Date
June 8, 2025, 11:09 p.m.
Environment | |
---|---|
e850-96 | |
qemu-arm64 | |
qemu-x86_64 | |
rk3399-rock-pi-4b |
[ 32.571518] ================================================================== [ 32.571693] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70 [ 32.571818] Read of size 4 at addr ffff000800c30c00 by task swapper/5/0 [ 32.572879] [ 32.574369] CPU: 5 UID: 0 PID: 0 Comm: swapper/5 Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 32.574425] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.574441] Hardware name: WinLink E850-96 board (DT) [ 32.574464] Call trace: [ 32.574479] show_stack+0x20/0x38 (C) [ 32.574515] dump_stack_lvl+0x8c/0xd0 [ 32.574553] print_report+0x118/0x608 [ 32.574589] kasan_report+0xdc/0x128 [ 32.574625] __asan_report_load4_noabort+0x20/0x30 [ 32.574662] rcu_uaf_reclaim+0x64/0x70 [ 32.574691] rcu_core+0x9f4/0x1e20 [ 32.574724] rcu_core_si+0x18/0x30 [ 32.574754] handle_softirqs+0x374/0xb28 [ 32.574789] __do_softirq+0x1c/0x28 [ 32.574821] ____do_softirq+0x18/0x30 [ 32.574857] call_on_irq_stack+0x24/0x30 [ 32.574886] do_softirq_own_stack+0x24/0x38 [ 32.574916] __irq_exit_rcu+0x1fc/0x318 [ 32.574946] irq_exit_rcu+0x1c/0x80 [ 32.574975] el1_interrupt+0x38/0x58 [ 32.575013] el1h_64_irq_handler+0x18/0x28 [ 32.575041] el1h_64_irq+0x6c/0x70 [ 32.575068] arch_local_irq_enable+0x4/0x8 (P) [ 32.575103] do_idle+0x384/0x4e8 [ 32.575134] cpu_startup_entry+0x64/0x80 [ 32.575167] secondary_start_kernel+0x288/0x340 [ 32.575200] __secondary_switched+0xc0/0xc8 [ 32.575243] [ 32.684076] Allocated by task 245: [ 32.687463] kasan_save_stack+0x3c/0x68 [ 32.691281] kasan_save_track+0x20/0x40 [ 32.695100] kasan_save_alloc_info+0x40/0x58 [ 32.699352] __kasan_kmalloc+0xd4/0xd8 [ 32.703085] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.707599] rcu_uaf+0xb0/0x2d8 [ 32.710724] kunit_try_run_case+0x170/0x3f0 [ 32.714890] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.720359] kthread+0x328/0x630 [ 32.723571] ret_from_fork+0x10/0x20 [ 32.727130] [ 32.728605] Freed by task 0: [ 32.731472] kasan_save_stack+0x3c/0x68 [ 32.735289] kasan_save_track+0x20/0x40 [ 32.739109] kasan_save_free_info+0x4c/0x78 [ 32.743275] __kasan_slab_free+0x6c/0x98 [ 32.747181] kfree+0x214/0x3c8 [ 32.750220] rcu_uaf_reclaim+0x28/0x70 [ 32.753954] rcu_core+0x9f4/0x1e20 [ 32.757338] rcu_core_si+0x18/0x30 [ 32.760725] handle_softirqs+0x374/0xb28 [ 32.764630] __do_softirq+0x1c/0x28 [ 32.768102] [ 32.769579] Last potentially related work creation: [ 32.774440] kasan_save_stack+0x3c/0x68 [ 32.778257] kasan_record_aux_stack+0xb4/0xc8 [ 32.782598] __call_rcu_common.constprop.0+0x70/0x8b0 [ 32.787632] call_rcu+0x18/0x30 [ 32.790759] rcu_uaf+0x14c/0x2d8 [ 32.793969] kunit_try_run_case+0x170/0x3f0 [ 32.798136] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.803604] kthread+0x328/0x630 [ 32.806816] ret_from_fork+0x10/0x20 [ 32.810375] [ 32.811852] The buggy address belongs to the object at ffff000800c30c00 [ 32.811852] which belongs to the cache kmalloc-32 of size 32 [ 32.824180] The buggy address is located 0 bytes inside of [ 32.824180] freed 32-byte region [ffff000800c30c00, ffff000800c30c20) [ 32.836156] [ 32.837635] The buggy address belongs to the physical page: [ 32.843191] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c30 [ 32.851177] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.857685] page_type: f5(slab) [ 32.860823] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000 [ 32.868541] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 32.876261] page dumped because: kasan: bad access detected [ 32.881815] [ 32.883290] Memory state around the buggy address: [ 32.888071] ffff000800c30b00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 32.895274] ffff000800c30b80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 32.902480] >ffff000800c30c00: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 32.909679] ^ [ 32.912895] ffff000800c30c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.920100] ffff000800c30d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.927302] ==================================================================
[ 26.064049] ================================================================== [ 26.064300] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70 [ 26.064458] Read of size 4 at addr fff00000c641c180 by task swapper/0/0 [ 26.064578] [ 26.064774] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 26.065050] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.065198] Hardware name: linux,dummy-virt (DT) [ 26.065413] Call trace: [ 26.065482] show_stack+0x20/0x38 (C) [ 26.065628] dump_stack_lvl+0x8c/0xd0 [ 26.065755] print_report+0x118/0x608 [ 26.065878] kasan_report+0xdc/0x128 [ 26.066020] __asan_report_load4_noabort+0x20/0x30 [ 26.066152] rcu_uaf_reclaim+0x64/0x70 [ 26.066685] rcu_core+0x9f4/0x1e20 [ 26.066923] rcu_core_si+0x18/0x30 [ 26.067198] handle_softirqs+0x374/0xb28 [ 26.067414] __do_softirq+0x1c/0x28 [ 26.067772] ____do_softirq+0x18/0x30 [ 26.067896] call_on_irq_stack+0x24/0x30 [ 26.068033] do_softirq_own_stack+0x24/0x38 [ 26.070040] __irq_exit_rcu+0x1fc/0x318 [ 26.070663] irq_exit_rcu+0x1c/0x80 [ 26.070785] el1_interrupt+0x38/0x58 [ 26.071439] el1h_64_irq_handler+0x18/0x28 [ 26.071590] el1h_64_irq+0x6c/0x70 [ 26.071849] arch_local_irq_enable+0x4/0x8 (P) [ 26.072057] do_idle+0x384/0x4e8 [ 26.072251] cpu_startup_entry+0x64/0x80 [ 26.073004] rest_init+0x160/0x188 [ 26.073141] start_kernel+0x30c/0x3d0 [ 26.073290] __primary_switched+0x8c/0xa0 [ 26.073433] [ 26.073482] Allocated by task 198: [ 26.073582] kasan_save_stack+0x3c/0x68 [ 26.073690] kasan_save_track+0x20/0x40 [ 26.073785] kasan_save_alloc_info+0x40/0x58 [ 26.073962] __kasan_kmalloc+0xd4/0xd8 [ 26.074068] __kmalloc_cache_noprof+0x16c/0x3c0 [ 26.074361] rcu_uaf+0xb0/0x2d8 [ 26.074472] kunit_try_run_case+0x170/0x3f0 [ 26.074686] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.074801] kthread+0x328/0x630 [ 26.074914] ret_from_fork+0x10/0x20 [ 26.075059] [ 26.075158] Freed by task 0: [ 26.075262] kasan_save_stack+0x3c/0x68 [ 26.075386] kasan_save_track+0x20/0x40 [ 26.075492] kasan_save_free_info+0x4c/0x78 [ 26.075611] __kasan_slab_free+0x6c/0x98 [ 26.075784] kfree+0x214/0x3c8 [ 26.075883] rcu_uaf_reclaim+0x28/0x70 [ 26.076013] rcu_core+0x9f4/0x1e20 [ 26.076200] rcu_core_si+0x18/0x30 [ 26.076396] handle_softirqs+0x374/0xb28 [ 26.076558] __do_softirq+0x1c/0x28 [ 26.076684] [ 26.076823] Last potentially related work creation: [ 26.076913] kasan_save_stack+0x3c/0x68 [ 26.077085] kasan_record_aux_stack+0xb4/0xc8 [ 26.077211] __call_rcu_common.constprop.0+0x70/0x8b0 [ 26.077330] call_rcu+0x18/0x30 [ 26.077423] rcu_uaf+0x14c/0x2d8 [ 26.077559] kunit_try_run_case+0x170/0x3f0 [ 26.077656] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.077766] kthread+0x328/0x630 [ 26.077867] ret_from_fork+0x10/0x20 [ 26.078189] [ 26.078254] The buggy address belongs to the object at fff00000c641c180 [ 26.078254] which belongs to the cache kmalloc-32 of size 32 [ 26.078446] The buggy address is located 0 bytes inside of [ 26.078446] freed 32-byte region [fff00000c641c180, fff00000c641c1a0) [ 26.078654] [ 26.078819] The buggy address belongs to the physical page: [ 26.078916] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10641c [ 26.079127] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.079499] page_type: f5(slab) [ 26.079608] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 26.079736] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 26.079837] page dumped because: kasan: bad access detected [ 26.079912] [ 26.079996] Memory state around the buggy address: [ 26.080174] fff00000c641c080: 00 00 00 fc fc fc fc fc 00 00 05 fc fc fc fc fc [ 26.080391] fff00000c641c100: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 26.080536] >fff00000c641c180: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 26.080637] ^ [ 26.080721] fff00000c641c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.080866] fff00000c641c280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.080988] ==================================================================
[ 26.306313] ================================================================== [ 26.306545] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70 [ 26.309457] Read of size 4 at addr fff00000c773e240 by task swapper/0/0 [ 26.310109] [ 26.310201] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 26.311496] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.311570] Hardware name: linux,dummy-virt (DT) [ 26.312609] Call trace: [ 26.313099] show_stack+0x20/0x38 (C) [ 26.313272] dump_stack_lvl+0x8c/0xd0 [ 26.313404] print_report+0x118/0x608 [ 26.314375] kasan_report+0xdc/0x128 [ 26.314498] __asan_report_load4_noabort+0x20/0x30 [ 26.314628] rcu_uaf_reclaim+0x64/0x70 [ 26.314742] rcu_core+0x9f4/0x1e20 [ 26.317492] rcu_core_si+0x18/0x30 [ 26.318691] handle_softirqs+0x374/0xb28 [ 26.319098] __do_softirq+0x1c/0x28 [ 26.319641] ____do_softirq+0x18/0x30 [ 26.320919] call_on_irq_stack+0x24/0x30 [ 26.321381] do_softirq_own_stack+0x24/0x38 [ 26.321520] __irq_exit_rcu+0x1fc/0x318 [ 26.322486] irq_exit_rcu+0x1c/0x80 [ 26.322608] el1_interrupt+0x38/0x58 [ 26.322728] el1h_64_irq_handler+0x18/0x28 [ 26.322864] el1h_64_irq+0x6c/0x70 [ 26.323562] arch_local_irq_enable+0x4/0x8 (P) [ 26.323704] do_idle+0x384/0x4e8 [ 26.323830] cpu_startup_entry+0x64/0x80 [ 26.323970] rest_init+0x160/0x188 [ 26.324109] start_kernel+0x30c/0x3d0 [ 26.324297] __primary_switched+0x8c/0xa0 [ 26.324609] [ 26.324664] Allocated by task 198: [ 26.324876] kasan_save_stack+0x3c/0x68 [ 26.324991] kasan_save_track+0x20/0x40 [ 26.325195] kasan_save_alloc_info+0x40/0x58 [ 26.325312] __kasan_kmalloc+0xd4/0xd8 [ 26.325426] __kmalloc_cache_noprof+0x16c/0x3c0 [ 26.325551] rcu_uaf+0xb0/0x2d8 [ 26.325641] kunit_try_run_case+0x170/0x3f0 [ 26.326124] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.326411] kthread+0x328/0x630 [ 26.326596] ret_from_fork+0x10/0x20 [ 26.326822] [ 26.326890] Freed by task 0: [ 26.326971] kasan_save_stack+0x3c/0x68 [ 26.327296] kasan_save_track+0x20/0x40 [ 26.327418] kasan_save_free_info+0x4c/0x78 [ 26.327537] __kasan_slab_free+0x6c/0x98 [ 26.327826] kfree+0x214/0x3c8 [ 26.327941] rcu_uaf_reclaim+0x28/0x70 [ 26.328052] rcu_core+0x9f4/0x1e20 [ 26.328102] rcu_core_si+0x18/0x30 [ 26.328147] handle_softirqs+0x374/0xb28 [ 26.328194] __do_softirq+0x1c/0x28 [ 26.328239] [ 26.328279] Last potentially related work creation: [ 26.328325] kasan_save_stack+0x3c/0x68 [ 26.328379] kasan_record_aux_stack+0xb4/0xc8 [ 26.328432] __call_rcu_common.constprop.0+0x70/0x8b0 [ 26.328484] call_rcu+0x18/0x30 [ 26.328523] rcu_uaf+0x14c/0x2d8 [ 26.328563] kunit_try_run_case+0x170/0x3f0 [ 26.328610] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.328666] kthread+0x328/0x630 [ 26.328705] ret_from_fork+0x10/0x20 [ 26.328758] [ 26.328792] The buggy address belongs to the object at fff00000c773e240 [ 26.328792] which belongs to the cache kmalloc-32 of size 32 [ 26.328916] The buggy address is located 0 bytes inside of [ 26.328916] freed 32-byte region [fff00000c773e240, fff00000c773e260) [ 26.329595] [ 26.330061] The buggy address belongs to the physical page: [ 26.330619] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10773e [ 26.331347] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.331475] page_type: f5(slab) [ 26.331581] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 26.331705] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 26.331814] page dumped because: kasan: bad access detected [ 26.331908] [ 26.331957] Memory state around the buggy address: [ 26.332040] fff00000c773e100: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 26.332145] fff00000c773e180: 00 00 05 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 26.333282] >fff00000c773e200: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 26.333384] ^ [ 26.333480] fff00000c773e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.333643] fff00000c773e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.333751] ==================================================================
[ 19.922858] ================================================================== [ 19.924012] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x50/0x60 [ 19.924824] Read of size 4 at addr ffff8881039cd400 by task swapper/0/0 [ 19.925333] [ 19.925656] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 19.925780] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.925819] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.925879] Call Trace: [ 19.925956] <IRQ> [ 19.926012] dump_stack_lvl+0x73/0xb0 [ 19.926109] print_report+0xd1/0x650 [ 19.926188] ? __virt_addr_valid+0x1db/0x2d0 [ 19.926267] ? rcu_uaf_reclaim+0x50/0x60 [ 19.926336] ? kasan_complete_mode_report_info+0x64/0x200 [ 19.926407] ? rcu_uaf_reclaim+0x50/0x60 [ 19.926475] kasan_report+0x141/0x180 [ 19.926826] ? rcu_uaf_reclaim+0x50/0x60 [ 19.926872] __asan_report_load4_noabort+0x18/0x20 [ 19.926912] rcu_uaf_reclaim+0x50/0x60 [ 19.926944] rcu_core+0x66f/0x1c40 [ 19.926985] ? __pfx_rcu_core+0x10/0x10 [ 19.927016] ? ktime_get+0x6b/0x150 [ 19.927047] ? handle_softirqs+0x18e/0x730 [ 19.927087] rcu_core_si+0x12/0x20 [ 19.927117] handle_softirqs+0x209/0x730 [ 19.927147] ? hrtimer_interrupt+0x2fe/0x780 [ 19.927187] ? __pfx_handle_softirqs+0x10/0x10 [ 19.927226] __irq_exit_rcu+0xc9/0x110 [ 19.927289] irq_exit_rcu+0x12/0x20 [ 19.927320] sysvec_apic_timer_interrupt+0x81/0x90 [ 19.927360] </IRQ> [ 19.927407] <TASK> [ 19.927426] asm_sysvec_apic_timer_interrupt+0x1f/0x30 [ 19.927631] RIP: 0010:pv_native_safe_halt+0xf/0x20 [ 19.927946] Code: 1f 84 00 00 00 00 00 0f 1f 40 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa eb 07 0f 00 2d a3 c8 1d 00 fb f4 <c3> cc cc cc cc 66 2e 0f 1f 84 00 00 00 00 00 66 90 90 90 90 90 90 [ 19.928060] RSP: 0000:ffffffffb3e07dd8 EFLAGS: 00010202 [ 19.928179] RAX: ffff8881a5e5f000 RBX: ffffffffb3e1cac0 RCX: ffffffffb2caf1c5 [ 19.928264] RDX: ffffed102b60618b RSI: 0000000000000004 RDI: 0000000000006e74 [ 19.928356] RBP: ffffffffb3e07de0 R08: 0000000000000001 R09: ffffed102b60618a [ 19.928417] R10: ffff88815b030c53 R11: 0000000000028400 R12: 0000000000000000 [ 19.928477] R13: fffffbfff67c3958 R14: ffffffffb49c0490 R15: 0000000000000000 [ 19.928697] ? ct_kernel_exit.constprop.0+0xa5/0xd0 [ 19.928785] ? default_idle+0xd/0x20 [ 19.928818] arch_cpu_idle+0xd/0x20 [ 19.928848] default_idle_call+0x48/0x80 [ 19.928877] do_idle+0x379/0x4f0 [ 19.928913] ? __pfx_do_idle+0x10/0x10 [ 19.928945] ? trace_preempt_on+0x20/0xc0 [ 19.928978] ? schedule+0x86/0x2e0 [ 19.929008] ? preempt_count_sub+0x50/0x80 [ 19.929041] cpu_startup_entry+0x5c/0x70 [ 19.929077] rest_init+0x11a/0x140 [ 19.929103] ? acpi_subsystem_init+0x5d/0x150 [ 19.929143] start_kernel+0x330/0x410 [ 19.929178] x86_64_start_reservations+0x1c/0x30 [ 19.929213] x86_64_start_kernel+0x10d/0x120 [ 19.929278] common_startup_64+0x13e/0x148 [ 19.929329] </TASK> [ 19.929345] [ 19.959161] Allocated by task 216: [ 19.959834] kasan_save_stack+0x45/0x70 [ 19.961060] kasan_save_track+0x18/0x40 [ 19.961904] kasan_save_alloc_info+0x3b/0x50 [ 19.962324] __kasan_kmalloc+0xb7/0xc0 [ 19.962743] __kmalloc_cache_noprof+0x189/0x420 [ 19.963224] rcu_uaf+0xb0/0x330 [ 19.963654] kunit_try_run_case+0x1a5/0x480 [ 19.964159] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.965043] kthread+0x337/0x6f0 [ 19.965802] ret_from_fork+0x116/0x1d0 [ 19.967200] ret_from_fork_asm+0x1a/0x30 [ 19.968054] [ 19.968276] Freed by task 0: [ 19.968536] kasan_save_stack+0x45/0x70 [ 19.969112] kasan_save_track+0x18/0x40 [ 19.969479] kasan_save_free_info+0x3f/0x60 [ 19.970049] __kasan_slab_free+0x56/0x70 [ 19.971598] kfree+0x222/0x3f0 [ 19.972029] rcu_uaf_reclaim+0x1f/0x60 [ 19.972749] rcu_core+0x66f/0x1c40 [ 19.973120] rcu_core_si+0x12/0x20 [ 19.974043] handle_softirqs+0x209/0x730 [ 19.974626] __irq_exit_rcu+0xc9/0x110 [ 19.975211] irq_exit_rcu+0x12/0x20 [ 19.976011] sysvec_apic_timer_interrupt+0x81/0x90 [ 19.976867] asm_sysvec_apic_timer_interrupt+0x1f/0x30 [ 19.977241] [ 19.977786] Last potentially related work creation: [ 19.978214] kasan_save_stack+0x45/0x70 [ 19.978593] kasan_record_aux_stack+0xb2/0xc0 [ 19.979011] __call_rcu_common.constprop.0+0x72/0x9d0 [ 19.980168] call_rcu+0x12/0x20 [ 19.981021] rcu_uaf+0x168/0x330 [ 19.981606] kunit_try_run_case+0x1a5/0x480 [ 19.982244] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.983069] kthread+0x337/0x6f0 [ 19.983889] ret_from_fork+0x116/0x1d0 [ 19.984616] ret_from_fork_asm+0x1a/0x30 [ 19.985044] [ 19.985664] The buggy address belongs to the object at ffff8881039cd400 [ 19.985664] which belongs to the cache kmalloc-32 of size 32 [ 19.986894] The buggy address is located 0 bytes inside of [ 19.986894] freed 32-byte region [ffff8881039cd400, ffff8881039cd420) [ 19.988059] [ 19.988804] The buggy address belongs to the physical page: [ 19.989362] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039cd [ 19.990373] flags: 0x200000000000000(node=0|zone=2) [ 19.991062] page_type: f5(slab) [ 19.991438] raw: 0200000000000000 ffff888100041780 dead000000000122 0000000000000000 [ 19.992265] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 19.993214] page dumped because: kasan: bad access detected [ 19.994039] [ 19.994258] Memory state around the buggy address: [ 19.994963] ffff8881039cd300: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 19.996014] ffff8881039cd380: 00 00 05 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 19.996654] >ffff8881039cd400: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 19.997192] ^ [ 19.997572] ffff8881039cd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.998182] ffff8881039cd500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.998769] ==================================================================
[ 18.862662] ================================================================== [ 18.863554] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x50/0x60 [ 18.864097] Read of size 4 at addr ffff888103305340 by task swapper/0/0 [ 18.864616] [ 18.864874] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 18.865033] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.865068] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.865165] Call Trace: [ 18.865224] <IRQ> [ 18.865269] dump_stack_lvl+0x73/0xb0 [ 18.865352] print_report+0xd1/0x650 [ 18.865428] ? __virt_addr_valid+0x1db/0x2d0 [ 18.865504] ? rcu_uaf_reclaim+0x50/0x60 [ 18.865581] ? kasan_complete_mode_report_info+0x64/0x200 [ 18.865657] ? rcu_uaf_reclaim+0x50/0x60 [ 18.865726] kasan_report+0x141/0x180 [ 18.865802] ? rcu_uaf_reclaim+0x50/0x60 [ 18.865904] __asan_report_load4_noabort+0x18/0x20 [ 18.865988] rcu_uaf_reclaim+0x50/0x60 [ 18.866064] rcu_core+0x66f/0x1c40 [ 18.866196] ? __pfx_rcu_core+0x10/0x10 [ 18.866284] ? ktime_get+0x6b/0x150 [ 18.866357] ? handle_softirqs+0x18e/0x730 [ 18.866434] rcu_core_si+0x12/0x20 [ 18.866470] handle_softirqs+0x209/0x730 [ 18.866500] ? hrtimer_interrupt+0x2fe/0x780 [ 18.866541] ? __pfx_handle_softirqs+0x10/0x10 [ 18.866577] __irq_exit_rcu+0xc9/0x110 [ 18.866605] irq_exit_rcu+0x12/0x20 [ 18.866633] sysvec_apic_timer_interrupt+0x81/0x90 [ 18.866669] </IRQ> [ 18.866707] <TASK> [ 18.866723] asm_sysvec_apic_timer_interrupt+0x1f/0x30 [ 18.866842] RIP: 0010:pv_native_safe_halt+0xf/0x20 [ 18.867171] Code: 1f 84 00 00 00 00 00 0f 1f 40 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa eb 07 0f 00 2d a3 c8 1d 00 fb f4 <c3> cc cc cc cc 66 2e 0f 1f 84 00 00 00 00 00 66 90 90 90 90 90 90 [ 18.867283] RSP: 0000:ffffffffbde07dd8 EFLAGS: 00010202 [ 18.867394] RAX: ffff88819be5f000 RBX: ffffffffbde1cac0 RCX: ffffffffbccaf1c5 [ 18.867457] RDX: ffffed102b60618b RSI: 0000000000000004 RDI: 0000000000017714 [ 18.867512] RBP: ffffffffbde07de0 R08: 0000000000000001 R09: ffffed102b60618a [ 18.867567] R10: ffff88815b030c53 R11: 0000000000013400 R12: 0000000000000000 [ 18.867622] R13: fffffbfff7bc3958 R14: ffffffffbe9c0490 R15: 0000000000000000 [ 18.867698] ? ct_kernel_exit.constprop.0+0xa5/0xd0 [ 18.867776] ? default_idle+0xd/0x20 [ 18.867808] arch_cpu_idle+0xd/0x20 [ 18.867835] default_idle_call+0x48/0x80 [ 18.867862] do_idle+0x379/0x4f0 [ 18.867931] ? __pfx_do_idle+0x10/0x10 [ 18.867965] ? complete+0x15b/0x1d0 [ 18.867990] ? trace_preempt_on+0x20/0xc0 [ 18.868020] ? schedule+0x86/0x2e0 [ 18.868048] ? preempt_count_sub+0x50/0x80 [ 18.868079] cpu_startup_entry+0x5c/0x70 [ 18.868132] rest_init+0x11a/0x140 [ 18.868171] ? acpi_subsystem_init+0x5d/0x150 [ 18.868211] start_kernel+0x330/0x410 [ 18.868244] x86_64_start_reservations+0x1c/0x30 [ 18.868277] x86_64_start_kernel+0x10d/0x120 [ 18.868309] common_startup_64+0x13e/0x148 [ 18.868350] </TASK> [ 18.868364] [ 18.893793] Allocated by task 216: [ 18.894360] kasan_save_stack+0x45/0x70 [ 18.894852] kasan_save_track+0x18/0x40 [ 18.895405] kasan_save_alloc_info+0x3b/0x50 [ 18.895806] __kasan_kmalloc+0xb7/0xc0 [ 18.896517] __kmalloc_cache_noprof+0x189/0x420 [ 18.897028] rcu_uaf+0xb0/0x330 [ 18.897520] kunit_try_run_case+0x1a5/0x480 [ 18.897976] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.898599] kthread+0x337/0x6f0 [ 18.899056] ret_from_fork+0x116/0x1d0 [ 18.899507] ret_from_fork_asm+0x1a/0x30 [ 18.899994] [ 18.900235] Freed by task 0: [ 18.900613] kasan_save_stack+0x45/0x70 [ 18.901198] kasan_save_track+0x18/0x40 [ 18.901682] kasan_save_free_info+0x3f/0x60 [ 18.902242] __kasan_slab_free+0x56/0x70 [ 18.902734] kfree+0x222/0x3f0 [ 18.903063] rcu_uaf_reclaim+0x1f/0x60 [ 18.903660] rcu_core+0x66f/0x1c40 [ 18.904158] rcu_core_si+0x12/0x20 [ 18.904629] handle_softirqs+0x209/0x730 [ 18.905133] __irq_exit_rcu+0xc9/0x110 [ 18.905625] irq_exit_rcu+0x12/0x20 [ 18.906143] sysvec_apic_timer_interrupt+0x81/0x90 [ 18.906682] asm_sysvec_apic_timer_interrupt+0x1f/0x30 [ 18.907370] [ 18.907698] Last potentially related work creation: [ 18.908308] kasan_save_stack+0x45/0x70 [ 18.908757] kasan_record_aux_stack+0xb2/0xc0 [ 18.909407] __call_rcu_common.constprop.0+0x72/0x9d0 [ 18.910009] call_rcu+0x12/0x20 [ 18.910450] rcu_uaf+0x168/0x330 [ 18.910896] kunit_try_run_case+0x1a5/0x480 [ 18.911486] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.912171] kthread+0x337/0x6f0 [ 18.912564] ret_from_fork+0x116/0x1d0 [ 18.913026] ret_from_fork_asm+0x1a/0x30 [ 18.913581] [ 18.913810] The buggy address belongs to the object at ffff888103305340 [ 18.913810] which belongs to the cache kmalloc-32 of size 32 [ 18.914731] The buggy address is located 0 bytes inside of [ 18.914731] freed 32-byte region [ffff888103305340, ffff888103305360) [ 18.915538] [ 18.915741] The buggy address belongs to the physical page: [ 18.916370] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103305 [ 18.917179] flags: 0x200000000000000(node=0|zone=2) [ 18.917673] page_type: f5(slab) [ 18.918191] raw: 0200000000000000 ffff888100041780 dead000000000122 0000000000000000 [ 18.918682] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 18.919313] page dumped because: kasan: bad access detected [ 18.919932] [ 18.920356] Memory state around the buggy address: [ 18.920926] ffff888103305200: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 18.921514] ffff888103305280: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 18.922299] >ffff888103305300: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 18.923005] ^ [ 18.923605] ffff888103305380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.924287] ffff888103305400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.924923] ==================================================================
[ 21.048733] ================================================================== [ 21.049746] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70 [ 21.050397] Read of size 4 at addr ffff00000f201900 by task swapper/1/0 [ 21.051023] [ 21.051194] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 21.051252] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.051269] Hardware name: Radxa ROCK Pi 4B (DT) [ 21.051290] Call trace: [ 21.051303] show_stack+0x20/0x38 (C) [ 21.051344] dump_stack_lvl+0x8c/0xd0 [ 21.051386] print_report+0x118/0x608 [ 21.051428] kasan_report+0xdc/0x128 [ 21.051466] __asan_report_load4_noabort+0x20/0x30 [ 21.051512] rcu_uaf_reclaim+0x64/0x70 [ 21.051545] rcu_core+0x9f4/0x1e20 [ 21.051583] rcu_core_si+0x18/0x30 [ 21.051618] handle_softirqs+0x374/0xb28 [ 21.051657] __do_softirq+0x1c/0x28 [ 21.051690] ____do_softirq+0x18/0x30 [ 21.051726] call_on_irq_stack+0x24/0x30 [ 21.051763] do_softirq_own_stack+0x24/0x38 [ 21.051800] __irq_exit_rcu+0x1fc/0x318 [ 21.051837] irq_exit_rcu+0x1c/0x80 [ 21.051872] el1_interrupt+0x38/0x58 [ 21.051915] el1h_64_irq_handler+0x18/0x28 [ 21.051949] el1h_64_irq+0x6c/0x70 [ 21.051980] arch_local_irq_enable+0x4/0x8 (P) [ 21.052026] cpuidle_enter+0x60/0xb8 [ 21.052065] do_idle+0x36c/0x4e8 [ 21.052102] cpu_startup_entry+0x68/0x80 [ 21.052139] secondary_start_kernel+0x288/0x340 [ 21.052176] __secondary_switched+0xc0/0xc8 [ 21.052223] [ 21.062381] Allocated by task 251: [ 21.062715] kasan_save_stack+0x3c/0x68 [ 21.063101] kasan_save_track+0x20/0x40 [ 21.063486] kasan_save_alloc_info+0x40/0x58 [ 21.063912] __kasan_kmalloc+0xd4/0xd8 [ 21.064290] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.064735] rcu_uaf+0xb0/0x2d8 [ 21.065054] kunit_try_run_case+0x170/0x3f0 [ 21.065472] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.066009] kthread+0x328/0x630 [ 21.066335] ret_from_fork+0x10/0x20 [ 21.066695] [ 21.066854] Freed by task 0: [ 21.067136] kasan_save_stack+0x3c/0x68 [ 21.067523] kasan_save_track+0x20/0x40 [ 21.067908] kasan_save_free_info+0x4c/0x78 [ 21.068326] __kasan_slab_free+0x6c/0x98 [ 21.068718] kfree+0x214/0x3c8 [ 21.069031] rcu_uaf_reclaim+0x28/0x70 [ 21.069403] rcu_core+0x9f4/0x1e20 [ 21.069747] rcu_core_si+0x18/0x30 [ 21.070090] handle_softirqs+0x374/0xb28 [ 21.070482] __do_softirq+0x1c/0x28 [ 21.070830] [ 21.070990] Last potentially related work creation: [ 21.071447] kasan_save_stack+0x3c/0x68 [ 21.071831] kasan_record_aux_stack+0xb4/0xc8 [ 21.072266] __call_rcu_common.constprop.0+0x70/0x8b0 [ 21.072758] call_rcu+0x18/0x30 [ 21.073076] rcu_uaf+0x14c/0x2d8 [ 21.073403] kunit_try_run_case+0x170/0x3f0 [ 21.073819] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.074353] kthread+0x328/0x630 [ 21.074678] ret_from_fork+0x10/0x20 [ 21.075039] [ 21.075197] The buggy address belongs to the object at ffff00000f201900 [ 21.075197] which belongs to the cache kmalloc-32 of size 32 [ 21.076325] The buggy address is located 0 bytes inside of [ 21.076325] freed 32-byte region [ffff00000f201900, ffff00000f201920) [ 21.077425] [ 21.077584] The buggy address belongs to the physical page: [ 21.078106] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xf201 [ 21.078841] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 21.079460] page_type: f5(slab) [ 21.079781] raw: 03fffe0000000000 ffff000000402780 dead000000000122 0000000000000000 [ 21.080507] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 21.081222] page dumped because: kasan: bad access detected [ 21.081742] [ 21.081900] Memory state around the buggy address: [ 21.082356] ffff00000f201800: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 21.083032] ffff00000f201880: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 21.083706] >ffff00000f201900: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 21.084376] ^ [ 21.084693] ffff00000f201980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.085367] ffff00000f201a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.086036] ==================================================================