Hay
Date
July 2, 2025, 11:09 p.m.

Environment
qemu-arm64
qemu-x86_64

[   18.114272] ==================================================================
[   18.114348] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520
[   18.114405] Read of size 1 at addr fff00000c17aa800 by task kunit_try_catch/164
[   18.114470] 
[   18.114527] CPU: 0 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   18.114638] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.114664] Hardware name: linux,dummy-virt (DT)
[   18.114712] Call trace:
[   18.114751]  show_stack+0x20/0x38 (C)
[   18.114807]  dump_stack_lvl+0x8c/0xd0
[   18.114875]  print_report+0x118/0x608
[   18.114940]  kasan_report+0xdc/0x128
[   18.114997]  __asan_report_load1_noabort+0x20/0x30
[   18.115073]  krealloc_uaf+0x4c8/0x520
[   18.115118]  kunit_try_run_case+0x170/0x3f0
[   18.115164]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.115215]  kthread+0x328/0x630
[   18.115255]  ret_from_fork+0x10/0x20
[   18.115301] 
[   18.115318] Allocated by task 164:
[   18.115343]  kasan_save_stack+0x3c/0x68
[   18.115381]  kasan_save_track+0x20/0x40
[   18.115416]  kasan_save_alloc_info+0x40/0x58
[   18.115454]  __kasan_kmalloc+0xd4/0xd8
[   18.115488]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.115544]  krealloc_uaf+0xc8/0x520
[   18.115588]  kunit_try_run_case+0x170/0x3f0
[   18.115652]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.115694]  kthread+0x328/0x630
[   18.115730]  ret_from_fork+0x10/0x20
[   18.115818] 
[   18.115836] Freed by task 164:
[   18.115860]  kasan_save_stack+0x3c/0x68
[   18.115896]  kasan_save_track+0x20/0x40
[   18.115947]  kasan_save_free_info+0x4c/0x78
[   18.116012]  __kasan_slab_free+0x6c/0x98
[   18.116048]  kfree+0x214/0x3c8
[   18.116116]  krealloc_uaf+0x12c/0x520
[   18.116150]  kunit_try_run_case+0x170/0x3f0
[   18.116208]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.116276]  kthread+0x328/0x630
[   18.116324]  ret_from_fork+0x10/0x20
[   18.116408] 
[   18.116426] The buggy address belongs to the object at fff00000c17aa800
[   18.116426]  which belongs to the cache kmalloc-256 of size 256
[   18.116488] The buggy address is located 0 bytes inside of
[   18.116488]  freed 256-byte region [fff00000c17aa800, fff00000c17aa900)
[   18.116546] 
[   18.116564] The buggy address belongs to the physical page:
[   18.116602] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1017aa
[   18.116868] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.117054] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   18.117170] page_type: f5(slab)
[   18.117275] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   18.117352] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.117411] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   18.117459] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.117778] head: 0bfffe0000000001 ffffc1ffc305ea81 00000000ffffffff 00000000ffffffff
[   18.117894] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   18.117973] page dumped because: kasan: bad access detected
[   18.118059] 
[   18.118163] Memory state around the buggy address:
[   18.118262]  fff00000c17aa700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.118351]  fff00000c17aa780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.118455] >fff00000c17aa800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.118512]                    ^
[   18.118552]  fff00000c17aa880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.118644]  fff00000c17aa900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.118695] ==================================================================
[   18.110344] ==================================================================
[   18.110441] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520
[   18.110497] Read of size 1 at addr fff00000c17aa800 by task kunit_try_catch/164
[   18.110544] 
[   18.110594] CPU: 0 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   18.110678] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.110705] Hardware name: linux,dummy-virt (DT)
[   18.110736] Call trace:
[   18.110758]  show_stack+0x20/0x38 (C)
[   18.110888]  dump_stack_lvl+0x8c/0xd0
[   18.110966]  print_report+0x118/0x608
[   18.111022]  kasan_report+0xdc/0x128
[   18.111075]  __kasan_check_byte+0x54/0x70
[   18.111121]  krealloc_noprof+0x44/0x360
[   18.111175]  krealloc_uaf+0x180/0x520
[   18.111243]  kunit_try_run_case+0x170/0x3f0
[   18.111290]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.111342]  kthread+0x328/0x630
[   18.111384]  ret_from_fork+0x10/0x20
[   18.111431] 
[   18.111449] Allocated by task 164:
[   18.111495]  kasan_save_stack+0x3c/0x68
[   18.111553]  kasan_save_track+0x20/0x40
[   18.111600]  kasan_save_alloc_info+0x40/0x58
[   18.111650]  __kasan_kmalloc+0xd4/0xd8
[   18.111685]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.111736]  krealloc_uaf+0xc8/0x520
[   18.111778]  kunit_try_run_case+0x170/0x3f0
[   18.111815]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.111878]  kthread+0x328/0x630
[   18.111910]  ret_from_fork+0x10/0x20
[   18.111950] 
[   18.111993] Freed by task 164:
[   18.112045]  kasan_save_stack+0x3c/0x68
[   18.112092]  kasan_save_track+0x20/0x40
[   18.112129]  kasan_save_free_info+0x4c/0x78
[   18.112173]  __kasan_slab_free+0x6c/0x98
[   18.112209]  kfree+0x214/0x3c8
[   18.112258]  krealloc_uaf+0x12c/0x520
[   18.112292]  kunit_try_run_case+0x170/0x3f0
[   18.112328]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.112370]  kthread+0x328/0x630
[   18.112404]  ret_from_fork+0x10/0x20
[   18.112464] 
[   18.112502] The buggy address belongs to the object at fff00000c17aa800
[   18.112502]  which belongs to the cache kmalloc-256 of size 256
[   18.112611] The buggy address is located 0 bytes inside of
[   18.112611]  freed 256-byte region [fff00000c17aa800, fff00000c17aa900)
[   18.112672] 
[   18.112699] The buggy address belongs to the physical page:
[   18.112733] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1017aa
[   18.112783] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.112827] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   18.112877] page_type: f5(slab)
[   18.112915] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   18.112962] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.113009] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   18.113056] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.113102] head: 0bfffe0000000001 ffffc1ffc305ea81 00000000ffffffff 00000000ffffffff
[   18.113149] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   18.113187] page dumped because: kasan: bad access detected
[   18.113386] 
[   18.113404] Memory state around the buggy address:
[   18.113484]  fff00000c17aa700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.113526]  fff00000c17aa780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.113566] >fff00000c17aa800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.113612]                    ^
[   18.113639]  fff00000c17aa880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.113678]  fff00000c17aa900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.113715] ==================================================================

[   11.364212] ==================================================================
[   11.365212] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x53c/0x5e0
[   11.365869] Read of size 1 at addr ffff888100a21e00 by task kunit_try_catch/183
[   11.366678] 
[   11.366929] CPU: 1 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   11.366985] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.366996] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.367016] Call Trace:
[   11.367030]  <TASK>
[   11.367048]  dump_stack_lvl+0x73/0xb0
[   11.367079]  print_report+0xd1/0x650
[   11.367102]  ? __virt_addr_valid+0x1db/0x2d0
[   11.367125]  ? krealloc_uaf+0x53c/0x5e0
[   11.367145]  ? kasan_complete_mode_report_info+0x64/0x200
[   11.367165]  ? krealloc_uaf+0x53c/0x5e0
[   11.367186]  kasan_report+0x141/0x180
[   11.367206]  ? krealloc_uaf+0x53c/0x5e0
[   11.367232]  __asan_report_load1_noabort+0x18/0x20
[   11.367255]  krealloc_uaf+0x53c/0x5e0
[   11.367275]  ? __pfx_krealloc_uaf+0x10/0x10
[   11.367295]  ? finish_task_switch.isra.0+0x153/0x700
[   11.367317]  ? __switch_to+0x47/0xf50
[   11.367342]  ? __schedule+0x10cc/0x2b60
[   11.367363]  ? __pfx_read_tsc+0x10/0x10
[   11.367397]  ? ktime_get_ts64+0x86/0x230
[   11.367420]  kunit_try_run_case+0x1a5/0x480
[   11.367444]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.367465]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.367488]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.367509]  ? __kthread_parkme+0x82/0x180
[   11.367529]  ? preempt_count_sub+0x50/0x80
[   11.367551]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.367575]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.367596]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.367618]  kthread+0x337/0x6f0
[   11.367637]  ? trace_preempt_on+0x20/0xc0
[   11.367661]  ? __pfx_kthread+0x10/0x10
[   11.367682]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.367706]  ? calculate_sigpending+0x7b/0xa0
[   11.367730]  ? __pfx_kthread+0x10/0x10
[   11.367750]  ret_from_fork+0x116/0x1d0
[   11.367768]  ? __pfx_kthread+0x10/0x10
[   11.367789]  ret_from_fork_asm+0x1a/0x30
[   11.367820]  </TASK>
[   11.367831] 
[   11.375481] Allocated by task 183:
[   11.375851]  kasan_save_stack+0x45/0x70
[   11.376061]  kasan_save_track+0x18/0x40
[   11.376230]  kasan_save_alloc_info+0x3b/0x50
[   11.376391]  __kasan_kmalloc+0xb7/0xc0
[   11.376578]  __kmalloc_cache_noprof+0x189/0x420
[   11.376897]  krealloc_uaf+0xbb/0x5e0
[   11.377070]  kunit_try_run_case+0x1a5/0x480
[   11.377228]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.377475]  kthread+0x337/0x6f0
[   11.377636]  ret_from_fork+0x116/0x1d0
[   11.377822]  ret_from_fork_asm+0x1a/0x30
[   11.378067] 
[   11.378145] Freed by task 183:
[   11.378267]  kasan_save_stack+0x45/0x70
[   11.378471]  kasan_save_track+0x18/0x40
[   11.378779]  kasan_save_free_info+0x3f/0x60
[   11.378975]  __kasan_slab_free+0x56/0x70
[   11.379156]  kfree+0x222/0x3f0
[   11.379292]  krealloc_uaf+0x13d/0x5e0
[   11.379452]  kunit_try_run_case+0x1a5/0x480
[   11.379797]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.380061]  kthread+0x337/0x6f0
[   11.380200]  ret_from_fork+0x116/0x1d0
[   11.380354]  ret_from_fork_asm+0x1a/0x30
[   11.380565] 
[   11.380712] The buggy address belongs to the object at ffff888100a21e00
[   11.380712]  which belongs to the cache kmalloc-256 of size 256
[   11.381165] The buggy address is located 0 bytes inside of
[   11.381165]  freed 256-byte region [ffff888100a21e00, ffff888100a21f00)
[   11.381519] 
[   11.381601] The buggy address belongs to the physical page:
[   11.381853] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a20
[   11.382217] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.382562] flags: 0x200000000000040(head|node=0|zone=2)
[   11.382971] page_type: f5(slab)
[   11.383156] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.383466] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.383918] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.384226] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.384519] head: 0200000000000001 ffffea0004028801 00000000ffffffff 00000000ffffffff
[   11.384939] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   11.385254] page dumped because: kasan: bad access detected
[   11.385437] 
[   11.385506] Memory state around the buggy address:
[   11.385704]  ffff888100a21d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.386017]  ffff888100a21d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.386441] >ffff888100a21e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   11.386694]                    ^
[   11.386834]  ffff888100a21e80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   11.387163]  ffff888100a21f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.387391] ==================================================================
[   11.329267] ==================================================================
[   11.330124] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x1b8/0x5e0
[   11.330351] Read of size 1 at addr ffff888100a21e00 by task kunit_try_catch/183
[   11.330649] 
[   11.330910] CPU: 1 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   11.330957] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.330968] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.330987] Call Trace:
[   11.330999]  <TASK>
[   11.331049]  dump_stack_lvl+0x73/0xb0
[   11.331079]  print_report+0xd1/0x650
[   11.331102]  ? __virt_addr_valid+0x1db/0x2d0
[   11.331124]  ? krealloc_uaf+0x1b8/0x5e0
[   11.331143]  ? kasan_complete_mode_report_info+0x64/0x200
[   11.331164]  ? krealloc_uaf+0x1b8/0x5e0
[   11.331216]  kasan_report+0x141/0x180
[   11.331237]  ? krealloc_uaf+0x1b8/0x5e0
[   11.331260]  ? krealloc_uaf+0x1b8/0x5e0
[   11.331279]  __kasan_check_byte+0x3d/0x50
[   11.331300]  krealloc_noprof+0x3f/0x340
[   11.331322]  krealloc_uaf+0x1b8/0x5e0
[   11.331342]  ? __pfx_krealloc_uaf+0x10/0x10
[   11.331362]  ? finish_task_switch.isra.0+0x153/0x700
[   11.331394]  ? __switch_to+0x47/0xf50
[   11.331419]  ? __schedule+0x10cc/0x2b60
[   11.331469]  ? __pfx_read_tsc+0x10/0x10
[   11.331490]  ? ktime_get_ts64+0x86/0x230
[   11.331538]  kunit_try_run_case+0x1a5/0x480
[   11.331563]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.331625]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.331650]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.331671]  ? __kthread_parkme+0x82/0x180
[   11.331707]  ? preempt_count_sub+0x50/0x80
[   11.331728]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.331750]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.331772]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.331793]  kthread+0x337/0x6f0
[   11.331811]  ? trace_preempt_on+0x20/0xc0
[   11.331835]  ? __pfx_kthread+0x10/0x10
[   11.331855]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.331875]  ? calculate_sigpending+0x7b/0xa0
[   11.331897]  ? __pfx_kthread+0x10/0x10
[   11.331917]  ret_from_fork+0x116/0x1d0
[   11.331934]  ? __pfx_kthread+0x10/0x10
[   11.331953]  ret_from_fork_asm+0x1a/0x30
[   11.331982]  </TASK>
[   11.331993] 
[   11.344481] Allocated by task 183:
[   11.345241]  kasan_save_stack+0x45/0x70
[   11.345440]  kasan_save_track+0x18/0x40
[   11.345835]  kasan_save_alloc_info+0x3b/0x50
[   11.346175]  __kasan_kmalloc+0xb7/0xc0
[   11.346462]  __kmalloc_cache_noprof+0x189/0x420
[   11.346862]  krealloc_uaf+0xbb/0x5e0
[   11.347045]  kunit_try_run_case+0x1a5/0x480
[   11.347251]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.347502]  kthread+0x337/0x6f0
[   11.347967]  ret_from_fork+0x116/0x1d0
[   11.348146]  ret_from_fork_asm+0x1a/0x30
[   11.348543] 
[   11.348734] Freed by task 183:
[   11.348880]  kasan_save_stack+0x45/0x70
[   11.349212]  kasan_save_track+0x18/0x40
[   11.349492]  kasan_save_free_info+0x3f/0x60
[   11.350037]  __kasan_slab_free+0x56/0x70
[   11.350199]  kfree+0x222/0x3f0
[   11.350367]  krealloc_uaf+0x13d/0x5e0
[   11.350557]  kunit_try_run_case+0x1a5/0x480
[   11.351167]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.351430]  kthread+0x337/0x6f0
[   11.351814]  ret_from_fork+0x116/0x1d0
[   11.351994]  ret_from_fork_asm+0x1a/0x30
[   11.352317] 
[   11.352421] The buggy address belongs to the object at ffff888100a21e00
[   11.352421]  which belongs to the cache kmalloc-256 of size 256
[   11.353537] The buggy address is located 0 bytes inside of
[   11.353537]  freed 256-byte region [ffff888100a21e00, ffff888100a21f00)
[   11.354307] 
[   11.354422] The buggy address belongs to the physical page:
[   11.355076] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a20
[   11.355420] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.355882] flags: 0x200000000000040(head|node=0|zone=2)
[   11.356144] page_type: f5(slab)
[   11.356310] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.356598] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.357208] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.357497] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.358089] head: 0200000000000001 ffffea0004028801 00000000ffffffff 00000000ffffffff
[   11.358570] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   11.359023] page dumped because: kasan: bad access detected
[   11.359352] 
[   11.359462] Memory state around the buggy address:
[   11.359914]  ffff888100a21d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.360296]  ffff888100a21d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.360715] >ffff888100a21e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   11.361642]                    ^
[   11.361782]  ffff888100a21e80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   11.362002]  ffff888100a21f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.362217] ==================================================================