Date
July 3, 2025, 10:10 a.m.
Environment | |
---|---|
dragonboard-845c | |
qemu-arm64 | |
qemu-x86_64 |
[ 37.788324] ================================================================== [ 37.800061] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520 [ 37.806768] Read of size 1 at addr ffff000086189800 by task kunit_try_catch/273 [ 37.814179] [ 37.815721] CPU: 3 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 37.815750] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.815758] Hardware name: Thundercomm Dragonboard 845c (DT) [ 37.815768] Call trace: [ 37.815775] show_stack+0x20/0x38 (C) [ 37.815793] dump_stack_lvl+0x8c/0xd0 [ 37.815812] print_report+0x118/0x608 [ 37.815830] kasan_report+0xdc/0x128 [ 37.815850] __kasan_check_byte+0x54/0x70 [ 37.815868] krealloc_noprof+0x44/0x360 [ 37.815886] krealloc_uaf+0x180/0x520 [ 37.815904] kunit_try_run_case+0x170/0x3f0 [ 37.815923] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.815944] kthread+0x328/0x630 [ 37.815959] ret_from_fork+0x10/0x20 [ 37.815976] [ 37.884249] Allocated by task 273: [ 37.887711] kasan_save_stack+0x3c/0x68 [ 37.891614] kasan_save_track+0x20/0x40 [ 37.895516] kasan_save_alloc_info+0x40/0x58 [ 37.899854] __kasan_kmalloc+0xd4/0xd8 [ 37.903666] __kmalloc_cache_noprof+0x16c/0x3c0 [ 37.908278] krealloc_uaf+0xc8/0x520 [ 37.911917] kunit_try_run_case+0x170/0x3f0 [ 37.916173] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.921750] kthread+0x328/0x630 [ 37.925042] ret_from_fork+0x10/0x20 [ 37.928680] [ 37.930210] Freed by task 273: [ 37.933325] kasan_save_stack+0x3c/0x68 [ 37.937237] kasan_save_track+0x20/0x40 [ 37.941148] kasan_save_free_info+0x4c/0x78 [ 37.945402] __kasan_slab_free+0x6c/0x98 [ 37.949401] kfree+0x214/0x3c8 [ 37.952521] krealloc_uaf+0x12c/0x520 [ 37.956246] kunit_try_run_case+0x170/0x3f0 [ 37.960501] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.966076] kthread+0x328/0x630 [ 37.969369] ret_from_fork+0x10/0x20 [ 37.973007] [ 37.974537] The buggy address belongs to the object at ffff000086189800 [ 37.974537] which belongs to the cache kmalloc-256 of size 256 [ 37.987202] The buggy address is located 0 bytes inside of [ 37.987202] freed 256-byte region [ffff000086189800, ffff000086189900) [ 37.999430] [ 38.000958] The buggy address belongs to the physical page: [ 38.006610] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106188 [ 38.014714] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 38.022473] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 38.029531] page_type: f5(slab) [ 38.032737] raw: 0bfffe0000000040 ffff000080002b40 dead000000000122 0000000000000000 [ 38.040585] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 38.048434] head: 0bfffe0000000040 ffff000080002b40 dead000000000122 0000000000000000 [ 38.056368] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 38.064300] head: 0bfffe0000000002 fffffdffc2186201 00000000ffffffff 00000000ffffffff [ 38.072233] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 38.080164] page dumped because: kasan: bad access detected [ 38.085815] [ 38.087343] Memory state around the buggy address: [ 38.092204] ffff000086189700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.099523] ffff000086189780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.106840] >ffff000086189800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 38.114154] ^ [ 38.117443] ffff000086189880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 38.124759] ffff000086189900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.132073] ================================================================== [ 38.139451] ================================================================== [ 38.146771] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520 [ 38.153485] Read of size 1 at addr ffff000086189800 by task kunit_try_catch/273 [ 38.160898] [ 38.162432] CPU: 3 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 38.162462] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.162472] Hardware name: Thundercomm Dragonboard 845c (DT) [ 38.162483] Call trace: [ 38.162489] show_stack+0x20/0x38 (C) [ 38.162509] dump_stack_lvl+0x8c/0xd0 [ 38.162530] print_report+0x118/0x608 [ 38.162549] kasan_report+0xdc/0x128 [ 38.162568] __asan_report_load1_noabort+0x20/0x30 [ 38.162586] krealloc_uaf+0x4c8/0x520 [ 38.162604] kunit_try_run_case+0x170/0x3f0 [ 38.162622] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.162644] kthread+0x328/0x630 [ 38.162659] ret_from_fork+0x10/0x20 [ 38.162677] [ 38.227864] Allocated by task 273: [ 38.231328] kasan_save_stack+0x3c/0x68 [ 38.235239] kasan_save_track+0x20/0x40 [ 38.239152] kasan_save_alloc_info+0x40/0x58 [ 38.243491] __kasan_kmalloc+0xd4/0xd8 [ 38.247305] __kmalloc_cache_noprof+0x16c/0x3c0 [ 38.251916] krealloc_uaf+0xc8/0x520 [ 38.255558] kunit_try_run_case+0x170/0x3f0 [ 38.259810] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.265386] kthread+0x328/0x630 [ 38.268678] ret_from_fork+0x10/0x20 [ 38.272318] [ 38.273848] Freed by task 273: [ 38.276962] kasan_save_stack+0x3c/0x68 [ 38.280874] kasan_save_track+0x20/0x40 [ 38.284785] kasan_save_free_info+0x4c/0x78 [ 38.289037] __kasan_slab_free+0x6c/0x98 [ 38.293034] kfree+0x214/0x3c8 [ 38.296155] krealloc_uaf+0x12c/0x520 [ 38.299882] kunit_try_run_case+0x170/0x3f0 [ 38.304137] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.309711] kthread+0x328/0x630 [ 38.313006] ret_from_fork+0x10/0x20 [ 38.316645] [ 38.318176] The buggy address belongs to the object at ffff000086189800 [ 38.318176] which belongs to the cache kmalloc-256 of size 256 [ 38.330835] The buggy address is located 0 bytes inside of [ 38.330835] freed 256-byte region [ffff000086189800, ffff000086189900) [ 38.343058] [ 38.344587] The buggy address belongs to the physical page: [ 38.350237] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106188 [ 38.358342] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 38.366102] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 38.373160] page_type: f5(slab) [ 38.376365] raw: 0bfffe0000000040 ffff000080002b40 dead000000000122 0000000000000000 [ 38.384213] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 38.392060] head: 0bfffe0000000040 ffff000080002b40 dead000000000122 0000000000000000 [ 38.399994] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 38.407927] head: 0bfffe0000000002 fffffdffc2186201 00000000ffffffff 00000000ffffffff [ 38.415859] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 38.423789] page dumped because: kasan: bad access detected [ 38.429439] [ 38.430968] Memory state around the buggy address: [ 38.435828] ffff000086189700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.443145] ffff000086189780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.450464] >ffff000086189800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 38.457777] ^ [ 38.461066] ffff000086189880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 38.468383] ffff000086189900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.475698] ==================================================================
[ 31.001399] ================================================================== [ 31.001463] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520 [ 31.001520] Read of size 1 at addr fff00000c872c800 by task kunit_try_catch/196 [ 31.001869] [ 31.001981] CPU: 0 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 31.002328] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.002445] Hardware name: linux,dummy-virt (DT) [ 31.002489] Call trace: [ 31.002553] show_stack+0x20/0x38 (C) [ 31.002655] dump_stack_lvl+0x8c/0xd0 [ 31.002708] print_report+0x118/0x608 [ 31.002755] kasan_report+0xdc/0x128 [ 31.002898] __asan_report_load1_noabort+0x20/0x30 [ 31.002955] krealloc_uaf+0x4c8/0x520 [ 31.003135] kunit_try_run_case+0x170/0x3f0 [ 31.003201] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.003405] kthread+0x328/0x630 [ 31.003499] ret_from_fork+0x10/0x20 [ 31.003565] [ 31.003584] Allocated by task 196: [ 31.003611] kasan_save_stack+0x3c/0x68 [ 31.003827] kasan_save_track+0x20/0x40 [ 31.004076] kasan_save_alloc_info+0x40/0x58 [ 31.004170] __kasan_kmalloc+0xd4/0xd8 [ 31.004531] __kmalloc_cache_noprof+0x16c/0x3c0 [ 31.004720] krealloc_uaf+0xc8/0x520 [ 31.004919] kunit_try_run_case+0x170/0x3f0 [ 31.005016] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.005132] kthread+0x328/0x630 [ 31.005189] ret_from_fork+0x10/0x20 [ 31.005250] [ 31.005269] Freed by task 196: [ 31.005295] kasan_save_stack+0x3c/0x68 [ 31.005333] kasan_save_track+0x20/0x40 [ 31.005370] kasan_save_free_info+0x4c/0x78 [ 31.005666] __kasan_slab_free+0x6c/0x98 [ 31.005811] kfree+0x214/0x3c8 [ 31.005940] krealloc_uaf+0x12c/0x520 [ 31.006082] kunit_try_run_case+0x170/0x3f0 [ 31.006268] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.006366] kthread+0x328/0x630 [ 31.006405] ret_from_fork+0x10/0x20 [ 31.006764] [ 31.006814] The buggy address belongs to the object at fff00000c872c800 [ 31.006814] which belongs to the cache kmalloc-256 of size 256 [ 31.007060] The buggy address is located 0 bytes inside of [ 31.007060] freed 256-byte region [fff00000c872c800, fff00000c872c900) [ 31.007408] [ 31.007463] The buggy address belongs to the physical page: [ 31.007675] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10872c [ 31.007859] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 31.008032] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 31.008151] page_type: f5(slab) [ 31.008525] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 31.008585] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.008680] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 31.008731] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.008898] head: 0bfffe0000000001 ffffc1ffc321cb01 00000000ffffffff 00000000ffffffff [ 31.009136] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 31.009272] page dumped because: kasan: bad access detected [ 31.009430] [ 31.009502] Memory state around the buggy address: [ 31.009654] fff00000c872c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.009728] fff00000c872c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.009769] >fff00000c872c800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.009847] ^ [ 31.010183] fff00000c872c880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.010349] fff00000c872c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.010513] ================================================================== [ 30.987935] ================================================================== [ 30.988119] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520 [ 30.988179] Read of size 1 at addr fff00000c872c800 by task kunit_try_catch/196 [ 30.988612] [ 30.988681] CPU: 0 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 30.988902] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.989036] Hardware name: linux,dummy-virt (DT) [ 30.989119] Call trace: [ 30.989142] show_stack+0x20/0x38 (C) [ 30.989201] dump_stack_lvl+0x8c/0xd0 [ 30.989397] print_report+0x118/0x608 [ 30.989635] kasan_report+0xdc/0x128 [ 30.989790] __kasan_check_byte+0x54/0x70 [ 30.990078] krealloc_noprof+0x44/0x360 [ 30.990688] krealloc_uaf+0x180/0x520 [ 30.990987] kunit_try_run_case+0x170/0x3f0 [ 30.991249] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.991582] kthread+0x328/0x630 [ 30.991752] ret_from_fork+0x10/0x20 [ 30.991889] [ 30.991910] Allocated by task 196: [ 30.992112] kasan_save_stack+0x3c/0x68 [ 30.992295] kasan_save_track+0x20/0x40 [ 30.992380] kasan_save_alloc_info+0x40/0x58 [ 30.992555] __kasan_kmalloc+0xd4/0xd8 [ 30.992868] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.992996] krealloc_uaf+0xc8/0x520 [ 30.993142] kunit_try_run_case+0x170/0x3f0 [ 30.993281] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.993436] kthread+0x328/0x630 [ 30.993517] ret_from_fork+0x10/0x20 [ 30.993555] [ 30.993598] Freed by task 196: [ 30.993638] kasan_save_stack+0x3c/0x68 [ 30.993829] kasan_save_track+0x20/0x40 [ 30.994155] kasan_save_free_info+0x4c/0x78 [ 30.994238] __kasan_slab_free+0x6c/0x98 [ 30.994443] kfree+0x214/0x3c8 [ 30.994729] krealloc_uaf+0x12c/0x520 [ 30.994852] kunit_try_run_case+0x170/0x3f0 [ 30.994896] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.995419] kthread+0x328/0x630 [ 30.995545] ret_from_fork+0x10/0x20 [ 30.995777] [ 30.996023] The buggy address belongs to the object at fff00000c872c800 [ 30.996023] which belongs to the cache kmalloc-256 of size 256 [ 30.996562] The buggy address is located 0 bytes inside of [ 30.996562] freed 256-byte region [fff00000c872c800, fff00000c872c900) [ 30.996757] [ 30.996824] The buggy address belongs to the physical page: [ 30.996988] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10872c [ 30.997194] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.997320] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.997427] page_type: f5(slab) [ 30.997636] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.998005] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.998080] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.998243] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.998305] head: 0bfffe0000000001 ffffc1ffc321cb01 00000000ffffffff 00000000ffffffff [ 30.998545] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 30.998604] page dumped because: kasan: bad access detected [ 30.998635] [ 30.998918] Memory state around the buggy address: [ 30.999097] fff00000c872c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.999169] fff00000c872c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.999317] >fff00000c872c800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.999507] ^ [ 30.999576] fff00000c872c880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.999772] fff00000c872c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.000219] ==================================================================
[ 23.081385] ================================================================== [ 23.081862] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x1b8/0x5e0 [ 23.082140] Read of size 1 at addr ffff8881055a1000 by task kunit_try_catch/213 [ 23.082683] [ 23.082781] CPU: 0 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT(voluntary) [ 23.082868] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.082882] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.082903] Call Trace: [ 23.082915] <TASK> [ 23.082931] dump_stack_lvl+0x73/0xb0 [ 23.082961] print_report+0xd1/0x650 [ 23.083016] ? __virt_addr_valid+0x1db/0x2d0 [ 23.083041] ? krealloc_uaf+0x1b8/0x5e0 [ 23.083061] ? kasan_complete_mode_report_info+0x64/0x200 [ 23.083087] ? krealloc_uaf+0x1b8/0x5e0 [ 23.083108] kasan_report+0x141/0x180 [ 23.083129] ? krealloc_uaf+0x1b8/0x5e0 [ 23.083153] ? krealloc_uaf+0x1b8/0x5e0 [ 23.083207] __kasan_check_byte+0x3d/0x50 [ 23.083230] krealloc_noprof+0x3f/0x340 [ 23.083258] krealloc_uaf+0x1b8/0x5e0 [ 23.083289] ? __pfx_krealloc_uaf+0x10/0x10 [ 23.083469] ? finish_task_switch.isra.0+0x153/0x700 [ 23.083493] ? __switch_to+0x47/0xf50 [ 23.083527] ? __schedule+0x10cc/0x2b60 [ 23.083553] ? __pfx_read_tsc+0x10/0x10 [ 23.083580] ? ktime_get_ts64+0x86/0x230 [ 23.083607] kunit_try_run_case+0x1a5/0x480 [ 23.083634] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.083657] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.083678] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.083703] ? __kthread_parkme+0x82/0x180 [ 23.083723] ? preempt_count_sub+0x50/0x80 [ 23.083747] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.083771] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.083794] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.083818] kthread+0x337/0x6f0 [ 23.083837] ? trace_preempt_on+0x20/0xc0 [ 23.083860] ? __pfx_kthread+0x10/0x10 [ 23.083880] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.083904] ? calculate_sigpending+0x7b/0xa0 [ 23.083928] ? __pfx_kthread+0x10/0x10 [ 23.083949] ret_from_fork+0x116/0x1d0 [ 23.083969] ? __pfx_kthread+0x10/0x10 [ 23.083989] ret_from_fork_asm+0x1a/0x30 [ 23.084023] </TASK> [ 23.084035] [ 23.092710] Allocated by task 213: [ 23.092832] kasan_save_stack+0x45/0x70 [ 23.092970] kasan_save_track+0x18/0x40 [ 23.093095] kasan_save_alloc_info+0x3b/0x50 [ 23.093402] __kasan_kmalloc+0xb7/0xc0 [ 23.093732] __kmalloc_cache_noprof+0x189/0x420 [ 23.094335] krealloc_uaf+0xbb/0x5e0 [ 23.094600] kunit_try_run_case+0x1a5/0x480 [ 23.094818] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.095093] kthread+0x337/0x6f0 [ 23.095367] ret_from_fork+0x116/0x1d0 [ 23.095578] ret_from_fork_asm+0x1a/0x30 [ 23.095730] [ 23.095795] Freed by task 213: [ 23.095897] kasan_save_stack+0x45/0x70 [ 23.096077] kasan_save_track+0x18/0x40 [ 23.096253] kasan_save_free_info+0x3f/0x60 [ 23.096444] __kasan_slab_free+0x56/0x70 [ 23.096777] kfree+0x222/0x3f0 [ 23.096896] krealloc_uaf+0x13d/0x5e0 [ 23.097219] kunit_try_run_case+0x1a5/0x480 [ 23.097417] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.097661] kthread+0x337/0x6f0 [ 23.097922] ret_from_fork+0x116/0x1d0 [ 23.098050] ret_from_fork_asm+0x1a/0x30 [ 23.098554] [ 23.098659] The buggy address belongs to the object at ffff8881055a1000 [ 23.098659] which belongs to the cache kmalloc-256 of size 256 [ 23.099330] The buggy address is located 0 bytes inside of [ 23.099330] freed 256-byte region [ffff8881055a1000, ffff8881055a1100) [ 23.099856] [ 23.099984] The buggy address belongs to the physical page: [ 23.100347] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1055a0 [ 23.100594] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.100807] flags: 0x200000000000040(head|node=0|zone=2) [ 23.101053] page_type: f5(slab) [ 23.101244] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 23.101725] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.102152] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 23.102751] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.102989] head: 0200000000000001 ffffea0004156801 00000000ffffffff 00000000ffffffff [ 23.103634] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 23.103979] page dumped because: kasan: bad access detected [ 23.104217] [ 23.104279] Memory state around the buggy address: [ 23.104679] ffff8881055a0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.104992] ffff8881055a0f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.105365] >ffff8881055a1000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.105710] ^ [ 23.105871] ffff8881055a1080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.106200] ffff8881055a1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.106589] ================================================================== [ 23.107581] ================================================================== [ 23.107961] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x53c/0x5e0 [ 23.108288] Read of size 1 at addr ffff8881055a1000 by task kunit_try_catch/213 [ 23.108725] [ 23.108830] CPU: 0 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT(voluntary) [ 23.108877] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.108888] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.108910] Call Trace: [ 23.108923] <TASK> [ 23.108938] dump_stack_lvl+0x73/0xb0 [ 23.108966] print_report+0xd1/0x650 [ 23.108989] ? __virt_addr_valid+0x1db/0x2d0 [ 23.109012] ? krealloc_uaf+0x53c/0x5e0 [ 23.109033] ? kasan_complete_mode_report_info+0x64/0x200 [ 23.109058] ? krealloc_uaf+0x53c/0x5e0 [ 23.109079] kasan_report+0x141/0x180 [ 23.109100] ? krealloc_uaf+0x53c/0x5e0 [ 23.109127] __asan_report_load1_noabort+0x18/0x20 [ 23.109150] krealloc_uaf+0x53c/0x5e0 [ 23.109171] ? __pfx_krealloc_uaf+0x10/0x10 [ 23.109191] ? finish_task_switch.isra.0+0x153/0x700 [ 23.109212] ? __switch_to+0x47/0xf50 [ 23.109245] ? __schedule+0x10cc/0x2b60 [ 23.109270] ? __pfx_read_tsc+0x10/0x10 [ 23.109296] ? ktime_get_ts64+0x86/0x230 [ 23.109322] kunit_try_run_case+0x1a5/0x480 [ 23.109347] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.109369] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.109390] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.109415] ? __kthread_parkme+0x82/0x180 [ 23.109435] ? preempt_count_sub+0x50/0x80 [ 23.109469] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.109494] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.109517] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.109581] kthread+0x337/0x6f0 [ 23.109602] ? trace_preempt_on+0x20/0xc0 [ 23.109625] ? __pfx_kthread+0x10/0x10 [ 23.109646] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.109669] ? calculate_sigpending+0x7b/0xa0 [ 23.109693] ? __pfx_kthread+0x10/0x10 [ 23.109715] ret_from_fork+0x116/0x1d0 [ 23.109734] ? __pfx_kthread+0x10/0x10 [ 23.109755] ret_from_fork_asm+0x1a/0x30 [ 23.109788] </TASK> [ 23.109799] [ 23.121764] Allocated by task 213: [ 23.122383] kasan_save_stack+0x45/0x70 [ 23.122986] kasan_save_track+0x18/0x40 [ 23.123658] kasan_save_alloc_info+0x3b/0x50 [ 23.123898] __kasan_kmalloc+0xb7/0xc0 [ 23.124033] __kmalloc_cache_noprof+0x189/0x420 [ 23.124597] krealloc_uaf+0xbb/0x5e0 [ 23.125098] kunit_try_run_case+0x1a5/0x480 [ 23.125753] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.126416] kthread+0x337/0x6f0 [ 23.126568] ret_from_fork+0x116/0x1d0 [ 23.126701] ret_from_fork_asm+0x1a/0x30 [ 23.126834] [ 23.126900] Freed by task 213: [ 23.127005] kasan_save_stack+0x45/0x70 [ 23.127229] kasan_save_track+0x18/0x40 [ 23.127578] kasan_save_free_info+0x3f/0x60 [ 23.128369] __kasan_slab_free+0x56/0x70 [ 23.128933] kfree+0x222/0x3f0 [ 23.129323] krealloc_uaf+0x13d/0x5e0 [ 23.129676] kunit_try_run_case+0x1a5/0x480 [ 23.130052] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.130598] kthread+0x337/0x6f0 [ 23.130890] ret_from_fork+0x116/0x1d0 [ 23.131434] ret_from_fork_asm+0x1a/0x30 [ 23.131595] [ 23.131662] The buggy address belongs to the object at ffff8881055a1000 [ 23.131662] which belongs to the cache kmalloc-256 of size 256 [ 23.132013] The buggy address is located 0 bytes inside of [ 23.132013] freed 256-byte region [ffff8881055a1000, ffff8881055a1100) [ 23.132946] [ 23.133112] The buggy address belongs to the physical page: [ 23.133695] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1055a0 [ 23.134494] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.135109] flags: 0x200000000000040(head|node=0|zone=2) [ 23.135692] page_type: f5(slab) [ 23.135979] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 23.136277] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.137110] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 23.137695] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.137932] head: 0200000000000001 ffffea0004156801 00000000ffffffff 00000000ffffffff [ 23.138355] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 23.138637] page dumped because: kasan: bad access detected [ 23.138804] [ 23.138869] Memory state around the buggy address: [ 23.139016] ffff8881055a0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.139817] ffff8881055a0f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.140649] >ffff8881055a1000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.141435] ^ [ 23.141765] ffff8881055a1080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.142615] ffff8881055a1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.143335] ==================================================================