Hay
Date
July 4, 2025, 3:11 p.m.

Environment
e850-96
qemu-arm64
qemu-x86_64
x86

[   23.750901] ==================================================================
[   23.760905] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520
[   23.767500] Read of size 1 at addr ffff000803bc6600 by task kunit_try_catch/213
[   23.774790] 
[   23.776276] CPU: 2 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   23.776331] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.776348] Hardware name: WinLink E850-96 board (DT)
[   23.776368] Call trace:
[   23.776383]  show_stack+0x20/0x38 (C)
[   23.776414]  dump_stack_lvl+0x8c/0xd0
[   23.776452]  print_report+0x118/0x608
[   23.776481]  kasan_report+0xdc/0x128
[   23.776511]  __kasan_check_byte+0x54/0x70
[   23.776539]  krealloc_noprof+0x44/0x360
[   23.776570]  krealloc_uaf+0x180/0x520
[   23.776595]  kunit_try_run_case+0x170/0x3f0
[   23.776632]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.776668]  kthread+0x328/0x630
[   23.776701]  ret_from_fork+0x10/0x20
[   23.776732] 
[   23.841629] Allocated by task 213:
[   23.845017]  kasan_save_stack+0x3c/0x68
[   23.848832]  kasan_save_track+0x20/0x40
[   23.852652]  kasan_save_alloc_info+0x40/0x58
[   23.856906]  __kasan_kmalloc+0xd4/0xd8
[   23.860638]  __kmalloc_cache_noprof+0x16c/0x3c0
[   23.865152]  krealloc_uaf+0xc8/0x520
[   23.868711]  kunit_try_run_case+0x170/0x3f0
[   23.872878]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.878346]  kthread+0x328/0x630
[   23.881558]  ret_from_fork+0x10/0x20
[   23.885117] 
[   23.886594] Freed by task 213:
[   23.889632]  kasan_save_stack+0x3c/0x68
[   23.893450]  kasan_save_track+0x20/0x40
[   23.897269]  kasan_save_free_info+0x4c/0x78
[   23.901436]  __kasan_slab_free+0x6c/0x98
[   23.905342]  kfree+0x214/0x3c8
[   23.908380]  krealloc_uaf+0x12c/0x520
[   23.912026]  kunit_try_run_case+0x170/0x3f0
[   23.916193]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.921663]  kthread+0x328/0x630
[   23.924873]  ret_from_fork+0x10/0x20
[   23.928432] 
[   23.929910] The buggy address belongs to the object at ffff000803bc6600
[   23.929910]  which belongs to the cache kmalloc-256 of size 256
[   23.942411] The buggy address is located 0 bytes inside of
[   23.942411]  freed 256-byte region [ffff000803bc6600, ffff000803bc6700)
[   23.954473] 
[   23.955953] The buggy address belongs to the physical page:
[   23.961508] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883bc4
[   23.969493] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.977131] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   23.984075] page_type: f5(slab)
[   23.987212] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   23.994931] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.002657] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   24.010469] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.018282] head: 0bfffe0000000002 fffffdffe00ef101 00000000ffffffff 00000000ffffffff
[   24.026094] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   24.033899] page dumped because: kasan: bad access detected
[   24.039454] 
[   24.040930] Memory state around the buggy address:
[   24.045714]  ffff000803bc6500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.052913]  ffff000803bc6580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.060120] >ffff000803bc6600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.067319]                    ^
[   24.070534]  ffff000803bc6680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.077739]  ffff000803bc6700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.084942] ==================================================================
[   24.092356] ==================================================================
[   24.099355] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520
[   24.105947] Read of size 1 at addr ffff000803bc6600 by task kunit_try_catch/213
[   24.113239] 
[   24.114725] CPU: 2 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   24.114773] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.114790] Hardware name: WinLink E850-96 board (DT)
[   24.114810] Call trace:
[   24.114823]  show_stack+0x20/0x38 (C)
[   24.114855]  dump_stack_lvl+0x8c/0xd0
[   24.114890]  print_report+0x118/0x608
[   24.114919]  kasan_report+0xdc/0x128
[   24.114949]  __asan_report_load1_noabort+0x20/0x30
[   24.114979]  krealloc_uaf+0x4c8/0x520
[   24.115003]  kunit_try_run_case+0x170/0x3f0
[   24.115037]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.115073]  kthread+0x328/0x630
[   24.115105]  ret_from_fork+0x10/0x20
[   24.115139] 
[   24.177039] Allocated by task 213:
[   24.180428]  kasan_save_stack+0x3c/0x68
[   24.184244]  kasan_save_track+0x20/0x40
[   24.188064]  kasan_save_alloc_info+0x40/0x58
[   24.192317]  __kasan_kmalloc+0xd4/0xd8
[   24.196050]  __kmalloc_cache_noprof+0x16c/0x3c0
[   24.200563]  krealloc_uaf+0xc8/0x520
[   24.204122]  kunit_try_run_case+0x170/0x3f0
[   24.208289]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.213758]  kthread+0x328/0x630
[   24.216970]  ret_from_fork+0x10/0x20
[   24.220528] 
[   24.222004] Freed by task 213:
[   24.225044]  kasan_save_stack+0x3c/0x68
[   24.228862]  kasan_save_track+0x20/0x40
[   24.232681]  kasan_save_free_info+0x4c/0x78
[   24.236848]  __kasan_slab_free+0x6c/0x98
[   24.240754]  kfree+0x214/0x3c8
[   24.243792]  krealloc_uaf+0x12c/0x520
[   24.247438]  kunit_try_run_case+0x170/0x3f0
[   24.251604]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.257073]  kthread+0x328/0x630
[   24.260285]  ret_from_fork+0x10/0x20
[   24.263844] 
[   24.265319] The buggy address belongs to the object at ffff000803bc6600
[   24.265319]  which belongs to the cache kmalloc-256 of size 256
[   24.277820] The buggy address is located 0 bytes inside of
[   24.277820]  freed 256-byte region [ffff000803bc6600, ffff000803bc6700)
[   24.289885] 
[   24.291364] The buggy address belongs to the physical page:
[   24.296919] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883bc4
[   24.304904] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   24.312542] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   24.319487] page_type: f5(slab)
[   24.322620] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   24.330343] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.338069] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   24.345880] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.353694] head: 0bfffe0000000002 fffffdffe00ef101 00000000ffffffff 00000000ffffffff
[   24.361505] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   24.369311] page dumped because: kasan: bad access detected
[   24.374866] 
[   24.376342] Memory state around the buggy address:
[   24.381123]  ffff000803bc6500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.388325]  ffff000803bc6580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.395533] >ffff000803bc6600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.402731]                    ^
[   24.405947]  ffff000803bc6680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.413151]  ffff000803bc6700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.420353] ==================================================================

[   15.533690] ==================================================================
[   15.533736] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520
[   15.533780] Read of size 1 at addr fff00000c0923000 by task kunit_try_catch/169
[   15.533828] 
[   15.533857] CPU: 0 UID: 0 PID: 169 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   15.534112] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.534262] Hardware name: linux,dummy-virt (DT)
[   15.534292] Call trace:
[   15.534579]  show_stack+0x20/0x38 (C)
[   15.534652]  dump_stack_lvl+0x8c/0xd0
[   15.534702]  print_report+0x118/0x608
[   15.535116]  kasan_report+0xdc/0x128
[   15.535302]  __asan_report_load1_noabort+0x20/0x30
[   15.535645]  krealloc_uaf+0x4c8/0x520
[   15.535760]  kunit_try_run_case+0x170/0x3f0
[   15.535806]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.535867]  kthread+0x328/0x630
[   15.536119]  ret_from_fork+0x10/0x20
[   15.536167] 
[   15.536185] Allocated by task 169:
[   15.536228]  kasan_save_stack+0x3c/0x68
[   15.536265]  kasan_save_track+0x20/0x40
[   15.536299]  kasan_save_alloc_info+0x40/0x58
[   15.536499]  __kasan_kmalloc+0xd4/0xd8
[   15.536543]  __kmalloc_cache_noprof+0x16c/0x3c0
[   15.536804]  krealloc_uaf+0xc8/0x520
[   15.536841]  kunit_try_run_case+0x170/0x3f0
[   15.536877]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.536919]  kthread+0x328/0x630
[   15.536953]  ret_from_fork+0x10/0x20
[   15.536986] 
[   15.537004] Freed by task 169:
[   15.537076]  kasan_save_stack+0x3c/0x68
[   15.537248]  kasan_save_track+0x20/0x40
[   15.537321]  kasan_save_free_info+0x4c/0x78
[   15.537384]  __kasan_slab_free+0x6c/0x98
[   15.537456]  kfree+0x214/0x3c8
[   15.537530]  krealloc_uaf+0x12c/0x520
[   15.537594]  kunit_try_run_case+0x170/0x3f0
[   15.537662]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.537704]  kthread+0x328/0x630
[   15.537737]  ret_from_fork+0x10/0x20
[   15.537771] 
[   15.537788] The buggy address belongs to the object at fff00000c0923000
[   15.537788]  which belongs to the cache kmalloc-256 of size 256
[   15.537887] The buggy address is located 0 bytes inside of
[   15.537887]  freed 256-byte region [fff00000c0923000, fff00000c0923100)
[   15.538149] 
[   15.538168] The buggy address belongs to the physical page:
[   15.538204] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100922
[   15.538345] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   15.538389] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   15.538437] page_type: f5(slab)
[   15.538479] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   15.538653] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.538700] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   15.538802] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.539235] head: 0bfffe0000000001 ffffc1ffc3024881 00000000ffffffff 00000000ffffffff
[   15.539337] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   15.539379] page dumped because: kasan: bad access detected
[   15.539409] 
[   15.539426] Memory state around the buggy address:
[   15.539457]  fff00000c0922f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.540138]  fff00000c0922f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.540199] >fff00000c0923000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.540235]                    ^
[   15.540262]  fff00000c0923080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.540303]  fff00000c0923100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.540338] ==================================================================
[   15.524873] ==================================================================
[   15.525256] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520
[   15.525413] Read of size 1 at addr fff00000c0923000 by task kunit_try_catch/169
[   15.525460] 
[   15.525491] CPU: 0 UID: 0 PID: 169 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   15.525992] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.526020] Hardware name: linux,dummy-virt (DT)
[   15.526051] Call trace:
[   15.526239]  show_stack+0x20/0x38 (C)
[   15.526380]  dump_stack_lvl+0x8c/0xd0
[   15.526601]  print_report+0x118/0x608
[   15.526784]  kasan_report+0xdc/0x128
[   15.526827]  __kasan_check_byte+0x54/0x70
[   15.526870]  krealloc_noprof+0x44/0x360
[   15.526916]  krealloc_uaf+0x180/0x520
[   15.526956]  kunit_try_run_case+0x170/0x3f0
[   15.527002]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.527053]  kthread+0x328/0x630
[   15.527095]  ret_from_fork+0x10/0x20
[   15.527139] 
[   15.527157] Allocated by task 169:
[   15.527185]  kasan_save_stack+0x3c/0x68
[   15.527222]  kasan_save_track+0x20/0x40
[   15.527257]  kasan_save_alloc_info+0x40/0x58
[   15.527294]  __kasan_kmalloc+0xd4/0xd8
[   15.527328]  __kmalloc_cache_noprof+0x16c/0x3c0
[   15.527373]  krealloc_uaf+0xc8/0x520
[   15.527408]  kunit_try_run_case+0x170/0x3f0
[   15.527684]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.528091]  kthread+0x328/0x630
[   15.528352]  ret_from_fork+0x10/0x20
[   15.528388] 
[   15.528425] Freed by task 169:
[   15.528462]  kasan_save_stack+0x3c/0x68
[   15.528498]  kasan_save_track+0x20/0x40
[   15.528977]  kasan_save_free_info+0x4c/0x78
[   15.529025]  __kasan_slab_free+0x6c/0x98
[   15.529061]  kfree+0x214/0x3c8
[   15.529361]  krealloc_uaf+0x12c/0x520
[   15.529493]  kunit_try_run_case+0x170/0x3f0
[   15.529531]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.529818]  kthread+0x328/0x630
[   15.529947]  ret_from_fork+0x10/0x20
[   15.530438] 
[   15.530481] The buggy address belongs to the object at fff00000c0923000
[   15.530481]  which belongs to the cache kmalloc-256 of size 256
[   15.530648] The buggy address is located 0 bytes inside of
[   15.530648]  freed 256-byte region [fff00000c0923000, fff00000c0923100)
[   15.530860] 
[   15.531031] The buggy address belongs to the physical page:
[   15.531145] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100922
[   15.531240] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   15.531373] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   15.531421] page_type: f5(slab)
[   15.531474] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   15.531521] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.531567] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   15.531672] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.531882] head: 0bfffe0000000001 ffffc1ffc3024881 00000000ffffffff 00000000ffffffff
[   15.531941] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   15.532021] page dumped because: kasan: bad access detected
[   15.532050] 
[   15.532067] Memory state around the buggy address:
[   15.532098]  fff00000c0922f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.532280]  fff00000c0922f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.532410] >fff00000c0923000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.532446]                    ^
[   15.532474]  fff00000c0923080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.532872]  fff00000c0923100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.532965] ==================================================================

[   14.161865] ==================================================================
[   14.162737] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x53c/0x5e0
[   14.164125] Read of size 1 at addr ffff88810034f400 by task kunit_try_catch/185
[   14.164675] 
[   14.164815] CPU: 0 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   14.164877] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.164891] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.164915] Call Trace:
[   14.164932]  <TASK>
[   14.164960]  dump_stack_lvl+0x73/0xb0
[   14.164998]  print_report+0xd1/0x650
[   14.165043]  ? __virt_addr_valid+0x1db/0x2d0
[   14.165075]  ? krealloc_uaf+0x53c/0x5e0
[   14.165107]  ? kasan_complete_mode_report_info+0x64/0x200
[   14.165145]  ? krealloc_uaf+0x53c/0x5e0
[   14.165178]  kasan_report+0x141/0x180
[   14.165221]  ? krealloc_uaf+0x53c/0x5e0
[   14.165269]  __asan_report_load1_noabort+0x18/0x20
[   14.165311]  krealloc_uaf+0x53c/0x5e0
[   14.165367]  ? __pfx_krealloc_uaf+0x10/0x10
[   14.165448]  ? finish_task_switch.isra.0+0x153/0x700
[   14.165497]  ? __switch_to+0x5d9/0xf60
[   14.165533]  ? dequeue_task_fair+0x166/0x4e0
[   14.165574]  ? __schedule+0x10cc/0x2b60
[   14.165618]  ? __pfx_read_tsc+0x10/0x10
[   14.165655]  ? ktime_get_ts64+0x86/0x230
[   14.165697]  kunit_try_run_case+0x1a5/0x480
[   14.165746]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.165789]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.165840]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.165891]  ? __kthread_parkme+0x82/0x180
[   14.165940]  ? preempt_count_sub+0x50/0x80
[   14.165978]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.166004]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.166030]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.166056]  kthread+0x337/0x6f0
[   14.166080]  ? trace_preempt_on+0x20/0xc0
[   14.166112]  ? __pfx_kthread+0x10/0x10
[   14.166132]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.166156]  ? calculate_sigpending+0x7b/0xa0
[   14.166180]  ? __pfx_kthread+0x10/0x10
[   14.166201]  ret_from_fork+0x41/0x80
[   14.166236]  ? __pfx_kthread+0x10/0x10
[   14.166267]  ret_from_fork_asm+0x1a/0x30
[   14.166322]  </TASK>
[   14.166355] 
[   14.180625] Allocated by task 185:
[   14.181033]  kasan_save_stack+0x45/0x70
[   14.181626]  kasan_save_track+0x18/0x40
[   14.182628]  kasan_save_alloc_info+0x3b/0x50
[   14.183070]  __kasan_kmalloc+0xb7/0xc0
[   14.183269]  __kmalloc_cache_noprof+0x189/0x420
[   14.183494]  krealloc_uaf+0xbb/0x5e0
[   14.184013]  kunit_try_run_case+0x1a5/0x480
[   14.184559]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.184860]  kthread+0x337/0x6f0
[   14.185192]  ret_from_fork+0x41/0x80
[   14.185941]  ret_from_fork_asm+0x1a/0x30
[   14.186361] 
[   14.186571] Freed by task 185:
[   14.186798]  kasan_save_stack+0x45/0x70
[   14.187107]  kasan_save_track+0x18/0x40
[   14.187670]  kasan_save_free_info+0x3f/0x60
[   14.187978]  __kasan_slab_free+0x56/0x70
[   14.188170]  kfree+0x222/0x3f0
[   14.188348]  krealloc_uaf+0x13d/0x5e0
[   14.188661]  kunit_try_run_case+0x1a5/0x480
[   14.189062]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.190107]  kthread+0x337/0x6f0
[   14.190944]  ret_from_fork+0x41/0x80
[   14.191512]  ret_from_fork_asm+0x1a/0x30
[   14.191773] 
[   14.191973] The buggy address belongs to the object at ffff88810034f400
[   14.191973]  which belongs to the cache kmalloc-256 of size 256
[   14.192754] The buggy address is located 0 bytes inside of
[   14.192754]  freed 256-byte region [ffff88810034f400, ffff88810034f500)
[   14.193435] 
[   14.193871] The buggy address belongs to the physical page:
[   14.194532] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10034e
[   14.194959] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   14.195518] flags: 0x200000000000040(head|node=0|zone=2)
[   14.195940] page_type: f5(slab)
[   14.196253] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   14.197040] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   14.197684] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   14.198516] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   14.199510] head: 0200000000000001 ffffea000400d381 00000000ffffffff 00000000ffffffff
[   14.199794] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   14.200521] page dumped because: kasan: bad access detected
[   14.200974] 
[   14.201072] Memory state around the buggy address:
[   14.201198]  ffff88810034f300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.201845]  ffff88810034f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.202659] >ffff88810034f400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.203167]                    ^
[   14.203980]  ffff88810034f480: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.204482]  ffff88810034f500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.204913] ==================================================================
[   14.117997] ==================================================================
[   14.119261] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x1b8/0x5e0
[   14.119584] Read of size 1 at addr ffff88810034f400 by task kunit_try_catch/185
[   14.120111] 
[   14.121164] CPU: 0 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   14.121294] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.121321] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.121378] Call Trace:
[   14.121407]  <TASK>
[   14.121443]  dump_stack_lvl+0x73/0xb0
[   14.121484]  print_report+0xd1/0x650
[   14.121512]  ? __virt_addr_valid+0x1db/0x2d0
[   14.121540]  ? krealloc_uaf+0x1b8/0x5e0
[   14.121560]  ? kasan_complete_mode_report_info+0x64/0x200
[   14.121585]  ? krealloc_uaf+0x1b8/0x5e0
[   14.121605]  kasan_report+0x141/0x180
[   14.121629]  ? krealloc_uaf+0x1b8/0x5e0
[   14.121652]  ? krealloc_uaf+0x1b8/0x5e0
[   14.121672]  __kasan_check_byte+0x3d/0x50
[   14.121697]  krealloc_noprof+0x3f/0x340
[   14.121725]  krealloc_uaf+0x1b8/0x5e0
[   14.121745]  ? __pfx_krealloc_uaf+0x10/0x10
[   14.121764]  ? finish_task_switch.isra.0+0x153/0x700
[   14.121791]  ? __switch_to+0x5d9/0xf60
[   14.121815]  ? dequeue_task_fair+0x166/0x4e0
[   14.121841]  ? __schedule+0x10cc/0x2b60
[   14.121867]  ? __pfx_read_tsc+0x10/0x10
[   14.121889]  ? ktime_get_ts64+0x86/0x230
[   14.121918]  kunit_try_run_case+0x1a5/0x480
[   14.121947]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.121971]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.121999]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.122024]  ? __kthread_parkme+0x82/0x180
[   14.122050]  ? preempt_count_sub+0x50/0x80
[   14.122076]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.122102]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.122127]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.122152]  kthread+0x337/0x6f0
[   14.122170]  ? trace_preempt_on+0x20/0xc0
[   14.122197]  ? __pfx_kthread+0x10/0x10
[   14.122217]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.122241]  ? calculate_sigpending+0x7b/0xa0
[   14.122362]  ? __pfx_kthread+0x10/0x10
[   14.122400]  ret_from_fork+0x41/0x80
[   14.122427]  ? __pfx_kthread+0x10/0x10
[   14.122448]  ret_from_fork_asm+0x1a/0x30
[   14.122484]  </TASK>
[   14.122496] 
[   14.137441] Allocated by task 185:
[   14.137797]  kasan_save_stack+0x45/0x70
[   14.138382]  kasan_save_track+0x18/0x40
[   14.138946]  kasan_save_alloc_info+0x3b/0x50
[   14.139475]  __kasan_kmalloc+0xb7/0xc0
[   14.139871]  __kmalloc_cache_noprof+0x189/0x420
[   14.140432]  krealloc_uaf+0xbb/0x5e0
[   14.140617]  kunit_try_run_case+0x1a5/0x480
[   14.140984]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.141696]  kthread+0x337/0x6f0
[   14.141898]  ret_from_fork+0x41/0x80
[   14.142211]  ret_from_fork_asm+0x1a/0x30
[   14.142888] 
[   14.143302] Freed by task 185:
[   14.143595]  kasan_save_stack+0x45/0x70
[   14.143982]  kasan_save_track+0x18/0x40
[   14.144331]  kasan_save_free_info+0x3f/0x60
[   14.144484]  __kasan_slab_free+0x56/0x70
[   14.144583]  kfree+0x222/0x3f0
[   14.144665]  krealloc_uaf+0x13d/0x5e0
[   14.144752]  kunit_try_run_case+0x1a5/0x480
[   14.144851]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.144963]  kthread+0x337/0x6f0
[   14.145061]  ret_from_fork+0x41/0x80
[   14.145644]  ret_from_fork_asm+0x1a/0x30
[   14.146184] 
[   14.146416] The buggy address belongs to the object at ffff88810034f400
[   14.146416]  which belongs to the cache kmalloc-256 of size 256
[   14.148026] The buggy address is located 0 bytes inside of
[   14.148026]  freed 256-byte region [ffff88810034f400, ffff88810034f500)
[   14.148816] 
[   14.149382] The buggy address belongs to the physical page:
[   14.149811] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10034e
[   14.150624] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   14.151606] flags: 0x200000000000040(head|node=0|zone=2)
[   14.152010] page_type: f5(slab)
[   14.152431] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   14.153007] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   14.153816] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   14.154374] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   14.154893] head: 0200000000000001 ffffea000400d381 00000000ffffffff 00000000ffffffff
[   14.155256] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   14.155521] page dumped because: kasan: bad access detected
[   14.155985] 
[   14.156153] Memory state around the buggy address:
[   14.157095]  ffff88810034f300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.157633]  ffff88810034f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.157908] >ffff88810034f400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.158891]                    ^
[   14.159115]  ffff88810034f480: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.159364]  ffff88810034f500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.160243] ==================================================================

[   27.240527] ==================================================================
[   27.252157] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x1b8/0x5e0
[   27.258777] Read of size 1 at addr ffff8881041c0000 by task kunit_try_catch/207
[   27.266084] 
[   27.267585] CPU: 0 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   27.267593] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.267595] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   27.267599] Call Trace:
[   27.267601]  <TASK>
[   27.267602]  dump_stack_lvl+0x73/0xb0
[   27.267606]  print_report+0xd1/0x650
[   27.267611]  ? __virt_addr_valid+0x1db/0x2d0
[   27.267615]  ? krealloc_uaf+0x1b8/0x5e0
[   27.267618]  ? kasan_complete_mode_report_info+0x64/0x200
[   27.267622]  ? krealloc_uaf+0x1b8/0x5e0
[   27.267625]  kasan_report+0x141/0x180
[   27.267630]  ? krealloc_uaf+0x1b8/0x5e0
[   27.267633]  ? krealloc_uaf+0x1b8/0x5e0
[   27.267636]  __kasan_check_byte+0x3d/0x50
[   27.267641]  krealloc_noprof+0x3f/0x340
[   27.267645]  krealloc_uaf+0x1b8/0x5e0
[   27.267648]  ? __pfx_krealloc_uaf+0x10/0x10
[   27.267651]  ? finish_task_switch.isra.0+0x153/0x700
[   27.267656]  ? __switch_to+0x5d9/0xf60
[   27.267660]  ? dequeue_task_fair+0x166/0x4e0
[   27.267664]  ? __schedule+0x10cc/0x2b60
[   27.267669]  ? ktime_get_ts64+0x83/0x230
[   27.267673]  kunit_try_run_case+0x1a2/0x480
[   27.267678]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.267683]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.267687]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.267692]  ? __kthread_parkme+0x82/0x180
[   27.267696]  ? preempt_count_sub+0x50/0x80
[   27.267700]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.267705]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   27.267710]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.267714]  kthread+0x334/0x6f0
[   27.267717]  ? trace_preempt_on+0x20/0xc0
[   27.267721]  ? __pfx_kthread+0x10/0x10
[   27.267724]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.267729]  ? calculate_sigpending+0x7b/0xa0
[   27.267732]  ? __pfx_kthread+0x10/0x10
[   27.267736]  ret_from_fork+0x3e/0x80
[   27.267740]  ? __pfx_kthread+0x10/0x10
[   27.267743]  ret_from_fork_asm+0x1a/0x30
[   27.267748]  </TASK>
[   27.267750] 
[   27.448327] Allocated by task 207:
[   27.451732]  kasan_save_stack+0x45/0x70
[   27.455571]  kasan_save_track+0x18/0x40
[   27.459409]  kasan_save_alloc_info+0x3b/0x50
[   27.463682]  __kasan_kmalloc+0xb7/0xc0
[   27.467437]  __kmalloc_cache_noprof+0x189/0x420
[   27.471976]  krealloc_uaf+0xbb/0x5e0
[   27.475555]  kunit_try_run_case+0x1a2/0x480
[   27.479743]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   27.485142]  kthread+0x334/0x6f0
[   27.488373]  ret_from_fork+0x3e/0x80
[   27.491958]  ret_from_fork_asm+0x1a/0x30
[   27.495879] 
[   27.497379] Freed by task 207:
[   27.500437]  kasan_save_stack+0x45/0x70
[   27.504277]  kasan_save_track+0x18/0x40
[   27.508116]  kasan_save_free_info+0x3f/0x60
[   27.512302]  __kasan_slab_free+0x56/0x70
[   27.516227]  kfree+0x222/0x3f0
[   27.519288]  krealloc_uaf+0x13d/0x5e0
[   27.522964]  kunit_try_run_case+0x1a2/0x480
[   27.527157]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   27.532557]  kthread+0x334/0x6f0
[   27.535791]  ret_from_fork+0x3e/0x80
[   27.539378]  ret_from_fork_asm+0x1a/0x30
[   27.543305] 
[   27.544804] The buggy address belongs to the object at ffff8881041c0000
[   27.544804]  which belongs to the cache kmalloc-256 of size 256
[   27.557316] The buggy address is located 0 bytes inside of
[   27.557316]  freed 256-byte region [ffff8881041c0000, ffff8881041c0100)
[   27.569398] 
[   27.570914] The buggy address belongs to the physical page:
[   27.576515] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1041c0
[   27.584521] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   27.592174] flags: 0x200000000000040(head|node=0|zone=2)
[   27.597487] page_type: f5(slab)
[   27.600633] raw: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000
[   27.608372] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   27.616113] head: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000
[   27.623971] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   27.631799] head: 0200000000000001 ffffea0004107001 00000000ffffffff 00000000ffffffff
[   27.639625] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   27.647450] page dumped because: kasan: bad access detected
[   27.653022] 
[   27.654523] Memory state around the buggy address:
[   27.659315]  ffff8881041bff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.666533]  ffff8881041bff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.673755] >ffff8881041c0000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   27.680982]                    ^
[   27.684213]  ffff8881041c0080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   27.691434]  ffff8881041c0100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.698651] ==================================================================
[   27.705909] ==================================================================
[   27.713161] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x53c/0x5e0
[   27.719774] Read of size 1 at addr ffff8881041c0000 by task kunit_try_catch/207
[   27.727089] 
[   27.728588] CPU: 0 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   27.728596] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.728598] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   27.728601] Call Trace:
[   27.728603]  <TASK>
[   27.728604]  dump_stack_lvl+0x73/0xb0
[   27.728608]  print_report+0xd1/0x650
[   27.728612]  ? __virt_addr_valid+0x1db/0x2d0
[   27.728616]  ? krealloc_uaf+0x53c/0x5e0
[   27.728619]  ? kasan_complete_mode_report_info+0x64/0x200
[   27.728623]  ? krealloc_uaf+0x53c/0x5e0
[   27.728627]  kasan_report+0x141/0x180
[   27.728631]  ? krealloc_uaf+0x53c/0x5e0
[   27.728635]  __asan_report_load1_noabort+0x18/0x20
[   27.728639]  krealloc_uaf+0x53c/0x5e0
[   27.728642]  ? __pfx_krealloc_uaf+0x10/0x10
[   27.728645]  ? finish_task_switch.isra.0+0x153/0x700
[   27.728649]  ? __switch_to+0x5d9/0xf60
[   27.728653]  ? dequeue_task_fair+0x166/0x4e0
[   27.728657]  ? __schedule+0x10cc/0x2b60
[   27.728662]  ? ktime_get_ts64+0x83/0x230
[   27.728667]  kunit_try_run_case+0x1a2/0x480
[   27.728671]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.728676]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.728680]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.728685]  ? __kthread_parkme+0x82/0x180
[   27.728689]  ? preempt_count_sub+0x50/0x80
[   27.728693]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.728698]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   27.728702]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.728707]  kthread+0x334/0x6f0
[   27.728710]  ? trace_preempt_on+0x20/0xc0
[   27.728714]  ? __pfx_kthread+0x10/0x10
[   27.728717]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.728721]  ? calculate_sigpending+0x7b/0xa0
[   27.728725]  ? __pfx_kthread+0x10/0x10
[   27.728728]  ret_from_fork+0x3e/0x80
[   27.728732]  ? __pfx_kthread+0x10/0x10
[   27.728735]  ret_from_fork_asm+0x1a/0x30
[   27.728741]  </TASK>
[   27.728742] 
[   27.902334] Allocated by task 207:
[   27.905743]  kasan_save_stack+0x45/0x70
[   27.909589]  kasan_save_track+0x18/0x40
[   27.913430]  kasan_save_alloc_info+0x3b/0x50
[   27.917703]  __kasan_kmalloc+0xb7/0xc0
[   27.921455]  __kmalloc_cache_noprof+0x189/0x420
[   27.925993]  krealloc_uaf+0xbb/0x5e0
[   27.929576]  kunit_try_run_case+0x1a2/0x480
[   27.933768]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   27.939170]  kthread+0x334/0x6f0
[   27.942401]  ret_from_fork+0x3e/0x80
[   27.945982]  ret_from_fork_asm+0x1a/0x30
[   27.949931] 
[   27.951449] Freed by task 207:
[   27.954509]  kasan_save_stack+0x45/0x70
[   27.958349]  kasan_save_track+0x18/0x40
[   27.962195]  kasan_save_free_info+0x3f/0x60
[   27.966381]  __kasan_slab_free+0x56/0x70
[   27.970309]  kfree+0x222/0x3f0
[   27.973368]  krealloc_uaf+0x13d/0x5e0
[   27.977032]  kunit_try_run_case+0x1a2/0x480
[   27.981219]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   27.986617]  kthread+0x334/0x6f0
[   27.989852]  ret_from_fork+0x3e/0x80
[   27.993430]  ret_from_fork_asm+0x1a/0x30
[   27.997357] 
[   27.998856] The buggy address belongs to the object at ffff8881041c0000
[   27.998856]  which belongs to the cache kmalloc-256 of size 256
[   28.011369] The buggy address is located 0 bytes inside of
[   28.011369]  freed 256-byte region [ffff8881041c0000, ffff8881041c0100)
[   28.023452] 
[   28.024961] The buggy address belongs to the physical page:
[   28.030533] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1041c0
[   28.038542] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   28.046203] flags: 0x200000000000040(head|node=0|zone=2)
[   28.051523] page_type: f5(slab)
[   28.054672] raw: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000
[   28.062418] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   28.070167] head: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000
[   28.078001] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   28.085834] head: 0200000000000001 ffffea0004107001 00000000ffffffff 00000000ffffffff
[   28.093662] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   28.101495] page dumped because: kasan: bad access detected
[   28.107067] 
[   28.108568] Memory state around the buggy address:
[   28.113358]  ffff8881041bff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.120579]  ffff8881041bff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.127797] >ffff8881041c0000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   28.135018]                    ^
[   28.138249]  ffff8881041c0080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   28.145470]  ffff8881041c0100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.152690] ==================================================================