Date
July 15, 2025, 2:10 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 107.298090] ================================================================== [ 107.299072] BUG: KASAN: use-after-free in strnlen+0x3c/0x6c [ 107.299938] Read of size 1 at addr ffff0000c66ab410 by task kunit_try_catch/248 [ 107.301013] [ 107.301391] CPU: 1 PID: 248 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 107.302454] Hardware name: linux,dummy-virt (DT) [ 107.303075] Call trace: [ 107.303481] dump_backtrace+0xe0/0x134 [ 107.304088] show_stack+0x20/0x2c [ 107.304674] dump_stack_lvl+0x88/0xb4 [ 107.305477] print_report+0x158/0x44c [ 107.306175] kasan_report+0xc8/0x180 [ 107.306795] __asan_load1+0x68/0x74 [ 107.307525] strnlen+0x3c/0x6c [ 107.308099] kasan_strings+0x194/0x530 [ 107.308653] kunit_try_run_case+0x8c/0x124 [ 107.309079] kunit_generic_run_threadfn_adapter+0x38/0x54 [ 107.309573] kthread+0x15c/0x170 [ 107.309972] ret_from_fork+0x10/0x20 [ 107.310379] [ 107.310617] Allocated by task 248: [ 107.311011] kasan_save_stack+0x3c/0x70 [ 107.311451] kasan_set_track+0x2c/0x40 [ 107.311895] kasan_save_alloc_info+0x24/0x34 [ 107.312529] __kasan_kmalloc+0xd4/0xe0 [ 107.313255] kmalloc_trace+0x8c/0x150 [ 107.314023] kasan_strings+0xa0/0x530 [ 107.314643] kunit_try_run_case+0x8c/0x124 [ 107.315306] kunit_generic_run_threadfn_adapter+0x38/0x54 [ 107.316095] kthread+0x15c/0x170 [ 107.316645] ret_from_fork+0x10/0x20 [ 107.317216] [ 107.317486] Freed by task 248: [ 107.317933] kasan_save_stack+0x3c/0x70 [ 107.318519] kasan_set_track+0x2c/0x40 [ 107.319148] kasan_save_free_info+0x38/0x5c [ 107.319800] __kasan_slab_free+0x100/0x170 [ 107.320422] slab_free_freelist_hook+0xd8/0x1c0 [ 107.321255] __kmem_cache_free+0x15c/0x2a0 [ 107.321919] kfree+0x88/0x150 [ 107.322424] kasan_strings+0xc0/0x530 [ 107.323053] kunit_try_run_case+0x8c/0x124 [ 107.323711] kunit_generic_run_threadfn_adapter+0x38/0x54 [ 107.324515] kthread+0x15c/0x170 [ 107.325062] ret_from_fork+0x10/0x20 [ 107.325613] [ 107.325891] The buggy address belongs to the object at ffff0000c66ab400 [ 107.325891] which belongs to the cache kmalloc-128 of size 128 [ 107.327307] The buggy address is located 16 bytes inside of [ 107.327307] 128-byte region [ffff0000c66ab400, ffff0000c66ab480) [ 107.328697] [ 107.329030] The buggy address belongs to the physical page: [ 107.329954] page:0000000069500412 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ab [ 107.331328] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 107.332316] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 107.332868] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 107.333355] page dumped because: kasan: bad access detected [ 107.333722] [ 107.334191] Memory state around the buggy address: [ 107.335025] ffff0000c66ab300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 107.335936] ffff0000c66ab380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 107.336920] >ffff0000c66ab400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 107.337926] ^ [ 107.338522] ffff0000c66ab480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 107.339528] ffff0000c66ab500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 107.340508] ==================================================================
[ 76.985504] ================================================================== [ 76.986007] BUG: KASAN: use-after-free in strnlen+0x3c/0x74 [ 76.986632] Read of size 1 at addr ffff0000c5abca10 by task kunit_try_catch/164 [ 76.987233] [ 76.987475] CPU: 0 PID: 164 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 76.988262] Hardware name: linux,dummy-virt (DT) [ 76.988674] Call trace: [ 76.989439] dump_backtrace+0xf8/0x118 [ 76.989922] show_stack+0x18/0x24 [ 76.990369] __dump_stack+0x28/0x38 [ 76.990819] dump_stack_lvl+0x54/0x6c [ 76.991268] print_address_description+0x7c/0x1ec [ 76.991802] print_report+0x50/0x68 [ 76.992244] kasan_report+0xac/0x100 [ 76.992979] __asan_load1+0x6c/0x70 [ 76.993443] strnlen+0x3c/0x74 [ 76.993869] kasan_strings+0x234/0x404 [ 76.994306] kunit_try_run_case+0x80/0x184 [ 76.994818] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.995402] kthread+0x16c/0x21c [ 76.995856] ret_from_fork+0x10/0x20 [ 76.996274] [ 76.996480] Allocated by task 164: [ 76.997354] kasan_set_track+0x4c/0x80 [ 76.997840] kasan_save_alloc_info+0x28/0x34 [ 76.998335] __kasan_kmalloc+0x88/0xa0 [ 76.998831] kmalloc_trace+0x54/0x68 [ 76.999287] kasan_strings+0x48/0x404 [ 76.999716] kunit_try_run_case+0x80/0x184 [ 77.000180] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 77.000959] kthread+0x16c/0x21c [ 77.001380] ret_from_fork+0x10/0x20 [ 77.001833] [ 77.002015] Freed by task 164: [ 77.002366] kasan_set_track+0x4c/0x80 [ 77.002978] kasan_save_free_info+0x3c/0x60 [ 77.003433] ____kasan_slab_free+0xe8/0x140 [ 77.003919] __kasan_slab_free+0x18/0x28 [ 77.004391] __kmem_cache_free+0xdc/0x284 [ 77.005281] kfree+0x60/0x74 [ 77.005679] kasan_strings+0x90/0x404 [ 77.006113] kunit_try_run_case+0x80/0x184 [ 77.006561] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 77.007128] kthread+0x16c/0x21c [ 77.007527] ret_from_fork+0x10/0x20 [ 77.007992] [ 77.008176] The buggy address belongs to the object at ffff0000c5abca00 [ 77.008176] which belongs to the cache kmalloc-128 of size 128 [ 77.009355] The buggy address is located 16 bytes inside of [ 77.009355] 128-byte region [ffff0000c5abca00, ffff0000c5abca80) [ 77.010237] [ 77.010461] The buggy address belongs to the physical page: [ 77.010918] page:00000000b0163b2b refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105abc [ 77.011702] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 77.012524] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 77.013654] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 77.014305] page dumped because: kasan: bad access detected [ 77.014785] [ 77.014970] Memory state around the buggy address: [ 77.015424] ffff0000c5abc900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 77.016066] ffff0000c5abc980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.016984] >ffff0000c5abca00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 77.017552] ^ [ 77.017952] ffff0000c5abca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.018585] ffff0000c5abcb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.019181] ==================================================================
[ 76.130871] ================================================================== [ 76.131485] BUG: KASAN: use-after-free in strnlen+0x3c/0x74 [ 76.132344] Read of size 1 at addr ffff0000c58a7510 by task kunit_try_catch/164 [ 76.133237] [ 76.133575] CPU: 0 PID: 164 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 76.134412] Hardware name: linux,dummy-virt (DT) [ 76.134864] Call trace: [ 76.135137] dump_backtrace+0xf4/0x114 [ 76.135654] show_stack+0x18/0x24 [ 76.136187] __dump_stack+0x28/0x38 [ 76.136794] dump_stack_lvl+0x50/0x68 [ 76.137233] print_address_description+0x7c/0x1ec [ 76.137812] print_report+0x50/0x68 [ 76.138277] kasan_report+0xac/0xfc [ 76.138747] __asan_load1+0x6c/0x70 [ 76.139189] strnlen+0x3c/0x74 [ 76.139582] kasan_strings+0x234/0x404 [ 76.140111] kunit_try_run_case+0x80/0x184 [ 76.140701] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.141360] kthread+0x16c/0x21c [ 76.141819] ret_from_fork+0x10/0x20 [ 76.142348] [ 76.142574] Allocated by task 164: [ 76.142924] kasan_set_track+0x4c/0x80 [ 76.143444] kasan_save_alloc_info+0x28/0x34 [ 76.144016] __kasan_kmalloc+0x88/0xa0 [ 76.144594] kmalloc_trace+0x54/0x68 [ 76.145091] kasan_strings+0x48/0x404 [ 76.145566] kunit_try_run_case+0x80/0x184 [ 76.146065] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.146647] kthread+0x16c/0x21c [ 76.147096] ret_from_fork+0x10/0x20 [ 76.147544] [ 76.147767] Freed by task 164: [ 76.148145] kasan_set_track+0x4c/0x80 [ 76.148689] kasan_save_free_info+0x3c/0x60 [ 76.149161] ____kasan_slab_free+0xe8/0x140 [ 76.149714] __kasan_slab_free+0x18/0x28 [ 76.150265] __kmem_cache_free+0xdc/0x27c [ 76.150754] kfree+0x60/0x74 [ 76.151131] kasan_strings+0x90/0x404 [ 76.151610] kunit_try_run_case+0x80/0x184 [ 76.152356] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.152972] kthread+0x16c/0x21c [ 76.153384] ret_from_fork+0x10/0x20 [ 76.153838] [ 76.154037] The buggy address belongs to the object at ffff0000c58a7500 [ 76.154037] which belongs to the cache kmalloc-128 of size 128 [ 76.154984] The buggy address is located 16 bytes inside of [ 76.154984] 128-byte region [ffff0000c58a7500, ffff0000c58a7580) [ 76.155954] [ 76.156243] The buggy address belongs to the physical page: [ 76.156795] page:00000000333134b1 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7 [ 76.157748] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 76.158513] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 76.159227] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 76.159929] page dumped because: kasan: bad access detected [ 76.160538] [ 76.160922] Memory state around the buggy address: [ 76.161357] ffff0000c58a7400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 76.161981] ffff0000c58a7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.162616] >ffff0000c58a7500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 76.163191] ^ [ 76.163562] ffff0000c58a7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.164148] ffff0000c58a7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.164816] ==================================================================
[ 74.711153] ================================================================== [ 74.711700] BUG: KASAN: use-after-free in strnlen+0x3c/0x6c [ 74.712304] Read of size 1 at addr ffff0000c5938710 by task kunit_try_catch/164 [ 74.712943] [ 74.713178] CPU: 1 PID: 164 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 74.713813] Hardware name: linux,dummy-virt (DT) [ 74.714966] Call trace: [ 74.715219] dump_backtrace.part.0+0xdc/0xf0 [ 74.715744] show_stack+0x18/0x30 [ 74.716136] dump_stack_lvl+0x64/0x80 [ 74.716587] print_report+0x158/0x438 [ 74.716999] kasan_report+0xb4/0xf4 [ 74.717402] __asan_load1+0x68/0x74 [ 74.717989] strnlen+0x3c/0x6c [ 74.718390] kasan_strings+0x18c/0x520 [ 74.718834] kunit_try_run_case+0x84/0x120 [ 74.719303] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 74.719840] kthread+0x180/0x190 [ 74.720217] ret_from_fork+0x10/0x20 [ 74.720646] [ 74.720821] Allocated by task 164: [ 74.721161] kasan_save_stack+0x3c/0x70 [ 74.721615] kasan_set_track+0x2c/0x40 [ 74.722166] kasan_save_alloc_info+0x24/0x34 [ 74.722651] __kasan_kmalloc+0xb8/0xc0 [ 74.723047] kmalloc_trace+0x58/0x6c [ 74.723465] kasan_strings+0x98/0x520 [ 74.723900] kunit_try_run_case+0x84/0x120 [ 74.724352] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 74.724952] kthread+0x180/0x190 [ 74.725321] ret_from_fork+0x10/0x20 [ 74.725733] [ 74.726180] Freed by task 164: [ 74.726505] kasan_save_stack+0x3c/0x70 [ 74.726924] kasan_set_track+0x2c/0x40 [ 74.727287] kasan_save_free_info+0x38/0x5c [ 74.727801] __kasan_slab_free+0xe4/0x150 [ 74.728210] __kmem_cache_free+0x130/0x2a4 [ 74.728700] kfree+0x58/0x80 [ 74.729057] kasan_strings+0xb8/0x520 [ 74.729477] kunit_try_run_case+0x84/0x120 [ 74.730072] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 74.730664] kthread+0x180/0x190 [ 74.731041] ret_from_fork+0x10/0x20 [ 74.731432] [ 74.731640] The buggy address belongs to the object at ffff0000c5938700 [ 74.731640] which belongs to the cache kmalloc-128 of size 128 [ 74.732616] The buggy address is located 16 bytes inside of [ 74.732616] 128-byte region [ffff0000c5938700, ffff0000c5938780) [ 74.733484] [ 74.733684] The buggy address belongs to the physical page: [ 74.734956] page:000000003af4cecf refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105938 [ 74.735716] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 74.736422] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 74.737070] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 74.737695] page dumped because: kasan: bad access detected [ 74.738315] [ 74.738509] Memory state around the buggy address: [ 74.738932] ffff0000c5938600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 74.739570] ffff0000c5938680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.740187] >ffff0000c5938700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 74.740748] ^ [ 74.741081] ffff0000c5938780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.741692] ffff0000c5938800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.742420] ==================================================================
[ 66.113433] ================================================================== [ 66.114035] BUG: KASAN: use-after-free in strnlen+0x20/0x90 [ 66.114537] Read of size 1 at addr ffff0000c59bd910 by task kunit_try_catch/162 [ 66.115140] [ 66.115366] CPU: 1 PID: 162 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 66.115988] Hardware name: linux,dummy-virt (DT) [ 66.116696] Call trace: [ 66.116939] dump_backtrace+0x110/0x120 [ 66.117531] show_stack+0x18/0x28 [ 66.118484] dump_stack_lvl+0x68/0x84 [ 66.119068] print_report+0x158/0x484 [ 66.119449] kasan_report+0x98/0xe0 [ 66.119757] __asan_load1+0x68/0x78 [ 66.120056] strnlen+0x20/0x90 [ 66.120404] kasan_strings+0x1c8/0x4e0 [ 66.120864] kunit_try_run_case+0x7c/0x120 [ 66.121367] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 66.122084] kthread+0x1a4/0x1b8 [ 66.122609] ret_from_fork+0x10/0x20 [ 66.123004] [ 66.123187] Allocated by task 162: [ 66.123538] kasan_save_stack+0x2c/0x58 [ 66.123966] kasan_set_track+0x2c/0x40 [ 66.124389] kasan_save_alloc_info+0x24/0x38 [ 66.124832] __kasan_kmalloc+0xa0/0xb8 [ 66.125208] kmalloc_trace+0x50/0x68 [ 66.125783] kasan_strings+0xa8/0x4e0 [ 66.126200] kunit_try_run_case+0x7c/0x120 [ 66.127028] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 66.127613] kthread+0x1a4/0x1b8 [ 66.127981] ret_from_fork+0x10/0x20 [ 66.128373] [ 66.128566] Freed by task 162: [ 66.128907] kasan_save_stack+0x2c/0x58 [ 66.129324] kasan_set_track+0x2c/0x40 [ 66.129948] kasan_save_free_info+0x38/0x60 [ 66.130498] __kasan_slab_free+0xe8/0x158 [ 66.130902] __kmem_cache_free+0x138/0x2b0 [ 66.131377] kfree+0x5c/0x70 [ 66.131716] kasan_strings+0xc8/0x4e0 [ 66.132128] kunit_try_run_case+0x7c/0x120 [ 66.132572] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 66.133110] kthread+0x1a4/0x1b8 [ 66.133440] ret_from_fork+0x10/0x20 [ 66.133963] [ 66.134659] The buggy address belongs to the object at ffff0000c59bd900 [ 66.134659] which belongs to the cache kmalloc-128 of size 128 [ 66.135595] The buggy address is located 16 bytes inside of [ 66.135595] 128-byte region [ffff0000c59bd900, ffff0000c59bd980) [ 66.136465] [ 66.136701] The buggy address belongs to the physical page: [ 66.137136] page:00000000a3aeb2fe refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059bd [ 66.138135] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 66.138796] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 66.139394] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 66.139971] page dumped because: kasan: bad access detected [ 66.140432] [ 66.140625] Memory state around the buggy address: [ 66.141022] ffff0000c59bd800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 66.142046] ffff0000c59bd880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.142654] >ffff0000c59bd900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 66.143197] ^ [ 66.143582] ffff0000c59bd980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.144159] ffff0000c59bda00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.144737] ==================================================================
[ 32.202493] ================================================================== [ 32.202867] BUG: KASAN: use-after-free in strnlen+0x2d/0x50 [ 32.203174] Read of size 1 at addr ffff8881037341d0 by task kunit_try_catch/268 [ 32.203618] [ 32.203767] CPU: 1 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 32.204076] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 32.204738] Call Trace: [ 32.204889] <TASK> [ 32.205008] dump_stack_lvl+0x49/0x62 [ 32.205270] print_report+0x189/0x492 [ 32.205511] ? kasan_complete_mode_report_info+0x7c/0x200 [ 32.205751] ? strnlen+0x2d/0x50 [ 32.205909] kasan_report+0x10c/0x190 [ 32.206140] ? kasan_report.cold+0xc/0x11 [ 32.206487] ? strnlen+0x2d/0x50 [ 32.206823] __asan_load1+0x62/0x70 [ 32.206995] strnlen+0x2d/0x50 [ 32.207145] kasan_strings+0x1f7/0x4e0 [ 32.207330] ? kmalloc_oob_right+0x310/0x310 [ 32.207555] ? __kunit_add_resource+0xd1/0x100 [ 32.208017] ? kasan_test_init+0x13e/0x1b0 [ 32.208277] kunit_try_run_case+0x8f/0xd0 [ 32.208585] ? kunit_catch_run_case+0x80/0x80 [ 32.208866] ? kunit_try_catch_throw+0x40/0x40 [ 32.209273] kunit_generic_run_threadfn_adapter+0x2f/0x50 [ 32.209708] kthread+0x17b/0x1b0 [ 32.209868] ? kthread_complete_and_exit+0x30/0x30 [ 32.210072] ret_from_fork+0x22/0x30 [ 32.210405] </TASK> [ 32.210555] [ 32.210662] Allocated by task 268: [ 32.210858] kasan_save_stack+0x41/0x70 [ 32.211099] kasan_set_track+0x25/0x40 [ 32.211363] kasan_save_alloc_info+0x1e/0x30 [ 32.211598] __kasan_kmalloc+0xb6/0xc0 [ 32.211805] kmalloc_trace+0x48/0xb0 [ 32.211981] kasan_strings+0x99/0x4e0 [ 32.212209] kunit_try_run_case+0x8f/0xd0 [ 32.212507] kunit_generic_run_threadfn_adapter+0x2f/0x50 [ 32.212786] kthread+0x17b/0x1b0 [ 32.212939] ret_from_fork+0x22/0x30 [ 32.213100] [ 32.213203] Freed by task 268: [ 32.213442] kasan_save_stack+0x41/0x70 [ 32.213677] kasan_set_track+0x25/0x40 [ 32.214075] kasan_save_free_info+0x2e/0x50 [ 32.214280] ____kasan_slab_free+0x175/0x1d0 [ 32.214467] __kasan_slab_free+0x12/0x20 [ 32.214643] __kmem_cache_free+0x188/0x2f0 [ 32.214888] kfree+0x78/0x120 [ 32.215076] kasan_strings+0xbd/0x4e0 [ 32.215296] kunit_try_run_case+0x8f/0xd0 [ 32.215536] kunit_generic_run_threadfn_adapter+0x2f/0x50 [ 32.215849] kthread+0x17b/0x1b0 [ 32.216185] ret_from_fork+0x22/0x30 [ 32.216349] [ 32.216435] The buggy address belongs to the object at ffff8881037341c0 [ 32.216435] which belongs to the cache kmalloc-32 of size 32 [ 32.217030] The buggy address is located 16 bytes inside of [ 32.217030] 32-byte region [ffff8881037341c0, ffff8881037341e0) [ 32.217406] [ 32.217495] The buggy address belongs to the physical page: [ 32.217690] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103734 [ 32.218239] flags: 0x200000000000200(slab|node=0|zone=2) [ 32.218544] raw: 0200000000000200 0000000000000000 dead000000000122 ffff888100041500 [ 32.219023] raw: 0000000000000000 0000000080400040 00000001ffffffff 0000000000000000 [ 32.219392] page dumped because: kasan: bad access detected [ 32.219671] [ 32.219779] Memory state around the buggy address: [ 32.219986] ffff888103734080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 32.220248] ffff888103734100: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 32.220912] >ffff888103734180: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 32.221304] ^ [ 32.221569] ffff888103734200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.221821] ffff888103734280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.222105] ==================================================================