Hay
Date
June 17, 2025, 3:40 p.m.

Environment
qemu-arm64
qemu-x86_64

[   21.550943] ==================================================================
[   21.551058] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520
[   21.551150] Read of size 1 at addr fff00000c4771c00 by task kunit_try_catch/166
[   21.551206] 
[   21.551261] CPU: 0 UID: 0 PID: 166 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT 
[   21.551361] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.551390] Hardware name: linux,dummy-virt (DT)
[   21.551427] Call trace:
[   21.551454]  show_stack+0x20/0x38 (C)
[   21.551511]  dump_stack_lvl+0x8c/0xd0
[   21.551565]  print_report+0x118/0x608
[   21.551614]  kasan_report+0xdc/0x128
[   21.551662]  __kasan_check_byte+0x54/0x70
[   21.551711]  krealloc_noprof+0x44/0x360
[   21.551857]  krealloc_uaf+0x180/0x520
[   21.551972]  kunit_try_run_case+0x170/0x3f0
[   21.552086]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.552198]  kthread+0x328/0x630
[   21.552284]  ret_from_fork+0x10/0x20
[   21.552385] 
[   21.552426] Allocated by task 166:
[   21.552490]  kasan_save_stack+0x3c/0x68
[   21.552587]  kasan_save_track+0x20/0x40
[   21.552672]  kasan_save_alloc_info+0x40/0x58
[   21.552780]  __kasan_kmalloc+0xd4/0xd8
[   21.552868]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.552967]  krealloc_uaf+0xc8/0x520
[   21.553054]  kunit_try_run_case+0x170/0x3f0
[   21.553145]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.553250]  kthread+0x328/0x630
[   21.553381]  ret_from_fork+0x10/0x20
[   21.553467] 
[   21.553510] Freed by task 166:
[   21.554012]  kasan_save_stack+0x3c/0x68
[   21.554123]  kasan_save_track+0x20/0x40
[   21.554217]  kasan_save_free_info+0x4c/0x78
[   21.554318]  __kasan_slab_free+0x6c/0x98
[   21.554417]  kfree+0x214/0x3c8
[   21.554503]  krealloc_uaf+0x12c/0x520
[   21.554737]  kunit_try_run_case+0x170/0x3f0
[   21.554952]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.555164]  kthread+0x328/0x630
[   21.555367]  ret_from_fork+0x10/0x20
[   21.555708] 
[   21.555843] The buggy address belongs to the object at fff00000c4771c00
[   21.555843]  which belongs to the cache kmalloc-256 of size 256
[   21.556227] The buggy address is located 0 bytes inside of
[   21.556227]  freed 256-byte region [fff00000c4771c00, fff00000c4771d00)
[   21.556474] 
[   21.556558] The buggy address belongs to the physical page:
[   21.556720] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104770
[   21.556977] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.557355] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   21.557831] page_type: f5(slab)
[   21.557957] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   21.558142] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.558272] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   21.558367] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.558485] head: 0bfffe0000000001 ffffc1ffc311dc01 00000000ffffffff 00000000ffffffff
[   21.558603] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   21.558764] page dumped because: kasan: bad access detected
[   21.558850] 
[   21.558896] Memory state around the buggy address:
[   21.558979]  fff00000c4771b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.559085]  fff00000c4771b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.559184] >fff00000c4771c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.559276]                    ^
[   21.559347]  fff00000c4771c80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.559697]  fff00000c4771d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.559809] ==================================================================
[   21.569161] ==================================================================
[   21.569563] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520
[   21.569942] Read of size 1 at addr fff00000c4771c00 by task kunit_try_catch/166
[   21.570055] 
[   21.570133] CPU: 0 UID: 0 PID: 166 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT 
[   21.570370] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.570458] Hardware name: linux,dummy-virt (DT)
[   21.570540] Call trace:
[   21.570600]  show_stack+0x20/0x38 (C)
[   21.570718]  dump_stack_lvl+0x8c/0xd0
[   21.570878]  print_report+0x118/0x608
[   21.571037]  kasan_report+0xdc/0x128
[   21.571147]  __asan_report_load1_noabort+0x20/0x30
[   21.571280]  krealloc_uaf+0x4c8/0x520
[   21.571433]  kunit_try_run_case+0x170/0x3f0
[   21.571598]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.571800]  kthread+0x328/0x630
[   21.571919]  ret_from_fork+0x10/0x20
[   21.572036] 
[   21.572076] Allocated by task 166:
[   21.572150]  kasan_save_stack+0x3c/0x68
[   21.572247]  kasan_save_track+0x20/0x40
[   21.572357]  kasan_save_alloc_info+0x40/0x58
[   21.572455]  __kasan_kmalloc+0xd4/0xd8
[   21.572572]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.572705]  krealloc_uaf+0xc8/0x520
[   21.572944]  kunit_try_run_case+0x170/0x3f0
[   21.573044]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.573259]  kthread+0x328/0x630
[   21.573414]  ret_from_fork+0x10/0x20
[   21.573523] 
[   21.573581] Freed by task 166:
[   21.573670]  kasan_save_stack+0x3c/0x68
[   21.573807]  kasan_save_track+0x20/0x40
[   21.573882]  kasan_save_free_info+0x4c/0x78
[   21.573951]  __kasan_slab_free+0x6c/0x98
[   21.574043]  kfree+0x214/0x3c8
[   21.574111]  krealloc_uaf+0x12c/0x520
[   21.574191]  kunit_try_run_case+0x170/0x3f0
[   21.574290]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.574384]  kthread+0x328/0x630
[   21.574464]  ret_from_fork+0x10/0x20
[   21.574575] 
[   21.574640] The buggy address belongs to the object at fff00000c4771c00
[   21.574640]  which belongs to the cache kmalloc-256 of size 256
[   21.574788] The buggy address is located 0 bytes inside of
[   21.574788]  freed 256-byte region [fff00000c4771c00, fff00000c4771d00)
[   21.574938] 
[   21.575003] The buggy address belongs to the physical page:
[   21.575079] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104770
[   21.575221] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.575338] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   21.575461] page_type: f5(slab)
[   21.575552] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   21.575753] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.575913] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   21.576041] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.576171] head: 0bfffe0000000001 ffffc1ffc311dc01 00000000ffffffff 00000000ffffffff
[   21.576283] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   21.576385] page dumped because: kasan: bad access detected
[   21.576460] 
[   21.576512] Memory state around the buggy address:
[   21.576623]  fff00000c4771b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.576764]  fff00000c4771b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.576862] >fff00000c4771c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.576945]                    ^
[   21.577014]  fff00000c4771c80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.577158]  fff00000c4771d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.577269] ==================================================================

[   19.020246] ==================================================================
[   19.021609] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x53c/0x5e0
[   19.022223] Read of size 1 at addr ffff888100aab600 by task kunit_try_catch/184
[   19.023026] 
[   19.023267] CPU: 1 UID: 0 PID: 184 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT(voluntary) 
[   19.023397] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.023430] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.023479] Call Trace:
[   19.023511]  <TASK>
[   19.023552]  dump_stack_lvl+0x73/0xb0
[   19.023640]  print_report+0xd1/0x650
[   19.023727]  ? __virt_addr_valid+0x1db/0x2d0
[   19.023832]  ? krealloc_uaf+0x53c/0x5e0
[   19.023989]  ? kasan_complete_mode_report_info+0x64/0x200
[   19.024121]  ? krealloc_uaf+0x53c/0x5e0
[   19.024219]  kasan_report+0x141/0x180
[   19.024345]  ? krealloc_uaf+0x53c/0x5e0
[   19.024432]  __asan_report_load1_noabort+0x18/0x20
[   19.024513]  krealloc_uaf+0x53c/0x5e0
[   19.024587]  ? __pfx_krealloc_uaf+0x10/0x10
[   19.024678]  ? finish_task_switch.isra.0+0x153/0x700
[   19.024820]  ? __switch_to+0x5d9/0xf60
[   19.024896]  ? dequeue_task_fair+0x166/0x4e0
[   19.025069]  ? __schedule+0x10cc/0x2b60
[   19.025182]  ? __pfx_read_tsc+0x10/0x10
[   19.025261]  ? ktime_get_ts64+0x86/0x230
[   19.025356]  kunit_try_run_case+0x1a5/0x480
[   19.025404]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.025444]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.025484]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.025520]  ? __kthread_parkme+0x82/0x180
[   19.025556]  ? preempt_count_sub+0x50/0x80
[   19.025595]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.025633]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.025669]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.025705]  kthread+0x337/0x6f0
[   19.025732]  ? trace_preempt_on+0x20/0xc0
[   19.025771]  ? __pfx_kthread+0x10/0x10
[   19.025799]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.025833]  ? calculate_sigpending+0x7b/0xa0
[   19.025894]  ? __pfx_kthread+0x10/0x10
[   19.026010]  ret_from_fork+0x41/0x80
[   19.026101]  ? __pfx_kthread+0x10/0x10
[   19.026136]  ret_from_fork_asm+0x1a/0x30
[   19.026186]  </TASK>
[   19.026202] 
[   19.048686] Allocated by task 184:
[   19.048966]  kasan_save_stack+0x45/0x70
[   19.049453]  kasan_save_track+0x18/0x40
[   19.049874]  kasan_save_alloc_info+0x3b/0x50
[   19.051356]  __kasan_kmalloc+0xb7/0xc0
[   19.051810]  __kmalloc_cache_noprof+0x189/0x420
[   19.052170]  krealloc_uaf+0xbb/0x5e0
[   19.052466]  kunit_try_run_case+0x1a5/0x480
[   19.052854]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.054405]  kthread+0x337/0x6f0
[   19.055812]  ret_from_fork+0x41/0x80
[   19.057181]  ret_from_fork_asm+0x1a/0x30
[   19.058338] 
[   19.058507] Freed by task 184:
[   19.058722]  kasan_save_stack+0x45/0x70
[   19.058989]  kasan_save_track+0x18/0x40
[   19.059341]  kasan_save_free_info+0x3f/0x60
[   19.059654]  __kasan_slab_free+0x56/0x70
[   19.059920]  kfree+0x222/0x3f0
[   19.060153]  krealloc_uaf+0x13d/0x5e0
[   19.063523]  kunit_try_run_case+0x1a5/0x480
[   19.065939]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.066511]  kthread+0x337/0x6f0
[   19.066762]  ret_from_fork+0x41/0x80
[   19.067215]  ret_from_fork_asm+0x1a/0x30
[   19.068271] 
[   19.068631] The buggy address belongs to the object at ffff888100aab600
[   19.068631]  which belongs to the cache kmalloc-256 of size 256
[   19.070967] The buggy address is located 0 bytes inside of
[   19.070967]  freed 256-byte region [ffff888100aab600, ffff888100aab700)
[   19.071871] 
[   19.072091] The buggy address belongs to the physical page:
[   19.073304] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aaa
[   19.074186] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.075747] flags: 0x200000000000040(head|node=0|zone=2)
[   19.076279] page_type: f5(slab)
[   19.076639] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   19.077271] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.078079] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   19.078952] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.079628] head: 0200000000000001 ffffea000402aa81 00000000ffffffff 00000000ffffffff
[   19.080513] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   19.081406] page dumped because: kasan: bad access detected
[   19.082163] 
[   19.082440] Memory state around the buggy address:
[   19.082860]  ffff888100aab500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.083602]  ffff888100aab580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.084131] >ffff888100aab600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.084764]                    ^
[   19.085085]  ffff888100aab680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.085795]  ffff888100aab700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.086589] ==================================================================
[   18.955405] ==================================================================
[   18.957278] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x1b8/0x5e0
[   18.957888] Read of size 1 at addr ffff888100aab600 by task kunit_try_catch/184
[   18.958417] 
[   18.959418] CPU: 1 UID: 0 PID: 184 Comm: kunit_try_catch Tainted: G    B            N  6.15.3-rc1 #1 PREEMPT(voluntary) 
[   18.959553] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.959595] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.959782] Call Trace:
[   18.959820]  <TASK>
[   18.959864]  dump_stack_lvl+0x73/0xb0
[   18.959927]  print_report+0xd1/0x650
[   18.960103]  ? __virt_addr_valid+0x1db/0x2d0
[   18.960155]  ? krealloc_uaf+0x1b8/0x5e0
[   18.960188]  ? kasan_complete_mode_report_info+0x64/0x200
[   18.960226]  ? krealloc_uaf+0x1b8/0x5e0
[   18.960256]  kasan_report+0x141/0x180
[   18.960319]  ? krealloc_uaf+0x1b8/0x5e0
[   18.960359]  ? krealloc_uaf+0x1b8/0x5e0
[   18.960391]  __kasan_check_byte+0x3d/0x50
[   18.960428]  krealloc_noprof+0x3f/0x340
[   18.960469]  krealloc_uaf+0x1b8/0x5e0
[   18.960500]  ? __pfx_krealloc_uaf+0x10/0x10
[   18.960529]  ? finish_task_switch.isra.0+0x153/0x700
[   18.960570]  ? __switch_to+0x5d9/0xf60
[   18.960606]  ? dequeue_task_fair+0x166/0x4e0
[   18.960645]  ? __schedule+0x10cc/0x2b60
[   18.960684]  ? __pfx_read_tsc+0x10/0x10
[   18.960719]  ? ktime_get_ts64+0x86/0x230
[   18.960761]  kunit_try_run_case+0x1a5/0x480
[   18.960806]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.960844]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.960884]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.960922]  ? __kthread_parkme+0x82/0x180
[   18.960995]  ? preempt_count_sub+0x50/0x80
[   18.961085]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.961149]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.961190]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.961229]  kthread+0x337/0x6f0
[   18.961258]  ? trace_preempt_on+0x20/0xc0
[   18.961322]  ? __pfx_kthread+0x10/0x10
[   18.961355]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.961392]  ? calculate_sigpending+0x7b/0xa0
[   18.961429]  ? __pfx_kthread+0x10/0x10
[   18.961459]  ret_from_fork+0x41/0x80
[   18.961497]  ? __pfx_kthread+0x10/0x10
[   18.961527]  ret_from_fork_asm+0x1a/0x30
[   18.961576]  </TASK>
[   18.961591] 
[   18.985060] Allocated by task 184:
[   18.985876]  kasan_save_stack+0x45/0x70
[   18.986536]  kasan_save_track+0x18/0x40
[   18.986922]  kasan_save_alloc_info+0x3b/0x50
[   18.987474]  __kasan_kmalloc+0xb7/0xc0
[   18.987834]  __kmalloc_cache_noprof+0x189/0x420
[   18.989080]  krealloc_uaf+0xbb/0x5e0
[   18.989535]  kunit_try_run_case+0x1a5/0x480
[   18.990473]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.990906]  kthread+0x337/0x6f0
[   18.991843]  ret_from_fork+0x41/0x80
[   18.992721]  ret_from_fork_asm+0x1a/0x30
[   18.992904] 
[   18.993170] Freed by task 184:
[   18.994157]  kasan_save_stack+0x45/0x70
[   18.994641]  kasan_save_track+0x18/0x40
[   18.995638]  kasan_save_free_info+0x3f/0x60
[   18.995837]  __kasan_slab_free+0x56/0x70
[   18.996054]  kfree+0x222/0x3f0
[   18.996253]  krealloc_uaf+0x13d/0x5e0
[   18.996558]  kunit_try_run_case+0x1a5/0x480
[   18.997248]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.998387]  kthread+0x337/0x6f0
[   18.998804]  ret_from_fork+0x41/0x80
[   18.999727]  ret_from_fork_asm+0x1a/0x30
[   19.000731] 
[   19.001181] The buggy address belongs to the object at ffff888100aab600
[   19.001181]  which belongs to the cache kmalloc-256 of size 256
[   19.002834] The buggy address is located 0 bytes inside of
[   19.002834]  freed 256-byte region [ffff888100aab600, ffff888100aab700)
[   19.003909] 
[   19.004464] The buggy address belongs to the physical page:
[   19.005103] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aaa
[   19.005873] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.006700] flags: 0x200000000000040(head|node=0|zone=2)
[   19.007579] page_type: f5(slab)
[   19.007941] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   19.008835] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.009450] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   19.010560] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.011247] head: 0200000000000001 ffffea000402aa81 00000000ffffffff 00000000ffffffff
[   19.012211] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   19.012773] page dumped because: kasan: bad access detected
[   19.013275] 
[   19.013500] Memory state around the buggy address:
[   19.013975]  ffff888100aab500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.014738]  ffff888100aab580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.015376] >ffff888100aab600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.016023]                    ^
[   19.016572]  ffff888100aab680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.017347]  ffff888100aab700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.018008] ==================================================================