Hay
Date
July 13, 2025, 11:09 p.m.

Environment
qemu-arm64
qemu-x86_64

[   15.838543] ==================================================================
[   15.838602] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520
[   15.838650] Read of size 1 at addr fff00000c171e200 by task kunit_try_catch/165
[   15.838697] 
[   15.838726] CPU: 0 UID: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   15.838804] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.838830] Hardware name: linux,dummy-virt (DT)
[   15.838860] Call trace:
[   15.838901]  show_stack+0x20/0x38 (C)
[   15.838951]  dump_stack_lvl+0x8c/0xd0
[   15.839004]  print_report+0x118/0x5d0
[   15.839050]  kasan_report+0xdc/0x128
[   15.839103]  __asan_report_load1_noabort+0x20/0x30
[   15.839153]  krealloc_uaf+0x4c8/0x520
[   15.839210]  kunit_try_run_case+0x170/0x3f0
[   15.839256]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.839528]  kthread+0x328/0x630
[   15.839894]  ret_from_fork+0x10/0x20
[   15.840275] 
[   15.840309] Allocated by task 165:
[   15.840338]  kasan_save_stack+0x3c/0x68
[   15.840380]  kasan_save_track+0x20/0x40
[   15.840417]  kasan_save_alloc_info+0x40/0x58
[   15.840783]  __kasan_kmalloc+0xd4/0xd8
[   15.840877]  __kmalloc_cache_noprof+0x16c/0x3c0
[   15.840954]  krealloc_uaf+0xc8/0x520
[   15.841097]  kunit_try_run_case+0x170/0x3f0
[   15.841154]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.841244]  kthread+0x328/0x630
[   15.841339]  ret_from_fork+0x10/0x20
[   15.841375] 
[   15.841624] Freed by task 165:
[   15.841691]  kasan_save_stack+0x3c/0x68
[   15.841843]  kasan_save_track+0x20/0x40
[   15.841911]  kasan_save_free_info+0x4c/0x78
[   15.841981]  __kasan_slab_free+0x6c/0x98
[   15.842141]  kfree+0x214/0x3c8
[   15.842224]  krealloc_uaf+0x12c/0x520
[   15.842533]  kunit_try_run_case+0x170/0x3f0
[   15.842603]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.842678]  kthread+0x328/0x630
[   15.842790]  ret_from_fork+0x10/0x20
[   15.842867] 
[   15.842901] The buggy address belongs to the object at fff00000c171e200
[   15.842901]  which belongs to the cache kmalloc-256 of size 256
[   15.842982] The buggy address is located 0 bytes inside of
[   15.842982]  freed 256-byte region [fff00000c171e200, fff00000c171e300)
[   15.843336] 
[   15.843394] The buggy address belongs to the physical page:
[   15.843503] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10171e
[   15.843577] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   15.843645] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   15.843788] page_type: f5(slab)
[   15.843857] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   15.843916] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.844350] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   15.844417] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.844551] head: 0bfffe0000000001 ffffc1ffc305c781 00000000ffffffff 00000000ffffffff
[   15.844636] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   15.844694] page dumped because: kasan: bad access detected
[   15.845297] 
[   15.845352] Memory state around the buggy address:
[   15.845469]  fff00000c171e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.845523]  fff00000c171e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.845579] >fff00000c171e200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.845635]                    ^
[   15.845718]  fff00000c171e280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.845829]  fff00000c171e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.845898] ==================================================================
[   15.829865] ==================================================================
[   15.829947] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520
[   15.830325] Read of size 1 at addr fff00000c171e200 by task kunit_try_catch/165
[   15.830484] 
[   15.830553] CPU: 0 UID: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   15.830696] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.830724] Hardware name: linux,dummy-virt (DT)
[   15.830771] Call trace:
[   15.830799]  show_stack+0x20/0x38 (C)
[   15.830877]  dump_stack_lvl+0x8c/0xd0
[   15.830924]  print_report+0x118/0x5d0
[   15.830968]  kasan_report+0xdc/0x128
[   15.831179]  __kasan_check_byte+0x54/0x70
[   15.831531]  krealloc_noprof+0x44/0x360
[   15.831603]  krealloc_uaf+0x180/0x520
[   15.831647]  kunit_try_run_case+0x170/0x3f0
[   15.831745]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.831800]  kthread+0x328/0x630
[   15.831841]  ret_from_fork+0x10/0x20
[   15.831903] 
[   15.831921] Allocated by task 165:
[   15.831949]  kasan_save_stack+0x3c/0x68
[   15.831997]  kasan_save_track+0x20/0x40
[   15.832034]  kasan_save_alloc_info+0x40/0x58
[   15.832072]  __kasan_kmalloc+0xd4/0xd8
[   15.832116]  __kmalloc_cache_noprof+0x16c/0x3c0
[   15.832571]  krealloc_uaf+0xc8/0x520
[   15.832769]  kunit_try_run_case+0x170/0x3f0
[   15.832830]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.832974]  kthread+0x328/0x630
[   15.833044]  ret_from_fork+0x10/0x20
[   15.833102] 
[   15.833212] Freed by task 165:
[   15.833262]  kasan_save_stack+0x3c/0x68
[   15.833343]  kasan_save_track+0x20/0x40
[   15.833457]  kasan_save_free_info+0x4c/0x78
[   15.833536]  __kasan_slab_free+0x6c/0x98
[   15.833599]  kfree+0x214/0x3c8
[   15.833632]  krealloc_uaf+0x12c/0x520
[   15.833921]  kunit_try_run_case+0x170/0x3f0
[   15.834013]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.834163]  kthread+0x328/0x630
[   15.834243]  ret_from_fork+0x10/0x20
[   15.834369] 
[   15.834423] The buggy address belongs to the object at fff00000c171e200
[   15.834423]  which belongs to the cache kmalloc-256 of size 256
[   15.834833] The buggy address is located 0 bytes inside of
[   15.834833]  freed 256-byte region [fff00000c171e200, fff00000c171e300)
[   15.834933] 
[   15.834964] The buggy address belongs to the physical page:
[   15.835101] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10171e
[   15.835217] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   15.835389] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   15.835488] page_type: f5(slab)
[   15.835542] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   15.835663] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.835727] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   15.835963] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.836168] head: 0bfffe0000000001 ffffc1ffc305c781 00000000ffffffff 00000000ffffffff
[   15.836321] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   15.836421] page dumped because: kasan: bad access detected
[   15.836460] 
[   15.836477] Memory state around the buggy address:
[   15.836510]  fff00000c171e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.836884]  fff00000c171e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.836932] >fff00000c171e200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.837282]                    ^
[   15.837342]  fff00000c171e280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.837502]  fff00000c171e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.837566] ==================================================================

[   16.650084] ==================================================================
[   16.650132] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520
[   16.650177] Read of size 1 at addr fff00000c4519000 by task kunit_try_catch/165
[   16.650238] 
[   16.650267] CPU: 1 UID: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.650344] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.650370] Hardware name: linux,dummy-virt (DT)
[   16.650400] Call trace:
[   16.650440]  show_stack+0x20/0x38 (C)
[   16.650487]  dump_stack_lvl+0x8c/0xd0
[   16.650532]  print_report+0x118/0x5d0
[   16.650581]  kasan_report+0xdc/0x128
[   16.650626]  __asan_report_load1_noabort+0x20/0x30
[   16.650675]  krealloc_uaf+0x4c8/0x520
[   16.650723]  kunit_try_run_case+0x170/0x3f0
[   16.650771]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.650822]  kthread+0x328/0x630
[   16.650862]  ret_from_fork+0x10/0x20
[   16.650908] 
[   16.650925] Allocated by task 165:
[   16.650952]  kasan_save_stack+0x3c/0x68
[   16.650991]  kasan_save_track+0x20/0x40
[   16.651026]  kasan_save_alloc_info+0x40/0x58
[   16.651065]  __kasan_kmalloc+0xd4/0xd8
[   16.651110]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.651149]  krealloc_uaf+0xc8/0x520
[   16.651193]  kunit_try_run_case+0x170/0x3f0
[   16.651229]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.651270]  kthread+0x328/0x630
[   16.651301]  ret_from_fork+0x10/0x20
[   16.651334] 
[   16.651351] Freed by task 165:
[   16.651496]  kasan_save_stack+0x3c/0x68
[   16.651708]  kasan_save_track+0x20/0x40
[   16.651750]  kasan_save_free_info+0x4c/0x78
[   16.651811]  __kasan_slab_free+0x6c/0x98
[   16.651865]  kfree+0x214/0x3c8
[   16.652003]  krealloc_uaf+0x12c/0x520
[   16.652102]  kunit_try_run_case+0x170/0x3f0
[   16.652216]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.652355]  kthread+0x328/0x630
[   16.652484]  ret_from_fork+0x10/0x20
[   16.652606] 
[   16.652657] The buggy address belongs to the object at fff00000c4519000
[   16.652657]  which belongs to the cache kmalloc-256 of size 256
[   16.652789] The buggy address is located 0 bytes inside of
[   16.652789]  freed 256-byte region [fff00000c4519000, fff00000c4519100)
[   16.653088] 
[   16.653111] The buggy address belongs to the physical page:
[   16.653232] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104518
[   16.653288] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.653334] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.653492] page_type: f5(slab)
[   16.653589] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.653719] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.653814] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.653883] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.654016] head: 0bfffe0000000001 ffffc1ffc3114601 00000000ffffffff 00000000ffffffff
[   16.654107] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   16.654147] page dumped because: kasan: bad access detected
[   16.654195] 
[   16.654212] Memory state around the buggy address:
[   16.654242]  fff00000c4518f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.654439]  fff00000c4518f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.654542] >fff00000c4519000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.654620]                    ^
[   16.654648]  fff00000c4519080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.654728]  fff00000c4519100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.654801] ==================================================================
[   16.642715] ==================================================================
[   16.642793] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520
[   16.642843] Read of size 1 at addr fff00000c4519000 by task kunit_try_catch/165
[   16.642908] 
[   16.642939] CPU: 1 UID: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.643019] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.643045] Hardware name: linux,dummy-virt (DT)
[   16.643075] Call trace:
[   16.643095]  show_stack+0x20/0x38 (C)
[   16.643141]  dump_stack_lvl+0x8c/0xd0
[   16.643209]  print_report+0x118/0x5d0
[   16.643255]  kasan_report+0xdc/0x128
[   16.643298]  __kasan_check_byte+0x54/0x70
[   16.643342]  krealloc_noprof+0x44/0x360
[   16.643417]  krealloc_uaf+0x180/0x520
[   16.643460]  kunit_try_run_case+0x170/0x3f0
[   16.643505]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.643555]  kthread+0x328/0x630
[   16.643595]  ret_from_fork+0x10/0x20
[   16.643640] 
[   16.643993] Allocated by task 165:
[   16.644060]  kasan_save_stack+0x3c/0x68
[   16.644125]  kasan_save_track+0x20/0x40
[   16.644244]  kasan_save_alloc_info+0x40/0x58
[   16.644315]  __kasan_kmalloc+0xd4/0xd8
[   16.644383]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.644421]  krealloc_uaf+0xc8/0x520
[   16.644483]  kunit_try_run_case+0x170/0x3f0
[   16.644520]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.644563]  kthread+0x328/0x630
[   16.644784]  ret_from_fork+0x10/0x20
[   16.644852] 
[   16.644947] Freed by task 165:
[   16.645013]  kasan_save_stack+0x3c/0x68
[   16.645124]  kasan_save_track+0x20/0x40
[   16.645171]  kasan_save_free_info+0x4c/0x78
[   16.645219]  __kasan_slab_free+0x6c/0x98
[   16.645257]  kfree+0x214/0x3c8
[   16.645477]  krealloc_uaf+0x12c/0x520
[   16.645635]  kunit_try_run_case+0x170/0x3f0
[   16.645722]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.645834]  kthread+0x328/0x630
[   16.645915]  ret_from_fork+0x10/0x20
[   16.646034] 
[   16.646124] The buggy address belongs to the object at fff00000c4519000
[   16.646124]  which belongs to the cache kmalloc-256 of size 256
[   16.646364] The buggy address is located 0 bytes inside of
[   16.646364]  freed 256-byte region [fff00000c4519000, fff00000c4519100)
[   16.646620] 
[   16.646691] The buggy address belongs to the physical page:
[   16.646734] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104518
[   16.646971] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.647090] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.647218] page_type: f5(slab)
[   16.647363] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.647457] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.647521] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.647924] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.648087] head: 0bfffe0000000001 ffffc1ffc3114601 00000000ffffffff 00000000ffffffff
[   16.648271] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   16.648371] page dumped because: kasan: bad access detected
[   16.648460] 
[   16.648521] Memory state around the buggy address:
[   16.648605]  fff00000c4518f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.648746]  fff00000c4518f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.648849] >fff00000c4519000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.648911]                    ^
[   16.648938]  fff00000c4519080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.649110]  fff00000c4519100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.649286] ==================================================================

[   12.531896] ==================================================================
[   12.532388] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x53c/0x5e0
[   12.532765] Read of size 1 at addr ffff888100aab200 by task kunit_try_catch/181
[   12.533175] 
[   12.533351] CPU: 1 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.533393] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.533405] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.533425] Call Trace:
[   12.533437]  <TASK>
[   12.533462]  dump_stack_lvl+0x73/0xb0
[   12.533489]  print_report+0xd1/0x610
[   12.533512]  ? __virt_addr_valid+0x1db/0x2d0
[   12.533547]  ? krealloc_uaf+0x53c/0x5e0
[   12.533579]  ? kasan_complete_mode_report_info+0x64/0x200
[   12.533603]  ? krealloc_uaf+0x53c/0x5e0
[   12.533624]  kasan_report+0x141/0x180
[   12.533652]  ? krealloc_uaf+0x53c/0x5e0
[   12.533678]  __asan_report_load1_noabort+0x18/0x20
[   12.533703]  krealloc_uaf+0x53c/0x5e0
[   12.533725]  ? __pfx_krealloc_uaf+0x10/0x10
[   12.533746]  ? finish_task_switch.isra.0+0x153/0x700
[   12.533769]  ? __switch_to+0x47/0xf50
[   12.533794]  ? __schedule+0x10cc/0x2b60
[   12.533816]  ? __pfx_read_tsc+0x10/0x10
[   12.533845]  ? ktime_get_ts64+0x86/0x230
[   12.533871]  kunit_try_run_case+0x1a5/0x480
[   12.533897]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.533921]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.533945]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.533970]  ? __kthread_parkme+0x82/0x180
[   12.533990]  ? preempt_count_sub+0x50/0x80
[   12.534014]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.534039]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.534063]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.534089]  kthread+0x337/0x6f0
[   12.534108]  ? trace_preempt_on+0x20/0xc0
[   12.534131]  ? __pfx_kthread+0x10/0x10
[   12.534152]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.534173]  ? calculate_sigpending+0x7b/0xa0
[   12.534197]  ? __pfx_kthread+0x10/0x10
[   12.534219]  ret_from_fork+0x116/0x1d0
[   12.534237]  ? __pfx_kthread+0x10/0x10
[   12.534258]  ret_from_fork_asm+0x1a/0x30
[   12.534289]  </TASK>
[   12.534298] 
[   12.548787] Allocated by task 181:
[   12.549148]  kasan_save_stack+0x45/0x70
[   12.549307]  kasan_save_track+0x18/0x40
[   12.549760]  kasan_save_alloc_info+0x3b/0x50
[   12.550242]  __kasan_kmalloc+0xb7/0xc0
[   12.550416]  __kmalloc_cache_noprof+0x189/0x420
[   12.550653]  krealloc_uaf+0xbb/0x5e0
[   12.551068]  kunit_try_run_case+0x1a5/0x480
[   12.551470]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.552006]  kthread+0x337/0x6f0
[   12.552413]  ret_from_fork+0x116/0x1d0
[   12.552853]  ret_from_fork_asm+0x1a/0x30
[   12.553234] 
[   12.553387] Freed by task 181:
[   12.553582]  kasan_save_stack+0x45/0x70
[   12.554023]  kasan_save_track+0x18/0x40
[   12.554238]  kasan_save_free_info+0x3f/0x60
[   12.555042]  __kasan_slab_free+0x56/0x70
[   12.555425]  kfree+0x222/0x3f0
[   12.555569]  krealloc_uaf+0x13d/0x5e0
[   12.555827]  kunit_try_run_case+0x1a5/0x480
[   12.556285]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.556884]  kthread+0x337/0x6f0
[   12.557276]  ret_from_fork+0x116/0x1d0
[   12.557418]  ret_from_fork_asm+0x1a/0x30
[   12.557709] 
[   12.557868] The buggy address belongs to the object at ffff888100aab200
[   12.557868]  which belongs to the cache kmalloc-256 of size 256
[   12.559011] The buggy address is located 0 bytes inside of
[   12.559011]  freed 256-byte region [ffff888100aab200, ffff888100aab300)
[   12.559820] 
[   12.559979] The buggy address belongs to the physical page:
[   12.560544] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aaa
[   12.560787] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.561013] flags: 0x200000000000040(head|node=0|zone=2)
[   12.561213] page_type: f5(slab)
[   12.561333] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.561935] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.562306] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.562770] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.563145] head: 0200000000000001 ffffea000402aa81 00000000ffffffff 00000000ffffffff
[   12.563444] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   12.563816] page dumped because: kasan: bad access detected
[   12.564088] 
[   12.564198] Memory state around the buggy address:
[   12.564383]  ffff888100aab100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.564801]  ffff888100aab180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.565258] >ffff888100aab200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.565648]                    ^
[   12.565978]  ffff888100aab280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.566264]  ffff888100aab300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.566652] ==================================================================
[   12.491250] ==================================================================
[   12.491884] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x1b8/0x5e0
[   12.492115] Read of size 1 at addr ffff888100aab200 by task kunit_try_catch/181
[   12.492430] 
[   12.492666] CPU: 1 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.492722] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.492733] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.492754] Call Trace:
[   12.492766]  <TASK>
[   12.492782]  dump_stack_lvl+0x73/0xb0
[   12.492812]  print_report+0xd1/0x610
[   12.492835]  ? __virt_addr_valid+0x1db/0x2d0
[   12.492859]  ? krealloc_uaf+0x1b8/0x5e0
[   12.492881]  ? kasan_complete_mode_report_info+0x64/0x200
[   12.492905]  ? krealloc_uaf+0x1b8/0x5e0
[   12.492926]  kasan_report+0x141/0x180
[   12.492947]  ? krealloc_uaf+0x1b8/0x5e0
[   12.492971]  ? krealloc_uaf+0x1b8/0x5e0
[   12.493003]  __kasan_check_byte+0x3d/0x50
[   12.493024]  krealloc_noprof+0x3f/0x340
[   12.493048]  krealloc_uaf+0x1b8/0x5e0
[   12.493080]  ? __pfx_krealloc_uaf+0x10/0x10
[   12.493101]  ? finish_task_switch.isra.0+0x153/0x700
[   12.493125]  ? __switch_to+0x47/0xf50
[   12.493161]  ? __schedule+0x10cc/0x2b60
[   12.493183]  ? __pfx_read_tsc+0x10/0x10
[   12.493204]  ? ktime_get_ts64+0x86/0x230
[   12.493229]  kunit_try_run_case+0x1a5/0x480
[   12.493255]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.493278]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.493301]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.493325]  ? __kthread_parkme+0x82/0x180
[   12.493346]  ? preempt_count_sub+0x50/0x80
[   12.493377]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.493402]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.493437]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.493472]  kthread+0x337/0x6f0
[   12.493511]  ? trace_preempt_on+0x20/0xc0
[   12.493534]  ? __pfx_kthread+0x10/0x10
[   12.493555]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.493587]  ? calculate_sigpending+0x7b/0xa0
[   12.493611]  ? __pfx_kthread+0x10/0x10
[   12.493632]  ret_from_fork+0x116/0x1d0
[   12.493651]  ? __pfx_kthread+0x10/0x10
[   12.493672]  ret_from_fork_asm+0x1a/0x30
[   12.493711]  </TASK>
[   12.493721] 
[   12.508800] Allocated by task 181:
[   12.509151]  kasan_save_stack+0x45/0x70
[   12.509585]  kasan_save_track+0x18/0x40
[   12.510024]  kasan_save_alloc_info+0x3b/0x50
[   12.510518]  __kasan_kmalloc+0xb7/0xc0
[   12.510921]  __kmalloc_cache_noprof+0x189/0x420
[   12.511122]  krealloc_uaf+0xbb/0x5e0
[   12.511253]  kunit_try_run_case+0x1a5/0x480
[   12.511398]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.511961]  kthread+0x337/0x6f0
[   12.512342]  ret_from_fork+0x116/0x1d0
[   12.512772]  ret_from_fork_asm+0x1a/0x30
[   12.513217] 
[   12.513406] Freed by task 181:
[   12.513747]  kasan_save_stack+0x45/0x70
[   12.514102]  kasan_save_track+0x18/0x40
[   12.514550]  kasan_save_free_info+0x3f/0x60
[   12.515009]  __kasan_slab_free+0x56/0x70
[   12.515330]  kfree+0x222/0x3f0
[   12.515682]  krealloc_uaf+0x13d/0x5e0
[   12.515875]  kunit_try_run_case+0x1a5/0x480
[   12.516295]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.516798]  kthread+0x337/0x6f0
[   12.517146]  ret_from_fork+0x116/0x1d0
[   12.517318]  ret_from_fork_asm+0x1a/0x30
[   12.517624] 
[   12.517836] The buggy address belongs to the object at ffff888100aab200
[   12.517836]  which belongs to the cache kmalloc-256 of size 256
[   12.519143] The buggy address is located 0 bytes inside of
[   12.519143]  freed 256-byte region [ffff888100aab200, ffff888100aab300)
[   12.520021] 
[   12.520221] The buggy address belongs to the physical page:
[   12.520484] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aaa
[   12.521066] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.521869] flags: 0x200000000000040(head|node=0|zone=2)
[   12.522371] page_type: f5(slab)
[   12.522571] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.523260] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.523963] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.524622] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.525123] head: 0200000000000001 ffffea000402aa81 00000000ffffffff 00000000ffffffff
[   12.525381] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   12.526135] page dumped because: kasan: bad access detected
[   12.526696] 
[   12.526886] Memory state around the buggy address:
[   12.527420]  ffff888100aab100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.528177]  ffff888100aab180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.529014] >ffff888100aab200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.529587]                    ^
[   12.529918]  ffff888100aab280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.530442]  ffff888100aab300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.530894] ==================================================================

[   12.811231] ==================================================================
[   12.812268] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x1b8/0x5e0
[   12.812612] Read of size 1 at addr ffff888100343a00 by task kunit_try_catch/182
[   12.812939] 
[   12.813118] CPU: 0 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.813162] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.813173] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.813192] Call Trace:
[   12.813204]  <TASK>
[   12.813219]  dump_stack_lvl+0x73/0xb0
[   12.813298]  print_report+0xd1/0x610
[   12.813334]  ? __virt_addr_valid+0x1db/0x2d0
[   12.813370]  ? krealloc_uaf+0x1b8/0x5e0
[   12.813391]  ? kasan_complete_mode_report_info+0x64/0x200
[   12.813414]  ? krealloc_uaf+0x1b8/0x5e0
[   12.813435]  kasan_report+0x141/0x180
[   12.813457]  ? krealloc_uaf+0x1b8/0x5e0
[   12.813525]  ? krealloc_uaf+0x1b8/0x5e0
[   12.813547]  __kasan_check_byte+0x3d/0x50
[   12.813569]  krealloc_noprof+0x3f/0x340
[   12.813630]  krealloc_uaf+0x1b8/0x5e0
[   12.813720]  ? __pfx_krealloc_uaf+0x10/0x10
[   12.813743]  ? finish_task_switch.isra.0+0x153/0x700
[   12.813767]  ? __switch_to+0x47/0xf50
[   12.813792]  ? __schedule+0x10cc/0x2b60
[   12.813814]  ? __pfx_read_tsc+0x10/0x10
[   12.813836]  ? ktime_get_ts64+0x86/0x230
[   12.813862]  kunit_try_run_case+0x1a5/0x480
[   12.813888]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.813911]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.813935]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.813960]  ? __kthread_parkme+0x82/0x180
[   12.813983]  ? preempt_count_sub+0x50/0x80
[   12.814007]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.814033]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.814072]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.814099]  kthread+0x337/0x6f0
[   12.814128]  ? trace_preempt_on+0x20/0xc0
[   12.814152]  ? __pfx_kthread+0x10/0x10
[   12.814172]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.814194]  ? calculate_sigpending+0x7b/0xa0
[   12.814218]  ? __pfx_kthread+0x10/0x10
[   12.814239]  ret_from_fork+0x116/0x1d0
[   12.814258]  ? __pfx_kthread+0x10/0x10
[   12.814279]  ret_from_fork_asm+0x1a/0x30
[   12.814310]  </TASK>
[   12.814320] 
[   12.823326] Allocated by task 182:
[   12.823583]  kasan_save_stack+0x45/0x70
[   12.823955]  kasan_save_track+0x18/0x40
[   12.824292]  kasan_save_alloc_info+0x3b/0x50
[   12.824449]  __kasan_kmalloc+0xb7/0xc0
[   12.824580]  __kmalloc_cache_noprof+0x189/0x420
[   12.824769]  krealloc_uaf+0xbb/0x5e0
[   12.824954]  kunit_try_run_case+0x1a5/0x480
[   12.825430]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.825900]  kthread+0x337/0x6f0
[   12.826092]  ret_from_fork+0x116/0x1d0
[   12.826286]  ret_from_fork_asm+0x1a/0x30
[   12.826434] 
[   12.826699] Freed by task 182:
[   12.826875]  kasan_save_stack+0x45/0x70
[   12.827082]  kasan_save_track+0x18/0x40
[   12.827392]  kasan_save_free_info+0x3f/0x60
[   12.827607]  __kasan_slab_free+0x56/0x70
[   12.827932]  kfree+0x222/0x3f0
[   12.828068]  krealloc_uaf+0x13d/0x5e0
[   12.828252]  kunit_try_run_case+0x1a5/0x480
[   12.828465]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.829346]  kthread+0x337/0x6f0
[   12.829520]  ret_from_fork+0x116/0x1d0
[   12.829690]  ret_from_fork_asm+0x1a/0x30
[   12.829832] 
[   12.829904] The buggy address belongs to the object at ffff888100343a00
[   12.829904]  which belongs to the cache kmalloc-256 of size 256
[   12.830328] The buggy address is located 0 bytes inside of
[   12.830328]  freed 256-byte region [ffff888100343a00, ffff888100343b00)
[   12.830676] 
[   12.830753] The buggy address belongs to the physical page:
[   12.830928] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100342
[   12.831743] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.832099] flags: 0x200000000000040(head|node=0|zone=2)
[   12.832367] page_type: f5(slab)
[   12.832541] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.833909] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.835203] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.835440] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.835764] head: 0200000000000001 ffffea000400d081 00000000ffffffff 00000000ffffffff
[   12.835995] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   12.836284] page dumped because: kasan: bad access detected
[   12.837662] 
[   12.837749] Memory state around the buggy address:
[   12.837942]  ffff888100343900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.838259]  ffff888100343980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.839001] >ffff888100343a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.839272]                    ^
[   12.839393]  ffff888100343a80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.840217]  ffff888100343b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.840551] ==================================================================
[   12.843381] ==================================================================
[   12.843920] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x53c/0x5e0
[   12.844369] Read of size 1 at addr ffff888100343a00 by task kunit_try_catch/182
[   12.845762] 
[   12.845901] CPU: 0 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.845948] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.845960] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.845980] Call Trace:
[   12.845996]  <TASK>
[   12.846012]  dump_stack_lvl+0x73/0xb0
[   12.846044]  print_report+0xd1/0x610
[   12.846082]  ? __virt_addr_valid+0x1db/0x2d0
[   12.846105]  ? krealloc_uaf+0x53c/0x5e0
[   12.846126]  ? kasan_complete_mode_report_info+0x64/0x200
[   12.846149]  ? krealloc_uaf+0x53c/0x5e0
[   12.846321]  kasan_report+0x141/0x180
[   12.846344]  ? krealloc_uaf+0x53c/0x5e0
[   12.846371]  __asan_report_load1_noabort+0x18/0x20
[   12.846396]  krealloc_uaf+0x53c/0x5e0
[   12.846417]  ? __pfx_krealloc_uaf+0x10/0x10
[   12.846439]  ? finish_task_switch.isra.0+0x153/0x700
[   12.846463]  ? __switch_to+0x47/0xf50
[   12.846488]  ? __schedule+0x10cc/0x2b60
[   12.846510]  ? __pfx_read_tsc+0x10/0x10
[   12.846531]  ? ktime_get_ts64+0x86/0x230
[   12.846555]  kunit_try_run_case+0x1a5/0x480
[   12.846579]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.846603]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.846627]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.846798]  ? __kthread_parkme+0x82/0x180
[   12.846824]  ? preempt_count_sub+0x50/0x80
[   12.846847]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.846872]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.846897]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.846924]  kthread+0x337/0x6f0
[   12.846943]  ? trace_preempt_on+0x20/0xc0
[   12.846967]  ? __pfx_kthread+0x10/0x10
[   12.846988]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.847009]  ? calculate_sigpending+0x7b/0xa0
[   12.847034]  ? __pfx_kthread+0x10/0x10
[   12.847074]  ret_from_fork+0x116/0x1d0
[   12.847093]  ? __pfx_kthread+0x10/0x10
[   12.847114]  ret_from_fork_asm+0x1a/0x30
[   12.847145]  </TASK>
[   12.847155] 
[   12.856356] Allocated by task 182:
[   12.856580]  kasan_save_stack+0x45/0x70
[   12.856728]  kasan_save_track+0x18/0x40
[   12.856863]  kasan_save_alloc_info+0x3b/0x50
[   12.857013]  __kasan_kmalloc+0xb7/0xc0
[   12.857255]  __kmalloc_cache_noprof+0x189/0x420
[   12.857536]  krealloc_uaf+0xbb/0x5e0
[   12.857727]  kunit_try_run_case+0x1a5/0x480
[   12.857943]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.858249]  kthread+0x337/0x6f0
[   12.858410]  ret_from_fork+0x116/0x1d0
[   12.858582]  ret_from_fork_asm+0x1a/0x30
[   12.858771] 
[   12.858870] Freed by task 182:
[   12.859003]  kasan_save_stack+0x45/0x70
[   12.859471]  kasan_save_track+0x18/0x40
[   12.859758]  kasan_save_free_info+0x3f/0x60
[   12.859960]  __kasan_slab_free+0x56/0x70
[   12.860188]  kfree+0x222/0x3f0
[   12.860309]  krealloc_uaf+0x13d/0x5e0
[   12.860441]  kunit_try_run_case+0x1a5/0x480
[   12.860587]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.861209]  kthread+0x337/0x6f0
[   12.861537]  ret_from_fork+0x116/0x1d0
[   12.861797]  ret_from_fork_asm+0x1a/0x30
[   12.862111] 
[   12.862227] The buggy address belongs to the object at ffff888100343a00
[   12.862227]  which belongs to the cache kmalloc-256 of size 256
[   12.862993] The buggy address is located 0 bytes inside of
[   12.862993]  freed 256-byte region [ffff888100343a00, ffff888100343b00)
[   12.863617] 
[   12.863774] The buggy address belongs to the physical page:
[   12.863984] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100342
[   12.864295] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.864840] flags: 0x200000000000040(head|node=0|zone=2)
[   12.865157] page_type: f5(slab)
[   12.865356] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.865656] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.866249] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.866591] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.867263] head: 0200000000000001 ffffea000400d081 00000000ffffffff 00000000ffffffff
[   12.867638] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   12.868046] page dumped because: kasan: bad access detected
[   12.868355] 
[   12.868473] Memory state around the buggy address:
[   12.868648]  ffff888100343900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.869095]  ffff888100343980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.869358] >ffff888100343a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.869807]                    ^
[   12.870011]  ffff888100343a80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.870431]  ffff888100343b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.870775] ==================================================================