Hay
Date
June 2, 2025, 2:13 p.m.

Environment
qemu-arm64
qemu-x86_64

[   18.560652] ==================================================================
[   18.561270] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520
[   18.561613] Read of size 1 at addr fff00000c1789e00 by task kunit_try_catch/154
[   18.561948] 
[   18.563276] CPU: 1 UID: 0 PID: 154 Comm: kunit_try_catch Tainted: G    B            N 6.14.10-rc1 #1
[   18.563469] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.563529] Hardware name: linux,dummy-virt (DT)
[   18.563598] Call trace:
[   18.563643]  show_stack+0x20/0x38 (C)
[   18.563758]  dump_stack_lvl+0x8c/0xd0
[   18.563851]  print_report+0x118/0x608
[   18.563944]  kasan_report+0xdc/0x128
[   18.564031]  __kasan_check_byte+0x54/0x70
[   18.564122]  krealloc_noprof+0x44/0x360
[   18.564237]  krealloc_uaf+0x180/0x520
[   18.564304]  kunit_try_run_case+0x170/0x3f0
[   18.564371]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.564427]  kthread+0x318/0x620
[   18.564478]  ret_from_fork+0x10/0x20
[   18.564534] 
[   18.568930] Allocated by task 154:
[   18.569736]  kasan_save_stack+0x3c/0x68
[   18.571181]  kasan_save_track+0x20/0x40
[   18.571442]  kasan_save_alloc_info+0x40/0x58
[   18.571876]  __kasan_kmalloc+0xd4/0xd8
[   18.572317]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.572662]  krealloc_uaf+0xc8/0x520
[   18.573087]  kunit_try_run_case+0x170/0x3f0
[   18.573610]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.574102]  kthread+0x318/0x620
[   18.574460]  ret_from_fork+0x10/0x20
[   18.574905] 
[   18.575124] Freed by task 154:
[   18.575518]  kasan_save_stack+0x3c/0x68
[   18.575906]  kasan_save_track+0x20/0x40
[   18.576760]  kasan_save_free_info+0x4c/0x78
[   18.577213]  __kasan_slab_free+0x6c/0x98
[   18.577669]  kfree+0x214/0x3c8
[   18.578493]  krealloc_uaf+0x12c/0x520
[   18.579248]  kunit_try_run_case+0x170/0x3f0
[   18.579558]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.580233]  kthread+0x318/0x620
[   18.580599]  ret_from_fork+0x10/0x20
[   18.581214] 
[   18.581495] The buggy address belongs to the object at fff00000c1789e00
[   18.581495]  which belongs to the cache kmalloc-256 of size 256
[   18.582911] The buggy address is located 0 bytes inside of
[   18.582911]  freed 256-byte region [fff00000c1789e00, fff00000c1789f00)
[   18.583424] 
[   18.583559] The buggy address belongs to the physical page:
[   18.583808] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101788
[   18.584139] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.585801] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   18.586664] page_type: f5(slab)
[   18.587261] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   18.587939] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.588804] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   18.589414] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.590032] head: 0bfffe0000000001 ffffc1ffc305e201 ffffffffffffffff 0000000000000000
[   18.590965] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   18.591850] page dumped because: kasan: bad access detected
[   18.592472] 
[   18.592871] Memory state around the buggy address:
[   18.593523]  fff00000c1789d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.594288]  fff00000c1789d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.595709] >fff00000c1789e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.596277]                    ^
[   18.596578]  fff00000c1789e80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.597101]  fff00000c1789f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.597665] ==================================================================
[   18.600461] ==================================================================
[   18.601006] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520
[   18.601578] Read of size 1 at addr fff00000c1789e00 by task kunit_try_catch/154
[   18.602038] 
[   18.602465] CPU: 1 UID: 0 PID: 154 Comm: kunit_try_catch Tainted: G    B            N 6.14.10-rc1 #1
[   18.602678] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.602732] Hardware name: linux,dummy-virt (DT)
[   18.602819] Call trace:
[   18.602865]  show_stack+0x20/0x38 (C)
[   18.602989]  dump_stack_lvl+0x8c/0xd0
[   18.603166]  print_report+0x118/0x608
[   18.603268]  kasan_report+0xdc/0x128
[   18.603347]  __asan_report_load1_noabort+0x20/0x30
[   18.603444]  krealloc_uaf+0x4c8/0x520
[   18.603536]  kunit_try_run_case+0x170/0x3f0
[   18.603633]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.603735]  kthread+0x318/0x620
[   18.603831]  ret_from_fork+0x10/0x20
[   18.603933] 
[   18.609378] Allocated by task 154:
[   18.609909]  kasan_save_stack+0x3c/0x68
[   18.610609]  kasan_save_track+0x20/0x40
[   18.610980]  kasan_save_alloc_info+0x40/0x58
[   18.611342]  __kasan_kmalloc+0xd4/0xd8
[   18.611673]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.612074]  krealloc_uaf+0xc8/0x520
[   18.612535]  kunit_try_run_case+0x170/0x3f0
[   18.612965]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.613445]  kthread+0x318/0x620
[   18.613902]  ret_from_fork+0x10/0x20
[   18.615343] 
[   18.615523] Freed by task 154:
[   18.615971]  kasan_save_stack+0x3c/0x68
[   18.616540]  kasan_save_track+0x20/0x40
[   18.617080]  kasan_save_free_info+0x4c/0x78
[   18.617642]  __kasan_slab_free+0x6c/0x98
[   18.618312]  kfree+0x214/0x3c8
[   18.618663]  krealloc_uaf+0x12c/0x520
[   18.619034]  kunit_try_run_case+0x170/0x3f0
[   18.619435]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.619867]  kthread+0x318/0x620
[   18.620297]  ret_from_fork+0x10/0x20
[   18.620861] 
[   18.621314] The buggy address belongs to the object at fff00000c1789e00
[   18.621314]  which belongs to the cache kmalloc-256 of size 256
[   18.622455] The buggy address is located 0 bytes inside of
[   18.622455]  freed 256-byte region [fff00000c1789e00, fff00000c1789f00)
[   18.624054] 
[   18.624387] The buggy address belongs to the physical page:
[   18.624984] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101788
[   18.625770] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.626773] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   18.627413] page_type: f5(slab)
[   18.627797] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   18.628588] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.629318] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   18.629993] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.631055] head: 0bfffe0000000001 ffffc1ffc305e201 ffffffffffffffff 0000000000000000
[   18.631495] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   18.632535] page dumped because: kasan: bad access detected
[   18.633221] 
[   18.633630] Memory state around the buggy address:
[   18.634028]  fff00000c1789d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.634620]  fff00000c1789d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.635572] >fff00000c1789e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.636098]                    ^
[   18.639149]  fff00000c1789e80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.640570]  fff00000c1789f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.640980] ==================================================================

[   12.655766] ==================================================================
[   12.656112] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x53e/0x5e0
[   12.656375] Read of size 1 at addr ffff8881003a1a00 by task kunit_try_catch/172
[   12.656845] 
[   12.656933] CPU: 0 UID: 0 PID: 172 Comm: kunit_try_catch Tainted: G    B            N 6.14.10-rc1 #1
[   12.656971] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.656982] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.657001] Call Trace:
[   12.657028]  <TASK>
[   12.657044]  dump_stack_lvl+0x73/0xb0
[   12.657071]  print_report+0xd1/0x650
[   12.657096]  ? __virt_addr_valid+0x1db/0x2d0
[   12.657121]  ? krealloc_uaf+0x53e/0x5e0
[   12.657144]  ? kasan_complete_mode_report_info+0x64/0x200
[   12.657172]  ? krealloc_uaf+0x53e/0x5e0
[   12.657195]  kasan_report+0x140/0x180
[   12.657219]  ? krealloc_uaf+0x53e/0x5e0
[   12.657247]  __asan_report_load1_noabort+0x18/0x20
[   12.657273]  krealloc_uaf+0x53e/0x5e0
[   12.657297]  ? __pfx_krealloc_uaf+0x10/0x10
[   12.657319]  ? finish_task_switch.isra.0+0x153/0x700
[   12.657345]  ? __switch_to+0x5d9/0xf60
[   12.657373]  ? __schedule+0xce8/0x2840
[   12.657398]  ? __pfx_read_tsc+0x10/0x10
[   12.657422]  ? ktime_get_ts64+0x86/0x230
[   12.657449]  kunit_try_run_case+0x1a6/0x480
[   12.657475]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.657499]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   12.657524]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.657550]  ? __kthread_parkme+0x82/0x160
[   12.657857]  ? preempt_count_sub+0x50/0x80
[   12.657888]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.657914]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.657943]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.657971]  kthread+0x324/0x6e0
[   12.657994]  ? trace_preempt_on+0x20/0xc0
[   12.658031]  ? __pfx_kthread+0x10/0x10
[   12.658056]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.658081]  ? calculate_sigpending+0x7b/0xa0
[   12.658105]  ? __pfx_kthread+0x10/0x10
[   12.658130]  ret_from_fork+0x41/0x80
[   12.658150]  ? __pfx_kthread+0x10/0x10
[   12.658175]  ret_from_fork_asm+0x1a/0x30
[   12.658210]  </TASK>
[   12.658220] 
[   12.665607] Allocated by task 172:
[   12.665781]  kasan_save_stack+0x45/0x70
[   12.665998]  kasan_save_track+0x18/0x40
[   12.666338]  kasan_save_alloc_info+0x3b/0x50
[   12.666560]  __kasan_kmalloc+0xb7/0xc0
[   12.666768]  __kmalloc_cache_noprof+0x18a/0x420
[   12.666986]  krealloc_uaf+0xbc/0x5e0
[   12.667180]  kunit_try_run_case+0x1a6/0x480
[   12.667327]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.668284]  kthread+0x324/0x6e0
[   12.668856]  ret_from_fork+0x41/0x80
[   12.669324]  ret_from_fork_asm+0x1a/0x30
[   12.669520] 
[   12.669879] Freed by task 172:
[   12.670000]  kasan_save_stack+0x45/0x70
[   12.670214]  kasan_save_track+0x18/0x40
[   12.670409]  kasan_save_free_info+0x3f/0x60
[   12.670636]  __kasan_slab_free+0x56/0x70
[   12.670990]  kfree+0x224/0x3f0
[   12.671197]  krealloc_uaf+0x13e/0x5e0
[   12.671350]  kunit_try_run_case+0x1a6/0x480
[   12.671570]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.671802]  kthread+0x324/0x6e0
[   12.672078]  ret_from_fork+0x41/0x80
[   12.672264]  ret_from_fork_asm+0x1a/0x30
[   12.672405] 
[   12.672474] The buggy address belongs to the object at ffff8881003a1a00
[   12.672474]  which belongs to the cache kmalloc-256 of size 256
[   12.673258] The buggy address is located 0 bytes inside of
[   12.673258]  freed 256-byte region [ffff8881003a1a00, ffff8881003a1b00)
[   12.673831] 
[   12.674440] The buggy address belongs to the physical page:
[   12.674802] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1003a0
[   12.675776] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.676559] flags: 0x200000000000040(head|node=0|zone=2)
[   12.677237] page_type: f5(slab)
[   12.677546] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.677826] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.678084] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.678613] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.679224] head: 0200000000000001 ffffea000400e801 ffffffffffffffff 0000000000000000
[   12.679668] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   12.679943] page dumped because: kasan: bad access detected
[   12.680213] 
[   12.680297] Memory state around the buggy address:
[   12.680517]  ffff8881003a1900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.681201]  ffff8881003a1980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.681562] >ffff8881003a1a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.682056]                    ^
[   12.682332]  ffff8881003a1a80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.683046]  ffff8881003a1b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.683344] ==================================================================
[   12.624819] ==================================================================
[   12.625892] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x1b9/0x5e0
[   12.626211] Read of size 1 at addr ffff8881003a1a00 by task kunit_try_catch/172
[   12.626498] 
[   12.626612] CPU: 0 UID: 0 PID: 172 Comm: kunit_try_catch Tainted: G    B            N 6.14.10-rc1 #1
[   12.626654] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.626666] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.626686] Call Trace:
[   12.626699]  <TASK>
[   12.626716]  dump_stack_lvl+0x73/0xb0
[   12.626745]  print_report+0xd1/0x650
[   12.626769]  ? __virt_addr_valid+0x1db/0x2d0
[   12.626795]  ? krealloc_uaf+0x1b9/0x5e0
[   12.626817]  ? kasan_complete_mode_report_info+0x64/0x200
[   12.626845]  ? krealloc_uaf+0x1b9/0x5e0
[   12.626868]  kasan_report+0x140/0x180
[   12.626892]  ? krealloc_uaf+0x1b9/0x5e0
[   12.626918]  ? krealloc_uaf+0x1b9/0x5e0
[   12.626942]  __kasan_check_byte+0x3d/0x50
[   12.626966]  krealloc_noprof+0x3f/0x340
[   12.626990]  krealloc_uaf+0x1b9/0x5e0
[   12.627013]  ? __pfx_krealloc_uaf+0x10/0x10
[   12.627049]  ? finish_task_switch.isra.0+0x153/0x700
[   12.627076]  ? __switch_to+0x5d9/0xf60
[   12.627105]  ? __schedule+0xce8/0x2840
[   12.627131]  ? __pfx_read_tsc+0x10/0x10
[   12.627155]  ? ktime_get_ts64+0x86/0x230
[   12.627185]  kunit_try_run_case+0x1a6/0x480
[   12.627214]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.627239]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   12.627267]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.627294]  ? __kthread_parkme+0x82/0x160
[   12.627319]  ? preempt_count_sub+0x50/0x80
[   12.627345]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.627370]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.627400]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.627429]  kthread+0x324/0x6e0
[   12.627527]  ? trace_preempt_on+0x20/0xc0
[   12.627556]  ? __pfx_kthread+0x10/0x10
[   12.627580]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.627605]  ? calculate_sigpending+0x7b/0xa0
[   12.627629]  ? __pfx_kthread+0x10/0x10
[   12.627654]  ret_from_fork+0x41/0x80
[   12.627675]  ? __pfx_kthread+0x10/0x10
[   12.627700]  ret_from_fork_asm+0x1a/0x30
[   12.627734]  </TASK>
[   12.627746] 
[   12.638084] Allocated by task 172:
[   12.638279]  kasan_save_stack+0x45/0x70
[   12.638474]  kasan_save_track+0x18/0x40
[   12.638973]  kasan_save_alloc_info+0x3b/0x50
[   12.639305]  __kasan_kmalloc+0xb7/0xc0
[   12.639482]  __kmalloc_cache_noprof+0x18a/0x420
[   12.639999]  krealloc_uaf+0xbc/0x5e0
[   12.640210]  kunit_try_run_case+0x1a6/0x480
[   12.640370]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.640958]  kthread+0x324/0x6e0
[   12.641263]  ret_from_fork+0x41/0x80
[   12.641546]  ret_from_fork_asm+0x1a/0x30
[   12.641909] 
[   12.642027] Freed by task 172:
[   12.642191]  kasan_save_stack+0x45/0x70
[   12.642374]  kasan_save_track+0x18/0x40
[   12.642552]  kasan_save_free_info+0x3f/0x60
[   12.642735]  __kasan_slab_free+0x56/0x70
[   12.642916]  kfree+0x224/0x3f0
[   12.643536]  krealloc_uaf+0x13e/0x5e0
[   12.643752]  kunit_try_run_case+0x1a6/0x480
[   12.644123]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.644443]  kthread+0x324/0x6e0
[   12.644800]  ret_from_fork+0x41/0x80
[   12.645099]  ret_from_fork_asm+0x1a/0x30
[   12.645444] 
[   12.645543] The buggy address belongs to the object at ffff8881003a1a00
[   12.645543]  which belongs to the cache kmalloc-256 of size 256
[   12.646244] The buggy address is located 0 bytes inside of
[   12.646244]  freed 256-byte region [ffff8881003a1a00, ffff8881003a1b00)
[   12.646875] 
[   12.646981] The buggy address belongs to the physical page:
[   12.647416] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1003a0
[   12.647998] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.648391] flags: 0x200000000000040(head|node=0|zone=2)
[   12.648745] page_type: f5(slab)
[   12.648904] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.649221] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.649522] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.650096] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.650501] head: 0200000000000001 ffffea000400e801 ffffffffffffffff 0000000000000000
[   12.650976] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   12.651365] page dumped because: kasan: bad access detected
[   12.651791] 
[   12.651874] Memory state around the buggy address:
[   12.652178]  ffff8881003a1900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.652540]  ffff8881003a1980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.652959] >ffff8881003a1a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.653338]                    ^
[   12.653462]  ffff8881003a1a80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.654010]  ffff8881003a1b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.654305] ==================================================================