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.075115]  fff00000c62d4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.075201] ==================================================================

[   18.954687] ==================================================================
[   18.955082] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5fe/0x6c0
[   18.955549] Read of size 1 at addr ffff888103199c00 by task kunit_try_catch/216
[   18.956735] 
[   18.957220] CPU: 0 UID: 0 PID: 216 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   18.957288] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.957304] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.957333] Call Trace:
[   18.957351]  <TASK>
[   18.957372]  dump_stack_lvl+0x73/0xb0
[   18.957413]  print_report+0xd1/0x650
[   18.957947]  ? __virt_addr_valid+0x1db/0x2d0
[   18.958213]  ? ksize_uaf+0x5fe/0x6c0
[   18.958318]  ? kasan_complete_mode_report_info+0x64/0x200
[   18.958363]  ? ksize_uaf+0x5fe/0x6c0
[   18.958398]  kasan_report+0x141/0x180
[   18.958440]  ? ksize_uaf+0x5fe/0x6c0
[   18.958802]  __asan_report_load1_noabort+0x18/0x20
[   18.958839]  ksize_uaf+0x5fe/0x6c0
[   18.958873]  ? __pfx_ksize_uaf+0x10/0x10
[   18.958904]  ? __schedule+0x10cc/0x2b30
[   18.958937]  ? __pfx_read_tsc+0x10/0x10
[   18.958964]  ? ktime_get_ts64+0x86/0x230
[   18.959002]  kunit_try_run_case+0x1a5/0x480
[   18.959039]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.959071]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.959104]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.959138]  ? __kthread_parkme+0x82/0x180
[   18.959169]  ? preempt_count_sub+0x50/0x80
[   18.959204]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.959236]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.959268]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.959301]  kthread+0x337/0x6f0
[   18.959331]  ? trace_preempt_on+0x20/0xc0
[   18.959364]  ? __pfx_kthread+0x10/0x10
[   18.959395]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.959427]  ? calculate_sigpending+0x7b/0xa0
[   18.959519]  ? __pfx_kthread+0x10/0x10
[   18.959595]  ret_from_fork+0x41/0x80
[   18.959667]  ? __pfx_kthread+0x10/0x10
[   18.959738]  ret_from_fork_asm+0x1a/0x30
[   18.959829]  </TASK>
[   18.959867] 
[   18.981226] Allocated by task 216:
[   18.982551]  kasan_save_stack+0x45/0x70
[   18.982873]  kasan_save_track+0x18/0x40
[   18.983265]  kasan_save_alloc_info+0x3b/0x50
[   18.984086]  __kasan_kmalloc+0xb7/0xc0
[   18.984471]  __kmalloc_cache_noprof+0x189/0x420
[   18.984907]  ksize_uaf+0xaa/0x6c0
[   18.985324]  kunit_try_run_case+0x1a5/0x480
[   18.985791]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.986524]  kthread+0x337/0x6f0
[   18.987162]  ret_from_fork+0x41/0x80
[   18.987613]  ret_from_fork_asm+0x1a/0x30
[   18.988074] 
[   18.988294] Freed by task 216:
[   18.989129]  kasan_save_stack+0x45/0x70
[   18.989657]  kasan_save_track+0x18/0x40
[   18.989998]  kasan_save_free_info+0x3f/0x60
[   18.990429]  __kasan_slab_free+0x56/0x70
[   18.990918]  kfree+0x222/0x3f0
[   18.991276]  ksize_uaf+0x12c/0x6c0
[   18.991809]  kunit_try_run_case+0x1a5/0x480
[   18.992271]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.992848]  kthread+0x337/0x6f0
[   18.993246]  ret_from_fork+0x41/0x80
[   18.994002]  ret_from_fork_asm+0x1a/0x30
[   18.994372] 
[   18.994711] The buggy address belongs to the object at ffff888103199c00
[   18.994711]  which belongs to the cache kmalloc-128 of size 128
[   18.995611] The buggy address is located 0 bytes inside of
[   18.995611]  freed 128-byte region [ffff888103199c00, ffff888103199c80)
[   18.996353] 
[   18.996596] The buggy address belongs to the physical page:
[   18.997267] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103199
[   18.997934] flags: 0x200000000000000(node=0|zone=2)
[   18.998587] page_type: f5(slab)
[   18.999103] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   18.999823] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.000413] page dumped because: kasan: bad access detected
[   19.000930] 
[   19.001154] Memory state around the buggy address:
[   19.001553]  ffff888103199b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.002750]  ffff888103199b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.003522] >ffff888103199c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.003975]                    ^
[   19.004346]  ffff888103199c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.005093]  ffff888103199d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.005709] ==================================================================
[   18.903970] ==================================================================
[   18.904804] BUG: KASAN: slab-use-after-free in ksize_uaf+0x19d/0x6c0
[   18.905439] Read of size 1 at addr ffff888103199c00 by task kunit_try_catch/216
[   18.906310] 
[   18.906790] CPU: 0 UID: 0 PID: 216 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   18.906926] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.906985] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.907072] Call Trace:
[   18.907118]  <TASK>
[   18.907175]  dump_stack_lvl+0x73/0xb0
[   18.907281]  print_report+0xd1/0x650
[   18.907392]  ? __virt_addr_valid+0x1db/0x2d0
[   18.907472]  ? ksize_uaf+0x19d/0x6c0
[   18.907559]  ? kasan_complete_mode_report_info+0x64/0x200
[   18.907632]  ? ksize_uaf+0x19d/0x6c0
[   18.907664]  kasan_report+0x141/0x180
[   18.907732]  ? ksize_uaf+0x19d/0x6c0
[   18.907814]  ? ksize_uaf+0x19d/0x6c0
[   18.907906]  __kasan_check_byte+0x3d/0x50
[   18.908013]  ksize+0x20/0x60
[   18.908086]  ksize_uaf+0x19d/0x6c0
[   18.908161]  ? __pfx_ksize_uaf+0x10/0x10
[   18.908233]  ? __schedule+0x10cc/0x2b30
[   18.908363]  ? __pfx_read_tsc+0x10/0x10
[   18.908436]  ? ktime_get_ts64+0x86/0x230
[   18.908543]  kunit_try_run_case+0x1a5/0x480
[   18.908595]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.908626]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.908660]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.908692]  ? __kthread_parkme+0x82/0x180
[   18.908723]  ? preempt_count_sub+0x50/0x80
[   18.908757]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.908788]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.908818]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.908850]  kthread+0x337/0x6f0
[   18.908879]  ? trace_preempt_on+0x20/0xc0
[   18.908912]  ? __pfx_kthread+0x10/0x10
[   18.908943]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.908973]  ? calculate_sigpending+0x7b/0xa0
[   18.909002]  ? __pfx_kthread+0x10/0x10
[   18.909033]  ret_from_fork+0x41/0x80
[   18.909061]  ? __pfx_kthread+0x10/0x10
[   18.909091]  ret_from_fork_asm+0x1a/0x30
[   18.909134]  </TASK>
[   18.909147] 
[   18.925049] Allocated by task 216:
[   18.925388]  kasan_save_stack+0x45/0x70
[   18.925947]  kasan_save_track+0x18/0x40
[   18.926453]  kasan_save_alloc_info+0x3b/0x50
[   18.927208]  __kasan_kmalloc+0xb7/0xc0
[   18.927618]  __kmalloc_cache_noprof+0x189/0x420
[   18.928073]  ksize_uaf+0xaa/0x6c0
[   18.928418]  kunit_try_run_case+0x1a5/0x480
[   18.929626]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.930653]  kthread+0x337/0x6f0
[   18.931298]  ret_from_fork+0x41/0x80
[   18.931924]  ret_from_fork_asm+0x1a/0x30
[   18.932191] 
[   18.932283] Freed by task 216:
[   18.932410]  kasan_save_stack+0x45/0x70
[   18.933240]  kasan_save_track+0x18/0x40
[   18.933971]  kasan_save_free_info+0x3f/0x60
[   18.934955]  __kasan_slab_free+0x56/0x70
[   18.935814]  kfree+0x222/0x3f0
[   18.936444]  ksize_uaf+0x12c/0x6c0
[   18.937182]  kunit_try_run_case+0x1a5/0x480
[   18.938040]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.938625]  kthread+0x337/0x6f0
[   18.938878]  ret_from_fork+0x41/0x80
[   18.939407]  ret_from_fork_asm+0x1a/0x30
[   18.939948] 
[   18.940195] The buggy address belongs to the object at ffff888103199c00
[   18.940195]  which belongs to the cache kmalloc-128 of size 128
[   18.941719] The buggy address is located 0 bytes inside of
[   18.941719]  freed 128-byte region [ffff888103199c00, ffff888103199c80)
[   18.942912] 
[   18.943097] The buggy address belongs to the physical page:
[   18.943615] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103199
[   18.944189] flags: 0x200000000000000(node=0|zone=2)
[   18.945209] page_type: f5(slab)
[   18.945742] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   18.946878] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.947417] page dumped because: kasan: bad access detected
[   18.948346] 
[   18.948539] Memory state around the buggy address:
[   18.949117]  ffff888103199b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.949817]  ffff888103199b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.950582] >ffff888103199c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.951255]                    ^
[   18.951610]  ffff888103199c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.952427]  ffff888103199d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.953114] ==================================================================
[   19.008297] ==================================================================
[   19.009263] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5e4/0x6c0
[   19.009952] Read of size 1 at addr ffff888103199c78 by task kunit_try_catch/216
[   19.010519] 
[   19.010883] CPU: 0 UID: 0 PID: 216 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   19.011008] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.011045] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.011101] Call Trace:
[   19.011141]  <TASK>
[   19.011192]  dump_stack_lvl+0x73/0xb0
[   19.011267]  print_report+0xd1/0x650
[   19.011351]  ? __virt_addr_valid+0x1db/0x2d0
[   19.011428]  ? ksize_uaf+0x5e4/0x6c0
[   19.011521]  ? kasan_complete_mode_report_info+0x64/0x200
[   19.011599]  ? ksize_uaf+0x5e4/0x6c0
[   19.011674]  kasan_report+0x141/0x180
[   19.011753]  ? ksize_uaf+0x5e4/0x6c0
[   19.011850]  __asan_report_load1_noabort+0x18/0x20
[   19.011922]  ksize_uaf+0x5e4/0x6c0
[   19.011996]  ? __pfx_ksize_uaf+0x10/0x10
[   19.012074]  ? __schedule+0x10cc/0x2b30
[   19.012160]  ? __pfx_read_tsc+0x10/0x10
[   19.012234]  ? ktime_get_ts64+0x86/0x230
[   19.012316]  kunit_try_run_case+0x1a5/0x480
[   19.012415]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.012585]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.012625]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.012661]  ? __kthread_parkme+0x82/0x180
[   19.012692]  ? preempt_count_sub+0x50/0x80
[   19.012727]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.012761]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.012796]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.012829]  kthread+0x337/0x6f0
[   19.012858]  ? trace_preempt_on+0x20/0xc0
[   19.012891]  ? __pfx_kthread+0x10/0x10
[   19.012923]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.012957]  ? calculate_sigpending+0x7b/0xa0
[   19.012987]  ? __pfx_kthread+0x10/0x10
[   19.013019]  ret_from_fork+0x41/0x80
[   19.013049]  ? __pfx_kthread+0x10/0x10
[   19.013080]  ret_from_fork_asm+0x1a/0x30
[   19.013123]  </TASK>
[   19.013135] 
[   19.031243] Allocated by task 216:
[   19.031425]  kasan_save_stack+0x45/0x70
[   19.031869]  kasan_save_track+0x18/0x40
[   19.032279]  kasan_save_alloc_info+0x3b/0x50
[   19.033859]  __kasan_kmalloc+0xb7/0xc0
[   19.034387]  __kmalloc_cache_noprof+0x189/0x420
[   19.035131]  ksize_uaf+0xaa/0x6c0
[   19.035755]  kunit_try_run_case+0x1a5/0x480
[   19.036246]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.037065]  kthread+0x337/0x6f0
[   19.037381]  ret_from_fork+0x41/0x80
[   19.037675]  ret_from_fork_asm+0x1a/0x30
[   19.038096] 
[   19.038327] Freed by task 216:
[   19.038687]  kasan_save_stack+0x45/0x70
[   19.039087]  kasan_save_track+0x18/0x40
[   19.039484]  kasan_save_free_info+0x3f/0x60
[   19.040061]  __kasan_slab_free+0x56/0x70
[   19.040374]  kfree+0x222/0x3f0
[   19.040699]  ksize_uaf+0x12c/0x6c0
[   19.041005]  kunit_try_run_case+0x1a5/0x480
[   19.042000]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.042689]  kthread+0x337/0x6f0
[   19.043083]  ret_from_fork+0x41/0x80
[   19.043742]  ret_from_fork_asm+0x1a/0x30
[   19.044161] 
[   19.044949] The buggy address belongs to the object at ffff888103199c00
[   19.044949]  which belongs to the cache kmalloc-128 of size 128
[   19.046099] The buggy address is located 120 bytes inside of
[   19.046099]  freed 128-byte region [ffff888103199c00, ffff888103199c80)
[   19.047015] 
[   19.047327] The buggy address belongs to the physical page:
[   19.047875] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103199
[   19.048723] flags: 0x200000000000000(node=0|zone=2)
[   19.049268] page_type: f5(slab)
[   19.049861] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   19.050690] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.051340] page dumped because: kasan: bad access detected
[   19.052653] 
[   19.052917] Memory state around the buggy address:
[   19.053452]  ffff888103199b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.053965]  ffff888103199b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.054892] >ffff888103199c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.055549]                                                                 ^
[   19.056148]  ffff888103199c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.056827]  ffff888103199d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.057880] ==================================================================

[   20.213891] ==================================================================
[   20.214591] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8
[   20.215203] Read of size 1 at addr ffff00000c992700 by task kunit_try_catch/254
[   20.215870] 
[   20.216027] CPU: 3 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   20.216065] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.216075] Hardware name: Radxa ROCK Pi 4B (DT)
[   20.216088] Call trace:
[   20.216096]  show_stack+0x20/0x38 (C)
[   20.216121]  dump_stack_lvl+0x8c/0xd0
[   20.216144]  print_report+0x118/0x608
[   20.216166]  kasan_report+0xdc/0x128
[   20.216186]  __asan_report_load1_noabort+0x20/0x30
[   20.216210]  ksize_uaf+0x598/0x5f8
[   20.216233]  kunit_try_run_case+0x170/0x3f0
[   20.216259]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.216288]  kthread+0x328/0x630
[   20.216313]  ret_from_fork+0x10/0x20
[   20.216337] 
[   20.221807] Allocated by task 254:
[   20.222127]  kasan_save_stack+0x3c/0x68
[   20.222495]  kasan_save_track+0x20/0x40
[   20.222855]  kasan_save_alloc_info+0x40/0x58
[   20.223257]  __kasan_kmalloc+0xd4/0xd8
[   20.223610]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.224038]  ksize_uaf+0xb8/0x5f8
[   20.224357]  kunit_try_run_case+0x170/0x3f0
[   20.224752]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.225263]  kthread+0x328/0x630
[   20.225573]  ret_from_fork+0x10/0x20
[   20.225913] 
[   20.226061] Freed by task 254:
[   20.226347]  kasan_save_stack+0x3c/0x68
[   20.226708]  kasan_save_track+0x20/0x40
[   20.227069]  kasan_save_free_info+0x4c/0x78
[   20.227461]  __kasan_slab_free+0x6c/0x98
[   20.227829]  kfree+0x214/0x3c8
[   20.228124]  ksize_uaf+0x11c/0x5f8
[   20.228450]  kunit_try_run_case+0x170/0x3f0
[   20.228845]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.229356]  kthread+0x328/0x630
[   20.229666]  ret_from_fork+0x10/0x20
[   20.230005] 
[   20.230152] The buggy address belongs to the object at ffff00000c992700
[   20.230152]  which belongs to the cache kmalloc-128 of size 128
[   20.231272] The buggy address is located 0 bytes inside of
[   20.231272]  freed 128-byte region [ffff00000c992700, ffff00000c992780)
[   20.232356] 
[   20.232503] The buggy address belongs to the physical page:
[   20.233012] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xc992
[   20.233723] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   20.234323] page_type: f5(slab)
[   20.234626] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000
[   20.235331] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.236028] page dumped because: kasan: bad access detected
[   20.236534] 
[   20.236681] Memory state around the buggy address:
[   20.237121]  ffff00000c992600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.237775]  ffff00000c992680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.238430] >ffff00000c992700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.239082]                    ^
[   20.239384]  ffff00000c992780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.240039]  ffff00000c992800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.240690] ==================================================================
[   20.241882] ==================================================================
[   20.242561] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8
[   20.243160] Read of size 1 at addr ffff00000c992778 by task kunit_try_catch/254
[   20.243826] 
[   20.243981] CPU: 4 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   20.244018] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.244028] Hardware name: Radxa ROCK Pi 4B (DT)
[   20.244039] Call trace:
[   20.244048]  show_stack+0x20/0x38 (C)
[   20.244071]  dump_stack_lvl+0x8c/0xd0
[   20.244092]  print_report+0x118/0x608
[   20.244111]  kasan_report+0xdc/0x128
[   20.244130]  __asan_report_load1_noabort+0x20/0x30
[   20.244152]  ksize_uaf+0x544/0x5f8
[   20.244174]  kunit_try_run_case+0x170/0x3f0
[   20.244198]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.244224]  kthread+0x328/0x630
[   20.244247]  ret_from_fork+0x10/0x20
[   20.244268] 
[   20.249733] Allocated by task 254:
[   20.250050]  kasan_save_stack+0x3c/0x68
[   20.250411]  kasan_save_track+0x20/0x40
[   20.250770]  kasan_save_alloc_info+0x40/0x58
[   20.251168]  __kasan_kmalloc+0xd4/0xd8
[   20.251519]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.251945]  ksize_uaf+0xb8/0x5f8
[   20.252262]  kunit_try_run_case+0x170/0x3f0
[   20.252654]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.253163]  kthread+0x328/0x630
[   20.253471]  ret_from_fork+0x10/0x20
[   20.253809] 
[   20.253955] Freed by task 254:
[   20.254240]  kasan_save_stack+0x3c/0x68
[   20.254598]  kasan_save_track+0x20/0x40
[   20.254956]  kasan_save_free_info+0x4c/0x78
[   20.255347]  __kasan_slab_free+0x6c/0x98
[   20.255713]  kfree+0x214/0x3c8
[   20.256008]  ksize_uaf+0x11c/0x5f8
[   20.256332]  kunit_try_run_case+0x170/0x3f0
[   20.256723]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.257232]  kthread+0x328/0x630
[   20.257540]  ret_from_fork+0x10/0x20
[   20.257877] 
[   20.258024] The buggy address belongs to the object at ffff00000c992700
[   20.258024]  which belongs to the cache kmalloc-128 of size 128
[   20.259142] The buggy address is located 120 bytes inside of
[   20.259142]  freed 128-byte region [ffff00000c992700, ffff00000c992780)
[   20.260239] 
[   20.260384] The buggy address belongs to the physical page:
[   20.260888] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xc992
[   20.261599] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   20.262197] page_type: f5(slab)
[   20.262497] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000
[   20.263196] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.263891] page dumped because: kasan: bad access detected
[   20.264396] 
[   20.264540] Memory state around the buggy address:
[   20.264978]  ffff00000c992600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.265630]  ffff00000c992680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.266283] >ffff00000c992700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.266932]                                                                 ^
[   20.267576]  ffff00000c992780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.268228]  ffff00000c992800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.268877] ==================================================================
[   20.184728] ==================================================================
[   20.185839] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8
[   20.186466] Read of size 1 at addr ffff00000c992700 by task kunit_try_catch/254
[   20.187144] 
[   20.187309] CPU: 3 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   20.187358] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.187373] Hardware name: Radxa ROCK Pi 4B (DT)
[   20.187390] Call trace:
[   20.187402]  show_stack+0x20/0x38 (C)
[   20.187435]  dump_stack_lvl+0x8c/0xd0
[   20.187467]  print_report+0x118/0x608
[   20.187497]  kasan_report+0xdc/0x128
[   20.187525]  __kasan_check_byte+0x54/0x70
[   20.187554]  ksize+0x30/0x88
[   20.187580]  ksize_uaf+0x168/0x5f8
[   20.187613]  kunit_try_run_case+0x170/0x3f0
[   20.187648]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.187687]  kthread+0x328/0x630
[   20.187722]  ret_from_fork+0x10/0x20
[   20.187755] 
[   20.193462] Allocated by task 254:
[   20.193789]  kasan_save_stack+0x3c/0x68
[   20.194163]  kasan_save_track+0x20/0x40
[   20.194535]  kasan_save_alloc_info+0x40/0x58
[   20.194949]  __kasan_kmalloc+0xd4/0xd8
[   20.195312]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.195755]  ksize_uaf+0xb8/0x5f8
[   20.196084]  kunit_try_run_case+0x170/0x3f0
[   20.196492]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.197016]  kthread+0x328/0x630
[   20.197340]  ret_from_fork+0x10/0x20
[   20.197690] 
[   20.197843] Freed by task 254:
[   20.198138]  kasan_save_stack+0x3c/0x68
[   20.198510]  kasan_save_track+0x20/0x40
[   20.198880]  kasan_save_free_info+0x4c/0x78
[   20.199284]  __kasan_slab_free+0x6c/0x98
[   20.199665]  kfree+0x214/0x3c8
[   20.199972]  ksize_uaf+0x11c/0x5f8
[   20.200310]  kunit_try_run_case+0x170/0x3f0
[   20.200716]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.201242]  kthread+0x328/0x630
[   20.201564]  ret_from_fork+0x10/0x20
[   20.201914] 
[   20.202068] The buggy address belongs to the object at ffff00000c992700
[   20.202068]  which belongs to the cache kmalloc-128 of size 128
[   20.203203] The buggy address is located 0 bytes inside of
[   20.203203]  freed 128-byte region [ffff00000c992700, ffff00000c992780)
[   20.204300] 
[   20.204454] The buggy address belongs to the physical page:
[   20.204971] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xc992
[   20.205696] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   20.206309] page_type: f5(slab)
[   20.206624] raw: 03fffe0000000000 ffff000000402a00 dead000000000122 0000000000000000
[   20.207341] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.208050] page dumped because: kasan: bad access detected
[   20.208566] 
[   20.208718] Memory state around the buggy address:
[   20.209167]  ffff00000c992600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.209834]  ffff00000c992680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.210501] >ffff00000c992700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.211164]                    ^
[   20.211475]  ffff00000c992780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.212140]  ffff00000c992800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.212802] ==================================================================