Hay
Date
July 6, 2025, 11:09 p.m.

Environment
qemu-arm64
qemu-x86_64
x86

[   17.052293] ==================================================================
[   17.052368] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0
[   17.052416] Free of addr fff00000c5fbe840 by task kunit_try_catch/193
[   17.052457] 
[   17.052486] CPU: 0 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   17.052565] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.052590] Hardware name: linux,dummy-virt (DT)
[   17.052620] Call trace:
[   17.052640]  show_stack+0x20/0x38 (C)
[   17.052684]  dump_stack_lvl+0x8c/0xd0
[   17.052730]  print_report+0x118/0x608
[   17.052773]  kasan_report_invalid_free+0xc0/0xe8
[   17.052821]  check_slab_allocation+0xd4/0x108
[   17.052867]  __kasan_slab_pre_free+0x2c/0x48
[   17.052913]  kfree+0xe8/0x3c8
[   17.052953]  kfree_sensitive+0x3c/0xb0
[   17.053009]  kmalloc_double_kzfree+0x168/0x308
[   17.053053]  kunit_try_run_case+0x170/0x3f0
[   17.053099]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.053149]  kthread+0x328/0x630
[   17.053188]  ret_from_fork+0x10/0x20
[   17.053234] 
[   17.053251] Allocated by task 193:
[   17.053278]  kasan_save_stack+0x3c/0x68
[   17.053316]  kasan_save_track+0x20/0x40
[   17.053353]  kasan_save_alloc_info+0x40/0x58
[   17.053391]  __kasan_kmalloc+0xd4/0xd8
[   17.053428]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.053466]  kmalloc_double_kzfree+0xb8/0x308
[   17.053502]  kunit_try_run_case+0x170/0x3f0
[   17.053539]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.053581]  kthread+0x328/0x630
[   17.053613]  ret_from_fork+0x10/0x20
[   17.053656] 
[   17.053674] Freed by task 193:
[   17.053698]  kasan_save_stack+0x3c/0x68
[   17.053735]  kasan_save_track+0x20/0x40
[   17.053770]  kasan_save_free_info+0x4c/0x78
[   17.053808]  __kasan_slab_free+0x6c/0x98
[   17.053845]  kfree+0x214/0x3c8
[   17.053876]  kfree_sensitive+0x80/0xb0
[   17.053910]  kmalloc_double_kzfree+0x11c/0x308
[   17.053947]  kunit_try_run_case+0x170/0x3f0
[   17.054016]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.054060]  kthread+0x328/0x630
[   17.054130]  ret_from_fork+0x10/0x20
[   17.054186] 
[   17.054250] The buggy address belongs to the object at fff00000c5fbe840
[   17.054250]  which belongs to the cache kmalloc-16 of size 16
[   17.054314] The buggy address is located 0 bytes inside of
[   17.054314]  16-byte region [fff00000c5fbe840, fff00000c5fbe850)
[   17.054403] 
[   17.054442] The buggy address belongs to the physical page:
[   17.054490] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105fbe
[   17.054557] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.054619] page_type: f5(slab)
[   17.054704] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   17.054757] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   17.054797] page dumped because: kasan: bad access detected
[   17.054829] 
[   17.054847] Memory state around the buggy address:
[   17.054881]  fff00000c5fbe700: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   17.054924]  fff00000c5fbe780: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   17.054965] >fff00000c5fbe800: fa fb fc fc fa fb fc fc fa fb fc fc fc fc fc fc
[   17.055013]                                            ^
[   17.055047]  fff00000c5fbe880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.055089]  fff00000c5fbe900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.055126] ==================================================================

[   17.043799] ==================================================================
[   17.043897] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0
[   17.043960] Free of addr fff00000c1376c40 by task kunit_try_catch/193
[   17.044079] 
[   17.044115] CPU: 1 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   17.044198] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.044223] Hardware name: linux,dummy-virt (DT)
[   17.044253] Call trace:
[   17.044292]  show_stack+0x20/0x38 (C)
[   17.044342]  dump_stack_lvl+0x8c/0xd0
[   17.044389]  print_report+0x118/0x608
[   17.044434]  kasan_report_invalid_free+0xc0/0xe8
[   17.044484]  check_slab_allocation+0xd4/0x108
[   17.044529]  __kasan_slab_pre_free+0x2c/0x48
[   17.044574]  kfree+0xe8/0x3c8
[   17.044614]  kfree_sensitive+0x3c/0xb0
[   17.044658]  kmalloc_double_kzfree+0x168/0x308
[   17.044705]  kunit_try_run_case+0x170/0x3f0
[   17.044754]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.044806]  kthread+0x328/0x630
[   17.044845]  ret_from_fork+0x10/0x20
[   17.044891] 
[   17.045136] Allocated by task 193:
[   17.045182]  kasan_save_stack+0x3c/0x68
[   17.045499]  kasan_save_track+0x20/0x40
[   17.045657]  kasan_save_alloc_info+0x40/0x58
[   17.045857]  __kasan_kmalloc+0xd4/0xd8
[   17.045936]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.046288]  kmalloc_double_kzfree+0xb8/0x308
[   17.046470]  kunit_try_run_case+0x170/0x3f0
[   17.046514]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.046574]  kthread+0x328/0x630
[   17.046614]  ret_from_fork+0x10/0x20
[   17.046876] 
[   17.046999] Freed by task 193:
[   17.047100]  kasan_save_stack+0x3c/0x68
[   17.047194]  kasan_save_track+0x20/0x40
[   17.047411]  kasan_save_free_info+0x4c/0x78
[   17.047613]  __kasan_slab_free+0x6c/0x98
[   17.047789]  kfree+0x214/0x3c8
[   17.047925]  kfree_sensitive+0x80/0xb0
[   17.048051]  kmalloc_double_kzfree+0x11c/0x308
[   17.048204]  kunit_try_run_case+0x170/0x3f0
[   17.048291]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.048337]  kthread+0x328/0x630
[   17.048609]  ret_from_fork+0x10/0x20
[   17.048715] 
[   17.048999] The buggy address belongs to the object at fff00000c1376c40
[   17.048999]  which belongs to the cache kmalloc-16 of size 16
[   17.049106] The buggy address is located 0 bytes inside of
[   17.049106]  16-byte region [fff00000c1376c40, fff00000c1376c50)
[   17.049197] 
[   17.049298] The buggy address belongs to the physical page:
[   17.049364] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101376
[   17.049614] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.049775] page_type: f5(slab)
[   17.049830] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   17.049983] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   17.050085] page dumped because: kasan: bad access detected
[   17.050204] 
[   17.050256] Memory state around the buggy address:
[   17.050332]  fff00000c1376b00: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   17.050511]  fff00000c1376b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   17.050707] >fff00000c1376c00: fa fb fc fc fa fb fc fc fa fb fc fc fc fc fc fc
[   17.050870]                                            ^
[   17.050949]  fff00000c1376c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.051181]  fff00000c1376d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.051325] ==================================================================

[   13.749523] ==================================================================
[   13.750735] BUG: KASAN: double-free in kfree_sensitive+0x2e/0x90
[   13.751174] Free of addr ffff8881024eb420 by task kunit_try_catch/210
[   13.751748] 
[   13.752367] CPU: 1 UID: 0 PID: 210 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   13.752464] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.752482] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.752514] Call Trace:
[   13.752533]  <TASK>
[   13.752558]  dump_stack_lvl+0x73/0xb0
[   13.752604]  print_report+0xd1/0x650
[   13.752651]  ? __virt_addr_valid+0x1db/0x2d0
[   13.752683]  ? kasan_complete_mode_report_info+0x64/0x200
[   13.752715]  ? kfree_sensitive+0x2e/0x90
[   13.752746]  kasan_report_invalid_free+0x10a/0x130
[   13.752780]  ? kfree_sensitive+0x2e/0x90
[   13.752809]  ? kfree_sensitive+0x2e/0x90
[   13.752837]  check_slab_allocation+0x101/0x130
[   13.752869]  __kasan_slab_pre_free+0x28/0x40
[   13.752898]  kfree+0xf0/0x3f0
[   13.752931]  ? kfree_sensitive+0x2e/0x90
[   13.752965]  kfree_sensitive+0x2e/0x90
[   13.752993]  kmalloc_double_kzfree+0x19c/0x350
[   13.753018]  ? __pfx_kmalloc_double_kzfree+0x10/0x10
[   13.753039]  ? __schedule+0x10cc/0x2b60
[   13.753058]  ? __pfx_read_tsc+0x10/0x10
[   13.753076]  ? ktime_get_ts64+0x86/0x230
[   13.753097]  kunit_try_run_case+0x1a5/0x480
[   13.753297]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.753347]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.753391]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.753432]  ? __kthread_parkme+0x82/0x180
[   13.753479]  ? preempt_count_sub+0x50/0x80
[   13.753548]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.753588]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.753643]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.753684]  kthread+0x337/0x6f0
[   13.753721]  ? trace_preempt_on+0x20/0xc0
[   13.753765]  ? __pfx_kthread+0x10/0x10
[   13.753802]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.753834]  ? calculate_sigpending+0x7b/0xa0
[   13.753865]  ? __pfx_kthread+0x10/0x10
[   13.753894]  ret_from_fork+0x116/0x1d0
[   13.753927]  ? __pfx_kthread+0x10/0x10
[   13.753957]  ret_from_fork_asm+0x1a/0x30
[   13.753995]  </TASK>
[   13.754007] 
[   13.765407] Allocated by task 210:
[   13.765893]  kasan_save_stack+0x45/0x70
[   13.766261]  kasan_save_track+0x18/0x40
[   13.766656]  kasan_save_alloc_info+0x3b/0x50
[   13.766915]  __kasan_kmalloc+0xb7/0xc0
[   13.767081]  __kmalloc_cache_noprof+0x189/0x420
[   13.767290]  kmalloc_double_kzfree+0xa9/0x350
[   13.767467]  kunit_try_run_case+0x1a5/0x480
[   13.768238]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.768814]  kthread+0x337/0x6f0
[   13.769097]  ret_from_fork+0x116/0x1d0
[   13.769412]  ret_from_fork_asm+0x1a/0x30
[   13.769964] 
[   13.770160] Freed by task 210:
[   13.770443]  kasan_save_stack+0x45/0x70
[   13.770779]  kasan_save_track+0x18/0x40
[   13.771236]  kasan_save_free_info+0x3f/0x60
[   13.771948]  __kasan_slab_free+0x56/0x70
[   13.772305]  kfree+0x222/0x3f0
[   13.772511]  kfree_sensitive+0x67/0x90
[   13.773024]  kmalloc_double_kzfree+0x12b/0x350
[   13.773308]  kunit_try_run_case+0x1a5/0x480
[   13.773841]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.774134]  kthread+0x337/0x6f0
[   13.774353]  ret_from_fork+0x116/0x1d0
[   13.774794]  ret_from_fork_asm+0x1a/0x30
[   13.775137] 
[   13.775321] The buggy address belongs to the object at ffff8881024eb420
[   13.775321]  which belongs to the cache kmalloc-16 of size 16
[   13.776340] The buggy address is located 0 bytes inside of
[   13.776340]  16-byte region [ffff8881024eb420, ffff8881024eb430)
[   13.777295] 
[   13.777472] The buggy address belongs to the physical page:
[   13.777998] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024eb
[   13.778481] flags: 0x200000000000000(node=0|zone=2)
[   13.779037] page_type: f5(slab)
[   13.779249] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.780051] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.780316] page dumped because: kasan: bad access detected
[   13.780723] 
[   13.781030] Memory state around the buggy address:
[   13.781341]  ffff8881024eb300: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.781882]  ffff8881024eb380: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   13.782397] >ffff8881024eb400: fa fb fc fc fa fb fc fc fc fc fc fc fc fc fc fc
[   13.782964]                                ^
[   13.783249]  ffff8881024eb480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.783979]  ffff8881024eb500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.784306] ==================================================================

[   13.925011] ==================================================================
[   13.925401] BUG: KASAN: double-free in kfree_sensitive+0x2e/0x90
[   13.925793] Free of addr ffff88810168fee0 by task kunit_try_catch/209
[   13.926112] 
[   13.926424] CPU: 0 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   13.926466] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.926477] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.926497] Call Trace:
[   13.926509]  <TASK>
[   13.926524]  dump_stack_lvl+0x73/0xb0
[   13.926552]  print_report+0xd1/0x650
[   13.926574]  ? __virt_addr_valid+0x1db/0x2d0
[   13.926597]  ? kasan_complete_mode_report_info+0x64/0x200
[   13.926622]  ? kfree_sensitive+0x2e/0x90
[   13.926643]  kasan_report_invalid_free+0x10a/0x130
[   13.926666]  ? kfree_sensitive+0x2e/0x90
[   13.926687]  ? kfree_sensitive+0x2e/0x90
[   13.926781]  check_slab_allocation+0x101/0x130
[   13.926803]  __kasan_slab_pre_free+0x28/0x40
[   13.926823]  kfree+0xf0/0x3f0
[   13.926845]  ? kfree_sensitive+0x2e/0x90
[   13.926867]  kfree_sensitive+0x2e/0x90
[   13.926886]  kmalloc_double_kzfree+0x19c/0x350
[   13.926908]  ? __pfx_kmalloc_double_kzfree+0x10/0x10
[   13.926932]  ? __schedule+0x10cc/0x2b60
[   13.926954]  ? __pfx_read_tsc+0x10/0x10
[   13.926977]  ? ktime_get_ts64+0x86/0x230
[   13.927003]  kunit_try_run_case+0x1a5/0x480
[   13.927026]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.927057]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.927081]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.927103]  ? __kthread_parkme+0x82/0x180
[   13.927122]  ? preempt_count_sub+0x50/0x80
[   13.927146]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.927170]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.927192]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.927214]  kthread+0x337/0x6f0
[   13.927233]  ? trace_preempt_on+0x20/0xc0
[   13.927255]  ? __pfx_kthread+0x10/0x10
[   13.927275]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.927296]  ? calculate_sigpending+0x7b/0xa0
[   13.927320]  ? __pfx_kthread+0x10/0x10
[   13.927341]  ret_from_fork+0x116/0x1d0
[   13.927359]  ? __pfx_kthread+0x10/0x10
[   13.927379]  ret_from_fork_asm+0x1a/0x30
[   13.927410]  </TASK>
[   13.927420] 
[   13.935578] Allocated by task 209:
[   13.935909]  kasan_save_stack+0x45/0x70
[   13.936137]  kasan_save_track+0x18/0x40
[   13.936343]  kasan_save_alloc_info+0x3b/0x50
[   13.936568]  __kasan_kmalloc+0xb7/0xc0
[   13.936863]  __kmalloc_cache_noprof+0x189/0x420
[   13.937121]  kmalloc_double_kzfree+0xa9/0x350
[   13.937298]  kunit_try_run_case+0x1a5/0x480
[   13.937527]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.937807]  kthread+0x337/0x6f0
[   13.937943]  ret_from_fork+0x116/0x1d0
[   13.938103]  ret_from_fork_asm+0x1a/0x30
[   13.938321] 
[   13.938424] Freed by task 209:
[   13.938592]  kasan_save_stack+0x45/0x70
[   13.938882]  kasan_save_track+0x18/0x40
[   13.939104]  kasan_save_free_info+0x3f/0x60
[   13.939331]  __kasan_slab_free+0x56/0x70
[   13.939538]  kfree+0x222/0x3f0
[   13.939664]  kfree_sensitive+0x67/0x90
[   13.939940]  kmalloc_double_kzfree+0x12b/0x350
[   13.940191]  kunit_try_run_case+0x1a5/0x480
[   13.940415]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.940654]  kthread+0x337/0x6f0
[   13.940992]  ret_from_fork+0x116/0x1d0
[   13.941213]  ret_from_fork_asm+0x1a/0x30
[   13.941393] 
[   13.941497] The buggy address belongs to the object at ffff88810168fee0
[   13.941497]  which belongs to the cache kmalloc-16 of size 16
[   13.942130] The buggy address is located 0 bytes inside of
[   13.942130]  16-byte region [ffff88810168fee0, ffff88810168fef0)
[   13.942604] 
[   13.942682] The buggy address belongs to the physical page:
[   13.942946] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10168f
[   13.943294] flags: 0x200000000000000(node=0|zone=2)
[   13.943547] page_type: f5(slab)
[   13.943803] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.944187] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.944489] page dumped because: kasan: bad access detected
[   13.944674] 
[   13.944823] Memory state around the buggy address:
[   13.944997]  ffff88810168fd80: fa fb fc fc 00 02 fc fc 00 05 fc fc 00 02 fc fc
[   13.945360]  ffff88810168fe00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc
[   13.945893] >ffff88810168fe80: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc
[   13.946262]                                                        ^
[   13.946569]  ffff88810168ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.946943]  ffff88810168ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.947213] ==================================================================

[   28.959089] ==================================================================
[   28.966363] BUG: KASAN: double-free in kfree_sensitive+0x2e/0x90
[   28.972399] Free of addr ffff888105602c00 by task kunit_try_catch/233
[   28.978837] 
[   28.980363] CPU: 1 UID: 0 PID: 233 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   28.980371] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   28.980374] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   28.980390] Call Trace:
[   28.980391]  <TASK>
[   28.980393]  dump_stack_lvl+0x73/0xb0
[   28.980397]  print_report+0xd1/0x650
[   28.980401]  ? __virt_addr_valid+0x1db/0x2d0
[   28.980405]  ? kasan_complete_mode_report_info+0x64/0x200
[   28.980410]  ? kfree_sensitive+0x2e/0x90
[   28.980414]  kasan_report_invalid_free+0x10a/0x130
[   28.980418]  ? kfree_sensitive+0x2e/0x90
[   28.980422]  ? kfree_sensitive+0x2e/0x90
[   28.980425]  check_slab_allocation+0x101/0x130
[   28.980429]  __kasan_slab_pre_free+0x28/0x40
[   28.980433]  kfree+0xf0/0x3f0
[   28.980437]  ? kfree_sensitive+0x2e/0x90
[   28.980441]  kfree_sensitive+0x2e/0x90
[   28.980444]  kmalloc_double_kzfree+0x19c/0x350
[   28.980448]  ? __pfx_kmalloc_double_kzfree+0x10/0x10
[   28.980453]  ? __schedule+0x10cc/0x2b60
[   28.980456]  ? ktime_get_ts64+0x83/0x230
[   28.980461]  kunit_try_run_case+0x1a2/0x480
[   28.980465]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.980469]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.980473]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.980477]  ? __kthread_parkme+0x82/0x180
[   28.980481]  ? preempt_count_sub+0x50/0x80
[   28.980485]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.980489]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   28.980493]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.980497]  kthread+0x334/0x6f0
[   28.980501]  ? trace_preempt_on+0x20/0xc0
[   28.980505]  ? __pfx_kthread+0x10/0x10
[   28.980509]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.980512]  ? calculate_sigpending+0x7b/0xa0
[   28.980517]  ? __pfx_kthread+0x10/0x10
[   28.980520]  ret_from_fork+0x113/0x1d0
[   28.980524]  ? __pfx_kthread+0x10/0x10
[   28.980527]  ret_from_fork_asm+0x1a/0x30
[   28.980533]  </TASK>
[   28.980534] 
[   29.160709] Allocated by task 233:
[   29.164113]  kasan_save_stack+0x45/0x70
[   29.167952]  kasan_save_track+0x18/0x40
[   29.171791]  kasan_save_alloc_info+0x3b/0x50
[   29.176064]  __kasan_kmalloc+0xb7/0xc0
[   29.179818]  __kmalloc_cache_noprof+0x189/0x420
[   29.184365]  kmalloc_double_kzfree+0xa9/0x350
[   29.188753]  kunit_try_run_case+0x1a2/0x480
[   29.192939]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   29.198365]  kthread+0x334/0x6f0
[   29.201622]  ret_from_fork+0x113/0x1d0
[   29.205388]  ret_from_fork_asm+0x1a/0x30
[   29.209326] 
[   29.210853] Freed by task 233:
[   29.213911]  kasan_save_stack+0x45/0x70
[   29.217752]  kasan_save_track+0x18/0x40
[   29.221589]  kasan_save_free_info+0x3f/0x60
[   29.225778]  __kasan_slab_free+0x56/0x70
[   29.229702]  kfree+0x222/0x3f0
[   29.232761]  kfree_sensitive+0x67/0x90
[   29.236514]  kmalloc_double_kzfree+0x12b/0x350
[   29.240960]  kunit_try_run_case+0x1a2/0x480
[   29.245147]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   29.250546]  kthread+0x334/0x6f0
[   29.253778]  ret_from_fork+0x113/0x1d0
[   29.257530]  ret_from_fork_asm+0x1a/0x30
[   29.261456] 
[   29.262957] The buggy address belongs to the object at ffff888105602c00
[   29.262957]  which belongs to the cache kmalloc-16 of size 16
[   29.275298] The buggy address is located 0 bytes inside of
[   29.275298]  16-byte region [ffff888105602c00, ffff888105602c10)
[   29.286771] 
[   29.288272] The buggy address belongs to the physical page:
[   29.293844] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105602
[   29.301843] flags: 0x200000000000000(node=0|zone=2)
[   29.306723] page_type: f5(slab)
[   29.309871] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000
[   29.317619] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   29.325364] page dumped because: kasan: bad access detected
[   29.330939] 
[   29.332437] Memory state around the buggy address:
[   29.337230]  ffff888105602b00: 00 03 fc fc 00 03 fc fc fa fb fc fc 00 04 fc fc
[   29.344450]  ffff888105602b80: 00 04 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   29.351670] >ffff888105602c00: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.358898]                    ^
[   29.362129]  ffff888105602c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.369364]  ffff888105602d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.376585] ==================================================================