Hay
Date
July 19, 2025, 11:12 p.m.

Environment
qemu-arm64
qemu-x86_64

[   15.160144] ==================================================================
[   15.160233] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520
[   15.160388] Read of size 1 at addr fff00000c5c3ca00 by task kunit_try_catch/164
[   15.160436] 
[   15.160471] CPU: 1 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   15.160778] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.160864] Hardware name: linux,dummy-virt (DT)
[   15.160990] Call trace:
[   15.161013]  show_stack+0x20/0x38 (C)
[   15.161064]  dump_stack_lvl+0x8c/0xd0
[   15.161121]  print_report+0x118/0x5d0
[   15.161326]  kasan_report+0xdc/0x128
[   15.161372]  __kasan_check_byte+0x54/0x70
[   15.161418]  krealloc_noprof+0x44/0x360
[   15.161464]  krealloc_uaf+0x180/0x520
[   15.161507]  kunit_try_run_case+0x170/0x3f0
[   15.161553]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.161613]  kthread+0x328/0x630
[   15.161655]  ret_from_fork+0x10/0x20
[   15.161711] 
[   15.161730] Allocated by task 164:
[   15.161759]  kasan_save_stack+0x3c/0x68
[   15.161799]  kasan_save_track+0x20/0x40
[   15.161835]  kasan_save_alloc_info+0x40/0x58
[   15.161874]  __kasan_kmalloc+0xd4/0xd8
[   15.161909]  __kmalloc_cache_noprof+0x16c/0x3c0
[   15.161947]  krealloc_uaf+0xc8/0x520
[   15.161981]  kunit_try_run_case+0x170/0x3f0
[   15.162017]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.162058]  kthread+0x328/0x630
[   15.162089]  ret_from_fork+0x10/0x20
[   15.162124] 
[   15.162142] Freed by task 164:
[   15.162167]  kasan_save_stack+0x3c/0x68
[   15.162213]  kasan_save_track+0x20/0x40
[   15.162249]  kasan_save_free_info+0x4c/0x78
[   15.162287]  __kasan_slab_free+0x6c/0x98
[   15.162382]  kfree+0x214/0x3c8
[   15.162423]  krealloc_uaf+0x12c/0x520
[   15.162457]  kunit_try_run_case+0x170/0x3f0
[   15.162493]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.162706]  kthread+0x328/0x630
[   15.162828]  ret_from_fork+0x10/0x20
[   15.162863] 
[   15.162883] The buggy address belongs to the object at fff00000c5c3ca00
[   15.162883]  which belongs to the cache kmalloc-256 of size 256
[   15.163083] The buggy address is located 0 bytes inside of
[   15.163083]  freed 256-byte region [fff00000c5c3ca00, fff00000c5c3cb00)
[   15.163327] 
[   15.163348] The buggy address belongs to the physical page:
[   15.163415] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105c3c
[   15.163475] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   15.163661] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   15.163721] page_type: f5(slab)
[   15.163758] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   15.163806] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.163862] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   15.163909] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.164000] head: 0bfffe0000000001 ffffc1ffc3170f01 00000000ffffffff 00000000ffffffff
[   15.164085] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   15.164135] page dumped because: kasan: bad access detected
[   15.164166] 
[   15.164198] Memory state around the buggy address:
[   15.164241]  fff00000c5c3c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.164355]  fff00000c5c3c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.164413] >fff00000c5c3ca00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.164457]                    ^
[   15.164538]  fff00000c5c3ca80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.164579]  fff00000c5c3cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.164615] ==================================================================
[   15.165149] ==================================================================
[   15.165197] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520
[   15.165284] Read of size 1 at addr fff00000c5c3ca00 by task kunit_try_catch/164
[   15.165333] 
[   15.165360] CPU: 1 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   15.165437] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.165464] Hardware name: linux,dummy-virt (DT)
[   15.165494] Call trace:
[   15.165515]  show_stack+0x20/0x38 (C)
[   15.165563]  dump_stack_lvl+0x8c/0xd0
[   15.165616]  print_report+0x118/0x5d0
[   15.165666]  kasan_report+0xdc/0x128
[   15.165729]  __asan_report_load1_noabort+0x20/0x30
[   15.165779]  krealloc_uaf+0x4c8/0x520
[   15.165833]  kunit_try_run_case+0x170/0x3f0
[   15.165879]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.165931]  kthread+0x328/0x630
[   15.165971]  ret_from_fork+0x10/0x20
[   15.166139] 
[   15.166158] Allocated by task 164:
[   15.166187]  kasan_save_stack+0x3c/0x68
[   15.166241]  kasan_save_track+0x20/0x40
[   15.166277]  kasan_save_alloc_info+0x40/0x58
[   15.166436]  __kasan_kmalloc+0xd4/0xd8
[   15.166472]  __kmalloc_cache_noprof+0x16c/0x3c0
[   15.166509]  krealloc_uaf+0xc8/0x520
[   15.166542]  kunit_try_run_case+0x170/0x3f0
[   15.166584]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.166828]  kthread+0x328/0x630
[   15.166867]  ret_from_fork+0x10/0x20
[   15.166902] 
[   15.166952] Freed by task 164:
[   15.167059]  kasan_save_stack+0x3c/0x68
[   15.167101]  kasan_save_track+0x20/0x40
[   15.167296]  kasan_save_free_info+0x4c/0x78
[   15.167421]  __kasan_slab_free+0x6c/0x98
[   15.167529]  kfree+0x214/0x3c8
[   15.167566]  krealloc_uaf+0x12c/0x520
[   15.167644]  kunit_try_run_case+0x170/0x3f0
[   15.167734]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.167776]  kthread+0x328/0x630
[   15.167813]  ret_from_fork+0x10/0x20
[   15.167874] 
[   15.167892] The buggy address belongs to the object at fff00000c5c3ca00
[   15.167892]  which belongs to the cache kmalloc-256 of size 256
[   15.167947] The buggy address is located 0 bytes inside of
[   15.167947]  freed 256-byte region [fff00000c5c3ca00, fff00000c5c3cb00)
[   15.168133] 
[   15.168154] The buggy address belongs to the physical page:
[   15.168194] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105c3c
[   15.168245] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   15.168291] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   15.168340] page_type: f5(slab)
[   15.168377] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   15.168508] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.168581] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   15.168628] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.168718] head: 0bfffe0000000001 ffffc1ffc3170f01 00000000ffffffff 00000000ffffffff
[   15.168767] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   15.168824] page dumped because: kasan: bad access detected
[   15.168854] 
[   15.168886] Memory state around the buggy address:
[   15.168920]  fff00000c5c3c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.168962]  fff00000c5c3c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.169003] >fff00000c5c3ca00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.169039]                    ^
[   15.169079]  fff00000c5c3ca80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.169218]  fff00000c5c3cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.169255] ==================================================================

[   11.973270] ==================================================================
[   11.973918] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x53c/0x5e0
[   11.974243] Read of size 1 at addr ffff888100350600 by task kunit_try_catch/181
[   11.974824] 
[   11.975197] CPU: 0 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   11.975245] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.975256] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.975275] Call Trace:
[   11.975289]  <TASK>
[   11.975304]  dump_stack_lvl+0x73/0xb0
[   11.975334]  print_report+0xd1/0x610
[   11.975356]  ? __virt_addr_valid+0x1db/0x2d0
[   11.975409]  ? krealloc_uaf+0x53c/0x5e0
[   11.975429]  ? kasan_complete_mode_report_info+0x64/0x200
[   11.975464]  ? krealloc_uaf+0x53c/0x5e0
[   11.975484]  kasan_report+0x141/0x180
[   11.975505]  ? krealloc_uaf+0x53c/0x5e0
[   11.975530]  __asan_report_load1_noabort+0x18/0x20
[   11.975553]  krealloc_uaf+0x53c/0x5e0
[   11.975573]  ? __pfx_krealloc_uaf+0x10/0x10
[   11.975593]  ? finish_task_switch.isra.0+0x153/0x700
[   11.975613]  ? __switch_to+0x47/0xf50
[   11.975638]  ? __schedule+0x10cc/0x2b60
[   11.975659]  ? __pfx_read_tsc+0x10/0x10
[   11.975680]  ? ktime_get_ts64+0x86/0x230
[   11.975704]  kunit_try_run_case+0x1a5/0x480
[   11.975727]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.975748]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.975770]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.975792]  ? __kthread_parkme+0x82/0x180
[   11.975811]  ? preempt_count_sub+0x50/0x80
[   11.975832]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.975855]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.975876]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.975898]  kthread+0x337/0x6f0
[   11.975917]  ? trace_preempt_on+0x20/0xc0
[   11.975938]  ? __pfx_kthread+0x10/0x10
[   11.975957]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.975977]  ? calculate_sigpending+0x7b/0xa0
[   11.976000]  ? __pfx_kthread+0x10/0x10
[   11.976032]  ret_from_fork+0x116/0x1d0
[   11.976050]  ? __pfx_kthread+0x10/0x10
[   11.976069]  ret_from_fork_asm+0x1a/0x30
[   11.976098]  </TASK>
[   11.976107] 
[   11.986733] Allocated by task 181:
[   11.986916]  kasan_save_stack+0x45/0x70
[   11.987124]  kasan_save_track+0x18/0x40
[   11.987312]  kasan_save_alloc_info+0x3b/0x50
[   11.988218]  __kasan_kmalloc+0xb7/0xc0
[   11.988387]  __kmalloc_cache_noprof+0x189/0x420
[   11.988547]  krealloc_uaf+0xbb/0x5e0
[   11.988681]  kunit_try_run_case+0x1a5/0x480
[   11.988826]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.989014]  kthread+0x337/0x6f0
[   11.989184]  ret_from_fork+0x116/0x1d0
[   11.989370]  ret_from_fork_asm+0x1a/0x30
[   11.989566] 
[   11.989664] Freed by task 181:
[   11.989823]  kasan_save_stack+0x45/0x70
[   11.990150]  kasan_save_track+0x18/0x40
[   11.990572]  kasan_save_free_info+0x3f/0x60
[   11.990795]  __kasan_slab_free+0x56/0x70
[   11.990993]  kfree+0x222/0x3f0
[   11.991271]  krealloc_uaf+0x13d/0x5e0
[   11.991613]  kunit_try_run_case+0x1a5/0x480
[   11.992045]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.992325]  kthread+0x337/0x6f0
[   11.992760]  ret_from_fork+0x116/0x1d0
[   11.993025]  ret_from_fork_asm+0x1a/0x30
[   11.993163] 
[   11.993234] The buggy address belongs to the object at ffff888100350600
[   11.993234]  which belongs to the cache kmalloc-256 of size 256
[   11.994228] The buggy address is located 0 bytes inside of
[   11.994228]  freed 256-byte region [ffff888100350600, ffff888100350700)
[   11.995546] 
[   11.995735] The buggy address belongs to the physical page:
[   11.996069] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100350
[   11.996571] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.997139] flags: 0x200000000000040(head|node=0|zone=2)
[   11.997321] page_type: f5(slab)
[   11.997723] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.998438] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.999122] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.999943] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.001315] head: 0200000000000001 ffffea000400d401 00000000ffffffff 00000000ffffffff
[   12.002317] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   12.003158] page dumped because: kasan: bad access detected
[   12.004165] 
[   12.004705] Memory state around the buggy address:
[   12.005683]  ffff888100350500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.006112]  ffff888100350580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.006330] >ffff888100350600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.006867]                    ^
[   12.007061]  ffff888100350680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.007399]  ffff888100350700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.007699] ==================================================================
[   11.944083] ==================================================================
[   11.944877] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x1b8/0x5e0
[   11.945227] Read of size 1 at addr ffff888100350600 by task kunit_try_catch/181
[   11.945712] 
[   11.945832] CPU: 0 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   11.945876] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.945886] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.945907] Call Trace:
[   11.945917]  <TASK>
[   11.945931]  dump_stack_lvl+0x73/0xb0
[   11.945961]  print_report+0xd1/0x610
[   11.945982]  ? __virt_addr_valid+0x1db/0x2d0
[   11.946017]  ? krealloc_uaf+0x1b8/0x5e0
[   11.946038]  ? kasan_complete_mode_report_info+0x64/0x200
[   11.946059]  ? krealloc_uaf+0x1b8/0x5e0
[   11.946079]  kasan_report+0x141/0x180
[   11.946100]  ? krealloc_uaf+0x1b8/0x5e0
[   11.946123]  ? krealloc_uaf+0x1b8/0x5e0
[   11.946143]  __kasan_check_byte+0x3d/0x50
[   11.946163]  krealloc_noprof+0x3f/0x340
[   11.946185]  krealloc_uaf+0x1b8/0x5e0
[   11.946206]  ? __pfx_krealloc_uaf+0x10/0x10
[   11.946225]  ? finish_task_switch.isra.0+0x153/0x700
[   11.946245]  ? __switch_to+0x47/0xf50
[   11.946270]  ? __schedule+0x10cc/0x2b60
[   11.946292]  ? __pfx_read_tsc+0x10/0x10
[   11.946311]  ? ktime_get_ts64+0x86/0x230
[   11.946334]  kunit_try_run_case+0x1a5/0x480
[   11.946358]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.946379]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.946402]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.946452]  ? __kthread_parkme+0x82/0x180
[   11.946473]  ? preempt_count_sub+0x50/0x80
[   11.946494]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.946529]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.946551]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.946573]  kthread+0x337/0x6f0
[   11.946591]  ? trace_preempt_on+0x20/0xc0
[   11.946613]  ? __pfx_kthread+0x10/0x10
[   11.946633]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.946652]  ? calculate_sigpending+0x7b/0xa0
[   11.946675]  ? __pfx_kthread+0x10/0x10
[   11.946695]  ret_from_fork+0x116/0x1d0
[   11.946712]  ? __pfx_kthread+0x10/0x10
[   11.946732]  ret_from_fork_asm+0x1a/0x30
[   11.946761]  </TASK>
[   11.946771] 
[   11.955854] Allocated by task 181:
[   11.956054]  kasan_save_stack+0x45/0x70
[   11.956243]  kasan_save_track+0x18/0x40
[   11.956377]  kasan_save_alloc_info+0x3b/0x50
[   11.956586]  __kasan_kmalloc+0xb7/0xc0
[   11.957028]  __kmalloc_cache_noprof+0x189/0x420
[   11.957276]  krealloc_uaf+0xbb/0x5e0
[   11.957617]  kunit_try_run_case+0x1a5/0x480
[   11.957769]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.958100]  kthread+0x337/0x6f0
[   11.958324]  ret_from_fork+0x116/0x1d0
[   11.958488]  ret_from_fork_asm+0x1a/0x30
[   11.958626] 
[   11.958696] Freed by task 181:
[   11.958858]  kasan_save_stack+0x45/0x70
[   11.959128]  kasan_save_track+0x18/0x40
[   11.959324]  kasan_save_free_info+0x3f/0x60
[   11.959797]  __kasan_slab_free+0x56/0x70
[   11.959968]  kfree+0x222/0x3f0
[   11.960173]  krealloc_uaf+0x13d/0x5e0
[   11.960528]  kunit_try_run_case+0x1a5/0x480
[   11.960752]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.960928]  kthread+0x337/0x6f0
[   11.961103]  ret_from_fork+0x116/0x1d0
[   11.961296]  ret_from_fork_asm+0x1a/0x30
[   11.961783] 
[   11.961892] The buggy address belongs to the object at ffff888100350600
[   11.961892]  which belongs to the cache kmalloc-256 of size 256
[   11.962744] The buggy address is located 0 bytes inside of
[   11.962744]  freed 256-byte region [ffff888100350600, ffff888100350700)
[   11.963120] 
[   11.963222] The buggy address belongs to the physical page:
[   11.963973] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100350
[   11.964807] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.965265] flags: 0x200000000000040(head|node=0|zone=2)
[   11.965846] page_type: f5(slab)
[   11.965979] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.966612] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.967037] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.967647] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.967947] head: 0200000000000001 ffffea000400d401 00000000ffffffff 00000000ffffffff
[   11.968404] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   11.969024] page dumped because: kasan: bad access detected
[   11.969558] 
[   11.969655] Memory state around the buggy address:
[   11.969885]  ffff888100350500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.970192]  ffff888100350580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.970810] >ffff888100350600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   11.971060]                    ^
[   11.971423]  ffff888100350680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   11.971996]  ffff888100350700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.972472] ==================================================================