Hay
Date
July 15, 2025, 2:10 p.m.

Environment
qemu-arm64
qemu-x86_64

[  107.256166] ==================================================================
[  107.256781] BUG: KASAN: use-after-free in strlen+0x18/0x64
[  107.257403] Read of size 1 at addr ffff0000c66ab410 by task kunit_try_catch/248
[  107.258091] 
[  107.258297] CPU: 1 PID: 248 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[  107.259872] Hardware name: linux,dummy-virt (DT)
[  107.260325] Call trace:
[  107.261101]  dump_backtrace+0xe0/0x134
[  107.261551]  show_stack+0x20/0x2c
[  107.261981]  dump_stack_lvl+0x88/0xb4
[  107.262414]  print_report+0x158/0x44c
[  107.262862]  kasan_report+0xc8/0x180
[  107.263319]  __asan_load1+0x68/0x74
[  107.263768]  strlen+0x18/0x64
[  107.264154]  kasan_strings+0x170/0x530
[  107.265499]  kunit_try_run_case+0x8c/0x124
[  107.265949]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  107.266445]  kthread+0x15c/0x170
[  107.266821]  ret_from_fork+0x10/0x20
[  107.267199] 
[  107.267387] Allocated by task 248:
[  107.267801]  kasan_save_stack+0x3c/0x70
[  107.268702]  kasan_set_track+0x2c/0x40
[  107.269099]  kasan_save_alloc_info+0x24/0x34
[  107.269510]  __kasan_kmalloc+0xd4/0xe0
[  107.270159]  kmalloc_trace+0x8c/0x150
[  107.270815]  kasan_strings+0xa0/0x530
[  107.271495]  kunit_try_run_case+0x8c/0x124
[  107.272197]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  107.273171]  kthread+0x15c/0x170
[  107.273843]  ret_from_fork+0x10/0x20
[  107.274506] 
[  107.274901] Freed by task 248:
[  107.275421]  kasan_save_stack+0x3c/0x70
[  107.276137]  kasan_set_track+0x2c/0x40
[  107.276781]  kasan_save_free_info+0x38/0x5c
[  107.277450]  __kasan_slab_free+0x100/0x170
[  107.278102]  slab_free_freelist_hook+0xd8/0x1c0
[  107.278780]  __kmem_cache_free+0x15c/0x2a0
[  107.279369]  kfree+0x88/0x150
[  107.279694]  kasan_strings+0xc0/0x530
[  107.280102]  kunit_try_run_case+0x8c/0x124
[  107.280705]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  107.281626]  kthread+0x15c/0x170
[  107.282222]  ret_from_fork+0x10/0x20
[  107.282840] 
[  107.283132] The buggy address belongs to the object at ffff0000c66ab400
[  107.283132]  which belongs to the cache kmalloc-128 of size 128
[  107.284704] The buggy address is located 16 bytes inside of
[  107.284704]  128-byte region [ffff0000c66ab400, ffff0000c66ab480)
[  107.286038] 
[  107.286319] The buggy address belongs to the physical page:
[  107.287074] page:0000000069500412 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ab
[  107.288188] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  107.289179] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  107.290198] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  107.291059] page dumped because: kasan: bad access detected
[  107.291807] 
[  107.292131] Memory state around the buggy address:
[  107.292769]  ffff0000c66ab300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  107.293532]  ffff0000c66ab380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  107.294039] >ffff0000c66ab400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  107.294498]                          ^
[  107.294839]  ffff0000c66ab480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  107.295697]  ffff0000c66ab500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  107.296545] ==================================================================

[   76.947148] ==================================================================
[   76.947685] BUG: KASAN: use-after-free in strlen+0x28/0x50
[   76.948285] Read of size 1 at addr ffff0000c5abca10 by task kunit_try_catch/164
[   76.949009] 
[   76.949210] CPU: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   76.950482] Hardware name: linux,dummy-virt (DT)
[   76.950935] Call trace:
[   76.951200]  dump_backtrace+0xf8/0x118
[   76.951695]  show_stack+0x18/0x24
[   76.952133]  __dump_stack+0x28/0x38
[   76.952567]  dump_stack_lvl+0x54/0x6c
[   76.953043]  print_address_description+0x7c/0x1ec
[   76.953564]  print_report+0x50/0x68
[   76.954004]  kasan_report+0xac/0x100
[   76.954441]  __asan_load1+0x6c/0x70
[   76.955909]  strlen+0x28/0x50
[   76.956270]  kasan_strings+0x1e8/0x404
[   76.956677]  kunit_try_run_case+0x80/0x184
[   76.957153]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.958319]  kthread+0x16c/0x21c
[   76.958715]  ret_from_fork+0x10/0x20
[   76.959491] 
[   76.959895] Allocated by task 164:
[   76.960190]  kasan_set_track+0x4c/0x80
[   76.960632]  kasan_save_alloc_info+0x28/0x34
[   76.961670]  __kasan_kmalloc+0x88/0xa0
[   76.962382]  kmalloc_trace+0x54/0x68
[   76.963010]  kasan_strings+0x48/0x404
[   76.963642]  kunit_try_run_case+0x80/0x184
[   76.964335]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.965954]  kthread+0x16c/0x21c
[   76.966563]  ret_from_fork+0x10/0x20
[   76.967178] 
[   76.967482] Freed by task 164:
[   76.967909]  kasan_set_track+0x4c/0x80
[   76.968341]  kasan_save_free_info+0x3c/0x60
[   76.968784]  ____kasan_slab_free+0xe8/0x140
[   76.969345]  __kasan_slab_free+0x18/0x28
[   76.969863]  __kmem_cache_free+0xdc/0x284
[   76.970333]  kfree+0x60/0x74
[   76.970744]  kasan_strings+0x90/0x404
[   76.971201]  kunit_try_run_case+0x80/0x184
[   76.971746]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.972369]  kthread+0x16c/0x21c
[   76.972785]  ret_from_fork+0x10/0x20
[   76.973267] 
[   76.973475] The buggy address belongs to the object at ffff0000c5abca00
[   76.973475]  which belongs to the cache kmalloc-128 of size 128
[   76.974848] The buggy address is located 16 bytes inside of
[   76.974848]  128-byte region [ffff0000c5abca00, ffff0000c5abca80)
[   76.975738] 
[   76.975972] The buggy address belongs to the physical page:
[   76.976447] page:00000000b0163b2b refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105abc
[   76.977439] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   76.978166] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   76.978824] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   76.979431] page dumped because: kasan: bad access detected
[   76.979888] 
[   76.980095] Memory state around the buggy address:
[   76.980510]  ffff0000c5abc900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   76.981305]  ffff0000c5abc980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.982274] >ffff0000c5abca00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   76.982890]                          ^
[   76.983271]  ffff0000c5abca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.983872]  ffff0000c5abcb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.984494] ==================================================================

[   76.094900] ==================================================================
[   76.095487] BUG: KASAN: use-after-free in strlen+0x28/0x50
[   76.096123] Read of size 1 at addr ffff0000c58a7510 by task kunit_try_catch/164
[   76.096815] 
[   76.097132] CPU: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   76.098028] Hardware name: linux,dummy-virt (DT)
[   76.098510] Call trace:
[   76.098803]  dump_backtrace+0xf4/0x114
[   76.099322]  show_stack+0x18/0x24
[   76.099876]  __dump_stack+0x28/0x38
[   76.100362]  dump_stack_lvl+0x50/0x68
[   76.100874]  print_address_description+0x7c/0x1ec
[   76.101518]  print_report+0x50/0x68
[   76.102012]  kasan_report+0xac/0xfc
[   76.102501]  __asan_load1+0x6c/0x70
[   76.103039]  strlen+0x28/0x50
[   76.103457]  kasan_strings+0x1e8/0x404
[   76.104052]  kunit_try_run_case+0x80/0x184
[   76.104607]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.105206]  kthread+0x16c/0x21c
[   76.105645]  ret_from_fork+0x10/0x20
[   76.106086] 
[   76.106308] Allocated by task 164:
[   76.106672]  kasan_set_track+0x4c/0x80
[   76.107157]  kasan_save_alloc_info+0x28/0x34
[   76.107635]  __kasan_kmalloc+0x88/0xa0
[   76.108215]  kmalloc_trace+0x54/0x68
[   76.108796]  kasan_strings+0x48/0x404
[   76.109462]  kunit_try_run_case+0x80/0x184
[   76.110066]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.110767]  kthread+0x16c/0x21c
[   76.111313]  ret_from_fork+0x10/0x20
[   76.111956] 
[   76.112164] Freed by task 164:
[   76.112692]  kasan_set_track+0x4c/0x80
[   76.113197]  kasan_save_free_info+0x3c/0x60
[   76.113722]  ____kasan_slab_free+0xe8/0x140
[   76.114251]  __kasan_slab_free+0x18/0x28
[   76.114748]  __kmem_cache_free+0xdc/0x27c
[   76.115214]  kfree+0x60/0x74
[   76.115632]  kasan_strings+0x90/0x404
[   76.116178]  kunit_try_run_case+0x80/0x184
[   76.116659]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.117363]  kthread+0x16c/0x21c
[   76.117833]  ret_from_fork+0x10/0x20
[   76.118288] 
[   76.118520] The buggy address belongs to the object at ffff0000c58a7500
[   76.118520]  which belongs to the cache kmalloc-128 of size 128
[   76.119474] The buggy address is located 16 bytes inside of
[   76.119474]  128-byte region [ffff0000c58a7500, ffff0000c58a7580)
[   76.120557] 
[   76.120809] The buggy address belongs to the physical page:
[   76.121569] page:00000000333134b1 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7
[   76.122365] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   76.123113] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   76.123792] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   76.124526] page dumped because: kasan: bad access detected
[   76.125034] 
[   76.125279] Memory state around the buggy address:
[   76.125682]  ffff0000c58a7400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   76.126501]  ffff0000c58a7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.127177] >ffff0000c58a7500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   76.127890]                          ^
[   76.128475]  ffff0000c58a7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.129198]  ffff0000c58a7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.129864] ==================================================================

[   74.674820] ==================================================================
[   74.675701] BUG: KASAN: use-after-free in strlen+0x18/0x64
[   74.676477] Read of size 1 at addr ffff0000c5938710 by task kunit_try_catch/164
[   74.677320] 
[   74.677602] CPU: 1 PID: 164 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   74.679059] Hardware name: linux,dummy-virt (DT)
[   74.679659] Call trace:
[   74.680020]  dump_backtrace.part.0+0xdc/0xf0
[   74.680702]  show_stack+0x18/0x30
[   74.681248]  dump_stack_lvl+0x64/0x80
[   74.681947]  print_report+0x158/0x438
[   74.682581]  kasan_report+0xb4/0xf4
[   74.683111]  __asan_load1+0x68/0x74
[   74.683662]  strlen+0x18/0x64
[   74.684159]  kasan_strings+0x168/0x520
[   74.684739]  kunit_try_run_case+0x84/0x120
[   74.685346]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   74.686147]  kthread+0x180/0x190
[   74.686831]  ret_from_fork+0x10/0x20
[   74.687376] 
[   74.687651] Allocated by task 164:
[   74.688102]  kasan_save_stack+0x3c/0x70
[   74.688485]  kasan_set_track+0x2c/0x40
[   74.688820]  kasan_save_alloc_info+0x24/0x34
[   74.689198]  __kasan_kmalloc+0xb8/0xc0
[   74.689565]  kmalloc_trace+0x58/0x6c
[   74.690087]  kasan_strings+0x98/0x520
[   74.690720]  kunit_try_run_case+0x84/0x120
[   74.691243]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   74.691813]  kthread+0x180/0x190
[   74.692213]  ret_from_fork+0x10/0x20
[   74.692645] 
[   74.692848] Freed by task 164:
[   74.693142]  kasan_save_stack+0x3c/0x70
[   74.693555]  kasan_set_track+0x2c/0x40
[   74.694739]  kasan_save_free_info+0x38/0x5c
[   74.695562]  __kasan_slab_free+0xe4/0x150
[   74.696205]  __kmem_cache_free+0x130/0x2a4
[   74.696695]  kfree+0x58/0x80
[   74.697086]  kasan_strings+0xb8/0x520
[   74.697565]  kunit_try_run_case+0x84/0x120
[   74.698175]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   74.698806]  kthread+0x180/0x190
[   74.699222]  ret_from_fork+0x10/0x20
[   74.699669] 
[   74.699867] The buggy address belongs to the object at ffff0000c5938700
[   74.699867]  which belongs to the cache kmalloc-128 of size 128
[   74.700807] The buggy address is located 16 bytes inside of
[   74.700807]  128-byte region [ffff0000c5938700, ffff0000c5938780)
[   74.701634] 
[   74.701879] The buggy address belongs to the physical page:
[   74.702410] page:000000003af4cecf refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105938
[   74.703323] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   74.703992] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   74.704689] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   74.705246] page dumped because: kasan: bad access detected
[   74.705703] 
[   74.706079] Memory state around the buggy address:
[   74.706527]  ffff0000c5938600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   74.707162]  ffff0000c5938680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.707863] >ffff0000c5938700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   74.708446]                          ^
[   74.708800]  ffff0000c5938780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.709368]  ffff0000c5938800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.710196] ==================================================================

[   66.081897] ==================================================================
[   66.082447] BUG: KASAN: use-after-free in strlen+0x18/0x68
[   66.082967] Read of size 1 at addr ffff0000c59bd910 by task kunit_try_catch/162
[   66.083584] 
[   66.083818] CPU: 1 PID: 162 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   66.084501] Hardware name: linux,dummy-virt (DT)
[   66.084919] Call trace:
[   66.085166]  dump_backtrace+0x110/0x120
[   66.085695]  show_stack+0x18/0x28
[   66.086167]  dump_stack_lvl+0x68/0x84
[   66.086984]  print_report+0x158/0x484
[   66.087393]  kasan_report+0x98/0xe0
[   66.087755]  __asan_load1+0x68/0x78
[   66.088152]  strlen+0x18/0x68
[   66.088547]  kasan_strings+0x19c/0x4e0
[   66.088978]  kunit_try_run_case+0x7c/0x120
[   66.089426]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   66.090109]  kthread+0x1a4/0x1b8
[   66.090596]  ret_from_fork+0x10/0x20
[   66.091003] 
[   66.091193] Allocated by task 162:
[   66.091552]  kasan_save_stack+0x2c/0x58
[   66.091956]  kasan_set_track+0x2c/0x40
[   66.092350]  kasan_save_alloc_info+0x24/0x38
[   66.092790]  __kasan_kmalloc+0xa0/0xb8
[   66.093169]  kmalloc_trace+0x50/0x68
[   66.093735]  kasan_strings+0xa8/0x4e0
[   66.094128]  kunit_try_run_case+0x7c/0x120
[   66.094911]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   66.095520]  kthread+0x1a4/0x1b8
[   66.095862]  ret_from_fork+0x10/0x20
[   66.096261] 
[   66.096457] Freed by task 162:
[   66.096788]  kasan_save_stack+0x2c/0x58
[   66.097170]  kasan_set_track+0x2c/0x40
[   66.097767]  kasan_save_free_info+0x38/0x60
[   66.098178]  __kasan_slab_free+0xe8/0x158
[   66.098719]  __kmem_cache_free+0x138/0x2b0
[   66.099185]  kfree+0x5c/0x70
[   66.099538]  kasan_strings+0xc8/0x4e0
[   66.099947]  kunit_try_run_case+0x7c/0x120
[   66.100368]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   66.100920]  kthread+0x1a4/0x1b8
[   66.101280]  ret_from_fork+0x10/0x20
[   66.102111] 
[   66.102333] The buggy address belongs to the object at ffff0000c59bd900
[   66.102333]  which belongs to the cache kmalloc-128 of size 128
[   66.103280] The buggy address is located 16 bytes inside of
[   66.103280]  128-byte region [ffff0000c59bd900, ffff0000c59bd980)
[   66.104158] 
[   66.104347] The buggy address belongs to the physical page:
[   66.104794] page:00000000a3aeb2fe refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059bd
[   66.105697] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   66.106353] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   66.107120] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   66.107724] page dumped because: kasan: bad access detected
[   66.108177] 
[   66.108382] Memory state around the buggy address:
[   66.108770]  ffff0000c59bd800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   66.109347]  ffff0000c59bd880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.110495] >ffff0000c59bd900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   66.111104]                          ^
[   66.111483]  ffff0000c59bd980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.112073]  ffff0000c59bda00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.112632] ==================================================================

[   32.182367] ==================================================================
[   32.182705] BUG: KASAN: use-after-free in strlen+0xf/0x50
[   32.183192] Read of size 1 at addr ffff8881037341d0 by task kunit_try_catch/268
[   32.183618] 
[   32.183829] CPU: 1 PID: 268 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   32.184191] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.184747] Call Trace:
[   32.184948]  <TASK>
[   32.185063]  dump_stack_lvl+0x49/0x62
[   32.185379]  print_report+0x189/0x492
[   32.185632]  ? kasan_complete_mode_report_info+0x7c/0x200
[   32.185921]  ? strlen+0xf/0x50
[   32.186110]  kasan_report+0x10c/0x190
[   32.186350]  ? strlen+0xf/0x50
[   32.186560]  __asan_load1+0x62/0x70
[   32.186765]  strlen+0xf/0x50
[   32.186967]  kasan_strings+0x1bf/0x4e0
[   32.187210]  ? kmalloc_oob_right+0x310/0x310
[   32.187494]  ? __kunit_add_resource+0xd1/0x100
[   32.187750]  ? kasan_test_init+0x13e/0x1b0
[   32.187981]  kunit_try_run_case+0x8f/0xd0
[   32.188233]  ? kunit_catch_run_case+0x80/0x80
[   32.188484]  ? kunit_try_catch_throw+0x40/0x40
[   32.188719]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   32.189034]  kthread+0x17b/0x1b0
[   32.189249]  ? kthread_complete_and_exit+0x30/0x30
[   32.189538]  ret_from_fork+0x22/0x30
[   32.189788]  </TASK>
[   32.189934] 
[   32.190028] Allocated by task 268:
[   32.190239]  kasan_save_stack+0x41/0x70
[   32.190489]  kasan_set_track+0x25/0x40
[   32.190797]  kasan_save_alloc_info+0x1e/0x30
[   32.190991]  __kasan_kmalloc+0xb6/0xc0
[   32.191178]  kmalloc_trace+0x48/0xb0
[   32.191401]  kasan_strings+0x99/0x4e0
[   32.191837]  kunit_try_run_case+0x8f/0xd0
[   32.192061]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   32.192439]  kthread+0x17b/0x1b0
[   32.192646]  ret_from_fork+0x22/0x30
[   32.192880] 
[   32.192973] Freed by task 268:
[   32.193105]  kasan_save_stack+0x41/0x70
[   32.193390]  kasan_set_track+0x25/0x40
[   32.193628]  kasan_save_free_info+0x2e/0x50
[   32.193860]  ____kasan_slab_free+0x175/0x1d0
[   32.194128]  __kasan_slab_free+0x12/0x20
[   32.194387]  __kmem_cache_free+0x188/0x2f0
[   32.194615]  kfree+0x78/0x120
[   32.194798]  kasan_strings+0xbd/0x4e0
[   32.194979]  kunit_try_run_case+0x8f/0xd0
[   32.195192]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   32.195451]  kthread+0x17b/0x1b0
[   32.195661]  ret_from_fork+0x22/0x30
[   32.195979] 
[   32.196061] The buggy address belongs to the object at ffff8881037341c0
[   32.196061]  which belongs to the cache kmalloc-32 of size 32
[   32.196901] The buggy address is located 16 bytes inside of
[   32.196901]  32-byte region [ffff8881037341c0, ffff8881037341e0)
[   32.197362] 
[   32.197448] The buggy address belongs to the physical page:
[   32.197720] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103734
[   32.198109] flags: 0x200000000000200(slab|node=0|zone=2)
[   32.198345] raw: 0200000000000200 0000000000000000 dead000000000122 ffff888100041500
[   32.198609] raw: 0000000000000000 0000000080400040 00000001ffffffff 0000000000000000
[   32.199172] page dumped because: kasan: bad access detected
[   32.199455] 
[   32.199564] Memory state around the buggy address:
[   32.199767]  ffff888103734080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   32.200011]  ffff888103734100: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   32.200452] >ffff888103734180: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   32.200797]                                                  ^
[   32.201101]  ffff888103734200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.201569]  ffff888103734280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.201902] ==================================================================