Hay
Date
July 15, 2025, 2:10 p.m.

Environment
qemu-arm64
qemu-x86_64

[   76.552483] ==================================================================
[   76.553361] BUG: KASAN: use-after-free in ksize_uaf+0x130/0x24c
[   76.553907] Read of size 1 at addr ffff0000c5a87178 by task kunit_try_catch/158
[   76.554643] 
[   76.554856] CPU: 1 PID: 158 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   76.555589] Hardware name: linux,dummy-virt (DT)
[   76.555998] Call trace:
[   76.556314]  dump_backtrace+0xf8/0x118
[   76.557264]  show_stack+0x18/0x24
[   76.557740]  __dump_stack+0x28/0x38
[   76.558157]  dump_stack_lvl+0x54/0x6c
[   76.558614]  print_address_description+0x7c/0x1ec
[   76.559160]  print_report+0x50/0x68
[   76.559593]  kasan_report+0xac/0x100
[   76.560042]  __asan_load1+0x6c/0x70
[   76.560518]  ksize_uaf+0x130/0x24c
[   76.560967]  kunit_try_run_case+0x80/0x184
[   76.561428]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.562010]  kthread+0x16c/0x21c
[   76.562452]  ret_from_fork+0x10/0x20
[   76.563150] 
[   76.563370] Allocated by task 158:
[   76.563708]  kasan_set_track+0x4c/0x80
[   76.564220]  kasan_save_alloc_info+0x28/0x34
[   76.565161]  __kasan_kmalloc+0x88/0xa0
[   76.565642]  kmalloc_trace+0x54/0x68
[   76.566116]  ksize_uaf+0x48/0x24c
[   76.566513]  kunit_try_run_case+0x80/0x184
[   76.567023]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.567583]  kthread+0x16c/0x21c
[   76.567996]  ret_from_fork+0x10/0x20
[   76.568447] 
[   76.568952] Freed by task 158:
[   76.569266]  kasan_set_track+0x4c/0x80
[   76.569773]  kasan_save_free_info+0x3c/0x60
[   76.570233]  ____kasan_slab_free+0xe8/0x140
[   76.570703]  __kasan_slab_free+0x18/0x28
[   76.571228]  __kmem_cache_free+0xdc/0x284
[   76.571706]  kfree+0x60/0x74
[   76.572110]  ksize_uaf+0x90/0x24c
[   76.572520]  kunit_try_run_case+0x80/0x184
[   76.573020]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.573575]  kthread+0x16c/0x21c
[   76.574022]  ret_from_fork+0x10/0x20
[   76.574419] 
[   76.574630] The buggy address belongs to the object at ffff0000c5a87100
[   76.574630]  which belongs to the cache kmalloc-128 of size 128
[   76.576011] The buggy address is located 120 bytes inside of
[   76.576011]  128-byte region [ffff0000c5a87100, ffff0000c5a87180)
[   76.577135] 
[   76.577366] The buggy address belongs to the physical page:
[   76.577829] page:000000005da1e2c0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a87
[   76.578614] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   76.579429] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   76.580096] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   76.581175] page dumped because: kasan: bad access detected
[   76.581640] 
[   76.581858] Memory state around the buggy address:
[   76.582273]  ffff0000c5a87000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   76.582931]  ffff0000c5a87080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.583567] >ffff0000c5a87100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   76.584180]                                                                 ^
[   76.585080]  ffff0000c5a87180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.585680]  ffff0000c5a87200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.586287] ==================================================================
[   76.474519] ==================================================================
[   76.475275] BUG: KASAN: use-after-free in ksize_uaf+0xa4/0x24c
[   76.475789] Read of size 1 at addr ffff0000c5a87100 by task kunit_try_catch/158
[   76.476303] 
[   76.476495] CPU: 1 PID: 158 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   76.478661] Hardware name: linux,dummy-virt (DT)
[   76.479890] Call trace:
[   76.480338]  dump_backtrace+0xf8/0x118
[   76.481358]  show_stack+0x18/0x24
[   76.482338]  __dump_stack+0x28/0x38
[   76.483302]  dump_stack_lvl+0x54/0x6c
[   76.484278]  print_address_description+0x7c/0x1ec
[   76.485449]  print_report+0x50/0x68
[   76.486450]  kasan_report+0xac/0x100
[   76.487452]  __kasan_check_byte+0x3c/0x54
[   76.488505]  ksize+0x34/0x13c
[   76.489210]  ksize_uaf+0xa4/0x24c
[   76.489802]  kunit_try_run_case+0x80/0x184
[   76.490277]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.490927]  kthread+0x16c/0x21c
[   76.491348]  ret_from_fork+0x10/0x20
[   76.491817] 
[   76.492027] Allocated by task 158:
[   76.492371]  kasan_set_track+0x4c/0x80
[   76.492928]  kasan_save_alloc_info+0x28/0x34
[   76.493397]  __kasan_kmalloc+0x88/0xa0
[   76.493867]  kmalloc_trace+0x54/0x68
[   76.494296]  ksize_uaf+0x48/0x24c
[   76.494725]  kunit_try_run_case+0x80/0x184
[   76.495481]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.496100]  kthread+0x16c/0x21c
[   76.496521]  ret_from_fork+0x10/0x20
[   76.497216] 
[   76.497403] Freed by task 158:
[   76.497767]  kasan_set_track+0x4c/0x80
[   76.498259]  kasan_save_free_info+0x3c/0x60
[   76.498752]  ____kasan_slab_free+0xe8/0x140
[   76.499313]  __kasan_slab_free+0x18/0x28
[   76.499787]  __kmem_cache_free+0xdc/0x284
[   76.500299]  kfree+0x60/0x74
[   76.500961]  ksize_uaf+0x90/0x24c
[   76.501418]  kunit_try_run_case+0x80/0x184
[   76.501903]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.502455]  kthread+0x16c/0x21c
[   76.502877]  ret_from_fork+0x10/0x20
[   76.503301] 
[   76.503501] The buggy address belongs to the object at ffff0000c5a87100
[   76.503501]  which belongs to the cache kmalloc-128 of size 128
[   76.504473] The buggy address is located 0 bytes inside of
[   76.504473]  128-byte region [ffff0000c5a87100, ffff0000c5a87180)
[   76.505627] 
[   76.505852] The buggy address belongs to the physical page:
[   76.506342] page:000000005da1e2c0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a87
[   76.507127] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   76.507835] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   76.508538] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   76.509427] page dumped because: kasan: bad access detected
[   76.509920] 
[   76.510107] Memory state around the buggy address:
[   76.510573]  ffff0000c5a87000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   76.511214]  ffff0000c5a87080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.511857] >ffff0000c5a87100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   76.512438]                    ^
[   76.513087]  ffff0000c5a87180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.513707]  ffff0000c5a87200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.514329] ==================================================================
[   76.516368] ==================================================================
[   76.517434] BUG: KASAN: use-after-free in ksize_uaf+0xe8/0x24c
[   76.517966] Read of size 1 at addr ffff0000c5a87100 by task kunit_try_catch/158
[   76.518478] 
[   76.518674] CPU: 1 PID: 158 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   76.519678] Hardware name: linux,dummy-virt (DT)
[   76.520045] Call trace:
[   76.520282]  dump_backtrace+0xf8/0x118
[   76.521816]  show_stack+0x18/0x24
[   76.522268]  __dump_stack+0x28/0x38
[   76.522739]  dump_stack_lvl+0x54/0x6c
[   76.523208]  print_address_description+0x7c/0x1ec
[   76.523787]  print_report+0x50/0x68
[   76.524286]  kasan_report+0xac/0x100
[   76.524961]  __asan_load1+0x6c/0x70
[   76.525593]  ksize_uaf+0xe8/0x24c
[   76.526033]  kunit_try_run_case+0x80/0x184
[   76.526542]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.527176]  kthread+0x16c/0x21c
[   76.527616]  ret_from_fork+0x10/0x20
[   76.528098] 
[   76.528314] Allocated by task 158:
[   76.528925]  kasan_set_track+0x4c/0x80
[   76.529433]  kasan_save_alloc_info+0x28/0x34
[   76.529914]  __kasan_kmalloc+0x88/0xa0
[   76.530386]  kmalloc_trace+0x54/0x68
[   76.530884]  ksize_uaf+0x48/0x24c
[   76.531330]  kunit_try_run_case+0x80/0x184
[   76.531840]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.532425]  kthread+0x16c/0x21c
[   76.532841]  ret_from_fork+0x10/0x20
[   76.533272] 
[   76.533453] Freed by task 158:
[   76.534315]  kasan_set_track+0x4c/0x80
[   76.534824]  kasan_save_free_info+0x3c/0x60
[   76.535291]  ____kasan_slab_free+0xe8/0x140
[   76.535805]  __kasan_slab_free+0x18/0x28
[   76.536303]  __kmem_cache_free+0xdc/0x284
[   76.537054]  kfree+0x60/0x74
[   76.537468]  ksize_uaf+0x90/0x24c
[   76.537941]  kunit_try_run_case+0x80/0x184
[   76.538443]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.539099]  kthread+0x16c/0x21c
[   76.539510]  ret_from_fork+0x10/0x20
[   76.539966] 
[   76.540172] The buggy address belongs to the object at ffff0000c5a87100
[   76.540172]  which belongs to the cache kmalloc-128 of size 128
[   76.541356] The buggy address is located 0 bytes inside of
[   76.541356]  128-byte region [ffff0000c5a87100, ffff0000c5a87180)
[   76.542244] 
[   76.542451] The buggy address belongs to the physical page:
[   76.543307] page:000000005da1e2c0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a87
[   76.544115] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   76.545099] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   76.545786] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   76.546411] page dumped because: kasan: bad access detected
[   76.546923] 
[   76.547123] Memory state around the buggy address:
[   76.547555]  ffff0000c5a87000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   76.548209]  ffff0000c5a87080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.549027] >ffff0000c5a87100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   76.549626]                    ^
[   76.549989]  ffff0000c5a87180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.550611]  ffff0000c5a87200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.551491] ==================================================================

[   75.590434] ==================================================================
[   75.591328] BUG: KASAN: use-after-free in ksize_uaf+0xe8/0x24c
[   75.592119] Read of size 1 at addr ffff0000c5a06600 by task kunit_try_catch/158
[   75.593131] 
[   75.593456] CPU: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   75.594523] Hardware name: linux,dummy-virt (DT)
[   75.594936] Call trace:
[   75.595176]  dump_backtrace+0xf4/0x114
[   75.595599]  show_stack+0x18/0x24
[   75.596287]  __dump_stack+0x28/0x38
[   75.596910]  dump_stack_lvl+0x50/0x68
[   75.597562]  print_address_description+0x7c/0x1ec
[   75.598314]  print_report+0x50/0x68
[   75.598927]  kasan_report+0xac/0xfc
[   75.599540]  __asan_load1+0x6c/0x70
[   75.600273]  ksize_uaf+0xe8/0x24c
[   75.600852]  kunit_try_run_case+0x80/0x184
[   75.601521]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.602337]  kthread+0x16c/0x21c
[   75.602921]  ret_from_fork+0x10/0x20
[   75.603526] 
[   75.603870] Allocated by task 158:
[   75.604367]  kasan_set_track+0x4c/0x80
[   75.604808]  kasan_save_alloc_info+0x28/0x34
[   75.605214]  __kasan_kmalloc+0x88/0xa0
[   75.605640]  kmalloc_trace+0x54/0x68
[   75.606238]  ksize_uaf+0x48/0x24c
[   75.606805]  kunit_try_run_case+0x80/0x184
[   75.607468]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.608382]  kthread+0x16c/0x21c
[   75.608999]  ret_from_fork+0x10/0x20
[   75.609599] 
[   75.609884] Freed by task 158:
[   75.610337]  kasan_set_track+0x4c/0x80
[   75.610974]  kasan_save_free_info+0x3c/0x60
[   75.611620]  ____kasan_slab_free+0xe8/0x140
[   75.612411]  __kasan_slab_free+0x18/0x28
[   75.613113]  __kmem_cache_free+0xdc/0x27c
[   75.613759]  kfree+0x60/0x74
[   75.614273]  ksize_uaf+0x90/0x24c
[   75.614841]  kunit_try_run_case+0x80/0x184
[   75.615500]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.616414]  kthread+0x16c/0x21c
[   75.617058]  ret_from_fork+0x10/0x20
[   75.617652] 
[   75.617937] The buggy address belongs to the object at ffff0000c5a06600
[   75.617937]  which belongs to the cache kmalloc-128 of size 128
[   75.619330] The buggy address is located 0 bytes inside of
[   75.619330]  128-byte region [ffff0000c5a06600, ffff0000c5a06680)
[   75.620760] 
[   75.621067] The buggy address belongs to the physical page:
[   75.621772] page:00000000cc3fd307 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a06
[   75.622674] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   75.623252] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   75.623947] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   75.624950] page dumped because: kasan: bad access detected
[   75.625652] 
[   75.625935] Memory state around the buggy address:
[   75.626565]  ffff0000c5a06500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   75.627459]  ffff0000c5a06580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.628479] >ffff0000c5a06600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   75.629518]                    ^
[   75.630062]  ffff0000c5a06680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.630983]  ffff0000c5a06700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.631926] ==================================================================
[   75.545296] ==================================================================
[   75.546698] BUG: KASAN: use-after-free in ksize_uaf+0xa4/0x24c
[   75.547537] Read of size 1 at addr ffff0000c5a06600 by task kunit_try_catch/158
[   75.548619] 
[   75.548967] CPU: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   75.550167] Hardware name: linux,dummy-virt (DT)
[   75.550780] Call trace:
[   75.551159]  dump_backtrace+0xf4/0x114
[   75.551872]  show_stack+0x18/0x24
[   75.552554]  __dump_stack+0x28/0x38
[   75.553153]  dump_stack_lvl+0x50/0x68
[   75.553773]  print_address_description+0x7c/0x1ec
[   75.554301]  print_report+0x50/0x68
[   75.554712]  kasan_report+0xac/0xfc
[   75.555348]  __kasan_check_byte+0x3c/0x54
[   75.556123]  ksize+0x34/0x13c
[   75.556716]  ksize_uaf+0xa4/0x24c
[   75.557299]  kunit_try_run_case+0x80/0x184
[   75.557984]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.558803]  kthread+0x16c/0x21c
[   75.559375]  ret_from_fork+0x10/0x20
[   75.560061] 
[   75.560488] Allocated by task 158:
[   75.561004]  kasan_set_track+0x4c/0x80
[   75.561624]  kasan_save_alloc_info+0x28/0x34
[   75.562047]  __kasan_kmalloc+0x88/0xa0
[   75.562469]  kmalloc_trace+0x54/0x68
[   75.562983]  ksize_uaf+0x48/0x24c
[   75.563539]  kunit_try_run_case+0x80/0x184
[   75.564346]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.565219]  kthread+0x16c/0x21c
[   75.565812]  ret_from_fork+0x10/0x20
[   75.566399] 
[   75.566672] Freed by task 158:
[   75.567138]  kasan_set_track+0x4c/0x80
[   75.567828]  kasan_save_free_info+0x3c/0x60
[   75.568489]  ____kasan_slab_free+0xe8/0x140
[   75.569185]  __kasan_slab_free+0x18/0x28
[   75.569848]  __kmem_cache_free+0xdc/0x27c
[   75.570483]  kfree+0x60/0x74
[   75.571011]  ksize_uaf+0x90/0x24c
[   75.571578]  kunit_try_run_case+0x80/0x184
[   75.572341]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.573225]  kthread+0x16c/0x21c
[   75.573822]  ret_from_fork+0x10/0x20
[   75.574254] 
[   75.574442] The buggy address belongs to the object at ffff0000c5a06600
[   75.574442]  which belongs to the cache kmalloc-128 of size 128
[   75.575173] The buggy address is located 0 bytes inside of
[   75.575173]  128-byte region [ffff0000c5a06600, ffff0000c5a06680)
[   75.576223] 
[   75.576508] The buggy address belongs to the physical page:
[   75.577338] page:00000000cc3fd307 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a06
[   75.578485] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   75.579463] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   75.580531] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   75.581556] page dumped because: kasan: bad access detected
[   75.582346] 
[   75.582635] Memory state around the buggy address:
[   75.583280]  ffff0000c5a06500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   75.584296]  ffff0000c5a06580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.585287] >ffff0000c5a06600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   75.586165]                    ^
[   75.586652]  ffff0000c5a06680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.587548]  ffff0000c5a06700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.588492] ==================================================================
[   75.633076] ==================================================================
[   75.633723] BUG: KASAN: use-after-free in ksize_uaf+0x130/0x24c
[   75.634576] Read of size 1 at addr ffff0000c5a06678 by task kunit_try_catch/158
[   75.635491] 
[   75.635806] CPU: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   75.636958] Hardware name: linux,dummy-virt (DT)
[   75.637411] Call trace:
[   75.637647]  dump_backtrace+0xf4/0x114
[   75.638093]  show_stack+0x18/0x24
[   75.638492]  __dump_stack+0x28/0x38
[   75.639031]  dump_stack_lvl+0x50/0x68
[   75.639624]  print_address_description+0x7c/0x1ec
[   75.640505]  print_report+0x50/0x68
[   75.641134]  kasan_report+0xac/0xfc
[   75.641748]  __asan_load1+0x6c/0x70
[   75.642361]  ksize_uaf+0x130/0x24c
[   75.642947]  kunit_try_run_case+0x80/0x184
[   75.643620]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.644569]  kthread+0x16c/0x21c
[   75.645226]  ret_from_fork+0x10/0x20
[   75.645828] 
[   75.646103] Allocated by task 158:
[   75.646592]  kasan_set_track+0x4c/0x80
[   75.647236]  kasan_save_alloc_info+0x28/0x34
[   75.647970]  __kasan_kmalloc+0x88/0xa0
[   75.648689]  kmalloc_trace+0x54/0x68
[   75.649301]  ksize_uaf+0x48/0x24c
[   75.649880]  kunit_try_run_case+0x80/0x184
[   75.650543]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.651361]  kthread+0x16c/0x21c
[   75.652017]  ret_from_fork+0x10/0x20
[   75.652659] 
[   75.652964] Freed by task 158:
[   75.653439]  kasan_set_track+0x4c/0x80
[   75.654006]  kasan_save_free_info+0x3c/0x60
[   75.654419]  ____kasan_slab_free+0xe8/0x140
[   75.654876]  __kasan_slab_free+0x18/0x28
[   75.655310]  __kmem_cache_free+0xdc/0x27c
[   75.655825]  kfree+0x60/0x74
[   75.656351]  ksize_uaf+0x90/0x24c
[   75.656975]  kunit_try_run_case+0x80/0x184
[   75.657632]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.658457]  kthread+0x16c/0x21c
[   75.659031]  ret_from_fork+0x10/0x20
[   75.659613] 
[   75.659928] The buggy address belongs to the object at ffff0000c5a06600
[   75.659928]  which belongs to the cache kmalloc-128 of size 128
[   75.661483] The buggy address is located 120 bytes inside of
[   75.661483]  128-byte region [ffff0000c5a06600, ffff0000c5a06680)
[   75.662850] 
[   75.663130] The buggy address belongs to the physical page:
[   75.663851] page:00000000cc3fd307 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a06
[   75.664999] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   75.665951] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   75.666941] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   75.667930] page dumped because: kasan: bad access detected
[   75.668668] 
[   75.668962] Memory state around the buggy address:
[   75.669596]  ffff0000c5a06500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   75.670346]  ffff0000c5a06580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.670863] >ffff0000c5a06600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   75.671489]                                                                 ^
[   75.672172]  ffff0000c5a06680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.672785]  ffff0000c5a06700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.673387] ==================================================================

[   74.244424] ==================================================================
[   74.244981] BUG: KASAN: use-after-free in ksize_uaf+0x100/0x32c
[   74.245628] Read of size 1 at addr ffff0000c5938278 by task kunit_try_catch/158
[   74.246935] 
[   74.247138] CPU: 1 PID: 158 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   74.247943] Hardware name: linux,dummy-virt (DT)
[   74.248379] Call trace:
[   74.248667]  dump_backtrace.part.0+0xdc/0xf0
[   74.249174]  show_stack+0x18/0x30
[   74.249645]  dump_stack_lvl+0x64/0x80
[   74.250054]  print_report+0x158/0x438
[   74.250822]  kasan_report+0xb4/0xf4
[   74.251212]  __asan_load1+0x68/0x74
[   74.251671]  ksize_uaf+0x100/0x32c
[   74.252099]  kunit_try_run_case+0x84/0x120
[   74.252608]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   74.253178]  kthread+0x180/0x190
[   74.253594]  ret_from_fork+0x10/0x20
[   74.254597] 
[   74.254806] Allocated by task 158:
[   74.255163]  kasan_save_stack+0x3c/0x70
[   74.255633]  kasan_set_track+0x2c/0x40
[   74.256022]  kasan_save_alloc_info+0x24/0x34
[   74.256520]  __kasan_kmalloc+0xb8/0xc0
[   74.256952]  kmalloc_trace+0x58/0x6c
[   74.257388]  ksize_uaf+0x94/0x32c
[   74.257922]  kunit_try_run_case+0x84/0x120
[   74.258360]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   74.259157]  kthread+0x180/0x190
[   74.259578]  ret_from_fork+0x10/0x20
[   74.259966] 
[   74.260193] Freed by task 158:
[   74.260521]  kasan_save_stack+0x3c/0x70
[   74.260997]  kasan_set_track+0x2c/0x40
[   74.261379]  kasan_save_free_info+0x38/0x5c
[   74.262031]  __kasan_slab_free+0xe4/0x150
[   74.262495]  __kmem_cache_free+0x130/0x2a4
[   74.263510]  kfree+0x58/0x80
[   74.263914]  ksize_uaf+0xb4/0x32c
[   74.264306]  kunit_try_run_case+0x84/0x120
[   74.264816]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   74.265416]  kthread+0x180/0x190
[   74.266156]  ret_from_fork+0x10/0x20
[   74.266584] 
[   74.266803] The buggy address belongs to the object at ffff0000c5938200
[   74.266803]  which belongs to the cache kmalloc-128 of size 128
[   74.267794] The buggy address is located 120 bytes inside of
[   74.267794]  128-byte region [ffff0000c5938200, ffff0000c5938280)
[   74.268747] 
[   74.268992] The buggy address belongs to the physical page:
[   74.269485] page:000000003af4cecf refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105938
[   74.270577] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   74.271721] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   74.272421] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   74.273022] page dumped because: kasan: bad access detected
[   74.273489] 
[   74.273693] Memory state around the buggy address:
[   74.274240]  ffff0000c5938100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   74.275151]  ffff0000c5938180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.275802] >ffff0000c5938200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   74.276359]                                                                 ^
[   74.276934]  ffff0000c5938280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.277527]  ffff0000c5938300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.278370] ==================================================================
[   74.169142] ==================================================================
[   74.170260] BUG: KASAN: use-after-free in ksize_uaf+0xc4/0x32c
[   74.170937] Read of size 1 at addr ffff0000c5938200 by task kunit_try_catch/158
[   74.171875] 
[   74.172200] CPU: 1 PID: 158 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   74.173306] Hardware name: linux,dummy-virt (DT)
[   74.174100] Call trace:
[   74.174590]  dump_backtrace.part.0+0xdc/0xf0
[   74.175480]  show_stack+0x18/0x30
[   74.176012]  dump_stack_lvl+0x64/0x80
[   74.176703]  print_report+0x158/0x438
[   74.177341]  kasan_report+0xb4/0xf4
[   74.177694]  __kasan_check_byte+0x54/0x70
[   74.178558]  ksize+0x3c/0x94
[   74.179237]  ksize_uaf+0xc4/0x32c
[   74.179965]  kunit_try_run_case+0x84/0x120
[   74.180740]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   74.181638]  kthread+0x180/0x190
[   74.182445]  ret_from_fork+0x10/0x20
[   74.183057] 
[   74.183236] Allocated by task 158:
[   74.183519]  kasan_save_stack+0x3c/0x70
[   74.183881]  kasan_set_track+0x2c/0x40
[   74.184214]  kasan_save_alloc_info+0x24/0x34
[   74.185160]  __kasan_kmalloc+0xb8/0xc0
[   74.185895]  kmalloc_trace+0x58/0x6c
[   74.186700]  ksize_uaf+0x94/0x32c
[   74.187388]  kunit_try_run_case+0x84/0x120
[   74.188220]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   74.189127]  kthread+0x180/0x190
[   74.189805]  ret_from_fork+0x10/0x20
[   74.190553] 
[   74.190998] Freed by task 158:
[   74.191571]  kasan_save_stack+0x3c/0x70
[   74.192280]  kasan_set_track+0x2c/0x40
[   74.192858]  kasan_save_free_info+0x38/0x5c
[   74.193503]  __kasan_slab_free+0xe4/0x150
[   74.194165]  __kmem_cache_free+0x130/0x2a4
[   74.195087]  kfree+0x58/0x80
[   74.195700]  ksize_uaf+0xb4/0x32c
[   74.196352]  kunit_try_run_case+0x84/0x120
[   74.197083]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   74.197934]  kthread+0x180/0x190
[   74.198575]  ret_from_fork+0x10/0x20
[   74.198924] 
[   74.199091] The buggy address belongs to the object at ffff0000c5938200
[   74.199091]  which belongs to the cache kmalloc-128 of size 128
[   74.199926] The buggy address is located 0 bytes inside of
[   74.199926]  128-byte region [ffff0000c5938200, ffff0000c5938280)
[   74.200821] 
[   74.201046] The buggy address belongs to the physical page:
[   74.201464] page:000000003af4cecf refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105938
[   74.202605] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   74.203275] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   74.203943] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   74.204556] page dumped because: kasan: bad access detected
[   74.204998] 
[   74.205225] Memory state around the buggy address:
[   74.205686]  ffff0000c5938100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   74.206843]  ffff0000c5938180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.207471] >ffff0000c5938200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   74.208068]                    ^
[   74.208429]  ffff0000c5938280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.209078]  ffff0000c5938300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.209666] ==================================================================
[   74.211038] ==================================================================
[   74.211618] BUG: KASAN: use-after-free in ksize_uaf+0xe0/0x32c
[   74.212208] Read of size 1 at addr ffff0000c5938200 by task kunit_try_catch/158
[   74.212829] 
[   74.213070] CPU: 1 PID: 158 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   74.213835] Hardware name: linux,dummy-virt (DT)
[   74.214292] Call trace:
[   74.215082]  dump_backtrace.part.0+0xdc/0xf0
[   74.215625]  show_stack+0x18/0x30
[   74.216051]  dump_stack_lvl+0x64/0x80
[   74.216462]  print_report+0x158/0x438
[   74.216943]  kasan_report+0xb4/0xf4
[   74.217325]  __asan_load1+0x68/0x74
[   74.217766]  ksize_uaf+0xe0/0x32c
[   74.218165]  kunit_try_run_case+0x84/0x120
[   74.218901]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   74.219468]  kthread+0x180/0x190
[   74.219887]  ret_from_fork+0x10/0x20
[   74.220288] 
[   74.220512] Allocated by task 158:
[   74.220880]  kasan_save_stack+0x3c/0x70
[   74.221316]  kasan_set_track+0x2c/0x40
[   74.221710]  kasan_save_alloc_info+0x24/0x34
[   74.222292]  __kasan_kmalloc+0xb8/0xc0
[   74.223060]  kmalloc_trace+0x58/0x6c
[   74.223550]  ksize_uaf+0x94/0x32c
[   74.223956]  kunit_try_run_case+0x84/0x120
[   74.224440]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   74.224994]  kthread+0x180/0x190
[   74.225381]  ret_from_fork+0x10/0x20
[   74.225905] 
[   74.226107] Freed by task 158:
[   74.226646]  kasan_save_stack+0x3c/0x70
[   74.227085]  kasan_set_track+0x2c/0x40
[   74.227484]  kasan_save_free_info+0x38/0x5c
[   74.227965]  __kasan_slab_free+0xe4/0x150
[   74.228416]  __kmem_cache_free+0x130/0x2a4
[   74.228931]  kfree+0x58/0x80
[   74.229311]  ksize_uaf+0xb4/0x32c
[   74.229754]  kunit_try_run_case+0x84/0x120
[   74.230290]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   74.231230]  kthread+0x180/0x190
[   74.231637]  ret_from_fork+0x10/0x20
[   74.232031] 
[   74.232252] The buggy address belongs to the object at ffff0000c5938200
[   74.232252]  which belongs to the cache kmalloc-128 of size 128
[   74.233221] The buggy address is located 0 bytes inside of
[   74.233221]  128-byte region [ffff0000c5938200, ffff0000c5938280)
[   74.234274] 
[   74.234487] The buggy address belongs to the physical page:
[   74.235160] page:000000003af4cecf refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105938
[   74.235949] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   74.236651] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   74.237344] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   74.238082] page dumped because: kasan: bad access detected
[   74.238580] 
[   74.238755] Memory state around the buggy address:
[   74.239172]  ffff0000c5938100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   74.239831]  ffff0000c5938180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.241007] >ffff0000c5938200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   74.241584]                    ^
[   74.242101]  ffff0000c5938280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.242788]  ffff0000c5938300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.243556] ==================================================================

[   65.683652] ==================================================================
[   65.684483] BUG: KASAN: use-after-free in ksize_uaf+0x100/0x320
[   65.685292] Read of size 1 at addr ffff0000c58ade00 by task kunit_try_catch/156
[   65.686710] 
[   65.687008] CPU: 0 PID: 156 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   65.688006] Hardware name: linux,dummy-virt (DT)
[   65.688590] Call trace:
[   65.688959]  dump_backtrace+0x110/0x120
[   65.689847]  show_stack+0x18/0x28
[   65.690424]  dump_stack_lvl+0x68/0x84
[   65.690862]  print_report+0x158/0x484
[   65.691180]  kasan_report+0x98/0xe0
[   65.691730]  __asan_load1+0x68/0x78
[   65.692261]  ksize_uaf+0x100/0x320
[   65.692802]  kunit_try_run_case+0x7c/0x120
[   65.693435]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   65.694546]  kthread+0x1a4/0x1b8
[   65.695065]  ret_from_fork+0x10/0x20
[   65.695441] 
[   65.695611] Allocated by task 156:
[   65.695865]  kasan_save_stack+0x2c/0x58
[   65.696188]  kasan_set_track+0x2c/0x40
[   65.696525]  kasan_save_alloc_info+0x24/0x38
[   65.696978]  __kasan_kmalloc+0xa0/0xb8
[   65.697407]  kmalloc_trace+0x50/0x68
[   65.697811]  ksize_uaf+0xa8/0x320
[   65.698172]  kunit_try_run_case+0x7c/0x120
[   65.698859]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   65.699383]  kthread+0x1a4/0x1b8
[   65.699721]  ret_from_fork+0x10/0x20
[   65.700106] 
[   65.700297] Freed by task 156:
[   65.700583]  kasan_save_stack+0x2c/0x58
[   65.700901]  kasan_set_track+0x2c/0x40
[   65.701325]  kasan_save_free_info+0x38/0x60
[   65.702182]  __kasan_slab_free+0xe8/0x158
[   65.702588]  __kmem_cache_free+0x138/0x2b0
[   65.702995]  kfree+0x5c/0x70
[   65.703323]  ksize_uaf+0xc8/0x320
[   65.703697]  kunit_try_run_case+0x7c/0x120
[   65.704104]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   65.704621]  kthread+0x1a4/0x1b8
[   65.704956]  ret_from_fork+0x10/0x20
[   65.705364] 
[   65.705560] The buggy address belongs to the object at ffff0000c58ade00
[   65.705560]  which belongs to the cache kmalloc-128 of size 128
[   65.706656] The buggy address is located 0 bytes inside of
[   65.706656]  128-byte region [ffff0000c58ade00, ffff0000c58ade80)
[   65.707510] 
[   65.707693] The buggy address belongs to the physical page:
[   65.708101] page:00000000f12428ca refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ad
[   65.708764] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   65.709373] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   65.710443] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   65.711004] page dumped because: kasan: bad access detected
[   65.711417] 
[   65.711605] Memory state around the buggy address:
[   65.711987]  ffff0000c58add00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   65.712517]  ffff0000c58add80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.713051] >ffff0000c58ade00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   65.713959]                    ^
[   65.714257]  ffff0000c58ade80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.714863]  ffff0000c58adf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.715381] ==================================================================
[   65.716120] ==================================================================
[   65.716642] BUG: KASAN: use-after-free in ksize_uaf+0x128/0x320
[   65.717262] Read of size 1 at addr ffff0000c58ade78 by task kunit_try_catch/156
[   65.717821] 
[   65.718040] CPU: 0 PID: 156 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   65.718722] Hardware name: linux,dummy-virt (DT)
[   65.719088] Call trace:
[   65.719331]  dump_backtrace+0x110/0x120
[   65.719761]  show_stack+0x18/0x28
[   65.720138]  dump_stack_lvl+0x68/0x84
[   65.721029]  print_report+0x158/0x484
[   65.721423]  kasan_report+0x98/0xe0
[   65.722018]  __asan_load1+0x68/0x78
[   65.722391]  ksize_uaf+0x128/0x320
[   65.722768]  kunit_try_run_case+0x7c/0x120
[   65.723190]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   65.723699]  kthread+0x1a4/0x1b8
[   65.724027]  ret_from_fork+0x10/0x20
[   65.724424] 
[   65.724609] Allocated by task 156:
[   65.724907]  kasan_save_stack+0x2c/0x58
[   65.725298]  kasan_set_track+0x2c/0x40
[   65.725716]  kasan_save_alloc_info+0x24/0x38
[   65.726598]  __kasan_kmalloc+0xa0/0xb8
[   65.726975]  kmalloc_trace+0x50/0x68
[   65.727366]  ksize_uaf+0xa8/0x320
[   65.727748]  kunit_try_run_case+0x7c/0x120
[   65.728170]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   65.728662]  kthread+0x1a4/0x1b8
[   65.729013]  ret_from_fork+0x10/0x20
[   65.729415] 
[   65.729861] Freed by task 156:
[   65.730151]  kasan_save_stack+0x2c/0x58
[   65.730557]  kasan_set_track+0x2c/0x40
[   65.730917]  kasan_save_free_info+0x38/0x60
[   65.731348]  __kasan_slab_free+0xe8/0x158
[   65.731744]  __kmem_cache_free+0x138/0x2b0
[   65.732204]  kfree+0x5c/0x70
[   65.732535]  ksize_uaf+0xc8/0x320
[   65.732917]  kunit_try_run_case+0x7c/0x120
[   65.733352]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   65.734315]  kthread+0x1a4/0x1b8
[   65.734663]  ret_from_fork+0x10/0x20
[   65.735018] 
[   65.735195] The buggy address belongs to the object at ffff0000c58ade00
[   65.735195]  which belongs to the cache kmalloc-128 of size 128
[   65.736067] The buggy address is located 120 bytes inside of
[   65.736067]  128-byte region [ffff0000c58ade00, ffff0000c58ade80)
[   65.736895] 
[   65.737060] The buggy address belongs to the physical page:
[   65.737733] page:00000000f12428ca refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ad
[   65.738463] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   65.739067] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   65.739679] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   65.740254] page dumped because: kasan: bad access detected
[   65.740674] 
[   65.740854] Memory state around the buggy address:
[   65.741269]  ffff0000c58add00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   65.742004]  ffff0000c58add80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.742577] >ffff0000c58ade00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   65.743088]                                                                 ^
[   65.743605]  ffff0000c58ade80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.744185]  ffff0000c58adf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.744720] ==================================================================
[   65.649025] ==================================================================
[   65.650564] BUG: KASAN: use-after-free in ksize_uaf+0xdc/0x320
[   65.651519] Read of size 1 at addr ffff0000c58ade00 by task kunit_try_catch/156
[   65.652512] 
[   65.652827] CPU: 0 PID: 156 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   65.653867] Hardware name: linux,dummy-virt (DT)
[   65.654599] Call trace:
[   65.655005]  dump_backtrace+0x110/0x120
[   65.655653]  show_stack+0x18/0x28
[   65.656214]  dump_stack_lvl+0x68/0x84
[   65.656828]  print_report+0x158/0x484
[   65.657397]  kasan_report+0x98/0xe0
[   65.658119]  __kasan_check_byte+0x58/0x70
[   65.658604]  ksize+0x30/0x80
[   65.658890]  ksize_uaf+0xdc/0x320
[   65.659203]  kunit_try_run_case+0x7c/0x120
[   65.659651]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   65.660203]  kthread+0x1a4/0x1b8
[   65.660529]  ret_from_fork+0x10/0x20
[   65.660953] 
[   65.661126] Allocated by task 156:
[   65.661489]  kasan_save_stack+0x2c/0x58
[   65.662062]  kasan_set_track+0x2c/0x40
[   65.662537]  kasan_save_alloc_info+0x24/0x38
[   65.663263]  __kasan_kmalloc+0xa0/0xb8
[   65.663681]  kmalloc_trace+0x50/0x68
[   65.664073]  ksize_uaf+0xa8/0x320
[   65.664447]  kunit_try_run_case+0x7c/0x120
[   65.664874]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   65.665403]  kthread+0x1a4/0x1b8
[   65.665857]  ret_from_fork+0x10/0x20
[   65.666448] 
[   65.666686] Freed by task 156:
[   65.667004]  kasan_save_stack+0x2c/0x58
[   65.667425]  kasan_set_track+0x2c/0x40
[   65.667827]  kasan_save_free_info+0x38/0x60
[   65.668252]  __kasan_slab_free+0xe8/0x158
[   65.668645]  __kmem_cache_free+0x138/0x2b0
[   65.669073]  kfree+0x5c/0x70
[   65.669442]  ksize_uaf+0xc8/0x320
[   65.670310]  kunit_try_run_case+0x7c/0x120
[   65.670743]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   65.671278]  kthread+0x1a4/0x1b8
[   65.671636]  ret_from_fork+0x10/0x20
[   65.672009] 
[   65.672217] The buggy address belongs to the object at ffff0000c58ade00
[   65.672217]  which belongs to the cache kmalloc-128 of size 128
[   65.673139] The buggy address is located 0 bytes inside of
[   65.673139]  128-byte region [ffff0000c58ade00, ffff0000c58ade80)
[   65.674244] 
[   65.674484] The buggy address belongs to the physical page:
[   65.675155] page:00000000f12428ca refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ad
[   65.675845] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   65.676471] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   65.677098] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   65.678218] page dumped because: kasan: bad access detected
[   65.678684] 
[   65.678883] Memory state around the buggy address:
[   65.679298]  ffff0000c58add00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   65.679894]  ffff0000c58add80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.680472] >ffff0000c58ade00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   65.681018]                    ^
[   65.681332]  ffff0000c58ade80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.682407]  ffff0000c58adf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.682832] ==================================================================

[   31.840463] ==================================================================
[   31.840998] BUG: KASAN: use-after-free in ksize_uaf+0xd0/0x2f0
[   31.841423] Read of size 1 at addr ffff88810349f100 by task kunit_try_catch/262
[   31.841760] 
[   31.841899] CPU: 0 PID: 262 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   31.842329] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.842764] Call Trace:
[   31.842951]  <TASK>
[   31.843118]  dump_stack_lvl+0x49/0x62
[   31.843518]  print_report+0x189/0x492
[   31.843807]  ? kasan_complete_mode_report_info+0x7c/0x200
[   31.844086]  ? ksize_uaf+0xd0/0x2f0
[   31.844292]  kasan_report+0x10c/0x190
[   31.844845]  ? ksize_uaf+0xd0/0x2f0
[   31.845109]  ? ksize_uaf+0xd0/0x2f0
[   31.845515]  __kasan_check_byte+0x39/0x50
[   31.845780]  ksize+0x1e/0x70
[   31.846010]  ksize_uaf+0xd0/0x2f0
[   31.846243]  ? kmem_cache_oob+0x210/0x210
[   31.846615]  ? __kunit_add_resource+0xd1/0x100
[   31.846912]  ? kasan_test_init+0x13e/0x1b0
[   31.847158]  kunit_try_run_case+0x8f/0xd0
[   31.847560]  ? kunit_catch_run_case+0x80/0x80
[   31.847830]  ? kunit_try_catch_throw+0x40/0x40
[   31.848116]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   31.848734]  kthread+0x17b/0x1b0
[   31.848948]  ? kthread_complete_and_exit+0x30/0x30
[   31.849251]  ret_from_fork+0x22/0x30
[   31.849615]  </TASK>
[   31.849774] 
[   31.849909] Allocated by task 262:
[   31.850107]  kasan_save_stack+0x41/0x70
[   31.850528]  kasan_set_track+0x25/0x40
[   31.850745]  kasan_save_alloc_info+0x1e/0x30
[   31.851025]  __kasan_kmalloc+0xb6/0xc0
[   31.851254]  kmalloc_trace+0x48/0xb0
[   31.851617]  ksize_uaf+0x99/0x2f0
[   31.851834]  kunit_try_run_case+0x8f/0xd0
[   31.852090]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   31.852659]  kthread+0x17b/0x1b0
[   31.852832]  ret_from_fork+0x22/0x30
[   31.853094] 
[   31.853251] Freed by task 262:
[   31.853528]  kasan_save_stack+0x41/0x70
[   31.853777]  kasan_set_track+0x25/0x40
[   31.854045]  kasan_save_free_info+0x2e/0x50
[   31.854325]  ____kasan_slab_free+0x175/0x1d0
[   31.854707]  __kasan_slab_free+0x12/0x20
[   31.854974]  __kmem_cache_free+0x188/0x2f0
[   31.855250]  kfree+0x78/0x120
[   31.855553]  ksize_uaf+0xb9/0x2f0
[   31.855786]  kunit_try_run_case+0x8f/0xd0
[   31.856041]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   31.856465]  kthread+0x17b/0x1b0
[   31.856892]  ret_from_fork+0x22/0x30
[   31.857239] 
[   31.857375] The buggy address belongs to the object at ffff88810349f100
[   31.857375]  which belongs to the cache kmalloc-128 of size 128
[   31.858139] The buggy address is located 0 bytes inside of
[   31.858139]  128-byte region [ffff88810349f100, ffff88810349f180)
[   31.858684] 
[   31.858799] The buggy address belongs to the physical page:
[   31.859077] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10349f
[   31.859764] flags: 0x200000000000200(slab|node=0|zone=2)
[   31.860104] raw: 0200000000000200 0000000000000000 dead000000000122 ffff8881000418c0
[   31.860806] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   31.861198] page dumped because: kasan: bad access detected
[   31.861584] 
[   31.861711] Memory state around the buggy address:
[   31.861956]  ffff88810349f000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   31.862459]  ffff88810349f080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.862821] >ffff88810349f100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.863150]                    ^
[   31.863422]  ffff88810349f180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.863796]  ffff88810349f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.864148] ==================================================================
[   31.896286] ==================================================================
[   31.897020] BUG: KASAN: use-after-free in ksize_uaf+0x12e/0x2f0
[   31.897401] Read of size 1 at addr ffff88810349f178 by task kunit_try_catch/262
[   31.897774] 
[   31.897895] CPU: 0 PID: 262 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   31.898288] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.898723] Call Trace:
[   31.898892]  <TASK>
[   31.899047]  dump_stack_lvl+0x49/0x62
[   31.899370]  print_report+0x189/0x492
[   31.899579]  ? kasan_complete_mode_report_info+0x7c/0x200
[   31.899881]  ? ksize_uaf+0x12e/0x2f0
[   31.900055]  kasan_report+0x10c/0x190
[   31.900311]  ? ksize_uaf+0x12e/0x2f0
[   31.900531]  __asan_load1+0x62/0x70
[   31.900693]  ksize_uaf+0x12e/0x2f0
[   31.900997]  ? kmem_cache_oob+0x210/0x210
[   31.901570]  ? __kunit_add_resource+0xd1/0x100
[   31.901986]  ? kasan_test_init+0x13e/0x1b0
[   31.902201]  kunit_try_run_case+0x8f/0xd0
[   31.902475]  ? kunit_catch_run_case+0x80/0x80
[   31.902740]  ? kunit_try_catch_throw+0x40/0x40
[   31.903008]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   31.903356]  kthread+0x17b/0x1b0
[   31.903571]  ? kthread_complete_and_exit+0x30/0x30
[   31.903861]  ret_from_fork+0x22/0x30
[   31.904123]  </TASK>
[   31.904318] 
[   31.904428] Allocated by task 262:
[   31.904643]  kasan_save_stack+0x41/0x70
[   31.904908]  kasan_set_track+0x25/0x40
[   31.905184]  kasan_save_alloc_info+0x1e/0x30
[   31.905392]  __kasan_kmalloc+0xb6/0xc0
[   31.905815]  kmalloc_trace+0x48/0xb0
[   31.906067]  ksize_uaf+0x99/0x2f0
[   31.906589]  kunit_try_run_case+0x8f/0xd0
[   31.906982]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   31.907331]  kthread+0x17b/0x1b0
[   31.907567]  ret_from_fork+0x22/0x30
[   31.907778] 
[   31.907897] Freed by task 262:
[   31.908063]  kasan_save_stack+0x41/0x70
[   31.908328]  kasan_set_track+0x25/0x40
[   31.908657]  kasan_save_free_info+0x2e/0x50
[   31.908913]  ____kasan_slab_free+0x175/0x1d0
[   31.909169]  __kasan_slab_free+0x12/0x20
[   31.909530]  __kmem_cache_free+0x188/0x2f0
[   31.910051]  kfree+0x78/0x120
[   31.910215]  ksize_uaf+0xb9/0x2f0
[   31.910458]  kunit_try_run_case+0x8f/0xd0
[   31.910702]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   31.910978]  kthread+0x17b/0x1b0
[   31.911213]  ret_from_fork+0x22/0x30
[   31.911429] 
[   31.911544] The buggy address belongs to the object at ffff88810349f100
[   31.911544]  which belongs to the cache kmalloc-128 of size 128
[   31.912109] The buggy address is located 120 bytes inside of
[   31.912109]  128-byte region [ffff88810349f100, ffff88810349f180)
[   31.912748] 
[   31.912864] The buggy address belongs to the physical page:
[   31.913173] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10349f
[   31.913631] flags: 0x200000000000200(slab|node=0|zone=2)
[   31.914039] raw: 0200000000000200 0000000000000000 dead000000000122 ffff8881000418c0
[   31.914824] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   31.915157] page dumped because: kasan: bad access detected
[   31.915547] 
[   31.915642] Memory state around the buggy address:
[   31.915912]  ffff88810349f000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   31.916309]  ffff88810349f080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.916631] >ffff88810349f100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.916987]                                                                 ^
[   31.917338]  ffff88810349f180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.917929]  ffff88810349f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.918405] ==================================================================
[   31.867226] ==================================================================
[   31.867613] BUG: KASAN: use-after-free in ksize_uaf+0xfd/0x2f0
[   31.868274] Read of size 1 at addr ffff88810349f100 by task kunit_try_catch/262
[   31.868684] 
[   31.868791] CPU: 0 PID: 262 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   31.869233] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.869641] Call Trace:
[   31.869868]  <TASK>
[   31.870062]  dump_stack_lvl+0x49/0x62
[   31.870373]  print_report+0x189/0x492
[   31.870713]  ? kasan_complete_mode_report_info+0x7c/0x200
[   31.871089]  ? ksize_uaf+0xfd/0x2f0
[   31.871327]  kasan_report+0x10c/0x190
[   31.871614]  ? ksize_uaf+0xfd/0x2f0
[   31.872206]  __asan_load1+0x62/0x70
[   31.872471]  ksize_uaf+0xfd/0x2f0
[   31.872742]  ? kmem_cache_oob+0x210/0x210
[   31.873026]  ? __kunit_add_resource+0xd1/0x100
[   31.873364]  ? kasan_test_init+0x13e/0x1b0
[   31.873639]  kunit_try_run_case+0x8f/0xd0
[   31.873904]  ? kunit_catch_run_case+0x80/0x80
[   31.874178]  ? kunit_try_catch_throw+0x40/0x40
[   31.874496]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   31.874844]  kthread+0x17b/0x1b0
[   31.875096]  ? kthread_complete_and_exit+0x30/0x30
[   31.875800]  ret_from_fork+0x22/0x30
[   31.876080]  </TASK>
[   31.876234] 
[   31.876321] Allocated by task 262:
[   31.876584]  kasan_save_stack+0x41/0x70
[   31.876784]  kasan_set_track+0x25/0x40
[   31.877009]  kasan_save_alloc_info+0x1e/0x30
[   31.877629]  __kasan_kmalloc+0xb6/0xc0
[   31.877895]  kmalloc_trace+0x48/0xb0
[   31.878069]  ksize_uaf+0x99/0x2f0
[   31.878247]  kunit_try_run_case+0x8f/0xd0
[   31.878443]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   31.878674]  kthread+0x17b/0x1b0
[   31.878834]  ret_from_fork+0x22/0x30
[   31.879002] 
[   31.879088] Freed by task 262:
[   31.879246]  kasan_save_stack+0x41/0x70
[   31.879774]  kasan_set_track+0x25/0x40
[   31.880232]  kasan_save_free_info+0x2e/0x50
[   31.881184]  ____kasan_slab_free+0x175/0x1d0
[   31.881684]  __kasan_slab_free+0x12/0x20
[   31.882120]  __kmem_cache_free+0x188/0x2f0
[   31.882658]  kfree+0x78/0x120
[   31.883026]  ksize_uaf+0xb9/0x2f0
[   31.883454]  kunit_try_run_case+0x8f/0xd0
[   31.883898]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   31.884504]  kthread+0x17b/0x1b0
[   31.885192]  ret_from_fork+0x22/0x30
[   31.885622] 
[   31.885817] The buggy address belongs to the object at ffff88810349f100
[   31.885817]  which belongs to the cache kmalloc-128 of size 128
[   31.887099] The buggy address is located 0 bytes inside of
[   31.887099]  128-byte region [ffff88810349f100, ffff88810349f180)
[   31.888251] 
[   31.888549] The buggy address belongs to the physical page:
[   31.888893] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10349f
[   31.889264] flags: 0x200000000000200(slab|node=0|zone=2)
[   31.889902] raw: 0200000000000200 0000000000000000 dead000000000122 ffff8881000418c0
[   31.890692] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   31.891506] page dumped because: kasan: bad access detected
[   31.891911] 
[   31.892002] Memory state around the buggy address:
[   31.892200]  ffff88810349f000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   31.892892]  ffff88810349f080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.893741] >ffff88810349f100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.894484]                    ^
[   31.894842]  ffff88810349f180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.895564]  ffff88810349f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.895814] ==================================================================