==================================================================
BUG: KASAN: use-after-free in advance_sched+0x1b0/0x858 net/sched/sch_taprio.c:717
Read of size 8 at addr ffff0000d838a210 by task udevd/3842
CPU: 0 PID: 3842 Comm: udevd Not tainted 6.1.82-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/29/2024
Call trace:
dump_backtrace+0x1c8/0x1f4 arch/arm64/kernel/stacktrace.c:158
show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:165
__dump_stack lib/dump_stack.c:88 [inline]
dump_stack_lvl+0x108/0x170 lib/dump_stack.c:106
print_address_description mm/kasan/report.c:284 [inline]
print_report+0x174/0x4c0 mm/kasan/report.c:395
kasan_report+0xd4/0x130 mm/kasan/report.c:495
__asan_report_load8_noabort+0x2c/0x38 mm/kasan/report_generic.c:351
advance_sched+0x1b0/0x858 net/sched/sch_taprio.c:717
__run_hrtimer kernel/time/hrtimer.c:1686 [inline]
__hrtimer_run_queues+0x4b0/0xdc0 kernel/time/hrtimer.c:1750
hrtimer_interrupt+0x2c0/0xb64 kernel/time/hrtimer.c:1812
timer_handler drivers/clocksource/arm_arch_timer.c:655 [inline]
arch_timer_handler_virt+0x74/0x88 drivers/clocksource/arm_arch_timer.c:666
handle_percpu_devid_irq+0x174/0x354 kernel/irq/chip.c:930
generic_handle_irq_desc include/linux/irqdesc.h:158 [inline]
handle_irq_desc kernel/irq/irqdesc.c:651 [inline]
generic_handle_domain_irq+0x7c/0xc4 kernel/irq/irqdesc.c:707
__gic_handle_irq drivers/irqchip/irq-gic-v3.c:737 [inline]
__gic_handle_irq_from_irqson drivers/irqchip/irq-gic-v3.c:788 [inline]
gic_handle_irq+0x70/0x1e4 drivers/irqchip/irq-gic-v3.c:832
call_on_irq_stack+0x24/0x4c arch/arm64/kernel/entry.S:893
do_interrupt_handler+0xd4/0x138 arch/arm64/kernel/entry-common.c:274
__el1_irq arch/arm64/kernel/entry-common.c:471 [inline]
el1_interrupt+0x34/0x68 arch/arm64/kernel/entry-common.c:486
el1h_64_irq_handler+0x18/0x24 arch/arm64/kernel/entry-common.c:491
el1h_64_irq+0x64/0x68 arch/arm64/kernel/entry.S:581
preempt_schedule_common+0xf4/0x1e8 kernel/sched/core.c:6727
preempt_schedule+0x64/0x84 kernel/sched/core.c:6751
__raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:152 [inline]
_raw_spin_unlock_irqrestore+0xa8/0xac kernel/locking/spinlock.c:194
spin_unlock_irqrestore include/linux/spinlock.h:406 [inline]
__wake_up_common_lock kernel/sched/wait.c:140 [inline]
__wake_up_sync_key+0x124/0x1ac kernel/sched/wait.c:208
sock_def_readable+0x150/0x278 net/core/sock.c:3304
__netlink_sendskb net/netlink/af_netlink.c:1273 [inline]
netlink_sendskb+0x98/0x154 net/netlink/af_netlink.c:1279
netlink_unicast+0x320/0x898 net/netlink/af_netlink.c:1367
netlink_sendmsg+0x834/0xb18 net/netlink/af_netlink.c:1874
sock_sendmsg_nosec net/socket.c:718 [inline]
__sock_sendmsg net/socket.c:730 [inline]
____sys_sendmsg+0x55c/0x848 net/socket.c:2514
___sys_sendmsg net/socket.c:2568 [inline]
__sys_sendmsg+0x26c/0x33c net/socket.c:2597
__do_sys_sendmsg net/socket.c:2606 [inline]
__se_sys_sendmsg net/socket.c:2604 [inline]
__arm64_sys_sendmsg+0x80/0x94 net/socket.c:2604
__invoke_syscall arch/arm64/kernel/syscall.c:38 [inline]
invoke_syscall+0x98/0x2c0 arch/arm64/kernel/syscall.c:52
el0_svc_common+0x138/0x258 arch/arm64/kernel/syscall.c:142
do_el0_svc+0x64/0x218 arch/arm64/kernel/syscall.c:206
el0_svc+0x58/0x168 arch/arm64/kernel/entry-common.c:637
el0t_64_sync_handler+0x84/0xf0 arch/arm64/kernel/entry-common.c:655
el0t_64_sync+0x18c/0x190 arch/arm64/kernel/entry.S:585
Allocated by task 4665:
kasan_save_stack mm/kasan/common.c:45 [inline]
kasan_set_track+0x4c/0x80 mm/kasan/common.c:52
kasan_save_alloc_info+0x24/0x30 mm/kasan/generic.c:505
____kasan_kmalloc mm/kasan/common.c:374 [inline]
__kasan_kmalloc+0xac/0xc4 mm/kasan/common.c:383
kasan_kmalloc include/linux/kasan.h:211 [inline]
kmalloc_trace+0x7c/0x94 mm/slab_common.c:1050
kmalloc include/linux/slab.h:556 [inline]
kzalloc include/linux/slab.h:692 [inline]
parse_sched_list net/sched/sch_taprio.c:863 [inline]
parse_taprio_schedule net/sched/sch_taprio.c:905 [inline]
taprio_change+0x2034/0x3834 net/sched/sch_taprio.c:1599
taprio_init+0x4a8/0x530 net/sched/sch_taprio.c:1821
qdisc_create+0x70c/0xe64 net/sched/sch_api.c:1314
tc_modify_qdisc+0xa14/0x186c
rtnetlink_rcv_msg+0x72c/0xd94 net/core/rtnetlink.c:6121
netlink_rcv_skb+0x20c/0x3b8 net/netlink/af_netlink.c:2508
rtnetlink_rcv+0x28/0x38 net/core/rtnetlink.c:6139
netlink_unicast_kernel net/netlink/af_netlink.c:1326 [inline]
netlink_unicast+0x65c/0x898 net/netlink/af_netlink.c:1352
netlink_sendmsg+0x834/0xb18 net/netlink/af_netlink.c:1874
sock_sendmsg_nosec net/socket.c:718 [inline]
__sock_sendmsg net/socket.c:730 [inline]
____sys_sendmsg+0x55c/0x848 net/socket.c:2514
___sys_sendmsg net/socket.c:2568 [inline]
__sys_sendmmsg+0x318/0x7d8 net/socket.c:2654
__do_sys_sendmmsg net/socket.c:2683 [inline]
__se_sys_sendmmsg net/socket.c:2680 [inline]
__arm64_sys_sendmmsg+0xa0/0xbc net/socket.c:2680
__invoke_syscall arch/arm64/kernel/syscall.c:38 [inline]
invoke_syscall+0x98/0x2c0 arch/arm64/kernel/syscall.c:52
el0_svc_common+0x138/0x258 arch/arm64/kernel/syscall.c:142
do_el0_svc+0x64/0x218 arch/arm64/kernel/syscall.c:206
el0_svc+0x58/0x168 arch/arm64/kernel/entry-common.c:637
el0t_64_sync_handler+0x84/0xf0 arch/arm64/kernel/entry-common.c:655
el0t_64_sync+0x18c/0x190 arch/arm64/kernel/entry.S:585
Freed by task 15:
kasan_save_stack mm/kasan/common.c:45 [inline]
kasan_set_track+0x4c/0x80 mm/kasan/common.c:52
kasan_save_free_info+0x38/0x5c mm/kasan/generic.c:516
____kasan_slab_free+0x144/0x1c0 mm/kasan/common.c:236
__kasan_slab_free+0x18/0x28 mm/kasan/common.c:244
kasan_slab_free include/linux/kasan.h:177 [inline]
slab_free_hook mm/slub.c:1724 [inline]
slab_free_freelist_hook mm/slub.c:1750 [inline]
slab_free mm/slub.c:3661 [inline]
__kmem_cache_free+0x2c0/0x4b4 mm/slub.c:3674
kfree+0xcc/0x1b8 mm/slab_common.c:1007
taprio_free_sched_cb+0x12c/0x174 net/sched/sch_taprio.c:124
rcu_do_batch kernel/rcu/tree.c:2296 [inline]
rcu_core+0x878/0x1c10 kernel/rcu/tree.c:2556
rcu_core_si+0x10/0x1c kernel/rcu/tree.c:2573
__do_softirq+0x314/0xe38 kernel/softirq.c:571
The buggy address belongs to the object at ffff0000d838a200
which belongs to the cache kmalloc-128 of size 128
The buggy address is located 16 bytes inside of
128-byte region [ffff0000d838a200, ffff0000d838a280)
The buggy address belongs to the physical page:
page:00000000e1acae3a refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x11838a
flags: 0x5ffc00000000200(slab|node=0|zone=2|lastcpupid=0x7ff)
raw: 05ffc00000000200 fffffc00032a16c0 dead000000000003 ffff0000c0002300
raw: 0000000000000000 0000000000100010 00000001ffffffff 0000000000000000
page dumped because: kasan: bad access detected
Memory state around the buggy address:
ffff0000d838a100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
ffff0000d838a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
>ffff0000d838a200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
^
ffff0000d838a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
ffff0000d838a300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
==================================================================
BUG: sleeping function called from invalid context at fs/file_table.c:304
in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 4250, name: syz-executor.0
preempt_count: 101, expected: 0
RCU nest depth: 0, expected: 0
INFO: lockdep is turned off.
Preemption disabled at:
[<ffff80000803315c>] local_bh_disable+0x28/0x34 include/linux/bottom_half.h:20
CPU: 0 PID: 4250 Comm: syz-executor.0 Tainted: G B W 6.1.82-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/29/2024
Call trace:
dump_backtrace+0x1c8/0x1f4 arch/arm64/kernel/stacktrace.c:158
show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:165
__dump_stack lib/dump_stack.c:88 [inline]
dump_stack_lvl+0x108/0x170 lib/dump_stack.c:106
dump_stack+0x1c/0x58 lib/dump_stack.c:113
__might_resched+0x37c/0x4d8 kernel/sched/core.c:9942
__might_sleep+0x90/0xe4 kernel/sched/core.c:9871
__fput+0xd4/0x7bc fs/file_table.c:304
____fput+0x20/0x30 fs/file_table.c:348
rcu_do_batch kernel/rcu/tree.c:2296 [inline]
rcu_core+0x878/0x1c10 kernel/rcu/tree.c:2556
rcu_core_si+0x10/0x1c kernel/rcu/tree.c:2573
__do_softirq+0x314/0xe38 kernel/softirq.c:571
____do_softirq+0x14/0x20 arch/arm64/kernel/irq.c:80
call_on_irq_stack+0x24/0x4c arch/arm64/kernel/entry.S:893
do_softirq_own_stack+0x20/0x2c arch/arm64/kernel/irq.c:85
do_softirq+0xf8/0x1ac kernel/softirq.c:472
__local_bh_enable_ip+0x298/0x470 kernel/softirq.c:396
local_bh_enable+0x28/0x34 include/linux/bottom_half.h:33
put_cpu_fpsimd_context arch/arm64/kernel/fpsimd.c:274 [inline]
fpsimd_restore_current_state+0x110/0x26c arch/arm64/kernel/fpsimd.c:1730
do_notify_resume+0x1948/0x3474 arch/arm64/kernel/signal.c:1135
prepare_exit_to_user_mode arch/arm64/kernel/entry-common.c:137 [inline]
exit_to_user_mode arch/arm64/kernel/entry-common.c:142 [inline]
el0_svc+0x9c/0x168 arch/arm64/kernel/entry-common.c:638
el0t_64_sync_handler+0x84/0xf0 arch/arm64/kernel/entry-common.c:655
el0t_64_sync+0x18c/0x190 arch/arm64/kernel/entry.S:585
------------[ cut here ]------------
kernel BUG at include/linux/fs.h:3074!
Internal error: Oops - BUG: 00000000f2000800 [#1] PREEMPT SMP
Modules linked in:
CPU: 0 PID: 4250 Comm: syz-executor.0 Tainted: G B W 6.1.82-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/29/2024
pstate: 00400005 (nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : i_readcount_dec include/linux/fs.h:3074 [inline]
pc : put_file_access fs/internal.h:108 [inline]
pc : __fput+0x770/0x7bc fs/file_table.c:327
lr : i_readcount_dec include/linux/fs.h:3074 [inline]
lr : put_file_access fs/internal.h:108 [inline]
lr : __fput+0x770/0x7bc fs/file_table.c:327
sp : ffff800008007cc0
x29: ffff800008007d00
x28: 1fffe0001a03b5ef
x27: 1fffe0001a03b5e5
x26: ffff0000c085b520
x25: 00000000000a801d
x24: 00000000000a801d
x23: ffff000143131654
x22: dfff800000000000
x21: 0000000000000000
x20: ffff0000d01daf7c
x19: ffff0000d01daf00
x18: 1fffe00018c6e087
x17: 0000000000000000
x16: ffff8000084fb154
x15: 0000000000000000
x14: 0000000000000000
x13: 205d304320202020
x12: 0000000000000001
x11: 0000000000ff0100
x10: 0000000000000000
x9 : ffff800008a4b0b4
x8 : ffff0000c6370000
x7 : 205b5d3835343437
x6 : ffff800008348ef8
x5 : 0000000000000000
x4 : 0000000000000001
x3 : ffff800008a4ad80
x2 : 0000000000000000 x1 : 0000000000000000 x0 : 0000000000000000
Call trace:
i_readcount_dec include/linux/fs.h:3074 [inline]
put_file_access fs/internal.h:108 [inline]
__fput+0x770/0x7bc fs/file_table.c:327
____fput+0x20/0x30 fs/file_table.c:348
rcu_do_batch kernel/rcu/tree.c:2296 [inline]
rcu_core+0x878/0x1c10 kernel/rcu/tree.c:2556
rcu_core_si+0x10/0x1c kernel/rcu/tree.c:2573
__do_softirq+0x314/0xe38 kernel/softirq.c:571
____do_softirq+0x14/0x20 arch/arm64/kernel/irq.c:80
call_on_irq_stack+0x24/0x4c arch/arm64/kernel/entry.S:893
do_softirq_own_stack+0x20/0x2c arch/arm64/kernel/irq.c:85
do_softirq+0xf8/0x1ac kernel/softirq.c:472
__local_bh_enable_ip+0x298/0x470 kernel/softirq.c:396
local_bh_enable+0x28/0x34 include/linux/bottom_half.h:33
put_cpu_fpsimd_context arch/arm64/kernel/fpsimd.c:274 [inline]
fpsimd_restore_current_state+0x110/0x26c arch/arm64/kernel/fpsimd.c:1730
do_notify_resume+0x1948/0x3474 arch/arm64/kernel/signal.c:1135
prepare_exit_to_user_mode arch/arm64/kernel/entry-common.c:137 [inline]
exit_to_user_mode arch/arm64/kernel/entry-common.c:142 [inline]
el0_svc+0x9c/0x168 arch/arm64/kernel/entry-common.c:638
el0t_64_sync_handler+0x84/0xf0 arch/arm64/kernel/entry-common.c:655
el0t_64_sync+0x18c/0x190 arch/arm64/kernel/entry.S:585
Code: aa1c03e0 97fcac50 17fffe98 97eac029 (d4210000)
---[ end trace 0000000000000000 ]---