Hay
Date
Feb. 5, 2025, 2:09 p.m.

Environment
qemu-armv7
qemu-x86_64

[  146.837579] ==================================================================
[  146.838492] BUG: KASAN: slab-use-after-free in ksize_uaf+0x12c/0x308
[  146.839047] Read of size 1 at addr c8e02b78 by task kunit_try_catch/187
[  146.839906] 
[  146.840136] CPU: 1 PID: 187 Comm: kunit_try_catch Tainted: G    B            N 6.6.76-rc1 #1
[  146.841197] Hardware name: Generic DT based system
[  146.841813]  unwind_backtrace from show_stack+0x18/0x1c
[  146.842403]  show_stack from dump_stack_lvl+0x58/0x70
[  146.843480]  dump_stack_lvl from print_report+0x164/0x51c
[  146.844411]  print_report from kasan_report+0xc8/0x104
[  146.844982]  kasan_report from ksize_uaf+0x12c/0x308
[  146.846178]  ksize_uaf from kunit_try_run_case+0x11c/0x2e4
[  146.847407]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  146.848478]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  146.849339]  kthread from ret_from_fork+0x14/0x30
[  146.849976] Exception stack(0xfa0a3fb0 to 0xfa0a3ff8)
[  146.850655] 3fa0:                                     00000000 00000000 00000000 00000000
[  146.851571] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  146.852457] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  146.853181] 
[  146.853416] Allocated by task 187:
[  146.853796]  kasan_set_track+0x3c/0x5c
[  146.854322]  __kasan_kmalloc+0x8c/0x94
[  146.855023]  ksize_uaf+0xa0/0x308
[  146.855466]  kunit_try_run_case+0x11c/0x2e4
[  146.856197]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  146.856855]  kthread+0x184/0x1a8
[  146.857380]  ret_from_fork+0x14/0x30
[  146.857824] 
[  146.858194] Freed by task 187:
[  146.858601]  kasan_set_track+0x3c/0x5c
[  146.859141]  kasan_save_free_info+0x30/0x3c
[  146.859789]  __kasan_slab_free+0xdc/0x124
[  146.860299]  __kmem_cache_free+0x140/0x2a8
[  146.860956]  ksize_uaf+0xbc/0x308
[  146.861441]  kunit_try_run_case+0x11c/0x2e4
[  146.862009]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  146.862609]  kthread+0x184/0x1a8
[  146.863263]  ret_from_fork+0x14/0x30
[  146.863761] 
[  146.863976] The buggy address belongs to the object at c8e02b00
[  146.863976]  which belongs to the cache kmalloc-128 of size 128
[  146.865261] The buggy address is located 120 bytes inside of
[  146.865261]  freed 128-byte region [c8e02b00, c8e02b80)
[  146.866426] 
[  146.867387] The buggy address belongs to the physical page:
[  146.868142] page:b76fc2b6 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48e02
[  146.869104] flags: 0x800(slab|zone=0)
[  146.869570] page_type: 0xffffffff()
[  146.870199] raw: 00000800 c4801300 00000122 00000000 00000000 80100010 ffffffff 00000001
[  146.871047] raw: 00000000
[  146.871511] page dumped because: kasan: bad access detected
[  146.872179] 
[  146.872434] Memory state around the buggy address:
[  146.872942]  c8e02a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  146.873656]  c8e02a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  146.874636] >c8e02b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  146.875362]                                                         ^
[  146.876022]  c8e02b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  146.876715]  c8e02c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  146.877410] ==================================================================
[  146.797510] ==================================================================
[  146.798249] BUG: KASAN: slab-use-after-free in ksize_uaf+0xfc/0x308
[  146.798955] Read of size 1 at addr c8e02b00 by task kunit_try_catch/187
[  146.799645] 
[  146.799918] CPU: 1 PID: 187 Comm: kunit_try_catch Tainted: G    B            N 6.6.76-rc1 #1
[  146.800714] Hardware name: Generic DT based system
[  146.801381]  unwind_backtrace from show_stack+0x18/0x1c
[  146.802017]  show_stack from dump_stack_lvl+0x58/0x70
[  146.802723]  dump_stack_lvl from print_report+0x164/0x51c
[  146.803318]  print_report from kasan_report+0xc8/0x104
[  146.804149]  kasan_report from ksize_uaf+0xfc/0x308
[  146.804869]  ksize_uaf from kunit_try_run_case+0x11c/0x2e4
[  146.805576]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  146.807331]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  146.808175]  kthread from ret_from_fork+0x14/0x30
[  146.808737] Exception stack(0xfa0a3fb0 to 0xfa0a3ff8)
[  146.809376] 3fa0:                                     00000000 00000000 00000000 00000000
[  146.810380] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  146.811291] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  146.812044] 
[  146.812347] Allocated by task 187:
[  146.812714]  kasan_set_track+0x3c/0x5c
[  146.813355]  __kasan_kmalloc+0x8c/0x94
[  146.813998]  ksize_uaf+0xa0/0x308
[  146.814460]  kunit_try_run_case+0x11c/0x2e4
[  146.814992]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  146.815868]  kthread+0x184/0x1a8
[  146.816345]  ret_from_fork+0x14/0x30
[  146.816839] 
[  146.817142] Freed by task 187:
[  146.817588]  kasan_set_track+0x3c/0x5c
[  146.818118]  kasan_save_free_info+0x30/0x3c
[  146.818705]  __kasan_slab_free+0xdc/0x124
[  146.819422]  __kmem_cache_free+0x140/0x2a8
[  146.820047]  ksize_uaf+0xbc/0x308
[  146.820470]  kunit_try_run_case+0x11c/0x2e4
[  146.821106]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  146.821878]  kthread+0x184/0x1a8
[  146.822360]  ret_from_fork+0x14/0x30
[  146.822896] 
[  146.823198] The buggy address belongs to the object at c8e02b00
[  146.823198]  which belongs to the cache kmalloc-128 of size 128
[  146.824405] The buggy address is located 0 bytes inside of
[  146.824405]  freed 128-byte region [c8e02b00, c8e02b80)
[  146.825492] 
[  146.826748] The buggy address belongs to the physical page:
[  146.827366] page:b76fc2b6 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48e02
[  146.828197] flags: 0x800(slab|zone=0)
[  146.828690] page_type: 0xffffffff()
[  146.829122] raw: 00000800 c4801300 00000122 00000000 00000000 80100010 ffffffff 00000001
[  146.829999] raw: 00000000
[  146.830446] page dumped because: kasan: bad access detected
[  146.831095] 
[  146.831319] Memory state around the buggy address:
[  146.831947]  c8e02a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  146.832711]  c8e02a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  146.833524] >c8e02b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  146.834171]            ^
[  146.834644]  c8e02b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  146.835347]  c8e02c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  146.836187] ==================================================================
[  146.751863] ==================================================================
[  146.753029] BUG: KASAN: slab-use-after-free in ksize_uaf+0xd0/0x308
[  146.753845] Read of size 1 at addr c8e02b00 by task kunit_try_catch/187
[  146.754731] 
[  146.754978] CPU: 1 PID: 187 Comm: kunit_try_catch Tainted: G    B            N 6.6.76-rc1 #1
[  146.756113] Hardware name: Generic DT based system
[  146.756656]  unwind_backtrace from show_stack+0x18/0x1c
[  146.757606]  show_stack from dump_stack_lvl+0x58/0x70
[  146.758443]  dump_stack_lvl from print_report+0x164/0x51c
[  146.759274]  print_report from kasan_report+0xc8/0x104
[  146.760118]  kasan_report from __kasan_check_byte+0x34/0x3c
[  146.760920]  __kasan_check_byte from ksize+0x20/0x3c
[  146.761773]  ksize from ksize_uaf+0xd0/0x308
[  146.762489]  ksize_uaf from kunit_try_run_case+0x11c/0x2e4
[  146.763320]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  146.764381]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  146.765271]  kthread from ret_from_fork+0x14/0x30
[  146.765954] Exception stack(0xfa0a3fb0 to 0xfa0a3ff8)
[  146.766609] 3fa0:                                     00000000 00000000 00000000 00000000
[  146.768380] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  146.769265] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  146.770040] 
[  146.770353] Allocated by task 187:
[  146.770808]  kasan_set_track+0x3c/0x5c
[  146.771352]  __kasan_kmalloc+0x8c/0x94
[  146.771902]  ksize_uaf+0xa0/0x308
[  146.772478]  kunit_try_run_case+0x11c/0x2e4
[  146.772950]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  146.773689]  kthread+0x184/0x1a8
[  146.774256]  ret_from_fork+0x14/0x30
[  146.774774] 
[  146.775048] Freed by task 187:
[  146.775550]  kasan_set_track+0x3c/0x5c
[  146.776033]  kasan_save_free_info+0x30/0x3c
[  146.776613]  __kasan_slab_free+0xdc/0x124
[  146.777299]  __kmem_cache_free+0x140/0x2a8
[  146.777814]  ksize_uaf+0xbc/0x308
[  146.778454]  kunit_try_run_case+0x11c/0x2e4
[  146.779240]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  146.779952]  kthread+0x184/0x1a8
[  146.780493]  ret_from_fork+0x14/0x30
[  146.781041] 
[  146.781292] The buggy address belongs to the object at c8e02b00
[  146.781292]  which belongs to the cache kmalloc-128 of size 128
[  146.782593] The buggy address is located 0 bytes inside of
[  146.782593]  freed 128-byte region [c8e02b00, c8e02b80)
[  146.783698] 
[  146.784045] The buggy address belongs to the physical page:
[  146.784776] page:b76fc2b6 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48e02
[  146.785709] flags: 0x800(slab|zone=0)
[  146.786272] page_type: 0xffffffff()
[  146.786743] raw: 00000800 c4801300 00000122 00000000 00000000 80100010 ffffffff 00000001
[  146.787585] raw: 00000000
[  146.788791] page dumped because: kasan: bad access detected
[  146.789388] 
[  146.789656] Memory state around the buggy address:
[  146.790226]  c8e02a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  146.790962]  c8e02a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  146.791618] >c8e02b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  146.792420]            ^
[  146.792769]  c8e02b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  146.793511]  c8e02c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  146.794096] ==================================================================


[   49.743716] ==================================================================
[   49.744383] BUG: KASAN: slab-use-after-free in ksize_uaf+0x108/0x310
[   49.745106] Read of size 1 at addr ffff88810284c900 by task kunit_try_catch/210
[   49.745919] 
[   49.746256] CPU: 0 PID: 210 Comm: kunit_try_catch Tainted: G    B            N 6.6.76-rc1 #1
[   49.748084] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   49.749596] Call Trace:
[   49.750086]  <TASK>
[   49.750446]  dump_stack_lvl+0x4e/0x90
[   49.751120]  print_report+0xd2/0x660
[   49.752188]  ? __virt_addr_valid+0x156/0x1e0
[   49.753237]  ? kasan_complete_mode_report_info+0x64/0x200
[   49.753856]  kasan_report+0xff/0x140
[   49.754338]  ? ksize_uaf+0x108/0x310
[   49.754944]  ? ksize_uaf+0x108/0x310
[   49.756185]  __asan_load1+0x66/0x70
[   49.756662]  ksize_uaf+0x108/0x310
[   49.757174]  ? __pfx_ksize_uaf+0x10/0x10
[   49.757660]  ? __schedule+0x70b/0x1190
[   49.758307]  ? ktime_get_ts64+0x118/0x140
[   49.758869]  kunit_try_run_case+0x126/0x290
[   49.759927]  ? __pfx_kunit_try_run_case+0x10/0x10
[   49.760604]  ? __kasan_check_write+0x18/0x20
[   49.761277]  ? trace_preempt_on+0x20/0xa0
[   49.762177]  ? __kthread_parkme+0x4f/0xd0
[   49.762705]  ? preempt_count_sub+0x50/0x80
[   49.764169]  ? __pfx_kunit_try_run_case+0x10/0x10
[   49.764720]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   49.765416]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   49.766329]  kthread+0x19e/0x1e0
[   49.767219]  ? __pfx_kthread+0x10/0x10
[   49.768321]  ret_from_fork+0x41/0x70
[   49.768795]  ? __pfx_kthread+0x10/0x10
[   49.769278]  ret_from_fork_asm+0x1b/0x30
[   49.769892]  </TASK>
[   49.770228] 
[   49.770502] Allocated by task 210:
[   49.771709]  kasan_save_stack+0x3c/0x60
[   49.772179]  kasan_set_track+0x29/0x40
[   49.772616]  kasan_save_alloc_info+0x22/0x30
[   49.773247]  __kasan_kmalloc+0xb7/0xc0
[   49.773762]  kmalloc_trace+0x4c/0xb0
[   49.774348]  ksize_uaf+0x9d/0x310
[   49.774902]  kunit_try_run_case+0x126/0x290
[   49.775453]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   49.776871]  kthread+0x19e/0x1e0
[   49.777361]  ret_from_fork+0x41/0x70
[   49.777967]  ret_from_fork_asm+0x1b/0x30
[   49.778541] 
[   49.778852] Freed by task 210:
[   49.779316]  kasan_save_stack+0x3c/0x60
[   49.779819]  kasan_set_track+0x29/0x40
[   49.780903]  kasan_save_free_info+0x2f/0x50
[   49.782210]  ____kasan_slab_free+0x172/0x1d0
[   49.782675]  __kasan_slab_free+0x16/0x20
[   49.783121]  __kmem_cache_free+0x190/0x310
[   49.783555]  kfree+0x7c/0x120
[   49.784008]  ksize_uaf+0xbd/0x310
[   49.785356]  kunit_try_run_case+0x126/0x290
[   49.786163]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   49.786753]  kthread+0x19e/0x1e0
[   49.787308]  ret_from_fork+0x41/0x70
[   49.787804]  ret_from_fork_asm+0x1b/0x30
[   49.789143] 
[   49.789358] The buggy address belongs to the object at ffff88810284c900
[   49.789358]  which belongs to the cache kmalloc-128 of size 128
[   49.790573] The buggy address is located 0 bytes inside of
[   49.790573]  freed 128-byte region [ffff88810284c900, ffff88810284c980)
[   49.792269] 
[   49.792779] The buggy address belongs to the physical page:
[   49.793292] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10284c
[   49.794555] flags: 0x200000000000800(slab|node=0|zone=2)
[   49.795220] page_type: 0xffffffff()
[   49.795692] raw: 0200000000000800 ffff8881000418c0 dead000000000122 0000000000000000
[   49.796562] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   49.797298] page dumped because: kasan: bad access detected
[   49.798395] 
[   49.798937] Memory state around the buggy address:
[   49.799967]  ffff88810284c800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   49.800767]  ffff88810284c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.801666] >ffff88810284c900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   49.802220]                    ^
[   49.802545]  ffff88810284c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.803250]  ffff88810284ca00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.804454] ==================================================================
[   49.805606] ==================================================================
[   49.806296] BUG: KASAN: slab-use-after-free in ksize_uaf+0x140/0x310
[   49.806983] Read of size 1 at addr ffff88810284c978 by task kunit_try_catch/210
[   49.808405] 
[   49.808699] CPU: 0 PID: 210 Comm: kunit_try_catch Tainted: G    B            N 6.6.76-rc1 #1
[   49.809873] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   49.810717] Call Trace:
[   49.811381]  <TASK>
[   49.811726]  dump_stack_lvl+0x4e/0x90
[   49.812255]  print_report+0xd2/0x660
[   49.812899]  ? __virt_addr_valid+0x156/0x1e0
[   49.813842]  ? kasan_complete_mode_report_info+0x64/0x200
[   49.814762]  kasan_report+0xff/0x140
[   49.815222]  ? ksize_uaf+0x140/0x310
[   49.815487]  ? ksize_uaf+0x140/0x310
[   49.815804]  __asan_load1+0x66/0x70
[   49.816350]  ksize_uaf+0x140/0x310
[   49.817136]  ? __pfx_ksize_uaf+0x10/0x10
[   49.817873]  ? __schedule+0x70b/0x1190
[   49.818468]  ? ktime_get_ts64+0x118/0x140
[   49.819072]  kunit_try_run_case+0x126/0x290
[   49.819968]  ? __pfx_kunit_try_run_case+0x10/0x10
[   49.820514]  ? __kasan_check_write+0x18/0x20
[   49.821254]  ? trace_preempt_on+0x20/0xa0
[   49.822237]  ? __kthread_parkme+0x4f/0xd0
[   49.822922]  ? preempt_count_sub+0x50/0x80
[   49.823463]  ? __pfx_kunit_try_run_case+0x10/0x10
[   49.824170]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   49.824973]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   49.825682]  kthread+0x19e/0x1e0
[   49.826789]  ? __pfx_kthread+0x10/0x10
[   49.827320]  ret_from_fork+0x41/0x70
[   49.827960]  ? __pfx_kthread+0x10/0x10
[   49.828443]  ret_from_fork_asm+0x1b/0x30
[   49.828817]  </TASK>
[   49.829140] 
[   49.829410] Allocated by task 210:
[   49.829764]  kasan_save_stack+0x3c/0x60
[   49.830305]  kasan_set_track+0x29/0x40
[   49.831327]  kasan_save_alloc_info+0x22/0x30
[   49.832063]  __kasan_kmalloc+0xb7/0xc0
[   49.832704]  kmalloc_trace+0x4c/0xb0
[   49.833216]  ksize_uaf+0x9d/0x310
[   49.833667]  kunit_try_run_case+0x126/0x290
[   49.834262]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   49.834987]  kthread+0x19e/0x1e0
[   49.835573]  ret_from_fork+0x41/0x70
[   49.836280]  ret_from_fork_asm+0x1b/0x30
[   49.837326] 
[   49.837617] Freed by task 210:
[   49.838119]  kasan_save_stack+0x3c/0x60
[   49.838678]  kasan_set_track+0x29/0x40
[   49.839173]  kasan_save_free_info+0x2f/0x50
[   49.839796]  ____kasan_slab_free+0x172/0x1d0
[   49.840540]  __kasan_slab_free+0x16/0x20
[   49.841011]  __kmem_cache_free+0x190/0x310
[   49.842003]  kfree+0x7c/0x120
[   49.842385]  ksize_uaf+0xbd/0x310
[   49.842872]  kunit_try_run_case+0x126/0x290
[   49.843378]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   49.844197]  kthread+0x19e/0x1e0
[   49.845085]  ret_from_fork+0x41/0x70
[   49.845780]  ret_from_fork_asm+0x1b/0x30
[   49.846398] 
[   49.846824] The buggy address belongs to the object at ffff88810284c900
[   49.846824]  which belongs to the cache kmalloc-128 of size 128
[   49.847564] The buggy address is located 120 bytes inside of
[   49.847564]  freed 128-byte region [ffff88810284c900, ffff88810284c980)
[   49.848407] 
[   49.849252] The buggy address belongs to the physical page:
[   49.849997] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10284c
[   49.850939] flags: 0x200000000000800(slab|node=0|zone=2)
[   49.851472] page_type: 0xffffffff()
[   49.852117] raw: 0200000000000800 ffff8881000418c0 dead000000000122 0000000000000000
[   49.853397] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   49.853912] page dumped because: kasan: bad access detected
[   49.854290] 
[   49.854888] Memory state around the buggy address:
[   49.855641]  ffff88810284c800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   49.856634]  ffff88810284c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.857553] >ffff88810284c900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   49.858838]                                                                 ^
[   49.859549]  ffff88810284c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.860365]  ffff88810284ca00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.861084] ==================================================================
[   49.687411] ==================================================================
[   49.688527] BUG: KASAN: slab-use-after-free in ksize_uaf+0xd4/0x310
[   49.689215] Read of size 1 at addr ffff88810284c900 by task kunit_try_catch/210
[   49.690120] 
[   49.690416] CPU: 0 PID: 210 Comm: kunit_try_catch Tainted: G    B            N 6.6.76-rc1 #1
[   49.691312] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   49.692300] Call Trace:
[   49.692720]  <TASK>
[   49.693110]  dump_stack_lvl+0x4e/0x90
[   49.693686]  print_report+0xd2/0x660
[   49.694328]  ? __virt_addr_valid+0x156/0x1e0
[   49.694967]  ? kasan_complete_mode_report_info+0x64/0x200
[   49.695585]  kasan_report+0xff/0x140
[   49.696209]  ? ksize_uaf+0xd4/0x310
[   49.696811]  ? ksize_uaf+0xd4/0x310
[   49.697329]  ? ksize_uaf+0xd4/0x310
[   49.697947]  __kasan_check_byte+0x3d/0x50
[   49.698503]  ksize+0x20/0x60
[   49.699242]  ksize_uaf+0xd4/0x310
[   49.700213]  ? __pfx_ksize_uaf+0x10/0x10
[   49.701202]  ? __schedule+0x70b/0x1190
[   49.701970]  ? ktime_get_ts64+0x118/0x140
[   49.702546]  kunit_try_run_case+0x126/0x290
[   49.703138]  ? __pfx_kunit_try_run_case+0x10/0x10
[   49.703692]  ? __kasan_check_write+0x18/0x20
[   49.704343]  ? trace_preempt_on+0x20/0xa0
[   49.704960]  ? __kthread_parkme+0x4f/0xd0
[   49.705389]  ? preempt_count_sub+0x50/0x80
[   49.706274]  ? __pfx_kunit_try_run_case+0x10/0x10
[   49.707071]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   49.707688]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   49.708402]  kthread+0x19e/0x1e0
[   49.708844]  ? __pfx_kthread+0x10/0x10
[   49.709518]  ret_from_fork+0x41/0x70
[   49.710054]  ? __pfx_kthread+0x10/0x10
[   49.710533]  ret_from_fork_asm+0x1b/0x30
[   49.711336]  </TASK>
[   49.711774] 
[   49.712055] Allocated by task 210:
[   49.712498]  kasan_save_stack+0x3c/0x60
[   49.713110]  kasan_set_track+0x29/0x40
[   49.713623]  kasan_save_alloc_info+0x22/0x30
[   49.714315]  __kasan_kmalloc+0xb7/0xc0
[   49.714824]  kmalloc_trace+0x4c/0xb0
[   49.715467]  ksize_uaf+0x9d/0x310
[   49.716021]  kunit_try_run_case+0x126/0x290
[   49.716592]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   49.717330]  kthread+0x19e/0x1e0
[   49.717810]  ret_from_fork+0x41/0x70
[   49.718425]  ret_from_fork_asm+0x1b/0x30
[   49.718944] 
[   49.719217] Freed by task 210:
[   49.719670]  kasan_save_stack+0x3c/0x60
[   49.720213]  kasan_set_track+0x29/0x40
[   49.720833]  kasan_save_free_info+0x2f/0x50
[   49.721411]  ____kasan_slab_free+0x172/0x1d0
[   49.722075]  __kasan_slab_free+0x16/0x20
[   49.722656]  __kmem_cache_free+0x190/0x310
[   49.723216]  kfree+0x7c/0x120
[   49.723682]  ksize_uaf+0xbd/0x310
[   49.724197]  kunit_try_run_case+0x126/0x290
[   49.724720]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   49.725534]  kthread+0x19e/0x1e0
[   49.726132]  ret_from_fork+0x41/0x70
[   49.726642]  ret_from_fork_asm+0x1b/0x30
[   49.727297] 
[   49.727576] The buggy address belongs to the object at ffff88810284c900
[   49.727576]  which belongs to the cache kmalloc-128 of size 128
[   49.728790] The buggy address is located 0 bytes inside of
[   49.728790]  freed 128-byte region [ffff88810284c900, ffff88810284c980)
[   49.729907] 
[   49.730231] The buggy address belongs to the physical page:
[   49.730842] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10284c
[   49.731766] flags: 0x200000000000800(slab|node=0|zone=2)
[   49.732337] page_type: 0xffffffff()
[   49.732928] raw: 0200000000000800 ffff8881000418c0 dead000000000122 0000000000000000
[   49.733672] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   49.734517] page dumped because: kasan: bad access detected
[   49.735169] 
[   49.735497] Memory state around the buggy address:
[   49.736041]  ffff88810284c800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   49.736848]  ffff88810284c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.737599] >ffff88810284c900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   49.738415]                    ^
[   49.738918]  ffff88810284c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.739627]  ffff88810284ca00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.740453] ==================================================================