Hay
Date
July 6, 2025, 11:09 p.m.

Environment
qemu-arm64
qemu-x86_64
x86

[   17.021445] ==================================================================
[   17.021505] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x3f4/0x468
[   17.021587] Read of size 1 at addr fff00000c69bd428 by task kunit_try_catch/189
[   17.021783] 
[   17.021859] CPU: 0 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   17.021945] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.021972] Hardware name: linux,dummy-virt (DT)
[   17.022014] Call trace:
[   17.022036]  show_stack+0x20/0x38 (C)
[   17.022088]  dump_stack_lvl+0x8c/0xd0
[   17.022142]  print_report+0x118/0x608
[   17.022188]  kasan_report+0xdc/0x128
[   17.022232]  __asan_report_load1_noabort+0x20/0x30
[   17.022282]  kmalloc_uaf2+0x3f4/0x468
[   17.022323]  kunit_try_run_case+0x170/0x3f0
[   17.022370]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.022426]  kthread+0x328/0x630
[   17.022466]  ret_from_fork+0x10/0x20
[   17.022513] 
[   17.022540] Allocated by task 189:
[   17.022567]  kasan_save_stack+0x3c/0x68
[   17.022639]  kasan_save_track+0x20/0x40
[   17.022681]  kasan_save_alloc_info+0x40/0x58
[   17.022839]  __kasan_kmalloc+0xd4/0xd8
[   17.022890]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.022929]  kmalloc_uaf2+0xc4/0x468
[   17.022961]  kunit_try_run_case+0x170/0x3f0
[   17.023013]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.023056]  kthread+0x328/0x630
[   17.023088]  ret_from_fork+0x10/0x20
[   17.023121] 
[   17.023280] Freed by task 189:
[   17.023353]  kasan_save_stack+0x3c/0x68
[   17.023424]  kasan_save_track+0x20/0x40
[   17.023524]  kasan_save_free_info+0x4c/0x78
[   17.023634]  __kasan_slab_free+0x6c/0x98
[   17.023720]  kfree+0x214/0x3c8
[   17.023789]  kmalloc_uaf2+0x134/0x468
[   17.023841]  kunit_try_run_case+0x170/0x3f0
[   17.023879]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.023922]  kthread+0x328/0x630
[   17.023952]  ret_from_fork+0x10/0x20
[   17.024124] 
[   17.024174] The buggy address belongs to the object at fff00000c69bd400
[   17.024174]  which belongs to the cache kmalloc-64 of size 64
[   17.024327] The buggy address is located 40 bytes inside of
[   17.024327]  freed 64-byte region [fff00000c69bd400, fff00000c69bd440)
[   17.024401] 
[   17.024421] The buggy address belongs to the physical page:
[   17.024451] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069bd
[   17.024649] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.024739] page_type: f5(slab)
[   17.024814] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   17.024923] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.025051] page dumped because: kasan: bad access detected
[   17.025082] 
[   17.025099] Memory state around the buggy address:
[   17.025164]  fff00000c69bd300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.025481]  fff00000c69bd380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.025597] >fff00000c69bd400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.025681]                                   ^
[   17.025807]  fff00000c69bd480: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc
[   17.025851]  fff00000c69bd500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.026030] ==================================================================

[   17.008010] ==================================================================
[   17.008068] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x3f4/0x468
[   17.008120] Read of size 1 at addr fff00000c7772228 by task kunit_try_catch/189
[   17.008189] 
[   17.008221] CPU: 1 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   17.008303] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.008338] Hardware name: linux,dummy-virt (DT)
[   17.008369] Call trace:
[   17.008390]  show_stack+0x20/0x38 (C)
[   17.008443]  dump_stack_lvl+0x8c/0xd0
[   17.008499]  print_report+0x118/0x608
[   17.008546]  kasan_report+0xdc/0x128
[   17.008590]  __asan_report_load1_noabort+0x20/0x30
[   17.008642]  kmalloc_uaf2+0x3f4/0x468
[   17.008694]  kunit_try_run_case+0x170/0x3f0
[   17.008743]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.008796]  kthread+0x328/0x630
[   17.008836]  ret_from_fork+0x10/0x20
[   17.008883] 
[   17.008900] Allocated by task 189:
[   17.009091]  kasan_save_stack+0x3c/0x68
[   17.009174]  kasan_save_track+0x20/0x40
[   17.009216]  kasan_save_alloc_info+0x40/0x58
[   17.009523]  __kasan_kmalloc+0xd4/0xd8
[   17.009583]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.010019]  kmalloc_uaf2+0xc4/0x468
[   17.010380]  kunit_try_run_case+0x170/0x3f0
[   17.010446]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.010531]  kthread+0x328/0x630
[   17.010635]  ret_from_fork+0x10/0x20
[   17.010701] 
[   17.010720] Freed by task 189:
[   17.010756]  kasan_save_stack+0x3c/0x68
[   17.010795]  kasan_save_track+0x20/0x40
[   17.010832]  kasan_save_free_info+0x4c/0x78
[   17.011161]  __kasan_slab_free+0x6c/0x98
[   17.011303]  kfree+0x214/0x3c8
[   17.011341]  kmalloc_uaf2+0x134/0x468
[   17.011425]  kunit_try_run_case+0x170/0x3f0
[   17.011742]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.011826]  kthread+0x328/0x630
[   17.011988]  ret_from_fork+0x10/0x20
[   17.012076] 
[   17.012183] The buggy address belongs to the object at fff00000c7772200
[   17.012183]  which belongs to the cache kmalloc-64 of size 64
[   17.012320] The buggy address is located 40 bytes inside of
[   17.012320]  freed 64-byte region [fff00000c7772200, fff00000c7772240)
[   17.012791] 
[   17.012862] The buggy address belongs to the physical page:
[   17.013117] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772
[   17.013270] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.013367] page_type: f5(slab)
[   17.013407] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   17.013735] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.013880] page dumped because: kasan: bad access detected
[   17.013979] 
[   17.014041] Memory state around the buggy address:
[   17.014130]  fff00000c7772100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.014284]  fff00000c7772180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.014391] >fff00000c7772200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.014438]                                   ^
[   17.014471]  fff00000c7772280: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc
[   17.014513]  fff00000c7772300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.014553] ==================================================================

[   13.674376] ==================================================================
[   13.675126] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x4a8/0x520
[   13.675601] Read of size 1 at addr ffff888102aad228 by task kunit_try_catch/206
[   13.675891] 
[   13.676073] CPU: 0 UID: 0 PID: 206 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   13.676149] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.676169] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.676204] Call Trace:
[   13.676231]  <TASK>
[   13.676260]  dump_stack_lvl+0x73/0xb0
[   13.676313]  print_report+0xd1/0x650
[   13.676351]  ? __virt_addr_valid+0x1db/0x2d0
[   13.676391]  ? kmalloc_uaf2+0x4a8/0x520
[   13.676426]  ? kasan_complete_mode_report_info+0x64/0x200
[   13.676471]  ? kmalloc_uaf2+0x4a8/0x520
[   13.676504]  kasan_report+0x141/0x180
[   13.676544]  ? kmalloc_uaf2+0x4a8/0x520
[   13.676586]  __asan_report_load1_noabort+0x18/0x20
[   13.676664]  kmalloc_uaf2+0x4a8/0x520
[   13.676701]  ? __pfx_kmalloc_uaf2+0x10/0x10
[   13.676734]  ? finish_task_switch.isra.0+0x153/0x700
[   13.676771]  ? __switch_to+0x47/0xf50
[   13.676820]  ? __schedule+0x10cc/0x2b60
[   13.676858]  ? __pfx_read_tsc+0x10/0x10
[   13.676890]  ? ktime_get_ts64+0x86/0x230
[   13.676927]  kunit_try_run_case+0x1a5/0x480
[   13.676966]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.676997]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.677028]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.677106]  ? __kthread_parkme+0x82/0x180
[   13.677148]  ? preempt_count_sub+0x50/0x80
[   13.677188]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.677233]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.677276]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.677309]  kthread+0x337/0x6f0
[   13.677330]  ? trace_preempt_on+0x20/0xc0
[   13.677352]  ? __pfx_kthread+0x10/0x10
[   13.677370]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.677389]  ? calculate_sigpending+0x7b/0xa0
[   13.677410]  ? __pfx_kthread+0x10/0x10
[   13.677429]  ret_from_fork+0x116/0x1d0
[   13.677445]  ? __pfx_kthread+0x10/0x10
[   13.677463]  ret_from_fork_asm+0x1a/0x30
[   13.677492]  </TASK>
[   13.677507] 
[   13.689707] Allocated by task 206:
[   13.689945]  kasan_save_stack+0x45/0x70
[   13.690354]  kasan_save_track+0x18/0x40
[   13.690830]  kasan_save_alloc_info+0x3b/0x50
[   13.690983]  __kasan_kmalloc+0xb7/0xc0
[   13.691358]  __kmalloc_cache_noprof+0x189/0x420
[   13.692095]  kmalloc_uaf2+0xc6/0x520
[   13.692314]  kunit_try_run_case+0x1a5/0x480
[   13.692463]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.693370]  kthread+0x337/0x6f0
[   13.693781]  ret_from_fork+0x116/0x1d0
[   13.693946]  ret_from_fork_asm+0x1a/0x30
[   13.694424] 
[   13.694541] Freed by task 206:
[   13.694682]  kasan_save_stack+0x45/0x70
[   13.695251]  kasan_save_track+0x18/0x40
[   13.695803]  kasan_save_free_info+0x3f/0x60
[   13.696016]  __kasan_slab_free+0x56/0x70
[   13.696642]  kfree+0x222/0x3f0
[   13.696865]  kmalloc_uaf2+0x14c/0x520
[   13.696997]  kunit_try_run_case+0x1a5/0x480
[   13.697250]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.697614]  kthread+0x337/0x6f0
[   13.697890]  ret_from_fork+0x116/0x1d0
[   13.698239]  ret_from_fork_asm+0x1a/0x30
[   13.698582] 
[   13.698961] The buggy address belongs to the object at ffff888102aad200
[   13.698961]  which belongs to the cache kmalloc-64 of size 64
[   13.699855] The buggy address is located 40 bytes inside of
[   13.699855]  freed 64-byte region [ffff888102aad200, ffff888102aad240)
[   13.700476] 
[   13.700803] The buggy address belongs to the physical page:
[   13.701124] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102aad
[   13.701707] flags: 0x200000000000000(node=0|zone=2)
[   13.701941] page_type: f5(slab)
[   13.702086] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.702778] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.703320] page dumped because: kasan: bad access detected
[   13.703772] 
[   13.703886] Memory state around the buggy address:
[   13.704214]  ffff888102aad100: 00 00 00 00 02 fc fc fc fc fc fc fc fc fc fc fc
[   13.704600]  ffff888102aad180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.704988] >ffff888102aad200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.705261]                                   ^
[   13.705571]  ffff888102aad280: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc
[   13.705931]  ffff888102aad300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.706165] ==================================================================

[   13.852167] ==================================================================
[   13.853403] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x4a8/0x520
[   13.854305] Read of size 1 at addr ffff888102c4c328 by task kunit_try_catch/205
[   13.854544] 
[   13.854639] CPU: 0 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   13.854684] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.854696] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.854745] Call Trace:
[   13.854757]  <TASK>
[   13.854772]  dump_stack_lvl+0x73/0xb0
[   13.854801]  print_report+0xd1/0x650
[   13.854822]  ? __virt_addr_valid+0x1db/0x2d0
[   13.854843]  ? kmalloc_uaf2+0x4a8/0x520
[   13.854862]  ? kasan_complete_mode_report_info+0x64/0x200
[   13.854888]  ? kmalloc_uaf2+0x4a8/0x520
[   13.854907]  kasan_report+0x141/0x180
[   13.854928]  ? kmalloc_uaf2+0x4a8/0x520
[   13.854953]  __asan_report_load1_noabort+0x18/0x20
[   13.854976]  kmalloc_uaf2+0x4a8/0x520
[   13.854996]  ? __pfx_kmalloc_uaf2+0x10/0x10
[   13.855014]  ? finish_task_switch.isra.0+0x153/0x700
[   13.855036]  ? __switch_to+0x47/0xf50
[   13.855073]  ? __schedule+0x10cc/0x2b60
[   13.855095]  ? __pfx_read_tsc+0x10/0x10
[   13.855115]  ? ktime_get_ts64+0x86/0x230
[   13.855138]  kunit_try_run_case+0x1a5/0x480
[   13.855161]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.855182]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.855204]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.855226]  ? __kthread_parkme+0x82/0x180
[   13.855245]  ? preempt_count_sub+0x50/0x80
[   13.855267]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.855290]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.855311]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.855333]  kthread+0x337/0x6f0
[   13.855352]  ? trace_preempt_on+0x20/0xc0
[   13.855373]  ? __pfx_kthread+0x10/0x10
[   13.855394]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.855414]  ? calculate_sigpending+0x7b/0xa0
[   13.855437]  ? __pfx_kthread+0x10/0x10
[   13.855458]  ret_from_fork+0x116/0x1d0
[   13.855475]  ? __pfx_kthread+0x10/0x10
[   13.855495]  ret_from_fork_asm+0x1a/0x30
[   13.855525]  </TASK>
[   13.855536] 
[   13.869651] Allocated by task 205:
[   13.869965]  kasan_save_stack+0x45/0x70
[   13.870210]  kasan_save_track+0x18/0x40
[   13.870359]  kasan_save_alloc_info+0x3b/0x50
[   13.870514]  __kasan_kmalloc+0xb7/0xc0
[   13.870651]  __kmalloc_cache_noprof+0x189/0x420
[   13.871298]  kmalloc_uaf2+0xc6/0x520
[   13.871669]  kunit_try_run_case+0x1a5/0x480
[   13.872119]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.872709]  kthread+0x337/0x6f0
[   13.873163]  ret_from_fork+0x116/0x1d0
[   13.873560]  ret_from_fork_asm+0x1a/0x30
[   13.874198] 
[   13.874377] Freed by task 205:
[   13.874684]  kasan_save_stack+0x45/0x70
[   13.874989]  kasan_save_track+0x18/0x40
[   13.875146]  kasan_save_free_info+0x3f/0x60
[   13.875297]  __kasan_slab_free+0x56/0x70
[   13.875437]  kfree+0x222/0x3f0
[   13.875557]  kmalloc_uaf2+0x14c/0x520
[   13.875691]  kunit_try_run_case+0x1a5/0x480
[   13.876648]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.876931]  kthread+0x337/0x6f0
[   13.877454]  ret_from_fork+0x116/0x1d0
[   13.878030]  ret_from_fork_asm+0x1a/0x30
[   13.878306] 
[   13.878388] The buggy address belongs to the object at ffff888102c4c300
[   13.878388]  which belongs to the cache kmalloc-64 of size 64
[   13.879034] The buggy address is located 40 bytes inside of
[   13.879034]  freed 64-byte region [ffff888102c4c300, ffff888102c4c340)
[   13.880928] 
[   13.881295] The buggy address belongs to the physical page:
[   13.882167] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c4c
[   13.882954] flags: 0x200000000000000(node=0|zone=2)
[   13.883150] page_type: f5(slab)
[   13.883283] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.883528] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.884093] page dumped because: kasan: bad access detected
[   13.884633] 
[   13.884748] Memory state around the buggy address:
[   13.884975]  ffff888102c4c200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.885263]  ffff888102c4c280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.885591] >ffff888102c4c300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.885883]                                   ^
[   13.886658]  ffff888102c4c380: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc
[   13.887509]  ffff888102c4c400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.888343] ==================================================================

[   28.108890] ==================================================================
[   28.120046] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x4a8/0x520
[   28.126666] Read of size 1 at addr ffff8881066f50a8 by task kunit_try_catch/229
[   28.133972] 
[   28.135474] CPU: 3 UID: 0 PID: 229 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   28.135482] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   28.135485] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   28.135488] Call Trace:
[   28.135490]  <TASK>
[   28.135491]  dump_stack_lvl+0x73/0xb0
[   28.135496]  print_report+0xd1/0x650
[   28.135500]  ? __virt_addr_valid+0x1db/0x2d0
[   28.135504]  ? kmalloc_uaf2+0x4a8/0x520
[   28.135507]  ? kasan_complete_mode_report_info+0x64/0x200
[   28.135512]  ? kmalloc_uaf2+0x4a8/0x520
[   28.135516]  kasan_report+0x141/0x180
[   28.135520]  ? kmalloc_uaf2+0x4a8/0x520
[   28.135524]  __asan_report_load1_noabort+0x18/0x20
[   28.135529]  kmalloc_uaf2+0x4a8/0x520
[   28.135532]  ? __pfx_kmalloc_uaf2+0x10/0x10
[   28.135536]  ? finish_task_switch.isra.0+0x153/0x700
[   28.135540]  ? __switch_to+0x544/0xf50
[   28.135545]  ? __schedule+0x10cc/0x2b60
[   28.135548]  ? ktime_get_ts64+0x83/0x230
[   28.135553]  kunit_try_run_case+0x1a2/0x480
[   28.135557]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.135561]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.135565]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.135570]  ? __kthread_parkme+0x82/0x180
[   28.135573]  ? preempt_count_sub+0x50/0x80
[   28.135577]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.135581]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   28.135585]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.135590]  kthread+0x334/0x6f0
[   28.135593]  ? trace_preempt_on+0x20/0xc0
[   28.135597]  ? __pfx_kthread+0x10/0x10
[   28.135601]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.135605]  ? calculate_sigpending+0x7b/0xa0
[   28.135609]  ? __pfx_kthread+0x10/0x10
[   28.135613]  ret_from_fork+0x113/0x1d0
[   28.135616]  ? __pfx_kthread+0x10/0x10
[   28.135620]  ret_from_fork_asm+0x1a/0x30
[   28.135625]  </TASK>
[   28.135627] 
[   28.306915] Allocated by task 229:
[   28.310319]  kasan_save_stack+0x45/0x70
[   28.314187]  kasan_save_track+0x18/0x40
[   28.318025]  kasan_save_alloc_info+0x3b/0x50
[   28.322298]  __kasan_kmalloc+0xb7/0xc0
[   28.326049]  __kmalloc_cache_noprof+0x189/0x420
[   28.330584]  kmalloc_uaf2+0xc6/0x520
[   28.334163]  kunit_try_run_case+0x1a2/0x480
[   28.338367]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   28.343792]  kthread+0x334/0x6f0
[   28.347023]  ret_from_fork+0x113/0x1d0
[   28.350777]  ret_from_fork_asm+0x1a/0x30
[   28.354702] 
[   28.356202] Freed by task 229:
[   28.359260]  kasan_save_stack+0x45/0x70
[   28.363100]  kasan_save_track+0x18/0x40
[   28.366940]  kasan_save_free_info+0x3f/0x60
[   28.371124]  __kasan_slab_free+0x56/0x70
[   28.375051]  kfree+0x222/0x3f0
[   28.378110]  kmalloc_uaf2+0x14c/0x520
[   28.381776]  kunit_try_run_case+0x1a2/0x480
[   28.385962]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   28.391363]  kthread+0x334/0x6f0
[   28.394621]  ret_from_fork+0x113/0x1d0
[   28.398373]  ret_from_fork_asm+0x1a/0x30
[   28.402316] 
[   28.403817] The buggy address belongs to the object at ffff8881066f5080
[   28.403817]  which belongs to the cache kmalloc-64 of size 64
[   28.416158] The buggy address is located 40 bytes inside of
[   28.416158]  freed 64-byte region [ffff8881066f5080, ffff8881066f50c0)
[   28.428241] 
[   28.429737] The buggy address belongs to the physical page:
[   28.435312] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066f5
[   28.443318] flags: 0x200000000000000(node=0|zone=2)
[   28.448225] page_type: f5(slab)
[   28.451395] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   28.459137] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.466882] page dumped because: kasan: bad access detected
[   28.472456] 
[   28.473955] Memory state around the buggy address:
[   28.478748]  ffff8881066f4f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   28.485967]  ffff8881066f5000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.493188] >ffff8881066f5080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.500406]                                   ^
[   28.504939]  ffff8881066f5100: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc
[   28.512159]  ffff8881066f5180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.519378] ==================================================================