Date
July 4, 2025, 3:11 p.m.
Environment | |
---|---|
e850-96 | |
qemu-arm64 | |
qemu-x86_64 |
[ 30.540699] ================================================================== [ 30.540878] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70 [ 30.541002] Read of size 4 at addr ffff00080656c280 by task swapper/1/0 [ 30.542062] [ 30.543548] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 30.543600] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.543615] Hardware name: WinLink E850-96 board (DT) [ 30.543637] Call trace: [ 30.543650] show_stack+0x20/0x38 (C) [ 30.543681] dump_stack_lvl+0x8c/0xd0 [ 30.543718] print_report+0x118/0x608 [ 30.543748] kasan_report+0xdc/0x128 [ 30.543780] __asan_report_load4_noabort+0x20/0x30 [ 30.543816] rcu_uaf_reclaim+0x64/0x70 [ 30.543847] rcu_core+0x9f4/0x1e20 [ 30.543877] rcu_core_si+0x18/0x30 [ 30.543904] handle_softirqs+0x374/0xb28 [ 30.543936] __do_softirq+0x1c/0x28 [ 30.543967] ____do_softirq+0x18/0x30 [ 30.543999] call_on_irq_stack+0x24/0x30 [ 30.544027] do_softirq_own_stack+0x24/0x38 [ 30.544058] __irq_exit_rcu+0x1fc/0x318 [ 30.544088] irq_exit_rcu+0x1c/0x80 [ 30.544114] el1_interrupt+0x38/0x58 [ 30.544144] el1h_64_irq_handler+0x18/0x28 [ 30.544172] el1h_64_irq+0x6c/0x70 [ 30.544199] arch_local_irq_enable+0x4/0x8 (P) [ 30.544231] do_idle+0x384/0x4e8 [ 30.544260] cpu_startup_entry+0x64/0x80 [ 30.544288] secondary_start_kernel+0x288/0x340 [ 30.544327] __secondary_switched+0xc0/0xc8 [ 30.544367] [ 30.653257] Allocated by task 247: [ 30.656646] kasan_save_stack+0x3c/0x68 [ 30.660462] kasan_save_track+0x20/0x40 [ 30.664281] kasan_save_alloc_info+0x40/0x58 [ 30.668534] __kasan_kmalloc+0xd4/0xd8 [ 30.672267] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.676781] rcu_uaf+0xb0/0x2d8 [ 30.679906] kunit_try_run_case+0x170/0x3f0 [ 30.684073] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.689543] kthread+0x328/0x630 [ 30.692753] ret_from_fork+0x10/0x20 [ 30.696312] [ 30.697789] Freed by task 0: [ 30.700655] kasan_save_stack+0x3c/0x68 [ 30.704471] kasan_save_track+0x20/0x40 [ 30.708291] kasan_save_free_info+0x4c/0x78 [ 30.712457] __kasan_slab_free+0x6c/0x98 [ 30.716365] kfree+0x214/0x3c8 [ 30.719401] rcu_uaf_reclaim+0x28/0x70 [ 30.723134] rcu_core+0x9f4/0x1e20 [ 30.726520] rcu_core_si+0x18/0x30 [ 30.729905] handle_softirqs+0x374/0xb28 [ 30.733811] __do_softirq+0x1c/0x28 [ 30.737284] [ 30.738760] Last potentially related work creation: [ 30.743620] kasan_save_stack+0x3c/0x68 [ 30.747440] kasan_record_aux_stack+0xb4/0xc8 [ 30.751780] __call_rcu_common.constprop.0+0x70/0x8b0 [ 30.756815] call_rcu+0x18/0x30 [ 30.759939] rcu_uaf+0x14c/0x2d8 [ 30.763151] kunit_try_run_case+0x170/0x3f0 [ 30.767318] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.772787] kthread+0x328/0x630 [ 30.775998] ret_from_fork+0x10/0x20 [ 30.779557] [ 30.781034] The buggy address belongs to the object at ffff00080656c280 [ 30.781034] which belongs to the cache kmalloc-32 of size 32 [ 30.793363] The buggy address is located 0 bytes inside of [ 30.793363] freed 32-byte region [ffff00080656c280, ffff00080656c2a0) [ 30.805338] [ 30.806818] The buggy address belongs to the physical page: [ 30.812374] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88656c [ 30.820357] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.826867] page_type: f5(slab) [ 30.830007] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000 [ 30.837723] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 30.845443] page dumped because: kasan: bad access detected [ 30.850997] [ 30.852473] Memory state around the buggy address: [ 30.857256] ffff00080656c180: 00 00 00 06 fc fc fc fc fa fb fb fb fc fc fc fc [ 30.864456] ffff00080656c200: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 30.871662] >ffff00080656c280: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 30.878861] ^ [ 30.882077] ffff00080656c300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.889282] ffff00080656c380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.896484] ==================================================================
[ 15.939692] ================================================================== [ 15.939828] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70 [ 15.939897] Read of size 4 at addr fff00000c6f01e80 by task ksoftirqd/0/15 [ 15.939944] [ 15.941668] CPU: 0 UID: 0 PID: 15 Comm: ksoftirqd/0 Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 15.941761] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.941786] Hardware name: linux,dummy-virt (DT) [ 15.941818] Call trace: [ 15.941844] show_stack+0x20/0x38 (C) [ 15.941896] dump_stack_lvl+0x8c/0xd0 [ 15.941944] print_report+0x118/0x608 [ 15.941992] kasan_report+0xdc/0x128 [ 15.942037] __asan_report_load4_noabort+0x20/0x30 [ 15.942086] rcu_uaf_reclaim+0x64/0x70 [ 15.942130] rcu_core+0x9f4/0x1e20 [ 15.942176] rcu_core_si+0x18/0x30 [ 15.942218] handle_softirqs+0x374/0xb28 [ 15.942266] run_ksoftirqd+0x80/0xb0 [ 15.942308] smpboot_thread_fn+0x2e8/0x760 [ 15.942354] kthread+0x328/0x630 [ 15.942398] ret_from_fork+0x10/0x20 [ 15.942445] [ 15.942463] Allocated by task 203: [ 15.942493] kasan_save_stack+0x3c/0x68 [ 15.942530] kasan_save_track+0x20/0x40 [ 15.942567] kasan_save_alloc_info+0x40/0x58 [ 15.942605] __kasan_kmalloc+0xd4/0xd8 [ 15.942648] __kmalloc_cache_noprof+0x16c/0x3c0 [ 15.942745] rcu_uaf+0xb0/0x2d8 [ 15.942781] kunit_try_run_case+0x170/0x3f0 [ 15.942833] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.942886] kthread+0x328/0x630 [ 15.942922] ret_from_fork+0x10/0x20 [ 15.942955] [ 15.942975] Freed by task 15: [ 15.943000] kasan_save_stack+0x3c/0x68 [ 15.943044] kasan_save_track+0x20/0x40 [ 15.943086] kasan_save_free_info+0x4c/0x78 [ 15.943125] __kasan_slab_free+0x6c/0x98 [ 15.943167] kfree+0x214/0x3c8 [ 15.943207] rcu_uaf_reclaim+0x28/0x70 [ 15.943244] rcu_core+0x9f4/0x1e20 [ 15.943276] rcu_core_si+0x18/0x30 [ 15.943325] handle_softirqs+0x374/0xb28 [ 15.943359] run_ksoftirqd+0x80/0xb0 [ 15.943403] smpboot_thread_fn+0x2e8/0x760 [ 15.943439] kthread+0x328/0x630 [ 15.943474] ret_from_fork+0x10/0x20 [ 15.943509] [ 15.943540] Last potentially related work creation: [ 15.943583] kasan_save_stack+0x3c/0x68 [ 15.943637] kasan_record_aux_stack+0xb4/0xc8 [ 15.943676] __call_rcu_common.constprop.0+0x70/0x8b0 [ 15.943717] call_rcu+0x18/0x30 [ 15.943750] rcu_uaf+0x14c/0x2d8 [ 15.943785] kunit_try_run_case+0x170/0x3f0 [ 15.943824] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 15.943877] kthread+0x328/0x630 [ 15.943920] ret_from_fork+0x10/0x20 [ 15.943960] [ 15.944002] The buggy address belongs to the object at fff00000c6f01e80 [ 15.944002] which belongs to the cache kmalloc-32 of size 32 [ 15.944075] The buggy address is located 0 bytes inside of [ 15.944075] freed 32-byte region [fff00000c6f01e80, fff00000c6f01ea0) [ 15.944139] [ 15.944166] The buggy address belongs to the physical page: [ 15.944208] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106f01 [ 15.944260] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 15.944311] page_type: f5(slab) [ 15.944359] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 15.944416] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 15.944457] page dumped because: kasan: bad access detected [ 15.944502] [ 15.944519] Memory state around the buggy address: [ 15.944588] fff00000c6f01d80: 00 00 00 fc fc fc fc fc 00 00 00 01 fc fc fc fc [ 15.944639] fff00000c6f01e00: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 15.944682] >fff00000c6f01e80: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 15.944721] ^ [ 15.944747] fff00000c6f01f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.944789] fff00000c6f01f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.944826] ==================================================================
[ 15.044427] ================================================================== [ 15.044853] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x50/0x60 [ 15.045052] Read of size 4 at addr ffff8881029eef00 by task swapper/1/0 [ 15.045386] [ 15.045533] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 15.045630] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.045653] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.045698] Call Trace: [ 15.045763] <IRQ> [ 15.045809] dump_stack_lvl+0x73/0xb0 [ 15.045870] print_report+0xd1/0x650 [ 15.045915] ? __virt_addr_valid+0x1db/0x2d0 [ 15.045969] ? rcu_uaf_reclaim+0x50/0x60 [ 15.046012] ? kasan_complete_mode_report_info+0x64/0x200 [ 15.046062] ? rcu_uaf_reclaim+0x50/0x60 [ 15.046105] kasan_report+0x141/0x180 [ 15.046147] ? rcu_uaf_reclaim+0x50/0x60 [ 15.046213] __asan_report_load4_noabort+0x18/0x20 [ 15.046266] rcu_uaf_reclaim+0x50/0x60 [ 15.046304] rcu_core+0x66c/0x1c30 [ 15.046364] ? enqueue_hrtimer+0xfe/0x210 [ 15.046410] ? __pfx_rcu_core+0x10/0x10 [ 15.046451] ? ktime_get+0x6b/0x150 [ 15.046489] ? handle_softirqs+0x18e/0x730 [ 15.046546] rcu_core_si+0x12/0x20 [ 15.046586] handle_softirqs+0x209/0x730 [ 15.046632] ? hrtimer_interrupt+0x2fe/0x780 [ 15.046688] ? __pfx_handle_softirqs+0x10/0x10 [ 15.046748] __irq_exit_rcu+0xc9/0x110 [ 15.046792] irq_exit_rcu+0x12/0x20 [ 15.046831] sysvec_apic_timer_interrupt+0x81/0x90 [ 15.046885] </IRQ> [ 15.046949] <TASK> [ 15.046971] asm_sysvec_apic_timer_interrupt+0x1f/0x30 [ 15.047278] RIP: 0010:pv_native_safe_halt+0xf/0x20 [ 15.047761] Code: 1f 84 00 00 00 00 00 0f 1f 40 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa eb 07 0f 00 2d 43 ae 27 00 fb f4 <e9> fc 1f 02 00 66 2e 0f 1f 84 00 00 00 00 00 66 90 90 90 90 90 90 [ 15.047907] RSP: 0000:ffff88810086fdc8 EFLAGS: 00010216 [ 15.048038] RAX: ffff8881a0992000 RBX: ffff8881008353c0 RCX: ffffffffb820ef55 [ 15.048128] RDX: ffffed102b626103 RSI: 0000000000000004 RDI: 0000000000018dac [ 15.048198] RBP: ffff88810086fdd0 R08: 0000000000000001 R09: ffffed102b626102 [ 15.048272] R10: ffff88815b130813 R11: 0000000000026800 R12: 0000000000000001 [ 15.048349] R13: ffffed1020106a78 R14: ffffffffb9f9c210 R15: 0000000000000000 [ 15.048430] ? ct_kernel_exit.constprop.0+0xa5/0xd0 [ 15.048475] ? default_idle+0xd/0x20 [ 15.048498] arch_cpu_idle+0xd/0x20 [ 15.048519] default_idle_call+0x48/0x80 [ 15.048539] do_idle+0x379/0x4f0 [ 15.048565] ? __pfx_do_idle+0x10/0x10 [ 15.048584] ? _raw_spin_unlock_irqrestore+0x49/0x90 [ 15.048612] ? complete+0x15b/0x1d0 [ 15.048637] cpu_startup_entry+0x5c/0x70 [ 15.048659] start_secondary+0x211/0x290 [ 15.048683] ? __pfx_start_secondary+0x10/0x10 [ 15.048709] common_startup_64+0x13e/0x148 [ 15.048744] </TASK> [ 15.048758] [ 15.065796] Allocated by task 219: [ 15.066377] kasan_save_stack+0x45/0x70 [ 15.066800] kasan_save_track+0x18/0x40 [ 15.067168] kasan_save_alloc_info+0x3b/0x50 [ 15.067698] __kasan_kmalloc+0xb7/0xc0 [ 15.068009] __kmalloc_cache_noprof+0x189/0x420 [ 15.068520] rcu_uaf+0xb0/0x330 [ 15.068835] kunit_try_run_case+0x1a5/0x480 [ 15.069705] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.070387] kthread+0x337/0x6f0 [ 15.070761] ret_from_fork+0x41/0x80 [ 15.070975] ret_from_fork_asm+0x1a/0x30 [ 15.071503] [ 15.071708] Freed by task 0: [ 15.071880] kasan_save_stack+0x45/0x70 [ 15.072436] kasan_save_track+0x18/0x40 [ 15.072768] kasan_save_free_info+0x3f/0x60 [ 15.073115] __kasan_slab_free+0x56/0x70 [ 15.073620] kfree+0x222/0x3f0 [ 15.073945] rcu_uaf_reclaim+0x1f/0x60 [ 15.074355] rcu_core+0x66c/0x1c30 [ 15.074666] rcu_core_si+0x12/0x20 [ 15.074964] handle_softirqs+0x209/0x730 [ 15.075801] __irq_exit_rcu+0xc9/0x110 [ 15.076152] irq_exit_rcu+0x12/0x20 [ 15.076635] sysvec_apic_timer_interrupt+0x81/0x90 [ 15.076953] asm_sysvec_apic_timer_interrupt+0x1f/0x30 [ 15.077484] [ 15.077765] Last potentially related work creation: [ 15.078101] kasan_save_stack+0x45/0x70 [ 15.078654] kasan_record_aux_stack+0xb2/0xc0 [ 15.078933] __call_rcu_common.constprop.0+0x72/0x9c0 [ 15.079550] call_rcu+0x12/0x20 [ 15.079789] rcu_uaf+0x168/0x330 [ 15.080036] kunit_try_run_case+0x1a5/0x480 [ 15.080807] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.081129] kthread+0x337/0x6f0 [ 15.081373] ret_from_fork+0x41/0x80 [ 15.081678] ret_from_fork_asm+0x1a/0x30 [ 15.082081] [ 15.082305] The buggy address belongs to the object at ffff8881029eef00 [ 15.082305] which belongs to the cache kmalloc-32 of size 32 [ 15.083022] The buggy address is located 0 bytes inside of [ 15.083022] freed 32-byte region [ffff8881029eef00, ffff8881029eef20) [ 15.083738] [ 15.084088] The buggy address belongs to the physical page: [ 15.084569] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029ee [ 15.085387] flags: 0x200000000000000(node=0|zone=2) [ 15.086552] page_type: f5(slab) [ 15.086896] raw: 0200000000000000 ffff888100041780 dead000000000122 0000000000000000 [ 15.087390] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 15.087914] page dumped because: kasan: bad access detected [ 15.088541] [ 15.088755] Memory state around the buggy address: [ 15.089168] ffff8881029eee00: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 15.089918] ffff8881029eee80: 00 00 05 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 15.090506] >ffff8881029eef00: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 15.090736] ^ [ 15.090885] ffff8881029eef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.091786] ffff8881029ef000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 15.092515] ==================================================================