Hay
Date
July 9, 2025, 2:07 p.m.

Environment
qemu-arm64
qemu-x86_64

[   17.067630] ==================================================================
[   17.067747] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0
[   17.067819] Read of size 18446744073709551614 at addr fff00000ffe70004 by task kunit_try_catch/180
[   17.067904] 
[   17.067951] CPU: 0 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   17.068046] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.068073] Hardware name: linux,dummy-virt (DT)
[   17.068407] Call trace:
[   17.068642]  show_stack+0x20/0x38 (C)
[   17.068707]  dump_stack_lvl+0x8c/0xd0
[   17.068759]  print_report+0x118/0x608
[   17.069065]  kasan_report+0xdc/0x128
[   17.069243]  kasan_check_range+0x100/0x1a8
[   17.069318]  __asan_memmove+0x3c/0x98
[   17.069373]  kmalloc_memmove_negative_size+0x154/0x2e0
[   17.069463]  kunit_try_run_case+0x170/0x3f0
[   17.069851]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.070033]  kthread+0x328/0x630
[   17.070828]  ret_from_fork+0x10/0x20
[   17.071185] 
[   17.071763] Allocated by task 2846403498:
[   17.072124] ------------[ cut here ]------------
[   17.072380] pool index 44973 out of bounds (211) for stack id adacafae
[   17.076622] WARNING: CPU: 0 PID: 180 at lib/stackdepot.c:451 depot_fetch_stack+0x6c/0x90
[   17.627792] Modules linked in:
[   17.629288] CPU: 0 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   17.629930] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.630584] Hardware name: linux,dummy-virt (DT)
[   17.631569] pstate: 624020c9 (nZCv daIF +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   17.632394] pc : depot_fetch_stack+0x6c/0x90
[   17.632768] lr : depot_fetch_stack+0x6c/0x90
[   17.633628] sp : ffff800080a27a20
[   17.633877] x29: ffff800080a27a20 x28: ffffa8ee9a94f000 x27: 1ffff00010010f60
[   17.634639] x26: 1ffff00010010f5f x25: 0000000000000000 x24: ffffa8ee9375f5c4
[   17.635172] x23: ffffc1ffc3ff9c00 x22: ffffa8ee982b1b28 x21: ffffa8ee982b4e38
[   17.635631] x20: fff00000ffe70004 x19: ffff800080a27b30 x18: 000000005bc8891d
[   17.636111] x17: 0000000000000001 x16: 00000000f1f1f1f1 x15: 0000000000000007
[   17.636594] x14: 0000000000000000 x13: 0000000000000007 x12: ffff700010144ea1
[   17.637068] x11: 1ffff00010144ea0 x10: ffff700010144ea0 x9 : ffffa8ee930ebbbc
[   17.637591] x8 : ffff800080a27507 x7 : 0000000000000001 x6 : ffff700010144ea0
[   17.637939] x5 : ffff800080a27500 x4 : 1ffe000018f06799 x3 : dfff800000000000
[   17.638296] x2 : 0000000000000000 x1 : 0000000000000000 x0 : fff00000c7833cc0
[   17.638783] Call trace:
[   17.638981]  depot_fetch_stack+0x6c/0x90 (P)
[   17.639320]  stack_depot_print+0x24/0x60
[   17.639627]  print_report+0x5e4/0x608
[   17.639888]  kasan_report+0xdc/0x128
[   17.640199]  kasan_check_range+0x100/0x1a8
[   17.640492]  __asan_memmove+0x3c/0x98
[   17.640753]  kmalloc_memmove_negative_size+0x154/0x2e0
[   17.641116]  kunit_try_run_case+0x170/0x3f0
[   17.641431]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.641779]  kthread+0x328/0x630
[   17.642032]  ret_from_fork+0x10/0x20
[   17.642396] ---[ end trace 0000000000000000 ]---
[   17.643005] ------------[ cut here ]------------
[   17.643061] corrupt handle or use after stack_depot_put()
[   17.643168] WARNING: CPU: 0 PID: 180 at lib/stackdepot.c:723 stack_depot_print+0x54/0x60
[   17.644040] Modules linked in:
[   17.644344] CPU: 0 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc5 #1 PREEMPT 
[   17.644864] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   17.645119] Hardware name: linux,dummy-virt (DT)
[   17.645360] pstate: 624020c9 (nZCv daIF +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   17.645688] pc : stack_depot_print+0x54/0x60
[   17.645922] lr : stack_depot_print+0x54/0x60
[   17.646223] sp : ffff800080a27a30
[   17.646410] x29: ffff800080a27a30 x28: ffffa8ee9a94f000 x27: 1ffff00010010f60
[   17.646976] x26: 1ffff00010010f5f x25: 0000000000000000 x24: ffffa8ee9375f5c4
[   17.647490] x23: ffffc1ffc3ff9c00 x22: ffffa8ee982b1b28 x21: ffffa8ee982b4e38
[   17.647967] x20: fff00000ffe70004 x19: ffff800080a27b30 x18: 000000005bc8891d
[   17.648447] x17: 0000000000000001 x16: 00000000f1f1f1f1 x15: 00000000f3f3f3f3
[   17.648907] x14: ffff700010144f26 x13: 1ffe000018f06799 x12: ffff751dd340a659
[   17.649391] x11: 1ffff51dd340a658 x10: ffff751dd340a658 x9 : ffffa8ee930ebbbc
[   17.649847] x8 : ffffa8ee9a0532c3 x7 : 0000000000000001 x6 : ffff751dd340a658
[   17.650318] x5 : ffffa8ee9a0532c0 x4 : 1ffe000018f06799 x3 : dfff800000000000
[   17.650782] x2 : 0000000000000000 x1 : 0000000000000000 x0 : fff00000c7833cc0
[   17.651251] Call trace:
[   17.651432]  stack_depot_print+0x54/0x60 (P)
[   17.651710]  print_report+0x5e4/0x608
[   17.651959]  kasan_report+0xdc/0x128
[   17.652280]  kasan_check_range+0x100/0x1a8
[   17.652550]  __asan_memmove+0x3c/0x98
[   17.652865]  kmalloc_memmove_negative_size+0x154/0x2e0
[   17.653187]  kunit_try_run_case+0x170/0x3f0
[   17.653484]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.653831]  kthread+0x328/0x630
[   17.654069]  ret_from_fork+0x10/0x20
[   17.654351] ---[ end trace 0000000000000000 ]---
[   17.654669] 
[   17.654702] Last potentially related work creation:
[   17.654770] ------------[ cut here ]------------
[   17.654795] pool index 43945 out of bounds (211) for stack id a9a8abaa
[   17.654897] WARNING: CPU: 0 PID: 180 at lib/stackdepot.c:451 depot_fetch_stack+0x6c/0x90
[   17.656195] Modules linked in:
[   17.656470] CPU: 0 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc5 #1 PREEMPT 
[   17.657034] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   17.657350] Hardware name: linux,dummy-virt (DT)
[   17.657640] pstate: 624020c9 (nZCv daIF +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   17.658040] pc : depot_fetch_stack+0x6c/0x90
[   17.658325] lr : depot_fetch_stack+0x6c/0x90
[   17.658607] sp : ffff800080a27a00
[   17.658808] x29: ffff800080a27a00 x28: ffffa8ee9a94f000 x27: 1ffff00010010f60
[   17.659326] x26: 1ffff00010010f5f x25: 0000000000000000 x24: ffffa8ee9375f5c4
[   17.659799] x23: ffffc1ffc3ff9c00 x22: ffffa8ee982b1b28 x21: ffffa8ee982b4e38
[   17.660258] x20: fff00000ffe70004 x19: fff00000ffe70040 x18: 000000005bc8891d
[   17.660706] x17: 0000000000000001 x16: 00000000f1f1f1f1 x15: 0000000000000007
[   17.661163] x14: 0000000000000000 x13: 0000000000000007 x12: ffff751dd340a659
[   17.661605] x11: 1ffff51dd340a658 x10: ffff751dd340a658 x9 : ffffa8ee930ebbbc
[   17.662043] x8 : ffffa8ee9a0532c3 x7 : 0000000000000001 x6 : ffff751dd340a658
[   17.662493] x5 : ffffa8ee9a0532c0 x4 : 1ffe000018f06799 x3 : dfff800000000000
[   17.662930] x2 : 0000000000000000 x1 : 0000000000000000 x0 : fff00000c7833cc0
[   17.663377] Call trace:
[   17.663568]  depot_fetch_stack+0x6c/0x90 (P)
[   17.663837]  stack_depot_print+0x24/0x60
[   17.664040]  kasan_print_aux_stacks+0x50/0x98
[   17.664258]  print_report+0x348/0x608
[   17.664447]  kasan_report+0xdc/0x128
[   17.664750]  kasan_check_range+0x100/0x1a8
[   17.665030]  __asan_memmove+0x3c/0x98
[   17.665336]  kmalloc_memmove_negative_size+0x154/0x2e0
[   17.665640]  kunit_try_run_case+0x170/0x3f0
[   17.665935]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.666309]  kthread+0x328/0x630
[   17.666552]  ret_from_fork+0x10/0x20
[   17.666829] ---[ end trace 0000000000000000 ]---
[   17.667164] ------------[ cut here ]------------
[   17.667195] corrupt handle or use after stack_depot_put()
[   17.667276] WARNING: CPU: 0 PID: 180 at lib/stackdepot.c:723 stack_depot_print+0x54/0x60
[   17.668243] Modules linked in:
[   17.668534] CPU: 0 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc5 #1 PREEMPT 
[   17.669091] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   17.669333] Hardware name: linux,dummy-virt (DT)
[   17.669567] pstate: 624020c9 (nZCv daIF +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   17.669942] pc : stack_depot_print+0x54/0x60
[   17.670256] lr : stack_depot_print+0x54/0x60
[   17.670465] sp : ffff800080a27a10
[   17.670718] x29: ffff800080a27a10 x28: ffffa8ee9a94f000 x27: 1ffff00010010f60
[   17.671179] x26: 1ffff00010010f5f x25: 0000000000000000 x24: ffffa8ee9375f5c4
[   17.671675] x23: ffffc1ffc3ff9c00 x22: ffffa8ee982b1b28 x21: ffffa8ee982b4e38
[   17.672142] x20: fff00000ffe70004 x19: fff00000ffe70040 x18: 000000005bc8891d
[   17.672603] x17: 0000000000000001 x16: 00000000f1f1f1f1 x15: 00000000f3f3f3f3
[   17.673042] x14: ffff700010144f22 x13: 1ffe000018f06799 x12: ffff751dd340a659
[   17.673487] x11: 1ffff51dd340a658 x10: ffff751dd340a658 x9 : ffffa8ee930ebbbc
[   17.673919] x8 : ffffa8ee9a0532c3 x7 : 0000000000000001 x6 : ffff751dd340a658
[   17.674386] x5 : ffffa8ee9a0532c0 x4 : 1ffe000018f06799 x3 : dfff800000000000
[   17.674822] x2 : 0000000000000000 x1 : 0000000000000000 x0 : fff00000c7833cc0
[   17.675260] Call trace:
[   17.675450]  stack_depot_print+0x54/0x60 (P)
[   17.675723]  kasan_print_aux_stacks+0x50/0x98
[   17.676080]  print_report+0x348/0x608
[   17.676341]  kasan_report+0xdc/0x128
[   17.676576]  kasan_check_range+0x100/0x1a8
[   17.676902]  __asan_memmove+0x3c/0x98
[   17.677185]  kmalloc_memmove_negative_size+0x154/0x2e0
[   17.677549]  kunit_try_run_case+0x170/0x3f0
[   17.677834]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.678224]  kthread+0x328/0x630
[   17.678458]  ret_from_fork+0x10/0x20
[   17.678708] ---[ end trace 0000000000000000 ]---
[   17.679019] 
[   17.679100] Second to last potentially related work creation:
[   17.679138] ------------[ cut here ]------------
[   17.679164] pool index 44973 out of bounds (211) for stack id adacafae
[   17.679265] WARNING: CPU: 0 PID: 180 at lib/stackdepot.c:451 depot_fetch_stack+0x6c/0x90
[   17.680423] Modules linked in:
[   17.681453] CPU: 0 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc5 #1 PREEMPT 
[   17.682891] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   17.683131] Hardware name: linux,dummy-virt (DT)
[   17.683335] pstate: 624020c9 (nZCv daIF +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   17.684817] pc : depot_fetch_stack+0x6c/0x90
[   17.685502] lr : depot_fetch_stack+0x6c/0x90
[   17.685727] sp : ffff800080a27a00
[   17.685884] x29: ffff800080a27a00 x28: ffffa8ee9a94f000 x27: 1ffff00010010f60
[   17.686282] x26: 1ffff00010010f5f x25: 0000000000000000 x24: ffffa8ee9375f5c4
[   17.686633] x23: ffffc1ffc3ff9c00 x22: ffffa8ee982b1b28 x21: ffffa8ee982b4e38
[   17.686980] x20: fff00000ffe70004 x19: fff00000ffe70040 x18: 000000005bc8891d
[   17.689666] x17: 0000000000000001 x16: 00000000f1f1f1f1 x15: 0000000000000007
[   17.690839] x14: 0000000000000000 x13: 0000000000000007 x12: ffff751dd340a659
[   17.692121] x11: 1ffff51dd340a658 x10: ffff751dd340a658 x9 : ffffa8ee930ebbbc
[   17.693268] x8 : ffffa8ee9a0532c3 x7 : 0000000000000001 x6 : ffff751dd340a658
[   17.694525] x5 : ffffa8ee9a0532c0 x4 : 1ffe000018f06799 x3 : dfff800000000000
[   17.695665] x2 : 0000000000000000 x1 : 0000000000000000 x0 : fff00000c7833cc0
[   17.696036] Call trace:
[   17.696185]  depot_fetch_stack+0x6c/0x90 (P)
[   17.696751]  stack_depot_print+0x24/0x60
[   17.697157]  kasan_print_aux_stacks+0x78/0x98
[   17.697581]  print_report+0x348/0x608
[   17.697835]  kasan_report+0xdc/0x128
[   17.698347]  kasan_check_range+0x100/0x1a8
[   17.698807]  __asan_memmove+0x3c/0x98
[   17.699195]  kmalloc_memmove_negative_size+0x154/0x2e0
[   17.699529]  kunit_try_run_case+0x170/0x3f0
[   17.699777]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.700137]  kthread+0x328/0x630
[   17.700416]  ret_from_fork+0x10/0x20
[   17.700621] ---[ end trace 0000000000000000 ]---
[   17.700954] ------------[ cut here ]------------
[   17.700985] corrupt handle or use after stack_depot_put()
[   17.701117] WARNING: CPU: 0 PID: 180 at lib/stackdepot.c:723 stack_depot_print+0x54/0x60
[   17.701905] Modules linked in:
[   17.702106] CPU: 0 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc5 #1 PREEMPT 
[   17.702501] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   17.702769] Hardware name: linux,dummy-virt (DT)
[   17.703104] pstate: 624020c9 (nZCv daIF +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   17.703457] pc : stack_depot_print+0x54/0x60
[   17.703715] lr : stack_depot_print+0x54/0x60
[   17.704033] sp : ffff800080a27a10
[   17.704301] x29: ffff800080a27a10 x28: ffffa8ee9a94f000 x27: 1ffff00010010f60
[   17.704703] x26: 1ffff00010010f5f x25: 0000000000000000 x24: ffffa8ee9375f5c4
[   17.705214] x23: ffffc1ffc3ff9c00 x22: ffffa8ee982b1b28 x21: ffffa8ee982b4e38
[   17.705633] x20: fff00000ffe70004 x19: fff00000ffe70040 x18: 000000005bc8891d
[   17.706048] x17: 0000000000000001 x16: 00000000f1f1f1f1 x15: 00000000f3f3f3f3
[   17.706469] x14: ffff700010144f22 x13: 1ffe000018f06799 x12: ffff751dd340a659
[   17.706879] x11: 1ffff51dd340a658 x10: ffff751dd340a658 x9 : ffffa8ee930ebbbc
[   17.707310] x8 : ffffa8ee9a0532c3 x7 : 0000000000000001 x6 : ffff751dd340a658
[   17.707728] x5 : ffffa8ee9a0532c0 x4 : 1ffe000018f06799 x3 : dfff800000000000
[   17.708161] x2 : 0000000000000000 x1 : 0000000000000000 x0 : fff00000c7833cc0
[   17.708656] Call trace:
[   17.708826]  stack_depot_print+0x54/0x60 (P)
[   17.709161]  kasan_print_aux_stacks+0x78/0x98
[   17.709494]  print_report+0x348/0x608
[   17.709698]  kasan_report+0xdc/0x128
[   17.709938]  kasan_check_range+0x100/0x1a8
[   17.710193]  __asan_memmove+0x3c/0x98
[   17.710383]  kmalloc_memmove_negative_size+0x154/0x2e0
[   17.710651]  kunit_try_run_case+0x170/0x3f0
[   17.710903]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.711221]  kthread+0x328/0x630
[   17.711450]  ret_from_fork+0x10/0x20
[   17.711672] ---[ end trace 0000000000000000 ]---
[   17.711935] 
[   17.711980] The buggy address belongs to the object at fff00000ffe70000
[   17.711980]  which belongs to the cache kmalloc-64 of size 64
[   17.712054] The buggy address is located 4 bytes inside of
[   17.712054]  64-byte region [fff00000ffe70000, fff00000ffe70040)
[   17.712129] 
[   17.712151] The buggy address belongs to the physical page:
[   17.712186] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x13fe70
[   17.712249] memcg:fff00000d9d40db9
[   17.712282] flags: 0xbfffe0000002000(reserved|node=0|zone=2|lastcpupid=0x1ffff)
[   17.712343] page_type: f5(slab)
[   17.712420] raw: 0bfffe0000002000 fff00000c00018c0 ffffc1ffc3ff9c08 0000000000000000
[   17.712487] raw: 0000000000000000 0000000000010000 00000001f5000000 fff00000d9d40db9
[   17.712549] page dumped because: kasan: bad access detected
[   17.712582] 
[   17.712602] Memory state around the buggy address:
[   17.712647]  fff00000ffe6ff00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.712692]  fff00000ffe6ff80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.712736] >fff00000ffe70000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.712777]                    ^
[   17.712805]  fff00000ffe70080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.712849]  fff00000ffe70100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.712890] ==================================================================

[   12.960621] ==================================================================
[   12.961959] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x171/0x330
[   12.962225] Read of size 18446744073709551614 at addr ffff8881029b5704 by task kunit_try_catch/197
[   12.962531] 
[   12.962645] CPU: 0 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.962695] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.962706] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.962729] Call Trace:
[   12.962742]  <TASK>
[   12.963440]  dump_stack_lvl+0x73/0xb0
[   12.963486]  print_report+0xd1/0x650
[   12.963518]  ? __virt_addr_valid+0x1db/0x2d0
[   12.963543]  ? kmalloc_memmove_negative_size+0x171/0x330
[   12.963568]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.963590]  ? kmalloc_memmove_negative_size+0x171/0x330
[   12.963647]  kasan_report+0x141/0x180
[   12.963669]  ? kmalloc_memmove_negative_size+0x171/0x330
[   12.963698]  kasan_check_range+0x10c/0x1c0
[   12.963721]  __asan_memmove+0x27/0x70
[   12.963740]  kmalloc_memmove_negative_size+0x171/0x330
[   12.963766]  ? __pfx_kmalloc_memmove_negative_size+0x10/0x10
[   12.963794]  ? __schedule+0x10cc/0x2b60
[   12.963860]  ? __pfx_read_tsc+0x10/0x10
[   12.963881]  ? ktime_get_ts64+0x86/0x230
[   12.963906]  kunit_try_run_case+0x1a5/0x480
[   12.963931]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.963954]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.963978]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.964001]  ? __kthread_parkme+0x82/0x180
[   12.964022]  ? preempt_count_sub+0x50/0x80
[   12.964046]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.964070]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.964093]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.964118]  kthread+0x337/0x6f0
[   12.964137]  ? trace_preempt_on+0x20/0xc0
[   12.964160]  ? __pfx_kthread+0x10/0x10
[   12.964180]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.964201]  ? calculate_sigpending+0x7b/0xa0
[   12.964225]  ? __pfx_kthread+0x10/0x10
[   12.964245]  ret_from_fork+0x116/0x1d0
[   12.964263]  ? __pfx_kthread+0x10/0x10
[   12.964283]  ret_from_fork_asm+0x1a/0x30
[   12.964315]  </TASK>
[   12.964326] 
[   12.972449] Allocated by task 197:
[   12.972670]  kasan_save_stack+0x45/0x70
[   12.972876]  kasan_save_track+0x18/0x40
[   12.973067]  kasan_save_alloc_info+0x3b/0x50
[   12.973521]  __kasan_kmalloc+0xb7/0xc0
[   12.973749]  __kmalloc_cache_noprof+0x189/0x420
[   12.974202]  kmalloc_memmove_negative_size+0xac/0x330
[   12.974440]  kunit_try_run_case+0x1a5/0x480
[   12.974642]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.975493]  kthread+0x337/0x6f0
[   12.975707]  ret_from_fork+0x116/0x1d0
[   12.975942]  ret_from_fork_asm+0x1a/0x30
[   12.976130] 
[   12.976221] The buggy address belongs to the object at ffff8881029b5700
[   12.976221]  which belongs to the cache kmalloc-64 of size 64
[   12.976720] The buggy address is located 4 bytes inside of
[   12.976720]  64-byte region [ffff8881029b5700, ffff8881029b5740)
[   12.977986] 
[   12.978244] The buggy address belongs to the physical page:
[   12.978722] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b5
[   12.979314] flags: 0x200000000000000(node=0|zone=2)
[   12.979689] page_type: f5(slab)
[   12.980102] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   12.980740] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   12.981233] page dumped because: kasan: bad access detected
[   12.981458] 
[   12.981549] Memory state around the buggy address:
[   12.981766]  ffff8881029b5600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   12.982567]  ffff8881029b5680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   12.983229] >ffff8881029b5700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   12.983916]                    ^
[   12.984157]  ffff8881029b5780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.984456]  ffff8881029b5800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.984753] ==================================================================