Hay
Date
June 26, 2025, 11:12 a.m.

Environment
e850-96
qemu-arm64
qemu-x86_64

[   26.170075] ==================================================================
[   26.177020] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520
[   26.183613] Read of size 1 at addr ffff000802fae600 by task kunit_try_catch/213
[   26.190906] 
[   26.192390] CPU: 0 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   26.192438] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.192454] Hardware name: WinLink E850-96 board (DT)
[   26.192472] Call trace:
[   26.192484]  show_stack+0x20/0x38 (C)
[   26.192516]  dump_stack_lvl+0x8c/0xd0
[   26.192553]  print_report+0x118/0x608
[   26.192582]  kasan_report+0xdc/0x128
[   26.192610]  __asan_report_load1_noabort+0x20/0x30
[   26.192645]  krealloc_uaf+0x4c8/0x520
[   26.192671]  kunit_try_run_case+0x170/0x3f0
[   26.192708]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.192747]  kthread+0x328/0x630
[   26.192779]  ret_from_fork+0x10/0x20
[   26.192812] 
[   26.254705] Allocated by task 213:
[   26.258093]  kasan_save_stack+0x3c/0x68
[   26.261910]  kasan_save_track+0x20/0x40
[   26.265730]  kasan_save_alloc_info+0x40/0x58
[   26.269983]  __kasan_kmalloc+0xd4/0xd8
[   26.273716]  __kmalloc_cache_noprof+0x16c/0x3c0
[   26.278230]  krealloc_uaf+0xc8/0x520
[   26.281789]  kunit_try_run_case+0x170/0x3f0
[   26.285955]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.291425]  kthread+0x328/0x630
[   26.294636]  ret_from_fork+0x10/0x20
[   26.298195] 
[   26.299670] Freed by task 213:
[   26.302708]  kasan_save_stack+0x3c/0x68
[   26.306528]  kasan_save_track+0x20/0x40
[   26.310348]  kasan_save_free_info+0x4c/0x78
[   26.314514]  __kasan_slab_free+0x6c/0x98
[   26.318420]  kfree+0x214/0x3c8
[   26.321458]  krealloc_uaf+0x12c/0x520
[   26.325104]  kunit_try_run_case+0x170/0x3f0
[   26.329270]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.334739]  kthread+0x328/0x630
[   26.337951]  ret_from_fork+0x10/0x20
[   26.341510] 
[   26.342987] The buggy address belongs to the object at ffff000802fae600
[   26.342987]  which belongs to the cache kmalloc-256 of size 256
[   26.355487] The buggy address is located 0 bytes inside of
[   26.355487]  freed 256-byte region [ffff000802fae600, ffff000802fae700)
[   26.367551] 
[   26.369030] The buggy address belongs to the physical page:
[   26.374586] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882fac
[   26.382568] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   26.390209] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   26.397151] page_type: f5(slab)
[   26.400288] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   26.408009] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.415737] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   26.423547] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.431359] head: 0bfffe0000000002 fffffdffe00beb01 00000000ffffffff 00000000ffffffff
[   26.439172] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   26.446977] page dumped because: kasan: bad access detected
[   26.452532] 
[   26.454008] Memory state around the buggy address:
[   26.458789]  ffff000802fae500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.465991]  ffff000802fae580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.473196] >ffff000802fae600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.480396]                    ^
[   26.483612]  ffff000802fae680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.490817]  ffff000802fae700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.498018] ==================================================================
[   25.828773] ==================================================================
[   25.838571] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520
[   25.845166] Read of size 1 at addr ffff000802fae600 by task kunit_try_catch/213
[   25.852455] 
[   25.853942] CPU: 0 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   25.854000] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.854016] Hardware name: WinLink E850-96 board (DT)
[   25.854038] Call trace:
[   25.854054]  show_stack+0x20/0x38 (C)
[   25.854089]  dump_stack_lvl+0x8c/0xd0
[   25.854126]  print_report+0x118/0x608
[   25.854159]  kasan_report+0xdc/0x128
[   25.854191]  __kasan_check_byte+0x54/0x70
[   25.854220]  krealloc_noprof+0x44/0x360
[   25.854252]  krealloc_uaf+0x180/0x520
[   25.854277]  kunit_try_run_case+0x170/0x3f0
[   25.854315]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.854353]  kthread+0x328/0x630
[   25.854388]  ret_from_fork+0x10/0x20
[   25.854426] 
[   25.919296] Allocated by task 213:
[   25.922684]  kasan_save_stack+0x3c/0x68
[   25.926498]  kasan_save_track+0x20/0x40
[   25.930318]  kasan_save_alloc_info+0x40/0x58
[   25.934572]  __kasan_kmalloc+0xd4/0xd8
[   25.938304]  __kmalloc_cache_noprof+0x16c/0x3c0
[   25.942818]  krealloc_uaf+0xc8/0x520
[   25.946377]  kunit_try_run_case+0x170/0x3f0
[   25.950544]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.956012]  kthread+0x328/0x630
[   25.959224]  ret_from_fork+0x10/0x20
[   25.962783] 
[   25.964260] Freed by task 213:
[   25.967296]  kasan_save_stack+0x3c/0x68
[   25.971116]  kasan_save_track+0x20/0x40
[   25.974937]  kasan_save_free_info+0x4c/0x78
[   25.979102]  __kasan_slab_free+0x6c/0x98
[   25.983008]  kfree+0x214/0x3c8
[   25.986046]  krealloc_uaf+0x12c/0x520
[   25.989692]  kunit_try_run_case+0x170/0x3f0
[   25.993859]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.999327]  kthread+0x328/0x630
[   26.002539]  ret_from_fork+0x10/0x20
[   26.006098] 
[   26.007575] The buggy address belongs to the object at ffff000802fae600
[   26.007575]  which belongs to the cache kmalloc-256 of size 256
[   26.020077] The buggy address is located 0 bytes inside of
[   26.020077]  freed 256-byte region [ffff000802fae600, ffff000802fae700)
[   26.032139] 
[   26.033620] The buggy address belongs to the physical page:
[   26.039176] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882fac
[   26.047160] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   26.054798] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   26.061741] page_type: f5(slab)
[   26.064880] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   26.072597] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.080323] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   26.088135] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.095948] head: 0bfffe0000000002 fffffdffe00beb01 00000000ffffffff 00000000ffffffff
[   26.103760] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   26.111565] page dumped because: kasan: bad access detected
[   26.117122] 
[   26.118598] Memory state around the buggy address:
[   26.123377]  ffff000802fae500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.130581]  ffff000802fae580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.137786] >ffff000802fae600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.144985]                    ^
[   26.148201]  ffff000802fae680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.155405]  ffff000802fae700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.162606] ==================================================================

[   17.882848] ==================================================================
[   17.882977] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520
[   17.883072] Read of size 1 at addr fff00000c4776000 by task kunit_try_catch/166
[   17.883125] 
[   17.883161] CPU: 0 UID: 0 PID: 166 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   17.883380] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.883441] Hardware name: linux,dummy-virt (DT)
[   17.883490] Call trace:
[   17.883512]  show_stack+0x20/0x38 (C)
[   17.883562]  dump_stack_lvl+0x8c/0xd0
[   17.883772]  print_report+0x118/0x608
[   17.883917]  kasan_report+0xdc/0x128
[   17.884011]  __kasan_check_byte+0x54/0x70
[   17.884243]  krealloc_noprof+0x44/0x360
[   17.884467]  krealloc_uaf+0x180/0x520
[   17.884617]  kunit_try_run_case+0x170/0x3f0
[   17.884670]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.884969]  kthread+0x328/0x630
[   17.885140]  ret_from_fork+0x10/0x20
[   17.885300] 
[   17.885369] Allocated by task 166:
[   17.885485]  kasan_save_stack+0x3c/0x68
[   17.885618]  kasan_save_track+0x20/0x40
[   17.885707]  kasan_save_alloc_info+0x40/0x58
[   17.885945]  __kasan_kmalloc+0xd4/0xd8
[   17.886165]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.886235]  krealloc_uaf+0xc8/0x520
[   17.886271]  kunit_try_run_case+0x170/0x3f0
[   17.886368]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.886421]  kthread+0x328/0x630
[   17.886456]  ret_from_fork+0x10/0x20
[   17.886492] 
[   17.886528] Freed by task 166:
[   17.886566]  kasan_save_stack+0x3c/0x68
[   17.886613]  kasan_save_track+0x20/0x40
[   17.886656]  kasan_save_free_info+0x4c/0x78
[   17.886704]  __kasan_slab_free+0x6c/0x98
[   17.886739]  kfree+0x214/0x3c8
[   17.886771]  krealloc_uaf+0x12c/0x520
[   17.886803]  kunit_try_run_case+0x170/0x3f0
[   17.886864]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.886910]  kthread+0x328/0x630
[   17.886945]  ret_from_fork+0x10/0x20
[   17.887007] 
[   17.887032] The buggy address belongs to the object at fff00000c4776000
[   17.887032]  which belongs to the cache kmalloc-256 of size 256
[   17.887159] The buggy address is located 0 bytes inside of
[   17.887159]  freed 256-byte region [fff00000c4776000, fff00000c4776100)
[   17.887223] 
[   17.887248] The buggy address belongs to the physical page:
[   17.887279] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104776
[   17.887339] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.887384] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.887444] page_type: f5(slab)
[   17.887489] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.887550] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.887601] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.887652] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.887701] head: 0bfffe0000000001 ffffc1ffc311dd81 00000000ffffffff 00000000ffffffff
[   17.887751] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   17.887791] page dumped because: kasan: bad access detected
[   17.887841] 
[   17.887931] Memory state around the buggy address:
[   17.888202]  fff00000c4775f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.888291]  fff00000c4775f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.888337] >fff00000c4776000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.888385]                    ^
[   17.888416]  fff00000c4776080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.888459]  fff00000c4776100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.888499] ==================================================================
[   17.889574] ==================================================================
[   17.889744] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520
[   17.889827] Read of size 1 at addr fff00000c4776000 by task kunit_try_catch/166
[   17.889957] 
[   17.890006] CPU: 0 UID: 0 PID: 166 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   17.890293] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.890419] Hardware name: linux,dummy-virt (DT)
[   17.890472] Call trace:
[   17.890563]  show_stack+0x20/0x38 (C)
[   17.890617]  dump_stack_lvl+0x8c/0xd0
[   17.890664]  print_report+0x118/0x608
[   17.890708]  kasan_report+0xdc/0x128
[   17.890803]  __asan_report_load1_noabort+0x20/0x30
[   17.890866]  krealloc_uaf+0x4c8/0x520
[   17.890909]  kunit_try_run_case+0x170/0x3f0
[   17.890962]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.891015]  kthread+0x328/0x630
[   17.891099]  ret_from_fork+0x10/0x20
[   17.891191] 
[   17.891210] Allocated by task 166:
[   17.891237]  kasan_save_stack+0x3c/0x68
[   17.891481]  kasan_save_track+0x20/0x40
[   17.891526]  kasan_save_alloc_info+0x40/0x58
[   17.891575]  __kasan_kmalloc+0xd4/0xd8
[   17.891611]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.891713]  krealloc_uaf+0xc8/0x520
[   17.891821]  kunit_try_run_case+0x170/0x3f0
[   17.891875]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.892181]  kthread+0x328/0x630
[   17.892270]  ret_from_fork+0x10/0x20
[   17.892436] 
[   17.892462] Freed by task 166:
[   17.892581]  kasan_save_stack+0x3c/0x68
[   17.892651]  kasan_save_track+0x20/0x40
[   17.892687]  kasan_save_free_info+0x4c/0x78
[   17.892732]  __kasan_slab_free+0x6c/0x98
[   17.892870]  kfree+0x214/0x3c8
[   17.892970]  krealloc_uaf+0x12c/0x520
[   17.893134]  kunit_try_run_case+0x170/0x3f0
[   17.893304]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.893352]  kthread+0x328/0x630
[   17.893615]  ret_from_fork+0x10/0x20
[   17.893909] 
[   17.894080] The buggy address belongs to the object at fff00000c4776000
[   17.894080]  which belongs to the cache kmalloc-256 of size 256
[   17.894205] The buggy address is located 0 bytes inside of
[   17.894205]  freed 256-byte region [fff00000c4776000, fff00000c4776100)
[   17.894350] 
[   17.894370] The buggy address belongs to the physical page:
[   17.894400] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104776
[   17.894693] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.894800] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.894956] page_type: f5(slab)
[   17.895105] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.895210] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.895318] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.895606] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.895682] head: 0bfffe0000000001 ffffc1ffc311dd81 00000000ffffffff 00000000ffffffff
[   17.895846] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   17.896057] page dumped because: kasan: bad access detected
[   17.896147] 
[   17.896282] Memory state around the buggy address:
[   17.896421]  fff00000c4775f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.896470]  fff00000c4775f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.896534] >fff00000c4776000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.896582]                    ^
[   17.896747]  fff00000c4776080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.897036]  fff00000c4776100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.897181] ==================================================================

[   10.838343] ==================================================================
[   10.839018] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x53c/0x5e0
[   10.839669] Read of size 1 at addr ffff8881009a2e00 by task kunit_try_catch/183
[   10.840293] 
[   10.840438] CPU: 1 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT(voluntary) 
[   10.840485] Tainted: [B]=BAD_PAGE, [N]=TEST
[   10.840496] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   10.840531] Call Trace:
[   10.840543]  <TASK>
[   10.840561]  dump_stack_lvl+0x73/0xb0
[   10.840589]  print_report+0xd1/0x650
[   10.840654]  ? __virt_addr_valid+0x1db/0x2d0
[   10.840678]  ? krealloc_uaf+0x53c/0x5e0
[   10.840695]  ? kasan_complete_mode_report_info+0x64/0x200
[   10.840717]  ? krealloc_uaf+0x53c/0x5e0
[   10.840735]  kasan_report+0x141/0x180
[   10.840756]  ? krealloc_uaf+0x53c/0x5e0
[   10.840779]  __asan_report_load1_noabort+0x18/0x20
[   10.840799]  krealloc_uaf+0x53c/0x5e0
[   10.840907]  ? __pfx_krealloc_uaf+0x10/0x10
[   10.840940]  ? finish_task_switch.isra.0+0x153/0x700
[   10.840967]  ? __switch_to+0x5d9/0xf60
[   10.840989]  ? dequeue_task_fair+0x166/0x4e0
[   10.841014]  ? __schedule+0x10cc/0x2b60
[   10.841037]  ? __pfx_read_tsc+0x10/0x10
[   10.841057]  ? ktime_get_ts64+0x86/0x230
[   10.841083]  kunit_try_run_case+0x1a5/0x480
[   10.841109]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.841130]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   10.841155]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   10.841177]  ? __kthread_parkme+0x82/0x180
[   10.841200]  ? preempt_count_sub+0x50/0x80
[   10.841224]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.841247]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.841269]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   10.841549]  kthread+0x337/0x6f0
[   10.841571]  ? trace_preempt_on+0x20/0xc0
[   10.841600]  ? __pfx_kthread+0x10/0x10
[   10.841618]  ? _raw_spin_unlock_irq+0x47/0x80
[   10.841640]  ? calculate_sigpending+0x7b/0xa0
[   10.841661]  ? __pfx_kthread+0x10/0x10
[   10.841679]  ret_from_fork+0x41/0x80
[   10.841700]  ? __pfx_kthread+0x10/0x10
[   10.841727]  ret_from_fork_asm+0x1a/0x30
[   10.841758]  </TASK>
[   10.841769] 
[   10.855927] Allocated by task 183:
[   10.856328]  kasan_save_stack+0x45/0x70
[   10.856488]  kasan_save_track+0x18/0x40
[   10.857004]  kasan_save_alloc_info+0x3b/0x50
[   10.857414]  __kasan_kmalloc+0xb7/0xc0
[   10.857550]  __kmalloc_cache_noprof+0x189/0x420
[   10.857700]  krealloc_uaf+0xbb/0x5e0
[   10.858398]  kunit_try_run_case+0x1a5/0x480
[   10.858950]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.859635]  kthread+0x337/0x6f0
[   10.860101]  ret_from_fork+0x41/0x80
[   10.860239]  ret_from_fork_asm+0x1a/0x30
[   10.860381] 
[   10.860450] Freed by task 183:
[   10.860557]  kasan_save_stack+0x45/0x70
[   10.860688]  kasan_save_track+0x18/0x40
[   10.861469]  kasan_save_free_info+0x3f/0x60
[   10.862029]  __kasan_slab_free+0x56/0x70
[   10.862508]  kfree+0x222/0x3f0
[   10.862969]  krealloc_uaf+0x13d/0x5e0
[   10.863458]  kunit_try_run_case+0x1a5/0x480
[   10.864009]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.864631]  kthread+0x337/0x6f0
[   10.864984]  ret_from_fork+0x41/0x80
[   10.865117]  ret_from_fork_asm+0x1a/0x30
[   10.865251] 
[   10.865321] The buggy address belongs to the object at ffff8881009a2e00
[   10.865321]  which belongs to the cache kmalloc-256 of size 256
[   10.865673] The buggy address is located 0 bytes inside of
[   10.865673]  freed 256-byte region [ffff8881009a2e00, ffff8881009a2f00)
[   10.866134] 
[   10.866288] The buggy address belongs to the physical page:
[   10.866503] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1009a2
[   10.866978] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   10.867412] flags: 0x200000000000040(head|node=0|zone=2)
[   10.867761] page_type: f5(slab)
[   10.867949] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   10.868320] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   10.868638] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   10.869094] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   10.869439] head: 0200000000000001 ffffea0004026881 00000000ffffffff 00000000ffffffff
[   10.869769] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   10.870506] page dumped because: kasan: bad access detected
[   10.871058] 
[   10.871254] Memory state around the buggy address:
[   10.871705]  ffff8881009a2d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.872262]  ffff8881009a2d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.872746] >ffff8881009a2e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   10.873126]                    ^
[   10.873306]  ffff8881009a2e80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   10.873762]  ffff8881009a2f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.874221] ==================================================================
[   10.798195] ==================================================================
[   10.798688] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x1b8/0x5e0
[   10.799357] Read of size 1 at addr ffff8881009a2e00 by task kunit_try_catch/183
[   10.799830] 
[   10.800102] CPU: 1 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT(voluntary) 
[   10.800154] Tainted: [B]=BAD_PAGE, [N]=TEST
[   10.800166] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   10.800187] Call Trace:
[   10.800199]  <TASK>
[   10.800218]  dump_stack_lvl+0x73/0xb0
[   10.800246]  print_report+0xd1/0x650
[   10.800273]  ? __virt_addr_valid+0x1db/0x2d0
[   10.800295]  ? krealloc_uaf+0x1b8/0x5e0
[   10.800312]  ? kasan_complete_mode_report_info+0x64/0x200
[   10.800334]  ? krealloc_uaf+0x1b8/0x5e0
[   10.800352]  kasan_report+0x141/0x180
[   10.800374]  ? krealloc_uaf+0x1b8/0x5e0
[   10.800394]  ? krealloc_uaf+0x1b8/0x5e0
[   10.800412]  __kasan_check_byte+0x3d/0x50
[   10.800435]  krealloc_noprof+0x3f/0x340
[   10.800459]  krealloc_uaf+0x1b8/0x5e0
[   10.800476]  ? __pfx_krealloc_uaf+0x10/0x10
[   10.800493]  ? finish_task_switch.isra.0+0x153/0x700
[   10.800517]  ? __switch_to+0x5d9/0xf60
[   10.800539]  ? dequeue_task_fair+0x166/0x4e0
[   10.800573]  ? __schedule+0x10cc/0x2b60
[   10.800596]  ? __pfx_read_tsc+0x10/0x10
[   10.800615]  ? ktime_get_ts64+0x86/0x230
[   10.800641]  kunit_try_run_case+0x1a5/0x480
[   10.800666]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.800688]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   10.800711]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   10.800734]  ? __kthread_parkme+0x82/0x180
[   10.800755]  ? preempt_count_sub+0x50/0x80
[   10.800779]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.800801]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.800824]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   10.800846]  kthread+0x337/0x6f0
[   10.800862]  ? trace_preempt_on+0x20/0xc0
[   10.800885]  ? __pfx_kthread+0x10/0x10
[   10.800904]  ? _raw_spin_unlock_irq+0x47/0x80
[   10.800936]  ? calculate_sigpending+0x7b/0xa0
[   10.800960]  ? __pfx_kthread+0x10/0x10
[   10.800978]  ret_from_fork+0x41/0x80
[   10.800998]  ? __pfx_kthread+0x10/0x10
[   10.801016]  ret_from_fork_asm+0x1a/0x30
[   10.801046]  </TASK>
[   10.801058] 
[   10.815246] Allocated by task 183:
[   10.815625]  kasan_save_stack+0x45/0x70
[   10.816080]  kasan_save_track+0x18/0x40
[   10.816444]  kasan_save_alloc_info+0x3b/0x50
[   10.816951]  __kasan_kmalloc+0xb7/0xc0
[   10.817265]  __kmalloc_cache_noprof+0x189/0x420
[   10.817517]  krealloc_uaf+0xbb/0x5e0
[   10.817656]  kunit_try_run_case+0x1a5/0x480
[   10.818127]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.818671]  kthread+0x337/0x6f0
[   10.818998]  ret_from_fork+0x41/0x80
[   10.819332]  ret_from_fork_asm+0x1a/0x30
[   10.819675] 
[   10.819845] Freed by task 183:
[   10.820084]  kasan_save_stack+0x45/0x70
[   10.820408]  kasan_save_track+0x18/0x40
[   10.820778]  kasan_save_free_info+0x3f/0x60
[   10.821071]  __kasan_slab_free+0x56/0x70
[   10.821447]  kfree+0x222/0x3f0
[   10.821726]  krealloc_uaf+0x13d/0x5e0
[   10.821884]  kunit_try_run_case+0x1a5/0x480
[   10.822179]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   10.822694]  kthread+0x337/0x6f0
[   10.823067]  ret_from_fork+0x41/0x80
[   10.823450]  ret_from_fork_asm+0x1a/0x30
[   10.823628] 
[   10.823812] The buggy address belongs to the object at ffff8881009a2e00
[   10.823812]  which belongs to the cache kmalloc-256 of size 256
[   10.824992] The buggy address is located 0 bytes inside of
[   10.824992]  freed 256-byte region [ffff8881009a2e00, ffff8881009a2f00)
[   10.825551] 
[   10.825727] The buggy address belongs to the physical page:
[   10.826293] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1009a2
[   10.827022] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   10.827799] flags: 0x200000000000040(head|node=0|zone=2)
[   10.828305] page_type: f5(slab)
[   10.828432] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   10.828843] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   10.829731] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   10.830642] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   10.831446] head: 0200000000000001 ffffea0004026881 00000000ffffffff 00000000ffffffff
[   10.832047] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   10.832618] page dumped because: kasan: bad access detected
[   10.833172] 
[   10.833329] Memory state around the buggy address:
[   10.833526]  ffff8881009a2d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.834114]  ffff8881009a2d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.834889] >ffff8881009a2e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   10.835478]                    ^
[   10.835609]  ffff8881009a2e80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   10.836180]  ffff8881009a2f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.836935] ==================================================================