Hay
Date
July 15, 2025, 2:10 p.m.

Environment
qemu-arm64
qemu-x86_64

[  105.875576] ==================================================================
[  105.876371] BUG: KASAN: use-after-free in kmalloc_uaf+0xcc/0x1f0
[  105.877667] Read of size 1 at addr ffff0000c66f6a08 by task kunit_try_catch/227
[  105.878912] 
[  105.879249] CPU: 1 PID: 227 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[  105.880297] Hardware name: linux,dummy-virt (DT)
[  105.881086] Call trace:
[  105.881668]  dump_backtrace+0xe0/0x134
[  105.882436]  show_stack+0x20/0x2c
[  105.883125]  dump_stack_lvl+0x88/0xb4
[  105.883704]  print_report+0x158/0x44c
[  105.884079]  kasan_report+0xc8/0x180
[  105.884448]  __asan_load1+0x68/0x74
[  105.884888]  kmalloc_uaf+0xcc/0x1f0
[  105.885783]  kunit_try_run_case+0x8c/0x124
[  105.886555]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  105.887388]  kthread+0x15c/0x170
[  105.887968]  ret_from_fork+0x10/0x20
[  105.888664] 
[  105.888983] Allocated by task 227:
[  105.889593]  kasan_save_stack+0x3c/0x70
[  105.890327]  kasan_set_track+0x2c/0x40
[  105.891114]  kasan_save_alloc_info+0x24/0x34
[  105.891886]  __kasan_kmalloc+0xd4/0xe0
[  105.892620]  kmalloc_trace+0x8c/0x150
[  105.893287]  kmalloc_uaf+0x9c/0x1f0
[  105.893922]  kunit_try_run_case+0x8c/0x124
[  105.894600]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  105.895452]  kthread+0x15c/0x170
[  105.896047]  ret_from_fork+0x10/0x20
[  105.896689] 
[  105.897032] Freed by task 227:
[  105.897532]  kasan_save_stack+0x3c/0x70
[  105.898182]  kasan_set_track+0x2c/0x40
[  105.898801]  kasan_save_free_info+0x38/0x5c
[  105.899215]  __kasan_slab_free+0x100/0x170
[  105.899607]  slab_free_freelist_hook+0xd8/0x1c0
[  105.900365]  __kmem_cache_free+0x15c/0x2a0
[  105.901089]  kfree+0x88/0x150
[  105.901635]  kmalloc_uaf+0xbc/0x1f0
[  105.902261]  kunit_try_run_case+0x8c/0x124
[  105.902940]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  105.903770]  kthread+0x15c/0x170
[  105.904356]  ret_from_fork+0x10/0x20
[  105.905016] 
[  105.905355] The buggy address belongs to the object at ffff0000c66f6a00
[  105.905355]  which belongs to the cache kmalloc-128 of size 128
[  105.907145] The buggy address is located 8 bytes inside of
[  105.907145]  128-byte region [ffff0000c66f6a00, ffff0000c66f6a80)
[  105.908787] 
[  105.909099] The buggy address belongs to the physical page:
[  105.909997] page:000000008cb3a959 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066f6
[  105.910848] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  105.911401] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  105.912146] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  105.913224] page dumped because: kasan: bad access detected
[  105.914021] 
[  105.914390] Memory state around the buggy address:
[  105.915095]  ffff0000c66f6900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[  105.916072]  ffff0000c66f6980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  105.917078] >ffff0000c66f6a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  105.918103]                       ^
[  105.918690]  ffff0000c66f6a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  105.919605]  ffff0000c66f6b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  105.920492] ==================================================================

[   75.629573] ==================================================================
[   75.630348] BUG: KASAN: use-after-free in kmalloc_uaf+0xa4/0x148
[   75.631053] Read of size 1 at addr ffff0000c5a77308 by task kunit_try_catch/143
[   75.632345] 
[   75.632717] CPU: 0 PID: 143 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   75.633908] Hardware name: linux,dummy-virt (DT)
[   75.634671] Call trace:
[   75.635169]  dump_backtrace+0xf8/0x118
[   75.635923]  show_stack+0x18/0x24
[   75.636680]  __dump_stack+0x28/0x38
[   75.637342]  dump_stack_lvl+0x54/0x6c
[   75.637967]  print_address_description+0x7c/0x1ec
[   75.638744]  print_report+0x50/0x68
[   75.639365]  kasan_report+0xac/0x100
[   75.639988]  __asan_load1+0x6c/0x70
[   75.640618]  kmalloc_uaf+0xa4/0x148
[   75.641252]  kunit_try_run_case+0x80/0x184
[   75.641735]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.642247]  kthread+0x16c/0x21c
[   75.642629]  ret_from_fork+0x10/0x20
[   75.643225] 
[   75.643495] Allocated by task 143:
[   75.643985]  kasan_set_track+0x4c/0x80
[   75.644658]  kasan_save_alloc_info+0x28/0x34
[   75.645355]  __kasan_kmalloc+0x88/0xa0
[   75.645996]  kmalloc_trace+0x54/0x68
[   75.646574]  kmalloc_uaf+0x48/0x148
[   75.647150]  kunit_try_run_case+0x80/0x184
[   75.647799]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.648619]  kthread+0x16c/0x21c
[   75.649206]  ret_from_fork+0x10/0x20
[   75.649835] 
[   75.650103] Freed by task 143:
[   75.650548]  kasan_set_track+0x4c/0x80
[   75.651174]  kasan_save_free_info+0x3c/0x60
[   75.651812]  ____kasan_slab_free+0xe8/0x140
[   75.652483]  __kasan_slab_free+0x18/0x28
[   75.653202]  __kmem_cache_free+0xdc/0x284
[   75.653913]  kfree+0x60/0x74
[   75.654413]  kmalloc_uaf+0x90/0x148
[   75.654991]  kunit_try_run_case+0x80/0x184
[   75.655630]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.656392]  kthread+0x16c/0x21c
[   75.657051]  ret_from_fork+0x10/0x20
[   75.657710] 
[   75.657998] The buggy address belongs to the object at ffff0000c5a77300
[   75.657998]  which belongs to the cache kmalloc-128 of size 128
[   75.659319] The buggy address is located 8 bytes inside of
[   75.659319]  128-byte region [ffff0000c5a77300, ffff0000c5a77380)
[   75.660109] 
[   75.660319] The buggy address belongs to the physical page:
[   75.660818] page:00000000495fea3c refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a77
[   75.661582] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   75.662262] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   75.663303] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   75.664219] page dumped because: kasan: bad access detected
[   75.665387] 
[   75.665667] Memory state around the buggy address:
[   75.666301]  ffff0000c5a77200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   75.667181]  ffff0000c5a77280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.668056] >ffff0000c5a77300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   75.669159]                       ^
[   75.669717]  ffff0000c5a77380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.670334]  ffff0000c5a77400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.670812] ==================================================================

[   74.682106] ==================================================================
[   74.683766] BUG: KASAN: use-after-free in kmalloc_uaf+0xa4/0x148
[   74.684987] Read of size 1 at addr ffff0000c5a14008 by task kunit_try_catch/143
[   74.685506] 
[   74.685707] CPU: 0 PID: 143 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   74.687262] Hardware name: linux,dummy-virt (DT)
[   74.688076] Call trace:
[   74.688721]  dump_backtrace+0xf4/0x114
[   74.689594]  show_stack+0x18/0x24
[   74.690246]  __dump_stack+0x28/0x38
[   74.690864]  dump_stack_lvl+0x50/0x68
[   74.691484]  print_address_description+0x7c/0x1ec
[   74.692262]  print_report+0x50/0x68
[   74.692871]  kasan_report+0xac/0xfc
[   74.693281]  __asan_load1+0x6c/0x70
[   74.693696]  kmalloc_uaf+0xa4/0x148
[   74.694328]  kunit_try_run_case+0x80/0x184
[   74.695020]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   74.695926]  kthread+0x16c/0x21c
[   74.696533]  ret_from_fork+0x10/0x20
[   74.697269] 
[   74.697639] Allocated by task 143:
[   74.698160]  kasan_set_track+0x4c/0x80
[   74.698829]  kasan_save_alloc_info+0x28/0x34
[   74.699499]  __kasan_kmalloc+0x88/0xa0
[   74.700160]  kmalloc_trace+0x54/0x68
[   74.700785]  kmalloc_uaf+0x48/0x148
[   74.701381]  kunit_try_run_case+0x80/0x184
[   74.702066]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   74.702887]  kthread+0x16c/0x21c
[   74.703274]  ret_from_fork+0x10/0x20
[   74.703646] 
[   74.703969] Freed by task 143:
[   74.704470]  kasan_set_track+0x4c/0x80
[   74.705177]  kasan_save_free_info+0x3c/0x60
[   74.705934]  ____kasan_slab_free+0xe8/0x140
[   74.706649]  __kasan_slab_free+0x18/0x28
[   74.707337]  __kmem_cache_free+0xdc/0x27c
[   74.708001]  kfree+0x60/0x74
[   74.708533]  kmalloc_uaf+0x90/0x148
[   74.709132]  kunit_try_run_case+0x80/0x184
[   74.709820]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   74.710650]  kthread+0x16c/0x21c
[   74.711250]  ret_from_fork+0x10/0x20
[   74.711927] 
[   74.712158] The buggy address belongs to the object at ffff0000c5a14000
[   74.712158]  which belongs to the cache kmalloc-128 of size 128
[   74.713861] The buggy address is located 8 bytes inside of
[   74.713861]  128-byte region [ffff0000c5a14000, ffff0000c5a14080)
[   74.714666] 
[   74.715015] The buggy address belongs to the physical page:
[   74.715746] page:000000002a39f223 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a14
[   74.716937] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   74.717921] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   74.718898] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   74.719381] page dumped because: kasan: bad access detected
[   74.719959] 
[   74.720240] Memory state around the buggy address:
[   74.720996]  ffff0000c5a13f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   74.722053]  ffff0000c5a13f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   74.723075] >ffff0000c5a14000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   74.723979]                       ^
[   74.724514]  ffff0000c5a14080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.725454]  ffff0000c5a14100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.726337] ==================================================================

[   73.271251] ==================================================================
[   73.272777] BUG: KASAN: use-after-free in kmalloc_uaf+0xc4/0x1e0
[   73.273908] Read of size 1 at addr ffff0000c589d808 by task kunit_try_catch/143
[   73.275193] 
[   73.275683] CPU: 1 PID: 143 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   73.276681] Hardware name: linux,dummy-virt (DT)
[   73.277381] Call trace:
[   73.277940]  dump_backtrace.part.0+0xdc/0xf0
[   73.278796]  show_stack+0x18/0x30
[   73.279479]  dump_stack_lvl+0x64/0x80
[   73.280171]  print_report+0x158/0x438
[   73.280865]  kasan_report+0xb4/0xf4
[   73.281513]  __asan_load1+0x68/0x74
[   73.282221]  kmalloc_uaf+0xc4/0x1e0
[   73.283003]  kunit_try_run_case+0x84/0x120
[   73.283764]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   73.284660]  kthread+0x180/0x190
[   73.285193]  ret_from_fork+0x10/0x20
[   73.285788] 
[   73.286064] Allocated by task 143:
[   73.286644]  kasan_save_stack+0x3c/0x70
[   73.287233]  kasan_set_track+0x2c/0x40
[   73.287801]  kasan_save_alloc_info+0x24/0x34
[   73.288443]  __kasan_kmalloc+0xb8/0xc0
[   73.288946]  kmalloc_trace+0x58/0x6c
[   73.289294]  kmalloc_uaf+0x94/0x1e0
[   73.289652]  kunit_try_run_case+0x84/0x120
[   73.290346]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   73.291185]  kthread+0x180/0x190
[   73.291808]  ret_from_fork+0x10/0x20
[   73.292377] 
[   73.292651] Freed by task 143:
[   73.293098]  kasan_save_stack+0x3c/0x70
[   73.293681]  kasan_set_track+0x2c/0x40
[   73.294343]  kasan_save_free_info+0x38/0x5c
[   73.295078]  __kasan_slab_free+0xe4/0x150
[   73.295717]  __kmem_cache_free+0x130/0x2a4
[   73.296389]  kfree+0x58/0x80
[   73.296900]  kmalloc_uaf+0xb4/0x1e0
[   73.297473]  kunit_try_run_case+0x84/0x120
[   73.298291]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   73.298927]  kthread+0x180/0x190
[   73.299244]  ret_from_fork+0x10/0x20
[   73.299601] 
[   73.299844] The buggy address belongs to the object at ffff0000c589d800
[   73.299844]  which belongs to the cache kmalloc-128 of size 128
[   73.300812] The buggy address is located 8 bytes inside of
[   73.300812]  128-byte region [ffff0000c589d800, ffff0000c589d880)
[   73.301705] 
[   73.302292] The buggy address belongs to the physical page:
[   73.302787] page:00000000b8b1210d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10589d
[   73.303569] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   73.304233] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   73.304929] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   73.305549] page dumped because: kasan: bad access detected
[   73.305988] 
[   73.306267] Memory state around the buggy address:
[   73.307255]  ffff0000c589d700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   73.307908]  ffff0000c589d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.308544] >ffff0000c589d800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   73.309123]                       ^
[   73.309505]  ffff0000c589d880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.310158]  ffff0000c589d900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.310919] ==================================================================

[   64.784195] ==================================================================
[   64.784935] BUG: KASAN: use-after-free in kmalloc_uaf+0xdc/0x1e8
[   64.785402] Read of size 1 at addr ffff0000c59aae08 by task kunit_try_catch/141
[   64.785839] 
[   64.786007] CPU: 1 PID: 141 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   64.787950] Hardware name: linux,dummy-virt (DT)
[   64.788700] Call trace:
[   64.789176]  dump_backtrace+0x110/0x120
[   64.790018]  show_stack+0x18/0x28
[   64.790800]  dump_stack_lvl+0x68/0x84
[   64.791517]  print_report+0x158/0x484
[   64.792219]  kasan_report+0x98/0xe0
[   64.792898]  __asan_load1+0x68/0x78
[   64.793606]  kmalloc_uaf+0xdc/0x1e8
[   64.794321]  kunit_try_run_case+0x7c/0x120
[   64.795112]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   64.796033]  kthread+0x1a4/0x1b8
[   64.796705]  ret_from_fork+0x10/0x20
[   64.797391] 
[   64.797827] Allocated by task 141:
[   64.798467]  kasan_save_stack+0x2c/0x58
[   64.799176]  kasan_set_track+0x2c/0x40
[   64.799890]  kasan_save_alloc_info+0x24/0x38
[   64.800724]  __kasan_kmalloc+0xa0/0xb8
[   64.801354]  kmalloc_trace+0x50/0x68
[   64.802079]  kmalloc_uaf+0xa8/0x1e8
[   64.802774]  kunit_try_run_case+0x7c/0x120
[   64.803541]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   64.804491]  kthread+0x1a4/0x1b8
[   64.805169]  ret_from_fork+0x10/0x20
[   64.805814] 
[   64.806108] Freed by task 141:
[   64.806725]  kasan_save_stack+0x2c/0x58
[   64.807456]  kasan_set_track+0x2c/0x40
[   64.807947]  kasan_save_free_info+0x38/0x60
[   64.808314]  __kasan_slab_free+0xe8/0x158
[   64.808636]  __kmem_cache_free+0x138/0x2b0
[   64.809003]  kfree+0x5c/0x70
[   64.809607]  kmalloc_uaf+0xc8/0x1e8
[   64.810224]  kunit_try_run_case+0x7c/0x120
[   64.811065]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   64.811878]  kthread+0x1a4/0x1b8
[   64.812566]  ret_from_fork+0x10/0x20
[   64.813338] 
[   64.813864] The buggy address belongs to the object at ffff0000c59aae00
[   64.813864]  which belongs to the cache kmalloc-128 of size 128
[   64.815068] The buggy address is located 8 bytes inside of
[   64.815068]  128-byte region [ffff0000c59aae00, ffff0000c59aae80)
[   64.815702] 
[   64.815863] The buggy address belongs to the physical page:
[   64.816193] page:000000007750314d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059aa
[   64.817222] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   64.818253] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   64.819500] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   64.820359] page dumped because: kasan: bad access detected
[   64.820997] 
[   64.821247] Memory state around the buggy address:
[   64.822353]  ffff0000c59aad00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   64.823182]  ffff0000c59aad80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.824013] >ffff0000c59aae00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   64.824806]                       ^
[   64.825289]  ffff0000c59aae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.826247]  ffff0000c59aaf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.827174] ==================================================================

[   31.062331] ==================================================================
[   31.063003] BUG: KASAN: use-after-free in kmalloc_uaf+0xcd/0x1c0
[   31.063394] Read of size 1 at addr ffff888101a015a8 by task kunit_try_catch/247
[   31.063863] 
[   31.063992] CPU: 1 PID: 247 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   31.064451] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.064922] Call Trace:
[   31.065140]  <TASK>
[   31.065315]  dump_stack_lvl+0x49/0x62
[   31.065605]  print_report+0x189/0x492
[   31.065792]  ? kasan_complete_mode_report_info+0x7c/0x200
[   31.066301]  ? kmalloc_uaf+0xcd/0x1c0
[   31.066619]  kasan_report+0x10c/0x190
[   31.066890]  ? kmalloc_uaf+0xcd/0x1c0
[   31.067535]  __asan_load1+0x62/0x70
[   31.067782]  kmalloc_uaf+0xcd/0x1c0
[   31.067996]  ? kmalloc_uaf2+0x2b0/0x2b0
[   31.068201]  ? __kunit_add_resource+0xd1/0x100
[   31.068517]  ? kasan_test_init+0x13e/0x1b0
[   31.068782]  kunit_try_run_case+0x8f/0xd0
[   31.069000]  ? kunit_catch_run_case+0x80/0x80
[   31.069328]  ? kunit_try_catch_throw+0x40/0x40
[   31.069585]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   31.069908]  kthread+0x17b/0x1b0
[   31.070096]  ? kthread_complete_and_exit+0x30/0x30
[   31.070321]  ret_from_fork+0x22/0x30
[   31.070612]  </TASK>
[   31.070774] 
[   31.070886] Allocated by task 247:
[   31.071084]  kasan_save_stack+0x41/0x70
[   31.071337]  kasan_set_track+0x25/0x40
[   31.071964]  kasan_save_alloc_info+0x1e/0x30
[   31.072273]  __kasan_kmalloc+0xb6/0xc0
[   31.072517]  kmalloc_trace+0x48/0xb0
[   31.072724]  kmalloc_uaf+0x99/0x1c0
[   31.072956]  kunit_try_run_case+0x8f/0xd0
[   31.073152]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   31.073477]  kthread+0x17b/0x1b0
[   31.073722]  ret_from_fork+0x22/0x30
[   31.073932] 
[   31.074015] Freed by task 247:
[   31.074219]  kasan_save_stack+0x41/0x70
[   31.074483]  kasan_set_track+0x25/0x40
[   31.074701]  kasan_save_free_info+0x2e/0x50
[   31.074959]  ____kasan_slab_free+0x175/0x1d0
[   31.075199]  __kasan_slab_free+0x12/0x20
[   31.075426]  __kmem_cache_free+0x188/0x2f0
[   31.075679]  kfree+0x78/0x120
[   31.075860]  kmalloc_uaf+0xb5/0x1c0
[   31.076054]  kunit_try_run_case+0x8f/0xd0
[   31.076669]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   31.077000]  kthread+0x17b/0x1b0
[   31.077201]  ret_from_fork+0x22/0x30
[   31.077465] 
[   31.077572] The buggy address belongs to the object at ffff888101a015a0
[   31.077572]  which belongs to the cache kmalloc-16 of size 16
[   31.078065] The buggy address is located 8 bytes inside of
[   31.078065]  16-byte region [ffff888101a015a0, ffff888101a015b0)
[   31.078576] 
[   31.078667] The buggy address belongs to the physical page:
[   31.078922] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101a01
[   31.079422] flags: 0x200000000000200(slab|node=0|zone=2)
[   31.080020] raw: 0200000000000200 0000000000000000 dead000000000122 ffff8881000413c0
[   31.080596] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   31.080920] page dumped because: kasan: bad access detected
[   31.081336] 
[   31.081577] Memory state around the buggy address:
[   31.081851]  ffff888101a01480: 00 06 fc fc 00 06 fc fc 00 06 fc fc 00 02 fc fc
[   31.082338]  ffff888101a01500: 00 03 fc fc 00 00 fc fc 00 00 fc fc fa fb fc fc
[   31.082772] >ffff888101a01580: fa fb fc fc fa fb fc fc fc fc fc fc fc fc fc fc
[   31.083094]                                   ^
[   31.083544]  ffff888101a01600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.084012]  ffff888101a01680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.084474] ==================================================================