Date
June 3, 2025, 7:38 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 | |
x86 |
[ 18.309173] ================================================================== [ 18.309476] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520 [ 18.309558] Read of size 1 at addr fff00000c1828a00 by task kunit_try_catch/164 [ 18.309645] [ 18.309694] CPU: 1 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 18.309778] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.309840] Hardware name: linux,dummy-virt (DT) [ 18.309888] Call trace: [ 18.309910] show_stack+0x20/0x38 (C) [ 18.309964] dump_stack_lvl+0x8c/0xd0 [ 18.310031] print_report+0x118/0x608 [ 18.310103] kasan_report+0xdc/0x128 [ 18.310167] __asan_report_load1_noabort+0x20/0x30 [ 18.310234] krealloc_uaf+0x4c8/0x520 [ 18.310280] kunit_try_run_case+0x170/0x3f0 [ 18.310355] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.310409] kthread+0x328/0x630 [ 18.310465] ret_from_fork+0x10/0x20 [ 18.310530] [ 18.310736] Allocated by task 164: [ 18.310771] kasan_save_stack+0x3c/0x68 [ 18.310813] kasan_save_track+0x20/0x40 [ 18.310849] kasan_save_alloc_info+0x40/0x58 [ 18.310885] __kasan_kmalloc+0xd4/0xd8 [ 18.310937] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.310977] krealloc_uaf+0xc8/0x520 [ 18.311027] kunit_try_run_case+0x170/0x3f0 [ 18.311095] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.311139] kthread+0x328/0x630 [ 18.311199] ret_from_fork+0x10/0x20 [ 18.311254] [ 18.311272] Freed by task 164: [ 18.311298] kasan_save_stack+0x3c/0x68 [ 18.311334] kasan_save_track+0x20/0x40 [ 18.311501] kasan_save_free_info+0x4c/0x78 [ 18.311560] __kasan_slab_free+0x6c/0x98 [ 18.311597] kfree+0x214/0x3c8 [ 18.311629] krealloc_uaf+0x12c/0x520 [ 18.311683] kunit_try_run_case+0x170/0x3f0 [ 18.311720] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.311762] kthread+0x328/0x630 [ 18.311794] ret_from_fork+0x10/0x20 [ 18.311828] [ 18.311847] The buggy address belongs to the object at fff00000c1828a00 [ 18.311847] which belongs to the cache kmalloc-256 of size 256 [ 18.311995] The buggy address is located 0 bytes inside of [ 18.311995] freed 256-byte region [fff00000c1828a00, fff00000c1828b00) [ 18.312114] [ 18.312183] The buggy address belongs to the physical page: [ 18.312248] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101828 [ 18.312346] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 18.312494] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 18.312592] page_type: f5(slab) [ 18.312666] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 18.312749] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.312855] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 18.312941] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.313011] head: 0bfffe0000000001 ffffc1ffc3060a01 00000000ffffffff 00000000ffffffff [ 18.313071] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 18.313376] page dumped because: kasan: bad access detected [ 18.313482] [ 18.313598] Memory state around the buggy address: [ 18.313667] fff00000c1828900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.313740] fff00000c1828980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.313862] >fff00000c1828a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.313970] ^ [ 18.314066] fff00000c1828a80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.314123] fff00000c1828b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.314231] ================================================================== [ 18.302606] ================================================================== [ 18.302683] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520 [ 18.302747] Read of size 1 at addr fff00000c1828a00 by task kunit_try_catch/164 [ 18.302798] [ 18.302839] CPU: 1 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT [ 18.303017] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.303060] Hardware name: linux,dummy-virt (DT) [ 18.303090] Call trace: [ 18.303112] show_stack+0x20/0x38 (C) [ 18.303177] dump_stack_lvl+0x8c/0xd0 [ 18.303225] print_report+0x118/0x608 [ 18.303271] kasan_report+0xdc/0x128 [ 18.303328] __kasan_check_byte+0x54/0x70 [ 18.303436] krealloc_noprof+0x44/0x360 [ 18.303485] krealloc_uaf+0x180/0x520 [ 18.303728] kunit_try_run_case+0x170/0x3f0 [ 18.303794] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.303869] kthread+0x328/0x630 [ 18.303916] ret_from_fork+0x10/0x20 [ 18.303965] [ 18.303984] Allocated by task 164: [ 18.304012] kasan_save_stack+0x3c/0x68 [ 18.304053] kasan_save_track+0x20/0x40 [ 18.304090] kasan_save_alloc_info+0x40/0x58 [ 18.304126] __kasan_kmalloc+0xd4/0xd8 [ 18.304268] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.304340] krealloc_uaf+0xc8/0x520 [ 18.304389] kunit_try_run_case+0x170/0x3f0 [ 18.304496] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.304575] kthread+0x328/0x630 [ 18.304694] ret_from_fork+0x10/0x20 [ 18.304786] [ 18.304860] Freed by task 164: [ 18.304943] kasan_save_stack+0x3c/0x68 [ 18.305000] kasan_save_track+0x20/0x40 [ 18.305037] kasan_save_free_info+0x4c/0x78 [ 18.305299] __kasan_slab_free+0x6c/0x98 [ 18.305376] kfree+0x214/0x3c8 [ 18.305456] krealloc_uaf+0x12c/0x520 [ 18.305568] kunit_try_run_case+0x170/0x3f0 [ 18.305651] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.305765] kthread+0x328/0x630 [ 18.305810] ret_from_fork+0x10/0x20 [ 18.305845] [ 18.305877] The buggy address belongs to the object at fff00000c1828a00 [ 18.305877] which belongs to the cache kmalloc-256 of size 256 [ 18.306266] The buggy address is located 0 bytes inside of [ 18.306266] freed 256-byte region [fff00000c1828a00, fff00000c1828b00) [ 18.306365] [ 18.306405] The buggy address belongs to the physical page: [ 18.306450] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101828 [ 18.306511] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 18.306555] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 18.306624] page_type: f5(slab) [ 18.306663] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 18.306712] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.306761] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 18.306808] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.306863] head: 0bfffe0000000001 ffffc1ffc3060a01 00000000ffffffff 00000000ffffffff [ 18.306911] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 18.306949] page dumped because: kasan: bad access detected [ 18.306980] [ 18.306997] Memory state around the buggy address: [ 18.307045] fff00000c1828900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.307087] fff00000c1828980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.307128] >fff00000c1828a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.307165] ^ [ 18.307201] fff00000c1828a80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.307244] fff00000c1828b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.307291] ==================================================================
[ 14.392279] ================================================================== [ 14.393492] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x53c/0x5e0 [ 14.393828] Read of size 1 at addr ffff888100342000 by task kunit_try_catch/181 [ 14.394106] [ 14.394263] CPU: 0 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 14.394417] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.394447] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.394513] Call Trace: [ 14.394558] <TASK> [ 14.394599] dump_stack_lvl+0x73/0xb0 [ 14.394666] print_report+0xd1/0x650 [ 14.394787] ? __virt_addr_valid+0x1db/0x2d0 [ 14.394859] ? krealloc_uaf+0x53c/0x5e0 [ 14.394902] ? kasan_complete_mode_report_info+0x64/0x200 [ 14.394941] ? krealloc_uaf+0x53c/0x5e0 [ 14.394979] kasan_report+0x141/0x180 [ 14.395021] ? krealloc_uaf+0x53c/0x5e0 [ 14.395076] __asan_report_load1_noabort+0x18/0x20 [ 14.395151] krealloc_uaf+0x53c/0x5e0 [ 14.395231] ? __pfx_krealloc_uaf+0x10/0x10 [ 14.395281] ? finish_task_switch.isra.0+0x153/0x700 [ 14.395332] ? __switch_to+0x47/0xf50 [ 14.395429] ? __schedule+0x10cc/0x2b60 [ 14.395502] ? __pfx_read_tsc+0x10/0x10 [ 14.395548] ? ktime_get_ts64+0x86/0x230 [ 14.395583] kunit_try_run_case+0x1a5/0x480 [ 14.395610] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.395632] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.395659] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.395705] ? __kthread_parkme+0x82/0x180 [ 14.395772] ? preempt_count_sub+0x50/0x80 [ 14.395811] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.395849] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.395893] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.395938] kthread+0x337/0x6f0 [ 14.395980] ? trace_preempt_on+0x20/0xc0 [ 14.396025] ? __pfx_kthread+0x10/0x10 [ 14.396070] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.396118] ? calculate_sigpending+0x7b/0xa0 [ 14.396167] ? __pfx_kthread+0x10/0x10 [ 14.396228] ret_from_fork+0x116/0x1d0 [ 14.396269] ? __pfx_kthread+0x10/0x10 [ 14.396324] ret_from_fork_asm+0x1a/0x30 [ 14.396395] </TASK> [ 14.396420] [ 14.410151] Allocated by task 181: [ 14.410436] kasan_save_stack+0x45/0x70 [ 14.411284] kasan_save_track+0x18/0x40 [ 14.411551] kasan_save_alloc_info+0x3b/0x50 [ 14.412274] __kasan_kmalloc+0xb7/0xc0 [ 14.412595] __kmalloc_cache_noprof+0x189/0x420 [ 14.413168] krealloc_uaf+0xbb/0x5e0 [ 14.413467] kunit_try_run_case+0x1a5/0x480 [ 14.414066] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.414567] kthread+0x337/0x6f0 [ 14.414847] ret_from_fork+0x116/0x1d0 [ 14.415106] ret_from_fork_asm+0x1a/0x30 [ 14.415801] [ 14.416101] Freed by task 181: [ 14.416522] kasan_save_stack+0x45/0x70 [ 14.417204] kasan_save_track+0x18/0x40 [ 14.417542] kasan_save_free_info+0x3f/0x60 [ 14.418199] __kasan_slab_free+0x56/0x70 [ 14.418579] kfree+0x222/0x3f0 [ 14.419102] krealloc_uaf+0x13d/0x5e0 [ 14.419835] kunit_try_run_case+0x1a5/0x480 [ 14.420333] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.420564] kthread+0x337/0x6f0 [ 14.420811] ret_from_fork+0x116/0x1d0 [ 14.421577] ret_from_fork_asm+0x1a/0x30 [ 14.422271] [ 14.422407] The buggy address belongs to the object at ffff888100342000 [ 14.422407] which belongs to the cache kmalloc-256 of size 256 [ 14.423555] The buggy address is located 0 bytes inside of [ 14.423555] freed 256-byte region [ffff888100342000, ffff888100342100) [ 14.424028] [ 14.424159] The buggy address belongs to the physical page: [ 14.424383] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100342 [ 14.425120] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 14.425613] flags: 0x200000000000040(head|node=0|zone=2) [ 14.426074] page_type: f5(slab) [ 14.426475] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 14.426876] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 14.427780] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 14.428569] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 14.429512] head: 0200000000000001 ffffea000400d081 00000000ffffffff 00000000ffffffff [ 14.430261] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 14.430845] page dumped because: kasan: bad access detected [ 14.431482] [ 14.431638] Memory state around the buggy address: [ 14.432024] ffff888100341f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.432669] ffff888100341f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.432889] >ffff888100342000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.433343] ^ [ 14.433696] ffff888100342080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.434565] ffff888100342100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.435383] ================================================================== [ 14.341532] ================================================================== [ 14.342795] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x1b8/0x5e0 [ 14.343418] Read of size 1 at addr ffff888100342000 by task kunit_try_catch/181 [ 14.344652] [ 14.345015] CPU: 0 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 14.345132] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.345161] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.345206] Call Trace: [ 14.345237] <TASK> [ 14.345281] dump_stack_lvl+0x73/0xb0 [ 14.345355] print_report+0xd1/0x650 [ 14.345405] ? __virt_addr_valid+0x1db/0x2d0 [ 14.345467] ? krealloc_uaf+0x1b8/0x5e0 [ 14.345522] ? kasan_complete_mode_report_info+0x64/0x200 [ 14.345580] ? krealloc_uaf+0x1b8/0x5e0 [ 14.345624] kasan_report+0x141/0x180 [ 14.345671] ? krealloc_uaf+0x1b8/0x5e0 [ 14.345720] ? krealloc_uaf+0x1b8/0x5e0 [ 14.345824] __kasan_check_byte+0x3d/0x50 [ 14.345863] krealloc_noprof+0x3f/0x340 [ 14.345900] krealloc_uaf+0x1b8/0x5e0 [ 14.345931] ? __pfx_krealloc_uaf+0x10/0x10 [ 14.345960] ? finish_task_switch.isra.0+0x153/0x700 [ 14.345993] ? __switch_to+0x47/0xf50 [ 14.346029] ? __schedule+0x10cc/0x2b60 [ 14.346063] ? __pfx_read_tsc+0x10/0x10 [ 14.346094] ? ktime_get_ts64+0x86/0x230 [ 14.346133] kunit_try_run_case+0x1a5/0x480 [ 14.346172] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.346200] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.346239] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.346278] ? __kthread_parkme+0x82/0x180 [ 14.346310] ? preempt_count_sub+0x50/0x80 [ 14.346345] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.346375] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.346412] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.346492] kthread+0x337/0x6f0 [ 14.346518] ? trace_preempt_on+0x20/0xc0 [ 14.346545] ? __pfx_kthread+0x10/0x10 [ 14.346567] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.346592] ? calculate_sigpending+0x7b/0xa0 [ 14.346618] ? __pfx_kthread+0x10/0x10 [ 14.346641] ret_from_fork+0x116/0x1d0 [ 14.346661] ? __pfx_kthread+0x10/0x10 [ 14.346687] ret_from_fork_asm+0x1a/0x30 [ 14.346778] </TASK> [ 14.346802] [ 14.363373] Allocated by task 181: [ 14.363672] kasan_save_stack+0x45/0x70 [ 14.364254] kasan_save_track+0x18/0x40 [ 14.365043] kasan_save_alloc_info+0x3b/0x50 [ 14.365422] __kasan_kmalloc+0xb7/0xc0 [ 14.366070] __kmalloc_cache_noprof+0x189/0x420 [ 14.366416] krealloc_uaf+0xbb/0x5e0 [ 14.366960] kunit_try_run_case+0x1a5/0x480 [ 14.367171] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.368140] kthread+0x337/0x6f0 [ 14.368392] ret_from_fork+0x116/0x1d0 [ 14.368564] ret_from_fork_asm+0x1a/0x30 [ 14.368905] [ 14.369402] Freed by task 181: [ 14.369705] kasan_save_stack+0x45/0x70 [ 14.370609] kasan_save_track+0x18/0x40 [ 14.371070] kasan_save_free_info+0x3f/0x60 [ 14.371869] __kasan_slab_free+0x56/0x70 [ 14.372172] kfree+0x222/0x3f0 [ 14.372357] krealloc_uaf+0x13d/0x5e0 [ 14.372744] kunit_try_run_case+0x1a5/0x480 [ 14.373351] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.374168] kthread+0x337/0x6f0 [ 14.374382] ret_from_fork+0x116/0x1d0 [ 14.375033] ret_from_fork_asm+0x1a/0x30 [ 14.375611] [ 14.375796] The buggy address belongs to the object at ffff888100342000 [ 14.375796] which belongs to the cache kmalloc-256 of size 256 [ 14.377236] The buggy address is located 0 bytes inside of [ 14.377236] freed 256-byte region [ffff888100342000, ffff888100342100) [ 14.378341] [ 14.378765] The buggy address belongs to the physical page: [ 14.379083] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100342 [ 14.379647] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 14.380439] flags: 0x200000000000040(head|node=0|zone=2) [ 14.380876] page_type: f5(slab) [ 14.381319] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 14.381657] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 14.382216] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 14.382974] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 14.383660] head: 0200000000000001 ffffea000400d081 00000000ffffffff 00000000ffffffff [ 14.384767] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 14.385086] page dumped because: kasan: bad access detected [ 14.385262] [ 14.385395] Memory state around the buggy address: [ 14.386446] ffff888100341f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.387353] ffff888100341f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.388171] >ffff888100342000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.388878] ^ [ 14.389202] ffff888100342080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.390370] ffff888100342100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.390878] ==================================================================
[ 26.108866] ================================================================== [ 26.120448] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x1b8/0x5e0 [ 26.127061] Read of size 1 at addr ffff888104476600 by task kunit_try_catch/204 [ 26.134383] [ 26.135904] CPU: 2 UID: 0 PID: 204 Comm: kunit_try_catch Tainted: G S B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 26.135913] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 26.135915] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 26.135919] Call Trace: [ 26.135920] <TASK> [ 26.135922] dump_stack_lvl+0x73/0xb0 [ 26.135926] print_report+0xd1/0x650 [ 26.135930] ? __virt_addr_valid+0x1db/0x2d0 [ 26.135934] ? krealloc_uaf+0x1b8/0x5e0 [ 26.135938] ? kasan_complete_mode_report_info+0x64/0x200 [ 26.135942] ? krealloc_uaf+0x1b8/0x5e0 [ 26.135946] kasan_report+0x141/0x180 [ 26.135950] ? krealloc_uaf+0x1b8/0x5e0 [ 26.135955] ? krealloc_uaf+0x1b8/0x5e0 [ 26.135959] __kasan_check_byte+0x3d/0x50 [ 26.135963] krealloc_noprof+0x3f/0x340 [ 26.135967] krealloc_uaf+0x1b8/0x5e0 [ 26.135971] ? __pfx_krealloc_uaf+0x10/0x10 [ 26.135975] ? finish_task_switch.isra.0+0x153/0x700 [ 26.135979] ? __switch_to+0x544/0xf50 [ 26.135984] ? __schedule+0x10cc/0x2b60 [ 26.135988] ? ktime_get_ts64+0x83/0x230 [ 26.135992] kunit_try_run_case+0x1a2/0x480 [ 26.135996] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.135999] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.136004] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.136009] ? __kthread_parkme+0x82/0x180 [ 26.136012] ? preempt_count_sub+0x50/0x80 [ 26.136016] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.136020] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 26.136024] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.136029] kthread+0x334/0x6f0 [ 26.136032] ? trace_preempt_on+0x20/0xc0 [ 26.136036] ? __pfx_kthread+0x10/0x10 [ 26.136040] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.136044] ? calculate_sigpending+0x7b/0xa0 [ 26.136048] ? __pfx_kthread+0x10/0x10 [ 26.136052] ret_from_fork+0x113/0x1d0 [ 26.136055] ? __pfx_kthread+0x10/0x10 [ 26.136059] ret_from_fork_asm+0x1a/0x30 [ 26.136065] </TASK> [ 26.136066] [ 26.315116] Allocated by task 204: [ 26.318524] kasan_save_stack+0x45/0x70 [ 26.322382] kasan_save_track+0x18/0x40 [ 26.326243] kasan_save_alloc_info+0x3b/0x50 [ 26.330517] __kasan_kmalloc+0xb7/0xc0 [ 26.334269] __kmalloc_cache_noprof+0x189/0x420 [ 26.338803] krealloc_uaf+0xbb/0x5e0 [ 26.342383] kunit_try_run_case+0x1a2/0x480 [ 26.346592] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 26.351993] kthread+0x334/0x6f0 [ 26.355227] ret_from_fork+0x113/0x1d0 [ 26.358977] ret_from_fork_asm+0x1a/0x30 [ 26.362904] [ 26.364413] Freed by task 204: [ 26.367471] kasan_save_stack+0x45/0x70 [ 26.371310] kasan_save_track+0x18/0x40 [ 26.375151] kasan_save_free_info+0x3f/0x60 [ 26.379334] __kasan_slab_free+0x56/0x70 [ 26.383261] kfree+0x222/0x3f0 [ 26.386320] krealloc_uaf+0x13d/0x5e0 [ 26.389987] kunit_try_run_case+0x1a2/0x480 [ 26.394174] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 26.399581] kthread+0x334/0x6f0 [ 26.402813] ret_from_fork+0x113/0x1d0 [ 26.406566] ret_from_fork_asm+0x1a/0x30 [ 26.410493] [ 26.411992] The buggy address belongs to the object at ffff888104476600 [ 26.411992] which belongs to the cache kmalloc-256 of size 256 [ 26.424506] The buggy address is located 0 bytes inside of [ 26.424506] freed 256-byte region [ffff888104476600, ffff888104476700) [ 26.436585] [ 26.438085] The buggy address belongs to the physical page: [ 26.443659] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104476 [ 26.451667] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 26.459326] flags: 0x200000000000040(head|node=0|zone=2) [ 26.464640] page_type: f5(slab) [ 26.467789] raw: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000 [ 26.475535] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.483275] head: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000 [ 26.491108] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.498935] head: 0200000000000001 ffffea0004111d81 00000000ffffffff 00000000ffffffff [ 26.506769] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 26.514595] page dumped because: kasan: bad access detected [ 26.520167] [ 26.521666] Memory state around the buggy address: [ 26.526458] ffff888104476500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.533678] ffff888104476580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.540898] >ffff888104476600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.548116] ^ [ 26.551350] ffff888104476680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.558593] ffff888104476700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.565813] ================================================================== [ 26.573064] ================================================================== [ 26.580296] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x53c/0x5e0 [ 26.586915] Read of size 1 at addr ffff888104476600 by task kunit_try_catch/204 [ 26.594222] [ 26.595723] CPU: 2 UID: 0 PID: 204 Comm: kunit_try_catch Tainted: G S B N 6.15.0-next-20250603 #1 PREEMPT(voluntary) [ 26.595732] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 26.595734] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 26.595738] Call Trace: [ 26.595739] <TASK> [ 26.595741] dump_stack_lvl+0x73/0xb0 [ 26.595745] print_report+0xd1/0x650 [ 26.595749] ? __virt_addr_valid+0x1db/0x2d0 [ 26.595752] ? krealloc_uaf+0x53c/0x5e0 [ 26.595756] ? kasan_complete_mode_report_info+0x64/0x200 [ 26.595760] ? krealloc_uaf+0x53c/0x5e0 [ 26.595764] kasan_report+0x141/0x180 [ 26.595768] ? krealloc_uaf+0x53c/0x5e0 [ 26.595773] __asan_report_load1_noabort+0x18/0x20 [ 26.595777] krealloc_uaf+0x53c/0x5e0 [ 26.595781] ? __pfx_krealloc_uaf+0x10/0x10 [ 26.595785] ? finish_task_switch.isra.0+0x153/0x700 [ 26.595789] ? __switch_to+0x544/0xf50 [ 26.595793] ? __schedule+0x10cc/0x2b60 [ 26.595798] ? ktime_get_ts64+0x83/0x230 [ 26.595802] kunit_try_run_case+0x1a2/0x480 [ 26.595806] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.595809] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.595814] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.595818] ? __kthread_parkme+0x82/0x180 [ 26.595821] ? preempt_count_sub+0x50/0x80 [ 26.595826] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.595829] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 26.595834] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.595838] kthread+0x334/0x6f0 [ 26.595842] ? trace_preempt_on+0x20/0xc0 [ 26.595846] ? __pfx_kthread+0x10/0x10 [ 26.595849] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.595853] ? calculate_sigpending+0x7b/0xa0 [ 26.595858] ? __pfx_kthread+0x10/0x10 [ 26.595862] ret_from_fork+0x113/0x1d0 [ 26.595865] ? __pfx_kthread+0x10/0x10 [ 26.595868] ret_from_fork_asm+0x1a/0x30 [ 26.595874] </TASK> [ 26.595876] [ 26.768088] Allocated by task 204: [ 26.771496] kasan_save_stack+0x45/0x70 [ 26.775333] kasan_save_track+0x18/0x40 [ 26.779173] kasan_save_alloc_info+0x3b/0x50 [ 26.783446] __kasan_kmalloc+0xb7/0xc0 [ 26.787199] __kmalloc_cache_noprof+0x189/0x420 [ 26.791732] krealloc_uaf+0xbb/0x5e0 [ 26.795311] kunit_try_run_case+0x1a2/0x480 [ 26.799498] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 26.804898] kthread+0x334/0x6f0 [ 26.808128] ret_from_fork+0x113/0x1d0 [ 26.811882] ret_from_fork_asm+0x1a/0x30 [ 26.815808] [ 26.817306] Freed by task 204: [ 26.820383] kasan_save_stack+0x45/0x70 [ 26.824250] kasan_save_track+0x18/0x40 [ 26.828089] kasan_save_free_info+0x3f/0x60 [ 26.832273] __kasan_slab_free+0x56/0x70 [ 26.836200] kfree+0x222/0x3f0 [ 26.839260] krealloc_uaf+0x13d/0x5e0 [ 26.842932] kunit_try_run_case+0x1a2/0x480 [ 26.847120] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 26.852519] kthread+0x334/0x6f0 [ 26.855751] ret_from_fork+0x113/0x1d0 [ 26.859504] ret_from_fork_asm+0x1a/0x30 [ 26.863429] [ 26.864929] The buggy address belongs to the object at ffff888104476600 [ 26.864929] which belongs to the cache kmalloc-256 of size 256 [ 26.877436] The buggy address is located 0 bytes inside of [ 26.877436] freed 256-byte region [ffff888104476600, ffff888104476700) [ 26.889516] [ 26.891017] The buggy address belongs to the physical page: [ 26.896589] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104476 [ 26.904596] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 26.912258] flags: 0x200000000000040(head|node=0|zone=2) [ 26.917569] page_type: f5(slab) [ 26.920717] raw: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000 [ 26.928456] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.936195] head: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000 [ 26.944030] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.951863] head: 0200000000000001 ffffea0004111d81 00000000ffffffff 00000000ffffffff [ 26.959691] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 26.967524] page dumped because: kasan: bad access detected [ 26.973095] [ 26.974596] Memory state around the buggy address: [ 26.979401] ffff888104476500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.986634] ffff888104476580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.993853] >ffff888104476600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 27.001072] ^ [ 27.004306] ffff888104476680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 27.011525] ffff888104476700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.018741] ==================================================================