Date
July 15, 2025, 2:10 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 107.181239] ================================================================== [ 107.182177] BUG: KASAN: use-after-free in strcmp+0x2c/0x80 [ 107.183235] Read of size 1 at addr ffff0000c66ab410 by task kunit_try_catch/248 [ 107.184239] [ 107.184716] CPU: 1 PID: 248 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 107.185859] Hardware name: linux,dummy-virt (DT) [ 107.186205] Call trace: [ 107.186436] dump_backtrace+0xe0/0x134 [ 107.186823] show_stack+0x20/0x2c [ 107.187363] dump_stack_lvl+0x88/0xb4 [ 107.187821] print_report+0x158/0x44c [ 107.188305] kasan_report+0xc8/0x180 [ 107.188754] __asan_load1+0x68/0x74 [ 107.189222] strcmp+0x2c/0x80 [ 107.189618] kasan_strings+0x128/0x530 [ 107.190108] kunit_try_run_case+0x8c/0x124 [ 107.190569] kunit_generic_run_threadfn_adapter+0x38/0x54 [ 107.191157] kthread+0x15c/0x170 [ 107.191568] ret_from_fork+0x10/0x20 [ 107.192009] [ 107.192236] Allocated by task 248: [ 107.192591] kasan_save_stack+0x3c/0x70 [ 107.193065] kasan_set_track+0x2c/0x40 [ 107.193693] kasan_save_alloc_info+0x24/0x34 [ 107.194191] __kasan_kmalloc+0xd4/0xe0 [ 107.194627] kmalloc_trace+0x8c/0x150 [ 107.195063] kasan_strings+0xa0/0x530 [ 107.195495] kunit_try_run_case+0x8c/0x124 [ 107.195940] kunit_generic_run_threadfn_adapter+0x38/0x54 [ 107.196565] kthread+0x15c/0x170 [ 107.196956] ret_from_fork+0x10/0x20 [ 107.197536] [ 107.197763] Freed by task 248: [ 107.198071] kasan_save_stack+0x3c/0x70 [ 107.198536] kasan_set_track+0x2c/0x40 [ 107.198950] kasan_save_free_info+0x38/0x5c [ 107.199450] __kasan_slab_free+0x100/0x170 [ 107.199969] slab_free_freelist_hook+0xd8/0x1c0 [ 107.200472] __kmem_cache_free+0x15c/0x2a0 [ 107.200955] kfree+0x88/0x150 [ 107.201327] kasan_strings+0xc0/0x530 [ 107.201740] kunit_try_run_case+0x8c/0x124 [ 107.202247] kunit_generic_run_threadfn_adapter+0x38/0x54 [ 107.202807] kthread+0x15c/0x170 [ 107.203308] ret_from_fork+0x10/0x20 [ 107.203852] [ 107.204172] The buggy address belongs to the object at ffff0000c66ab400 [ 107.204172] which belongs to the cache kmalloc-128 of size 128 [ 107.205537] The buggy address is located 16 bytes inside of [ 107.205537] 128-byte region [ffff0000c66ab400, ffff0000c66ab480) [ 107.206794] [ 107.207127] The buggy address belongs to the physical page: [ 107.207721] page:0000000069500412 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ab [ 107.208640] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 107.209525] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 107.210289] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 107.211024] page dumped because: kasan: bad access detected [ 107.211585] [ 107.211916] Memory state around the buggy address: [ 107.212430] ffff0000c66ab300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 107.213050] ffff0000c66ab380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 107.213960] >ffff0000c66ab400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 107.214648] ^ [ 107.215173] ffff0000c66ab480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 107.215915] ffff0000c66ab500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 107.216618] ==================================================================
[ 76.877662] ================================================================== [ 76.878250] BUG: KASAN: use-after-free in strcmp+0x30/0x84 [ 76.878793] Read of size 1 at addr ffff0000c5abca10 by task kunit_try_catch/164 [ 76.879388] [ 76.879614] CPU: 0 PID: 164 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 76.880360] Hardware name: linux,dummy-virt (DT) [ 76.881042] Call trace: [ 76.881320] dump_backtrace+0xf8/0x118 [ 76.881790] show_stack+0x18/0x24 [ 76.882248] __dump_stack+0x28/0x38 [ 76.882657] dump_stack_lvl+0x54/0x6c [ 76.883129] print_address_description+0x7c/0x1ec [ 76.883697] print_report+0x50/0x68 [ 76.884178] kasan_report+0xac/0x100 [ 76.884634] __asan_load1+0x6c/0x70 [ 76.885161] strcmp+0x30/0x84 [ 76.885551] kasan_strings+0x148/0x404 [ 76.885992] kunit_try_run_case+0x80/0x184 [ 76.886460] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.887537] kthread+0x16c/0x21c [ 76.887982] ret_from_fork+0x10/0x20 [ 76.888446] [ 76.888636] Allocated by task 164: [ 76.889221] kasan_set_track+0x4c/0x80 [ 76.889718] kasan_save_alloc_info+0x28/0x34 [ 76.890181] __kasan_kmalloc+0x88/0xa0 [ 76.890683] kmalloc_trace+0x54/0x68 [ 76.891110] kasan_strings+0x48/0x404 [ 76.891571] kunit_try_run_case+0x80/0x184 [ 76.892047] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.893088] kthread+0x16c/0x21c [ 76.893522] ret_from_fork+0x10/0x20 [ 76.893995] [ 76.894181] Freed by task 164: [ 76.894516] kasan_set_track+0x4c/0x80 [ 76.895013] kasan_save_free_info+0x3c/0x60 [ 76.895457] ____kasan_slab_free+0xe8/0x140 [ 76.895983] __kasan_slab_free+0x18/0x28 [ 76.896455] __kmem_cache_free+0xdc/0x284 [ 76.897077] kfree+0x60/0x74 [ 76.897496] kasan_strings+0x90/0x404 [ 76.897974] kunit_try_run_case+0x80/0x184 [ 76.898453] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.899187] kthread+0x16c/0x21c [ 76.899603] ret_from_fork+0x10/0x20 [ 76.900057] [ 76.900248] The buggy address belongs to the object at ffff0000c5abca00 [ 76.900248] which belongs to the cache kmalloc-128 of size 128 [ 76.901686] The buggy address is located 16 bytes inside of [ 76.901686] 128-byte region [ffff0000c5abca00, ffff0000c5abca80) [ 76.902588] [ 76.902819] The buggy address belongs to the physical page: [ 76.903270] page:00000000b0163b2b refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105abc [ 76.904055] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 76.905013] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 76.905705] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 76.906362] page dumped because: kasan: bad access detected [ 76.906846] [ 76.907043] Memory state around the buggy address: [ 76.907475] ffff0000c5abc900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 76.908123] ffff0000c5abc980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.909241] >ffff0000c5abca00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 76.909825] ^ [ 76.910230] ffff0000c5abca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.910890] ffff0000c5abcb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.911512] ==================================================================
[ 76.011985] ================================================================== [ 76.012888] BUG: KASAN: use-after-free in strcmp+0x30/0x84 [ 76.013662] Read of size 1 at addr ffff0000c58a7510 by task kunit_try_catch/164 [ 76.014575] [ 76.014872] CPU: 0 PID: 164 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 76.016001] Hardware name: linux,dummy-virt (DT) [ 76.016837] Call trace: [ 76.017317] dump_backtrace+0xf4/0x114 [ 76.018022] show_stack+0x18/0x24 [ 76.018667] __dump_stack+0x28/0x38 [ 76.019272] dump_stack_lvl+0x50/0x68 [ 76.019975] print_address_description+0x7c/0x1ec [ 76.020885] print_report+0x50/0x68 [ 76.021555] kasan_report+0xac/0xfc [ 76.022196] __asan_load1+0x6c/0x70 [ 76.022692] strcmp+0x30/0x84 [ 76.023039] kasan_strings+0x148/0x404 [ 76.023436] kunit_try_run_case+0x80/0x184 [ 76.023940] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.024833] kthread+0x16c/0x21c [ 76.025453] ret_from_fork+0x10/0x20 [ 76.025929] [ 76.026119] Allocated by task 164: [ 76.026409] kasan_set_track+0x4c/0x80 [ 76.026985] kasan_save_alloc_info+0x28/0x34 [ 76.027705] __kasan_kmalloc+0x88/0xa0 [ 76.028431] kmalloc_trace+0x54/0x68 [ 76.029096] kasan_strings+0x48/0x404 [ 76.029783] kunit_try_run_case+0x80/0x184 [ 76.030508] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.031376] kthread+0x16c/0x21c [ 76.032177] ret_from_fork+0x10/0x20 [ 76.032962] [ 76.033247] Freed by task 164: [ 76.033798] kasan_set_track+0x4c/0x80 [ 76.034463] kasan_save_free_info+0x3c/0x60 [ 76.035134] ____kasan_slab_free+0xe8/0x140 [ 76.035906] __kasan_slab_free+0x18/0x28 [ 76.036420] __kmem_cache_free+0xdc/0x27c [ 76.036846] kfree+0x60/0x74 [ 76.037184] kasan_strings+0x90/0x404 [ 76.037575] kunit_try_run_case+0x80/0x184 [ 76.037999] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.038494] kthread+0x16c/0x21c [ 76.039032] ret_from_fork+0x10/0x20 [ 76.039613] [ 76.039900] The buggy address belongs to the object at ffff0000c58a7500 [ 76.039900] which belongs to the cache kmalloc-128 of size 128 [ 76.041499] The buggy address is located 16 bytes inside of [ 76.041499] 128-byte region [ffff0000c58a7500, ffff0000c58a7580) [ 76.042973] [ 76.043271] The buggy address belongs to the physical page: [ 76.044286] page:00000000333134b1 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7 [ 76.045468] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 76.046415] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 76.047408] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 76.048466] page dumped because: kasan: bad access detected [ 76.049524] [ 76.049831] Memory state around the buggy address: [ 76.050463] ffff0000c58a7400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 76.051365] ffff0000c58a7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.052376] >ffff0000c58a7500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 76.053508] ^ [ 76.054055] ffff0000c58a7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.054955] ffff0000c58a7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.055858] ==================================================================
[ 74.601507] ================================================================== [ 74.602347] BUG: KASAN: use-after-free in strcmp+0x2c/0x80 [ 74.602898] Read of size 1 at addr ffff0000c5938710 by task kunit_try_catch/164 [ 74.603531] [ 74.603780] CPU: 1 PID: 164 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 74.604453] Hardware name: linux,dummy-virt (DT) [ 74.604842] Call trace: [ 74.605118] dump_backtrace.part.0+0xdc/0xf0 [ 74.605651] show_stack+0x18/0x30 [ 74.606083] dump_stack_lvl+0x64/0x80 [ 74.606525] print_report+0x158/0x438 [ 74.607011] kasan_report+0xb4/0xf4 [ 74.607457] __asan_load1+0x68/0x74 [ 74.607891] strcmp+0x2c/0x80 [ 74.608323] kasan_strings+0x120/0x520 [ 74.608949] kunit_try_run_case+0x84/0x120 [ 74.609430] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 74.610105] kthread+0x180/0x190 [ 74.610542] ret_from_fork+0x10/0x20 [ 74.610966] [ 74.611151] Allocated by task 164: [ 74.611483] kasan_save_stack+0x3c/0x70 [ 74.611868] kasan_set_track+0x2c/0x40 [ 74.612310] kasan_save_alloc_info+0x24/0x34 [ 74.612798] __kasan_kmalloc+0xb8/0xc0 [ 74.613203] kmalloc_trace+0x58/0x6c [ 74.613648] kasan_strings+0x98/0x520 [ 74.614231] kunit_try_run_case+0x84/0x120 [ 74.614758] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 74.615314] kthread+0x180/0x190 [ 74.615833] ret_from_fork+0x10/0x20 [ 74.616369] [ 74.616636] Freed by task 164: [ 74.617053] kasan_save_stack+0x3c/0x70 [ 74.617618] kasan_set_track+0x2c/0x40 [ 74.618366] kasan_save_free_info+0x38/0x5c [ 74.619065] __kasan_slab_free+0xe4/0x150 [ 74.619678] __kmem_cache_free+0x130/0x2a4 [ 74.620337] kfree+0x58/0x80 [ 74.620839] kasan_strings+0xb8/0x520 [ 74.621434] kunit_try_run_case+0x84/0x120 [ 74.622208] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 74.622697] kthread+0x180/0x190 [ 74.623009] ret_from_fork+0x10/0x20 [ 74.623344] [ 74.624162] The buggy address belongs to the object at ffff0000c5938700 [ 74.624162] which belongs to the cache kmalloc-128 of size 128 [ 74.625536] The buggy address is located 16 bytes inside of [ 74.625536] 128-byte region [ffff0000c5938700, ffff0000c5938780) [ 74.627234] [ 74.627534] The buggy address belongs to the physical page: [ 74.628226] page:000000003af4cecf refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105938 [ 74.629321] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 74.630430] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 74.631351] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 74.632011] page dumped because: kasan: bad access detected [ 74.632360] [ 74.632629] Memory state around the buggy address: [ 74.633229] ffff0000c5938600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 74.634293] ffff0000c5938680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.635162] >ffff0000c5938700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 74.635988] ^ [ 74.636450] ffff0000c5938780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.636920] ffff0000c5938800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.637354] ==================================================================
[ 66.007427] ================================================================== [ 66.007951] BUG: KASAN: use-after-free in strcmp+0x2c/0x78 [ 66.008922] Read of size 1 at addr ffff0000c59bd910 by task kunit_try_catch/162 [ 66.009536] [ 66.010886] CPU: 1 PID: 162 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 66.011413] Hardware name: linux,dummy-virt (DT) [ 66.011716] Call trace: [ 66.011914] dump_backtrace+0x110/0x120 [ 66.012293] show_stack+0x18/0x28 [ 66.012634] dump_stack_lvl+0x68/0x84 [ 66.012968] print_report+0x158/0x484 [ 66.013351] kasan_report+0x98/0xe0 [ 66.014485] __asan_load1+0x68/0x78 [ 66.015159] strcmp+0x2c/0x78 [ 66.015790] kasan_strings+0x144/0x4e0 [ 66.016532] kunit_try_run_case+0x7c/0x120 [ 66.017324] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 66.018333] kthread+0x1a4/0x1b8 [ 66.018996] ret_from_fork+0x10/0x20 [ 66.019692] [ 66.020089] Allocated by task 162: [ 66.020671] kasan_save_stack+0x2c/0x58 [ 66.021353] kasan_set_track+0x2c/0x40 [ 66.022107] kasan_save_alloc_info+0x24/0x38 [ 66.022905] __kasan_kmalloc+0xa0/0xb8 [ 66.023627] kmalloc_trace+0x50/0x68 [ 66.024186] kasan_strings+0xa8/0x4e0 [ 66.024774] kunit_try_run_case+0x7c/0x120 [ 66.025399] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 66.026249] kthread+0x1a4/0x1b8 [ 66.026789] ret_from_fork+0x10/0x20 [ 66.027355] [ 66.027626] Freed by task 162: [ 66.028052] kasan_save_stack+0x2c/0x58 [ 66.028627] kasan_set_track+0x2c/0x40 [ 66.029156] kasan_save_free_info+0x38/0x60 [ 66.029871] __kasan_slab_free+0xe8/0x158 [ 66.030492] __kmem_cache_free+0x138/0x2b0 [ 66.031127] kfree+0x5c/0x70 [ 66.031603] kasan_strings+0xc8/0x4e0 [ 66.032162] kunit_try_run_case+0x7c/0x120 [ 66.032601] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 66.033019] kthread+0x1a4/0x1b8 [ 66.033330] ret_from_fork+0x10/0x20 [ 66.034121] [ 66.034393] The buggy address belongs to the object at ffff0000c59bd900 [ 66.034393] which belongs to the cache kmalloc-128 of size 128 [ 66.035322] The buggy address is located 16 bytes inside of [ 66.035322] 128-byte region [ffff0000c59bd900, ffff0000c59bd980) [ 66.035938] [ 66.036093] The buggy address belongs to the physical page: [ 66.036659] page:00000000a3aeb2fe refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059bd [ 66.038471] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 66.039366] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 66.040260] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 66.041097] page dumped because: kasan: bad access detected [ 66.042053] [ 66.042326] Memory state around the buggy address: [ 66.042906] ffff0000c59bd800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 66.043727] ffff0000c59bd880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.044552] >ffff0000c59bd900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 66.045193] ^ [ 66.046005] ffff0000c59bd980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.046853] ffff0000c59bda00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.047664] ==================================================================
[ 32.127293] ================================================================== [ 32.127653] BUG: KASAN: use-after-free in strcmp+0x22/0x60 [ 32.128090] Read of size 1 at addr ffff8881037341d0 by task kunit_try_catch/268 [ 32.128691] [ 32.128959] CPU: 1 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 32.129553] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 32.130075] Call Trace: [ 32.130262] <TASK> [ 32.130470] dump_stack_lvl+0x49/0x62 [ 32.130729] print_report+0x189/0x492 [ 32.131323] ? kasan_complete_mode_report_info+0x7c/0x200 [ 32.131844] ? strcmp+0x22/0x60 [ 32.132155] kasan_report+0x10c/0x190 [ 32.132594] ? kasan_quarantine_put+0xba/0x1c0 [ 32.132994] ? strcmp+0x22/0x60 [ 32.133406] __asan_load1+0x62/0x70 [ 32.133730] strcmp+0x22/0x60 [ 32.134043] kasan_strings+0x14d/0x4e0 [ 32.134504] ? kmalloc_oob_right+0x310/0x310 [ 32.134789] ? __kunit_add_resource+0xd1/0x100 [ 32.135174] ? kasan_test_init+0x13e/0x1b0 [ 32.135635] kunit_try_run_case+0x8f/0xd0 [ 32.136014] ? kunit_catch_run_case+0x80/0x80 [ 32.136409] ? kunit_try_catch_throw+0x40/0x40 [ 32.136798] kunit_generic_run_threadfn_adapter+0x2f/0x50 [ 32.137255] kthread+0x17b/0x1b0 [ 32.137579] ? kthread_complete_and_exit+0x30/0x30 [ 32.137885] ret_from_fork+0x22/0x30 [ 32.138105] </TASK> [ 32.138482] [ 32.138599] Allocated by task 268: [ 32.138989] kasan_save_stack+0x41/0x70 [ 32.139260] kasan_set_track+0x25/0x40 [ 32.139597] kasan_save_alloc_info+0x1e/0x30 [ 32.140283] __kasan_kmalloc+0xb6/0xc0 [ 32.140665] kmalloc_trace+0x48/0xb0 [ 32.140929] kasan_strings+0x99/0x4e0 [ 32.141394] kunit_try_run_case+0x8f/0xd0 [ 32.141803] kunit_generic_run_threadfn_adapter+0x2f/0x50 [ 32.142144] kthread+0x17b/0x1b0 [ 32.142644] ret_from_fork+0x22/0x30 [ 32.142848] [ 32.142980] Freed by task 268: [ 32.143455] kasan_save_stack+0x41/0x70 [ 32.143805] kasan_set_track+0x25/0x40 [ 32.144150] kasan_save_free_info+0x2e/0x50 [ 32.144528] ____kasan_slab_free+0x175/0x1d0 [ 32.144949] __kasan_slab_free+0x12/0x20 [ 32.145357] __kmem_cache_free+0x188/0x2f0 [ 32.145712] kfree+0x78/0x120 [ 32.145904] kasan_strings+0xbd/0x4e0 [ 32.146109] kunit_try_run_case+0x8f/0xd0 [ 32.146403] kunit_generic_run_threadfn_adapter+0x2f/0x50 [ 32.146976] kthread+0x17b/0x1b0 [ 32.147200] ret_from_fork+0x22/0x30 [ 32.147438] [ 32.147626] The buggy address belongs to the object at ffff8881037341c0 [ 32.147626] which belongs to the cache kmalloc-32 of size 32 [ 32.148678] The buggy address is located 16 bytes inside of [ 32.148678] 32-byte region [ffff8881037341c0, ffff8881037341e0) [ 32.149368] [ 32.149609] The buggy address belongs to the physical page: [ 32.150007] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103734 [ 32.150640] flags: 0x200000000000200(slab|node=0|zone=2) [ 32.151137] raw: 0200000000000200 0000000000000000 dead000000000122 ffff888100041500 [ 32.151481] raw: 0000000000000000 0000000080400040 00000001ffffffff 0000000000000000 [ 32.152125] page dumped because: kasan: bad access detected [ 32.152594] [ 32.152690] Memory state around the buggy address: [ 32.152952] ffff888103734080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 32.153489] ffff888103734100: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 32.153916] >ffff888103734180: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 32.154230] ^ [ 32.154615] ffff888103734200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.155016] ffff888103734280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.155688] ==================================================================