Hay
Date
July 20, 2025, 11:12 p.m.

Environment
qemu-arm64
qemu-x86_64

[   16.530095] ==================================================================
[   16.530279] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520
[   16.530446] Read of size 1 at addr fff00000c653c600 by task kunit_try_catch/164
[   16.530832] 
[   16.530960] CPU: 1 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   16.531056] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.531092] Hardware name: linux,dummy-virt (DT)
[   16.531125] Call trace:
[   16.531147]  show_stack+0x20/0x38 (C)
[   16.531580]  dump_stack_lvl+0x8c/0xd0
[   16.531664]  print_report+0x118/0x5d0
[   16.531719]  kasan_report+0xdc/0x128
[   16.531878]  __kasan_check_byte+0x54/0x70
[   16.531938]  krealloc_noprof+0x44/0x360
[   16.532149]  krealloc_uaf+0x180/0x520
[   16.532318]  kunit_try_run_case+0x170/0x3f0
[   16.532366]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.532417]  kthread+0x328/0x630
[   16.532458]  ret_from_fork+0x10/0x20
[   16.532506] 
[   16.532525] Allocated by task 164:
[   16.532553]  kasan_save_stack+0x3c/0x68
[   16.532595]  kasan_save_track+0x20/0x40
[   16.532632]  kasan_save_alloc_info+0x40/0x58
[   16.532684]  __kasan_kmalloc+0xd4/0xd8
[   16.532720]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.533085]  krealloc_uaf+0xc8/0x520
[   16.533329]  kunit_try_run_case+0x170/0x3f0
[   16.533418]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.533494]  kthread+0x328/0x630
[   16.533526]  ret_from_fork+0x10/0x20
[   16.533621] 
[   16.533711] Freed by task 164:
[   16.533866]  kasan_save_stack+0x3c/0x68
[   16.533918]  kasan_save_track+0x20/0x40
[   16.533956]  kasan_save_free_info+0x4c/0x78
[   16.533995]  __kasan_slab_free+0x6c/0x98
[   16.534031]  kfree+0x214/0x3c8
[   16.534064]  krealloc_uaf+0x12c/0x520
[   16.534099]  kunit_try_run_case+0x170/0x3f0
[   16.534136]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.534550]  kthread+0x328/0x630
[   16.534646]  ret_from_fork+0x10/0x20
[   16.534739] 
[   16.534763] The buggy address belongs to the object at fff00000c653c600
[   16.534763]  which belongs to the cache kmalloc-256 of size 256
[   16.535249] The buggy address is located 0 bytes inside of
[   16.535249]  freed 256-byte region [fff00000c653c600, fff00000c653c700)
[   16.535348] 
[   16.535380] The buggy address belongs to the physical page:
[   16.535441] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10653c
[   16.535540] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.535585] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.535929] page_type: f5(slab)
[   16.536009] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.536059] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.536108] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.536156] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.536214] head: 0bfffe0000000001 ffffc1ffc3194f01 00000000ffffffff 00000000ffffffff
[   16.536261] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   16.536432] page dumped because: kasan: bad access detected
[   16.536467] 
[   16.536485] Memory state around the buggy address:
[   16.536518]  fff00000c653c500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.536967]  fff00000c653c580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.537029] >fff00000c653c600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.537067]                    ^
[   16.537279]  fff00000c653c680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.537365]  fff00000c653c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.537403] ==================================================================
[   16.539015] ==================================================================
[   16.539066] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520
[   16.539114] Read of size 1 at addr fff00000c653c600 by task kunit_try_catch/164
[   16.539164] 
[   16.539195] CPU: 1 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   16.539275] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.539314] Hardware name: linux,dummy-virt (DT)
[   16.539344] Call trace:
[   16.539365]  show_stack+0x20/0x38 (C)
[   16.539717]  dump_stack_lvl+0x8c/0xd0
[   16.539802]  print_report+0x118/0x5d0
[   16.539908]  kasan_report+0xdc/0x128
[   16.539954]  __asan_report_load1_noabort+0x20/0x30
[   16.540351]  krealloc_uaf+0x4c8/0x520
[   16.540402]  kunit_try_run_case+0x170/0x3f0
[   16.540505]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.540557]  kthread+0x328/0x630
[   16.540854]  ret_from_fork+0x10/0x20
[   16.540995] 
[   16.541013] Allocated by task 164:
[   16.541040]  kasan_save_stack+0x3c/0x68
[   16.541080]  kasan_save_track+0x20/0x40
[   16.541117]  kasan_save_alloc_info+0x40/0x58
[   16.541156]  __kasan_kmalloc+0xd4/0xd8
[   16.541192]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.541230]  krealloc_uaf+0xc8/0x520
[   16.541270]  kunit_try_run_case+0x170/0x3f0
[   16.541447]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.541576]  kthread+0x328/0x630
[   16.541643]  ret_from_fork+0x10/0x20
[   16.541684] 
[   16.541730] Freed by task 164:
[   16.541756]  kasan_save_stack+0x3c/0x68
[   16.541855]  kasan_save_track+0x20/0x40
[   16.541891]  kasan_save_free_info+0x4c/0x78
[   16.541940]  __kasan_slab_free+0x6c/0x98
[   16.541976]  kfree+0x214/0x3c8
[   16.542008]  krealloc_uaf+0x12c/0x520
[   16.542043]  kunit_try_run_case+0x170/0x3f0
[   16.542410]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.542552]  kthread+0x328/0x630
[   16.542584]  ret_from_fork+0x10/0x20
[   16.542619] 
[   16.542644] The buggy address belongs to the object at fff00000c653c600
[   16.542644]  which belongs to the cache kmalloc-256 of size 256
[   16.542757] The buggy address is located 0 bytes inside of
[   16.542757]  freed 256-byte region [fff00000c653c600, fff00000c653c700)
[   16.542817] 
[   16.542837] The buggy address belongs to the physical page:
[   16.543143] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10653c
[   16.543254] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.543310] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.543499] page_type: f5(slab)
[   16.543629] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.543682] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.543730] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.543948] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.543998] head: 0bfffe0000000001 ffffc1ffc3194f01 00000000ffffffff 00000000ffffffff
[   16.544056] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   16.544149] page dumped because: kasan: bad access detected
[   16.544302] 
[   16.544320] Memory state around the buggy address:
[   16.544369]  fff00000c653c500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.544412]  fff00000c653c580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.544455] >fff00000c653c600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.544493]                    ^
[   16.544521]  fff00000c653c680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.544563]  fff00000c653c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.544601] ==================================================================

[   16.511643] ==================================================================
[   16.511760] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520
[   16.511846] Read of size 1 at addr fff00000c5b4fe00 by task kunit_try_catch/164
[   16.512192] 
[   16.512445] CPU: 1 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   16.512544] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.512571] Hardware name: linux,dummy-virt (DT)
[   16.512605] Call trace:
[   16.512757]  show_stack+0x20/0x38 (C)
[   16.512821]  dump_stack_lvl+0x8c/0xd0
[   16.512943]  print_report+0x118/0x5d0
[   16.513046]  kasan_report+0xdc/0x128
[   16.513167]  __asan_report_load1_noabort+0x20/0x30
[   16.513330]  krealloc_uaf+0x4c8/0x520
[   16.513425]  kunit_try_run_case+0x170/0x3f0
[   16.513482]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.513535]  kthread+0x328/0x630
[   16.513851]  ret_from_fork+0x10/0x20
[   16.514080] 
[   16.514120] Allocated by task 164:
[   16.514407]  kasan_save_stack+0x3c/0x68
[   16.514481]  kasan_save_track+0x20/0x40
[   16.514695]  kasan_save_alloc_info+0x40/0x58
[   16.514762]  __kasan_kmalloc+0xd4/0xd8
[   16.514934]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.515143]  krealloc_uaf+0xc8/0x520
[   16.515212]  kunit_try_run_case+0x170/0x3f0
[   16.515409]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.515587]  kthread+0x328/0x630
[   16.515640]  ret_from_fork+0x10/0x20
[   16.515985] 
[   16.516110] Freed by task 164:
[   16.516157]  kasan_save_stack+0x3c/0x68
[   16.516257]  kasan_save_track+0x20/0x40
[   16.516424]  kasan_save_free_info+0x4c/0x78
[   16.516641]  __kasan_slab_free+0x6c/0x98
[   16.516696]  kfree+0x214/0x3c8
[   16.516879]  krealloc_uaf+0x12c/0x520
[   16.517079]  kunit_try_run_case+0x170/0x3f0
[   16.517138]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.517196]  kthread+0x328/0x630
[   16.517229]  ret_from_fork+0x10/0x20
[   16.517417] 
[   16.517557] The buggy address belongs to the object at fff00000c5b4fe00
[   16.517557]  which belongs to the cache kmalloc-256 of size 256
[   16.517763] The buggy address is located 0 bytes inside of
[   16.517763]  freed 256-byte region [fff00000c5b4fe00, fff00000c5b4ff00)
[   16.517847] 
[   16.517970] The buggy address belongs to the physical page:
[   16.518002] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b4e
[   16.518094] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.518271] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.518373] page_type: f5(slab)
[   16.518553] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.518945] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.519035] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.519190] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.519248] head: 0bfffe0000000001 ffffc1ffc316d381 00000000ffffffff 00000000ffffffff
[   16.519592] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   16.519833] page dumped because: kasan: bad access detected
[   16.519901] 
[   16.519994] Memory state around the buggy address:
[   16.520028]  fff00000c5b4fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.520234]  fff00000c5b4fd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.520457] >fff00000c5b4fe00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.520641]                    ^
[   16.520841]  fff00000c5b4fe80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.520895]  fff00000c5b4ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.520934] ==================================================================
[   16.500806] ==================================================================
[   16.501296] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520
[   16.501433] Read of size 1 at addr fff00000c5b4fe00 by task kunit_try_catch/164
[   16.501551] 
[   16.501701] CPU: 1 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   16.501792] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.501818] Hardware name: linux,dummy-virt (DT)
[   16.501850] Call trace:
[   16.501873]  show_stack+0x20/0x38 (C)
[   16.501928]  dump_stack_lvl+0x8c/0xd0
[   16.501975]  print_report+0x118/0x5d0
[   16.502022]  kasan_report+0xdc/0x128
[   16.502067]  __kasan_check_byte+0x54/0x70
[   16.502113]  krealloc_noprof+0x44/0x360
[   16.502160]  krealloc_uaf+0x180/0x520
[   16.502689]  kunit_try_run_case+0x170/0x3f0
[   16.502773]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.503128]  kthread+0x328/0x630
[   16.503216]  ret_from_fork+0x10/0x20
[   16.503464] 
[   16.503659] Allocated by task 164:
[   16.503768]  kasan_save_stack+0x3c/0x68
[   16.504159]  kasan_save_track+0x20/0x40
[   16.504316]  kasan_save_alloc_info+0x40/0x58
[   16.504510]  __kasan_kmalloc+0xd4/0xd8
[   16.504690]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.504737]  krealloc_uaf+0xc8/0x520
[   16.504821]  kunit_try_run_case+0x170/0x3f0
[   16.504867]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.504910]  kthread+0x328/0x630
[   16.505097]  ret_from_fork+0x10/0x20
[   16.505307] 
[   16.505459] Freed by task 164:
[   16.505521]  kasan_save_stack+0x3c/0x68
[   16.505602]  kasan_save_track+0x20/0x40
[   16.505652]  kasan_save_free_info+0x4c/0x78
[   16.505934]  __kasan_slab_free+0x6c/0x98
[   16.506148]  kfree+0x214/0x3c8
[   16.506198]  krealloc_uaf+0x12c/0x520
[   16.506234]  kunit_try_run_case+0x170/0x3f0
[   16.506282]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.506327]  kthread+0x328/0x630
[   16.506361]  ret_from_fork+0x10/0x20
[   16.506397] 
[   16.506431] The buggy address belongs to the object at fff00000c5b4fe00
[   16.506431]  which belongs to the cache kmalloc-256 of size 256
[   16.506561] The buggy address is located 0 bytes inside of
[   16.506561]  freed 256-byte region [fff00000c5b4fe00, fff00000c5b4ff00)
[   16.506640] 
[   16.506672] The buggy address belongs to the physical page:
[   16.506705] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b4e
[   16.506767] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.506814] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.506865] page_type: f5(slab)
[   16.506920] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.506995] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.507045] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.507093] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.507141] head: 0bfffe0000000001 ffffc1ffc316d381 00000000ffffffff 00000000ffffffff
[   16.507198] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   16.507236] page dumped because: kasan: bad access detected
[   16.507267] 
[   16.507285] Memory state around the buggy address:
[   16.507318]  fff00000c5b4fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.507360]  fff00000c5b4fd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.507401] >fff00000c5b4fe00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.507438]                    ^
[   16.507466]  fff00000c5b4fe80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.507508]  fff00000c5b4ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.507544] ==================================================================

[   12.634268] ==================================================================
[   12.634605] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x53c/0x5e0
[   12.634974] Read of size 1 at addr ffff888100ab0a00 by task kunit_try_catch/182
[   12.635197] 
[   12.635279] CPU: 1 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   12.635320] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.635332] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.635352] Call Trace:
[   12.635368]  <TASK>
[   12.635383]  dump_stack_lvl+0x73/0xb0
[   12.635697]  print_report+0xd1/0x610
[   12.635722]  ? __virt_addr_valid+0x1db/0x2d0
[   12.635744]  ? krealloc_uaf+0x53c/0x5e0
[   12.635765]  ? kasan_complete_mode_report_info+0x64/0x200
[   12.635787]  ? krealloc_uaf+0x53c/0x5e0
[   12.635808]  kasan_report+0x141/0x180
[   12.635830]  ? krealloc_uaf+0x53c/0x5e0
[   12.635857]  __asan_report_load1_noabort+0x18/0x20
[   12.635881]  krealloc_uaf+0x53c/0x5e0
[   12.635902]  ? __pfx_krealloc_uaf+0x10/0x10
[   12.635923]  ? finish_task_switch.isra.0+0x153/0x700
[   12.635944]  ? __switch_to+0x47/0xf50
[   12.635970]  ? __schedule+0x10c6/0x2b60
[   12.635992]  ? __pfx_read_tsc+0x10/0x10
[   12.636012]  ? ktime_get_ts64+0x86/0x230
[   12.636101]  kunit_try_run_case+0x1a5/0x480
[   12.636128]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.636151]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.636175]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.636198]  ? __kthread_parkme+0x82/0x180
[   12.636218]  ? preempt_count_sub+0x50/0x80
[   12.636241]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.636264]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.636287]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.636310]  kthread+0x337/0x6f0
[   12.636329]  ? trace_preempt_on+0x20/0xc0
[   12.636352]  ? __pfx_kthread+0x10/0x10
[   12.636372]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.636393]  ? calculate_sigpending+0x7b/0xa0
[   12.636429]  ? __pfx_kthread+0x10/0x10
[   12.636451]  ret_from_fork+0x116/0x1d0
[   12.636469]  ? __pfx_kthread+0x10/0x10
[   12.636490]  ret_from_fork_asm+0x1a/0x30
[   12.636523]  </TASK>
[   12.636533] 
[   12.644685] Allocated by task 182:
[   12.644868]  kasan_save_stack+0x45/0x70
[   12.645152]  kasan_save_track+0x18/0x40
[   12.645352]  kasan_save_alloc_info+0x3b/0x50
[   12.645575]  __kasan_kmalloc+0xb7/0xc0
[   12.645723]  __kmalloc_cache_noprof+0x189/0x420
[   12.645882]  krealloc_uaf+0xbb/0x5e0
[   12.646015]  kunit_try_run_case+0x1a5/0x480
[   12.646270]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.646535]  kthread+0x337/0x6f0
[   12.646845]  ret_from_fork+0x116/0x1d0
[   12.647175]  ret_from_fork_asm+0x1a/0x30
[   12.647375] 
[   12.647475] Freed by task 182:
[   12.647590]  kasan_save_stack+0x45/0x70
[   12.647792]  kasan_save_track+0x18/0x40
[   12.647984]  kasan_save_free_info+0x3f/0x60
[   12.648266]  __kasan_slab_free+0x56/0x70
[   12.648429]  kfree+0x222/0x3f0
[   12.648550]  krealloc_uaf+0x13d/0x5e0
[   12.648740]  kunit_try_run_case+0x1a5/0x480
[   12.648951]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.649349]  kthread+0x337/0x6f0
[   12.649520]  ret_from_fork+0x116/0x1d0
[   12.649806]  ret_from_fork_asm+0x1a/0x30
[   12.649985] 
[   12.650141] The buggy address belongs to the object at ffff888100ab0a00
[   12.650141]  which belongs to the cache kmalloc-256 of size 256
[   12.650646] The buggy address is located 0 bytes inside of
[   12.650646]  freed 256-byte region [ffff888100ab0a00, ffff888100ab0b00)
[   12.651313] 
[   12.651412] The buggy address belongs to the physical page:
[   12.651683] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100ab0
[   12.651945] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.652177] flags: 0x200000000000040(head|node=0|zone=2)
[   12.652356] page_type: f5(slab)
[   12.652521] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.653193] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.653547] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.653883] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.654121] head: 0200000000000001 ffffea000402ac01 00000000ffffffff 00000000ffffffff
[   12.654355] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   12.654879] page dumped because: kasan: bad access detected
[   12.655140] 
[   12.655235] Memory state around the buggy address:
[   12.655802]  ffff888100ab0900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.656192]  ffff888100ab0980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.656447] >ffff888100ab0a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.656863]                    ^
[   12.657035]  ffff888100ab0a80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.657252]  ffff888100ab0b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.657475] ==================================================================
[   12.609199] ==================================================================
[   12.610383] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x1b8/0x5e0
[   12.610855] Read of size 1 at addr ffff888100ab0a00 by task kunit_try_catch/182
[   12.611495] 
[   12.611612] CPU: 1 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   12.611662] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.611676] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.611699] Call Trace:
[   12.611712]  <TASK>
[   12.611730]  dump_stack_lvl+0x73/0xb0
[   12.611765]  print_report+0xd1/0x610
[   12.611788]  ? __virt_addr_valid+0x1db/0x2d0
[   12.611812]  ? krealloc_uaf+0x1b8/0x5e0
[   12.611833]  ? kasan_complete_mode_report_info+0x64/0x200
[   12.611856]  ? krealloc_uaf+0x1b8/0x5e0
[   12.611878]  kasan_report+0x141/0x180
[   12.611900]  ? krealloc_uaf+0x1b8/0x5e0
[   12.611926]  ? krealloc_uaf+0x1b8/0x5e0
[   12.611947]  __kasan_check_byte+0x3d/0x50
[   12.611969]  krealloc_noprof+0x3f/0x340
[   12.611993]  krealloc_uaf+0x1b8/0x5e0
[   12.612014]  ? __pfx_krealloc_uaf+0x10/0x10
[   12.612049]  ? finish_task_switch.isra.0+0x153/0x700
[   12.612071]  ? __switch_to+0x47/0xf50
[   12.612098]  ? __schedule+0x10c6/0x2b60
[   12.612121]  ? __pfx_read_tsc+0x10/0x10
[   12.612141]  ? ktime_get_ts64+0x86/0x230
[   12.612168]  kunit_try_run_case+0x1a5/0x480
[   12.612194]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.612215]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.612239]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.612262]  ? __kthread_parkme+0x82/0x180
[   12.612282]  ? preempt_count_sub+0x50/0x80
[   12.612305]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.612329]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.612351]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.612375]  kthread+0x337/0x6f0
[   12.612394]  ? trace_preempt_on+0x20/0xc0
[   12.612428]  ? __pfx_kthread+0x10/0x10
[   12.612448]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.612469]  ? calculate_sigpending+0x7b/0xa0
[   12.612493]  ? __pfx_kthread+0x10/0x10
[   12.612515]  ret_from_fork+0x116/0x1d0
[   12.612533]  ? __pfx_kthread+0x10/0x10
[   12.612553]  ret_from_fork_asm+0x1a/0x30
[   12.612586]  </TASK>
[   12.612597] 
[   12.620855] Allocated by task 182:
[   12.620992]  kasan_save_stack+0x45/0x70
[   12.621148]  kasan_save_track+0x18/0x40
[   12.621345]  kasan_save_alloc_info+0x3b/0x50
[   12.621577]  __kasan_kmalloc+0xb7/0xc0
[   12.621771]  __kmalloc_cache_noprof+0x189/0x420
[   12.621997]  krealloc_uaf+0xbb/0x5e0
[   12.622242]  kunit_try_run_case+0x1a5/0x480
[   12.622439]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.622887]  kthread+0x337/0x6f0
[   12.623022]  ret_from_fork+0x116/0x1d0
[   12.623212]  ret_from_fork_asm+0x1a/0x30
[   12.623445] 
[   12.623545] Freed by task 182:
[   12.623708]  kasan_save_stack+0x45/0x70
[   12.623933]  kasan_save_track+0x18/0x40
[   12.624245]  kasan_save_free_info+0x3f/0x60
[   12.624465]  __kasan_slab_free+0x56/0x70
[   12.624607]  kfree+0x222/0x3f0
[   12.624733]  krealloc_uaf+0x13d/0x5e0
[   12.624867]  kunit_try_run_case+0x1a5/0x480
[   12.625015]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.625222]  kthread+0x337/0x6f0
[   12.625388]  ret_from_fork+0x116/0x1d0
[   12.625701]  ret_from_fork_asm+0x1a/0x30
[   12.625902] 
[   12.625998] The buggy address belongs to the object at ffff888100ab0a00
[   12.625998]  which belongs to the cache kmalloc-256 of size 256
[   12.626989] The buggy address is located 0 bytes inside of
[   12.626989]  freed 256-byte region [ffff888100ab0a00, ffff888100ab0b00)
[   12.627483] 
[   12.627586] The buggy address belongs to the physical page:
[   12.627869] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100ab0
[   12.628153] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.628411] flags: 0x200000000000040(head|node=0|zone=2)
[   12.628811] page_type: f5(slab)
[   12.628991] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.629366] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.629774] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.630272] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.630575] head: 0200000000000001 ffffea000402ac01 00000000ffffffff 00000000ffffffff
[   12.630910] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   12.631305] page dumped because: kasan: bad access detected
[   12.631556] 
[   12.631653] Memory state around the buggy address:
[   12.631955]  ffff888100ab0900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.632258]  ffff888100ab0980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.632522] >ffff888100ab0a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.632846]                    ^
[   12.633009]  ffff888100ab0a80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.633267]  ffff888100ab0b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.633545] ==================================================================

[   12.749737] ==================================================================
[   12.750074] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x53c/0x5e0
[   12.750602] Read of size 1 at addr ffff888100a28200 by task kunit_try_catch/181
[   12.751006] 
[   12.751103] CPU: 1 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   12.751158] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.751170] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.751191] Call Trace:
[   12.751209]  <TASK>
[   12.751224]  dump_stack_lvl+0x73/0xb0
[   12.751263]  print_report+0xd1/0x610
[   12.751283]  ? __virt_addr_valid+0x1db/0x2d0
[   12.751305]  ? krealloc_uaf+0x53c/0x5e0
[   12.751336]  ? kasan_complete_mode_report_info+0x64/0x200
[   12.751357]  ? krealloc_uaf+0x53c/0x5e0
[   12.751378]  kasan_report+0x141/0x180
[   12.751398]  ? krealloc_uaf+0x53c/0x5e0
[   12.751424]  __asan_report_load1_noabort+0x18/0x20
[   12.751447]  krealloc_uaf+0x53c/0x5e0
[   12.751468]  ? __pfx_krealloc_uaf+0x10/0x10
[   12.751488]  ? __schedule+0x2079/0x2b60
[   12.751508]  ? schedule+0x7c/0x2e0
[   12.751527]  ? trace_hardirqs_on+0x37/0xe0
[   12.751549]  ? __schedule+0x2079/0x2b60
[   12.751570]  ? __pfx_read_tsc+0x10/0x10
[   12.751590]  ? ktime_get_ts64+0x86/0x230
[   12.751613]  kunit_try_run_case+0x1a5/0x480
[   12.751646]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.751676]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.751698]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.751733]  ? __kthread_parkme+0x82/0x180
[   12.751753]  ? preempt_count_sub+0x50/0x80
[   12.751776]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.751800]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.751822]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.751845]  kthread+0x337/0x6f0
[   12.751864]  ? trace_preempt_on+0x20/0xc0
[   12.751885]  ? __pfx_kthread+0x10/0x10
[   12.751904]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.751925]  ? calculate_sigpending+0x7b/0xa0
[   12.751948]  ? __pfx_kthread+0x10/0x10
[   12.751968]  ret_from_fork+0x116/0x1d0
[   12.751986]  ? __pfx_kthread+0x10/0x10
[   12.752005]  ret_from_fork_asm+0x1a/0x30
[   12.752034]  </TASK>
[   12.752044] 
[   12.760212] Allocated by task 181:
[   12.760412]  kasan_save_stack+0x45/0x70
[   12.760634]  kasan_save_track+0x18/0x40
[   12.760805]  kasan_save_alloc_info+0x3b/0x50
[   12.761063]  __kasan_kmalloc+0xb7/0xc0
[   12.761465]  __kmalloc_cache_noprof+0x189/0x420
[   12.761675]  krealloc_uaf+0xbb/0x5e0
[   12.761810]  kunit_try_run_case+0x1a5/0x480
[   12.761960]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.762247]  kthread+0x337/0x6f0
[   12.762417]  ret_from_fork+0x116/0x1d0
[   12.762601]  ret_from_fork_asm+0x1a/0x30
[   12.762795] 
[   12.763020] Freed by task 181:
[   12.763198]  kasan_save_stack+0x45/0x70
[   12.763488]  kasan_save_track+0x18/0x40
[   12.763679]  kasan_save_free_info+0x3f/0x60
[   12.763988]  __kasan_slab_free+0x56/0x70
[   12.764207]  kfree+0x222/0x3f0
[   12.764401]  krealloc_uaf+0x13d/0x5e0
[   12.764574]  kunit_try_run_case+0x1a5/0x480
[   12.764806]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.765338]  kthread+0x337/0x6f0
[   12.765531]  ret_from_fork+0x116/0x1d0
[   12.765721]  ret_from_fork_asm+0x1a/0x30
[   12.765971] 
[   12.766058] The buggy address belongs to the object at ffff888100a28200
[   12.766058]  which belongs to the cache kmalloc-256 of size 256
[   12.766433] The buggy address is located 0 bytes inside of
[   12.766433]  freed 256-byte region [ffff888100a28200, ffff888100a28300)
[   12.766789] 
[   12.766868] The buggy address belongs to the physical page:
[   12.767196] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a28
[   12.767834] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.768173] flags: 0x200000000000040(head|node=0|zone=2)
[   12.768664] page_type: f5(slab)
[   12.768798] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.769440] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.769820] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.770226] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.770563] head: 0200000000000001 ffffea0004028a01 00000000ffffffff 00000000ffffffff
[   12.770798] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   12.771202] page dumped because: kasan: bad access detected
[   12.771653] 
[   12.771753] Memory state around the buggy address:
[   12.772244]  ffff888100a28100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.772601]  ffff888100a28180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.772973] >ffff888100a28200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.773426]                    ^
[   12.773586]  ffff888100a28280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.773855]  ffff888100a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.774250] ==================================================================
[   12.722693] ==================================================================
[   12.723534] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x1b8/0x5e0
[   12.723924] Read of size 1 at addr ffff888100a28200 by task kunit_try_catch/181
[   12.724256] 
[   12.724413] CPU: 1 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   12.724469] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.724481] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.724501] Call Trace:
[   12.724513]  <TASK>
[   12.724541]  dump_stack_lvl+0x73/0xb0
[   12.724570]  print_report+0xd1/0x610
[   12.724592]  ? __virt_addr_valid+0x1db/0x2d0
[   12.724615]  ? krealloc_uaf+0x1b8/0x5e0
[   12.724635]  ? kasan_complete_mode_report_info+0x64/0x200
[   12.724656]  ? krealloc_uaf+0x1b8/0x5e0
[   12.724676]  kasan_report+0x141/0x180
[   12.724697]  ? krealloc_uaf+0x1b8/0x5e0
[   12.724720]  ? krealloc_uaf+0x1b8/0x5e0
[   12.724740]  __kasan_check_byte+0x3d/0x50
[   12.724770]  krealloc_noprof+0x3f/0x340
[   12.724792]  krealloc_uaf+0x1b8/0x5e0
[   12.724812]  ? __pfx_krealloc_uaf+0x10/0x10
[   12.724842]  ? __schedule+0x2079/0x2b60
[   12.724862]  ? schedule+0x7c/0x2e0
[   12.724881]  ? trace_hardirqs_on+0x37/0xe0
[   12.724904]  ? __schedule+0x2079/0x2b60
[   12.724925]  ? __pfx_read_tsc+0x10/0x10
[   12.725005]  ? ktime_get_ts64+0x86/0x230
[   12.725030]  kunit_try_run_case+0x1a5/0x480
[   12.725054]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.725076]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.725098]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.725120]  ? __kthread_parkme+0x82/0x180
[   12.725140]  ? preempt_count_sub+0x50/0x80
[   12.725175]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.725198]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.725220]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.725242]  kthread+0x337/0x6f0
[   12.725261]  ? trace_preempt_on+0x20/0xc0
[   12.725282]  ? __pfx_kthread+0x10/0x10
[   12.725302]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.725330]  ? calculate_sigpending+0x7b/0xa0
[   12.725353]  ? __pfx_kthread+0x10/0x10
[   12.725374]  ret_from_fork+0x116/0x1d0
[   12.725392]  ? __pfx_kthread+0x10/0x10
[   12.725411]  ret_from_fork_asm+0x1a/0x30
[   12.725441]  </TASK>
[   12.725451] 
[   12.734469] Allocated by task 181:
[   12.734693]  kasan_save_stack+0x45/0x70
[   12.734996]  kasan_save_track+0x18/0x40
[   12.735162]  kasan_save_alloc_info+0x3b/0x50
[   12.735319]  __kasan_kmalloc+0xb7/0xc0
[   12.735483]  __kmalloc_cache_noprof+0x189/0x420
[   12.735743]  krealloc_uaf+0xbb/0x5e0
[   12.735954]  kunit_try_run_case+0x1a5/0x480
[   12.736336]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.736578]  kthread+0x337/0x6f0
[   12.736761]  ret_from_fork+0x116/0x1d0
[   12.736910]  ret_from_fork_asm+0x1a/0x30
[   12.737052] 
[   12.737231] Freed by task 181:
[   12.737506]  kasan_save_stack+0x45/0x70
[   12.737740]  kasan_save_track+0x18/0x40
[   12.737915]  kasan_save_free_info+0x3f/0x60
[   12.738305]  __kasan_slab_free+0x56/0x70
[   12.738534]  kfree+0x222/0x3f0
[   12.738758]  krealloc_uaf+0x13d/0x5e0
[   12.738962]  kunit_try_run_case+0x1a5/0x480
[   12.739276]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.739537]  kthread+0x337/0x6f0
[   12.739731]  ret_from_fork+0x116/0x1d0
[   12.739926]  ret_from_fork_asm+0x1a/0x30
[   12.740088] 
[   12.740178] The buggy address belongs to the object at ffff888100a28200
[   12.740178]  which belongs to the cache kmalloc-256 of size 256
[   12.740580] The buggy address is located 0 bytes inside of
[   12.740580]  freed 256-byte region [ffff888100a28200, ffff888100a28300)
[   12.741460] 
[   12.741692] The buggy address belongs to the physical page:
[   12.742082] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a28
[   12.742692] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.742955] flags: 0x200000000000040(head|node=0|zone=2)
[   12.743142] page_type: f5(slab)
[   12.743452] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.744119] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.744478] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.744880] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.745297] head: 0200000000000001 ffffea0004028a01 00000000ffffffff 00000000ffffffff
[   12.745634] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   12.746162] page dumped because: kasan: bad access detected
[   12.746449] 
[   12.746557] Memory state around the buggy address:
[   12.746773]  ffff888100a28100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.747168]  ffff888100a28180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.747513] >ffff888100a28200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.747896]                    ^
[   12.748016]  ffff888100a28280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.748518]  ffff888100a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.748837] ==================================================================