Hay
Date
July 15, 2025, 2:10 p.m.

Environment
qemu-arm64
qemu-x86_64

[  105.586206] ==================================================================
[  105.586997] BUG: KASAN: use-after-free in kmalloc_uaf_16+0x104/0x2a0
[  105.587606] Read of size 16 at addr ffff0000c67f5900 by task kunit_try_catch/219
[  105.588107] 
[  105.588308] CPU: 1 PID: 219 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[  105.588889] Hardware name: linux,dummy-virt (DT)
[  105.589363] Call trace:
[  105.590095]  dump_backtrace+0xe0/0x134
[  105.590655]  show_stack+0x20/0x2c
[  105.591087]  dump_stack_lvl+0x88/0xb4
[  105.591572]  print_report+0x158/0x44c
[  105.592000]  kasan_report+0xc8/0x180
[  105.592568]  __asan_load16+0x68/0x9c
[  105.593205]  kmalloc_uaf_16+0x104/0x2a0
[  105.593707]  kunit_try_run_case+0x8c/0x124
[  105.594218]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  105.594826]  kthread+0x15c/0x170
[  105.595256]  ret_from_fork+0x10/0x20
[  105.595739] 
[  105.595998] Allocated by task 219:
[  105.596384]  kasan_save_stack+0x3c/0x70
[  105.597039]  kasan_set_track+0x2c/0x40
[  105.597537]  kasan_save_alloc_info+0x24/0x34
[  105.598050]  __kasan_kmalloc+0xd4/0xe0
[  105.598552]  kmalloc_trace+0x8c/0x150
[  105.598998]  kmalloc_uaf_16+0xcc/0x2a0
[  105.599470]  kunit_try_run_case+0x8c/0x124
[  105.599961]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  105.600699]  kthread+0x15c/0x170
[  105.601110]  ret_from_fork+0x10/0x20
[  105.601672] 
[  105.601920] Freed by task 219:
[  105.602267]  kasan_save_stack+0x3c/0x70
[  105.602775]  kasan_set_track+0x2c/0x40
[  105.603245]  kasan_save_free_info+0x38/0x5c
[  105.603776]  __kasan_slab_free+0x100/0x170
[  105.604279]  slab_free_freelist_hook+0xd8/0x1c0
[  105.605127]  __kmem_cache_free+0x15c/0x2a0
[  105.605580]  kfree+0x88/0x150
[  105.606014]  kmalloc_uaf_16+0xec/0x2a0
[  105.606484]  kunit_try_run_case+0x8c/0x124
[  105.607034]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  105.607605]  kthread+0x15c/0x170
[  105.608061]  ret_from_fork+0x10/0x20
[  105.608765] 
[  105.609011] The buggy address belongs to the object at ffff0000c67f5900
[  105.609011]  which belongs to the cache kmalloc-128 of size 128
[  105.609994] The buggy address is located 0 bytes inside of
[  105.609994]  128-byte region [ffff0000c67f5900, ffff0000c67f5980)
[  105.610930] 
[  105.611175] The buggy address belongs to the physical page:
[  105.611650] page:00000000678f5464 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1067f5
[  105.612415] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  105.613130] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  105.614030] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  105.614520] page dumped because: kasan: bad access detected
[  105.614908] 
[  105.615132] Memory state around the buggy address:
[  105.615564]  ffff0000c67f5800: 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  105.616186]  ffff0000c67f5880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  105.617067] >ffff0000c67f5900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  105.617672]                    ^
[  105.618014]  ffff0000c67f5980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  105.618649]  ffff0000c67f5a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  105.619316] ==================================================================

[   75.343257] ==================================================================
[   75.343987] BUG: KASAN: use-after-free in kmalloc_uaf_16+0x104/0x1ac
[   75.344530] Read of size 16 at addr ffff0000c5a76100 by task kunit_try_catch/135
[   75.345885] 
[   75.346136] CPU: 0 PID: 135 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   75.346988] Hardware name: linux,dummy-virt (DT)
[   75.347439] Call trace:
[   75.347697]  dump_backtrace+0xf8/0x118
[   75.348213]  show_stack+0x18/0x24
[   75.348795]  __dump_stack+0x28/0x38
[   75.349256]  dump_stack_lvl+0x54/0x6c
[   75.349712]  print_address_description+0x7c/0x1ec
[   75.350251]  print_report+0x50/0x68
[   75.350777]  kasan_report+0xac/0x100
[   75.351296]  kasan_check_range+0x260/0x2a0
[   75.351786]  memcpy+0x48/0x90
[   75.352151]  kmalloc_uaf_16+0x104/0x1ac
[   75.352629]  kunit_try_run_case+0x80/0x184
[   75.353156]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.353778]  kthread+0x16c/0x21c
[   75.354223]  ret_from_fork+0x10/0x20
[   75.354665] 
[   75.354886] Allocated by task 135:
[   75.355220]  kasan_set_track+0x4c/0x80
[   75.355699]  kasan_save_alloc_info+0x28/0x34
[   75.356188]  __kasan_kmalloc+0x88/0xa0
[   75.356886]  kmalloc_trace+0x54/0x68
[   75.357327]  kmalloc_uaf_16+0xa0/0x1ac
[   75.357786]  kunit_try_run_case+0x80/0x184
[   75.358251]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.359125]  kthread+0x16c/0x21c
[   75.359569]  ret_from_fork+0x10/0x20
[   75.360035] 
[   75.360231] Freed by task 135:
[   75.360581]  kasan_set_track+0x4c/0x80
[   75.361297]  kasan_save_free_info+0x3c/0x60
[   75.361781]  ____kasan_slab_free+0xe8/0x140
[   75.362268]  __kasan_slab_free+0x18/0x28
[   75.362723]  __kmem_cache_free+0xdc/0x284
[   75.363194]  kfree+0x60/0x74
[   75.363552]  kmalloc_uaf_16+0xe8/0x1ac
[   75.364012]  kunit_try_run_case+0x80/0x184
[   75.364486]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.365552]  kthread+0x16c/0x21c
[   75.365975]  ret_from_fork+0x10/0x20
[   75.366405] 
[   75.366618] The buggy address belongs to the object at ffff0000c5a76100
[   75.366618]  which belongs to the cache kmalloc-128 of size 128
[   75.367525] The buggy address is located 0 bytes inside of
[   75.367525]  128-byte region [ffff0000c5a76100, ffff0000c5a76180)
[   75.368472] 
[   75.368916] The buggy address belongs to the physical page:
[   75.369418] page:00000000e5b61371 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a76
[   75.370187] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   75.370984] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   75.371645] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   75.372248] page dumped because: kasan: bad access detected
[   75.372713] 
[   75.373102] Memory state around the buggy address:
[   75.373554]  ffff0000c5a76000: 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.374176]  ffff0000c5a76080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.375135] >ffff0000c5a76100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   75.375703]                    ^
[   75.376066]  ffff0000c5a76180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.376950]  ffff0000c5a76200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.377530] ==================================================================

[   74.360677] ==================================================================
[   74.361479] BUG: KASAN: use-after-free in kmalloc_uaf_16+0x104/0x1ac
[   74.362050] Read of size 16 at addr ffff0000c5919800 by task kunit_try_catch/135
[   74.363382] 
[   74.363897] CPU: 1 PID: 135 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   74.364662] Hardware name: linux,dummy-virt (DT)
[   74.365026] Call trace:
[   74.365260]  dump_backtrace+0xf4/0x114
[   74.365697]  show_stack+0x18/0x24
[   74.366686]  __dump_stack+0x28/0x38
[   74.367440]  dump_stack_lvl+0x50/0x68
[   74.368260]  print_address_description+0x7c/0x1ec
[   74.369129]  print_report+0x50/0x68
[   74.369908]  kasan_report+0xac/0xfc
[   74.370628]  kasan_check_range+0x258/0x290
[   74.371426]  memcpy+0x48/0x90
[   74.372109]  kmalloc_uaf_16+0x104/0x1ac
[   74.372841]  kunit_try_run_case+0x80/0x184
[   74.373614]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   74.374530]  kthread+0x16c/0x21c
[   74.375224]  ret_from_fork+0x10/0x20
[   74.375901] 
[   74.376247] Allocated by task 135:
[   74.376786]  kasan_set_track+0x4c/0x80
[   74.377467]  kasan_save_alloc_info+0x28/0x34
[   74.378166]  __kasan_kmalloc+0x88/0xa0
[   74.378853]  kmalloc_trace+0x54/0x68
[   74.379483]  kmalloc_uaf_16+0xa0/0x1ac
[   74.380198]  kunit_try_run_case+0x80/0x184
[   74.380866]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   74.381378]  kthread+0x16c/0x21c
[   74.381769]  ret_from_fork+0x10/0x20
[   74.382467] 
[   74.382818] Freed by task 135:
[   74.383139]  kasan_set_track+0x4c/0x80
[   74.383934]  kasan_save_free_info+0x3c/0x60
[   74.384449]  ____kasan_slab_free+0xe8/0x140
[   74.384915]  __kasan_slab_free+0x18/0x28
[   74.385456]  __kmem_cache_free+0xdc/0x27c
[   74.386003]  kfree+0x60/0x74
[   74.386440]  kmalloc_uaf_16+0xe8/0x1ac
[   74.386947]  kunit_try_run_case+0x80/0x184
[   74.387410]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   74.388187]  kthread+0x16c/0x21c
[   74.388599]  ret_from_fork+0x10/0x20
[   74.389079] 
[   74.389278] The buggy address belongs to the object at ffff0000c5919800
[   74.389278]  which belongs to the cache kmalloc-128 of size 128
[   74.390244] The buggy address is located 0 bytes inside of
[   74.390244]  128-byte region [ffff0000c5919800, ffff0000c5919880)
[   74.391077] 
[   74.391264] The buggy address belongs to the physical page:
[   74.391634] page:0000000087a007df refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105919
[   74.393204] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   74.394455] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   74.395718] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   74.397018] page dumped because: kasan: bad access detected
[   74.397941] 
[   74.398359] Memory state around the buggy address:
[   74.399229]  ffff0000c5919700: 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.400530]  ffff0000c5919780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.401208] >ffff0000c5919800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   74.401684]                    ^
[   74.401998]  ffff0000c5919880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.402491]  ffff0000c5919900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.403474] ==================================================================

[   72.967443] ==================================================================
[   72.968303] BUG: KASAN: use-after-free in kmalloc_uaf_16+0xfc/0x290
[   72.968955] Read of size 16 at addr ffff0000c5952f00 by task kunit_try_catch/135
[   72.969478] 
[   72.969663] CPU: 0 PID: 135 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   72.970979] Hardware name: linux,dummy-virt (DT)
[   72.971604] Call trace:
[   72.971981]  dump_backtrace.part.0+0xdc/0xf0
[   72.972673]  show_stack+0x18/0x30
[   72.973235]  dump_stack_lvl+0x64/0x80
[   72.973866]  print_report+0x158/0x438
[   72.974521]  kasan_report+0xb4/0xf4
[   72.975055]  __asan_load16+0x68/0x9c
[   72.975406]  kmalloc_uaf_16+0xfc/0x290
[   72.975779]  kunit_try_run_case+0x84/0x120
[   72.976157]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   72.976891]  kthread+0x180/0x190
[   72.977413]  ret_from_fork+0x10/0x20
[   72.978193] 
[   72.978484] Allocated by task 135:
[   72.979020]  kasan_save_stack+0x3c/0x70
[   72.979623]  kasan_set_track+0x2c/0x40
[   72.980190]  kasan_save_alloc_info+0x24/0x34
[   72.980839]  __kasan_kmalloc+0xb8/0xc0
[   72.981406]  kmalloc_trace+0x58/0x6c
[   72.982058]  kmalloc_uaf_16+0xc4/0x290
[   72.982739]  kunit_try_run_case+0x84/0x120
[   72.983362]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   72.984143]  kthread+0x180/0x190
[   72.984662]  ret_from_fork+0x10/0x20
[   72.985223] 
[   72.985512] Freed by task 135:
[   72.986045]  kasan_save_stack+0x3c/0x70
[   72.986809]  kasan_set_track+0x2c/0x40
[   72.987389]  kasan_save_free_info+0x38/0x5c
[   72.988039]  __kasan_slab_free+0xe4/0x150
[   72.988662]  __kmem_cache_free+0x130/0x2a4
[   72.989208]  kfree+0x58/0x80
[   72.989537]  kmalloc_uaf_16+0xe4/0x290
[   72.990176]  kunit_try_run_case+0x84/0x120
[   72.990907]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   72.991696]  kthread+0x180/0x190
[   72.992301]  ret_from_fork+0x10/0x20
[   72.992951] 
[   72.993217] The buggy address belongs to the object at ffff0000c5952f00
[   72.993217]  which belongs to the cache kmalloc-128 of size 128
[   72.994838] The buggy address is located 0 bytes inside of
[   72.994838]  128-byte region [ffff0000c5952f00, ffff0000c5952f80)
[   72.996791] 
[   72.996989] The buggy address belongs to the physical page:
[   72.997525] page:000000000a751a16 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105952
[   72.998747] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   72.999285] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   72.999802] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   73.000253] page dumped because: kasan: bad access detected
[   73.001220] 
[   73.001571] Memory state around the buggy address:
[   73.002479]  ffff0000c5952e00: 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.003361]  ffff0000c5952e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.004262] >ffff0000c5952f00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   73.005241]                    ^
[   73.006015]  ffff0000c5952f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.007045]  ffff0000c5953000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   73.007909] ==================================================================

[   64.557018] ==================================================================
[   64.557814] BUG: KASAN: use-after-free in kmalloc_uaf_16+0x110/0x278
[   64.558380] Read of size 16 at addr ffff0000c58b8500 by task kunit_try_catch/133
[   64.558918] 
[   64.559121] CPU: 0 PID: 133 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   64.559799] Hardware name: linux,dummy-virt (DT)
[   64.560154] Call trace:
[   64.560410]  dump_backtrace+0x110/0x120
[   64.560841]  show_stack+0x18/0x28
[   64.561242]  dump_stack_lvl+0x68/0x84
[   64.561749]  print_report+0x158/0x484
[   64.562105]  kasan_report+0x98/0xe0
[   64.562527]  __asan_load16+0x7c/0xa8
[   64.562968]  kmalloc_uaf_16+0x110/0x278
[   64.563595]  kunit_try_run_case+0x7c/0x120
[   64.564134]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   64.564733]  kthread+0x1a4/0x1b8
[   64.565179]  ret_from_fork+0x10/0x20
[   64.565648] 
[   64.565902] Allocated by task 133:
[   64.566207]  kasan_save_stack+0x2c/0x58
[   64.566552]  kasan_set_track+0x2c/0x40
[   64.566967]  kasan_save_alloc_info+0x24/0x38
[   64.567378]  __kasan_kmalloc+0xa0/0xb8
[   64.567712]  kmalloc_trace+0x50/0x68
[   64.568087]  kmalloc_uaf_16+0xd4/0x278
[   64.568509]  kunit_try_run_case+0x7c/0x120
[   64.568916]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   64.569425]  kthread+0x1a4/0x1b8
[   64.569756]  ret_from_fork+0x10/0x20
[   64.570118] 
[   64.570318] Freed by task 133:
[   64.570567]  kasan_save_stack+0x2c/0x58
[   64.570956]  kasan_set_track+0x2c/0x40
[   64.571315]  kasan_save_free_info+0x38/0x60
[   64.571718]  __kasan_slab_free+0xe8/0x158
[   64.572119]  __kmem_cache_free+0x138/0x2b0
[   64.572566]  kfree+0x5c/0x70
[   64.572906]  kmalloc_uaf_16+0xf4/0x278
[   64.573303]  kunit_try_run_case+0x7c/0x120
[   64.573727]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   64.574219]  kthread+0x1a4/0x1b8
[   64.574565]  ret_from_fork+0x10/0x20
[   64.574921] 
[   64.575121] The buggy address belongs to the object at ffff0000c58b8500
[   64.575121]  which belongs to the cache kmalloc-128 of size 128
[   64.575953] The buggy address is located 0 bytes inside of
[   64.575953]  128-byte region [ffff0000c58b8500, ffff0000c58b8580)
[   64.576734] 
[   64.576900] The buggy address belongs to the physical page:
[   64.577307] page:0000000079d9b0ef refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058b8
[   64.578035] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   64.578645] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   64.579238] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   64.579796] page dumped because: kasan: bad access detected
[   64.580204] 
[   64.580398] Memory state around the buggy address:
[   64.580788]  ffff0000c58b8400: 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.581344]  ffff0000c58b8480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.581874] >ffff0000c58b8500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   64.582439]                    ^
[   64.582729]  ffff0000c58b8580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.583311]  ffff0000c58b8600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.583813] ==================================================================

[   30.844709] ==================================================================
[   30.845240] BUG: KASAN: use-after-free in kmalloc_uaf_16+0x104/0x250
[   30.846036] Read of size 16 at addr ffff888102f54b40 by task kunit_try_catch/239
[   30.846786] 
[   30.847027] CPU: 0 PID: 239 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   30.847980] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.848922] Call Trace:
[   30.849214]  <TASK>
[   30.849511]  dump_stack_lvl+0x49/0x62
[   30.849919]  print_report+0x189/0x492
[   30.850116]  ? kasan_complete_mode_report_info+0x7c/0x200
[   30.850594]  ? kmalloc_uaf_16+0x104/0x250
[   30.851177]  kasan_report+0x10c/0x190
[   30.851681]  ? kmalloc_uaf_16+0x104/0x250
[   30.852134]  __asan_load16+0x65/0x90
[   30.852757]  kmalloc_uaf_16+0x104/0x250
[   30.853186]  ? kmalloc_uaf+0x1c0/0x1c0
[   30.853789]  ? __kunit_add_resource+0xd1/0x100
[   30.854018]  ? kasan_test_init+0x13e/0x1b0
[   30.854230]  kunit_try_run_case+0x8f/0xd0
[   30.854638]  ? kunit_catch_run_case+0x80/0x80
[   30.855088]  ? kunit_try_catch_throw+0x40/0x40
[   30.855631]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   30.856308]  kthread+0x17b/0x1b0
[   30.856749]  ? kthread_complete_and_exit+0x30/0x30
[   30.857242]  ret_from_fork+0x22/0x30
[   30.857670]  </TASK>
[   30.858140] 
[   30.858338] Allocated by task 239:
[   30.858615]  kasan_save_stack+0x41/0x70
[   30.858812]  kasan_set_track+0x25/0x40
[   30.858993]  kasan_save_alloc_info+0x1e/0x30
[   30.859191]  __kasan_kmalloc+0xb6/0xc0
[   30.859480]  kmalloc_trace+0x48/0xb0
[   30.859864]  kmalloc_uaf_16+0xc5/0x250
[   30.860039]  kunit_try_run_case+0x8f/0xd0
[   30.860234]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   30.860724]  kthread+0x17b/0x1b0
[   30.861065]  ret_from_fork+0x22/0x30
[   30.861666] 
[   30.861856] Freed by task 239:
[   30.862204]  kasan_save_stack+0x41/0x70
[   30.862717]  kasan_set_track+0x25/0x40
[   30.863100]  kasan_save_free_info+0x2e/0x50
[   30.863568]  ____kasan_slab_free+0x175/0x1d0
[   30.864077]  __kasan_slab_free+0x12/0x20
[   30.864306]  __kmem_cache_free+0x188/0x2f0
[   30.864851]  kfree+0x78/0x120
[   30.865226]  kmalloc_uaf_16+0xe5/0x250
[   30.865905]  kunit_try_run_case+0x8f/0xd0
[   30.866202]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   30.866922]  kthread+0x17b/0x1b0
[   30.867215]  ret_from_fork+0x22/0x30
[   30.867517] 
[   30.867730] The buggy address belongs to the object at ffff888102f54b40
[   30.867730]  which belongs to the cache kmalloc-16 of size 16
[   30.868848] The buggy address is located 0 bytes inside of
[   30.868848]  16-byte region [ffff888102f54b40, ffff888102f54b50)
[   30.869256] 
[   30.869347] The buggy address belongs to the physical page:
[   30.869596] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102f54
[   30.870017] flags: 0x200000000000200(slab|node=0|zone=2)
[   30.870615] raw: 0200000000000200 0000000000000000 dead000000000122 ffff8881000413c0
[   30.871031] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   30.871486] page dumped because: kasan: bad access detected
[   30.871764] 
[   30.871880] Memory state around the buggy address:
[   30.872139]  ffff888102f54a00: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   30.872629]  ffff888102f54a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   30.873012] >ffff888102f54b00: fa fb fc fc 00 00 fc fc fa fb fc fc fc fc fc fc
[   30.873481]                                            ^
[   30.873765]  ffff888102f54b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.874106]  ffff888102f54c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.874467] ==================================================================