Date
July 15, 2025, 2:10 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 107.219300] ================================================================== [ 107.219893] BUG: KASAN: use-after-free in strncmp+0x3c/0x90 [ 107.220636] Read of size 1 at addr ffff0000c66ab410 by task kunit_try_catch/248 [ 107.221664] [ 107.221967] CPU: 1 PID: 248 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 107.222897] Hardware name: linux,dummy-virt (DT) [ 107.223300] Call trace: [ 107.223546] dump_backtrace+0xe0/0x134 [ 107.224003] show_stack+0x20/0x2c [ 107.224793] dump_stack_lvl+0x88/0xb4 [ 107.225253] print_report+0x158/0x44c [ 107.225674] kasan_report+0xc8/0x180 [ 107.226127] __asan_load1+0x68/0x74 [ 107.226559] strncmp+0x3c/0x90 [ 107.226959] kasan_strings+0x150/0x530 [ 107.227395] kunit_try_run_case+0x8c/0x124 [ 107.227879] kunit_generic_run_threadfn_adapter+0x38/0x54 [ 107.229253] kthread+0x15c/0x170 [ 107.229651] ret_from_fork+0x10/0x20 [ 107.230097] [ 107.230289] Allocated by task 248: [ 107.230658] kasan_save_stack+0x3c/0x70 [ 107.231120] kasan_set_track+0x2c/0x40 [ 107.231551] kasan_save_alloc_info+0x24/0x34 [ 107.232065] __kasan_kmalloc+0xd4/0xe0 [ 107.232866] kmalloc_trace+0x8c/0x150 [ 107.233296] kasan_strings+0xa0/0x530 [ 107.233755] kunit_try_run_case+0x8c/0x124 [ 107.234234] kunit_generic_run_threadfn_adapter+0x38/0x54 [ 107.234789] kthread+0x15c/0x170 [ 107.235193] ret_from_fork+0x10/0x20 [ 107.235625] [ 107.235840] Freed by task 248: [ 107.236191] kasan_save_stack+0x3c/0x70 [ 107.237497] kasan_set_track+0x2c/0x40 [ 107.237939] kasan_save_free_info+0x38/0x5c [ 107.238388] __kasan_slab_free+0x100/0x170 [ 107.238881] slab_free_freelist_hook+0xd8/0x1c0 [ 107.239371] __kmem_cache_free+0x15c/0x2a0 [ 107.239841] kfree+0x88/0x150 [ 107.240234] kasan_strings+0xc0/0x530 [ 107.241026] kunit_try_run_case+0x8c/0x124 [ 107.241530] kunit_generic_run_threadfn_adapter+0x38/0x54 [ 107.242096] kthread+0x15c/0x170 [ 107.242486] ret_from_fork+0x10/0x20 [ 107.242914] [ 107.243129] The buggy address belongs to the object at ffff0000c66ab400 [ 107.243129] which belongs to the cache kmalloc-128 of size 128 [ 107.244074] The buggy address is located 16 bytes inside of [ 107.244074] 128-byte region [ffff0000c66ab400, ffff0000c66ab480) [ 107.245089] [ 107.245320] The buggy address belongs to the physical page: [ 107.245800] page:0000000069500412 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ab [ 107.246565] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 107.248025] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 107.248849] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 107.249454] page dumped because: kasan: bad access detected [ 107.249935] [ 107.250128] Memory state around the buggy address: [ 107.250558] ffff0000c66ab300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 107.251407] ffff0000c66ab380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 107.252048] >ffff0000c66ab400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 107.253518] ^ [ 107.253901] ffff0000c66ab480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 107.254548] ffff0000c66ab500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 107.255181] ==================================================================
[ 76.912309] ================================================================== [ 76.913153] BUG: KASAN: use-after-free in strncmp+0x3c/0xa0 [ 76.913747] Read of size 1 at addr ffff0000c5abca10 by task kunit_try_catch/164 [ 76.914334] [ 76.914567] CPU: 0 PID: 164 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 76.915298] Hardware name: linux,dummy-virt (DT) [ 76.915698] Call trace: [ 76.916001] dump_backtrace+0xf8/0x118 [ 76.916462] show_stack+0x18/0x24 [ 76.916908] __dump_stack+0x28/0x38 [ 76.917324] dump_stack_lvl+0x54/0x6c [ 76.917744] print_address_description+0x7c/0x1ec [ 76.918286] print_report+0x50/0x68 [ 76.918724] kasan_report+0xac/0x100 [ 76.919680] __asan_load1+0x6c/0x70 [ 76.920137] strncmp+0x3c/0xa0 [ 76.920535] kasan_strings+0x1a0/0x404 [ 76.921218] kunit_try_run_case+0x80/0x184 [ 76.921720] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.922317] kthread+0x16c/0x21c [ 76.922749] ret_from_fork+0x10/0x20 [ 76.923167] [ 76.923372] Allocated by task 164: [ 76.923693] kasan_set_track+0x4c/0x80 [ 76.924144] kasan_save_alloc_info+0x28/0x34 [ 76.925091] __kasan_kmalloc+0x88/0xa0 [ 76.925561] kmalloc_trace+0x54/0x68 [ 76.926018] kasan_strings+0x48/0x404 [ 76.926447] kunit_try_run_case+0x80/0x184 [ 76.926947] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.927510] kthread+0x16c/0x21c [ 76.927924] ret_from_fork+0x10/0x20 [ 76.928368] [ 76.928551] Freed by task 164: [ 76.928926] kasan_set_track+0x4c/0x80 [ 76.929416] kasan_save_free_info+0x3c/0x60 [ 76.929860] ____kasan_slab_free+0xe8/0x140 [ 76.930329] __kasan_slab_free+0x18/0x28 [ 76.931052] __kmem_cache_free+0xdc/0x284 [ 76.931515] kfree+0x60/0x74 [ 76.931894] kasan_strings+0x90/0x404 [ 76.932364] kunit_try_run_case+0x80/0x184 [ 76.933293] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.933941] kthread+0x16c/0x21c [ 76.934388] ret_from_fork+0x10/0x20 [ 76.934840] [ 76.935058] The buggy address belongs to the object at ffff0000c5abca00 [ 76.935058] which belongs to the cache kmalloc-128 of size 128 [ 76.936045] The buggy address is located 16 bytes inside of [ 76.936045] 128-byte region [ffff0000c5abca00, ffff0000c5abca80) [ 76.937262] [ 76.937483] The buggy address belongs to the physical page: [ 76.937946] page:00000000b0163b2b refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105abc [ 76.938720] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 76.939421] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 76.940109] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 76.941278] page dumped because: kasan: bad access detected [ 76.941720] [ 76.941952] Memory state around the buggy address: [ 76.942360] ffff0000c5abc900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 76.943025] ffff0000c5abc980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.943645] >ffff0000c5abca00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 76.944259] ^ [ 76.944876] ffff0000c5abca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.945492] ffff0000c5abcb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.946128] ==================================================================
[ 76.057400] ================================================================== [ 76.057892] BUG: KASAN: use-after-free in strncmp+0x3c/0xa0 [ 76.058480] Read of size 1 at addr ffff0000c58a7510 by task kunit_try_catch/164 [ 76.059117] [ 76.059332] CPU: 0 PID: 164 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 76.060284] Hardware name: linux,dummy-virt (DT) [ 76.060958] Call trace: [ 76.061237] dump_backtrace+0xf4/0x114 [ 76.061771] show_stack+0x18/0x24 [ 76.062224] __dump_stack+0x28/0x38 [ 76.062732] dump_stack_lvl+0x50/0x68 [ 76.063205] print_address_description+0x7c/0x1ec [ 76.064304] print_report+0x50/0x68 [ 76.064838] kasan_report+0xac/0xfc [ 76.065325] __asan_load1+0x6c/0x70 [ 76.065830] strncmp+0x3c/0xa0 [ 76.066272] kasan_strings+0x1a0/0x404 [ 76.066695] kunit_try_run_case+0x80/0x184 [ 76.067180] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.068013] kthread+0x16c/0x21c [ 76.068448] ret_from_fork+0x10/0x20 [ 76.068920] [ 76.069137] Allocated by task 164: [ 76.069492] kasan_set_track+0x4c/0x80 [ 76.070005] kasan_save_alloc_info+0x28/0x34 [ 76.070462] __kasan_kmalloc+0x88/0xa0 [ 76.070956] kmalloc_trace+0x54/0x68 [ 76.071380] kasan_strings+0x48/0x404 [ 76.072335] kunit_try_run_case+0x80/0x184 [ 76.072876] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.073440] kthread+0x16c/0x21c [ 76.073867] ret_from_fork+0x10/0x20 [ 76.074318] [ 76.074509] Freed by task 164: [ 76.074874] kasan_set_track+0x4c/0x80 [ 76.075377] kasan_save_free_info+0x3c/0x60 [ 76.076102] ____kasan_slab_free+0xe8/0x140 [ 76.076644] __kasan_slab_free+0x18/0x28 [ 76.077129] __kmem_cache_free+0xdc/0x27c [ 76.077581] kfree+0x60/0x74 [ 76.077975] kasan_strings+0x90/0x404 [ 76.078422] kunit_try_run_case+0x80/0x184 [ 76.078925] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.079480] kthread+0x16c/0x21c [ 76.080450] ret_from_fork+0x10/0x20 [ 76.080924] [ 76.081152] The buggy address belongs to the object at ffff0000c58a7500 [ 76.081152] which belongs to the cache kmalloc-128 of size 128 [ 76.082112] The buggy address is located 16 bytes inside of [ 76.082112] 128-byte region [ffff0000c58a7500, ffff0000c58a7580) [ 76.082847] [ 76.083039] The buggy address belongs to the physical page: [ 76.083409] page:00000000333134b1 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7 [ 76.084884] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 76.085848] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 76.086838] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 76.088250] page dumped because: kasan: bad access detected [ 76.088962] [ 76.089242] Memory state around the buggy address: [ 76.089877] ffff0000c58a7400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 76.090771] ffff0000c58a7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.091382] >ffff0000c58a7500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 76.092230] ^ [ 76.092656] ffff0000c58a7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.093315] ffff0000c58a7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.093920] ==================================================================
[ 74.638244] ================================================================== [ 74.639101] BUG: KASAN: use-after-free in strncmp+0x3c/0x90 [ 74.639897] Read of size 1 at addr ffff0000c5938710 by task kunit_try_catch/164 [ 74.640749] [ 74.641018] CPU: 1 PID: 164 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 74.642161] Hardware name: linux,dummy-virt (DT) [ 74.643262] Call trace: [ 74.643645] dump_backtrace.part.0+0xdc/0xf0 [ 74.644315] show_stack+0x18/0x30 [ 74.644867] dump_stack_lvl+0x64/0x80 [ 74.645431] print_report+0x158/0x438 [ 74.646043] kasan_report+0xb4/0xf4 [ 74.646593] __asan_load1+0x68/0x74 [ 74.647194] strncmp+0x3c/0x90 [ 74.647730] kasan_strings+0x148/0x520 [ 74.648316] kunit_try_run_case+0x84/0x120 [ 74.648937] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 74.649535] kthread+0x180/0x190 [ 74.650032] ret_from_fork+0x10/0x20 [ 74.650408] [ 74.650575] Allocated by task 164: [ 74.650843] kasan_save_stack+0x3c/0x70 [ 74.651185] kasan_set_track+0x2c/0x40 [ 74.651528] kasan_save_alloc_info+0x24/0x34 [ 74.652052] __kasan_kmalloc+0xb8/0xc0 [ 74.652526] kmalloc_trace+0x58/0x6c [ 74.652932] kasan_strings+0x98/0x520 [ 74.653382] kunit_try_run_case+0x84/0x120 [ 74.653835] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 74.654565] kthread+0x180/0x190 [ 74.654932] ret_from_fork+0x10/0x20 [ 74.655330] [ 74.655543] Freed by task 164: [ 74.655840] kasan_save_stack+0x3c/0x70 [ 74.656266] kasan_set_track+0x2c/0x40 [ 74.656688] kasan_save_free_info+0x38/0x5c [ 74.657131] __kasan_slab_free+0xe4/0x150 [ 74.657560] __kmem_cache_free+0x130/0x2a4 [ 74.658153] kfree+0x58/0x80 [ 74.658562] kasan_strings+0xb8/0x520 [ 74.658924] kunit_try_run_case+0x84/0x120 [ 74.659299] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 74.660073] kthread+0x180/0x190 [ 74.660573] ret_from_fork+0x10/0x20 [ 74.661108] [ 74.661362] The buggy address belongs to the object at ffff0000c5938700 [ 74.661362] which belongs to the cache kmalloc-128 of size 128 [ 74.662863] The buggy address is located 16 bytes inside of [ 74.662863] 128-byte region [ffff0000c5938700, ffff0000c5938780) [ 74.664843] [ 74.665117] The buggy address belongs to the physical page: [ 74.665790] page:000000003af4cecf refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105938 [ 74.666694] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 74.667220] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 74.667990] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 74.668509] page dumped because: kasan: bad access detected [ 74.669159] [ 74.669418] Memory state around the buggy address: [ 74.670042] ffff0000c5938600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 74.671055] ffff0000c5938680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.671716] >ffff0000c5938700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 74.672156] ^ [ 74.672463] ffff0000c5938780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.672927] ffff0000c5938800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.673361] ==================================================================
[ 66.048514] ================================================================== [ 66.048945] BUG: KASAN: use-after-free in strncmp+0x30/0xe0 [ 66.049571] Read of size 1 at addr ffff0000c59bd910 by task kunit_try_catch/162 [ 66.050528] [ 66.050863] CPU: 1 PID: 162 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 66.051903] Hardware name: linux,dummy-virt (DT) [ 66.052490] Call trace: [ 66.052857] dump_backtrace+0x110/0x120 [ 66.053511] show_stack+0x18/0x28 [ 66.054111] dump_stack_lvl+0x68/0x84 [ 66.054728] print_report+0x158/0x484 [ 66.055292] kasan_report+0x98/0xe0 [ 66.055813] __asan_load1+0x68/0x78 [ 66.056347] strncmp+0x30/0xe0 [ 66.056833] kasan_strings+0x174/0x4e0 [ 66.057434] kunit_try_run_case+0x7c/0x120 [ 66.058136] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 66.058730] kthread+0x1a4/0x1b8 [ 66.059031] ret_from_fork+0x10/0x20 [ 66.059379] [ 66.059598] Allocated by task 162: [ 66.059902] kasan_save_stack+0x2c/0x58 [ 66.060287] kasan_set_track+0x2c/0x40 [ 66.060692] kasan_save_alloc_info+0x24/0x38 [ 66.061097] __kasan_kmalloc+0xa0/0xb8 [ 66.061643] kmalloc_trace+0x50/0x68 [ 66.062077] kasan_strings+0xa8/0x4e0 [ 66.062810] kunit_try_run_case+0x7c/0x120 [ 66.063235] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 66.063801] kthread+0x1a4/0x1b8 [ 66.064174] ret_from_fork+0x10/0x20 [ 66.064564] [ 66.064747] Freed by task 162: [ 66.065077] kasan_save_stack+0x2c/0x58 [ 66.065524] kasan_set_track+0x2c/0x40 [ 66.065909] kasan_save_free_info+0x38/0x60 [ 66.066419] __kasan_slab_free+0xe8/0x158 [ 66.067001] __kmem_cache_free+0x138/0x2b0 [ 66.067486] kfree+0x5c/0x70 [ 66.067811] kasan_strings+0xc8/0x4e0 [ 66.068224] kunit_try_run_case+0x7c/0x120 [ 66.068661] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 66.069209] kthread+0x1a4/0x1b8 [ 66.069790] ret_from_fork+0x10/0x20 [ 66.070168] [ 66.070367] The buggy address belongs to the object at ffff0000c59bd900 [ 66.070367] which belongs to the cache kmalloc-128 of size 128 [ 66.071236] The buggy address is located 16 bytes inside of [ 66.071236] 128-byte region [ffff0000c59bd900, ffff0000c59bd980) [ 66.072077] [ 66.072640] The buggy address belongs to the physical page: [ 66.073059] page:00000000a3aeb2fe refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059bd [ 66.073999] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 66.074604] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 66.075367] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 66.075948] page dumped because: kasan: bad access detected [ 66.076404] [ 66.076604] Memory state around the buggy address: [ 66.077019] ffff0000c59bd800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 66.077837] ffff0000c59bd880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.078380] >ffff0000c59bd900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 66.079282] ^ [ 66.079662] ffff0000c59bd980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.080235] ffff0000c59bda00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.080781] ==================================================================
[ 32.156219] ================================================================== [ 32.156725] BUG: KASAN: use-after-free in strncmp+0x32/0x80 [ 32.157024] Read of size 1 at addr ffff8881037341d0 by task kunit_try_catch/268 [ 32.157920] [ 32.158316] CPU: 1 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 32.158735] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 32.159249] Call Trace: [ 32.159592] <TASK> [ 32.159815] dump_stack_lvl+0x49/0x62 [ 32.160061] print_report+0x189/0x492 [ 32.160532] ? kasan_complete_mode_report_info+0x7c/0x200 [ 32.160854] ? strncmp+0x32/0x80 [ 32.161065] kasan_report+0x10c/0x190 [ 32.161551] ? kasan_report.cold+0xc/0x11 [ 32.161806] ? strncmp+0x32/0x80 [ 32.162113] __asan_load1+0x62/0x70 [ 32.162490] strncmp+0x32/0x80 [ 32.162796] kasan_strings+0x18c/0x4e0 [ 32.163124] ? kmalloc_oob_right+0x310/0x310 [ 32.163545] ? __kunit_add_resource+0xd1/0x100 [ 32.163970] ? kasan_test_init+0x13e/0x1b0 [ 32.164304] kunit_try_run_case+0x8f/0xd0 [ 32.164686] ? kunit_catch_run_case+0x80/0x80 [ 32.164981] ? kunit_try_catch_throw+0x40/0x40 [ 32.165230] kunit_generic_run_threadfn_adapter+0x2f/0x50 [ 32.165530] kthread+0x17b/0x1b0 [ 32.165711] ? kthread_complete_and_exit+0x30/0x30 [ 32.165959] ret_from_fork+0x22/0x30 [ 32.166579] </TASK> [ 32.166742] [ 32.166851] Allocated by task 268: [ 32.167147] kasan_save_stack+0x41/0x70 [ 32.167566] kasan_set_track+0x25/0x40 [ 32.167871] kasan_save_alloc_info+0x1e/0x30 [ 32.168112] __kasan_kmalloc+0xb6/0xc0 [ 32.168557] kmalloc_trace+0x48/0xb0 [ 32.168753] kasan_strings+0x99/0x4e0 [ 32.169109] kunit_try_run_case+0x8f/0xd0 [ 32.169476] kunit_generic_run_threadfn_adapter+0x2f/0x50 [ 32.169773] kthread+0x17b/0x1b0 [ 32.169956] ret_from_fork+0x22/0x30 [ 32.170354] [ 32.170463] Freed by task 268: [ 32.170757] kasan_save_stack+0x41/0x70 [ 32.171041] kasan_set_track+0x25/0x40 [ 32.171405] kasan_save_free_info+0x2e/0x50 [ 32.171713] ____kasan_slab_free+0x175/0x1d0 [ 32.171930] __kasan_slab_free+0x12/0x20 [ 32.172151] __kmem_cache_free+0x188/0x2f0 [ 32.172414] kfree+0x78/0x120 [ 32.172872] kasan_strings+0xbd/0x4e0 [ 32.173248] kunit_try_run_case+0x8f/0xd0 [ 32.173540] kunit_generic_run_threadfn_adapter+0x2f/0x50 [ 32.173888] kthread+0x17b/0x1b0 [ 32.174152] ret_from_fork+0x22/0x30 [ 32.174412] [ 32.174510] The buggy address belongs to the object at ffff8881037341c0 [ 32.174510] which belongs to the cache kmalloc-32 of size 32 [ 32.175025] The buggy address is located 16 bytes inside of [ 32.175025] 32-byte region [ffff8881037341c0, ffff8881037341e0) [ 32.175943] [ 32.176076] The buggy address belongs to the physical page: [ 32.176477] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103734 [ 32.176992] flags: 0x200000000000200(slab|node=0|zone=2) [ 32.177428] raw: 0200000000000200 0000000000000000 dead000000000122 ffff888100041500 [ 32.177840] raw: 0000000000000000 0000000080400040 00000001ffffffff 0000000000000000 [ 32.178280] page dumped because: kasan: bad access detected [ 32.178609] [ 32.178725] Memory state around the buggy address: [ 32.179105] ffff888103734080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 32.179501] ffff888103734100: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 32.180005] >ffff888103734180: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 32.180315] ^ [ 32.180815] ffff888103734200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.181157] ffff888103734280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.181768] ==================================================================