Date
July 15, 2025, 2:10 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 105.975078] ================================================================== [ 105.976041] BUG: KASAN: use-after-free in kmalloc_uaf2+0x10c/0x2a0 [ 105.977352] Read of size 1 at addr ffff0000c65d8628 by task kunit_try_catch/229 [ 105.978737] [ 105.979132] CPU: 0 PID: 229 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 105.980507] Hardware name: linux,dummy-virt (DT) [ 105.981485] Call trace: [ 105.982024] dump_backtrace+0xe0/0x134 [ 105.982855] show_stack+0x20/0x2c [ 105.983657] dump_stack_lvl+0x88/0xb4 [ 105.984575] print_report+0x158/0x44c [ 105.985316] kasan_report+0xc8/0x180 [ 105.986163] __asan_load1+0x68/0x74 [ 105.987067] kmalloc_uaf2+0x10c/0x2a0 [ 105.987761] kunit_try_run_case+0x8c/0x124 [ 105.988186] kunit_generic_run_threadfn_adapter+0x38/0x54 [ 105.988978] kthread+0x15c/0x170 [ 105.989393] ret_from_fork+0x10/0x20 [ 105.989869] [ 105.990071] Allocated by task 229: [ 105.990418] kasan_save_stack+0x3c/0x70 [ 105.990851] kasan_set_track+0x2c/0x40 [ 105.991279] kasan_save_alloc_info+0x24/0x34 [ 105.991761] __kasan_kmalloc+0xd4/0xe0 [ 105.992186] kmalloc_trace+0x8c/0x150 [ 105.992633] kmalloc_uaf2+0xb4/0x2a0 [ 105.993078] kunit_try_run_case+0x8c/0x124 [ 105.993563] kunit_generic_run_threadfn_adapter+0x38/0x54 [ 105.994119] kthread+0x15c/0x170 [ 105.994547] ret_from_fork+0x10/0x20 [ 105.995172] [ 105.995396] Freed by task 229: [ 105.995777] kasan_save_stack+0x3c/0x70 [ 105.996219] kasan_set_track+0x2c/0x40 [ 105.997792] kasan_save_free_info+0x38/0x5c [ 105.998250] __kasan_slab_free+0x100/0x170 [ 105.998724] slab_free_freelist_hook+0xd8/0x1c0 [ 105.999176] __kmem_cache_free+0x15c/0x2a0 [ 105.999669] kfree+0x88/0x150 [ 106.000034] kmalloc_uaf2+0xcc/0x2a0 [ 106.000724] kunit_try_run_case+0x8c/0x124 [ 106.001236] kunit_generic_run_threadfn_adapter+0x38/0x54 [ 106.001820] kthread+0x15c/0x170 [ 106.002229] ret_from_fork+0x10/0x20 [ 106.002614] [ 106.002848] The buggy address belongs to the object at ffff0000c65d8600 [ 106.002848] which belongs to the cache kmalloc-128 of size 128 [ 106.003828] The buggy address is located 40 bytes inside of [ 106.003828] 128-byte region [ffff0000c65d8600, ffff0000c65d8680) [ 106.004921] [ 106.005130] The buggy address belongs to the physical page: [ 106.005626] page:00000000d460a56f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065d8 [ 106.006397] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 106.007083] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 106.007722] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 106.008358] page dumped because: kasan: bad access detected [ 106.009034] [ 106.009246] Memory state around the buggy address: [ 106.009670] ffff0000c65d8500: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 106.010299] ffff0000c65d8580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 106.010940] >ffff0000c65d8600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 106.011522] ^ [ 106.011949] ffff0000c65d8680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 106.012808] ffff0000c65d8700: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc [ 106.013448] ==================================================================
[ 75.724399] ================================================================== [ 75.725890] BUG: KASAN: use-after-free in kmalloc_uaf2+0xfc/0x1e8 [ 75.726816] Read of size 1 at addr ffff0000c5a46f28 by task kunit_try_catch/145 [ 75.727722] [ 75.728030] CPU: 1 PID: 145 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 75.729070] Hardware name: linux,dummy-virt (DT) [ 75.729783] Call trace: [ 75.730098] dump_backtrace+0xf8/0x118 [ 75.730728] show_stack+0x18/0x24 [ 75.731317] __dump_stack+0x28/0x38 [ 75.731899] dump_stack_lvl+0x54/0x6c [ 75.732497] print_address_description+0x7c/0x1ec [ 75.733458] print_report+0x50/0x68 [ 75.733975] kasan_report+0xac/0x100 [ 75.734389] __asan_load1+0x6c/0x70 [ 75.734802] kmalloc_uaf2+0xfc/0x1e8 [ 75.735224] kunit_try_run_case+0x80/0x184 [ 75.735709] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 75.736331] kthread+0x16c/0x21c [ 75.736841] ret_from_fork+0x10/0x20 [ 75.737287] [ 75.737655] Allocated by task 145: [ 75.738064] kasan_set_track+0x4c/0x80 [ 75.738562] kasan_save_alloc_info+0x28/0x34 [ 75.739032] __kasan_kmalloc+0x88/0xa0 [ 75.739480] kmalloc_trace+0x54/0x68 [ 75.739901] kmalloc_uaf2+0x48/0x1e8 [ 75.740339] kunit_try_run_case+0x80/0x184 [ 75.741092] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 75.741689] kthread+0x16c/0x21c [ 75.742140] ret_from_fork+0x10/0x20 [ 75.742567] [ 75.742767] Freed by task 145: [ 75.743108] kasan_set_track+0x4c/0x80 [ 75.743591] kasan_save_free_info+0x3c/0x60 [ 75.744102] ____kasan_slab_free+0xe8/0x140 [ 75.745100] __kasan_slab_free+0x18/0x28 [ 75.745588] __kmem_cache_free+0xdc/0x284 [ 75.746062] kfree+0x60/0x74 [ 75.746433] kmalloc_uaf2+0x90/0x1e8 [ 75.746848] kunit_try_run_case+0x80/0x184 [ 75.747313] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 75.747926] kthread+0x16c/0x21c [ 75.748332] ret_from_fork+0x10/0x20 [ 75.748972] [ 75.749178] The buggy address belongs to the object at ffff0000c5a46f00 [ 75.749178] which belongs to the cache kmalloc-128 of size 128 [ 75.750117] The buggy address is located 40 bytes inside of [ 75.750117] 128-byte region [ffff0000c5a46f00, ffff0000c5a46f80) [ 75.750997] [ 75.751214] The buggy address belongs to the physical page: [ 75.751667] page:00000000e850444c refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a46 [ 75.752480] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 75.753308] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 75.754011] raw: 0000000000000000 0000000000100010 00000001ffffffff 0000000000000000 [ 75.754635] page dumped because: kasan: bad access detected [ 75.755161] [ 75.755351] Memory state around the buggy address: [ 75.755817] ffff0000c5a46e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 75.756464] ffff0000c5a46e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.757400] >ffff0000c5a46f00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 75.758017] ^ [ 75.758437] ffff0000c5a46f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.759079] ffff0000c5a47000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 75.759660] ==================================================================
[ 74.770299] ================================================================== [ 74.771175] BUG: KASAN: use-after-free in kmalloc_uaf2+0xfc/0x1e8 [ 74.771813] Read of size 1 at addr ffff0000c5a14228 by task kunit_try_catch/145 [ 74.772671] [ 74.773021] CPU: 0 PID: 145 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 74.773842] Hardware name: linux,dummy-virt (DT) [ 74.774364] Call trace: [ 74.774763] dump_backtrace+0xf4/0x114 [ 74.775331] show_stack+0x18/0x24 [ 74.776010] __dump_stack+0x28/0x38 [ 74.776440] dump_stack_lvl+0x50/0x68 [ 74.776886] print_address_description+0x7c/0x1ec [ 74.777509] print_report+0x50/0x68 [ 74.778036] kasan_report+0xac/0xfc [ 74.778469] __asan_load1+0x6c/0x70 [ 74.778911] kmalloc_uaf2+0xfc/0x1e8 [ 74.779315] kunit_try_run_case+0x80/0x184 [ 74.779818] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 74.780400] kthread+0x16c/0x21c [ 74.780848] ret_from_fork+0x10/0x20 [ 74.781263] [ 74.781469] Allocated by task 145: [ 74.781816] kasan_set_track+0x4c/0x80 [ 74.782309] kasan_save_alloc_info+0x28/0x34 [ 74.782785] __kasan_kmalloc+0x88/0xa0 [ 74.783287] kmalloc_trace+0x54/0x68 [ 74.783746] kmalloc_uaf2+0x48/0x1e8 [ 74.784169] kunit_try_run_case+0x80/0x184 [ 74.784675] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 74.785286] kthread+0x16c/0x21c [ 74.785748] ret_from_fork+0x10/0x20 [ 74.786200] [ 74.786386] Freed by task 145: [ 74.786721] kasan_set_track+0x4c/0x80 [ 74.787379] kasan_save_free_info+0x3c/0x60 [ 74.787869] ____kasan_slab_free+0xe8/0x140 [ 74.788372] __kasan_slab_free+0x18/0x28 [ 74.788847] __kmem_cache_free+0xdc/0x27c [ 74.789283] kfree+0x60/0x74 [ 74.789684] kmalloc_uaf2+0x90/0x1e8 [ 74.790094] kunit_try_run_case+0x80/0x184 [ 74.790551] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 74.791147] kthread+0x16c/0x21c [ 74.791576] ret_from_fork+0x10/0x20 [ 74.792545] [ 74.792761] The buggy address belongs to the object at ffff0000c5a14200 [ 74.792761] which belongs to the cache kmalloc-128 of size 128 [ 74.793703] The buggy address is located 40 bytes inside of [ 74.793703] 128-byte region [ffff0000c5a14200, ffff0000c5a14280) [ 74.794595] [ 74.794826] The buggy address belongs to the physical page: [ 74.795268] page:000000002a39f223 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a14 [ 74.796067] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 74.796768] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 74.797472] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 74.798114] page dumped because: kasan: bad access detected [ 74.798586] [ 74.798788] Memory state around the buggy address: [ 74.799285] ffff0000c5a14100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 74.800503] ffff0000c5a14180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.801165] >ffff0000c5a14200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 74.801780] ^ [ 74.802208] ffff0000c5a14280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.802832] ffff0000c5a14300: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc [ 74.803302] ==================================================================
[ 73.357743] ================================================================== [ 73.358837] BUG: KASAN: use-after-free in kmalloc_uaf2+0x104/0x290 [ 73.359501] Read of size 1 at addr ffff0000c589dc28 by task kunit_try_catch/145 [ 73.360122] [ 73.360359] CPU: 1 PID: 145 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 73.361108] Hardware name: linux,dummy-virt (DT) [ 73.361567] Call trace: [ 73.362181] dump_backtrace.part.0+0xdc/0xf0 [ 73.362738] show_stack+0x18/0x30 [ 73.363201] dump_stack_lvl+0x64/0x80 [ 73.363666] print_report+0x158/0x438 [ 73.364142] kasan_report+0xb4/0xf4 [ 73.364559] __asan_load1+0x68/0x74 [ 73.364972] kmalloc_uaf2+0x104/0x290 [ 73.365437] kunit_try_run_case+0x84/0x120 [ 73.366119] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 73.366691] kthread+0x180/0x190 [ 73.367236] ret_from_fork+0x10/0x20 [ 73.367692] [ 73.367892] Allocated by task 145: [ 73.368236] kasan_save_stack+0x3c/0x70 [ 73.368677] kasan_set_track+0x2c/0x40 [ 73.369111] kasan_save_alloc_info+0x24/0x34 [ 73.369609] __kasan_kmalloc+0xb8/0xc0 [ 73.370284] kmalloc_trace+0x58/0x6c [ 73.370737] kmalloc_uaf2+0xac/0x290 [ 73.371153] kunit_try_run_case+0x84/0x120 [ 73.371655] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 73.372249] kthread+0x180/0x190 [ 73.372663] ret_from_fork+0x10/0x20 [ 73.373053] [ 73.373280] Freed by task 145: [ 73.373626] kasan_save_stack+0x3c/0x70 [ 73.374038] kasan_set_track+0x2c/0x40 [ 73.374490] kasan_save_free_info+0x38/0x5c [ 73.374935] __kasan_slab_free+0xe4/0x150 [ 73.375312] __kmem_cache_free+0x130/0x2a4 [ 73.376148] kfree+0x58/0x80 [ 73.376528] kmalloc_uaf2+0xc4/0x290 [ 73.376990] kunit_try_run_case+0x84/0x120 [ 73.377443] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 73.378317] kthread+0x180/0x190 [ 73.378711] ret_from_fork+0x10/0x20 [ 73.379153] [ 73.379412] The buggy address belongs to the object at ffff0000c589dc00 [ 73.379412] which belongs to the cache kmalloc-128 of size 128 [ 73.380378] The buggy address is located 40 bytes inside of [ 73.380378] 128-byte region [ffff0000c589dc00, ffff0000c589dc80) [ 73.381270] [ 73.381512] The buggy address belongs to the physical page: [ 73.382160] page:00000000b8b1210d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10589d [ 73.382902] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 73.383825] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 73.384510] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 73.385106] page dumped because: kasan: bad access detected [ 73.385599] [ 73.385787] Memory state around the buggy address: [ 73.386382] ffff0000c589db00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 73.387167] ffff0000c589db80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.387798] >ffff0000c589dc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 73.388382] ^ [ 73.388858] ffff0000c589dc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.389507] ffff0000c589dd00: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc [ 73.390299] ==================================================================
[ 64.865057] ================================================================== [ 64.866460] BUG: KASAN: use-after-free in kmalloc_uaf2+0x110/0x298 [ 64.867112] Read of size 1 at addr ffff0000c59b5128 by task kunit_try_catch/143 [ 64.867566] [ 64.867735] CPU: 1 PID: 143 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 64.868488] Hardware name: linux,dummy-virt (DT) [ 64.869506] Call trace: [ 64.870217] dump_backtrace+0x110/0x120 [ 64.870996] show_stack+0x18/0x28 [ 64.871668] dump_stack_lvl+0x68/0x84 [ 64.872363] print_report+0x158/0x484 [ 64.873011] kasan_report+0x98/0xe0 [ 64.874180] __asan_load1+0x68/0x78 [ 64.874861] kmalloc_uaf2+0x110/0x298 [ 64.875540] kunit_try_run_case+0x7c/0x120 [ 64.876261] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 64.877120] kthread+0x1a4/0x1b8 [ 64.878027] ret_from_fork+0x10/0x20 [ 64.878712] [ 64.879017] Allocated by task 143: [ 64.879423] kasan_save_stack+0x2c/0x58 [ 64.879749] kasan_set_track+0x2c/0x40 [ 64.880047] kasan_save_alloc_info+0x24/0x38 [ 64.880596] __kasan_kmalloc+0xa0/0xb8 [ 64.880988] kmalloc_trace+0x50/0x68 [ 64.881411] kmalloc_uaf2+0xb4/0x298 [ 64.882071] kunit_try_run_case+0x7c/0x120 [ 64.882779] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 64.883590] kthread+0x1a4/0x1b8 [ 64.884121] ret_from_fork+0x10/0x20 [ 64.884674] [ 64.884832] Freed by task 143: [ 64.885060] kasan_save_stack+0x2c/0x58 [ 64.885469] kasan_set_track+0x2c/0x40 [ 64.885939] kasan_save_free_info+0x38/0x60 [ 64.886386] __kasan_slab_free+0xe8/0x158 [ 64.886933] __kmem_cache_free+0x138/0x2b0 [ 64.887442] kfree+0x5c/0x70 [ 64.887806] kmalloc_uaf2+0xcc/0x298 [ 64.888252] kunit_try_run_case+0x7c/0x120 [ 64.888713] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 64.889290] kthread+0x1a4/0x1b8 [ 64.890123] ret_from_fork+0x10/0x20 [ 64.890556] [ 64.890778] The buggy address belongs to the object at ffff0000c59b5100 [ 64.890778] which belongs to the cache kmalloc-128 of size 128 [ 64.891739] The buggy address is located 40 bytes inside of [ 64.891739] 128-byte region [ffff0000c59b5100, ffff0000c59b5180) [ 64.892631] [ 64.892882] The buggy address belongs to the physical page: [ 64.893368] page:000000007eb50857 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059b5 [ 64.894090] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 64.894968] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 64.895596] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 64.896157] page dumped because: kasan: bad access detected [ 64.896637] [ 64.896823] Memory state around the buggy address: [ 64.897233] ffff0000c59b5000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 64.898044] ffff0000c59b5080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.898650] >ffff0000c59b5100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 64.899148] ^ [ 64.899527] ffff0000c59b5180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.900086] ffff0000c59b5200: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc [ 64.900997] ==================================================================
[ 31.113581] ================================================================== [ 31.114864] BUG: KASAN: use-after-free in kmalloc_uaf2+0x11e/0x2b0 [ 31.115149] Read of size 1 at addr ffff888103492da8 by task kunit_try_catch/249 [ 31.116712] [ 31.117090] CPU: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 31.118203] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.119112] Call Trace: [ 31.119536] <TASK> [ 31.119931] dump_stack_lvl+0x49/0x62 [ 31.120734] print_report+0x189/0x492 [ 31.121117] ? kasan_complete_mode_report_info+0x7c/0x200 [ 31.121891] ? kmalloc_uaf2+0x11e/0x2b0 [ 31.122103] kasan_report+0x10c/0x190 [ 31.122692] ? kmalloc_uaf2+0x11e/0x2b0 [ 31.123311] __asan_load1+0x62/0x70 [ 31.123861] kmalloc_uaf2+0x11e/0x2b0 [ 31.124443] ? kfree_via_page+0x190/0x190 [ 31.125006] ? preempt_count_sub+0x4c/0x70 [ 31.125704] ? _raw_spin_unlock_irqrestore+0x2d/0x60 [ 31.126076] ? __kunit_add_resource+0xd1/0x100 [ 31.126325] kunit_try_run_case+0x8f/0xd0 [ 31.126519] ? kunit_catch_run_case+0x80/0x80 [ 31.126719] ? kunit_try_catch_throw+0x40/0x40 [ 31.126924] kunit_generic_run_threadfn_adapter+0x2f/0x50 [ 31.127158] kthread+0x17b/0x1b0 [ 31.127579] ? kthread_complete_and_exit+0x30/0x30 [ 31.128036] ret_from_fork+0x22/0x30 [ 31.128366] </TASK> [ 31.128600] [ 31.128788] Allocated by task 249: [ 31.129046] kasan_save_stack+0x41/0x70 [ 31.129302] kasan_set_track+0x25/0x40 [ 31.129746] kasan_save_alloc_info+0x1e/0x30 [ 31.130203] __kasan_kmalloc+0xb6/0xc0 [ 31.130724] kmalloc_trace+0x48/0xb0 [ 31.131096] kmalloc_uaf2+0xac/0x2b0 [ 31.131562] kunit_try_run_case+0x8f/0xd0 [ 31.131748] kunit_generic_run_threadfn_adapter+0x2f/0x50 [ 31.131970] kthread+0x17b/0x1b0 [ 31.132125] ret_from_fork+0x22/0x30 [ 31.132365] [ 31.132470] Freed by task 249: [ 31.132677] kasan_save_stack+0x41/0x70 [ 31.132881] kasan_set_track+0x25/0x40 [ 31.133239] kasan_save_free_info+0x2e/0x50 [ 31.133577] ____kasan_slab_free+0x175/0x1d0 [ 31.133804] __kasan_slab_free+0x12/0x20 [ 31.134030] __kmem_cache_free+0x188/0x2f0 [ 31.134259] kfree+0x78/0x120 [ 31.134521] kmalloc_uaf2+0xcc/0x2b0 [ 31.135025] kunit_try_run_case+0x8f/0xd0 [ 31.135318] kunit_generic_run_threadfn_adapter+0x2f/0x50 [ 31.135849] kthread+0x17b/0x1b0 [ 31.136040] ret_from_fork+0x22/0x30 [ 31.136274] [ 31.136413] The buggy address belongs to the object at ffff888103492d80 [ 31.136413] which belongs to the cache kmalloc-64 of size 64 [ 31.136994] The buggy address is located 40 bytes inside of [ 31.136994] 64-byte region [ffff888103492d80, ffff888103492dc0) [ 31.137498] [ 31.137614] The buggy address belongs to the physical page: [ 31.137868] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103492 [ 31.138843] flags: 0x200000000000200(slab|node=0|zone=2) [ 31.139182] raw: 0200000000000200 0000000000000000 dead000000000122 ffff888100041640 [ 31.139947] raw: 0000000000000000 0000000080200020 00000001ffffffff 0000000000000000 [ 31.140406] page dumped because: kasan: bad access detected [ 31.140897] [ 31.141152] Memory state around the buggy address: [ 31.141622] ffff888103492c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.142081] ffff888103492d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.142535] >ffff888103492d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.143310] ^ [ 31.143796] ffff888103492e00: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc [ 31.144526] ffff888103492e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.145172] ==================================================================