Date
April 20, 2025, 11:09 p.m.
Environment | |
---|---|
x15 | |
x86 |
[ 52.783081] ================================================================== [ 52.794708] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x208/0x5d4 [ 52.801391] Read of size 1 at addr cb2d1c00 by task kunit_try_catch/220 [ 52.808044] [ 52.809539] CPU: 1 UID: 0 PID: 220 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 52.809570] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 52.809570] Hardware name: Generic DRA74X (Flattened Device Tree) [ 52.809600] Call trace: [ 52.809600] unwind_backtrace from show_stack+0x18/0x1c [ 52.809631] show_stack from dump_stack_lvl+0x70/0x90 [ 52.809661] dump_stack_lvl from print_report+0x158/0x528 [ 52.809661] print_report from kasan_report+0xdc/0x118 [ 52.809692] kasan_report from __kasan_check_byte+0x34/0x3c [ 52.809722] __kasan_check_byte from krealloc_noprof+0x30/0x2e4 [ 52.809753] krealloc_noprof from krealloc_uaf+0x208/0x5d4 [ 52.809753] krealloc_uaf from kunit_try_run_case+0x22c/0x5a8 [ 52.809783] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 52.809814] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 52.809844] kthread from ret_from_fork+0x14/0x20 [ 52.809844] Exception stack(0xf23fbfb0 to 0xf23fbff8) [ 52.809875] bfa0: 00000000 00000000 00000000 00000000 [ 52.809875] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 52.809906] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 52.809906] [ 52.925720] Allocated by task 220: [ 52.929138] kasan_save_track+0x30/0x5c [ 52.933013] __kasan_kmalloc+0x8c/0x94 [ 52.936798] krealloc_uaf+0xd8/0x5d4 [ 52.940399] kunit_try_run_case+0x22c/0x5a8 [ 52.944610] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 52.950134] kthread+0x464/0x810 [ 52.953399] ret_from_fork+0x14/0x20 [ 52.957000] [ 52.958496] Freed by task 220: [ 52.961578] kasan_save_track+0x30/0x5c [ 52.965454] kasan_save_free_info+0x3c/0x48 [ 52.969665] __kasan_slab_free+0x40/0x50 [ 52.973632] kfree+0xe8/0x384 [ 52.976623] krealloc_uaf+0x180/0x5d4 [ 52.980316] kunit_try_run_case+0x22c/0x5a8 [ 52.984527] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 52.990051] kthread+0x464/0x810 [ 52.993316] ret_from_fork+0x14/0x20 [ 52.996917] [ 52.998413] The buggy address belongs to the object at cb2d1c00 [ 52.998413] which belongs to the cache kmalloc-256 of size 256 [ 53.010314] The buggy address is located 0 bytes inside of [ 53.010314] freed 256-byte region [cb2d1c00, cb2d1d00) [ 53.021057] [ 53.022583] The buggy address belongs to the physical page: [ 53.028167] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8b2d0 [ 53.035461] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 53.043151] flags: 0x40(head|zone=0) [ 53.046752] page_type: f5(slab) [ 53.049926] raw: 00000040 c7001500 00000122 00000000 00000000 80100010 f5000000 00000000 [ 53.058074] raw: 00000000 [ 53.060729] head: 00000040 c7001500 00000122 00000000 00000000 80100010 f5000000 00000000 [ 53.068969] head: 00000000 00000001 eeb91541 ffffffff 00000000 ffffffff 00000000 ffffffff [ 53.077178] head: 00000000 00000002 [ 53.080688] page dumped because: kasan: bad access detected [ 53.086303] [ 53.087799] Memory state around the buggy address: [ 53.092620] cb2d1b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.099212] cb2d1b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.105773] >cb2d1c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 53.112335] ^ [ 53.114898] cb2d1c80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 53.121459] cb2d1d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.128051] ================================================================== [ 53.135650] ================================================================== [ 53.142944] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x580/0x5d4 [ 53.149597] Read of size 1 at addr cb2d1c00 by task kunit_try_catch/220 [ 53.156249] [ 53.157745] CPU: 1 UID: 0 PID: 220 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 53.157775] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 53.157806] Hardware name: Generic DRA74X (Flattened Device Tree) [ 53.157806] Call trace: [ 53.157806] unwind_backtrace from show_stack+0x18/0x1c [ 53.157836] show_stack from dump_stack_lvl+0x70/0x90 [ 53.157867] dump_stack_lvl from print_report+0x158/0x528 [ 53.157897] print_report from kasan_report+0xdc/0x118 [ 53.157897] kasan_report from krealloc_uaf+0x580/0x5d4 [ 53.157928] krealloc_uaf from kunit_try_run_case+0x22c/0x5a8 [ 53.157958] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 53.157989] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 53.157989] kthread from ret_from_fork+0x14/0x20 [ 53.158020] Exception stack(0xf23fbfb0 to 0xf23fbff8) [ 53.158050] bfa0: 00000000 00000000 00000000 00000000 [ 53.158050] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 53.158081] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 53.158081] [ 53.262084] Allocated by task 220: [ 53.265502] kasan_save_track+0x30/0x5c [ 53.269378] __kasan_kmalloc+0x8c/0x94 [ 53.273162] krealloc_uaf+0xd8/0x5d4 [ 53.276763] kunit_try_run_case+0x22c/0x5a8 [ 53.280975] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 53.286499] kthread+0x464/0x810 [ 53.289764] ret_from_fork+0x14/0x20 [ 53.293365] [ 53.294860] Freed by task 220: [ 53.297943] kasan_save_track+0x30/0x5c [ 53.301818] kasan_save_free_info+0x3c/0x48 [ 53.306030] __kasan_slab_free+0x40/0x50 [ 53.309967] kfree+0xe8/0x384 [ 53.312988] krealloc_uaf+0x180/0x5d4 [ 53.316680] kunit_try_run_case+0x22c/0x5a8 [ 53.320892] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 53.326416] kthread+0x464/0x810 [ 53.329681] ret_from_fork+0x14/0x20 [ 53.333282] [ 53.334777] The buggy address belongs to the object at cb2d1c00 [ 53.334777] which belongs to the cache kmalloc-256 of size 256 [ 53.346679] The buggy address is located 0 bytes inside of [ 53.346679] freed 256-byte region [cb2d1c00, cb2d1d00) [ 53.357452] [ 53.358947] The buggy address belongs to the physical page: [ 53.364562] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8b2d0 [ 53.371826] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 53.379516] flags: 0x40(head|zone=0) [ 53.383117] page_type: f5(slab) [ 53.386291] raw: 00000040 c7001500 00000122 00000000 00000000 80100010 f5000000 00000000 [ 53.394439] raw: 00000000 [ 53.397094] head: 00000040 c7001500 00000122 00000000 00000000 80100010 f5000000 00000000 [ 53.405334] head: 00000000 00000001 eeb91541 ffffffff 00000000 ffffffff 00000000 ffffffff [ 53.413543] head: 00000000 00000002 [ 53.417053] page dumped because: kasan: bad access detected [ 53.422668] [ 53.424163] Memory state around the buggy address: [ 53.428985] cb2d1b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.435577] cb2d1b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.442138] >cb2d1c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 53.448699] ^ [ 53.451263] cb2d1c80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 53.457824] cb2d1d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.464385] ==================================================================
[ 22.744141] ================================================================== [ 22.755745] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x1b8/0x5e0 [ 22.762363] Read of size 1 at addr ffff8881038cac00 by task kunit_try_catch/207 [ 22.769687] [ 22.771221] CPU: 3 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 22.771229] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.771231] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 22.771234] Call Trace: [ 22.771236] <TASK> [ 22.771237] dump_stack_lvl+0x73/0xb0 [ 22.771241] print_report+0xd1/0x650 [ 22.771245] ? __virt_addr_valid+0x1db/0x2d0 [ 22.771249] ? krealloc_uaf+0x1b8/0x5e0 [ 22.771253] ? kasan_complete_mode_report_info+0x64/0x200 [ 22.771257] ? krealloc_uaf+0x1b8/0x5e0 [ 22.771261] kasan_report+0x141/0x180 [ 22.771265] ? krealloc_uaf+0x1b8/0x5e0 [ 22.771269] ? krealloc_uaf+0x1b8/0x5e0 [ 22.771274] __kasan_check_byte+0x3d/0x50 [ 22.771278] krealloc_noprof+0x3f/0x340 [ 22.771282] krealloc_uaf+0x1b8/0x5e0 [ 22.771286] ? __pfx_krealloc_uaf+0x10/0x10 [ 22.771290] ? finish_task_switch.isra.0+0x153/0x700 [ 22.771294] ? __switch_to+0x5d9/0xf60 [ 22.771298] ? dequeue_task_fair+0x166/0x4e0 [ 22.771302] ? __schedule+0x10cc/0x2b30 [ 22.771306] ? ktime_get_ts64+0x83/0x230 [ 22.771311] kunit_try_run_case+0x1a2/0x480 [ 22.771315] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.771319] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.771324] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.771328] ? __kthread_parkme+0x82/0x180 [ 22.771332] ? preempt_count_sub+0x50/0x80 [ 22.771337] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.771341] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 22.771345] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.771349] kthread+0x334/0x6f0 [ 22.771353] ? trace_preempt_on+0x20/0xc0 [ 22.771357] ? __pfx_kthread+0x10/0x10 [ 22.771361] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.771365] ? calculate_sigpending+0x7b/0xa0 [ 22.771369] ? __pfx_kthread+0x10/0x10 [ 22.771373] ret_from_fork+0x3e/0x80 [ 22.771377] ? __pfx_kthread+0x10/0x10 [ 22.771381] ret_from_fork_asm+0x1a/0x30 [ 22.771387] </TASK> [ 22.771388] [ 22.951937] Allocated by task 207: [ 22.955343] kasan_save_stack+0x45/0x70 [ 22.959183] kasan_save_track+0x18/0x40 [ 22.963021] kasan_save_alloc_info+0x3b/0x50 [ 22.967294] __kasan_kmalloc+0xb7/0xc0 [ 22.971045] __kmalloc_cache_noprof+0x189/0x420 [ 22.975579] krealloc_uaf+0xbb/0x5e0 [ 22.979159] kunit_try_run_case+0x1a2/0x480 [ 22.983353] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 22.988758] kthread+0x334/0x6f0 [ 22.992019] ret_from_fork+0x3e/0x80 [ 22.995599] ret_from_fork_asm+0x1a/0x30 [ 22.999531] [ 23.001031] Freed by task 207: [ 23.004093] kasan_save_stack+0x45/0x70 [ 23.007931] kasan_save_track+0x18/0x40 [ 23.011770] kasan_save_free_info+0x3f/0x60 [ 23.015956] __kasan_slab_free+0x56/0x70 [ 23.019879] kfree+0x222/0x3f0 [ 23.022940] krealloc_uaf+0x13d/0x5e0 [ 23.026605] kunit_try_run_case+0x1a2/0x480 [ 23.030792] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 23.036191] kthread+0x334/0x6f0 [ 23.039424] ret_from_fork+0x3e/0x80 [ 23.043004] ret_from_fork_asm+0x1a/0x30 [ 23.046938] [ 23.048435] The buggy address belongs to the object at ffff8881038cac00 [ 23.048435] which belongs to the cache kmalloc-256 of size 256 [ 23.060941] The buggy address is located 0 bytes inside of [ 23.060941] freed 256-byte region [ffff8881038cac00, ffff8881038cad00) [ 23.073023] [ 23.074521] The buggy address belongs to the physical page: [ 23.080094] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ca [ 23.088103] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.095762] flags: 0x200000000000040(head|node=0|zone=2) [ 23.101074] page_type: f5(slab) [ 23.104221] raw: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000 [ 23.111960] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.119702] head: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000 [ 23.127553] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.135385] head: 0200000000000001 ffffea00040e3281 00000000ffffffff 00000000ffffffff [ 23.143212] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 23.151046] page dumped because: kasan: bad access detected [ 23.156617] [ 23.158116] Memory state around the buggy address: [ 23.162909] ffff8881038cab00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.170127] ffff8881038cab80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.177347] >ffff8881038cac00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.184567] ^ [ 23.187799] ffff8881038cac80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.195017] ffff8881038cad00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.202238] ================================================================== [ 23.209478] ================================================================== [ 23.216708] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x53c/0x5e0 [ 23.223346] Read of size 1 at addr ffff8881038cac00 by task kunit_try_catch/207 [ 23.230652] [ 23.232154] CPU: 3 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 23.232162] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.232164] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 23.232167] Call Trace: [ 23.232169] <TASK> [ 23.232170] dump_stack_lvl+0x73/0xb0 [ 23.232174] print_report+0xd1/0x650 [ 23.232178] ? __virt_addr_valid+0x1db/0x2d0 [ 23.232181] ? krealloc_uaf+0x53c/0x5e0 [ 23.232185] ? kasan_complete_mode_report_info+0x64/0x200 [ 23.232189] ? krealloc_uaf+0x53c/0x5e0 [ 23.232193] kasan_report+0x141/0x180 [ 23.232197] ? krealloc_uaf+0x53c/0x5e0 [ 23.232202] __asan_report_load1_noabort+0x18/0x20 [ 23.232206] krealloc_uaf+0x53c/0x5e0 [ 23.232210] ? __pfx_krealloc_uaf+0x10/0x10 [ 23.232214] ? finish_task_switch.isra.0+0x153/0x700 [ 23.232218] ? __switch_to+0x5d9/0xf60 [ 23.232222] ? dequeue_task_fair+0x166/0x4e0 [ 23.232226] ? __schedule+0x10cc/0x2b30 [ 23.232231] ? ktime_get_ts64+0x83/0x230 [ 23.232235] kunit_try_run_case+0x1a2/0x480 [ 23.232240] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.232244] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.232248] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.232252] ? __kthread_parkme+0x82/0x180 [ 23.232256] ? preempt_count_sub+0x50/0x80 [ 23.232261] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.232265] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 23.232269] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.232273] kthread+0x334/0x6f0 [ 23.232277] ? trace_preempt_on+0x20/0xc0 [ 23.232281] ? __pfx_kthread+0x10/0x10 [ 23.232285] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.232289] ? calculate_sigpending+0x7b/0xa0 [ 23.232293] ? __pfx_kthread+0x10/0x10 [ 23.232297] ret_from_fork+0x3e/0x80 [ 23.232301] ? __pfx_kthread+0x10/0x10 [ 23.232305] ret_from_fork_asm+0x1a/0x30 [ 23.232311] </TASK> [ 23.232312] [ 23.405930] Allocated by task 207: [ 23.409334] kasan_save_stack+0x45/0x70 [ 23.413174] kasan_save_track+0x18/0x40 [ 23.417013] kasan_save_alloc_info+0x3b/0x50 [ 23.421286] __kasan_kmalloc+0xb7/0xc0 [ 23.425037] __kmalloc_cache_noprof+0x189/0x420 [ 23.429571] krealloc_uaf+0xbb/0x5e0 [ 23.433148] kunit_try_run_case+0x1a2/0x480 [ 23.437334] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 23.442733] kthread+0x334/0x6f0 [ 23.445966] ret_from_fork+0x3e/0x80 [ 23.449547] ret_from_fork_asm+0x1a/0x30 [ 23.453481] [ 23.454979] Freed by task 207: [ 23.458038] kasan_save_stack+0x45/0x70 [ 23.461879] kasan_save_track+0x18/0x40 [ 23.465741] kasan_save_free_info+0x3f/0x60 [ 23.469928] __kasan_slab_free+0x56/0x70 [ 23.473856] kfree+0x222/0x3f0 [ 23.476913] krealloc_uaf+0x13d/0x5e0 [ 23.480578] kunit_try_run_case+0x1a2/0x480 [ 23.484767] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 23.490174] kthread+0x334/0x6f0 [ 23.493405] ret_from_fork+0x3e/0x80 [ 23.496984] ret_from_fork_asm+0x1a/0x30 [ 23.500910] [ 23.502410] The buggy address belongs to the object at ffff8881038cac00 [ 23.502410] which belongs to the cache kmalloc-256 of size 256 [ 23.514923] The buggy address is located 0 bytes inside of [ 23.514923] freed 256-byte region [ffff8881038cac00, ffff8881038cad00) [ 23.527004] [ 23.528505] The buggy address belongs to the physical page: [ 23.534077] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ca [ 23.542083] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.549737] flags: 0x200000000000040(head|node=0|zone=2) [ 23.555048] page_type: f5(slab) [ 23.558197] raw: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000 [ 23.565944] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.573743] head: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000 [ 23.581576] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.589404] head: 0200000000000001 ffffea00040e3281 00000000ffffffff 00000000ffffffff [ 23.597236] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 23.605063] page dumped because: kasan: bad access detected [ 23.610634] [ 23.612132] Memory state around the buggy address: [ 23.616927] ffff8881038cab00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.624145] ffff8881038cab80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.631364] >ffff8881038cac00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.638582] ^ [ 23.641816] ffff8881038cac80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.649034] ffff8881038cad00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.656254] ==================================================================