Hay
Date
July 15, 2025, 2:10 p.m.

Environment
qemu-arm64
qemu-x86_64

[  107.181239] ==================================================================
[  107.182177] BUG: KASAN: use-after-free in strcmp+0x2c/0x80
[  107.183235] Read of size 1 at addr ffff0000c66ab410 by task kunit_try_catch/248
[  107.184239] 
[  107.184716] CPU: 1 PID: 248 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[  107.185859] Hardware name: linux,dummy-virt (DT)
[  107.186205] Call trace:
[  107.186436]  dump_backtrace+0xe0/0x134
[  107.186823]  show_stack+0x20/0x2c
[  107.187363]  dump_stack_lvl+0x88/0xb4
[  107.187821]  print_report+0x158/0x44c
[  107.188305]  kasan_report+0xc8/0x180
[  107.188754]  __asan_load1+0x68/0x74
[  107.189222]  strcmp+0x2c/0x80
[  107.189618]  kasan_strings+0x128/0x530
[  107.190108]  kunit_try_run_case+0x8c/0x124
[  107.190569]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  107.191157]  kthread+0x15c/0x170
[  107.191568]  ret_from_fork+0x10/0x20
[  107.192009] 
[  107.192236] Allocated by task 248:
[  107.192591]  kasan_save_stack+0x3c/0x70
[  107.193065]  kasan_set_track+0x2c/0x40
[  107.193693]  kasan_save_alloc_info+0x24/0x34
[  107.194191]  __kasan_kmalloc+0xd4/0xe0
[  107.194627]  kmalloc_trace+0x8c/0x150
[  107.195063]  kasan_strings+0xa0/0x530
[  107.195495]  kunit_try_run_case+0x8c/0x124
[  107.195940]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  107.196565]  kthread+0x15c/0x170
[  107.196956]  ret_from_fork+0x10/0x20
[  107.197536] 
[  107.197763] Freed by task 248:
[  107.198071]  kasan_save_stack+0x3c/0x70
[  107.198536]  kasan_set_track+0x2c/0x40
[  107.198950]  kasan_save_free_info+0x38/0x5c
[  107.199450]  __kasan_slab_free+0x100/0x170
[  107.199969]  slab_free_freelist_hook+0xd8/0x1c0
[  107.200472]  __kmem_cache_free+0x15c/0x2a0
[  107.200955]  kfree+0x88/0x150
[  107.201327]  kasan_strings+0xc0/0x530
[  107.201740]  kunit_try_run_case+0x8c/0x124
[  107.202247]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  107.202807]  kthread+0x15c/0x170
[  107.203308]  ret_from_fork+0x10/0x20
[  107.203852] 
[  107.204172] The buggy address belongs to the object at ffff0000c66ab400
[  107.204172]  which belongs to the cache kmalloc-128 of size 128
[  107.205537] The buggy address is located 16 bytes inside of
[  107.205537]  128-byte region [ffff0000c66ab400, ffff0000c66ab480)
[  107.206794] 
[  107.207127] The buggy address belongs to the physical page:
[  107.207721] page:0000000069500412 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ab
[  107.208640] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  107.209525] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  107.210289] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  107.211024] page dumped because: kasan: bad access detected
[  107.211585] 
[  107.211916] Memory state around the buggy address:
[  107.212430]  ffff0000c66ab300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  107.213050]  ffff0000c66ab380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  107.213960] >ffff0000c66ab400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  107.214648]                          ^
[  107.215173]  ffff0000c66ab480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  107.215915]  ffff0000c66ab500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  107.216618] ==================================================================

[   76.877662] ==================================================================
[   76.878250] BUG: KASAN: use-after-free in strcmp+0x30/0x84
[   76.878793] Read of size 1 at addr ffff0000c5abca10 by task kunit_try_catch/164
[   76.879388] 
[   76.879614] CPU: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   76.880360] Hardware name: linux,dummy-virt (DT)
[   76.881042] Call trace:
[   76.881320]  dump_backtrace+0xf8/0x118
[   76.881790]  show_stack+0x18/0x24
[   76.882248]  __dump_stack+0x28/0x38
[   76.882657]  dump_stack_lvl+0x54/0x6c
[   76.883129]  print_address_description+0x7c/0x1ec
[   76.883697]  print_report+0x50/0x68
[   76.884178]  kasan_report+0xac/0x100
[   76.884634]  __asan_load1+0x6c/0x70
[   76.885161]  strcmp+0x30/0x84
[   76.885551]  kasan_strings+0x148/0x404
[   76.885992]  kunit_try_run_case+0x80/0x184
[   76.886460]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.887537]  kthread+0x16c/0x21c
[   76.887982]  ret_from_fork+0x10/0x20
[   76.888446] 
[   76.888636] Allocated by task 164:
[   76.889221]  kasan_set_track+0x4c/0x80
[   76.889718]  kasan_save_alloc_info+0x28/0x34
[   76.890181]  __kasan_kmalloc+0x88/0xa0
[   76.890683]  kmalloc_trace+0x54/0x68
[   76.891110]  kasan_strings+0x48/0x404
[   76.891571]  kunit_try_run_case+0x80/0x184
[   76.892047]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.893088]  kthread+0x16c/0x21c
[   76.893522]  ret_from_fork+0x10/0x20
[   76.893995] 
[   76.894181] Freed by task 164:
[   76.894516]  kasan_set_track+0x4c/0x80
[   76.895013]  kasan_save_free_info+0x3c/0x60
[   76.895457]  ____kasan_slab_free+0xe8/0x140
[   76.895983]  __kasan_slab_free+0x18/0x28
[   76.896455]  __kmem_cache_free+0xdc/0x284
[   76.897077]  kfree+0x60/0x74
[   76.897496]  kasan_strings+0x90/0x404
[   76.897974]  kunit_try_run_case+0x80/0x184
[   76.898453]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.899187]  kthread+0x16c/0x21c
[   76.899603]  ret_from_fork+0x10/0x20
[   76.900057] 
[   76.900248] The buggy address belongs to the object at ffff0000c5abca00
[   76.900248]  which belongs to the cache kmalloc-128 of size 128
[   76.901686] The buggy address is located 16 bytes inside of
[   76.901686]  128-byte region [ffff0000c5abca00, ffff0000c5abca80)
[   76.902588] 
[   76.902819] The buggy address belongs to the physical page:
[   76.903270] page:00000000b0163b2b refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105abc
[   76.904055] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   76.905013] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   76.905705] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   76.906362] page dumped because: kasan: bad access detected
[   76.906846] 
[   76.907043] Memory state around the buggy address:
[   76.907475]  ffff0000c5abc900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   76.908123]  ffff0000c5abc980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.909241] >ffff0000c5abca00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   76.909825]                          ^
[   76.910230]  ffff0000c5abca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.910890]  ffff0000c5abcb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.911512] ==================================================================

[   76.011985] ==================================================================
[   76.012888] BUG: KASAN: use-after-free in strcmp+0x30/0x84
[   76.013662] Read of size 1 at addr ffff0000c58a7510 by task kunit_try_catch/164
[   76.014575] 
[   76.014872] CPU: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   76.016001] Hardware name: linux,dummy-virt (DT)
[   76.016837] Call trace:
[   76.017317]  dump_backtrace+0xf4/0x114
[   76.018022]  show_stack+0x18/0x24
[   76.018667]  __dump_stack+0x28/0x38
[   76.019272]  dump_stack_lvl+0x50/0x68
[   76.019975]  print_address_description+0x7c/0x1ec
[   76.020885]  print_report+0x50/0x68
[   76.021555]  kasan_report+0xac/0xfc
[   76.022196]  __asan_load1+0x6c/0x70
[   76.022692]  strcmp+0x30/0x84
[   76.023039]  kasan_strings+0x148/0x404
[   76.023436]  kunit_try_run_case+0x80/0x184
[   76.023940]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.024833]  kthread+0x16c/0x21c
[   76.025453]  ret_from_fork+0x10/0x20
[   76.025929] 
[   76.026119] Allocated by task 164:
[   76.026409]  kasan_set_track+0x4c/0x80
[   76.026985]  kasan_save_alloc_info+0x28/0x34
[   76.027705]  __kasan_kmalloc+0x88/0xa0
[   76.028431]  kmalloc_trace+0x54/0x68
[   76.029096]  kasan_strings+0x48/0x404
[   76.029783]  kunit_try_run_case+0x80/0x184
[   76.030508]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.031376]  kthread+0x16c/0x21c
[   76.032177]  ret_from_fork+0x10/0x20
[   76.032962] 
[   76.033247] Freed by task 164:
[   76.033798]  kasan_set_track+0x4c/0x80
[   76.034463]  kasan_save_free_info+0x3c/0x60
[   76.035134]  ____kasan_slab_free+0xe8/0x140
[   76.035906]  __kasan_slab_free+0x18/0x28
[   76.036420]  __kmem_cache_free+0xdc/0x27c
[   76.036846]  kfree+0x60/0x74
[   76.037184]  kasan_strings+0x90/0x404
[   76.037575]  kunit_try_run_case+0x80/0x184
[   76.037999]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.038494]  kthread+0x16c/0x21c
[   76.039032]  ret_from_fork+0x10/0x20
[   76.039613] 
[   76.039900] The buggy address belongs to the object at ffff0000c58a7500
[   76.039900]  which belongs to the cache kmalloc-128 of size 128
[   76.041499] The buggy address is located 16 bytes inside of
[   76.041499]  128-byte region [ffff0000c58a7500, ffff0000c58a7580)
[   76.042973] 
[   76.043271] The buggy address belongs to the physical page:
[   76.044286] page:00000000333134b1 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7
[   76.045468] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   76.046415] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   76.047408] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   76.048466] page dumped because: kasan: bad access detected
[   76.049524] 
[   76.049831] Memory state around the buggy address:
[   76.050463]  ffff0000c58a7400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   76.051365]  ffff0000c58a7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.052376] >ffff0000c58a7500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   76.053508]                          ^
[   76.054055]  ffff0000c58a7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.054955]  ffff0000c58a7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.055858] ==================================================================

[   74.601507] ==================================================================
[   74.602347] BUG: KASAN: use-after-free in strcmp+0x2c/0x80
[   74.602898] Read of size 1 at addr ffff0000c5938710 by task kunit_try_catch/164
[   74.603531] 
[   74.603780] CPU: 1 PID: 164 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   74.604453] Hardware name: linux,dummy-virt (DT)
[   74.604842] Call trace:
[   74.605118]  dump_backtrace.part.0+0xdc/0xf0
[   74.605651]  show_stack+0x18/0x30
[   74.606083]  dump_stack_lvl+0x64/0x80
[   74.606525]  print_report+0x158/0x438
[   74.607011]  kasan_report+0xb4/0xf4
[   74.607457]  __asan_load1+0x68/0x74
[   74.607891]  strcmp+0x2c/0x80
[   74.608323]  kasan_strings+0x120/0x520
[   74.608949]  kunit_try_run_case+0x84/0x120
[   74.609430]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   74.610105]  kthread+0x180/0x190
[   74.610542]  ret_from_fork+0x10/0x20
[   74.610966] 
[   74.611151] Allocated by task 164:
[   74.611483]  kasan_save_stack+0x3c/0x70
[   74.611868]  kasan_set_track+0x2c/0x40
[   74.612310]  kasan_save_alloc_info+0x24/0x34
[   74.612798]  __kasan_kmalloc+0xb8/0xc0
[   74.613203]  kmalloc_trace+0x58/0x6c
[   74.613648]  kasan_strings+0x98/0x520
[   74.614231]  kunit_try_run_case+0x84/0x120
[   74.614758]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   74.615314]  kthread+0x180/0x190
[   74.615833]  ret_from_fork+0x10/0x20
[   74.616369] 
[   74.616636] Freed by task 164:
[   74.617053]  kasan_save_stack+0x3c/0x70
[   74.617618]  kasan_set_track+0x2c/0x40
[   74.618366]  kasan_save_free_info+0x38/0x5c
[   74.619065]  __kasan_slab_free+0xe4/0x150
[   74.619678]  __kmem_cache_free+0x130/0x2a4
[   74.620337]  kfree+0x58/0x80
[   74.620839]  kasan_strings+0xb8/0x520
[   74.621434]  kunit_try_run_case+0x84/0x120
[   74.622208]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   74.622697]  kthread+0x180/0x190
[   74.623009]  ret_from_fork+0x10/0x20
[   74.623344] 
[   74.624162] The buggy address belongs to the object at ffff0000c5938700
[   74.624162]  which belongs to the cache kmalloc-128 of size 128
[   74.625536] The buggy address is located 16 bytes inside of
[   74.625536]  128-byte region [ffff0000c5938700, ffff0000c5938780)
[   74.627234] 
[   74.627534] The buggy address belongs to the physical page:
[   74.628226] page:000000003af4cecf refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105938
[   74.629321] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   74.630430] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   74.631351] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   74.632011] page dumped because: kasan: bad access detected
[   74.632360] 
[   74.632629] Memory state around the buggy address:
[   74.633229]  ffff0000c5938600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   74.634293]  ffff0000c5938680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.635162] >ffff0000c5938700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   74.635988]                          ^
[   74.636450]  ffff0000c5938780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.636920]  ffff0000c5938800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.637354] ==================================================================

[   66.007427] ==================================================================
[   66.007951] BUG: KASAN: use-after-free in strcmp+0x2c/0x78
[   66.008922] Read of size 1 at addr ffff0000c59bd910 by task kunit_try_catch/162
[   66.009536] 
[   66.010886] CPU: 1 PID: 162 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   66.011413] Hardware name: linux,dummy-virt (DT)
[   66.011716] Call trace:
[   66.011914]  dump_backtrace+0x110/0x120
[   66.012293]  show_stack+0x18/0x28
[   66.012634]  dump_stack_lvl+0x68/0x84
[   66.012968]  print_report+0x158/0x484
[   66.013351]  kasan_report+0x98/0xe0
[   66.014485]  __asan_load1+0x68/0x78
[   66.015159]  strcmp+0x2c/0x78
[   66.015790]  kasan_strings+0x144/0x4e0
[   66.016532]  kunit_try_run_case+0x7c/0x120
[   66.017324]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   66.018333]  kthread+0x1a4/0x1b8
[   66.018996]  ret_from_fork+0x10/0x20
[   66.019692] 
[   66.020089] Allocated by task 162:
[   66.020671]  kasan_save_stack+0x2c/0x58
[   66.021353]  kasan_set_track+0x2c/0x40
[   66.022107]  kasan_save_alloc_info+0x24/0x38
[   66.022905]  __kasan_kmalloc+0xa0/0xb8
[   66.023627]  kmalloc_trace+0x50/0x68
[   66.024186]  kasan_strings+0xa8/0x4e0
[   66.024774]  kunit_try_run_case+0x7c/0x120
[   66.025399]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   66.026249]  kthread+0x1a4/0x1b8
[   66.026789]  ret_from_fork+0x10/0x20
[   66.027355] 
[   66.027626] Freed by task 162:
[   66.028052]  kasan_save_stack+0x2c/0x58
[   66.028627]  kasan_set_track+0x2c/0x40
[   66.029156]  kasan_save_free_info+0x38/0x60
[   66.029871]  __kasan_slab_free+0xe8/0x158
[   66.030492]  __kmem_cache_free+0x138/0x2b0
[   66.031127]  kfree+0x5c/0x70
[   66.031603]  kasan_strings+0xc8/0x4e0
[   66.032162]  kunit_try_run_case+0x7c/0x120
[   66.032601]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   66.033019]  kthread+0x1a4/0x1b8
[   66.033330]  ret_from_fork+0x10/0x20
[   66.034121] 
[   66.034393] The buggy address belongs to the object at ffff0000c59bd900
[   66.034393]  which belongs to the cache kmalloc-128 of size 128
[   66.035322] The buggy address is located 16 bytes inside of
[   66.035322]  128-byte region [ffff0000c59bd900, ffff0000c59bd980)
[   66.035938] 
[   66.036093] The buggy address belongs to the physical page:
[   66.036659] page:00000000a3aeb2fe refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059bd
[   66.038471] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   66.039366] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   66.040260] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   66.041097] page dumped because: kasan: bad access detected
[   66.042053] 
[   66.042326] Memory state around the buggy address:
[   66.042906]  ffff0000c59bd800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   66.043727]  ffff0000c59bd880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.044552] >ffff0000c59bd900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   66.045193]                          ^
[   66.046005]  ffff0000c59bd980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.046853]  ffff0000c59bda00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.047664] ==================================================================

[   32.127293] ==================================================================
[   32.127653] BUG: KASAN: use-after-free in strcmp+0x22/0x60
[   32.128090] Read of size 1 at addr ffff8881037341d0 by task kunit_try_catch/268
[   32.128691] 
[   32.128959] CPU: 1 PID: 268 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   32.129553] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.130075] Call Trace:
[   32.130262]  <TASK>
[   32.130470]  dump_stack_lvl+0x49/0x62
[   32.130729]  print_report+0x189/0x492
[   32.131323]  ? kasan_complete_mode_report_info+0x7c/0x200
[   32.131844]  ? strcmp+0x22/0x60
[   32.132155]  kasan_report+0x10c/0x190
[   32.132594]  ? kasan_quarantine_put+0xba/0x1c0
[   32.132994]  ? strcmp+0x22/0x60
[   32.133406]  __asan_load1+0x62/0x70
[   32.133730]  strcmp+0x22/0x60
[   32.134043]  kasan_strings+0x14d/0x4e0
[   32.134504]  ? kmalloc_oob_right+0x310/0x310
[   32.134789]  ? __kunit_add_resource+0xd1/0x100
[   32.135174]  ? kasan_test_init+0x13e/0x1b0
[   32.135635]  kunit_try_run_case+0x8f/0xd0
[   32.136014]  ? kunit_catch_run_case+0x80/0x80
[   32.136409]  ? kunit_try_catch_throw+0x40/0x40
[   32.136798]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   32.137255]  kthread+0x17b/0x1b0
[   32.137579]  ? kthread_complete_and_exit+0x30/0x30
[   32.137885]  ret_from_fork+0x22/0x30
[   32.138105]  </TASK>
[   32.138482] 
[   32.138599] Allocated by task 268:
[   32.138989]  kasan_save_stack+0x41/0x70
[   32.139260]  kasan_set_track+0x25/0x40
[   32.139597]  kasan_save_alloc_info+0x1e/0x30
[   32.140283]  __kasan_kmalloc+0xb6/0xc0
[   32.140665]  kmalloc_trace+0x48/0xb0
[   32.140929]  kasan_strings+0x99/0x4e0
[   32.141394]  kunit_try_run_case+0x8f/0xd0
[   32.141803]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   32.142144]  kthread+0x17b/0x1b0
[   32.142644]  ret_from_fork+0x22/0x30
[   32.142848] 
[   32.142980] Freed by task 268:
[   32.143455]  kasan_save_stack+0x41/0x70
[   32.143805]  kasan_set_track+0x25/0x40
[   32.144150]  kasan_save_free_info+0x2e/0x50
[   32.144528]  ____kasan_slab_free+0x175/0x1d0
[   32.144949]  __kasan_slab_free+0x12/0x20
[   32.145357]  __kmem_cache_free+0x188/0x2f0
[   32.145712]  kfree+0x78/0x120
[   32.145904]  kasan_strings+0xbd/0x4e0
[   32.146109]  kunit_try_run_case+0x8f/0xd0
[   32.146403]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   32.146976]  kthread+0x17b/0x1b0
[   32.147200]  ret_from_fork+0x22/0x30
[   32.147438] 
[   32.147626] The buggy address belongs to the object at ffff8881037341c0
[   32.147626]  which belongs to the cache kmalloc-32 of size 32
[   32.148678] The buggy address is located 16 bytes inside of
[   32.148678]  32-byte region [ffff8881037341c0, ffff8881037341e0)
[   32.149368] 
[   32.149609] The buggy address belongs to the physical page:
[   32.150007] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103734
[   32.150640] flags: 0x200000000000200(slab|node=0|zone=2)
[   32.151137] raw: 0200000000000200 0000000000000000 dead000000000122 ffff888100041500
[   32.151481] raw: 0000000000000000 0000000080400040 00000001ffffffff 0000000000000000
[   32.152125] page dumped because: kasan: bad access detected
[   32.152594] 
[   32.152690] Memory state around the buggy address:
[   32.152952]  ffff888103734080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   32.153489]  ffff888103734100: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   32.153916] >ffff888103734180: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   32.154230]                                                  ^
[   32.154615]  ffff888103734200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.155016]  ffff888103734280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.155688] ==================================================================