Date
May 30, 2025, 4:14 a.m.
Environment | |
---|---|
e850-96 | |
qemu-arm64 | |
qemu-x86_64 | |
x15 |
[ 25.922366] ================================================================== [ 25.932122] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520 [ 25.938717] Read of size 1 at addr ffff000803394a00 by task kunit_try_catch/208 [ 25.946007] [ 25.947491] CPU: 5 UID: 0 PID: 208 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 25.947539] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.947553] Hardware name: WinLink E850-96 board (DT) [ 25.947573] Call trace: [ 25.947589] show_stack+0x20/0x38 (C) [ 25.947623] dump_stack_lvl+0x8c/0xd0 [ 25.947658] print_report+0x118/0x608 [ 25.947693] kasan_report+0xdc/0x128 [ 25.947725] __kasan_check_byte+0x54/0x70 [ 25.947757] krealloc_noprof+0x44/0x360 [ 25.947793] krealloc_uaf+0x180/0x520 [ 25.947821] kunit_try_run_case+0x170/0x3f0 [ 25.947857] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.947898] kthread+0x328/0x630 [ 25.947924] ret_from_fork+0x10/0x20 [ 25.947959] [ 26.013715] Allocated by task 208: [ 26.017102] kasan_save_stack+0x3c/0x68 [ 26.020921] kasan_save_track+0x20/0x40 [ 26.024739] kasan_save_alloc_info+0x40/0x58 [ 26.028992] __kasan_kmalloc+0xd4/0xd8 [ 26.032725] __kmalloc_cache_noprof+0x15c/0x3c0 [ 26.037239] krealloc_uaf+0xc8/0x520 [ 26.040797] kunit_try_run_case+0x170/0x3f0 [ 26.044964] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.050433] kthread+0x328/0x630 [ 26.053645] ret_from_fork+0x10/0x20 [ 26.057204] [ 26.058681] Freed by task 208: [ 26.061717] kasan_save_stack+0x3c/0x68 [ 26.065537] kasan_save_track+0x20/0x40 [ 26.069356] kasan_save_free_info+0x4c/0x78 [ 26.073523] __kasan_slab_free+0x6c/0x98 [ 26.077429] kfree+0x214/0x3c8 [ 26.080467] krealloc_uaf+0x12c/0x520 [ 26.084114] kunit_try_run_case+0x170/0x3f0 [ 26.088280] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.093748] kthread+0x328/0x630 [ 26.096960] ret_from_fork+0x10/0x20 [ 26.100519] [ 26.101996] The buggy address belongs to the object at ffff000803394a00 [ 26.101996] which belongs to the cache kmalloc-256 of size 256 [ 26.114496] The buggy address is located 0 bytes inside of [ 26.114496] freed 256-byte region [ffff000803394a00, ffff000803394b00) [ 26.126560] [ 26.128040] The buggy address belongs to the physical page: [ 26.133596] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883394 [ 26.141580] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 26.149218] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 26.156162] page_type: f5(slab) [ 26.159298] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 26.167017] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.174746] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 26.182555] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.190368] head: 0bfffe0000000002 fffffdffe00ce501 00000000ffffffff 00000000ffffffff [ 26.198180] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 26.205986] page dumped because: kasan: bad access detected [ 26.211543] [ 26.213017] Memory state around the buggy address: [ 26.217796] ffff000803394900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.225000] ffff000803394980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.232205] >ffff000803394a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.239406] ^ [ 26.242621] ffff000803394a80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.249826] ffff000803394b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.257027] ================================================================== [ 26.264413] ================================================================== [ 26.271441] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520 [ 26.278034] Read of size 1 at addr ffff000803394a00 by task kunit_try_catch/208 [ 26.285325] [ 26.286808] CPU: 5 UID: 0 PID: 208 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 26.286853] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.286867] Hardware name: WinLink E850-96 board (DT) [ 26.286886] Call trace: [ 26.286896] show_stack+0x20/0x38 (C) [ 26.286927] dump_stack_lvl+0x8c/0xd0 [ 26.286962] print_report+0x118/0x608 [ 26.286996] kasan_report+0xdc/0x128 [ 26.287028] __asan_report_load1_noabort+0x20/0x30 [ 26.287058] krealloc_uaf+0x4c8/0x520 [ 26.287087] kunit_try_run_case+0x170/0x3f0 [ 26.287120] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.287158] kthread+0x328/0x630 [ 26.287183] ret_from_fork+0x10/0x20 [ 26.287213] [ 26.349994] Allocated by task 208: [ 26.353381] kasan_save_stack+0x3c/0x68 [ 26.357199] kasan_save_track+0x20/0x40 [ 26.361019] kasan_save_alloc_info+0x40/0x58 [ 26.365272] __kasan_kmalloc+0xd4/0xd8 [ 26.369006] __kmalloc_cache_noprof+0x15c/0x3c0 [ 26.373518] krealloc_uaf+0xc8/0x520 [ 26.377077] kunit_try_run_case+0x170/0x3f0 [ 26.381244] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.386713] kthread+0x328/0x630 [ 26.389925] ret_from_fork+0x10/0x20 [ 26.393483] [ 26.394959] Freed by task 208: [ 26.397997] kasan_save_stack+0x3c/0x68 [ 26.401816] kasan_save_track+0x20/0x40 [ 26.405636] kasan_save_free_info+0x4c/0x78 [ 26.409802] __kasan_slab_free+0x6c/0x98 [ 26.413709] kfree+0x214/0x3c8 [ 26.416747] krealloc_uaf+0x12c/0x520 [ 26.420394] kunit_try_run_case+0x170/0x3f0 [ 26.424559] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.430028] kthread+0x328/0x630 [ 26.433240] ret_from_fork+0x10/0x20 [ 26.436798] [ 26.438275] The buggy address belongs to the object at ffff000803394a00 [ 26.438275] which belongs to the cache kmalloc-256 of size 256 [ 26.450776] The buggy address is located 0 bytes inside of [ 26.450776] freed 256-byte region [ffff000803394a00, ffff000803394b00) [ 26.462840] [ 26.464317] The buggy address belongs to the physical page: [ 26.469873] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883394 [ 26.477857] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 26.485497] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 26.492440] page_type: f5(slab) [ 26.495574] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 26.503297] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.511024] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 26.518835] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.526648] head: 0bfffe0000000002 fffffdffe00ce501 00000000ffffffff 00000000ffffffff [ 26.534460] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 26.542266] page dumped because: kasan: bad access detected [ 26.547822] [ 26.549297] Memory state around the buggy address: [ 26.554075] ffff000803394900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.561279] ffff000803394980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.568484] >ffff000803394a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.575685] ^ [ 26.578901] ffff000803394a80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.586105] ffff000803394b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.593307] ==================================================================
[ 24.671288] ================================================================== [ 24.671546] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520 [ 24.671673] Read of size 1 at addr fff00000c5fb2200 by task kunit_try_catch/165 [ 24.671804] [ 24.671880] CPU: 0 UID: 0 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 24.672195] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.672351] Hardware name: linux,dummy-virt (DT) [ 24.672739] Call trace: [ 24.672843] show_stack+0x20/0x38 (C) [ 24.672973] dump_stack_lvl+0x8c/0xd0 [ 24.673096] print_report+0x118/0x608 [ 24.673208] kasan_report+0xdc/0x128 [ 24.673336] __asan_report_load1_noabort+0x20/0x30 [ 24.673456] krealloc_uaf+0x4c8/0x520 [ 24.673566] kunit_try_run_case+0x170/0x3f0 [ 24.673704] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.673847] kthread+0x328/0x630 [ 24.674163] ret_from_fork+0x10/0x20 [ 24.674414] [ 24.674459] Allocated by task 165: [ 24.674620] kasan_save_stack+0x3c/0x68 [ 24.674802] kasan_save_track+0x20/0x40 [ 24.674912] kasan_save_alloc_info+0x40/0x58 [ 24.675021] __kasan_kmalloc+0xd4/0xd8 [ 24.675397] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.675828] krealloc_uaf+0xc8/0x520 [ 24.676100] kunit_try_run_case+0x170/0x3f0 [ 24.676459] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.676664] kthread+0x328/0x630 [ 24.676773] ret_from_fork+0x10/0x20 [ 24.676869] [ 24.676917] Freed by task 165: [ 24.677031] kasan_save_stack+0x3c/0x68 [ 24.677180] kasan_save_track+0x20/0x40 [ 24.677296] kasan_save_free_info+0x4c/0x78 [ 24.677630] __kasan_slab_free+0x6c/0x98 [ 24.677949] kfree+0x214/0x3c8 [ 24.678072] krealloc_uaf+0x12c/0x520 [ 24.678323] kunit_try_run_case+0x170/0x3f0 [ 24.678452] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.678733] kthread+0x328/0x630 [ 24.678825] ret_from_fork+0x10/0x20 [ 24.678925] [ 24.678975] The buggy address belongs to the object at fff00000c5fb2200 [ 24.678975] which belongs to the cache kmalloc-256 of size 256 [ 24.679159] The buggy address is located 0 bytes inside of [ 24.679159] freed 256-byte region [fff00000c5fb2200, fff00000c5fb2300) [ 24.679525] [ 24.679643] The buggy address belongs to the physical page: [ 24.679848] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105fb2 [ 24.680004] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.680142] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 24.680296] page_type: f5(slab) [ 24.680467] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 24.680610] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.680795] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 24.681328] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.681558] head: 0bfffe0000000001 ffffc1ffc317ec81 00000000ffffffff 00000000ffffffff [ 24.682067] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 24.682167] page dumped because: kasan: bad access detected [ 24.682238] [ 24.682401] Memory state around the buggy address: [ 24.682505] fff00000c5fb2100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.682615] fff00000c5fb2180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.682820] >fff00000c5fb2200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.683017] ^ [ 24.683160] fff00000c5fb2280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.683265] fff00000c5fb2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.683998] ================================================================== [ 24.649809] ================================================================== [ 24.650275] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520 [ 24.650556] Read of size 1 at addr fff00000c5fb2200 by task kunit_try_catch/165 [ 24.650750] [ 24.650838] CPU: 0 UID: 0 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 24.651155] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.651231] Hardware name: linux,dummy-virt (DT) [ 24.651313] Call trace: [ 24.651376] show_stack+0x20/0x38 (C) [ 24.651646] dump_stack_lvl+0x8c/0xd0 [ 24.652276] print_report+0x118/0x608 [ 24.652399] kasan_report+0xdc/0x128 [ 24.652650] __kasan_check_byte+0x54/0x70 [ 24.652789] krealloc_noprof+0x44/0x360 [ 24.652962] krealloc_uaf+0x180/0x520 [ 24.653088] kunit_try_run_case+0x170/0x3f0 [ 24.653440] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.653581] kthread+0x328/0x630 [ 24.653759] ret_from_fork+0x10/0x20 [ 24.654008] [ 24.654110] Allocated by task 165: [ 24.654243] kasan_save_stack+0x3c/0x68 [ 24.654346] kasan_save_track+0x20/0x40 [ 24.654443] kasan_save_alloc_info+0x40/0x58 [ 24.654534] __kasan_kmalloc+0xd4/0xd8 [ 24.654623] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.654943] krealloc_uaf+0xc8/0x520 [ 24.655061] kunit_try_run_case+0x170/0x3f0 [ 24.655174] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.655297] kthread+0x328/0x630 [ 24.655403] ret_from_fork+0x10/0x20 [ 24.655509] [ 24.655585] Freed by task 165: [ 24.655726] kasan_save_stack+0x3c/0x68 [ 24.656027] kasan_save_track+0x20/0x40 [ 24.656134] kasan_save_free_info+0x4c/0x78 [ 24.656269] __kasan_slab_free+0x6c/0x98 [ 24.656478] kfree+0x214/0x3c8 [ 24.656600] krealloc_uaf+0x12c/0x520 [ 24.656851] kunit_try_run_case+0x170/0x3f0 [ 24.657013] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.657120] kthread+0x328/0x630 [ 24.657209] ret_from_fork+0x10/0x20 [ 24.657360] [ 24.657544] The buggy address belongs to the object at fff00000c5fb2200 [ 24.657544] which belongs to the cache kmalloc-256 of size 256 [ 24.657956] The buggy address is located 0 bytes inside of [ 24.657956] freed 256-byte region [fff00000c5fb2200, fff00000c5fb2300) [ 24.658485] [ 24.658547] The buggy address belongs to the physical page: [ 24.658708] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105fb2 [ 24.658856] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.658962] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 24.659330] page_type: f5(slab) [ 24.659742] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 24.660527] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.661404] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 24.661986] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.662152] head: 0bfffe0000000001 ffffc1ffc317ec81 00000000ffffffff 00000000ffffffff [ 24.662425] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 24.662519] page dumped because: kasan: bad access detected [ 24.663344] [ 24.663969] Memory state around the buggy address: [ 24.664212] fff00000c5fb2100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.664621] fff00000c5fb2180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.664970] >fff00000c5fb2200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.665338] ^ [ 24.665413] fff00000c5fb2280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.666368] fff00000c5fb2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.666517] ==================================================================
[ 17.906663] ================================================================== [ 17.908080] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x1b8/0x5e0 [ 17.908974] Read of size 1 at addr ffff888100a24400 by task kunit_try_catch/181 [ 17.910476] [ 17.910718] CPU: 1 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT(voluntary) [ 17.910843] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.910871] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.910902] Call Trace: [ 17.910925] <TASK> [ 17.910972] dump_stack_lvl+0x73/0xb0 [ 17.911024] print_report+0xd1/0x650 [ 17.911086] ? __virt_addr_valid+0x1db/0x2d0 [ 17.911120] ? krealloc_uaf+0x1b8/0x5e0 [ 17.911150] ? kasan_complete_mode_report_info+0x64/0x200 [ 17.911210] ? krealloc_uaf+0x1b8/0x5e0 [ 17.911284] kasan_report+0x141/0x180 [ 17.911357] ? krealloc_uaf+0x1b8/0x5e0 [ 17.911396] ? krealloc_uaf+0x1b8/0x5e0 [ 17.911427] __kasan_check_byte+0x3d/0x50 [ 17.911457] krealloc_noprof+0x3f/0x340 [ 17.911486] ? stack_depot_save_flags+0x48b/0x840 [ 17.911524] krealloc_uaf+0x1b8/0x5e0 [ 17.911555] ? __pfx_krealloc_uaf+0x10/0x10 [ 17.911585] ? finish_task_switch.isra.0+0x153/0x700 [ 17.911615] ? __switch_to+0x47/0xf50 [ 17.911649] ? __schedule+0x10cc/0x2b60 [ 17.911683] ? __pfx_read_tsc+0x10/0x10 [ 17.911712] ? ktime_get_ts64+0x86/0x230 [ 17.911747] kunit_try_run_case+0x1a5/0x480 [ 17.911806] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.911834] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.911870] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.911904] ? __kthread_parkme+0x82/0x180 [ 17.911931] ? preempt_count_sub+0x50/0x80 [ 17.911962] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.911989] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.912023] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.912134] kthread+0x337/0x6f0 [ 17.912220] ? trace_preempt_on+0x20/0xc0 [ 17.912302] ? __pfx_kthread+0x10/0x10 [ 17.912406] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.912469] ? calculate_sigpending+0x7b/0xa0 [ 17.912507] ? __pfx_kthread+0x10/0x10 [ 17.912537] ret_from_fork+0x116/0x1d0 [ 17.912564] ? __pfx_kthread+0x10/0x10 [ 17.912592] ret_from_fork_asm+0x1a/0x30 [ 17.912633] </TASK> [ 17.912648] [ 17.935863] Allocated by task 181: [ 17.936887] kasan_save_stack+0x45/0x70 [ 17.937253] kasan_save_track+0x18/0x40 [ 17.937628] kasan_save_alloc_info+0x3b/0x50 [ 17.938428] __kasan_kmalloc+0xb7/0xc0 [ 17.938722] __kmalloc_cache_noprof+0x189/0x420 [ 17.939703] krealloc_uaf+0xbb/0x5e0 [ 17.940267] kunit_try_run_case+0x1a5/0x480 [ 17.940895] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.941776] kthread+0x337/0x6f0 [ 17.942210] ret_from_fork+0x116/0x1d0 [ 17.943251] ret_from_fork_asm+0x1a/0x30 [ 17.943616] [ 17.943969] Freed by task 181: [ 17.944488] kasan_save_stack+0x45/0x70 [ 17.945284] kasan_save_track+0x18/0x40 [ 17.945670] kasan_save_free_info+0x3f/0x60 [ 17.946639] __kasan_slab_free+0x56/0x70 [ 17.947781] kfree+0x222/0x3f0 [ 17.948126] krealloc_uaf+0x13d/0x5e0 [ 17.948825] kunit_try_run_case+0x1a5/0x480 [ 17.949852] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.950368] kthread+0x337/0x6f0 [ 17.950713] ret_from_fork+0x116/0x1d0 [ 17.951100] ret_from_fork_asm+0x1a/0x30 [ 17.951545] [ 17.951759] The buggy address belongs to the object at ffff888100a24400 [ 17.951759] which belongs to the cache kmalloc-256 of size 256 [ 17.953453] The buggy address is located 0 bytes inside of [ 17.953453] freed 256-byte region [ffff888100a24400, ffff888100a24500) [ 17.955494] [ 17.956142] The buggy address belongs to the physical page: [ 17.956960] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a24 [ 17.958121] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.959021] flags: 0x200000000000040(head|node=0|zone=2) [ 17.959564] page_type: f5(slab) [ 17.959906] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 17.960527] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.961100] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 17.961951] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.962676] head: 0200000000000001 ffffea0004028901 00000000ffffffff 00000000ffffffff [ 17.963368] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 17.964115] page dumped because: kasan: bad access detected [ 17.964682] [ 17.965092] Memory state around the buggy address: [ 17.965686] ffff888100a24300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.966517] ffff888100a24380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.967147] >ffff888100a24400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.967937] ^ [ 17.968401] ffff888100a24480: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.969272] ffff888100a24500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.970187] ================================================================== [ 17.971492] ================================================================== [ 17.972266] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x53c/0x5e0 [ 17.973004] Read of size 1 at addr ffff888100a24400 by task kunit_try_catch/181 [ 17.973725] [ 17.974013] CPU: 1 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT(voluntary) [ 17.974160] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.974198] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.974252] Call Trace: [ 17.974311] <TASK> [ 17.974359] dump_stack_lvl+0x73/0xb0 [ 17.974440] print_report+0xd1/0x650 [ 17.974517] ? __virt_addr_valid+0x1db/0x2d0 [ 17.974599] ? krealloc_uaf+0x53c/0x5e0 [ 17.974669] ? kasan_complete_mode_report_info+0x64/0x200 [ 17.974759] ? krealloc_uaf+0x53c/0x5e0 [ 17.974836] kasan_report+0x141/0x180 [ 17.974914] ? krealloc_uaf+0x53c/0x5e0 [ 17.975000] __asan_report_load1_noabort+0x18/0x20 [ 17.975095] krealloc_uaf+0x53c/0x5e0 [ 17.975173] ? __pfx_krealloc_uaf+0x10/0x10 [ 17.975251] ? finish_task_switch.isra.0+0x153/0x700 [ 17.975327] ? __switch_to+0x47/0xf50 [ 17.975409] ? __schedule+0x10cc/0x2b60 [ 17.975488] ? __pfx_read_tsc+0x10/0x10 [ 17.975561] ? ktime_get_ts64+0x86/0x230 [ 17.975644] kunit_try_run_case+0x1a5/0x480 [ 17.975719] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.975786] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.975873] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.975952] ? __kthread_parkme+0x82/0x180 [ 17.976022] ? preempt_count_sub+0x50/0x80 [ 17.976246] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.976299] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.976339] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.976375] kthread+0x337/0x6f0 [ 17.976402] ? trace_preempt_on+0x20/0xc0 [ 17.976434] ? __pfx_kthread+0x10/0x10 [ 17.976462] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.976494] ? calculate_sigpending+0x7b/0xa0 [ 17.976527] ? __pfx_kthread+0x10/0x10 [ 17.976556] ret_from_fork+0x116/0x1d0 [ 17.976579] ? __pfx_kthread+0x10/0x10 [ 17.976607] ret_from_fork_asm+0x1a/0x30 [ 17.976647] </TASK> [ 17.976661] [ 17.996496] Allocated by task 181: [ 17.996886] kasan_save_stack+0x45/0x70 [ 17.997724] kasan_save_track+0x18/0x40 [ 17.998093] kasan_save_alloc_info+0x3b/0x50 [ 17.998692] __kasan_kmalloc+0xb7/0xc0 [ 17.999414] __kmalloc_cache_noprof+0x189/0x420 [ 17.999824] krealloc_uaf+0xbb/0x5e0 [ 18.000630] kunit_try_run_case+0x1a5/0x480 [ 18.001075] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.001981] kthread+0x337/0x6f0 [ 18.002858] ret_from_fork+0x116/0x1d0 [ 18.003471] ret_from_fork_asm+0x1a/0x30 [ 18.004099] [ 18.004316] Freed by task 181: [ 18.004637] kasan_save_stack+0x45/0x70 [ 18.005237] kasan_save_track+0x18/0x40 [ 18.005722] kasan_save_free_info+0x3f/0x60 [ 18.006137] __kasan_slab_free+0x56/0x70 [ 18.006635] kfree+0x222/0x3f0 [ 18.007509] krealloc_uaf+0x13d/0x5e0 [ 18.007796] kunit_try_run_case+0x1a5/0x480 [ 18.008631] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.009463] kthread+0x337/0x6f0 [ 18.010007] ret_from_fork+0x116/0x1d0 [ 18.010470] ret_from_fork_asm+0x1a/0x30 [ 18.011269] [ 18.011425] The buggy address belongs to the object at ffff888100a24400 [ 18.011425] which belongs to the cache kmalloc-256 of size 256 [ 18.012301] The buggy address is located 0 bytes inside of [ 18.012301] freed 256-byte region [ffff888100a24400, ffff888100a24500) [ 18.013739] [ 18.014007] The buggy address belongs to the physical page: [ 18.015196] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a24 [ 18.015797] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 18.016569] flags: 0x200000000000040(head|node=0|zone=2) [ 18.017428] page_type: f5(slab) [ 18.017964] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 18.018783] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.019696] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 18.020820] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.021827] head: 0200000000000001 ffffea0004028901 00000000ffffffff 00000000ffffffff [ 18.022693] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 18.023584] page dumped because: kasan: bad access detected [ 18.024312] [ 18.024524] Memory state around the buggy address: [ 18.025248] ffff888100a24300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.026378] ffff888100a24380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.027051] >ffff888100a24400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.027902] ^ [ 18.028414] ffff888100a24480: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.029122] ffff888100a24500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.030508] ==================================================================
[ 52.864105] ================================================================== [ 52.871368] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x580/0x5d4 [ 52.878051] Read of size 1 at addr cb2c8000 by task kunit_try_catch/216 [ 52.884704] [ 52.886199] CPU: 0 UID: 0 PID: 216 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 52.886230] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 52.886230] Hardware name: Generic DRA74X (Flattened Device Tree) [ 52.886260] Call trace: [ 52.886260] unwind_backtrace from show_stack+0x18/0x1c [ 52.886291] show_stack from dump_stack_lvl+0x70/0x90 [ 52.886322] dump_stack_lvl from print_report+0x158/0x528 [ 52.886322] print_report from kasan_report+0xdc/0x118 [ 52.886352] kasan_report from krealloc_uaf+0x580/0x5d4 [ 52.886383] krealloc_uaf from kunit_try_run_case+0x22c/0x5a8 [ 52.886413] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 52.886444] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 52.886444] kthread from ret_from_fork+0x14/0x20 [ 52.886474] Exception stack(0xf2243fb0 to 0xf2243ff8) [ 52.886474] 3fa0: 00000000 00000000 00000000 00000000 [ 52.886505] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 52.886505] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 52.886535] [ 52.991394] Allocated by task 216: [ 52.994812] kasan_save_track+0x30/0x5c [ 52.998687] __kasan_kmalloc+0x8c/0x94 [ 53.002471] krealloc_uaf+0xd8/0x5d4 [ 53.006072] kunit_try_run_case+0x22c/0x5a8 [ 53.010284] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 53.015808] kthread+0x464/0x810 [ 53.019073] ret_from_fork+0x14/0x20 [ 53.022674] [ 53.024169] Freed by task 216: [ 53.027252] kasan_save_track+0x30/0x5c [ 53.031127] kasan_save_free_info+0x3c/0x48 [ 53.035339] __kasan_slab_free+0x40/0x50 [ 53.039276] kfree+0xe8/0x384 [ 53.042297] krealloc_uaf+0x180/0x5d4 [ 53.045989] kunit_try_run_case+0x22c/0x5a8 [ 53.050201] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 53.055725] kthread+0x464/0x810 [ 53.058990] ret_from_fork+0x14/0x20 [ 53.062591] [ 53.064086] The buggy address belongs to the object at cb2c8000 [ 53.064086] which belongs to the cache kmalloc-256 of size 256 [ 53.075988] The buggy address is located 0 bytes inside of [ 53.075988] freed 256-byte region [cb2c8000, cb2c8100) [ 53.086730] [ 53.088256] The buggy address belongs to the physical page: [ 53.093841] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8b2c8 [ 53.101135] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 53.108825] flags: 0x40(head|zone=0) [ 53.112426] page_type: f5(slab) [ 53.115600] raw: 00000040 c7001500 00000122 00000000 00000000 80100010 f5000000 00000000 [ 53.123748] raw: 00000000 [ 53.126373] head: 00000040 c7001500 00000122 00000000 00000000 80100010 f5000000 00000000 [ 53.134613] head: 00000000 00000001 eeb91421 ffffffff 00000000 ffffffff 00000000 ffffffff [ 53.142852] head: 00000000 00000002 [ 53.146362] page dumped because: kasan: bad access detected [ 53.151977] [ 53.153472] Memory state around the buggy address: [ 53.158294] cb2c7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.164855] cb2c7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.171417] >cb2c8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 53.178009] ^ [ 53.180541] cb2c8080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 53.187133] cb2c8100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.193695] ================================================================== [ 52.510711] ================================================================== [ 52.522369] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x208/0x5d4 [ 52.529022] Read of size 1 at addr cb2c8000 by task kunit_try_catch/216 [ 52.535675] [ 52.537200] CPU: 0 UID: 0 PID: 216 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 52.537200] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 52.537231] Hardware name: Generic DRA74X (Flattened Device Tree) [ 52.537231] Call trace: [ 52.537231] unwind_backtrace from show_stack+0x18/0x1c [ 52.537261] show_stack from dump_stack_lvl+0x70/0x90 [ 52.537292] dump_stack_lvl from print_report+0x158/0x528 [ 52.537322] print_report from kasan_report+0xdc/0x118 [ 52.537322] kasan_report from __kasan_check_byte+0x34/0x3c [ 52.537353] __kasan_check_byte from krealloc_noprof+0x30/0x2e4 [ 52.537384] krealloc_noprof from krealloc_uaf+0x208/0x5d4 [ 52.537384] krealloc_uaf from kunit_try_run_case+0x22c/0x5a8 [ 52.537414] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 52.537445] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 52.537475] kthread from ret_from_fork+0x14/0x20 [ 52.537506] Exception stack(0xf2243fb0 to 0xf2243ff8) [ 52.537506] 3fa0: 00000000 00000000 00000000 00000000 [ 52.537536] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 52.537536] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 52.537536] [ 52.654205] Allocated by task 216: [ 52.657653] kasan_save_track+0x30/0x5c [ 52.661499] __kasan_kmalloc+0x8c/0x94 [ 52.665283] krealloc_uaf+0xd8/0x5d4 [ 52.668884] kunit_try_run_case+0x22c/0x5a8 [ 52.673126] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 52.678649] kthread+0x464/0x810 [ 52.681884] ret_from_fork+0x14/0x20 [ 52.685485] [ 52.687011] Freed by task 216: [ 52.690063] kasan_save_track+0x30/0x5c [ 52.693939] kasan_save_free_info+0x3c/0x48 [ 52.698150] __kasan_slab_free+0x40/0x50 [ 52.702117] kfree+0xe8/0x384 [ 52.705108] krealloc_uaf+0x180/0x5d4 [ 52.708801] kunit_try_run_case+0x22c/0x5a8 [ 52.713012] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 52.718536] kthread+0x464/0x810 [ 52.721801] ret_from_fork+0x14/0x20 [ 52.725402] [ 52.726898] The buggy address belongs to the object at cb2c8000 [ 52.726898] which belongs to the cache kmalloc-256 of size 256 [ 52.738800] The buggy address is located 0 bytes inside of [ 52.738800] freed 256-byte region [cb2c8000, cb2c8100) [ 52.749572] [ 52.751068] The buggy address belongs to the physical page: [ 52.756683] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8b2c8 [ 52.763946] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 52.771667] flags: 0x40(head|zone=0) [ 52.775268] page_type: f5(slab) [ 52.778442] raw: 00000040 c7001500 00000122 00000000 00000000 80100010 f5000000 00000000 [ 52.786560] raw: 00000000 [ 52.789215] head: 00000040 c7001500 00000122 00000000 00000000 80100010 f5000000 00000000 [ 52.797454] head: 00000000 00000001 eeb91421 ffffffff 00000000 ffffffff 00000000 ffffffff [ 52.805694] head: 00000000 00000002 [ 52.809204] page dumped because: kasan: bad access detected [ 52.814788] [ 52.816314] Memory state around the buggy address: [ 52.821136] cb2c7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.827697] cb2c7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.834259] >cb2c8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 52.840850] ^ [ 52.843383] cb2c8080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 52.849945] cb2c8100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.856536] ==================================================================