Hay
Date
June 8, 2025, 11:09 p.m.

Environment
e850-96
qemu-arm64
qemu-x86_64
rk3399-rock-pi-4b

[   34.351644] ==================================================================
[   34.351833] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x388/0x468
[   34.351966] Read of size 1 at addr ffff000802cca000 by task kunit_try_catch/260
[   34.355351] 
[   34.356838] CPU: 0 UID: 0 PID: 260 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   34.356896] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.356913] Hardware name: WinLink E850-96 board (DT)
[   34.356936] Call trace:
[   34.356951]  show_stack+0x20/0x38 (C)
[   34.356989]  dump_stack_lvl+0x8c/0xd0
[   34.357026]  print_report+0x118/0x608
[   34.357061]  kasan_report+0xdc/0x128
[   34.357096]  __asan_report_load1_noabort+0x20/0x30
[   34.357135]  kmem_cache_rcu_uaf+0x388/0x468
[   34.357169]  kunit_try_run_case+0x170/0x3f0
[   34.357209]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.357249]  kthread+0x328/0x630
[   34.357278]  ret_from_fork+0x10/0x20
[   34.357315] 
[   34.419675] Allocated by task 260:
[   34.423062]  kasan_save_stack+0x3c/0x68
[   34.426878]  kasan_save_track+0x20/0x40
[   34.430697]  kasan_save_alloc_info+0x40/0x58
[   34.434950]  __kasan_slab_alloc+0xa8/0xb0
[   34.438943]  kmem_cache_alloc_noprof+0x10c/0x398
[   34.443544]  kmem_cache_rcu_uaf+0x12c/0x468
[   34.447710]  kunit_try_run_case+0x170/0x3f0
[   34.451877]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.457346]  kthread+0x328/0x630
[   34.460558]  ret_from_fork+0x10/0x20
[   34.464118] 
[   34.465594] Freed by task 0:
[   34.468460]  kasan_save_stack+0x3c/0x68
[   34.472276]  kasan_save_track+0x20/0x40
[   34.476096]  kasan_save_free_info+0x4c/0x78
[   34.480262]  __kasan_slab_free+0x6c/0x98
[   34.484170]  slab_free_after_rcu_debug+0xd4/0x2f8
[   34.488856]  rcu_core+0x9f4/0x1e20
[   34.492241]  rcu_core_si+0x18/0x30
[   34.495627]  handle_softirqs+0x374/0xb28
[   34.499533]  __do_softirq+0x1c/0x28
[   34.503005] 
[   34.504482] Last potentially related work creation:
[   34.509343]  kasan_save_stack+0x3c/0x68
[   34.513161]  kasan_record_aux_stack+0xb4/0xc8
[   34.517501]  kmem_cache_free+0x120/0x468
[   34.521407]  kmem_cache_rcu_uaf+0x16c/0x468
[   34.525574]  kunit_try_run_case+0x170/0x3f0
[   34.529740]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.535209]  kthread+0x328/0x630
[   34.538421]  ret_from_fork+0x10/0x20
[   34.541980] 
[   34.543455] The buggy address belongs to the object at ffff000802cca000
[   34.543455]  which belongs to the cache test_cache of size 200
[   34.555872] The buggy address is located 0 bytes inside of
[   34.555872]  freed 200-byte region [ffff000802cca000, ffff000802cca0c8)
[   34.567934] 
[   34.569414] The buggy address belongs to the physical page:
[   34.574970] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882cca
[   34.582954] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   34.590593] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   34.597538] page_type: f5(slab)
[   34.600675] raw: 0bfffe0000000040 ffff00080179fa40 dead000000000122 0000000000000000
[   34.608392] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000
[   34.616120] head: 0bfffe0000000040 ffff00080179fa40 dead000000000122 0000000000000000
[   34.623930] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000
[   34.631743] head: 0bfffe0000000001 fffffdffe00b3281 00000000ffffffff 00000000ffffffff
[   34.639555] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   34.647360] page dumped because: kasan: bad access detected
[   34.652915] 
[   34.654391] Memory state around the buggy address:
[   34.659173]  ffff000802cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.666374]  ffff000802cc9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.673580] >ffff000802cca000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.680780]                    ^
[   34.683995]  ffff000802cca080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   34.691200]  ffff000802cca100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.698402] ==================================================================

[   27.285288] ==================================================================
[   27.285478] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x388/0x468
[   27.285636] Read of size 1 at addr fff00000c6427000 by task kunit_try_catch/213
[   27.285757] 
[   27.285848] CPU: 0 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   27.288255] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.288343] Hardware name: linux,dummy-virt (DT)
[   27.288435] Call trace:
[   27.288503]  show_stack+0x20/0x38 (C)
[   27.288743]  dump_stack_lvl+0x8c/0xd0
[   27.290546]  print_report+0x118/0x608
[   27.291225]  kasan_report+0xdc/0x128
[   27.292235]  __asan_report_load1_noabort+0x20/0x30
[   27.292372]  kmem_cache_rcu_uaf+0x388/0x468
[   27.293034]  kunit_try_run_case+0x170/0x3f0
[   27.293728]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.294212]  kthread+0x328/0x630
[   27.294884]  ret_from_fork+0x10/0x20
[   27.295045] 
[   27.295097] Allocated by task 213:
[   27.295714]  kasan_save_stack+0x3c/0x68
[   27.295991]  kasan_save_track+0x20/0x40
[   27.296156]  kasan_save_alloc_info+0x40/0x58
[   27.296535]  __kasan_slab_alloc+0xa8/0xb0
[   27.296637]  kmem_cache_alloc_noprof+0x10c/0x398
[   27.297370]  kmem_cache_rcu_uaf+0x12c/0x468
[   27.297479]  kunit_try_run_case+0x170/0x3f0
[   27.297535]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.297592]  kthread+0x328/0x630
[   27.297637]  ret_from_fork+0x10/0x20
[   27.297685] 
[   27.297708] Freed by task 0:
[   27.297744]  kasan_save_stack+0x3c/0x68
[   27.297796]  kasan_save_track+0x20/0x40
[   27.297846]  kasan_save_free_info+0x4c/0x78
[   27.297898]  __kasan_slab_free+0x6c/0x98
[   27.298462]  slab_free_after_rcu_debug+0xd4/0x2f8
[   27.298573]  rcu_core+0x9f4/0x1e20
[   27.298667]  rcu_core_si+0x18/0x30
[   27.299182]  handle_softirqs+0x374/0xb28
[   27.299871]  __do_softirq+0x1c/0x28
[   27.299991] 
[   27.300037] Last potentially related work creation:
[   27.300564]  kasan_save_stack+0x3c/0x68
[   27.300726]  kasan_record_aux_stack+0xb4/0xc8
[   27.301291]  kmem_cache_free+0x120/0x468
[   27.301394]  kmem_cache_rcu_uaf+0x16c/0x468
[   27.301492]  kunit_try_run_case+0x170/0x3f0
[   27.301584]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.301970]  kthread+0x328/0x630
[   27.302085]  ret_from_fork+0x10/0x20
[   27.302390] 
[   27.302483] The buggy address belongs to the object at fff00000c6427000
[   27.302483]  which belongs to the cache test_cache of size 200
[   27.302776] The buggy address is located 0 bytes inside of
[   27.302776]  freed 200-byte region [fff00000c6427000, fff00000c64270c8)
[   27.302952] 
[   27.303086] The buggy address belongs to the physical page:
[   27.303492] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106427
[   27.303709] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.304550] page_type: f5(slab)
[   27.304967] raw: 0bfffe0000000000 fff00000c569fa00 dead000000000122 0000000000000000
[   27.305134] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   27.305437] page dumped because: kasan: bad access detected
[   27.305516] 
[   27.305962] Memory state around the buggy address:
[   27.306057]  fff00000c6426f00: 00 00 00 00 00 00 00 00 00 00 00 00 fc fc fc fc
[   27.306165]  fff00000c6426f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.306273] >fff00000c6427000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   27.306530]                    ^
[   27.307014]  fff00000c6427080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   27.307251]  fff00000c6427100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.307694] ==================================================================

[   27.340191] ==================================================================
[   27.340419] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x388/0x468
[   27.340949] Read of size 1 at addr fff00000c7708000 by task kunit_try_catch/213
[   27.341931] 
[   27.342094] CPU: 0 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   27.342294] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.342700] Hardware name: linux,dummy-virt (DT)
[   27.343253] Call trace:
[   27.343735]  show_stack+0x20/0x38 (C)
[   27.344268]  dump_stack_lvl+0x8c/0xd0
[   27.344811]  print_report+0x118/0x608
[   27.344962]  kasan_report+0xdc/0x128
[   27.345140]  __asan_report_load1_noabort+0x20/0x30
[   27.345444]  kmem_cache_rcu_uaf+0x388/0x468
[   27.345771]  kunit_try_run_case+0x170/0x3f0
[   27.345951]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.346201]  kthread+0x328/0x630
[   27.346318]  ret_from_fork+0x10/0x20
[   27.346463] 
[   27.346604] Allocated by task 213:
[   27.346771]  kasan_save_stack+0x3c/0x68
[   27.346901]  kasan_save_track+0x20/0x40
[   27.347083]  kasan_save_alloc_info+0x40/0x58
[   27.347262]  __kasan_slab_alloc+0xa8/0xb0
[   27.347377]  kmem_cache_alloc_noprof+0x10c/0x398
[   27.347494]  kmem_cache_rcu_uaf+0x12c/0x468
[   27.347615]  kunit_try_run_case+0x170/0x3f0
[   27.347823]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.347995]  kthread+0x328/0x630
[   27.348088]  ret_from_fork+0x10/0x20
[   27.348178] 
[   27.348235] Freed by task 0:
[   27.348371]  kasan_save_stack+0x3c/0x68
[   27.348476]  kasan_save_track+0x20/0x40
[   27.348586]  kasan_save_free_info+0x4c/0x78
[   27.348768]  __kasan_slab_free+0x6c/0x98
[   27.348920]  slab_free_after_rcu_debug+0xd4/0x2f8
[   27.349090]  rcu_core+0x9f4/0x1e20
[   27.349159]  rcu_core_si+0x18/0x30
[   27.349246]  handle_softirqs+0x374/0xb28
[   27.349369]  __do_softirq+0x1c/0x28
[   27.349578] 
[   27.349634] Last potentially related work creation:
[   27.349708]  kasan_save_stack+0x3c/0x68
[   27.349976]  kasan_record_aux_stack+0xb4/0xc8
[   27.350113]  kmem_cache_free+0x120/0x468
[   27.350350]  kmem_cache_rcu_uaf+0x16c/0x468
[   27.350450]  kunit_try_run_case+0x170/0x3f0
[   27.350554]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.350713]  kthread+0x328/0x630
[   27.350978]  ret_from_fork+0x10/0x20
[   27.351109] 
[   27.351238] The buggy address belongs to the object at fff00000c7708000
[   27.351238]  which belongs to the cache test_cache of size 200
[   27.351443] The buggy address is located 0 bytes inside of
[   27.351443]  freed 200-byte region [fff00000c7708000, fff00000c77080c8)
[   27.351596] 
[   27.351717] The buggy address belongs to the physical page:
[   27.351815] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107708
[   27.351970] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.352110] page_type: f5(slab)
[   27.352757] raw: 0bfffe0000000000 fff00000c770b000 dead000000000122 0000000000000000
[   27.352931] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   27.353046] page dumped because: kasan: bad access detected
[   27.353547] 
[   27.354064] Memory state around the buggy address:
[   27.354379]  fff00000c7707f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   27.354769]  fff00000c7707f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   27.354900] >fff00000c7708000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   27.355011]                    ^
[   27.355094]  fff00000c7708080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   27.355203]  fff00000c7708100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.355366] ==================================================================

[   20.357110] ==================================================================
[   20.358785] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x3e3/0x510
[   20.359898] Read of size 1 at addr ffff888101b3b000 by task kunit_try_catch/231
[   20.360833] 
[   20.361534] CPU: 1 UID: 0 PID: 231 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   20.361691] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.361729] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.361793] Call Trace:
[   20.361848]  <TASK>
[   20.361903]  dump_stack_lvl+0x73/0xb0
[   20.361986]  print_report+0xd1/0x650
[   20.362024]  ? __virt_addr_valid+0x1db/0x2d0
[   20.362060]  ? kmem_cache_rcu_uaf+0x3e3/0x510
[   20.362098]  ? kasan_complete_mode_report_info+0x64/0x200
[   20.362129]  ? kmem_cache_rcu_uaf+0x3e3/0x510
[   20.362163]  kasan_report+0x141/0x180
[   20.362193]  ? kmem_cache_rcu_uaf+0x3e3/0x510
[   20.362245]  __asan_report_load1_noabort+0x18/0x20
[   20.362302]  kmem_cache_rcu_uaf+0x3e3/0x510
[   20.362338]  ? __pfx_kmem_cache_rcu_uaf+0x10/0x10
[   20.362370]  ? finish_task_switch.isra.0+0x153/0x700
[   20.362403]  ? __switch_to+0x47/0xf50
[   20.362442]  ? __pfx_read_tsc+0x10/0x10
[   20.362471]  ? ktime_get_ts64+0x86/0x230
[   20.362534]  kunit_try_run_case+0x1a5/0x480
[   20.362749]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.362787]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   20.362824]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.362859]  ? __kthread_parkme+0x82/0x180
[   20.362888]  ? preempt_count_sub+0x50/0x80
[   20.362918]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.362955]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.362988]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.363022]  kthread+0x337/0x6f0
[   20.363049]  ? trace_preempt_on+0x20/0xc0
[   20.363082]  ? __pfx_kthread+0x10/0x10
[   20.363110]  ? _raw_spin_unlock_irq+0x47/0x80
[   20.363140]  ? calculate_sigpending+0x7b/0xa0
[   20.363175]  ? __pfx_kthread+0x10/0x10
[   20.363204]  ret_from_fork+0x116/0x1d0
[   20.363238]  ? __pfx_kthread+0x10/0x10
[   20.363306]  ret_from_fork_asm+0x1a/0x30
[   20.363353]  </TASK>
[   20.363369] 
[   20.384338] Allocated by task 231:
[   20.385051]  kasan_save_stack+0x45/0x70
[   20.385451]  kasan_save_track+0x18/0x40
[   20.385811]  kasan_save_alloc_info+0x3b/0x50
[   20.386148]  __kasan_slab_alloc+0x91/0xa0
[   20.386578]  kmem_cache_alloc_noprof+0x123/0x3f0
[   20.387094]  kmem_cache_rcu_uaf+0x155/0x510
[   20.387780]  kunit_try_run_case+0x1a5/0x480
[   20.388706]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.389043]  kthread+0x337/0x6f0
[   20.389287]  ret_from_fork+0x116/0x1d0
[   20.390336]  ret_from_fork_asm+0x1a/0x30
[   20.391348] 
[   20.391862] Freed by task 0:
[   20.392634]  kasan_save_stack+0x45/0x70
[   20.393643]  kasan_save_track+0x18/0x40
[   20.394676]  kasan_save_free_info+0x3f/0x60
[   20.395062]  __kasan_slab_free+0x56/0x70
[   20.395808]  slab_free_after_rcu_debug+0xe4/0x310
[   20.396374]  rcu_core+0x66f/0x1c40
[   20.397074]  rcu_core_si+0x12/0x20
[   20.397471]  handle_softirqs+0x209/0x730
[   20.398156]  __irq_exit_rcu+0xc9/0x110
[   20.399117]  irq_exit_rcu+0x12/0x20
[   20.400027]  sysvec_apic_timer_interrupt+0x81/0x90
[   20.400528]  asm_sysvec_apic_timer_interrupt+0x1f/0x30
[   20.400945] 
[   20.401182] Last potentially related work creation:
[   20.401644]  kasan_save_stack+0x45/0x70
[   20.402416]  kasan_record_aux_stack+0xb2/0xc0
[   20.402989]  kmem_cache_free+0x131/0x420
[   20.403463]  kmem_cache_rcu_uaf+0x194/0x510
[   20.404717]  kunit_try_run_case+0x1a5/0x480
[   20.405107]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.405948]  kthread+0x337/0x6f0
[   20.406345]  ret_from_fork+0x116/0x1d0
[   20.406904]  ret_from_fork_asm+0x1a/0x30
[   20.407329] 
[   20.408089] The buggy address belongs to the object at ffff888101b3b000
[   20.408089]  which belongs to the cache test_cache of size 200
[   20.409458] The buggy address is located 0 bytes inside of
[   20.409458]  freed 200-byte region [ffff888101b3b000, ffff888101b3b0c8)
[   20.411022] 
[   20.411415] The buggy address belongs to the physical page:
[   20.413284] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3b
[   20.413896] flags: 0x200000000000000(node=0|zone=2)
[   20.414406] page_type: f5(slab)
[   20.414771] raw: 0200000000000000 ffff8881010fd640 dead000000000122 0000000000000000
[   20.415436] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   20.417093] page dumped because: kasan: bad access detected
[   20.417752] 
[   20.417962] Memory state around the buggy address:
[   20.418435]  ffff888101b3af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.418984]  ffff888101b3af80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.420022] >ffff888101b3b000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.420686]                    ^
[   20.421146]  ffff888101b3b080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   20.422588]  ffff888101b3b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.423344] ==================================================================

[   19.229080] ==================================================================
[   19.230076] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x3e3/0x510
[   19.231970] Read of size 1 at addr ffff8881038e4000 by task kunit_try_catch/231
[   19.233419] 
[   19.234024] CPU: 1 UID: 0 PID: 231 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   19.234167] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.234204] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.234274] Call Trace:
[   19.234315]  <TASK>
[   19.234365]  dump_stack_lvl+0x73/0xb0
[   19.234460]  print_report+0xd1/0x650
[   19.234524]  ? __virt_addr_valid+0x1db/0x2d0
[   19.234584]  ? kmem_cache_rcu_uaf+0x3e3/0x510
[   19.234637]  ? kasan_complete_mode_report_info+0x64/0x200
[   19.234772]  ? kmem_cache_rcu_uaf+0x3e3/0x510
[   19.234856]  kasan_report+0x141/0x180
[   19.234967]  ? kmem_cache_rcu_uaf+0x3e3/0x510
[   19.235174]  __asan_report_load1_noabort+0x18/0x20
[   19.235262]  kmem_cache_rcu_uaf+0x3e3/0x510
[   19.235344]  ? __pfx_kmem_cache_rcu_uaf+0x10/0x10
[   19.235419]  ? finish_task_switch.isra.0+0x153/0x700
[   19.235488]  ? __switch_to+0x47/0xf50
[   19.235665]  ? __pfx_read_tsc+0x10/0x10
[   19.235744]  ? ktime_get_ts64+0x86/0x230
[   19.235869]  kunit_try_run_case+0x1a5/0x480
[   19.235946]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.236008]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.236045]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.236080]  ? __kthread_parkme+0x82/0x180
[   19.236153]  ? preempt_count_sub+0x50/0x80
[   19.236191]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.236228]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.236263]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.236299]  kthread+0x337/0x6f0
[   19.236327]  ? trace_preempt_on+0x20/0xc0
[   19.236362]  ? __pfx_kthread+0x10/0x10
[   19.236390]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.236421]  ? calculate_sigpending+0x7b/0xa0
[   19.236455]  ? __pfx_kthread+0x10/0x10
[   19.236485]  ret_from_fork+0x116/0x1d0
[   19.236518]  ? __pfx_kthread+0x10/0x10
[   19.236609]  ret_from_fork_asm+0x1a/0x30
[   19.236676]  </TASK>
[   19.236693] 
[   19.258980] Allocated by task 231:
[   19.259349]  kasan_save_stack+0x45/0x70
[   19.259783]  kasan_save_track+0x18/0x40
[   19.260298]  kasan_save_alloc_info+0x3b/0x50
[   19.260720]  __kasan_slab_alloc+0x91/0xa0
[   19.261252]  kmem_cache_alloc_noprof+0x123/0x3f0
[   19.261717]  kmem_cache_rcu_uaf+0x155/0x510
[   19.262082]  kunit_try_run_case+0x1a5/0x480
[   19.263022]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.263491]  kthread+0x337/0x6f0
[   19.264416]  ret_from_fork+0x116/0x1d0
[   19.265205]  ret_from_fork_asm+0x1a/0x30
[   19.265897] 
[   19.266242] Freed by task 0:
[   19.266970]  kasan_save_stack+0x45/0x70
[   19.267918]  kasan_save_track+0x18/0x40
[   19.268448]  kasan_save_free_info+0x3f/0x60
[   19.269182]  __kasan_slab_free+0x56/0x70
[   19.269506]  slab_free_after_rcu_debug+0xe4/0x310
[   19.270428]  rcu_core+0x66f/0x1c40
[   19.271040]  rcu_core_si+0x12/0x20
[   19.272119]  handle_softirqs+0x209/0x730
[   19.272512]  __irq_exit_rcu+0xc9/0x110
[   19.273591]  irq_exit_rcu+0x12/0x20
[   19.274257]  sysvec_apic_timer_interrupt+0x81/0x90
[   19.274789]  asm_sysvec_apic_timer_interrupt+0x1f/0x30
[   19.275250] 
[   19.275487] Last potentially related work creation:
[   19.275870]  kasan_save_stack+0x45/0x70
[   19.276368]  kasan_record_aux_stack+0xb2/0xc0
[   19.276784]  kmem_cache_free+0x131/0x420
[   19.277160]  kmem_cache_rcu_uaf+0x194/0x510
[   19.277622]  kunit_try_run_case+0x1a5/0x480
[   19.278426]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.278862]  kthread+0x337/0x6f0
[   19.279573]  ret_from_fork+0x116/0x1d0
[   19.279932]  ret_from_fork_asm+0x1a/0x30
[   19.280632] 
[   19.280867] The buggy address belongs to the object at ffff8881038e4000
[   19.280867]  which belongs to the cache test_cache of size 200
[   19.282752] The buggy address is located 0 bytes inside of
[   19.282752]  freed 200-byte region [ffff8881038e4000, ffff8881038e40c8)
[   19.284784] 
[   19.285333] The buggy address belongs to the physical page:
[   19.286401] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e4
[   19.287457] flags: 0x200000000000000(node=0|zone=2)
[   19.287945] page_type: f5(slab)
[   19.288943] raw: 0200000000000000 ffff88810111b280 dead000000000122 0000000000000000
[   19.289715] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   19.290777] page dumped because: kasan: bad access detected
[   19.291392] 
[   19.291574] Memory state around the buggy address:
[   19.291970]  ffff8881038e3f00: 00 00 00 00 00 00 00 00 00 00 00 00 fc fc fc fc
[   19.292961]  ffff8881038e3f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.293998] >ffff8881038e4000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.294540]                    ^
[   19.294816]  ffff8881038e4080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   19.295331]  ffff8881038e4100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.295836] ==================================================================

[   21.380943] ==================================================================
[   21.382067] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x388/0x468
[   21.382752] Read of size 1 at addr ffff00000f560000 by task kunit_try_catch/266
[   21.383431] 
[   21.383596] CPU: 3 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   21.383645] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.383659] Hardware name: Radxa ROCK Pi 4B (DT)
[   21.383677] Call trace:
[   21.383688]  show_stack+0x20/0x38 (C)
[   21.383722]  dump_stack_lvl+0x8c/0xd0
[   21.383757]  print_report+0x118/0x608
[   21.383792]  kasan_report+0xdc/0x128
[   21.383823]  __asan_report_load1_noabort+0x20/0x30
[   21.383861]  kmem_cache_rcu_uaf+0x388/0x468
[   21.383892]  kunit_try_run_case+0x170/0x3f0
[   21.383926]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.383963]  kthread+0x328/0x630
[   21.383990]  ret_from_fork+0x10/0x20
[   21.384023] 
[   21.389602] Allocated by task 266:
[   21.389930]  kasan_save_stack+0x3c/0x68
[   21.390307]  kasan_save_track+0x20/0x40
[   21.390682]  kasan_save_alloc_info+0x40/0x58
[   21.391099]  __kasan_slab_alloc+0xa8/0xb0
[   21.391490]  kmem_cache_alloc_noprof+0x10c/0x398
[   21.391936]  kmem_cache_rcu_uaf+0x12c/0x468
[   21.392341]  kunit_try_run_case+0x170/0x3f0
[   21.392746]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.393270]  kthread+0x328/0x630
[   21.393585]  ret_from_fork+0x10/0x20
[   21.393935] 
[   21.394088] Freed by task 0:
[   21.394366]  kasan_save_stack+0x3c/0x68
[   21.394741]  kasan_save_track+0x20/0x40
[   21.395116]  kasan_save_free_info+0x4c/0x78
[   21.395524]  __kasan_slab_free+0x6c/0x98
[   21.395907]  slab_free_after_rcu_debug+0xd4/0x2f8
[   21.396358]  rcu_core+0x9f4/0x1e20
[   21.396694]  rcu_core_si+0x18/0x30
[   21.397029]  handle_softirqs+0x374/0xb28
[   21.397412]  __do_softirq+0x1c/0x28
[   21.397752] 
[   21.397905] Last potentially related work creation:
[   21.398356]  kasan_save_stack+0x3c/0x68
[   21.398732]  kasan_record_aux_stack+0xb4/0xc8
[   21.399156]  kmem_cache_free+0x120/0x468
[   21.399537]  kmem_cache_rcu_uaf+0x16c/0x468
[   21.399941]  kunit_try_run_case+0x170/0x3f0
[   21.400347]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.400870]  kthread+0x328/0x630
[   21.401187]  ret_from_fork+0x10/0x20
[   21.401536] 
[   21.401689] The buggy address belongs to the object at ffff00000f560000
[   21.401689]  which belongs to the cache test_cache of size 200
[   21.402814] The buggy address is located 0 bytes inside of
[   21.402814]  freed 200-byte region [ffff00000f560000, ffff00000f5600c8)
[   21.403910] 
[   21.404065] The buggy address belongs to the physical page:
[   21.404580] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xf560
[   21.405305] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.406012] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff)
[   21.406663] page_type: f5(slab)
[   21.406976] raw: 03fffe0000000040 ffff00000daa4000 dead000000000122 0000000000000000
[   21.407690] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000
[   21.408405] head: 03fffe0000000040 ffff00000daa4000 dead000000000122 0000000000000000
[   21.409128] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000
[   21.409852] head: 03fffe0000000001 fffffdffc03d5801 00000000ffffffff 00000000ffffffff
[   21.410574] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   21.411288] page dumped because: kasan: bad access detected
[   21.411803] 
[   21.411955] Memory state around the buggy address:
[   21.412404]  ffff00000f55ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.413069]  ffff00000f55ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.413734] >ffff00000f560000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.414395]                    ^
[   21.414704]  ffff00000f560080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   21.415370]  ffff00000f560100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.416031] ==================================================================