Hay
Date
June 26, 2025, 11:12 a.m.

Environment
e850-96
qemu-arm64
qemu-x86_64

[   32.242697] ==================================================================
[   32.249759] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8
[   32.256092] Read of size 1 at addr ffff000802d02d78 by task kunit_try_catch/245
[   32.263383] 
[   32.264867] CPU: 0 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   32.264919] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.264934] Hardware name: WinLink E850-96 board (DT)
[   32.264952] Call trace:
[   32.264962]  show_stack+0x20/0x38 (C)
[   32.264995]  dump_stack_lvl+0x8c/0xd0
[   32.265031]  print_report+0x118/0x608
[   32.265063]  kasan_report+0xdc/0x128
[   32.265091]  __asan_report_load1_noabort+0x20/0x30
[   32.265126]  ksize_uaf+0x544/0x5f8
[   32.265160]  kunit_try_run_case+0x170/0x3f0
[   32.265195]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.265232]  kthread+0x328/0x630
[   32.265264]  ret_from_fork+0x10/0x20
[   32.265297] 
[   32.326923] Allocated by task 245:
[   32.330311]  kasan_save_stack+0x3c/0x68
[   32.334128]  kasan_save_track+0x20/0x40
[   32.337948]  kasan_save_alloc_info+0x40/0x58
[   32.342201]  __kasan_kmalloc+0xd4/0xd8
[   32.345933]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.350447]  ksize_uaf+0xb8/0x5f8
[   32.353747]  kunit_try_run_case+0x170/0x3f0
[   32.357913]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.363381]  kthread+0x328/0x630
[   32.366593]  ret_from_fork+0x10/0x20
[   32.370152] 
[   32.371628] Freed by task 245:
[   32.374667]  kasan_save_stack+0x3c/0x68
[   32.378485]  kasan_save_track+0x20/0x40
[   32.382305]  kasan_save_free_info+0x4c/0x78
[   32.386471]  __kasan_slab_free+0x6c/0x98
[   32.390377]  kfree+0x214/0x3c8
[   32.393415]  ksize_uaf+0x11c/0x5f8
[   32.396801]  kunit_try_run_case+0x170/0x3f0
[   32.400967]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.406438]  kthread+0x328/0x630
[   32.409648]  ret_from_fork+0x10/0x20
[   32.413207] 
[   32.414683] The buggy address belongs to the object at ffff000802d02d00
[   32.414683]  which belongs to the cache kmalloc-128 of size 128
[   32.427184] The buggy address is located 120 bytes inside of
[   32.427184]  freed 128-byte region [ffff000802d02d00, ffff000802d02d80)
[   32.439422] 
[   32.440901] The buggy address belongs to the physical page:
[   32.446459] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882d02
[   32.454441] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.462079] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.469022] page_type: f5(slab)
[   32.472159] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   32.479879] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.487606] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   32.495417] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.503230] head: 0bfffe0000000001 fffffdffe00b4081 00000000ffffffff 00000000ffffffff
[   32.511042] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   32.518848] page dumped because: kasan: bad access detected
[   32.524404] 
[   32.525879] Memory state around the buggy address:
[   32.530660]  ffff000802d02c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.537862]  ffff000802d02c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.545067] >ffff000802d02d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.552267]                                                                 ^
[   32.559389]  ffff000802d02d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.566594]  ffff000802d02e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.573795] ==================================================================
[   31.908452] ==================================================================
[   31.915391] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8
[   31.921723] Read of size 1 at addr ffff000802d02d00 by task kunit_try_catch/245
[   31.929013] 
[   31.930499] CPU: 0 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   31.930551] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.930566] Hardware name: WinLink E850-96 board (DT)
[   31.930588] Call trace:
[   31.930600]  show_stack+0x20/0x38 (C)
[   31.930637]  dump_stack_lvl+0x8c/0xd0
[   31.930674]  print_report+0x118/0x608
[   31.930709]  kasan_report+0xdc/0x128
[   31.930740]  __asan_report_load1_noabort+0x20/0x30
[   31.930774]  ksize_uaf+0x598/0x5f8
[   31.930808]  kunit_try_run_case+0x170/0x3f0
[   31.930844]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.930881]  kthread+0x328/0x630
[   31.930915]  ret_from_fork+0x10/0x20
[   31.930953] 
[   31.992553] Allocated by task 245:
[   31.995942]  kasan_save_stack+0x3c/0x68
[   31.999758]  kasan_save_track+0x20/0x40
[   32.003578]  kasan_save_alloc_info+0x40/0x58
[   32.007831]  __kasan_kmalloc+0xd4/0xd8
[   32.011565]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.016078]  ksize_uaf+0xb8/0x5f8
[   32.019377]  kunit_try_run_case+0x170/0x3f0
[   32.023543]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.029011]  kthread+0x328/0x630
[   32.032223]  ret_from_fork+0x10/0x20
[   32.035782] 
[   32.037257] Freed by task 245:
[   32.040297]  kasan_save_stack+0x3c/0x68
[   32.044115]  kasan_save_track+0x20/0x40
[   32.047935]  kasan_save_free_info+0x4c/0x78
[   32.052101]  __kasan_slab_free+0x6c/0x98
[   32.056007]  kfree+0x214/0x3c8
[   32.059046]  ksize_uaf+0x11c/0x5f8
[   32.062431]  kunit_try_run_case+0x170/0x3f0
[   32.066598]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.072068]  kthread+0x328/0x630
[   32.075278]  ret_from_fork+0x10/0x20
[   32.078837] 
[   32.080312] The buggy address belongs to the object at ffff000802d02d00
[   32.080312]  which belongs to the cache kmalloc-128 of size 128
[   32.092816] The buggy address is located 0 bytes inside of
[   32.092816]  freed 128-byte region [ffff000802d02d00, ffff000802d02d80)
[   32.104878] 
[   32.106357] The buggy address belongs to the physical page:
[   32.111913] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882d02
[   32.119897] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.127536] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.134478] page_type: f5(slab)
[   32.137615] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   32.145336] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.153063] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   32.160873] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.168687] head: 0bfffe0000000001 fffffdffe00b4081 00000000ffffffff 00000000ffffffff
[   32.176499] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   32.184304] page dumped because: kasan: bad access detected
[   32.189861] 
[   32.191335] Memory state around the buggy address:
[   32.196115]  ffff000802d02c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.203318]  ffff000802d02c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.210523] >ffff000802d02d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.217725]                    ^
[   32.220938]  ffff000802d02d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.228144]  ffff000802d02e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.235345] ==================================================================
[   31.569422] ==================================================================
[   31.578936] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8
[   31.585271] Read of size 1 at addr ffff000802d02d00 by task kunit_try_catch/245
[   31.592561] 
[   31.594048] CPU: 0 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   31.594101] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.594118] Hardware name: WinLink E850-96 board (DT)
[   31.594140] Call trace:
[   31.594153]  show_stack+0x20/0x38 (C)
[   31.594192]  dump_stack_lvl+0x8c/0xd0
[   31.594228]  print_report+0x118/0x608
[   31.594256]  kasan_report+0xdc/0x128
[   31.594286]  __kasan_check_byte+0x54/0x70
[   31.594319]  ksize+0x30/0x88
[   31.594347]  ksize_uaf+0x168/0x5f8
[   31.594379]  kunit_try_run_case+0x170/0x3f0
[   31.594415]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.594457]  kthread+0x328/0x630
[   31.594496]  ret_from_fork+0x10/0x20
[   31.594532] 
[   31.658185] Allocated by task 245:
[   31.661573]  kasan_save_stack+0x3c/0x68
[   31.665388]  kasan_save_track+0x20/0x40
[   31.669208]  kasan_save_alloc_info+0x40/0x58
[   31.673461]  __kasan_kmalloc+0xd4/0xd8
[   31.677194]  __kmalloc_cache_noprof+0x16c/0x3c0
[   31.681707]  ksize_uaf+0xb8/0x5f8
[   31.685006]  kunit_try_run_case+0x170/0x3f0
[   31.689173]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.694641]  kthread+0x328/0x630
[   31.697853]  ret_from_fork+0x10/0x20
[   31.701412] 
[   31.702887] Freed by task 245:
[   31.705927]  kasan_save_stack+0x3c/0x68
[   31.709745]  kasan_save_track+0x20/0x40
[   31.713564]  kasan_save_free_info+0x4c/0x78
[   31.717731]  __kasan_slab_free+0x6c/0x98
[   31.721637]  kfree+0x214/0x3c8
[   31.724675]  ksize_uaf+0x11c/0x5f8
[   31.728061]  kunit_try_run_case+0x170/0x3f0
[   31.732227]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.737696]  kthread+0x328/0x630
[   31.740908]  ret_from_fork+0x10/0x20
[   31.744467] 
[   31.745944] The buggy address belongs to the object at ffff000802d02d00
[   31.745944]  which belongs to the cache kmalloc-128 of size 128
[   31.758446] The buggy address is located 0 bytes inside of
[   31.758446]  freed 128-byte region [ffff000802d02d00, ffff000802d02d80)
[   31.770508] 
[   31.771988] The buggy address belongs to the physical page:
[   31.777544] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882d02
[   31.785528] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.793166] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.800111] page_type: f5(slab)
[   31.803249] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   31.810965] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   31.818694] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   31.826505] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   31.834318] head: 0bfffe0000000001 fffffdffe00b4081 00000000ffffffff 00000000ffffffff
[   31.842129] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   31.849934] page dumped because: kasan: bad access detected
[   31.855491] 
[   31.856964] Memory state around the buggy address:
[   31.861747]  ffff000802d02c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.868948]  ffff000802d02c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.876153] >ffff000802d02d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.883354]                    ^
[   31.886569]  ffff000802d02d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.893775]  ffff000802d02e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.900975] ==================================================================

[   18.255060] ==================================================================
[   18.255278] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8
[   18.255342] Read of size 1 at addr fff00000c5bdcd00 by task kunit_try_catch/198
[   18.255554] 
[   18.255621] CPU: 0 UID: 0 PID: 198 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   18.255713] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.255934] Hardware name: linux,dummy-virt (DT)
[   18.256100] Call trace:
[   18.256152]  show_stack+0x20/0x38 (C)
[   18.256294]  dump_stack_lvl+0x8c/0xd0
[   18.256471]  print_report+0x118/0x608
[   18.256601]  kasan_report+0xdc/0x128
[   18.256790]  __kasan_check_byte+0x54/0x70
[   18.256975]  ksize+0x30/0x88
[   18.257047]  ksize_uaf+0x168/0x5f8
[   18.257199]  kunit_try_run_case+0x170/0x3f0
[   18.257356]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.257484]  kthread+0x328/0x630
[   18.257722]  ret_from_fork+0x10/0x20
[   18.258128] 
[   18.258174] Allocated by task 198:
[   18.258242]  kasan_save_stack+0x3c/0x68
[   18.258403]  kasan_save_track+0x20/0x40
[   18.258536]  kasan_save_alloc_info+0x40/0x58
[   18.258600]  __kasan_kmalloc+0xd4/0xd8
[   18.258635]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.259038]  ksize_uaf+0xb8/0x5f8
[   18.259181]  kunit_try_run_case+0x170/0x3f0
[   18.259312]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.259508]  kthread+0x328/0x630
[   18.259557]  ret_from_fork+0x10/0x20
[   18.259592] 
[   18.259668] Freed by task 198:
[   18.260002]  kasan_save_stack+0x3c/0x68
[   18.260072]  kasan_save_track+0x20/0x40
[   18.260227]  kasan_save_free_info+0x4c/0x78
[   18.260419]  __kasan_slab_free+0x6c/0x98
[   18.260554]  kfree+0x214/0x3c8
[   18.260589]  ksize_uaf+0x11c/0x5f8
[   18.260625]  kunit_try_run_case+0x170/0x3f0
[   18.260940]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.261099]  kthread+0x328/0x630
[   18.261301]  ret_from_fork+0x10/0x20
[   18.261439] 
[   18.261602] The buggy address belongs to the object at fff00000c5bdcd00
[   18.261602]  which belongs to the cache kmalloc-128 of size 128
[   18.261697] The buggy address is located 0 bytes inside of
[   18.261697]  freed 128-byte region [fff00000c5bdcd00, fff00000c5bdcd80)
[   18.261897] 
[   18.261943] The buggy address belongs to the physical page:
[   18.261991] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bdc
[   18.262046] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.262097] page_type: f5(slab)
[   18.262137] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.262200] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.262259] page dumped because: kasan: bad access detected
[   18.262302] 
[   18.262320] Memory state around the buggy address:
[   18.262370]  fff00000c5bdcc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.262416]  fff00000c5bdcc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.262467] >fff00000c5bdcd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.262519]                    ^
[   18.262556]  fff00000c5bdcd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.262601]  fff00000c5bdce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.262642] ==================================================================
[   18.272994] ==================================================================
[   18.273048] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8
[   18.273341] Read of size 1 at addr fff00000c5bdcd78 by task kunit_try_catch/198
[   18.273529] 
[   18.273564] CPU: 0 UID: 0 PID: 198 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   18.273660] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.274046] Hardware name: linux,dummy-virt (DT)
[   18.274168] Call trace:
[   18.274195]  show_stack+0x20/0x38 (C)
[   18.274248]  dump_stack_lvl+0x8c/0xd0
[   18.274357]  print_report+0x118/0x608
[   18.274407]  kasan_report+0xdc/0x128
[   18.274451]  __asan_report_load1_noabort+0x20/0x30
[   18.274500]  ksize_uaf+0x544/0x5f8
[   18.274786]  kunit_try_run_case+0x170/0x3f0
[   18.274881]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.274937]  kthread+0x328/0x630
[   18.275064]  ret_from_fork+0x10/0x20
[   18.275153] 
[   18.275201] Allocated by task 198:
[   18.275299]  kasan_save_stack+0x3c/0x68
[   18.275386]  kasan_save_track+0x20/0x40
[   18.275440]  kasan_save_alloc_info+0x40/0x58
[   18.275774]  __kasan_kmalloc+0xd4/0xd8
[   18.275820]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.275897]  ksize_uaf+0xb8/0x5f8
[   18.276006]  kunit_try_run_case+0x170/0x3f0
[   18.276170]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.276305]  kthread+0x328/0x630
[   18.276427]  ret_from_fork+0x10/0x20
[   18.276604] 
[   18.276809] Freed by task 198:
[   18.276872]  kasan_save_stack+0x3c/0x68
[   18.276986]  kasan_save_track+0x20/0x40
[   18.277122]  kasan_save_free_info+0x4c/0x78
[   18.277225]  __kasan_slab_free+0x6c/0x98
[   18.277458]  kfree+0x214/0x3c8
[   18.277523]  ksize_uaf+0x11c/0x5f8
[   18.277806]  kunit_try_run_case+0x170/0x3f0
[   18.277907]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.277959]  kthread+0x328/0x630
[   18.277995]  ret_from_fork+0x10/0x20
[   18.278033] 
[   18.278056] The buggy address belongs to the object at fff00000c5bdcd00
[   18.278056]  which belongs to the cache kmalloc-128 of size 128
[   18.278120] The buggy address is located 120 bytes inside of
[   18.278120]  freed 128-byte region [fff00000c5bdcd00, fff00000c5bdcd80)
[   18.278261] 
[   18.278310] The buggy address belongs to the physical page:
[   18.278369] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bdc
[   18.278431] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.278480] page_type: f5(slab)
[   18.278518] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.278571] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.278623] page dumped because: kasan: bad access detected
[   18.278655] 
[   18.278674] Memory state around the buggy address:
[   18.278713]  fff00000c5bdcc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.278758]  fff00000c5bdcc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.278804] >fff00000c5bdcd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.278844]                                                                 ^
[   18.278916]  fff00000c5bdcd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.278976]  fff00000c5bdce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.279017] ==================================================================
[   18.264812] ==================================================================
[   18.265057] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8
[   18.265203] Read of size 1 at addr fff00000c5bdcd00 by task kunit_try_catch/198
[   18.265318] 
[   18.265414] CPU: 0 UID: 0 PID: 198 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   18.265505] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.265792] Hardware name: linux,dummy-virt (DT)
[   18.265882] Call trace:
[   18.265909]  show_stack+0x20/0x38 (C)
[   18.266014]  dump_stack_lvl+0x8c/0xd0
[   18.266066]  print_report+0x118/0x608
[   18.266148]  kasan_report+0xdc/0x128
[   18.266202]  __asan_report_load1_noabort+0x20/0x30
[   18.266523]  ksize_uaf+0x598/0x5f8
[   18.266591]  kunit_try_run_case+0x170/0x3f0
[   18.266669]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.266725]  kthread+0x328/0x630
[   18.266770]  ret_from_fork+0x10/0x20
[   18.267065] 
[   18.267112] Allocated by task 198:
[   18.267376]  kasan_save_stack+0x3c/0x68
[   18.267447]  kasan_save_track+0x20/0x40
[   18.267483]  kasan_save_alloc_info+0x40/0x58
[   18.267586]  __kasan_kmalloc+0xd4/0xd8
[   18.267632]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.267671]  ksize_uaf+0xb8/0x5f8
[   18.267706]  kunit_try_run_case+0x170/0x3f0
[   18.267874]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.268051]  kthread+0x328/0x630
[   18.268171]  ret_from_fork+0x10/0x20
[   18.268219] 
[   18.268240] Freed by task 198:
[   18.268268]  kasan_save_stack+0x3c/0x68
[   18.268304]  kasan_save_track+0x20/0x40
[   18.268611]  kasan_save_free_info+0x4c/0x78
[   18.268682]  __kasan_slab_free+0x6c/0x98
[   18.269064]  kfree+0x214/0x3c8
[   18.269306]  ksize_uaf+0x11c/0x5f8
[   18.269398]  kunit_try_run_case+0x170/0x3f0
[   18.269714]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.269849]  kthread+0x328/0x630
[   18.270062]  ret_from_fork+0x10/0x20
[   18.270401] 
[   18.270450] The buggy address belongs to the object at fff00000c5bdcd00
[   18.270450]  which belongs to the cache kmalloc-128 of size 128
[   18.270591] The buggy address is located 0 bytes inside of
[   18.270591]  freed 128-byte region [fff00000c5bdcd00, fff00000c5bdcd80)
[   18.270742] 
[   18.270812] The buggy address belongs to the physical page:
[   18.270843] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bdc
[   18.271326] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.271454] page_type: f5(slab)
[   18.271498] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.271706] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.271769] page dumped because: kasan: bad access detected
[   18.271809] 
[   18.271827] Memory state around the buggy address:
[   18.271894]  fff00000c5bdcc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.271940]  fff00000c5bdcc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.271984] >fff00000c5bdcd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.272026]                    ^
[   18.272064]  fff00000c5bdcd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.272109]  fff00000c5bdce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.272152] ==================================================================

[   11.446672] ==================================================================
[   11.447142] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5e4/0x6c0
[   11.447665] Read of size 1 at addr ffff888102f60978 by task kunit_try_catch/215
[   11.448128] 
[   11.448465] CPU: 1 UID: 0 PID: 215 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT(voluntary) 
[   11.448526] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.448537] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.448557] Call Trace:
[   11.448569]  <TASK>
[   11.448586]  dump_stack_lvl+0x73/0xb0
[   11.448622]  print_report+0xd1/0x650
[   11.448645]  ? __virt_addr_valid+0x1db/0x2d0
[   11.448666]  ? ksize_uaf+0x5e4/0x6c0
[   11.448698]  ? kasan_complete_mode_report_info+0x64/0x200
[   11.448773]  ? ksize_uaf+0x5e4/0x6c0
[   11.448796]  kasan_report+0x141/0x180
[   11.448829]  ? ksize_uaf+0x5e4/0x6c0
[   11.448855]  __asan_report_load1_noabort+0x18/0x20
[   11.448875]  ksize_uaf+0x5e4/0x6c0
[   11.448906]  ? __pfx_ksize_uaf+0x10/0x10
[   11.448936]  ? __schedule+0x10cc/0x2b60
[   11.448959]  ? __pfx_read_tsc+0x10/0x10
[   11.448979]  ? ktime_get_ts64+0x86/0x230
[   11.449005]  kunit_try_run_case+0x1a5/0x480
[   11.449029]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.449050]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.449073]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.449097]  ? __kthread_parkme+0x82/0x180
[   11.449118]  ? preempt_count_sub+0x50/0x80
[   11.449144]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.449177]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.449200]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.449222]  kthread+0x337/0x6f0
[   11.449249]  ? trace_preempt_on+0x20/0xc0
[   11.449273]  ? __pfx_kthread+0x10/0x10
[   11.449290]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.449311]  ? calculate_sigpending+0x7b/0xa0
[   11.449332]  ? __pfx_kthread+0x10/0x10
[   11.449350]  ret_from_fork+0x41/0x80
[   11.449371]  ? __pfx_kthread+0x10/0x10
[   11.449397]  ret_from_fork_asm+0x1a/0x30
[   11.449427]  </TASK>
[   11.449437] 
[   11.457187] Allocated by task 215:
[   11.457360]  kasan_save_stack+0x45/0x70
[   11.457587]  kasan_save_track+0x18/0x40
[   11.457880]  kasan_save_alloc_info+0x3b/0x50
[   11.458083]  __kasan_kmalloc+0xb7/0xc0
[   11.458298]  __kmalloc_cache_noprof+0x189/0x420
[   11.458455]  ksize_uaf+0xaa/0x6c0
[   11.458577]  kunit_try_run_case+0x1a5/0x480
[   11.458737]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.459238]  kthread+0x337/0x6f0
[   11.459415]  ret_from_fork+0x41/0x80
[   11.459639]  ret_from_fork_asm+0x1a/0x30
[   11.459930] 
[   11.460020] Freed by task 215:
[   11.460173]  kasan_save_stack+0x45/0x70
[   11.460375]  kasan_save_track+0x18/0x40
[   11.460547]  kasan_save_free_info+0x3f/0x60
[   11.460860]  __kasan_slab_free+0x56/0x70
[   11.461067]  kfree+0x222/0x3f0
[   11.461227]  ksize_uaf+0x12c/0x6c0
[   11.461393]  kunit_try_run_case+0x1a5/0x480
[   11.461625]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.462008]  kthread+0x337/0x6f0
[   11.462134]  ret_from_fork+0x41/0x80
[   11.462264]  ret_from_fork_asm+0x1a/0x30
[   11.462412] 
[   11.462505] The buggy address belongs to the object at ffff888102f60900
[   11.462505]  which belongs to the cache kmalloc-128 of size 128
[   11.463283] The buggy address is located 120 bytes inside of
[   11.463283]  freed 128-byte region [ffff888102f60900, ffff888102f60980)
[   11.463841] 
[   11.463924] The buggy address belongs to the physical page:
[   11.464153] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102f60
[   11.464519] flags: 0x200000000000000(node=0|zone=2)
[   11.464743] page_type: f5(slab)
[   11.464896] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   11.465214] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.465503] page dumped because: kasan: bad access detected
[   11.465743] 
[   11.465820] Memory state around the buggy address:
[   11.466168]  ffff888102f60800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   11.466475]  ffff888102f60880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.467028] >ffff888102f60900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   11.467292]                                                                 ^
[   11.467642]  ffff888102f60980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.468026]  ffff888102f60a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.468327] ==================================================================
[   11.400079] ==================================================================
[   11.401027] BUG: KASAN: slab-use-after-free in ksize_uaf+0x19d/0x6c0
[   11.401377] Read of size 1 at addr ffff888102f60900 by task kunit_try_catch/215
[   11.401693] 
[   11.401972] CPU: 1 UID: 0 PID: 215 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT(voluntary) 
[   11.402035] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.402046] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.402069] Call Trace:
[   11.402081]  <TASK>
[   11.402101]  dump_stack_lvl+0x73/0xb0
[   11.402129]  print_report+0xd1/0x650
[   11.402162]  ? __virt_addr_valid+0x1db/0x2d0
[   11.402186]  ? ksize_uaf+0x19d/0x6c0
[   11.402206]  ? kasan_complete_mode_report_info+0x64/0x200
[   11.402238]  ? ksize_uaf+0x19d/0x6c0
[   11.402259]  kasan_report+0x141/0x180
[   11.402281]  ? ksize_uaf+0x19d/0x6c0
[   11.402304]  ? ksize_uaf+0x19d/0x6c0
[   11.402325]  __kasan_check_byte+0x3d/0x50
[   11.402347]  ksize+0x20/0x60
[   11.402369]  ksize_uaf+0x19d/0x6c0
[   11.402389]  ? __pfx_ksize_uaf+0x10/0x10
[   11.402410]  ? __schedule+0x10cc/0x2b60
[   11.402434]  ? __pfx_read_tsc+0x10/0x10
[   11.402454]  ? ktime_get_ts64+0x86/0x230
[   11.402490]  kunit_try_run_case+0x1a5/0x480
[   11.402516]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.402537]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.402572]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.402595]  ? __kthread_parkme+0x82/0x180
[   11.402647]  ? preempt_count_sub+0x50/0x80
[   11.402674]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.402697]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.402719]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.402740]  kthread+0x337/0x6f0
[   11.402757]  ? trace_preempt_on+0x20/0xc0
[   11.402781]  ? __pfx_kthread+0x10/0x10
[   11.402798]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.402818]  ? calculate_sigpending+0x7b/0xa0
[   11.402840]  ? __pfx_kthread+0x10/0x10
[   11.402858]  ret_from_fork+0x41/0x80
[   11.402879]  ? __pfx_kthread+0x10/0x10
[   11.402896]  ret_from_fork_asm+0x1a/0x30
[   11.402939]  </TASK>
[   11.402952] 
[   11.411192] Allocated by task 215:
[   11.411352]  kasan_save_stack+0x45/0x70
[   11.411510]  kasan_save_track+0x18/0x40
[   11.411817]  kasan_save_alloc_info+0x3b/0x50
[   11.412037]  __kasan_kmalloc+0xb7/0xc0
[   11.412389]  __kmalloc_cache_noprof+0x189/0x420
[   11.412807]  ksize_uaf+0xaa/0x6c0
[   11.413117]  kunit_try_run_case+0x1a5/0x480
[   11.413333]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.413633]  kthread+0x337/0x6f0
[   11.413866]  ret_from_fork+0x41/0x80
[   11.414053]  ret_from_fork_asm+0x1a/0x30
[   11.414219] 
[   11.414337] Freed by task 215:
[   11.414495]  kasan_save_stack+0x45/0x70
[   11.414656]  kasan_save_track+0x18/0x40
[   11.414791]  kasan_save_free_info+0x3f/0x60
[   11.415008]  __kasan_slab_free+0x56/0x70
[   11.415203]  kfree+0x222/0x3f0
[   11.415416]  ksize_uaf+0x12c/0x6c0
[   11.415545]  kunit_try_run_case+0x1a5/0x480
[   11.415692]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.416116]  kthread+0x337/0x6f0
[   11.416294]  ret_from_fork+0x41/0x80
[   11.416475]  ret_from_fork_asm+0x1a/0x30
[   11.416860] 
[   11.416977] The buggy address belongs to the object at ffff888102f60900
[   11.416977]  which belongs to the cache kmalloc-128 of size 128
[   11.417359] The buggy address is located 0 bytes inside of
[   11.417359]  freed 128-byte region [ffff888102f60900, ffff888102f60980)
[   11.418278] 
[   11.418394] The buggy address belongs to the physical page:
[   11.418620] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102f60
[   11.419087] flags: 0x200000000000000(node=0|zone=2)
[   11.419395] page_type: f5(slab)
[   11.419594] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   11.420067] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.420498] page dumped because: kasan: bad access detected
[   11.420857] 
[   11.420951] Memory state around the buggy address:
[   11.421146]  ffff888102f60800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   11.421362]  ffff888102f60880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.421672] >ffff888102f60900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   11.422236]                    ^
[   11.422362]  ffff888102f60980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.422582]  ffff888102f60a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.422868] ==================================================================
[   11.423597] ==================================================================
[   11.424453] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5fe/0x6c0
[   11.424906] Read of size 1 at addr ffff888102f60900 by task kunit_try_catch/215
[   11.425137] 
[   11.425226] CPU: 1 UID: 0 PID: 215 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT(voluntary) 
[   11.425350] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.425364] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.425385] Call Trace:
[   11.425418]  <TASK>
[   11.425437]  dump_stack_lvl+0x73/0xb0
[   11.425463]  print_report+0xd1/0x650
[   11.425499]  ? __virt_addr_valid+0x1db/0x2d0
[   11.425520]  ? ksize_uaf+0x5fe/0x6c0
[   11.425540]  ? kasan_complete_mode_report_info+0x64/0x200
[   11.425562]  ? ksize_uaf+0x5fe/0x6c0
[   11.425583]  kasan_report+0x141/0x180
[   11.425605]  ? ksize_uaf+0x5fe/0x6c0
[   11.425630]  __asan_report_load1_noabort+0x18/0x20
[   11.425650]  ksize_uaf+0x5fe/0x6c0
[   11.425671]  ? __pfx_ksize_uaf+0x10/0x10
[   11.425692]  ? __schedule+0x10cc/0x2b60
[   11.425755]  ? __pfx_read_tsc+0x10/0x10
[   11.425788]  ? ktime_get_ts64+0x86/0x230
[   11.425815]  kunit_try_run_case+0x1a5/0x480
[   11.425839]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.425871]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.425894]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.425926]  ? __kthread_parkme+0x82/0x180
[   11.425948]  ? preempt_count_sub+0x50/0x80
[   11.425982]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.426006]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.426029]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.426062]  kthread+0x337/0x6f0
[   11.426079]  ? trace_preempt_on+0x20/0xc0
[   11.426102]  ? __pfx_kthread+0x10/0x10
[   11.426120]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.426150]  ? calculate_sigpending+0x7b/0xa0
[   11.426171]  ? __pfx_kthread+0x10/0x10
[   11.426188]  ret_from_fork+0x41/0x80
[   11.426219]  ? __pfx_kthread+0x10/0x10
[   11.426237]  ret_from_fork_asm+0x1a/0x30
[   11.426267]  </TASK>
[   11.426278] 
[   11.434186] Allocated by task 215:
[   11.434475]  kasan_save_stack+0x45/0x70
[   11.434701]  kasan_save_track+0x18/0x40
[   11.434882]  kasan_save_alloc_info+0x3b/0x50
[   11.435139]  __kasan_kmalloc+0xb7/0xc0
[   11.435354]  __kmalloc_cache_noprof+0x189/0x420
[   11.435537]  ksize_uaf+0xaa/0x6c0
[   11.435736]  kunit_try_run_case+0x1a5/0x480
[   11.435914]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.436360]  kthread+0x337/0x6f0
[   11.436545]  ret_from_fork+0x41/0x80
[   11.436816]  ret_from_fork_asm+0x1a/0x30
[   11.437043] 
[   11.437128] Freed by task 215:
[   11.437284]  kasan_save_stack+0x45/0x70
[   11.437477]  kasan_save_track+0x18/0x40
[   11.437692]  kasan_save_free_info+0x3f/0x60
[   11.437832]  __kasan_slab_free+0x56/0x70
[   11.437978]  kfree+0x222/0x3f0
[   11.438092]  ksize_uaf+0x12c/0x6c0
[   11.438291]  kunit_try_run_case+0x1a5/0x480
[   11.438509]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.438811]  kthread+0x337/0x6f0
[   11.439057]  ret_from_fork+0x41/0x80
[   11.439250]  ret_from_fork_asm+0x1a/0x30
[   11.439441] 
[   11.439540] The buggy address belongs to the object at ffff888102f60900
[   11.439540]  which belongs to the cache kmalloc-128 of size 128
[   11.440182] The buggy address is located 0 bytes inside of
[   11.440182]  freed 128-byte region [ffff888102f60900, ffff888102f60980)
[   11.440774] 
[   11.441057] The buggy address belongs to the physical page:
[   11.441274] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102f60
[   11.441681] flags: 0x200000000000000(node=0|zone=2)
[   11.441985] page_type: f5(slab)
[   11.442136] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   11.442453] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.442769] page dumped because: kasan: bad access detected
[   11.442952] 
[   11.443021] Memory state around the buggy address:
[   11.443308]  ffff888102f60800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   11.443864]  ffff888102f60880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.444216] >ffff888102f60900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   11.444507]                    ^
[   11.444713]  ffff888102f60980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.445029]  ffff888102f60a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.445286] ==================================================================