Hay
Date
July 15, 2025, 2:10 p.m.

Environment
qemu-arm64
qemu-x86_64

[  107.927611] ==================================================================
[  107.928799] BUG: KASAN: use-after-free in kfree_sensitive+0x20/0x64
[  107.929402] Read of size 1 at addr ffff0000c66abb00 by task kunit_try_catch/251
[  107.930010] 
[  107.930232] CPU: 1 PID: 251 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[  107.930967] Hardware name: linux,dummy-virt (DT)
[  107.931421] Call trace:
[  107.931687]  dump_backtrace+0xe0/0x134
[  107.932126]  show_stack+0x20/0x2c
[  107.932578]  dump_stack_lvl+0x88/0xb4
[  107.933094]  print_report+0x158/0x44c
[  107.933510]  kasan_report+0xc8/0x180
[  107.933928]  __kasan_check_byte+0x54/0x70
[  107.934384]  ksize+0x44/0xb0
[  107.934783]  kfree_sensitive+0x20/0x64
[  107.935258]  kmalloc_double_kzfree+0xcc/0x1e0
[  107.935750]  kunit_try_run_case+0x8c/0x124
[  107.936215]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  107.937010]  kthread+0x15c/0x170
[  107.937413]  ret_from_fork+0x10/0x20
[  107.937826] 
[  107.938043] Allocated by task 251:
[  107.938390]  kasan_save_stack+0x3c/0x70
[  107.938851]  kasan_set_track+0x2c/0x40
[  107.939259]  kasan_save_alloc_info+0x24/0x34
[  107.939724]  __kasan_kmalloc+0xd4/0xe0
[  107.940132]  kmalloc_trace+0x8c/0x150
[  107.940734]  kmalloc_double_kzfree+0x9c/0x1e0
[  107.941246]  kunit_try_run_case+0x8c/0x124
[  107.941730]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  107.942351]  kthread+0x15c/0x170
[  107.942807]  ret_from_fork+0x10/0x20
[  107.943200] 
[  107.943424] Freed by task 251:
[  107.943754]  kasan_save_stack+0x3c/0x70
[  107.944226]  kasan_set_track+0x2c/0x40
[  107.944873]  kasan_save_free_info+0x38/0x5c
[  107.945389]  __kasan_slab_free+0x100/0x170
[  107.945825]  slab_free_freelist_hook+0xd8/0x1c0
[  107.946237]  __kmem_cache_free+0x15c/0x2a0
[  107.946767]  kfree+0x88/0x150
[  107.947196]  kfree_sensitive+0x54/0x64
[  107.947671]  kmalloc_double_kzfree+0xbc/0x1e0
[  107.948233]  kunit_try_run_case+0x8c/0x124
[  107.948779]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  107.949406]  kthread+0x15c/0x170
[  107.949833]  ret_from_fork+0x10/0x20
[  107.950307] 
[  107.950559] The buggy address belongs to the object at ffff0000c66abb00
[  107.950559]  which belongs to the cache kmalloc-128 of size 128
[  107.951730] The buggy address is located 0 bytes inside of
[  107.951730]  128-byte region [ffff0000c66abb00, ffff0000c66abb80)
[  107.953058] 
[  107.953294] The buggy address belongs to the physical page:
[  107.953766] page:0000000069500412 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ab
[  107.954551] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  107.955279] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  107.955978] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  107.956933] page dumped because: kasan: bad access detected
[  107.957391] 
[  107.957600] Memory state around the buggy address:
[  107.958073]  ffff0000c66aba00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[  107.959065]  ffff0000c66aba80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  107.959658] >ffff0000c66abb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  107.960348]                    ^
[  107.960871]  ffff0000c66abb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  107.961674]  ffff0000c66abc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  107.962269] ==================================================================

[   77.586541] ==================================================================
[   77.587632] BUG: KASAN: use-after-free in kfree_sensitive+0x1c/0xa4
[   77.588282] Read of size 1 at addr ffff0000c5ad0000 by task kunit_try_catch/167
[   77.588908] 
[   77.589125] CPU: 1 PID: 167 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   77.589900] Hardware name: linux,dummy-virt (DT)
[   77.590347] Call trace:
[   77.590624]  dump_backtrace+0xf8/0x118
[   77.591164]  show_stack+0x18/0x24
[   77.591626]  __dump_stack+0x28/0x38
[   77.592095]  dump_stack_lvl+0x54/0x6c
[   77.592543]  print_address_description+0x7c/0x1ec
[   77.593194]  print_report+0x50/0x68
[   77.593664]  kasan_report+0xac/0x100
[   77.594156]  __kasan_check_byte+0x3c/0x54
[   77.594646]  ksize+0x34/0x13c
[   77.595055]  kfree_sensitive+0x1c/0xa4
[   77.595506]  kmalloc_double_kzfree+0xa4/0x144
[   77.596013]  kunit_try_run_case+0x80/0x184
[   77.596523]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   77.597236]  kthread+0x16c/0x21c
[   77.597653]  ret_from_fork+0x10/0x20
[   77.598113] 
[   77.598303] Allocated by task 167:
[   77.598638]  kasan_set_track+0x4c/0x80
[   77.599129]  kasan_save_alloc_info+0x28/0x34
[   77.599627]  __kasan_kmalloc+0x88/0xa0
[   77.600129]  kmalloc_trace+0x54/0x68
[   77.600555]  kmalloc_double_kzfree+0x48/0x144
[   77.601063]  kunit_try_run_case+0x80/0x184
[   77.601677]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   77.602280]  kthread+0x16c/0x21c
[   77.602695]  ret_from_fork+0x10/0x20
[   77.603139] 
[   77.603339] Freed by task 167:
[   77.603659]  kasan_set_track+0x4c/0x80
[   77.604198]  kasan_save_free_info+0x3c/0x60
[   77.604678]  ____kasan_slab_free+0xe8/0x140
[   77.605262]  __kasan_slab_free+0x18/0x28
[   77.605771]  __kmem_cache_free+0xdc/0x284
[   77.606250]  kfree_sensitive+0x88/0xa4
[   77.606697]  kmalloc_double_kzfree+0x90/0x144
[   77.607225]  kunit_try_run_case+0x80/0x184
[   77.607726]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   77.608294]  kthread+0x16c/0x21c
[   77.608826]  ret_from_fork+0x10/0x20
[   77.609272] 
[   77.609489] The buggy address belongs to the object at ffff0000c5ad0000
[   77.609489]  which belongs to the cache kmalloc-128 of size 128
[   77.610422] The buggy address is located 0 bytes inside of
[   77.610422]  128-byte region [ffff0000c5ad0000, ffff0000c5ad0080)
[   77.611346] 
[   77.611561] The buggy address belongs to the physical page:
[   77.612048] page:000000001efa35a5 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ad0
[   77.612923] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   77.613794] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   77.614500] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   77.615153] page dumped because: kasan: bad access detected
[   77.615633] 
[   77.615836] Memory state around the buggy address:
[   77.616314]  ffff0000c5acff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   77.617058]  ffff0000c5acff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   77.617719] >ffff0000c5ad0000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   77.618361]                    ^
[   77.618726]  ffff0000c5ad0080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.619367]  ffff0000c5ad0100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.619969] ==================================================================

[   76.778528] ==================================================================
[   76.780377] BUG: KASAN: use-after-free in kfree_sensitive+0x1c/0xa4
[   76.781366] Read of size 1 at addr ffff0000c58a7b00 by task kunit_try_catch/167
[   76.782309] 
[   76.782638] CPU: 0 PID: 167 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   76.783792] Hardware name: linux,dummy-virt (DT)
[   76.784537] Call trace:
[   76.784958]  dump_backtrace+0xf4/0x114
[   76.785646]  show_stack+0x18/0x24
[   76.786285]  __dump_stack+0x28/0x38
[   76.786907]  dump_stack_lvl+0x50/0x68
[   76.787534]  print_address_description+0x7c/0x1ec
[   76.788260]  print_report+0x50/0x68
[   76.788686]  kasan_report+0xac/0xfc
[   76.789214]  __kasan_check_byte+0x3c/0x54
[   76.789714]  ksize+0x34/0x13c
[   76.790152]  kfree_sensitive+0x1c/0xa4
[   76.790556]  kmalloc_double_kzfree+0xa4/0x144
[   76.791309]  kunit_try_run_case+0x80/0x184
[   76.792092]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.792965]  kthread+0x16c/0x21c
[   76.793578]  ret_from_fork+0x10/0x20
[   76.794206] 
[   76.794503] Allocated by task 167:
[   76.795025]  kasan_set_track+0x4c/0x80
[   76.795757]  kasan_save_alloc_info+0x28/0x34
[   76.796462]  __kasan_kmalloc+0x88/0xa0
[   76.796981]  kmalloc_trace+0x54/0x68
[   76.797384]  kmalloc_double_kzfree+0x48/0x144
[   76.797921]  kunit_try_run_case+0x80/0x184
[   76.798597]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.799437]  kthread+0x16c/0x21c
[   76.800109]  ret_from_fork+0x10/0x20
[   76.800792] 
[   76.801167] Freed by task 167:
[   76.801651]  kasan_set_track+0x4c/0x80
[   76.802319]  kasan_save_free_info+0x3c/0x60
[   76.803003]  ____kasan_slab_free+0xe8/0x140
[   76.803782]  __kasan_slab_free+0x18/0x28
[   76.804498]  __kmem_cache_free+0xdc/0x27c
[   76.805172]  kfree_sensitive+0x88/0xa4
[   76.805735]  kmalloc_double_kzfree+0x90/0x144
[   76.806196]  kunit_try_run_case+0x80/0x184
[   76.806619]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.807140]  kthread+0x16c/0x21c
[   76.807532]  ret_from_fork+0x10/0x20
[   76.808307] 
[   76.808655] The buggy address belongs to the object at ffff0000c58a7b00
[   76.808655]  which belongs to the cache kmalloc-128 of size 128
[   76.810120] The buggy address is located 0 bytes inside of
[   76.810120]  128-byte region [ffff0000c58a7b00, ffff0000c58a7b80)
[   76.811477] 
[   76.811824] The buggy address belongs to the physical page:
[   76.812616] page:00000000333134b1 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7
[   76.813772] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   76.814725] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   76.815734] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   76.816686] page dumped because: kasan: bad access detected
[   76.817390] 
[   76.817675] Memory state around the buggy address:
[   76.818315]  ffff0000c58a7a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   76.819239]  ffff0000c58a7a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.820262] >ffff0000c58a7b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   76.821241]                    ^
[   76.821793]  ffff0000c58a7b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.822697]  ffff0000c58a7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.823238] ==================================================================

[   75.326116] ==================================================================
[   75.327374] BUG: KASAN: use-after-free in kfree_sensitive+0x18/0x5c
[   75.328032] Read of size 1 at addr ffff0000c5938e00 by task kunit_try_catch/167
[   75.328733] 
[   75.329029] CPU: 0 PID: 167 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   75.329855] Hardware name: linux,dummy-virt (DT)
[   75.330320] Call trace:
[   75.330637]  dump_backtrace.part.0+0xdc/0xf0
[   75.331155]  show_stack+0x18/0x30
[   75.331750]  dump_stack_lvl+0x64/0x80
[   75.332348]  print_report+0x158/0x438
[   75.332965]  kasan_report+0xb4/0xf4
[   75.333420]  __kasan_check_byte+0x54/0x70
[   75.334795]  ksize+0x3c/0x94
[   75.335281]  kfree_sensitive+0x18/0x5c
[   75.335673]  kmalloc_double_kzfree+0xc4/0x1d0
[   75.336082]  kunit_try_run_case+0x84/0x120
[   75.336482]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   75.336951]  kthread+0x180/0x190
[   75.337271]  ret_from_fork+0x10/0x20
[   75.338053] 
[   75.338246] Allocated by task 167:
[   75.338534]  kasan_save_stack+0x3c/0x70
[   75.338889]  kasan_set_track+0x2c/0x40
[   75.339225]  kasan_save_alloc_info+0x24/0x34
[   75.341016]  __kasan_kmalloc+0xb8/0xc0
[   75.341737]  kmalloc_trace+0x58/0x6c
[   75.343082]  kmalloc_double_kzfree+0x94/0x1d0
[   75.344123]  kunit_try_run_case+0x84/0x120
[   75.345198]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   75.347550]  kthread+0x180/0x190
[   75.348469]  ret_from_fork+0x10/0x20
[   75.348863] 
[   75.349046] Freed by task 167:
[   75.349671]  kasan_save_stack+0x3c/0x70
[   75.350187]  kasan_set_track+0x2c/0x40
[   75.351216]  kasan_save_free_info+0x38/0x5c
[   75.351706]  __kasan_slab_free+0xe4/0x150
[   75.352138]  __kmem_cache_free+0x130/0x2a4
[   75.352623]  kfree+0x58/0x80
[   75.353012]  kfree_sensitive+0x4c/0x5c
[   75.353419]  kmalloc_double_kzfree+0xb4/0x1d0
[   75.353880]  kunit_try_run_case+0x84/0x120
[   75.354342]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   75.354866]  kthread+0x180/0x190
[   75.355235]  ret_from_fork+0x10/0x20
[   75.355676] 
[   75.355871] The buggy address belongs to the object at ffff0000c5938e00
[   75.355871]  which belongs to the cache kmalloc-128 of size 128
[   75.356769] The buggy address is located 0 bytes inside of
[   75.356769]  128-byte region [ffff0000c5938e00, ffff0000c5938e80)
[   75.357662] 
[   75.357869] The buggy address belongs to the physical page:
[   75.358326] page:000000003af4cecf refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105938
[   75.359071] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   75.360298] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   75.360978] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   75.361476] page dumped because: kasan: bad access detected
[   75.361994] 
[   75.362257] Memory state around the buggy address:
[   75.362759]  ffff0000c5938d00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.363387]  ffff0000c5938d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.364007] >ffff0000c5938e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   75.364556]                    ^
[   75.364895]  ffff0000c5938e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.365362]  ffff0000c5938f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.366709] ==================================================================

[   66.652338] ==================================================================
[   66.654401] BUG: KASAN: use-after-free in kfree_sensitive+0x18/0x60
[   66.655278] Read of size 1 at addr ffff0000c5a10200 by task kunit_try_catch/165
[   66.655737] 
[   66.655918] CPU: 1 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   66.656438] Hardware name: linux,dummy-virt (DT)
[   66.656758] Call trace:
[   66.657018]  dump_backtrace+0x110/0x120
[   66.657519]  show_stack+0x18/0x28
[   66.657974]  dump_stack_lvl+0x68/0x84
[   66.658619]  print_report+0x158/0x484
[   66.659030]  kasan_report+0x98/0xe0
[   66.659410]  __kasan_check_byte+0x58/0x70
[   66.659803]  ksize+0x30/0x80
[   66.660114]  kfree_sensitive+0x18/0x60
[   66.660518]  kmalloc_double_kzfree+0xdc/0x1d8
[   66.660978]  kunit_try_run_case+0x7c/0x120
[   66.661407]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   66.661936]  kthread+0x1a4/0x1b8
[   66.662545]  ret_from_fork+0x10/0x20
[   66.662938] 
[   66.663119] Allocated by task 165:
[   66.663435]  kasan_save_stack+0x2c/0x58
[   66.663814]  kasan_set_track+0x2c/0x40
[   66.664213]  kasan_save_alloc_info+0x24/0x38
[   66.664655]  __kasan_kmalloc+0xa0/0xb8
[   66.665020]  kmalloc_trace+0x50/0x68
[   66.665414]  kmalloc_double_kzfree+0xa8/0x1d8
[   66.666094]  kunit_try_run_case+0x7c/0x120
[   66.666545]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   66.667036]  kthread+0x1a4/0x1b8
[   66.667412]  ret_from_fork+0x10/0x20
[   66.667789] 
[   66.667966] Freed by task 165:
[   66.668242]  kasan_save_stack+0x2c/0x58
[   66.668640]  kasan_set_track+0x2c/0x40
[   66.669029]  kasan_save_free_info+0x38/0x60
[   66.669725]  __kasan_slab_free+0xe8/0x158
[   66.670137]  __kmem_cache_free+0x138/0x2b0
[   66.670577]  kfree+0x5c/0x70
[   66.670914]  kfree_sensitive+0x4c/0x60
[   66.671326]  kmalloc_double_kzfree+0xc8/0x1d8
[   66.671766]  kunit_try_run_case+0x7c/0x120
[   66.672181]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   66.672715]  kthread+0x1a4/0x1b8
[   66.673066]  ret_from_fork+0x10/0x20
[   66.673443] 
[   66.673643] The buggy address belongs to the object at ffff0000c5a10200
[   66.673643]  which belongs to the cache kmalloc-128 of size 128
[   66.674491] The buggy address is located 0 bytes inside of
[   66.674491]  128-byte region [ffff0000c5a10200, ffff0000c5a10280)
[   66.675585] 
[   66.675799] The buggy address belongs to the physical page:
[   66.676224] page:000000003e6c9983 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a10
[   66.676956] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   66.678250] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   66.678843] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   66.679432] page dumped because: kasan: bad access detected
[   66.679872] 
[   66.680067] Memory state around the buggy address:
[   66.680505]  ffff0000c5a10100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   66.681046]  ffff0000c5a10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.681938] >ffff0000c5a10200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   66.682614]                    ^
[   66.682932]  ffff0000c5a10280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.683504]  ffff0000c5a10300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.684032] ==================================================================

[   32.620510] ==================================================================
[   32.621370] BUG: KASAN: use-after-free in kfree_sensitive+0x12/0x50
[   32.621872] Read of size 1 at addr ffff888101a015c0 by task kunit_try_catch/271
[   32.622931] 
[   32.623155] CPU: 1 PID: 271 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   32.623836] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.624313] Call Trace:
[   32.624875]  <TASK>
[   32.625241]  dump_stack_lvl+0x49/0x62
[   32.625653]  print_report+0x189/0x492
[   32.626036]  ? kasan_complete_mode_report_info+0x7c/0x200
[   32.626602]  ? kfree_sensitive+0x12/0x50
[   32.627004]  kasan_report+0x10c/0x190
[   32.627548]  ? kfree_sensitive+0x12/0x50
[   32.627925]  ? kfree_sensitive+0x12/0x50
[   32.628367]  __kasan_check_byte+0x39/0x50
[   32.628977]  ksize+0x1e/0x70
[   32.629376]  kfree_sensitive+0x12/0x50
[   32.629604]  kmalloc_double_kzfree+0xc8/0x1b0
[   32.629844]  ? kasan_global_oob_right+0x160/0x160
[   32.630089]  ? __kunit_add_resource+0xd1/0x100
[   32.630778]  ? kasan_test_init+0x13e/0x1b0
[   32.631148]  kunit_try_run_case+0x8f/0xd0
[   32.631606]  ? kunit_catch_run_case+0x80/0x80
[   32.632002]  ? kunit_try_catch_throw+0x40/0x40
[   32.632846]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   32.633174]  kthread+0x17b/0x1b0
[   32.633631]  ? kthread_complete_and_exit+0x30/0x30
[   32.634072]  ret_from_fork+0x22/0x30
[   32.634528]  </TASK>
[   32.634866] 
[   32.635022] Allocated by task 271:
[   32.635413]  kasan_save_stack+0x41/0x70
[   32.635747]  kasan_set_track+0x25/0x40
[   32.636093]  kasan_save_alloc_info+0x1e/0x30
[   32.636778]  __kasan_kmalloc+0xb6/0xc0
[   32.637192]  kmalloc_trace+0x48/0xb0
[   32.637622]  kmalloc_double_kzfree+0x99/0x1b0
[   32.637992]  kunit_try_run_case+0x8f/0xd0
[   32.638296]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   32.638783]  kthread+0x17b/0x1b0
[   32.639108]  ret_from_fork+0x22/0x30
[   32.639738] 
[   32.639861] Freed by task 271:
[   32.640026]  kasan_save_stack+0x41/0x70
[   32.640697]  kasan_set_track+0x25/0x40
[   32.641089]  kasan_save_free_info+0x2e/0x50
[   32.641603]  ____kasan_slab_free+0x175/0x1d0
[   32.641864]  __kasan_slab_free+0x12/0x20
[   32.642215]  __kmem_cache_free+0x188/0x2f0
[   32.642681]  kfree+0x78/0x120
[   32.643007]  kfree_sensitive+0x3e/0x50
[   32.643255]  kmalloc_double_kzfree+0xb1/0x1b0
[   32.643724]  kunit_try_run_case+0x8f/0xd0
[   32.643997]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   32.644594]  kthread+0x17b/0x1b0
[   32.644815]  ret_from_fork+0x22/0x30
[   32.645204] 
[   32.645299] The buggy address belongs to the object at ffff888101a015c0
[   32.645299]  which belongs to the cache kmalloc-16 of size 16
[   32.646097] The buggy address is located 0 bytes inside of
[   32.646097]  16-byte region [ffff888101a015c0, ffff888101a015d0)
[   32.647001] 
[   32.647125] The buggy address belongs to the physical page:
[   32.647453] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101a01
[   32.647944] flags: 0x200000000000200(slab|node=0|zone=2)
[   32.648309] raw: 0200000000000200 0000000000000000 dead000000000122 ffff8881000413c0
[   32.649130] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   32.649752] page dumped because: kasan: bad access detected
[   32.650027] 
[   32.650158] Memory state around the buggy address:
[   32.650577]  ffff888101a01480: 00 06 fc fc 00 06 fc fc 00 06 fc fc 00 02 fc fc
[   32.650962]  ffff888101a01500: 00 03 fc fc 00 00 fc fc 00 00 fc fc fa fb fc fc
[   32.651344] >ffff888101a01580: fa fb fc fc fa fb fc fc fa fb fc fc fc fc fc fc
[   32.651813]                                            ^
[   32.652058]  ffff888101a01600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.652729]  ffff888101a01680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.653103] ==================================================================