Date
July 6, 2025, 11:09 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 | |
x86 |
[ 16.996695] ================================================================== [ 16.996892] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x300/0x338 [ 16.996953] Read of size 1 at addr fff00000c5fbe828 by task kunit_try_catch/185 [ 16.997045] [ 16.997103] CPU: 0 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 16.997187] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.997213] Hardware name: linux,dummy-virt (DT) [ 16.997338] Call trace: [ 16.997409] show_stack+0x20/0x38 (C) [ 16.997461] dump_stack_lvl+0x8c/0xd0 [ 16.997505] print_report+0x118/0x608 [ 16.997549] kasan_report+0xdc/0x128 [ 16.997592] __asan_report_load1_noabort+0x20/0x30 [ 16.997758] kmalloc_uaf+0x300/0x338 [ 16.997811] kunit_try_run_case+0x170/0x3f0 [ 16.997882] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.997934] kthread+0x328/0x630 [ 16.997973] ret_from_fork+0x10/0x20 [ 16.998214] [ 16.998278] Allocated by task 185: [ 16.998338] kasan_save_stack+0x3c/0x68 [ 16.998420] kasan_save_track+0x20/0x40 [ 16.998476] kasan_save_alloc_info+0x40/0x58 [ 16.998538] __kasan_kmalloc+0xd4/0xd8 [ 16.998587] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.998674] kmalloc_uaf+0xb8/0x338 [ 16.998707] kunit_try_run_case+0x170/0x3f0 [ 16.998746] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.998814] kthread+0x328/0x630 [ 16.998846] ret_from_fork+0x10/0x20 [ 16.999056] [ 16.999133] Freed by task 185: [ 16.999221] kasan_save_stack+0x3c/0x68 [ 16.999315] kasan_save_track+0x20/0x40 [ 16.999441] kasan_save_free_info+0x4c/0x78 [ 16.999544] __kasan_slab_free+0x6c/0x98 [ 16.999583] kfree+0x214/0x3c8 [ 16.999614] kmalloc_uaf+0x11c/0x338 [ 16.999712] kunit_try_run_case+0x170/0x3f0 [ 17.000039] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.000161] kthread+0x328/0x630 [ 17.000239] ret_from_fork+0x10/0x20 [ 17.000375] [ 17.000433] The buggy address belongs to the object at fff00000c5fbe820 [ 17.000433] which belongs to the cache kmalloc-16 of size 16 [ 17.000501] The buggy address is located 8 bytes inside of [ 17.000501] freed 16-byte region [fff00000c5fbe820, fff00000c5fbe830) [ 17.000685] [ 17.000717] The buggy address belongs to the physical page: [ 17.000873] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105fbe [ 17.000995] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.001076] page_type: f5(slab) [ 17.001134] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 17.001317] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 17.001515] page dumped because: kasan: bad access detected [ 17.001609] [ 17.001683] Memory state around the buggy address: [ 17.001756] fff00000c5fbe700: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 17.001799] fff00000c5fbe780: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 17.002088] >fff00000c5fbe800: fa fb fc fc fa fb fc fc fc fc fc fc fc fc fc fc [ 17.002158] ^ [ 17.002192] fff00000c5fbe880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.002262] fff00000c5fbe900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.002538] ==================================================================
[ 16.972761] ================================================================== [ 16.972833] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x300/0x338 [ 16.972887] Read of size 1 at addr fff00000c1376c28 by task kunit_try_catch/185 [ 16.972951] [ 16.972983] CPU: 1 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 16.973070] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.973095] Hardware name: linux,dummy-virt (DT) [ 16.973422] Call trace: [ 16.973702] show_stack+0x20/0x38 (C) [ 16.973924] dump_stack_lvl+0x8c/0xd0 [ 16.973991] print_report+0x118/0x608 [ 16.974201] kasan_report+0xdc/0x128 [ 16.974258] __asan_report_load1_noabort+0x20/0x30 [ 16.974311] kmalloc_uaf+0x300/0x338 [ 16.974352] kunit_try_run_case+0x170/0x3f0 [ 16.974775] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.974898] kthread+0x328/0x630 [ 16.975091] ret_from_fork+0x10/0x20 [ 16.975277] [ 16.975346] Allocated by task 185: [ 16.975379] kasan_save_stack+0x3c/0x68 [ 16.975719] kasan_save_track+0x20/0x40 [ 16.975828] kasan_save_alloc_info+0x40/0x58 [ 16.975895] __kasan_kmalloc+0xd4/0xd8 [ 16.976054] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.976231] kmalloc_uaf+0xb8/0x338 [ 16.976340] kunit_try_run_case+0x170/0x3f0 [ 16.976416] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.976822] kthread+0x328/0x630 [ 16.976997] ret_from_fork+0x10/0x20 [ 16.977091] [ 16.977215] Freed by task 185: [ 16.977294] kasan_save_stack+0x3c/0x68 [ 16.977438] kasan_save_track+0x20/0x40 [ 16.977477] kasan_save_free_info+0x4c/0x78 [ 16.977548] __kasan_slab_free+0x6c/0x98 [ 16.977826] kfree+0x214/0x3c8 [ 16.977903] kmalloc_uaf+0x11c/0x338 [ 16.978039] kunit_try_run_case+0x170/0x3f0 [ 16.978153] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.978268] kthread+0x328/0x630 [ 16.978337] ret_from_fork+0x10/0x20 [ 16.978440] [ 16.978595] The buggy address belongs to the object at fff00000c1376c20 [ 16.978595] which belongs to the cache kmalloc-16 of size 16 [ 16.978762] The buggy address is located 8 bytes inside of [ 16.978762] freed 16-byte region [fff00000c1376c20, fff00000c1376c30) [ 16.978903] [ 16.978986] The buggy address belongs to the physical page: [ 16.979049] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101376 [ 16.979191] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.979373] page_type: f5(slab) [ 16.979416] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 16.979507] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 16.979848] page dumped because: kasan: bad access detected [ 16.979926] [ 16.980015] Memory state around the buggy address: [ 16.980206] fff00000c1376b00: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 16.980344] fff00000c1376b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 16.980402] >fff00000c1376c00: fa fb fc fc fa fb fc fc fc fc fc fc fc fc fc fc [ 16.980601] ^ [ 16.980861] fff00000c1376c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.980998] fff00000c1376d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.981092] ==================================================================
[ 13.620338] ================================================================== [ 13.621169] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x320/0x380 [ 13.621551] Read of size 1 at addr ffff888101c6db88 by task kunit_try_catch/202 [ 13.621846] [ 13.621975] CPU: 0 UID: 0 PID: 202 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 13.622033] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.622047] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.622072] Call Trace: [ 13.622090] <TASK> [ 13.622112] dump_stack_lvl+0x73/0xb0 [ 13.622154] print_report+0xd1/0x650 [ 13.622185] ? __virt_addr_valid+0x1db/0x2d0 [ 13.622218] ? kmalloc_uaf+0x320/0x380 [ 13.622251] ? kasan_complete_mode_report_info+0x64/0x200 [ 13.622286] ? kmalloc_uaf+0x320/0x380 [ 13.622316] kasan_report+0x141/0x180 [ 13.622377] ? kmalloc_uaf+0x320/0x380 [ 13.622433] __asan_report_load1_noabort+0x18/0x20 [ 13.622476] kmalloc_uaf+0x320/0x380 [ 13.622522] ? __pfx_kmalloc_uaf+0x10/0x10 [ 13.622569] ? __schedule+0x10cc/0x2b60 [ 13.622602] ? __pfx_read_tsc+0x10/0x10 [ 13.622645] ? ktime_get_ts64+0x86/0x230 [ 13.622686] kunit_try_run_case+0x1a5/0x480 [ 13.622724] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.622761] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.622804] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.622845] ? __kthread_parkme+0x82/0x180 [ 13.622882] ? preempt_count_sub+0x50/0x80 [ 13.622924] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.622967] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.623008] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.623043] kthread+0x337/0x6f0 [ 13.623074] ? trace_preempt_on+0x20/0xc0 [ 13.623113] ? __pfx_kthread+0x10/0x10 [ 13.623165] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.623206] ? calculate_sigpending+0x7b/0xa0 [ 13.623244] ? __pfx_kthread+0x10/0x10 [ 13.623277] ret_from_fork+0x116/0x1d0 [ 13.623309] ? __pfx_kthread+0x10/0x10 [ 13.623342] ret_from_fork_asm+0x1a/0x30 [ 13.623392] </TASK> [ 13.623414] [ 13.632884] Allocated by task 202: [ 13.633110] kasan_save_stack+0x45/0x70 [ 13.633379] kasan_save_track+0x18/0x40 [ 13.633543] kasan_save_alloc_info+0x3b/0x50 [ 13.633875] __kasan_kmalloc+0xb7/0xc0 [ 13.634185] __kmalloc_cache_noprof+0x189/0x420 [ 13.634473] kmalloc_uaf+0xaa/0x380 [ 13.634699] kunit_try_run_case+0x1a5/0x480 [ 13.634991] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.635562] kthread+0x337/0x6f0 [ 13.635920] ret_from_fork+0x116/0x1d0 [ 13.636261] ret_from_fork_asm+0x1a/0x30 [ 13.636511] [ 13.636680] Freed by task 202: [ 13.637310] kasan_save_stack+0x45/0x70 [ 13.637492] kasan_save_track+0x18/0x40 [ 13.637651] kasan_save_free_info+0x3f/0x60 [ 13.637968] __kasan_slab_free+0x56/0x70 [ 13.638248] kfree+0x222/0x3f0 [ 13.638503] kmalloc_uaf+0x12c/0x380 [ 13.639156] kunit_try_run_case+0x1a5/0x480 [ 13.639519] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.639796] kthread+0x337/0x6f0 [ 13.640043] ret_from_fork+0x116/0x1d0 [ 13.640294] ret_from_fork_asm+0x1a/0x30 [ 13.640485] [ 13.640644] The buggy address belongs to the object at ffff888101c6db80 [ 13.640644] which belongs to the cache kmalloc-16 of size 16 [ 13.641309] The buggy address is located 8 bytes inside of [ 13.641309] freed 16-byte region [ffff888101c6db80, ffff888101c6db90) [ 13.641830] [ 13.641968] The buggy address belongs to the physical page: [ 13.642362] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101c6d [ 13.643092] flags: 0x200000000000000(node=0|zone=2) [ 13.643723] page_type: f5(slab) [ 13.644033] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.644493] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.644873] page dumped because: kasan: bad access detected [ 13.645161] [ 13.645331] Memory state around the buggy address: [ 13.645655] ffff888101c6da80: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.646069] ffff888101c6db00: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.646601] >ffff888101c6db80: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.646970] ^ [ 13.647246] ffff888101c6dc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.647639] ffff888101c6dc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.647913] ==================================================================
[ 13.776584] ================================================================== [ 13.777339] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x320/0x380 [ 13.777818] Read of size 1 at addr ffff888102873108 by task kunit_try_catch/201 [ 13.778151] [ 13.778278] CPU: 1 UID: 0 PID: 201 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 13.778323] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.778335] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.778356] Call Trace: [ 13.778369] <TASK> [ 13.778385] dump_stack_lvl+0x73/0xb0 [ 13.778416] print_report+0xd1/0x650 [ 13.778438] ? __virt_addr_valid+0x1db/0x2d0 [ 13.778461] ? kmalloc_uaf+0x320/0x380 [ 13.778480] ? kasan_complete_mode_report_info+0x64/0x200 [ 13.778506] ? kmalloc_uaf+0x320/0x380 [ 13.778526] kasan_report+0x141/0x180 [ 13.778547] ? kmalloc_uaf+0x320/0x380 [ 13.778573] __asan_report_load1_noabort+0x18/0x20 [ 13.778596] kmalloc_uaf+0x320/0x380 [ 13.778615] ? __pfx_kmalloc_uaf+0x10/0x10 [ 13.778636] ? __schedule+0x10cc/0x2b60 [ 13.778658] ? __pfx_read_tsc+0x10/0x10 [ 13.778678] ? ktime_get_ts64+0x86/0x230 [ 13.778703] kunit_try_run_case+0x1a5/0x480 [ 13.779232] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.779258] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.779283] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.779305] ? __kthread_parkme+0x82/0x180 [ 13.779326] ? preempt_count_sub+0x50/0x80 [ 13.779350] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.779374] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.779396] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.779418] kthread+0x337/0x6f0 [ 13.779438] ? trace_preempt_on+0x20/0xc0 [ 13.779462] ? __pfx_kthread+0x10/0x10 [ 13.779482] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.779503] ? calculate_sigpending+0x7b/0xa0 [ 13.779528] ? __pfx_kthread+0x10/0x10 [ 13.779549] ret_from_fork+0x116/0x1d0 [ 13.779568] ? __pfx_kthread+0x10/0x10 [ 13.779588] ret_from_fork_asm+0x1a/0x30 [ 13.779620] </TASK> [ 13.779631] [ 13.790672] Allocated by task 201: [ 13.791315] kasan_save_stack+0x45/0x70 [ 13.791485] kasan_save_track+0x18/0x40 [ 13.791634] kasan_save_alloc_info+0x3b/0x50 [ 13.792384] __kasan_kmalloc+0xb7/0xc0 [ 13.793043] __kmalloc_cache_noprof+0x189/0x420 [ 13.793659] kmalloc_uaf+0xaa/0x380 [ 13.794223] kunit_try_run_case+0x1a5/0x480 [ 13.794855] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.795499] kthread+0x337/0x6f0 [ 13.795644] ret_from_fork+0x116/0x1d0 [ 13.796174] ret_from_fork_asm+0x1a/0x30 [ 13.796835] [ 13.797066] Freed by task 201: [ 13.797354] kasan_save_stack+0x45/0x70 [ 13.797581] kasan_save_track+0x18/0x40 [ 13.797788] kasan_save_free_info+0x3f/0x60 [ 13.798001] __kasan_slab_free+0x56/0x70 [ 13.798218] kfree+0x222/0x3f0 [ 13.798384] kmalloc_uaf+0x12c/0x380 [ 13.798566] kunit_try_run_case+0x1a5/0x480 [ 13.798776] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.799029] kthread+0x337/0x6f0 [ 13.799975] ret_from_fork+0x116/0x1d0 [ 13.800146] ret_from_fork_asm+0x1a/0x30 [ 13.800605] [ 13.800954] The buggy address belongs to the object at ffff888102873100 [ 13.800954] which belongs to the cache kmalloc-16 of size 16 [ 13.801472] The buggy address is located 8 bytes inside of [ 13.801472] freed 16-byte region [ffff888102873100, ffff888102873110) [ 13.802318] [ 13.802662] The buggy address belongs to the physical page: [ 13.803156] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102873 [ 13.803604] flags: 0x200000000000000(node=0|zone=2) [ 13.804035] page_type: f5(slab) [ 13.804217] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.804572] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.805288] page dumped because: kasan: bad access detected [ 13.805676] [ 13.806002] Memory state around the buggy address: [ 13.806365] ffff888102873000: 00 01 fc fc 00 04 fc fc 00 04 fc fc fa fb fc fc [ 13.806929] ffff888102873080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.807424] >ffff888102873100: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.808026] ^ [ 13.808182] ffff888102873180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.808875] ffff888102873200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.809199] ==================================================================
[ 27.285938] ================================================================== [ 27.297973] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x320/0x380 [ 27.304506] Read of size 1 at addr ffff888106713188 by task kunit_try_catch/225 [ 27.311812] [ 27.313314] CPU: 3 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 27.313323] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 27.313326] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 27.313329] Call Trace: [ 27.313331] <TASK> [ 27.313350] dump_stack_lvl+0x73/0xb0 [ 27.313355] print_report+0xd1/0x650 [ 27.313359] ? __virt_addr_valid+0x1db/0x2d0 [ 27.313363] ? kmalloc_uaf+0x320/0x380 [ 27.313379] ? kasan_complete_mode_report_info+0x64/0x200 [ 27.313384] ? kmalloc_uaf+0x320/0x380 [ 27.313388] kasan_report+0x141/0x180 [ 27.313392] ? kmalloc_uaf+0x320/0x380 [ 27.313396] __asan_report_load1_noabort+0x18/0x20 [ 27.313401] kmalloc_uaf+0x320/0x380 [ 27.313404] ? __pfx_kmalloc_uaf+0x10/0x10 [ 27.313408] ? __schedule+0x10cc/0x2b60 [ 27.313412] ? ktime_get_ts64+0x83/0x230 [ 27.313416] kunit_try_run_case+0x1a2/0x480 [ 27.313421] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.313425] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.313429] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.313433] ? __kthread_parkme+0x82/0x180 [ 27.313437] ? preempt_count_sub+0x50/0x80 [ 27.313441] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.313445] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 27.313449] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.313453] kthread+0x334/0x6f0 [ 27.313457] ? trace_preempt_on+0x20/0xc0 [ 27.313461] ? __pfx_kthread+0x10/0x10 [ 27.313464] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.313468] ? calculate_sigpending+0x7b/0xa0 [ 27.313473] ? __pfx_kthread+0x10/0x10 [ 27.313476] ret_from_fork+0x113/0x1d0 [ 27.313480] ? __pfx_kthread+0x10/0x10 [ 27.313483] ret_from_fork_asm+0x1a/0x30 [ 27.313489] </TASK> [ 27.313491] [ 27.475724] Allocated by task 225: [ 27.479129] kasan_save_stack+0x45/0x70 [ 27.482969] kasan_save_track+0x18/0x40 [ 27.486808] kasan_save_alloc_info+0x3b/0x50 [ 27.491080] __kasan_kmalloc+0xb7/0xc0 [ 27.494833] __kmalloc_cache_noprof+0x189/0x420 [ 27.499379] kmalloc_uaf+0xaa/0x380 [ 27.502879] kunit_try_run_case+0x1a2/0x480 [ 27.507072] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 27.512471] kthread+0x334/0x6f0 [ 27.515703] ret_from_fork+0x113/0x1d0 [ 27.519455] ret_from_fork_asm+0x1a/0x30 [ 27.523402] [ 27.524899] Freed by task 225: [ 27.527959] kasan_save_stack+0x45/0x70 [ 27.531798] kasan_save_track+0x18/0x40 [ 27.535637] kasan_save_free_info+0x3f/0x60 [ 27.539824] __kasan_slab_free+0x56/0x70 [ 27.543748] kfree+0x222/0x3f0 [ 27.546807] kmalloc_uaf+0x12c/0x380 [ 27.550404] kunit_try_run_case+0x1a2/0x480 [ 27.554592] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 27.559998] kthread+0x334/0x6f0 [ 27.563231] ret_from_fork+0x113/0x1d0 [ 27.566984] ret_from_fork_asm+0x1a/0x30 [ 27.570911] [ 27.572419] The buggy address belongs to the object at ffff888106713180 [ 27.572419] which belongs to the cache kmalloc-16 of size 16 [ 27.584761] The buggy address is located 8 bytes inside of [ 27.584761] freed 16-byte region [ffff888106713180, ffff888106713190) [ 27.596762] [ 27.598262] The buggy address belongs to the physical page: [ 27.603836] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106713 [ 27.611842] flags: 0x200000000000000(node=0|zone=2) [ 27.616723] page_type: f5(slab) [ 27.619868] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000 [ 27.627607] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 27.635361] page dumped because: kasan: bad access detected [ 27.640962] [ 27.642461] Memory state around the buggy address: [ 27.647256] ffff888106713080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.654475] ffff888106713100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.661695] >ffff888106713180: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.668912] ^ [ 27.672420] ffff888106713200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.679643] ffff888106713280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.686862] ==================================================================