Hay
Date
Nov. 26, 2024, 6:09 a.m.

Environment
qemu-arm64
qemu-x86_64

[   32.202362] ==================================================================
[   32.203482] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70
[   32.204229] Read of size 4 at addr fff00000c5e26e40 by task swapper/1/0
[   32.204994] 
[   32.205386] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Tainted: G    B            N 6.12.0-next-20241126 #1
[   32.206417] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.207065] Hardware name: linux,dummy-virt (DT)
[   32.207982] Call trace:
[   32.208376]  show_stack+0x20/0x38 (C)
[   32.209015]  dump_stack_lvl+0x8c/0xd0
[   32.209626]  print_report+0x118/0x5e0
[   32.210451]  kasan_report+0xc8/0x118
[   32.211099]  __asan_report_load4_noabort+0x20/0x30
[   32.211859]  rcu_uaf_reclaim+0x64/0x70
[   32.212374]  rcu_core+0xa54/0x1df8
[   32.213005]  rcu_core_si+0x18/0x30
[   32.213551]  handle_softirqs+0x374/0xb20
[   32.214209]  __do_softirq+0x1c/0x28
[   32.214977]  ____do_softirq+0x18/0x30
[   32.215639]  call_on_irq_stack+0x24/0x58
[   32.216294]  do_softirq_own_stack+0x24/0x38
[   32.217007]  __irq_exit_rcu+0x1fc/0x318
[   32.217602]  irq_exit_rcu+0x1c/0x80
[   32.218454]  el1_interrupt+0x38/0x58
[   32.219084]  el1h_64_irq_handler+0x18/0x28
[   32.219769]  el1h_64_irq+0x6c/0x70
[   32.220455]  arch_local_irq_enable+0x4/0x8 (P)
[   32.221148]  default_idle_call+0x6c/0x78 (L)
[   32.221841]  do_idle+0x384/0x4e8
[   32.222599]  cpu_startup_entry+0x68/0x80
[   32.223229]  secondary_start_kernel+0x288/0x340
[   32.223918]  __secondary_switched+0xc0/0xc8
[   32.224496] 
[   32.224883] Allocated by task 187:
[   32.225441]  kasan_save_stack+0x3c/0x68
[   32.226218]  kasan_save_track+0x20/0x40
[   32.227511]  kasan_save_alloc_info+0x40/0x58
[   32.228218]  __kasan_kmalloc+0xd4/0xd8
[   32.228742]  __kmalloc_cache_noprof+0x15c/0x3c8
[   32.229347]  rcu_uaf+0xb0/0x2d0
[   32.230211]  kunit_try_run_case+0x14c/0x3d0
[   32.231023]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.231786]  kthread+0x24c/0x2d0
[   32.232337]  ret_from_fork+0x10/0x20
[   32.232967] 
[   32.233326] Freed by task 0:
[   32.234335]  kasan_save_stack+0x3c/0x68
[   32.234946]  kasan_save_track+0x20/0x40
[   32.235474]  kasan_save_free_info+0x4c/0x78
[   32.236057]  __kasan_slab_free+0x6c/0x98
[   32.237210]  kfree+0x114/0x3d0
[   32.238118]  rcu_uaf_reclaim+0x28/0x70
[   32.238650]  rcu_core+0xa54/0x1df8
[   32.239446]  rcu_core_si+0x18/0x30
[   32.240243]  handle_softirqs+0x374/0xb20
[   32.241056]  __do_softirq+0x1c/0x28
[   32.241567] 
[   32.242417] Last potentially related work creation:
[   32.243197]  kasan_save_stack+0x3c/0x68
[   32.243718]  __kasan_record_aux_stack+0xbc/0xe8
[   32.244420]  kasan_record_aux_stack_noalloc+0x14/0x20
[   32.245130]  __call_rcu_common.constprop.0+0x74/0xa18
[   32.246047]  call_rcu+0x18/0x30
[   32.246583]  rcu_uaf+0x14c/0x2d0
[   32.247099]  kunit_try_run_case+0x14c/0x3d0
[   32.248195]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.249323]  kthread+0x24c/0x2d0
[   32.249837]  ret_from_fork+0x10/0x20
[   32.250563] 
[   32.251316] The buggy address belongs to the object at fff00000c5e26e40
[   32.251316]  which belongs to the cache kmalloc-32 of size 32
[   32.252654] The buggy address is located 0 bytes inside of
[   32.252654]  freed 32-byte region [fff00000c5e26e40, fff00000c5e26e60)
[   32.254144] 
[   32.254634] The buggy address belongs to the physical page:
[   32.255470] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e26
[   32.256462] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.257403] page_type: f5(slab)
[   32.258208] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   32.258920] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   32.259940] page dumped because: kasan: bad access detected
[   32.260726] 
[   32.261096] Memory state around the buggy address:
[   32.261668]  fff00000c5e26d00: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   32.262801]  fff00000c5e26d80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   32.263726] >fff00000c5e26e00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   32.264520]                                            ^
[   32.265328]  fff00000c5e26e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.266768]  fff00000c5e26f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.267838] ==================================================================

[   32.221099] ==================================================================
[   32.222018] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70
[   32.222855] Read of size 4 at addr fff00000c58e0280 by task swapper/1/0
[   32.223529] 
[   32.223934] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Tainted: G    B            N 6.12.0-next-20241126 #1
[   32.224782] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.225401] Hardware name: linux,dummy-virt (DT)
[   32.226065] Call trace:
[   32.226513]  show_stack+0x20/0x38 (C)
[   32.227321]  dump_stack_lvl+0x8c/0xd0
[   32.227958]  print_report+0x118/0x5e0
[   32.228462]  kasan_report+0xc8/0x118
[   32.229343]  __asan_report_load4_noabort+0x20/0x30
[   32.230035]  rcu_uaf_reclaim+0x64/0x70
[   32.230663]  rcu_core+0xa54/0x1df8
[   32.231261]  rcu_core_si+0x18/0x30
[   32.231762]  handle_softirqs+0x374/0xb20
[   32.232599]  __do_softirq+0x1c/0x28
[   32.233174]  ____do_softirq+0x18/0x30
[   32.234016]  call_on_irq_stack+0x24/0x58
[   32.234741]  do_softirq_own_stack+0x24/0x38
[   32.235437]  __irq_exit_rcu+0x1fc/0x318
[   32.235988]  irq_exit_rcu+0x1c/0x80
[   32.236937]  el1_interrupt+0x38/0x58
[   32.237441]  el1h_64_irq_handler+0x18/0x28
[   32.238085]  el1h_64_irq+0x6c/0x70
[   32.238776]  arch_local_irq_enable+0x4/0x8 (P)
[   32.239449]  default_idle_call+0x6c/0x78 (L)
[   32.240112]  do_idle+0x384/0x4e8
[   32.240926]  cpu_startup_entry+0x64/0x80
[   32.241603]  secondary_start_kernel+0x288/0x340
[   32.242278]  __secondary_switched+0xc0/0xc8
[   32.242825] 
[   32.243197] Allocated by task 187:
[   32.243700]  kasan_save_stack+0x3c/0x68
[   32.244250]  kasan_save_track+0x20/0x40
[   32.245147]  kasan_save_alloc_info+0x40/0x58
[   32.245658]  __kasan_kmalloc+0xd4/0xd8
[   32.246101]  __kmalloc_cache_noprof+0x15c/0x3c8
[   32.246578]  rcu_uaf+0xb0/0x2d0
[   32.247323]  kunit_try_run_case+0x14c/0x3d0
[   32.248038]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.249216]  kthread+0x24c/0x2d0
[   32.249754]  ret_from_fork+0x10/0x20
[   32.250186] 
[   32.250491] Freed by task 0:
[   32.251043]  kasan_save_stack+0x3c/0x68
[   32.251582]  kasan_save_track+0x20/0x40
[   32.252316]  kasan_save_free_info+0x4c/0x78
[   32.253235]  __kasan_slab_free+0x6c/0x98
[   32.253924]  kfree+0x114/0x3d0
[   32.254552]  rcu_uaf_reclaim+0x28/0x70
[   32.255101]  rcu_core+0xa54/0x1df8
[   32.255764]  rcu_core_si+0x18/0x30
[   32.256359]  handle_softirqs+0x374/0xb20
[   32.256988]  __do_softirq+0x1c/0x28
[   32.257482] 
[   32.257876] Last potentially related work creation:
[   32.258794]  kasan_save_stack+0x3c/0x68
[   32.259475]  __kasan_record_aux_stack+0xbc/0xe8
[   32.260078]  kasan_record_aux_stack_noalloc+0x14/0x20
[   32.261065]  __call_rcu_common.constprop.0+0x74/0xa18
[   32.261788]  call_rcu+0x18/0x30
[   32.262342]  rcu_uaf+0x14c/0x2d0
[   32.262921]  kunit_try_run_case+0x14c/0x3d0
[   32.263579]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.264993]  kthread+0x24c/0x2d0
[   32.265742]  ret_from_fork+0x10/0x20
[   32.266280] 
[   32.266692] The buggy address belongs to the object at fff00000c58e0280
[   32.266692]  which belongs to the cache kmalloc-32 of size 32
[   32.267960] The buggy address is located 0 bytes inside of
[   32.267960]  freed 32-byte region [fff00000c58e0280, fff00000c58e02a0)
[   32.269551] 
[   32.269938] The buggy address belongs to the physical page:
[   32.270676] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058e0
[   32.271617] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.272814] page_type: f5(slab)
[   32.273352] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   32.274266] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   32.275183] page dumped because: kasan: bad access detected
[   32.275917] 
[   32.276560] Memory state around the buggy address:
[   32.277281]  fff00000c58e0180: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   32.278035]  fff00000c58e0200: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   32.278895] >fff00000c58e0280: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   32.279745]                    ^
[   32.280601]  fff00000c58e0300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.281547]  fff00000c58e0380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.282434] ==================================================================

[   26.387367] ==================================================================
[   26.388010] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x50/0x60
[   26.388158] Read of size 4 at addr ffff8881028e0980 by task swapper/0/0
[   26.388158] 
[   26.388158] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G    B            N 6.12.0-next-20241126 #1
[   26.388158] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.388158] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.388158] Call Trace:
[   26.388158]  <IRQ>
[   26.388158]  dump_stack_lvl+0x73/0xb0
[   26.388158]  print_report+0xd1/0x640
[   26.388158]  ? __virt_addr_valid+0x1db/0x2d0
[   26.388158]  ? kasan_complete_mode_report_info+0x64/0x200
[   26.388158]  kasan_report+0x102/0x140
[   26.388158]  ? rcu_uaf_reclaim+0x50/0x60
[   26.388158]  ? rcu_uaf_reclaim+0x50/0x60
[   26.388158]  __asan_report_load4_noabort+0x18/0x20
[   26.388158]  rcu_uaf_reclaim+0x50/0x60
[   26.388158]  rcu_core+0x680/0x1d70
[   26.388158]  ? __pfx_rcu_core+0x10/0x10
[   26.388158]  ? ktime_get+0x69/0x150
[   26.388158]  ? handle_softirqs+0x18e/0x720
[   26.388158]  rcu_core_si+0x12/0x20
[   26.388158]  handle_softirqs+0x209/0x720
[   26.388158]  ? hrtimer_interrupt+0x2fe/0x780
[   26.388158]  ? __pfx_handle_softirqs+0x10/0x10
[   26.388158]  __irq_exit_rcu+0xc9/0x110
[   26.388158]  irq_exit_rcu+0x12/0x20
[   26.388158]  sysvec_apic_timer_interrupt+0x81/0x90
[   26.403337]  </IRQ>
[   26.403337]  <TASK>
[   26.403337]  asm_sysvec_apic_timer_interrupt+0x1f/0x30
[   26.403337] RIP: 0010:default_idle+0xf/0x20
[   26.403337] Code: 4c 01 c7 4c 29 c2 e9 72 ff ff ff 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa eb 07 0f 00 2d 13 e0 34 00 fb f4 <fa> c3 cc cc cc cc 66 66 2e 0f 1f 84 00 00 00 00 00 90 90 90 90 90
[   26.403337] RSP: 0000:ffffffff94607df0 EFLAGS: 00010202
[   26.403337] RAX: ffff88815b000000 RBX: ffffffff9461a680 RCX: ffffffff9330c925
[   26.403337] RDX: ffffed102b606b23 RSI: 0000000000000004 RDI: 0000000000064ee4
[   26.403337] RBP: ffffffff94607df8 R08: 0000000000000001 R09: ffffed102b606b22
[   26.403337] R10: ffff88815b035913 R11: 0000000000000000 R12: 0000000000000000
[   26.403337] R13: fffffbfff28c34d0 R14: ffffffff95172c90 R15: 0000000000000000
[   26.403337]  ? ct_kernel_exit.constprop.0+0xa5/0xd0
[   26.403337]  ? arch_cpu_idle+0xd/0x20
[   26.403337]  default_idle_call+0x48/0x80
[   26.403337]  do_idle+0x310/0x3c0
[   26.403337]  ? __pfx_do_idle+0x10/0x10
[   26.403337]  ? trace_preempt_on+0x20/0xc0
[   26.403337]  ? schedule+0x86/0x310
[   26.403337]  ? preempt_count_sub+0x50/0x80
[   26.403337]  cpu_startup_entry+0x5c/0x70
[   26.403337]  rest_init+0x11a/0x140
[   26.403337]  ? acpi_subsystem_init+0x5d/0x150
[   26.403337]  start_kernel+0x320/0x400
[   26.403337]  x86_64_start_reservations+0x1c/0x30
[   26.403337]  x86_64_start_kernel+0xcf/0xe0
[   26.403337]  common_startup_64+0x12c/0x138
[   26.403337]  </TASK>
[   26.403337] 
[   26.403337] Allocated by task 207:
[   26.403337]  kasan_save_stack+0x3d/0x60
[   26.403337]  kasan_save_track+0x18/0x40
[   26.403337]  kasan_save_alloc_info+0x3b/0x50
[   26.403337]  __kasan_kmalloc+0xb7/0xc0
[   26.403337]  __kmalloc_cache_noprof+0x184/0x410
[   26.403337]  rcu_uaf+0xb1/0x330
[   26.403337]  kunit_try_run_case+0x1b3/0x490
[   26.403337]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.403337]  kthread+0x257/0x310
[   26.403337]  ret_from_fork+0x41/0x80
[   26.403337]  ret_from_fork_asm+0x1a/0x30
[   26.403337] 
[   26.403337] Freed by task 0:
[   26.403337]  kasan_save_stack+0x3d/0x60
[   26.403337]  kasan_save_track+0x18/0x40
[   26.403337]  kasan_save_free_info+0x3f/0x60
[   26.403337]  __kasan_slab_free+0x56/0x70
[   26.403337]  kfree+0x123/0x3f0
[   26.403337]  rcu_uaf_reclaim+0x1f/0x60
[   26.403337]  rcu_core+0x680/0x1d70
[   26.403337]  rcu_core_si+0x12/0x20
[   26.403337]  handle_softirqs+0x209/0x720
[   26.403337]  __irq_exit_rcu+0xc9/0x110
[   26.403337]  irq_exit_rcu+0x12/0x20
[   26.403337]  sysvec_apic_timer_interrupt+0x81/0x90
[   26.403337]  asm_sysvec_apic_timer_interrupt+0x1f/0x30
[   26.403337] 
[   26.403337] Last potentially related work creation:
[   26.403337]  kasan_save_stack+0x3d/0x60
[   26.403337]  __kasan_record_aux_stack+0xae/0xc0
[   26.403337]  kasan_record_aux_stack_noalloc+0xf/0x20
[   26.403337]  __call_rcu_common.constprop.0+0x72/0xaa0
[   26.403337]  call_rcu+0x12/0x20
[   26.403337]  rcu_uaf+0x169/0x330
[   26.403337]  kunit_try_run_case+0x1b3/0x490
[   26.403337]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.403337]  kthread+0x257/0x310
[   26.403337]  ret_from_fork+0x41/0x80
[   26.403337]  ret_from_fork_asm+0x1a/0x30
[   26.403337] 
[   26.403337] The buggy address belongs to the object at ffff8881028e0980
[   26.403337]  which belongs to the cache kmalloc-32 of size 32
[   26.403337] The buggy address is located 0 bytes inside of
[   26.403337]  freed 32-byte region [ffff8881028e0980, ffff8881028e09a0)
[   26.403337] 
[   26.403337] The buggy address belongs to the physical page:
[   26.403337] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028e0
[   26.403337] flags: 0x200000000000000(node=0|zone=2)
[   26.403337] page_type: f5(slab)
[   26.403337] raw: 0200000000000000 ffff888100041780 dead000000000122 0000000000000000
[   26.403337] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   26.403337] page dumped because: kasan: bad access detected
[   26.403337] 
[   26.403337] Memory state around the buggy address:
[   26.403337]  ffff8881028e0880: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   26.403337]  ffff8881028e0900: 00 00 05 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   26.403337] >ffff8881028e0980: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   26.403337]                    ^
[   26.403337]  ffff8881028e0a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.403337]  ffff8881028e0a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.403337] ==================================================================

[   21.379223] ==================================================================
[   21.379846] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x50/0x60
[   21.380581] Read of size 4 at addr ffff8881028b8e40 by task swapper/0/0
[   21.381698] 
[   21.381965] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G    B            N 6.12.0-next-20241126 #1
[   21.383195] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.384540] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.385033] Call Trace:
[   21.385992]  <IRQ>
[   21.386381]  dump_stack_lvl+0x73/0xb0
[   21.387135]  print_report+0xd1/0x640
[   21.387772]  ? __virt_addr_valid+0x1db/0x2d0
[   21.388357]  ? kasan_complete_mode_report_info+0x64/0x200
[   21.389553]  kasan_report+0x102/0x140
[   21.390091]  ? rcu_uaf_reclaim+0x50/0x60
[   21.390568]  ? rcu_uaf_reclaim+0x50/0x60
[   21.391130]  __asan_report_load4_noabort+0x18/0x20
[   21.391723]  rcu_uaf_reclaim+0x50/0x60
[   21.392250]  rcu_core+0x680/0x1d70
[   21.392751]  ? __pfx_rcu_core+0x10/0x10
[   21.393283]  ? ktime_get+0x69/0x150
[   21.393789]  ? handle_softirqs+0x18e/0x720
[   21.394350]  rcu_core_si+0x12/0x20
[   21.394847]  handle_softirqs+0x209/0x720
[   21.395386]  ? hrtimer_interrupt+0x2fe/0x780
[   21.395981]  ? __pfx_handle_softirqs+0x10/0x10
[   21.397003]  __irq_exit_rcu+0xc9/0x110
[   21.397744]  irq_exit_rcu+0x12/0x20
[   21.398171]  sysvec_apic_timer_interrupt+0x81/0x90
[   21.398709]  </IRQ>
[   21.399562]  <TASK>
[   21.399768]  asm_sysvec_apic_timer_interrupt+0x1f/0x30
[   21.401035] RIP: 0010:default_idle+0xf/0x20
[   21.401792] Code: 4c 01 c7 4c 29 c2 e9 72 ff ff ff 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa eb 07 0f 00 2d 13 e0 34 00 fb f4 <fa> c3 cc cc cc cc 66 66 2e 0f 1f 84 00 00 00 00 00 90 90 90 90 90
[   21.403177] RSP: 0000:ffffffffa7407df0 EFLAGS: 00010202
[   21.403872] RAX: ffff888154a00000 RBX: ffffffffa741a680 RCX: ffffffffa610c925
[   21.404822] RDX: ffffed102a946b23 RSI: 0000000000000004 RDI: 000000000001de74
[   21.405441] RBP: ffffffffa7407df8 R08: 0000000000000001 R09: ffffed102a946b22
[   21.406339] R10: ffff888154a35913 R11: ffff888102b2f6b0 R12: 0000000000000000
[   21.407055] R13: fffffbfff4e834d0 R14: ffffffffa7f72c90 R15: 0000000000000000
[   21.407602]  ? ct_kernel_exit.constprop.0+0xa5/0xd0
[   21.408204]  ? arch_cpu_idle+0xd/0x20
[   21.408996]  default_idle_call+0x48/0x80
[   21.409409]  do_idle+0x310/0x3c0
[   21.410126]  ? __pfx_do_idle+0x10/0x10
[   21.410581]  ? trace_preempt_on+0x20/0xc0
[   21.411343]  ? schedule+0x86/0x310
[   21.411887]  ? preempt_count_sub+0x50/0x80
[   21.412352]  cpu_startup_entry+0x5c/0x70
[   21.412725]  rest_init+0x11a/0x140
[   21.413125]  start_kernel+0x320/0x400
[   21.413781]  x86_64_start_reservations+0x1c/0x30
[   21.414430]  x86_64_start_kernel+0xcf/0xe0
[   21.414877]  common_startup_64+0x12c/0x138
[   21.415468]  </TASK>
[   21.415982] 
[   21.416267] Allocated by task 205:
[   21.416726]  kasan_save_stack+0x3d/0x60
[   21.417307]  kasan_save_track+0x18/0x40
[   21.417772]  kasan_save_alloc_info+0x3b/0x50
[   21.418345]  __kasan_kmalloc+0xb7/0xc0
[   21.418869]  __kmalloc_cache_noprof+0x184/0x410
[   21.419269]  rcu_uaf+0xb1/0x330
[   21.419846]  kunit_try_run_case+0x1b3/0x490
[   21.420421]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.420925]  kthread+0x257/0x310
[   21.421778]  ret_from_fork+0x41/0x80
[   21.422562]  ret_from_fork_asm+0x1a/0x30
[   21.422869] 
[   21.423047] Freed by task 0:
[   21.423370]  kasan_save_stack+0x3d/0x60
[   21.423743]  kasan_save_track+0x18/0x40
[   21.424089]  kasan_save_free_info+0x3f/0x60
[   21.424374]  __kasan_slab_free+0x56/0x70
[   21.425335]  kfree+0x123/0x3f0
[   21.425752]  rcu_uaf_reclaim+0x1f/0x60
[   21.426345]  rcu_core+0x680/0x1d70
[   21.426798]  rcu_core_si+0x12/0x20
[   21.427345]  handle_softirqs+0x209/0x720
[   21.427830]  __irq_exit_rcu+0xc9/0x110
[   21.428243]  irq_exit_rcu+0x12/0x20
[   21.428535]  sysvec_apic_timer_interrupt+0x81/0x90
[   21.428893]  asm_sysvec_apic_timer_interrupt+0x1f/0x30
[   21.429391] 
[   21.430270] Last potentially related work creation:
[   21.431623]  kasan_save_stack+0x3d/0x60
[   21.432052]  __kasan_record_aux_stack+0xae/0xc0
[   21.432416]  kasan_record_aux_stack_noalloc+0xf/0x20
[   21.432934]  __call_rcu_common.constprop.0+0x72/0xaa0
[   21.433328]  call_rcu+0x12/0x20
[   21.434314]  rcu_uaf+0x169/0x330
[   21.434741]  kunit_try_run_case+0x1b3/0x490
[   21.435210]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.435790]  kthread+0x257/0x310
[   21.436305]  ret_from_fork+0x41/0x80
[   21.436722]  ret_from_fork_asm+0x1a/0x30
[   21.437555] 
[   21.437823] The buggy address belongs to the object at ffff8881028b8e40
[   21.437823]  which belongs to the cache kmalloc-32 of size 32
[   21.438780] The buggy address is located 0 bytes inside of
[   21.438780]  freed 32-byte region [ffff8881028b8e40, ffff8881028b8e60)
[   21.439920] 
[   21.440313] The buggy address belongs to the physical page:
[   21.440882] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028b8
[   21.441902] flags: 0x200000000000000(node=0|zone=2)
[   21.442412] page_type: f5(slab)
[   21.442816] raw: 0200000000000000 ffff888100041780 dead000000000122 0000000000000000
[   21.443398] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   21.443859] page dumped because: kasan: bad access detected
[   21.444345] 
[   21.444800] Memory state around the buggy address:
[   21.445560]  ffff8881028b8d00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   21.446418]  ffff8881028b8d80: 00 00 00 fc fc fc fc fc 00 00 05 fc fc fc fc fc
[   21.447149] >ffff8881028b8e00: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   21.447833]                                            ^
[   21.448512]  ffff8881028b8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.449399]  ffff8881028b8f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.450116] ==================================================================