Date
July 18, 2025, 2:09 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 16.909021] ================================================================== [ 16.909075] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520 [ 16.909190] Read of size 1 at addr fff00000c1bc4800 by task kunit_try_catch/164 [ 16.909290] [ 16.909325] CPU: 1 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 16.909885] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.910007] Hardware name: linux,dummy-virt (DT) [ 16.910042] Call trace: [ 16.910081] show_stack+0x20/0x38 (C) [ 16.910149] dump_stack_lvl+0x8c/0xd0 [ 16.910201] print_report+0x118/0x5d0 [ 16.910247] kasan_report+0xdc/0x128 [ 16.910337] __asan_report_load1_noabort+0x20/0x30 [ 16.910392] krealloc_uaf+0x4c8/0x520 [ 16.910435] kunit_try_run_case+0x170/0x3f0 [ 16.910480] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.910645] kthread+0x328/0x630 [ 16.910921] ret_from_fork+0x10/0x20 [ 16.911041] [ 16.911103] Allocated by task 164: [ 16.911173] kasan_save_stack+0x3c/0x68 [ 16.911287] kasan_save_track+0x20/0x40 [ 16.911509] kasan_save_alloc_info+0x40/0x58 [ 16.911583] __kasan_kmalloc+0xd4/0xd8 [ 16.911627] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.911664] krealloc_uaf+0xc8/0x520 [ 16.911698] kunit_try_run_case+0x170/0x3f0 [ 16.911958] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.912006] kthread+0x328/0x630 [ 16.912087] ret_from_fork+0x10/0x20 [ 16.912213] [ 16.912282] Freed by task 164: [ 16.912321] kasan_save_stack+0x3c/0x68 [ 16.912366] kasan_save_track+0x20/0x40 [ 16.912641] kasan_save_free_info+0x4c/0x78 [ 16.912839] __kasan_slab_free+0x6c/0x98 [ 16.912965] kfree+0x214/0x3c8 [ 16.913095] krealloc_uaf+0x12c/0x520 [ 16.913224] kunit_try_run_case+0x170/0x3f0 [ 16.913302] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.913366] kthread+0x328/0x630 [ 16.913404] ret_from_fork+0x10/0x20 [ 16.913762] [ 16.913877] The buggy address belongs to the object at fff00000c1bc4800 [ 16.913877] which belongs to the cache kmalloc-256 of size 256 [ 16.913983] The buggy address is located 0 bytes inside of [ 16.913983] freed 256-byte region [fff00000c1bc4800, fff00000c1bc4900) [ 16.914151] [ 16.914240] The buggy address belongs to the physical page: [ 16.914347] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bc4 [ 16.914443] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.914514] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.914906] page_type: f5(slab) [ 16.914961] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 16.915047] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.915180] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 16.915325] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.915478] head: 0bfffe0000000001 ffffc1ffc306f101 00000000ffffffff 00000000ffffffff [ 16.915565] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 16.915610] page dumped because: kasan: bad access detected [ 16.915946] [ 16.916083] Memory state around the buggy address: [ 16.916218] fff00000c1bc4700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.916284] fff00000c1bc4780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.916450] >fff00000c1bc4800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.916528] ^ [ 16.916616] fff00000c1bc4880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.916747] fff00000c1bc4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.916784] ================================================================== [ 16.899755] ================================================================== [ 16.900125] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520 [ 16.900323] Read of size 1 at addr fff00000c1bc4800 by task kunit_try_catch/164 [ 16.900507] [ 16.900576] CPU: 1 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 16.900774] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.900828] Hardware name: linux,dummy-virt (DT) [ 16.901240] Call trace: [ 16.901330] show_stack+0x20/0x38 (C) [ 16.901458] dump_stack_lvl+0x8c/0xd0 [ 16.901528] print_report+0x118/0x5d0 [ 16.901741] kasan_report+0xdc/0x128 [ 16.901811] __kasan_check_byte+0x54/0x70 [ 16.901929] krealloc_noprof+0x44/0x360 [ 16.902035] krealloc_uaf+0x180/0x520 [ 16.902192] kunit_try_run_case+0x170/0x3f0 [ 16.902247] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.902483] kthread+0x328/0x630 [ 16.902550] ret_from_fork+0x10/0x20 [ 16.902686] [ 16.902783] Allocated by task 164: [ 16.902990] kasan_save_stack+0x3c/0x68 [ 16.903051] kasan_save_track+0x20/0x40 [ 16.903141] kasan_save_alloc_info+0x40/0x58 [ 16.903208] __kasan_kmalloc+0xd4/0xd8 [ 16.903245] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.903290] krealloc_uaf+0xc8/0x520 [ 16.903387] kunit_try_run_case+0x170/0x3f0 [ 16.903437] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.903479] kthread+0x328/0x630 [ 16.903533] ret_from_fork+0x10/0x20 [ 16.903569] [ 16.903853] Freed by task 164: [ 16.904029] kasan_save_stack+0x3c/0x68 [ 16.904351] kasan_save_track+0x20/0x40 [ 16.904472] kasan_save_free_info+0x4c/0x78 [ 16.904606] __kasan_slab_free+0x6c/0x98 [ 16.904825] kfree+0x214/0x3c8 [ 16.904913] krealloc_uaf+0x12c/0x520 [ 16.905050] kunit_try_run_case+0x170/0x3f0 [ 16.905090] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.905383] kthread+0x328/0x630 [ 16.905559] ret_from_fork+0x10/0x20 [ 16.905704] [ 16.905805] The buggy address belongs to the object at fff00000c1bc4800 [ 16.905805] which belongs to the cache kmalloc-256 of size 256 [ 16.905958] The buggy address is located 0 bytes inside of [ 16.905958] freed 256-byte region [fff00000c1bc4800, fff00000c1bc4900) [ 16.906043] [ 16.906065] The buggy address belongs to the physical page: [ 16.906099] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bc4 [ 16.906154] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.906226] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.906281] page_type: f5(slab) [ 16.906324] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 16.906372] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.906419] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 16.906475] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.906522] head: 0bfffe0000000001 ffffc1ffc306f101 00000000ffffffff 00000000ffffffff [ 16.906576] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 16.906615] page dumped because: kasan: bad access detected [ 16.906656] [ 16.906675] Memory state around the buggy address: [ 16.906708] fff00000c1bc4700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.906757] fff00000c1bc4780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.906812] >fff00000c1bc4800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.906877] ^ [ 16.906905] fff00000c1bc4880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.906953] fff00000c1bc4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.906998] ==================================================================
[ 16.575080] ================================================================== [ 16.575193] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520 [ 16.575246] Read of size 1 at addr fff00000c45d0000 by task kunit_try_catch/164 [ 16.575700] [ 16.575751] CPU: 1 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 16.575861] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.575898] Hardware name: linux,dummy-virt (DT) [ 16.575929] Call trace: [ 16.575953] show_stack+0x20/0x38 (C) [ 16.576013] dump_stack_lvl+0x8c/0xd0 [ 16.576063] print_report+0x118/0x5d0 [ 16.576111] kasan_report+0xdc/0x128 [ 16.576161] __kasan_check_byte+0x54/0x70 [ 16.576209] krealloc_noprof+0x44/0x360 [ 16.576255] krealloc_uaf+0x180/0x520 [ 16.576308] kunit_try_run_case+0x170/0x3f0 [ 16.576375] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.576426] kthread+0x328/0x630 [ 16.576467] ret_from_fork+0x10/0x20 [ 16.576804] [ 16.577619] Allocated by task 164: [ 16.577682] kasan_save_stack+0x3c/0x68 [ 16.578045] kasan_save_track+0x20/0x40 [ 16.578119] kasan_save_alloc_info+0x40/0x58 [ 16.578428] __kasan_kmalloc+0xd4/0xd8 [ 16.578586] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.578902] krealloc_uaf+0xc8/0x520 [ 16.578992] kunit_try_run_case+0x170/0x3f0 [ 16.579090] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.579261] kthread+0x328/0x630 [ 16.579376] ret_from_fork+0x10/0x20 [ 16.579455] [ 16.579551] Freed by task 164: [ 16.580014] kasan_save_stack+0x3c/0x68 [ 16.580095] kasan_save_track+0x20/0x40 [ 16.580221] kasan_save_free_info+0x4c/0x78 [ 16.580292] __kasan_slab_free+0x6c/0x98 [ 16.580767] kfree+0x214/0x3c8 [ 16.580992] krealloc_uaf+0x12c/0x520 [ 16.581062] kunit_try_run_case+0x170/0x3f0 [ 16.581260] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.581401] kthread+0x328/0x630 [ 16.581438] ret_from_fork+0x10/0x20 [ 16.581837] [ 16.581909] The buggy address belongs to the object at fff00000c45d0000 [ 16.581909] which belongs to the cache kmalloc-256 of size 256 [ 16.582011] The buggy address is located 0 bytes inside of [ 16.582011] freed 256-byte region [fff00000c45d0000, fff00000c45d0100) [ 16.582378] [ 16.582439] The buggy address belongs to the physical page: [ 16.582484] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1045d0 [ 16.582673] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.582878] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.583005] page_type: f5(slab) [ 16.583047] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 16.583404] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.583539] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 16.583598] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.583683] head: 0bfffe0000000001 ffffc1ffc3117401 00000000ffffffff 00000000ffffffff [ 16.584048] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 16.584165] page dumped because: kasan: bad access detected [ 16.584227] [ 16.584246] Memory state around the buggy address: [ 16.584613] fff00000c45cff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.584696] fff00000c45cff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.584801] >fff00000c45d0000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.584840] ^ [ 16.584885] fff00000c45d0080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.585196] fff00000c45d0100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.585272] ================================================================== [ 16.588764] ================================================================== [ 16.588819] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520 [ 16.588877] Read of size 1 at addr fff00000c45d0000 by task kunit_try_catch/164 [ 16.588924] [ 16.588958] CPU: 1 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 16.589036] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.589062] Hardware name: linux,dummy-virt (DT) [ 16.589363] Call trace: [ 16.589415] show_stack+0x20/0x38 (C) [ 16.589491] dump_stack_lvl+0x8c/0xd0 [ 16.589831] print_report+0x118/0x5d0 [ 16.589913] kasan_report+0xdc/0x128 [ 16.589982] __asan_report_load1_noabort+0x20/0x30 [ 16.590062] krealloc_uaf+0x4c8/0x520 [ 16.590124] kunit_try_run_case+0x170/0x3f0 [ 16.590432] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.590529] kthread+0x328/0x630 [ 16.590577] ret_from_fork+0x10/0x20 [ 16.590645] [ 16.590664] Allocated by task 164: [ 16.590702] kasan_save_stack+0x3c/0x68 [ 16.590742] kasan_save_track+0x20/0x40 [ 16.590779] kasan_save_alloc_info+0x40/0x58 [ 16.590817] __kasan_kmalloc+0xd4/0xd8 [ 16.590853] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.590891] krealloc_uaf+0xc8/0x520 [ 16.590935] kunit_try_run_case+0x170/0x3f0 [ 16.590972] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.591013] kthread+0x328/0x630 [ 16.591054] ret_from_fork+0x10/0x20 [ 16.591099] [ 16.591117] Freed by task 164: [ 16.591152] kasan_save_stack+0x3c/0x68 [ 16.591194] kasan_save_track+0x20/0x40 [ 16.591229] kasan_save_free_info+0x4c/0x78 [ 16.591276] __kasan_slab_free+0x6c/0x98 [ 16.591313] kfree+0x214/0x3c8 [ 16.591357] krealloc_uaf+0x12c/0x520 [ 16.591400] kunit_try_run_case+0x170/0x3f0 [ 16.591441] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.591493] kthread+0x328/0x630 [ 16.591533] ret_from_fork+0x10/0x20 [ 16.591573] [ 16.591591] The buggy address belongs to the object at fff00000c45d0000 [ 16.591591] which belongs to the cache kmalloc-256 of size 256 [ 16.591645] The buggy address is located 0 bytes inside of [ 16.591645] freed 256-byte region [fff00000c45d0000, fff00000c45d0100) [ 16.591704] [ 16.591722] The buggy address belongs to the physical page: [ 16.591752] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1045d0 [ 16.591812] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.591858] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.591912] page_type: f5(slab) [ 16.591960] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 16.592008] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.592055] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 16.592111] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.592165] head: 0bfffe0000000001 ffffc1ffc3117401 00000000ffffffff 00000000ffffffff [ 16.592213] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 16.592250] page dumped because: kasan: bad access detected [ 16.592290] [ 16.592307] Memory state around the buggy address: [ 16.592692] fff00000c45cff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.592741] fff00000c45cff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.593106] >fff00000c45d0000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.593485] ^ [ 16.593537] fff00000c45d0080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.593617] fff00000c45d0100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.593671] ==================================================================
[ 16.577666] ================================================================== [ 16.578590] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520 [ 16.578672] Read of size 1 at addr fff00000c17c7a00 by task kunit_try_catch/164 [ 16.579171] [ 16.579320] CPU: 0 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 16.579447] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.579481] Hardware name: linux,dummy-virt (DT) [ 16.579513] Call trace: [ 16.579538] show_stack+0x20/0x38 (C) [ 16.579591] dump_stack_lvl+0x8c/0xd0 [ 16.580119] print_report+0x118/0x5d0 [ 16.580651] kasan_report+0xdc/0x128 [ 16.580728] __kasan_check_byte+0x54/0x70 [ 16.581006] krealloc_noprof+0x44/0x360 [ 16.581066] krealloc_uaf+0x180/0x520 [ 16.581123] kunit_try_run_case+0x170/0x3f0 [ 16.581194] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.581256] kthread+0x328/0x630 [ 16.581304] ret_from_fork+0x10/0x20 [ 16.581360] [ 16.581379] Allocated by task 164: [ 16.581408] kasan_save_stack+0x3c/0x68 [ 16.581449] kasan_save_track+0x20/0x40 [ 16.581486] kasan_save_alloc_info+0x40/0x58 [ 16.581526] __kasan_kmalloc+0xd4/0xd8 [ 16.581571] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.581609] krealloc_uaf+0xc8/0x520 [ 16.581642] kunit_try_run_case+0x170/0x3f0 [ 16.581694] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.581769] kthread+0x328/0x630 [ 16.581801] ret_from_fork+0x10/0x20 [ 16.581845] [ 16.582310] Freed by task 164: [ 16.582618] kasan_save_stack+0x3c/0x68 [ 16.582704] kasan_save_track+0x20/0x40 [ 16.582809] kasan_save_free_info+0x4c/0x78 [ 16.582854] __kasan_slab_free+0x6c/0x98 [ 16.582893] kfree+0x214/0x3c8 [ 16.583244] krealloc_uaf+0x12c/0x520 [ 16.583691] kunit_try_run_case+0x170/0x3f0 [ 16.583856] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.583915] kthread+0x328/0x630 [ 16.583948] ret_from_fork+0x10/0x20 [ 16.584388] [ 16.584425] The buggy address belongs to the object at fff00000c17c7a00 [ 16.584425] which belongs to the cache kmalloc-256 of size 256 [ 16.584940] The buggy address is located 0 bytes inside of [ 16.584940] freed 256-byte region [fff00000c17c7a00, fff00000c17c7b00) [ 16.585018] [ 16.585223] The buggy address belongs to the physical page: [ 16.585435] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1017c6 [ 16.585510] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.585556] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.586022] page_type: f5(slab) [ 16.586346] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 16.586677] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.586806] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 16.586855] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.587270] head: 0bfffe0000000001 ffffc1ffc305f181 00000000ffffffff 00000000ffffffff [ 16.587451] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 16.587637] page dumped because: kasan: bad access detected [ 16.587769] [ 16.587848] Memory state around the buggy address: [ 16.588104] fff00000c17c7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.588188] fff00000c17c7980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.588527] >fff00000c17c7a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.588893] ^ [ 16.588949] fff00000c17c7a80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.589207] fff00000c17c7b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.589413] ================================================================== [ 16.592875] ================================================================== [ 16.593091] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520 [ 16.593235] Read of size 1 at addr fff00000c17c7a00 by task kunit_try_catch/164 [ 16.593336] [ 16.593415] CPU: 0 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 16.593502] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.593734] Hardware name: linux,dummy-virt (DT) [ 16.594004] Call trace: [ 16.594178] show_stack+0x20/0x38 (C) [ 16.594433] dump_stack_lvl+0x8c/0xd0 [ 16.594707] print_report+0x118/0x5d0 [ 16.594817] kasan_report+0xdc/0x128 [ 16.594864] __asan_report_load1_noabort+0x20/0x30 [ 16.594977] krealloc_uaf+0x4c8/0x520 [ 16.595065] kunit_try_run_case+0x170/0x3f0 [ 16.595114] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.595501] kthread+0x328/0x630 [ 16.595628] ret_from_fork+0x10/0x20 [ 16.595682] [ 16.595701] Allocated by task 164: [ 16.595771] kasan_save_stack+0x3c/0x68 [ 16.595834] kasan_save_track+0x20/0x40 [ 16.595877] kasan_save_alloc_info+0x40/0x58 [ 16.595916] __kasan_kmalloc+0xd4/0xd8 [ 16.595951] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.595988] krealloc_uaf+0xc8/0x520 [ 16.596031] kunit_try_run_case+0x170/0x3f0 [ 16.596067] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.596108] kthread+0x328/0x630 [ 16.596149] ret_from_fork+0x10/0x20 [ 16.596193] [ 16.596211] Freed by task 164: [ 16.596237] kasan_save_stack+0x3c/0x68 [ 16.596274] kasan_save_track+0x20/0x40 [ 16.596309] kasan_save_free_info+0x4c/0x78 [ 16.596354] __kasan_slab_free+0x6c/0x98 [ 16.596395] kfree+0x214/0x3c8 [ 16.596427] krealloc_uaf+0x12c/0x520 [ 16.596475] kunit_try_run_case+0x170/0x3f0 [ 16.596512] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.596553] kthread+0x328/0x630 [ 16.596584] ret_from_fork+0x10/0x20 [ 16.596617] [ 16.596636] The buggy address belongs to the object at fff00000c17c7a00 [ 16.596636] which belongs to the cache kmalloc-256 of size 256 [ 16.596692] The buggy address is located 0 bytes inside of [ 16.596692] freed 256-byte region [fff00000c17c7a00, fff00000c17c7b00) [ 16.596760] [ 16.596789] The buggy address belongs to the physical page: [ 16.596821] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1017c6 [ 16.596882] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.596929] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 16.596982] page_type: f5(slab) [ 16.597019] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 16.597066] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.597122] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 16.597170] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.597226] head: 0bfffe0000000001 ffffc1ffc305f181 00000000ffffffff 00000000ffffffff [ 16.597272] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 16.597316] page dumped because: kasan: bad access detected [ 16.597361] [ 16.597379] Memory state around the buggy address: [ 16.597409] fff00000c17c7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.597450] fff00000c17c7980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.597491] >fff00000c17c7a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.597526] ^ [ 16.597553] fff00000c17c7a80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.597602] fff00000c17c7b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.597659] ==================================================================
[ 12.207919] ================================================================== [ 12.208760] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x53c/0x5e0 [ 12.209473] Read of size 1 at addr ffff888100a1ec00 by task kunit_try_catch/181 [ 12.210334] [ 12.210581] CPU: 1 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 12.210626] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.210637] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.210658] Call Trace: [ 12.210672] <TASK> [ 12.210690] dump_stack_lvl+0x73/0xb0 [ 12.210720] print_report+0xd1/0x610 [ 12.210742] ? __virt_addr_valid+0x1db/0x2d0 [ 12.210771] ? krealloc_uaf+0x53c/0x5e0 [ 12.210792] ? kasan_complete_mode_report_info+0x64/0x200 [ 12.210814] ? krealloc_uaf+0x53c/0x5e0 [ 12.210835] kasan_report+0x141/0x180 [ 12.210856] ? krealloc_uaf+0x53c/0x5e0 [ 12.210883] __asan_report_load1_noabort+0x18/0x20 [ 12.210916] krealloc_uaf+0x53c/0x5e0 [ 12.210937] ? __pfx_krealloc_uaf+0x10/0x10 [ 12.210957] ? finish_task_switch.isra.0+0x153/0x700 [ 12.210979] ? __switch_to+0x47/0xf50 [ 12.211005] ? __schedule+0x10cc/0x2b60 [ 12.211027] ? __pfx_read_tsc+0x10/0x10 [ 12.211047] ? ktime_get_ts64+0x86/0x230 [ 12.211071] kunit_try_run_case+0x1a5/0x480 [ 12.211095] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.211117] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.211140] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.211163] ? __kthread_parkme+0x82/0x180 [ 12.211183] ? preempt_count_sub+0x50/0x80 [ 12.211206] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.211229] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.211252] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.211275] kthread+0x337/0x6f0 [ 12.211293] ? trace_preempt_on+0x20/0xc0 [ 12.211316] ? __pfx_kthread+0x10/0x10 [ 12.211335] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.211356] ? calculate_sigpending+0x7b/0xa0 [ 12.211381] ? __pfx_kthread+0x10/0x10 [ 12.211401] ret_from_fork+0x116/0x1d0 [ 12.211419] ? __pfx_kthread+0x10/0x10 [ 12.211439] ret_from_fork_asm+0x1a/0x30 [ 12.211470] </TASK> [ 12.211480] [ 12.225679] Allocated by task 181: [ 12.226192] kasan_save_stack+0x45/0x70 [ 12.226634] kasan_save_track+0x18/0x40 [ 12.227129] kasan_save_alloc_info+0x3b/0x50 [ 12.227671] __kasan_kmalloc+0xb7/0xc0 [ 12.228029] __kmalloc_cache_noprof+0x189/0x420 [ 12.228588] krealloc_uaf+0xbb/0x5e0 [ 12.229008] kunit_try_run_case+0x1a5/0x480 [ 12.229540] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.230088] kthread+0x337/0x6f0 [ 12.230291] ret_from_fork+0x116/0x1d0 [ 12.230424] ret_from_fork_asm+0x1a/0x30 [ 12.230768] [ 12.230937] Freed by task 181: [ 12.231296] kasan_save_stack+0x45/0x70 [ 12.231720] kasan_save_track+0x18/0x40 [ 12.232132] kasan_save_free_info+0x3f/0x60 [ 12.232561] __kasan_slab_free+0x56/0x70 [ 12.232877] kfree+0x222/0x3f0 [ 12.233218] krealloc_uaf+0x13d/0x5e0 [ 12.233540] kunit_try_run_case+0x1a5/0x480 [ 12.233728] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.234308] kthread+0x337/0x6f0 [ 12.234699] ret_from_fork+0x116/0x1d0 [ 12.235042] ret_from_fork_asm+0x1a/0x30 [ 12.235391] [ 12.235465] The buggy address belongs to the object at ffff888100a1ec00 [ 12.235465] which belongs to the cache kmalloc-256 of size 256 [ 12.235975] The buggy address is located 0 bytes inside of [ 12.235975] freed 256-byte region [ffff888100a1ec00, ffff888100a1ed00) [ 12.237310] [ 12.237541] The buggy address belongs to the physical page: [ 12.238173] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a1e [ 12.238903] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 12.239415] flags: 0x200000000000040(head|node=0|zone=2) [ 12.240009] page_type: f5(slab) [ 12.240280] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 12.240985] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.241503] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 12.242276] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.242977] head: 0200000000000001 ffffea0004028781 00000000ffffffff 00000000ffffffff [ 12.243495] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 12.244084] page dumped because: kasan: bad access detected [ 12.244316] [ 12.244487] Memory state around the buggy address: [ 12.245076] ffff888100a1eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.245423] ffff888100a1eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.246174] >ffff888100a1ec00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 12.246713] ^ [ 12.246853] ffff888100a1ec80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 12.247326] ffff888100a1ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.248139] ================================================================== [ 12.165575] ================================================================== [ 12.166685] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x1b8/0x5e0 [ 12.166951] Read of size 1 at addr ffff888100a1ec00 by task kunit_try_catch/181 [ 12.168149] [ 12.168443] CPU: 1 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 12.168491] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.168502] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.168524] Call Trace: [ 12.168536] <TASK> [ 12.168554] dump_stack_lvl+0x73/0xb0 [ 12.168586] print_report+0xd1/0x610 [ 12.168609] ? __virt_addr_valid+0x1db/0x2d0 [ 12.168633] ? krealloc_uaf+0x1b8/0x5e0 [ 12.168654] ? kasan_complete_mode_report_info+0x64/0x200 [ 12.168676] ? krealloc_uaf+0x1b8/0x5e0 [ 12.168697] kasan_report+0x141/0x180 [ 12.168719] ? krealloc_uaf+0x1b8/0x5e0 [ 12.168746] ? krealloc_uaf+0x1b8/0x5e0 [ 12.168770] __kasan_check_byte+0x3d/0x50 [ 12.168792] krealloc_noprof+0x3f/0x340 [ 12.168815] krealloc_uaf+0x1b8/0x5e0 [ 12.168836] ? __pfx_krealloc_uaf+0x10/0x10 [ 12.168857] ? finish_task_switch.isra.0+0x153/0x700 [ 12.168881] ? __switch_to+0x47/0xf50 [ 12.168927] ? __schedule+0x10cc/0x2b60 [ 12.168952] ? __pfx_read_tsc+0x10/0x10 [ 12.168973] ? ktime_get_ts64+0x86/0x230 [ 12.168998] kunit_try_run_case+0x1a5/0x480 [ 12.169024] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.169047] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.169071] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.169093] ? __kthread_parkme+0x82/0x180 [ 12.169114] ? preempt_count_sub+0x50/0x80 [ 12.169137] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.169160] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.169184] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.169207] kthread+0x337/0x6f0 [ 12.169226] ? trace_preempt_on+0x20/0xc0 [ 12.169250] ? __pfx_kthread+0x10/0x10 [ 12.169270] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.169291] ? calculate_sigpending+0x7b/0xa0 [ 12.169315] ? __pfx_kthread+0x10/0x10 [ 12.169335] ret_from_fork+0x116/0x1d0 [ 12.169353] ? __pfx_kthread+0x10/0x10 [ 12.169373] ret_from_fork_asm+0x1a/0x30 [ 12.169405] </TASK> [ 12.169416] [ 12.183751] Allocated by task 181: [ 12.184225] kasan_save_stack+0x45/0x70 [ 12.184639] kasan_save_track+0x18/0x40 [ 12.185075] kasan_save_alloc_info+0x3b/0x50 [ 12.185562] __kasan_kmalloc+0xb7/0xc0 [ 12.185950] __kmalloc_cache_noprof+0x189/0x420 [ 12.186406] krealloc_uaf+0xbb/0x5e0 [ 12.186809] kunit_try_run_case+0x1a5/0x480 [ 12.187266] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.187840] kthread+0x337/0x6f0 [ 12.188150] ret_from_fork+0x116/0x1d0 [ 12.188647] ret_from_fork_asm+0x1a/0x30 [ 12.189138] [ 12.189370] Freed by task 181: [ 12.189767] kasan_save_stack+0x45/0x70 [ 12.190252] kasan_save_track+0x18/0x40 [ 12.190668] kasan_save_free_info+0x3f/0x60 [ 12.191142] __kasan_slab_free+0x56/0x70 [ 12.191386] kfree+0x222/0x3f0 [ 12.191504] krealloc_uaf+0x13d/0x5e0 [ 12.192075] kunit_try_run_case+0x1a5/0x480 [ 12.192497] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.193134] kthread+0x337/0x6f0 [ 12.193450] ret_from_fork+0x116/0x1d0 [ 12.193745] ret_from_fork_asm+0x1a/0x30 [ 12.194243] [ 12.194417] The buggy address belongs to the object at ffff888100a1ec00 [ 12.194417] which belongs to the cache kmalloc-256 of size 256 [ 12.195539] The buggy address is located 0 bytes inside of [ 12.195539] freed 256-byte region [ffff888100a1ec00, ffff888100a1ed00) [ 12.196177] [ 12.196255] The buggy address belongs to the physical page: [ 12.196432] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a1e [ 12.197198] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 12.197969] flags: 0x200000000000040(head|node=0|zone=2) [ 12.198548] page_type: f5(slab) [ 12.198918] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 12.199841] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.200625] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 12.201391] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.201772] head: 0200000000000001 ffffea0004028781 00000000ffffffff 00000000ffffffff [ 12.202037] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 12.202796] page dumped because: kasan: bad access detected [ 12.203389] [ 12.203597] Memory state around the buggy address: [ 12.204141] ffff888100a1eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.204865] ffff888100a1eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.205510] >ffff888100a1ec00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 12.205743] ^ [ 12.205861] ffff888100a1ec80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 12.206121] ffff888100a1ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.206924] ==================================================================
[ 11.930644] ================================================================== [ 11.931924] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x1b8/0x5e0 [ 11.932589] Read of size 1 at addr ffff888100a28400 by task kunit_try_catch/182 [ 11.933473] [ 11.933724] CPU: 1 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 11.933783] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.933795] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.933816] Call Trace: [ 11.933829] <TASK> [ 11.933846] dump_stack_lvl+0x73/0xb0 [ 11.933878] print_report+0xd1/0x610 [ 11.933900] ? __virt_addr_valid+0x1db/0x2d0 [ 11.933923] ? krealloc_uaf+0x1b8/0x5e0 [ 11.933944] ? kasan_complete_mode_report_info+0x64/0x200 [ 11.933966] ? krealloc_uaf+0x1b8/0x5e0 [ 11.933987] kasan_report+0x141/0x180 [ 11.934009] ? krealloc_uaf+0x1b8/0x5e0 [ 11.934033] ? krealloc_uaf+0x1b8/0x5e0 [ 11.934055] __kasan_check_byte+0x3d/0x50 [ 11.934077] krealloc_noprof+0x3f/0x340 [ 11.934100] krealloc_uaf+0x1b8/0x5e0 [ 11.934121] ? __pfx_krealloc_uaf+0x10/0x10 [ 11.934141] ? finish_task_switch.isra.0+0x153/0x700 [ 11.934164] ? __switch_to+0x47/0xf50 [ 11.934190] ? __schedule+0x10cc/0x2b60 [ 11.934211] ? __pfx_read_tsc+0x10/0x10 [ 11.934231] ? ktime_get_ts64+0x86/0x230 [ 11.934257] kunit_try_run_case+0x1a5/0x480 [ 11.934281] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.934303] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.934326] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.934349] ? __kthread_parkme+0x82/0x180 [ 11.934370] ? preempt_count_sub+0x50/0x80 [ 11.934394] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.934606] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.934631] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.934655] kthread+0x337/0x6f0 [ 11.934709] ? trace_preempt_on+0x20/0xc0 [ 11.934734] ? __pfx_kthread+0x10/0x10 [ 11.934754] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.934776] ? calculate_sigpending+0x7b/0xa0 [ 11.934800] ? __pfx_kthread+0x10/0x10 [ 11.934820] ret_from_fork+0x116/0x1d0 [ 11.934838] ? __pfx_kthread+0x10/0x10 [ 11.934858] ret_from_fork_asm+0x1a/0x30 [ 11.934890] </TASK> [ 11.934901] [ 11.952639] Allocated by task 182: [ 11.952792] kasan_save_stack+0x45/0x70 [ 11.952939] kasan_save_track+0x18/0x40 [ 11.953072] kasan_save_alloc_info+0x3b/0x50 [ 11.953224] __kasan_kmalloc+0xb7/0xc0 [ 11.953351] __kmalloc_cache_noprof+0x189/0x420 [ 11.953764] krealloc_uaf+0xbb/0x5e0 [ 11.954081] kunit_try_run_case+0x1a5/0x480 [ 11.954536] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.955021] kthread+0x337/0x6f0 [ 11.955140] ret_from_fork+0x116/0x1d0 [ 11.955270] ret_from_fork_asm+0x1a/0x30 [ 11.955405] [ 11.955486] Freed by task 182: [ 11.955619] kasan_save_stack+0x45/0x70 [ 11.955800] kasan_save_track+0x18/0x40 [ 11.955931] kasan_save_free_info+0x3f/0x60 [ 11.956072] __kasan_slab_free+0x56/0x70 [ 11.956287] kfree+0x222/0x3f0 [ 11.956452] krealloc_uaf+0x13d/0x5e0 [ 11.956631] kunit_try_run_case+0x1a5/0x480 [ 11.956772] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.957181] kthread+0x337/0x6f0 [ 11.957830] ret_from_fork+0x116/0x1d0 [ 11.958006] ret_from_fork_asm+0x1a/0x30 [ 11.958174] [ 11.958245] The buggy address belongs to the object at ffff888100a28400 [ 11.958245] which belongs to the cache kmalloc-256 of size 256 [ 11.959032] The buggy address is located 0 bytes inside of [ 11.959032] freed 256-byte region [ffff888100a28400, ffff888100a28500) [ 11.960023] [ 11.960124] The buggy address belongs to the physical page: [ 11.960336] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a28 [ 11.960860] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 11.961318] flags: 0x200000000000040(head|node=0|zone=2) [ 11.961713] page_type: f5(slab) [ 11.961895] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 11.962199] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.962534] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 11.962848] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.963156] head: 0200000000000001 ffffea0004028a01 00000000ffffffff 00000000ffffffff [ 11.963816] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 11.964135] page dumped because: kasan: bad access detected [ 11.964340] [ 11.964526] Memory state around the buggy address: [ 11.964891] ffff888100a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.965178] ffff888100a28380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.965747] >ffff888100a28400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 11.966206] ^ [ 11.966333] ffff888100a28480: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 11.966823] ffff888100a28500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.967280] ================================================================== [ 11.967985] ================================================================== [ 11.968447] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x53c/0x5e0 [ 11.968757] Read of size 1 at addr ffff888100a28400 by task kunit_try_catch/182 [ 11.969086] [ 11.969603] CPU: 1 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 11.969649] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.969659] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.969678] Call Trace: [ 11.969694] <TASK> [ 11.969709] dump_stack_lvl+0x73/0xb0 [ 11.969738] print_report+0xd1/0x610 [ 11.969760] ? __virt_addr_valid+0x1db/0x2d0 [ 11.969783] ? krealloc_uaf+0x53c/0x5e0 [ 11.969803] ? kasan_complete_mode_report_info+0x64/0x200 [ 11.969826] ? krealloc_uaf+0x53c/0x5e0 [ 11.969847] kasan_report+0x141/0x180 [ 11.969868] ? krealloc_uaf+0x53c/0x5e0 [ 11.969895] __asan_report_load1_noabort+0x18/0x20 [ 11.969918] krealloc_uaf+0x53c/0x5e0 [ 11.969939] ? __pfx_krealloc_uaf+0x10/0x10 [ 11.969959] ? finish_task_switch.isra.0+0x153/0x700 [ 11.969981] ? __switch_to+0x47/0xf50 [ 11.970006] ? __schedule+0x10cc/0x2b60 [ 11.970028] ? __pfx_read_tsc+0x10/0x10 [ 11.970048] ? ktime_get_ts64+0x86/0x230 [ 11.970072] kunit_try_run_case+0x1a5/0x480 [ 11.970095] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.970117] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.970140] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.970163] ? __kthread_parkme+0x82/0x180 [ 11.970183] ? preempt_count_sub+0x50/0x80 [ 11.970206] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.970229] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.970252] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.970276] kthread+0x337/0x6f0 [ 11.970294] ? trace_preempt_on+0x20/0xc0 [ 11.970317] ? __pfx_kthread+0x10/0x10 [ 11.970337] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.970357] ? calculate_sigpending+0x7b/0xa0 [ 11.970380] ? __pfx_kthread+0x10/0x10 [ 11.970401] ret_from_fork+0x116/0x1d0 [ 11.970432] ? __pfx_kthread+0x10/0x10 [ 11.970464] ret_from_fork_asm+0x1a/0x30 [ 11.970496] </TASK> [ 11.970506] [ 11.982368] Allocated by task 182: [ 11.982740] kasan_save_stack+0x45/0x70 [ 11.983187] kasan_save_track+0x18/0x40 [ 11.983536] kasan_save_alloc_info+0x3b/0x50 [ 11.984129] __kasan_kmalloc+0xb7/0xc0 [ 11.984547] __kmalloc_cache_noprof+0x189/0x420 [ 11.984963] krealloc_uaf+0xbb/0x5e0 [ 11.985288] kunit_try_run_case+0x1a5/0x480 [ 11.985812] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.986497] kthread+0x337/0x6f0 [ 11.986847] ret_from_fork+0x116/0x1d0 [ 11.987080] ret_from_fork_asm+0x1a/0x30 [ 11.987220] [ 11.987291] Freed by task 182: [ 11.987402] kasan_save_stack+0x45/0x70 [ 11.987766] kasan_save_track+0x18/0x40 [ 11.988125] kasan_save_free_info+0x3f/0x60 [ 11.988669] __kasan_slab_free+0x56/0x70 [ 11.989037] kfree+0x222/0x3f0 [ 11.989317] krealloc_uaf+0x13d/0x5e0 [ 11.989773] kunit_try_run_case+0x1a5/0x480 [ 11.990122] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.990300] kthread+0x337/0x6f0 [ 11.990502] ret_from_fork+0x116/0x1d0 [ 11.990883] ret_from_fork_asm+0x1a/0x30 [ 11.991226] [ 11.991383] The buggy address belongs to the object at ffff888100a28400 [ 11.991383] which belongs to the cache kmalloc-256 of size 256 [ 11.992543] The buggy address is located 0 bytes inside of [ 11.992543] freed 256-byte region [ffff888100a28400, ffff888100a28500) [ 11.993048] [ 11.993126] The buggy address belongs to the physical page: [ 11.993309] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a28 [ 11.993575] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 11.994057] flags: 0x200000000000040(head|node=0|zone=2) [ 11.994357] page_type: f5(slab) [ 11.994614] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 11.994951] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.995260] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 11.995674] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.996006] head: 0200000000000001 ffffea0004028a01 00000000ffffffff 00000000ffffffff [ 11.996324] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 11.996684] page dumped because: kasan: bad access detected [ 11.996855] [ 11.996923] Memory state around the buggy address: [ 11.997153] ffff888100a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.997639] ffff888100a28380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.997912] >ffff888100a28400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 11.998158] ^ [ 11.998326] ffff888100a28480: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 11.998718] ffff888100a28500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.998948] ==================================================================
[ 12.123173] ================================================================== [ 12.123502] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x53c/0x5e0 [ 12.123811] Read of size 1 at addr ffff888100348c00 by task kunit_try_catch/181 [ 12.124124] [ 12.124239] CPU: 0 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 12.124285] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.124296] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.124317] Call Trace: [ 12.124338] <TASK> [ 12.124359] dump_stack_lvl+0x73/0xb0 [ 12.124389] print_report+0xd1/0x610 [ 12.124413] ? __virt_addr_valid+0x1db/0x2d0 [ 12.124435] ? krealloc_uaf+0x53c/0x5e0 [ 12.124455] ? kasan_complete_mode_report_info+0x64/0x200 [ 12.124476] ? krealloc_uaf+0x53c/0x5e0 [ 12.124496] kasan_report+0x141/0x180 [ 12.124516] ? krealloc_uaf+0x53c/0x5e0 [ 12.124540] __asan_report_load1_noabort+0x18/0x20 [ 12.124563] krealloc_uaf+0x53c/0x5e0 [ 12.124583] ? __pfx_krealloc_uaf+0x10/0x10 [ 12.124602] ? finish_task_switch.isra.0+0x153/0x700 [ 12.124624] ? __switch_to+0x47/0xf50 [ 12.124648] ? __schedule+0x10cc/0x2b60 [ 12.124669] ? __pfx_read_tsc+0x10/0x10 [ 12.124689] ? ktime_get_ts64+0x86/0x230 [ 12.124711] kunit_try_run_case+0x1a5/0x480 [ 12.124734] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.124755] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.124777] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.124798] ? __kthread_parkme+0x82/0x180 [ 12.124818] ? preempt_count_sub+0x50/0x80 [ 12.124839] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.124868] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.124890] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.124912] kthread+0x337/0x6f0 [ 12.124929] ? trace_preempt_on+0x20/0xc0 [ 12.124951] ? __pfx_kthread+0x10/0x10 [ 12.124970] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.124989] ? calculate_sigpending+0x7b/0xa0 [ 12.125022] ? __pfx_kthread+0x10/0x10 [ 12.125042] ret_from_fork+0x116/0x1d0 [ 12.125059] ? __pfx_kthread+0x10/0x10 [ 12.125077] ret_from_fork_asm+0x1a/0x30 [ 12.125107] </TASK> [ 12.125116] [ 12.133391] Allocated by task 181: [ 12.133619] kasan_save_stack+0x45/0x70 [ 12.133842] kasan_save_track+0x18/0x40 [ 12.134307] kasan_save_alloc_info+0x3b/0x50 [ 12.134537] __kasan_kmalloc+0xb7/0xc0 [ 12.134749] __kmalloc_cache_noprof+0x189/0x420 [ 12.134942] krealloc_uaf+0xbb/0x5e0 [ 12.135266] kunit_try_run_case+0x1a5/0x480 [ 12.135450] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.135704] kthread+0x337/0x6f0 [ 12.135833] ret_from_fork+0x116/0x1d0 [ 12.135972] ret_from_fork_asm+0x1a/0x30 [ 12.136258] [ 12.136358] Freed by task 181: [ 12.136543] kasan_save_stack+0x45/0x70 [ 12.136737] kasan_save_track+0x18/0x40 [ 12.136909] kasan_save_free_info+0x3f/0x60 [ 12.137179] __kasan_slab_free+0x56/0x70 [ 12.137389] kfree+0x222/0x3f0 [ 12.137562] krealloc_uaf+0x13d/0x5e0 [ 12.137740] kunit_try_run_case+0x1a5/0x480 [ 12.137919] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.138438] kthread+0x337/0x6f0 [ 12.138596] ret_from_fork+0x116/0x1d0 [ 12.138776] ret_from_fork_asm+0x1a/0x30 [ 12.138920] [ 12.139120] The buggy address belongs to the object at ffff888100348c00 [ 12.139120] which belongs to the cache kmalloc-256 of size 256 [ 12.139657] The buggy address is located 0 bytes inside of [ 12.139657] freed 256-byte region [ffff888100348c00, ffff888100348d00) [ 12.140259] [ 12.140358] The buggy address belongs to the physical page: [ 12.140613] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100348 [ 12.140864] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 12.141234] flags: 0x200000000000040(head|node=0|zone=2) [ 12.141518] page_type: f5(slab) [ 12.141689] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 12.142247] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.142626] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 12.142939] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.143352] head: 0200000000000001 ffffea000400d201 00000000ffffffff 00000000ffffffff [ 12.143690] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 12.143920] page dumped because: kasan: bad access detected [ 12.144222] [ 12.144318] Memory state around the buggy address: [ 12.144568] ffff888100348b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.144890] ffff888100348b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.145211] >ffff888100348c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 12.145562] ^ [ 12.145728] ffff888100348c80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 12.146275] ffff888100348d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.146561] ================================================================== [ 12.097001] ================================================================== [ 12.097504] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x1b8/0x5e0 [ 12.097798] Read of size 1 at addr ffff888100348c00 by task kunit_try_catch/181 [ 12.098104] [ 12.098225] CPU: 0 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 12.098273] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.098284] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.098306] Call Trace: [ 12.098320] <TASK> [ 12.098338] dump_stack_lvl+0x73/0xb0 [ 12.098369] print_report+0xd1/0x610 [ 12.098391] ? __virt_addr_valid+0x1db/0x2d0 [ 12.098415] ? krealloc_uaf+0x1b8/0x5e0 [ 12.098434] ? kasan_complete_mode_report_info+0x64/0x200 [ 12.098455] ? krealloc_uaf+0x1b8/0x5e0 [ 12.098475] kasan_report+0x141/0x180 [ 12.098495] ? krealloc_uaf+0x1b8/0x5e0 [ 12.098518] ? krealloc_uaf+0x1b8/0x5e0 [ 12.098538] __kasan_check_byte+0x3d/0x50 [ 12.098558] krealloc_noprof+0x3f/0x340 [ 12.098580] krealloc_uaf+0x1b8/0x5e0 [ 12.098600] ? __pfx_krealloc_uaf+0x10/0x10 [ 12.098620] ? finish_task_switch.isra.0+0x153/0x700 [ 12.098642] ? __switch_to+0x47/0xf50 [ 12.098667] ? __schedule+0x10cc/0x2b60 [ 12.098689] ? __pfx_read_tsc+0x10/0x10 [ 12.098709] ? ktime_get_ts64+0x86/0x230 [ 12.098732] kunit_try_run_case+0x1a5/0x480 [ 12.098758] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.098778] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.098801] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.098823] ? __kthread_parkme+0x82/0x180 [ 12.098843] ? preempt_count_sub+0x50/0x80 [ 12.098864] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.098886] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.098908] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.098930] kthread+0x337/0x6f0 [ 12.098948] ? trace_preempt_on+0x20/0xc0 [ 12.098971] ? __pfx_kthread+0x10/0x10 [ 12.098990] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.099105] ? calculate_sigpending+0x7b/0xa0 [ 12.099134] ? __pfx_kthread+0x10/0x10 [ 12.099155] ret_from_fork+0x116/0x1d0 [ 12.099174] ? __pfx_kthread+0x10/0x10 [ 12.099193] ret_from_fork_asm+0x1a/0x30 [ 12.099224] </TASK> [ 12.099233] [ 12.107280] Allocated by task 181: [ 12.107448] kasan_save_stack+0x45/0x70 [ 12.107691] kasan_save_track+0x18/0x40 [ 12.107843] kasan_save_alloc_info+0x3b/0x50 [ 12.108163] __kasan_kmalloc+0xb7/0xc0 [ 12.108346] __kmalloc_cache_noprof+0x189/0x420 [ 12.108566] krealloc_uaf+0xbb/0x5e0 [ 12.108753] kunit_try_run_case+0x1a5/0x480 [ 12.108929] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.109237] kthread+0x337/0x6f0 [ 12.109384] ret_from_fork+0x116/0x1d0 [ 12.109579] ret_from_fork_asm+0x1a/0x30 [ 12.109754] [ 12.109875] Freed by task 181: [ 12.110101] kasan_save_stack+0x45/0x70 [ 12.110288] kasan_save_track+0x18/0x40 [ 12.110482] kasan_save_free_info+0x3f/0x60 [ 12.110671] __kasan_slab_free+0x56/0x70 [ 12.110843] kfree+0x222/0x3f0 [ 12.111202] krealloc_uaf+0x13d/0x5e0 [ 12.111395] kunit_try_run_case+0x1a5/0x480 [ 12.111625] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.111802] kthread+0x337/0x6f0 [ 12.111923] ret_from_fork+0x116/0x1d0 [ 12.112148] ret_from_fork_asm+0x1a/0x30 [ 12.112314] [ 12.112391] The buggy address belongs to the object at ffff888100348c00 [ 12.112391] which belongs to the cache kmalloc-256 of size 256 [ 12.113112] The buggy address is located 0 bytes inside of [ 12.113112] freed 256-byte region [ffff888100348c00, ffff888100348d00) [ 12.113675] [ 12.113765] The buggy address belongs to the physical page: [ 12.113942] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100348 [ 12.114273] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 12.114605] flags: 0x200000000000040(head|node=0|zone=2) [ 12.114868] page_type: f5(slab) [ 12.115354] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 12.115733] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.116173] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000 [ 12.116545] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 12.116895] head: 0200000000000001 ffffea000400d201 00000000ffffffff 00000000ffffffff [ 12.117300] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 12.117564] page dumped because: kasan: bad access detected [ 12.117735] [ 12.117829] Memory state around the buggy address: [ 12.118131] ffff888100348b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.118474] ffff888100348b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.118761] >ffff888100348c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 12.119322] ^ [ 12.119516] ffff888100348c80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 12.119809] ffff888100348d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.120194] ==================================================================