Hay
Date
June 8, 2025, 11:09 p.m.

Environment
e850-96
qemu-arm64
qemu-x86_64
rk3399-rock-pi-4b

[   40.752346] ==================================================================
[   40.759443] BUG: KASAN: slab-use-after-free in strlen+0xa8/0xb0
[   40.765342] Read of size 1 at addr ffff00080499db10 by task kunit_try_catch/306
[   40.772633] 
[   40.774118] CPU: 1 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   40.774171] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.774188] Hardware name: WinLink E850-96 board (DT)
[   40.774210] Call trace:
[   40.774225]  show_stack+0x20/0x38 (C)
[   40.774260]  dump_stack_lvl+0x8c/0xd0
[   40.774296]  print_report+0x118/0x608
[   40.774332]  kasan_report+0xdc/0x128
[   40.774365]  __asan_report_load1_noabort+0x20/0x30
[   40.774402]  strlen+0xa8/0xb0
[   40.774429]  kasan_strings+0x418/0xb00
[   40.774461]  kunit_try_run_case+0x170/0x3f0
[   40.774497]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.774535]  kthread+0x328/0x630
[   40.774564]  ret_from_fork+0x10/0x20
[   40.774603] 
[   40.839472] Allocated by task 306:
[   40.842859]  kasan_save_stack+0x3c/0x68
[   40.846677]  kasan_save_track+0x20/0x40
[   40.850496]  kasan_save_alloc_info+0x40/0x58
[   40.854750]  __kasan_kmalloc+0xd4/0xd8
[   40.858482]  __kmalloc_cache_noprof+0x16c/0x3c0
[   40.862996]  kasan_strings+0xc8/0xb00
[   40.866642]  kunit_try_run_case+0x170/0x3f0
[   40.870809]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.876279]  kthread+0x328/0x630
[   40.879489]  ret_from_fork+0x10/0x20
[   40.883048] 
[   40.884524] Freed by task 306:
[   40.887562]  kasan_save_stack+0x3c/0x68
[   40.891381]  kasan_save_track+0x20/0x40
[   40.895201]  kasan_save_free_info+0x4c/0x78
[   40.899367]  __kasan_slab_free+0x6c/0x98
[   40.903273]  kfree+0x214/0x3c8
[   40.906312]  kasan_strings+0x24c/0xb00
[   40.910044]  kunit_try_run_case+0x170/0x3f0
[   40.914211]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.919679]  kthread+0x328/0x630
[   40.922891]  ret_from_fork+0x10/0x20
[   40.926451] 
[   40.927926] The buggy address belongs to the object at ffff00080499db00
[   40.927926]  which belongs to the cache kmalloc-32 of size 32
[   40.940254] The buggy address is located 16 bytes inside of
[   40.940254]  freed 32-byte region [ffff00080499db00, ffff00080499db20)
[   40.952318] 
[   40.953796] The buggy address belongs to the physical page:
[   40.959353] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88499d
[   40.967337] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   40.973847] page_type: f5(slab)
[   40.976983] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000
[   40.984703] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   40.992422] page dumped because: kasan: bad access detected
[   40.997977] 
[   40.999451] Memory state around the buggy address:
[   41.004233]  ffff00080499da00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   41.011436]  ffff00080499da80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   41.018640] >ffff00080499db00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   41.025841]                          ^
[   41.029577]  ffff00080499db80: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   41.036782]  ffff00080499dc00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   41.043985] ==================================================================

[   28.991914] ==================================================================
[   28.992160] BUG: KASAN: slab-use-after-free in strlen+0xa8/0xb0
[   28.992296] Read of size 1 at addr fff00000c6437e10 by task kunit_try_catch/259
[   28.992427] 
[   28.992516] CPU: 0 UID: 0 PID: 259 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   28.992728] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.992801] Hardware name: linux,dummy-virt (DT)
[   28.992880] Call trace:
[   28.992960]  show_stack+0x20/0x38 (C)
[   28.993096]  dump_stack_lvl+0x8c/0xd0
[   28.993220]  print_report+0x118/0x608
[   28.993345]  kasan_report+0xdc/0x128
[   28.993465]  __asan_report_load1_noabort+0x20/0x30
[   28.993612]  strlen+0xa8/0xb0
[   28.993749]  kasan_strings+0x418/0xb00
[   28.994173]  kunit_try_run_case+0x170/0x3f0
[   28.994328]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.994488]  kthread+0x328/0x630
[   28.994990]  ret_from_fork+0x10/0x20
[   28.995564] 
[   28.995973] Allocated by task 259:
[   28.996590]  kasan_save_stack+0x3c/0x68
[   28.996713]  kasan_save_track+0x20/0x40
[   28.996818]  kasan_save_alloc_info+0x40/0x58
[   28.998215]  __kasan_kmalloc+0xd4/0xd8
[   28.998665]  __kmalloc_cache_noprof+0x16c/0x3c0
[   28.999469]  kasan_strings+0xc8/0xb00
[   28.999581]  kunit_try_run_case+0x170/0x3f0
[   28.999978]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.000388]  kthread+0x328/0x630
[   29.000737]  ret_from_fork+0x10/0x20
[   29.001064] 
[   29.001747] Freed by task 259:
[   29.002037]  kasan_save_stack+0x3c/0x68
[   29.002418]  kasan_save_track+0x20/0x40
[   29.003061]  kasan_save_free_info+0x4c/0x78
[   29.003213]  __kasan_slab_free+0x6c/0x98
[   29.003685]  kfree+0x214/0x3c8
[   29.003814]  kasan_strings+0x24c/0xb00
[   29.004297]  kunit_try_run_case+0x170/0x3f0
[   29.004836]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.005093]  kthread+0x328/0x630
[   29.005180]  ret_from_fork+0x10/0x20
[   29.006028] 
[   29.006291] The buggy address belongs to the object at fff00000c6437e00
[   29.006291]  which belongs to the cache kmalloc-32 of size 32
[   29.006855] The buggy address is located 16 bytes inside of
[   29.006855]  freed 32-byte region [fff00000c6437e00, fff00000c6437e20)
[   29.007653] 
[   29.007714] The buggy address belongs to the physical page:
[   29.007810] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106437
[   29.008261] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.008545] page_type: f5(slab)
[   29.009080] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   29.009222] raw: 0000000000000000 0000000000400040 00000000f5000000 0000000000000000
[   29.009329] page dumped because: kasan: bad access detected
[   29.010301] 
[   29.010406] Memory state around the buggy address:
[   29.010753]  fff00000c6437d00: 00 00 00 fc fc fc fc fc 00 00 00 04 fc fc fc fc
[   29.010893]  fff00000c6437d80: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   29.011235] >fff00000c6437e00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   29.011982]                          ^
[   29.012293]  fff00000c6437e80: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   29.012408]  fff00000c6437f00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   29.013229] ==================================================================

[   29.117894] ==================================================================
[   29.118094] BUG: KASAN: slab-use-after-free in strlen+0xa8/0xb0
[   29.118238] Read of size 1 at addr fff00000c7761a90 by task kunit_try_catch/259
[   29.118365] 
[   29.118449] CPU: 1 UID: 0 PID: 259 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   29.118648] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.118720] Hardware name: linux,dummy-virt (DT)
[   29.118802] Call trace:
[   29.118879]  show_stack+0x20/0x38 (C)
[   29.119019]  dump_stack_lvl+0x8c/0xd0
[   29.119145]  print_report+0x118/0x608
[   29.119278]  kasan_report+0xdc/0x128
[   29.119398]  __asan_report_load1_noabort+0x20/0x30
[   29.119523]  strlen+0xa8/0xb0
[   29.119634]  kasan_strings+0x418/0xb00
[   29.119748]  kunit_try_run_case+0x170/0x3f0
[   29.123388]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.123536]  kthread+0x328/0x630
[   29.123653]  ret_from_fork+0x10/0x20
[   29.123792] 
[   29.123862] Allocated by task 259:
[   29.123940]  kasan_save_stack+0x3c/0x68
[   29.124040]  kasan_save_track+0x20/0x40
[   29.124140]  kasan_save_alloc_info+0x40/0x58
[   29.124241]  __kasan_kmalloc+0xd4/0xd8
[   29.124332]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.124435]  kasan_strings+0xc8/0xb00
[   29.124524]  kunit_try_run_case+0x170/0x3f0
[   29.124624]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.124735]  kthread+0x328/0x630
[   29.124817]  ret_from_fork+0x10/0x20
[   29.127619] 
[   29.127697] Freed by task 259:
[   29.127802]  kasan_save_stack+0x3c/0x68
[   29.128190]  kasan_save_track+0x20/0x40
[   29.128483]  kasan_save_free_info+0x4c/0x78
[   29.128919]  __kasan_slab_free+0x6c/0x98
[   29.129748]  kfree+0x214/0x3c8
[   29.130351]  kasan_strings+0x24c/0xb00
[   29.130967]  kunit_try_run_case+0x170/0x3f0
[   29.131525]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.132072]  kthread+0x328/0x630
[   29.132169]  ret_from_fork+0x10/0x20
[   29.132263] 
[   29.132875] The buggy address belongs to the object at fff00000c7761a80
[   29.132875]  which belongs to the cache kmalloc-32 of size 32
[   29.133570] The buggy address is located 16 bytes inside of
[   29.133570]  freed 32-byte region [fff00000c7761a80, fff00000c7761aa0)
[   29.133729] 
[   29.133782] The buggy address belongs to the physical page:
[   29.133878] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107761
[   29.134020] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.134146] page_type: f5(slab)
[   29.134246] raw: 0bfffe0000000000 fff00000c0001780 dead000000000100 dead000000000122
[   29.134986] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   29.137028] page dumped because: kasan: bad access detected
[   29.137128] 
[   29.137180] Memory state around the buggy address:
[   29.137269]  fff00000c7761980: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   29.137386]  fff00000c7761a00: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   29.137500] >fff00000c7761a80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   29.137602]                          ^
[   29.137683]  fff00000c7761b00: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   29.137797]  fff00000c7761b80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   29.137930] ==================================================================

[   22.214175] ==================================================================
[   22.215692] BUG: KASAN: slab-use-after-free in strlen+0x8f/0xb0
[   22.216205] Read of size 1 at addr ffff8881039d7c90 by task kunit_try_catch/277
[   22.216767] 
[   22.216993] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   22.217162] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.217205] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.217284] Call Trace:
[   22.217338]  <TASK>
[   22.217390]  dump_stack_lvl+0x73/0xb0
[   22.217480]  print_report+0xd1/0x650
[   22.217603]  ? __virt_addr_valid+0x1db/0x2d0
[   22.217741]  ? strlen+0x8f/0xb0
[   22.217811]  ? kasan_complete_mode_report_info+0x64/0x200
[   22.217927]  ? strlen+0x8f/0xb0
[   22.218028]  kasan_report+0x141/0x180
[   22.218109]  ? strlen+0x8f/0xb0
[   22.218187]  __asan_report_load1_noabort+0x18/0x20
[   22.218305]  strlen+0x8f/0xb0
[   22.218381]  kasan_strings+0x57b/0xe80
[   22.218457]  ? __pfx_kasan_strings+0x10/0x10
[   22.218547]  ? __schedule+0x207f/0x2b60
[   22.218619]  ? schedule+0x7c/0x2e0
[   22.218672]  ? trace_hardirqs_on+0x37/0xe0
[   22.218711]  ? __schedule+0x207f/0x2b60
[   22.218742]  ? __pfx_read_tsc+0x10/0x10
[   22.218775]  ? ktime_get_ts64+0x86/0x230
[   22.218808]  kunit_try_run_case+0x1a5/0x480
[   22.218849]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.218889]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.218924]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.218960]  ? __kthread_parkme+0x82/0x180
[   22.218990]  ? preempt_count_sub+0x50/0x80
[   22.219022]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.219059]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.219097]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.219132]  kthread+0x337/0x6f0
[   22.219160]  ? trace_preempt_on+0x20/0xc0
[   22.219194]  ? __pfx_kthread+0x10/0x10
[   22.219224]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.219301]  ? calculate_sigpending+0x7b/0xa0
[   22.219342]  ? __pfx_kthread+0x10/0x10
[   22.219373]  ret_from_fork+0x116/0x1d0
[   22.219400]  ? __pfx_kthread+0x10/0x10
[   22.219431]  ret_from_fork_asm+0x1a/0x30
[   22.219473]  </TASK>
[   22.219488] 
[   22.236862] Allocated by task 277:
[   22.237589]  kasan_save_stack+0x45/0x70
[   22.238237]  kasan_save_track+0x18/0x40
[   22.238803]  kasan_save_alloc_info+0x3b/0x50
[   22.239165]  __kasan_kmalloc+0xb7/0xc0
[   22.239691]  __kmalloc_cache_noprof+0x189/0x420
[   22.240189]  kasan_strings+0xc0/0xe80
[   22.240724]  kunit_try_run_case+0x1a5/0x480
[   22.241225]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.241875]  kthread+0x337/0x6f0
[   22.242394]  ret_from_fork+0x116/0x1d0
[   22.242750]  ret_from_fork_asm+0x1a/0x30
[   22.243074] 
[   22.243264] Freed by task 277:
[   22.243791]  kasan_save_stack+0x45/0x70
[   22.244602]  kasan_save_track+0x18/0x40
[   22.245107]  kasan_save_free_info+0x3f/0x60
[   22.245664]  __kasan_slab_free+0x56/0x70
[   22.246179]  kfree+0x222/0x3f0
[   22.246666]  kasan_strings+0x2aa/0xe80
[   22.247100]  kunit_try_run_case+0x1a5/0x480
[   22.247543]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.247928]  kthread+0x337/0x6f0
[   22.248219]  ret_from_fork+0x116/0x1d0
[   22.248730]  ret_from_fork_asm+0x1a/0x30
[   22.249163] 
[   22.249517] The buggy address belongs to the object at ffff8881039d7c80
[   22.249517]  which belongs to the cache kmalloc-32 of size 32
[   22.250952] The buggy address is located 16 bytes inside of
[   22.250952]  freed 32-byte region [ffff8881039d7c80, ffff8881039d7ca0)
[   22.251962] 
[   22.252279] The buggy address belongs to the physical page:
[   22.253013] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d7
[   22.253713] flags: 0x200000000000000(node=0|zone=2)
[   22.254117] page_type: f5(slab)
[   22.254403] raw: 0200000000000000 ffff888100041780 dead000000000122 0000000000000000
[   22.255086] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   22.256004] page dumped because: kasan: bad access detected
[   22.256593] 
[   22.256898] Memory state around the buggy address:
[   22.257559]  ffff8881039d7b80: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   22.258325]  ffff8881039d7c00: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   22.259387] >ffff8881039d7c80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   22.259850]                          ^
[   22.260064]  ffff8881039d7d00: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   22.260524]  ffff8881039d7d80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   22.261692] ==================================================================

[   20.996197] ==================================================================
[   20.997553] BUG: KASAN: slab-use-after-free in strlen+0x8f/0xb0
[   20.998158] Read of size 1 at addr ffff8881038ef290 by task kunit_try_catch/277
[   20.999664] 
[   20.999998] CPU: 1 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   21.000076] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.000115] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.000165] Call Trace:
[   21.000187]  <TASK>
[   21.000204]  dump_stack_lvl+0x73/0xb0
[   21.000248]  print_report+0xd1/0x650
[   21.000282]  ? __virt_addr_valid+0x1db/0x2d0
[   21.000314]  ? strlen+0x8f/0xb0
[   21.000338]  ? kasan_complete_mode_report_info+0x64/0x200
[   21.000370]  ? strlen+0x8f/0xb0
[   21.000395]  kasan_report+0x141/0x180
[   21.000427]  ? strlen+0x8f/0xb0
[   21.000456]  __asan_report_load1_noabort+0x18/0x20
[   21.000492]  strlen+0x8f/0xb0
[   21.000536]  kasan_strings+0x57b/0xe80
[   21.000759]  ? trace_hardirqs_on+0x37/0xe0
[   21.000933]  ? __pfx_kasan_strings+0x10/0x10
[   21.000974]  ? finish_task_switch.isra.0+0x153/0x700
[   21.001009]  ? __switch_to+0x47/0xf50
[   21.001046]  ? __schedule+0x10cc/0x2b60
[   21.001078]  ? __pfx_read_tsc+0x10/0x10
[   21.001149]  ? ktime_get_ts64+0x86/0x230
[   21.001190]  kunit_try_run_case+0x1a5/0x480
[   21.001228]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.001265]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.001299]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.001334]  ? __kthread_parkme+0x82/0x180
[   21.001362]  ? preempt_count_sub+0x50/0x80
[   21.001393]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.001428]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.001462]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.001497]  kthread+0x337/0x6f0
[   21.001581]  ? trace_preempt_on+0x20/0xc0
[   21.001668]  ? __pfx_kthread+0x10/0x10
[   21.001748]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.001831]  ? calculate_sigpending+0x7b/0xa0
[   21.001904]  ? __pfx_kthread+0x10/0x10
[   21.001938]  ret_from_fork+0x116/0x1d0
[   21.001966]  ? __pfx_kthread+0x10/0x10
[   21.001997]  ret_from_fork_asm+0x1a/0x30
[   21.002038]  </TASK>
[   21.002053] 
[   21.025300] Allocated by task 277:
[   21.025492]  kasan_save_stack+0x45/0x70
[   21.026572]  kasan_save_track+0x18/0x40
[   21.027575]  kasan_save_alloc_info+0x3b/0x50
[   21.028117]  __kasan_kmalloc+0xb7/0xc0
[   21.028694]  __kmalloc_cache_noprof+0x189/0x420
[   21.029239]  kasan_strings+0xc0/0xe80
[   21.029976]  kunit_try_run_case+0x1a5/0x480
[   21.030507]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.031028]  kthread+0x337/0x6f0
[   21.031621]  ret_from_fork+0x116/0x1d0
[   21.032340]  ret_from_fork_asm+0x1a/0x30
[   21.033005] 
[   21.033269] Freed by task 277:
[   21.033561]  kasan_save_stack+0x45/0x70
[   21.034294]  kasan_save_track+0x18/0x40
[   21.035088]  kasan_save_free_info+0x3f/0x60
[   21.035698]  __kasan_slab_free+0x56/0x70
[   21.036115]  kfree+0x222/0x3f0
[   21.036477]  kasan_strings+0x2aa/0xe80
[   21.036911]  kunit_try_run_case+0x1a5/0x480
[   21.037485]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.038091]  kthread+0x337/0x6f0
[   21.038499]  ret_from_fork+0x116/0x1d0
[   21.039123]  ret_from_fork_asm+0x1a/0x30
[   21.039687] 
[   21.040276] The buggy address belongs to the object at ffff8881038ef280
[   21.040276]  which belongs to the cache kmalloc-32 of size 32
[   21.041410] The buggy address is located 16 bytes inside of
[   21.041410]  freed 32-byte region [ffff8881038ef280, ffff8881038ef2a0)
[   21.042397] 
[   21.042760] The buggy address belongs to the physical page:
[   21.043381] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038ef
[   21.044237] flags: 0x200000000000000(node=0|zone=2)
[   21.044683] page_type: f5(slab)
[   21.045007] raw: 0200000000000000 ffff888100041780 dead000000000122 0000000000000000
[   21.046124] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   21.046640] page dumped because: kasan: bad access detected
[   21.047157] 
[   21.047391] Memory state around the buggy address:
[   21.047858]  ffff8881038ef180: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   21.048813]  ffff8881038ef200: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   21.049447] >ffff8881038ef280: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   21.049909]                          ^
[   21.050496]  ffff8881038ef300: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   21.051525]  ffff8881038ef380: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   21.052289] ==================================================================

[   22.611696] ==================================================================
[   22.612351] BUG: KASAN: slab-use-after-free in strlen+0xa8/0xb0
[   22.612897] Read of size 1 at addr ffff00000f4bf450 by task kunit_try_catch/312
[   22.613559] 
[   22.613709] CPU: 4 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   22.613742] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.613752] Hardware name: Radxa ROCK Pi 4B (DT)
[   22.613763] Call trace:
[   22.613771]  show_stack+0x20/0x38 (C)
[   22.613792]  dump_stack_lvl+0x8c/0xd0
[   22.613814]  print_report+0x118/0x608
[   22.613836]  kasan_report+0xdc/0x128
[   22.613857]  __asan_report_load1_noabort+0x20/0x30
[   22.613882]  strlen+0xa8/0xb0
[   22.613900]  kasan_strings+0x418/0xb00
[   22.613919]  kunit_try_run_case+0x170/0x3f0
[   22.613941]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.613966]  kthread+0x328/0x630
[   22.613982]  ret_from_fork+0x10/0x20
[   22.614002] 
[   22.619754] Allocated by task 312:
[   22.620068]  kasan_save_stack+0x3c/0x68
[   22.620431]  kasan_save_track+0x20/0x40
[   22.620793]  kasan_save_alloc_info+0x40/0x58
[   22.621195]  __kasan_kmalloc+0xd4/0xd8
[   22.621549]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.621971]  kasan_strings+0xc8/0xb00
[   22.622317]  kunit_try_run_case+0x170/0x3f0
[   22.622708]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.623215]  kthread+0x328/0x630
[   22.623519]  ret_from_fork+0x10/0x20
[   22.623855] 
[   22.624001] Freed by task 312:
[   22.624285]  kasan_save_stack+0x3c/0x68
[   22.624646]  kasan_save_track+0x20/0x40
[   22.625007]  kasan_save_free_info+0x4c/0x78
[   22.625401]  __kasan_slab_free+0x6c/0x98
[   22.625770]  kfree+0x214/0x3c8
[   22.626060]  kasan_strings+0x24c/0xb00
[   22.626412]  kunit_try_run_case+0x170/0x3f0
[   22.626804]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.627312]  kthread+0x328/0x630
[   22.627616]  ret_from_fork+0x10/0x20
[   22.627954] 
[   22.628101] The buggy address belongs to the object at ffff00000f4bf440
[   22.628101]  which belongs to the cache kmalloc-32 of size 32
[   22.629203] The buggy address is located 16 bytes inside of
[   22.629203]  freed 32-byte region [ffff00000f4bf440, ffff00000f4bf460)
[   22.630282] 
[   22.630429] The buggy address belongs to the physical page:
[   22.630933] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xf4bf
[   22.631641] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   22.632234] page_type: f5(slab)
[   22.632533] raw: 03fffe0000000000 ffff000000402780 dead000000000122 0000000000000000
[   22.633233] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   22.633928] page dumped because: kasan: bad access detected
[   22.634432] 
[   22.634578] Memory state around the buggy address:
[   22.635015]  ffff00000f4bf300: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   22.635668]  ffff00000f4bf380: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   22.636319] >ffff00000f4bf400: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   22.636969]                                                  ^
[   22.637499]  ffff00000f4bf480: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   22.638152]  ffff00000f4bf500: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   22.638802] ==================================================================