Hay
Date
May 30, 2025, 4:14 a.m.

Environment
e850-96
qemu-arm64
qemu-x86_64
x15

[   32.351317] ==================================================================
[   32.358415] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8
[   32.364748] Read of size 1 at addr ffff000803eb5978 by task kunit_try_catch/240
[   32.372039] 
[   32.373521] CPU: 4 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   32.373575] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.373589] Hardware name: WinLink E850-96 board (DT)
[   32.373609] Call trace:
[   32.373619]  show_stack+0x20/0x38 (C)
[   32.373652]  dump_stack_lvl+0x8c/0xd0
[   32.373689]  print_report+0x118/0x608
[   32.373723]  kasan_report+0xdc/0x128
[   32.373756]  __asan_report_load1_noabort+0x20/0x30
[   32.373785]  ksize_uaf+0x544/0x5f8
[   32.373813]  kunit_try_run_case+0x170/0x3f0
[   32.373847]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.373885]  kthread+0x328/0x630
[   32.373912]  ret_from_fork+0x10/0x20
[   32.373944] 
[   32.436448] Allocated by task 240:
[   32.439834]  kasan_save_stack+0x3c/0x68
[   32.443653]  kasan_save_track+0x20/0x40
[   32.447472]  kasan_save_alloc_info+0x40/0x58
[   32.451726]  __kasan_kmalloc+0xd4/0xd8
[   32.455458]  __kmalloc_cache_noprof+0x15c/0x3c0
[   32.459972]  ksize_uaf+0xb8/0x5f8
[   32.463270]  kunit_try_run_case+0x170/0x3f0
[   32.467437]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.472906]  kthread+0x328/0x630
[   32.476118]  ret_from_fork+0x10/0x20
[   32.479677] 
[   32.481152] Freed by task 240:
[   32.484190]  kasan_save_stack+0x3c/0x68
[   32.488010]  kasan_save_track+0x20/0x40
[   32.491829]  kasan_save_free_info+0x4c/0x78
[   32.495996]  __kasan_slab_free+0x6c/0x98
[   32.499902]  kfree+0x214/0x3c8
[   32.502940]  ksize_uaf+0x11c/0x5f8
[   32.506326]  kunit_try_run_case+0x170/0x3f0
[   32.510492]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.515961]  kthread+0x328/0x630
[   32.519172]  ret_from_fork+0x10/0x20
[   32.522732] 
[   32.524208] The buggy address belongs to the object at ffff000803eb5900
[   32.524208]  which belongs to the cache kmalloc-128 of size 128
[   32.536707] The buggy address is located 120 bytes inside of
[   32.536707]  freed 128-byte region [ffff000803eb5900, ffff000803eb5980)
[   32.548946] 
[   32.550424] The buggy address belongs to the physical page:
[   32.555980] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883eb4
[   32.563964] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.571602] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.578548] page_type: f5(slab)
[   32.581681] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   32.589404] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.597130] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   32.604941] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.612754] head: 0bfffe0000000001 fffffdffe00fad01 00000000ffffffff 00000000ffffffff
[   32.620566] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   32.628372] page dumped because: kasan: bad access detected
[   32.633927] 
[   32.635403] Memory state around the buggy address:
[   32.640181]  ffff000803eb5800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.647386]  ffff000803eb5880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.654591] >ffff000803eb5900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.661792]                                                                 ^
[   32.668913]  ffff000803eb5980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.676118]  ffff000803eb5a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.683319] ==================================================================
[   31.676050] ==================================================================
[   31.685856] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8
[   31.692190] Read of size 1 at addr ffff000803eb5900 by task kunit_try_catch/240
[   31.699480] 
[   31.700964] CPU: 4 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   31.701016] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.701031] Hardware name: WinLink E850-96 board (DT)
[   31.701051] Call trace:
[   31.701066]  show_stack+0x20/0x38 (C)
[   31.701104]  dump_stack_lvl+0x8c/0xd0
[   31.701142]  print_report+0x118/0x608
[   31.701178]  kasan_report+0xdc/0x128
[   31.701208]  __kasan_check_byte+0x54/0x70
[   31.701243]  ksize+0x30/0x88
[   31.701277]  ksize_uaf+0x168/0x5f8
[   31.701305]  kunit_try_run_case+0x170/0x3f0
[   31.701342]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.701380]  kthread+0x328/0x630
[   31.701408]  ret_from_fork+0x10/0x20
[   31.701444] 
[   31.765973] Allocated by task 240:
[   31.769360]  kasan_save_stack+0x3c/0x68
[   31.773176]  kasan_save_track+0x20/0x40
[   31.776996]  kasan_save_alloc_info+0x40/0x58
[   31.781250]  __kasan_kmalloc+0xd4/0xd8
[   31.784982]  __kmalloc_cache_noprof+0x15c/0x3c0
[   31.789496]  ksize_uaf+0xb8/0x5f8
[   31.792794]  kunit_try_run_case+0x170/0x3f0
[   31.796961]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.802429]  kthread+0x328/0x630
[   31.805642]  ret_from_fork+0x10/0x20
[   31.809200] 
[   31.810676] Freed by task 240:
[   31.813716]  kasan_save_stack+0x3c/0x68
[   31.817534]  kasan_save_track+0x20/0x40
[   31.821353]  kasan_save_free_info+0x4c/0x78
[   31.825520]  __kasan_slab_free+0x6c/0x98
[   31.829426]  kfree+0x214/0x3c8
[   31.832464]  ksize_uaf+0x11c/0x5f8
[   31.835850]  kunit_try_run_case+0x170/0x3f0
[   31.840016]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.845485]  kthread+0x328/0x630
[   31.848696]  ret_from_fork+0x10/0x20
[   31.852256] 
[   31.853734] The buggy address belongs to the object at ffff000803eb5900
[   31.853734]  which belongs to the cache kmalloc-128 of size 128
[   31.866233] The buggy address is located 0 bytes inside of
[   31.866233]  freed 128-byte region [ffff000803eb5900, ffff000803eb5980)
[   31.878296] 
[   31.879776] The buggy address belongs to the physical page:
[   31.885332] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883eb4
[   31.893317] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.900956] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.907899] page_type: f5(slab)
[   31.911036] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   31.918754] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   31.926481] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   31.934292] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   31.942105] head: 0bfffe0000000001 fffffdffe00fad01 00000000ffffffff 00000000ffffffff
[   31.949917] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   31.957723] page dumped because: kasan: bad access detected
[   31.963279] 
[   31.964754] Memory state around the buggy address:
[   31.969533]  ffff000803eb5800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.976736]  ffff000803eb5880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.983941] >ffff000803eb5900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.991142]                    ^
[   31.994358]  ffff000803eb5980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.001563]  ffff000803eb5a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.008763] ==================================================================
[   32.016297] ==================================================================
[   32.023178] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8
[   32.029510] Read of size 1 at addr ffff000803eb5900 by task kunit_try_catch/240
[   32.036801] 
[   32.038284] CPU: 4 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   32.038340] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.038356] Hardware name: WinLink E850-96 board (DT)
[   32.038375] Call trace:
[   32.038386]  show_stack+0x20/0x38 (C)
[   32.038421]  dump_stack_lvl+0x8c/0xd0
[   32.038457]  print_report+0x118/0x608
[   32.038490]  kasan_report+0xdc/0x128
[   32.038522]  __asan_report_load1_noabort+0x20/0x30
[   32.038554]  ksize_uaf+0x598/0x5f8
[   32.038582]  kunit_try_run_case+0x170/0x3f0
[   32.038615]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.038653]  kthread+0x328/0x630
[   32.038679]  ret_from_fork+0x10/0x20
[   32.038710] 
[   32.101211] Allocated by task 240:
[   32.104596]  kasan_save_stack+0x3c/0x68
[   32.108415]  kasan_save_track+0x20/0x40
[   32.112234]  kasan_save_alloc_info+0x40/0x58
[   32.116487]  __kasan_kmalloc+0xd4/0xd8
[   32.120220]  __kmalloc_cache_noprof+0x15c/0x3c0
[   32.124734]  ksize_uaf+0xb8/0x5f8
[   32.128032]  kunit_try_run_case+0x170/0x3f0
[   32.132199]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.137667]  kthread+0x328/0x630
[   32.140879]  ret_from_fork+0x10/0x20
[   32.144438] 
[   32.145914] Freed by task 240:
[   32.148952]  kasan_save_stack+0x3c/0x68
[   32.152771]  kasan_save_track+0x20/0x40
[   32.156591]  kasan_save_free_info+0x4c/0x78
[   32.160757]  __kasan_slab_free+0x6c/0x98
[   32.164664]  kfree+0x214/0x3c8
[   32.167702]  ksize_uaf+0x11c/0x5f8
[   32.171087]  kunit_try_run_case+0x170/0x3f0
[   32.175254]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.180723]  kthread+0x328/0x630
[   32.183935]  ret_from_fork+0x10/0x20
[   32.187493] 
[   32.188971] The buggy address belongs to the object at ffff000803eb5900
[   32.188971]  which belongs to the cache kmalloc-128 of size 128
[   32.201469] The buggy address is located 0 bytes inside of
[   32.201469]  freed 128-byte region [ffff000803eb5900, ffff000803eb5980)
[   32.213535] 
[   32.215012] The buggy address belongs to the physical page:
[   32.220571] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883eb4
[   32.228552] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.236191] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.243136] page_type: f5(slab)
[   32.246271] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   32.253992] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.261718] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   32.269530] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.277343] head: 0bfffe0000000001 fffffdffe00fad01 00000000ffffffff 00000000ffffffff
[   32.285154] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   32.292960] page dumped because: kasan: bad access detected
[   32.298517] 
[   32.299991] Memory state around the buggy address:
[   32.304770]  ffff000803eb5800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.311975]  ffff000803eb5880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.319179] >ffff000803eb5900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.326380]                    ^
[   32.329596]  ffff000803eb5980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.336802]  ffff000803eb5a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.344003] ==================================================================

[   25.325060] ==================================================================
[   25.325409] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8
[   25.325566] Read of size 1 at addr fff00000c77e8378 by task kunit_try_catch/197
[   25.325720] 
[   25.325794] CPU: 0 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   25.325990] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.326156] Hardware name: linux,dummy-virt (DT)
[   25.326242] Call trace:
[   25.326291]  show_stack+0x20/0x38 (C)
[   25.326408]  dump_stack_lvl+0x8c/0xd0
[   25.326551]  print_report+0x118/0x608
[   25.326938]  kasan_report+0xdc/0x128
[   25.327193]  __asan_report_load1_noabort+0x20/0x30
[   25.327430]  ksize_uaf+0x544/0x5f8
[   25.327584]  kunit_try_run_case+0x170/0x3f0
[   25.327842]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.328096]  kthread+0x328/0x630
[   25.328258]  ret_from_fork+0x10/0x20
[   25.328473] 
[   25.328523] Allocated by task 197:
[   25.328659]  kasan_save_stack+0x3c/0x68
[   25.329021]  kasan_save_track+0x20/0x40
[   25.329142]  kasan_save_alloc_info+0x40/0x58
[   25.329325]  __kasan_kmalloc+0xd4/0xd8
[   25.329450]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.330574]  ksize_uaf+0xb8/0x5f8
[   25.330708]  kunit_try_run_case+0x170/0x3f0
[   25.330816]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.330926]  kthread+0x328/0x630
[   25.331035]  ret_from_fork+0x10/0x20
[   25.331253] 
[   25.331307] Freed by task 197:
[   25.331391]  kasan_save_stack+0x3c/0x68
[   25.331491]  kasan_save_track+0x20/0x40
[   25.331581]  kasan_save_free_info+0x4c/0x78
[   25.331742]  __kasan_slab_free+0x6c/0x98
[   25.331845]  kfree+0x214/0x3c8
[   25.331925]  ksize_uaf+0x11c/0x5f8
[   25.332016]  kunit_try_run_case+0x170/0x3f0
[   25.332285]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.332414]  kthread+0x328/0x630
[   25.332509]  ret_from_fork+0x10/0x20
[   25.332779] 
[   25.332837] The buggy address belongs to the object at fff00000c77e8300
[   25.332837]  which belongs to the cache kmalloc-128 of size 128
[   25.333431] The buggy address is located 120 bytes inside of
[   25.333431]  freed 128-byte region [fff00000c77e8300, fff00000c77e8380)
[   25.334085] 
[   25.334491] The buggy address belongs to the physical page:
[   25.334578] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e8
[   25.334778] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.334905] page_type: f5(slab)
[   25.335151] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   25.335283] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.335640] page dumped because: kasan: bad access detected
[   25.335739] 
[   25.335787] Memory state around the buggy address:
[   25.335859]  fff00000c77e8200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.335960]  fff00000c77e8280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.336099] >fff00000c77e8300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.336784]                                                                 ^
[   25.337065]  fff00000c77e8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.337297]  fff00000c77e8400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.337441] ==================================================================
[   25.284579] ==================================================================
[   25.286327] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8
[   25.287323] Read of size 1 at addr fff00000c77e8300 by task kunit_try_catch/197
[   25.287527] 
[   25.287637] CPU: 0 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   25.288069] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.288195] Hardware name: linux,dummy-virt (DT)
[   25.288321] Call trace:
[   25.288409]  show_stack+0x20/0x38 (C)
[   25.288589]  dump_stack_lvl+0x8c/0xd0
[   25.288735]  print_report+0x118/0x608
[   25.288858]  kasan_report+0xdc/0x128
[   25.288968]  __kasan_check_byte+0x54/0x70
[   25.289084]  ksize+0x30/0x88
[   25.289208]  ksize_uaf+0x168/0x5f8
[   25.289356]  kunit_try_run_case+0x170/0x3f0
[   25.289776]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.290391]  kthread+0x328/0x630
[   25.290539]  ret_from_fork+0x10/0x20
[   25.290819] 
[   25.290909] Allocated by task 197:
[   25.290999]  kasan_save_stack+0x3c/0x68
[   25.291106]  kasan_save_track+0x20/0x40
[   25.291209]  kasan_save_alloc_info+0x40/0x58
[   25.291308]  __kasan_kmalloc+0xd4/0xd8
[   25.292630]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.292837]  ksize_uaf+0xb8/0x5f8
[   25.293024]  kunit_try_run_case+0x170/0x3f0
[   25.293192]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.293340]  kthread+0x328/0x630
[   25.293921]  ret_from_fork+0x10/0x20
[   25.294088] 
[   25.294175] Freed by task 197:
[   25.294381]  kasan_save_stack+0x3c/0x68
[   25.294482]  kasan_save_track+0x20/0x40
[   25.294577]  kasan_save_free_info+0x4c/0x78
[   25.295511]  __kasan_slab_free+0x6c/0x98
[   25.295654]  kfree+0x214/0x3c8
[   25.295848]  ksize_uaf+0x11c/0x5f8
[   25.296115]  kunit_try_run_case+0x170/0x3f0
[   25.296390]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.296505]  kthread+0x328/0x630
[   25.297292]  ret_from_fork+0x10/0x20
[   25.297650] 
[   25.297951] The buggy address belongs to the object at fff00000c77e8300
[   25.297951]  which belongs to the cache kmalloc-128 of size 128
[   25.298535] The buggy address is located 0 bytes inside of
[   25.298535]  freed 128-byte region [fff00000c77e8300, fff00000c77e8380)
[   25.298898] 
[   25.299000] The buggy address belongs to the physical page:
[   25.299075] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e8
[   25.299950] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.300175] page_type: f5(slab)
[   25.300420] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   25.300557] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.301174] page dumped because: kasan: bad access detected
[   25.301621] 
[   25.301674] Memory state around the buggy address:
[   25.301938]  fff00000c77e8200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.302409]  fff00000c77e8280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.302516] >fff00000c77e8300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.302608]                    ^
[   25.303294]  fff00000c77e8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.303414]  fff00000c77e8400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.303983] ==================================================================
[   25.306985] ==================================================================
[   25.307728] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8
[   25.308536] Read of size 1 at addr fff00000c77e8300 by task kunit_try_catch/197
[   25.308694] 
[   25.308768] CPU: 0 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   25.309587] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.310178] Hardware name: linux,dummy-virt (DT)
[   25.310363] Call trace:
[   25.310449]  show_stack+0x20/0x38 (C)
[   25.311015]  dump_stack_lvl+0x8c/0xd0
[   25.311481]  print_report+0x118/0x608
[   25.311611]  kasan_report+0xdc/0x128
[   25.312172]  __asan_report_load1_noabort+0x20/0x30
[   25.312539]  ksize_uaf+0x598/0x5f8
[   25.312924]  kunit_try_run_case+0x170/0x3f0
[   25.313046]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.313175]  kthread+0x328/0x630
[   25.313301]  ret_from_fork+0x10/0x20
[   25.313868] 
[   25.314443] Allocated by task 197:
[   25.314528]  kasan_save_stack+0x3c/0x68
[   25.314884]  kasan_save_track+0x20/0x40
[   25.315113]  kasan_save_alloc_info+0x40/0x58
[   25.315223]  __kasan_kmalloc+0xd4/0xd8
[   25.315727]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.315846]  ksize_uaf+0xb8/0x5f8
[   25.316351]  kunit_try_run_case+0x170/0x3f0
[   25.316720]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.316934]  kthread+0x328/0x630
[   25.317034]  ret_from_fork+0x10/0x20
[   25.317144] 
[   25.317195] Freed by task 197:
[   25.317355]  kasan_save_stack+0x3c/0x68
[   25.317488]  kasan_save_track+0x20/0x40
[   25.317614]  kasan_save_free_info+0x4c/0x78
[   25.317891]  __kasan_slab_free+0x6c/0x98
[   25.318063]  kfree+0x214/0x3c8
[   25.318207]  ksize_uaf+0x11c/0x5f8
[   25.318469]  kunit_try_run_case+0x170/0x3f0
[   25.318582]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.318809]  kthread+0x328/0x630
[   25.318940]  ret_from_fork+0x10/0x20
[   25.319050] 
[   25.319105] The buggy address belongs to the object at fff00000c77e8300
[   25.319105]  which belongs to the cache kmalloc-128 of size 128
[   25.319295] The buggy address is located 0 bytes inside of
[   25.319295]  freed 128-byte region [fff00000c77e8300, fff00000c77e8380)
[   25.319542] 
[   25.319599] The buggy address belongs to the physical page:
[   25.319788] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e8
[   25.319929] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.320044] page_type: f5(slab)
[   25.321132] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   25.321489] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.321592] page dumped because: kasan: bad access detected
[   25.322583] 
[   25.322729] Memory state around the buggy address:
[   25.322836]  fff00000c77e8200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.322951]  fff00000c77e8280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.323060] >fff00000c77e8300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.323214]                    ^
[   25.323298]  fff00000c77e8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.323452]  fff00000c77e8400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.323557] ==================================================================

[   19.087456] ==================================================================
[   19.088103] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5fe/0x6c0
[   19.088709] Read of size 1 at addr ffff888102b56400 by task kunit_try_catch/213
[   19.089463] 
[   19.089897] CPU: 0 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT(voluntary) 
[   19.090076] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.090120] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.090181] Call Trace:
[   19.090222]  <TASK>
[   19.090282]  dump_stack_lvl+0x73/0xb0
[   19.090367]  print_report+0xd1/0x650
[   19.090444]  ? __virt_addr_valid+0x1db/0x2d0
[   19.090524]  ? ksize_uaf+0x5fe/0x6c0
[   19.090590]  ? kasan_complete_mode_report_info+0x64/0x200
[   19.090626]  ? ksize_uaf+0x5fe/0x6c0
[   19.090657]  kasan_report+0x141/0x180
[   19.090690]  ? ksize_uaf+0x5fe/0x6c0
[   19.090741]  __asan_report_load1_noabort+0x18/0x20
[   19.091121]  ksize_uaf+0x5fe/0x6c0
[   19.091296]  ? __pfx_ksize_uaf+0x10/0x10
[   19.091377]  ? __schedule+0x10cc/0x2b60
[   19.091447]  ? __pfx_read_tsc+0x10/0x10
[   19.091482]  ? ktime_get_ts64+0x86/0x230
[   19.091518]  kunit_try_run_case+0x1a5/0x480
[   19.091549]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.091576]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.091612]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.091646]  ? __kthread_parkme+0x82/0x180
[   19.091675]  ? preempt_count_sub+0x50/0x80
[   19.091706]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.091769]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.091808]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.091843]  kthread+0x337/0x6f0
[   19.091870]  ? trace_preempt_on+0x20/0xc0
[   19.091904]  ? __pfx_kthread+0x10/0x10
[   19.091932]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.091963]  ? calculate_sigpending+0x7b/0xa0
[   19.092019]  ? __pfx_kthread+0x10/0x10
[   19.092055]  ret_from_fork+0x116/0x1d0
[   19.092081]  ? __pfx_kthread+0x10/0x10
[   19.092109]  ret_from_fork_asm+0x1a/0x30
[   19.092151]  </TASK>
[   19.092169] 
[   19.110411] Allocated by task 213:
[   19.110716]  kasan_save_stack+0x45/0x70
[   19.111169]  kasan_save_track+0x18/0x40
[   19.111588]  kasan_save_alloc_info+0x3b/0x50
[   19.112495]  __kasan_kmalloc+0xb7/0xc0
[   19.113090]  __kmalloc_cache_noprof+0x189/0x420
[   19.113761]  ksize_uaf+0xaa/0x6c0
[   19.114120]  kunit_try_run_case+0x1a5/0x480
[   19.114844]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.115693]  kthread+0x337/0x6f0
[   19.116520]  ret_from_fork+0x116/0x1d0
[   19.116801]  ret_from_fork_asm+0x1a/0x30
[   19.117757] 
[   19.118120] Freed by task 213:
[   19.118375]  kasan_save_stack+0x45/0x70
[   19.119092]  kasan_save_track+0x18/0x40
[   19.119929]  kasan_save_free_info+0x3f/0x60
[   19.120689]  __kasan_slab_free+0x56/0x70
[   19.121089]  kfree+0x222/0x3f0
[   19.121440]  ksize_uaf+0x12c/0x6c0
[   19.122618]  kunit_try_run_case+0x1a5/0x480
[   19.123011]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.123672]  kthread+0x337/0x6f0
[   19.123988]  ret_from_fork+0x116/0x1d0
[   19.124486]  ret_from_fork_asm+0x1a/0x30
[   19.125522] 
[   19.125694] The buggy address belongs to the object at ffff888102b56400
[   19.125694]  which belongs to the cache kmalloc-128 of size 128
[   19.127266] The buggy address is located 0 bytes inside of
[   19.127266]  freed 128-byte region [ffff888102b56400, ffff888102b56480)
[   19.128065] 
[   19.128303] The buggy address belongs to the physical page:
[   19.128803] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b56
[   19.129959] flags: 0x200000000000000(node=0|zone=2)
[   19.130796] page_type: f5(slab)
[   19.131481] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   19.132334] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.133184] page dumped because: kasan: bad access detected
[   19.134087] 
[   19.134869] Memory state around the buggy address:
[   19.135255]  ffff888102b56300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.136012]  ffff888102b56380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.136627] >ffff888102b56400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.137598]                    ^
[   19.137974]  ffff888102b56480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.139195]  ffff888102b56500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.140121] ==================================================================
[   19.141504] ==================================================================
[   19.141981] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5e4/0x6c0
[   19.144016] Read of size 1 at addr ffff888102b56478 by task kunit_try_catch/213
[   19.145089] 
[   19.145346] CPU: 0 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT(voluntary) 
[   19.145469] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.145505] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.145554] Call Trace:
[   19.145575]  <TASK>
[   19.145603]  dump_stack_lvl+0x73/0xb0
[   19.145675]  print_report+0xd1/0x650
[   19.145710]  ? __virt_addr_valid+0x1db/0x2d0
[   19.145771]  ? ksize_uaf+0x5e4/0x6c0
[   19.145802]  ? kasan_complete_mode_report_info+0x64/0x200
[   19.145834]  ? ksize_uaf+0x5e4/0x6c0
[   19.145865]  kasan_report+0x141/0x180
[   19.145896]  ? ksize_uaf+0x5e4/0x6c0
[   19.145931]  __asan_report_load1_noabort+0x18/0x20
[   19.145959]  ksize_uaf+0x5e4/0x6c0
[   19.145989]  ? __pfx_ksize_uaf+0x10/0x10
[   19.146074]  ? __schedule+0x10cc/0x2b60
[   19.146145]  ? __pfx_read_tsc+0x10/0x10
[   19.146214]  ? ktime_get_ts64+0x86/0x230
[   19.146305]  kunit_try_run_case+0x1a5/0x480
[   19.146373]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.146405]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.146442]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.146477]  ? __kthread_parkme+0x82/0x180
[   19.146506]  ? preempt_count_sub+0x50/0x80
[   19.146538]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.146566]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.146601]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.146635]  kthread+0x337/0x6f0
[   19.146662]  ? trace_preempt_on+0x20/0xc0
[   19.146693]  ? __pfx_kthread+0x10/0x10
[   19.146736]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.146787]  ? calculate_sigpending+0x7b/0xa0
[   19.146822]  ? __pfx_kthread+0x10/0x10
[   19.146852]  ret_from_fork+0x116/0x1d0
[   19.146877]  ? __pfx_kthread+0x10/0x10
[   19.146905]  ret_from_fork_asm+0x1a/0x30
[   19.146947]  </TASK>
[   19.146961] 
[   19.162555] Allocated by task 213:
[   19.163165]  kasan_save_stack+0x45/0x70
[   19.163866]  kasan_save_track+0x18/0x40
[   19.164202]  kasan_save_alloc_info+0x3b/0x50
[   19.164630]  __kasan_kmalloc+0xb7/0xc0
[   19.165349]  __kmalloc_cache_noprof+0x189/0x420
[   19.165848]  ksize_uaf+0xaa/0x6c0
[   19.166360]  kunit_try_run_case+0x1a5/0x480
[   19.166802]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.169085]  kthread+0x337/0x6f0
[   19.169446]  ret_from_fork+0x116/0x1d0
[   19.171840]  ret_from_fork_asm+0x1a/0x30
[   19.172953] 
[   19.173140] Freed by task 213:
[   19.173451]  kasan_save_stack+0x45/0x70
[   19.175855]  kasan_save_track+0x18/0x40
[   19.176260]  kasan_save_free_info+0x3f/0x60
[   19.176570]  __kasan_slab_free+0x56/0x70
[   19.176868]  kfree+0x222/0x3f0
[   19.177518]  ksize_uaf+0x12c/0x6c0
[   19.177790]  kunit_try_run_case+0x1a5/0x480
[   19.178133]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.178532]  kthread+0x337/0x6f0
[   19.179113]  ret_from_fork+0x116/0x1d0
[   19.179635]  ret_from_fork_asm+0x1a/0x30
[   19.181647] 
[   19.182606] The buggy address belongs to the object at ffff888102b56400
[   19.182606]  which belongs to the cache kmalloc-128 of size 128
[   19.183632] The buggy address is located 120 bytes inside of
[   19.183632]  freed 128-byte region [ffff888102b56400, ffff888102b56480)
[   19.184227] 
[   19.184367] The buggy address belongs to the physical page:
[   19.185935] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b56
[   19.186899] flags: 0x200000000000000(node=0|zone=2)
[   19.187359] page_type: f5(slab)
[   19.187673] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   19.188334] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.189066] page dumped because: kasan: bad access detected
[   19.189546] 
[   19.190033] Memory state around the buggy address:
[   19.190527]  ffff888102b56300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.191461]  ffff888102b56380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.192027] >ffff888102b56400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.192643]                                                                 ^
[   19.193675]  ffff888102b56480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.194249]  ffff888102b56500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.194955] ==================================================================
[   19.030128] ==================================================================
[   19.031231] BUG: KASAN: slab-use-after-free in ksize_uaf+0x19d/0x6c0
[   19.032032] Read of size 1 at addr ffff888102b56400 by task kunit_try_catch/213
[   19.033507] 
[   19.033699] CPU: 0 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT(voluntary) 
[   19.033785] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.033803] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.033834] Call Trace:
[   19.033850]  <TASK>
[   19.033871]  dump_stack_lvl+0x73/0xb0
[   19.033909]  print_report+0xd1/0x650
[   19.033940]  ? __virt_addr_valid+0x1db/0x2d0
[   19.033971]  ? ksize_uaf+0x19d/0x6c0
[   19.034023]  ? kasan_complete_mode_report_info+0x64/0x200
[   19.034098]  ? ksize_uaf+0x19d/0x6c0
[   19.034316]  kasan_report+0x141/0x180
[   19.034400]  ? ksize_uaf+0x19d/0x6c0
[   19.034484]  ? ksize_uaf+0x19d/0x6c0
[   19.034587]  __kasan_check_byte+0x3d/0x50
[   19.034675]  ksize+0x20/0x60
[   19.034750]  ksize_uaf+0x19d/0x6c0
[   19.034861]  ? __pfx_ksize_uaf+0x10/0x10
[   19.034896]  ? __schedule+0x10cc/0x2b60
[   19.034932]  ? __pfx_read_tsc+0x10/0x10
[   19.034963]  ? ktime_get_ts64+0x86/0x230
[   19.035017]  kunit_try_run_case+0x1a5/0x480
[   19.035058]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.035087]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.035121]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.035155]  ? __kthread_parkme+0x82/0x180
[   19.035276]  ? preempt_count_sub+0x50/0x80
[   19.035318]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.035348]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.035383]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.035418]  kthread+0x337/0x6f0
[   19.035444]  ? trace_preempt_on+0x20/0xc0
[   19.035477]  ? __pfx_kthread+0x10/0x10
[   19.035505]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.035536]  ? calculate_sigpending+0x7b/0xa0
[   19.035570]  ? __pfx_kthread+0x10/0x10
[   19.035599]  ret_from_fork+0x116/0x1d0
[   19.035623]  ? __pfx_kthread+0x10/0x10
[   19.035651]  ret_from_fork_asm+0x1a/0x30
[   19.035691]  </TASK>
[   19.035706] 
[   19.058085] Allocated by task 213:
[   19.058638]  kasan_save_stack+0x45/0x70
[   19.059366]  kasan_save_track+0x18/0x40
[   19.059773]  kasan_save_alloc_info+0x3b/0x50
[   19.060289]  __kasan_kmalloc+0xb7/0xc0
[   19.060759]  __kmalloc_cache_noprof+0x189/0x420
[   19.061374]  ksize_uaf+0xaa/0x6c0
[   19.061730]  kunit_try_run_case+0x1a5/0x480
[   19.062502]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.063096]  kthread+0x337/0x6f0
[   19.063557]  ret_from_fork+0x116/0x1d0
[   19.064047]  ret_from_fork_asm+0x1a/0x30
[   19.064612] 
[   19.064917] Freed by task 213:
[   19.065582]  kasan_save_stack+0x45/0x70
[   19.066031]  kasan_save_track+0x18/0x40
[   19.066419]  kasan_save_free_info+0x3f/0x60
[   19.066859]  __kasan_slab_free+0x56/0x70
[   19.067461]  kfree+0x222/0x3f0
[   19.067813]  ksize_uaf+0x12c/0x6c0
[   19.068372]  kunit_try_run_case+0x1a5/0x480
[   19.068861]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.069649]  kthread+0x337/0x6f0
[   19.070090]  ret_from_fork+0x116/0x1d0
[   19.070670]  ret_from_fork_asm+0x1a/0x30
[   19.071331] 
[   19.071546] The buggy address belongs to the object at ffff888102b56400
[   19.071546]  which belongs to the cache kmalloc-128 of size 128
[   19.072681] The buggy address is located 0 bytes inside of
[   19.072681]  freed 128-byte region [ffff888102b56400, ffff888102b56480)
[   19.073729] 
[   19.074586] The buggy address belongs to the physical page:
[   19.075369] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b56
[   19.076041] flags: 0x200000000000000(node=0|zone=2)
[   19.076653] page_type: f5(slab)
[   19.077058] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   19.077894] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.078885] page dumped because: kasan: bad access detected
[   19.079439] 
[   19.079660] Memory state around the buggy address:
[   19.080388]  ffff888102b56300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.080957]  ffff888102b56380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.082028] >ffff888102b56400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.082698]                    ^
[   19.083444]  ffff888102b56480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.084348]  ffff888102b56500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.084908] ==================================================================

[   58.919952] ==================================================================
[   58.927246] BUG: KASAN: slab-use-after-free in ksize_uaf+0x68c/0x740
[   58.933624] Read of size 1 at addr cc78ef78 by task kunit_try_catch/248
[   58.940307] 
[   58.941802] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   58.941833] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   58.941833] Hardware name: Generic DRA74X (Flattened Device Tree)
[   58.941833] Call trace: 
[   58.941864]  unwind_backtrace from show_stack+0x18/0x1c
[   58.941894]  show_stack from dump_stack_lvl+0x70/0x90
[   58.941894]  dump_stack_lvl from print_report+0x158/0x528
[   58.941925]  print_report from kasan_report+0xdc/0x118
[   58.941955]  kasan_report from ksize_uaf+0x68c/0x740
[   58.941986]  ksize_uaf from kunit_try_run_case+0x22c/0x5a8
[   58.941986]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   58.942016]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   58.942047]  kthread from ret_from_fork+0x14/0x20
[   58.942077] Exception stack(0xf2333fb0 to 0xf2333ff8)
[   58.942077] 3fa0:                                     00000000 00000000 00000000 00000000
[   58.942108] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   58.942108] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   58.942138] 
[   59.046478] Allocated by task 248:
[   59.049896]  kasan_save_track+0x30/0x5c
[   59.053771]  __kasan_kmalloc+0x8c/0x94
[   59.057556]  ksize_uaf+0xd0/0x740
[   59.060882]  kunit_try_run_case+0x22c/0x5a8
[   59.065093]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   59.070648]  kthread+0x464/0x810
[   59.073883]  ret_from_fork+0x14/0x20
[   59.077484] 
[   59.079010] Freed by task 248:
[   59.082061]  kasan_save_track+0x30/0x5c
[   59.085937]  kasan_save_free_info+0x3c/0x48
[   59.090148]  __kasan_slab_free+0x40/0x50
[   59.094116]  kfree+0xe8/0x384
[   59.097106]  ksize_uaf+0x174/0x740
[   59.100524]  kunit_try_run_case+0x22c/0x5a8
[   59.104736]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   59.110290]  kthread+0x464/0x810
[   59.113525]  ret_from_fork+0x14/0x20
[   59.117126] 
[   59.118621] The buggy address belongs to the object at cc78ef00
[   59.118621]  which belongs to the cache kmalloc-128 of size 128
[   59.130523] The buggy address is located 120 bytes inside of
[   59.130523]  freed 128-byte region [cc78ef00, cc78ef80)
[   59.141479] 
[   59.142974] The buggy address belongs to the physical page:
[   59.148590] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c78e
[   59.155853] flags: 0x0(zone=0)
[   59.158935] page_type: f5(slab)
[   59.162109] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000
[   59.170227] raw: 00000000
[   59.172882] page dumped because: kasan: bad access detected
[   59.178497] 
[   59.179992] Memory state around the buggy address:
[   59.184814]  cc78ee00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   59.191375]  cc78ee80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.197967] >cc78ef00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   59.204528]                                                         ^
[   59.210998]  cc78ef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.217559]  cc78f000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   59.224151] ==================================================================
[   58.612335] ==================================================================
[   58.619598] BUG: KASAN: slab-use-after-free in ksize_uaf+0x6c8/0x740
[   58.626007] Read of size 1 at addr cc78ef00 by task kunit_try_catch/248
[   58.632659] 
[   58.634155] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   58.634185] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   58.634216] Hardware name: Generic DRA74X (Flattened Device Tree)
[   58.634216] Call trace: 
[   58.634216]  unwind_backtrace from show_stack+0x18/0x1c
[   58.634246]  show_stack from dump_stack_lvl+0x70/0x90
[   58.634277]  dump_stack_lvl from print_report+0x158/0x528
[   58.634307]  print_report from kasan_report+0xdc/0x118
[   58.634307]  kasan_report from ksize_uaf+0x6c8/0x740
[   58.634338]  ksize_uaf from kunit_try_run_case+0x22c/0x5a8
[   58.634368]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   58.634399]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   58.634429]  kthread from ret_from_fork+0x14/0x20
[   58.634429] Exception stack(0xf2333fb0 to 0xf2333ff8)
[   58.634460] 3fa0:                                     00000000 00000000 00000000 00000000
[   58.634460] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   58.634490] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   58.634490] 
[   58.738830] Allocated by task 248:
[   58.742279]  kasan_save_track+0x30/0x5c
[   58.746124]  __kasan_kmalloc+0x8c/0x94
[   58.749908]  ksize_uaf+0xd0/0x740
[   58.753265]  kunit_try_run_case+0x22c/0x5a8
[   58.757476]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   58.763000]  kthread+0x464/0x810
[   58.766265]  ret_from_fork+0x14/0x20
[   58.769866] 
[   58.771362] Freed by task 248:
[   58.774444]  kasan_save_track+0x30/0x5c
[   58.778320]  kasan_save_free_info+0x3c/0x48
[   58.782531]  __kasan_slab_free+0x40/0x50
[   58.786468]  kfree+0xe8/0x384
[   58.789459]  ksize_uaf+0x174/0x740
[   58.792907]  kunit_try_run_case+0x22c/0x5a8
[   58.797119]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   58.802642]  kthread+0x464/0x810
[   58.805908]  ret_from_fork+0x14/0x20
[   58.809509] 
[   58.811004] The buggy address belongs to the object at cc78ef00
[   58.811004]  which belongs to the cache kmalloc-128 of size 128
[   58.822906] The buggy address is located 0 bytes inside of
[   58.822906]  freed 128-byte region [cc78ef00, cc78ef80)
[   58.833679] 
[   58.835174] The buggy address belongs to the physical page:
[   58.840789] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c78e
[   58.848052] flags: 0x0(zone=0)
[   58.851135] page_type: f5(slab)
[   58.854309] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000
[   58.862426] raw: 00000000
[   58.865081] page dumped because: kasan: bad access detected
[   58.870697] 
[   58.872192] Memory state around the buggy address:
[   58.877014]  cc78ee00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   58.883575]  cc78ee80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.890167] >cc78ef00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   58.896728]            ^
[   58.899261]  cc78ef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.905853]  cc78f000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   58.912414] ==================================================================
[   58.290374] ==================================================================
[   58.301940] BUG: KASAN: slab-use-after-free in ksize_uaf+0x1f0/0x740
[   58.308349] Read of size 1 at addr cc78ef00 by task kunit_try_catch/248
[   58.315002] 
[   58.316497] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   58.316528] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   58.316558] Hardware name: Generic DRA74X (Flattened Device Tree)
[   58.316558] Call trace: 
[   58.316558]  unwind_backtrace from show_stack+0x18/0x1c
[   58.316589]  show_stack from dump_stack_lvl+0x70/0x90
[   58.316619]  dump_stack_lvl from print_report+0x158/0x528
[   58.316650]  print_report from kasan_report+0xdc/0x118
[   58.316650]  kasan_report from __kasan_check_byte+0x34/0x3c
[   58.316680]  __kasan_check_byte from ksize+0x20/0x3c
[   58.316711]  ksize from ksize_uaf+0x1f0/0x740
[   58.316711]  ksize_uaf from kunit_try_run_case+0x22c/0x5a8
[   58.316741]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   58.316772]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   58.316802]  kthread from ret_from_fork+0x14/0x20
[   58.316833] Exception stack(0xf2333fb0 to 0xf2333ff8)
[   58.316833] 3fa0:                                     00000000 00000000 00000000 00000000
[   58.316864] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   58.316864] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   58.316894] 
[   58.431213] Allocated by task 248:
[   58.434631]  kasan_save_track+0x30/0x5c
[   58.438507]  __kasan_kmalloc+0x8c/0x94
[   58.442260]  ksize_uaf+0xd0/0x740
[   58.445617]  kunit_try_run_case+0x22c/0x5a8
[   58.449829]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   58.455352]  kthread+0x464/0x810
[   58.458618]  ret_from_fork+0x14/0x20
[   58.462219] 
[   58.463714] Freed by task 248:
[   58.466796]  kasan_save_track+0x30/0x5c
[   58.470672]  kasan_save_free_info+0x3c/0x48
[   58.474884]  __kasan_slab_free+0x40/0x50
[   58.478820]  kfree+0xe8/0x384
[   58.481842]  ksize_uaf+0x174/0x740
[   58.485260]  kunit_try_run_case+0x22c/0x5a8
[   58.489471]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   58.495025]  kthread+0x464/0x810
[   58.498260]  ret_from_fork+0x14/0x20
[   58.501861] 
[   58.503387] The buggy address belongs to the object at cc78ef00
[   58.503387]  which belongs to the cache kmalloc-128 of size 128
[   58.515258] The buggy address is located 0 bytes inside of
[   58.515258]  freed 128-byte region [cc78ef00, cc78ef80)
[   58.526031] 
[   58.527526] The buggy address belongs to the physical page:
[   58.533142] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c78e
[   58.540405] flags: 0x0(zone=0)
[   58.543487] page_type: f5(slab)
[   58.546661] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000
[   58.554809] raw: 00000000
[   58.557434] page dumped because: kasan: bad access detected
[   58.563049] 
[   58.564544] Memory state around the buggy address:
[   58.569366]  cc78ee00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   58.575958]  cc78ee80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.582519] >cc78ef00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   58.589080]            ^
[   58.591644]  cc78ef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.598205]  cc78f000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   58.604766] ==================================================================