Hay
Date
July 6, 2025, 11:09 p.m.

Environment
qemu-arm64
qemu-x86_64
x86

[   16.838379] ==================================================================
[   16.838571] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520
[   16.838781] Read of size 1 at addr fff00000c45a8c00 by task kunit_try_catch/165
[   16.838830] 
[   16.838861] CPU: 0 UID: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   16.839448] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.839639] Hardware name: linux,dummy-virt (DT)
[   16.839720] Call trace:
[   16.839950]  show_stack+0x20/0x38 (C)
[   16.840039]  dump_stack_lvl+0x8c/0xd0
[   16.840173]  print_report+0x118/0x608
[   16.840218]  kasan_report+0xdc/0x128
[   16.840261]  __asan_report_load1_noabort+0x20/0x30
[   16.840609]  krealloc_uaf+0x4c8/0x520
[   16.840653]  kunit_try_run_case+0x170/0x3f0
[   16.840734]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.840906]  kthread+0x328/0x630
[   16.840964]  ret_from_fork+0x10/0x20
[   16.841021] 
[   16.841038] Allocated by task 165:
[   16.841111]  kasan_save_stack+0x3c/0x68
[   16.841289]  kasan_save_track+0x20/0x40
[   16.841374]  kasan_save_alloc_info+0x40/0x58
[   16.841474]  __kasan_kmalloc+0xd4/0xd8
[   16.841585]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.841676]  krealloc_uaf+0xc8/0x520
[   16.841764]  kunit_try_run_case+0x170/0x3f0
[   16.841800]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.841842]  kthread+0x328/0x630
[   16.841872]  ret_from_fork+0x10/0x20
[   16.841952] 
[   16.841995] Freed by task 165:
[   16.842019]  kasan_save_stack+0x3c/0x68
[   16.842055]  kasan_save_track+0x20/0x40
[   16.842090]  kasan_save_free_info+0x4c/0x78
[   16.842127]  __kasan_slab_free+0x6c/0x98
[   16.842162]  kfree+0x214/0x3c8
[   16.842194]  krealloc_uaf+0x12c/0x520
[   16.842371]  kunit_try_run_case+0x170/0x3f0
[   16.842638]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.842963]  kthread+0x328/0x630
[   16.843276]  ret_from_fork+0x10/0x20
[   16.843357] 
[   16.843660] The buggy address belongs to the object at fff00000c45a8c00
[   16.843660]  which belongs to the cache kmalloc-256 of size 256
[   16.843722] The buggy address is located 0 bytes inside of
[   16.843722]  freed 256-byte region [fff00000c45a8c00, fff00000c45a8d00)
[   16.843780] 
[   16.843800] The buggy address belongs to the physical page:
[   16.843841] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1045a8
[   16.843940] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.844395] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.844489] page_type: f5(slab)
[   16.844713] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.844838] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.844927] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.845113] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.845278] head: 0bfffe0000000001 ffffc1ffc3116a01 00000000ffffffff 00000000ffffffff
[   16.845325] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   16.845363] page dumped because: kasan: bad access detected
[   16.845824] 
[   16.845861] Memory state around the buggy address:
[   16.845895]  fff00000c45a8b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.845937]  fff00000c45a8b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.845991] >fff00000c45a8c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.846027]                    ^
[   16.846054]  fff00000c45a8c80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.846104]  fff00000c45a8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.846140] ==================================================================
[   16.826549] ==================================================================
[   16.826653] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520
[   16.826705] Read of size 1 at addr fff00000c45a8c00 by task kunit_try_catch/165
[   16.826752] 
[   16.826784] CPU: 0 UID: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   16.826862] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.826887] Hardware name: linux,dummy-virt (DT)
[   16.826916] Call trace:
[   16.826936]  show_stack+0x20/0x38 (C)
[   16.826996]  dump_stack_lvl+0x8c/0xd0
[   16.827201]  print_report+0x118/0x608
[   16.827353]  kasan_report+0xdc/0x128
[   16.827738]  __kasan_check_byte+0x54/0x70
[   16.827789]  krealloc_noprof+0x44/0x360
[   16.827834]  krealloc_uaf+0x180/0x520
[   16.828105]  kunit_try_run_case+0x170/0x3f0
[   16.828264]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.828899]  kthread+0x328/0x630
[   16.828947]  ret_from_fork+0x10/0x20
[   16.829640] 
[   16.829660] Allocated by task 165:
[   16.830269]  kasan_save_stack+0x3c/0x68
[   16.830333]  kasan_save_track+0x20/0x40
[   16.830370]  kasan_save_alloc_info+0x40/0x58
[   16.830409]  __kasan_kmalloc+0xd4/0xd8
[   16.830935]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.831370]  krealloc_uaf+0xc8/0x520
[   16.831587]  kunit_try_run_case+0x170/0x3f0
[   16.831717]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.831760]  kthread+0x328/0x630
[   16.831792]  ret_from_fork+0x10/0x20
[   16.831837] 
[   16.831991] Freed by task 165:
[   16.832120]  kasan_save_stack+0x3c/0x68
[   16.832160]  kasan_save_track+0x20/0x40
[   16.832254]  kasan_save_free_info+0x4c/0x78
[   16.832312]  __kasan_slab_free+0x6c/0x98
[   16.832426]  kfree+0x214/0x3c8
[   16.832459]  krealloc_uaf+0x12c/0x520
[   16.832494]  kunit_try_run_case+0x170/0x3f0
[   16.832530]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.832611]  kthread+0x328/0x630
[   16.832767]  ret_from_fork+0x10/0x20
[   16.832950] 
[   16.832973] The buggy address belongs to the object at fff00000c45a8c00
[   16.832973]  which belongs to the cache kmalloc-256 of size 256
[   16.833198] The buggy address is located 0 bytes inside of
[   16.833198]  freed 256-byte region [fff00000c45a8c00, fff00000c45a8d00)
[   16.833311] 
[   16.833332] The buggy address belongs to the physical page:
[   16.833866] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1045a8
[   16.834236] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.834407] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.834503] page_type: f5(slab)
[   16.834540] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.834766] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.834964] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.835025] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.835260] head: 0bfffe0000000001 ffffc1ffc3116a01 00000000ffffffff 00000000ffffffff
[   16.835411] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   16.835692] page dumped because: kasan: bad access detected
[   16.835815] 
[   16.835909] Memory state around the buggy address:
[   16.835944]  fff00000c45a8b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.835997]  fff00000c45a8b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.836038] >fff00000c45a8c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.836074]                    ^
[   16.836101]  fff00000c45a8c80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.836154]  fff00000c45a8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.836189] ==================================================================

[   16.788251] ==================================================================
[   16.788341] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520
[   16.788399] Read of size 1 at addr fff00000c172e200 by task kunit_try_catch/165
[   16.788578] 
[   16.788609] CPU: 1 UID: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   16.788892] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.788926] Hardware name: linux,dummy-virt (DT)
[   16.788955] Call trace:
[   16.788975]  show_stack+0x20/0x38 (C)
[   16.789509]  dump_stack_lvl+0x8c/0xd0
[   16.789672]  print_report+0x118/0x608
[   16.789716]  kasan_report+0xdc/0x128
[   16.790122]  __kasan_check_byte+0x54/0x70
[   16.790189]  krealloc_noprof+0x44/0x360
[   16.790274]  krealloc_uaf+0x180/0x520
[   16.790334]  kunit_try_run_case+0x170/0x3f0
[   16.790381]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.790438]  kthread+0x328/0x630
[   16.790477]  ret_from_fork+0x10/0x20
[   16.790522] 
[   16.790540] Allocated by task 165:
[   16.790695]  kasan_save_stack+0x3c/0x68
[   16.790863]  kasan_save_track+0x20/0x40
[   16.790978]  kasan_save_alloc_info+0x40/0x58
[   16.791019]  __kasan_kmalloc+0xd4/0xd8
[   16.791095]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.791141]  krealloc_uaf+0xc8/0x520
[   16.791338]  kunit_try_run_case+0x170/0x3f0
[   16.791599]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.791641]  kthread+0x328/0x630
[   16.792044]  ret_from_fork+0x10/0x20
[   16.792294] 
[   16.792332] Freed by task 165:
[   16.792415]  kasan_save_stack+0x3c/0x68
[   16.792538]  kasan_save_track+0x20/0x40
[   16.792596]  kasan_save_free_info+0x4c/0x78
[   16.792635]  __kasan_slab_free+0x6c/0x98
[   16.792672]  kfree+0x214/0x3c8
[   16.792704]  krealloc_uaf+0x12c/0x520
[   16.792739]  kunit_try_run_case+0x170/0x3f0
[   16.792775]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.792816]  kthread+0x328/0x630
[   16.792847]  ret_from_fork+0x10/0x20
[   16.792898] 
[   16.792932] The buggy address belongs to the object at fff00000c172e200
[   16.792932]  which belongs to the cache kmalloc-256 of size 256
[   16.793416] The buggy address is located 0 bytes inside of
[   16.793416]  freed 256-byte region [fff00000c172e200, fff00000c172e300)
[   16.793541] 
[   16.793562] The buggy address belongs to the physical page:
[   16.793592] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10172e
[   16.793644] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.794167] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.794314] page_type: f5(slab)
[   16.794351] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.794522] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.794599] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.794765] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.794886] head: 0bfffe0000000001 ffffc1ffc305cb81 00000000ffffffff 00000000ffffffff
[   16.795051] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   16.795092] page dumped because: kasan: bad access detected
[   16.795175] 
[   16.795201] Memory state around the buggy address:
[   16.795232]  fff00000c172e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.795326]  fff00000c172e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.795378] >fff00000c172e200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.795414]                    ^
[   16.795496]  fff00000c172e280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.795680]  fff00000c172e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.795728] ==================================================================
[   16.796940] ==================================================================
[   16.796988] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520
[   16.797331] Read of size 1 at addr fff00000c172e200 by task kunit_try_catch/165
[   16.797466] 
[   16.797578] CPU: 1 UID: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   16.797663] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.797688] Hardware name: linux,dummy-virt (DT)
[   16.797716] Call trace:
[   16.797736]  show_stack+0x20/0x38 (C)
[   16.797783]  dump_stack_lvl+0x8c/0xd0
[   16.797838]  print_report+0x118/0x608
[   16.797883]  kasan_report+0xdc/0x128
[   16.798271]  __asan_report_load1_noabort+0x20/0x30
[   16.798343]  krealloc_uaf+0x4c8/0x520
[   16.798398]  kunit_try_run_case+0x170/0x3f0
[   16.798446]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.798595]  kthread+0x328/0x630
[   16.798894]  ret_from_fork+0x10/0x20
[   16.799228] 
[   16.799269] Allocated by task 165:
[   16.799297]  kasan_save_stack+0x3c/0x68
[   16.799342]  kasan_save_track+0x20/0x40
[   16.799508]  kasan_save_alloc_info+0x40/0x58
[   16.799590]  __kasan_kmalloc+0xd4/0xd8
[   16.799665]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.799783]  krealloc_uaf+0xc8/0x520
[   16.799856]  kunit_try_run_case+0x170/0x3f0
[   16.800091]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.800390]  kthread+0x328/0x630
[   16.800529]  ret_from_fork+0x10/0x20
[   16.800701] 
[   16.800803] Freed by task 165:
[   16.800864]  kasan_save_stack+0x3c/0x68
[   16.800950]  kasan_save_track+0x20/0x40
[   16.800987]  kasan_save_free_info+0x4c/0x78
[   16.801025]  __kasan_slab_free+0x6c/0x98
[   16.801065]  kfree+0x214/0x3c8
[   16.801098]  krealloc_uaf+0x12c/0x520
[   16.801142]  kunit_try_run_case+0x170/0x3f0
[   16.801178]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.801456]  kthread+0x328/0x630
[   16.801647]  ret_from_fork+0x10/0x20
[   16.801683] 
[   16.801702] The buggy address belongs to the object at fff00000c172e200
[   16.801702]  which belongs to the cache kmalloc-256 of size 256
[   16.802158] The buggy address is located 0 bytes inside of
[   16.802158]  freed 256-byte region [fff00000c172e200, fff00000c172e300)
[   16.802336] 
[   16.802357] The buggy address belongs to the physical page:
[   16.802385] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10172e
[   16.802466] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.802592] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.802640] page_type: f5(slab)
[   16.802675] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.802723] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.802770] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.803056] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.803232] head: 0bfffe0000000001 ffffc1ffc305cb81 00000000ffffffff 00000000ffffffff
[   16.803332] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   16.803410] page dumped because: kasan: bad access detected
[   16.803439] 
[   16.803456] Memory state around the buggy address:
[   16.803493]  fff00000c172e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.803658]  fff00000c172e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.803699] >fff00000c172e200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.803774]                    ^
[   16.803902]  fff00000c172e280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.804046]  fff00000c172e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.804087] ==================================================================

[   13.273994] ==================================================================
[   13.274309] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x53c/0x5e0
[   13.274921] Read of size 1 at addr ffff88810034ce00 by task kunit_try_catch/182
[   13.275745] 
[   13.275871] CPU: 0 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   13.275983] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.276007] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.276126] Call Trace:
[   13.276159]  <TASK>
[   13.276189]  dump_stack_lvl+0x73/0xb0
[   13.276259]  print_report+0xd1/0x650
[   13.276301]  ? __virt_addr_valid+0x1db/0x2d0
[   13.276333]  ? krealloc_uaf+0x53c/0x5e0
[   13.276354]  ? kasan_complete_mode_report_info+0x64/0x200
[   13.276377]  ? krealloc_uaf+0x53c/0x5e0
[   13.276397]  kasan_report+0x141/0x180
[   13.276417]  ? krealloc_uaf+0x53c/0x5e0
[   13.276441]  __asan_report_load1_noabort+0x18/0x20
[   13.276463]  krealloc_uaf+0x53c/0x5e0
[   13.276482]  ? __pfx_krealloc_uaf+0x10/0x10
[   13.276528]  ? finish_task_switch.isra.0+0x153/0x700
[   13.276568]  ? __switch_to+0x47/0xf50
[   13.276607]  ? __schedule+0x10cc/0x2b60
[   13.276651]  ? __pfx_read_tsc+0x10/0x10
[   13.276671]  ? ktime_get_ts64+0x86/0x230
[   13.276695]  kunit_try_run_case+0x1a5/0x480
[   13.276717]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.276737]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.276759]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.276780]  ? __kthread_parkme+0x82/0x180
[   13.276798]  ? preempt_count_sub+0x50/0x80
[   13.276818]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.276839]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.276860]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.276880]  kthread+0x337/0x6f0
[   13.276898]  ? trace_preempt_on+0x20/0xc0
[   13.276919]  ? __pfx_kthread+0x10/0x10
[   13.276937]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.276957]  ? calculate_sigpending+0x7b/0xa0
[   13.276978]  ? __pfx_kthread+0x10/0x10
[   13.276998]  ret_from_fork+0x116/0x1d0
[   13.277014]  ? __pfx_kthread+0x10/0x10
[   13.277033]  ret_from_fork_asm+0x1a/0x30
[   13.277061]  </TASK>
[   13.277073] 
[   13.289793] Allocated by task 182:
[   13.290071]  kasan_save_stack+0x45/0x70
[   13.290720]  kasan_save_track+0x18/0x40
[   13.290973]  kasan_save_alloc_info+0x3b/0x50
[   13.291234]  __kasan_kmalloc+0xb7/0xc0
[   13.291423]  __kmalloc_cache_noprof+0x189/0x420
[   13.291791]  krealloc_uaf+0xbb/0x5e0
[   13.292050]  kunit_try_run_case+0x1a5/0x480
[   13.292221]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.292535]  kthread+0x337/0x6f0
[   13.292944]  ret_from_fork+0x116/0x1d0
[   13.293291]  ret_from_fork_asm+0x1a/0x30
[   13.293756] 
[   13.293947] Freed by task 182:
[   13.294133]  kasan_save_stack+0x45/0x70
[   13.294448]  kasan_save_track+0x18/0x40
[   13.295220]  kasan_save_free_info+0x3f/0x60
[   13.295674]  __kasan_slab_free+0x56/0x70
[   13.295946]  kfree+0x222/0x3f0
[   13.296196]  krealloc_uaf+0x13d/0x5e0
[   13.296654]  kunit_try_run_case+0x1a5/0x480
[   13.296880]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.297313]  kthread+0x337/0x6f0
[   13.297651]  ret_from_fork+0x116/0x1d0
[   13.297923]  ret_from_fork_asm+0x1a/0x30
[   13.298219] 
[   13.298379] The buggy address belongs to the object at ffff88810034ce00
[   13.298379]  which belongs to the cache kmalloc-256 of size 256
[   13.299071] The buggy address is located 0 bytes inside of
[   13.299071]  freed 256-byte region [ffff88810034ce00, ffff88810034cf00)
[   13.300165] 
[   13.300282] The buggy address belongs to the physical page:
[   13.300809] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10034c
[   13.301262] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   13.301748] flags: 0x200000000000040(head|node=0|zone=2)
[   13.301968] page_type: f5(slab)
[   13.302252] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   13.302496] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.303130] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   13.303461] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.304138] head: 0200000000000001 ffffea000400d301 00000000ffffffff 00000000ffffffff
[   13.304953] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   13.305285] page dumped because: kasan: bad access detected
[   13.305792] 
[   13.305939] Memory state around the buggy address:
[   13.306220]  ffff88810034cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.307137]  ffff88810034cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.307463] >ffff88810034ce00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.308061]                    ^
[   13.308293]  ffff88810034ce80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.309028]  ffff88810034cf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.309704] ==================================================================
[   13.236155] ==================================================================
[   13.236613] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x1b8/0x5e0
[   13.238030] Read of size 1 at addr ffff88810034ce00 by task kunit_try_catch/182
[   13.238371] 
[   13.238495] CPU: 0 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   13.238558] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.238576] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.238602] Call Trace:
[   13.238629]  <TASK>
[   13.238653]  dump_stack_lvl+0x73/0xb0
[   13.238704]  print_report+0xd1/0x650
[   13.238741]  ? __virt_addr_valid+0x1db/0x2d0
[   13.238776]  ? krealloc_uaf+0x1b8/0x5e0
[   13.238807]  ? kasan_complete_mode_report_info+0x64/0x200
[   13.238848]  ? krealloc_uaf+0x1b8/0x5e0
[   13.238887]  kasan_report+0x141/0x180
[   13.238921]  ? krealloc_uaf+0x1b8/0x5e0
[   13.238957]  ? krealloc_uaf+0x1b8/0x5e0
[   13.238986]  __kasan_check_byte+0x3d/0x50
[   13.239021]  krealloc_noprof+0x3f/0x340
[   13.239060]  krealloc_uaf+0x1b8/0x5e0
[   13.239096]  ? __pfx_krealloc_uaf+0x10/0x10
[   13.239130]  ? finish_task_switch.isra.0+0x153/0x700
[   13.239170]  ? __switch_to+0x47/0xf50
[   13.239215]  ? __schedule+0x10cc/0x2b60
[   13.239249]  ? __pfx_read_tsc+0x10/0x10
[   13.239276]  ? ktime_get_ts64+0x86/0x230
[   13.239307]  kunit_try_run_case+0x1a5/0x480
[   13.239336]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.239356]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.239377]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.239398]  ? __kthread_parkme+0x82/0x180
[   13.239418]  ? preempt_count_sub+0x50/0x80
[   13.239438]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.239459]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.239479]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.239501]  kthread+0x337/0x6f0
[   13.239527]  ? trace_preempt_on+0x20/0xc0
[   13.239557]  ? __pfx_kthread+0x10/0x10
[   13.239584]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.239613]  ? calculate_sigpending+0x7b/0xa0
[   13.239654]  ? __pfx_kthread+0x10/0x10
[   13.239673]  ret_from_fork+0x116/0x1d0
[   13.239690]  ? __pfx_kthread+0x10/0x10
[   13.239708]  ret_from_fork_asm+0x1a/0x30
[   13.239737]  </TASK>
[   13.239748] 
[   13.252507] Allocated by task 182:
[   13.252884]  kasan_save_stack+0x45/0x70
[   13.253182]  kasan_save_track+0x18/0x40
[   13.253392]  kasan_save_alloc_info+0x3b/0x50
[   13.253836]  __kasan_kmalloc+0xb7/0xc0
[   13.254296]  __kmalloc_cache_noprof+0x189/0x420
[   13.254814]  krealloc_uaf+0xbb/0x5e0
[   13.255332]  kunit_try_run_case+0x1a5/0x480
[   13.255811]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.256288]  kthread+0x337/0x6f0
[   13.256443]  ret_from_fork+0x116/0x1d0
[   13.256611]  ret_from_fork_asm+0x1a/0x30
[   13.256903] 
[   13.257096] Freed by task 182:
[   13.257765]  kasan_save_stack+0x45/0x70
[   13.257957]  kasan_save_track+0x18/0x40
[   13.258705]  kasan_save_free_info+0x3f/0x60
[   13.259154]  __kasan_slab_free+0x56/0x70
[   13.259578]  kfree+0x222/0x3f0
[   13.259745]  krealloc_uaf+0x13d/0x5e0
[   13.259861]  kunit_try_run_case+0x1a5/0x480
[   13.259975]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.260093]  kthread+0x337/0x6f0
[   13.260382]  ret_from_fork+0x116/0x1d0
[   13.260780]  ret_from_fork_asm+0x1a/0x30
[   13.261361] 
[   13.261607] The buggy address belongs to the object at ffff88810034ce00
[   13.261607]  which belongs to the cache kmalloc-256 of size 256
[   13.262669] The buggy address is located 0 bytes inside of
[   13.262669]  freed 256-byte region [ffff88810034ce00, ffff88810034cf00)
[   13.263450] 
[   13.263843] The buggy address belongs to the physical page:
[   13.264062] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10034c
[   13.264810] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   13.265030] flags: 0x200000000000040(head|node=0|zone=2)
[   13.265909] page_type: f5(slab)
[   13.266204] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   13.266417] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.267310] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   13.267628] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.267992] head: 0200000000000001 ffffea000400d301 00000000ffffffff 00000000ffffffff
[   13.268503] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   13.268946] page dumped because: kasan: bad access detected
[   13.269172] 
[   13.269571] Memory state around the buggy address:
[   13.269869]  ffff88810034cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.270777]  ffff88810034cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.270995] >ffff88810034ce00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.271486]                    ^
[   13.271802]  ffff88810034ce80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.272467]  ffff88810034cf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.272874] ==================================================================

[   13.458169] ==================================================================
[   13.458485] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x53c/0x5e0
[   13.459032] Read of size 1 at addr ffff888100a30400 by task kunit_try_catch/181
[   13.459771] 
[   13.460070] CPU: 1 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   13.460245] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.460259] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.460279] Call Trace:
[   13.460291]  <TASK>
[   13.460308]  dump_stack_lvl+0x73/0xb0
[   13.460339]  print_report+0xd1/0x650
[   13.460361]  ? __virt_addr_valid+0x1db/0x2d0
[   13.460383]  ? krealloc_uaf+0x53c/0x5e0
[   13.460403]  ? kasan_complete_mode_report_info+0x64/0x200
[   13.460428]  ? krealloc_uaf+0x53c/0x5e0
[   13.460449]  kasan_report+0x141/0x180
[   13.460471]  ? krealloc_uaf+0x53c/0x5e0
[   13.460498]  __asan_report_load1_noabort+0x18/0x20
[   13.460521]  krealloc_uaf+0x53c/0x5e0
[   13.460542]  ? __pfx_krealloc_uaf+0x10/0x10
[   13.460562]  ? finish_task_switch.isra.0+0x153/0x700
[   13.460584]  ? __switch_to+0x47/0xf50
[   13.460610]  ? __schedule+0x10cc/0x2b60
[   13.460632]  ? __pfx_read_tsc+0x10/0x10
[   13.460652]  ? ktime_get_ts64+0x86/0x230
[   13.460677]  kunit_try_run_case+0x1a5/0x480
[   13.460701]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.460771]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.460797]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.460819]  ? __kthread_parkme+0x82/0x180
[   13.460838]  ? preempt_count_sub+0x50/0x80
[   13.460861]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.460884]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.460906]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.460928]  kthread+0x337/0x6f0
[   13.460947]  ? trace_preempt_on+0x20/0xc0
[   13.460971]  ? __pfx_kthread+0x10/0x10
[   13.460991]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.461012]  ? calculate_sigpending+0x7b/0xa0
[   13.461036]  ? __pfx_kthread+0x10/0x10
[   13.461069]  ret_from_fork+0x116/0x1d0
[   13.461086]  ? __pfx_kthread+0x10/0x10
[   13.461106]  ret_from_fork_asm+0x1a/0x30
[   13.461138]  </TASK>
[   13.461149] 
[   13.473563] Allocated by task 181:
[   13.474099]  kasan_save_stack+0x45/0x70
[   13.474326]  kasan_save_track+0x18/0x40
[   13.474482]  kasan_save_alloc_info+0x3b/0x50
[   13.474638]  __kasan_kmalloc+0xb7/0xc0
[   13.474781]  __kmalloc_cache_noprof+0x189/0x420
[   13.474944]  krealloc_uaf+0xbb/0x5e0
[   13.475097]  kunit_try_run_case+0x1a5/0x480
[   13.475312]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.475645]  kthread+0x337/0x6f0
[   13.476091]  ret_from_fork+0x116/0x1d0
[   13.476444]  ret_from_fork_asm+0x1a/0x30
[   13.476814] 
[   13.476892] Freed by task 181:
[   13.477040]  kasan_save_stack+0x45/0x70
[   13.477440]  kasan_save_track+0x18/0x40
[   13.477831]  kasan_save_free_info+0x3f/0x60
[   13.478350]  __kasan_slab_free+0x56/0x70
[   13.478790]  kfree+0x222/0x3f0
[   13.479014]  krealloc_uaf+0x13d/0x5e0
[   13.479365]  kunit_try_run_case+0x1a5/0x480
[   13.479553]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.479745]  kthread+0x337/0x6f0
[   13.479873]  ret_from_fork+0x116/0x1d0
[   13.480012]  ret_from_fork_asm+0x1a/0x30
[   13.480175] 
[   13.480278] The buggy address belongs to the object at ffff888100a30400
[   13.480278]  which belongs to the cache kmalloc-256 of size 256
[   13.480786] The buggy address is located 0 bytes inside of
[   13.480786]  freed 256-byte region [ffff888100a30400, ffff888100a30500)
[   13.481333] 
[   13.481413] The buggy address belongs to the physical page:
[   13.481645] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a30
[   13.482031] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   13.482299] flags: 0x200000000000040(head|node=0|zone=2)
[   13.482567] page_type: f5(slab)
[   13.482750] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   13.483116] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.483434] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   13.483780] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.484236] head: 0200000000000001 ffffea0004028c01 00000000ffffffff 00000000ffffffff
[   13.484487] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   13.484875] page dumped because: kasan: bad access detected
[   13.485166] 
[   13.485246] Memory state around the buggy address:
[   13.485496]  ffff888100a30300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.485988]  ffff888100a30380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.486313] >ffff888100a30400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.486591]                    ^
[   13.486740]  ffff888100a30480: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.487095]  ffff888100a30500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.487367] ==================================================================
[   13.417269] ==================================================================
[   13.417823] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x1b8/0x5e0
[   13.418127] Read of size 1 at addr ffff888100a30400 by task kunit_try_catch/181
[   13.418413] 
[   13.418532] CPU: 1 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   13.418577] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.418588] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.418608] Call Trace:
[   13.418621]  <TASK>
[   13.418636]  dump_stack_lvl+0x73/0xb0
[   13.418666]  print_report+0xd1/0x650
[   13.418687]  ? __virt_addr_valid+0x1db/0x2d0
[   13.418711]  ? krealloc_uaf+0x1b8/0x5e0
[   13.418732]  ? kasan_complete_mode_report_info+0x64/0x200
[   13.418757]  ? krealloc_uaf+0x1b8/0x5e0
[   13.418777]  kasan_report+0x141/0x180
[   13.418799]  ? krealloc_uaf+0x1b8/0x5e0
[   13.418823]  ? krealloc_uaf+0x1b8/0x5e0
[   13.418843]  __kasan_check_byte+0x3d/0x50
[   13.418865]  krealloc_noprof+0x3f/0x340
[   13.418889]  krealloc_uaf+0x1b8/0x5e0
[   13.418910]  ? __pfx_krealloc_uaf+0x10/0x10
[   13.418930]  ? finish_task_switch.isra.0+0x153/0x700
[   13.418952]  ? __switch_to+0x47/0xf50
[   13.418979]  ? __schedule+0x10cc/0x2b60
[   13.419002]  ? __pfx_read_tsc+0x10/0x10
[   13.419022]  ? ktime_get_ts64+0x86/0x230
[   13.419084]  kunit_try_run_case+0x1a5/0x480
[   13.419111]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.419132]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.419155]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.419177]  ? __kthread_parkme+0x82/0x180
[   13.419197]  ? preempt_count_sub+0x50/0x80
[   13.419219]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.419242]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.419263]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.419297]  kthread+0x337/0x6f0
[   13.419317]  ? trace_preempt_on+0x20/0xc0
[   13.419357]  ? __pfx_kthread+0x10/0x10
[   13.419377]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.419397]  ? calculate_sigpending+0x7b/0xa0
[   13.419422]  ? __pfx_kthread+0x10/0x10
[   13.419443]  ret_from_fork+0x116/0x1d0
[   13.419461]  ? __pfx_kthread+0x10/0x10
[   13.419481]  ret_from_fork_asm+0x1a/0x30
[   13.419513]  </TASK>
[   13.419524] 
[   13.432765] Allocated by task 181:
[   13.432907]  kasan_save_stack+0x45/0x70
[   13.433364]  kasan_save_track+0x18/0x40
[   13.435278]  kasan_save_alloc_info+0x3b/0x50
[   13.435556]  __kasan_kmalloc+0xb7/0xc0
[   13.436143]  __kmalloc_cache_noprof+0x189/0x420
[   13.436368]  krealloc_uaf+0xbb/0x5e0
[   13.437026]  kunit_try_run_case+0x1a5/0x480
[   13.437240]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.437661]  kthread+0x337/0x6f0
[   13.438206]  ret_from_fork+0x116/0x1d0
[   13.438428]  ret_from_fork_asm+0x1a/0x30
[   13.438783] 
[   13.438949] Freed by task 181:
[   13.439403]  kasan_save_stack+0x45/0x70
[   13.439714]  kasan_save_track+0x18/0x40
[   13.440118]  kasan_save_free_info+0x3f/0x60
[   13.440595]  __kasan_slab_free+0x56/0x70
[   13.440972]  kfree+0x222/0x3f0
[   13.441195]  krealloc_uaf+0x13d/0x5e0
[   13.441693]  kunit_try_run_case+0x1a5/0x480
[   13.442129]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.442564]  kthread+0x337/0x6f0
[   13.442706]  ret_from_fork+0x116/0x1d0
[   13.443402]  ret_from_fork_asm+0x1a/0x30
[   13.444030] 
[   13.444425] The buggy address belongs to the object at ffff888100a30400
[   13.444425]  which belongs to the cache kmalloc-256 of size 256
[   13.445757] The buggy address is located 0 bytes inside of
[   13.445757]  freed 256-byte region [ffff888100a30400, ffff888100a30500)
[   13.446829] 
[   13.447219] The buggy address belongs to the physical page:
[   13.448092] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a30
[   13.449042] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   13.449400] flags: 0x200000000000040(head|node=0|zone=2)
[   13.449891] page_type: f5(slab)
[   13.450301] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   13.450684] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.451259] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   13.451791] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.452416] head: 0200000000000001 ffffea0004028c01 00000000ffffffff 00000000ffffffff
[   13.452737] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   13.453351] page dumped because: kasan: bad access detected
[   13.453843] 
[   13.453962] Memory state around the buggy address:
[   13.454210]  ffff888100a30300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.454744]  ffff888100a30380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.455270] >ffff888100a30400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.455832]                    ^
[   13.455991]  ffff888100a30480: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.456310]  ffff888100a30500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.456634] ==================================================================

[   23.442665] ==================================================================
[   23.449896] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x53c/0x5e0
[   23.456516] Read of size 1 at addr ffff88810033ec00 by task kunit_try_catch/205
[   23.463830] 
[   23.465348] CPU: 0 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   23.465356] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   23.465359] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   23.465362] Call Trace:
[   23.465363]  <TASK>
[   23.465365]  dump_stack_lvl+0x73/0xb0
[   23.465369]  print_report+0xd1/0x650
[   23.465386]  ? __virt_addr_valid+0x1db/0x2d0
[   23.465390]  ? krealloc_uaf+0x53c/0x5e0
[   23.465393]  ? kasan_complete_mode_report_info+0x64/0x200
[   23.465398]  ? krealloc_uaf+0x53c/0x5e0
[   23.465402]  kasan_report+0x141/0x180
[   23.465406]  ? krealloc_uaf+0x53c/0x5e0
[   23.465411]  __asan_report_load1_noabort+0x18/0x20
[   23.465416]  krealloc_uaf+0x53c/0x5e0
[   23.465419]  ? __pfx_krealloc_uaf+0x10/0x10
[   23.465423]  ? finish_task_switch.isra.0+0x153/0x700
[   23.465427]  ? __switch_to+0x544/0xf50
[   23.465432]  ? __schedule+0x10cc/0x2b60
[   23.465436]  ? ktime_get_ts64+0x83/0x230
[   23.465440]  kunit_try_run_case+0x1a2/0x480
[   23.465444]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.465449]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.465453]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.465457]  ? __kthread_parkme+0x82/0x180
[   23.465460]  ? preempt_count_sub+0x50/0x80
[   23.465464]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.465469]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   23.465473]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.465477]  kthread+0x334/0x6f0
[   23.465480]  ? trace_preempt_on+0x20/0xc0
[   23.465484]  ? __pfx_kthread+0x10/0x10
[   23.465488]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.465492]  ? calculate_sigpending+0x7b/0xa0
[   23.465496]  ? __pfx_kthread+0x10/0x10
[   23.465500]  ret_from_fork+0x113/0x1d0
[   23.465503]  ? __pfx_kthread+0x10/0x10
[   23.465507]  ret_from_fork_asm+0x1a/0x30
[   23.465513]  </TASK>
[   23.465514] 
[   23.636904] Allocated by task 205:
[   23.640307]  kasan_save_stack+0x45/0x70
[   23.644148]  kasan_save_track+0x18/0x40
[   23.647986]  kasan_save_alloc_info+0x3b/0x50
[   23.652259]  __kasan_kmalloc+0xb7/0xc0
[   23.656013]  __kmalloc_cache_noprof+0x189/0x420
[   23.660553]  krealloc_uaf+0xbb/0x5e0
[   23.664133]  kunit_try_run_case+0x1a2/0x480
[   23.668320]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   23.673753]  kthread+0x334/0x6f0
[   23.676986]  ret_from_fork+0x113/0x1d0
[   23.680739]  ret_from_fork_asm+0x1a/0x30
[   23.684665] 
[   23.686163] Freed by task 205:
[   23.689222]  kasan_save_stack+0x45/0x70
[   23.693061]  kasan_save_track+0x18/0x40
[   23.696902]  kasan_save_free_info+0x3f/0x60
[   23.701087]  __kasan_slab_free+0x56/0x70
[   23.705015]  kfree+0x222/0x3f0
[   23.708073]  krealloc_uaf+0x13d/0x5e0
[   23.711740]  kunit_try_run_case+0x1a2/0x480
[   23.715925]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   23.721326]  kthread+0x334/0x6f0
[   23.724583]  ret_from_fork+0x113/0x1d0
[   23.728363]  ret_from_fork_asm+0x1a/0x30
[   23.732313] 
[   23.733814] The buggy address belongs to the object at ffff88810033ec00
[   23.733814]  which belongs to the cache kmalloc-256 of size 256
[   23.746328] The buggy address is located 0 bytes inside of
[   23.746328]  freed 256-byte region [ffff88810033ec00, ffff88810033ed00)
[   23.758426] 
[   23.759926] The buggy address belongs to the physical page:
[   23.765497] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10033e
[   23.773498] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.781149] flags: 0x200000000000040(head|node=0|zone=2)
[   23.786463] page_type: f5(slab)
[   23.789611] raw: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000
[   23.797362] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.805131] head: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000
[   23.812957] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.820782] head: 0200000000000001 ffffea000400cf81 00000000ffffffff 00000000ffffffff
[   23.828611] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   23.836444] page dumped because: kasan: bad access detected
[   23.842016] 
[   23.843514] Memory state around the buggy address:
[   23.848308]  ffff88810033eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.855526]  ffff88810033eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.862746] >ffff88810033ec00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.869964]                    ^
[   23.873198]  ffff88810033ec80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.880418]  ffff88810033ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.887636] ==================================================================
[   22.979323] ==================================================================
[   22.990929] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x1b8/0x5e0
[   22.997548] Read of size 1 at addr ffff88810033ec00 by task kunit_try_catch/205
[   23.004862] 
[   23.006365] CPU: 0 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   23.006373] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   23.006388] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   23.006391] Call Trace:
[   23.006393]  <TASK>
[   23.006394]  dump_stack_lvl+0x73/0xb0
[   23.006399]  print_report+0xd1/0x650
[   23.006403]  ? __virt_addr_valid+0x1db/0x2d0
[   23.006407]  ? krealloc_uaf+0x1b8/0x5e0
[   23.006410]  ? kasan_complete_mode_report_info+0x64/0x200
[   23.006415]  ? krealloc_uaf+0x1b8/0x5e0
[   23.006419]  kasan_report+0x141/0x180
[   23.006423]  ? krealloc_uaf+0x1b8/0x5e0
[   23.006427]  ? krealloc_uaf+0x1b8/0x5e0
[   23.006431]  __kasan_check_byte+0x3d/0x50
[   23.006435]  krealloc_noprof+0x3f/0x340
[   23.006439]  krealloc_uaf+0x1b8/0x5e0
[   23.006443]  ? __pfx_krealloc_uaf+0x10/0x10
[   23.006447]  ? finish_task_switch.isra.0+0x153/0x700
[   23.006451]  ? __switch_to+0x544/0xf50
[   23.006455]  ? __schedule+0x10cc/0x2b60
[   23.006459]  ? ktime_get_ts64+0x83/0x230
[   23.006463]  kunit_try_run_case+0x1a2/0x480
[   23.006468]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.006472]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.006476]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.006480]  ? __kthread_parkme+0x82/0x180
[   23.006483]  ? preempt_count_sub+0x50/0x80
[   23.006487]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.006492]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   23.006496]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.006500]  kthread+0x334/0x6f0
[   23.006503]  ? trace_preempt_on+0x20/0xc0
[   23.006507]  ? __pfx_kthread+0x10/0x10
[   23.006511]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.006515]  ? calculate_sigpending+0x7b/0xa0
[   23.006519]  ? __pfx_kthread+0x10/0x10
[   23.006523]  ret_from_fork+0x113/0x1d0
[   23.006526]  ? __pfx_kthread+0x10/0x10
[   23.006530]  ret_from_fork_asm+0x1a/0x30
[   23.006535]  </TASK>
[   23.006537] 
[   23.184740] Allocated by task 205:
[   23.188145]  kasan_save_stack+0x45/0x70
[   23.191985]  kasan_save_track+0x18/0x40
[   23.195824]  kasan_save_alloc_info+0x3b/0x50
[   23.200097]  __kasan_kmalloc+0xb7/0xc0
[   23.203850]  __kmalloc_cache_noprof+0x189/0x420
[   23.208405]  krealloc_uaf+0xbb/0x5e0
[   23.211986]  kunit_try_run_case+0x1a2/0x480
[   23.216173]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   23.221573]  kthread+0x334/0x6f0
[   23.224804]  ret_from_fork+0x113/0x1d0
[   23.228556]  ret_from_fork_asm+0x1a/0x30
[   23.232483] 
[   23.233982] Freed by task 205:
[   23.237041]  kasan_save_stack+0x45/0x70
[   23.240881]  kasan_save_track+0x18/0x40
[   23.244722]  kasan_save_free_info+0x3f/0x60
[   23.248914]  __kasan_slab_free+0x56/0x70
[   23.252841]  kfree+0x222/0x3f0
[   23.255901]  krealloc_uaf+0x13d/0x5e0
[   23.259565]  kunit_try_run_case+0x1a2/0x480
[   23.263753]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   23.269153]  kthread+0x334/0x6f0
[   23.272405]  ret_from_fork+0x113/0x1d0
[   23.276163]  ret_from_fork_asm+0x1a/0x30
[   23.280090] 
[   23.281589] The buggy address belongs to the object at ffff88810033ec00
[   23.281589]  which belongs to the cache kmalloc-256 of size 256
[   23.294103] The buggy address is located 0 bytes inside of
[   23.294103]  freed 256-byte region [ffff88810033ec00, ffff88810033ed00)
[   23.306185] 
[   23.307684] The buggy address belongs to the physical page:
[   23.313256] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10033e
[   23.321263] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.328915] flags: 0x200000000000040(head|node=0|zone=2)
[   23.334228] page_type: f5(slab)
[   23.337376] raw: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000
[   23.345141] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.352881] head: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000
[   23.360706] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.368532] head: 0200000000000001 ffffea000400cf81 00000000ffffffff 00000000ffffffff
[   23.376365] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   23.384220] page dumped because: kasan: bad access detected
[   23.389792] 
[   23.391291] Memory state around the buggy address:
[   23.396082]  ffff88810033eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.403303]  ffff88810033eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.410524] >ffff88810033ec00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.417749]                    ^
[   23.420984]  ffff88810033ec80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.428201]  ffff88810033ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.435421] ==================================================================