The kcmp syscall and fuse_lock_owner_id() might allow bypassing Tag-Based KASAN mode in use-after-free exploits. See the "Against UAF access: Probabilistic UAF mitigation; pointer leaks" section of [1] for details. This needs to be investigated. [1] https://googleprojectzero.blogspot.com/2021/10/how-simple-linux-kernel-memory.html