====================================== | [ 69.480276][ T371] ================================================================== | [ 69.480997][ T371] BUG: KASAN: slab-use-after-free in emit_its_trampoline (arch/x86/kernel/alternative.c:129 arch/x86/kernel/alternative.c:236 arch/x86/kernel/alternative.c:264 arch/x86/kernel/alternative.c:808) | [ 69.481631][ T371] Read of size 1 at addr ffff888001936720 by task modprobe/371 | [ 69.482215][ T371] [ 69.482436][ T371] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011 [ 69.482440][ T371] Call Trace: [ 69.482444][ T371] [ 69.482447][ T371] dump_stack_lvl (lib/dump_stack.c:123) [ 69.482466][ T371] print_address_description.constprop.0 (mm/kasan/report.c:409) [ 69.482582][ T371] ? emit_its_trampoline (arch/x86/kernel/alternative.c:129 arch/x86/kernel/alternative.c:236 arch/x86/kernel/alternative.c:264 arch/x86/kernel/alternative.c:808) [ 69.482593][ T371] print_report (mm/kasan/report.c:522) [ 69.482600][ T371] ? emit_its_trampoline (arch/x86/kernel/alternative.c:129 arch/x86/kernel/alternative.c:236 arch/x86/kernel/alternative.c:264 arch/x86/kernel/alternative.c:808) [ 69.482605][ T371] ? kasan_addr_to_slab (./include/linux/mm.h:1178 mm/kasan/../slab.h:211 mm/kasan/common.c:38) [ 69.482611][ T371] ? emit_its_trampoline (arch/x86/kernel/alternative.c:129 arch/x86/kernel/alternative.c:236 arch/x86/kernel/alternative.c:264 arch/x86/kernel/alternative.c:808) [ 69.482616][ T371] kasan_report (mm/kasan/report.c:636) [ 69.482624][ T371] ? emit_its_trampoline (arch/x86/kernel/alternative.c:129 arch/x86/kernel/alternative.c:236 arch/x86/kernel/alternative.c:264 arch/x86/kernel/alternative.c:808) [ 69.482635][ T371] ? emit_its_trampoline (arch/x86/kernel/alternative.c:129 arch/x86/kernel/alternative.c:236 arch/x86/kernel/alternative.c:264 arch/x86/kernel/alternative.c:808) [ 69.482640][ T371] __kasan_check_byte (mm/kasan/common.c:561) [ 69.482646][ T371] krealloc_noprof (mm/slub.c:4858 mm/slub.c:4958) [ 69.482653][ T371] ? execmem_alloc (mm/execmem.c:299 mm/execmem.c:383) [ 69.482664][ T371] emit_its_trampoline (arch/x86/kernel/alternative.c:129 arch/x86/kernel/alternative.c:236 arch/x86/kernel/alternative.c:264 arch/x86/kernel/alternative.c:808) [ 69.482670][ T371] ? __x86_indirect_paranoid_thunk_rax (./arch/x86/include/asm/GEN-for-each-reg.h:6) [ 69.482681][ T371] ? __do_softirq (./arch/x86/include/asm/GEN-for-each-reg.h:6) [ 69.482687][ T371] apply_retpolines (arch/x86/kernel/alternative.c:994 (discriminator 3)) [ 69.482696][ T371] ? __pfx_apply_retpolines (arch/x86/kernel/alternative.c:946) [ 69.482702][ T371] ? __pfx___mutex_lock (kernel/locking/mutex.c:746) [ 69.482723][ T371] module_finalize (arch/x86/kernel/module.c:292) [ 69.482734][ T371] ? add_kallsyms (kernel/module/kallsyms.c:212) [ 69.482744][ T371] ? __pfx_module_finalize (arch/x86/kernel/module.c:241) [ 69.482751][ T371] ? __pfx_cmp_ex_sort (lib/extable.c:52) [ 69.482757][ T371] ? __pfx_swap_ex (lib/extable.c:28) [ 69.482766][ T371] load_module (kernel/module/main.c:2927 kernel/module/main.c:3422) [ 69.482794][ T371] ? __pfx_load_module (kernel/module/main.c:3327) [ 69.482800][ T371] ? kernel_read_file (fs/kernel_read_file.c:80 (discriminator 2)) [ 69.482811][ T371] ? kernel_read_file (./arch/x86/include/asm/atomic.h:53 ./include/linux/atomic/atomic-arch-fallback.h:992 ./include/linux/atomic/atomic-instrumented.h:436 ./include/linux/fs.h:3192 fs/kernel_read_file.c:122) [ 69.482819][ T371] ? __pfx_kernel_read_file (fs/kernel_read_file.c:38) [ 69.482830][ T371] ? init_module_from_file (kernel/module/main.c:3673) [ 69.482835][ T371] init_module_from_file (kernel/module/main.c:3673) [ 69.482842][ T371] ? __pfx_init_module_from_file (kernel/module/main.c:3649) [ 69.482856][ T371] ? idempotent_init_module (kernel/module/main.c:3685) [ 69.482861][ T371] ? __lock_release (kernel/locking/lockdep.c:5539) [ 69.482872][ T371] ? do_raw_spin_unlock (./arch/x86/include/asm/atomic.h:23 ./include/linux/atomic/atomic-arch-fallback.h:457 ./include/linux/atomic/atomic-instrumented.h:33 ./include/asm-generic/qspinlock.h:57 kernel/locking/spinlock_debug.c:101 kernel/locking/spinlock_debug.c:141) [ 69.482879][ T371] idempotent_init_module (kernel/module/main.c:3685) [ 69.482887][ T371] ? __pfx_idempotent_init_module (kernel/module/main.c:3677) [ 69.482900][ T371] ? cap_capable (security/commoncap.c:132) [ 69.482913][ T371] __x64_sys_finit_module (./include/linux/file.h:62 ./include/linux/file.h:83 kernel/module/main.c:3708 kernel/module/main.c:3695 kernel/module/main.c:3695) [ 69.482918][ T371] ? do_syscall_64 (./arch/x86/include/asm/irqflags.h:42 ./arch/x86/include/asm/irqflags.h:119 ./include/linux/entry-common.h:199 arch/x86/entry/syscall_64.c:90) [ 69.482927][ T371] do_syscall_64 (arch/x86/entry/syscall_64.c:63 arch/x86/entry/syscall_64.c:94) [ 69.482934][ T371] entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130) [ 69.482942][ T371] RIP: 0033:0x7f67441d1e5d [ 69.482951][ T371] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 73 9f 1b 00 f7 d8 64 89 01 48 All code ======== 0: ff c3 inc %ebx 2: 66 2e 0f 1f 84 00 00 cs nopw 0x0(%rax,%rax,1) 9: 00 00 00 c: 90 nop d: f3 0f 1e fa endbr64 11: 48 89 f8 mov %rdi,%rax 14: 48 89 f7 mov %rsi,%rdi 17: 48 89 d6 mov %rdx,%rsi 1a: 48 89 ca mov %rcx,%rdx 1d: 4d 89 c2 mov %r8,%r10 20: 4d 89 c8 mov %r9,%r8 23: 4c 8b 4c 24 08 mov 0x8(%rsp),%r9 28: 0f 05 syscall 2a:* 48 3d 01 f0 ff ff cmp $0xfffffffffffff001,%rax <-- trapping instruction 30: 73 01 jae 0x33 32: c3 ret 33: 48 8b 0d 73 9f 1b 00 mov 0x1b9f73(%rip),%rcx # 0x1b9fad 3a: f7 d8 neg %eax 3c: 64 89 01 mov %eax,%fs:(%rcx) 3f: 48 rex.W Code starting with the faulting instruction =========================================== 0: 48 3d 01 f0 ff ff cmp $0xfffffffffffff001,%rax 6: 73 01 jae 0x9 8: c3 ret 9: 48 8b 0d 73 9f 1b 00 mov 0x1b9f73(%rip),%rcx # 0x1b9f83 10: f7 d8 neg %eax 12: 64 89 01 mov %eax,%fs:(%rcx) 15: 48 rex.W [ 69.482957][ T371] RSP: 002b:00007fff17178f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 [ 69.482965][ T371] RAX: ffffffffffffffda RBX: 000056221f552b70 RCX: 00007f67441d1e5d [ 69.482969][ T371] RDX: 0000000000000000 RSI: 000056221cc3ca2a RDI: 0000000000000005 [ 69.482973][ T371] RBP: 0000000000040000 R08: 0000000000000000 R09: 00007fff17179060 [ 69.482976][ T371] R10: 0000000000000005 R11: 0000000000000246 R12: 000056221cc3ca2a Finger prints: print_report:kasan_report:__kasan_check_byte:krealloc_noprof:emit_its_trampoline