Hay
Date
July 15, 2025, 2:10 p.m.

Environment
qemu-arm64
qemu-x86_64

[  107.298090] ==================================================================
[  107.299072] BUG: KASAN: use-after-free in strnlen+0x3c/0x6c
[  107.299938] Read of size 1 at addr ffff0000c66ab410 by task kunit_try_catch/248
[  107.301013] 
[  107.301391] CPU: 1 PID: 248 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[  107.302454] Hardware name: linux,dummy-virt (DT)
[  107.303075] Call trace:
[  107.303481]  dump_backtrace+0xe0/0x134
[  107.304088]  show_stack+0x20/0x2c
[  107.304674]  dump_stack_lvl+0x88/0xb4
[  107.305477]  print_report+0x158/0x44c
[  107.306175]  kasan_report+0xc8/0x180
[  107.306795]  __asan_load1+0x68/0x74
[  107.307525]  strnlen+0x3c/0x6c
[  107.308099]  kasan_strings+0x194/0x530
[  107.308653]  kunit_try_run_case+0x8c/0x124
[  107.309079]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  107.309573]  kthread+0x15c/0x170
[  107.309972]  ret_from_fork+0x10/0x20
[  107.310379] 
[  107.310617] Allocated by task 248:
[  107.311011]  kasan_save_stack+0x3c/0x70
[  107.311451]  kasan_set_track+0x2c/0x40
[  107.311895]  kasan_save_alloc_info+0x24/0x34
[  107.312529]  __kasan_kmalloc+0xd4/0xe0
[  107.313255]  kmalloc_trace+0x8c/0x150
[  107.314023]  kasan_strings+0xa0/0x530
[  107.314643]  kunit_try_run_case+0x8c/0x124
[  107.315306]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  107.316095]  kthread+0x15c/0x170
[  107.316645]  ret_from_fork+0x10/0x20
[  107.317216] 
[  107.317486] Freed by task 248:
[  107.317933]  kasan_save_stack+0x3c/0x70
[  107.318519]  kasan_set_track+0x2c/0x40
[  107.319148]  kasan_save_free_info+0x38/0x5c
[  107.319800]  __kasan_slab_free+0x100/0x170
[  107.320422]  slab_free_freelist_hook+0xd8/0x1c0
[  107.321255]  __kmem_cache_free+0x15c/0x2a0
[  107.321919]  kfree+0x88/0x150
[  107.322424]  kasan_strings+0xc0/0x530
[  107.323053]  kunit_try_run_case+0x8c/0x124
[  107.323711]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  107.324515]  kthread+0x15c/0x170
[  107.325062]  ret_from_fork+0x10/0x20
[  107.325613] 
[  107.325891] The buggy address belongs to the object at ffff0000c66ab400
[  107.325891]  which belongs to the cache kmalloc-128 of size 128
[  107.327307] The buggy address is located 16 bytes inside of
[  107.327307]  128-byte region [ffff0000c66ab400, ffff0000c66ab480)
[  107.328697] 
[  107.329030] The buggy address belongs to the physical page:
[  107.329954] page:0000000069500412 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ab
[  107.331328] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  107.332316] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  107.332868] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  107.333355] page dumped because: kasan: bad access detected
[  107.333722] 
[  107.334191] Memory state around the buggy address:
[  107.335025]  ffff0000c66ab300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  107.335936]  ffff0000c66ab380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  107.336920] >ffff0000c66ab400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  107.337926]                          ^
[  107.338522]  ffff0000c66ab480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  107.339528]  ffff0000c66ab500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  107.340508] ==================================================================

[   76.985504] ==================================================================
[   76.986007] BUG: KASAN: use-after-free in strnlen+0x3c/0x74
[   76.986632] Read of size 1 at addr ffff0000c5abca10 by task kunit_try_catch/164
[   76.987233] 
[   76.987475] CPU: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   76.988262] Hardware name: linux,dummy-virt (DT)
[   76.988674] Call trace:
[   76.989439]  dump_backtrace+0xf8/0x118
[   76.989922]  show_stack+0x18/0x24
[   76.990369]  __dump_stack+0x28/0x38
[   76.990819]  dump_stack_lvl+0x54/0x6c
[   76.991268]  print_address_description+0x7c/0x1ec
[   76.991802]  print_report+0x50/0x68
[   76.992244]  kasan_report+0xac/0x100
[   76.992979]  __asan_load1+0x6c/0x70
[   76.993443]  strnlen+0x3c/0x74
[   76.993869]  kasan_strings+0x234/0x404
[   76.994306]  kunit_try_run_case+0x80/0x184
[   76.994818]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.995402]  kthread+0x16c/0x21c
[   76.995856]  ret_from_fork+0x10/0x20
[   76.996274] 
[   76.996480] Allocated by task 164:
[   76.997354]  kasan_set_track+0x4c/0x80
[   76.997840]  kasan_save_alloc_info+0x28/0x34
[   76.998335]  __kasan_kmalloc+0x88/0xa0
[   76.998831]  kmalloc_trace+0x54/0x68
[   76.999287]  kasan_strings+0x48/0x404
[   76.999716]  kunit_try_run_case+0x80/0x184
[   77.000180]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   77.000959]  kthread+0x16c/0x21c
[   77.001380]  ret_from_fork+0x10/0x20
[   77.001833] 
[   77.002015] Freed by task 164:
[   77.002366]  kasan_set_track+0x4c/0x80
[   77.002978]  kasan_save_free_info+0x3c/0x60
[   77.003433]  ____kasan_slab_free+0xe8/0x140
[   77.003919]  __kasan_slab_free+0x18/0x28
[   77.004391]  __kmem_cache_free+0xdc/0x284
[   77.005281]  kfree+0x60/0x74
[   77.005679]  kasan_strings+0x90/0x404
[   77.006113]  kunit_try_run_case+0x80/0x184
[   77.006561]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   77.007128]  kthread+0x16c/0x21c
[   77.007527]  ret_from_fork+0x10/0x20
[   77.007992] 
[   77.008176] The buggy address belongs to the object at ffff0000c5abca00
[   77.008176]  which belongs to the cache kmalloc-128 of size 128
[   77.009355] The buggy address is located 16 bytes inside of
[   77.009355]  128-byte region [ffff0000c5abca00, ffff0000c5abca80)
[   77.010237] 
[   77.010461] The buggy address belongs to the physical page:
[   77.010918] page:00000000b0163b2b refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105abc
[   77.011702] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   77.012524] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   77.013654] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   77.014305] page dumped because: kasan: bad access detected
[   77.014785] 
[   77.014970] Memory state around the buggy address:
[   77.015424]  ffff0000c5abc900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   77.016066]  ffff0000c5abc980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.016984] >ffff0000c5abca00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   77.017552]                          ^
[   77.017952]  ffff0000c5abca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.018585]  ffff0000c5abcb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.019181] ==================================================================

[   76.130871] ==================================================================
[   76.131485] BUG: KASAN: use-after-free in strnlen+0x3c/0x74
[   76.132344] Read of size 1 at addr ffff0000c58a7510 by task kunit_try_catch/164
[   76.133237] 
[   76.133575] CPU: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   76.134412] Hardware name: linux,dummy-virt (DT)
[   76.134864] Call trace:
[   76.135137]  dump_backtrace+0xf4/0x114
[   76.135654]  show_stack+0x18/0x24
[   76.136187]  __dump_stack+0x28/0x38
[   76.136794]  dump_stack_lvl+0x50/0x68
[   76.137233]  print_address_description+0x7c/0x1ec
[   76.137812]  print_report+0x50/0x68
[   76.138277]  kasan_report+0xac/0xfc
[   76.138747]  __asan_load1+0x6c/0x70
[   76.139189]  strnlen+0x3c/0x74
[   76.139582]  kasan_strings+0x234/0x404
[   76.140111]  kunit_try_run_case+0x80/0x184
[   76.140701]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.141360]  kthread+0x16c/0x21c
[   76.141819]  ret_from_fork+0x10/0x20
[   76.142348] 
[   76.142574] Allocated by task 164:
[   76.142924]  kasan_set_track+0x4c/0x80
[   76.143444]  kasan_save_alloc_info+0x28/0x34
[   76.144016]  __kasan_kmalloc+0x88/0xa0
[   76.144594]  kmalloc_trace+0x54/0x68
[   76.145091]  kasan_strings+0x48/0x404
[   76.145566]  kunit_try_run_case+0x80/0x184
[   76.146065]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.146647]  kthread+0x16c/0x21c
[   76.147096]  ret_from_fork+0x10/0x20
[   76.147544] 
[   76.147767] Freed by task 164:
[   76.148145]  kasan_set_track+0x4c/0x80
[   76.148689]  kasan_save_free_info+0x3c/0x60
[   76.149161]  ____kasan_slab_free+0xe8/0x140
[   76.149714]  __kasan_slab_free+0x18/0x28
[   76.150265]  __kmem_cache_free+0xdc/0x27c
[   76.150754]  kfree+0x60/0x74
[   76.151131]  kasan_strings+0x90/0x404
[   76.151610]  kunit_try_run_case+0x80/0x184
[   76.152356]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.152972]  kthread+0x16c/0x21c
[   76.153384]  ret_from_fork+0x10/0x20
[   76.153838] 
[   76.154037] The buggy address belongs to the object at ffff0000c58a7500
[   76.154037]  which belongs to the cache kmalloc-128 of size 128
[   76.154984] The buggy address is located 16 bytes inside of
[   76.154984]  128-byte region [ffff0000c58a7500, ffff0000c58a7580)
[   76.155954] 
[   76.156243] The buggy address belongs to the physical page:
[   76.156795] page:00000000333134b1 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7
[   76.157748] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   76.158513] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   76.159227] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   76.159929] page dumped because: kasan: bad access detected
[   76.160538] 
[   76.160922] Memory state around the buggy address:
[   76.161357]  ffff0000c58a7400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   76.161981]  ffff0000c58a7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.162616] >ffff0000c58a7500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   76.163191]                          ^
[   76.163562]  ffff0000c58a7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.164148]  ffff0000c58a7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.164816] ==================================================================

[   74.711153] ==================================================================
[   74.711700] BUG: KASAN: use-after-free in strnlen+0x3c/0x6c
[   74.712304] Read of size 1 at addr ffff0000c5938710 by task kunit_try_catch/164
[   74.712943] 
[   74.713178] CPU: 1 PID: 164 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   74.713813] Hardware name: linux,dummy-virt (DT)
[   74.714966] Call trace:
[   74.715219]  dump_backtrace.part.0+0xdc/0xf0
[   74.715744]  show_stack+0x18/0x30
[   74.716136]  dump_stack_lvl+0x64/0x80
[   74.716587]  print_report+0x158/0x438
[   74.716999]  kasan_report+0xb4/0xf4
[   74.717402]  __asan_load1+0x68/0x74
[   74.717989]  strnlen+0x3c/0x6c
[   74.718390]  kasan_strings+0x18c/0x520
[   74.718834]  kunit_try_run_case+0x84/0x120
[   74.719303]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   74.719840]  kthread+0x180/0x190
[   74.720217]  ret_from_fork+0x10/0x20
[   74.720646] 
[   74.720821] Allocated by task 164:
[   74.721161]  kasan_save_stack+0x3c/0x70
[   74.721615]  kasan_set_track+0x2c/0x40
[   74.722166]  kasan_save_alloc_info+0x24/0x34
[   74.722651]  __kasan_kmalloc+0xb8/0xc0
[   74.723047]  kmalloc_trace+0x58/0x6c
[   74.723465]  kasan_strings+0x98/0x520
[   74.723900]  kunit_try_run_case+0x84/0x120
[   74.724352]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   74.724952]  kthread+0x180/0x190
[   74.725321]  ret_from_fork+0x10/0x20
[   74.725733] 
[   74.726180] Freed by task 164:
[   74.726505]  kasan_save_stack+0x3c/0x70
[   74.726924]  kasan_set_track+0x2c/0x40
[   74.727287]  kasan_save_free_info+0x38/0x5c
[   74.727801]  __kasan_slab_free+0xe4/0x150
[   74.728210]  __kmem_cache_free+0x130/0x2a4
[   74.728700]  kfree+0x58/0x80
[   74.729057]  kasan_strings+0xb8/0x520
[   74.729477]  kunit_try_run_case+0x84/0x120
[   74.730072]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   74.730664]  kthread+0x180/0x190
[   74.731041]  ret_from_fork+0x10/0x20
[   74.731432] 
[   74.731640] The buggy address belongs to the object at ffff0000c5938700
[   74.731640]  which belongs to the cache kmalloc-128 of size 128
[   74.732616] The buggy address is located 16 bytes inside of
[   74.732616]  128-byte region [ffff0000c5938700, ffff0000c5938780)
[   74.733484] 
[   74.733684] The buggy address belongs to the physical page:
[   74.734956] page:000000003af4cecf refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105938
[   74.735716] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   74.736422] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   74.737070] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   74.737695] page dumped because: kasan: bad access detected
[   74.738315] 
[   74.738509] Memory state around the buggy address:
[   74.738932]  ffff0000c5938600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   74.739570]  ffff0000c5938680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.740187] >ffff0000c5938700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   74.740748]                          ^
[   74.741081]  ffff0000c5938780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.741692]  ffff0000c5938800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.742420] ==================================================================

[   66.113433] ==================================================================
[   66.114035] BUG: KASAN: use-after-free in strnlen+0x20/0x90
[   66.114537] Read of size 1 at addr ffff0000c59bd910 by task kunit_try_catch/162
[   66.115140] 
[   66.115366] CPU: 1 PID: 162 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   66.115988] Hardware name: linux,dummy-virt (DT)
[   66.116696] Call trace:
[   66.116939]  dump_backtrace+0x110/0x120
[   66.117531]  show_stack+0x18/0x28
[   66.118484]  dump_stack_lvl+0x68/0x84
[   66.119068]  print_report+0x158/0x484
[   66.119449]  kasan_report+0x98/0xe0
[   66.119757]  __asan_load1+0x68/0x78
[   66.120056]  strnlen+0x20/0x90
[   66.120404]  kasan_strings+0x1c8/0x4e0
[   66.120864]  kunit_try_run_case+0x7c/0x120
[   66.121367]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   66.122084]  kthread+0x1a4/0x1b8
[   66.122609]  ret_from_fork+0x10/0x20
[   66.123004] 
[   66.123187] Allocated by task 162:
[   66.123538]  kasan_save_stack+0x2c/0x58
[   66.123966]  kasan_set_track+0x2c/0x40
[   66.124389]  kasan_save_alloc_info+0x24/0x38
[   66.124832]  __kasan_kmalloc+0xa0/0xb8
[   66.125208]  kmalloc_trace+0x50/0x68
[   66.125783]  kasan_strings+0xa8/0x4e0
[   66.126200]  kunit_try_run_case+0x7c/0x120
[   66.127028]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   66.127613]  kthread+0x1a4/0x1b8
[   66.127981]  ret_from_fork+0x10/0x20
[   66.128373] 
[   66.128566] Freed by task 162:
[   66.128907]  kasan_save_stack+0x2c/0x58
[   66.129324]  kasan_set_track+0x2c/0x40
[   66.129948]  kasan_save_free_info+0x38/0x60
[   66.130498]  __kasan_slab_free+0xe8/0x158
[   66.130902]  __kmem_cache_free+0x138/0x2b0
[   66.131377]  kfree+0x5c/0x70
[   66.131716]  kasan_strings+0xc8/0x4e0
[   66.132128]  kunit_try_run_case+0x7c/0x120
[   66.132572]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   66.133110]  kthread+0x1a4/0x1b8
[   66.133440]  ret_from_fork+0x10/0x20
[   66.133963] 
[   66.134659] The buggy address belongs to the object at ffff0000c59bd900
[   66.134659]  which belongs to the cache kmalloc-128 of size 128
[   66.135595] The buggy address is located 16 bytes inside of
[   66.135595]  128-byte region [ffff0000c59bd900, ffff0000c59bd980)
[   66.136465] 
[   66.136701] The buggy address belongs to the physical page:
[   66.137136] page:00000000a3aeb2fe refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059bd
[   66.138135] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   66.138796] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   66.139394] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   66.139971] page dumped because: kasan: bad access detected
[   66.140432] 
[   66.140625] Memory state around the buggy address:
[   66.141022]  ffff0000c59bd800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   66.142046]  ffff0000c59bd880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.142654] >ffff0000c59bd900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   66.143197]                          ^
[   66.143582]  ffff0000c59bd980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.144159]  ffff0000c59bda00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.144737] ==================================================================

[   32.202493] ==================================================================
[   32.202867] BUG: KASAN: use-after-free in strnlen+0x2d/0x50
[   32.203174] Read of size 1 at addr ffff8881037341d0 by task kunit_try_catch/268
[   32.203618] 
[   32.203767] CPU: 1 PID: 268 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   32.204076] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.204738] Call Trace:
[   32.204889]  <TASK>
[   32.205008]  dump_stack_lvl+0x49/0x62
[   32.205270]  print_report+0x189/0x492
[   32.205511]  ? kasan_complete_mode_report_info+0x7c/0x200
[   32.205751]  ? strnlen+0x2d/0x50
[   32.205909]  kasan_report+0x10c/0x190
[   32.206140]  ? kasan_report.cold+0xc/0x11
[   32.206487]  ? strnlen+0x2d/0x50
[   32.206823]  __asan_load1+0x62/0x70
[   32.206995]  strnlen+0x2d/0x50
[   32.207145]  kasan_strings+0x1f7/0x4e0
[   32.207330]  ? kmalloc_oob_right+0x310/0x310
[   32.207555]  ? __kunit_add_resource+0xd1/0x100
[   32.208017]  ? kasan_test_init+0x13e/0x1b0
[   32.208277]  kunit_try_run_case+0x8f/0xd0
[   32.208585]  ? kunit_catch_run_case+0x80/0x80
[   32.208866]  ? kunit_try_catch_throw+0x40/0x40
[   32.209273]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   32.209708]  kthread+0x17b/0x1b0
[   32.209868]  ? kthread_complete_and_exit+0x30/0x30
[   32.210072]  ret_from_fork+0x22/0x30
[   32.210405]  </TASK>
[   32.210555] 
[   32.210662] Allocated by task 268:
[   32.210858]  kasan_save_stack+0x41/0x70
[   32.211099]  kasan_set_track+0x25/0x40
[   32.211363]  kasan_save_alloc_info+0x1e/0x30
[   32.211598]  __kasan_kmalloc+0xb6/0xc0
[   32.211805]  kmalloc_trace+0x48/0xb0
[   32.211981]  kasan_strings+0x99/0x4e0
[   32.212209]  kunit_try_run_case+0x8f/0xd0
[   32.212507]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   32.212786]  kthread+0x17b/0x1b0
[   32.212939]  ret_from_fork+0x22/0x30
[   32.213100] 
[   32.213203] Freed by task 268:
[   32.213442]  kasan_save_stack+0x41/0x70
[   32.213677]  kasan_set_track+0x25/0x40
[   32.214075]  kasan_save_free_info+0x2e/0x50
[   32.214280]  ____kasan_slab_free+0x175/0x1d0
[   32.214467]  __kasan_slab_free+0x12/0x20
[   32.214643]  __kmem_cache_free+0x188/0x2f0
[   32.214888]  kfree+0x78/0x120
[   32.215076]  kasan_strings+0xbd/0x4e0
[   32.215296]  kunit_try_run_case+0x8f/0xd0
[   32.215536]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   32.215849]  kthread+0x17b/0x1b0
[   32.216185]  ret_from_fork+0x22/0x30
[   32.216349] 
[   32.216435] The buggy address belongs to the object at ffff8881037341c0
[   32.216435]  which belongs to the cache kmalloc-32 of size 32
[   32.217030] The buggy address is located 16 bytes inside of
[   32.217030]  32-byte region [ffff8881037341c0, ffff8881037341e0)
[   32.217406] 
[   32.217495] The buggy address belongs to the physical page:
[   32.217690] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103734
[   32.218239] flags: 0x200000000000200(slab|node=0|zone=2)
[   32.218544] raw: 0200000000000200 0000000000000000 dead000000000122 ffff888100041500
[   32.219023] raw: 0000000000000000 0000000080400040 00000001ffffffff 0000000000000000
[   32.219392] page dumped because: kasan: bad access detected
[   32.219671] 
[   32.219779] Memory state around the buggy address:
[   32.219986]  ffff888103734080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   32.220248]  ffff888103734100: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   32.220912] >ffff888103734180: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   32.221304]                                                  ^
[   32.221569]  ffff888103734200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.221821]  ffff888103734280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.222105] ==================================================================