Hay
Date
July 18, 2025, 2:09 p.m.

Environment
qemu-arm64
qemu-x86_64

[   19.330504] ==================================================================
[   19.330926] BUG: KASAN: slab-use-after-free in strcmp+0xc0/0xc8
[   19.331191] Read of size 1 at addr fff00000c799d550 by task kunit_try_catch/259
[   19.331243] 
[   19.331288] CPU: 0 UID: 0 PID: 259 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.331752] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.331813] Hardware name: linux,dummy-virt (DT)
[   19.331916] Call trace:
[   19.332036]  show_stack+0x20/0x38 (C)
[   19.332229]  dump_stack_lvl+0x8c/0xd0
[   19.332333]  print_report+0x118/0x5d0
[   19.332494]  kasan_report+0xdc/0x128
[   19.332550]  __asan_report_load1_noabort+0x20/0x30
[   19.332899]  strcmp+0xc0/0xc8
[   19.332971]  kasan_strings+0x340/0xb00
[   19.333287]  kunit_try_run_case+0x170/0x3f0
[   19.333482]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.333726]  kthread+0x328/0x630
[   19.333854]  ret_from_fork+0x10/0x20
[   19.334079] 
[   19.334188] Allocated by task 259:
[   19.334443]  kasan_save_stack+0x3c/0x68
[   19.334597]  kasan_save_track+0x20/0x40
[   19.334641]  kasan_save_alloc_info+0x40/0x58
[   19.334684]  __kasan_kmalloc+0xd4/0xd8
[   19.334732]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.334786]  kasan_strings+0xc8/0xb00
[   19.334831]  kunit_try_run_case+0x170/0x3f0
[   19.334884]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.334931]  kthread+0x328/0x630
[   19.334976]  ret_from_fork+0x10/0x20
[   19.335013] 
[   19.335044] Freed by task 259:
[   19.335085]  kasan_save_stack+0x3c/0x68
[   19.335124]  kasan_save_track+0x20/0x40
[   19.335174]  kasan_save_free_info+0x4c/0x78
[   19.335214]  __kasan_slab_free+0x6c/0x98
[   19.335256]  kfree+0x214/0x3c8
[   19.335291]  kasan_strings+0x24c/0xb00
[   19.335337]  kunit_try_run_case+0x170/0x3f0
[   19.335386]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.335431]  kthread+0x328/0x630
[   19.335466]  ret_from_fork+0x10/0x20
[   19.335520] 
[   19.335558] The buggy address belongs to the object at fff00000c799d540
[   19.335558]  which belongs to the cache kmalloc-32 of size 32
[   19.335623] The buggy address is located 16 bytes inside of
[   19.335623]  freed 32-byte region [fff00000c799d540, fff00000c799d560)
[   19.335689] 
[   19.335723] The buggy address belongs to the physical page:
[   19.335784] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10799d
[   19.335864] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.335921] page_type: f5(slab)
[   19.335967] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   19.336030] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   19.336073] page dumped because: kasan: bad access detected
[   19.336117] 
[   19.336146] Memory state around the buggy address:
[   19.336183]  fff00000c799d400: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   19.336231]  fff00000c799d480: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   19.336286] >fff00000c799d500: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   19.336333]                                                  ^
[   19.336380]  fff00000c799d580: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   19.336424]  fff00000c799d600: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   19.336470] ==================================================================

[   18.891757] ==================================================================
[   18.891908] BUG: KASAN: slab-use-after-free in strcmp+0xc0/0xc8
[   18.892000] Read of size 1 at addr fff00000c7a5ef90 by task kunit_try_catch/259
[   18.892053] 
[   18.892106] CPU: 1 UID: 0 PID: 259 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.892198] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.892293] Hardware name: linux,dummy-virt (DT)
[   18.892363] Call trace:
[   18.892410]  show_stack+0x20/0x38 (C)
[   18.892465]  dump_stack_lvl+0x8c/0xd0
[   18.892522]  print_report+0x118/0x5d0
[   18.892610]  kasan_report+0xdc/0x128
[   18.892733]  __asan_report_load1_noabort+0x20/0x30
[   18.892799]  strcmp+0xc0/0xc8
[   18.892842]  kasan_strings+0x340/0xb00
[   18.892896]  kunit_try_run_case+0x170/0x3f0
[   18.892946]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.893001]  kthread+0x328/0x630
[   18.893044]  ret_from_fork+0x10/0x20
[   18.893095] 
[   18.893403] Allocated by task 259:
[   18.893472]  kasan_save_stack+0x3c/0x68
[   18.893669]  kasan_save_track+0x20/0x40
[   18.893753]  kasan_save_alloc_info+0x40/0x58
[   18.893904]  __kasan_kmalloc+0xd4/0xd8
[   18.894072]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.894121]  kasan_strings+0xc8/0xb00
[   18.894159]  kunit_try_run_case+0x170/0x3f0
[   18.894200]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.894247]  kthread+0x328/0x630
[   18.894283]  ret_from_fork+0x10/0x20
[   18.894330] 
[   18.894425] Freed by task 259:
[   18.894616]  kasan_save_stack+0x3c/0x68
[   18.894680]  kasan_save_track+0x20/0x40
[   18.894905]  kasan_save_free_info+0x4c/0x78
[   18.895095]  __kasan_slab_free+0x6c/0x98
[   18.895203]  kfree+0x214/0x3c8
[   18.895388]  kasan_strings+0x24c/0xb00
[   18.895444]  kunit_try_run_case+0x170/0x3f0
[   18.895496]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.895543]  kthread+0x328/0x630
[   18.895584]  ret_from_fork+0x10/0x20
[   18.895625] 
[   18.895666] The buggy address belongs to the object at fff00000c7a5ef80
[   18.895666]  which belongs to the cache kmalloc-32 of size 32
[   18.895741] The buggy address is located 16 bytes inside of
[   18.895741]  freed 32-byte region [fff00000c7a5ef80, fff00000c7a5efa0)
[   18.895804] 
[   18.895845] The buggy address belongs to the physical page:
[   18.895881] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a5e
[   18.895947] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.896000] page_type: f5(slab)
[   18.896042] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   18.896095] raw: 0000000000000000 0000000000400040 00000000f5000000 0000000000000000
[   18.896148] page dumped because: kasan: bad access detected
[   18.896184] 
[   18.896206] Memory state around the buggy address:
[   18.896250]  fff00000c7a5ee80: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   18.896296]  fff00000c7a5ef00: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   18.896827] >fff00000c7a5ef80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   18.896925]                          ^
[   18.897088]  fff00000c7a5f000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.897151]  fff00000c7a5f080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.898027] ==================================================================

[   13.987896] ==================================================================
[   13.988983] BUG: KASAN: slab-use-after-free in strcmp+0xb0/0xc0
[   13.989327] Read of size 1 at addr ffff8881026f44d0 by task kunit_try_catch/277
[   13.989794] 
[   13.989927] CPU: 1 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   13.989981] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.989993] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.990014] Call Trace:
[   13.990037]  <TASK>
[   13.990051]  dump_stack_lvl+0x73/0xb0
[   13.990079]  print_report+0xd1/0x610
[   13.990102]  ? __virt_addr_valid+0x1db/0x2d0
[   13.990125]  ? strcmp+0xb0/0xc0
[   13.990141]  ? kasan_complete_mode_report_info+0x64/0x200
[   13.990163]  ? strcmp+0xb0/0xc0
[   13.990181]  kasan_report+0x141/0x180
[   13.990212]  ? strcmp+0xb0/0xc0
[   13.990235]  __asan_report_load1_noabort+0x18/0x20
[   13.990258]  strcmp+0xb0/0xc0
[   13.990288]  kasan_strings+0x431/0xe80
[   13.990308]  ? trace_hardirqs_on+0x37/0xe0
[   13.990332]  ? __pfx_kasan_strings+0x10/0x10
[   13.990355]  ? __kasan_check_write+0x18/0x20
[   13.990374]  ? queued_spin_lock_slowpath+0x116/0xb40
[   13.990399]  ? irqentry_exit+0x2a/0x60
[   13.990420]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   13.990454]  ? trace_hardirqs_on+0x37/0xe0
[   13.990475]  ? __pfx_read_tsc+0x10/0x10
[   13.990496]  ? ktime_get_ts64+0x86/0x230
[   13.990562]  kunit_try_run_case+0x1a5/0x480
[   13.990603]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.990635]  ? queued_spin_lock_slowpath+0x116/0xb40
[   13.990659]  ? __kthread_parkme+0x82/0x180
[   13.990679]  ? preempt_count_sub+0x50/0x80
[   13.990704]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.990728]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.990760]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.990785]  kthread+0x337/0x6f0
[   13.990806]  ? trace_preempt_on+0x20/0xc0
[   13.990841]  ? __pfx_kthread+0x10/0x10
[   13.990861]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.990882]  ? calculate_sigpending+0x7b/0xa0
[   13.990906]  ? __pfx_kthread+0x10/0x10
[   13.990928]  ret_from_fork+0x116/0x1d0
[   13.990946]  ? __pfx_kthread+0x10/0x10
[   13.990967]  ret_from_fork_asm+0x1a/0x30
[   13.991000]  </TASK>
[   13.991009] 
[   13.999231] Allocated by task 277:
[   13.999422]  kasan_save_stack+0x45/0x70
[   13.999928]  kasan_save_track+0x18/0x40
[   14.000154]  kasan_save_alloc_info+0x3b/0x50
[   14.000396]  __kasan_kmalloc+0xb7/0xc0
[   14.000627]  __kmalloc_cache_noprof+0x189/0x420
[   14.000810]  kasan_strings+0xc0/0xe80
[   14.001079]  kunit_try_run_case+0x1a5/0x480
[   14.001253]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.001628]  kthread+0x337/0x6f0
[   14.001754]  ret_from_fork+0x116/0x1d0
[   14.001926]  ret_from_fork_asm+0x1a/0x30
[   14.002156] 
[   14.002253] Freed by task 277:
[   14.002407]  kasan_save_stack+0x45/0x70
[   14.002650]  kasan_save_track+0x18/0x40
[   14.002851]  kasan_save_free_info+0x3f/0x60
[   14.003066]  __kasan_slab_free+0x56/0x70
[   14.003243]  kfree+0x222/0x3f0
[   14.003410]  kasan_strings+0x2aa/0xe80
[   14.003671]  kunit_try_run_case+0x1a5/0x480
[   14.003869]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.004130]  kthread+0x337/0x6f0
[   14.004288]  ret_from_fork+0x116/0x1d0
[   14.004657]  ret_from_fork_asm+0x1a/0x30
[   14.004867] 
[   14.004986] The buggy address belongs to the object at ffff8881026f44c0
[   14.004986]  which belongs to the cache kmalloc-32 of size 32
[   14.005371] The buggy address is located 16 bytes inside of
[   14.005371]  freed 32-byte region [ffff8881026f44c0, ffff8881026f44e0)
[   14.005736] 
[   14.005809] The buggy address belongs to the physical page:
[   14.005983] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f4
[   14.006380] flags: 0x200000000000000(node=0|zone=2)
[   14.006678] page_type: f5(slab)
[   14.006845] raw: 0200000000000000 ffff888100041780 dead000000000122 0000000000000000
[   14.007457] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   14.008059] page dumped because: kasan: bad access detected
[   14.008234] 
[   14.008303] Memory state around the buggy address:
[   14.008575]  ffff8881026f4380: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   14.008929]  ffff8881026f4400: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   14.009286] >ffff8881026f4480: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   14.009704]                                                  ^
[   14.009947]  ffff8881026f4500: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   14.010166]  ffff8881026f4580: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   14.010535] ==================================================================

[   14.279826] ==================================================================
[   14.281394] BUG: KASAN: slab-use-after-free in strcmp+0xb0/0xc0
[   14.282078] Read of size 1 at addr ffff8881029c9590 by task kunit_try_catch/276
[   14.282903] 
[   14.283125] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.283185] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.283198] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.283222] Call Trace:
[   14.283241]  <TASK>
[   14.283265]  dump_stack_lvl+0x73/0xb0
[   14.283301]  print_report+0xd1/0x610
[   14.283326]  ? __virt_addr_valid+0x1db/0x2d0
[   14.283351]  ? strcmp+0xb0/0xc0
[   14.283368]  ? kasan_complete_mode_report_info+0x64/0x200
[   14.283392]  ? strcmp+0xb0/0xc0
[   14.283409]  kasan_report+0x141/0x180
[   14.283431]  ? strcmp+0xb0/0xc0
[   14.283453]  __asan_report_load1_noabort+0x18/0x20
[   14.283478]  strcmp+0xb0/0xc0
[   14.283496]  kasan_strings+0x431/0xe80
[   14.283517]  ? trace_hardirqs_on+0x37/0xe0
[   14.283541]  ? __pfx_kasan_strings+0x10/0x10
[   14.283562]  ? finish_task_switch.isra.0+0x153/0x700
[   14.283585]  ? __switch_to+0x47/0xf50
[   14.283611]  ? __schedule+0x10cc/0x2b60
[   14.283635]  ? __pfx_read_tsc+0x10/0x10
[   14.283656]  ? ktime_get_ts64+0x86/0x230
[   14.283681]  kunit_try_run_case+0x1a5/0x480
[   14.283707]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.283729]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.283754]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.283778]  ? __kthread_parkme+0x82/0x180
[   14.283800]  ? preempt_count_sub+0x50/0x80
[   14.283824]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.283849]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.283873]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.283898]  kthread+0x337/0x6f0
[   14.283918]  ? trace_preempt_on+0x20/0xc0
[   14.283940]  ? __pfx_kthread+0x10/0x10
[   14.283962]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.283983]  ? calculate_sigpending+0x7b/0xa0
[   14.284020]  ? __pfx_kthread+0x10/0x10
[   14.284042]  ret_from_fork+0x116/0x1d0
[   14.284063]  ? __pfx_kthread+0x10/0x10
[   14.284083]  ret_from_fork_asm+0x1a/0x30
[   14.284115]  </TASK>
[   14.284127] 
[   14.298155] Allocated by task 276:
[   14.298872]  kasan_save_stack+0x45/0x70
[   14.299452]  kasan_save_track+0x18/0x40
[   14.300007]  kasan_save_alloc_info+0x3b/0x50
[   14.300401]  __kasan_kmalloc+0xb7/0xc0
[   14.300880]  __kmalloc_cache_noprof+0x189/0x420
[   14.301317]  kasan_strings+0xc0/0xe80
[   14.301534]  kunit_try_run_case+0x1a5/0x480
[   14.302184]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.303064]  kthread+0x337/0x6f0
[   14.303205]  ret_from_fork+0x116/0x1d0
[   14.303739]  ret_from_fork_asm+0x1a/0x30
[   14.304221] 
[   14.304431] Freed by task 276:
[   14.304630]  kasan_save_stack+0x45/0x70
[   14.304773]  kasan_save_track+0x18/0x40
[   14.304916]  kasan_save_free_info+0x3f/0x60
[   14.305206]  __kasan_slab_free+0x56/0x70
[   14.305654]  kfree+0x222/0x3f0
[   14.306066]  kasan_strings+0x2aa/0xe80
[   14.306512]  kunit_try_run_case+0x1a5/0x480
[   14.306926]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.307859]  kthread+0x337/0x6f0
[   14.308171]  ret_from_fork+0x116/0x1d0
[   14.308404]  ret_from_fork_asm+0x1a/0x30
[   14.308785] 
[   14.309082] The buggy address belongs to the object at ffff8881029c9580
[   14.309082]  which belongs to the cache kmalloc-32 of size 32
[   14.309912] The buggy address is located 16 bytes inside of
[   14.309912]  freed 32-byte region [ffff8881029c9580, ffff8881029c95a0)
[   14.310801] 
[   14.310886] The buggy address belongs to the physical page:
[   14.311236] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029c9
[   14.312399] flags: 0x200000000000000(node=0|zone=2)
[   14.312901] page_type: f5(slab)
[   14.313172] raw: 0200000000000000 ffff888100041780 dead000000000122 0000000000000000
[   14.313691] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   14.313924] page dumped because: kasan: bad access detected
[   14.314392] 
[   14.314621] Memory state around the buggy address:
[   14.315143]  ffff8881029c9480: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   14.315841]  ffff8881029c9500: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   14.316392] >ffff8881029c9580: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   14.317000]                          ^
[   14.317148]  ffff8881029c9600: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   14.317365]  ffff8881029c9680: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   14.318500] ==================================================================

[   14.103258] ==================================================================
[   14.105807] BUG: KASAN: slab-use-after-free in strcmp+0xb0/0xc0
[   14.106150] Read of size 1 at addr ffff8881029b0850 by task kunit_try_catch/276
[   14.106911] 
[   14.107189] CPU: 1 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.107240] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.107262] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.107287] Call Trace:
[   14.107300]  <TASK>
[   14.107318]  dump_stack_lvl+0x73/0xb0
[   14.107347]  print_report+0xd1/0x610
[   14.107382]  ? __virt_addr_valid+0x1db/0x2d0
[   14.107407]  ? strcmp+0xb0/0xc0
[   14.107424]  ? kasan_complete_mode_report_info+0x64/0x200
[   14.107458]  ? strcmp+0xb0/0xc0
[   14.107476]  kasan_report+0x141/0x180
[   14.107499]  ? strcmp+0xb0/0xc0
[   14.107522]  __asan_report_load1_noabort+0x18/0x20
[   14.107558]  strcmp+0xb0/0xc0
[   14.107576]  kasan_strings+0x431/0xe80
[   14.107597]  ? trace_hardirqs_on+0x37/0xe0
[   14.107621]  ? __pfx_kasan_strings+0x10/0x10
[   14.107642]  ? finish_task_switch.isra.0+0x153/0x700
[   14.107665]  ? __switch_to+0x47/0xf50
[   14.107694]  ? __schedule+0x10cc/0x2b60
[   14.107717]  ? __pfx_read_tsc+0x10/0x10
[   14.107738]  ? ktime_get_ts64+0x86/0x230
[   14.107763]  kunit_try_run_case+0x1a5/0x480
[   14.107789]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.107812]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.107836]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.107859]  ? __kthread_parkme+0x82/0x180
[   14.107880]  ? preempt_count_sub+0x50/0x80
[   14.107913]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.107937]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.107961]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.107985]  kthread+0x337/0x6f0
[   14.108004]  ? trace_preempt_on+0x20/0xc0
[   14.108026]  ? __pfx_kthread+0x10/0x10
[   14.108046]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.108068]  ? calculate_sigpending+0x7b/0xa0
[   14.108094]  ? __pfx_kthread+0x10/0x10
[   14.108115]  ret_from_fork+0x116/0x1d0
[   14.108133]  ? __pfx_kthread+0x10/0x10
[   14.108153]  ret_from_fork_asm+0x1a/0x30
[   14.108186]  </TASK>
[   14.108198] 
[   14.122318] Allocated by task 276:
[   14.122684]  kasan_save_stack+0x45/0x70
[   14.123124]  kasan_save_track+0x18/0x40
[   14.123269]  kasan_save_alloc_info+0x3b/0x50
[   14.123421]  __kasan_kmalloc+0xb7/0xc0
[   14.123613]  __kmalloc_cache_noprof+0x189/0x420
[   14.124068]  kasan_strings+0xc0/0xe80
[   14.124437]  kunit_try_run_case+0x1a5/0x480
[   14.125023]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.125671]  kthread+0x337/0x6f0
[   14.125994]  ret_from_fork+0x116/0x1d0
[   14.126461]  ret_from_fork_asm+0x1a/0x30
[   14.127080] 
[   14.127280] Freed by task 276:
[   14.127405]  kasan_save_stack+0x45/0x70
[   14.127601]  kasan_save_track+0x18/0x40
[   14.127985]  kasan_save_free_info+0x3f/0x60
[   14.128414]  __kasan_slab_free+0x56/0x70
[   14.128982]  kfree+0x222/0x3f0
[   14.129317]  kasan_strings+0x2aa/0xe80
[   14.129542]  kunit_try_run_case+0x1a5/0x480
[   14.129952]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.130428]  kthread+0x337/0x6f0
[   14.130693]  ret_from_fork+0x116/0x1d0
[   14.131213]  ret_from_fork_asm+0x1a/0x30
[   14.131663] 
[   14.131811] The buggy address belongs to the object at ffff8881029b0840
[   14.131811]  which belongs to the cache kmalloc-32 of size 32
[   14.132442] The buggy address is located 16 bytes inside of
[   14.132442]  freed 32-byte region [ffff8881029b0840, ffff8881029b0860)
[   14.133633] 
[   14.133715] The buggy address belongs to the physical page:
[   14.133903] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b0
[   14.134524] flags: 0x200000000000000(node=0|zone=2)
[   14.135113] page_type: f5(slab)
[   14.135434] raw: 0200000000000000 ffff888100041780 dead000000000122 0000000000000000
[   14.136313] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   14.136917] page dumped because: kasan: bad access detected
[   14.137348] 
[   14.137502] Memory state around the buggy address:
[   14.138021]  ffff8881029b0700: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   14.138506]  ffff8881029b0780: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   14.138732] >ffff8881029b0800: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   14.139461]                                                  ^
[   14.140127]  ffff8881029b0880: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   14.141162]  ffff8881029b0900: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   14.141446] ==================================================================