Hay
Date
July 15, 2025, 11:35 a.m.

Environment
e850-96
qemu-arm64
qemu-x86_64

[   42.831204] ==================================================================
[   42.841133] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520
[   42.847723] Read of size 1 at addr ffff000805058400 by task kunit_try_catch/245
[   42.855013] 
[   42.856500] CPU: 3 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   42.856555] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.856570] Hardware name: WinLink E850-96 board (DT)
[   42.856591] Call trace:
[   42.856605]  show_stack+0x20/0x38 (C)
[   42.856641]  dump_stack_lvl+0x8c/0xd0
[   42.856676]  print_report+0x118/0x5d0
[   42.856702]  kasan_report+0xdc/0x128
[   42.856726]  __kasan_check_byte+0x54/0x70
[   42.856752]  krealloc_noprof+0x44/0x360
[   42.856785]  krealloc_uaf+0x180/0x520
[   42.856817]  kunit_try_run_case+0x170/0x3f0
[   42.856846]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.856880]  kthread+0x328/0x630
[   42.856907]  ret_from_fork+0x10/0x20
[   42.856942] 
[   42.923069] Allocated by task 245:
[   42.926457]  kasan_save_stack+0x3c/0x68
[   42.930273]  kasan_save_track+0x20/0x40
[   42.934093]  kasan_save_alloc_info+0x40/0x58
[   42.938346]  __kasan_kmalloc+0xd4/0xd8
[   42.942079]  __kmalloc_cache_noprof+0x16c/0x3c0
[   42.946592]  krealloc_uaf+0xc8/0x520
[   42.950151]  kunit_try_run_case+0x170/0x3f0
[   42.954318]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.959786]  kthread+0x328/0x630
[   42.962998]  ret_from_fork+0x10/0x20
[   42.966557] 
[   42.968034] Freed by task 245:
[   42.971073]  kasan_save_stack+0x3c/0x68
[   42.974890]  kasan_save_track+0x20/0x40
[   42.978710]  kasan_save_free_info+0x4c/0x78
[   42.982876]  __kasan_slab_free+0x6c/0x98
[   42.986784]  kfree+0x214/0x3c8
[   42.989821]  krealloc_uaf+0x12c/0x520
[   42.993467]  kunit_try_run_case+0x170/0x3f0
[   42.997633]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.003102]  kthread+0x328/0x630
[   43.006313]  ret_from_fork+0x10/0x20
[   43.009873] 
[   43.011350] The buggy address belongs to the object at ffff000805058400
[   43.011350]  which belongs to the cache kmalloc-256 of size 256
[   43.023851] The buggy address is located 0 bytes inside of
[   43.023851]  freed 256-byte region [ffff000805058400, ffff000805058500)
[   43.035913] 
[   43.037392] The buggy address belongs to the physical page:
[   43.042949] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885058
[   43.050933] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   43.058573] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   43.065515] page_type: f5(slab)
[   43.068653] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   43.076371] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   43.084099] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   43.091909] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   43.099722] head: 0bfffe0000000002 fffffdffe0141601 00000000ffffffff 00000000ffffffff
[   43.107534] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   43.115342] page dumped because: kasan: bad access detected
[   43.120895] 
[   43.122370] Memory state around the buggy address:
[   43.127151]  ffff000805058300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.134355]  ffff000805058380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.141558] >ffff000805058400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   43.148759]                    ^
[   43.151975]  ffff000805058480: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   43.159179]  ffff000805058500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.166382] ==================================================================
[   43.173919] ==================================================================
[   43.180797] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520
[   43.187388] Read of size 1 at addr ffff000805058400 by task kunit_try_catch/245
[   43.194679] 
[   43.196165] CPU: 3 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   43.196218] Tainted: [B]=BAD_PAGE, [N]=TEST
[   43.196234] Hardware name: WinLink E850-96 board (DT)
[   43.196254] Call trace:
[   43.196266]  show_stack+0x20/0x38 (C)
[   43.196298]  dump_stack_lvl+0x8c/0xd0
[   43.196332]  print_report+0x118/0x5d0
[   43.196361]  kasan_report+0xdc/0x128
[   43.196386]  __asan_report_load1_noabort+0x20/0x30
[   43.196415]  krealloc_uaf+0x4c8/0x520
[   43.196446]  kunit_try_run_case+0x170/0x3f0
[   43.196475]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.196507]  kthread+0x328/0x630
[   43.196535]  ret_from_fork+0x10/0x20
[   43.196565] 
[   43.259696] Allocated by task 245:
[   43.263084]  kasan_save_stack+0x3c/0x68
[   43.266900]  kasan_save_track+0x20/0x40
[   43.270719]  kasan_save_alloc_info+0x40/0x58
[   43.274973]  __kasan_kmalloc+0xd4/0xd8
[   43.278705]  __kmalloc_cache_noprof+0x16c/0x3c0
[   43.283220]  krealloc_uaf+0xc8/0x520
[   43.286778]  kunit_try_run_case+0x170/0x3f0
[   43.290945]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.296413]  kthread+0x328/0x630
[   43.299625]  ret_from_fork+0x10/0x20
[   43.303184] 
[   43.304659] Freed by task 245:
[   43.307699]  kasan_save_stack+0x3c/0x68
[   43.311517]  kasan_save_track+0x20/0x40
[   43.315337]  kasan_save_free_info+0x4c/0x78
[   43.319503]  __kasan_slab_free+0x6c/0x98
[   43.323409]  kfree+0x214/0x3c8
[   43.326448]  krealloc_uaf+0x12c/0x520
[   43.330093]  kunit_try_run_case+0x170/0x3f0
[   43.334260]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.339729]  kthread+0x328/0x630
[   43.342940]  ret_from_fork+0x10/0x20
[   43.346500] 
[   43.347976] The buggy address belongs to the object at ffff000805058400
[   43.347976]  which belongs to the cache kmalloc-256 of size 256
[   43.360477] The buggy address is located 0 bytes inside of
[   43.360477]  freed 256-byte region [ffff000805058400, ffff000805058500)
[   43.372540] 
[   43.374020] The buggy address belongs to the physical page:
[   43.379575] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885058
[   43.387559] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   43.395199] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   43.402141] page_type: f5(slab)
[   43.405279] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   43.412998] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   43.420726] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   43.428536] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   43.436349] head: 0bfffe0000000002 fffffdffe0141601 00000000ffffffff 00000000ffffffff
[   43.444161] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   43.451969] page dumped because: kasan: bad access detected
[   43.457521] 
[   43.458997] Memory state around the buggy address:
[   43.463780]  ffff000805058300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.470980]  ffff000805058380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.478185] >ffff000805058400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   43.485387]                    ^
[   43.488602]  ffff000805058480: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   43.495806]  ffff000805058500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.503007] ==================================================================

[   30.538916] ==================================================================
[   30.538978] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520
[   30.539224] Read of size 1 at addr fff00000c792ec00 by task kunit_try_catch/196
[   30.539348] 
[   30.539402] CPU: 0 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   30.539524] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.539550] Hardware name: linux,dummy-virt (DT)
[   30.539579] Call trace:
[   30.539613]  show_stack+0x20/0x38 (C)
[   30.539662]  dump_stack_lvl+0x8c/0xd0
[   30.539780]  print_report+0x118/0x5d0
[   30.539827]  kasan_report+0xdc/0x128
[   30.539992]  __kasan_check_byte+0x54/0x70
[   30.540045]  krealloc_noprof+0x44/0x360
[   30.540092]  krealloc_uaf+0x180/0x520
[   30.540174]  kunit_try_run_case+0x170/0x3f0
[   30.540239]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.540306]  kthread+0x328/0x630
[   30.540368]  ret_from_fork+0x10/0x20
[   30.540417] 
[   30.540447] Allocated by task 196:
[   30.540474]  kasan_save_stack+0x3c/0x68
[   30.540534]  kasan_save_track+0x20/0x40
[   30.540643]  kasan_save_alloc_info+0x40/0x58
[   30.540757]  __kasan_kmalloc+0xd4/0xd8
[   30.540823]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.540866]  krealloc_uaf+0xc8/0x520
[   30.540949]  kunit_try_run_case+0x170/0x3f0
[   30.540985]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.541064]  kthread+0x328/0x630
[   30.541097]  ret_from_fork+0x10/0x20
[   30.541138] 
[   30.541165] Freed by task 196:
[   30.541191]  kasan_save_stack+0x3c/0x68
[   30.541265]  kasan_save_track+0x20/0x40
[   30.541489]  kasan_save_free_info+0x4c/0x78
[   30.541540]  __kasan_slab_free+0x6c/0x98
[   30.541579]  kfree+0x214/0x3c8
[   30.541613]  krealloc_uaf+0x12c/0x520
[   30.541771]  kunit_try_run_case+0x170/0x3f0
[   30.541897]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.541940]  kthread+0x328/0x630
[   30.541999]  ret_from_fork+0x10/0x20
[   30.542035] 
[   30.542056] The buggy address belongs to the object at fff00000c792ec00
[   30.542056]  which belongs to the cache kmalloc-256 of size 256
[   30.542466] The buggy address is located 0 bytes inside of
[   30.542466]  freed 256-byte region [fff00000c792ec00, fff00000c792ed00)
[   30.542642] 
[   30.542727] The buggy address belongs to the physical page:
[   30.542795] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xfff00000c792e600 pfn:0x10792e
[   30.542899] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.542964] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.543012] page_type: f5(slab)
[   30.543420] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.543519] raw: fff00000c792e600 000000008010000f 00000000f5000000 0000000000000000
[   30.543612] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.543660] head: fff00000c792e600 000000008010000f 00000000f5000000 0000000000000000
[   30.543958] head: 0bfffe0000000001 ffffc1ffc31e4b81 00000000ffffffff 00000000ffffffff
[   30.544057] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   30.544172] page dumped because: kasan: bad access detected
[   30.544264] 
[   30.544301] Memory state around the buggy address:
[   30.544332]  fff00000c792eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.544383]  fff00000c792eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.544608] >fff00000c792ec00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.544688]                    ^
[   30.544716]  fff00000c792ec80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.544985]  fff00000c792ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.545070] ==================================================================
[   30.546202] ==================================================================
[   30.546249] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520
[   30.546297] Read of size 1 at addr fff00000c792ec00 by task kunit_try_catch/196
[   30.546344] 
[   30.546558] CPU: 0 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   30.546663] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.546689] Hardware name: linux,dummy-virt (DT)
[   30.546719] Call trace:
[   30.546762]  show_stack+0x20/0x38 (C)
[   30.546849]  dump_stack_lvl+0x8c/0xd0
[   30.546896]  print_report+0x118/0x5d0
[   30.546940]  kasan_report+0xdc/0x128
[   30.547168]  __asan_report_load1_noabort+0x20/0x30
[   30.547244]  krealloc_uaf+0x4c8/0x520
[   30.547291]  kunit_try_run_case+0x170/0x3f0
[   30.547345]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.547397]  kthread+0x328/0x630
[   30.547450]  ret_from_fork+0x10/0x20
[   30.547497] 
[   30.547522] Allocated by task 196:
[   30.547550]  kasan_save_stack+0x3c/0x68
[   30.547599]  kasan_save_track+0x20/0x40
[   30.547637]  kasan_save_alloc_info+0x40/0x58
[   30.547673]  __kasan_kmalloc+0xd4/0xd8
[   30.547738]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.547932]  krealloc_uaf+0xc8/0x520
[   30.547974]  kunit_try_run_case+0x170/0x3f0
[   30.548074]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.548140]  kthread+0x328/0x630
[   30.548206]  ret_from_fork+0x10/0x20
[   30.548247] 
[   30.548333] Freed by task 196:
[   30.548425]  kasan_save_stack+0x3c/0x68
[   30.548474]  kasan_save_track+0x20/0x40
[   30.548511]  kasan_save_free_info+0x4c/0x78
[   30.548547]  __kasan_slab_free+0x6c/0x98
[   30.548584]  kfree+0x214/0x3c8
[   30.548616]  krealloc_uaf+0x12c/0x520
[   30.548652]  kunit_try_run_case+0x170/0x3f0
[   30.548686]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.549022]  kthread+0x328/0x630
[   30.549160]  ret_from_fork+0x10/0x20
[   30.549196] 
[   30.549215] The buggy address belongs to the object at fff00000c792ec00
[   30.549215]  which belongs to the cache kmalloc-256 of size 256
[   30.549270] The buggy address is located 0 bytes inside of
[   30.549270]  freed 256-byte region [fff00000c792ec00, fff00000c792ed00)
[   30.549556] 
[   30.549653] The buggy address belongs to the physical page:
[   30.549731] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xfff00000c792e600 pfn:0x10792e
[   30.549834] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.549916] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.550011] page_type: f5(slab)
[   30.550087] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.550135] raw: fff00000c792e600 000000008010000f 00000000f5000000 0000000000000000
[   30.550182] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.550459] head: fff00000c792e600 000000008010000f 00000000f5000000 0000000000000000
[   30.550606] head: 0bfffe0000000001 ffffc1ffc31e4b81 00000000ffffffff 00000000ffffffff
[   30.550712] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   30.550830] page dumped because: kasan: bad access detected
[   30.550894] 
[   30.550911] Memory state around the buggy address:
[   30.550941]  fff00000c792eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.550982]  fff00000c792eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.551021] >fff00000c792ec00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.551255]                    ^
[   30.551334]  fff00000c792ec80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.551414]  fff00000c792ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.551555] ==================================================================

[   24.013564] ==================================================================
[   24.014103] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x53c/0x5e0
[   24.014372] Read of size 1 at addr ffff8881009a8e00 by task kunit_try_catch/212
[   24.014789] 
[   24.014881] CPU: 1 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) 
[   24.014930] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.014941] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.014962] Call Trace:
[   24.014975]  <TASK>
[   24.014994]  dump_stack_lvl+0x73/0xb0
[   24.015033]  print_report+0xd1/0x610
[   24.015055]  ? __virt_addr_valid+0x1db/0x2d0
[   24.015079]  ? krealloc_uaf+0x53c/0x5e0
[   24.015099]  ? kasan_complete_mode_report_info+0x64/0x200
[   24.015125]  ? krealloc_uaf+0x53c/0x5e0
[   24.015146]  kasan_report+0x141/0x180
[   24.015167]  ? krealloc_uaf+0x53c/0x5e0
[   24.015194]  __asan_report_load1_noabort+0x18/0x20
[   24.015218]  krealloc_uaf+0x53c/0x5e0
[   24.015239]  ? __pfx_krealloc_uaf+0x10/0x10
[   24.015259]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   24.015288]  ? __pfx_krealloc_uaf+0x10/0x10
[   24.015314]  kunit_try_run_case+0x1a5/0x480
[   24.015336]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.015357]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.015379]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.015401]  ? __kthread_parkme+0x82/0x180
[   24.015421]  ? preempt_count_sub+0x50/0x80
[   24.015444]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.015467]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.015492]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.015530]  kthread+0x337/0x6f0
[   24.015550]  ? trace_preempt_on+0x20/0xc0
[   24.015573]  ? __pfx_kthread+0x10/0x10
[   24.015594]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.015618]  ? calculate_sigpending+0x7b/0xa0
[   24.015643]  ? __pfx_kthread+0x10/0x10
[   24.015664]  ret_from_fork+0x116/0x1d0
[   24.015684]  ? __pfx_kthread+0x10/0x10
[   24.015704]  ret_from_fork_asm+0x1a/0x30
[   24.015736]  </TASK>
[   24.015747] 
[   24.022350] Allocated by task 212:
[   24.022478]  kasan_save_stack+0x45/0x70
[   24.022806]  kasan_save_track+0x18/0x40
[   24.023018]  kasan_save_alloc_info+0x3b/0x50
[   24.023224]  __kasan_kmalloc+0xb7/0xc0
[   24.023392]  __kmalloc_cache_noprof+0x189/0x420
[   24.023593]  krealloc_uaf+0xbb/0x5e0
[   24.023785]  kunit_try_run_case+0x1a5/0x480
[   24.023926]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.024096]  kthread+0x337/0x6f0
[   24.024211]  ret_from_fork+0x116/0x1d0
[   24.024379]  ret_from_fork_asm+0x1a/0x30
[   24.024835] 
[   24.024993] Freed by task 212:
[   24.025304]  kasan_save_stack+0x45/0x70
[   24.025497]  kasan_save_track+0x18/0x40
[   24.025857]  kasan_save_free_info+0x3f/0x60
[   24.026122]  __kasan_slab_free+0x56/0x70
[   24.026313]  kfree+0x222/0x3f0
[   24.026453]  krealloc_uaf+0x13d/0x5e0
[   24.026691]  kunit_try_run_case+0x1a5/0x480
[   24.026870]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.027056]  kthread+0x337/0x6f0
[   24.027169]  ret_from_fork+0x116/0x1d0
[   24.027294]  ret_from_fork_asm+0x1a/0x30
[   24.027427] 
[   24.027513] The buggy address belongs to the object at ffff8881009a8e00
[   24.027513]  which belongs to the cache kmalloc-256 of size 256
[   24.028395] The buggy address is located 0 bytes inside of
[   24.028395]  freed 256-byte region [ffff8881009a8e00, ffff8881009a8f00)
[   24.029250] 
[   24.029333] The buggy address belongs to the physical page:
[   24.029548] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1009a8
[   24.029786] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   24.030152] anon flags: 0x200000000000040(head|node=0|zone=2)
[   24.030422] page_type: f5(slab)
[   24.030601] raw: 0200000000000040 ffff888100041b40 0000000000000000 dead000000000001
[   24.030963] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.031262] head: 0200000000000040 ffff888100041b40 0000000000000000 dead000000000001
[   24.031527] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.031900] head: 0200000000000001 ffffea0004026a01 00000000ffffffff 00000000ffffffff
[   24.032273] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   24.032679] page dumped because: kasan: bad access detected
[   24.032847] 
[   24.032909] Memory state around the buggy address:
[   24.033056]  ffff8881009a8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.033352]  ffff8881009a8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.033808] >ffff8881009a8e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.034109]                    ^
[   24.034263]  ffff8881009a8e80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.034477]  ffff8881009a8f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.034689] ==================================================================
[   23.990864] ==================================================================
[   23.991403] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x1b8/0x5e0
[   23.992017] Read of size 1 at addr ffff8881009a8e00 by task kunit_try_catch/212
[   23.992316] 
[   23.992416] CPU: 1 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) 
[   23.992464] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.992476] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.992496] Call Trace:
[   23.992509]  <TASK>
[   23.992539]  dump_stack_lvl+0x73/0xb0
[   23.992569]  print_report+0xd1/0x610
[   23.992945]  ? __virt_addr_valid+0x1db/0x2d0
[   23.992970]  ? krealloc_uaf+0x1b8/0x5e0
[   23.992990]  ? kasan_complete_mode_report_info+0x64/0x200
[   23.993016]  ? krealloc_uaf+0x1b8/0x5e0
[   23.993038]  kasan_report+0x141/0x180
[   23.993059]  ? krealloc_uaf+0x1b8/0x5e0
[   23.993083]  ? krealloc_uaf+0x1b8/0x5e0
[   23.993104]  __kasan_check_byte+0x3d/0x50
[   23.993126]  krealloc_noprof+0x3f/0x340
[   23.993153]  krealloc_uaf+0x1b8/0x5e0
[   23.993174]  ? __pfx_krealloc_uaf+0x10/0x10
[   23.993194]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   23.993224]  ? __pfx_krealloc_uaf+0x10/0x10
[   23.993250]  kunit_try_run_case+0x1a5/0x480
[   23.993273]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.993294]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.993316]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.993337]  ? __kthread_parkme+0x82/0x180
[   23.993357]  ? preempt_count_sub+0x50/0x80
[   23.993381]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.993403]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.993429]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.993455]  kthread+0x337/0x6f0
[   23.993474]  ? trace_preempt_on+0x20/0xc0
[   23.993497]  ? __pfx_kthread+0x10/0x10
[   23.993531]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.993556]  ? calculate_sigpending+0x7b/0xa0
[   23.993637]  ? __pfx_kthread+0x10/0x10
[   23.993661]  ret_from_fork+0x116/0x1d0
[   23.993680]  ? __pfx_kthread+0x10/0x10
[   23.993700]  ret_from_fork_asm+0x1a/0x30
[   23.993732]  </TASK>
[   23.993743] 
[   24.000965] Allocated by task 212:
[   24.001305]  kasan_save_stack+0x45/0x70
[   24.001500]  kasan_save_track+0x18/0x40
[   24.001677]  kasan_save_alloc_info+0x3b/0x50
[   24.001950]  __kasan_kmalloc+0xb7/0xc0
[   24.002083]  __kmalloc_cache_noprof+0x189/0x420
[   24.002231]  krealloc_uaf+0xbb/0x5e0
[   24.002392]  kunit_try_run_case+0x1a5/0x480
[   24.002626]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.002893]  kthread+0x337/0x6f0
[   24.003056]  ret_from_fork+0x116/0x1d0
[   24.003233]  ret_from_fork_asm+0x1a/0x30
[   24.003418] 
[   24.003482] Freed by task 212:
[   24.003596]  kasan_save_stack+0x45/0x70
[   24.003726]  kasan_save_track+0x18/0x40
[   24.003854]  kasan_save_free_info+0x3f/0x60
[   24.004025]  __kasan_slab_free+0x56/0x70
[   24.004211]  kfree+0x222/0x3f0
[   24.004374]  krealloc_uaf+0x13d/0x5e0
[   24.004730]  kunit_try_run_case+0x1a5/0x480
[   24.004932]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.005149]  kthread+0x337/0x6f0
[   24.005298]  ret_from_fork+0x116/0x1d0
[   24.005465]  ret_from_fork_asm+0x1a/0x30
[   24.005725] 
[   24.005797] The buggy address belongs to the object at ffff8881009a8e00
[   24.005797]  which belongs to the cache kmalloc-256 of size 256
[   24.006344] The buggy address is located 0 bytes inside of
[   24.006344]  freed 256-byte region [ffff8881009a8e00, ffff8881009a8f00)
[   24.006918] 
[   24.007016] The buggy address belongs to the physical page:
[   24.007234] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1009a8
[   24.007555] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   24.007940] anon flags: 0x200000000000040(head|node=0|zone=2)
[   24.008130] page_type: f5(slab)
[   24.008247] raw: 0200000000000040 ffff888100041b40 0000000000000000 dead000000000001
[   24.008531] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.008862] head: 0200000000000040 ffff888100041b40 0000000000000000 dead000000000001
[   24.009548] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.010073] head: 0200000000000001 ffffea0004026a01 00000000ffffffff 00000000ffffffff
[   24.010302] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   24.010532] page dumped because: kasan: bad access detected
[   24.010696] 
[   24.010791] Memory state around the buggy address:
[   24.011011]  ffff8881009a8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.011330]  ffff8881009a8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.011724] >ffff8881009a8e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.012041]                    ^
[   24.012203]  ffff8881009a8e80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.012527]  ffff8881009a8f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.012884] ==================================================================