Hay
Date
July 18, 2025, 11:11 p.m.

Environment
qemu-arm64
qemu-x86_64

[   15.322888] ==================================================================
[   15.323222] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520
[   15.323278] Read of size 1 at addr fff00000c1735800 by task kunit_try_catch/164
[   15.323730] 
[   15.323782] CPU: 1 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   15.324024] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.324063] Hardware name: linux,dummy-virt (DT)
[   15.324402] Call trace:
[   15.324428]  show_stack+0x20/0x38 (C)
[   15.324482]  dump_stack_lvl+0x8c/0xd0
[   15.324572]  print_report+0x118/0x5d0
[   15.324658]  kasan_report+0xdc/0x128
[   15.324750]  __kasan_check_byte+0x54/0x70
[   15.324827]  krealloc_noprof+0x44/0x360
[   15.324899]  krealloc_uaf+0x180/0x520
[   15.325016]  kunit_try_run_case+0x170/0x3f0
[   15.325069]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.325159]  kthread+0x328/0x630
[   15.325234]  ret_from_fork+0x10/0x20
[   15.325297] 
[   15.325316] Allocated by task 164:
[   15.325609]  kasan_save_stack+0x3c/0x68
[   15.325797]  kasan_save_track+0x20/0x40
[   15.325842]  kasan_save_alloc_info+0x40/0x58
[   15.326252]  __kasan_kmalloc+0xd4/0xd8
[   15.326381]  __kmalloc_cache_noprof+0x16c/0x3c0
[   15.326499]  krealloc_uaf+0xc8/0x520
[   15.326574]  kunit_try_run_case+0x170/0x3f0
[   15.326943]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.327256]  kthread+0x328/0x630
[   15.327323]  ret_from_fork+0x10/0x20
[   15.327481] 
[   15.327504] Freed by task 164:
[   15.327550]  kasan_save_stack+0x3c/0x68
[   15.327932]  kasan_save_track+0x20/0x40
[   15.327977]  kasan_save_free_info+0x4c/0x78
[   15.328349]  __kasan_slab_free+0x6c/0x98
[   15.328475]  kfree+0x214/0x3c8
[   15.328512]  krealloc_uaf+0x12c/0x520
[   15.328548]  kunit_try_run_case+0x170/0x3f0
[   15.328745]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.328944]  kthread+0x328/0x630
[   15.329002]  ret_from_fork+0x10/0x20
[   15.329162] 
[   15.329345] The buggy address belongs to the object at fff00000c1735800
[   15.329345]  which belongs to the cache kmalloc-256 of size 256
[   15.329483] The buggy address is located 0 bytes inside of
[   15.329483]  freed 256-byte region [fff00000c1735800, fff00000c1735900)
[   15.329582] 
[   15.329639] The buggy address belongs to the physical page:
[   15.329670] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101734
[   15.329998] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   15.330073] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   15.330188] page_type: f5(slab)
[   15.330229] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   15.330277] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.330325] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   15.330387] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.330436] head: 0bfffe0000000001 ffffc1ffc305cd01 00000000ffffffff 00000000ffffffff
[   15.330482] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   15.330520] page dumped because: kasan: bad access detected
[   15.330560] 
[   15.330578] Memory state around the buggy address:
[   15.330611]  fff00000c1735700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.330661]  fff00000c1735780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.330703] >fff00000c1735800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.330755]                    ^
[   15.330782]  fff00000c1735880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.330824]  fff00000c1735900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.330861] ==================================================================
[   15.332564] ==================================================================
[   15.332706] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520
[   15.332759] Read of size 1 at addr fff00000c1735800 by task kunit_try_catch/164
[   15.332807] 
[   15.332835] CPU: 1 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   15.333093] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.333243] Hardware name: linux,dummy-virt (DT)
[   15.333369] Call trace:
[   15.333491]  show_stack+0x20/0x38 (C)
[   15.333670]  dump_stack_lvl+0x8c/0xd0
[   15.333800]  print_report+0x118/0x5d0
[   15.333852]  kasan_report+0xdc/0x128
[   15.333897]  __asan_report_load1_noabort+0x20/0x30
[   15.334080]  krealloc_uaf+0x4c8/0x520
[   15.334307]  kunit_try_run_case+0x170/0x3f0
[   15.334433]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.334642]  kthread+0x328/0x630
[   15.334769]  ret_from_fork+0x10/0x20
[   15.334853] 
[   15.334871] Allocated by task 164:
[   15.335378]  kasan_save_stack+0x3c/0x68
[   15.335500]  kasan_save_track+0x20/0x40
[   15.335578]  kasan_save_alloc_info+0x40/0x58
[   15.335714]  __kasan_kmalloc+0xd4/0xd8
[   15.336083]  __kmalloc_cache_noprof+0x16c/0x3c0
[   15.336160]  krealloc_uaf+0xc8/0x520
[   15.336268]  kunit_try_run_case+0x170/0x3f0
[   15.336308]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.336672]  kthread+0x328/0x630
[   15.336754]  ret_from_fork+0x10/0x20
[   15.336874] 
[   15.336940] Freed by task 164:
[   15.337054]  kasan_save_stack+0x3c/0x68
[   15.337134]  kasan_save_track+0x20/0x40
[   15.337261]  kasan_save_free_info+0x4c/0x78
[   15.337304]  __kasan_slab_free+0x6c/0x98
[   15.337398]  kfree+0x214/0x3c8
[   15.337910]  krealloc_uaf+0x12c/0x520
[   15.338007]  kunit_try_run_case+0x170/0x3f0
[   15.338111]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.338197]  kthread+0x328/0x630
[   15.338277]  ret_from_fork+0x10/0x20
[   15.338646] 
[   15.338692] The buggy address belongs to the object at fff00000c1735800
[   15.338692]  which belongs to the cache kmalloc-256 of size 256
[   15.338824] The buggy address is located 0 bytes inside of
[   15.338824]  freed 256-byte region [fff00000c1735800, fff00000c1735900)
[   15.338919] 
[   15.339064] The buggy address belongs to the physical page:
[   15.339142] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101734
[   15.339258] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   15.339325] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   15.339556] page_type: f5(slab)
[   15.339604] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   15.339668] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.339727] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   15.339778] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.339826] head: 0bfffe0000000001 ffffc1ffc305cd01 00000000ffffffff 00000000ffffffff
[   15.339873] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   15.339911] page dumped because: kasan: bad access detected
[   15.339949] 
[   15.339967] Memory state around the buggy address:
[   15.339997]  fff00000c1735700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.340039]  fff00000c1735780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.340079] >fff00000c1735800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.340129]                    ^
[   15.340157]  fff00000c1735880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.340206]  fff00000c1735900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.340257] ==================================================================

[   12.111428] ==================================================================
[   12.111963] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x1b8/0x5e0
[   12.112255] Read of size 1 at addr ffff888100344000 by task kunit_try_catch/183
[   12.112652] 
[   12.112860] CPU: 0 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.112907] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.112919] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.112947] Call Trace:
[   12.112960]  <TASK>
[   12.112976]  dump_stack_lvl+0x73/0xb0
[   12.113006]  print_report+0xd1/0x610
[   12.113027]  ? __virt_addr_valid+0x1db/0x2d0
[   12.113063]  ? krealloc_uaf+0x1b8/0x5e0
[   12.113084]  ? kasan_complete_mode_report_info+0x64/0x200
[   12.113106]  ? krealloc_uaf+0x1b8/0x5e0
[   12.113126]  kasan_report+0x141/0x180
[   12.113147]  ? krealloc_uaf+0x1b8/0x5e0
[   12.113171]  ? krealloc_uaf+0x1b8/0x5e0
[   12.113191]  __kasan_check_byte+0x3d/0x50
[   12.113212]  krealloc_noprof+0x3f/0x340
[   12.113235]  krealloc_uaf+0x1b8/0x5e0
[   12.113256]  ? __pfx_krealloc_uaf+0x10/0x10
[   12.113287]  ? finish_task_switch.isra.0+0x153/0x700
[   12.113310]  ? __switch_to+0x47/0xf50
[   12.113335]  ? __schedule+0x10cc/0x2b60
[   12.113357]  ? __pfx_read_tsc+0x10/0x10
[   12.113377]  ? ktime_get_ts64+0x86/0x230
[   12.113402]  kunit_try_run_case+0x1a5/0x480
[   12.113426]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.113448]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.113471]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.113493]  ? __kthread_parkme+0x82/0x180
[   12.113513]  ? preempt_count_sub+0x50/0x80
[   12.113535]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.113558]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.113581]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.113604]  kthread+0x337/0x6f0
[   12.113672]  ? trace_preempt_on+0x20/0xc0
[   12.113696]  ? __pfx_kthread+0x10/0x10
[   12.113715]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.113736]  ? calculate_sigpending+0x7b/0xa0
[   12.113760]  ? __pfx_kthread+0x10/0x10
[   12.113780]  ret_from_fork+0x116/0x1d0
[   12.113798]  ? __pfx_kthread+0x10/0x10
[   12.113817]  ret_from_fork_asm+0x1a/0x30
[   12.113847]  </TASK>
[   12.113857] 
[   12.121831] Allocated by task 183:
[   12.122020]  kasan_save_stack+0x45/0x70
[   12.122224]  kasan_save_track+0x18/0x40
[   12.122428]  kasan_save_alloc_info+0x3b/0x50
[   12.122867]  __kasan_kmalloc+0xb7/0xc0
[   12.123166]  __kmalloc_cache_noprof+0x189/0x420
[   12.123411]  krealloc_uaf+0xbb/0x5e0
[   12.123604]  kunit_try_run_case+0x1a5/0x480
[   12.123837]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.124247]  kthread+0x337/0x6f0
[   12.124427]  ret_from_fork+0x116/0x1d0
[   12.124603]  ret_from_fork_asm+0x1a/0x30
[   12.124767] 
[   12.124856] Freed by task 183:
[   12.125083]  kasan_save_stack+0x45/0x70
[   12.125304]  kasan_save_track+0x18/0x40
[   12.125472]  kasan_save_free_info+0x3f/0x60
[   12.125683]  __kasan_slab_free+0x56/0x70
[   12.125850]  kfree+0x222/0x3f0
[   12.125981]  krealloc_uaf+0x13d/0x5e0
[   12.126114]  kunit_try_run_case+0x1a5/0x480
[   12.126384]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.126631]  kthread+0x337/0x6f0
[   12.126815]  ret_from_fork+0x116/0x1d0
[   12.126978]  ret_from_fork_asm+0x1a/0x30
[   12.127356] 
[   12.127440] The buggy address belongs to the object at ffff888100344000
[   12.127440]  which belongs to the cache kmalloc-256 of size 256
[   12.127840] The buggy address is located 0 bytes inside of
[   12.127840]  freed 256-byte region [ffff888100344000, ffff888100344100)
[   12.128192] 
[   12.128299] The buggy address belongs to the physical page:
[   12.128550] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100344
[   12.129036] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.129384] flags: 0x200000000000040(head|node=0|zone=2)
[   12.129889] page_type: f5(slab)
[   12.130095] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.130400] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.130906] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.131369] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.131779] head: 0200000000000001 ffffea000400d101 00000000ffffffff 00000000ffffffff
[   12.132286] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   12.132671] page dumped because: kasan: bad access detected
[   12.132903] 
[   12.132977] Memory state around the buggy address:
[   12.133144]  ffff888100343f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.133700]  ffff888100343f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.134003] >ffff888100344000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.134291]                    ^
[   12.134415]  ffff888100344080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.134798]  ffff888100344100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.135012] ==================================================================
[   12.135745] ==================================================================
[   12.136203] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x53c/0x5e0
[   12.136534] Read of size 1 at addr ffff888100344000 by task kunit_try_catch/183
[   12.136821] 
[   12.136919] CPU: 0 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.136967] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.136978] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.136998] Call Trace:
[   12.137009]  <TASK>
[   12.137064]  dump_stack_lvl+0x73/0xb0
[   12.137093]  print_report+0xd1/0x610
[   12.137115]  ? __virt_addr_valid+0x1db/0x2d0
[   12.137137]  ? krealloc_uaf+0x53c/0x5e0
[   12.137157]  ? kasan_complete_mode_report_info+0x64/0x200
[   12.137179]  ? krealloc_uaf+0x53c/0x5e0
[   12.137200]  kasan_report+0x141/0x180
[   12.137221]  ? krealloc_uaf+0x53c/0x5e0
[   12.137246]  __asan_report_load1_noabort+0x18/0x20
[   12.137270]  krealloc_uaf+0x53c/0x5e0
[   12.137303]  ? __pfx_krealloc_uaf+0x10/0x10
[   12.137323]  ? finish_task_switch.isra.0+0x153/0x700
[   12.137345]  ? __switch_to+0x47/0xf50
[   12.137369]  ? __schedule+0x10cc/0x2b60
[   12.137390]  ? __pfx_read_tsc+0x10/0x10
[   12.137410]  ? ktime_get_ts64+0x86/0x230
[   12.137433]  kunit_try_run_case+0x1a5/0x480
[   12.137466]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.137487]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.137510]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.137533]  ? __kthread_parkme+0x82/0x180
[   12.137553]  ? preempt_count_sub+0x50/0x80
[   12.137575]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.137598]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.137620]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.137644]  kthread+0x337/0x6f0
[   12.137662]  ? trace_preempt_on+0x20/0xc0
[   12.137685]  ? __pfx_kthread+0x10/0x10
[   12.137704]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.137724]  ? calculate_sigpending+0x7b/0xa0
[   12.137748]  ? __pfx_kthread+0x10/0x10
[   12.137768]  ret_from_fork+0x116/0x1d0
[   12.137786]  ? __pfx_kthread+0x10/0x10
[   12.137805]  ret_from_fork_asm+0x1a/0x30
[   12.137834]  </TASK>
[   12.137844] 
[   12.145298] Allocated by task 183:
[   12.145428]  kasan_save_stack+0x45/0x70
[   12.145570]  kasan_save_track+0x18/0x40
[   12.145704]  kasan_save_alloc_info+0x3b/0x50
[   12.145853]  __kasan_kmalloc+0xb7/0xc0
[   12.145986]  __kmalloc_cache_noprof+0x189/0x420
[   12.146141]  krealloc_uaf+0xbb/0x5e0
[   12.146270]  kunit_try_run_case+0x1a5/0x480
[   12.146733]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.147354]  kthread+0x337/0x6f0
[   12.147586]  ret_from_fork+0x116/0x1d0
[   12.147777]  ret_from_fork_asm+0x1a/0x30
[   12.147973] 
[   12.148131] Freed by task 183:
[   12.148302]  kasan_save_stack+0x45/0x70
[   12.148557]  kasan_save_track+0x18/0x40
[   12.148749]  kasan_save_free_info+0x3f/0x60
[   12.148960]  __kasan_slab_free+0x56/0x70
[   12.149392]  kfree+0x222/0x3f0
[   12.149589]  krealloc_uaf+0x13d/0x5e0
[   12.149778]  kunit_try_run_case+0x1a5/0x480
[   12.149949]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.150359]  kthread+0x337/0x6f0
[   12.150561]  ret_from_fork+0x116/0x1d0
[   12.150705]  ret_from_fork_asm+0x1a/0x30
[   12.150844] 
[   12.150918] The buggy address belongs to the object at ffff888100344000
[   12.150918]  which belongs to the cache kmalloc-256 of size 256
[   12.151294] The buggy address is located 0 bytes inside of
[   12.151294]  freed 256-byte region [ffff888100344000, ffff888100344100)
[   12.151819] 
[   12.151914] The buggy address belongs to the physical page:
[   12.152190] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100344
[   12.152906] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.153203] flags: 0x200000000000040(head|node=0|zone=2)
[   12.153475] page_type: f5(slab)
[   12.153612] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.153842] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.154128] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.154727] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.155207] head: 0200000000000001 ffffea000400d101 00000000ffffffff 00000000ffffffff
[   12.155601] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   12.155892] page dumped because: kasan: bad access detected
[   12.156205] 
[   12.156301] Memory state around the buggy address:
[   12.156544]  ffff888100343f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.156826]  ffff888100343f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.158560] >ffff888100344000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.158811]                    ^
[   12.158930]  ffff888100344080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.159391]  ffff888100344100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.159960] ==================================================================