Hay
Date
June 2, 2025, 2:11 p.m.

Environment
e850-96
qemu-arm64
qemu-x86_64

[   29.788242] ==================================================================
[   29.795255] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8
[   29.801587] Read of size 1 at addr ffff000800dac200 by task kunit_try_catch/243
[   29.808879] 
[   29.810365] CPU: 1 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   29.810418] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.810434] Hardware name: WinLink E850-96 board (DT)
[   29.810454] Call trace:
[   29.810465]  show_stack+0x20/0x38 (C)
[   29.810495]  dump_stack_lvl+0x8c/0xd0
[   29.810529]  print_report+0x118/0x608
[   29.810557]  kasan_report+0xdc/0x128
[   29.810585]  __asan_report_load1_noabort+0x20/0x30
[   29.810616]  ksize_uaf+0x598/0x5f8
[   29.810646]  kunit_try_run_case+0x170/0x3f0
[   29.810679]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.810717]  kthread+0x328/0x630
[   29.810754]  ret_from_fork+0x10/0x20
[   29.810788] 
[   29.872421] Allocated by task 243:
[   29.875808]  kasan_save_stack+0x3c/0x68
[   29.879624]  kasan_save_track+0x20/0x40
[   29.883444]  kasan_save_alloc_info+0x40/0x58
[   29.887697]  __kasan_kmalloc+0xd4/0xd8
[   29.891430]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.895943]  ksize_uaf+0xb8/0x5f8
[   29.899242]  kunit_try_run_case+0x170/0x3f0
[   29.903409]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.908877]  kthread+0x328/0x630
[   29.912089]  ret_from_fork+0x10/0x20
[   29.915648] 
[   29.917124] Freed by task 243:
[   29.920163]  kasan_save_stack+0x3c/0x68
[   29.923981]  kasan_save_track+0x20/0x40
[   29.927800]  kasan_save_free_info+0x4c/0x78
[   29.931967]  __kasan_slab_free+0x6c/0x98
[   29.935873]  kfree+0x214/0x3c8
[   29.938911]  ksize_uaf+0x11c/0x5f8
[   29.942298]  kunit_try_run_case+0x170/0x3f0
[   29.946463]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.951932]  kthread+0x328/0x630
[   29.955144]  ret_from_fork+0x10/0x20
[   29.958703] 
[   29.960180] The buggy address belongs to the object at ffff000800dac200
[   29.960180]  which belongs to the cache kmalloc-128 of size 128
[   29.972679] The buggy address is located 0 bytes inside of
[   29.972679]  freed 128-byte region [ffff000800dac200, ffff000800dac280)
[   29.984744] 
[   29.986224] The buggy address belongs to the physical page:
[   29.991780] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880dac
[   29.999761] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.007403] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.014346] page_type: f5(slab)
[   30.017478] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   30.025201] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.032928] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   30.040739] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.048552] head: 0bfffe0000000001 fffffdffe0036b01 00000000ffffffff 00000000ffffffff
[   30.056364] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   30.064170] page dumped because: kasan: bad access detected
[   30.069725] 
[   30.071201] Memory state around the buggy address:
[   30.075981]  ffff000800dac100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.083184]  ffff000800dac180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.090389] >ffff000800dac200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.097590]                    ^
[   30.100805]  ffff000800dac280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.108009]  ffff000800dac300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.115211] ==================================================================
[   29.448975] ==================================================================
[   29.458801] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8
[   29.465135] Read of size 1 at addr ffff000800dac200 by task kunit_try_catch/243
[   29.472425] 
[   29.473911] CPU: 1 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   29.473968] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.473983] Hardware name: WinLink E850-96 board (DT)
[   29.474007] Call trace:
[   29.474020]  show_stack+0x20/0x38 (C)
[   29.474061]  dump_stack_lvl+0x8c/0xd0
[   29.474095]  print_report+0x118/0x608
[   29.474130]  kasan_report+0xdc/0x128
[   29.474159]  __kasan_check_byte+0x54/0x70
[   29.474188]  ksize+0x30/0x88
[   29.474216]  ksize_uaf+0x168/0x5f8
[   29.474250]  kunit_try_run_case+0x170/0x3f0
[   29.474288]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.474330]  kthread+0x328/0x630
[   29.474364]  ret_from_fork+0x10/0x20
[   29.474399] 
[   29.538050] Allocated by task 243:
[   29.541439]  kasan_save_stack+0x3c/0x68
[   29.545254]  kasan_save_track+0x20/0x40
[   29.549074]  kasan_save_alloc_info+0x40/0x58
[   29.553327]  __kasan_kmalloc+0xd4/0xd8
[   29.557060]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.561573]  ksize_uaf+0xb8/0x5f8
[   29.564872]  kunit_try_run_case+0x170/0x3f0
[   29.569039]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.574507]  kthread+0x328/0x630
[   29.577719]  ret_from_fork+0x10/0x20
[   29.581278] 
[   29.582754] Freed by task 243:
[   29.585792]  kasan_save_stack+0x3c/0x68
[   29.589611]  kasan_save_track+0x20/0x40
[   29.593431]  kasan_save_free_info+0x4c/0x78
[   29.597597]  __kasan_slab_free+0x6c/0x98
[   29.601503]  kfree+0x214/0x3c8
[   29.604541]  ksize_uaf+0x11c/0x5f8
[   29.607928]  kunit_try_run_case+0x170/0x3f0
[   29.612094]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.617562]  kthread+0x328/0x630
[   29.620774]  ret_from_fork+0x10/0x20
[   29.624333] 
[   29.625811] The buggy address belongs to the object at ffff000800dac200
[   29.625811]  which belongs to the cache kmalloc-128 of size 128
[   29.638311] The buggy address is located 0 bytes inside of
[   29.638311]  freed 128-byte region [ffff000800dac200, ffff000800dac280)
[   29.650374] 
[   29.651854] The buggy address belongs to the physical page:
[   29.657409] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880dac
[   29.665395] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.673034] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.679976] page_type: f5(slab)
[   29.683112] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   29.690832] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.698558] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   29.706370] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.714182] head: 0bfffe0000000001 fffffdffe0036b01 00000000ffffffff 00000000ffffffff
[   29.721994] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   29.729800] page dumped because: kasan: bad access detected
[   29.735355] 
[   29.736831] Memory state around the buggy address:
[   29.741612]  ffff000800dac100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.748814]  ffff000800dac180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.756020] >ffff000800dac200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.763220]                    ^
[   29.766435]  ffff000800dac280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.773640]  ffff000800dac300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.780842] ==================================================================
[   30.122630] ==================================================================
[   30.129625] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8
[   30.135957] Read of size 1 at addr ffff000800dac278 by task kunit_try_catch/243
[   30.143249] 
[   30.144733] CPU: 1 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   30.144787] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.144802] Hardware name: WinLink E850-96 board (DT)
[   30.144820] Call trace:
[   30.144832]  show_stack+0x20/0x38 (C)
[   30.144862]  dump_stack_lvl+0x8c/0xd0
[   30.144896]  print_report+0x118/0x608
[   30.144924]  kasan_report+0xdc/0x128
[   30.144951]  __asan_report_load1_noabort+0x20/0x30
[   30.144983]  ksize_uaf+0x544/0x5f8
[   30.145016]  kunit_try_run_case+0x170/0x3f0
[   30.145049]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.145087]  kthread+0x328/0x630
[   30.145120]  ret_from_fork+0x10/0x20
[   30.145152] 
[   30.206789] Allocated by task 243:
[   30.210177]  kasan_save_stack+0x3c/0x68
[   30.213994]  kasan_save_track+0x20/0x40
[   30.217814]  kasan_save_alloc_info+0x40/0x58
[   30.222067]  __kasan_kmalloc+0xd4/0xd8
[   30.225800]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.230313]  ksize_uaf+0xb8/0x5f8
[   30.233612]  kunit_try_run_case+0x170/0x3f0
[   30.237779]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.243247]  kthread+0x328/0x630
[   30.246459]  ret_from_fork+0x10/0x20
[   30.250018] 
[   30.251494] Freed by task 243:
[   30.254533]  kasan_save_stack+0x3c/0x68
[   30.258351]  kasan_save_track+0x20/0x40
[   30.262170]  kasan_save_free_info+0x4c/0x78
[   30.266337]  __kasan_slab_free+0x6c/0x98
[   30.270243]  kfree+0x214/0x3c8
[   30.273281]  ksize_uaf+0x11c/0x5f8
[   30.276667]  kunit_try_run_case+0x170/0x3f0
[   30.280833]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.286302]  kthread+0x328/0x630
[   30.289514]  ret_from_fork+0x10/0x20
[   30.293073] 
[   30.294550] The buggy address belongs to the object at ffff000800dac200
[   30.294550]  which belongs to the cache kmalloc-128 of size 128
[   30.307049] The buggy address is located 120 bytes inside of
[   30.307049]  freed 128-byte region [ffff000800dac200, ffff000800dac280)
[   30.319288] 
[   30.320763] The buggy address belongs to the physical page:
[   30.326324] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880dac
[   30.334307] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.341945] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.348889] page_type: f5(slab)
[   30.352023] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   30.359745] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.367471] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   30.375282] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.383096] head: 0bfffe0000000001 fffffdffe0036b01 00000000ffffffff 00000000ffffffff
[   30.390908] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   30.398713] page dumped because: kasan: bad access detected
[   30.404268] 
[   30.405745] Memory state around the buggy address:
[   30.410525]  ffff000800dac100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.417727]  ffff000800dac180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.424932] >ffff000800dac200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.432133]                                                                 ^
[   30.439255]  ffff000800dac280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.446459]  ffff000800dac300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.453661] ==================================================================

[   19.230386] ==================================================================
[   19.230466] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8
[   19.230522] Read of size 1 at addr fff00000c3f75900 by task kunit_try_catch/199
[   19.230598] 
[   19.230630] CPU: 1 UID: 0 PID: 199 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   19.230715] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   19.230762] Hardware name: linux,dummy-virt (DT)
[   19.230794] Call trace:
[   19.230816]  show_stack+0x20/0x38 (C)
[   19.230862]  dump_stack_lvl+0x8c/0xd0
[   19.230921]  print_report+0x118/0x608
[   19.230967]  kasan_report+0xdc/0x128
[   19.231029]  __asan_report_load1_noabort+0x20/0x30
[   19.231085]  ksize_uaf+0x598/0x5f8
[   19.231198]  kunit_try_run_case+0x170/0x3f0
[   19.231253]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.231314]  kthread+0x328/0x630
[   19.231378]  ret_from_fork+0x10/0x20
[   19.231455] 
[   19.231523] Allocated by task 199:
[   19.231560]  kasan_save_stack+0x3c/0x68
[   19.231618]  kasan_save_track+0x20/0x40
[   19.231655]  kasan_save_alloc_info+0x40/0x58
[   19.231696]  __kasan_kmalloc+0xd4/0xd8
[   19.231733]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.231774]  ksize_uaf+0xb8/0x5f8
[   19.231821]  kunit_try_run_case+0x170/0x3f0
[   19.231860]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.231931]  kthread+0x328/0x630
[   19.231978]  ret_from_fork+0x10/0x20
[   19.232097] 
[   19.232156] Freed by task 199:
[   19.232191]  kasan_save_stack+0x3c/0x68
[   19.232299]  kasan_save_track+0x20/0x40
[   19.232394]  kasan_save_free_info+0x4c/0x78
[   19.232442]  __kasan_slab_free+0x6c/0x98
[   19.232498]  kfree+0x214/0x3c8
[   19.232534]  ksize_uaf+0x11c/0x5f8
[   19.232570]  kunit_try_run_case+0x170/0x3f0
[   19.232792]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.232895]  kthread+0x328/0x630
[   19.232931]  ret_from_fork+0x10/0x20
[   19.232997] 
[   19.233037] The buggy address belongs to the object at fff00000c3f75900
[   19.233037]  which belongs to the cache kmalloc-128 of size 128
[   19.233116] The buggy address is located 0 bytes inside of
[   19.233116]  freed 128-byte region [fff00000c3f75900, fff00000c3f75980)
[   19.233234] 
[   19.233289] The buggy address belongs to the physical page:
[   19.233399] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f75
[   19.233557] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.233607] page_type: f5(slab)
[   19.233659] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.233986] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.234153] page dumped because: kasan: bad access detected
[   19.234263] 
[   19.234466] Memory state around the buggy address:
[   19.234501]  fff00000c3f75800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.234792]  fff00000c3f75880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.234984] >fff00000c3f75900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.235121]                    ^
[   19.235214]  fff00000c3f75980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.235274]  fff00000c3f75a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.235312] ==================================================================
[   19.236052] ==================================================================
[   19.236214] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8
[   19.236323] Read of size 1 at addr fff00000c3f75978 by task kunit_try_catch/199
[   19.236421] 
[   19.236470] CPU: 1 UID: 0 PID: 199 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   19.236555] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   19.236623] Hardware name: linux,dummy-virt (DT)
[   19.236654] Call trace:
[   19.236676]  show_stack+0x20/0x38 (C)
[   19.236833]  dump_stack_lvl+0x8c/0xd0
[   19.236992]  print_report+0x118/0x608
[   19.237041]  kasan_report+0xdc/0x128
[   19.237106]  __asan_report_load1_noabort+0x20/0x30
[   19.237159]  ksize_uaf+0x544/0x5f8
[   19.237206]  kunit_try_run_case+0x170/0x3f0
[   19.237262]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.237384]  kthread+0x328/0x630
[   19.237451]  ret_from_fork+0x10/0x20
[   19.237499] 
[   19.237519] Allocated by task 199:
[   19.237782]  kasan_save_stack+0x3c/0x68
[   19.237832]  kasan_save_track+0x20/0x40
[   19.237917]  kasan_save_alloc_info+0x40/0x58
[   19.238044]  __kasan_kmalloc+0xd4/0xd8
[   19.238160]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.238272]  ksize_uaf+0xb8/0x5f8
[   19.238374]  kunit_try_run_case+0x170/0x3f0
[   19.238415]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.238565]  kthread+0x328/0x630
[   19.238602]  ret_from_fork+0x10/0x20
[   19.238816] 
[   19.238898] Freed by task 199:
[   19.238959]  kasan_save_stack+0x3c/0x68
[   19.239003]  kasan_save_track+0x20/0x40
[   19.239045]  kasan_save_free_info+0x4c/0x78
[   19.239095]  __kasan_slab_free+0x6c/0x98
[   19.239132]  kfree+0x214/0x3c8
[   19.239170]  ksize_uaf+0x11c/0x5f8
[   19.239207]  kunit_try_run_case+0x170/0x3f0
[   19.239257]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.239304]  kthread+0x328/0x630
[   19.239340]  ret_from_fork+0x10/0x20
[   19.239386] 
[   19.239405] The buggy address belongs to the object at fff00000c3f75900
[   19.239405]  which belongs to the cache kmalloc-128 of size 128
[   19.239463] The buggy address is located 120 bytes inside of
[   19.239463]  freed 128-byte region [fff00000c3f75900, fff00000c3f75980)
[   19.239524] 
[   19.239543] The buggy address belongs to the physical page:
[   19.239571] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f75
[   19.239748] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.239798] page_type: f5(slab)
[   19.239836] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.239887] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.239927] page dumped because: kasan: bad access detected
[   19.239958] 
[   19.239977] Memory state around the buggy address:
[   19.240009]  fff00000c3f75800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.240126]  fff00000c3f75880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.240293] >fff00000c3f75900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.240489]                                                                 ^
[   19.240576]  fff00000c3f75980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.240687]  fff00000c3f75a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.240728] ==================================================================
[   19.224771] ==================================================================
[   19.224913] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8
[   19.224982] Read of size 1 at addr fff00000c3f75900 by task kunit_try_catch/199
[   19.225039] 
[   19.225087] CPU: 1 UID: 0 PID: 199 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   19.225195] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   19.225263] Hardware name: linux,dummy-virt (DT)
[   19.225311] Call trace:
[   19.225362]  show_stack+0x20/0x38 (C)
[   19.225420]  dump_stack_lvl+0x8c/0xd0
[   19.225497]  print_report+0x118/0x608
[   19.225546]  kasan_report+0xdc/0x128
[   19.225591]  __kasan_check_byte+0x54/0x70
[   19.225748]  ksize+0x30/0x88
[   19.225830]  ksize_uaf+0x168/0x5f8
[   19.225947]  kunit_try_run_case+0x170/0x3f0
[   19.226090]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.226217]  kthread+0x328/0x630
[   19.226333]  ret_from_fork+0x10/0x20
[   19.226407] 
[   19.226426] Allocated by task 199:
[   19.226455]  kasan_save_stack+0x3c/0x68
[   19.226515]  kasan_save_track+0x20/0x40
[   19.226553]  kasan_save_alloc_info+0x40/0x58
[   19.226593]  __kasan_kmalloc+0xd4/0xd8
[   19.226630]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.226674]  ksize_uaf+0xb8/0x5f8
[   19.226711]  kunit_try_run_case+0x170/0x3f0
[   19.226752]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.226951]  kthread+0x328/0x630
[   19.227084]  ret_from_fork+0x10/0x20
[   19.227164] 
[   19.227198] Freed by task 199:
[   19.227225]  kasan_save_stack+0x3c/0x68
[   19.227263]  kasan_save_track+0x20/0x40
[   19.227299]  kasan_save_free_info+0x4c/0x78
[   19.227339]  __kasan_slab_free+0x6c/0x98
[   19.227527]  kfree+0x214/0x3c8
[   19.227610]  ksize_uaf+0x11c/0x5f8
[   19.227735]  kunit_try_run_case+0x170/0x3f0
[   19.227848]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.228003]  kthread+0x328/0x630
[   19.228052]  ret_from_fork+0x10/0x20
[   19.228087] 
[   19.228150] The buggy address belongs to the object at fff00000c3f75900
[   19.228150]  which belongs to the cache kmalloc-128 of size 128
[   19.228231] The buggy address is located 0 bytes inside of
[   19.228231]  freed 128-byte region [fff00000c3f75900, fff00000c3f75980)
[   19.228301] 
[   19.228331] The buggy address belongs to the physical page:
[   19.228383] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f75
[   19.228450] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.228505] page_type: f5(slab)
[   19.228559] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.228611] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.228653] page dumped because: kasan: bad access detected
[   19.228685] 
[   19.228704] Memory state around the buggy address:
[   19.228761]  fff00000c3f75800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.228814]  fff00000c3f75880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.228867] >fff00000c3f75900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.228905]                    ^
[   19.228932]  fff00000c3f75980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.228986]  fff00000c3f75a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.229039] ==================================================================

[   17.189849] ==================================================================
[   17.190530] BUG: KASAN: slab-use-after-free in ksize_uaf+0x19d/0x6c0
[   17.191102] Read of size 1 at addr ffff888102b31100 by task kunit_try_catch/217
[   17.191570] 
[   17.191757] CPU: 0 UID: 0 PID: 217 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT(voluntary) 
[   17.191860] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.191882] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.191925] Call Trace:
[   17.191955]  <TASK>
[   17.191996]  dump_stack_lvl+0x73/0xb0
[   17.192063]  print_report+0xd1/0x650
[   17.192116]  ? __virt_addr_valid+0x1db/0x2d0
[   17.192173]  ? ksize_uaf+0x19d/0x6c0
[   17.192221]  ? kasan_complete_mode_report_info+0x64/0x200
[   17.192260]  ? ksize_uaf+0x19d/0x6c0
[   17.192298]  kasan_report+0x141/0x180
[   17.192341]  ? ksize_uaf+0x19d/0x6c0
[   17.192390]  ? ksize_uaf+0x19d/0x6c0
[   17.192430]  __kasan_check_byte+0x3d/0x50
[   17.192480]  ksize+0x20/0x60
[   17.192519]  ksize_uaf+0x19d/0x6c0
[   17.192555]  ? __pfx_ksize_uaf+0x10/0x10
[   17.192591]  ? __schedule+0x10cc/0x2b30
[   17.192627]  ? __pfx_read_tsc+0x10/0x10
[   17.192664]  ? ktime_get_ts64+0x86/0x230
[   17.192742]  kunit_try_run_case+0x1a5/0x480
[   17.192802]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.192844]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.192896]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.192940]  ? __kthread_parkme+0x82/0x180
[   17.192981]  ? preempt_count_sub+0x50/0x80
[   17.193025]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.193066]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.193108]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.193152]  kthread+0x337/0x6f0
[   17.193190]  ? trace_preempt_on+0x20/0xc0
[   17.193240]  ? __pfx_kthread+0x10/0x10
[   17.193281]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.193325]  ? calculate_sigpending+0x7b/0xa0
[   17.193366]  ? __pfx_kthread+0x10/0x10
[   17.193415]  ret_from_fork+0x41/0x80
[   17.193455]  ? __pfx_kthread+0x10/0x10
[   17.193492]  ret_from_fork_asm+0x1a/0x30
[   17.193549]  </TASK>
[   17.193572] 
[   17.205769] Allocated by task 217:
[   17.206172]  kasan_save_stack+0x45/0x70
[   17.206570]  kasan_save_track+0x18/0x40
[   17.207817]  kasan_save_alloc_info+0x3b/0x50
[   17.208245]  __kasan_kmalloc+0xb7/0xc0
[   17.208581]  __kmalloc_cache_noprof+0x189/0x420
[   17.208851]  ksize_uaf+0xaa/0x6c0
[   17.209049]  kunit_try_run_case+0x1a5/0x480
[   17.209421]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.210091]  kthread+0x337/0x6f0
[   17.210586]  ret_from_fork+0x41/0x80
[   17.210936]  ret_from_fork_asm+0x1a/0x30
[   17.211594] 
[   17.211810] Freed by task 217:
[   17.212111]  kasan_save_stack+0x45/0x70
[   17.212550]  kasan_save_track+0x18/0x40
[   17.212923]  kasan_save_free_info+0x3f/0x60
[   17.213386]  __kasan_slab_free+0x56/0x70
[   17.213770]  kfree+0x222/0x3f0
[   17.214069]  ksize_uaf+0x12c/0x6c0
[   17.214546]  kunit_try_run_case+0x1a5/0x480
[   17.214804]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.215154]  kthread+0x337/0x6f0
[   17.215790]  ret_from_fork+0x41/0x80
[   17.216141]  ret_from_fork_asm+0x1a/0x30
[   17.216515] 
[   17.216712] The buggy address belongs to the object at ffff888102b31100
[   17.216712]  which belongs to the cache kmalloc-128 of size 128
[   17.217597] The buggy address is located 0 bytes inside of
[   17.217597]  freed 128-byte region [ffff888102b31100, ffff888102b31180)
[   17.218343] 
[   17.218484] The buggy address belongs to the physical page:
[   17.219093] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b31
[   17.219919] flags: 0x200000000000000(node=0|zone=2)
[   17.221031] page_type: f5(slab)
[   17.221498] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   17.221798] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.222315] page dumped because: kasan: bad access detected
[   17.222609] 
[   17.222729] Memory state around the buggy address:
[   17.223221]  ffff888102b31000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.223773]  ffff888102b31080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.224546] >ffff888102b31100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.224855]                    ^
[   17.225167]  ffff888102b31180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.225828]  ffff888102b31200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.226103] ==================================================================
[   17.270784] ==================================================================
[   17.271134] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5e4/0x6c0
[   17.271480] Read of size 1 at addr ffff888102b31178 by task kunit_try_catch/217
[   17.271790] 
[   17.272097] CPU: 0 UID: 0 PID: 217 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT(voluntary) 
[   17.272254] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.272286] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.272335] Call Trace:
[   17.272378]  <TASK>
[   17.272419]  dump_stack_lvl+0x73/0xb0
[   17.272494]  print_report+0xd1/0x650
[   17.272550]  ? __virt_addr_valid+0x1db/0x2d0
[   17.272604]  ? ksize_uaf+0x5e4/0x6c0
[   17.272651]  ? kasan_complete_mode_report_info+0x64/0x200
[   17.272701]  ? ksize_uaf+0x5e4/0x6c0
[   17.272760]  kasan_report+0x141/0x180
[   17.272815]  ? ksize_uaf+0x5e4/0x6c0
[   17.272872]  __asan_report_load1_noabort+0x18/0x20
[   17.272911]  ksize_uaf+0x5e4/0x6c0
[   17.272953]  ? __pfx_ksize_uaf+0x10/0x10
[   17.272999]  ? __schedule+0x10cc/0x2b30
[   17.273044]  ? __pfx_read_tsc+0x10/0x10
[   17.273125]  ? ktime_get_ts64+0x86/0x230
[   17.273189]  kunit_try_run_case+0x1a5/0x480
[   17.273237]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.273273]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.273312]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.273350]  ? __kthread_parkme+0x82/0x180
[   17.273389]  ? preempt_count_sub+0x50/0x80
[   17.273432]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.273472]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.273510]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.273549]  kthread+0x337/0x6f0
[   17.273578]  ? trace_preempt_on+0x20/0xc0
[   17.273623]  ? __pfx_kthread+0x10/0x10
[   17.273656]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.273692]  ? calculate_sigpending+0x7b/0xa0
[   17.273902]  ? __pfx_kthread+0x10/0x10
[   17.273950]  ret_from_fork+0x41/0x80
[   17.273998]  ? __pfx_kthread+0x10/0x10
[   17.274036]  ret_from_fork_asm+0x1a/0x30
[   17.274104]  </TASK>
[   17.274238] 
[   17.287886] Allocated by task 217:
[   17.288526]  kasan_save_stack+0x45/0x70
[   17.288961]  kasan_save_track+0x18/0x40
[   17.289409]  kasan_save_alloc_info+0x3b/0x50
[   17.289638]  __kasan_kmalloc+0xb7/0xc0
[   17.289985]  __kmalloc_cache_noprof+0x189/0x420
[   17.291087]  ksize_uaf+0xaa/0x6c0
[   17.291321]  kunit_try_run_case+0x1a5/0x480
[   17.291581]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.292021]  kthread+0x337/0x6f0
[   17.292254]  ret_from_fork+0x41/0x80
[   17.292504]  ret_from_fork_asm+0x1a/0x30
[   17.292729] 
[   17.293386] Freed by task 217:
[   17.293675]  kasan_save_stack+0x45/0x70
[   17.293962]  kasan_save_track+0x18/0x40
[   17.295041]  kasan_save_free_info+0x3f/0x60
[   17.295441]  __kasan_slab_free+0x56/0x70
[   17.295691]  kfree+0x222/0x3f0
[   17.296089]  ksize_uaf+0x12c/0x6c0
[   17.296671]  kunit_try_run_case+0x1a5/0x480
[   17.297075]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.297505]  kthread+0x337/0x6f0
[   17.297846]  ret_from_fork+0x41/0x80
[   17.298160]  ret_from_fork_asm+0x1a/0x30
[   17.298439] 
[   17.298574] The buggy address belongs to the object at ffff888102b31100
[   17.298574]  which belongs to the cache kmalloc-128 of size 128
[   17.299191] The buggy address is located 120 bytes inside of
[   17.299191]  freed 128-byte region [ffff888102b31100, ffff888102b31180)
[   17.301186] 
[   17.301323] The buggy address belongs to the physical page:
[   17.301643] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b31
[   17.302077] flags: 0x200000000000000(node=0|zone=2)
[   17.302744] page_type: f5(slab)
[   17.303034] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   17.303499] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.304176] page dumped because: kasan: bad access detected
[   17.305294] 
[   17.305426] Memory state around the buggy address:
[   17.305648]  ffff888102b31000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.306239]  ffff888102b31080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.306812] >ffff888102b31100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.307969]                                                                 ^
[   17.308624]  ffff888102b31180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.308874]  ffff888102b31200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.309108] ==================================================================
[   17.228926] ==================================================================
[   17.229472] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5fe/0x6c0
[   17.229802] Read of size 1 at addr ffff888102b31100 by task kunit_try_catch/217
[   17.230507] 
[   17.231189] CPU: 0 UID: 0 PID: 217 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT(voluntary) 
[   17.231481] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.231511] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.231560] Call Trace:
[   17.231599]  <TASK>
[   17.231643]  dump_stack_lvl+0x73/0xb0
[   17.231713]  print_report+0xd1/0x650
[   17.231765]  ? __virt_addr_valid+0x1db/0x2d0
[   17.231805]  ? ksize_uaf+0x5fe/0x6c0
[   17.231838]  ? kasan_complete_mode_report_info+0x64/0x200
[   17.231875]  ? ksize_uaf+0x5fe/0x6c0
[   17.231911]  kasan_report+0x141/0x180
[   17.231946]  ? ksize_uaf+0x5fe/0x6c0
[   17.231990]  __asan_report_load1_noabort+0x18/0x20
[   17.232026]  ksize_uaf+0x5fe/0x6c0
[   17.232061]  ? __pfx_ksize_uaf+0x10/0x10
[   17.232103]  ? __schedule+0x10cc/0x2b30
[   17.232148]  ? __pfx_read_tsc+0x10/0x10
[   17.232192]  ? ktime_get_ts64+0x86/0x230
[   17.232246]  kunit_try_run_case+0x1a5/0x480
[   17.232290]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.232328]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.232373]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.232400]  ? __kthread_parkme+0x82/0x180
[   17.232426]  ? preempt_count_sub+0x50/0x80
[   17.232455]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.232481]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.232507]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.232532]  kthread+0x337/0x6f0
[   17.232552]  ? trace_preempt_on+0x20/0xc0
[   17.232579]  ? __pfx_kthread+0x10/0x10
[   17.232600]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.232623]  ? calculate_sigpending+0x7b/0xa0
[   17.232648]  ? __pfx_kthread+0x10/0x10
[   17.232668]  ret_from_fork+0x41/0x80
[   17.232692]  ? __pfx_kthread+0x10/0x10
[   17.232712]  ret_from_fork_asm+0x1a/0x30
[   17.232770]  </TASK>
[   17.232793] 
[   17.246789] Allocated by task 217:
[   17.247190]  kasan_save_stack+0x45/0x70
[   17.247457]  kasan_save_track+0x18/0x40
[   17.247790]  kasan_save_alloc_info+0x3b/0x50
[   17.248109]  __kasan_kmalloc+0xb7/0xc0
[   17.248481]  __kmalloc_cache_noprof+0x189/0x420
[   17.249236]  ksize_uaf+0xaa/0x6c0
[   17.249449]  kunit_try_run_case+0x1a5/0x480
[   17.250147]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.250655]  kthread+0x337/0x6f0
[   17.251468]  ret_from_fork+0x41/0x80
[   17.251742]  ret_from_fork_asm+0x1a/0x30
[   17.251971] 
[   17.252096] Freed by task 217:
[   17.252692]  kasan_save_stack+0x45/0x70
[   17.252942]  kasan_save_track+0x18/0x40
[   17.253263]  kasan_save_free_info+0x3f/0x60
[   17.254072]  __kasan_slab_free+0x56/0x70
[   17.254837]  kfree+0x222/0x3f0
[   17.255327]  ksize_uaf+0x12c/0x6c0
[   17.255598]  kunit_try_run_case+0x1a5/0x480
[   17.256195]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.256444]  kthread+0x337/0x6f0
[   17.256789]  ret_from_fork+0x41/0x80
[   17.257162]  ret_from_fork_asm+0x1a/0x30
[   17.257502] 
[   17.257604] The buggy address belongs to the object at ffff888102b31100
[   17.257604]  which belongs to the cache kmalloc-128 of size 128
[   17.258549] The buggy address is located 0 bytes inside of
[   17.258549]  freed 128-byte region [ffff888102b31100, ffff888102b31180)
[   17.259494] 
[   17.259715] The buggy address belongs to the physical page:
[   17.260572] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b31
[   17.261471] flags: 0x200000000000000(node=0|zone=2)
[   17.262316] page_type: f5(slab)
[   17.262655] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   17.263402] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.264026] page dumped because: kasan: bad access detected
[   17.264583] 
[   17.264787] Memory state around the buggy address:
[   17.265168]  ffff888102b31000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.266395]  ffff888102b31080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.266793] >ffff888102b31100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.267549]                    ^
[   17.267785]  ffff888102b31180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.268260]  ffff888102b31200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.268679] ==================================================================