Hay
Date
July 15, 2025, 2:10 p.m.

Environment
qemu-arm64
qemu-x86_64

[  105.509978] ==================================================================
[  105.510575] BUG: KASAN: use-after-free in krealloc_uaf+0x10c/0x2f0
[  105.511197] Read of size 1 at addr ffff0000c6260800 by task kunit_try_catch/217
[  105.513397] 
[  105.513642] CPU: 0 PID: 217 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[  105.514385] Hardware name: linux,dummy-virt (DT)
[  105.514807] Call trace:
[  105.515099]  dump_backtrace+0xe0/0x134
[  105.515531]  show_stack+0x20/0x2c
[  105.515943]  dump_stack_lvl+0x88/0xb4
[  105.516384]  print_report+0x158/0x44c
[  105.516808]  kasan_report+0xc8/0x180
[  105.517256]  __asan_load1+0x68/0x74
[  105.517674]  krealloc_uaf+0x10c/0x2f0
[  105.518994]  kunit_try_run_case+0x8c/0x124
[  105.519489]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  105.520048]  kthread+0x15c/0x170
[  105.520851]  ret_from_fork+0x10/0x20
[  105.521293] 
[  105.521518] Allocated by task 217:
[  105.521853]  kasan_save_stack+0x3c/0x70
[  105.522346]  kasan_set_track+0x2c/0x40
[  105.522790]  kasan_save_alloc_info+0x24/0x34
[  105.523259]  __kasan_kmalloc+0xd4/0xe0
[  105.523704]  kmalloc_trace+0x8c/0x150
[  105.524181]  krealloc_uaf+0xb0/0x2f0
[  105.525457]  kunit_try_run_case+0x8c/0x124
[  105.525943]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  105.526494]  kthread+0x15c/0x170
[  105.526884]  ret_from_fork+0x10/0x20
[  105.527336] 
[  105.527526] Freed by task 217:
[  105.527867]  kasan_save_stack+0x3c/0x70
[  105.528332]  kasan_set_track+0x2c/0x40
[  105.528943]  kasan_save_free_info+0x38/0x5c
[  105.529416]  __kasan_slab_free+0x100/0x170
[  105.529894]  slab_free_freelist_hook+0xd8/0x1c0
[  105.530366]  __kmem_cache_free+0x15c/0x2a0
[  105.530985]  kfree+0x88/0x150
[  105.531357]  krealloc_uaf+0xd0/0x2f0
[  105.531834]  kunit_try_run_case+0x8c/0x124
[  105.532316]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  105.533683]  kthread+0x15c/0x170
[  105.534113]  ret_from_fork+0x10/0x20
[  105.534497] 
[  105.534720] The buggy address belongs to the object at ffff0000c6260800
[  105.534720]  which belongs to the cache kmalloc-256 of size 256
[  105.535686] The buggy address is located 0 bytes inside of
[  105.535686]  256-byte region [ffff0000c6260800, ffff0000c6260900)
[  105.536959] 
[  105.537160] The buggy address belongs to the physical page:
[  105.537638] page:0000000090416edb refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106260
[  105.538422] head:0000000090416edb order:1 compound_mapcount:0 compound_pincount:0
[  105.539023] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[  105.539722] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480
[  105.540406] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  105.541041] page dumped because: kasan: bad access detected
[  105.541512] 
[  105.541699] Memory state around the buggy address:
[  105.542166]  ffff0000c6260700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  105.543602]  ffff0000c6260780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  105.544222] >ffff0000c6260800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  105.545132]                    ^
[  105.545489]  ffff0000c6260880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  105.546123]  ffff0000c6260900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  105.546727] ==================================================================
[  105.470438] ==================================================================
[  105.471397] BUG: KASAN: use-after-free in krealloc_uaf+0xe8/0x2f0
[  105.472197] Read of size 1 at addr ffff0000c6260800 by task kunit_try_catch/217
[  105.473920] 
[  105.474220] CPU: 0 PID: 217 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[  105.475236] Hardware name: linux,dummy-virt (DT)
[  105.475834] Call trace:
[  105.476209]  dump_backtrace+0xe0/0x134
[  105.477016]  show_stack+0x20/0x2c
[  105.477368]  dump_stack_lvl+0x88/0xb4
[  105.477787]  print_report+0x158/0x44c
[  105.478171]  kasan_report+0xc8/0x180
[  105.478644]  __kasan_check_byte+0x54/0x70
[  105.479137]  krealloc+0xec/0x1c0
[  105.479512]  krealloc_uaf+0xe8/0x2f0
[  105.479963]  kunit_try_run_case+0x8c/0x124
[  105.480420]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  105.480989]  kthread+0x15c/0x170
[  105.481388]  ret_from_fork+0x10/0x20
[  105.481826] 
[  105.482015] Allocated by task 217:
[  105.482336]  kasan_save_stack+0x3c/0x70
[  105.483649]  kasan_set_track+0x2c/0x40
[  105.484104]  kasan_save_alloc_info+0x24/0x34
[  105.485000]  __kasan_kmalloc+0xd4/0xe0
[  105.485428]  kmalloc_trace+0x8c/0x150
[  105.485872]  krealloc_uaf+0xb0/0x2f0
[  105.486297]  kunit_try_run_case+0x8c/0x124
[  105.486785]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  105.487321]  kthread+0x15c/0x170
[  105.487753]  ret_from_fork+0x10/0x20
[  105.488194] 
[  105.488416] Freed by task 217:
[  105.489587]  kasan_save_stack+0x3c/0x70
[  105.490046]  kasan_set_track+0x2c/0x40
[  105.490506]  kasan_save_free_info+0x38/0x5c
[  105.491012]  __kasan_slab_free+0x100/0x170
[  105.491469]  slab_free_freelist_hook+0xd8/0x1c0
[  105.491964]  __kmem_cache_free+0x15c/0x2a0
[  105.492420]  kfree+0x88/0x150
[  105.492816]  krealloc_uaf+0xd0/0x2f0
[  105.493298]  kunit_try_run_case+0x8c/0x124
[  105.494125]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  105.494695]  kthread+0x15c/0x170
[  105.495123]  ret_from_fork+0x10/0x20
[  105.495530] 
[  105.495760] The buggy address belongs to the object at ffff0000c6260800
[  105.495760]  which belongs to the cache kmalloc-256 of size 256
[  105.497486] The buggy address is located 0 bytes inside of
[  105.497486]  256-byte region [ffff0000c6260800, ffff0000c6260900)
[  105.498377] 
[  105.498614] The buggy address belongs to the physical page:
[  105.499101] page:0000000090416edb refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106260
[  105.499892] head:0000000090416edb order:1 compound_mapcount:0 compound_pincount:0
[  105.500672] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[  105.501397] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480
[  105.502087] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  105.502694] page dumped because: kasan: bad access detected
[  105.503348] 
[  105.503553] Memory state around the buggy address:
[  105.504021]  ffff0000c6260700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  105.505503]  ffff0000c6260780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  105.506126] >ffff0000c6260800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  105.506720]                    ^
[  105.507082]  ffff0000c6260880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  105.507699]  ffff0000c6260900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  105.508304] ==================================================================

[   75.268508] ==================================================================
[   75.269367] BUG: KASAN: use-after-free in krealloc_uaf+0xd0/0x21c
[   75.270019] Read of size 1 at addr ffff0000c56f1800 by task kunit_try_catch/133
[   75.270646] 
[   75.270870] CPU: 0 PID: 133 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   75.271574] Hardware name: linux,dummy-virt (DT)
[   75.272027] Call trace:
[   75.272302]  dump_backtrace+0xf8/0x118
[   75.273431]  show_stack+0x18/0x24
[   75.273909]  __dump_stack+0x28/0x38
[   75.274358]  dump_stack_lvl+0x54/0x6c
[   75.274790]  print_address_description+0x7c/0x1ec
[   75.275319]  print_report+0x50/0x68
[   75.275763]  kasan_report+0xac/0x100
[   75.276211]  __asan_load1+0x6c/0x70
[   75.276933]  krealloc_uaf+0xd0/0x21c
[   75.277376]  kunit_try_run_case+0x80/0x184
[   75.277893]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.278457]  kthread+0x16c/0x21c
[   75.278874]  ret_from_fork+0x10/0x20
[   75.279305] 
[   75.279498] Allocated by task 133:
[   75.279860]  kasan_set_track+0x4c/0x80
[   75.280329]  kasan_save_alloc_info+0x28/0x34
[   75.281356]  __kasan_kmalloc+0x88/0xa0
[   75.281851]  kmalloc_trace+0x54/0x68
[   75.282286]  krealloc_uaf+0x48/0x21c
[   75.282682]  kunit_try_run_case+0x80/0x184
[   75.283148]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.283708]  kthread+0x16c/0x21c
[   75.284144]  ret_from_fork+0x10/0x20
[   75.284558] 
[   75.285009] Freed by task 133:
[   75.285325]  kasan_set_track+0x4c/0x80
[   75.285799]  kasan_save_free_info+0x3c/0x60
[   75.286313]  ____kasan_slab_free+0xe8/0x140
[   75.286885]  __kasan_slab_free+0x18/0x28
[   75.287388]  __kmem_cache_free+0xdc/0x284
[   75.287842]  kfree+0x60/0x74
[   75.288235]  krealloc_uaf+0x90/0x21c
[   75.288929]  kunit_try_run_case+0x80/0x184
[   75.289415]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.290045]  kthread+0x16c/0x21c
[   75.290453]  ret_from_fork+0x10/0x20
[   75.291160] 
[   75.291352] The buggy address belongs to the object at ffff0000c56f1800
[   75.291352]  which belongs to the cache kmalloc-256 of size 256
[   75.292324] The buggy address is located 0 bytes inside of
[   75.292324]  256-byte region [ffff0000c56f1800, ffff0000c56f1900)
[   75.293456] 
[   75.293690] The buggy address belongs to the physical page:
[   75.294166] page:00000000b1c7ebef refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056f0
[   75.294961] head:00000000b1c7ebef order:1 compound_mapcount:0 compound_pincount:0
[   75.295596] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[   75.296320] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480
[   75.297459] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   75.298090] page dumped because: kasan: bad access detected
[   75.298563] 
[   75.298767] Memory state around the buggy address:
[   75.299199]  ffff0000c56f1700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.299834]  ffff0000c56f1780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.300463] >ffff0000c56f1800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   75.301299]                    ^
[   75.301658]  ffff0000c56f1880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   75.302284]  ffff0000c56f1900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.302894] ==================================================================
[   75.232336] ==================================================================
[   75.233840] BUG: KASAN: use-after-free in krealloc_uaf+0xac/0x21c
[   75.234437] Read of size 1 at addr ffff0000c56f1800 by task kunit_try_catch/133
[   75.235077] 
[   75.235302] CPU: 0 PID: 133 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   75.236034] Hardware name: linux,dummy-virt (DT)
[   75.236495] Call trace:
[   75.236774]  dump_backtrace+0xf8/0x118
[   75.237291]  show_stack+0x18/0x24
[   75.237723]  __dump_stack+0x28/0x38
[   75.238149]  dump_stack_lvl+0x54/0x6c
[   75.238565]  print_address_description+0x7c/0x1ec
[   75.239406]  print_report+0x50/0x68
[   75.239889]  kasan_report+0xac/0x100
[   75.240332]  __kasan_check_byte+0x3c/0x54
[   75.241327]  krealloc+0x54/0x270
[   75.241773]  krealloc_uaf+0xac/0x21c
[   75.242217]  kunit_try_run_case+0x80/0x184
[   75.242671]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.243242]  kthread+0x16c/0x21c
[   75.243686]  ret_from_fork+0x10/0x20
[   75.244114] 
[   75.244329] Allocated by task 133:
[   75.244654]  kasan_set_track+0x4c/0x80
[   75.245177]  kasan_save_alloc_info+0x28/0x34
[   75.245620]  __kasan_kmalloc+0x88/0xa0
[   75.246078]  kmalloc_trace+0x54/0x68
[   75.246518]  krealloc_uaf+0x48/0x21c
[   75.247206]  kunit_try_run_case+0x80/0x184
[   75.247666]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.248243]  kthread+0x16c/0x21c
[   75.249126]  ret_from_fork+0x10/0x20
[   75.249547] 
[   75.249786] Freed by task 133:
[   75.250125]  kasan_set_track+0x4c/0x80
[   75.250558]  kasan_save_free_info+0x3c/0x60
[   75.251053]  ____kasan_slab_free+0xe8/0x140
[   75.251536]  __kasan_slab_free+0x18/0x28
[   75.252048]  __kmem_cache_free+0xdc/0x284
[   75.252539]  kfree+0x60/0x74
[   75.252947]  krealloc_uaf+0x90/0x21c
[   75.253399]  kunit_try_run_case+0x80/0x184
[   75.253872]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.254427]  kthread+0x16c/0x21c
[   75.255110]  ret_from_fork+0x10/0x20
[   75.255568] 
[   75.255780] The buggy address belongs to the object at ffff0000c56f1800
[   75.255780]  which belongs to the cache kmalloc-256 of size 256
[   75.256720] The buggy address is located 0 bytes inside of
[   75.256720]  256-byte region [ffff0000c56f1800, ffff0000c56f1900)
[   75.258083] 
[   75.258280] The buggy address belongs to the physical page:
[   75.258708] page:00000000b1c7ebef refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056f0
[   75.259551] head:00000000b1c7ebef order:1 compound_mapcount:0 compound_pincount:0
[   75.260239] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[   75.261147] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480
[   75.261844] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   75.262432] page dumped because: kasan: bad access detected
[   75.262917] 
[   75.263104] Memory state around the buggy address:
[   75.263538]  ffff0000c56f1700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.264190]  ffff0000c56f1780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.264890] >ffff0000c56f1800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   75.265483]                    ^
[   75.265837]  ffff0000c56f1880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   75.266472]  ffff0000c56f1900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.267497] ==================================================================

[   74.282637] ==================================================================
[   74.283184] BUG: KASAN: use-after-free in krealloc_uaf+0xd0/0x21c
[   74.283865] Read of size 1 at addr ffff0000c4b2bc00 by task kunit_try_catch/133
[   74.284517] 
[   74.284723] CPU: 1 PID: 133 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   74.285450] Hardware name: linux,dummy-virt (DT)
[   74.286402] Call trace:
[   74.286688]  dump_backtrace+0xf4/0x114
[   74.287227]  show_stack+0x18/0x24
[   74.287655]  __dump_stack+0x28/0x38
[   74.288071]  dump_stack_lvl+0x50/0x68
[   74.288518]  print_address_description+0x7c/0x1ec
[   74.289054]  print_report+0x50/0x68
[   74.289537]  kasan_report+0xac/0xfc
[   74.289984]  __asan_load1+0x6c/0x70
[   74.290417]  krealloc_uaf+0xd0/0x21c
[   74.290863]  kunit_try_run_case+0x80/0x184
[   74.291360]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   74.292483]  kthread+0x16c/0x21c
[   74.292924]  ret_from_fork+0x10/0x20
[   74.293380] 
[   74.293575] Allocated by task 133:
[   74.293953]  kasan_set_track+0x4c/0x80
[   74.294472]  kasan_save_alloc_info+0x28/0x34
[   74.294946]  __kasan_kmalloc+0x88/0xa0
[   74.295399]  kmalloc_trace+0x54/0x68
[   74.295851]  krealloc_uaf+0x48/0x21c
[   74.296298]  kunit_try_run_case+0x80/0x184
[   74.296813]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   74.297393]  kthread+0x16c/0x21c
[   74.297830]  ret_from_fork+0x10/0x20
[   74.298267] 
[   74.298469] Freed by task 133:
[   74.298782]  kasan_set_track+0x4c/0x80
[   74.299273]  kasan_save_free_info+0x3c/0x60
[   74.300283]  ____kasan_slab_free+0xe8/0x140
[   74.300803]  __kasan_slab_free+0x18/0x28
[   74.301273]  __kmem_cache_free+0xdc/0x27c
[   74.301725]  kfree+0x60/0x74
[   74.302129]  krealloc_uaf+0x90/0x21c
[   74.302565]  kunit_try_run_case+0x80/0x184
[   74.303049]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   74.303603]  kthread+0x16c/0x21c
[   74.304063]  ret_from_fork+0x10/0x20
[   74.304535] 
[   74.304718] The buggy address belongs to the object at ffff0000c4b2bc00
[   74.304718]  which belongs to the cache kmalloc-256 of size 256
[   74.305673] The buggy address is located 0 bytes inside of
[   74.305673]  256-byte region [ffff0000c4b2bc00, ffff0000c4b2bd00)
[   74.306566] 
[   74.306783] The buggy address belongs to the physical page:
[   74.307230] page:00000000c9970dfc refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104b2a
[   74.308564] head:00000000c9970dfc order:1 compound_mapcount:0 compound_pincount:0
[   74.309223] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[   74.309928] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480
[   74.310585] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   74.311206] page dumped because: kasan: bad access detected
[   74.311673] 
[   74.311908] Memory state around the buggy address:
[   74.312369]  ffff0000c4b2bb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.312998]  ffff0000c4b2bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.313604] >ffff0000c4b2bc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   74.314186]                    ^
[   74.314542]  ffff0000c4b2bc80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   74.315150]  ffff0000c4b2bd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.316297] ==================================================================
[   74.247602] ==================================================================
[   74.248472] BUG: KASAN: use-after-free in krealloc_uaf+0xac/0x21c
[   74.249022] Read of size 1 at addr ffff0000c4b2bc00 by task kunit_try_catch/133
[   74.249698] 
[   74.250066] CPU: 1 PID: 133 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   74.250838] Hardware name: linux,dummy-virt (DT)
[   74.251295] Call trace:
[   74.251531]  dump_backtrace+0xf4/0x114
[   74.251986]  show_stack+0x18/0x24
[   74.252506]  __dump_stack+0x28/0x38
[   74.253003]  dump_stack_lvl+0x50/0x68
[   74.253556]  print_address_description+0x7c/0x1ec
[   74.254122]  print_report+0x50/0x68
[   74.254586]  kasan_report+0xac/0xfc
[   74.255146]  __kasan_check_byte+0x3c/0x54
[   74.255635]  krealloc+0x54/0x26c
[   74.256146]  krealloc_uaf+0xac/0x21c
[   74.256630]  kunit_try_run_case+0x80/0x184
[   74.257123]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   74.257704]  kthread+0x16c/0x21c
[   74.258240]  ret_from_fork+0x10/0x20
[   74.258682] 
[   74.258918] Allocated by task 133:
[   74.259302]  kasan_set_track+0x4c/0x80
[   74.260103]  kasan_save_alloc_info+0x28/0x34
[   74.260553]  __kasan_kmalloc+0x88/0xa0
[   74.261014]  kmalloc_trace+0x54/0x68
[   74.261460]  krealloc_uaf+0x48/0x21c
[   74.261886]  kunit_try_run_case+0x80/0x184
[   74.262341]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   74.262942]  kthread+0x16c/0x21c
[   74.263377]  ret_from_fork+0x10/0x20
[   74.263965] 
[   74.264168] Freed by task 133:
[   74.264508]  kasan_set_track+0x4c/0x80
[   74.264963]  kasan_save_free_info+0x3c/0x60
[   74.265443]  ____kasan_slab_free+0xe8/0x140
[   74.265952]  __kasan_slab_free+0x18/0x28
[   74.266420]  __kmem_cache_free+0xdc/0x27c
[   74.266889]  kfree+0x60/0x74
[   74.267252]  krealloc_uaf+0x90/0x21c
[   74.268327]  kunit_try_run_case+0x80/0x184
[   74.268826]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   74.269395]  kthread+0x16c/0x21c
[   74.269809]  ret_from_fork+0x10/0x20
[   74.270245] 
[   74.270449] The buggy address belongs to the object at ffff0000c4b2bc00
[   74.270449]  which belongs to the cache kmalloc-256 of size 256
[   74.271373] The buggy address is located 0 bytes inside of
[   74.271373]  256-byte region [ffff0000c4b2bc00, ffff0000c4b2bd00)
[   74.272294] 
[   74.272508] The buggy address belongs to the physical page:
[   74.272972] page:00000000c9970dfc refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104b2a
[   74.273778] head:00000000c9970dfc order:1 compound_mapcount:0 compound_pincount:0
[   74.274400] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[   74.275138] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480
[   74.276407] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   74.277034] page dumped because: kasan: bad access detected
[   74.277504] 
[   74.277697] Memory state around the buggy address:
[   74.278152]  ffff0000c4b2bb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.278803]  ffff0000c4b2bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.279419] >ffff0000c4b2bc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   74.280023]                    ^
[   74.280375]  ffff0000c4b2bc80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   74.281013]  ffff0000c4b2bd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.281628] ==================================================================

[   72.896921] ==================================================================
[   72.897455] BUG: KASAN: use-after-free in krealloc_uaf+0x104/0x2f0
[   72.898165] Read of size 1 at addr ffff0000c55e6400 by task kunit_try_catch/133
[   72.898789] 
[   72.899129] CPU: 1 PID: 133 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   72.899920] Hardware name: linux,dummy-virt (DT)
[   72.900305] Call trace:
[   72.901161]  dump_backtrace.part.0+0xdc/0xf0
[   72.901691]  show_stack+0x18/0x30
[   72.902554]  dump_stack_lvl+0x64/0x80
[   72.902978]  print_report+0x158/0x438
[   72.903425]  kasan_report+0xb4/0xf4
[   72.903853]  __asan_load1+0x68/0x74
[   72.904261]  krealloc_uaf+0x104/0x2f0
[   72.904705]  kunit_try_run_case+0x84/0x120
[   72.905162]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   72.905696]  kthread+0x180/0x190
[   72.906229]  ret_from_fork+0x10/0x20
[   72.906658] 
[   72.906868] Allocated by task 133:
[   72.907217]  kasan_save_stack+0x3c/0x70
[   72.907649]  kasan_set_track+0x2c/0x40
[   72.908056]  kasan_save_alloc_info+0x24/0x34
[   72.908547]  __kasan_kmalloc+0xb8/0xc0
[   72.908985]  kmalloc_trace+0x58/0x6c
[   72.909405]  krealloc_uaf+0xa8/0x2f0
[   72.909987]  kunit_try_run_case+0x84/0x120
[   72.910438]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   72.910963]  kthread+0x180/0x190
[   72.911342]  ret_from_fork+0x10/0x20
[   72.911758] 
[   72.911944] Freed by task 133:
[   72.912267]  kasan_save_stack+0x3c/0x70
[   72.912679]  kasan_set_track+0x2c/0x40
[   72.913063]  kasan_save_free_info+0x38/0x5c
[   72.913528]  __kasan_slab_free+0xe4/0x150
[   72.914598]  __kmem_cache_free+0x130/0x2a4
[   72.915066]  kfree+0x58/0x80
[   72.915448]  krealloc_uaf+0xc8/0x2f0
[   72.915881]  kunit_try_run_case+0x84/0x120
[   72.916339]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   72.916871]  kthread+0x180/0x190
[   72.917256]  ret_from_fork+0x10/0x20
[   72.917682] 
[   72.917897] The buggy address belongs to the object at ffff0000c55e6400
[   72.917897]  which belongs to the cache kmalloc-256 of size 256
[   72.918820] The buggy address is located 0 bytes inside of
[   72.918820]  256-byte region [ffff0000c55e6400, ffff0000c55e6500)
[   72.919695] 
[   72.919901] The buggy address belongs to the physical page:
[   72.920351] page:0000000087736949 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1055e6
[   72.921298] head:0000000087736949 order:1 compound_mapcount:0 compound_pincount:0
[   72.922044] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[   72.922762] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480
[   72.923432] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   72.924084] page dumped because: kasan: bad access detected
[   72.924533] 
[   72.924729] Memory state around the buggy address:
[   72.925139]  ffff0000c55e6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.925733]  ffff0000c55e6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.926333] >ffff0000c55e6400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   72.927079]                    ^
[   72.927435]  ffff0000c55e6480: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   72.928028]  ffff0000c55e6500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.928611] ==================================================================
[   72.860314] ==================================================================
[   72.861222] BUG: KASAN: use-after-free in krealloc_uaf+0xe0/0x2f0
[   72.861845] Read of size 1 at addr ffff0000c55e6400 by task kunit_try_catch/133
[   72.862376] 
[   72.862621] CPU: 1 PID: 133 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   72.863275] Hardware name: linux,dummy-virt (DT)
[   72.863911] Call trace:
[   72.864180]  dump_backtrace.part.0+0xdc/0xf0
[   72.864712]  show_stack+0x18/0x30
[   72.865117]  dump_stack_lvl+0x64/0x80
[   72.865611]  print_report+0x158/0x438
[   72.866205]  kasan_report+0xb4/0xf4
[   72.866635]  __kasan_check_byte+0x54/0x70
[   72.867062]  krealloc+0xe0/0x1a0
[   72.867457]  krealloc_uaf+0xe0/0x2f0
[   72.867898]  kunit_try_run_case+0x84/0x120
[   72.868362]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   72.868948]  kthread+0x180/0x190
[   72.869344]  ret_from_fork+0x10/0x20
[   72.869816] 
[   72.870034] Allocated by task 133:
[   72.870345]  kasan_save_stack+0x3c/0x70
[   72.870760]  kasan_set_track+0x2c/0x40
[   72.871175]  kasan_save_alloc_info+0x24/0x34
[   72.871786]  __kasan_kmalloc+0xb8/0xc0
[   72.872203]  kmalloc_trace+0x58/0x6c
[   72.872642]  krealloc_uaf+0xa8/0x2f0
[   72.873078]  kunit_try_run_case+0x84/0x120
[   72.873557]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   72.874255]  kthread+0x180/0x190
[   72.874662]  ret_from_fork+0x10/0x20
[   72.875072] 
[   72.875301] Freed by task 133:
[   72.875636]  kasan_save_stack+0x3c/0x70
[   72.876061]  kasan_set_track+0x2c/0x40
[   72.876480]  kasan_save_free_info+0x38/0x5c
[   72.876922]  __kasan_slab_free+0xe4/0x150
[   72.877349]  __kmem_cache_free+0x130/0x2a4
[   72.877883]  kfree+0x58/0x80
[   72.878248]  krealloc_uaf+0xc8/0x2f0
[   72.878677]  kunit_try_run_case+0x84/0x120
[   72.879124]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   72.879959]  kthread+0x180/0x190
[   72.880363]  ret_from_fork+0x10/0x20
[   72.880799] 
[   72.880976] The buggy address belongs to the object at ffff0000c55e6400
[   72.880976]  which belongs to the cache kmalloc-256 of size 256
[   72.882242] The buggy address is located 0 bytes inside of
[   72.882242]  256-byte region [ffff0000c55e6400, ffff0000c55e6500)
[   72.883101] 
[   72.883294] The buggy address belongs to the physical page:
[   72.883766] page:0000000087736949 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1055e6
[   72.884732] head:0000000087736949 order:1 compound_mapcount:0 compound_pincount:0
[   72.885412] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[   72.886307] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480
[   72.887097] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   72.887828] page dumped because: kasan: bad access detected
[   72.888344] 
[   72.888642] Memory state around the buggy address:
[   72.889176]  ffff0000c55e6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.889923]  ffff0000c55e6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.890764] >ffff0000c55e6400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   72.891332]                    ^
[   72.891692]  ffff0000c55e6480: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   72.892271]  ffff0000c55e6500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.892827] ==================================================================

[   64.469020] ==================================================================
[   64.469934] BUG: KASAN: use-after-free in krealloc_uaf+0xec/0x2c8
[   64.470639] Read of size 1 at addr ffff0000c17a6800 by task kunit_try_catch/131
[   64.471191] 
[   64.471397] CPU: 0 PID: 131 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   64.472022] Hardware name: linux,dummy-virt (DT)
[   64.472379] Call trace:
[   64.472639]  dump_backtrace+0x110/0x120
[   64.473053]  show_stack+0x18/0x28
[   64.473479]  dump_stack_lvl+0x68/0x84
[   64.473919]  print_report+0x158/0x484
[   64.474282]  kasan_report+0x98/0xe0
[   64.474645]  __kasan_check_byte+0x58/0x70
[   64.475075]  krealloc+0x48/0x178
[   64.475465]  krealloc_uaf+0xec/0x2c8
[   64.475847]  kunit_try_run_case+0x7c/0x120
[   64.476270]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   64.476787]  kthread+0x1a4/0x1b8
[   64.477117]  ret_from_fork+0x10/0x20
[   64.477575] 
[   64.477780] Allocated by task 131:
[   64.478115]  kasan_save_stack+0x2c/0x58
[   64.478508]  kasan_set_track+0x2c/0x40
[   64.478866]  kasan_save_alloc_info+0x24/0x38
[   64.479316]  __kasan_kmalloc+0xa0/0xb8
[   64.479702]  kmalloc_trace+0x50/0x68
[   64.480081]  krealloc_uaf+0xb0/0x2c8
[   64.480496]  kunit_try_run_case+0x7c/0x120
[   64.480905]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   64.481441]  kthread+0x1a4/0x1b8
[   64.481848]  ret_from_fork+0x10/0x20
[   64.482255] 
[   64.482419] Freed by task 131:
[   64.482711]  kasan_save_stack+0x2c/0x58
[   64.483097]  kasan_set_track+0x2c/0x40
[   64.483469]  kasan_save_free_info+0x38/0x60
[   64.483836]  __kasan_slab_free+0xe8/0x158
[   64.484265]  __kmem_cache_free+0x138/0x2b0
[   64.484722]  kfree+0x5c/0x70
[   64.485036]  krealloc_uaf+0xd0/0x2c8
[   64.485439]  kunit_try_run_case+0x7c/0x120
[   64.485862]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   64.486455]  kthread+0x1a4/0x1b8
[   64.486807]  ret_from_fork+0x10/0x20
[   64.487219] 
[   64.487422] The buggy address belongs to the object at ffff0000c17a6800
[   64.487422]  which belongs to the cache kmalloc-256 of size 256
[   64.488239] The buggy address is located 0 bytes inside of
[   64.488239]  256-byte region [ffff0000c17a6800, ffff0000c17a6900)
[   64.488988] 
[   64.489201] The buggy address belongs to the physical page:
[   64.489664] page:00000000d35011b9 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1017a6
[   64.490573] head:00000000d35011b9 order:1 compound_mapcount:0 compound_pincount:0
[   64.491140] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[   64.491838] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480
[   64.492468] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   64.493072] page dumped because: kasan: bad access detected
[   64.493558] 
[   64.493909] Memory state around the buggy address:
[   64.494489]  ffff0000c17a6700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.495036]  ffff0000c17a6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.495573] >ffff0000c17a6800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   64.496372]                    ^
[   64.496770]  ffff0000c17a6880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   64.497462]  ffff0000c17a6900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.498053] ==================================================================
[   64.499346] ==================================================================
[   64.500186] BUG: KASAN: use-after-free in krealloc_uaf+0x118/0x2c8
[   64.500881] Read of size 1 at addr ffff0000c17a6800 by task kunit_try_catch/131
[   64.501649] 
[   64.501855] CPU: 0 PID: 131 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   64.502491] Hardware name: linux,dummy-virt (DT)
[   64.502850] Call trace:
[   64.503076]  dump_backtrace+0x110/0x120
[   64.503514]  show_stack+0x18/0x28
[   64.503889]  dump_stack_lvl+0x68/0x84
[   64.504285]  print_report+0x158/0x484
[   64.504667]  kasan_report+0x98/0xe0
[   64.505021]  __asan_load1+0x68/0x78
[   64.505380]  krealloc_uaf+0x118/0x2c8
[   64.505901]  kunit_try_run_case+0x7c/0x120
[   64.506312]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   64.506800]  kthread+0x1a4/0x1b8
[   64.507168]  ret_from_fork+0x10/0x20
[   64.507550] 
[   64.507844] Allocated by task 131:
[   64.508155]  kasan_save_stack+0x2c/0x58
[   64.508587]  kasan_set_track+0x2c/0x40
[   64.508910]  kasan_save_alloc_info+0x24/0x38
[   64.509365]  __kasan_kmalloc+0xa0/0xb8
[   64.509755]  kmalloc_trace+0x50/0x68
[   64.510123]  krealloc_uaf+0xb0/0x2c8
[   64.510543]  kunit_try_run_case+0x7c/0x120
[   64.510966]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   64.511471]  kthread+0x1a4/0x1b8
[   64.511821]  ret_from_fork+0x10/0x20
[   64.512181] 
[   64.512374] Freed by task 131:
[   64.512631]  kasan_save_stack+0x2c/0x58
[   64.513008]  kasan_set_track+0x2c/0x40
[   64.513397]  kasan_save_free_info+0x38/0x60
[   64.513853]  __kasan_slab_free+0xe8/0x158
[   64.514219]  __kmem_cache_free+0x138/0x2b0
[   64.514661]  kfree+0x5c/0x70
[   64.515001]  krealloc_uaf+0xd0/0x2c8
[   64.515410]  kunit_try_run_case+0x7c/0x120
[   64.515815]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   64.516386]  kthread+0x1a4/0x1b8
[   64.516737]  ret_from_fork+0x10/0x20
[   64.517085] 
[   64.517252] The buggy address belongs to the object at ffff0000c17a6800
[   64.517252]  which belongs to the cache kmalloc-256 of size 256
[   64.518051] The buggy address is located 0 bytes inside of
[   64.518051]  256-byte region [ffff0000c17a6800, ffff0000c17a6900)
[   64.518853] 
[   64.519034] The buggy address belongs to the physical page:
[   64.519479] page:00000000d35011b9 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1017a6
[   64.520120] head:00000000d35011b9 order:1 compound_mapcount:0 compound_pincount:0
[   64.520695] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[   64.521347] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480
[   64.522032] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   64.522575] page dumped because: kasan: bad access detected
[   64.522972] 
[   64.523154] Memory state around the buggy address:
[   64.523681]  ffff0000c17a6700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.524257]  ffff0000c17a6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.524820] >ffff0000c17a6800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   64.525376]                    ^
[   64.525671]  ffff0000c17a6880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   64.526201]  ffff0000c17a6900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.526711] ==================================================================

[   30.755338] ==================================================================
[   30.756519] BUG: KASAN: use-after-free in krealloc_uaf+0xed/0x2e0
[   30.757020] Read of size 1 at addr ffff88810090ca00 by task kunit_try_catch/237
[   30.757539] 
[   30.757674] CPU: 1 PID: 237 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   30.758056] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.758818] Call Trace:
[   30.759084]  <TASK>
[   30.759367]  dump_stack_lvl+0x49/0x62
[   30.759721]  print_report+0x189/0x492
[   30.760101]  ? kasan_complete_mode_report_info+0x7c/0x200
[   30.760543]  ? krealloc_uaf+0xed/0x2e0
[   30.760735]  kasan_report+0x10c/0x190
[   30.760924]  ? krealloc_uaf+0xed/0x2e0
[   30.761111]  ? krealloc_uaf+0xed/0x2e0
[   30.761358]  __kasan_check_byte+0x39/0x50
[   30.761706]  krealloc+0x35/0x140
[   30.762274]  krealloc_uaf+0xed/0x2e0
[   30.762625]  ? kmalloc_memmove_negative_size+0x1e0/0x1e0
[   30.763049]  ? preempt_count_sub+0x4c/0x70
[   30.763429]  ? _raw_spin_unlock_irqrestore+0x2d/0x60
[   30.763822]  ? __kunit_add_resource+0xd1/0x100
[   30.764246]  kunit_try_run_case+0x8f/0xd0
[   30.764659]  ? kunit_catch_run_case+0x80/0x80
[   30.764914]  ? kunit_try_catch_throw+0x40/0x40
[   30.765157]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   30.765662]  kthread+0x17b/0x1b0
[   30.765990]  ? kthread_complete_and_exit+0x30/0x30
[   30.766432]  ret_from_fork+0x22/0x30
[   30.766813]  </TASK>
[   30.767066] 
[   30.767329] Allocated by task 237:
[   30.767639]  kasan_save_stack+0x41/0x70
[   30.767993]  kasan_set_track+0x25/0x40
[   30.768218]  kasan_save_alloc_info+0x1e/0x30
[   30.768681]  __kasan_kmalloc+0xb6/0xc0
[   30.769037]  kmalloc_trace+0x48/0xb0
[   30.769397]  krealloc_uaf+0xac/0x2e0
[   30.769732]  kunit_try_run_case+0x8f/0xd0
[   30.770082]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   30.770482]  kthread+0x17b/0x1b0
[   30.770683]  ret_from_fork+0x22/0x30
[   30.770883] 
[   30.770979] Freed by task 237:
[   30.771143]  kasan_save_stack+0x41/0x70
[   30.771710]  kasan_set_track+0x25/0x40
[   30.772031]  kasan_save_free_info+0x2e/0x50
[   30.772478]  ____kasan_slab_free+0x175/0x1d0
[   30.772807]  __kasan_slab_free+0x12/0x20
[   30.773144]  __kmem_cache_free+0x188/0x2f0
[   30.773671]  kfree+0x78/0x120
[   30.773880]  krealloc_uaf+0xcc/0x2e0
[   30.774268]  kunit_try_run_case+0x8f/0xd0
[   30.774505]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   30.774882]  kthread+0x17b/0x1b0
[   30.775202]  ret_from_fork+0x22/0x30
[   30.775547] 
[   30.775767] The buggy address belongs to the object at ffff88810090ca00
[   30.775767]  which belongs to the cache kmalloc-256 of size 256
[   30.776601] The buggy address is located 0 bytes inside of
[   30.776601]  256-byte region [ffff88810090ca00, ffff88810090cb00)
[   30.777393] 
[   30.777528] The buggy address belongs to the physical page:
[   30.777920] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10090c
[   30.778528] head:(____ptrval____) order:1 compound_mapcount:0 compound_pincount:0
[   30.778979] flags: 0x200000000010200(slab|head|node=0|zone=2)
[   30.779477] raw: 0200000000010200 0000000000000000 dead000000000122 ffff888100041b40
[   30.779966] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   30.780494] page dumped because: kasan: bad access detected
[   30.780831] 
[   30.780926] Memory state around the buggy address:
[   30.781491]  ffff88810090c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.781812]  ffff88810090c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.782170] >ffff88810090ca00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.782656]                    ^
[   30.782951]  ffff88810090ca80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.783475]  ffff88810090cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.783914] ==================================================================
[   30.784963] ==================================================================
[   30.785310] BUG: KASAN: use-after-free in krealloc_uaf+0x126/0x2e0
[   30.785702] Read of size 1 at addr ffff88810090ca00 by task kunit_try_catch/237
[   30.786730] 
[   30.786863] CPU: 1 PID: 237 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   30.787241] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.787624] Call Trace:
[   30.787780]  <TASK>
[   30.787923]  dump_stack_lvl+0x49/0x62
[   30.788157]  print_report+0x189/0x492
[   30.788429]  ? kasan_complete_mode_report_info+0x7c/0x200
[   30.789268]  ? krealloc_uaf+0x126/0x2e0
[   30.789510]  kasan_report+0x10c/0x190
[   30.789742]  ? krealloc_uaf+0x126/0x2e0
[   30.789964]  __asan_load1+0x62/0x70
[   30.790176]  krealloc_uaf+0x126/0x2e0
[   30.790738]  ? kmalloc_memmove_negative_size+0x1e0/0x1e0
[   30.791116]  ? preempt_count_sub+0x4c/0x70
[   30.791518]  ? _raw_spin_unlock_irqrestore+0x2d/0x60
[   30.791911]  ? __kunit_add_resource+0xd1/0x100
[   30.792294]  kunit_try_run_case+0x8f/0xd0
[   30.792647]  ? kunit_catch_run_case+0x80/0x80
[   30.793012]  ? kunit_try_catch_throw+0x40/0x40
[   30.793422]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   30.793817]  kthread+0x17b/0x1b0
[   30.794020]  ? kthread_complete_and_exit+0x30/0x30
[   30.794507]  ret_from_fork+0x22/0x30
[   30.794759]  </TASK>
[   30.795059] 
[   30.795305] Allocated by task 237:
[   30.795492]  kasan_save_stack+0x41/0x70
[   30.795862]  kasan_set_track+0x25/0x40
[   30.796103]  kasan_save_alloc_info+0x1e/0x30
[   30.796580]  __kasan_kmalloc+0xb6/0xc0
[   30.796824]  kmalloc_trace+0x48/0xb0
[   30.797208]  krealloc_uaf+0xac/0x2e0
[   30.797538]  kunit_try_run_case+0x8f/0xd0
[   30.797883]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   30.798193]  kthread+0x17b/0x1b0
[   30.798552]  ret_from_fork+0x22/0x30
[   30.798871] 
[   30.799006] Freed by task 237:
[   30.799347]  kasan_save_stack+0x41/0x70
[   30.799592]  kasan_set_track+0x25/0x40
[   30.800002]  kasan_save_free_info+0x2e/0x50
[   30.800394]  ____kasan_slab_free+0x175/0x1d0
[   30.800651]  __kasan_slab_free+0x12/0x20
[   30.800868]  __kmem_cache_free+0x188/0x2f0
[   30.801105]  kfree+0x78/0x120
[   30.801619]  krealloc_uaf+0xcc/0x2e0
[   30.801849]  kunit_try_run_case+0x8f/0xd0
[   30.802173]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   30.802566]  kthread+0x17b/0x1b0
[   30.802875]  ret_from_fork+0x22/0x30
[   30.803102] 
[   30.803392] The buggy address belongs to the object at ffff88810090ca00
[   30.803392]  which belongs to the cache kmalloc-256 of size 256
[   30.804042] The buggy address is located 0 bytes inside of
[   30.804042]  256-byte region [ffff88810090ca00, ffff88810090cb00)
[   30.804787] 
[   30.804940] The buggy address belongs to the physical page:
[   30.805358] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10090c
[   30.805919] head:(____ptrval____) order:1 compound_mapcount:0 compound_pincount:0
[   30.806280] flags: 0x200000000010200(slab|head|node=0|zone=2)
[   30.806742] raw: 0200000000010200 0000000000000000 dead000000000122 ffff888100041b40
[   30.807227] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   30.807675] page dumped because: kasan: bad access detected
[   30.808033] 
[   30.808173] Memory state around the buggy address:
[   30.808507]  ffff88810090c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.808992]  ffff88810090c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.809533] >ffff88810090ca00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.809872]                    ^
[   30.810145]  ffff88810090ca80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.810589]  ffff88810090cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.810925] ==================================================================