Hay
Date
July 18, 2025, 2:09 p.m.

Environment
qemu-arm64
qemu-x86_64

[   17.092438] ==================================================================
[   17.092714] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0
[   17.093109] Read of size 18446744073709551614 at addr fff00000c7894a04 by task kunit_try_catch/180
[   17.093500] 
[   17.093716] CPU: 1 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.094414] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.094607] Hardware name: linux,dummy-virt (DT)
[   17.094803] Call trace:
[   17.094831]  show_stack+0x20/0x38 (C)
[   17.094902]  dump_stack_lvl+0x8c/0xd0
[   17.094953]  print_report+0x118/0x5d0
[   17.095202]  kasan_report+0xdc/0x128
[   17.095281]  kasan_check_range+0x100/0x1a8
[   17.095860]  __asan_memmove+0x3c/0x98
[   17.095976]  kmalloc_memmove_negative_size+0x154/0x2e0
[   17.096338]  kunit_try_run_case+0x170/0x3f0
[   17.096391]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.097018]  kthread+0x328/0x630
[   17.097078]  ret_from_fork+0x10/0x20
[   17.097272] 
[   17.097292] Allocated by task 180:
[   17.097323]  kasan_save_stack+0x3c/0x68
[   17.097368]  kasan_save_track+0x20/0x40
[   17.097405]  kasan_save_alloc_info+0x40/0x58
[   17.097918]  __kasan_kmalloc+0xd4/0xd8
[   17.098147]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.099140]  kmalloc_memmove_negative_size+0xb0/0x2e0
[   17.099829]  kunit_try_run_case+0x170/0x3f0
[   17.100175]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.100542]  kthread+0x328/0x630
[   17.100586]  ret_from_fork+0x10/0x20
[   17.100672] 
[   17.100697] The buggy address belongs to the object at fff00000c7894a00
[   17.100697]  which belongs to the cache kmalloc-64 of size 64
[   17.100786] The buggy address is located 4 bytes inside of
[   17.100786]  64-byte region [fff00000c7894a00, fff00000c7894a40)
[   17.100857] 
[   17.101399] The buggy address belongs to the physical page:
[   17.101486] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107894
[   17.101739] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.102072] page_type: f5(slab)
[   17.102441] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   17.102627] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.102670] page dumped because: kasan: bad access detected
[   17.102737] 
[   17.103024] Memory state around the buggy address:
[   17.103229]  fff00000c7894900: 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc fc
[   17.103427]  fff00000c7894980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.103477] >fff00000c7894a00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   17.103515]                    ^
[   17.103775]  fff00000c7894a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.103862]  fff00000c7894b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.103903] ==================================================================

[   16.724426] ==================================================================
[   16.724682] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0
[   16.724752] Read of size 18446744073709551614 at addr fff00000c7965f84 by task kunit_try_catch/180
[   16.725443] 
[   16.725730] CPU: 1 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.726102] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.726427] Hardware name: linux,dummy-virt (DT)
[   16.726819] Call trace:
[   16.726942]  show_stack+0x20/0x38 (C)
[   16.727111]  dump_stack_lvl+0x8c/0xd0
[   16.727211]  print_report+0x118/0x5d0
[   16.727637]  kasan_report+0xdc/0x128
[   16.727736]  kasan_check_range+0x100/0x1a8
[   16.727800]  __asan_memmove+0x3c/0x98
[   16.727870]  kmalloc_memmove_negative_size+0x154/0x2e0
[   16.728203]  kunit_try_run_case+0x170/0x3f0
[   16.728619]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.728814]  kthread+0x328/0x630
[   16.728942]  ret_from_fork+0x10/0x20
[   16.729128] 
[   16.729344] Allocated by task 180:
[   16.729392]  kasan_save_stack+0x3c/0x68
[   16.729569]  kasan_save_track+0x20/0x40
[   16.729714]  kasan_save_alloc_info+0x40/0x58
[   16.729864]  __kasan_kmalloc+0xd4/0xd8
[   16.729904]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.731236]  kmalloc_memmove_negative_size+0xb0/0x2e0
[   16.731309]  kunit_try_run_case+0x170/0x3f0
[   16.731543]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.731692]  kthread+0x328/0x630
[   16.731736]  ret_from_fork+0x10/0x20
[   16.731909] 
[   16.732138] The buggy address belongs to the object at fff00000c7965f80
[   16.732138]  which belongs to the cache kmalloc-64 of size 64
[   16.732470] The buggy address is located 4 bytes inside of
[   16.732470]  64-byte region [fff00000c7965f80, fff00000c7965fc0)
[   16.732687] 
[   16.732821] The buggy address belongs to the physical page:
[   16.732863] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107965
[   16.732950] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.733358] page_type: f5(slab)
[   16.733511] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   16.733595] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.733984] page dumped because: kasan: bad access detected
[   16.734095] 
[   16.734154] Memory state around the buggy address:
[   16.734192]  fff00000c7965e80: 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc fc
[   16.734440]  fff00000c7965f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.734618] >fff00000c7965f80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   16.734685]                    ^
[   16.735008]  fff00000c7966000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.735086]  fff00000c7966080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.735262] ==================================================================

[   16.765701] ==================================================================
[   16.766065] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0
[   16.766129] Read of size 18446744073709551614 at addr fff00000c771ab84 by task kunit_try_catch/180
[   16.766375] 
[   16.766453] CPU: 0 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.766563] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.766589] Hardware name: linux,dummy-virt (DT)
[   16.766655] Call trace:
[   16.766707]  show_stack+0x20/0x38 (C)
[   16.766769]  dump_stack_lvl+0x8c/0xd0
[   16.766815]  print_report+0x118/0x5d0
[   16.766872]  kasan_report+0xdc/0x128
[   16.766965]  kasan_check_range+0x100/0x1a8
[   16.767052]  __asan_memmove+0x3c/0x98
[   16.767093]  kmalloc_memmove_negative_size+0x154/0x2e0
[   16.767380]  kunit_try_run_case+0x170/0x3f0
[   16.767437]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.767488]  kthread+0x328/0x630
[   16.767648]  ret_from_fork+0x10/0x20
[   16.767787] 
[   16.767933] Allocated by task 180:
[   16.768036]  kasan_save_stack+0x3c/0x68
[   16.768163]  kasan_save_track+0x20/0x40
[   16.768250]  kasan_save_alloc_info+0x40/0x58
[   16.768380]  __kasan_kmalloc+0xd4/0xd8
[   16.768490]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.769560]  kmalloc_memmove_negative_size+0xb0/0x2e0
[   16.769671]  kunit_try_run_case+0x170/0x3f0
[   16.769773]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.769917]  kthread+0x328/0x630
[   16.769950]  ret_from_fork+0x10/0x20
[   16.770047] 
[   16.770251] The buggy address belongs to the object at fff00000c771ab80
[   16.770251]  which belongs to the cache kmalloc-64 of size 64
[   16.770574] The buggy address is located 4 bytes inside of
[   16.770574]  64-byte region [fff00000c771ab80, fff00000c771abc0)
[   16.770652] 
[   16.770691] The buggy address belongs to the physical page:
[   16.770744] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10771a
[   16.770802] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.770857] page_type: f5(slab)
[   16.770906] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   16.770956] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.771007] page dumped because: kasan: bad access detected
[   16.771055] 
[   16.771074] Memory state around the buggy address:
[   16.771118]  fff00000c771aa80: 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc fc
[   16.771162]  fff00000c771ab00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.771210] >fff00000c771ab80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   16.771258]                    ^
[   16.771287]  fff00000c771ac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.771329]  fff00000c771ac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.771368] ==================================================================

[   12.439801] ==================================================================
[   12.440387] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x171/0x330
[   12.440789] Read of size 18446744073709551614 at addr ffff888102e2d604 by task kunit_try_catch/197
[   12.441377] 
[   12.441502] CPU: 0 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.441548] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.441559] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.441580] Call Trace:
[   12.441647]  <TASK>
[   12.441666]  dump_stack_lvl+0x73/0xb0
[   12.441698]  print_report+0xd1/0x610
[   12.441720]  ? __virt_addr_valid+0x1db/0x2d0
[   12.441743]  ? kmalloc_memmove_negative_size+0x171/0x330
[   12.441768]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.441791]  ? kmalloc_memmove_negative_size+0x171/0x330
[   12.441837]  kasan_report+0x141/0x180
[   12.441859]  ? kmalloc_memmove_negative_size+0x171/0x330
[   12.441904]  kasan_check_range+0x10c/0x1c0
[   12.441929]  __asan_memmove+0x27/0x70
[   12.441948]  kmalloc_memmove_negative_size+0x171/0x330
[   12.441973]  ? __pfx_kmalloc_memmove_negative_size+0x10/0x10
[   12.442003]  ? __pfx_kmalloc_memmove_negative_size+0x10/0x10
[   12.442033]  kunit_try_run_case+0x1a5/0x480
[   12.442058]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.442080]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.442105]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.442128]  ? __kthread_parkme+0x82/0x180
[   12.442149]  ? preempt_count_sub+0x50/0x80
[   12.442173]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.442197]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.442220]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.442244]  kthread+0x337/0x6f0
[   12.442262]  ? trace_preempt_on+0x20/0xc0
[   12.442286]  ? __pfx_kthread+0x10/0x10
[   12.442306]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.442327]  ? calculate_sigpending+0x7b/0xa0
[   12.442351]  ? __pfx_kthread+0x10/0x10
[   12.442372]  ret_from_fork+0x116/0x1d0
[   12.442391]  ? __pfx_kthread+0x10/0x10
[   12.442411]  ret_from_fork_asm+0x1a/0x30
[   12.442444]  </TASK>
[   12.442455] 
[   12.450089] Allocated by task 197:
[   12.450226]  kasan_save_stack+0x45/0x70
[   12.450374]  kasan_save_track+0x18/0x40
[   12.450770]  kasan_save_alloc_info+0x3b/0x50
[   12.451031]  __kasan_kmalloc+0xb7/0xc0
[   12.451266]  __kmalloc_cache_noprof+0x189/0x420
[   12.451865]  kmalloc_memmove_negative_size+0xac/0x330
[   12.452117]  kunit_try_run_case+0x1a5/0x480
[   12.452324]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.452588]  kthread+0x337/0x6f0
[   12.452766]  ret_from_fork+0x116/0x1d0
[   12.452939]  ret_from_fork_asm+0x1a/0x30
[   12.453199] 
[   12.453273] The buggy address belongs to the object at ffff888102e2d600
[   12.453273]  which belongs to the cache kmalloc-64 of size 64
[   12.453960] The buggy address is located 4 bytes inside of
[   12.453960]  64-byte region [ffff888102e2d600, ffff888102e2d640)
[   12.454333] 
[   12.454407] The buggy address belongs to the physical page:
[   12.454582] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102e2d
[   12.455210] flags: 0x200000000000000(node=0|zone=2)
[   12.455736] page_type: f5(slab)
[   12.455922] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   12.456200] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   12.456429] page dumped because: kasan: bad access detected
[   12.456761] 
[   12.456859] Memory state around the buggy address:
[   12.457103]  ffff888102e2d500: 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc fc
[   12.457425]  ffff888102e2d580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   12.457745] >ffff888102e2d600: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   12.458211]                    ^
[   12.458336]  ffff888102e2d680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.458628]  ffff888102e2d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.459084] ==================================================================

[   12.180829] ==================================================================
[   12.181265] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x171/0x330
[   12.181881] Read of size 18446744073709551614 at addr ffff8881026d7e84 by task kunit_try_catch/198
[   12.182205] 
[   12.182295] CPU: 1 UID: 0 PID: 198 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.182338] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.182350] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.182370] Call Trace:
[   12.182382]  <TASK>
[   12.182444]  dump_stack_lvl+0x73/0xb0
[   12.182478]  print_report+0xd1/0x610
[   12.182512]  ? __virt_addr_valid+0x1db/0x2d0
[   12.182565]  ? kmalloc_memmove_negative_size+0x171/0x330
[   12.182591]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.182626]  ? kmalloc_memmove_negative_size+0x171/0x330
[   12.182671]  kasan_report+0x141/0x180
[   12.182694]  ? kmalloc_memmove_negative_size+0x171/0x330
[   12.182726]  kasan_check_range+0x10c/0x1c0
[   12.182751]  __asan_memmove+0x27/0x70
[   12.182789]  kmalloc_memmove_negative_size+0x171/0x330
[   12.182819]  ? __pfx_kmalloc_memmove_negative_size+0x10/0x10
[   12.182849]  ? __schedule+0x10cc/0x2b60
[   12.182873]  ? __pfx_read_tsc+0x10/0x10
[   12.182894]  ? ktime_get_ts64+0x86/0x230
[   12.182929]  kunit_try_run_case+0x1a5/0x480
[   12.182954]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.182988]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.183015]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.183041]  ? __kthread_parkme+0x82/0x180
[   12.183063]  ? preempt_count_sub+0x50/0x80
[   12.183088]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.183113]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.183138]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.183163]  kthread+0x337/0x6f0
[   12.183183]  ? trace_preempt_on+0x20/0xc0
[   12.183206]  ? __pfx_kthread+0x10/0x10
[   12.183227]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.183251]  ? calculate_sigpending+0x7b/0xa0
[   12.183276]  ? __pfx_kthread+0x10/0x10
[   12.183299]  ret_from_fork+0x116/0x1d0
[   12.183319]  ? __pfx_kthread+0x10/0x10
[   12.183340]  ret_from_fork_asm+0x1a/0x30
[   12.183373]  </TASK>
[   12.183383] 
[   12.195587] Allocated by task 198:
[   12.196054]  kasan_save_stack+0x45/0x70
[   12.196602]  kasan_save_track+0x18/0x40
[   12.196981]  kasan_save_alloc_info+0x3b/0x50
[   12.197384]  __kasan_kmalloc+0xb7/0xc0
[   12.197845]  __kmalloc_cache_noprof+0x189/0x420
[   12.198272]  kmalloc_memmove_negative_size+0xac/0x330
[   12.198804]  kunit_try_run_case+0x1a5/0x480
[   12.199194]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.199770]  kthread+0x337/0x6f0
[   12.200093]  ret_from_fork+0x116/0x1d0
[   12.200447]  ret_from_fork_asm+0x1a/0x30
[   12.200928] 
[   12.201113] The buggy address belongs to the object at ffff8881026d7e80
[   12.201113]  which belongs to the cache kmalloc-64 of size 64
[   12.202351] The buggy address is located 4 bytes inside of
[   12.202351]  64-byte region [ffff8881026d7e80, ffff8881026d7ec0)
[   12.203500] 
[   12.203680] The buggy address belongs to the physical page:
[   12.204175] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d7
[   12.205006] flags: 0x200000000000000(node=0|zone=2)
[   12.205351] page_type: f5(slab)
[   12.205720] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   12.206107] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   12.206351] page dumped because: kasan: bad access detected
[   12.206559] 
[   12.206627] Memory state around the buggy address:
[   12.206895]  ffff8881026d7d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   12.207174]  ffff8881026d7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   12.207575] >ffff8881026d7e80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   12.207871]                    ^
[   12.208020]  ffff8881026d7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.208333]  ffff8881026d7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.208590] ==================================================================

[   12.369481] ==================================================================
[   12.369961] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x171/0x330
[   12.370510] Read of size 18446744073709551614 at addr ffff8881029b2b04 by task kunit_try_catch/197
[   12.371020] 
[   12.371151] CPU: 0 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.371203] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.371214] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.371237] Call Trace:
[   12.371251]  <TASK>
[   12.371271]  dump_stack_lvl+0x73/0xb0
[   12.371308]  print_report+0xd1/0x610
[   12.371332]  ? __virt_addr_valid+0x1db/0x2d0
[   12.371357]  ? kmalloc_memmove_negative_size+0x171/0x330
[   12.371383]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.371406]  ? kmalloc_memmove_negative_size+0x171/0x330
[   12.371519]  kasan_report+0x141/0x180
[   12.371547]  ? kmalloc_memmove_negative_size+0x171/0x330
[   12.371577]  kasan_check_range+0x10c/0x1c0
[   12.371600]  __asan_memmove+0x27/0x70
[   12.371618]  kmalloc_memmove_negative_size+0x171/0x330
[   12.371643]  ? __pfx_kmalloc_memmove_negative_size+0x10/0x10
[   12.371669]  ? __schedule+0x10cc/0x2b60
[   12.371693]  ? __pfx_read_tsc+0x10/0x10
[   12.371715]  ? ktime_get_ts64+0x86/0x230
[   12.371742]  kunit_try_run_case+0x1a5/0x480
[   12.371768]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.371790]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.371814]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.371837]  ? __kthread_parkme+0x82/0x180
[   12.371858]  ? preempt_count_sub+0x50/0x80
[   12.371883]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.371905]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.371928]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.371952]  kthread+0x337/0x6f0
[   12.371970]  ? trace_preempt_on+0x20/0xc0
[   12.371994]  ? __pfx_kthread+0x10/0x10
[   12.372065]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.372090]  ? calculate_sigpending+0x7b/0xa0
[   12.372114]  ? __pfx_kthread+0x10/0x10
[   12.372135]  ret_from_fork+0x116/0x1d0
[   12.372154]  ? __pfx_kthread+0x10/0x10
[   12.372173]  ret_from_fork_asm+0x1a/0x30
[   12.372204]  </TASK>
[   12.372215] 
[   12.386251] Allocated by task 197:
[   12.386477]  kasan_save_stack+0x45/0x70
[   12.386934]  kasan_save_track+0x18/0x40
[   12.387418]  kasan_save_alloc_info+0x3b/0x50
[   12.387586]  __kasan_kmalloc+0xb7/0xc0
[   12.387720]  __kmalloc_cache_noprof+0x189/0x420
[   12.387878]  kmalloc_memmove_negative_size+0xac/0x330
[   12.388178]  kunit_try_run_case+0x1a5/0x480
[   12.388574]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.389372]  kthread+0x337/0x6f0
[   12.389842]  ret_from_fork+0x116/0x1d0
[   12.390311]  ret_from_fork_asm+0x1a/0x30
[   12.390719] 
[   12.390885] The buggy address belongs to the object at ffff8881029b2b00
[   12.390885]  which belongs to the cache kmalloc-64 of size 64
[   12.392089] The buggy address is located 4 bytes inside of
[   12.392089]  64-byte region [ffff8881029b2b00, ffff8881029b2b40)
[   12.392719] 
[   12.392799] The buggy address belongs to the physical page:
[   12.392984] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b2
[   12.393799] flags: 0x200000000000000(node=0|zone=2)
[   12.394387] page_type: f5(slab)
[   12.394755] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   12.395524] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   12.396228] page dumped because: kasan: bad access detected
[   12.396831] 
[   12.396962] Memory state around the buggy address:
[   12.397326]  ffff8881029b2a00: 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc fc
[   12.397960]  ffff8881029b2a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   12.398641] >ffff8881029b2b00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   12.398989]                    ^
[   12.399374]  ffff8881029b2b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.400084]  ffff8881029b2c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.400504] ==================================================================