Date
June 8, 2025, 11:09 p.m.
Environment | |
---|---|
e850-96 | |
qemu-arm64 | |
qemu-x86_64 | |
rk3399-rock-pi-4b |
[ 25.780418] ================================================================== [ 25.790430] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520 [ 25.797025] Read of size 1 at addr ffff0008032a0a00 by task kunit_try_catch/211 [ 25.804316] [ 25.805802] CPU: 5 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 25.805856] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.805870] Hardware name: WinLink E850-96 board (DT) [ 25.805891] Call trace: [ 25.805905] show_stack+0x20/0x38 (C) [ 25.805940] dump_stack_lvl+0x8c/0xd0 [ 25.805979] print_report+0x118/0x608 [ 25.806013] kasan_report+0xdc/0x128 [ 25.806046] __kasan_check_byte+0x54/0x70 [ 25.806076] krealloc_noprof+0x44/0x360 [ 25.806110] krealloc_uaf+0x180/0x520 [ 25.806138] kunit_try_run_case+0x170/0x3f0 [ 25.806175] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.806213] kthread+0x328/0x630 [ 25.806241] ret_from_fork+0x10/0x20 [ 25.806274] [ 25.871155] Allocated by task 211: [ 25.874544] kasan_save_stack+0x3c/0x68 [ 25.878361] kasan_save_track+0x20/0x40 [ 25.882179] kasan_save_alloc_info+0x40/0x58 [ 25.886433] __kasan_kmalloc+0xd4/0xd8 [ 25.890165] __kmalloc_cache_noprof+0x16c/0x3c0 [ 25.894679] krealloc_uaf+0xc8/0x520 [ 25.898238] kunit_try_run_case+0x170/0x3f0 [ 25.902404] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.907874] kthread+0x328/0x630 [ 25.911085] ret_from_fork+0x10/0x20 [ 25.914644] [ 25.916121] Freed by task 211: [ 25.919158] kasan_save_stack+0x3c/0x68 [ 25.922977] kasan_save_track+0x20/0x40 [ 25.926798] kasan_save_free_info+0x4c/0x78 [ 25.930963] __kasan_slab_free+0x6c/0x98 [ 25.934869] kfree+0x214/0x3c8 [ 25.937907] krealloc_uaf+0x12c/0x520 [ 25.941553] kunit_try_run_case+0x170/0x3f0 [ 25.945719] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.951188] kthread+0x328/0x630 [ 25.954400] ret_from_fork+0x10/0x20 [ 25.957959] [ 25.959436] The buggy address belongs to the object at ffff0008032a0a00 [ 25.959436] which belongs to the cache kmalloc-256 of size 256 [ 25.971938] The buggy address is located 0 bytes inside of [ 25.971938] freed 256-byte region [ffff0008032a0a00, ffff0008032a0b00) [ 25.984000] [ 25.985478] The buggy address belongs to the physical page: [ 25.991035] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8832a0 [ 25.999021] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 26.006658] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 26.013602] page_type: f5(slab) [ 26.016738] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 26.024458] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.032186] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 26.039996] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.047809] head: 0bfffe0000000002 fffffdffe00ca801 00000000ffffffff 00000000ffffffff [ 26.055621] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 26.063426] page dumped because: kasan: bad access detected [ 26.068982] [ 26.070457] Memory state around the buggy address: [ 26.075240] ffff0008032a0900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.082440] ffff0008032a0980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.089645] >ffff0008032a0a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.096846] ^ [ 26.100061] ffff0008032a0a80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.107266] ffff0008032a0b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.114470] ================================================================== [ 26.121781] ================================================================== [ 26.128884] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520 [ 26.135476] Read of size 1 at addr ffff0008032a0a00 by task kunit_try_catch/211 [ 26.142765] [ 26.144250] CPU: 5 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 26.144300] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.144315] Hardware name: WinLink E850-96 board (DT) [ 26.144336] Call trace: [ 26.144351] show_stack+0x20/0x38 (C) [ 26.144381] dump_stack_lvl+0x8c/0xd0 [ 26.144417] print_report+0x118/0x608 [ 26.144449] kasan_report+0xdc/0x128 [ 26.144482] __asan_report_load1_noabort+0x20/0x30 [ 26.144518] krealloc_uaf+0x4c8/0x520 [ 26.144546] kunit_try_run_case+0x170/0x3f0 [ 26.144581] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.144618] kthread+0x328/0x630 [ 26.144646] ret_from_fork+0x10/0x20 [ 26.144679] [ 26.206568] Allocated by task 211: [ 26.209952] kasan_save_stack+0x3c/0x68 [ 26.213773] kasan_save_track+0x20/0x40 [ 26.217591] kasan_save_alloc_info+0x40/0x58 [ 26.221844] __kasan_kmalloc+0xd4/0xd8 [ 26.225577] __kmalloc_cache_noprof+0x16c/0x3c0 [ 26.230090] krealloc_uaf+0xc8/0x520 [ 26.233649] kunit_try_run_case+0x170/0x3f0 [ 26.237816] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.243285] kthread+0x328/0x630 [ 26.246496] ret_from_fork+0x10/0x20 [ 26.250055] [ 26.251531] Freed by task 211: [ 26.254569] kasan_save_stack+0x3c/0x68 [ 26.258389] kasan_save_track+0x20/0x40 [ 26.262208] kasan_save_free_info+0x4c/0x78 [ 26.266374] __kasan_slab_free+0x6c/0x98 [ 26.270281] kfree+0x214/0x3c8 [ 26.273319] krealloc_uaf+0x12c/0x520 [ 26.276965] kunit_try_run_case+0x170/0x3f0 [ 26.281131] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.286600] kthread+0x328/0x630 [ 26.289812] ret_from_fork+0x10/0x20 [ 26.293371] [ 26.294848] The buggy address belongs to the object at ffff0008032a0a00 [ 26.294848] which belongs to the cache kmalloc-256 of size 256 [ 26.307346] The buggy address is located 0 bytes inside of [ 26.307346] freed 256-byte region [ffff0008032a0a00, ffff0008032a0b00) [ 26.319412] [ 26.320891] The buggy address belongs to the physical page: [ 26.326446] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8832a0 [ 26.334431] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 26.342068] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 26.349012] page_type: f5(slab) [ 26.352147] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 26.359870] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.367596] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 26.375408] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.383221] head: 0bfffe0000000002 fffffdffe00ca801 00000000ffffffff 00000000ffffffff [ 26.391032] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 26.398838] page dumped because: kasan: bad access detected [ 26.404393] [ 26.405869] Memory state around the buggy address: [ 26.410650] ffff0008032a0900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.417851] ffff0008032a0980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.425056] >ffff0008032a0a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.432258] ^ [ 26.435473] ffff0008032a0a80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.442678] ffff0008032a0b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.449879] ==================================================================
[ 25.165772] ================================================================== [ 25.166900] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520 [ 25.167183] Read of size 1 at addr fff00000c178be00 by task kunit_try_catch/164 [ 25.167317] [ 25.167870] CPU: 0 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 25.168594] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.168997] Hardware name: linux,dummy-virt (DT) [ 25.169216] Call trace: [ 25.169428] show_stack+0x20/0x38 (C) [ 25.169581] dump_stack_lvl+0x8c/0xd0 [ 25.170373] print_report+0x118/0x608 [ 25.170843] kasan_report+0xdc/0x128 [ 25.171010] __asan_report_load1_noabort+0x20/0x30 [ 25.171704] krealloc_uaf+0x4c8/0x520 [ 25.172233] kunit_try_run_case+0x170/0x3f0 [ 25.173040] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.173233] kthread+0x328/0x630 [ 25.173635] ret_from_fork+0x10/0x20 [ 25.173754] [ 25.173799] Allocated by task 164: [ 25.173868] kasan_save_stack+0x3c/0x68 [ 25.175246] kasan_save_track+0x20/0x40 [ 25.175352] kasan_save_alloc_info+0x40/0x58 [ 25.175458] __kasan_kmalloc+0xd4/0xd8 [ 25.175583] __kmalloc_cache_noprof+0x16c/0x3c0 [ 25.175694] krealloc_uaf+0xc8/0x520 [ 25.175798] kunit_try_run_case+0x170/0x3f0 [ 25.177991] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.178123] kthread+0x328/0x630 [ 25.178225] ret_from_fork+0x10/0x20 [ 25.178393] [ 25.178474] Freed by task 164: [ 25.178724] kasan_save_stack+0x3c/0x68 [ 25.179185] kasan_save_track+0x20/0x40 [ 25.179423] kasan_save_free_info+0x4c/0x78 [ 25.179530] __kasan_slab_free+0x6c/0x98 [ 25.179632] kfree+0x214/0x3c8 [ 25.179723] krealloc_uaf+0x12c/0x520 [ 25.180144] kunit_try_run_case+0x170/0x3f0 [ 25.180457] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.180589] kthread+0x328/0x630 [ 25.180678] ret_from_fork+0x10/0x20 [ 25.180765] [ 25.180810] The buggy address belongs to the object at fff00000c178be00 [ 25.180810] which belongs to the cache kmalloc-256 of size 256 [ 25.180962] The buggy address is located 0 bytes inside of [ 25.180962] freed 256-byte region [fff00000c178be00, fff00000c178bf00) [ 25.181106] [ 25.181167] The buggy address belongs to the physical page: [ 25.181323] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10178a [ 25.181505] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 25.181836] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 25.181978] page_type: f5(slab) [ 25.182073] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 25.182272] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 25.182448] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 25.182760] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 25.184122] head: 0bfffe0000000001 ffffc1ffc305e281 00000000ffffffff 00000000ffffffff [ 25.184653] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 25.184759] page dumped because: kasan: bad access detected [ 25.185101] [ 25.185433] Memory state around the buggy address: [ 25.185549] fff00000c178bd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.185959] fff00000c178bd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.186695] >fff00000c178be00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.186985] ^ [ 25.187067] fff00000c178be80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.187245] fff00000c178bf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.187343] ================================================================== [ 25.137021] ================================================================== [ 25.137233] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520 [ 25.137438] Read of size 1 at addr fff00000c178be00 by task kunit_try_catch/164 [ 25.137577] [ 25.138288] CPU: 0 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 25.138533] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.138655] Hardware name: linux,dummy-virt (DT) [ 25.138882] Call trace: [ 25.138961] show_stack+0x20/0x38 (C) [ 25.139110] dump_stack_lvl+0x8c/0xd0 [ 25.139258] print_report+0x118/0x608 [ 25.139813] kasan_report+0xdc/0x128 [ 25.139987] __kasan_check_byte+0x54/0x70 [ 25.140132] krealloc_noprof+0x44/0x360 [ 25.140950] krealloc_uaf+0x180/0x520 [ 25.141085] kunit_try_run_case+0x170/0x3f0 [ 25.141387] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.141530] kthread+0x328/0x630 [ 25.141664] ret_from_fork+0x10/0x20 [ 25.141803] [ 25.141858] Allocated by task 164: [ 25.141959] kasan_save_stack+0x3c/0x68 [ 25.142067] kasan_save_track+0x20/0x40 [ 25.143258] kasan_save_alloc_info+0x40/0x58 [ 25.143420] __kasan_kmalloc+0xd4/0xd8 [ 25.143524] __kmalloc_cache_noprof+0x16c/0x3c0 [ 25.144463] krealloc_uaf+0xc8/0x520 [ 25.145921] kunit_try_run_case+0x170/0x3f0 [ 25.146093] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.146761] kthread+0x328/0x630 [ 25.146877] ret_from_fork+0x10/0x20 [ 25.147614] [ 25.147739] Freed by task 164: [ 25.147982] kasan_save_stack+0x3c/0x68 [ 25.148329] kasan_save_track+0x20/0x40 [ 25.148723] kasan_save_free_info+0x4c/0x78 [ 25.148827] __kasan_slab_free+0x6c/0x98 [ 25.149171] kfree+0x214/0x3c8 [ 25.149371] krealloc_uaf+0x12c/0x520 [ 25.149567] kunit_try_run_case+0x170/0x3f0 [ 25.149995] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.150110] kthread+0x328/0x630 [ 25.150196] ret_from_fork+0x10/0x20 [ 25.150304] [ 25.151505] The buggy address belongs to the object at fff00000c178be00 [ 25.151505] which belongs to the cache kmalloc-256 of size 256 [ 25.151826] The buggy address is located 0 bytes inside of [ 25.151826] freed 256-byte region [fff00000c178be00, fff00000c178bf00) [ 25.153194] [ 25.153291] The buggy address belongs to the physical page: [ 25.153366] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10178a [ 25.153492] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 25.154693] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 25.155375] page_type: f5(slab) [ 25.155482] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 25.155612] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 25.155736] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 25.155853] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 25.159005] head: 0bfffe0000000001 ffffc1ffc305e281 00000000ffffffff 00000000ffffffff [ 25.159301] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 25.159559] page dumped because: kasan: bad access detected [ 25.160033] [ 25.160419] Memory state around the buggy address: [ 25.160824] fff00000c178bd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.161493] fff00000c178bd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.161633] >fff00000c178be00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.161992] ^ [ 25.162183] fff00000c178be80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.162286] fff00000c178bf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.163075] ==================================================================
[ 25.387598] ================================================================== [ 25.387696] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520 [ 25.387810] Read of size 1 at addr fff00000c17ed600 by task kunit_try_catch/164 [ 25.391673] [ 25.392034] CPU: 0 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 25.392574] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.392740] Hardware name: linux,dummy-virt (DT) [ 25.392861] Call trace: [ 25.392917] show_stack+0x20/0x38 (C) [ 25.393171] dump_stack_lvl+0x8c/0xd0 [ 25.393538] print_report+0x118/0x608 [ 25.393880] kasan_report+0xdc/0x128 [ 25.394033] __asan_report_load1_noabort+0x20/0x30 [ 25.394278] krealloc_uaf+0x4c8/0x520 [ 25.394397] kunit_try_run_case+0x170/0x3f0 [ 25.394590] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.394727] kthread+0x328/0x630 [ 25.394928] ret_from_fork+0x10/0x20 [ 25.395072] [ 25.395126] Allocated by task 164: [ 25.395203] kasan_save_stack+0x3c/0x68 [ 25.395318] kasan_save_track+0x20/0x40 [ 25.397068] kasan_save_alloc_info+0x40/0x58 [ 25.397215] __kasan_kmalloc+0xd4/0xd8 [ 25.397323] __kmalloc_cache_noprof+0x16c/0x3c0 [ 25.397429] krealloc_uaf+0xc8/0x520 [ 25.397563] kunit_try_run_case+0x170/0x3f0 [ 25.397723] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.397899] kthread+0x328/0x630 [ 25.398144] ret_from_fork+0x10/0x20 [ 25.398634] [ 25.398719] Freed by task 164: [ 25.398787] kasan_save_stack+0x3c/0x68 [ 25.399046] kasan_save_track+0x20/0x40 [ 25.399143] kasan_save_free_info+0x4c/0x78 [ 25.399242] __kasan_slab_free+0x6c/0x98 [ 25.399331] kfree+0x214/0x3c8 [ 25.399460] krealloc_uaf+0x12c/0x520 [ 25.399623] kunit_try_run_case+0x170/0x3f0 [ 25.399723] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.399864] kthread+0x328/0x630 [ 25.400103] ret_from_fork+0x10/0x20 [ 25.400355] [ 25.400647] The buggy address belongs to the object at fff00000c17ed600 [ 25.400647] which belongs to the cache kmalloc-256 of size 256 [ 25.401148] The buggy address is located 0 bytes inside of [ 25.401148] freed 256-byte region [fff00000c17ed600, fff00000c17ed700) [ 25.401381] [ 25.401438] The buggy address belongs to the physical page: [ 25.401521] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1017ec [ 25.402476] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 25.402609] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 25.402740] page_type: f5(slab) [ 25.403621] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 25.403867] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 25.404879] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 25.405610] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 25.405777] head: 0bfffe0000000001 ffffc1ffc305fb01 00000000ffffffff 00000000ffffffff [ 25.405934] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 25.406035] page dumped because: kasan: bad access detected [ 25.406190] [ 25.406237] Memory state around the buggy address: [ 25.406454] fff00000c17ed500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.406627] fff00000c17ed580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.406903] >fff00000c17ed600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.407008] ^ [ 25.407920] fff00000c17ed680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.408079] fff00000c17ed700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.408180] ================================================================== [ 25.366894] ================================================================== [ 25.368717] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520 [ 25.369630] Read of size 1 at addr fff00000c17ed600 by task kunit_try_catch/164 [ 25.370172] [ 25.370272] CPU: 0 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 25.370723] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.370914] Hardware name: linux,dummy-virt (DT) [ 25.371039] Call trace: [ 25.371146] show_stack+0x20/0x38 (C) [ 25.371416] dump_stack_lvl+0x8c/0xd0 [ 25.371593] print_report+0x118/0x608 [ 25.371788] kasan_report+0xdc/0x128 [ 25.371958] __kasan_check_byte+0x54/0x70 [ 25.372098] krealloc_noprof+0x44/0x360 [ 25.372512] krealloc_uaf+0x180/0x520 [ 25.372981] kunit_try_run_case+0x170/0x3f0 [ 25.373186] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.373487] kthread+0x328/0x630 [ 25.373612] ret_from_fork+0x10/0x20 [ 25.373887] [ 25.373939] Allocated by task 164: [ 25.374026] kasan_save_stack+0x3c/0x68 [ 25.374130] kasan_save_track+0x20/0x40 [ 25.374297] kasan_save_alloc_info+0x40/0x58 [ 25.374408] __kasan_kmalloc+0xd4/0xd8 [ 25.374671] __kmalloc_cache_noprof+0x16c/0x3c0 [ 25.374869] krealloc_uaf+0xc8/0x520 [ 25.375083] kunit_try_run_case+0x170/0x3f0 [ 25.375207] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.375391] kthread+0x328/0x630 [ 25.375485] ret_from_fork+0x10/0x20 [ 25.375603] [ 25.375718] Freed by task 164: [ 25.376017] kasan_save_stack+0x3c/0x68 [ 25.376137] kasan_save_track+0x20/0x40 [ 25.377317] kasan_save_free_info+0x4c/0x78 [ 25.377451] __kasan_slab_free+0x6c/0x98 [ 25.377560] kfree+0x214/0x3c8 [ 25.377776] krealloc_uaf+0x12c/0x520 [ 25.377958] kunit_try_run_case+0x170/0x3f0 [ 25.378214] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.378325] kthread+0x328/0x630 [ 25.378406] ret_from_fork+0x10/0x20 [ 25.378557] [ 25.378620] The buggy address belongs to the object at fff00000c17ed600 [ 25.378620] which belongs to the cache kmalloc-256 of size 256 [ 25.379073] The buggy address is located 0 bytes inside of [ 25.379073] freed 256-byte region [fff00000c17ed600, fff00000c17ed700) [ 25.379253] [ 25.379394] The buggy address belongs to the physical page: [ 25.379609] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1017ec [ 25.379877] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 25.380006] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 25.380209] page_type: f5(slab) [ 25.380356] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 25.380624] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 25.380941] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 25.381122] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 25.381361] head: 0bfffe0000000001 ffffc1ffc305fb01 00000000ffffffff 00000000ffffffff [ 25.381858] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 25.381959] page dumped because: kasan: bad access detected [ 25.382032] [ 25.382075] Memory state around the buggy address: [ 25.382769] fff00000c17ed500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.383334] fff00000c17ed580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.383544] >fff00000c17ed600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.384142] ^ [ 25.384218] fff00000c17ed680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.384321] fff00000c17ed700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.384591] ==================================================================
[ 18.679050] ================================================================== [ 18.680190] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x53c/0x5e0 [ 18.680798] Read of size 1 at addr ffff888100aad200 by task kunit_try_catch/182 [ 18.681763] [ 18.682007] CPU: 1 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 18.682130] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.682168] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.682226] Call Trace: [ 18.682281] <TASK> [ 18.682325] dump_stack_lvl+0x73/0xb0 [ 18.682410] print_report+0xd1/0x650 [ 18.682475] ? __virt_addr_valid+0x1db/0x2d0 [ 18.682563] ? krealloc_uaf+0x53c/0x5e0 [ 18.682627] ? kasan_complete_mode_report_info+0x64/0x200 [ 18.682692] ? krealloc_uaf+0x53c/0x5e0 [ 18.682749] kasan_report+0x141/0x180 [ 18.682808] ? krealloc_uaf+0x53c/0x5e0 [ 18.682875] __asan_report_load1_noabort+0x18/0x20 [ 18.682948] krealloc_uaf+0x53c/0x5e0 [ 18.683011] ? __pfx_krealloc_uaf+0x10/0x10 [ 18.683607] ? finish_task_switch.isra.0+0x153/0x700 [ 18.683691] ? __switch_to+0x47/0xf50 [ 18.683778] ? __schedule+0x10cc/0x2b60 [ 18.683857] ? __pfx_read_tsc+0x10/0x10 [ 18.683982] ? ktime_get_ts64+0x86/0x230 [ 18.684158] kunit_try_run_case+0x1a5/0x480 [ 18.684239] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.684302] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.684343] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.684379] ? __kthread_parkme+0x82/0x180 [ 18.684409] ? preempt_count_sub+0x50/0x80 [ 18.684442] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.684481] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.684556] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.684641] kthread+0x337/0x6f0 [ 18.684706] ? trace_preempt_on+0x20/0xc0 [ 18.684744] ? __pfx_kthread+0x10/0x10 [ 18.684777] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.684811] ? calculate_sigpending+0x7b/0xa0 [ 18.684848] ? __pfx_kthread+0x10/0x10 [ 18.684878] ret_from_fork+0x116/0x1d0 [ 18.684905] ? __pfx_kthread+0x10/0x10 [ 18.684934] ret_from_fork_asm+0x1a/0x30 [ 18.684981] </TASK> [ 18.684997] [ 18.711028] Allocated by task 182: [ 18.712113] kasan_save_stack+0x45/0x70 [ 18.713763] kasan_save_track+0x18/0x40 [ 18.714305] kasan_save_alloc_info+0x3b/0x50 [ 18.714969] __kasan_kmalloc+0xb7/0xc0 [ 18.715285] __kmalloc_cache_noprof+0x189/0x420 [ 18.716465] krealloc_uaf+0xbb/0x5e0 [ 18.717820] kunit_try_run_case+0x1a5/0x480 [ 18.718772] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.719521] kthread+0x337/0x6f0 [ 18.720077] ret_from_fork+0x116/0x1d0 [ 18.721701] ret_from_fork_asm+0x1a/0x30 [ 18.722380] [ 18.723079] Freed by task 182: [ 18.723964] kasan_save_stack+0x45/0x70 [ 18.725703] kasan_save_track+0x18/0x40 [ 18.726273] kasan_save_free_info+0x3f/0x60 [ 18.726972] __kasan_slab_free+0x56/0x70 [ 18.727723] kfree+0x222/0x3f0 [ 18.728134] krealloc_uaf+0x13d/0x5e0 [ 18.728494] kunit_try_run_case+0x1a5/0x480 [ 18.729731] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.730399] kthread+0x337/0x6f0 [ 18.730785] ret_from_fork+0x116/0x1d0 [ 18.731481] ret_from_fork_asm+0x1a/0x30 [ 18.732209] [ 18.732483] The buggy address belongs to the object at ffff888100aad200 [ 18.732483] which belongs to the cache kmalloc-256 of size 256 [ 18.734139] The buggy address is located 0 bytes inside of [ 18.734139] freed 256-byte region [ffff888100aad200, ffff888100aad300) [ 18.736100] [ 18.736387] The buggy address belongs to the physical page: [ 18.737560] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aac [ 18.738551] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 18.740184] flags: 0x200000000000040(head|node=0|zone=2) [ 18.740828] page_type: f5(slab) [ 18.741139] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 18.742541] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.743375] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 18.743971] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.744685] head: 0200000000000001 ffffea000402ab01 00000000ffffffff 00000000ffffffff [ 18.745310] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 18.746426] page dumped because: kasan: bad access detected [ 18.746758] [ 18.746903] Memory state around the buggy address: [ 18.747183] ffff888100aad100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.747622] ffff888100aad180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.749602] >ffff888100aad200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.750667] ^ [ 18.751021] ffff888100aad280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.751869] ffff888100aad300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.752886] ================================================================== [ 18.617404] ================================================================== [ 18.618392] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x1b8/0x5e0 [ 18.619110] Read of size 1 at addr ffff888100aad200 by task kunit_try_catch/182 [ 18.619547] [ 18.619738] CPU: 1 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 18.619856] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.619895] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.619957] Call Trace: [ 18.619998] <TASK> [ 18.620049] dump_stack_lvl+0x73/0xb0 [ 18.620137] print_report+0xd1/0x650 [ 18.620201] ? __virt_addr_valid+0x1db/0x2d0 [ 18.620277] ? krealloc_uaf+0x1b8/0x5e0 [ 18.621073] ? kasan_complete_mode_report_info+0x64/0x200 [ 18.621161] ? krealloc_uaf+0x1b8/0x5e0 [ 18.621250] kasan_report+0x141/0x180 [ 18.621328] ? krealloc_uaf+0x1b8/0x5e0 [ 18.621673] ? krealloc_uaf+0x1b8/0x5e0 [ 18.621894] __kasan_check_byte+0x3d/0x50 [ 18.621948] krealloc_noprof+0x3f/0x340 [ 18.621990] krealloc_uaf+0x1b8/0x5e0 [ 18.622022] ? __pfx_krealloc_uaf+0x10/0x10 [ 18.622052] ? finish_task_switch.isra.0+0x153/0x700 [ 18.622088] ? __switch_to+0x47/0xf50 [ 18.622126] ? __schedule+0x10cc/0x2b60 [ 18.622160] ? __pfx_read_tsc+0x10/0x10 [ 18.622212] ? ktime_get_ts64+0x86/0x230 [ 18.622279] kunit_try_run_case+0x1a5/0x480 [ 18.622338] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.622389] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.622444] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.622513] ? __kthread_parkme+0x82/0x180 [ 18.622564] ? preempt_count_sub+0x50/0x80 [ 18.622614] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.622667] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.622723] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.622780] kthread+0x337/0x6f0 [ 18.622827] ? trace_preempt_on+0x20/0xc0 [ 18.622880] ? __pfx_kthread+0x10/0x10 [ 18.622931] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.622980] ? calculate_sigpending+0x7b/0xa0 [ 18.623034] ? __pfx_kthread+0x10/0x10 [ 18.623080] ret_from_fork+0x116/0x1d0 [ 18.623121] ? __pfx_kthread+0x10/0x10 [ 18.623165] ret_from_fork_asm+0x1a/0x30 [ 18.623231] </TASK> [ 18.623255] [ 18.642059] Allocated by task 182: [ 18.642390] kasan_save_stack+0x45/0x70 [ 18.642834] kasan_save_track+0x18/0x40 [ 18.643081] kasan_save_alloc_info+0x3b/0x50 [ 18.643380] __kasan_kmalloc+0xb7/0xc0 [ 18.643766] __kmalloc_cache_noprof+0x189/0x420 [ 18.644058] krealloc_uaf+0xbb/0x5e0 [ 18.644356] kunit_try_run_case+0x1a5/0x480 [ 18.644857] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.645245] kthread+0x337/0x6f0 [ 18.645639] ret_from_fork+0x116/0x1d0 [ 18.646218] ret_from_fork_asm+0x1a/0x30 [ 18.646956] [ 18.647283] Freed by task 182: [ 18.648032] kasan_save_stack+0x45/0x70 [ 18.648442] kasan_save_track+0x18/0x40 [ 18.648908] kasan_save_free_info+0x3f/0x60 [ 18.649595] __kasan_slab_free+0x56/0x70 [ 18.652517] kfree+0x222/0x3f0 [ 18.653900] krealloc_uaf+0x13d/0x5e0 [ 18.654341] kunit_try_run_case+0x1a5/0x480 [ 18.654827] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.655606] kthread+0x337/0x6f0 [ 18.655841] ret_from_fork+0x116/0x1d0 [ 18.656075] ret_from_fork_asm+0x1a/0x30 [ 18.656326] [ 18.656469] The buggy address belongs to the object at ffff888100aad200 [ 18.656469] which belongs to the cache kmalloc-256 of size 256 [ 18.658100] The buggy address is located 0 bytes inside of [ 18.658100] freed 256-byte region [ffff888100aad200, ffff888100aad300) [ 18.659003] [ 18.659204] The buggy address belongs to the physical page: [ 18.659591] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aac [ 18.662292] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 18.663573] flags: 0x200000000000040(head|node=0|zone=2) [ 18.664340] page_type: f5(slab) [ 18.664774] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 18.665338] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.666585] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 18.667721] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.668272] head: 0200000000000001 ffffea000402ab01 00000000ffffffff 00000000ffffffff [ 18.669314] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 18.669707] page dumped because: kasan: bad access detected [ 18.670134] [ 18.670412] Memory state around the buggy address: [ 18.671490] ffff888100aad100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.672431] ffff888100aad180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.673140] >ffff888100aad200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.673732] ^ [ 18.674083] ffff888100aad280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.675673] ffff888100aad300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.676578] ==================================================================
[ 17.753047] ================================================================== [ 17.754485] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x53c/0x5e0 [ 17.756301] Read of size 1 at addr ffff888100aa7000 by task kunit_try_catch/182 [ 17.757923] [ 17.758227] CPU: 1 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 17.758352] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.758392] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.758446] Call Trace: [ 17.758479] <TASK> [ 17.758537] dump_stack_lvl+0x73/0xb0 [ 17.758908] print_report+0xd1/0x650 [ 17.758948] ? __virt_addr_valid+0x1db/0x2d0 [ 17.758981] ? krealloc_uaf+0x53c/0x5e0 [ 17.759011] ? kasan_complete_mode_report_info+0x64/0x200 [ 17.759041] ? krealloc_uaf+0x53c/0x5e0 [ 17.759071] kasan_report+0x141/0x180 [ 17.759109] ? krealloc_uaf+0x53c/0x5e0 [ 17.759178] __asan_report_load1_noabort+0x18/0x20 [ 17.759217] krealloc_uaf+0x53c/0x5e0 [ 17.759248] ? __pfx_krealloc_uaf+0x10/0x10 [ 17.759277] ? finish_task_switch.isra.0+0x153/0x700 [ 17.759306] ? __switch_to+0x47/0xf50 [ 17.759340] ? __schedule+0x10cc/0x2b60 [ 17.759371] ? __pfx_read_tsc+0x10/0x10 [ 17.759399] ? ktime_get_ts64+0x86/0x230 [ 17.759430] kunit_try_run_case+0x1a5/0x480 [ 17.759463] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.759495] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.759579] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.759650] ? __kthread_parkme+0x82/0x180 [ 17.759681] ? preempt_count_sub+0x50/0x80 [ 17.759713] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.759748] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.759781] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.759815] kthread+0x337/0x6f0 [ 17.759842] ? trace_preempt_on+0x20/0xc0 [ 17.759873] ? __pfx_kthread+0x10/0x10 [ 17.759929] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.759963] ? calculate_sigpending+0x7b/0xa0 [ 17.759998] ? __pfx_kthread+0x10/0x10 [ 17.760027] ret_from_fork+0x116/0x1d0 [ 17.760052] ? __pfx_kthread+0x10/0x10 [ 17.760081] ret_from_fork_asm+0x1a/0x30 [ 17.760154] </TASK> [ 17.760172] [ 17.777855] Allocated by task 182: [ 17.778353] kasan_save_stack+0x45/0x70 [ 17.778776] kasan_save_track+0x18/0x40 [ 17.779350] kasan_save_alloc_info+0x3b/0x50 [ 17.780249] __kasan_kmalloc+0xb7/0xc0 [ 17.780867] __kmalloc_cache_noprof+0x189/0x420 [ 17.781462] krealloc_uaf+0xbb/0x5e0 [ 17.781931] kunit_try_run_case+0x1a5/0x480 [ 17.782443] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.783154] kthread+0x337/0x6f0 [ 17.783460] ret_from_fork+0x116/0x1d0 [ 17.784055] ret_from_fork_asm+0x1a/0x30 [ 17.784863] [ 17.785162] Freed by task 182: [ 17.785599] kasan_save_stack+0x45/0x70 [ 17.786016] kasan_save_track+0x18/0x40 [ 17.786418] kasan_save_free_info+0x3f/0x60 [ 17.787006] __kasan_slab_free+0x56/0x70 [ 17.787654] kfree+0x222/0x3f0 [ 17.787950] krealloc_uaf+0x13d/0x5e0 [ 17.788469] kunit_try_run_case+0x1a5/0x480 [ 17.789015] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.789727] kthread+0x337/0x6f0 [ 17.790145] ret_from_fork+0x116/0x1d0 [ 17.790949] ret_from_fork_asm+0x1a/0x30 [ 17.791449] [ 17.791845] The buggy address belongs to the object at ffff888100aa7000 [ 17.791845] which belongs to the cache kmalloc-256 of size 256 [ 17.793161] The buggy address is located 0 bytes inside of [ 17.793161] freed 256-byte region [ffff888100aa7000, ffff888100aa7100) [ 17.794652] [ 17.795099] The buggy address belongs to the physical page: [ 17.796198] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aa6 [ 17.797183] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.798387] flags: 0x200000000000040(head|node=0|zone=2) [ 17.799073] page_type: f5(slab) [ 17.799441] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 17.800582] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.801283] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 17.802296] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.802810] head: 0200000000000001 ffffea000402a981 00000000ffffffff 00000000ffffffff [ 17.803770] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 17.804503] page dumped because: kasan: bad access detected [ 17.805489] [ 17.805683] Memory state around the buggy address: [ 17.806154] ffff888100aa6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.806729] ffff888100aa6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.808046] >ffff888100aa7000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.809083] ^ [ 17.809536] ffff888100aa7080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.810743] ffff888100aa7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.811507] ================================================================== [ 17.694540] ================================================================== [ 17.695654] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x1b8/0x5e0 [ 17.696336] Read of size 1 at addr ffff888100aa7000 by task kunit_try_catch/182 [ 17.697210] [ 17.697518] CPU: 1 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 17.697704] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.697744] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.697805] Call Trace: [ 17.697842] <TASK> [ 17.697907] dump_stack_lvl+0x73/0xb0 [ 17.698313] print_report+0xd1/0x650 [ 17.698393] ? __virt_addr_valid+0x1db/0x2d0 [ 17.698732] ? krealloc_uaf+0x1b8/0x5e0 [ 17.698777] ? kasan_complete_mode_report_info+0x64/0x200 [ 17.698810] ? krealloc_uaf+0x1b8/0x5e0 [ 17.698841] kasan_report+0x141/0x180 [ 17.698872] ? krealloc_uaf+0x1b8/0x5e0 [ 17.698936] ? krealloc_uaf+0x1b8/0x5e0 [ 17.698969] __kasan_check_byte+0x3d/0x50 [ 17.699000] krealloc_noprof+0x3f/0x340 [ 17.699033] krealloc_uaf+0x1b8/0x5e0 [ 17.699064] ? __pfx_krealloc_uaf+0x10/0x10 [ 17.699093] ? finish_task_switch.isra.0+0x153/0x700 [ 17.699153] ? __switch_to+0x47/0xf50 [ 17.699193] ? __schedule+0x10cc/0x2b60 [ 17.699225] ? __pfx_read_tsc+0x10/0x10 [ 17.699254] ? ktime_get_ts64+0x86/0x230 [ 17.699287] kunit_try_run_case+0x1a5/0x480 [ 17.699324] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.699357] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.699390] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.699423] ? __kthread_parkme+0x82/0x180 [ 17.699450] ? preempt_count_sub+0x50/0x80 [ 17.699480] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.699526] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.699637] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.699706] kthread+0x337/0x6f0 [ 17.699739] ? trace_preempt_on+0x20/0xc0 [ 17.699775] ? __pfx_kthread+0x10/0x10 [ 17.699805] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.699836] ? calculate_sigpending+0x7b/0xa0 [ 17.699871] ? __pfx_kthread+0x10/0x10 [ 17.699931] ret_from_fork+0x116/0x1d0 [ 17.699960] ? __pfx_kthread+0x10/0x10 [ 17.699989] ret_from_fork_asm+0x1a/0x30 [ 17.700032] </TASK> [ 17.700047] [ 17.719366] Allocated by task 182: [ 17.719907] kasan_save_stack+0x45/0x70 [ 17.720380] kasan_save_track+0x18/0x40 [ 17.721006] kasan_save_alloc_info+0x3b/0x50 [ 17.721732] __kasan_kmalloc+0xb7/0xc0 [ 17.722276] __kmalloc_cache_noprof+0x189/0x420 [ 17.723012] krealloc_uaf+0xbb/0x5e0 [ 17.723677] kunit_try_run_case+0x1a5/0x480 [ 17.724209] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.724927] kthread+0x337/0x6f0 [ 17.725346] ret_from_fork+0x116/0x1d0 [ 17.726001] ret_from_fork_asm+0x1a/0x30 [ 17.726592] [ 17.727012] Freed by task 182: [ 17.727463] kasan_save_stack+0x45/0x70 [ 17.728055] kasan_save_track+0x18/0x40 [ 17.728452] kasan_save_free_info+0x3f/0x60 [ 17.728815] __kasan_slab_free+0x56/0x70 [ 17.729336] kfree+0x222/0x3f0 [ 17.729767] krealloc_uaf+0x13d/0x5e0 [ 17.730428] kunit_try_run_case+0x1a5/0x480 [ 17.731070] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.731868] kthread+0x337/0x6f0 [ 17.732378] ret_from_fork+0x116/0x1d0 [ 17.732783] ret_from_fork_asm+0x1a/0x30 [ 17.733302] [ 17.733533] The buggy address belongs to the object at ffff888100aa7000 [ 17.733533] which belongs to the cache kmalloc-256 of size 256 [ 17.734766] The buggy address is located 0 bytes inside of [ 17.734766] freed 256-byte region [ffff888100aa7000, ffff888100aa7100) [ 17.736090] [ 17.736425] The buggy address belongs to the physical page: [ 17.736991] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aa6 [ 17.738041] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.738902] flags: 0x200000000000040(head|node=0|zone=2) [ 17.739472] page_type: f5(slab) [ 17.740047] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 17.740843] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.741594] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 17.742226] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.742797] head: 0200000000000001 ffffea000402a981 00000000ffffffff 00000000ffffffff [ 17.744132] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 17.744750] page dumped because: kasan: bad access detected [ 17.745162] [ 17.745399] Memory state around the buggy address: [ 17.745778] ffff888100aa6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.747086] ffff888100aa6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.748080] >ffff888100aa7000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.748961] ^ [ 17.749323] ffff888100aa7080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.750095] ffff888100aa7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.750923] ==================================================================
[ 20.407968] ================================================================== [ 20.408642] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520 [ 20.409274] Read of size 1 at addr ffff00000b7bf200 by task kunit_try_catch/217 [ 20.409943] [ 20.410098] CPU: 3 UID: 0 PID: 217 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 20.410134] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.410144] Hardware name: Radxa ROCK Pi 4B (DT) [ 20.410157] Call trace: [ 20.410166] show_stack+0x20/0x38 (C) [ 20.410191] dump_stack_lvl+0x8c/0xd0 [ 20.410217] print_report+0x118/0x608 [ 20.410241] kasan_report+0xdc/0x128 [ 20.410263] __asan_report_load1_noabort+0x20/0x30 [ 20.410289] krealloc_uaf+0x4c8/0x520 [ 20.410310] kunit_try_run_case+0x170/0x3f0 [ 20.410334] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.410361] kthread+0x328/0x630 [ 20.410380] ret_from_fork+0x10/0x20 [ 20.410403] [ 20.415895] Allocated by task 217: [ 20.416211] kasan_save_stack+0x3c/0x68 [ 20.416575] kasan_save_track+0x20/0x40 [ 20.416937] kasan_save_alloc_info+0x40/0x58 [ 20.417339] __kasan_kmalloc+0xd4/0xd8 [ 20.417694] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.418117] krealloc_uaf+0xc8/0x520 [ 20.418455] kunit_try_run_case+0x170/0x3f0 [ 20.418848] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.419357] kthread+0x328/0x630 [ 20.419662] ret_from_fork+0x10/0x20 [ 20.420000] [ 20.420146] Freed by task 217: [ 20.420431] kasan_save_stack+0x3c/0x68 [ 20.420795] kasan_save_track+0x20/0x40 [ 20.421158] kasan_save_free_info+0x4c/0x78 [ 20.421553] __kasan_slab_free+0x6c/0x98 [ 20.421923] kfree+0x214/0x3c8 [ 20.422215] krealloc_uaf+0x12c/0x520 [ 20.422561] kunit_try_run_case+0x170/0x3f0 [ 20.422954] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.423462] kthread+0x328/0x630 [ 20.423767] ret_from_fork+0x10/0x20 [ 20.424105] [ 20.424252] The buggy address belongs to the object at ffff00000b7bf200 [ 20.424252] which belongs to the cache kmalloc-256 of size 256 [ 20.425369] The buggy address is located 0 bytes inside of [ 20.425369] freed 256-byte region [ffff00000b7bf200, ffff00000b7bf300) [ 20.426450] [ 20.426598] The buggy address belongs to the physical page: [ 20.427103] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xb7be [ 20.427812] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 20.428504] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff) [ 20.429143] page_type: f5(slab) [ 20.429443] raw: 03fffe0000000040 ffff000000402b40 dead000000000122 0000000000000000 [ 20.430146] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.430848] head: 03fffe0000000040 ffff000000402b40 dead000000000122 0000000000000000 [ 20.431557] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.432267] head: 03fffe0000000001 fffffdffc02def81 00000000ffffffff 00000000ffffffff [ 20.432975] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 20.433678] page dumped because: kasan: bad access detected [ 20.434182] [ 20.434329] Memory state around the buggy address: [ 20.434766] ffff00000b7bf100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.435419] ffff00000b7bf180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.436072] >ffff00000b7bf200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.436722] ^ [ 20.437024] ffff00000b7bf280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.437676] ffff00000b7bf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.438327] ================================================================== [ 20.375372] ================================================================== [ 20.376476] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520 [ 20.377108] Read of size 1 at addr ffff00000b7bf200 by task kunit_try_catch/217 [ 20.377784] [ 20.377946] CPU: 3 UID: 0 PID: 217 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 20.377993] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.378007] Hardware name: Radxa ROCK Pi 4B (DT) [ 20.378023] Call trace: [ 20.378033] show_stack+0x20/0x38 (C) [ 20.378065] dump_stack_lvl+0x8c/0xd0 [ 20.378099] print_report+0x118/0x608 [ 20.378132] kasan_report+0xdc/0x128 [ 20.378162] __kasan_check_byte+0x54/0x70 [ 20.378194] krealloc_noprof+0x44/0x360 [ 20.378226] krealloc_uaf+0x180/0x520 [ 20.378254] kunit_try_run_case+0x170/0x3f0 [ 20.378286] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.378323] kthread+0x328/0x630 [ 20.378348] ret_from_fork+0x10/0x20 [ 20.378379] [ 20.384186] Allocated by task 217: [ 20.384510] kasan_save_stack+0x3c/0x68 [ 20.384888] kasan_save_track+0x20/0x40 [ 20.385261] kasan_save_alloc_info+0x40/0x58 [ 20.385676] __kasan_kmalloc+0xd4/0xd8 [ 20.386041] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.386477] krealloc_uaf+0xc8/0x520 [ 20.386826] kunit_try_run_case+0x170/0x3f0 [ 20.387231] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.387753] kthread+0x328/0x630 [ 20.388068] ret_from_fork+0x10/0x20 [ 20.388417] [ 20.388570] Freed by task 217: [ 20.388863] kasan_save_stack+0x3c/0x68 [ 20.389238] kasan_save_track+0x20/0x40 [ 20.389611] kasan_save_free_info+0x4c/0x78 [ 20.390019] __kasan_slab_free+0x6c/0x98 [ 20.390401] kfree+0x214/0x3c8 [ 20.390704] krealloc_uaf+0x12c/0x520 [ 20.391061] kunit_try_run_case+0x170/0x3f0 [ 20.391465] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.391987] kthread+0x328/0x630 [ 20.392302] ret_from_fork+0x10/0x20 [ 20.392651] [ 20.392804] The buggy address belongs to the object at ffff00000b7bf200 [ 20.392804] which belongs to the cache kmalloc-256 of size 256 [ 20.393935] The buggy address is located 0 bytes inside of [ 20.393935] freed 256-byte region [ffff00000b7bf200, ffff00000b7bf300) [ 20.395029] [ 20.395183] The buggy address belongs to the physical page: [ 20.395697] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xb7be [ 20.396420] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 20.397125] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff) [ 20.397777] page_type: f5(slab) [ 20.398089] raw: 03fffe0000000040 ffff000000402b40 dead000000000122 0000000000000000 [ 20.398804] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.399518] head: 03fffe0000000040 ffff000000402b40 dead000000000122 0000000000000000 [ 20.400240] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.400962] head: 03fffe0000000001 fffffdffc02def81 00000000ffffffff 00000000ffffffff [ 20.401683] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 20.402397] page dumped because: kasan: bad access detected [ 20.402910] [ 20.403062] Memory state around the buggy address: [ 20.403508] ffff00000b7bf100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.404173] ffff00000b7bf180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.404837] >ffff00000b7bf200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.405497] ^ [ 20.405807] ffff00000b7bf280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.406471] ffff00000b7bf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.407132] ==================================================================