Hay
Date
July 15, 2025, 2:10 p.m.

Environment
qemu-arm64
qemu-x86_64

[  107.097974] ==================================================================
[  107.099280] BUG: KASAN: use-after-free in strchr+0x20/0x80
[  107.100089] Read of size 1 at addr ffff0000c66ab410 by task kunit_try_catch/248
[  107.101811] 
[  107.102050] CPU: 1 PID: 248 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[  107.102610] Hardware name: linux,dummy-virt (DT)
[  107.102993] Call trace:
[  107.103343]  dump_backtrace+0xe0/0x134
[  107.104075]  show_stack+0x20/0x2c
[  107.104672]  dump_stack_lvl+0x88/0xb4
[  107.105276]  print_report+0x158/0x44c
[  107.105783]  kasan_report+0xc8/0x180
[  107.106350]  __asan_load1+0x68/0x74
[  107.106884]  strchr+0x20/0x80
[  107.107394]  kasan_strings+0xd8/0x530
[  107.107961]  kunit_try_run_case+0x8c/0x124
[  107.108613]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  107.109328]  kthread+0x15c/0x170
[  107.109791]  ret_from_fork+0x10/0x20
[  107.110196] 
[  107.110410] Allocated by task 248:
[  107.110767]  kasan_save_stack+0x3c/0x70
[  107.111222]  kasan_set_track+0x2c/0x40
[  107.111683]  kasan_save_alloc_info+0x24/0x34
[  107.112150]  __kasan_kmalloc+0xd4/0xe0
[  107.112628]  kmalloc_trace+0x8c/0x150
[  107.113038]  kasan_strings+0xa0/0x530
[  107.113517]  kunit_try_run_case+0x8c/0x124
[  107.113989]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  107.114603]  kthread+0x15c/0x170
[  107.115016]  ret_from_fork+0x10/0x20
[  107.115444] 
[  107.115637] Freed by task 248:
[  107.116764]  kasan_save_stack+0x3c/0x70
[  107.117554]  kasan_set_track+0x2c/0x40
[  107.118158]  kasan_save_free_info+0x38/0x5c
[  107.118812]  __kasan_slab_free+0x100/0x170
[  107.119430]  slab_free_freelist_hook+0xd8/0x1c0
[  107.120088]  __kmem_cache_free+0x15c/0x2a0
[  107.121552]  kfree+0x88/0x150
[  107.122081]  kasan_strings+0xc0/0x530
[  107.122686]  kunit_try_run_case+0x8c/0x124
[  107.123318]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  107.124104]  kthread+0x15c/0x170
[  107.125016]  ret_from_fork+0x10/0x20
[  107.125600] 
[  107.125887] The buggy address belongs to the object at ffff0000c66ab400
[  107.125887]  which belongs to the cache kmalloc-128 of size 128
[  107.126866] The buggy address is located 16 bytes inside of
[  107.126866]  128-byte region [ffff0000c66ab400, ffff0000c66ab480)
[  107.127563] 
[  107.127753] The buggy address belongs to the physical page:
[  107.128129] page:0000000069500412 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ab
[  107.129697] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  107.130807] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  107.131812] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  107.132880] page dumped because: kasan: bad access detected
[  107.133561] 
[  107.133992] Memory state around the buggy address:
[  107.134787]  ffff0000c66ab300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  107.135822]  ffff0000c66ab380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  107.136849] >ffff0000c66ab400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  107.137953]                          ^
[  107.138286]  ffff0000c66ab480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  107.138788]  ffff0000c66ab500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  107.139958] ==================================================================

[   76.803113] ==================================================================
[   76.803852] BUG: KASAN: use-after-free in strchr+0x20/0x6c
[   76.804333] Read of size 1 at addr ffff0000c5abca10 by task kunit_try_catch/164
[   76.805669] 
[   76.805998] CPU: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   76.807301] Hardware name: linux,dummy-virt (DT)
[   76.808117] Call trace:
[   76.808561]  dump_backtrace+0xf8/0x118
[   76.809335]  show_stack+0x18/0x24
[   76.809984]  __dump_stack+0x28/0x38
[   76.810609]  dump_stack_lvl+0x54/0x6c
[   76.811256]  print_address_description+0x7c/0x1ec
[   76.812046]  print_report+0x50/0x68
[   76.812753]  kasan_report+0xac/0x100
[   76.813691]  __asan_load1+0x6c/0x70
[   76.814381]  strchr+0x20/0x6c
[   76.814942]  kasan_strings+0xa8/0x404
[   76.815589]  kunit_try_run_case+0x80/0x184
[   76.816308]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.817309]  kthread+0x16c/0x21c
[   76.818101]  ret_from_fork+0x10/0x20
[   76.818501] 
[   76.818688] Allocated by task 164:
[   76.818990]  kasan_set_track+0x4c/0x80
[   76.819408]  kasan_save_alloc_info+0x28/0x34
[   76.819831]  __kasan_kmalloc+0x88/0xa0
[   76.820339]  kmalloc_trace+0x54/0x68
[   76.820880]  kasan_strings+0x48/0x404
[   76.821329]  kunit_try_run_case+0x80/0x184
[   76.822047]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.822643]  kthread+0x16c/0x21c
[   76.823113]  ret_from_fork+0x10/0x20
[   76.823488] 
[   76.823667] Freed by task 164:
[   76.824125]  kasan_set_track+0x4c/0x80
[   76.824629]  kasan_save_free_info+0x3c/0x60
[   76.825129]  ____kasan_slab_free+0xe8/0x140
[   76.825686]  __kasan_slab_free+0x18/0x28
[   76.826203]  __kmem_cache_free+0xdc/0x284
[   76.826682]  kfree+0x60/0x74
[   76.827106]  kasan_strings+0x90/0x404
[   76.827580]  kunit_try_run_case+0x80/0x184
[   76.828041]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.828619]  kthread+0x16c/0x21c
[   76.829066]  ret_from_fork+0x10/0x20
[   76.829500] 
[   76.829698] The buggy address belongs to the object at ffff0000c5abca00
[   76.829698]  which belongs to the cache kmalloc-128 of size 128
[   76.830656] The buggy address is located 16 bytes inside of
[   76.830656]  128-byte region [ffff0000c5abca00, ffff0000c5abca80)
[   76.832021] 
[   76.832232] The buggy address belongs to the physical page:
[   76.832890] page:00000000b0163b2b refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105abc
[   76.833649] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   76.834325] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   76.835171] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   76.835818] page dumped because: kasan: bad access detected
[   76.836293] 
[   76.836483] Memory state around the buggy address:
[   76.837456]  ffff0000c5abc900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   76.838118]  ffff0000c5abc980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.838778] >ffff0000c5abca00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   76.839411]                          ^
[   76.839812]  ffff0000c5abca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.840442]  ffff0000c5abcb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.841202] ==================================================================

[   75.916364] ==================================================================
[   75.917414] BUG: KASAN: use-after-free in strchr+0x20/0x6c
[   75.917907] Read of size 1 at addr ffff0000c58a7510 by task kunit_try_catch/164
[   75.918414] 
[   75.918621] CPU: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   75.920393] Hardware name: linux,dummy-virt (DT)
[   75.921313] Call trace:
[   75.921916]  dump_backtrace+0xf4/0x114
[   75.922717]  show_stack+0x18/0x24
[   75.923508]  __dump_stack+0x28/0x38
[   75.924303]  dump_stack_lvl+0x50/0x68
[   75.925032]  print_address_description+0x7c/0x1ec
[   75.925926]  print_report+0x50/0x68
[   75.926650]  kasan_report+0xac/0xfc
[   75.927390]  __asan_load1+0x6c/0x70
[   75.928202]  strchr+0x20/0x6c
[   75.928795]  kasan_strings+0xa8/0x404
[   75.929602]  kunit_try_run_case+0x80/0x184
[   75.930430]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.931376]  kthread+0x16c/0x21c
[   75.932582]  ret_from_fork+0x10/0x20
[   75.933236] 
[   75.933552] Allocated by task 164:
[   75.934084]  kasan_set_track+0x4c/0x80
[   75.934775]  kasan_save_alloc_info+0x28/0x34
[   75.935341]  __kasan_kmalloc+0x88/0xa0
[   75.936354]  kmalloc_trace+0x54/0x68
[   75.936983]  kasan_strings+0x48/0x404
[   75.937589]  kunit_try_run_case+0x80/0x184
[   75.938254]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.939069]  kthread+0x16c/0x21c
[   75.939525]  ret_from_fork+0x10/0x20
[   75.940144] 
[   75.940612] Freed by task 164:
[   75.941093]  kasan_set_track+0x4c/0x80
[   75.941733]  kasan_save_free_info+0x3c/0x60
[   75.942194]  ____kasan_slab_free+0xe8/0x140
[   75.942639]  __kasan_slab_free+0x18/0x28
[   75.943076]  __kmem_cache_free+0xdc/0x27c
[   75.943484]  kfree+0x60/0x74
[   75.944500]  kasan_strings+0x90/0x404
[   75.945136]  kunit_try_run_case+0x80/0x184
[   75.945810]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.946616]  kthread+0x16c/0x21c
[   75.947209]  ret_from_fork+0x10/0x20
[   75.947857] 
[   75.948078] The buggy address belongs to the object at ffff0000c58a7500
[   75.948078]  which belongs to the cache kmalloc-128 of size 128
[   75.949024] The buggy address is located 16 bytes inside of
[   75.949024]  128-byte region [ffff0000c58a7500, ffff0000c58a7580)
[   75.950197] 
[   75.950401] The buggy address belongs to the physical page:
[   75.950866] page:00000000333134b1 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7
[   75.952127] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   75.953100] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   75.954089] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   75.955002] page dumped because: kasan: bad access detected
[   75.955958] 
[   75.956252] Memory state around the buggy address:
[   75.956887]  ffff0000c58a7400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   75.957789]  ffff0000c58a7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.958679] >ffff0000c58a7500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   75.959375]                          ^
[   75.959719]  ffff0000c58a7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.961129]  ffff0000c58a7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.962030] ==================================================================

[   74.513034] ==================================================================
[   74.514487] BUG: KASAN: use-after-free in strchr+0x20/0x80
[   74.515310] Read of size 1 at addr ffff0000c5938710 by task kunit_try_catch/164
[   74.516309] 
[   74.516649] CPU: 1 PID: 164 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   74.518659] Hardware name: linux,dummy-virt (DT)
[   74.519414] Call trace:
[   74.519830]  dump_backtrace.part.0+0xdc/0xf0
[   74.520551]  show_stack+0x18/0x30
[   74.521150]  dump_stack_lvl+0x64/0x80
[   74.521753]  print_report+0x158/0x438
[   74.522414]  kasan_report+0xb4/0xf4
[   74.522971]  __asan_load1+0x68/0x74
[   74.523547]  strchr+0x20/0x80
[   74.523926]  kasan_strings+0xd0/0x520
[   74.524294]  kunit_try_run_case+0x84/0x120
[   74.524801]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   74.525331]  kthread+0x180/0x190
[   74.525744]  ret_from_fork+0x10/0x20
[   74.526202] 
[   74.526446] Allocated by task 164:
[   74.526838]  kasan_save_stack+0x3c/0x70
[   74.527317]  kasan_set_track+0x2c/0x40
[   74.527908]  kasan_save_alloc_info+0x24/0x34
[   74.528572]  __kasan_kmalloc+0xb8/0xc0
[   74.529139]  kmalloc_trace+0x58/0x6c
[   74.529538]  kasan_strings+0x98/0x520
[   74.530080]  kunit_try_run_case+0x84/0x120
[   74.530492]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   74.530951]  kthread+0x180/0x190
[   74.531266]  ret_from_fork+0x10/0x20
[   74.531845] 
[   74.532104] Freed by task 164:
[   74.532535]  kasan_save_stack+0x3c/0x70
[   74.533089]  kasan_set_track+0x2c/0x40
[   74.533640]  kasan_save_free_info+0x38/0x5c
[   74.534983]  __kasan_slab_free+0xe4/0x150
[   74.535591]  __kmem_cache_free+0x130/0x2a4
[   74.536233]  kfree+0x58/0x80
[   74.536708]  kasan_strings+0xb8/0x520
[   74.537263]  kunit_try_run_case+0x84/0x120
[   74.538019]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   74.538836]  kthread+0x180/0x190
[   74.539334]  ret_from_fork+0x10/0x20
[   74.539892] 
[   74.540152] The buggy address belongs to the object at ffff0000c5938700
[   74.540152]  which belongs to the cache kmalloc-128 of size 128
[   74.541515] The buggy address is located 16 bytes inside of
[   74.541515]  128-byte region [ffff0000c5938700, ffff0000c5938780)
[   74.542482] 
[   74.542667] The buggy address belongs to the physical page:
[   74.543027] page:000000003af4cecf refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105938
[   74.543827] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   74.544733] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   74.545651] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   74.546818] page dumped because: kasan: bad access detected
[   74.547512] 
[   74.547775] Memory state around the buggy address:
[   74.548366]  ffff0000c5938600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   74.549224]  ffff0000c5938680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.550125] >ffff0000c5938700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   74.551050]                          ^
[   74.551605]  ffff0000c5938780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.552712]  ffff0000c5938800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.553161] ==================================================================

[   65.943557] ==================================================================
[   65.944776] BUG: KASAN: use-after-free in strchr+0x1c/0x78
[   65.945204] Read of size 1 at addr ffff0000c59bd910 by task kunit_try_catch/162
[   65.946625] 
[   65.947167] CPU: 1 PID: 162 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   65.948405] Hardware name: linux,dummy-virt (DT)
[   65.949204] Call trace:
[   65.950084]  dump_backtrace+0x110/0x120
[   65.950539]  show_stack+0x18/0x28
[   65.950923]  dump_stack_lvl+0x68/0x84
[   65.951322]  print_report+0x158/0x484
[   65.951782]  kasan_report+0x98/0xe0
[   65.952143]  __asan_load1+0x68/0x78
[   65.952588]  strchr+0x1c/0x78
[   65.952918]  kasan_strings+0xe4/0x4e0
[   65.953339]  kunit_try_run_case+0x7c/0x120
[   65.953759]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   65.954425]  kthread+0x1a4/0x1b8
[   65.954773]  ret_from_fork+0x10/0x20
[   65.955156] 
[   65.955343] Allocated by task 162:
[   65.955624]  kasan_save_stack+0x2c/0x58
[   65.956024]  kasan_set_track+0x2c/0x40
[   65.956390]  kasan_save_alloc_info+0x24/0x38
[   65.956823]  __kasan_kmalloc+0xa0/0xb8
[   65.957187]  kmalloc_trace+0x50/0x68
[   65.957814]  kasan_strings+0xa8/0x4e0
[   65.958204]  kunit_try_run_case+0x7c/0x120
[   65.958656]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   65.959179]  kthread+0x1a4/0x1b8
[   65.959897]  ret_from_fork+0x10/0x20
[   65.960280] 
[   65.960471] Freed by task 162:
[   65.960727]  kasan_save_stack+0x2c/0x58
[   65.961103]  kasan_set_track+0x2c/0x40
[   65.961526]  kasan_save_free_info+0x38/0x60
[   65.962208]  __kasan_slab_free+0xe8/0x158
[   65.962611]  __kmem_cache_free+0x138/0x2b0
[   65.963056]  kfree+0x5c/0x70
[   65.963356]  kasan_strings+0xc8/0x4e0
[   65.963769]  kunit_try_run_case+0x7c/0x120
[   65.964179]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   65.964714]  kthread+0x1a4/0x1b8
[   65.965059]  ret_from_fork+0x10/0x20
[   65.965439] 
[   65.966081] The buggy address belongs to the object at ffff0000c59bd900
[   65.966081]  which belongs to the cache kmalloc-128 of size 128
[   65.966960] The buggy address is located 16 bytes inside of
[   65.966960]  128-byte region [ffff0000c59bd900, ffff0000c59bd980)
[   65.967778] 
[   65.967972] The buggy address belongs to the physical page:
[   65.968389] page:00000000a3aeb2fe refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059bd
[   65.969110] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   65.970019] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   65.970642] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   65.971208] page dumped because: kasan: bad access detected
[   65.971642] 
[   65.971817] Memory state around the buggy address:
[   65.972196]  ffff0000c59bd800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   65.972715]  ffff0000c59bd880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.973300] >ffff0000c59bd900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   65.974744]                          ^
[   65.975083]  ffff0000c59bd980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.975673]  ffff0000c59bda00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.976214] ==================================================================

[   32.076190] ==================================================================
[   32.076835] BUG: KASAN: use-after-free in strchr+0x14/0x60
[   32.077110] Read of size 1 at addr ffff8881037341d0 by task kunit_try_catch/268
[   32.077577] 
[   32.077700] CPU: 1 PID: 268 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   32.078119] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.078659] Call Trace:
[   32.078796]  <TASK>
[   32.078954]  dump_stack_lvl+0x49/0x62
[   32.079229]  print_report+0x189/0x492
[   32.079530]  ? kasan_complete_mode_report_info+0x7c/0x200
[   32.079884]  ? strchr+0x14/0x60
[   32.080102]  kasan_report+0x10c/0x190
[   32.080432]  ? kasan_quarantine_put+0xba/0x1c0
[   32.080665]  ? strchr+0x14/0x60
[   32.080901]  __asan_load1+0x62/0x70
[   32.081099]  strchr+0x14/0x60
[   32.081384]  kasan_strings+0xd9/0x4e0
[   32.081616]  ? kmalloc_oob_right+0x310/0x310
[   32.081876]  ? __kunit_add_resource+0xd1/0x100
[   32.082138]  ? kasan_test_init+0x13e/0x1b0
[   32.082429]  kunit_try_run_case+0x8f/0xd0
[   32.082664]  ? kunit_catch_run_case+0x80/0x80
[   32.082964]  ? kunit_try_catch_throw+0x40/0x40
[   32.083207]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   32.083590]  kthread+0x17b/0x1b0
[   32.084117]  ? kthread_complete_and_exit+0x30/0x30
[   32.084838]  ret_from_fork+0x22/0x30
[   32.085421]  </TASK>
[   32.085576] 
[   32.085684] Allocated by task 268:
[   32.085862]  kasan_save_stack+0x41/0x70
[   32.086088]  kasan_set_track+0x25/0x40
[   32.086668]  kasan_save_alloc_info+0x1e/0x30
[   32.087094]  __kasan_kmalloc+0xb6/0xc0
[   32.087498]  kmalloc_trace+0x48/0xb0
[   32.087852]  kasan_strings+0x99/0x4e0
[   32.088071]  kunit_try_run_case+0x8f/0xd0
[   32.088490]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   32.089093]  kthread+0x17b/0x1b0
[   32.089367]  ret_from_fork+0x22/0x30
[   32.089582] 
[   32.089686] Freed by task 268:
[   32.089849]  kasan_save_stack+0x41/0x70
[   32.090068]  kasan_set_track+0x25/0x40
[   32.090590]  kasan_save_free_info+0x2e/0x50
[   32.091092]  ____kasan_slab_free+0x175/0x1d0
[   32.091501]  __kasan_slab_free+0x12/0x20
[   32.091866]  __kmem_cache_free+0x188/0x2f0
[   32.092119]  kfree+0x78/0x120
[   32.092497]  kasan_strings+0xbd/0x4e0
[   32.092915]  kunit_try_run_case+0x8f/0xd0
[   32.093331]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   32.093621]  kthread+0x17b/0x1b0
[   32.093804]  ret_from_fork+0x22/0x30
[   32.094000] 
[   32.094107] The buggy address belongs to the object at ffff8881037341c0
[   32.094107]  which belongs to the cache kmalloc-32 of size 32
[   32.095121] The buggy address is located 16 bytes inside of
[   32.095121]  32-byte region [ffff8881037341c0, ffff8881037341e0)
[   32.095951] 
[   32.096067] The buggy address belongs to the physical page:
[   32.096455] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103734
[   32.096866] flags: 0x200000000000200(slab|node=0|zone=2)
[   32.097184] raw: 0200000000000200 0000000000000000 dead000000000122 ffff888100041500
[   32.097491] raw: 0000000000000000 0000000080400040 00000001ffffffff 0000000000000000
[   32.097921] page dumped because: kasan: bad access detected
[   32.098144] 
[   32.098239] Memory state around the buggy address:
[   32.098509]  ffff888103734080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   32.099011]  ffff888103734100: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   32.099338] >ffff888103734180: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   32.099647]                                                  ^
[   32.100153]  ffff888103734200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.100494]  ffff888103734280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.100842] ==================================================================