Hay
Date
July 15, 2025, 2:10 p.m.

Environment
qemu-arm64
qemu-x86_64

[  107.141520] ==================================================================
[  107.142786] BUG: KASAN: use-after-free in strrchr+0x28/0x54
[  107.143643] Read of size 1 at addr ffff0000c66ab410 by task kunit_try_catch/248
[  107.144632] 
[  107.145029] CPU: 1 PID: 248 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[  107.145998] Hardware name: linux,dummy-virt (DT)
[  107.146337] Call trace:
[  107.146568]  dump_backtrace+0xe0/0x134
[  107.146946]  show_stack+0x20/0x2c
[  107.147464]  dump_stack_lvl+0x88/0xb4
[  107.148005]  print_report+0x158/0x44c
[  107.148496]  kasan_report+0xc8/0x180
[  107.148963]  __asan_load1+0x68/0x74
[  107.149451]  strrchr+0x28/0x54
[  107.149909]  kasan_strings+0xfc/0x530
[  107.150357]  kunit_try_run_case+0x8c/0x124
[  107.150948]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  107.151490]  kthread+0x15c/0x170
[  107.151976]  ret_from_fork+0x10/0x20
[  107.152599] 
[  107.152907] Allocated by task 248:
[  107.153493]  kasan_save_stack+0x3c/0x70
[  107.154185]  kasan_set_track+0x2c/0x40
[  107.154784]  kasan_save_alloc_info+0x24/0x34
[  107.155520]  __kasan_kmalloc+0xd4/0xe0
[  107.156120]  kmalloc_trace+0x8c/0x150
[  107.156718]  kasan_strings+0xa0/0x530
[  107.157537]  kunit_try_run_case+0x8c/0x124
[  107.157965]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  107.158459]  kthread+0x15c/0x170
[  107.158823]  ret_from_fork+0x10/0x20
[  107.159192] 
[  107.159371] Freed by task 248:
[  107.159637]  kasan_save_stack+0x3c/0x70
[  107.160029]  kasan_set_track+0x2c/0x40
[  107.160537]  kasan_save_free_info+0x38/0x5c
[  107.161801]  __kasan_slab_free+0x100/0x170
[  107.162306]  slab_free_freelist_hook+0xd8/0x1c0
[  107.162717]  __kmem_cache_free+0x15c/0x2a0
[  107.163333]  kfree+0x88/0x150
[  107.163886]  kasan_strings+0xc0/0x530
[  107.164434]  kunit_try_run_case+0x8c/0x124
[  107.165189]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  107.165854]  kthread+0x15c/0x170
[  107.166214]  ret_from_fork+0x10/0x20
[  107.166576] 
[  107.166769] The buggy address belongs to the object at ffff0000c66ab400
[  107.166769]  which belongs to the cache kmalloc-128 of size 128
[  107.167476] The buggy address is located 16 bytes inside of
[  107.167476]  128-byte region [ffff0000c66ab400, ffff0000c66ab480)
[  107.168275] 
[  107.168533] The buggy address belongs to the physical page:
[  107.169058] page:0000000069500412 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ab
[  107.169918] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  107.170812] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  107.171507] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  107.172053] page dumped because: kasan: bad access detected
[  107.172594] 
[  107.172858] Memory state around the buggy address:
[  107.173307]  ffff0000c66ab300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  107.174313]  ffff0000c66ab380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  107.175074] >ffff0000c66ab400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  107.175982]                          ^
[  107.176636]  ffff0000c66ab480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  107.177642]  ffff0000c66ab500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  107.178737] ==================================================================

[   76.842082] ==================================================================
[   76.842651] BUG: KASAN: use-after-free in strrchr+0x34/0x68
[   76.843365] Read of size 1 at addr ffff0000c5abca10 by task kunit_try_catch/164
[   76.843990] 
[   76.844232] CPU: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   76.845009] Hardware name: linux,dummy-virt (DT)
[   76.845601] Call trace:
[   76.845888]  dump_backtrace+0xf8/0x118
[   76.846381]  show_stack+0x18/0x24
[   76.847208]  __dump_stack+0x28/0x38
[   76.847660]  dump_stack_lvl+0x54/0x6c
[   76.848145]  print_address_description+0x7c/0x1ec
[   76.848974]  print_report+0x50/0x68
[   76.849426]  kasan_report+0xac/0x100
[   76.849886]  __asan_load1+0x6c/0x70
[   76.850363]  strrchr+0x34/0x68
[   76.850721]  kasan_strings+0xf8/0x404
[   76.851156]  kunit_try_run_case+0x80/0x184
[   76.851608]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.852193]  kthread+0x16c/0x21c
[   76.853052]  ret_from_fork+0x10/0x20
[   76.853490] 
[   76.853678] Allocated by task 164:
[   76.854061]  kasan_set_track+0x4c/0x80
[   76.854511]  kasan_save_alloc_info+0x28/0x34
[   76.854994]  __kasan_kmalloc+0x88/0xa0
[   76.855441]  kmalloc_trace+0x54/0x68
[   76.855901]  kasan_strings+0x48/0x404
[   76.856368]  kunit_try_run_case+0x80/0x184
[   76.857119]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.857705]  kthread+0x16c/0x21c
[   76.858159]  ret_from_fork+0x10/0x20
[   76.858630] 
[   76.858858] Freed by task 164:
[   76.859201]  kasan_set_track+0x4c/0x80
[   76.859689]  kasan_save_free_info+0x3c/0x60
[   76.860146]  ____kasan_slab_free+0xe8/0x140
[   76.860686]  __kasan_slab_free+0x18/0x28
[   76.861163]  __kmem_cache_free+0xdc/0x284
[   76.861625]  kfree+0x60/0x74
[   76.862000]  kasan_strings+0x90/0x404
[   76.862463]  kunit_try_run_case+0x80/0x184
[   76.863420]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.864060]  kthread+0x16c/0x21c
[   76.864472]  ret_from_fork+0x10/0x20
[   76.865158] 
[   76.865357] The buggy address belongs to the object at ffff0000c5abca00
[   76.865357]  which belongs to the cache kmalloc-128 of size 128
[   76.866348] The buggy address is located 16 bytes inside of
[   76.866348]  128-byte region [ffff0000c5abca00, ffff0000c5abca80)
[   76.867276] 
[   76.867517] The buggy address belongs to the physical page:
[   76.867988] page:00000000b0163b2b refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105abc
[   76.869332] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   76.870010] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   76.870701] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   76.871346] page dumped because: kasan: bad access detected
[   76.871826] 
[   76.872025] Memory state around the buggy address:
[   76.872471]  ffff0000c5abc900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   76.873118]  ffff0000c5abc980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.873751] >ffff0000c5abca00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   76.874590]                          ^
[   76.874967]  ffff0000c5abca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.875609]  ffff0000c5abcb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.876242] ==================================================================

[   75.963529] ==================================================================
[   75.964659] BUG: KASAN: use-after-free in strrchr+0x34/0x68
[   75.965472] Read of size 1 at addr ffff0000c58a7510 by task kunit_try_catch/164
[   75.966388] 
[   75.966681] CPU: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   75.968242] Hardware name: linux,dummy-virt (DT)
[   75.969280] Call trace:
[   75.969684]  dump_backtrace+0xf4/0x114
[   75.970428]  show_stack+0x18/0x24
[   75.971042]  __dump_stack+0x28/0x38
[   75.971995]  dump_stack_lvl+0x50/0x68
[   75.972421]  print_address_description+0x7c/0x1ec
[   75.972942]  print_report+0x50/0x68
[   75.973363]  kasan_report+0xac/0xfc
[   75.974411]  __asan_load1+0x6c/0x70
[   75.975195]  strrchr+0x34/0x68
[   75.975944]  kasan_strings+0xf8/0x404
[   75.976536]  kunit_try_run_case+0x80/0x184
[   75.977796]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.978638]  kthread+0x16c/0x21c
[   75.979583]  ret_from_fork+0x10/0x20
[   75.980593] 
[   75.981084] Allocated by task 164:
[   75.981661]  kasan_set_track+0x4c/0x80
[   75.982602]  kasan_save_alloc_info+0x28/0x34
[   75.983218]  __kasan_kmalloc+0x88/0xa0
[   75.983888]  kmalloc_trace+0x54/0x68
[   75.984611]  kasan_strings+0x48/0x404
[   75.985495]  kunit_try_run_case+0x80/0x184
[   75.986407]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.987490]  kthread+0x16c/0x21c
[   75.988373]  ret_from_fork+0x10/0x20
[   75.989096] 
[   75.989291] Freed by task 164:
[   75.989572]  kasan_set_track+0x4c/0x80
[   75.990330]  kasan_save_free_info+0x3c/0x60
[   75.991025]  ____kasan_slab_free+0xe8/0x140
[   75.991798]  __kasan_slab_free+0x18/0x28
[   75.992601]  __kmem_cache_free+0xdc/0x27c
[   75.993307]  kfree+0x60/0x74
[   75.993875]  kasan_strings+0x90/0x404
[   75.994518]  kunit_try_run_case+0x80/0x184
[   75.995208]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.995882]  kthread+0x16c/0x21c
[   75.996279]  ret_from_fork+0x10/0x20
[   75.996653] 
[   75.996883] The buggy address belongs to the object at ffff0000c58a7500
[   75.996883]  which belongs to the cache kmalloc-128 of size 128
[   75.998530] The buggy address is located 16 bytes inside of
[   75.998530]  128-byte region [ffff0000c58a7500, ffff0000c58a7580)
[   76.000003] 
[   76.000331] The buggy address belongs to the physical page:
[   76.001133] page:00000000333134b1 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7
[   76.002316] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   76.003149] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   76.003699] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   76.004876] page dumped because: kasan: bad access detected
[   76.005596] 
[   76.005882] Memory state around the buggy address:
[   76.006505]  ffff0000c58a7400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   76.007396]  ffff0000c58a7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.008408] >ffff0000c58a7500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   76.009425]                          ^
[   76.010047]  ffff0000c58a7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.010758]  ffff0000c58a7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.011219] ==================================================================

[   74.555188] ==================================================================
[   74.556071] BUG: KASAN: use-after-free in strrchr+0x28/0x54
[   74.556858] Read of size 1 at addr ffff0000c5938710 by task kunit_try_catch/164
[   74.558526] 
[   74.558932] CPU: 1 PID: 164 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   74.559710] Hardware name: linux,dummy-virt (DT)
[   74.560038] Call trace:
[   74.560251]  dump_backtrace.part.0+0xdc/0xf0
[   74.561341]  show_stack+0x18/0x30
[   74.562146]  dump_stack_lvl+0x64/0x80
[   74.563132]  print_report+0x158/0x438
[   74.564077]  kasan_report+0xb4/0xf4
[   74.564799]  __asan_load1+0x68/0x74
[   74.565562]  strrchr+0x28/0x54
[   74.566299]  kasan_strings+0xf4/0x520
[   74.567118]  kunit_try_run_case+0x84/0x120
[   74.567993]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   74.568954]  kthread+0x180/0x190
[   74.569471]  ret_from_fork+0x10/0x20
[   74.570249] 
[   74.570804] Allocated by task 164:
[   74.571331]  kasan_save_stack+0x3c/0x70
[   74.571711]  kasan_set_track+0x2c/0x40
[   74.572057]  kasan_save_alloc_info+0x24/0x34
[   74.572703]  __kasan_kmalloc+0xb8/0xc0
[   74.573521]  kmalloc_trace+0x58/0x6c
[   74.574537]  kasan_strings+0x98/0x520
[   74.575315]  kunit_try_run_case+0x84/0x120
[   74.576201]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   74.577224]  kthread+0x180/0x190
[   74.577983]  ret_from_fork+0x10/0x20
[   74.578761] 
[   74.579167] Freed by task 164:
[   74.579787]  kasan_save_stack+0x3c/0x70
[   74.580569]  kasan_set_track+0x2c/0x40
[   74.581335]  kasan_save_free_info+0x38/0x5c
[   74.582303]  __kasan_slab_free+0xe4/0x150
[   74.583038]  __kmem_cache_free+0x130/0x2a4
[   74.583856]  kfree+0x58/0x80
[   74.584548]  kasan_strings+0xb8/0x520
[   74.585066]  kunit_try_run_case+0x84/0x120
[   74.585927]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   74.586926]  kthread+0x180/0x190
[   74.587431]  ret_from_fork+0x10/0x20
[   74.587788] 
[   74.587954] The buggy address belongs to the object at ffff0000c5938700
[   74.587954]  which belongs to the cache kmalloc-128 of size 128
[   74.589002] The buggy address is located 16 bytes inside of
[   74.589002]  128-byte region [ffff0000c5938700, ffff0000c5938780)
[   74.590453] 
[   74.590719] The buggy address belongs to the physical page:
[   74.591401] page:000000003af4cecf refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105938
[   74.592488] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   74.593411] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   74.594451] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   74.595699] page dumped because: kasan: bad access detected
[   74.596066] 
[   74.596238] Memory state around the buggy address:
[   74.596618]  ffff0000c5938600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   74.597207]  ffff0000c5938680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.597893] >ffff0000c5938700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   74.598617]                          ^
[   74.599333]  ffff0000c5938780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.599954]  ffff0000c5938800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.600534] ==================================================================

[   65.977351] ==================================================================
[   65.978244] BUG: KASAN: use-after-free in strrchr+0x28/0x58
[   65.978747] Read of size 1 at addr ffff0000c59bd910 by task kunit_try_catch/162
[   65.979319] 
[   65.979512] CPU: 1 PID: 162 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   65.980147] Hardware name: linux,dummy-virt (DT)
[   65.980535] Call trace:
[   65.980809]  dump_backtrace+0x110/0x120
[   65.981267]  show_stack+0x18/0x28
[   65.981690]  dump_stack_lvl+0x68/0x84
[   65.982096]  print_report+0x158/0x484
[   65.982462]  kasan_report+0x98/0xe0
[   65.982827]  __asan_load1+0x68/0x78
[   65.983195]  strrchr+0x28/0x58
[   65.983999]  kasan_strings+0x110/0x4e0
[   65.984427]  kunit_try_run_case+0x7c/0x120
[   65.984853]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   65.985373]  kthread+0x1a4/0x1b8
[   65.985959]  ret_from_fork+0x10/0x20
[   65.986362] 
[   65.986549] Allocated by task 162:
[   65.986848]  kasan_save_stack+0x2c/0x58
[   65.987224]  kasan_set_track+0x2c/0x40
[   65.987586]  kasan_save_alloc_info+0x24/0x38
[   65.988041]  __kasan_kmalloc+0xa0/0xb8
[   65.988423]  kmalloc_trace+0x50/0x68
[   65.988815]  kasan_strings+0xa8/0x4e0
[   65.989213]  kunit_try_run_case+0x7c/0x120
[   65.990165]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   65.990705]  kthread+0x1a4/0x1b8
[   65.991025]  ret_from_fork+0x10/0x20
[   65.991418] 
[   65.991606] Freed by task 162:
[   65.991876]  kasan_save_stack+0x2c/0x58
[   65.992254]  kasan_set_track+0x2c/0x40
[   65.992635]  kasan_save_free_info+0x38/0x60
[   65.993046]  __kasan_slab_free+0xe8/0x158
[   65.993599]  __kmem_cache_free+0x138/0x2b0
[   65.994038]  kfree+0x5c/0x70
[   65.994387]  kasan_strings+0xc8/0x4e0
[   65.994779]  kunit_try_run_case+0x7c/0x120
[   65.995180]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   65.995794]  kthread+0x1a4/0x1b8
[   65.996142]  ret_from_fork+0x10/0x20
[   65.996506] 
[   65.996697] The buggy address belongs to the object at ffff0000c59bd900
[   65.996697]  which belongs to the cache kmalloc-128 of size 128
[   65.997565] The buggy address is located 16 bytes inside of
[   65.997565]  128-byte region [ffff0000c59bd900, ffff0000c59bd980)
[   65.998836] 
[   65.999054] The buggy address belongs to the physical page:
[   65.999466] page:00000000a3aeb2fe refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059bd
[   66.000182] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   66.000795] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   66.001398] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   66.001962] page dumped because: kasan: bad access detected
[   66.002643] 
[   66.002815] Memory state around the buggy address:
[   66.003212]  ffff0000c59bd800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   66.003805]  ffff0000c59bd880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.004380] >ffff0000c59bd900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   66.004887]                          ^
[   66.005206]  ffff0000c59bd980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.006006]  ffff0000c59bda00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.006548] ==================================================================

[   32.101964] ==================================================================
[   32.102424] BUG: KASAN: use-after-free in strrchr+0x1a/0x40
[   32.102747] Read of size 1 at addr ffff8881037341d0 by task kunit_try_catch/268
[   32.103092] 
[   32.103218] CPU: 1 PID: 268 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   32.103624] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.104060] Call Trace:
[   32.104225]  <TASK>
[   32.104391]  dump_stack_lvl+0x49/0x62
[   32.104623]  print_report+0x189/0x492
[   32.104890]  ? kasan_complete_mode_report_info+0x7c/0x200
[   32.105200]  ? strrchr+0x1a/0x40
[   32.105468]  kasan_report+0x10c/0x190
[   32.105672]  ? kasan_quarantine_put+0xba/0x1c0
[   32.105933]  ? strrchr+0x1a/0x40
[   32.106187]  __asan_load1+0x62/0x70
[   32.106403]  strrchr+0x1a/0x40
[   32.106604]  kasan_strings+0x112/0x4e0
[   32.106846]  ? kmalloc_oob_right+0x310/0x310
[   32.107121]  ? __kunit_add_resource+0xd1/0x100
[   32.107446]  ? kasan_test_init+0x13e/0x1b0
[   32.107667]  kunit_try_run_case+0x8f/0xd0
[   32.107916]  ? kunit_catch_run_case+0x80/0x80
[   32.108797]  ? kunit_try_catch_throw+0x40/0x40
[   32.109001]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   32.109316]  kthread+0x17b/0x1b0
[   32.109517]  ? kthread_complete_and_exit+0x30/0x30
[   32.109771]  ret_from_fork+0x22/0x30
[   32.109953]  </TASK>
[   32.110178] 
[   32.110335] Allocated by task 268:
[   32.110526]  kasan_save_stack+0x41/0x70
[   32.110758]  kasan_set_track+0x25/0x40
[   32.110968]  kasan_save_alloc_info+0x1e/0x30
[   32.111181]  __kasan_kmalloc+0xb6/0xc0
[   32.111479]  kmalloc_trace+0x48/0xb0
[   32.111708]  kasan_strings+0x99/0x4e0
[   32.111967]  kunit_try_run_case+0x8f/0xd0
[   32.112289]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   32.112592]  kthread+0x17b/0x1b0
[   32.112791]  ret_from_fork+0x22/0x30
[   32.113034] 
[   32.113200] Freed by task 268:
[   32.113392]  kasan_save_stack+0x41/0x70
[   32.113656]  kasan_set_track+0x25/0x40
[   32.113879]  kasan_save_free_info+0x2e/0x50
[   32.114055]  ____kasan_slab_free+0x175/0x1d0
[   32.114248]  __kasan_slab_free+0x12/0x20
[   32.114478]  __kmem_cache_free+0x188/0x2f0
[   32.114779]  kfree+0x78/0x120
[   32.115048]  kasan_strings+0xbd/0x4e0
[   32.115699]  kunit_try_run_case+0x8f/0xd0
[   32.115947]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   32.116591]  kthread+0x17b/0x1b0
[   32.116910]  ret_from_fork+0x22/0x30
[   32.117244] 
[   32.117570] The buggy address belongs to the object at ffff8881037341c0
[   32.117570]  which belongs to the cache kmalloc-32 of size 32
[   32.118233] The buggy address is located 16 bytes inside of
[   32.118233]  32-byte region [ffff8881037341c0, ffff8881037341e0)
[   32.119034] 
[   32.119278] The buggy address belongs to the physical page:
[   32.119703] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103734
[   32.120379] flags: 0x200000000000200(slab|node=0|zone=2)
[   32.120800] raw: 0200000000000200 0000000000000000 dead000000000122 ffff888100041500
[   32.121320] raw: 0000000000000000 0000000080400040 00000001ffffffff 0000000000000000
[   32.121824] page dumped because: kasan: bad access detected
[   32.122211] 
[   32.122475] Memory state around the buggy address:
[   32.122808]  ffff888103734080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   32.123283]  ffff888103734100: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   32.123745] >ffff888103734180: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   32.124199]                                                  ^
[   32.124619]  ffff888103734200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.125096]  ffff888103734280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.125546] ==================================================================