Date
July 2, 2025, 11:10 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 30.776716] ================================================================== [ 30.776770] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520 [ 30.776817] Read of size 1 at addr fff00000c8f6fc00 by task kunit_try_catch/197 [ 30.777140] [ 30.777202] CPU: 0 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250702 #1 PREEMPT [ 30.777299] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.777328] Hardware name: linux,dummy-virt (DT) [ 30.777412] Call trace: [ 30.777462] show_stack+0x20/0x38 (C) [ 30.777514] dump_stack_lvl+0x8c/0xd0 [ 30.777609] print_report+0x118/0x608 [ 30.777689] kasan_report+0xdc/0x128 [ 30.777758] __asan_report_load1_noabort+0x20/0x30 [ 30.777807] krealloc_uaf+0x4c8/0x520 [ 30.778008] kunit_try_run_case+0x170/0x3f0 [ 30.778203] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.778335] kthread+0x328/0x630 [ 30.778403] ret_from_fork+0x10/0x20 [ 30.778460] [ 30.778479] Allocated by task 197: [ 30.778514] kasan_save_stack+0x3c/0x68 [ 30.778630] kasan_save_track+0x20/0x40 [ 30.778689] kasan_save_alloc_info+0x40/0x58 [ 30.778725] __kasan_kmalloc+0xd4/0xd8 [ 30.778761] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.779035] krealloc_uaf+0xc8/0x520 [ 30.779172] kunit_try_run_case+0x170/0x3f0 [ 30.779219] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.779263] kthread+0x328/0x630 [ 30.779352] ret_from_fork+0x10/0x20 [ 30.779409] [ 30.779449] Freed by task 197: [ 30.779487] kasan_save_stack+0x3c/0x68 [ 30.779607] kasan_save_track+0x20/0x40 [ 30.779676] kasan_save_free_info+0x4c/0x78 [ 30.779800] __kasan_slab_free+0x6c/0x98 [ 30.779849] kfree+0x214/0x3c8 [ 30.779881] krealloc_uaf+0x12c/0x520 [ 30.780090] kunit_try_run_case+0x170/0x3f0 [ 30.780148] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.780312] kthread+0x328/0x630 [ 30.780426] ret_from_fork+0x10/0x20 [ 30.780483] [ 30.780528] The buggy address belongs to the object at fff00000c8f6fc00 [ 30.780528] which belongs to the cache kmalloc-256 of size 256 [ 30.780662] The buggy address is located 0 bytes inside of [ 30.780662] freed 256-byte region [fff00000c8f6fc00, fff00000c8f6fd00) [ 30.780739] [ 30.780758] The buggy address belongs to the physical page: [ 30.780788] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108f6e [ 30.781251] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.781375] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.781466] page_type: f5(slab) [ 30.781530] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.781649] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.781857] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.782082] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.782179] head: 0bfffe0000000001 ffffc1ffc323db81 00000000ffffffff 00000000ffffffff [ 30.782310] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 30.782380] page dumped because: kasan: bad access detected [ 30.782439] [ 30.782536] Memory state around the buggy address: [ 30.782607] fff00000c8f6fb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.782666] fff00000c8f6fb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.782960] >fff00000c8f6fc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.783107] ^ [ 30.783201] fff00000c8f6fc80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.783277] fff00000c8f6fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.783347] ================================================================== [ 30.768662] ================================================================== [ 30.768911] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520 [ 30.768996] Read of size 1 at addr fff00000c8f6fc00 by task kunit_try_catch/197 [ 30.769117] [ 30.769153] CPU: 0 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250702 #1 PREEMPT [ 30.769516] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.769630] Hardware name: linux,dummy-virt (DT) [ 30.769680] Call trace: [ 30.769719] show_stack+0x20/0x38 (C) [ 30.769818] dump_stack_lvl+0x8c/0xd0 [ 30.769897] print_report+0x118/0x608 [ 30.769958] kasan_report+0xdc/0x128 [ 30.770006] __kasan_check_byte+0x54/0x70 [ 30.770289] krealloc_noprof+0x44/0x360 [ 30.770380] krealloc_uaf+0x180/0x520 [ 30.770595] kunit_try_run_case+0x170/0x3f0 [ 30.770666] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.770911] kthread+0x328/0x630 [ 30.770983] ret_from_fork+0x10/0x20 [ 30.771033] [ 30.771265] Allocated by task 197: [ 30.771341] kasan_save_stack+0x3c/0x68 [ 30.771396] kasan_save_track+0x20/0x40 [ 30.771553] kasan_save_alloc_info+0x40/0x58 [ 30.771644] __kasan_kmalloc+0xd4/0xd8 [ 30.771695] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.771820] krealloc_uaf+0xc8/0x520 [ 30.771869] kunit_try_run_case+0x170/0x3f0 [ 30.771989] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.772074] kthread+0x328/0x630 [ 30.772119] ret_from_fork+0x10/0x20 [ 30.772156] [ 30.772194] Freed by task 197: [ 30.772576] kasan_save_stack+0x3c/0x68 [ 30.772648] kasan_save_track+0x20/0x40 [ 30.772782] kasan_save_free_info+0x4c/0x78 [ 30.772849] __kasan_slab_free+0x6c/0x98 [ 30.772972] kfree+0x214/0x3c8 [ 30.773072] krealloc_uaf+0x12c/0x520 [ 30.773140] kunit_try_run_case+0x170/0x3f0 [ 30.773253] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.773299] kthread+0x328/0x630 [ 30.773628] ret_from_fork+0x10/0x20 [ 30.773794] [ 30.773864] The buggy address belongs to the object at fff00000c8f6fc00 [ 30.773864] which belongs to the cache kmalloc-256 of size 256 [ 30.774064] The buggy address is located 0 bytes inside of [ 30.774064] freed 256-byte region [fff00000c8f6fc00, fff00000c8f6fd00) [ 30.774470] [ 30.774500] The buggy address belongs to the physical page: [ 30.774535] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108f6e [ 30.774589] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.774682] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.774735] page_type: f5(slab) [ 30.774787] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.774847] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.774895] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.774964] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.775029] head: 0bfffe0000000001 ffffc1ffc323db81 00000000ffffffff 00000000ffffffff [ 30.775086] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 30.775127] page dumped because: kasan: bad access detected [ 30.775166] [ 30.775185] Memory state around the buggy address: [ 30.775217] fff00000c8f6fb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.775259] fff00000c8f6fb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.775308] >fff00000c8f6fc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.775354] ^ [ 30.775382] fff00000c8f6fc80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.775428] fff00000c8f6fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.775466] ==================================================================
[ 32.558374] ================================================================== [ 32.558421] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520 [ 32.558467] Read of size 1 at addr fff00000c893f600 by task kunit_try_catch/195 [ 32.558515] [ 32.558542] CPU: 1 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250702 #1 PREEMPT [ 32.558625] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.558651] Hardware name: linux,dummy-virt (DT) [ 32.558681] Call trace: [ 32.558703] show_stack+0x20/0x38 (C) [ 32.558750] dump_stack_lvl+0x8c/0xd0 [ 32.558799] print_report+0x118/0x608 [ 32.559269] kasan_report+0xdc/0x128 [ 32.559341] __asan_report_load1_noabort+0x20/0x30 [ 32.559503] krealloc_uaf+0x4c8/0x520 [ 32.559550] kunit_try_run_case+0x170/0x3f0 [ 32.559598] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.559650] kthread+0x328/0x630 [ 32.559713] ret_from_fork+0x10/0x20 [ 32.559760] [ 32.559778] Allocated by task 195: [ 32.559855] kasan_save_stack+0x3c/0x68 [ 32.559904] kasan_save_track+0x20/0x40 [ 32.559942] kasan_save_alloc_info+0x40/0x58 [ 32.560135] __kasan_kmalloc+0xd4/0xd8 [ 32.560304] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.560350] krealloc_uaf+0xc8/0x520 [ 32.560385] kunit_try_run_case+0x170/0x3f0 [ 32.560422] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.560482] kthread+0x328/0x630 [ 32.560553] ret_from_fork+0x10/0x20 [ 32.560643] [ 32.560662] Freed by task 195: [ 32.560708] kasan_save_stack+0x3c/0x68 [ 32.560853] kasan_save_track+0x20/0x40 [ 32.560906] kasan_save_free_info+0x4c/0x78 [ 32.560981] __kasan_slab_free+0x6c/0x98 [ 32.561019] kfree+0x214/0x3c8 [ 32.561091] krealloc_uaf+0x12c/0x520 [ 32.561186] kunit_try_run_case+0x170/0x3f0 [ 32.561223] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.561265] kthread+0x328/0x630 [ 32.561296] ret_from_fork+0x10/0x20 [ 32.561330] [ 32.561348] The buggy address belongs to the object at fff00000c893f600 [ 32.561348] which belongs to the cache kmalloc-256 of size 256 [ 32.561695] The buggy address is located 0 bytes inside of [ 32.561695] freed 256-byte region [fff00000c893f600, fff00000c893f700) [ 32.561758] [ 32.561845] The buggy address belongs to the physical page: [ 32.561919] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10893e [ 32.562178] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 32.562224] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 32.562273] page_type: f5(slab) [ 32.562318] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122 [ 32.562636] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.562689] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122 [ 32.562758] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.562806] head: 0bfffe0000000001 ffffc1ffc3224f81 00000000ffffffff 00000000ffffffff [ 32.563035] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 32.563138] page dumped because: kasan: bad access detected [ 32.563180] [ 32.563197] Memory state around the buggy address: [ 32.563227] fff00000c893f500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.563275] fff00000c893f580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.563315] >fff00000c893f600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.563351] ^ [ 32.563378] fff00000c893f680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.563791] fff00000c893f700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.563849] ================================================================== [ 32.552140] ================================================================== [ 32.552229] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520 [ 32.552283] Read of size 1 at addr fff00000c893f600 by task kunit_try_catch/195 [ 32.552397] [ 32.552481] CPU: 1 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250702 #1 PREEMPT [ 32.552569] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.552594] Hardware name: linux,dummy-virt (DT) [ 32.552624] Call trace: [ 32.552646] show_stack+0x20/0x38 (C) [ 32.552996] dump_stack_lvl+0x8c/0xd0 [ 32.553068] print_report+0x118/0x608 [ 32.553116] kasan_report+0xdc/0x128 [ 32.553175] __kasan_check_byte+0x54/0x70 [ 32.553221] krealloc_noprof+0x44/0x360 [ 32.553269] krealloc_uaf+0x180/0x520 [ 32.553314] kunit_try_run_case+0x170/0x3f0 [ 32.553361] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.553412] kthread+0x328/0x630 [ 32.553454] ret_from_fork+0x10/0x20 [ 32.553506] [ 32.553524] Allocated by task 195: [ 32.553587] kasan_save_stack+0x3c/0x68 [ 32.553635] kasan_save_track+0x20/0x40 [ 32.553771] kasan_save_alloc_info+0x40/0x58 [ 32.553806] __kasan_kmalloc+0xd4/0xd8 [ 32.553848] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.553931] krealloc_uaf+0xc8/0x520 [ 32.554063] kunit_try_run_case+0x170/0x3f0 [ 32.554101] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.554144] kthread+0x328/0x630 [ 32.554191] ret_from_fork+0x10/0x20 [ 32.554351] [ 32.554446] Freed by task 195: [ 32.554538] kasan_save_stack+0x3c/0x68 [ 32.554617] kasan_save_track+0x20/0x40 [ 32.554659] kasan_save_free_info+0x4c/0x78 [ 32.554783] __kasan_slab_free+0x6c/0x98 [ 32.554820] kfree+0x214/0x3c8 [ 32.554852] krealloc_uaf+0x12c/0x520 [ 32.554887] kunit_try_run_case+0x170/0x3f0 [ 32.554924] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.554971] kthread+0x328/0x630 [ 32.555091] ret_from_fork+0x10/0x20 [ 32.555126] [ 32.555474] The buggy address belongs to the object at fff00000c893f600 [ 32.555474] which belongs to the cache kmalloc-256 of size 256 [ 32.556010] The buggy address is located 0 bytes inside of [ 32.556010] freed 256-byte region [fff00000c893f600, fff00000c893f700) [ 32.556240] [ 32.556265] The buggy address belongs to the physical page: [ 32.556298] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10893e [ 32.556350] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 32.556396] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 32.556542] page_type: f5(slab) [ 32.556584] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122 [ 32.556633] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.556681] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122 [ 32.556729] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.556777] head: 0bfffe0000000001 ffffc1ffc3224f81 00000000ffffffff 00000000ffffffff [ 32.556824] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 32.556862] page dumped because: kasan: bad access detected [ 32.556989] [ 32.557066] Memory state around the buggy address: [ 32.557378] fff00000c893f500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.557512] fff00000c893f580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.557620] >fff00000c893f600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.557657] ^ [ 32.557685] fff00000c893f680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.557726] fff00000c893f700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.557762] ==================================================================
[ 22.998009] ================================================================== [ 22.998503] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x1b8/0x5e0 [ 22.998982] Read of size 1 at addr ffff888100a03a00 by task kunit_try_catch/212 [ 23.000030] [ 23.000329] CPU: 1 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) [ 23.000382] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.000395] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.000415] Call Trace: [ 23.000427] <TASK> [ 23.000442] dump_stack_lvl+0x73/0xb0 [ 23.000471] print_report+0xd1/0x650 [ 23.000593] ? __virt_addr_valid+0x1db/0x2d0 [ 23.000622] ? krealloc_uaf+0x1b8/0x5e0 [ 23.000643] ? kasan_complete_mode_report_info+0x64/0x200 [ 23.000668] ? krealloc_uaf+0x1b8/0x5e0 [ 23.000760] kasan_report+0x141/0x180 [ 23.000783] ? krealloc_uaf+0x1b8/0x5e0 [ 23.000806] ? krealloc_uaf+0x1b8/0x5e0 [ 23.000827] __kasan_check_byte+0x3d/0x50 [ 23.000848] krealloc_noprof+0x3f/0x340 [ 23.000875] krealloc_uaf+0x1b8/0x5e0 [ 23.000896] ? __pfx_krealloc_uaf+0x10/0x10 [ 23.000972] ? ktime_get_ts64+0x13a/0x230 [ 23.000997] ? ktime_get_ts64+0x86/0x230 [ 23.001020] kunit_try_run_case+0x1a5/0x480 [ 23.001044] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.001067] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.001088] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.001109] ? __kthread_parkme+0x82/0x180 [ 23.001129] ? preempt_count_sub+0x50/0x80 [ 23.001152] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.001176] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.001199] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.001222] kthread+0x337/0x6f0 [ 23.001241] ? trace_preempt_on+0x20/0xc0 [ 23.001263] ? __pfx_kthread+0x10/0x10 [ 23.001283] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.001317] ? calculate_sigpending+0x7b/0xa0 [ 23.001340] ? __pfx_kthread+0x10/0x10 [ 23.001361] ret_from_fork+0x116/0x1d0 [ 23.001380] ? __pfx_kthread+0x10/0x10 [ 23.001399] ret_from_fork_asm+0x1a/0x30 [ 23.001429] </TASK> [ 23.001441] [ 23.013442] Allocated by task 212: [ 23.013813] kasan_save_stack+0x45/0x70 [ 23.014359] kasan_save_track+0x18/0x40 [ 23.014759] kasan_save_alloc_info+0x3b/0x50 [ 23.015059] __kasan_kmalloc+0xb7/0xc0 [ 23.015187] __kmalloc_cache_noprof+0x189/0x420 [ 23.015347] krealloc_uaf+0xbb/0x5e0 [ 23.015471] kunit_try_run_case+0x1a5/0x480 [ 23.015904] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.016375] kthread+0x337/0x6f0 [ 23.016725] ret_from_fork+0x116/0x1d0 [ 23.017059] ret_from_fork_asm+0x1a/0x30 [ 23.017419] [ 23.017570] Freed by task 212: [ 23.017887] kasan_save_stack+0x45/0x70 [ 23.018437] kasan_save_track+0x18/0x40 [ 23.018909] kasan_save_free_info+0x3f/0x60 [ 23.019244] __kasan_slab_free+0x56/0x70 [ 23.019390] kfree+0x222/0x3f0 [ 23.019515] krealloc_uaf+0x13d/0x5e0 [ 23.019830] kunit_try_run_case+0x1a5/0x480 [ 23.020339] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.020893] kthread+0x337/0x6f0 [ 23.021180] ret_from_fork+0x116/0x1d0 [ 23.021522] ret_from_fork_asm+0x1a/0x30 [ 23.021930] [ 23.022006] The buggy address belongs to the object at ffff888100a03a00 [ 23.022006] which belongs to the cache kmalloc-256 of size 256 [ 23.022426] The buggy address is located 0 bytes inside of [ 23.022426] freed 256-byte region [ffff888100a03a00, ffff888100a03b00) [ 23.022926] [ 23.023107] The buggy address belongs to the physical page: [ 23.023331] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a02 [ 23.023863] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.024130] flags: 0x200000000000040(head|node=0|zone=2) [ 23.024380] page_type: f5(slab) [ 23.024498] raw: 0200000000000040 ffff888100041b40 ffffea0004028480 dead000000000002 [ 23.024804] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.025168] head: 0200000000000040 ffff888100041b40 ffffea0004028480 dead000000000002 [ 23.025431] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.025859] head: 0200000000000001 ffffea0004028081 00000000ffffffff 00000000ffffffff [ 23.026212] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 23.026759] page dumped because: kasan: bad access detected [ 23.027091] [ 23.027174] Memory state around the buggy address: [ 23.027390] ffff888100a03900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.027619] ffff888100a03980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.027929] >ffff888100a03a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.028314] ^ [ 23.028454] ffff888100a03a80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.028704] ffff888100a03b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.029080] ================================================================== [ 23.029798] ================================================================== [ 23.030304] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x53c/0x5e0 [ 23.030642] Read of size 1 at addr ffff888100a03a00 by task kunit_try_catch/212 [ 23.031287] [ 23.031416] CPU: 1 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) [ 23.031463] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.031476] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.031496] Call Trace: [ 23.031509] <TASK> [ 23.031525] dump_stack_lvl+0x73/0xb0 [ 23.031556] print_report+0xd1/0x650 [ 23.031578] ? __virt_addr_valid+0x1db/0x2d0 [ 23.031601] ? krealloc_uaf+0x53c/0x5e0 [ 23.031621] ? kasan_complete_mode_report_info+0x64/0x200 [ 23.031647] ? krealloc_uaf+0x53c/0x5e0 [ 23.031667] kasan_report+0x141/0x180 [ 23.031688] ? krealloc_uaf+0x53c/0x5e0 [ 23.031713] __asan_report_load1_noabort+0x18/0x20 [ 23.031736] krealloc_uaf+0x53c/0x5e0 [ 23.031757] ? __pfx_krealloc_uaf+0x10/0x10 [ 23.031836] ? ktime_get_ts64+0x13a/0x230 [ 23.031859] ? ktime_get_ts64+0x86/0x230 [ 23.031882] kunit_try_run_case+0x1a5/0x480 [ 23.031908] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.031931] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.031953] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.031975] ? __kthread_parkme+0x82/0x180 [ 23.031995] ? preempt_count_sub+0x50/0x80 [ 23.032018] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.032042] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.032065] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.032089] kthread+0x337/0x6f0 [ 23.032107] ? trace_preempt_on+0x20/0xc0 [ 23.032130] ? __pfx_kthread+0x10/0x10 [ 23.032150] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.032173] ? calculate_sigpending+0x7b/0xa0 [ 23.032197] ? __pfx_kthread+0x10/0x10 [ 23.032218] ret_from_fork+0x116/0x1d0 [ 23.032237] ? __pfx_kthread+0x10/0x10 [ 23.032257] ret_from_fork_asm+0x1a/0x30 [ 23.032287] </TASK> [ 23.032298] [ 23.039214] Allocated by task 212: [ 23.039477] kasan_save_stack+0x45/0x70 [ 23.039630] kasan_save_track+0x18/0x40 [ 23.039987] kasan_save_alloc_info+0x3b/0x50 [ 23.040180] __kasan_kmalloc+0xb7/0xc0 [ 23.040343] __kmalloc_cache_noprof+0x189/0x420 [ 23.040509] krealloc_uaf+0xbb/0x5e0 [ 23.040729] kunit_try_run_case+0x1a5/0x480 [ 23.040938] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.041163] kthread+0x337/0x6f0 [ 23.041323] ret_from_fork+0x116/0x1d0 [ 23.041475] ret_from_fork_asm+0x1a/0x30 [ 23.041666] [ 23.041762] Freed by task 212: [ 23.041899] kasan_save_stack+0x45/0x70 [ 23.042068] kasan_save_track+0x18/0x40 [ 23.042225] kasan_save_free_info+0x3f/0x60 [ 23.042382] __kasan_slab_free+0x56/0x70 [ 23.042923] kfree+0x222/0x3f0 [ 23.043123] krealloc_uaf+0x13d/0x5e0 [ 23.043264] kunit_try_run_case+0x1a5/0x480 [ 23.043463] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.043821] kthread+0x337/0x6f0 [ 23.043975] ret_from_fork+0x116/0x1d0 [ 23.044143] ret_from_fork_asm+0x1a/0x30 [ 23.044336] [ 23.044429] The buggy address belongs to the object at ffff888100a03a00 [ 23.044429] which belongs to the cache kmalloc-256 of size 256 [ 23.045035] The buggy address is located 0 bytes inside of [ 23.045035] freed 256-byte region [ffff888100a03a00, ffff888100a03b00) [ 23.045432] [ 23.045520] The buggy address belongs to the physical page: [ 23.045813] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a02 [ 23.046171] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.046450] flags: 0x200000000000040(head|node=0|zone=2) [ 23.046881] page_type: f5(slab) [ 23.047015] raw: 0200000000000040 ffff888100041b40 ffffea0004028480 dead000000000002 [ 23.047239] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.047557] head: 0200000000000040 ffff888100041b40 ffffea0004028480 dead000000000002 [ 23.047886] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.048119] head: 0200000000000001 ffffea0004028081 00000000ffffffff 00000000ffffffff [ 23.048699] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 23.048924] page dumped because: kasan: bad access detected [ 23.049088] [ 23.049151] Memory state around the buggy address: [ 23.049360] ffff888100a03900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.049868] ffff888100a03980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.050248] >ffff888100a03a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.050795] ^ [ 23.050959] ffff888100a03a80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.051203] ffff888100a03b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.051420] ==================================================================
[ 23.283314] ================================================================== [ 23.283681] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x53c/0x5e0 [ 23.284533] Read of size 1 at addr ffff888105572a00 by task kunit_try_catch/213 [ 23.284858] [ 23.285001] CPU: 0 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) [ 23.285054] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.285081] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.285104] Call Trace: [ 23.285128] <TASK> [ 23.285148] dump_stack_lvl+0x73/0xb0 [ 23.285180] print_report+0xd1/0x650 [ 23.285326] ? __virt_addr_valid+0x1db/0x2d0 [ 23.285351] ? krealloc_uaf+0x53c/0x5e0 [ 23.285372] ? kasan_complete_mode_report_info+0x64/0x200 [ 23.285411] ? krealloc_uaf+0x53c/0x5e0 [ 23.285433] kasan_report+0x141/0x180 [ 23.285454] ? krealloc_uaf+0x53c/0x5e0 [ 23.285493] __asan_report_load1_noabort+0x18/0x20 [ 23.285518] krealloc_uaf+0x53c/0x5e0 [ 23.285539] ? __pfx_krealloc_uaf+0x10/0x10 [ 23.285568] ? finish_task_switch.isra.0+0x153/0x700 [ 23.285592] ? __switch_to+0x47/0xf50 [ 23.285618] ? __schedule+0x10cc/0x2b60 [ 23.285651] ? __pfx_read_tsc+0x10/0x10 [ 23.285673] ? ktime_get_ts64+0x86/0x230 [ 23.285699] kunit_try_run_case+0x1a5/0x480 [ 23.285725] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.285748] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.285769] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.285791] ? __kthread_parkme+0x82/0x180 [ 23.285811] ? preempt_count_sub+0x50/0x80 [ 23.285838] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.285863] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.285887] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.285911] kthread+0x337/0x6f0 [ 23.285942] ? trace_preempt_on+0x20/0xc0 [ 23.285965] ? __pfx_kthread+0x10/0x10 [ 23.285986] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.286010] ? calculate_sigpending+0x7b/0xa0 [ 23.286034] ? __pfx_kthread+0x10/0x10 [ 23.286056] ret_from_fork+0x116/0x1d0 [ 23.286085] ? __pfx_kthread+0x10/0x10 [ 23.286106] ret_from_fork_asm+0x1a/0x30 [ 23.286137] </TASK> [ 23.286149] [ 23.294136] Allocated by task 213: [ 23.294587] kasan_save_stack+0x45/0x70 [ 23.294742] kasan_save_track+0x18/0x40 [ 23.294952] kasan_save_alloc_info+0x3b/0x50 [ 23.295234] __kasan_kmalloc+0xb7/0xc0 [ 23.295427] __kmalloc_cache_noprof+0x189/0x420 [ 23.295616] krealloc_uaf+0xbb/0x5e0 [ 23.295786] kunit_try_run_case+0x1a5/0x480 [ 23.296004] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.296319] kthread+0x337/0x6f0 [ 23.296495] ret_from_fork+0x116/0x1d0 [ 23.296674] ret_from_fork_asm+0x1a/0x30 [ 23.296880] [ 23.296995] Freed by task 213: [ 23.297150] kasan_save_stack+0x45/0x70 [ 23.297342] kasan_save_track+0x18/0x40 [ 23.297474] kasan_save_free_info+0x3f/0x60 [ 23.297617] __kasan_slab_free+0x56/0x70 [ 23.297836] kfree+0x222/0x3f0 [ 23.298018] krealloc_uaf+0x13d/0x5e0 [ 23.298258] kunit_try_run_case+0x1a5/0x480 [ 23.298465] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.298676] kthread+0x337/0x6f0 [ 23.298790] ret_from_fork+0x116/0x1d0 [ 23.298981] ret_from_fork_asm+0x1a/0x30 [ 23.299467] [ 23.299570] The buggy address belongs to the object at ffff888105572a00 [ 23.299570] which belongs to the cache kmalloc-256 of size 256 [ 23.300137] The buggy address is located 0 bytes inside of [ 23.300137] freed 256-byte region [ffff888105572a00, ffff888105572b00) [ 23.300699] [ 23.300770] The buggy address belongs to the physical page: [ 23.300955] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105572 [ 23.301358] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.301690] flags: 0x200000000000040(head|node=0|zone=2) [ 23.301975] page_type: f5(slab) [ 23.302152] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 23.302570] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.302834] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 23.303153] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.303599] head: 0200000000000001 ffffea0004155c81 00000000ffffffff 00000000ffffffff [ 23.303984] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 23.304300] page dumped because: kasan: bad access detected [ 23.304508] [ 23.304955] Memory state around the buggy address: [ 23.305136] ffff888105572900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.305496] ffff888105572980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.305808] >ffff888105572a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.306084] ^ [ 23.306313] ffff888105572a80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.306655] ffff888105572b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.306973] ================================================================== [ 23.254760] ================================================================== [ 23.255241] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x1b8/0x5e0 [ 23.255676] Read of size 1 at addr ffff888105572a00 by task kunit_try_catch/213 [ 23.256007] [ 23.256151] CPU: 0 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) [ 23.256207] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.256220] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.256243] Call Trace: [ 23.256258] <TASK> [ 23.256278] dump_stack_lvl+0x73/0xb0 [ 23.256311] print_report+0xd1/0x650 [ 23.256346] ? __virt_addr_valid+0x1db/0x2d0 [ 23.256383] ? krealloc_uaf+0x1b8/0x5e0 [ 23.256403] ? kasan_complete_mode_report_info+0x64/0x200 [ 23.256429] ? krealloc_uaf+0x1b8/0x5e0 [ 23.256503] kasan_report+0x141/0x180 [ 23.256526] ? krealloc_uaf+0x1b8/0x5e0 [ 23.256550] ? krealloc_uaf+0x1b8/0x5e0 [ 23.256571] __kasan_check_byte+0x3d/0x50 [ 23.256592] krealloc_noprof+0x3f/0x340 [ 23.256631] krealloc_uaf+0x1b8/0x5e0 [ 23.256652] ? __pfx_krealloc_uaf+0x10/0x10 [ 23.256672] ? finish_task_switch.isra.0+0x153/0x700 [ 23.256706] ? __switch_to+0x47/0xf50 [ 23.256733] ? __schedule+0x10cc/0x2b60 [ 23.256755] ? __pfx_read_tsc+0x10/0x10 [ 23.256777] ? ktime_get_ts64+0x86/0x230 [ 23.256813] kunit_try_run_case+0x1a5/0x480 [ 23.256841] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.256874] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.256896] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.256917] ? __kthread_parkme+0x82/0x180 [ 23.256938] ? preempt_count_sub+0x50/0x80 [ 23.256971] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.256996] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.257019] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.257043] kthread+0x337/0x6f0 [ 23.257072] ? trace_preempt_on+0x20/0xc0 [ 23.257097] ? __pfx_kthread+0x10/0x10 [ 23.257117] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.257141] ? calculate_sigpending+0x7b/0xa0 [ 23.257165] ? __pfx_kthread+0x10/0x10 [ 23.257197] ret_from_fork+0x116/0x1d0 [ 23.257216] ? __pfx_kthread+0x10/0x10 [ 23.257236] ret_from_fork_asm+0x1a/0x30 [ 23.257268] </TASK> [ 23.257281] [ 23.268915] Allocated by task 213: [ 23.269363] kasan_save_stack+0x45/0x70 [ 23.269602] kasan_save_track+0x18/0x40 [ 23.269735] kasan_save_alloc_info+0x3b/0x50 [ 23.269884] __kasan_kmalloc+0xb7/0xc0 [ 23.270039] __kmalloc_cache_noprof+0x189/0x420 [ 23.270265] krealloc_uaf+0xbb/0x5e0 [ 23.270463] kunit_try_run_case+0x1a5/0x480 [ 23.270606] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.271051] kthread+0x337/0x6f0 [ 23.271280] ret_from_fork+0x116/0x1d0 [ 23.271499] ret_from_fork_asm+0x1a/0x30 [ 23.271691] [ 23.271789] Freed by task 213: [ 23.271920] kasan_save_stack+0x45/0x70 [ 23.272220] kasan_save_track+0x18/0x40 [ 23.272433] kasan_save_free_info+0x3f/0x60 [ 23.272602] __kasan_slab_free+0x56/0x70 [ 23.272791] kfree+0x222/0x3f0 [ 23.272933] krealloc_uaf+0x13d/0x5e0 [ 23.273080] kunit_try_run_case+0x1a5/0x480 [ 23.273262] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.273519] kthread+0x337/0x6f0 [ 23.273743] ret_from_fork+0x116/0x1d0 [ 23.273912] ret_from_fork_asm+0x1a/0x30 [ 23.274105] [ 23.274172] The buggy address belongs to the object at ffff888105572a00 [ 23.274172] which belongs to the cache kmalloc-256 of size 256 [ 23.274808] The buggy address is located 0 bytes inside of [ 23.274808] freed 256-byte region [ffff888105572a00, ffff888105572b00) [ 23.275549] [ 23.275647] The buggy address belongs to the physical page: [ 23.275889] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105572 [ 23.276396] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.276735] flags: 0x200000000000040(head|node=0|zone=2) [ 23.277010] page_type: f5(slab) [ 23.277246] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 23.277493] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.277973] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 23.278238] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.278621] head: 0200000000000001 ffffea0004155c81 00000000ffffffff 00000000ffffffff [ 23.279011] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 23.279399] page dumped because: kasan: bad access detected [ 23.279654] [ 23.279744] Memory state around the buggy address: [ 23.279983] ffff888105572900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.280369] ffff888105572980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.280596] >ffff888105572a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.280899] ^ [ 23.281093] ffff888105572a80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.281406] ffff888105572b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.281675] ==================================================================