Hay
Date
July 15, 2025, 2:10 p.m.

Environment
qemu-arm64
qemu-x86_64

[  105.925910] ==================================================================
[  105.926966] BUG: KASAN: use-after-free in kmalloc_uaf_memset+0xd4/0x1f0
[  105.927523] Write of size 33 at addr ffff0000c66f6b00 by task kunit_try_catch/228
[  105.928428] 
[  105.928771] CPU: 1 PID: 228 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[  105.929913] Hardware name: linux,dummy-virt (DT)
[  105.930568] Call trace:
[  105.930971]  dump_backtrace+0xe0/0x134
[  105.931582]  show_stack+0x20/0x2c
[  105.932133]  dump_stack_lvl+0x88/0xb4
[  105.932883]  print_report+0x158/0x44c
[  105.933575]  kasan_report+0xc8/0x180
[  105.934229]  kasan_check_range+0xe4/0x190
[  105.934899]  memset+0x40/0x70
[  105.935444]  kmalloc_uaf_memset+0xd4/0x1f0
[  105.936127]  kunit_try_run_case+0x8c/0x124
[  105.936907]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  105.937647]  kthread+0x15c/0x170
[  105.938028]  ret_from_fork+0x10/0x20
[  105.938397] 
[  105.938577] Allocated by task 228:
[  105.938900]  kasan_save_stack+0x3c/0x70
[  105.939447]  kasan_set_track+0x2c/0x40
[  105.939981]  kasan_save_alloc_info+0x24/0x34
[  105.940694]  __kasan_kmalloc+0xd4/0xe0
[  105.941181]  kmalloc_trace+0x8c/0x150
[  105.941617]  kmalloc_uaf_memset+0x9c/0x1f0
[  105.942068]  kunit_try_run_case+0x8c/0x124
[  105.942472]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  105.943109]  kthread+0x15c/0x170
[  105.943551]  ret_from_fork+0x10/0x20
[  105.944032] 
[  105.944251] Freed by task 228:
[  105.944628]  kasan_save_stack+0x3c/0x70
[  105.945176]  kasan_set_track+0x2c/0x40
[  105.945838]  kasan_save_free_info+0x38/0x5c
[  105.946400]  __kasan_slab_free+0x100/0x170
[  105.946801]  slab_free_freelist_hook+0xd8/0x1c0
[  105.947198]  __kmem_cache_free+0x15c/0x2a0
[  105.947579]  kfree+0x88/0x150
[  105.948079]  kmalloc_uaf_memset+0xbc/0x1f0
[  105.948958]  kunit_try_run_case+0x8c/0x124
[  105.949643]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  105.950448]  kthread+0x15c/0x170
[  105.951047]  ret_from_fork+0x10/0x20
[  105.951612] 
[  105.951891] The buggy address belongs to the object at ffff0000c66f6b00
[  105.951891]  which belongs to the cache kmalloc-128 of size 128
[  105.953535] The buggy address is located 0 bytes inside of
[  105.953535]  128-byte region [ffff0000c66f6b00, ffff0000c66f6b80)
[  105.955076] 
[  105.955358] The buggy address belongs to the physical page:
[  105.956040] page:000000008cb3a959 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066f6
[  105.957992] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  105.958917] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  105.959756] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  105.960239] page dumped because: kasan: bad access detected
[  105.961089] 
[  105.961369] Memory state around the buggy address:
[  105.962206]  ffff0000c66f6a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  105.963094]  ffff0000c66f6a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  105.963966] >ffff0000c66f6b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  105.965664]                    ^
[  105.966158]  ffff0000c66f6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  105.966648]  ffff0000c66f6c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  105.967233] ==================================================================

[   75.674540] ==================================================================
[   75.676406] BUG: KASAN: use-after-free in kmalloc_uaf_memset+0xac/0x14c
[   75.677884] Write of size 33 at addr ffff0000c5a46e00 by task kunit_try_catch/144
[   75.679638] 
[   75.680306] CPU: 1 PID: 144 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   75.681665] Hardware name: linux,dummy-virt (DT)
[   75.682038] Call trace:
[   75.682274]  dump_backtrace+0xf8/0x118
[   75.682703]  show_stack+0x18/0x24
[   75.683104]  __dump_stack+0x28/0x38
[   75.683479]  dump_stack_lvl+0x54/0x6c
[   75.684113]  print_address_description+0x7c/0x1ec
[   75.685346]  print_report+0x50/0x68
[   75.686145]  kasan_report+0xac/0x100
[   75.686931]  kasan_check_range+0x260/0x2a0
[   75.687773]  memset+0x40/0x70
[   75.688425]  kmalloc_uaf_memset+0xac/0x14c
[   75.689279]  kunit_try_run_case+0x80/0x184
[   75.690085]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.691038]  kthread+0x16c/0x21c
[   75.691661]  ret_from_fork+0x10/0x20
[   75.692289] 
[   75.693143] Allocated by task 144:
[   75.693684]  kasan_set_track+0x4c/0x80
[   75.694383]  kasan_save_alloc_info+0x28/0x34
[   75.695061]  __kasan_kmalloc+0x88/0xa0
[   75.695703]  kmalloc_trace+0x54/0x68
[   75.696311]  kmalloc_uaf_memset+0x48/0x14c
[   75.697029]  kunit_try_run_case+0x80/0x184
[   75.697817]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.698698]  kthread+0x16c/0x21c
[   75.699356]  ret_from_fork+0x10/0x20
[   75.699944] 
[   75.700218] Freed by task 144:
[   75.700671]  kasan_set_track+0x4c/0x80
[   75.701413]  kasan_save_free_info+0x3c/0x60
[   75.702161]  ____kasan_slab_free+0xe8/0x140
[   75.702844]  __kasan_slab_free+0x18/0x28
[   75.703494]  __kmem_cache_free+0xdc/0x284
[   75.703910]  kfree+0x60/0x74
[   75.704263]  kmalloc_uaf_memset+0x90/0x14c
[   75.704698]  kunit_try_run_case+0x80/0x184
[   75.705362]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.706167]  kthread+0x16c/0x21c
[   75.706734]  ret_from_fork+0x10/0x20
[   75.707309] 
[   75.707577] The buggy address belongs to the object at ffff0000c5a46e00
[   75.707577]  which belongs to the cache kmalloc-128 of size 128
[   75.708417] The buggy address is located 0 bytes inside of
[   75.708417]  128-byte region [ffff0000c5a46e00, ffff0000c5a46e80)
[   75.709942] 
[   75.710382] The buggy address belongs to the physical page:
[   75.711060] page:00000000e850444c refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a46
[   75.712173] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   75.713189] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   75.714291] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   75.714793] page dumped because: kasan: bad access detected
[   75.715163] 
[   75.715340] Memory state around the buggy address:
[   75.715690]  ffff0000c5a46d00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.716580]  ffff0000c5a46d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.717547] >ffff0000c5a46e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   75.718447]                    ^
[   75.718944]  ffff0000c5a46e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.719824]  ffff0000c5a46f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.720700] ==================================================================

[   74.730064] ==================================================================
[   74.730927] BUG: KASAN: use-after-free in kmalloc_uaf_memset+0xac/0x14c
[   74.731565] Write of size 33 at addr ffff0000c5a14100 by task kunit_try_catch/144
[   74.732799] 
[   74.733266] CPU: 0 PID: 144 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   74.733928] Hardware name: linux,dummy-virt (DT)
[   74.734275] Call trace:
[   74.734509]  dump_backtrace+0xf4/0x114
[   74.735167]  show_stack+0x18/0x24
[   74.735631]  __dump_stack+0x28/0x38
[   74.736076]  dump_stack_lvl+0x50/0x68
[   74.736528]  print_address_description+0x7c/0x1ec
[   74.737067]  print_report+0x50/0x68
[   74.737507]  kasan_report+0xac/0xfc
[   74.737963]  kasan_check_range+0x258/0x290
[   74.738437]  memset+0x40/0x70
[   74.738847]  kmalloc_uaf_memset+0xac/0x14c
[   74.739301]  kunit_try_run_case+0x80/0x184
[   74.739771]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   74.740323]  kthread+0x16c/0x21c
[   74.740731]  ret_from_fork+0x10/0x20
[   74.741179] 
[   74.741390] Allocated by task 144:
[   74.741716]  kasan_set_track+0x4c/0x80
[   74.742172]  kasan_save_alloc_info+0x28/0x34
[   74.742607]  __kasan_kmalloc+0x88/0xa0
[   74.743111]  kmalloc_trace+0x54/0x68
[   74.743533]  kmalloc_uaf_memset+0x48/0x14c
[   74.744033]  kunit_try_run_case+0x80/0x184
[   74.744492]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   74.745103]  kthread+0x16c/0x21c
[   74.745551]  ret_from_fork+0x10/0x20
[   74.746009] 
[   74.746196] Freed by task 144:
[   74.746533]  kasan_set_track+0x4c/0x80
[   74.747071]  kasan_save_free_info+0x3c/0x60
[   74.747506]  ____kasan_slab_free+0xe8/0x140
[   74.748041]  __kasan_slab_free+0x18/0x28
[   74.748497]  __kmem_cache_free+0xdc/0x27c
[   74.748983]  kfree+0x60/0x74
[   74.749383]  kmalloc_uaf_memset+0x90/0x14c
[   74.749888]  kunit_try_run_case+0x80/0x184
[   74.750344]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   74.750941]  kthread+0x16c/0x21c
[   74.751355]  ret_from_fork+0x10/0x20
[   74.751801] 
[   74.752000] The buggy address belongs to the object at ffff0000c5a14100
[   74.752000]  which belongs to the cache kmalloc-128 of size 128
[   74.752958] The buggy address is located 0 bytes inside of
[   74.752958]  128-byte region [ffff0000c5a14100, ffff0000c5a14180)
[   74.753843] 
[   74.754066] The buggy address belongs to the physical page:
[   74.754544] page:000000002a39f223 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a14
[   74.755338] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   74.756029] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   74.756721] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   74.757354] page dumped because: kasan: bad access detected
[   74.757832] 
[   74.758025] Memory state around the buggy address:
[   74.758456]  ffff0000c5a14000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   74.759096]  ffff0000c5a14080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.759720] >ffff0000c5a14100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   74.760338]                    ^
[   74.760682]  ffff0000c5a14180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.761339]  ffff0000c5a14200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.761985] ==================================================================

[   73.314952] ==================================================================
[   73.315785] BUG: KASAN: use-after-free in kmalloc_uaf_memset+0xcc/0x1f0
[   73.316428] Write of size 33 at addr ffff0000c589da00 by task kunit_try_catch/144
[   73.316965] 
[   73.317198] CPU: 1 PID: 144 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   73.318116] Hardware name: linux,dummy-virt (DT)
[   73.318572] Call trace:
[   73.318832]  dump_backtrace.part.0+0xdc/0xf0
[   73.319352]  show_stack+0x18/0x30
[   73.319767]  dump_stack_lvl+0x64/0x80
[   73.320186]  print_report+0x158/0x438
[   73.321414]  kasan_report+0xb4/0xf4
[   73.321884]  kasan_check_range+0xe4/0x190
[   73.322434]  memset+0x40/0x70
[   73.322869]  kmalloc_uaf_memset+0xcc/0x1f0
[   73.323619]  kunit_try_run_case+0x84/0x120
[   73.324296]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   73.324961]  kthread+0x180/0x190
[   73.325468]  ret_from_fork+0x10/0x20
[   73.326067] 
[   73.326240] Allocated by task 144:
[   73.326851]  kasan_save_stack+0x3c/0x70
[   73.327412]  kasan_set_track+0x2c/0x40
[   73.327938]  kasan_save_alloc_info+0x24/0x34
[   73.328533]  __kasan_kmalloc+0xb8/0xc0
[   73.329045]  kmalloc_trace+0x58/0x6c
[   73.329573]  kmalloc_uaf_memset+0x94/0x1f0
[   73.330238]  kunit_try_run_case+0x84/0x120
[   73.330811]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   73.331472]  kthread+0x180/0x190
[   73.331867]  ret_from_fork+0x10/0x20
[   73.332291] 
[   73.332493] Freed by task 144:
[   73.332788]  kasan_save_stack+0x3c/0x70
[   73.333232]  kasan_set_track+0x2c/0x40
[   73.333620]  kasan_save_free_info+0x38/0x5c
[   73.334110]  __kasan_slab_free+0xe4/0x150
[   73.334532]  __kmem_cache_free+0x130/0x2a4
[   73.335012]  kfree+0x58/0x80
[   73.335356]  kmalloc_uaf_memset+0xb4/0x1f0
[   73.336117]  kunit_try_run_case+0x84/0x120
[   73.336613]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   73.337178]  kthread+0x180/0x190
[   73.337589]  ret_from_fork+0x10/0x20
[   73.338194] 
[   73.338808] The buggy address belongs to the object at ffff0000c589da00
[   73.338808]  which belongs to the cache kmalloc-128 of size 128
[   73.339773] The buggy address is located 0 bytes inside of
[   73.339773]  128-byte region [ffff0000c589da00, ffff0000c589da80)
[   73.340696] 
[   73.340895] The buggy address belongs to the physical page:
[   73.341374] page:00000000b8b1210d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10589d
[   73.342441] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   73.343272] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   73.343919] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   73.344541] page dumped because: kasan: bad access detected
[   73.345045] 
[   73.345245] Memory state around the buggy address:
[   73.345714]  ffff0000c589d900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   73.346853]  ffff0000c589d980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.347484] >ffff0000c589da00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   73.348051]                    ^
[   73.348371]  ffff0000c589da80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.349028]  ffff0000c589db00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.349611] ==================================================================

[   64.830722] ==================================================================
[   64.831391] BUG: KASAN: use-after-free in kmalloc_uaf_memset+0xe4/0x1e8
[   64.831877] Write of size 33 at addr ffff0000c3c72400 by task kunit_try_catch/142
[   64.832416] 
[   64.832704] CPU: 0 PID: 142 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   64.833764] Hardware name: linux,dummy-virt (DT)
[   64.834415] Call trace:
[   64.834782]  dump_backtrace+0x110/0x120
[   64.835396]  show_stack+0x18/0x28
[   64.835927]  dump_stack_lvl+0x68/0x84
[   64.836484]  print_report+0x158/0x484
[   64.836999]  kasan_report+0x98/0xe0
[   64.837524]  kasan_check_range+0x160/0x1d8
[   64.838250]  memset+0x3c/0x80
[   64.838722]  kmalloc_uaf_memset+0xe4/0x1e8
[   64.839318]  kunit_try_run_case+0x7c/0x120
[   64.839894]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   64.840615]  kthread+0x1a4/0x1b8
[   64.841095]  ret_from_fork+0x10/0x20
[   64.841764] 
[   64.842017] Allocated by task 142:
[   64.842466]  kasan_save_stack+0x2c/0x58
[   64.842989]  kasan_set_track+0x2c/0x40
[   64.843471]  kasan_save_alloc_info+0x24/0x38
[   64.843823]  __kasan_kmalloc+0xa0/0xb8
[   64.844129]  kmalloc_trace+0x50/0x68
[   64.844495]  kmalloc_uaf_memset+0xa8/0x1e8
[   64.844941]  kunit_try_run_case+0x7c/0x120
[   64.845399]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   64.845901]  kthread+0x1a4/0x1b8
[   64.846420]  ret_from_fork+0x10/0x20
[   64.846773] 
[   64.846973] Freed by task 142:
[   64.847265]  kasan_save_stack+0x2c/0x58
[   64.847655]  kasan_set_track+0x2c/0x40
[   64.847984]  kasan_save_free_info+0x38/0x60
[   64.848425]  __kasan_slab_free+0xe8/0x158
[   64.848815]  __kmem_cache_free+0x138/0x2b0
[   64.849267]  kfree+0x5c/0x70
[   64.850093]  kmalloc_uaf_memset+0xc8/0x1e8
[   64.850547]  kunit_try_run_case+0x7c/0x120
[   64.850965]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   64.851455]  kthread+0x1a4/0x1b8
[   64.851804]  ret_from_fork+0x10/0x20
[   64.852182] 
[   64.852366] The buggy address belongs to the object at ffff0000c3c72400
[   64.852366]  which belongs to the cache kmalloc-128 of size 128
[   64.853187] The buggy address is located 0 bytes inside of
[   64.853187]  128-byte region [ffff0000c3c72400, ffff0000c3c72480)
[   64.854216] 
[   64.854472] The buggy address belongs to the physical page:
[   64.854900] page:00000000a9204604 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103c72
[   64.855575] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   64.856184] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   64.856908] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   64.857617] page dumped because: kasan: bad access detected
[   64.858034] 
[   64.858215] Memory state around the buggy address:
[   64.858648]  ffff0000c3c72300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   64.859190]  ffff0000c3c72380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.859738] >ffff0000c3c72400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   64.860217]                    ^
[   64.860529]  ffff0000c3c72480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.861058]  ffff0000c3c72500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.861823] ==================================================================

[   31.087118] ==================================================================
[   31.087792] BUG: KASAN: use-after-free in kmalloc_uaf_memset+0xcf/0x1c0
[   31.088123] Write of size 33 at addr ffff8881030dcd80 by task kunit_try_catch/248
[   31.088606] 
[   31.088763] CPU: 1 PID: 248 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   31.089193] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.089572] Call Trace:
[   31.090098]  <TASK>
[   31.090244]  dump_stack_lvl+0x49/0x62
[   31.090491]  print_report+0x189/0x492
[   31.090738]  ? kasan_complete_mode_report_info+0x7c/0x200
[   31.090985]  ? kmalloc_uaf_memset+0xcf/0x1c0
[   31.091266]  kasan_report+0x10c/0x190
[   31.091501]  ? kmalloc_uaf_memset+0xcf/0x1c0
[   31.091774]  kasan_check_range+0x10b/0x1c0
[   31.091989]  memset+0x23/0x50
[   31.092199]  kmalloc_uaf_memset+0xcf/0x1c0
[   31.092479]  ? kasan_strings+0x4e0/0x4e0
[   31.092719]  ? __kunit_add_resource+0xd1/0x100
[   31.092966]  ? kasan_test_init+0x13e/0x1b0
[   31.093223]  kunit_try_run_case+0x8f/0xd0
[   31.093458]  ? kunit_catch_run_case+0x80/0x80
[   31.093744]  ? kunit_try_catch_throw+0x40/0x40
[   31.093951]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   31.094292]  kthread+0x17b/0x1b0
[   31.094510]  ? kthread_complete_and_exit+0x30/0x30
[   31.094736]  ret_from_fork+0x22/0x30
[   31.094976]  </TASK>
[   31.095121] 
[   31.095256] Allocated by task 248:
[   31.095414]  kasan_save_stack+0x41/0x70
[   31.095653]  kasan_set_track+0x25/0x40
[   31.095891]  kasan_save_alloc_info+0x1e/0x30
[   31.096083]  __kasan_kmalloc+0xb6/0xc0
[   31.096429]  kmalloc_trace+0x48/0xb0
[   31.096651]  kmalloc_uaf_memset+0x99/0x1c0
[   31.096854]  kunit_try_run_case+0x8f/0xd0
[   31.097091]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   31.097344]  kthread+0x17b/0x1b0
[   31.097604]  ret_from_fork+0x22/0x30
[   31.097823] 
[   31.097927] Freed by task 248:
[   31.098076]  kasan_save_stack+0x41/0x70
[   31.098369]  kasan_set_track+0x25/0x40
[   31.098569]  kasan_save_free_info+0x2e/0x50
[   31.098812]  ____kasan_slab_free+0x175/0x1d0
[   31.099032]  __kasan_slab_free+0x12/0x20
[   31.099302]  __kmem_cache_free+0x188/0x2f0
[   31.099519]  kfree+0x78/0x120
[   31.099672]  kmalloc_uaf_memset+0xb1/0x1c0
[   31.099883]  kunit_try_run_case+0x8f/0xd0
[   31.100131]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   31.100431]  kthread+0x17b/0x1b0
[   31.100585]  ret_from_fork+0x22/0x30
[   31.101013] 
[   31.101154] The buggy address belongs to the object at ffff8881030dcd80
[   31.101154]  which belongs to the cache kmalloc-64 of size 64
[   31.102578] The buggy address is located 0 bytes inside of
[   31.102578]  64-byte region [ffff8881030dcd80, ffff8881030dcdc0)
[   31.103477] 
[   31.103598] The buggy address belongs to the physical page:
[   31.103854] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1030dc
[   31.104487] flags: 0x200000000000200(slab|node=0|zone=2)
[   31.104990] raw: 0200000000000200 0000000000000000 dead000000000122 ffff888100041640
[   31.105633] raw: 0000000000000000 0000000080200020 00000001ffffffff 0000000000000000
[   31.106110] page dumped because: kasan: bad access detected
[   31.106606] 
[   31.106739] Memory state around the buggy address:
[   31.107139]  ffff8881030dcc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.107925]  ffff8881030dcd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.108396] >ffff8881030dcd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.108900]                    ^
[   31.109301]  ffff8881030dce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.109766]  ffff8881030dce80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.110083] ==================================================================