Date
July 18, 2025, 2:09 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 17.092438] ================================================================== [ 17.092714] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0 [ 17.093109] Read of size 18446744073709551614 at addr fff00000c7894a04 by task kunit_try_catch/180 [ 17.093500] [ 17.093716] CPU: 1 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 17.094414] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.094607] Hardware name: linux,dummy-virt (DT) [ 17.094803] Call trace: [ 17.094831] show_stack+0x20/0x38 (C) [ 17.094902] dump_stack_lvl+0x8c/0xd0 [ 17.094953] print_report+0x118/0x5d0 [ 17.095202] kasan_report+0xdc/0x128 [ 17.095281] kasan_check_range+0x100/0x1a8 [ 17.095860] __asan_memmove+0x3c/0x98 [ 17.095976] kmalloc_memmove_negative_size+0x154/0x2e0 [ 17.096338] kunit_try_run_case+0x170/0x3f0 [ 17.096391] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.097018] kthread+0x328/0x630 [ 17.097078] ret_from_fork+0x10/0x20 [ 17.097272] [ 17.097292] Allocated by task 180: [ 17.097323] kasan_save_stack+0x3c/0x68 [ 17.097368] kasan_save_track+0x20/0x40 [ 17.097405] kasan_save_alloc_info+0x40/0x58 [ 17.097918] __kasan_kmalloc+0xd4/0xd8 [ 17.098147] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.099140] kmalloc_memmove_negative_size+0xb0/0x2e0 [ 17.099829] kunit_try_run_case+0x170/0x3f0 [ 17.100175] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.100542] kthread+0x328/0x630 [ 17.100586] ret_from_fork+0x10/0x20 [ 17.100672] [ 17.100697] The buggy address belongs to the object at fff00000c7894a00 [ 17.100697] which belongs to the cache kmalloc-64 of size 64 [ 17.100786] The buggy address is located 4 bytes inside of [ 17.100786] 64-byte region [fff00000c7894a00, fff00000c7894a40) [ 17.100857] [ 17.101399] The buggy address belongs to the physical page: [ 17.101486] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107894 [ 17.101739] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.102072] page_type: f5(slab) [ 17.102441] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 17.102627] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.102670] page dumped because: kasan: bad access detected [ 17.102737] [ 17.103024] Memory state around the buggy address: [ 17.103229] fff00000c7894900: 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc fc [ 17.103427] fff00000c7894980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.103477] >fff00000c7894a00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 17.103515] ^ [ 17.103775] fff00000c7894a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.103862] fff00000c7894b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.103903] ==================================================================
[ 16.724426] ================================================================== [ 16.724682] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0 [ 16.724752] Read of size 18446744073709551614 at addr fff00000c7965f84 by task kunit_try_catch/180 [ 16.725443] [ 16.725730] CPU: 1 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 16.726102] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.726427] Hardware name: linux,dummy-virt (DT) [ 16.726819] Call trace: [ 16.726942] show_stack+0x20/0x38 (C) [ 16.727111] dump_stack_lvl+0x8c/0xd0 [ 16.727211] print_report+0x118/0x5d0 [ 16.727637] kasan_report+0xdc/0x128 [ 16.727736] kasan_check_range+0x100/0x1a8 [ 16.727800] __asan_memmove+0x3c/0x98 [ 16.727870] kmalloc_memmove_negative_size+0x154/0x2e0 [ 16.728203] kunit_try_run_case+0x170/0x3f0 [ 16.728619] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.728814] kthread+0x328/0x630 [ 16.728942] ret_from_fork+0x10/0x20 [ 16.729128] [ 16.729344] Allocated by task 180: [ 16.729392] kasan_save_stack+0x3c/0x68 [ 16.729569] kasan_save_track+0x20/0x40 [ 16.729714] kasan_save_alloc_info+0x40/0x58 [ 16.729864] __kasan_kmalloc+0xd4/0xd8 [ 16.729904] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.731236] kmalloc_memmove_negative_size+0xb0/0x2e0 [ 16.731309] kunit_try_run_case+0x170/0x3f0 [ 16.731543] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.731692] kthread+0x328/0x630 [ 16.731736] ret_from_fork+0x10/0x20 [ 16.731909] [ 16.732138] The buggy address belongs to the object at fff00000c7965f80 [ 16.732138] which belongs to the cache kmalloc-64 of size 64 [ 16.732470] The buggy address is located 4 bytes inside of [ 16.732470] 64-byte region [fff00000c7965f80, fff00000c7965fc0) [ 16.732687] [ 16.732821] The buggy address belongs to the physical page: [ 16.732863] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107965 [ 16.732950] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.733358] page_type: f5(slab) [ 16.733511] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 16.733595] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.733984] page dumped because: kasan: bad access detected [ 16.734095] [ 16.734154] Memory state around the buggy address: [ 16.734192] fff00000c7965e80: 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc fc [ 16.734440] fff00000c7965f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.734618] >fff00000c7965f80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 16.734685] ^ [ 16.735008] fff00000c7966000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.735086] fff00000c7966080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.735262] ==================================================================
[ 16.765701] ================================================================== [ 16.766065] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0 [ 16.766129] Read of size 18446744073709551614 at addr fff00000c771ab84 by task kunit_try_catch/180 [ 16.766375] [ 16.766453] CPU: 0 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 16.766563] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.766589] Hardware name: linux,dummy-virt (DT) [ 16.766655] Call trace: [ 16.766707] show_stack+0x20/0x38 (C) [ 16.766769] dump_stack_lvl+0x8c/0xd0 [ 16.766815] print_report+0x118/0x5d0 [ 16.766872] kasan_report+0xdc/0x128 [ 16.766965] kasan_check_range+0x100/0x1a8 [ 16.767052] __asan_memmove+0x3c/0x98 [ 16.767093] kmalloc_memmove_negative_size+0x154/0x2e0 [ 16.767380] kunit_try_run_case+0x170/0x3f0 [ 16.767437] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.767488] kthread+0x328/0x630 [ 16.767648] ret_from_fork+0x10/0x20 [ 16.767787] [ 16.767933] Allocated by task 180: [ 16.768036] kasan_save_stack+0x3c/0x68 [ 16.768163] kasan_save_track+0x20/0x40 [ 16.768250] kasan_save_alloc_info+0x40/0x58 [ 16.768380] __kasan_kmalloc+0xd4/0xd8 [ 16.768490] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.769560] kmalloc_memmove_negative_size+0xb0/0x2e0 [ 16.769671] kunit_try_run_case+0x170/0x3f0 [ 16.769773] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.769917] kthread+0x328/0x630 [ 16.769950] ret_from_fork+0x10/0x20 [ 16.770047] [ 16.770251] The buggy address belongs to the object at fff00000c771ab80 [ 16.770251] which belongs to the cache kmalloc-64 of size 64 [ 16.770574] The buggy address is located 4 bytes inside of [ 16.770574] 64-byte region [fff00000c771ab80, fff00000c771abc0) [ 16.770652] [ 16.770691] The buggy address belongs to the physical page: [ 16.770744] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10771a [ 16.770802] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.770857] page_type: f5(slab) [ 16.770906] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 16.770956] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.771007] page dumped because: kasan: bad access detected [ 16.771055] [ 16.771074] Memory state around the buggy address: [ 16.771118] fff00000c771aa80: 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc fc [ 16.771162] fff00000c771ab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.771210] >fff00000c771ab80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 16.771258] ^ [ 16.771287] fff00000c771ac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.771329] fff00000c771ac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.771368] ==================================================================
[ 12.439801] ================================================================== [ 12.440387] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x171/0x330 [ 12.440789] Read of size 18446744073709551614 at addr ffff888102e2d604 by task kunit_try_catch/197 [ 12.441377] [ 12.441502] CPU: 0 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 12.441548] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.441559] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.441580] Call Trace: [ 12.441647] <TASK> [ 12.441666] dump_stack_lvl+0x73/0xb0 [ 12.441698] print_report+0xd1/0x610 [ 12.441720] ? __virt_addr_valid+0x1db/0x2d0 [ 12.441743] ? kmalloc_memmove_negative_size+0x171/0x330 [ 12.441768] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.441791] ? kmalloc_memmove_negative_size+0x171/0x330 [ 12.441837] kasan_report+0x141/0x180 [ 12.441859] ? kmalloc_memmove_negative_size+0x171/0x330 [ 12.441904] kasan_check_range+0x10c/0x1c0 [ 12.441929] __asan_memmove+0x27/0x70 [ 12.441948] kmalloc_memmove_negative_size+0x171/0x330 [ 12.441973] ? __pfx_kmalloc_memmove_negative_size+0x10/0x10 [ 12.442003] ? __pfx_kmalloc_memmove_negative_size+0x10/0x10 [ 12.442033] kunit_try_run_case+0x1a5/0x480 [ 12.442058] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.442080] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.442105] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.442128] ? __kthread_parkme+0x82/0x180 [ 12.442149] ? preempt_count_sub+0x50/0x80 [ 12.442173] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.442197] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.442220] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.442244] kthread+0x337/0x6f0 [ 12.442262] ? trace_preempt_on+0x20/0xc0 [ 12.442286] ? __pfx_kthread+0x10/0x10 [ 12.442306] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.442327] ? calculate_sigpending+0x7b/0xa0 [ 12.442351] ? __pfx_kthread+0x10/0x10 [ 12.442372] ret_from_fork+0x116/0x1d0 [ 12.442391] ? __pfx_kthread+0x10/0x10 [ 12.442411] ret_from_fork_asm+0x1a/0x30 [ 12.442444] </TASK> [ 12.442455] [ 12.450089] Allocated by task 197: [ 12.450226] kasan_save_stack+0x45/0x70 [ 12.450374] kasan_save_track+0x18/0x40 [ 12.450770] kasan_save_alloc_info+0x3b/0x50 [ 12.451031] __kasan_kmalloc+0xb7/0xc0 [ 12.451266] __kmalloc_cache_noprof+0x189/0x420 [ 12.451865] kmalloc_memmove_negative_size+0xac/0x330 [ 12.452117] kunit_try_run_case+0x1a5/0x480 [ 12.452324] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.452588] kthread+0x337/0x6f0 [ 12.452766] ret_from_fork+0x116/0x1d0 [ 12.452939] ret_from_fork_asm+0x1a/0x30 [ 12.453199] [ 12.453273] The buggy address belongs to the object at ffff888102e2d600 [ 12.453273] which belongs to the cache kmalloc-64 of size 64 [ 12.453960] The buggy address is located 4 bytes inside of [ 12.453960] 64-byte region [ffff888102e2d600, ffff888102e2d640) [ 12.454333] [ 12.454407] The buggy address belongs to the physical page: [ 12.454582] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102e2d [ 12.455210] flags: 0x200000000000000(node=0|zone=2) [ 12.455736] page_type: f5(slab) [ 12.455922] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 12.456200] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 12.456429] page dumped because: kasan: bad access detected [ 12.456761] [ 12.456859] Memory state around the buggy address: [ 12.457103] ffff888102e2d500: 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc fc [ 12.457425] ffff888102e2d580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 12.457745] >ffff888102e2d600: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 12.458211] ^ [ 12.458336] ffff888102e2d680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.458628] ffff888102e2d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.459084] ==================================================================
[ 12.180829] ================================================================== [ 12.181265] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x171/0x330 [ 12.181881] Read of size 18446744073709551614 at addr ffff8881026d7e84 by task kunit_try_catch/198 [ 12.182205] [ 12.182295] CPU: 1 UID: 0 PID: 198 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 12.182338] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.182350] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.182370] Call Trace: [ 12.182382] <TASK> [ 12.182444] dump_stack_lvl+0x73/0xb0 [ 12.182478] print_report+0xd1/0x610 [ 12.182512] ? __virt_addr_valid+0x1db/0x2d0 [ 12.182565] ? kmalloc_memmove_negative_size+0x171/0x330 [ 12.182591] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.182626] ? kmalloc_memmove_negative_size+0x171/0x330 [ 12.182671] kasan_report+0x141/0x180 [ 12.182694] ? kmalloc_memmove_negative_size+0x171/0x330 [ 12.182726] kasan_check_range+0x10c/0x1c0 [ 12.182751] __asan_memmove+0x27/0x70 [ 12.182789] kmalloc_memmove_negative_size+0x171/0x330 [ 12.182819] ? __pfx_kmalloc_memmove_negative_size+0x10/0x10 [ 12.182849] ? __schedule+0x10cc/0x2b60 [ 12.182873] ? __pfx_read_tsc+0x10/0x10 [ 12.182894] ? ktime_get_ts64+0x86/0x230 [ 12.182929] kunit_try_run_case+0x1a5/0x480 [ 12.182954] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.182988] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.183015] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.183041] ? __kthread_parkme+0x82/0x180 [ 12.183063] ? preempt_count_sub+0x50/0x80 [ 12.183088] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.183113] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.183138] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.183163] kthread+0x337/0x6f0 [ 12.183183] ? trace_preempt_on+0x20/0xc0 [ 12.183206] ? __pfx_kthread+0x10/0x10 [ 12.183227] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.183251] ? calculate_sigpending+0x7b/0xa0 [ 12.183276] ? __pfx_kthread+0x10/0x10 [ 12.183299] ret_from_fork+0x116/0x1d0 [ 12.183319] ? __pfx_kthread+0x10/0x10 [ 12.183340] ret_from_fork_asm+0x1a/0x30 [ 12.183373] </TASK> [ 12.183383] [ 12.195587] Allocated by task 198: [ 12.196054] kasan_save_stack+0x45/0x70 [ 12.196602] kasan_save_track+0x18/0x40 [ 12.196981] kasan_save_alloc_info+0x3b/0x50 [ 12.197384] __kasan_kmalloc+0xb7/0xc0 [ 12.197845] __kmalloc_cache_noprof+0x189/0x420 [ 12.198272] kmalloc_memmove_negative_size+0xac/0x330 [ 12.198804] kunit_try_run_case+0x1a5/0x480 [ 12.199194] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.199770] kthread+0x337/0x6f0 [ 12.200093] ret_from_fork+0x116/0x1d0 [ 12.200447] ret_from_fork_asm+0x1a/0x30 [ 12.200928] [ 12.201113] The buggy address belongs to the object at ffff8881026d7e80 [ 12.201113] which belongs to the cache kmalloc-64 of size 64 [ 12.202351] The buggy address is located 4 bytes inside of [ 12.202351] 64-byte region [ffff8881026d7e80, ffff8881026d7ec0) [ 12.203500] [ 12.203680] The buggy address belongs to the physical page: [ 12.204175] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d7 [ 12.205006] flags: 0x200000000000000(node=0|zone=2) [ 12.205351] page_type: f5(slab) [ 12.205720] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 12.206107] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 12.206351] page dumped because: kasan: bad access detected [ 12.206559] [ 12.206627] Memory state around the buggy address: [ 12.206895] ffff8881026d7d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 12.207174] ffff8881026d7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 12.207575] >ffff8881026d7e80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 12.207871] ^ [ 12.208020] ffff8881026d7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.208333] ffff8881026d7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.208590] ==================================================================
[ 12.369481] ================================================================== [ 12.369961] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x171/0x330 [ 12.370510] Read of size 18446744073709551614 at addr ffff8881029b2b04 by task kunit_try_catch/197 [ 12.371020] [ 12.371151] CPU: 0 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 12.371203] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.371214] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.371237] Call Trace: [ 12.371251] <TASK> [ 12.371271] dump_stack_lvl+0x73/0xb0 [ 12.371308] print_report+0xd1/0x610 [ 12.371332] ? __virt_addr_valid+0x1db/0x2d0 [ 12.371357] ? kmalloc_memmove_negative_size+0x171/0x330 [ 12.371383] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.371406] ? kmalloc_memmove_negative_size+0x171/0x330 [ 12.371519] kasan_report+0x141/0x180 [ 12.371547] ? kmalloc_memmove_negative_size+0x171/0x330 [ 12.371577] kasan_check_range+0x10c/0x1c0 [ 12.371600] __asan_memmove+0x27/0x70 [ 12.371618] kmalloc_memmove_negative_size+0x171/0x330 [ 12.371643] ? __pfx_kmalloc_memmove_negative_size+0x10/0x10 [ 12.371669] ? __schedule+0x10cc/0x2b60 [ 12.371693] ? __pfx_read_tsc+0x10/0x10 [ 12.371715] ? ktime_get_ts64+0x86/0x230 [ 12.371742] kunit_try_run_case+0x1a5/0x480 [ 12.371768] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.371790] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.371814] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.371837] ? __kthread_parkme+0x82/0x180 [ 12.371858] ? preempt_count_sub+0x50/0x80 [ 12.371883] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.371905] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.371928] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.371952] kthread+0x337/0x6f0 [ 12.371970] ? trace_preempt_on+0x20/0xc0 [ 12.371994] ? __pfx_kthread+0x10/0x10 [ 12.372065] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.372090] ? calculate_sigpending+0x7b/0xa0 [ 12.372114] ? __pfx_kthread+0x10/0x10 [ 12.372135] ret_from_fork+0x116/0x1d0 [ 12.372154] ? __pfx_kthread+0x10/0x10 [ 12.372173] ret_from_fork_asm+0x1a/0x30 [ 12.372204] </TASK> [ 12.372215] [ 12.386251] Allocated by task 197: [ 12.386477] kasan_save_stack+0x45/0x70 [ 12.386934] kasan_save_track+0x18/0x40 [ 12.387418] kasan_save_alloc_info+0x3b/0x50 [ 12.387586] __kasan_kmalloc+0xb7/0xc0 [ 12.387720] __kmalloc_cache_noprof+0x189/0x420 [ 12.387878] kmalloc_memmove_negative_size+0xac/0x330 [ 12.388178] kunit_try_run_case+0x1a5/0x480 [ 12.388574] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.389372] kthread+0x337/0x6f0 [ 12.389842] ret_from_fork+0x116/0x1d0 [ 12.390311] ret_from_fork_asm+0x1a/0x30 [ 12.390719] [ 12.390885] The buggy address belongs to the object at ffff8881029b2b00 [ 12.390885] which belongs to the cache kmalloc-64 of size 64 [ 12.392089] The buggy address is located 4 bytes inside of [ 12.392089] 64-byte region [ffff8881029b2b00, ffff8881029b2b40) [ 12.392719] [ 12.392799] The buggy address belongs to the physical page: [ 12.392984] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b2 [ 12.393799] flags: 0x200000000000000(node=0|zone=2) [ 12.394387] page_type: f5(slab) [ 12.394755] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 12.395524] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 12.396228] page dumped because: kasan: bad access detected [ 12.396831] [ 12.396962] Memory state around the buggy address: [ 12.397326] ffff8881029b2a00: 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc fc [ 12.397960] ffff8881029b2a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 12.398641] >ffff8881029b2b00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 12.398989] ^ [ 12.399374] ffff8881029b2b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.400084] ffff8881029b2c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.400504] ==================================================================