Hay
Date
June 8, 2025, 11:09 p.m.

Environment
e850-96
qemu-arm64
qemu-x86_64
rk3399-rock-pi-4b

[   40.139983] ==================================================================
[   40.163706] BUG: KASAN: slab-use-after-free in strcmp+0xc0/0xc8
[   40.169606] Read of size 1 at addr ffff00080499db10 by task kunit_try_catch/306
[   40.176896] 
[   40.178384] CPU: 1 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   40.178440] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.178459] Hardware name: WinLink E850-96 board (DT)
[   40.178480] Call trace:
[   40.178496]  show_stack+0x20/0x38 (C)
[   40.178532]  dump_stack_lvl+0x8c/0xd0
[   40.178568]  print_report+0x118/0x608
[   40.178607]  kasan_report+0xdc/0x128
[   40.178641]  __asan_report_load1_noabort+0x20/0x30
[   40.178683]  strcmp+0xc0/0xc8
[   40.178715]  kasan_strings+0x340/0xb00
[   40.178748]  kunit_try_run_case+0x170/0x3f0
[   40.178786]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.178826]  kthread+0x328/0x630
[   40.178857]  ret_from_fork+0x10/0x20
[   40.178894] 
[   40.243735] Allocated by task 306:
[   40.247124]  kasan_save_stack+0x3c/0x68
[   40.250940]  kasan_save_track+0x20/0x40
[   40.254759]  kasan_save_alloc_info+0x40/0x58
[   40.259012]  __kasan_kmalloc+0xd4/0xd8
[   40.262745]  __kmalloc_cache_noprof+0x16c/0x3c0
[   40.267259]  kasan_strings+0xc8/0xb00
[   40.270905]  kunit_try_run_case+0x170/0x3f0
[   40.275071]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.280541]  kthread+0x328/0x630
[   40.283751]  ret_from_fork+0x10/0x20
[   40.287310] 
[   40.288787] Freed by task 306:
[   40.291827]  kasan_save_stack+0x3c/0x68
[   40.295644]  kasan_save_track+0x20/0x40
[   40.299462]  kasan_save_free_info+0x4c/0x78
[   40.303630]  __kasan_slab_free+0x6c/0x98
[   40.307536]  kfree+0x214/0x3c8
[   40.310574]  kasan_strings+0x24c/0xb00
[   40.314306]  kunit_try_run_case+0x170/0x3f0
[   40.318473]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.323942]  kthread+0x328/0x630
[   40.327154]  ret_from_fork+0x10/0x20
[   40.330712] 
[   40.332190] The buggy address belongs to the object at ffff00080499db00
[   40.332190]  which belongs to the cache kmalloc-32 of size 32
[   40.344517] The buggy address is located 16 bytes inside of
[   40.344517]  freed 32-byte region [ffff00080499db00, ffff00080499db20)
[   40.356580] 
[   40.358058] The buggy address belongs to the physical page:
[   40.363617] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88499d
[   40.371600] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   40.378111] page_type: f5(slab)
[   40.381247] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000
[   40.388965] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   40.396686] page dumped because: kasan: bad access detected
[   40.402239] 
[   40.403715] Memory state around the buggy address:
[   40.408498]  ffff00080499da00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   40.415698]  ffff00080499da80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   40.422902] >ffff00080499db00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   40.430103]                          ^
[   40.433840]  ffff00080499db80: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   40.441045]  ffff00080499dc00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   40.448247] ==================================================================

[   28.952695] ==================================================================
[   28.952817] BUG: KASAN: slab-use-after-free in strcmp+0xc0/0xc8
[   28.956082] Read of size 1 at addr fff00000c6437e10 by task kunit_try_catch/259
[   28.956234] 
[   28.956336] CPU: 0 UID: 0 PID: 259 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   28.956578] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.956661] Hardware name: linux,dummy-virt (DT)
[   28.956758] Call trace:
[   28.956826]  show_stack+0x20/0x38 (C)
[   28.956988]  dump_stack_lvl+0x8c/0xd0
[   28.957140]  print_report+0x118/0x608
[   28.957357]  kasan_report+0xdc/0x128
[   28.959180]  __asan_report_load1_noabort+0x20/0x30
[   28.959340]  strcmp+0xc0/0xc8
[   28.959471]  kasan_strings+0x340/0xb00
[   28.959614]  kunit_try_run_case+0x170/0x3f0
[   28.959845]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.960023]  kthread+0x328/0x630
[   28.960763]  ret_from_fork+0x10/0x20
[   28.960969] 
[   28.961587] Allocated by task 259:
[   28.961728]  kasan_save_stack+0x3c/0x68
[   28.962156]  kasan_save_track+0x20/0x40
[   28.962371]  kasan_save_alloc_info+0x40/0x58
[   28.962568]  __kasan_kmalloc+0xd4/0xd8
[   28.962684]  __kmalloc_cache_noprof+0x16c/0x3c0
[   28.962850]  kasan_strings+0xc8/0xb00
[   28.963012]  kunit_try_run_case+0x170/0x3f0
[   28.963183]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.963317]  kthread+0x328/0x630
[   28.964034]  ret_from_fork+0x10/0x20
[   28.964154] 
[   28.964211] Freed by task 259:
[   28.964290]  kasan_save_stack+0x3c/0x68
[   28.964489]  kasan_save_track+0x20/0x40
[   28.965175]  kasan_save_free_info+0x4c/0x78
[   28.965587]  __kasan_slab_free+0x6c/0x98
[   28.965727]  kfree+0x214/0x3c8
[   28.965825]  kasan_strings+0x24c/0xb00
[   28.966116]  kunit_try_run_case+0x170/0x3f0
[   28.966339]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.967012]  kthread+0x328/0x630
[   28.967120]  ret_from_fork+0x10/0x20
[   28.967236] 
[   28.967784] The buggy address belongs to the object at fff00000c6437e00
[   28.967784]  which belongs to the cache kmalloc-32 of size 32
[   28.967995] The buggy address is located 16 bytes inside of
[   28.967995]  freed 32-byte region [fff00000c6437e00, fff00000c6437e20)
[   28.968286] 
[   28.968358] The buggy address belongs to the physical page:
[   28.968469] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106437
[   28.968694] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.968839] page_type: f5(slab)
[   28.969040] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   28.969217] raw: 0000000000000000 0000000000400040 00000000f5000000 0000000000000000
[   28.969377] page dumped because: kasan: bad access detected
[   28.969999] 
[   28.970060] Memory state around the buggy address:
[   28.970150]  fff00000c6437d00: 00 00 00 fc fc fc fc fc 00 00 00 04 fc fc fc fc
[   28.970266]  fff00000c6437d80: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   28.970803] >fff00000c6437e00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   28.971025]                          ^
[   28.971930]  fff00000c6437e80: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   28.972086]  fff00000c6437f00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   28.972201] ==================================================================

[   29.059022] ==================================================================
[   29.059385] BUG: KASAN: slab-use-after-free in strcmp+0xc0/0xc8
[   29.059535] Read of size 1 at addr fff00000c7761a90 by task kunit_try_catch/259
[   29.059662] 
[   29.059749] CPU: 1 UID: 0 PID: 259 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   29.059991] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.060066] Hardware name: linux,dummy-virt (DT)
[   29.060151] Call trace:
[   29.060221]  show_stack+0x20/0x38 (C)
[   29.060356]  dump_stack_lvl+0x8c/0xd0
[   29.060588]  print_report+0x118/0x608
[   29.060726]  kasan_report+0xdc/0x128
[   29.060883]  __asan_report_load1_noabort+0x20/0x30
[   29.061081]  strcmp+0xc0/0xc8
[   29.061392]  kasan_strings+0x340/0xb00
[   29.061600]  kunit_try_run_case+0x170/0x3f0
[   29.061745]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.061922]  kthread+0x328/0x630
[   29.062056]  ret_from_fork+0x10/0x20
[   29.062199] 
[   29.062259] Allocated by task 259:
[   29.062339]  kasan_save_stack+0x3c/0x68
[   29.062455]  kasan_save_track+0x20/0x40
[   29.062564]  kasan_save_alloc_info+0x40/0x58
[   29.062703]  __kasan_kmalloc+0xd4/0xd8
[   29.062808]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.062960]  kasan_strings+0xc8/0xb00
[   29.063090]  kunit_try_run_case+0x170/0x3f0
[   29.063194]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.063303]  kthread+0x328/0x630
[   29.063394]  ret_from_fork+0x10/0x20
[   29.063488] 
[   29.063571] Freed by task 259:
[   29.063646]  kasan_save_stack+0x3c/0x68
[   29.063751]  kasan_save_track+0x20/0x40
[   29.063878]  kasan_save_free_info+0x4c/0x78
[   29.064000]  __kasan_slab_free+0x6c/0x98
[   29.064107]  kfree+0x214/0x3c8
[   29.064385]  kasan_strings+0x24c/0xb00
[   29.064506]  kunit_try_run_case+0x170/0x3f0
[   29.064703]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.064830]  kthread+0x328/0x630
[   29.064944]  ret_from_fork+0x10/0x20
[   29.065080] 
[   29.065141] The buggy address belongs to the object at fff00000c7761a80
[   29.065141]  which belongs to the cache kmalloc-32 of size 32
[   29.065296] The buggy address is located 16 bytes inside of
[   29.065296]  freed 32-byte region [fff00000c7761a80, fff00000c7761aa0)
[   29.065454] 
[   29.065525] The buggy address belongs to the physical page:
[   29.065614] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107761
[   29.065771] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.065942] page_type: f5(slab)
[   29.066065] raw: 0bfffe0000000000 fff00000c0001780 dead000000000100 dead000000000122
[   29.066211] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   29.066329] page dumped because: kasan: bad access detected
[   29.066427] 
[   29.066482] Memory state around the buggy address:
[   29.066573]  fff00000c7761980: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   29.067438]  fff00000c7761a00: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   29.068103] >fff00000c7761a80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   29.068645]                          ^
[   29.068736]  fff00000c7761b00: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   29.068876]  fff00000c7761b80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   29.068987] ==================================================================

[   22.099975] ==================================================================
[   22.102048] BUG: KASAN: slab-use-after-free in strcmp+0xb0/0xc0
[   22.102647] Read of size 1 at addr ffff8881039d7c90 by task kunit_try_catch/277
[   22.103260] 
[   22.104331] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   22.104475] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.104824] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.104889] Call Trace:
[   22.104916]  <TASK>
[   22.104943]  dump_stack_lvl+0x73/0xb0
[   22.104998]  print_report+0xd1/0x650
[   22.105037]  ? __virt_addr_valid+0x1db/0x2d0
[   22.105072]  ? strcmp+0xb0/0xc0
[   22.105098]  ? kasan_complete_mode_report_info+0x64/0x200
[   22.105130]  ? strcmp+0xb0/0xc0
[   22.105155]  kasan_report+0x141/0x180
[   22.105186]  ? strcmp+0xb0/0xc0
[   22.105216]  __asan_report_load1_noabort+0x18/0x20
[   22.105300]  strcmp+0xb0/0xc0
[   22.105330]  kasan_strings+0x431/0xe80
[   22.105364]  ? __pfx_kasan_strings+0x10/0x10
[   22.105393]  ? __schedule+0x207f/0x2b60
[   22.105424]  ? schedule+0x7c/0x2e0
[   22.105453]  ? trace_hardirqs_on+0x37/0xe0
[   22.105488]  ? __schedule+0x207f/0x2b60
[   22.105562]  ? __pfx_read_tsc+0x10/0x10
[   22.105699]  ? ktime_get_ts64+0x86/0x230
[   22.105754]  kunit_try_run_case+0x1a5/0x480
[   22.105798]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.105834]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.105872]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.105906]  ? __kthread_parkme+0x82/0x180
[   22.105935]  ? preempt_count_sub+0x50/0x80
[   22.105966]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.106003]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.106036]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.106073]  kthread+0x337/0x6f0
[   22.106100]  ? trace_preempt_on+0x20/0xc0
[   22.106134]  ? __pfx_kthread+0x10/0x10
[   22.106163]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.106196]  ? calculate_sigpending+0x7b/0xa0
[   22.106282]  ? __pfx_kthread+0x10/0x10
[   22.106321]  ret_from_fork+0x116/0x1d0
[   22.106351]  ? __pfx_kthread+0x10/0x10
[   22.106381]  ret_from_fork_asm+0x1a/0x30
[   22.106424]  </TASK>
[   22.106440] 
[   22.128964] Allocated by task 277:
[   22.129416]  kasan_save_stack+0x45/0x70
[   22.129950]  kasan_save_track+0x18/0x40
[   22.130268]  kasan_save_alloc_info+0x3b/0x50
[   22.130739]  __kasan_kmalloc+0xb7/0xc0
[   22.131162]  __kmalloc_cache_noprof+0x189/0x420
[   22.132045]  kasan_strings+0xc0/0xe80
[   22.132514]  kunit_try_run_case+0x1a5/0x480
[   22.132859]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.134276]  kthread+0x337/0x6f0
[   22.134880]  ret_from_fork+0x116/0x1d0
[   22.135288]  ret_from_fork_asm+0x1a/0x30
[   22.135958] 
[   22.136144] Freed by task 277:
[   22.136421]  kasan_save_stack+0x45/0x70
[   22.136870]  kasan_save_track+0x18/0x40
[   22.137399]  kasan_save_free_info+0x3f/0x60
[   22.137859]  __kasan_slab_free+0x56/0x70
[   22.138241]  kfree+0x222/0x3f0
[   22.138558]  kasan_strings+0x2aa/0xe80
[   22.139866]  kunit_try_run_case+0x1a5/0x480
[   22.140343]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.141202]  kthread+0x337/0x6f0
[   22.141731]  ret_from_fork+0x116/0x1d0
[   22.142107]  ret_from_fork_asm+0x1a/0x30
[   22.143110] 
[   22.143420] The buggy address belongs to the object at ffff8881039d7c80
[   22.143420]  which belongs to the cache kmalloc-32 of size 32
[   22.144366] The buggy address is located 16 bytes inside of
[   22.144366]  freed 32-byte region [ffff8881039d7c80, ffff8881039d7ca0)
[   22.145542] 
[   22.145835] The buggy address belongs to the physical page:
[   22.146445] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d7
[   22.147474] flags: 0x200000000000000(node=0|zone=2)
[   22.148037] page_type: f5(slab)
[   22.148408] raw: 0200000000000000 ffff888100041780 dead000000000122 0000000000000000
[   22.149706] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   22.150294] page dumped because: kasan: bad access detected
[   22.151314] 
[   22.151530] Memory state around the buggy address:
[   22.152089]  ffff8881039d7b80: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   22.152662]  ffff8881039d7c00: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   22.153189] >ffff8881039d7c80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   22.153966]                          ^
[   22.154333]  ffff8881039d7d00: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   22.155760]  ffff8881039d7d80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   22.156257] ==================================================================

[   20.881278] ==================================================================
[   20.883724] BUG: KASAN: slab-use-after-free in strcmp+0xb0/0xc0
[   20.884930] Read of size 1 at addr ffff8881038ef290 by task kunit_try_catch/277
[   20.886299] 
[   20.886482] CPU: 1 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   20.886865] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.886920] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.886957] Call Trace:
[   20.886997]  <TASK>
[   20.887021]  dump_stack_lvl+0x73/0xb0
[   20.887064]  print_report+0xd1/0x650
[   20.887104]  ? __virt_addr_valid+0x1db/0x2d0
[   20.887374]  ? strcmp+0xb0/0xc0
[   20.887405]  ? kasan_complete_mode_report_info+0x64/0x200
[   20.887439]  ? strcmp+0xb0/0xc0
[   20.887464]  kasan_report+0x141/0x180
[   20.887497]  ? strcmp+0xb0/0xc0
[   20.887578]  __asan_report_load1_noabort+0x18/0x20
[   20.887658]  strcmp+0xb0/0xc0
[   20.887690]  kasan_strings+0x431/0xe80
[   20.887724]  ? trace_hardirqs_on+0x37/0xe0
[   20.887759]  ? __pfx_kasan_strings+0x10/0x10
[   20.887789]  ? finish_task_switch.isra.0+0x153/0x700
[   20.887820]  ? __switch_to+0x47/0xf50
[   20.887856]  ? __schedule+0x10cc/0x2b60
[   20.887920]  ? __pfx_read_tsc+0x10/0x10
[   20.887953]  ? ktime_get_ts64+0x86/0x230
[   20.887988]  kunit_try_run_case+0x1a5/0x480
[   20.888026]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.888060]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   20.888114]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.888171]  ? __kthread_parkme+0x82/0x180
[   20.888203]  ? preempt_count_sub+0x50/0x80
[   20.888236]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.888272]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.888305]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.888341]  kthread+0x337/0x6f0
[   20.888368]  ? trace_preempt_on+0x20/0xc0
[   20.888398]  ? __pfx_kthread+0x10/0x10
[   20.888427]  ? _raw_spin_unlock_irq+0x47/0x80
[   20.888458]  ? calculate_sigpending+0x7b/0xa0
[   20.888492]  ? __pfx_kthread+0x10/0x10
[   20.888564]  ret_from_fork+0x116/0x1d0
[   20.888633]  ? __pfx_kthread+0x10/0x10
[   20.888667]  ret_from_fork_asm+0x1a/0x30
[   20.888709]  </TASK>
[   20.888723] 
[   20.911221] Allocated by task 277:
[   20.911545]  kasan_save_stack+0x45/0x70
[   20.912860]  kasan_save_track+0x18/0x40
[   20.913205]  kasan_save_alloc_info+0x3b/0x50
[   20.913777]  __kasan_kmalloc+0xb7/0xc0
[   20.914109]  __kmalloc_cache_noprof+0x189/0x420
[   20.914977]  kasan_strings+0xc0/0xe80
[   20.915469]  kunit_try_run_case+0x1a5/0x480
[   20.916158]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.917040]  kthread+0x337/0x6f0
[   20.917444]  ret_from_fork+0x116/0x1d0
[   20.918129]  ret_from_fork_asm+0x1a/0x30
[   20.918485] 
[   20.918595] Freed by task 277:
[   20.918729]  kasan_save_stack+0x45/0x70
[   20.918914]  kasan_save_track+0x18/0x40
[   20.919077]  kasan_save_free_info+0x3f/0x60
[   20.920349]  __kasan_slab_free+0x56/0x70
[   20.920831]  kfree+0x222/0x3f0
[   20.921230]  kasan_strings+0x2aa/0xe80
[   20.921732]  kunit_try_run_case+0x1a5/0x480
[   20.922359]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.923215]  kthread+0x337/0x6f0
[   20.923535]  ret_from_fork+0x116/0x1d0
[   20.924385]  ret_from_fork_asm+0x1a/0x30
[   20.924787] 
[   20.925044] The buggy address belongs to the object at ffff8881038ef280
[   20.925044]  which belongs to the cache kmalloc-32 of size 32
[   20.926421] The buggy address is located 16 bytes inside of
[   20.926421]  freed 32-byte region [ffff8881038ef280, ffff8881038ef2a0)
[   20.927871] 
[   20.928222] The buggy address belongs to the physical page:
[   20.929154] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ef
[   20.930080] flags: 0x200000000000000(node=0|zone=2)
[   20.930590] page_type: f5(slab)
[   20.930905] raw: 0200000000000000 ffff888100041780 dead000000000122 0000000000000000
[   20.931505] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   20.932567] page dumped because: kasan: bad access detected
[   20.933222] 
[   20.933552] Memory state around the buggy address:
[   20.934393]  ffff8881038ef180: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   20.935088]  ffff8881038ef200: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   20.935611] >ffff8881038ef280: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.936246]                          ^
[   20.936609]  ffff8881038ef300: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   20.937628]  ffff8881038ef380: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.938281] ==================================================================

[   22.553474] ==================================================================
[   22.555608] BUG: KASAN: slab-use-after-free in strcmp+0xc0/0xc8
[   22.556170] Read of size 1 at addr ffff00000f4bf450 by task kunit_try_catch/312
[   22.556843] 
[   22.557006] CPU: 2 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   22.557052] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.557065] Hardware name: Radxa ROCK Pi 4B (DT)
[   22.557080] Call trace:
[   22.557091]  show_stack+0x20/0x38 (C)
[   22.557124]  dump_stack_lvl+0x8c/0xd0
[   22.557155]  print_report+0x118/0x608
[   22.557186]  kasan_report+0xdc/0x128
[   22.557213]  __asan_report_load1_noabort+0x20/0x30
[   22.557245]  strcmp+0xc0/0xc8
[   22.557269]  kasan_strings+0x340/0xb00
[   22.557295]  kunit_try_run_case+0x170/0x3f0
[   22.557326]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.557359]  kthread+0x328/0x630
[   22.557382]  ret_from_fork+0x10/0x20
[   22.557411] 
[   22.563195] Allocated by task 312:
[   22.563517]  kasan_save_stack+0x3c/0x68
[   22.563888]  kasan_save_track+0x20/0x40
[   22.564257]  kasan_save_alloc_info+0x40/0x58
[   22.564669]  __kasan_kmalloc+0xd4/0xd8
[   22.565030]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.565463]  kasan_strings+0xc8/0xb00
[   22.565815]  kunit_try_run_case+0x170/0x3f0
[   22.566215]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.566732]  kthread+0x328/0x630
[   22.567043]  ret_from_fork+0x10/0x20
[   22.567388] 
[   22.567538] Freed by task 312:
[   22.567829]  kasan_save_stack+0x3c/0x68
[   22.568199]  kasan_save_track+0x20/0x40
[   22.568567]  kasan_save_free_info+0x4c/0x78
[   22.568969]  __kasan_slab_free+0x6c/0x98
[   22.569345]  kfree+0x214/0x3c8
[   22.569643]  kasan_strings+0x24c/0xb00
[   22.570003]  kunit_try_run_case+0x170/0x3f0
[   22.570402]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.570919]  kthread+0x328/0x630
[   22.571230]  ret_from_fork+0x10/0x20
[   22.571575] 
[   22.571725] The buggy address belongs to the object at ffff00000f4bf440
[   22.571725]  which belongs to the cache kmalloc-32 of size 32
[   22.572835] The buggy address is located 16 bytes inside of
[   22.572835]  freed 32-byte region [ffff00000f4bf440, ffff00000f4bf460)
[   22.573924] 
[   22.574075] The buggy address belongs to the physical page:
[   22.574586] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xf4bf
[   22.575305] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   22.575910] page_type: f5(slab)
[   22.576217] raw: 03fffe0000000000 ffff000000402780 dead000000000122 0000000000000000
[   22.576926] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   22.577628] page dumped because: kasan: bad access detected
[   22.578138] 
[   22.578287] Memory state around the buggy address:
[   22.578732]  ffff00000f4bf300: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   22.579393]  ffff00000f4bf380: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   22.580052] >ffff00000f4bf400: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   22.580709]                                                  ^
[   22.581247]  ffff00000f4bf480: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   22.581907]  ffff00000f4bf500: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   22.582564] ==================================================================