Date
July 18, 2025, 2:09 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 19.365281] ================================================================== [ 19.365345] BUG: KASAN: slab-use-after-free in strnlen+0x80/0x88 [ 19.365471] Read of size 1 at addr fff00000c799d550 by task kunit_try_catch/259 [ 19.365540] [ 19.365582] CPU: 0 UID: 0 PID: 259 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.365933] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.365976] Hardware name: linux,dummy-virt (DT) [ 19.366011] Call trace: [ 19.366037] show_stack+0x20/0x38 (C) [ 19.366099] dump_stack_lvl+0x8c/0xd0 [ 19.366542] print_report+0x118/0x5d0 [ 19.366621] kasan_report+0xdc/0x128 [ 19.366672] __asan_report_load1_noabort+0x20/0x30 [ 19.366875] strnlen+0x80/0x88 [ 19.366920] kasan_strings+0x478/0xb00 [ 19.366973] kunit_try_run_case+0x170/0x3f0 [ 19.367274] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.367538] kthread+0x328/0x630 [ 19.367593] ret_from_fork+0x10/0x20 [ 19.367949] [ 19.368056] Allocated by task 259: [ 19.368094] kasan_save_stack+0x3c/0x68 [ 19.368546] kasan_save_track+0x20/0x40 [ 19.368764] kasan_save_alloc_info+0x40/0x58 [ 19.368997] __kasan_kmalloc+0xd4/0xd8 [ 19.369047] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.369427] kasan_strings+0xc8/0xb00 [ 19.369675] kunit_try_run_case+0x170/0x3f0 [ 19.369874] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.370126] kthread+0x328/0x630 [ 19.370198] ret_from_fork+0x10/0x20 [ 19.370429] [ 19.370562] Freed by task 259: [ 19.370745] kasan_save_stack+0x3c/0x68 [ 19.370818] kasan_save_track+0x20/0x40 [ 19.371078] kasan_save_free_info+0x4c/0x78 [ 19.371373] __kasan_slab_free+0x6c/0x98 [ 19.371554] kfree+0x214/0x3c8 [ 19.371790] kasan_strings+0x24c/0xb00 [ 19.371901] kunit_try_run_case+0x170/0x3f0 [ 19.371954] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.372011] kthread+0x328/0x630 [ 19.372047] ret_from_fork+0x10/0x20 [ 19.372095] [ 19.372126] The buggy address belongs to the object at fff00000c799d540 [ 19.372126] which belongs to the cache kmalloc-32 of size 32 [ 19.372189] The buggy address is located 16 bytes inside of [ 19.372189] freed 32-byte region [fff00000c799d540, fff00000c799d560) [ 19.372252] [ 19.372299] The buggy address belongs to the physical page: [ 19.372344] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10799d [ 19.372409] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.372477] page_type: f5(slab) [ 19.372519] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 19.372574] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 19.372616] page dumped because: kasan: bad access detected [ 19.372659] [ 19.372695] Memory state around the buggy address: [ 19.372732] fff00000c799d400: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 19.372776] fff00000c799d480: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 19.372820] >fff00000c799d500: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 19.372870] ^ [ 19.372918] fff00000c799d580: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 19.372972] fff00000c799d600: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 19.373013] ==================================================================
[ 18.922612] ================================================================== [ 18.922676] BUG: KASAN: slab-use-after-free in strnlen+0x80/0x88 [ 18.922723] Read of size 1 at addr fff00000c7a5ef90 by task kunit_try_catch/259 [ 18.922775] [ 18.922809] CPU: 1 UID: 0 PID: 259 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.922893] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.922922] Hardware name: linux,dummy-virt (DT) [ 18.922955] Call trace: [ 18.922980] show_stack+0x20/0x38 (C) [ 18.923031] dump_stack_lvl+0x8c/0xd0 [ 18.923080] print_report+0x118/0x5d0 [ 18.923129] kasan_report+0xdc/0x128 [ 18.923176] __asan_report_load1_noabort+0x20/0x30 [ 18.923228] strnlen+0x80/0x88 [ 18.923271] kasan_strings+0x478/0xb00 [ 18.923316] kunit_try_run_case+0x170/0x3f0 [ 18.923375] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.923430] kthread+0x328/0x630 [ 18.923472] ret_from_fork+0x10/0x20 [ 18.923521] [ 18.923542] Allocated by task 259: [ 18.923571] kasan_save_stack+0x3c/0x68 [ 18.923612] kasan_save_track+0x20/0x40 [ 18.923652] kasan_save_alloc_info+0x40/0x58 [ 18.923694] __kasan_kmalloc+0xd4/0xd8 [ 18.923732] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.923777] kasan_strings+0xc8/0xb00 [ 18.923814] kunit_try_run_case+0x170/0x3f0 [ 18.923854] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.923900] kthread+0x328/0x630 [ 18.923933] ret_from_fork+0x10/0x20 [ 18.923971] [ 18.923992] Freed by task 259: [ 18.924019] kasan_save_stack+0x3c/0x68 [ 18.924059] kasan_save_track+0x20/0x40 [ 18.924096] kasan_save_free_info+0x4c/0x78 [ 18.924138] __kasan_slab_free+0x6c/0x98 [ 18.924181] kfree+0x214/0x3c8 [ 18.924217] kasan_strings+0x24c/0xb00 [ 18.924252] kunit_try_run_case+0x170/0x3f0 [ 18.924298] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.924439] kthread+0x328/0x630 [ 18.924473] ret_from_fork+0x10/0x20 [ 18.924583] [ 18.924635] The buggy address belongs to the object at fff00000c7a5ef80 [ 18.924635] which belongs to the cache kmalloc-32 of size 32 [ 18.924840] The buggy address is located 16 bytes inside of [ 18.924840] freed 32-byte region [fff00000c7a5ef80, fff00000c7a5efa0) [ 18.924966] [ 18.925087] The buggy address belongs to the physical page: [ 18.925145] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a5e [ 18.925201] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.925267] page_type: f5(slab) [ 18.925354] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 18.925487] raw: 0000000000000000 0000000000400040 00000000f5000000 0000000000000000 [ 18.925555] page dumped because: kasan: bad access detected [ 18.925701] [ 18.925722] Memory state around the buggy address: [ 18.925755] fff00000c7a5ee80: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 18.925800] fff00000c7a5ef00: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 18.925844] >fff00000c7a5ef80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 18.925886] ^ [ 18.925920] fff00000c7a5f000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.925964] fff00000c7a5f080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.926004] ==================================================================
[ 14.056894] ================================================================== [ 14.057238] BUG: KASAN: slab-use-after-free in strnlen+0x73/0x80 [ 14.057672] Read of size 1 at addr ffff8881026f44d0 by task kunit_try_catch/277 [ 14.058015] [ 14.058115] CPU: 1 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.058156] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.058166] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.058186] Call Trace: [ 14.058199] <TASK> [ 14.058224] dump_stack_lvl+0x73/0xb0 [ 14.058250] print_report+0xd1/0x610 [ 14.058271] ? __virt_addr_valid+0x1db/0x2d0 [ 14.058304] ? strnlen+0x73/0x80 [ 14.058321] ? kasan_complete_mode_report_info+0x64/0x200 [ 14.058343] ? strnlen+0x73/0x80 [ 14.058361] kasan_report+0x141/0x180 [ 14.058383] ? strnlen+0x73/0x80 [ 14.058426] __asan_report_load1_noabort+0x18/0x20 [ 14.058467] strnlen+0x73/0x80 [ 14.058487] kasan_strings+0x615/0xe80 [ 14.058547] ? trace_hardirqs_on+0x37/0xe0 [ 14.058572] ? __pfx_kasan_strings+0x10/0x10 [ 14.058594] ? __kasan_check_write+0x18/0x20 [ 14.058613] ? queued_spin_lock_slowpath+0x116/0xb40 [ 14.058647] ? irqentry_exit+0x2a/0x60 [ 14.058667] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 14.058692] ? trace_hardirqs_on+0x37/0xe0 [ 14.058725] ? __pfx_read_tsc+0x10/0x10 [ 14.058744] ? ktime_get_ts64+0x86/0x230 [ 14.058768] kunit_try_run_case+0x1a5/0x480 [ 14.058792] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.058825] ? queued_spin_lock_slowpath+0x116/0xb40 [ 14.058848] ? __kthread_parkme+0x82/0x180 [ 14.058868] ? preempt_count_sub+0x50/0x80 [ 14.058902] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.058927] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.058951] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.058975] kthread+0x337/0x6f0 [ 14.059002] ? trace_preempt_on+0x20/0xc0 [ 14.059023] ? __pfx_kthread+0x10/0x10 [ 14.059044] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.059075] ? calculate_sigpending+0x7b/0xa0 [ 14.059099] ? __pfx_kthread+0x10/0x10 [ 14.059121] ret_from_fork+0x116/0x1d0 [ 14.059139] ? __pfx_kthread+0x10/0x10 [ 14.059159] ret_from_fork_asm+0x1a/0x30 [ 14.059191] </TASK> [ 14.059201] [ 14.066835] Allocated by task 277: [ 14.066967] kasan_save_stack+0x45/0x70 [ 14.067114] kasan_save_track+0x18/0x40 [ 14.067250] kasan_save_alloc_info+0x3b/0x50 [ 14.067422] __kasan_kmalloc+0xb7/0xc0 [ 14.067618] __kmalloc_cache_noprof+0x189/0x420 [ 14.067841] kasan_strings+0xc0/0xe80 [ 14.068110] kunit_try_run_case+0x1a5/0x480 [ 14.068321] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.068812] kthread+0x337/0x6f0 [ 14.068981] ret_from_fork+0x116/0x1d0 [ 14.069168] ret_from_fork_asm+0x1a/0x30 [ 14.069361] [ 14.069461] Freed by task 277: [ 14.069904] kasan_save_stack+0x45/0x70 [ 14.070123] kasan_save_track+0x18/0x40 [ 14.070348] kasan_save_free_info+0x3f/0x60 [ 14.070697] __kasan_slab_free+0x56/0x70 [ 14.070842] kfree+0x222/0x3f0 [ 14.070956] kasan_strings+0x2aa/0xe80 [ 14.071086] kunit_try_run_case+0x1a5/0x480 [ 14.071228] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.071398] kthread+0x337/0x6f0 [ 14.071696] ret_from_fork+0x116/0x1d0 [ 14.072084] ret_from_fork_asm+0x1a/0x30 [ 14.072342] [ 14.072584] The buggy address belongs to the object at ffff8881026f44c0 [ 14.072584] which belongs to the cache kmalloc-32 of size 32 [ 14.073451] The buggy address is located 16 bytes inside of [ 14.073451] freed 32-byte region [ffff8881026f44c0, ffff8881026f44e0) [ 14.074134] [ 14.074282] The buggy address belongs to the physical page: [ 14.074739] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026f4 [ 14.075043] flags: 0x200000000000000(node=0|zone=2) [ 14.075210] page_type: f5(slab) [ 14.075335] raw: 0200000000000000 ffff888100041780 dead000000000122 0000000000000000 [ 14.075691] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 14.076263] page dumped because: kasan: bad access detected [ 14.076682] [ 14.076814] Memory state around the buggy address: [ 14.077061] ffff8881026f4380: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 14.077287] ffff8881026f4400: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 14.077518] >ffff8881026f4480: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 14.077891] ^ [ 14.078218] ffff8881026f4500: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 14.079046] ffff8881026f4580: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 14.080079] ==================================================================
[ 14.395671] ================================================================== [ 14.396736] BUG: KASAN: slab-use-after-free in strnlen+0x73/0x80 [ 14.397425] Read of size 1 at addr ffff8881029c9590 by task kunit_try_catch/276 [ 14.397939] [ 14.398104] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.398159] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.398171] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.398196] Call Trace: [ 14.398217] <TASK> [ 14.398238] dump_stack_lvl+0x73/0xb0 [ 14.398274] print_report+0xd1/0x610 [ 14.398300] ? __virt_addr_valid+0x1db/0x2d0 [ 14.398326] ? strnlen+0x73/0x80 [ 14.398343] ? kasan_complete_mode_report_info+0x64/0x200 [ 14.398366] ? strnlen+0x73/0x80 [ 14.398384] kasan_report+0x141/0x180 [ 14.398405] ? strnlen+0x73/0x80 [ 14.398427] __asan_report_load1_noabort+0x18/0x20 [ 14.398452] strnlen+0x73/0x80 [ 14.398471] kasan_strings+0x615/0xe80 [ 14.398491] ? trace_hardirqs_on+0x37/0xe0 [ 14.398515] ? __pfx_kasan_strings+0x10/0x10 [ 14.398535] ? finish_task_switch.isra.0+0x153/0x700 [ 14.398558] ? __switch_to+0x47/0xf50 [ 14.398583] ? __schedule+0x10cc/0x2b60 [ 14.398606] ? __pfx_read_tsc+0x10/0x10 [ 14.398626] ? ktime_get_ts64+0x86/0x230 [ 14.398651] kunit_try_run_case+0x1a5/0x480 [ 14.398676] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.398698] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.398723] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.398746] ? __kthread_parkme+0x82/0x180 [ 14.398768] ? preempt_count_sub+0x50/0x80 [ 14.398790] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.398814] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.398838] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.398861] kthread+0x337/0x6f0 [ 14.398882] ? trace_preempt_on+0x20/0xc0 [ 14.398903] ? __pfx_kthread+0x10/0x10 [ 14.398924] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.398945] ? calculate_sigpending+0x7b/0xa0 [ 14.398970] ? __pfx_kthread+0x10/0x10 [ 14.398991] ret_from_fork+0x116/0x1d0 [ 14.399022] ? __pfx_kthread+0x10/0x10 [ 14.399043] ret_from_fork_asm+0x1a/0x30 [ 14.399074] </TASK> [ 14.399084] [ 14.413909] Allocated by task 276: [ 14.414315] kasan_save_stack+0x45/0x70 [ 14.414740] kasan_save_track+0x18/0x40 [ 14.415137] kasan_save_alloc_info+0x3b/0x50 [ 14.415517] __kasan_kmalloc+0xb7/0xc0 [ 14.415693] __kmalloc_cache_noprof+0x189/0x420 [ 14.415854] kasan_strings+0xc0/0xe80 [ 14.415987] kunit_try_run_case+0x1a5/0x480 [ 14.416732] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.417284] kthread+0x337/0x6f0 [ 14.417699] ret_from_fork+0x116/0x1d0 [ 14.418123] ret_from_fork_asm+0x1a/0x30 [ 14.418496] [ 14.418574] Freed by task 276: [ 14.418689] kasan_save_stack+0x45/0x70 [ 14.418827] kasan_save_track+0x18/0x40 [ 14.418962] kasan_save_free_info+0x3f/0x60 [ 14.419414] __kasan_slab_free+0x56/0x70 [ 14.419813] kfree+0x222/0x3f0 [ 14.420111] kasan_strings+0x2aa/0xe80 [ 14.420571] kunit_try_run_case+0x1a5/0x480 [ 14.420811] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.420996] kthread+0x337/0x6f0 [ 14.421687] ret_from_fork+0x116/0x1d0 [ 14.422124] ret_from_fork_asm+0x1a/0x30 [ 14.422538] [ 14.422713] The buggy address belongs to the object at ffff8881029c9580 [ 14.422713] which belongs to the cache kmalloc-32 of size 32 [ 14.423663] The buggy address is located 16 bytes inside of [ 14.423663] freed 32-byte region [ffff8881029c9580, ffff8881029c95a0) [ 14.424512] [ 14.424710] The buggy address belongs to the physical page: [ 14.425182] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029c9 [ 14.425441] flags: 0x200000000000000(node=0|zone=2) [ 14.425863] page_type: f5(slab) [ 14.426571] raw: 0200000000000000 ffff888100041780 dead000000000122 0000000000000000 [ 14.427280] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 14.427721] page dumped because: kasan: bad access detected [ 14.427896] [ 14.427966] Memory state around the buggy address: [ 14.428219] ffff8881029c9480: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 14.428821] ffff8881029c9500: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 14.429477] >ffff8881029c9580: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 14.430218] ^ [ 14.430561] ffff8881029c9600: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 14.431603] ffff8881029c9680: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 14.431825] ==================================================================
[ 14.188881] ================================================================== [ 14.189261] BUG: KASAN: slab-use-after-free in strnlen+0x73/0x80 [ 14.189614] Read of size 1 at addr ffff8881029b0850 by task kunit_try_catch/276 [ 14.189851] [ 14.189953] CPU: 1 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.189995] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.190007] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.190028] Call Trace: [ 14.190042] <TASK> [ 14.190058] dump_stack_lvl+0x73/0xb0 [ 14.190083] print_report+0xd1/0x610 [ 14.190106] ? __virt_addr_valid+0x1db/0x2d0 [ 14.190130] ? strnlen+0x73/0x80 [ 14.190147] ? kasan_complete_mode_report_info+0x64/0x200 [ 14.190171] ? strnlen+0x73/0x80 [ 14.190189] kasan_report+0x141/0x180 [ 14.190211] ? strnlen+0x73/0x80 [ 14.190234] __asan_report_load1_noabort+0x18/0x20 [ 14.190259] strnlen+0x73/0x80 [ 14.190278] kasan_strings+0x615/0xe80 [ 14.190297] ? trace_hardirqs_on+0x37/0xe0 [ 14.190321] ? __pfx_kasan_strings+0x10/0x10 [ 14.190341] ? finish_task_switch.isra.0+0x153/0x700 [ 14.190364] ? __switch_to+0x47/0xf50 [ 14.190390] ? __schedule+0x10cc/0x2b60 [ 14.190413] ? __pfx_read_tsc+0x10/0x10 [ 14.190433] ? ktime_get_ts64+0x86/0x230 [ 14.190458] kunit_try_run_case+0x1a5/0x480 [ 14.190482] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.190504] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.190610] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.190638] ? __kthread_parkme+0x82/0x180 [ 14.190659] ? preempt_count_sub+0x50/0x80 [ 14.190683] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.190708] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.190733] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.190757] kthread+0x337/0x6f0 [ 14.190781] ? trace_preempt_on+0x20/0xc0 [ 14.190803] ? __pfx_kthread+0x10/0x10 [ 14.190824] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.190845] ? calculate_sigpending+0x7b/0xa0 [ 14.190869] ? __pfx_kthread+0x10/0x10 [ 14.190890] ret_from_fork+0x116/0x1d0 [ 14.190920] ? __pfx_kthread+0x10/0x10 [ 14.190941] ret_from_fork_asm+0x1a/0x30 [ 14.190973] </TASK> [ 14.190983] [ 14.199193] Allocated by task 276: [ 14.199327] kasan_save_stack+0x45/0x70 [ 14.199474] kasan_save_track+0x18/0x40 [ 14.199610] kasan_save_alloc_info+0x3b/0x50 [ 14.199759] __kasan_kmalloc+0xb7/0xc0 [ 14.199900] __kmalloc_cache_noprof+0x189/0x420 [ 14.200321] kasan_strings+0xc0/0xe80 [ 14.200518] kunit_try_run_case+0x1a5/0x480 [ 14.200861] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.201167] kthread+0x337/0x6f0 [ 14.201301] ret_from_fork+0x116/0x1d0 [ 14.201434] ret_from_fork_asm+0x1a/0x30 [ 14.201728] [ 14.201827] Freed by task 276: [ 14.202005] kasan_save_stack+0x45/0x70 [ 14.202206] kasan_save_track+0x18/0x40 [ 14.202377] kasan_save_free_info+0x3f/0x60 [ 14.202631] __kasan_slab_free+0x56/0x70 [ 14.202781] kfree+0x222/0x3f0 [ 14.202909] kasan_strings+0x2aa/0xe80 [ 14.203229] kunit_try_run_case+0x1a5/0x480 [ 14.203433] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.203779] kthread+0x337/0x6f0 [ 14.203949] ret_from_fork+0x116/0x1d0 [ 14.204134] ret_from_fork_asm+0x1a/0x30 [ 14.204334] [ 14.204413] The buggy address belongs to the object at ffff8881029b0840 [ 14.204413] which belongs to the cache kmalloc-32 of size 32 [ 14.204983] The buggy address is located 16 bytes inside of [ 14.204983] freed 32-byte region [ffff8881029b0840, ffff8881029b0860) [ 14.205517] [ 14.205674] The buggy address belongs to the physical page: [ 14.205887] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b0 [ 14.206283] flags: 0x200000000000000(node=0|zone=2) [ 14.206502] page_type: f5(slab) [ 14.206733] raw: 0200000000000000 ffff888100041780 dead000000000122 0000000000000000 [ 14.207105] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 14.207411] page dumped because: kasan: bad access detected [ 14.207698] [ 14.207792] Memory state around the buggy address: [ 14.207987] ffff8881029b0700: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 14.208280] ffff8881029b0780: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 14.208736] >ffff8881029b0800: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 14.208978] ^ [ 14.209296] ffff8881029b0880: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 14.209643] ffff8881029b0900: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 14.210009] ==================================================================