Hay
Date
June 24, 2025, 11:37 a.m.

Environment
dragonboard-845c
qemu-arm64
qemu-x86_64

[   35.956371] ==================================================================
[   35.963690] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520
[   35.970396] Read of size 1 at addr ffff000086408c00 by task kunit_try_catch/262
[   35.977811] 
[   35.979342] CPU: 3 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   35.979372] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.979381] Hardware name: Thundercomm Dragonboard 845c (DT)
[   35.979394] Call trace:
[   35.979400]  show_stack+0x20/0x38 (C)
[   35.979418]  dump_stack_lvl+0x8c/0xd0
[   35.979437]  print_report+0x118/0x608
[   35.979457]  kasan_report+0xdc/0x128
[   35.979477]  __asan_report_load1_noabort+0x20/0x30
[   35.979495]  krealloc_uaf+0x4c8/0x520
[   35.979511]  kunit_try_run_case+0x170/0x3f0
[   35.979531]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.979552]  kthread+0x328/0x630
[   35.979567]  ret_from_fork+0x10/0x20
[   35.979585] 
[   36.044749] Allocated by task 262:
[   36.048209]  kasan_save_stack+0x3c/0x68
[   36.052119]  kasan_save_track+0x20/0x40
[   36.056030]  kasan_save_alloc_info+0x40/0x58
[   36.060369]  __kasan_kmalloc+0xd4/0xd8
[   36.064192]  __kmalloc_cache_noprof+0x16c/0x3c0
[   36.068805]  krealloc_uaf+0xc8/0x520
[   36.072444]  kunit_try_run_case+0x170/0x3f0
[   36.076698]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.082274]  kthread+0x328/0x630
[   36.085564]  ret_from_fork+0x10/0x20
[   36.089205] 
[   36.090735] Freed by task 262:
[   36.093846]  kasan_save_stack+0x3c/0x68
[   36.097758]  kasan_save_track+0x20/0x40
[   36.101667]  kasan_save_free_info+0x4c/0x78
[   36.105920]  __kasan_slab_free+0x6c/0x98
[   36.109917]  kfree+0x214/0x3c8
[   36.113037]  krealloc_uaf+0x12c/0x520
[   36.116771]  kunit_try_run_case+0x170/0x3f0
[   36.121027]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.126598]  kthread+0x328/0x630
[   36.129891]  ret_from_fork+0x10/0x20
[   36.133528] 
[   36.135056] The buggy address belongs to the object at ffff000086408c00
[   36.135056]  which belongs to the cache kmalloc-256 of size 256
[   36.147717] The buggy address is located 0 bytes inside of
[   36.147717]  freed 256-byte region [ffff000086408c00, ffff000086408d00)
[   36.159942] 
[   36.161473] The buggy address belongs to the physical page:
[   36.167121] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106408
[   36.175225] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   36.182985] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   36.190042] page_type: f5(slab)
[   36.193248] raw: 0bfffe0000000040 ffff000080002b40 dead000000000122 0000000000000000
[   36.201095] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.208943] head: 0bfffe0000000040 ffff000080002b40 dead000000000122 0000000000000000
[   36.216875] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.224808] head: 0bfffe0000000002 fffffdffc2190201 00000000ffffffff 00000000ffffffff
[   36.232739] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   36.240668] page dumped because: kasan: bad access detected
[   36.246318] 
[   36.247853] Memory state around the buggy address:
[   36.252716]  ffff000086408b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.260041]  ffff000086408b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.267358] >ffff000086408c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   36.274674]                    ^
[   36.277961]  ffff000086408c80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   36.285277]  ffff000086408d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.292588] ==================================================================
[   35.605223] ==================================================================
[   35.616954] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520
[   35.623666] Read of size 1 at addr ffff000086408c00 by task kunit_try_catch/262
[   35.631070] 
[   35.632608] CPU: 3 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   35.632636] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.632644] Hardware name: Thundercomm Dragonboard 845c (DT)
[   35.632655] Call trace:
[   35.632662]  show_stack+0x20/0x38 (C)
[   35.632681]  dump_stack_lvl+0x8c/0xd0
[   35.632700]  print_report+0x118/0x608
[   35.632719]  kasan_report+0xdc/0x128
[   35.632737]  __kasan_check_byte+0x54/0x70
[   35.632757]  krealloc_noprof+0x44/0x360
[   35.632779]  krealloc_uaf+0x180/0x520
[   35.632796]  kunit_try_run_case+0x170/0x3f0
[   35.632815]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.632838]  kthread+0x328/0x630
[   35.632854]  ret_from_fork+0x10/0x20
[   35.632871] 
[   35.701135] Allocated by task 262:
[   35.704596]  kasan_save_stack+0x3c/0x68
[   35.708505]  kasan_save_track+0x20/0x40
[   35.712415]  kasan_save_alloc_info+0x40/0x58
[   35.716755]  __kasan_kmalloc+0xd4/0xd8
[   35.720577]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.725188]  krealloc_uaf+0xc8/0x520
[   35.728827]  kunit_try_run_case+0x170/0x3f0
[   35.733080]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.738653]  kthread+0x328/0x630
[   35.741943]  ret_from_fork+0x10/0x20
[   35.745582] 
[   35.747109] Freed by task 262:
[   35.750222]  kasan_save_stack+0x3c/0x68
[   35.754133]  kasan_save_track+0x20/0x40
[   35.758042]  kasan_save_free_info+0x4c/0x78
[   35.762295]  __kasan_slab_free+0x6c/0x98
[   35.766290]  kfree+0x214/0x3c8
[   35.769411]  krealloc_uaf+0x12c/0x520
[   35.773145]  kunit_try_run_case+0x170/0x3f0
[   35.777400]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.782971]  kthread+0x328/0x630
[   35.786263]  ret_from_fork+0x10/0x20
[   35.789900] 
[   35.791426] The buggy address belongs to the object at ffff000086408c00
[   35.791426]  which belongs to the cache kmalloc-256 of size 256
[   35.804087] The buggy address is located 0 bytes inside of
[   35.804087]  freed 256-byte region [ffff000086408c00, ffff000086408d00)
[   35.816309] 
[   35.817839] The buggy address belongs to the physical page:
[   35.823487] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106408
[   35.831588] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   35.839344] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   35.846405] page_type: f5(slab)
[   35.849613] raw: 0bfffe0000000040 ffff000080002b40 dead000000000122 0000000000000000
[   35.857458] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.865305] head: 0bfffe0000000040 ffff000080002b40 dead000000000122 0000000000000000
[   35.873237] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.881169] head: 0bfffe0000000002 fffffdffc2190201 00000000ffffffff 00000000ffffffff
[   35.889102] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   35.897029] page dumped because: kasan: bad access detected
[   35.902680] 
[   35.904215] Memory state around the buggy address:
[   35.909077]  ffff000086408b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.916401]  ffff000086408b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.923717] >ffff000086408c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   35.931032]                    ^
[   35.934321]  ffff000086408c80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   35.941635]  ffff000086408d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.948948] ==================================================================

[   32.868501] ==================================================================
[   32.868564] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520
[   32.868625] Read of size 1 at addr fff00000c4633a00 by task kunit_try_catch/175
[   32.868683] 
[   32.868724] CPU: 0 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   32.868822] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.868853] Hardware name: linux,dummy-virt (DT)
[   32.868913] Call trace:
[   32.868988]  show_stack+0x20/0x38 (C)
[   32.869106]  dump_stack_lvl+0x8c/0xd0
[   32.869219]  print_report+0x118/0x608
[   32.869334]  kasan_report+0xdc/0x128
[   32.869458]  __asan_report_load1_noabort+0x20/0x30
[   32.869576]  krealloc_uaf+0x4c8/0x520
[   32.869683]  kunit_try_run_case+0x170/0x3f0
[   32.869795]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.869937]  kthread+0x328/0x630
[   32.870043]  ret_from_fork+0x10/0x20
[   32.870155] 
[   32.870197] Allocated by task 175:
[   32.870261]  kasan_save_stack+0x3c/0x68
[   32.870371]  kasan_save_track+0x20/0x40
[   32.870477]  kasan_save_alloc_info+0x40/0x58
[   32.870667]  __kasan_kmalloc+0xd4/0xd8
[   32.870950]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.871143]  krealloc_uaf+0xc8/0x520
[   32.871282]  kunit_try_run_case+0x170/0x3f0
[   32.871382]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.871503]  kthread+0x328/0x630
[   32.871597]  ret_from_fork+0x10/0x20
[   32.871815] 
[   32.871865] Freed by task 175:
[   32.871983]  kasan_save_stack+0x3c/0x68
[   32.872134]  kasan_save_track+0x20/0x40
[   32.872328]  kasan_save_free_info+0x4c/0x78
[   32.872430]  __kasan_slab_free+0x6c/0x98
[   32.872656]  kfree+0x214/0x3c8
[   32.872899]  krealloc_uaf+0x12c/0x520
[   32.873079]  kunit_try_run_case+0x170/0x3f0
[   32.873218]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.873336]  kthread+0x328/0x630
[   32.873477]  ret_from_fork+0x10/0x20
[   32.873576] 
[   32.873629] The buggy address belongs to the object at fff00000c4633a00
[   32.873629]  which belongs to the cache kmalloc-256 of size 256
[   32.873771] The buggy address is located 0 bytes inside of
[   32.873771]  freed 256-byte region [fff00000c4633a00, fff00000c4633b00)
[   32.873972] 
[   32.874025] The buggy address belongs to the physical page:
[   32.874134] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104632
[   32.874328] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.874461] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.874777] page_type: f5(slab)
[   32.874976] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   32.875244] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.875370] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   32.875537] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.875667] head: 0bfffe0000000001 ffffc1ffc3118c81 00000000ffffffff 00000000ffffffff
[   32.875797] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   32.875944] page dumped because: kasan: bad access detected
[   32.876088] 
[   32.876136] Memory state around the buggy address:
[   32.876223]  fff00000c4633900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.876328]  fff00000c4633980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.876430] >fff00000c4633a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.877483]                    ^
[   32.878162]  fff00000c4633a80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.878465]  fff00000c4633b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.878590] ==================================================================
[   32.850203] ==================================================================
[   32.850390] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520
[   32.850505] Read of size 1 at addr fff00000c4633a00 by task kunit_try_catch/175
[   32.850615] 
[   32.850683] CPU: 0 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   32.850876] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.850957] Hardware name: linux,dummy-virt (DT)
[   32.851043] Call trace:
[   32.851110]  show_stack+0x20/0x38 (C)
[   32.851285]  dump_stack_lvl+0x8c/0xd0
[   32.851511]  print_report+0x118/0x608
[   32.851644]  kasan_report+0xdc/0x128
[   32.851792]  __kasan_check_byte+0x54/0x70
[   32.852069]  krealloc_noprof+0x44/0x360
[   32.852191]  krealloc_uaf+0x180/0x520
[   32.852317]  kunit_try_run_case+0x170/0x3f0
[   32.852540]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.852793]  kthread+0x328/0x630
[   32.852929]  ret_from_fork+0x10/0x20
[   32.853242] 
[   32.853293] Allocated by task 175:
[   32.853417]  kasan_save_stack+0x3c/0x68
[   32.853561]  kasan_save_track+0x20/0x40
[   32.853861]  kasan_save_alloc_info+0x40/0x58
[   32.854009]  __kasan_kmalloc+0xd4/0xd8
[   32.854107]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.854226]  krealloc_uaf+0xc8/0x520
[   32.854476]  kunit_try_run_case+0x170/0x3f0
[   32.854643]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.855014]  kthread+0x328/0x630
[   32.855151]  ret_from_fork+0x10/0x20
[   32.855308] 
[   32.855512] Freed by task 175:
[   32.855623]  kasan_save_stack+0x3c/0x68
[   32.855841]  kasan_save_track+0x20/0x40
[   32.856159]  kasan_save_free_info+0x4c/0x78
[   32.856273]  __kasan_slab_free+0x6c/0x98
[   32.856871]  kfree+0x214/0x3c8
[   32.857047]  krealloc_uaf+0x12c/0x520
[   32.857172]  kunit_try_run_case+0x170/0x3f0
[   32.857426]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.857691]  kthread+0x328/0x630
[   32.857877]  ret_from_fork+0x10/0x20
[   32.858045] 
[   32.858165] The buggy address belongs to the object at fff00000c4633a00
[   32.858165]  which belongs to the cache kmalloc-256 of size 256
[   32.858691] The buggy address is located 0 bytes inside of
[   32.858691]  freed 256-byte region [fff00000c4633a00, fff00000c4633b00)
[   32.859179] 
[   32.859876] The buggy address belongs to the physical page:
[   32.860023] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104632
[   32.860560] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.861466] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.861856] page_type: f5(slab)
[   32.861995] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   32.862384] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.862618] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   32.862852] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.862994] head: 0bfffe0000000001 ffffc1ffc3118c81 00000000ffffffff 00000000ffffffff
[   32.863578] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   32.863981] page dumped because: kasan: bad access detected
[   32.864097] 
[   32.864174] Memory state around the buggy address:
[   32.864348]  fff00000c4633900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.864510]  fff00000c4633980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.864797] >fff00000c4633a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.865097]                    ^
[   32.865263]  fff00000c4633a80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.866044]  fff00000c4633b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.867059] ==================================================================

[   28.884210] ==================================================================
[   28.884749] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x53c/0x5e0
[   28.885262] Read of size 1 at addr ffff888100386000 by task kunit_try_catch/194
[   28.886114] 
[   28.886681] CPU: 0 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT(voluntary) 
[   28.886796] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.886827] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.886891] Call Trace:
[   28.886928]  <TASK>
[   28.886964]  dump_stack_lvl+0x73/0xb0
[   28.887037]  print_report+0xd1/0x650
[   28.887109]  ? __virt_addr_valid+0x1db/0x2d0
[   28.887171]  ? krealloc_uaf+0x53c/0x5e0
[   28.887220]  ? kasan_complete_mode_report_info+0x64/0x200
[   28.887285]  ? krealloc_uaf+0x53c/0x5e0
[   28.887340]  kasan_report+0x141/0x180
[   28.887401]  ? krealloc_uaf+0x53c/0x5e0
[   28.887469]  __asan_report_load1_noabort+0x18/0x20
[   28.887535]  krealloc_uaf+0x53c/0x5e0
[   28.887613]  ? __pfx_krealloc_uaf+0x10/0x10
[   28.887660]  ? finish_task_switch.isra.0+0x153/0x700
[   28.887712]  ? __switch_to+0x47/0xf50
[   28.887777]  ? __schedule+0x10cc/0x2b60
[   28.887855]  ? __pfx_read_tsc+0x10/0x10
[   28.887915]  ? ktime_get_ts64+0x86/0x230
[   28.887980]  kunit_try_run_case+0x1a5/0x480
[   28.888048]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.888118]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.888193]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.888230]  ? __kthread_parkme+0x82/0x180
[   28.888259]  ? preempt_count_sub+0x50/0x80
[   28.888290]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.888322]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.888354]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.888385]  kthread+0x337/0x6f0
[   28.888410]  ? trace_preempt_on+0x20/0xc0
[   28.888441]  ? __pfx_kthread+0x10/0x10
[   28.888468]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.888497]  ? calculate_sigpending+0x7b/0xa0
[   28.888527]  ? __pfx_kthread+0x10/0x10
[   28.888575]  ret_from_fork+0x116/0x1d0
[   28.888601]  ? __pfx_kthread+0x10/0x10
[   28.888628]  ret_from_fork_asm+0x1a/0x30
[   28.888682]  </TASK>
[   28.888697] 
[   28.904664] Allocated by task 194:
[   28.905036]  kasan_save_stack+0x45/0x70
[   28.905473]  kasan_save_track+0x18/0x40
[   28.906032]  kasan_save_alloc_info+0x3b/0x50
[   28.906569]  __kasan_kmalloc+0xb7/0xc0
[   28.906868]  __kmalloc_cache_noprof+0x189/0x420
[   28.907203]  krealloc_uaf+0xbb/0x5e0
[   28.908020]  kunit_try_run_case+0x1a5/0x480
[   28.908619]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.909059]  kthread+0x337/0x6f0
[   28.909364]  ret_from_fork+0x116/0x1d0
[   28.909624]  ret_from_fork_asm+0x1a/0x30
[   28.909871] 
[   28.909996] Freed by task 194:
[   28.910181]  kasan_save_stack+0x45/0x70
[   28.910608]  kasan_save_track+0x18/0x40
[   28.910973]  kasan_save_free_info+0x3f/0x60
[   28.911425]  __kasan_slab_free+0x56/0x70
[   28.912352]  kfree+0x222/0x3f0
[   28.912737]  krealloc_uaf+0x13d/0x5e0
[   28.913117]  kunit_try_run_case+0x1a5/0x480
[   28.913529]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.913936]  kthread+0x337/0x6f0
[   28.914305]  ret_from_fork+0x116/0x1d0
[   28.914683]  ret_from_fork_asm+0x1a/0x30
[   28.914979] 
[   28.915168] The buggy address belongs to the object at ffff888100386000
[   28.915168]  which belongs to the cache kmalloc-256 of size 256
[   28.915866] The buggy address is located 0 bytes inside of
[   28.915866]  freed 256-byte region [ffff888100386000, ffff888100386100)
[   28.916624] 
[   28.916769] The buggy address belongs to the physical page:
[   28.917044] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100386
[   28.918183] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   28.918919] flags: 0x200000000000040(head|node=0|zone=2)
[   28.919399] page_type: f5(slab)
[   28.919791] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   28.920450] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   28.920984] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   28.921358] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   28.921735] head: 0200000000000001 ffffea000400e181 00000000ffffffff 00000000ffffffff
[   28.922362] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   28.923584] page dumped because: kasan: bad access detected
[   28.924504] 
[   28.924745] Memory state around the buggy address:
[   28.925330]  ffff888100385f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.925958]  ffff888100385f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.926832] >ffff888100386000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   28.927402]                    ^
[   28.927636]  ffff888100386080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   28.928363]  ffff888100386100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.929312] ==================================================================
[   28.834374] ==================================================================
[   28.835247] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x1b8/0x5e0
[   28.836405] Read of size 1 at addr ffff888100386000 by task kunit_try_catch/194
[   28.836887] 
[   28.837076] CPU: 0 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT(voluntary) 
[   28.837185] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.837217] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.837267] Call Trace:
[   28.837300]  <TASK>
[   28.837343]  dump_stack_lvl+0x73/0xb0
[   28.837420]  print_report+0xd1/0x650
[   28.837474]  ? __virt_addr_valid+0x1db/0x2d0
[   28.837530]  ? krealloc_uaf+0x1b8/0x5e0
[   28.837601]  ? kasan_complete_mode_report_info+0x64/0x200
[   28.837662]  ? krealloc_uaf+0x1b8/0x5e0
[   28.837715]  kasan_report+0x141/0x180
[   28.837771]  ? krealloc_uaf+0x1b8/0x5e0
[   28.837831]  ? krealloc_uaf+0x1b8/0x5e0
[   28.837886]  __kasan_check_byte+0x3d/0x50
[   28.837938]  krealloc_noprof+0x3f/0x340
[   28.837997]  ? stack_depot_save_flags+0x48b/0x840
[   28.838062]  krealloc_uaf+0x1b8/0x5e0
[   28.838154]  ? __pfx_krealloc_uaf+0x10/0x10
[   28.838200]  ? finish_task_switch.isra.0+0x153/0x700
[   28.838257]  ? __switch_to+0x47/0xf50
[   28.838314]  ? __schedule+0x10cc/0x2b60
[   28.838372]  ? __pfx_read_tsc+0x10/0x10
[   28.838432]  ? ktime_get_ts64+0x86/0x230
[   28.838499]  kunit_try_run_case+0x1a5/0x480
[   28.838563]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.838596]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.838631]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.838678]  ? __kthread_parkme+0x82/0x180
[   28.838706]  ? preempt_count_sub+0x50/0x80
[   28.838737]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.838768]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.838799]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.838829]  kthread+0x337/0x6f0
[   28.838855]  ? trace_preempt_on+0x20/0xc0
[   28.838886]  ? __pfx_kthread+0x10/0x10
[   28.838914]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.838943]  ? calculate_sigpending+0x7b/0xa0
[   28.838974]  ? __pfx_kthread+0x10/0x10
[   28.839002]  ret_from_fork+0x116/0x1d0
[   28.839027]  ? __pfx_kthread+0x10/0x10
[   28.839059]  ret_from_fork_asm+0x1a/0x30
[   28.839126]  </TASK>
[   28.839152] 
[   28.857097] Allocated by task 194:
[   28.857466]  kasan_save_stack+0x45/0x70
[   28.857917]  kasan_save_track+0x18/0x40
[   28.858388]  kasan_save_alloc_info+0x3b/0x50
[   28.858873]  __kasan_kmalloc+0xb7/0xc0
[   28.859285]  __kmalloc_cache_noprof+0x189/0x420
[   28.859811]  krealloc_uaf+0xbb/0x5e0
[   28.860337]  kunit_try_run_case+0x1a5/0x480
[   28.860669]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.861181]  kthread+0x337/0x6f0
[   28.861538]  ret_from_fork+0x116/0x1d0
[   28.861813]  ret_from_fork_asm+0x1a/0x30
[   28.862212] 
[   28.862414] Freed by task 194:
[   28.863179]  kasan_save_stack+0x45/0x70
[   28.863608]  kasan_save_track+0x18/0x40
[   28.863957]  kasan_save_free_info+0x3f/0x60
[   28.864570]  __kasan_slab_free+0x56/0x70
[   28.864876]  kfree+0x222/0x3f0
[   28.865333]  krealloc_uaf+0x13d/0x5e0
[   28.865728]  kunit_try_run_case+0x1a5/0x480
[   28.866474]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.867009]  kthread+0x337/0x6f0
[   28.867430]  ret_from_fork+0x116/0x1d0
[   28.867811]  ret_from_fork_asm+0x1a/0x30
[   28.868078] 
[   28.868280] The buggy address belongs to the object at ffff888100386000
[   28.868280]  which belongs to the cache kmalloc-256 of size 256
[   28.869358] The buggy address is located 0 bytes inside of
[   28.869358]  freed 256-byte region [ffff888100386000, ffff888100386100)
[   28.870617] 
[   28.870844] The buggy address belongs to the physical page:
[   28.871339] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100386
[   28.872003] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   28.872782] flags: 0x200000000000040(head|node=0|zone=2)
[   28.873467] page_type: f5(slab)
[   28.873872] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   28.874783] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   28.875480] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   28.876183] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   28.876746] head: 0200000000000001 ffffea000400e181 00000000ffffffff 00000000ffffffff
[   28.877574] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   28.878203] page dumped because: kasan: bad access detected
[   28.878960] 
[   28.879167] Memory state around the buggy address:
[   28.879425]  ffff888100385f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.880062]  ffff888100385f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.880499] >ffff888100386000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   28.881360]                    ^
[   28.881932]  ffff888100386080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   28.882523]  ffff888100386100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.882891] ==================================================================