Hay
Date
July 18, 2025, 2:09 p.m.

Environment
qemu-arm64
qemu-x86_64

[   18.259889] ==================================================================
[   18.260004] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x388/0x468
[   18.260087] Read of size 1 at addr fff00000c7993000 by task kunit_try_catch/213
[   18.260141] 
[   18.260185] CPU: 1 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.260270] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.260299] Hardware name: linux,dummy-virt (DT)
[   18.260331] Call trace:
[   18.260357]  show_stack+0x20/0x38 (C)
[   18.260412]  dump_stack_lvl+0x8c/0xd0
[   18.260463]  print_report+0x118/0x5d0
[   18.260512]  kasan_report+0xdc/0x128
[   18.260559]  __asan_report_load1_noabort+0x20/0x30
[   18.260612]  kmem_cache_rcu_uaf+0x388/0x468
[   18.260659]  kunit_try_run_case+0x170/0x3f0
[   18.260709]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.260762]  kthread+0x328/0x630
[   18.260806]  ret_from_fork+0x10/0x20
[   18.260869] 
[   18.260888] Allocated by task 213:
[   18.260919]  kasan_save_stack+0x3c/0x68
[   18.260963]  kasan_save_track+0x20/0x40
[   18.261000]  kasan_save_alloc_info+0x40/0x58
[   18.261041]  __kasan_slab_alloc+0xa8/0xb0
[   18.261078]  kmem_cache_alloc_noprof+0x10c/0x398
[   18.261120]  kmem_cache_rcu_uaf+0x12c/0x468
[   18.261156]  kunit_try_run_case+0x170/0x3f0
[   18.261194]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.261235]  kthread+0x328/0x630
[   18.261268]  ret_from_fork+0x10/0x20
[   18.261303] 
[   18.261321] Freed by task 0:
[   18.261349]  kasan_save_stack+0x3c/0x68
[   18.261385]  kasan_save_track+0x20/0x40
[   18.261425]  kasan_save_free_info+0x4c/0x78
[   18.261464]  __kasan_slab_free+0x6c/0x98
[   18.261514]  slab_free_after_rcu_debug+0xd4/0x2f8
[   18.261555]  rcu_core+0x9f4/0x1e20
[   18.261593]  rcu_core_si+0x18/0x30
[   18.261626]  handle_softirqs+0x374/0xb28
[   18.261665]  __do_softirq+0x1c/0x28
[   18.261698] 
[   18.261719] Last potentially related work creation:
[   18.261744]  kasan_save_stack+0x3c/0x68
[   18.261783]  kasan_record_aux_stack+0xb4/0xc8
[   18.261823]  kmem_cache_free+0x120/0x468
[   18.261868]  kmem_cache_rcu_uaf+0x16c/0x468
[   18.261906]  kunit_try_run_case+0x170/0x3f0
[   18.261944]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.261985]  kthread+0x328/0x630
[   18.262018]  ret_from_fork+0x10/0x20
[   18.262054] 
[   18.262072] The buggy address belongs to the object at fff00000c7993000
[   18.262072]  which belongs to the cache test_cache of size 200
[   18.262129] The buggy address is located 0 bytes inside of
[   18.262129]  freed 200-byte region [fff00000c7993000, fff00000c79930c8)
[   18.262190] 
[   18.262212] The buggy address belongs to the physical page:
[   18.262245] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107993
[   18.262300] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.262354] page_type: f5(slab)
[   18.262398] raw: 0bfffe0000000000 fff00000c7990000 dead000000000122 0000000000000000
[   18.262449] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   18.262491] page dumped because: kasan: bad access detected
[   18.262522] 
[   18.262540] Memory state around the buggy address:
[   18.262573]  fff00000c7992f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.262616]  fff00000c7992f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.262659] >fff00000c7993000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.262699]                    ^
[   18.262726]  fff00000c7993080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   18.262768]  fff00000c7993100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.262808] ==================================================================

[   17.924989] ==================================================================
[   17.925118] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x388/0x468
[   17.925201] Read of size 1 at addr fff00000c7997000 by task kunit_try_catch/213
[   17.925253] 
[   17.925300] CPU: 1 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.925408] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.925434] Hardware name: linux,dummy-virt (DT)
[   17.925472] Call trace:
[   17.925496]  show_stack+0x20/0x38 (C)
[   17.925552]  dump_stack_lvl+0x8c/0xd0
[   17.925603]  print_report+0x118/0x5d0
[   17.925651]  kasan_report+0xdc/0x128
[   17.925696]  __asan_report_load1_noabort+0x20/0x30
[   17.925748]  kmem_cache_rcu_uaf+0x388/0x468
[   17.925797]  kunit_try_run_case+0x170/0x3f0
[   17.925846]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.925899]  kthread+0x328/0x630
[   17.925944]  ret_from_fork+0x10/0x20
[   17.925995] 
[   17.926013] Allocated by task 213:
[   17.926044]  kasan_save_stack+0x3c/0x68
[   17.926086]  kasan_save_track+0x20/0x40
[   17.926124]  kasan_save_alloc_info+0x40/0x58
[   17.926164]  __kasan_slab_alloc+0xa8/0xb0
[   17.926202]  kmem_cache_alloc_noprof+0x10c/0x398
[   17.926244]  kmem_cache_rcu_uaf+0x12c/0x468
[   17.926281]  kunit_try_run_case+0x170/0x3f0
[   17.926332]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.926375]  kthread+0x328/0x630
[   17.926407]  ret_from_fork+0x10/0x20
[   17.926443] 
[   17.926462] Freed by task 0:
[   17.926489]  kasan_save_stack+0x3c/0x68
[   17.926526]  kasan_save_track+0x20/0x40
[   17.926564]  kasan_save_free_info+0x4c/0x78
[   17.926605]  __kasan_slab_free+0x6c/0x98
[   17.926642]  slab_free_after_rcu_debug+0xd4/0x2f8
[   17.926683]  rcu_core+0x9f4/0x1e20
[   17.926719]  rcu_core_si+0x18/0x30
[   17.926754]  handle_softirqs+0x374/0xb28
[   17.926791]  __do_softirq+0x1c/0x28
[   17.926826] 
[   17.926845] Last potentially related work creation:
[   17.926871]  kasan_save_stack+0x3c/0x68
[   17.926910]  kasan_record_aux_stack+0xb4/0xc8
[   17.926948]  kmem_cache_free+0x120/0x468
[   17.926986]  kmem_cache_rcu_uaf+0x16c/0x468
[   17.927021]  kunit_try_run_case+0x170/0x3f0
[   17.927060]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.927102]  kthread+0x328/0x630
[   17.927133]  ret_from_fork+0x10/0x20
[   17.927169] 
[   17.927187] The buggy address belongs to the object at fff00000c7997000
[   17.927187]  which belongs to the cache test_cache of size 200
[   17.927246] The buggy address is located 0 bytes inside of
[   17.927246]  freed 200-byte region [fff00000c7997000, fff00000c79970c8)
[   17.927306] 
[   17.927337] The buggy address belongs to the physical page:
[   17.927371] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107997
[   17.927427] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.927480] page_type: f5(slab)
[   17.927524] raw: 0bfffe0000000000 fff00000c598d500 dead000000000122 0000000000000000
[   17.927575] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   17.927615] page dumped because: kasan: bad access detected
[   17.927647] 
[   17.927665] Memory state around the buggy address:
[   17.927700]  fff00000c7996f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.927745]  fff00000c7996f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.927788] >fff00000c7997000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.927828]                    ^
[   17.927855]  fff00000c7997080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   17.927897]  fff00000c7997100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.927936] ==================================================================

[   17.787481] ==================================================================
[   17.787581] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x388/0x468
[   17.787659] Read of size 1 at addr fff00000c775f000 by task kunit_try_catch/213
[   17.787730] 
[   17.787874] CPU: 0 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.788056] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.788084] Hardware name: linux,dummy-virt (DT)
[   17.788118] Call trace:
[   17.788141]  show_stack+0x20/0x38 (C)
[   17.788197]  dump_stack_lvl+0x8c/0xd0
[   17.788370]  print_report+0x118/0x5d0
[   17.788546]  kasan_report+0xdc/0x128
[   17.788686]  __asan_report_load1_noabort+0x20/0x30
[   17.788765]  kmem_cache_rcu_uaf+0x388/0x468
[   17.788813]  kunit_try_run_case+0x170/0x3f0
[   17.788862]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.788915]  kthread+0x328/0x630
[   17.788958]  ret_from_fork+0x10/0x20
[   17.789006] 
[   17.789024] Allocated by task 213:
[   17.789056]  kasan_save_stack+0x3c/0x68
[   17.789100]  kasan_save_track+0x20/0x40
[   17.789144]  kasan_save_alloc_info+0x40/0x58
[   17.789370]  __kasan_slab_alloc+0xa8/0xb0
[   17.789585]  kmem_cache_alloc_noprof+0x10c/0x398
[   17.789645]  kmem_cache_rcu_uaf+0x12c/0x468
[   17.790418]  kunit_try_run_case+0x170/0x3f0
[   17.790515]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.790630]  kthread+0x328/0x630
[   17.790737]  ret_from_fork+0x10/0x20
[   17.790860] 
[   17.790883] Freed by task 0:
[   17.790911]  kasan_save_stack+0x3c/0x68
[   17.790951]  kasan_save_track+0x20/0x40
[   17.791303]  kasan_save_free_info+0x4c/0x78
[   17.791346]  __kasan_slab_free+0x6c/0x98
[   17.791381]  slab_free_after_rcu_debug+0xd4/0x2f8
[   17.791422]  rcu_core+0x9f4/0x1e20
[   17.791459]  rcu_core_si+0x18/0x30
[   17.791525]  handle_softirqs+0x374/0xb28
[   17.791583]  __do_softirq+0x1c/0x28
[   17.791982] 
[   17.792002] Last potentially related work creation:
[   17.792031]  kasan_save_stack+0x3c/0x68
[   17.792069]  kasan_record_aux_stack+0xb4/0xc8
[   17.792110]  kmem_cache_free+0x120/0x468
[   17.792147]  kmem_cache_rcu_uaf+0x16c/0x468
[   17.792184]  kunit_try_run_case+0x170/0x3f0
[   17.792221]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.792264]  kthread+0x328/0x630
[   17.792294]  ret_from_fork+0x10/0x20
[   17.792329] 
[   17.792348] The buggy address belongs to the object at fff00000c775f000
[   17.792348]  which belongs to the cache test_cache of size 200
[   17.792438] The buggy address is located 0 bytes inside of
[   17.792438]  freed 200-byte region [fff00000c775f000, fff00000c775f0c8)
[   17.792512] 
[   17.792536] The buggy address belongs to the physical page:
[   17.792596] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10775f
[   17.792653] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.792707] page_type: f5(slab)
[   17.792763] raw: 0bfffe0000000000 fff00000c56bd8c0 dead000000000122 0000000000000000
[   17.792814] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   17.792855] page dumped because: kasan: bad access detected
[   17.792886] 
[   17.792903] Memory state around the buggy address:
[   17.792937]  fff00000c775ef00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.792982]  fff00000c775ef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.793052] >fff00000c775f000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.793250]                    ^
[   17.793291]  fff00000c775f080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   17.793337]  fff00000c775f100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.793409] ==================================================================

[   13.011829] ==================================================================
[   13.012449] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x3e3/0x510
[   13.013864] Read of size 1 at addr ffff888102e39000 by task kunit_try_catch/230
[   13.014304] 
[   13.014415] CPU: 0 UID: 0 PID: 230 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   13.014465] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.014476] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.014500] Call Trace:
[   13.014512]  <TASK>
[   13.014531]  dump_stack_lvl+0x73/0xb0
[   13.014566]  print_report+0xd1/0x610
[   13.014589]  ? __virt_addr_valid+0x1db/0x2d0
[   13.014614]  ? kmem_cache_rcu_uaf+0x3e3/0x510
[   13.014704]  ? kasan_complete_mode_report_info+0x64/0x200
[   13.015015]  ? kmem_cache_rcu_uaf+0x3e3/0x510
[   13.015042]  kasan_report+0x141/0x180
[   13.015065]  ? kmem_cache_rcu_uaf+0x3e3/0x510
[   13.015095]  __asan_report_load1_noabort+0x18/0x20
[   13.015120]  kmem_cache_rcu_uaf+0x3e3/0x510
[   13.015144]  ? __pfx_kmem_cache_rcu_uaf+0x10/0x10
[   13.015167]  ? finish_task_switch.isra.0+0x153/0x700
[   13.015193]  ? __switch_to+0x47/0xf50
[   13.015224]  ? __pfx_read_tsc+0x10/0x10
[   13.015246]  ? ktime_get_ts64+0x86/0x230
[   13.015272]  kunit_try_run_case+0x1a5/0x480
[   13.015299]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.015322]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.015348]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.015372]  ? __kthread_parkme+0x82/0x180
[   13.015394]  ? preempt_count_sub+0x50/0x80
[   13.015418]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.015442]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.015467]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.015491]  kthread+0x337/0x6f0
[   13.015510]  ? trace_preempt_on+0x20/0xc0
[   13.015720]  ? __pfx_kthread+0x10/0x10
[   13.015747]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.015771]  ? calculate_sigpending+0x7b/0xa0
[   13.015797]  ? __pfx_kthread+0x10/0x10
[   13.015821]  ret_from_fork+0x116/0x1d0
[   13.015842]  ? __pfx_kthread+0x10/0x10
[   13.015864]  ret_from_fork_asm+0x1a/0x30
[   13.015913]  </TASK>
[   13.015925] 
[   13.027261] Allocated by task 230:
[   13.027506]  kasan_save_stack+0x45/0x70
[   13.028094]  kasan_save_track+0x18/0x40
[   13.028282]  kasan_save_alloc_info+0x3b/0x50
[   13.028482]  __kasan_slab_alloc+0x91/0xa0
[   13.029046]  kmem_cache_alloc_noprof+0x123/0x3f0
[   13.029400]  kmem_cache_rcu_uaf+0x155/0x510
[   13.029836]  kunit_try_run_case+0x1a5/0x480
[   13.030218]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.030475]  kthread+0x337/0x6f0
[   13.030961]  ret_from_fork+0x116/0x1d0
[   13.031134]  ret_from_fork_asm+0x1a/0x30
[   13.031318] 
[   13.031406] Freed by task 0:
[   13.032057]  kasan_save_stack+0x45/0x70
[   13.032284]  kasan_save_track+0x18/0x40
[   13.032461]  kasan_save_free_info+0x3f/0x60
[   13.033108]  __kasan_slab_free+0x56/0x70
[   13.033354]  slab_free_after_rcu_debug+0xe4/0x310
[   13.033726]  rcu_core+0x66f/0x1c40
[   13.033910]  rcu_core_si+0x12/0x20
[   13.034251]  handle_softirqs+0x209/0x730
[   13.034753]  __irq_exit_rcu+0xc9/0x110
[   13.034972]  irq_exit_rcu+0x12/0x20
[   13.035289]  sysvec_apic_timer_interrupt+0x81/0x90
[   13.035502]  asm_sysvec_apic_timer_interrupt+0x1f/0x30
[   13.035742] 
[   13.035827] Last potentially related work creation:
[   13.036862]  kasan_save_stack+0x45/0x70
[   13.037136]  kasan_record_aux_stack+0xb2/0xc0
[   13.037344]  kmem_cache_free+0x131/0x420
[   13.037523]  kmem_cache_rcu_uaf+0x194/0x510
[   13.037710]  kunit_try_run_case+0x1a5/0x480
[   13.037909]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.038795]  kthread+0x337/0x6f0
[   13.039262]  ret_from_fork+0x116/0x1d0
[   13.039459]  ret_from_fork_asm+0x1a/0x30
[   13.039827] 
[   13.039928] The buggy address belongs to the object at ffff888102e39000
[   13.039928]  which belongs to the cache test_cache of size 200
[   13.041011] The buggy address is located 0 bytes inside of
[   13.041011]  freed 200-byte region [ffff888102e39000, ffff888102e390c8)
[   13.041966] 
[   13.042073] The buggy address belongs to the physical page:
[   13.042258] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102e39
[   13.042510] flags: 0x200000000000000(node=0|zone=2)
[   13.042682] page_type: f5(slab)
[   13.042816] raw: 0200000000000000 ffff888101ba63c0 dead000000000122 0000000000000000
[   13.043324] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   13.043769] page dumped because: kasan: bad access detected
[   13.044403] 
[   13.044640] Memory state around the buggy address:
[   13.045113]  ffff888102e38f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.045405]  ffff888102e38f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.045707] >ffff888102e39000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.046424]                    ^
[   13.046805]  ffff888102e39080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   13.047511]  ffff888102e39100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.048279] ==================================================================

[   12.843709] ==================================================================
[   12.844148] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x3e3/0x510
[   12.844408] Read of size 1 at addr ffff8881026ea000 by task kunit_try_catch/231
[   12.844745] 
[   12.844842] CPU: 1 UID: 0 PID: 231 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.844888] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.844899] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.844922] Call Trace:
[   12.844934]  <TASK>
[   12.844952]  dump_stack_lvl+0x73/0xb0
[   12.844983]  print_report+0xd1/0x610
[   12.845006]  ? __virt_addr_valid+0x1db/0x2d0
[   12.845031]  ? kmem_cache_rcu_uaf+0x3e3/0x510
[   12.845053]  ? kasan_complete_mode_report_info+0x64/0x200
[   12.845075]  ? kmem_cache_rcu_uaf+0x3e3/0x510
[   12.845098]  kasan_report+0x141/0x180
[   12.845119]  ? kmem_cache_rcu_uaf+0x3e3/0x510
[   12.845153]  __asan_report_load1_noabort+0x18/0x20
[   12.845177]  kmem_cache_rcu_uaf+0x3e3/0x510
[   12.845200]  ? __pfx_kmem_cache_rcu_uaf+0x10/0x10
[   12.845222]  ? finish_task_switch.isra.0+0x153/0x700
[   12.845246]  ? __switch_to+0x47/0xf50
[   12.845269]  ? irqentry_exit+0x2a/0x60
[   12.845290]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   12.845316]  ? irqentry_exit+0x2a/0x60
[   12.845336]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   12.845358]  ? __pfx_read_tsc+0x10/0x10
[   12.845379]  ? ktime_get_ts64+0x86/0x230
[   12.845404]  kunit_try_run_case+0x1a5/0x480
[   12.845430]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.845463]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.845487]  ? _raw_spin_unlock_irqrestore+0x49/0x90
[   12.845512]  ? preempt_count_sub+0x50/0x80
[   12.845535]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.845625]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.845649]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.845672]  kthread+0x337/0x6f0
[   12.845694]  ? trace_preempt_on+0x20/0xc0
[   12.845717]  ? __pfx_kthread+0x10/0x10
[   12.845737]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.845758]  ? calculate_sigpending+0x7b/0xa0
[   12.845783]  ? __pfx_kthread+0x10/0x10
[   12.845804]  ret_from_fork+0x116/0x1d0
[   12.846044]  ? __pfx_kthread+0x10/0x10
[   12.846065]  ret_from_fork_asm+0x1a/0x30
[   12.846099]  </TASK>
[   12.846109] 
[   12.857959] Allocated by task 231:
[   12.858139]  kasan_save_stack+0x45/0x70
[   12.858326]  kasan_save_track+0x18/0x40
[   12.859046]  kasan_save_alloc_info+0x3b/0x50
[   12.859236]  __kasan_slab_alloc+0x91/0xa0
[   12.859625]  kmem_cache_alloc_noprof+0x123/0x3f0
[   12.859838]  kmem_cache_rcu_uaf+0x155/0x510
[   12.860048]  kunit_try_run_case+0x1a5/0x480
[   12.860226]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.860516]  kthread+0x337/0x6f0
[   12.860814]  ret_from_fork+0x116/0x1d0
[   12.861003]  ret_from_fork_asm+0x1a/0x30
[   12.861188] 
[   12.861280] Freed by task 0:
[   12.861402]  kasan_save_stack+0x45/0x70
[   12.861549]  kasan_save_track+0x18/0x40
[   12.861709]  kasan_save_free_info+0x3f/0x60
[   12.862017]  __kasan_slab_free+0x56/0x70
[   12.862215]  slab_free_after_rcu_debug+0xe4/0x310
[   12.862683]  rcu_core+0x66f/0x1c40
[   12.862822]  rcu_core_si+0x12/0x20
[   12.862968]  handle_softirqs+0x209/0x730
[   12.863196]  __irq_exit_rcu+0xc9/0x110
[   12.863372]  irq_exit_rcu+0x12/0x20
[   12.863632]  sysvec_apic_timer_interrupt+0x81/0x90
[   12.863880]  asm_sysvec_apic_timer_interrupt+0x1f/0x30
[   12.864128] 
[   12.864218] Last potentially related work creation:
[   12.864531]  kasan_save_stack+0x45/0x70
[   12.864755]  kasan_record_aux_stack+0xb2/0xc0
[   12.864955]  kmem_cache_free+0x131/0x420
[   12.865095]  kmem_cache_rcu_uaf+0x194/0x510
[   12.865247]  kunit_try_run_case+0x1a5/0x480
[   12.865459]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.865740]  kthread+0x337/0x6f0
[   12.865907]  ret_from_fork+0x116/0x1d0
[   12.866293]  ret_from_fork_asm+0x1a/0x30
[   12.866486] 
[   12.866574] The buggy address belongs to the object at ffff8881026ea000
[   12.866574]  which belongs to the cache test_cache of size 200
[   12.867226] The buggy address is located 0 bytes inside of
[   12.867226]  freed 200-byte region [ffff8881026ea000, ffff8881026ea0c8)
[   12.868013] 
[   12.868132] The buggy address belongs to the physical page:
[   12.868369] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026ea
[   12.868782] flags: 0x200000000000000(node=0|zone=2)
[   12.869032] page_type: f5(slab)
[   12.869199] raw: 0200000000000000 ffff8881015ea780 dead000000000122 0000000000000000
[   12.869561] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   12.869972] page dumped because: kasan: bad access detected
[   12.870223] 
[   12.870320] Memory state around the buggy address:
[   12.870571]  ffff8881026e9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.871071]  ffff8881026e9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.871395] >ffff8881026ea000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.871618]                    ^
[   12.871734]  ffff8881026ea080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   12.872045]  ffff8881026ea100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.872719] ==================================================================

[   13.048230] ==================================================================
[   13.048804] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x3e3/0x510
[   13.049277] Read of size 1 at addr ffff88810341e000 by task kunit_try_catch/230
[   13.049668] 
[   13.049769] CPU: 1 UID: 0 PID: 230 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   13.049820] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.049831] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.049854] Call Trace:
[   13.049867]  <TASK>
[   13.049885]  dump_stack_lvl+0x73/0xb0
[   13.049918]  print_report+0xd1/0x610
[   13.049942]  ? __virt_addr_valid+0x1db/0x2d0
[   13.049992]  ? kmem_cache_rcu_uaf+0x3e3/0x510
[   13.050027]  ? kasan_complete_mode_report_info+0x64/0x200
[   13.050050]  ? kmem_cache_rcu_uaf+0x3e3/0x510
[   13.050073]  kasan_report+0x141/0x180
[   13.050095]  ? kmem_cache_rcu_uaf+0x3e3/0x510
[   13.050122]  __asan_report_load1_noabort+0x18/0x20
[   13.050209]  kmem_cache_rcu_uaf+0x3e3/0x510
[   13.050233]  ? __pfx_kmem_cache_rcu_uaf+0x10/0x10
[   13.050256]  ? finish_task_switch.isra.0+0x153/0x700
[   13.050282]  ? __switch_to+0x47/0xf50
[   13.050312]  ? __pfx_read_tsc+0x10/0x10
[   13.050333]  ? ktime_get_ts64+0x86/0x230
[   13.050380]  kunit_try_run_case+0x1a5/0x480
[   13.050408]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.050430]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.050455]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.050478]  ? __kthread_parkme+0x82/0x180
[   13.050499]  ? preempt_count_sub+0x50/0x80
[   13.050540]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.050564]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.050587]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.050611]  kthread+0x337/0x6f0
[   13.050629]  ? trace_preempt_on+0x20/0xc0
[   13.050654]  ? __pfx_kthread+0x10/0x10
[   13.050674]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.050694]  ? calculate_sigpending+0x7b/0xa0
[   13.050719]  ? __pfx_kthread+0x10/0x10
[   13.050739]  ret_from_fork+0x116/0x1d0
[   13.050758]  ? __pfx_kthread+0x10/0x10
[   13.050778]  ret_from_fork_asm+0x1a/0x30
[   13.051243]  </TASK>
[   13.051257] 
[   13.061494] Allocated by task 230:
[   13.061711]  kasan_save_stack+0x45/0x70
[   13.062260]  kasan_save_track+0x18/0x40
[   13.062445]  kasan_save_alloc_info+0x3b/0x50
[   13.062664]  __kasan_slab_alloc+0x91/0xa0
[   13.062844]  kmem_cache_alloc_noprof+0x123/0x3f0
[   13.063176]  kmem_cache_rcu_uaf+0x155/0x510
[   13.063651]  kunit_try_run_case+0x1a5/0x480
[   13.063952]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.064204]  kthread+0x337/0x6f0
[   13.064380]  ret_from_fork+0x116/0x1d0
[   13.064751]  ret_from_fork_asm+0x1a/0x30
[   13.065056] 
[   13.065188] Freed by task 0:
[   13.065466]  kasan_save_stack+0x45/0x70
[   13.065670]  kasan_save_track+0x18/0x40
[   13.066002]  kasan_save_free_info+0x3f/0x60
[   13.066390]  __kasan_slab_free+0x56/0x70
[   13.066669]  slab_free_after_rcu_debug+0xe4/0x310
[   13.066882]  rcu_core+0x66f/0x1c40
[   13.067256]  rcu_core_si+0x12/0x20
[   13.067734]  handle_softirqs+0x209/0x730
[   13.067916]  __irq_exit_rcu+0xc9/0x110
[   13.068154]  irq_exit_rcu+0x12/0x20
[   13.068612]  sysvec_apic_timer_interrupt+0x81/0x90
[   13.068813]  asm_sysvec_apic_timer_interrupt+0x1f/0x30
[   13.069120] 
[   13.069510] Last potentially related work creation:
[   13.069724]  kasan_save_stack+0x45/0x70
[   13.069919]  kasan_record_aux_stack+0xb2/0xc0
[   13.070199]  kmem_cache_free+0x131/0x420
[   13.070408]  kmem_cache_rcu_uaf+0x194/0x510
[   13.070635]  kunit_try_run_case+0x1a5/0x480
[   13.070843]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.071102]  kthread+0x337/0x6f0
[   13.071425]  ret_from_fork+0x116/0x1d0
[   13.071704]  ret_from_fork_asm+0x1a/0x30
[   13.071885] 
[   13.071991] The buggy address belongs to the object at ffff88810341e000
[   13.071991]  which belongs to the cache test_cache of size 200
[   13.072660] The buggy address is located 0 bytes inside of
[   13.072660]  freed 200-byte region [ffff88810341e000, ffff88810341e0c8)
[   13.073170] 
[   13.073295] The buggy address belongs to the physical page:
[   13.073738] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10341e
[   13.074087] flags: 0x200000000000000(node=0|zone=2)
[   13.074315] page_type: f5(slab)
[   13.074445] raw: 0200000000000000 ffff888100fa1c80 dead000000000122 0000000000000000
[   13.074792] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   13.075123] page dumped because: kasan: bad access detected
[   13.075373] 
[   13.075617] Memory state around the buggy address:
[   13.075786]  ffff88810341df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.076159]  ffff88810341df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.076378] >ffff88810341e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.076651]                    ^
[   13.076812]  ffff88810341e080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   13.077143]  ffff88810341e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.077430] ==================================================================