Date
July 14, 2025, 10:38 a.m.
Environment | |
---|---|
e850-96 | |
qemu-arm64 | |
qemu-x86_64 |
[ 41.586779] ================================================================== [ 41.596682] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520 [ 41.603275] Read of size 1 at addr ffff0008042d2400 by task kunit_try_catch/248 [ 41.610567] [ 41.612051] CPU: 2 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 41.612100] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.612116] Hardware name: WinLink E850-96 board (DT) [ 41.612135] Call trace: [ 41.612148] show_stack+0x20/0x38 (C) [ 41.612184] dump_stack_lvl+0x8c/0xd0 [ 41.612217] print_report+0x118/0x5d0 [ 41.612242] kasan_report+0xdc/0x128 [ 41.612271] __kasan_check_byte+0x54/0x70 [ 41.612297] krealloc_noprof+0x44/0x360 [ 41.612335] krealloc_uaf+0x180/0x520 [ 41.612365] kunit_try_run_case+0x170/0x3f0 [ 41.612401] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.612434] kthread+0x328/0x630 [ 41.612464] ret_from_fork+0x10/0x20 [ 41.612497] [ 41.678623] Allocated by task 248: [ 41.682009] kasan_save_stack+0x3c/0x68 [ 41.685826] kasan_save_track+0x20/0x40 [ 41.689646] kasan_save_alloc_info+0x40/0x58 [ 41.693899] __kasan_kmalloc+0xd4/0xd8 [ 41.697631] __kmalloc_cache_noprof+0x16c/0x3c0 [ 41.702145] krealloc_uaf+0xc8/0x520 [ 41.705704] kunit_try_run_case+0x170/0x3f0 [ 41.709871] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.715339] kthread+0x328/0x630 [ 41.718552] ret_from_fork+0x10/0x20 [ 41.722110] [ 41.723587] Freed by task 248: [ 41.726624] kasan_save_stack+0x3c/0x68 [ 41.730443] kasan_save_track+0x20/0x40 [ 41.734263] kasan_save_free_info+0x4c/0x78 [ 41.738430] __kasan_slab_free+0x6c/0x98 [ 41.742337] kfree+0x214/0x3c8 [ 41.745374] krealloc_uaf+0x12c/0x520 [ 41.749020] kunit_try_run_case+0x170/0x3f0 [ 41.753186] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.758655] kthread+0x328/0x630 [ 41.761867] ret_from_fork+0x10/0x20 [ 41.765426] [ 41.766903] The buggy address belongs to the object at ffff0008042d2400 [ 41.766903] which belongs to the cache kmalloc-256 of size 256 [ 41.779404] The buggy address is located 0 bytes inside of [ 41.779404] freed 256-byte region [ffff0008042d2400, ffff0008042d2500) [ 41.791467] [ 41.792945] The buggy address belongs to the physical page: [ 41.798503] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8842d0 [ 41.806486] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 41.814126] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 41.821070] page_type: f5(slab) [ 41.824205] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 41.831924] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 41.839651] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 41.847462] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 41.855275] head: 0bfffe0000000002 fffffdffe010b401 00000000ffffffff 00000000ffffffff [ 41.863087] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 41.870893] page dumped because: kasan: bad access detected [ 41.876448] [ 41.877925] Memory state around the buggy address: [ 41.882705] ffff0008042d2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.889907] ffff0008042d2380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.897111] >ffff0008042d2400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 41.904313] ^ [ 41.907528] ffff0008042d2480: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 41.914732] ffff0008042d2500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.921935] ================================================================== [ 41.929346] ================================================================== [ 41.936348] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520 [ 41.942941] Read of size 1 at addr ffff0008042d2400 by task kunit_try_catch/248 [ 41.950232] [ 41.951717] CPU: 2 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 41.951768] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.951782] Hardware name: WinLink E850-96 board (DT) [ 41.951801] Call trace: [ 41.951814] show_stack+0x20/0x38 (C) [ 41.951849] dump_stack_lvl+0x8c/0xd0 [ 41.951881] print_report+0x118/0x5d0 [ 41.951908] kasan_report+0xdc/0x128 [ 41.951933] __asan_report_load1_noabort+0x20/0x30 [ 41.951968] krealloc_uaf+0x4c8/0x520 [ 41.951998] kunit_try_run_case+0x170/0x3f0 [ 41.952034] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.952065] kthread+0x328/0x630 [ 41.952093] ret_from_fork+0x10/0x20 [ 41.952125] [ 42.015248] Allocated by task 248: [ 42.018634] kasan_save_stack+0x3c/0x68 [ 42.022453] kasan_save_track+0x20/0x40 [ 42.026273] kasan_save_alloc_info+0x40/0x58 [ 42.030526] __kasan_kmalloc+0xd4/0xd8 [ 42.034258] __kmalloc_cache_noprof+0x16c/0x3c0 [ 42.038772] krealloc_uaf+0xc8/0x520 [ 42.042331] kunit_try_run_case+0x170/0x3f0 [ 42.046498] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.051966] kthread+0x328/0x630 [ 42.055178] ret_from_fork+0x10/0x20 [ 42.058737] [ 42.060213] Freed by task 248: [ 42.063251] kasan_save_stack+0x3c/0x68 [ 42.067070] kasan_save_track+0x20/0x40 [ 42.070890] kasan_save_free_info+0x4c/0x78 [ 42.075056] __kasan_slab_free+0x6c/0x98 [ 42.078963] kfree+0x214/0x3c8 [ 42.082001] krealloc_uaf+0x12c/0x520 [ 42.085647] kunit_try_run_case+0x170/0x3f0 [ 42.089813] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.095282] kthread+0x328/0x630 [ 42.098494] ret_from_fork+0x10/0x20 [ 42.102053] [ 42.103529] The buggy address belongs to the object at ffff0008042d2400 [ 42.103529] which belongs to the cache kmalloc-256 of size 256 [ 42.116031] The buggy address is located 0 bytes inside of [ 42.116031] freed 256-byte region [ffff0008042d2400, ffff0008042d2500) [ 42.128094] [ 42.129572] The buggy address belongs to the physical page: [ 42.135127] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8842d0 [ 42.143113] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 42.150753] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 42.157695] page_type: f5(slab) [ 42.160830] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 42.168551] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 42.176278] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 42.184089] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 42.191902] head: 0bfffe0000000002 fffffdffe010b401 00000000ffffffff 00000000ffffffff [ 42.199714] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 42.207519] page dumped because: kasan: bad access detected [ 42.213075] [ 42.214551] Memory state around the buggy address: [ 42.219330] ffff0008042d2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.226533] ffff0008042d2380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.233738] >ffff0008042d2400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 42.240939] ^ [ 42.244155] ffff0008042d2480: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 42.251359] ffff0008042d2500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.258561] ==================================================================
[ 29.531496] ================================================================== [ 29.531561] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520 [ 29.531704] Read of size 1 at addr fff00000c9688400 by task kunit_try_catch/195 [ 29.531769] [ 29.531802] CPU: 0 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 29.531884] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.531909] Hardware name: linux,dummy-virt (DT) [ 29.531939] Call trace: [ 29.531961] show_stack+0x20/0x38 (C) [ 29.532009] dump_stack_lvl+0x8c/0xd0 [ 29.532065] print_report+0x118/0x5d0 [ 29.532120] kasan_report+0xdc/0x128 [ 29.532256] __kasan_check_byte+0x54/0x70 [ 29.532348] krealloc_noprof+0x44/0x360 [ 29.532419] krealloc_uaf+0x180/0x520 [ 29.532482] kunit_try_run_case+0x170/0x3f0 [ 29.532528] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.532576] kthread+0x328/0x630 [ 29.532616] ret_from_fork+0x10/0x20 [ 29.532663] [ 29.532681] Allocated by task 195: [ 29.532709] kasan_save_stack+0x3c/0x68 [ 29.532750] kasan_save_track+0x20/0x40 [ 29.532787] kasan_save_alloc_info+0x40/0x58 [ 29.532843] __kasan_kmalloc+0xd4/0xd8 [ 29.532880] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.532918] krealloc_uaf+0xc8/0x520 [ 29.533008] kunit_try_run_case+0x170/0x3f0 [ 29.533058] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.533098] kthread+0x328/0x630 [ 29.533131] ret_from_fork+0x10/0x20 [ 29.533166] [ 29.533199] Freed by task 195: [ 29.533247] kasan_save_stack+0x3c/0x68 [ 29.533285] kasan_save_track+0x20/0x40 [ 29.533321] kasan_save_free_info+0x4c/0x78 [ 29.533357] __kasan_slab_free+0x6c/0x98 [ 29.533394] kfree+0x214/0x3c8 [ 29.533428] krealloc_uaf+0x12c/0x520 [ 29.533472] kunit_try_run_case+0x170/0x3f0 [ 29.533670] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.533712] kthread+0x328/0x630 [ 29.533744] ret_from_fork+0x10/0x20 [ 29.533796] [ 29.533918] The buggy address belongs to the object at fff00000c9688400 [ 29.533918] which belongs to the cache kmalloc-256 of size 256 [ 29.534084] The buggy address is located 0 bytes inside of [ 29.534084] freed 256-byte region [fff00000c9688400, fff00000c9688500) [ 29.534145] [ 29.534166] The buggy address belongs to the physical page: [ 29.534197] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109688 [ 29.534248] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.534294] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.534422] page_type: f5(slab) [ 29.534540] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 29.534710] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.534758] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 29.534805] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.534853] head: 0bfffe0000000001 ffffc1ffc325a201 00000000ffffffff 00000000ffffffff [ 29.534901] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 29.534940] page dumped because: kasan: bad access detected [ 29.534971] [ 29.534989] Memory state around the buggy address: [ 29.535021] fff00000c9688300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.535081] fff00000c9688380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.535121] >fff00000c9688400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.535157] ^ [ 29.535183] fff00000c9688480: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.535223] fff00000c9688500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.535260] ================================================================== [ 29.536698] ================================================================== [ 29.536748] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520 [ 29.536795] Read of size 1 at addr fff00000c9688400 by task kunit_try_catch/195 [ 29.536931] [ 29.536965] CPU: 0 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 29.537044] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.537081] Hardware name: linux,dummy-virt (DT) [ 29.537110] Call trace: [ 29.537131] show_stack+0x20/0x38 (C) [ 29.537187] dump_stack_lvl+0x8c/0xd0 [ 29.537233] print_report+0x118/0x5d0 [ 29.537275] kasan_report+0xdc/0x128 [ 29.537316] __asan_report_load1_noabort+0x20/0x30 [ 29.537362] krealloc_uaf+0x4c8/0x520 [ 29.537407] kunit_try_run_case+0x170/0x3f0 [ 29.537453] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.537571] kthread+0x328/0x630 [ 29.537694] ret_from_fork+0x10/0x20 [ 29.537742] [ 29.537759] Allocated by task 195: [ 29.537791] kasan_save_stack+0x3c/0x68 [ 29.537864] kasan_save_track+0x20/0x40 [ 29.537901] kasan_save_alloc_info+0x40/0x58 [ 29.537936] __kasan_kmalloc+0xd4/0xd8 [ 29.537972] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.538011] krealloc_uaf+0xc8/0x520 [ 29.538045] kunit_try_run_case+0x170/0x3f0 [ 29.538091] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.538129] kthread+0x328/0x630 [ 29.538160] ret_from_fork+0x10/0x20 [ 29.538263] [ 29.538349] Freed by task 195: [ 29.538470] kasan_save_stack+0x3c/0x68 [ 29.538552] kasan_save_track+0x20/0x40 [ 29.538589] kasan_save_free_info+0x4c/0x78 [ 29.538624] __kasan_slab_free+0x6c/0x98 [ 29.538660] kfree+0x214/0x3c8 [ 29.538692] krealloc_uaf+0x12c/0x520 [ 29.538726] kunit_try_run_case+0x170/0x3f0 [ 29.538763] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.538808] kthread+0x328/0x630 [ 29.538957] ret_from_fork+0x10/0x20 [ 29.539080] [ 29.539097] The buggy address belongs to the object at fff00000c9688400 [ 29.539097] which belongs to the cache kmalloc-256 of size 256 [ 29.539153] The buggy address is located 0 bytes inside of [ 29.539153] freed 256-byte region [fff00000c9688400, fff00000c9688500) [ 29.539210] [ 29.539229] The buggy address belongs to the physical page: [ 29.539259] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109688 [ 29.539309] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.539354] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.539439] page_type: f5(slab) [ 29.539670] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 29.539720] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.539769] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 29.539816] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.539863] head: 0bfffe0000000001 ffffc1ffc325a201 00000000ffffffff 00000000ffffffff [ 29.539910] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 29.539948] page dumped because: kasan: bad access detected [ 29.539986] [ 29.540004] Memory state around the buggy address: [ 29.540034] fff00000c9688300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.540084] fff00000c9688380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.540125] >fff00000c9688400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.540183] ^ [ 29.540210] fff00000c9688480: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.540250] fff00000c9688500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.540302] ==================================================================
[ 24.200597] ================================================================== [ 24.201087] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x53c/0x5e0 [ 24.201350] Read of size 1 at addr ffff888103d99800 by task kunit_try_catch/213 [ 24.201668] [ 24.201789] CPU: 0 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) [ 24.201840] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 24.201853] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.201876] Call Trace: [ 24.201888] <TASK> [ 24.201906] dump_stack_lvl+0x73/0xb0 [ 24.201938] print_report+0xd1/0x610 [ 24.202004] ? __virt_addr_valid+0x1db/0x2d0 [ 24.202027] ? krealloc_uaf+0x53c/0x5e0 [ 24.202054] ? kasan_complete_mode_report_info+0x64/0x200 [ 24.202078] ? krealloc_uaf+0x53c/0x5e0 [ 24.202099] kasan_report+0x141/0x180 [ 24.202120] ? krealloc_uaf+0x53c/0x5e0 [ 24.202144] __asan_report_load1_noabort+0x18/0x20 [ 24.202167] krealloc_uaf+0x53c/0x5e0 [ 24.202188] ? __pfx_krealloc_uaf+0x10/0x10 [ 24.202208] ? finish_task_switch.isra.0+0x153/0x700 [ 24.202230] ? __switch_to+0x47/0xf80 [ 24.202256] ? __schedule+0x10cc/0x2b60 [ 24.202279] ? __pfx_read_tsc+0x10/0x10 [ 24.202301] ? ktime_get_ts64+0x86/0x230 [ 24.202325] kunit_try_run_case+0x1a5/0x480 [ 24.202348] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.202367] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.202390] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.202596] ? __kthread_parkme+0x82/0x180 [ 24.202624] ? preempt_count_sub+0x50/0x80 [ 24.202646] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.202683] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.202708] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.202732] kthread+0x337/0x6f0 [ 24.202761] ? trace_preempt_on+0x20/0xc0 [ 24.202785] ? __pfx_kthread+0x10/0x10 [ 24.202805] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.202826] ? calculate_sigpending+0x7b/0xa0 [ 24.202849] ? __pfx_kthread+0x10/0x10 [ 24.202870] ret_from_fork+0x116/0x1d0 [ 24.202888] ? __pfx_kthread+0x10/0x10 [ 24.202908] ret_from_fork_asm+0x1a/0x30 [ 24.202938] </TASK> [ 24.202998] [ 24.213679] Allocated by task 213: [ 24.214305] kasan_save_stack+0x45/0x70 [ 24.214501] kasan_save_track+0x18/0x40 [ 24.214848] kasan_save_alloc_info+0x3b/0x50 [ 24.215227] __kasan_kmalloc+0xb7/0xc0 [ 24.215613] __kmalloc_cache_noprof+0x189/0x420 [ 24.216075] krealloc_uaf+0xbb/0x5e0 [ 24.216274] kunit_try_run_case+0x1a5/0x480 [ 24.216481] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.216738] kthread+0x337/0x6f0 [ 24.216909] ret_from_fork+0x116/0x1d0 [ 24.217175] ret_from_fork_asm+0x1a/0x30 [ 24.217382] [ 24.217464] Freed by task 213: [ 24.217601] kasan_save_stack+0x45/0x70 [ 24.218236] kasan_save_track+0x18/0x40 [ 24.218416] kasan_save_free_info+0x3f/0x60 [ 24.218744] __kasan_slab_free+0x56/0x70 [ 24.218915] kfree+0x222/0x3f0 [ 24.219195] krealloc_uaf+0x13d/0x5e0 [ 24.219332] kunit_try_run_case+0x1a5/0x480 [ 24.219619] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.220214] kthread+0x337/0x6f0 [ 24.220370] ret_from_fork+0x116/0x1d0 [ 24.220803] ret_from_fork_asm+0x1a/0x30 [ 24.220984] [ 24.221174] The buggy address belongs to the object at ffff888103d99800 [ 24.221174] which belongs to the cache kmalloc-256 of size 256 [ 24.221668] The buggy address is located 0 bytes inside of [ 24.221668] freed 256-byte region [ffff888103d99800, ffff888103d99900) [ 24.222469] [ 24.222667] The buggy address belongs to the physical page: [ 24.223192] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d98 [ 24.223487] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.224130] flags: 0x200000000000040(head|node=0|zone=2) [ 24.224524] page_type: f5(slab) [ 24.224708] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 24.225177] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.225601] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 24.226140] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.226594] head: 0200000000000001 ffffea00040f6601 00000000ffffffff 00000000ffffffff [ 24.226963] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 24.227203] page dumped because: kasan: bad access detected [ 24.227453] [ 24.227547] Memory state around the buggy address: [ 24.227747] ffff888103d99700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.228413] ffff888103d99780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.228958] >ffff888103d99800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.229425] ^ [ 24.229578] ffff888103d99880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.229937] ffff888103d99900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.230478] ================================================================== [ 24.165175] ================================================================== [ 24.166330] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x1b8/0x5e0 [ 24.167382] Read of size 1 at addr ffff888103d99800 by task kunit_try_catch/213 [ 24.167633] [ 24.167962] CPU: 0 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) [ 24.168197] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 24.168211] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.168236] Call Trace: [ 24.168250] <TASK> [ 24.168272] dump_stack_lvl+0x73/0xb0 [ 24.168314] print_report+0xd1/0x610 [ 24.168338] ? __virt_addr_valid+0x1db/0x2d0 [ 24.168363] ? krealloc_uaf+0x1b8/0x5e0 [ 24.168383] ? kasan_complete_mode_report_info+0x64/0x200 [ 24.168408] ? krealloc_uaf+0x1b8/0x5e0 [ 24.168429] kasan_report+0x141/0x180 [ 24.168449] ? krealloc_uaf+0x1b8/0x5e0 [ 24.168472] ? krealloc_uaf+0x1b8/0x5e0 [ 24.168492] __kasan_check_byte+0x3d/0x50 [ 24.168513] krealloc_noprof+0x3f/0x340 [ 24.168540] krealloc_uaf+0x1b8/0x5e0 [ 24.168560] ? __pfx_krealloc_uaf+0x10/0x10 [ 24.168580] ? finish_task_switch.isra.0+0x153/0x700 [ 24.168602] ? __switch_to+0x47/0xf80 [ 24.168628] ? __schedule+0x10cc/0x2b60 [ 24.168651] ? __pfx_read_tsc+0x10/0x10 [ 24.168686] ? ktime_get_ts64+0x86/0x230 [ 24.168711] kunit_try_run_case+0x1a5/0x480 [ 24.168742] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.168762] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.168784] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.168807] ? __kthread_parkme+0x82/0x180 [ 24.168827] ? preempt_count_sub+0x50/0x80 [ 24.168849] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.168870] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.168894] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.168918] kthread+0x337/0x6f0 [ 24.168937] ? trace_preempt_on+0x20/0xc0 [ 24.168961] ? __pfx_kthread+0x10/0x10 [ 24.168981] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.169002] ? calculate_sigpending+0x7b/0xa0 [ 24.169026] ? __pfx_kthread+0x10/0x10 [ 24.169047] ret_from_fork+0x116/0x1d0 [ 24.169065] ? __pfx_kthread+0x10/0x10 [ 24.169085] ret_from_fork_asm+0x1a/0x30 [ 24.169116] </TASK> [ 24.169127] [ 24.181617] Allocated by task 213: [ 24.182409] kasan_save_stack+0x45/0x70 [ 24.182601] kasan_save_track+0x18/0x40 [ 24.182925] kasan_save_alloc_info+0x3b/0x50 [ 24.183267] __kasan_kmalloc+0xb7/0xc0 [ 24.183438] __kmalloc_cache_noprof+0x189/0x420 [ 24.183645] krealloc_uaf+0xbb/0x5e0 [ 24.184183] kunit_try_run_case+0x1a5/0x480 [ 24.184367] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.184767] kthread+0x337/0x6f0 [ 24.185111] ret_from_fork+0x116/0x1d0 [ 24.185447] ret_from_fork_asm+0x1a/0x30 [ 24.185646] [ 24.185932] Freed by task 213: [ 24.186297] kasan_save_stack+0x45/0x70 [ 24.186487] kasan_save_track+0x18/0x40 [ 24.186679] kasan_save_free_info+0x3f/0x60 [ 24.187115] __kasan_slab_free+0x56/0x70 [ 24.187284] kfree+0x222/0x3f0 [ 24.187409] krealloc_uaf+0x13d/0x5e0 [ 24.187861] kunit_try_run_case+0x1a5/0x480 [ 24.188249] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.188441] kthread+0x337/0x6f0 [ 24.188612] ret_from_fork+0x116/0x1d0 [ 24.188793] ret_from_fork_asm+0x1a/0x30 [ 24.189271] [ 24.189345] The buggy address belongs to the object at ffff888103d99800 [ 24.189345] which belongs to the cache kmalloc-256 of size 256 [ 24.190547] The buggy address is located 0 bytes inside of [ 24.190547] freed 256-byte region [ffff888103d99800, ffff888103d99900) [ 24.191295] [ 24.191376] The buggy address belongs to the physical page: [ 24.191764] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d98 [ 24.192271] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.192617] flags: 0x200000000000040(head|node=0|zone=2) [ 24.193130] page_type: f5(slab) [ 24.193279] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 24.193631] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.194349] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 24.194753] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.195222] head: 0200000000000001 ffffea00040f6601 00000000ffffffff 00000000ffffffff [ 24.195558] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 24.196096] page dumped because: kasan: bad access detected [ 24.196409] [ 24.196503] Memory state around the buggy address: [ 24.196860] ffff888103d99700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.197363] ffff888103d99780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.197708] >ffff888103d99800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.198397] ^ [ 24.198573] ffff888103d99880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.199166] ffff888103d99900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.199525] ==================================================================