Date
July 11, 2025, 10:11 a.m.
Environment | |
---|---|
e850-96 | |
qemu-arm64 | |
qemu-x86_64 |
[ 42.933526] ================================================================== [ 42.943331] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520 [ 42.949922] Read of size 1 at addr ffff0008030fd200 by task kunit_try_catch/248 [ 42.957213] [ 42.958700] CPU: 3 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 42.958761] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.958776] Hardware name: WinLink E850-96 board (DT) [ 42.958796] Call trace: [ 42.958809] show_stack+0x20/0x38 (C) [ 42.958844] dump_stack_lvl+0x8c/0xd0 [ 42.958874] print_report+0x118/0x5d0 [ 42.958901] kasan_report+0xdc/0x128 [ 42.958929] __kasan_check_byte+0x54/0x70 [ 42.958965] krealloc_noprof+0x44/0x360 [ 42.959002] krealloc_uaf+0x180/0x520 [ 42.959033] kunit_try_run_case+0x170/0x3f0 [ 42.959072] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.959104] kthread+0x328/0x630 [ 42.959135] ret_from_fork+0x10/0x20 [ 42.959171] [ 43.025270] Allocated by task 248: [ 43.028657] kasan_save_stack+0x3c/0x68 [ 43.032473] kasan_save_track+0x20/0x40 [ 43.036294] kasan_save_alloc_info+0x40/0x58 [ 43.040546] __kasan_kmalloc+0xd4/0xd8 [ 43.044278] __kmalloc_cache_noprof+0x16c/0x3c0 [ 43.048792] krealloc_uaf+0xc8/0x520 [ 43.052351] kunit_try_run_case+0x170/0x3f0 [ 43.056518] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.061986] kthread+0x328/0x630 [ 43.065198] ret_from_fork+0x10/0x20 [ 43.068757] [ 43.070234] Freed by task 248: [ 43.073273] kasan_save_stack+0x3c/0x68 [ 43.077090] kasan_save_track+0x20/0x40 [ 43.080908] kasan_save_free_info+0x4c/0x78 [ 43.085076] __kasan_slab_free+0x6c/0x98 [ 43.088984] kfree+0x214/0x3c8 [ 43.092020] krealloc_uaf+0x12c/0x520 [ 43.095666] kunit_try_run_case+0x170/0x3f0 [ 43.099833] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.105302] kthread+0x328/0x630 [ 43.108513] ret_from_fork+0x10/0x20 [ 43.112072] [ 43.113550] The buggy address belongs to the object at ffff0008030fd200 [ 43.113550] which belongs to the cache kmalloc-256 of size 256 [ 43.126052] The buggy address is located 0 bytes inside of [ 43.126052] freed 256-byte region [ffff0008030fd200, ffff0008030fd300) [ 43.138115] [ 43.139593] The buggy address belongs to the physical page: [ 43.145149] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8830fc [ 43.153133] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 43.160772] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 43.167714] page_type: f5(slab) [ 43.170853] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 43.178571] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 43.186298] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 43.194109] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 43.201922] head: 0bfffe0000000002 fffffdffe00c3f01 00000000ffffffff 00000000ffffffff [ 43.209734] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 43.217539] page dumped because: kasan: bad access detected [ 43.223094] [ 43.224570] Memory state around the buggy address: [ 43.229352] ffff0008030fd100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.236553] ffff0008030fd180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.243758] >ffff0008030fd200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 43.250959] ^ [ 43.254175] ffff0008030fd280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 43.261379] ffff0008030fd300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.268582] ================================================================== [ 43.275964] ================================================================== [ 43.283000] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520 [ 43.289587] Read of size 1 at addr ffff0008030fd200 by task kunit_try_catch/248 [ 43.296879] [ 43.298363] CPU: 3 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 43.298416] Tainted: [B]=BAD_PAGE, [N]=TEST [ 43.298431] Hardware name: WinLink E850-96 board (DT) [ 43.298452] Call trace: [ 43.298467] show_stack+0x20/0x38 (C) [ 43.298498] dump_stack_lvl+0x8c/0xd0 [ 43.298531] print_report+0x118/0x5d0 [ 43.298558] kasan_report+0xdc/0x128 [ 43.298585] __asan_report_load1_noabort+0x20/0x30 [ 43.298614] krealloc_uaf+0x4c8/0x520 [ 43.298644] kunit_try_run_case+0x170/0x3f0 [ 43.298681] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.298713] kthread+0x328/0x630 [ 43.298741] ret_from_fork+0x10/0x20 [ 43.298776] [ 43.361894] Allocated by task 248: [ 43.365283] kasan_save_stack+0x3c/0x68 [ 43.369100] kasan_save_track+0x20/0x40 [ 43.372919] kasan_save_alloc_info+0x40/0x58 [ 43.377172] __kasan_kmalloc+0xd4/0xd8 [ 43.380905] __kmalloc_cache_noprof+0x16c/0x3c0 [ 43.385419] krealloc_uaf+0xc8/0x520 [ 43.388978] kunit_try_run_case+0x170/0x3f0 [ 43.393145] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.398613] kthread+0x328/0x630 [ 43.401825] ret_from_fork+0x10/0x20 [ 43.405384] [ 43.406860] Freed by task 248: [ 43.409899] kasan_save_stack+0x3c/0x68 [ 43.413717] kasan_save_track+0x20/0x40 [ 43.417536] kasan_save_free_info+0x4c/0x78 [ 43.421703] __kasan_slab_free+0x6c/0x98 [ 43.425609] kfree+0x214/0x3c8 [ 43.428648] krealloc_uaf+0x12c/0x520 [ 43.432293] kunit_try_run_case+0x170/0x3f0 [ 43.436460] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.441928] kthread+0x328/0x630 [ 43.445140] ret_from_fork+0x10/0x20 [ 43.448699] [ 43.450175] The buggy address belongs to the object at ffff0008030fd200 [ 43.450175] which belongs to the cache kmalloc-256 of size 256 [ 43.462677] The buggy address is located 0 bytes inside of [ 43.462677] freed 256-byte region [ffff0008030fd200, ffff0008030fd300) [ 43.474740] [ 43.476220] The buggy address belongs to the physical page: [ 43.481776] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8830fc [ 43.489759] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 43.497399] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 43.504342] page_type: f5(slab) [ 43.507476] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 43.515198] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 43.522924] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 43.530736] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 43.538549] head: 0bfffe0000000002 fffffdffe00c3f01 00000000ffffffff 00000000ffffffff [ 43.546361] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 43.554166] page dumped because: kasan: bad access detected [ 43.559721] [ 43.561197] Memory state around the buggy address: [ 43.565977] ffff0008030fd100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.573180] ffff0008030fd180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.580385] >ffff0008030fd200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 43.587586] ^ [ 43.590801] ffff0008030fd280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 43.598006] ffff0008030fd300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.605207] ==================================================================
[ 30.298998] ================================================================== [ 30.299096] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520 [ 30.299220] Read of size 1 at addr fff00000c9554c00 by task kunit_try_catch/195 [ 30.299364] [ 30.299483] CPU: 1 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 30.299858] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.299884] Hardware name: linux,dummy-virt (DT) [ 30.299990] Call trace: [ 30.300115] show_stack+0x20/0x38 (C) [ 30.300166] dump_stack_lvl+0x8c/0xd0 [ 30.300218] print_report+0x118/0x5d0 [ 30.300597] kasan_report+0xdc/0x128 [ 30.300983] __kasan_check_byte+0x54/0x70 [ 30.301127] krealloc_noprof+0x44/0x360 [ 30.301354] krealloc_uaf+0x180/0x520 [ 30.301462] kunit_try_run_case+0x170/0x3f0 [ 30.301707] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.301768] kthread+0x328/0x630 [ 30.301810] ret_from_fork+0x10/0x20 [ 30.301986] [ 30.302007] Allocated by task 195: [ 30.302036] kasan_save_stack+0x3c/0x68 [ 30.302080] kasan_save_track+0x20/0x40 [ 30.302117] kasan_save_alloc_info+0x40/0x58 [ 30.302179] __kasan_kmalloc+0xd4/0xd8 [ 30.302291] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.302354] krealloc_uaf+0xc8/0x520 [ 30.302399] kunit_try_run_case+0x170/0x3f0 [ 30.302520] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.302559] kthread+0x328/0x630 [ 30.302591] ret_from_fork+0x10/0x20 [ 30.302625] [ 30.302644] Freed by task 195: [ 30.302893] kasan_save_stack+0x3c/0x68 [ 30.302970] kasan_save_track+0x20/0x40 [ 30.303055] kasan_save_free_info+0x4c/0x78 [ 30.303172] __kasan_slab_free+0x6c/0x98 [ 30.303227] kfree+0x214/0x3c8 [ 30.303270] krealloc_uaf+0x12c/0x520 [ 30.303481] kunit_try_run_case+0x170/0x3f0 [ 30.303520] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.303559] kthread+0x328/0x630 [ 30.303597] ret_from_fork+0x10/0x20 [ 30.303869] [ 30.303892] The buggy address belongs to the object at fff00000c9554c00 [ 30.303892] which belongs to the cache kmalloc-256 of size 256 [ 30.304218] The buggy address is located 0 bytes inside of [ 30.304218] freed 256-byte region [fff00000c9554c00, fff00000c9554d00) [ 30.304280] [ 30.304313] The buggy address belongs to the physical page: [ 30.304392] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109554 [ 30.304819] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.305075] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.305135] page_type: f5(slab) [ 30.305178] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122 [ 30.305238] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.305285] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122 [ 30.305457] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.305541] head: 0bfffe0000000001 ffffc1ffc3255501 00000000ffffffff 00000000ffffffff [ 30.305677] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 30.305717] page dumped because: kasan: bad access detected [ 30.305784] [ 30.306008] Memory state around the buggy address: [ 30.306121] fff00000c9554b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.306163] fff00000c9554b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.306209] >fff00000c9554c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.306456] ^ [ 30.306636] fff00000c9554c80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.306684] fff00000c9554d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.306720] ================================================================== [ 30.307742] ================================================================== [ 30.307794] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520 [ 30.308072] Read of size 1 at addr fff00000c9554c00 by task kunit_try_catch/195 [ 30.308405] [ 30.308449] CPU: 1 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 30.308534] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.308566] Hardware name: linux,dummy-virt (DT) [ 30.308721] Call trace: [ 30.308743] show_stack+0x20/0x38 (C) [ 30.308793] dump_stack_lvl+0x8c/0xd0 [ 30.308841] print_report+0x118/0x5d0 [ 30.308883] kasan_report+0xdc/0x128 [ 30.308925] __asan_report_load1_noabort+0x20/0x30 [ 30.308972] krealloc_uaf+0x4c8/0x520 [ 30.309016] kunit_try_run_case+0x170/0x3f0 [ 30.309063] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.309113] kthread+0x328/0x630 [ 30.309153] ret_from_fork+0x10/0x20 [ 30.309199] [ 30.309224] Allocated by task 195: [ 30.309556] kasan_save_stack+0x3c/0x68 [ 30.309827] kasan_save_track+0x20/0x40 [ 30.309870] kasan_save_alloc_info+0x40/0x58 [ 30.309906] __kasan_kmalloc+0xd4/0xd8 [ 30.310115] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.310184] krealloc_uaf+0xc8/0x520 [ 30.310256] kunit_try_run_case+0x170/0x3f0 [ 30.310295] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.310347] kthread+0x328/0x630 [ 30.310380] ret_from_fork+0x10/0x20 [ 30.310415] [ 30.310434] Freed by task 195: [ 30.310467] kasan_save_stack+0x3c/0x68 [ 30.310648] kasan_save_track+0x20/0x40 [ 30.310774] kasan_save_free_info+0x4c/0x78 [ 30.310810] __kasan_slab_free+0x6c/0x98 [ 30.310947] kfree+0x214/0x3c8 [ 30.310981] krealloc_uaf+0x12c/0x520 [ 30.311031] kunit_try_run_case+0x170/0x3f0 [ 30.311231] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.311297] kthread+0x328/0x630 [ 30.311345] ret_from_fork+0x10/0x20 [ 30.311379] [ 30.311398] The buggy address belongs to the object at fff00000c9554c00 [ 30.311398] which belongs to the cache kmalloc-256 of size 256 [ 30.311621] The buggy address is located 0 bytes inside of [ 30.311621] freed 256-byte region [fff00000c9554c00, fff00000c9554d00) [ 30.311687] [ 30.311706] The buggy address belongs to the physical page: [ 30.311955] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109554 [ 30.312289] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.312626] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.312702] page_type: f5(slab) [ 30.313066] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122 [ 30.313677] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.313781] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122 [ 30.313828] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.313896] head: 0bfffe0000000001 ffffc1ffc3255501 00000000ffffffff 00000000ffffffff [ 30.313943] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 30.314077] page dumped because: kasan: bad access detected [ 30.314795] [ 30.314846] Memory state around the buggy address: [ 30.314943] fff00000c9554b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.315009] fff00000c9554b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.315059] >fff00000c9554c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.315095] ^ [ 30.315124] fff00000c9554c80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.315164] fff00000c9554d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.315199] ==================================================================
[ 23.682599] ================================================================== [ 23.682894] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x53c/0x5e0 [ 23.683138] Read of size 1 at addr ffff888100a16c00 by task kunit_try_catch/214 [ 23.683754] [ 23.683877] CPU: 1 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) [ 23.683927] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.683938] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.683982] Call Trace: [ 23.683997] <TASK> [ 23.684012] dump_stack_lvl+0x73/0xb0 [ 23.684046] print_report+0xd1/0x610 [ 23.684086] ? __virt_addr_valid+0x1db/0x2d0 [ 23.684110] ? krealloc_uaf+0x53c/0x5e0 [ 23.684130] ? kasan_complete_mode_report_info+0x64/0x200 [ 23.684155] ? krealloc_uaf+0x53c/0x5e0 [ 23.684176] kasan_report+0x141/0x180 [ 23.684197] ? krealloc_uaf+0x53c/0x5e0 [ 23.684222] __asan_report_load1_noabort+0x18/0x20 [ 23.684245] krealloc_uaf+0x53c/0x5e0 [ 23.684312] ? __pfx_krealloc_uaf+0x10/0x10 [ 23.684350] ? finish_task_switch.isra.0+0x153/0x700 [ 23.684386] ? __switch_to+0x47/0xf80 [ 23.684444] ? __schedule+0x10cc/0x2b60 [ 23.684468] ? __pfx_read_tsc+0x10/0x10 [ 23.684490] ? ktime_get_ts64+0x86/0x230 [ 23.684516] kunit_try_run_case+0x1a5/0x480 [ 23.684540] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.684559] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.684582] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.684605] ? __kthread_parkme+0x82/0x180 [ 23.684626] ? preempt_count_sub+0x50/0x80 [ 23.684648] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.684669] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.684693] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.684718] kthread+0x337/0x6f0 [ 23.684748] ? trace_preempt_on+0x20/0xc0 [ 23.684774] ? __pfx_kthread+0x10/0x10 [ 23.684908] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.684932] ? calculate_sigpending+0x7b/0xa0 [ 23.684958] ? __pfx_kthread+0x10/0x10 [ 23.684980] ret_from_fork+0x116/0x1d0 [ 23.685000] ? __pfx_kthread+0x10/0x10 [ 23.685022] ret_from_fork_asm+0x1a/0x30 [ 23.685053] </TASK> [ 23.685065] [ 23.696547] Allocated by task 214: [ 23.696684] kasan_save_stack+0x45/0x70 [ 23.697368] kasan_save_track+0x18/0x40 [ 23.697730] kasan_save_alloc_info+0x3b/0x50 [ 23.698134] __kasan_kmalloc+0xb7/0xc0 [ 23.698560] __kmalloc_cache_noprof+0x189/0x420 [ 23.698990] krealloc_uaf+0xbb/0x5e0 [ 23.699557] kunit_try_run_case+0x1a5/0x480 [ 23.699961] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.700537] kthread+0x337/0x6f0 [ 23.700862] ret_from_fork+0x116/0x1d0 [ 23.701205] ret_from_fork_asm+0x1a/0x30 [ 23.701658] [ 23.701827] Freed by task 214: [ 23.702137] kasan_save_stack+0x45/0x70 [ 23.702561] kasan_save_track+0x18/0x40 [ 23.702953] kasan_save_free_info+0x3f/0x60 [ 23.703485] __kasan_slab_free+0x56/0x70 [ 23.703757] kfree+0x222/0x3f0 [ 23.703870] krealloc_uaf+0x13d/0x5e0 [ 23.703995] kunit_try_run_case+0x1a5/0x480 [ 23.704130] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.704545] kthread+0x337/0x6f0 [ 23.704851] ret_from_fork+0x116/0x1d0 [ 23.705210] ret_from_fork_asm+0x1a/0x30 [ 23.705658] [ 23.705848] The buggy address belongs to the object at ffff888100a16c00 [ 23.705848] which belongs to the cache kmalloc-256 of size 256 [ 23.706979] The buggy address is located 0 bytes inside of [ 23.706979] freed 256-byte region [ffff888100a16c00, ffff888100a16d00) [ 23.708023] [ 23.708213] The buggy address belongs to the physical page: [ 23.708636] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a16 [ 23.708901] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.709122] anon flags: 0x200000000000040(head|node=0|zone=2) [ 23.709588] page_type: f5(slab) [ 23.709927] raw: 0200000000000040 ffff888100041b40 0000000000000000 dead000000000001 [ 23.710713] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.711605] head: 0200000000000040 ffff888100041b40 0000000000000000 dead000000000001 [ 23.712500] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.713463] head: 0200000000000001 ffffea0004028581 00000000ffffffff 00000000ffffffff [ 23.714136] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 23.714680] page dumped because: kasan: bad access detected [ 23.715185] [ 23.715529] Memory state around the buggy address: [ 23.715855] ffff888100a16b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.716067] ffff888100a16b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.716343] >ffff888100a16c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.717183] ^ [ 23.717515] ffff888100a16c80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.718223] ffff888100a16d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.719014] ================================================================== [ 23.656869] ================================================================== [ 23.657570] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x1b8/0x5e0 [ 23.657907] Read of size 1 at addr ffff888100a16c00 by task kunit_try_catch/214 [ 23.658217] [ 23.658347] CPU: 1 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) [ 23.658500] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.658514] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.658537] Call Trace: [ 23.658551] <TASK> [ 23.658570] dump_stack_lvl+0x73/0xb0 [ 23.658625] print_report+0xd1/0x610 [ 23.658648] ? __virt_addr_valid+0x1db/0x2d0 [ 23.658671] ? krealloc_uaf+0x1b8/0x5e0 [ 23.658692] ? kasan_complete_mode_report_info+0x64/0x200 [ 23.658717] ? krealloc_uaf+0x1b8/0x5e0 [ 23.658749] kasan_report+0x141/0x180 [ 23.658770] ? krealloc_uaf+0x1b8/0x5e0 [ 23.658794] ? krealloc_uaf+0x1b8/0x5e0 [ 23.658815] __kasan_check_byte+0x3d/0x50 [ 23.658835] krealloc_noprof+0x3f/0x340 [ 23.658862] krealloc_uaf+0x1b8/0x5e0 [ 23.658904] ? __pfx_krealloc_uaf+0x10/0x10 [ 23.658924] ? finish_task_switch.isra.0+0x153/0x700 [ 23.658946] ? __switch_to+0x47/0xf80 [ 23.658972] ? __schedule+0x10cc/0x2b60 [ 23.658996] ? __pfx_read_tsc+0x10/0x10 [ 23.659018] ? ktime_get_ts64+0x86/0x230 [ 23.659044] kunit_try_run_case+0x1a5/0x480 [ 23.659083] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.659103] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.659126] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.659149] ? __kthread_parkme+0x82/0x180 [ 23.659170] ? preempt_count_sub+0x50/0x80 [ 23.659192] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.659213] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.659237] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.659261] kthread+0x337/0x6f0 [ 23.659340] ? trace_preempt_on+0x20/0xc0 [ 23.659363] ? __pfx_kthread+0x10/0x10 [ 23.659384] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.659405] ? calculate_sigpending+0x7b/0xa0 [ 23.659437] ? __pfx_kthread+0x10/0x10 [ 23.659459] ret_from_fork+0x116/0x1d0 [ 23.659478] ? __pfx_kthread+0x10/0x10 [ 23.659499] ret_from_fork_asm+0x1a/0x30 [ 23.659530] </TASK> [ 23.659541] [ 23.668207] Allocated by task 214: [ 23.668513] kasan_save_stack+0x45/0x70 [ 23.668711] kasan_save_track+0x18/0x40 [ 23.668852] kasan_save_alloc_info+0x3b/0x50 [ 23.668993] __kasan_kmalloc+0xb7/0xc0 [ 23.669151] __kmalloc_cache_noprof+0x189/0x420 [ 23.669592] krealloc_uaf+0xbb/0x5e0 [ 23.669796] kunit_try_run_case+0x1a5/0x480 [ 23.669998] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.670246] kthread+0x337/0x6f0 [ 23.670534] ret_from_fork+0x116/0x1d0 [ 23.670670] ret_from_fork_asm+0x1a/0x30 [ 23.670866] [ 23.670980] Freed by task 214: [ 23.671131] kasan_save_stack+0x45/0x70 [ 23.671446] kasan_save_track+0x18/0x40 [ 23.671608] kasan_save_free_info+0x3f/0x60 [ 23.671843] __kasan_slab_free+0x56/0x70 [ 23.672033] kfree+0x222/0x3f0 [ 23.672183] krealloc_uaf+0x13d/0x5e0 [ 23.672452] kunit_try_run_case+0x1a5/0x480 [ 23.672620] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.672832] kthread+0x337/0x6f0 [ 23.673019] ret_from_fork+0x116/0x1d0 [ 23.673209] ret_from_fork_asm+0x1a/0x30 [ 23.673502] [ 23.673614] The buggy address belongs to the object at ffff888100a16c00 [ 23.673614] which belongs to the cache kmalloc-256 of size 256 [ 23.674256] The buggy address is located 0 bytes inside of [ 23.674256] freed 256-byte region [ffff888100a16c00, ffff888100a16d00) [ 23.674790] [ 23.674881] The buggy address belongs to the physical page: [ 23.675058] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a16 [ 23.675295] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.675766] anon flags: 0x200000000000040(head|node=0|zone=2) [ 23.676051] page_type: f5(slab) [ 23.676220] raw: 0200000000000040 ffff888100041b40 0000000000000000 dead000000000001 [ 23.677056] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.677482] head: 0200000000000040 ffff888100041b40 0000000000000000 dead000000000001 [ 23.677718] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.678195] head: 0200000000000001 ffffea0004028581 00000000ffffffff 00000000ffffffff [ 23.678576] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 23.678934] page dumped because: kasan: bad access detected [ 23.679141] [ 23.679436] Memory state around the buggy address: [ 23.679672] ffff888100a16b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.679964] ffff888100a16b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.680488] >ffff888100a16c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.680797] ^ [ 23.680980] ffff888100a16c80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.681365] ffff888100a16d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.681680] ==================================================================