Hay
Date
July 6, 2025, 11:09 p.m.

Environment
qemu-arm64
qemu-x86_64
x86

[   17.377219] ==================================================================
[   17.377576] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70
[   17.377655] Read of size 4 at addr fff00000c69bfec0 by task swapper/0/0
[   17.377703] 
[   17.377742] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   17.377823] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.377851] Hardware name: linux,dummy-virt (DT)
[   17.378639] Call trace:
[   17.378677]  show_stack+0x20/0x38 (C)
[   17.379297]  dump_stack_lvl+0x8c/0xd0
[   17.379359]  print_report+0x118/0x608
[   17.379439]  kasan_report+0xdc/0x128
[   17.379484]  __asan_report_load4_noabort+0x20/0x30
[   17.379565]  rcu_uaf_reclaim+0x64/0x70
[   17.379611]  rcu_core+0x9f4/0x1e20
[   17.379657]  rcu_core_si+0x18/0x30
[   17.379698]  handle_softirqs+0x374/0xb28
[   17.379744]  __do_softirq+0x1c/0x28
[   17.379784]  ____do_softirq+0x18/0x30
[   17.379826]  call_on_irq_stack+0x24/0x30
[   17.379870]  do_softirq_own_stack+0x24/0x38
[   17.379916]  __irq_exit_rcu+0x1fc/0x318
[   17.379959]  irq_exit_rcu+0x1c/0x80
[   17.380049]  el1_interrupt+0x38/0x58
[   17.380119]  el1h_64_irq_handler+0x18/0x28
[   17.380172]  el1h_64_irq+0x6c/0x70
[   17.380302]  arch_local_irq_enable+0x4/0x8 (P)
[   17.380355]  do_idle+0x384/0x4e8
[   17.380401]  cpu_startup_entry+0x64/0x80
[   17.380446]  rest_init+0x160/0x188
[   17.380487]  start_kernel+0x30c/0x3d0
[   17.380538]  __primary_switched+0x8c/0xa0
[   17.380604] 
[   17.380623] Allocated by task 199:
[   17.380674]  kasan_save_stack+0x3c/0x68
[   17.380716]  kasan_save_track+0x20/0x40
[   17.380795]  kasan_save_alloc_info+0x40/0x58
[   17.380929]  __kasan_kmalloc+0xd4/0xd8
[   17.381013]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.381180]  rcu_uaf+0xb0/0x2d8
[   17.381246]  kunit_try_run_case+0x170/0x3f0
[   17.381285]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.381433]  kthread+0x328/0x630
[   17.381466]  ret_from_fork+0x10/0x20
[   17.381503] 
[   17.381554] Freed by task 0:
[   17.381580]  kasan_save_stack+0x3c/0x68
[   17.381689]  kasan_save_track+0x20/0x40
[   17.381733]  kasan_save_free_info+0x4c/0x78
[   17.381771]  __kasan_slab_free+0x6c/0x98
[   17.381950]  kfree+0x214/0x3c8
[   17.382003]  rcu_uaf_reclaim+0x28/0x70
[   17.382038]  rcu_core+0x9f4/0x1e20
[   17.382073]  rcu_core_si+0x18/0x30
[   17.382177]  handle_softirqs+0x374/0xb28
[   17.382306]  __do_softirq+0x1c/0x28
[   17.382340] 
[   17.382369] Last potentially related work creation:
[   17.382403]  kasan_save_stack+0x3c/0x68
[   17.382440]  kasan_record_aux_stack+0xb4/0xc8
[   17.382481]  __call_rcu_common.constprop.0+0x74/0x8c8
[   17.382523]  call_rcu+0x18/0x30
[   17.382556]  rcu_uaf+0x14c/0x2d8
[   17.382588]  kunit_try_run_case+0x170/0x3f0
[   17.382624]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.382667]  kthread+0x328/0x630
[   17.382700]  ret_from_fork+0x10/0x20
[   17.382830] 
[   17.382902] The buggy address belongs to the object at fff00000c69bfec0
[   17.382902]  which belongs to the cache kmalloc-32 of size 32
[   17.382989] The buggy address is located 0 bytes inside of
[   17.382989]  freed 32-byte region [fff00000c69bfec0, fff00000c69bfee0)
[   17.383052] 
[   17.383072] The buggy address belongs to the physical page:
[   17.383105] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069bf
[   17.383163] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.383256] page_type: f5(slab)
[   17.383298] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   17.383349] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   17.383389] page dumped because: kasan: bad access detected
[   17.383422] 
[   17.383439] Memory state around the buggy address:
[   17.383474]  fff00000c69bfd80: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   17.383542]  fff00000c69bfe00: 00 00 05 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   17.383625] >fff00000c69bfe80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   17.383677]                                            ^
[   17.383731]  fff00000c69bff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.383827]  fff00000c69bff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.383875] ==================================================================

[   17.143882] ==================================================================
[   17.144027] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70
[   17.144087] Read of size 4 at addr fff00000c7770d00 by task swapper/1/0
[   17.144133] 
[   17.144179] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   17.144265] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.144290] Hardware name: linux,dummy-virt (DT)
[   17.144322] Call trace:
[   17.144344]  show_stack+0x20/0x38 (C)
[   17.144391]  dump_stack_lvl+0x8c/0xd0
[   17.144437]  print_report+0x118/0x608
[   17.144491]  kasan_report+0xdc/0x128
[   17.144536]  __asan_report_load4_noabort+0x20/0x30
[   17.144585]  rcu_uaf_reclaim+0x64/0x70
[   17.144630]  rcu_core+0x9f4/0x1e20
[   17.144675]  rcu_core_si+0x18/0x30
[   17.144728]  handle_softirqs+0x374/0xb28
[   17.144776]  __do_softirq+0x1c/0x28
[   17.144831]  ____do_softirq+0x18/0x30
[   17.144884]  call_on_irq_stack+0x24/0x30
[   17.145482]  do_softirq_own_stack+0x24/0x38
[   17.145549]  __irq_exit_rcu+0x1fc/0x318
[   17.146085]  irq_exit_rcu+0x1c/0x80
[   17.146177]  el1_interrupt+0x38/0x58
[   17.146494]  el1h_64_irq_handler+0x18/0x28
[   17.146548]  el1h_64_irq+0x6c/0x70
[   17.147221]  arch_local_irq_enable+0x4/0x8 (P)
[   17.147566]  do_idle+0x384/0x4e8
[   17.147686]  cpu_startup_entry+0x64/0x80
[   17.147792]  secondary_start_kernel+0x288/0x340
[   17.147985]  __secondary_switched+0xc0/0xc8
[   17.148418] 
[   17.148530] Allocated by task 199:
[   17.148602]  kasan_save_stack+0x3c/0x68
[   17.148869]  kasan_save_track+0x20/0x40
[   17.149087]  kasan_save_alloc_info+0x40/0x58
[   17.149193]  __kasan_kmalloc+0xd4/0xd8
[   17.149540]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.149753]  rcu_uaf+0xb0/0x2d8
[   17.150094]  kunit_try_run_case+0x170/0x3f0
[   17.150336]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.150522]  kthread+0x328/0x630
[   17.150586]  ret_from_fork+0x10/0x20
[   17.150648] 
[   17.150830] Freed by task 0:
[   17.151019]  kasan_save_stack+0x3c/0x68
[   17.151157]  kasan_save_track+0x20/0x40
[   17.151237]  kasan_save_free_info+0x4c/0x78
[   17.151487]  __kasan_slab_free+0x6c/0x98
[   17.151960]  kfree+0x214/0x3c8
[   17.152066]  rcu_uaf_reclaim+0x28/0x70
[   17.152178]  rcu_core+0x9f4/0x1e20
[   17.152269]  rcu_core_si+0x18/0x30
[   17.152658]  handle_softirqs+0x374/0xb28
[   17.152851]  __do_softirq+0x1c/0x28
[   17.152921] 
[   17.153095] Last potentially related work creation:
[   17.153333]  kasan_save_stack+0x3c/0x68
[   17.153466]  kasan_record_aux_stack+0xb4/0xc8
[   17.153620]  __call_rcu_common.constprop.0+0x74/0x8c8
[   17.153723]  call_rcu+0x18/0x30
[   17.153879]  rcu_uaf+0x14c/0x2d8
[   17.154013]  kunit_try_run_case+0x170/0x3f0
[   17.154062]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.154117]  kthread+0x328/0x630
[   17.154149]  ret_from_fork+0x10/0x20
[   17.154454] 
[   17.154724] The buggy address belongs to the object at fff00000c7770d00
[   17.154724]  which belongs to the cache kmalloc-32 of size 32
[   17.154842] The buggy address is located 0 bytes inside of
[   17.154842]  freed 32-byte region [fff00000c7770d00, fff00000c7770d20)
[   17.155057] 
[   17.155750] The buggy address belongs to the physical page:
[   17.156036] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107770
[   17.156108] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.156473] page_type: f5(slab)
[   17.156616] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   17.156728] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   17.156953] page dumped because: kasan: bad access detected
[   17.157163] 
[   17.157243] Memory state around the buggy address:
[   17.157381]  fff00000c7770c00: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   17.157455]  fff00000c7770c80: 00 00 05 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   17.157566] >fff00000c7770d00: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   17.157617]                    ^
[   17.157645]  fff00000c7770d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.157692]  fff00000c7770e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.157767] ==================================================================

[   13.990684] ==================================================================
[   13.991254] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x50/0x60
[   13.991709] Read of size 4 at addr ffff888102aaa780 by task swapper/0/0
[   13.992026] 
[   13.992219] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   13.992294] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.992315] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.992349] Call Trace:
[   13.992398]  <IRQ>
[   13.992428]  dump_stack_lvl+0x73/0xb0
[   13.992486]  print_report+0xd1/0x650
[   13.992523]  ? __virt_addr_valid+0x1db/0x2d0
[   13.992562]  ? rcu_uaf_reclaim+0x50/0x60
[   13.992595]  ? kasan_complete_mode_report_info+0x64/0x200
[   13.992649]  ? rcu_uaf_reclaim+0x50/0x60
[   13.992681]  kasan_report+0x141/0x180
[   13.992717]  ? rcu_uaf_reclaim+0x50/0x60
[   13.992757]  __asan_report_load4_noabort+0x18/0x20
[   13.992798]  rcu_uaf_reclaim+0x50/0x60
[   13.992834]  rcu_core+0x66f/0x1c40
[   13.992886]  ? __pfx_rcu_core+0x10/0x10
[   13.992920]  ? ktime_get+0x6b/0x150
[   13.992956]  ? handle_softirqs+0x18e/0x730
[   13.992998]  rcu_core_si+0x12/0x20
[   13.993031]  handle_softirqs+0x209/0x730
[   13.993066]  ? hrtimer_interrupt+0x2fe/0x780
[   13.993144]  ? __pfx_handle_softirqs+0x10/0x10
[   13.993184]  __irq_exit_rcu+0xc9/0x110
[   13.993215]  irq_exit_rcu+0x12/0x20
[   13.993250]  sysvec_apic_timer_interrupt+0x81/0x90
[   13.993291]  </IRQ>
[   13.993348]  <TASK>
[   13.993371]  asm_sysvec_apic_timer_interrupt+0x1f/0x30
[   13.993529] RIP: 0010:pv_native_safe_halt+0xf/0x20
[   13.993867] Code: 1f 84 00 00 00 00 00 0f 1f 40 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa eb 07 0f 00 2d 83 ba 21 00 fb f4 <e9> 7c 1d 02 00 66 2e 0f 1f 84 00 00 00 00 00 66 90 90 90 90 90 90
[   13.993967] RSP: 0000:ffffffffa5407dd8 EFLAGS: 00010216
[   13.994064] RAX: ffff8881b4874000 RBX: ffffffffa541cac0 RCX: ffffffffa42700e5
[   13.994116] RDX: ffffed102b60618b RSI: 0000000000000004 RDI: 0000000000006a1c
[   13.994162] RBP: ffffffffa5407de0 R08: 0000000000000001 R09: ffffed102b60618a
[   13.994203] R10: ffff88815b030c53 R11: 000000000001d000 R12: 0000000000000000
[   13.994244] R13: fffffbfff4a83958 R14: ffffffffa5fb0e90 R15: 0000000000000000
[   13.994304]  ? ct_kernel_exit.constprop.0+0xa5/0xd0
[   13.994362]  ? default_idle+0xd/0x20
[   13.994385]  arch_cpu_idle+0xd/0x20
[   13.994406]  default_idle_call+0x48/0x80
[   13.994426]  do_idle+0x379/0x4f0
[   13.994449]  ? __pfx_do_idle+0x10/0x10
[   13.994475]  cpu_startup_entry+0x5c/0x70
[   13.994496]  rest_init+0x11a/0x140
[   13.994581]  ? acpi_subsystem_init+0x5d/0x150
[   13.994606]  start_kernel+0x330/0x410
[   13.994648]  x86_64_start_reservations+0x1c/0x30
[   13.994671]  x86_64_start_kernel+0x10d/0x120
[   13.994692]  common_startup_64+0x13e/0x148
[   13.994723]  </TASK>
[   13.994735] 
[   14.010363] Allocated by task 216:
[   14.010849]  kasan_save_stack+0x45/0x70
[   14.011206]  kasan_save_track+0x18/0x40
[   14.011629]  kasan_save_alloc_info+0x3b/0x50
[   14.011899]  __kasan_kmalloc+0xb7/0xc0
[   14.012240]  __kmalloc_cache_noprof+0x189/0x420
[   14.012551]  rcu_uaf+0xb0/0x330
[   14.013060]  kunit_try_run_case+0x1a5/0x480
[   14.013432]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.013835]  kthread+0x337/0x6f0
[   14.014180]  ret_from_fork+0x116/0x1d0
[   14.014573]  ret_from_fork_asm+0x1a/0x30
[   14.015010] 
[   14.015244] Freed by task 0:
[   14.015462]  kasan_save_stack+0x45/0x70
[   14.015779]  kasan_save_track+0x18/0x40
[   14.016156]  kasan_save_free_info+0x3f/0x60
[   14.016578]  __kasan_slab_free+0x56/0x70
[   14.017016]  kfree+0x222/0x3f0
[   14.017327]  rcu_uaf_reclaim+0x1f/0x60
[   14.017935]  rcu_core+0x66f/0x1c40
[   14.018155]  rcu_core_si+0x12/0x20
[   14.018455]  handle_softirqs+0x209/0x730
[   14.018715]  __irq_exit_rcu+0xc9/0x110
[   14.019094]  irq_exit_rcu+0x12/0x20
[   14.019301]  sysvec_apic_timer_interrupt+0x81/0x90
[   14.019875]  asm_sysvec_apic_timer_interrupt+0x1f/0x30
[   14.020089] 
[   14.020331] Last potentially related work creation:
[   14.020694]  kasan_save_stack+0x45/0x70
[   14.020986]  kasan_record_aux_stack+0xb2/0xc0
[   14.021305]  __call_rcu_common.constprop.0+0x7b/0x9e0
[   14.021807]  call_rcu+0x12/0x20
[   14.022070]  rcu_uaf+0x168/0x330
[   14.022398]  kunit_try_run_case+0x1a5/0x480
[   14.022892]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.023284]  kthread+0x337/0x6f0
[   14.023496]  ret_from_fork+0x116/0x1d0
[   14.023922]  ret_from_fork_asm+0x1a/0x30
[   14.024280] 
[   14.024466] The buggy address belongs to the object at ffff888102aaa780
[   14.024466]  which belongs to the cache kmalloc-32 of size 32
[   14.025103] The buggy address is located 0 bytes inside of
[   14.025103]  freed 32-byte region [ffff888102aaa780, ffff888102aaa7a0)
[   14.025827] 
[   14.026146] The buggy address belongs to the physical page:
[   14.026647] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102aaa
[   14.026983] flags: 0x200000000000000(node=0|zone=2)
[   14.027390] page_type: f5(slab)
[   14.027874] raw: 0200000000000000 ffff888100041780 dead000000000122 0000000000000000
[   14.028172] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   14.028680] page dumped because: kasan: bad access detected
[   14.029050] 
[   14.029172] Memory state around the buggy address:
[   14.029369]  ffff888102aaa680: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   14.029791]  ffff888102aaa700: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   14.030119] >ffff888102aaa780: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   14.030457]                    ^
[   14.030909]  ffff888102aaa800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.031268]  ffff888102aaa880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.031833] ==================================================================

[   14.136816] ==================================================================
[   14.137509] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x50/0x60
[   14.138017] Read of size 4 at addr ffff8881031bbe80 by task swapper/1/0
[   14.138554] 
[   14.138921] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.139101] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.139116] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.139140] Call Trace:
[   14.139170]  <IRQ>
[   14.139187]  dump_stack_lvl+0x73/0xb0
[   14.139220]  print_report+0xd1/0x650
[   14.139243]  ? __virt_addr_valid+0x1db/0x2d0
[   14.139268]  ? rcu_uaf_reclaim+0x50/0x60
[   14.139288]  ? kasan_complete_mode_report_info+0x64/0x200
[   14.139314]  ? rcu_uaf_reclaim+0x50/0x60
[   14.139335]  kasan_report+0x141/0x180
[   14.139357]  ? rcu_uaf_reclaim+0x50/0x60
[   14.139383]  __asan_report_load4_noabort+0x18/0x20
[   14.139407]  rcu_uaf_reclaim+0x50/0x60
[   14.139427]  rcu_core+0x66f/0x1c40
[   14.139458]  ? __pfx_rcu_core+0x10/0x10
[   14.139480]  ? ktime_get+0x6b/0x150
[   14.139503]  ? handle_softirqs+0x18e/0x730
[   14.139529]  rcu_core_si+0x12/0x20
[   14.139549]  handle_softirqs+0x209/0x730
[   14.139568]  ? hrtimer_interrupt+0x2fe/0x780
[   14.139596]  ? __pfx_handle_softirqs+0x10/0x10
[   14.139622]  __irq_exit_rcu+0xc9/0x110
[   14.139642]  irq_exit_rcu+0x12/0x20
[   14.139662]  sysvec_apic_timer_interrupt+0x81/0x90
[   14.139685]  </IRQ>
[   14.139712]  <TASK>
[   14.139723]  asm_sysvec_apic_timer_interrupt+0x1f/0x30
[   14.139839] RIP: 0010:pv_native_safe_halt+0xf/0x20
[   14.140084] Code: 1f 84 00 00 00 00 00 0f 1f 40 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa eb 07 0f 00 2d 83 ba 21 00 fb f4 <e9> 7c 1d 02 00 66 2e 0f 1f 84 00 00 00 00 00 66 90 90 90 90 90 90
[   14.140176] RSP: 0000:ffff888100877dc8 EFLAGS: 00010212
[   14.140268] RAX: ffff88819e174000 RBX: ffff888100853000 RCX: ffffffffbaa700e5
[   14.140320] RDX: ffffed102b62618b RSI: 0000000000000004 RDI: 00000000000115ec
[   14.140365] RBP: ffff888100877dd0 R08: 0000000000000001 R09: ffffed102b62618a
[   14.140409] R10: ffff88815b130c53 R11: 000000000002c400 R12: 0000000000000001
[   14.140453] R13: ffffed102010a600 R14: ffffffffbc7b0e90 R15: 0000000000000000
[   14.140514]  ? ct_kernel_exit.constprop.0+0xa5/0xd0
[   14.140568]  ? default_idle+0xd/0x20
[   14.140590]  arch_cpu_idle+0xd/0x20
[   14.140612]  default_idle_call+0x48/0x80
[   14.140635]  do_idle+0x379/0x4f0
[   14.140658]  ? complete+0x15b/0x1d0
[   14.140676]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.140701]  ? __pfx_do_idle+0x10/0x10
[   14.140723]  ? _raw_spin_unlock_irqrestore+0x49/0x90
[   14.140746]  ? complete+0x15b/0x1d0
[   14.140768]  cpu_startup_entry+0x5c/0x70
[   14.140792]  start_secondary+0x211/0x290
[   14.140814]  ? __pfx_start_secondary+0x10/0x10
[   14.140841]  common_startup_64+0x13e/0x148
[   14.140875]  </TASK>
[   14.140887] 
[   14.157444] Allocated by task 215:
[   14.157663]  kasan_save_stack+0x45/0x70
[   14.157947]  kasan_save_track+0x18/0x40
[   14.158786]  kasan_save_alloc_info+0x3b/0x50
[   14.159160]  __kasan_kmalloc+0xb7/0xc0
[   14.159488]  __kmalloc_cache_noprof+0x189/0x420
[   14.159891]  rcu_uaf+0xb0/0x330
[   14.160082]  kunit_try_run_case+0x1a5/0x480
[   14.160294]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.160536]  kthread+0x337/0x6f0
[   14.160694]  ret_from_fork+0x116/0x1d0
[   14.161339]  ret_from_fork_asm+0x1a/0x30
[   14.161547] 
[   14.161940] Freed by task 0:
[   14.162108]  kasan_save_stack+0x45/0x70
[   14.162320]  kasan_save_track+0x18/0x40
[   14.162510]  kasan_save_free_info+0x3f/0x60
[   14.162779]  __kasan_slab_free+0x56/0x70
[   14.162968]  kfree+0x222/0x3f0
[   14.163150]  rcu_uaf_reclaim+0x1f/0x60
[   14.163334]  rcu_core+0x66f/0x1c40
[   14.163518]  rcu_core_si+0x12/0x20
[   14.163690]  handle_softirqs+0x209/0x730
[   14.164523]  __irq_exit_rcu+0xc9/0x110
[   14.164723]  irq_exit_rcu+0x12/0x20
[   14.164970]  sysvec_apic_timer_interrupt+0x81/0x90
[   14.165237]  asm_sysvec_apic_timer_interrupt+0x1f/0x30
[   14.165494] 
[   14.165628] Last potentially related work creation:
[   14.166414]  kasan_save_stack+0x45/0x70
[   14.166781]  kasan_record_aux_stack+0xb2/0xc0
[   14.167180]  __call_rcu_common.constprop.0+0x7b/0x9e0
[   14.167410]  call_rcu+0x12/0x20
[   14.167583]  rcu_uaf+0x168/0x330
[   14.168123]  kunit_try_run_case+0x1a5/0x480
[   14.168338]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.168663]  kthread+0x337/0x6f0
[   14.168908]  ret_from_fork+0x116/0x1d0
[   14.169361]  ret_from_fork_asm+0x1a/0x30
[   14.169548] 
[   14.169699] The buggy address belongs to the object at ffff8881031bbe80
[   14.169699]  which belongs to the cache kmalloc-32 of size 32
[   14.170570] The buggy address is located 0 bytes inside of
[   14.170570]  freed 32-byte region [ffff8881031bbe80, ffff8881031bbea0)
[   14.171612] 
[   14.171714] The buggy address belongs to the physical page:
[   14.171901] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031bb
[   14.172399] flags: 0x200000000000000(node=0|zone=2)
[   14.173196] page_type: f5(slab)
[   14.173387] raw: 0200000000000000 ffff888100041780 dead000000000122 0000000000000000
[   14.174397] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   14.175077] page dumped because: kasan: bad access detected
[   14.175761] 
[   14.175933] Memory state around the buggy address:
[   14.176301]  ffff8881031bbd80: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   14.176533]  ffff8881031bbe00: 00 00 05 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   14.176997] >ffff8881031bbe80: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   14.177827]                    ^
[   14.178269]  ffff8881031bbf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.179105]  ffff8881031bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.179977] ==================================================================

[   31.741541] ==================================================================
[   31.751924] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x50/0x60
[   31.758634] Read of size 4 at addr ffff8881066f7d00 by task swapper/3/0
[   31.765253] 
[   31.766756] CPU: 3 UID: 0 PID: 0 Comm: swapper/3 Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   31.766765] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   31.766767] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   31.766771] Call Trace:
[   31.766773]  <IRQ>
[   31.766775]  dump_stack_lvl+0x73/0xb0
[   31.766781]  print_report+0xd1/0x650
[   31.766785]  ? __virt_addr_valid+0x1db/0x2d0
[   31.766790]  ? rcu_uaf_reclaim+0x50/0x60
[   31.766794]  ? kasan_complete_mode_report_info+0x64/0x200
[   31.766799]  ? rcu_uaf_reclaim+0x50/0x60
[   31.766803]  kasan_report+0x141/0x180
[   31.766807]  ? rcu_uaf_reclaim+0x50/0x60
[   31.766811]  __asan_report_load4_noabort+0x18/0x20
[   31.766816]  rcu_uaf_reclaim+0x50/0x60
[   31.766819]  rcu_core+0x66c/0x1c40
[   31.766825]  ? __pfx_rcu_core+0x10/0x10
[   31.766829]  ? ktime_get+0x68/0x150
[   31.766833]  ? handle_softirqs+0x18e/0x730
[   31.766838]  rcu_core_si+0x12/0x20
[   31.766841]  handle_softirqs+0x206/0x730
[   31.766845]  ? hrtimer_interrupt+0x2fe/0x780
[   31.766850]  ? __pfx_handle_softirqs+0x10/0x10
[   31.766855]  __irq_exit_rcu+0xc9/0x110
[   31.766859]  irq_exit_rcu+0x12/0x20
[   31.766862]  sysvec_apic_timer_interrupt+0x81/0x90
[   31.766867]  </IRQ>
[   31.766868]  <TASK>
[   31.766870]  asm_sysvec_apic_timer_interrupt+0x1f/0x30
[   31.766874] RIP: 0010:cpuidle_enter_state+0xe5/0x2e0
[   31.766880] Code: ff ff ff 48 89 45 c0 e8 09 ab ff fe 31 ff e8 12 c0 70 fc 80 7d d0 00 0f 85 27 01 00 00 e8 a3 b6 ff fe 84 c0 0f 84 0f 01 00 00 <45> 85 ed 0f 88 ef 00 00 00 4d 63 fd 48 8b 7d c0 4b 8d 04 7f 49 8d
[   31.766888] RSP: 0000:ffff888100907d70 EFLAGS: 00000246
[   31.766892] RAX: 0000000000000000 RBX: ffff888103847000 RCX: 000000000000001f
[   31.766896] RDX: 1ffff11083ef6c8f RSI: 0000000000000003 RDI: ffff88841f7b6478
[   31.766900] RBP: ffff888100907db8 R08: 0000000000000004 R09: ffffed1083ef618a
[   31.766903] R10: ffff88841f7b0c53 R11: 0000000000000006 R12: ffffffffa9bb10c0
[   31.766906] R13: 0000000000000003 R14: 0000000000000003 R15: ffffffffa9bb1210
[   31.766911]  ? tick_nohz_idle_enter+0x13f/0x1b0
[   31.766916]  ? mark_tsc_async_resets+0x10/0x40
[   31.766921]  cpuidle_enter+0x53/0xb0
[   31.766925]  ? cpuidle_select+0x5f/0xb0
[   31.766930]  do_idle+0x360/0x4f0
[   31.766935]  ? __pfx_do_idle+0x10/0x10
[   31.766939]  ? _raw_spin_unlock_irqrestore+0x49/0x90
[   31.766944]  ? complete+0x15b/0x1d0
[   31.766948]  cpu_startup_entry+0x5c/0x70
[   31.766952]  start_secondary+0x211/0x290
[   31.766956]  ? __pfx_start_secondary+0x10/0x10
[   31.766960]  common_startup_64+0x13e/0x148
[   31.766967]  </TASK>
[   31.766968] 
[   32.004514] Allocated by task 239:
[   32.007920]  kasan_save_stack+0x45/0x70
[   32.011760]  kasan_save_track+0x18/0x40
[   32.015597]  kasan_save_alloc_info+0x3b/0x50
[   32.019872]  __kasan_kmalloc+0xb7/0xc0
[   32.023624]  __kmalloc_cache_noprof+0x189/0x420
[   32.028165]  rcu_uaf+0xb0/0x330
[   32.031313]  kunit_try_run_case+0x1a2/0x480
[   32.035532]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   32.040933]  kthread+0x334/0x6f0
[   32.044174]  ret_from_fork+0x113/0x1d0
[   32.047926]  ret_from_fork_asm+0x1a/0x30
[   32.051851] 
[   32.053364] Freed by task 0:
[   32.056270]  kasan_save_stack+0x45/0x70
[   32.060111]  kasan_save_track+0x18/0x40
[   32.063949]  kasan_save_free_info+0x3f/0x60
[   32.068135]  __kasan_slab_free+0x56/0x70
[   32.072061]  kfree+0x222/0x3f0
[   32.075122]  rcu_uaf_reclaim+0x1f/0x60
[   32.078873]  rcu_core+0x66c/0x1c40
[   32.082280]  rcu_core_si+0x12/0x20
[   32.085684]  handle_softirqs+0x206/0x730
[   32.089612]  __irq_exit_rcu+0xc9/0x110
[   32.093366]  irq_exit_rcu+0x12/0x20
[   32.096883]  sysvec_apic_timer_interrupt+0x81/0x90
[   32.101674]  asm_sysvec_apic_timer_interrupt+0x1f/0x30
[   32.106814] 
[   32.108315] Last potentially related work creation:
[   32.113219]  kasan_save_stack+0x45/0x70
[   32.117059]  kasan_record_aux_stack+0xb2/0xc0
[   32.121418]  __call_rcu_common.constprop.0+0x7b/0x9e0
[   32.126470]  call_rcu+0x12/0x20
[   32.129618]  rcu_uaf+0x168/0x330
[   32.132850]  kunit_try_run_case+0x1a2/0x480
[   32.137043]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   32.142444]  kthread+0x334/0x6f0
[   32.145675]  ret_from_fork+0x113/0x1d0
[   32.149430]  ret_from_fork_asm+0x1a/0x30
[   32.153362] 
[   32.154881] The buggy address belongs to the object at ffff8881066f7d00
[   32.154881]  which belongs to the cache kmalloc-32 of size 32
[   32.167222] The buggy address is located 0 bytes inside of
[   32.167222]  freed 32-byte region [ffff8881066f7d00, ffff8881066f7d20)
[   32.179217] 
[   32.180716] The buggy address belongs to the physical page:
[   32.186287] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066f7
[   32.194286] flags: 0x200000000000000(node=0|zone=2)
[   32.199167] page_type: f5(slab)
[   32.202314] raw: 0200000000000000 ffff888100042780 dead000000000122 0000000000000000
[   32.210086] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   32.217827] page dumped because: kasan: bad access detected
[   32.223403] 
[   32.224896] Memory state around the buggy address:
[   32.229690]  ffff8881066f7c00: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   32.236909]  ffff8881066f7c80: 00 00 05 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   32.244128] >ffff8881066f7d00: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   32.251367]                    ^
[   32.254617]  ffff8881066f7d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.261835]  ffff8881066f7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.269055] ==================================================================