Date
June 23, 2025, 1:39 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 24.563355] ================================================================== [ 24.563471] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520 [ 24.563577] Read of size 1 at addr fff00000c44aac00 by task kunit_try_catch/166 [ 24.563708] [ 24.563788] CPU: 0 UID: 0 PID: 166 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT [ 24.563975] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.564037] Hardware name: linux,dummy-virt (DT) [ 24.564106] Call trace: [ 24.564156] show_stack+0x20/0x38 (C) [ 24.564271] dump_stack_lvl+0x8c/0xd0 [ 24.564535] print_report+0x118/0x608 [ 24.564684] kasan_report+0xdc/0x128 [ 24.564914] __asan_report_load1_noabort+0x20/0x30 [ 24.565054] krealloc_uaf+0x4c8/0x520 [ 24.565251] kunit_try_run_case+0x170/0x3f0 [ 24.565472] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.565716] kthread+0x328/0x630 [ 24.565912] ret_from_fork+0x10/0x20 [ 24.566047] [ 24.566171] Allocated by task 166: [ 24.566358] kasan_save_stack+0x3c/0x68 [ 24.566484] kasan_save_track+0x20/0x40 [ 24.566609] kasan_save_alloc_info+0x40/0x58 [ 24.566720] __kasan_kmalloc+0xd4/0xd8 [ 24.566867] __kmalloc_cache_noprof+0x16c/0x3c0 [ 24.567169] krealloc_uaf+0xc8/0x520 [ 24.567357] kunit_try_run_case+0x170/0x3f0 [ 24.567495] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.568060] kthread+0x328/0x630 [ 24.568544] ret_from_fork+0x10/0x20 [ 24.568664] [ 24.568822] Freed by task 166: [ 24.569004] kasan_save_stack+0x3c/0x68 [ 24.570341] kasan_save_track+0x20/0x40 [ 24.570623] kasan_save_free_info+0x4c/0x78 [ 24.570731] __kasan_slab_free+0x6c/0x98 [ 24.571054] kfree+0x214/0x3c8 [ 24.571657] krealloc_uaf+0x12c/0x520 [ 24.571770] kunit_try_run_case+0x170/0x3f0 [ 24.571877] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.571999] kthread+0x328/0x630 [ 24.572553] ret_from_fork+0x10/0x20 [ 24.572659] [ 24.572758] The buggy address belongs to the object at fff00000c44aac00 [ 24.572758] which belongs to the cache kmalloc-256 of size 256 [ 24.573975] The buggy address is located 0 bytes inside of [ 24.573975] freed 256-byte region [fff00000c44aac00, fff00000c44aad00) [ 24.574902] [ 24.574967] The buggy address belongs to the physical page: [ 24.575047] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1044aa [ 24.575191] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.575571] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 24.575719] page_type: f5(slab) [ 24.575833] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 24.575967] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.576200] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 24.576383] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.576515] head: 0bfffe0000000001 ffffc1ffc3112a81 00000000ffffffff 00000000ffffffff [ 24.577339] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 24.577638] page dumped because: kasan: bad access detected [ 24.577713] [ 24.578061] Memory state around the buggy address: [ 24.578206] fff00000c44aab00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.578450] fff00000c44aab80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.578612] >fff00000c44aac00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.579104] ^ [ 24.579180] fff00000c44aac80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.579340] fff00000c44aad00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.579499] ================================================================== [ 24.545528] ================================================================== [ 24.545799] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520 [ 24.546328] Read of size 1 at addr fff00000c44aac00 by task kunit_try_catch/166 [ 24.546521] [ 24.546610] CPU: 0 UID: 0 PID: 166 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT [ 24.546800] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.546861] Hardware name: linux,dummy-virt (DT) [ 24.546931] Call trace: [ 24.546982] show_stack+0x20/0x38 (C) [ 24.547099] dump_stack_lvl+0x8c/0xd0 [ 24.547209] print_report+0x118/0x608 [ 24.547317] kasan_report+0xdc/0x128 [ 24.547444] __kasan_check_byte+0x54/0x70 [ 24.547554] krealloc_noprof+0x44/0x360 [ 24.547681] krealloc_uaf+0x180/0x520 [ 24.547790] kunit_try_run_case+0x170/0x3f0 [ 24.547903] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.548024] kthread+0x328/0x630 [ 24.548133] ret_from_fork+0x10/0x20 [ 24.548244] [ 24.548288] Allocated by task 166: [ 24.548353] kasan_save_stack+0x3c/0x68 [ 24.549491] kasan_save_track+0x20/0x40 [ 24.549795] kasan_save_alloc_info+0x40/0x58 [ 24.550282] __kasan_kmalloc+0xd4/0xd8 [ 24.550485] __kmalloc_cache_noprof+0x16c/0x3c0 [ 24.550606] krealloc_uaf+0xc8/0x520 [ 24.550731] kunit_try_run_case+0x170/0x3f0 [ 24.550822] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.551004] kthread+0x328/0x630 [ 24.551347] ret_from_fork+0x10/0x20 [ 24.551565] [ 24.551634] Freed by task 166: [ 24.551983] kasan_save_stack+0x3c/0x68 [ 24.552554] kasan_save_track+0x20/0x40 [ 24.552647] kasan_save_free_info+0x4c/0x78 [ 24.553012] __kasan_slab_free+0x6c/0x98 [ 24.553943] kfree+0x214/0x3c8 [ 24.554370] krealloc_uaf+0x12c/0x520 [ 24.554507] kunit_try_run_case+0x170/0x3f0 [ 24.554739] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.555288] kthread+0x328/0x630 [ 24.555702] ret_from_fork+0x10/0x20 [ 24.555974] [ 24.556162] The buggy address belongs to the object at fff00000c44aac00 [ 24.556162] which belongs to the cache kmalloc-256 of size 256 [ 24.556481] The buggy address is located 0 bytes inside of [ 24.556481] freed 256-byte region [fff00000c44aac00, fff00000c44aad00) [ 24.557023] [ 24.557200] The buggy address belongs to the physical page: [ 24.557316] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1044aa [ 24.557632] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.558004] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 24.558180] page_type: f5(slab) [ 24.558365] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 24.558499] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.558624] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 24.558786] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.558988] head: 0bfffe0000000001 ffffc1ffc3112a81 00000000ffffffff 00000000ffffffff [ 24.559334] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 24.559515] page dumped because: kasan: bad access detected [ 24.559593] [ 24.559641] Memory state around the buggy address: [ 24.559925] fff00000c44aab00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.560090] fff00000c44aab80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.560217] >fff00000c44aac00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.560350] ^ [ 24.560492] fff00000c44aac80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.560679] fff00000c44aad00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.560829] ==================================================================
[ 16.999022] ================================================================== [ 17.000088] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x1b8/0x5e0 [ 17.000772] Read of size 1 at addr ffff888100a10200 by task kunit_try_catch/185 [ 17.001910] [ 17.002328] CPU: 1 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT(voluntary) [ 17.002454] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.002508] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.002589] Call Trace: [ 17.002650] <TASK> [ 17.002696] dump_stack_lvl+0x73/0xb0 [ 17.002746] print_report+0xd1/0x650 [ 17.002783] ? __virt_addr_valid+0x1db/0x2d0 [ 17.002815] ? krealloc_uaf+0x1b8/0x5e0 [ 17.002841] ? kasan_complete_mode_report_info+0x64/0x200 [ 17.002875] ? krealloc_uaf+0x1b8/0x5e0 [ 17.002903] kasan_report+0x141/0x180 [ 17.002937] ? krealloc_uaf+0x1b8/0x5e0 [ 17.002966] ? krealloc_uaf+0x1b8/0x5e0 [ 17.002992] __kasan_check_byte+0x3d/0x50 [ 17.003025] krealloc_noprof+0x3f/0x340 [ 17.003060] krealloc_uaf+0x1b8/0x5e0 [ 17.003086] ? __pfx_krealloc_uaf+0x10/0x10 [ 17.003110] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 17.003155] ? __pfx_krealloc_uaf+0x10/0x10 [ 17.003186] kunit_try_run_case+0x1a5/0x480 [ 17.003271] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.003309] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.003345] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.003380] ? __kthread_parkme+0x82/0x180 [ 17.003413] ? preempt_count_sub+0x50/0x80 [ 17.003451] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.003486] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.003520] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.003555] kthread+0x337/0x6f0 [ 17.003578] ? trace_preempt_on+0x20/0xc0 [ 17.003636] ? __pfx_kthread+0x10/0x10 [ 17.003663] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.003695] ? calculate_sigpending+0x7b/0xa0 [ 17.003727] ? __pfx_kthread+0x10/0x10 [ 17.003752] ret_from_fork+0x41/0x80 [ 17.003785] ? __pfx_kthread+0x10/0x10 [ 17.003810] ret_from_fork_asm+0x1a/0x30 [ 17.003852] </TASK> [ 17.003867] [ 17.020291] Allocated by task 185: [ 17.021252] kasan_save_stack+0x45/0x70 [ 17.021872] kasan_save_track+0x18/0x40 [ 17.022494] kasan_save_alloc_info+0x3b/0x50 [ 17.022893] __kasan_kmalloc+0xb7/0xc0 [ 17.023235] __kmalloc_cache_noprof+0x189/0x420 [ 17.024093] krealloc_uaf+0xbb/0x5e0 [ 17.024773] kunit_try_run_case+0x1a5/0x480 [ 17.025427] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.025907] kthread+0x337/0x6f0 [ 17.026232] ret_from_fork+0x41/0x80 [ 17.026590] ret_from_fork_asm+0x1a/0x30 [ 17.027018] [ 17.027282] Freed by task 185: [ 17.027600] kasan_save_stack+0x45/0x70 [ 17.028062] kasan_save_track+0x18/0x40 [ 17.028550] kasan_save_free_info+0x3f/0x60 [ 17.028968] __kasan_slab_free+0x56/0x70 [ 17.029441] kfree+0x222/0x3f0 [ 17.029852] krealloc_uaf+0x13d/0x5e0 [ 17.030266] kunit_try_run_case+0x1a5/0x480 [ 17.030764] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.031258] kthread+0x337/0x6f0 [ 17.031695] ret_from_fork+0x41/0x80 [ 17.032088] ret_from_fork_asm+0x1a/0x30 [ 17.032559] [ 17.032824] The buggy address belongs to the object at ffff888100a10200 [ 17.032824] which belongs to the cache kmalloc-256 of size 256 [ 17.033989] The buggy address is located 0 bytes inside of [ 17.033989] freed 256-byte region [ffff888100a10200, ffff888100a10300) [ 17.034974] [ 17.035275] The buggy address belongs to the physical page: [ 17.035769] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a10 [ 17.036360] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.037078] flags: 0x200000000000040(head|node=0|zone=2) [ 17.037620] page_type: f5(slab) [ 17.037966] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 17.038769] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.039474] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 17.040146] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.040887] head: 0200000000000001 ffffea0004028401 00000000ffffffff 00000000ffffffff [ 17.041565] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 17.042133] page dumped because: kasan: bad access detected [ 17.042667] [ 17.042918] Memory state around the buggy address: [ 17.043377] ffff888100a10100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.043971] ffff888100a10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.044653] >ffff888100a10200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.045295] ^ [ 17.045625] ffff888100a10280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.046272] ffff888100a10300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.046913] ================================================================== [ 17.048342] ================================================================== [ 17.048968] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x53c/0x5e0 [ 17.049534] Read of size 1 at addr ffff888100a10200 by task kunit_try_catch/185 [ 17.050439] [ 17.050705] CPU: 1 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc1 #1 PREEMPT(voluntary) [ 17.050819] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.050852] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.050901] Call Trace: [ 17.050945] <TASK> [ 17.050984] dump_stack_lvl+0x73/0xb0 [ 17.051052] print_report+0xd1/0x650 [ 17.051122] ? __virt_addr_valid+0x1db/0x2d0 [ 17.051190] ? krealloc_uaf+0x53c/0x5e0 [ 17.051305] ? kasan_complete_mode_report_info+0x64/0x200 [ 17.051402] ? krealloc_uaf+0x53c/0x5e0 [ 17.051499] kasan_report+0x141/0x180 [ 17.051576] ? krealloc_uaf+0x53c/0x5e0 [ 17.051671] __asan_report_load1_noabort+0x18/0x20 [ 17.051739] krealloc_uaf+0x53c/0x5e0 [ 17.051808] ? __pfx_krealloc_uaf+0x10/0x10 [ 17.051858] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 17.051958] ? __pfx_krealloc_uaf+0x10/0x10 [ 17.052062] kunit_try_run_case+0x1a5/0x480 [ 17.052143] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.052249] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.052330] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.052407] ? __kthread_parkme+0x82/0x180 [ 17.052496] ? preempt_count_sub+0x50/0x80 [ 17.052620] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.052720] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.052824] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.052896] kthread+0x337/0x6f0 [ 17.052959] ? trace_preempt_on+0x20/0xc0 [ 17.053017] ? __pfx_kthread+0x10/0x10 [ 17.053044] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.053076] ? calculate_sigpending+0x7b/0xa0 [ 17.053105] ? __pfx_kthread+0x10/0x10 [ 17.053130] ret_from_fork+0x41/0x80 [ 17.053162] ? __pfx_kthread+0x10/0x10 [ 17.053187] ret_from_fork_asm+0x1a/0x30 [ 17.053278] </TASK> [ 17.053298] [ 17.067453] Allocated by task 185: [ 17.067850] kasan_save_stack+0x45/0x70 [ 17.068261] kasan_save_track+0x18/0x40 [ 17.068690] kasan_save_alloc_info+0x3b/0x50 [ 17.069127] __kasan_kmalloc+0xb7/0xc0 [ 17.070118] __kmalloc_cache_noprof+0x189/0x420 [ 17.072460] krealloc_uaf+0xbb/0x5e0 [ 17.073104] kunit_try_run_case+0x1a5/0x480 [ 17.073762] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.074127] kthread+0x337/0x6f0 [ 17.074407] ret_from_fork+0x41/0x80 [ 17.075279] ret_from_fork_asm+0x1a/0x30 [ 17.075963] [ 17.076186] Freed by task 185: [ 17.077151] kasan_save_stack+0x45/0x70 [ 17.077886] kasan_save_track+0x18/0x40 [ 17.078659] kasan_save_free_info+0x3f/0x60 [ 17.079352] __kasan_slab_free+0x56/0x70 [ 17.079804] kfree+0x222/0x3f0 [ 17.080141] krealloc_uaf+0x13d/0x5e0 [ 17.080624] kunit_try_run_case+0x1a5/0x480 [ 17.081108] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.081600] kthread+0x337/0x6f0 [ 17.082003] ret_from_fork+0x41/0x80 [ 17.082467] ret_from_fork_asm+0x1a/0x30 [ 17.082916] [ 17.083185] The buggy address belongs to the object at ffff888100a10200 [ 17.083185] which belongs to the cache kmalloc-256 of size 256 [ 17.084157] The buggy address is located 0 bytes inside of [ 17.084157] freed 256-byte region [ffff888100a10200, ffff888100a10300) [ 17.085043] [ 17.085296] The buggy address belongs to the physical page: [ 17.085884] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a10 [ 17.086647] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.087308] flags: 0x200000000000040(head|node=0|zone=2) [ 17.087788] page_type: f5(slab) [ 17.088129] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 17.088801] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.089326] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 17.090079] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.090770] head: 0200000000000001 ffffea0004028401 00000000ffffffff 00000000ffffffff [ 17.091487] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 17.092090] page dumped because: kasan: bad access detected [ 17.092633] [ 17.092910] Memory state around the buggy address: [ 17.093407] ffff888100a10100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.094054] ffff888100a10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.094680] >ffff888100a10200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.095301] ^ [ 17.095704] ffff888100a10280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.096297] ffff888100a10300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.096874] ==================================================================