Hay
Date
July 18, 2025, 2:09 p.m.

Environment
qemu-arm64
qemu-x86_64

[   17.562193] ==================================================================
[   17.562349] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70
[   17.562420] Read of size 4 at addr fff00000c788d940 by task swapper/1/0
[   17.562467] 
[   17.562513] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.562597] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.562624] Hardware name: linux,dummy-virt (DT)
[   17.562656] Call trace:
[   17.562680]  show_stack+0x20/0x38 (C)
[   17.562730]  dump_stack_lvl+0x8c/0xd0
[   17.562781]  print_report+0x118/0x5d0
[   17.562827]  kasan_report+0xdc/0x128
[   17.562983]  __asan_report_load4_noabort+0x20/0x30
[   17.563069]  rcu_uaf_reclaim+0x64/0x70
[   17.563170]  rcu_core+0x9f4/0x1e20
[   17.563222]  rcu_core_si+0x18/0x30
[   17.563268]  handle_softirqs+0x374/0xb28
[   17.563331]  __do_softirq+0x1c/0x28
[   17.563453]  ____do_softirq+0x18/0x30
[   17.563550]  call_on_irq_stack+0x24/0x30
[   17.563871]  do_softirq_own_stack+0x24/0x38
[   17.564052]  __irq_exit_rcu+0x1fc/0x318
[   17.564104]  irq_exit_rcu+0x1c/0x80
[   17.564196]  el1_interrupt+0x38/0x58
[   17.564402]  el1h_64_irq_handler+0x18/0x28
[   17.564531]  el1h_64_irq+0x6c/0x70
[   17.564758]  arch_local_irq_enable+0x4/0x8 (P)
[   17.564826]  do_idle+0x384/0x4e8
[   17.564889]  cpu_startup_entry+0x64/0x80
[   17.565161]  secondary_start_kernel+0x288/0x340
[   17.565338]  __secondary_switched+0xc0/0xc8
[   17.565436] 
[   17.565574] Allocated by task 198:
[   17.565653]  kasan_save_stack+0x3c/0x68
[   17.565954]  kasan_save_track+0x20/0x40
[   17.566130]  kasan_save_alloc_info+0x40/0x58
[   17.566174]  __kasan_kmalloc+0xd4/0xd8
[   17.566465]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.566631]  rcu_uaf+0xb0/0x2d8
[   17.566680]  kunit_try_run_case+0x170/0x3f0
[   17.566779]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.566828]  kthread+0x328/0x630
[   17.566898]  ret_from_fork+0x10/0x20
[   17.566936] 
[   17.566966] Freed by task 0:
[   17.566995]  kasan_save_stack+0x3c/0x68
[   17.567035]  kasan_save_track+0x20/0x40
[   17.567083]  kasan_save_free_info+0x4c/0x78
[   17.567123]  __kasan_slab_free+0x6c/0x98
[   17.567162]  kfree+0x214/0x3c8
[   17.567194]  rcu_uaf_reclaim+0x28/0x70
[   17.567230]  rcu_core+0x9f4/0x1e20
[   17.567273]  rcu_core_si+0x18/0x30
[   17.567307]  handle_softirqs+0x374/0xb28
[   17.567585]  __do_softirq+0x1c/0x28
[   17.567762] 
[   17.567858] Last potentially related work creation:
[   17.568018]  kasan_save_stack+0x3c/0x68
[   17.568163]  kasan_record_aux_stack+0xb4/0xc8
[   17.568274]  __call_rcu_common.constprop.0+0x74/0x8c8
[   17.568355]  call_rcu+0x18/0x30
[   17.568563]  rcu_uaf+0x14c/0x2d8
[   17.568598]  kunit_try_run_case+0x170/0x3f0
[   17.568748]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.569002]  kthread+0x328/0x630
[   17.569117]  ret_from_fork+0x10/0x20
[   17.569296] 
[   17.569364] The buggy address belongs to the object at fff00000c788d940
[   17.569364]  which belongs to the cache kmalloc-32 of size 32
[   17.569555] The buggy address is located 0 bytes inside of
[   17.569555]  freed 32-byte region [fff00000c788d940, fff00000c788d960)
[   17.569679] 
[   17.569708] The buggy address belongs to the physical page:
[   17.569958] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10788d
[   17.570154] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.570250] page_type: f5(slab)
[   17.570414] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   17.570574] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   17.570661] page dumped because: kasan: bad access detected
[   17.570735] 
[   17.570754] Memory state around the buggy address:
[   17.570986]  fff00000c788d800: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   17.571121]  fff00000c788d880: 00 00 05 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   17.571291] >fff00000c788d900: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   17.571483]                                            ^
[   17.571540]  fff00000c788d980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.571617]  fff00000c788da00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.571753] ==================================================================

[   16.973969] ==================================================================
[   16.974095] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70
[   16.974166] Read of size 4 at addr fff00000c794c600 by task swapper/1/0
[   16.974213] 
[   16.974255] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.974353] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.974380] Hardware name: linux,dummy-virt (DT)
[   16.974412] Call trace:
[   16.974436]  show_stack+0x20/0x38 (C)
[   16.974486]  dump_stack_lvl+0x8c/0xd0
[   16.974535]  print_report+0x118/0x5d0
[   16.974580]  kasan_report+0xdc/0x128
[   16.974625]  __asan_report_load4_noabort+0x20/0x30
[   16.974673]  rcu_uaf_reclaim+0x64/0x70
[   16.980249]  rcu_core+0x9f4/0x1e20
[   16.980663]  rcu_core_si+0x18/0x30
[   16.980714]  handle_softirqs+0x374/0xb28
[   16.980766]  __do_softirq+0x1c/0x28
[   16.981263]  ____do_softirq+0x18/0x30
[   16.982351]  call_on_irq_stack+0x24/0x30
[   16.982411]  do_softirq_own_stack+0x24/0x38
[   16.982460]  __irq_exit_rcu+0x1fc/0x318
[   16.982529]  irq_exit_rcu+0x1c/0x80
[   16.982574]  el1_interrupt+0x38/0x58
[   16.982625]  el1h_64_irq_handler+0x18/0x28
[   16.982673]  el1h_64_irq+0x6c/0x70
[   16.982775]  arch_local_irq_enable+0x4/0x8 (P)
[   16.982827]  do_idle+0x384/0x4e8
[   16.982870]  cpu_startup_entry+0x64/0x80
[   16.982916]  secondary_start_kernel+0x288/0x340
[   16.982963]  __secondary_switched+0xc0/0xc8
[   16.983017] 
[   16.983035] Allocated by task 198:
[   16.983065]  kasan_save_stack+0x3c/0x68
[   16.983107]  kasan_save_track+0x20/0x40
[   16.983146]  kasan_save_alloc_info+0x40/0x58
[   16.983185]  __kasan_kmalloc+0xd4/0xd8
[   16.983223]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.983261]  rcu_uaf+0xb0/0x2d8
[   16.983294]  kunit_try_run_case+0x170/0x3f0
[   16.983345]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.983456]  kthread+0x328/0x630
[   16.983526]  ret_from_fork+0x10/0x20
[   16.983563] 
[   16.983620] Freed by task 0:
[   16.983707]  kasan_save_stack+0x3c/0x68
[   16.983756]  kasan_save_track+0x20/0x40
[   16.983832]  kasan_save_free_info+0x4c/0x78
[   16.983873]  __kasan_slab_free+0x6c/0x98
[   16.984243]  kfree+0x214/0x3c8
[   16.984423]  rcu_uaf_reclaim+0x28/0x70
[   16.984491]  rcu_core+0x9f4/0x1e20
[   16.984525]  rcu_core_si+0x18/0x30
[   16.984611]  handle_softirqs+0x374/0xb28
[   16.984688]  __do_softirq+0x1c/0x28
[   16.984803] 
[   16.984864] Last potentially related work creation:
[   16.984899]  kasan_save_stack+0x3c/0x68
[   16.985058]  kasan_record_aux_stack+0xb4/0xc8
[   16.985187]  __call_rcu_common.constprop.0+0x74/0x8c8
[   16.985253]  call_rcu+0x18/0x30
[   16.985285]  rcu_uaf+0x14c/0x2d8
[   16.985330]  kunit_try_run_case+0x170/0x3f0
[   16.985368]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.985412]  kthread+0x328/0x630
[   16.985444]  ret_from_fork+0x10/0x20
[   16.985523] 
[   16.985552] The buggy address belongs to the object at fff00000c794c600
[   16.985552]  which belongs to the cache kmalloc-32 of size 32
[   16.985612] The buggy address is located 0 bytes inside of
[   16.985612]  freed 32-byte region [fff00000c794c600, fff00000c794c620)
[   16.985671] 
[   16.985691] The buggy address belongs to the physical page:
[   16.985724] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10794c
[   16.985801] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.985853] page_type: f5(slab)
[   16.985907] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   16.985957] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   16.986050] page dumped because: kasan: bad access detected
[   16.986120] 
[   16.986138] Memory state around the buggy address:
[   16.986200]  fff00000c794c500: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   16.986308]  fff00000c794c580: 00 00 05 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   16.986363] >fff00000c794c600: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   16.986433]                    ^
[   16.986491]  fff00000c794c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.986533]  fff00000c794c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.986571] ==================================================================

[   16.964756] ==================================================================
[   16.964892] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70
[   16.964961] Read of size 4 at addr fff00000c771ff40 by task swapper/0/0
[   16.965008] 
[   16.965049] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.965130] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.965157] Hardware name: linux,dummy-virt (DT)
[   16.968369] Call trace:
[   16.968416]  show_stack+0x20/0x38 (C)
[   16.968821]  dump_stack_lvl+0x8c/0xd0
[   16.969634]  print_report+0x118/0x5d0
[   16.970371]  kasan_report+0xdc/0x128
[   16.970507]  __asan_report_load4_noabort+0x20/0x30
[   16.970559]  rcu_uaf_reclaim+0x64/0x70
[   16.970605]  rcu_core+0x9f4/0x1e20
[   16.971248]  rcu_core_si+0x18/0x30
[   16.971848]  handle_softirqs+0x374/0xb28
[   16.972414]  __do_softirq+0x1c/0x28
[   16.972756]  ____do_softirq+0x18/0x30
[   16.973291]  call_on_irq_stack+0x24/0x30
[   16.973374]  do_softirq_own_stack+0x24/0x38
[   16.973422]  __irq_exit_rcu+0x1fc/0x318
[   16.974407]  irq_exit_rcu+0x1c/0x80
[   16.974563]  el1_interrupt+0x38/0x58
[   16.974847]  el1h_64_irq_handler+0x18/0x28
[   16.975163]  el1h_64_irq+0x6c/0x70
[   16.975282]  arch_local_irq_enable+0x4/0x8 (P)
[   16.975996]  do_idle+0x384/0x4e8
[   16.976585]  cpu_startup_entry+0x64/0x80
[   16.977428]  rest_init+0x160/0x188
[   16.978023]  start_kernel+0x30c/0x3d0
[   16.978670]  __primary_switched+0x8c/0xa0
[   16.978893] 
[   16.979194] Allocated by task 198:
[   16.979236]  kasan_save_stack+0x3c/0x68
[   16.979732]  kasan_save_track+0x20/0x40
[   16.979785]  kasan_save_alloc_info+0x40/0x58
[   16.979826]  __kasan_kmalloc+0xd4/0xd8
[   16.979863]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.979902]  rcu_uaf+0xb0/0x2d8
[   16.979934]  kunit_try_run_case+0x170/0x3f0
[   16.980275]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.980354]  kthread+0x328/0x630
[   16.980555]  ret_from_fork+0x10/0x20
[   16.980621] 
[   16.981505] Freed by task 0:
[   16.981543]  kasan_save_stack+0x3c/0x68
[   16.981597]  kasan_save_track+0x20/0x40
[   16.981635]  kasan_save_free_info+0x4c/0x78
[   16.981676]  __kasan_slab_free+0x6c/0x98
[   16.981724]  kfree+0x214/0x3c8
[   16.981763]  rcu_uaf_reclaim+0x28/0x70
[   16.981799]  rcu_core+0x9f4/0x1e20
[   16.981833]  rcu_core_si+0x18/0x30
[   16.981871]  handle_softirqs+0x374/0xb28
[   16.981910]  __do_softirq+0x1c/0x28
[   16.982878] 
[   16.982922] Last potentially related work creation:
[   16.982997]  kasan_save_stack+0x3c/0x68
[   16.983212]  kasan_record_aux_stack+0xb4/0xc8
[   16.983257]  __call_rcu_common.constprop.0+0x74/0x8c8
[   16.983299]  call_rcu+0x18/0x30
[   16.983331]  rcu_uaf+0x14c/0x2d8
[   16.983365]  kunit_try_run_case+0x170/0x3f0
[   16.983644]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.983703]  kthread+0x328/0x630
[   16.983961]  ret_from_fork+0x10/0x20
[   16.984243] 
[   16.984404] The buggy address belongs to the object at fff00000c771ff40
[   16.984404]  which belongs to the cache kmalloc-32 of size 32
[   16.984469] The buggy address is located 0 bytes inside of
[   16.984469]  freed 32-byte region [fff00000c771ff40, fff00000c771ff60)
[   16.984530] 
[   16.985182] The buggy address belongs to the physical page:
[   16.985352] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10771f
[   16.985412] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.986101] page_type: f5(slab)
[   16.986263] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   16.986790] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   16.986853] page dumped because: kasan: bad access detected
[   16.986956] 
[   16.987228] Memory state around the buggy address:
[   16.987273]  fff00000c771fe00: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   16.987317]  fff00000c771fe80: 00 00 05 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   16.987464] >fff00000c771ff00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   16.987738]                                            ^
[   16.987965]  fff00000c771ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.988009]  fff00000c7720000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.988292] ==================================================================

[   12.786652] ==================================================================
[   12.787227] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x50/0x60
[   12.787603] Read of size 4 at addr ffff888102e2fa40 by task swapper/0/0
[   12.788066] 
[   12.788198] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.788266] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.788277] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.788300] Call Trace:
[   12.788346]  <IRQ>
[   12.788366]  dump_stack_lvl+0x73/0xb0
[   12.788401]  print_report+0xd1/0x610
[   12.788424]  ? __virt_addr_valid+0x1db/0x2d0
[   12.788450]  ? rcu_uaf_reclaim+0x50/0x60
[   12.788469]  ? kasan_complete_mode_report_info+0x64/0x200
[   12.788492]  ? rcu_uaf_reclaim+0x50/0x60
[   12.788583]  kasan_report+0x141/0x180
[   12.788610]  ? rcu_uaf_reclaim+0x50/0x60
[   12.788660]  __asan_report_load4_noabort+0x18/0x20
[   12.788685]  rcu_uaf_reclaim+0x50/0x60
[   12.788706]  rcu_core+0x66f/0x1c40
[   12.788737]  ? __pfx_rcu_core+0x10/0x10
[   12.788758]  ? ktime_get+0x6b/0x150
[   12.788786]  rcu_core_si+0x12/0x20
[   12.788805]  handle_softirqs+0x209/0x730
[   12.788827]  ? hrtimer_interrupt+0x2fe/0x780
[   12.788850]  ? __pfx_handle_softirqs+0x10/0x10
[   12.788903]  __irq_exit_rcu+0xc9/0x110
[   12.788923]  irq_exit_rcu+0x12/0x20
[   12.788943]  sysvec_apic_timer_interrupt+0x81/0x90
[   12.788988]  </IRQ>
[   12.789016]  <TASK>
[   12.789026]  asm_sysvec_apic_timer_interrupt+0x1f/0x30
[   12.789117] RIP: 0010:pv_native_safe_halt+0xf/0x20
[   12.789337] Code: 1f 84 00 00 00 00 00 0f 1f 40 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa eb 07 0f 00 2d 23 62 21 00 fb f4 <e9> 3c 1d 02 00 66 2e 0f 1f 84 00 00 00 00 00 66 90 90 90 90 90 90
[   12.789417] RSP: 0000:ffffffff9ac07dd8 EFLAGS: 00010216
[   12.789503] RAX: ffff8881bf072000 RBX: ffffffff9ac1cac0 RCX: ffffffff99a76125
[   12.789748] RDX: ffffed102b60618b RSI: 0000000000000004 RDI: 000000000000517c
[   12.789800] RBP: ffffffff9ac07de0 R08: 0000000000000001 R09: ffffed102b60618a
[   12.789843] R10: ffff88815b030c53 R11: ffffffff9bfc36c0 R12: 0000000000000000
[   12.789886] R13: fffffbfff3583958 R14: ffffffff9b7b1490 R15: 0000000000000000
[   12.789964]  ? ct_kernel_exit.constprop.0+0xa5/0xd0
[   12.790050]  ? default_idle+0xd/0x20
[   12.790073]  arch_cpu_idle+0xd/0x20
[   12.790094]  default_idle_call+0x48/0x80
[   12.790113]  do_idle+0x379/0x4f0
[   12.790140]  ? __pfx_do_idle+0x10/0x10
[   12.790161]  ? trace_preempt_on+0x20/0xc0
[   12.790184]  ? schedule+0x86/0x2e0
[   12.790204]  ? preempt_count_sub+0x50/0x80
[   12.790228]  cpu_startup_entry+0x5c/0x70
[   12.790247]  rest_init+0x11a/0x140
[   12.790264]  ? acpi_subsystem_init+0x5d/0x150
[   12.790290]  start_kernel+0x330/0x410
[   12.790315]  x86_64_start_reservations+0x1c/0x30
[   12.790340]  x86_64_start_kernel+0x10d/0x120
[   12.790364]  common_startup_64+0x13e/0x148
[   12.790398]  </TASK>
[   12.790409] 
[   12.809217] Allocated by task 215:
[   12.809747]  kasan_save_stack+0x45/0x70
[   12.810135]  kasan_save_track+0x18/0x40
[   12.810275]  kasan_save_alloc_info+0x3b/0x50
[   12.810421]  __kasan_kmalloc+0xb7/0xc0
[   12.810643]  __kmalloc_cache_noprof+0x189/0x420
[   12.811210]  rcu_uaf+0xb0/0x330
[   12.811571]  kunit_try_run_case+0x1a5/0x480
[   12.812092]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.812653]  kthread+0x337/0x6f0
[   12.813024]  ret_from_fork+0x116/0x1d0
[   12.813359]  ret_from_fork_asm+0x1a/0x30
[   12.813499] 
[   12.813866] Freed by task 0:
[   12.814209]  kasan_save_stack+0x45/0x70
[   12.814608]  kasan_save_track+0x18/0x40
[   12.815182]  kasan_save_free_info+0x3f/0x60
[   12.815364]  __kasan_slab_free+0x56/0x70
[   12.815507]  kfree+0x222/0x3f0
[   12.815634]  rcu_uaf_reclaim+0x1f/0x60
[   12.815774]  rcu_core+0x66f/0x1c40
[   12.816111]  rcu_core_si+0x12/0x20
[   12.816273]  handle_softirqs+0x209/0x730
[   12.816463]  __irq_exit_rcu+0xc9/0x110
[   12.817063]  irq_exit_rcu+0x12/0x20
[   12.817300]  sysvec_apic_timer_interrupt+0x81/0x90
[   12.817671]  asm_sysvec_apic_timer_interrupt+0x1f/0x30
[   12.817911] 
[   12.818073] Last potentially related work creation:
[   12.818318]  kasan_save_stack+0x45/0x70
[   12.818799]  kasan_record_aux_stack+0xb2/0xc0
[   12.819045]  __call_rcu_common.constprop.0+0x7b/0x9e0
[   12.819454]  call_rcu+0x12/0x20
[   12.819645]  rcu_uaf+0x168/0x330
[   12.820039]  kunit_try_run_case+0x1a5/0x480
[   12.820193]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.820662]  kthread+0x337/0x6f0
[   12.820951]  ret_from_fork+0x116/0x1d0
[   12.821142]  ret_from_fork_asm+0x1a/0x30
[   12.821498] 
[   12.821617] The buggy address belongs to the object at ffff888102e2fa40
[   12.821617]  which belongs to the cache kmalloc-32 of size 32
[   12.822262] The buggy address is located 0 bytes inside of
[   12.822262]  freed 32-byte region [ffff888102e2fa40, ffff888102e2fa60)
[   12.823283] 
[   12.823368] The buggy address belongs to the physical page:
[   12.823697] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102e2f
[   12.824198] flags: 0x200000000000000(node=0|zone=2)
[   12.824371] page_type: f5(slab)
[   12.824736] raw: 0200000000000000 ffff888100041780 dead000000000122 0000000000000000
[   12.825235] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   12.825554] page dumped because: kasan: bad access detected
[   12.826018] 
[   12.826192] Memory state around the buggy address:
[   12.826355]  ffff888102e2f900: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   12.826673]  ffff888102e2f980: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   12.827232] >ffff888102e2fa00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   12.827588]                                            ^
[   12.828069]  ffff888102e2fa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.828377]  ffff888102e2fb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.828938] ==================================================================

[   12.586550] ==================================================================
[   12.588284] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x50/0x60
[   12.589341] Read of size 4 at addr ffff888102ae5e40 by task swapper/0/0
[   12.590363] 
[   12.590788] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.590838] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.590850] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.591017] Call Trace:
[   12.591058]  <IRQ>
[   12.591119]  dump_stack_lvl+0x73/0xb0
[   12.591156]  print_report+0xd1/0x610
[   12.591180]  ? __virt_addr_valid+0x1db/0x2d0
[   12.591204]  ? rcu_uaf_reclaim+0x50/0x60
[   12.591224]  ? kasan_complete_mode_report_info+0x64/0x200
[   12.591246]  ? rcu_uaf_reclaim+0x50/0x60
[   12.591267]  kasan_report+0x141/0x180
[   12.591288]  ? rcu_uaf_reclaim+0x50/0x60
[   12.591314]  __asan_report_load4_noabort+0x18/0x20
[   12.591340]  rcu_uaf_reclaim+0x50/0x60
[   12.591360]  rcu_core+0x66f/0x1c40
[   12.591391]  ? __pfx_rcu_core+0x10/0x10
[   12.591630]  ? ktime_get+0x6b/0x150
[   12.591658]  ? handle_softirqs+0x18e/0x730
[   12.591685]  rcu_core_si+0x12/0x20
[   12.591705]  handle_softirqs+0x209/0x730
[   12.591724]  ? hrtimer_interrupt+0x2fe/0x780
[   12.591748]  ? __pfx_handle_softirqs+0x10/0x10
[   12.591775]  __irq_exit_rcu+0xc9/0x110
[   12.591795]  irq_exit_rcu+0x12/0x20
[   12.591814]  sysvec_apic_timer_interrupt+0x81/0x90
[   12.591839]  </IRQ>
[   12.591871]  <TASK>
[   12.591880]  asm_sysvec_apic_timer_interrupt+0x1f/0x30
[   12.591977] RIP: 0010:pv_native_safe_halt+0xf/0x20
[   12.592195] Code: 1f 84 00 00 00 00 00 0f 1f 40 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa eb 07 0f 00 2d 23 62 21 00 fb f4 <e9> 3c 1d 02 00 66 2e 0f 1f 84 00 00 00 00 00 66 90 90 90 90 90 90
[   12.592276] RSP: 0000:ffffffffa9407dd8 EFLAGS: 00010202
[   12.592362] RAX: ffff8881aa072000 RBX: ffffffffa941cac0 RCX: ffffffffa8276125
[   12.592423] RDX: ffffed102a90618b RSI: 0000000000000004 RDI: 0000000000006074
[   12.592481] RBP: ffffffffa9407de0 R08: 0000000000000001 R09: ffffed102a90618a
[   12.592522] R10: ffff888154830c53 R11: 0000000000058c00 R12: 0000000000000000
[   12.592564] R13: fffffbfff5283958 R14: ffffffffa9fb1490 R15: 0000000000000000
[   12.592622]  ? ct_kernel_exit.constprop.0+0xa5/0xd0
[   12.592677]  ? default_idle+0xd/0x20
[   12.592699]  arch_cpu_idle+0xd/0x20
[   12.592720]  default_idle_call+0x48/0x80
[   12.592738]  do_idle+0x379/0x4f0
[   12.592765]  ? __pfx_do_idle+0x10/0x10
[   12.592787]  ? trace_preempt_on+0x20/0xc0
[   12.592808]  ? schedule+0x86/0x2e0
[   12.592828]  ? preempt_count_sub+0x50/0x80
[   12.592852]  cpu_startup_entry+0x5c/0x70
[   12.592871]  rest_init+0x11a/0x140
[   12.592887]  ? acpi_subsystem_init+0x5d/0x150
[   12.592911]  start_kernel+0x330/0x410
[   12.592936]  x86_64_start_reservations+0x1c/0x30
[   12.592960]  x86_64_start_kernel+0x10d/0x120
[   12.592984]  common_startup_64+0x13e/0x148
[   12.593019]  </TASK>
[   12.593029] 
[   12.616448] Allocated by task 216:
[   12.616672]  kasan_save_stack+0x45/0x70
[   12.617323]  kasan_save_track+0x18/0x40
[   12.617811]  kasan_save_alloc_info+0x3b/0x50
[   12.618200]  __kasan_kmalloc+0xb7/0xc0
[   12.618740]  __kmalloc_cache_noprof+0x189/0x420
[   12.619167]  rcu_uaf+0xb0/0x330
[   12.619478]  kunit_try_run_case+0x1a5/0x480
[   12.619953]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.620253]  kthread+0x337/0x6f0
[   12.620377]  ret_from_fork+0x116/0x1d0
[   12.620788]  ret_from_fork_asm+0x1a/0x30
[   12.621164] 
[   12.621319] Freed by task 0:
[   12.621703]  kasan_save_stack+0x45/0x70
[   12.621970]  kasan_save_track+0x18/0x40
[   12.622115]  kasan_save_free_info+0x3f/0x60
[   12.622266]  __kasan_slab_free+0x56/0x70
[   12.622404]  kfree+0x222/0x3f0
[   12.622811]  rcu_uaf_reclaim+0x1f/0x60
[   12.623142]  rcu_core+0x66f/0x1c40
[   12.623501]  rcu_core_si+0x12/0x20
[   12.623852]  handle_softirqs+0x209/0x730
[   12.624204]  __irq_exit_rcu+0xc9/0x110
[   12.624745]  irq_exit_rcu+0x12/0x20
[   12.625089]  sysvec_apic_timer_interrupt+0x81/0x90
[   12.625609]  asm_sysvec_apic_timer_interrupt+0x1f/0x30
[   12.626136] 
[   12.626252] Last potentially related work creation:
[   12.626424]  kasan_save_stack+0x45/0x70
[   12.626867]  kasan_record_aux_stack+0xb2/0xc0
[   12.627253]  __call_rcu_common.constprop.0+0x7b/0x9e0
[   12.627787]  call_rcu+0x12/0x20
[   12.628021]  rcu_uaf+0x168/0x330
[   12.628139]  kunit_try_run_case+0x1a5/0x480
[   12.628283]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.628544]  kthread+0x337/0x6f0
[   12.628898]  ret_from_fork+0x116/0x1d0
[   12.629231]  ret_from_fork_asm+0x1a/0x30
[   12.629854] 
[   12.630045] The buggy address belongs to the object at ffff888102ae5e40
[   12.630045]  which belongs to the cache kmalloc-32 of size 32
[   12.631239] The buggy address is located 0 bytes inside of
[   12.631239]  freed 32-byte region [ffff888102ae5e40, ffff888102ae5e60)
[   12.632239] 
[   12.632317] The buggy address belongs to the physical page:
[   12.632500] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ae5
[   12.633251] flags: 0x200000000000000(node=0|zone=2)
[   12.633830] page_type: f5(slab)
[   12.634143] raw: 0200000000000000 ffff888100041780 dead000000000122 0000000000000000
[   12.634881] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   12.635113] page dumped because: kasan: bad access detected
[   12.635287] 
[   12.635355] Memory state around the buggy address:
[   12.635893]  ffff888102ae5d00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   12.636703]  ffff888102ae5d80: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   12.637482] >ffff888102ae5e00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   12.638169]                                            ^
[   12.638813]  ffff888102ae5e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.639516]  ffff888102ae5f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.639732] ==================================================================

[   12.778158] ==================================================================
[   12.779057] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x50/0x60
[   12.779588] Read of size 4 at addr ffff888103410bc0 by task swapper/1/0
[   12.780264] 
[   12.780525] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.780575] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.780586] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.780608] Call Trace:
[   12.780642]  <IRQ>
[   12.780661]  dump_stack_lvl+0x73/0xb0
[   12.780695]  print_report+0xd1/0x610
[   12.780719]  ? __virt_addr_valid+0x1db/0x2d0
[   12.780743]  ? rcu_uaf_reclaim+0x50/0x60
[   12.780762]  ? kasan_complete_mode_report_info+0x64/0x200
[   12.780784]  ? rcu_uaf_reclaim+0x50/0x60
[   12.780804]  kasan_report+0x141/0x180
[   12.780825]  ? rcu_uaf_reclaim+0x50/0x60
[   12.780855]  __asan_report_load4_noabort+0x18/0x20
[   12.780880]  rcu_uaf_reclaim+0x50/0x60
[   12.780900]  rcu_core+0x66f/0x1c40
[   12.780928]  ? __pfx_rcu_core+0x10/0x10
[   12.780949]  ? ktime_get+0x6b/0x150
[   12.780974]  rcu_core_si+0x12/0x20
[   12.780993]  handle_softirqs+0x209/0x730
[   12.781116]  ? hrtimer_interrupt+0x2fe/0x780
[   12.781142]  ? __pfx_handle_softirqs+0x10/0x10
[   12.781180]  __irq_exit_rcu+0xc9/0x110
[   12.781200]  irq_exit_rcu+0x12/0x20
[   12.781220]  sysvec_apic_timer_interrupt+0x81/0x90
[   12.781247]  </IRQ>
[   12.781276]  <TASK>
[   12.781286]  asm_sysvec_apic_timer_interrupt+0x1f/0x30
[   12.781378] RIP: 0010:pv_native_safe_halt+0xf/0x20
[   12.781590] Code: 1f 84 00 00 00 00 00 0f 1f 40 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa eb 07 0f 00 2d 23 62 21 00 fb f4 <e9> 3c 1d 02 00 66 2e 0f 1f 84 00 00 00 00 00 66 90 90 90 90 90 90
[   12.781672] RSP: 0000:ffff888100877dc8 EFLAGS: 00010216
[   12.781758] RAX: ffff88819ef72000 RBX: ffff888100853000 RCX: ffffffffb9c76125
[   12.781802] RDX: ffffed102b62618b RSI: 0000000000000004 RDI: 000000000001343c
[   12.781844] RBP: ffff888100877dd0 R08: 0000000000000001 R09: ffffed102b62618a
[   12.781886] R10: ffff88815b130c53 R11: 0000000000041000 R12: 0000000000000001
[   12.781927] R13: ffffed102010a600 R14: ffffffffbb9b1490 R15: 0000000000000000
[   12.781981]  ? ct_kernel_exit.constprop.0+0xa5/0xd0
[   12.782098]  ? default_idle+0xd/0x20
[   12.782127]  arch_cpu_idle+0xd/0x20
[   12.782148]  default_idle_call+0x48/0x80
[   12.782167]  do_idle+0x379/0x4f0
[   12.782193]  ? __pfx_do_idle+0x10/0x10
[   12.782213]  ? common_startup_64+0x13e/0x148
[   12.782242]  cpu_startup_entry+0x5c/0x70
[   12.782261]  start_secondary+0x211/0x290
[   12.782283]  ? __pfx_start_secondary+0x10/0x10
[   12.782307]  common_startup_64+0x13e/0x148
[   12.782337]  </TASK>
[   12.782347] 
[   12.800047] Allocated by task 215:
[   12.800494]  kasan_save_stack+0x45/0x70
[   12.800987]  kasan_save_track+0x18/0x40
[   12.801225]  kasan_save_alloc_info+0x3b/0x50
[   12.801763]  __kasan_kmalloc+0xb7/0xc0
[   12.801956]  __kmalloc_cache_noprof+0x189/0x420
[   12.802481]  rcu_uaf+0xb0/0x330
[   12.802801]  kunit_try_run_case+0x1a5/0x480
[   12.802962]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.803962]  kthread+0x337/0x6f0
[   12.804402]  ret_from_fork+0x116/0x1d0
[   12.804684]  ret_from_fork_asm+0x1a/0x30
[   12.804832] 
[   12.804915] Freed by task 0:
[   12.805120]  kasan_save_stack+0x45/0x70
[   12.805530]  kasan_save_track+0x18/0x40
[   12.805982]  kasan_save_free_info+0x3f/0x60
[   12.806488]  __kasan_slab_free+0x56/0x70
[   12.806889]  kfree+0x222/0x3f0
[   12.807288]  rcu_uaf_reclaim+0x1f/0x60
[   12.807451]  rcu_core+0x66f/0x1c40
[   12.807772]  rcu_core_si+0x12/0x20
[   12.807981]  handle_softirqs+0x209/0x730
[   12.808404]  __irq_exit_rcu+0xc9/0x110
[   12.808840]  irq_exit_rcu+0x12/0x20
[   12.809227]  sysvec_apic_timer_interrupt+0x81/0x90
[   12.809404]  asm_sysvec_apic_timer_interrupt+0x1f/0x30
[   12.809905] 
[   12.810148] Last potentially related work creation:
[   12.810727]  kasan_save_stack+0x45/0x70
[   12.810905]  kasan_record_aux_stack+0xb2/0xc0
[   12.811155]  __call_rcu_common.constprop.0+0x7b/0x9e0
[   12.811661]  call_rcu+0x12/0x20
[   12.811978]  rcu_uaf+0x168/0x330
[   12.812416]  kunit_try_run_case+0x1a5/0x480
[   12.812734]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.813088]  kthread+0x337/0x6f0
[   12.813784]  ret_from_fork+0x116/0x1d0
[   12.814140]  ret_from_fork_asm+0x1a/0x30
[   12.814313] 
[   12.814400] The buggy address belongs to the object at ffff888103410bc0
[   12.814400]  which belongs to the cache kmalloc-32 of size 32
[   12.814764] The buggy address is located 0 bytes inside of
[   12.814764]  freed 32-byte region [ffff888103410bc0, ffff888103410be0)
[   12.815359] 
[   12.815583] The buggy address belongs to the physical page:
[   12.816117] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103410
[   12.816884] flags: 0x200000000000000(node=0|zone=2)
[   12.817525] page_type: f5(slab)
[   12.817972] raw: 0200000000000000 ffff888100041780 dead000000000122 0000000000000000
[   12.819125] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   12.819904] page dumped because: kasan: bad access detected
[   12.820567] 
[   12.820644] Memory state around the buggy address:
[   12.820805]  ffff888103410a80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   12.821044]  ffff888103410b00: 00 00 00 fc fc fc fc fc 00 00 05 fc fc fc fc fc
[   12.821262] >ffff888103410b80: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   12.821644]                                            ^
[   12.822200]  ffff888103410c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.823024]  ffff888103410c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.824003] ==================================================================