Hay
Date
July 18, 2025, 2:09 p.m.

Environment
qemu-arm64
qemu-x86_64

[   17.122371] ==================================================================
[   17.122484] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x154/0x2e0
[   17.122567] Read of size 64 at addr fff00000c6c74604 by task kunit_try_catch/182
[   17.122618] 
[   17.122665] CPU: 0 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.122752] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.122779] Hardware name: linux,dummy-virt (DT)
[   17.122812] Call trace:
[   17.122838]  show_stack+0x20/0x38 (C)
[   17.122909]  dump_stack_lvl+0x8c/0xd0
[   17.122961]  print_report+0x118/0x5d0
[   17.123008]  kasan_report+0xdc/0x128
[   17.123052]  kasan_check_range+0x100/0x1a8
[   17.123099]  __asan_memmove+0x3c/0x98
[   17.123142]  kmalloc_memmove_invalid_size+0x154/0x2e0
[   17.123189]  kunit_try_run_case+0x170/0x3f0
[   17.123237]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.123289]  kthread+0x328/0x630
[   17.123354]  ret_from_fork+0x10/0x20
[   17.123406] 
[   17.123424] Allocated by task 182:
[   17.123484]  kasan_save_stack+0x3c/0x68
[   17.123529]  kasan_save_track+0x20/0x40
[   17.123566]  kasan_save_alloc_info+0x40/0x58
[   17.123606]  __kasan_kmalloc+0xd4/0xd8
[   17.123641]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.123682]  kmalloc_memmove_invalid_size+0xb0/0x2e0
[   17.123723]  kunit_try_run_case+0x170/0x3f0
[   17.123761]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.123804]  kthread+0x328/0x630
[   17.123835]  ret_from_fork+0x10/0x20
[   17.123882] 
[   17.123902] The buggy address belongs to the object at fff00000c6c74600
[   17.123902]  which belongs to the cache kmalloc-64 of size 64
[   17.123961] The buggy address is located 4 bytes inside of
[   17.123961]  allocated 64-byte region [fff00000c6c74600, fff00000c6c74640)
[   17.124021] 
[   17.124044] The buggy address belongs to the physical page:
[   17.124079] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106c74
[   17.124135] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.124188] page_type: f5(slab)
[   17.124232] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   17.124283] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.124325] page dumped because: kasan: bad access detected
[   17.124357] 
[   17.124375] Memory state around the buggy address:
[   17.124409]  fff00000c6c74500: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   17.124452]  fff00000c6c74580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.124494] >fff00000c6c74600: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   17.124532]                                            ^
[   17.124564]  fff00000c6c74680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.124605]  fff00000c6c74700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.124643] ==================================================================

[   16.746860] ==================================================================
[   16.746985] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x154/0x2e0
[   16.747088] Read of size 64 at addr fff00000c7951184 by task kunit_try_catch/182
[   16.747490] 
[   16.747577] CPU: 1 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.747665] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.747692] Hardware name: linux,dummy-virt (DT)
[   16.747794] Call trace:
[   16.747862]  show_stack+0x20/0x38 (C)
[   16.747936]  dump_stack_lvl+0x8c/0xd0
[   16.748034]  print_report+0x118/0x5d0
[   16.748083]  kasan_report+0xdc/0x128
[   16.748127]  kasan_check_range+0x100/0x1a8
[   16.748332]  __asan_memmove+0x3c/0x98
[   16.748532]  kmalloc_memmove_invalid_size+0x154/0x2e0
[   16.748604]  kunit_try_run_case+0x170/0x3f0
[   16.748744]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.748873]  kthread+0x328/0x630
[   16.748978]  ret_from_fork+0x10/0x20
[   16.749027] 
[   16.749046] Allocated by task 182:
[   16.749100]  kasan_save_stack+0x3c/0x68
[   16.749144]  kasan_save_track+0x20/0x40
[   16.749362]  kasan_save_alloc_info+0x40/0x58
[   16.749546]  __kasan_kmalloc+0xd4/0xd8
[   16.749614]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.749725]  kmalloc_memmove_invalid_size+0xb0/0x2e0
[   16.749835]  kunit_try_run_case+0x170/0x3f0
[   16.749955]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.750082]  kthread+0x328/0x630
[   16.750131]  ret_from_fork+0x10/0x20
[   16.750168] 
[   16.750536] The buggy address belongs to the object at fff00000c7951180
[   16.750536]  which belongs to the cache kmalloc-64 of size 64
[   16.750667] The buggy address is located 4 bytes inside of
[   16.750667]  allocated 64-byte region [fff00000c7951180, fff00000c79511c0)
[   16.750730] 
[   16.750757] The buggy address belongs to the physical page:
[   16.750800] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107951
[   16.750871] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.750930] page_type: f5(slab)
[   16.750977] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   16.751034] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.751076] page dumped because: kasan: bad access detected
[   16.751107] 
[   16.751125] Memory state around the buggy address:
[   16.751170]  fff00000c7951080: 00 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc
[   16.751232]  fff00000c7951100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.751280] >fff00000c7951180: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   16.751348]                                            ^
[   16.751383]  fff00000c7951200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.751434]  fff00000c7951280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.751471] ==================================================================

[   16.777964] ==================================================================
[   16.778025] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x154/0x2e0
[   16.778117] Read of size 64 at addr fff00000c771ad84 by task kunit_try_catch/182
[   16.778168] 
[   16.778217] CPU: 0 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.778299] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.778326] Hardware name: linux,dummy-virt (DT)
[   16.778374] Call trace:
[   16.778398]  show_stack+0x20/0x38 (C)
[   16.778522]  dump_stack_lvl+0x8c/0xd0
[   16.778691]  print_report+0x118/0x5d0
[   16.778799]  kasan_report+0xdc/0x128
[   16.778855]  kasan_check_range+0x100/0x1a8
[   16.778956]  __asan_memmove+0x3c/0x98
[   16.779011]  kmalloc_memmove_invalid_size+0x154/0x2e0
[   16.779059]  kunit_try_run_case+0x170/0x3f0
[   16.779106]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.779158]  kthread+0x328/0x630
[   16.779198]  ret_from_fork+0x10/0x20
[   16.779245] 
[   16.779263] Allocated by task 182:
[   16.779291]  kasan_save_stack+0x3c/0x68
[   16.779333]  kasan_save_track+0x20/0x40
[   16.779507]  kasan_save_alloc_info+0x40/0x58
[   16.779554]  __kasan_kmalloc+0xd4/0xd8
[   16.779672]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.779780]  kmalloc_memmove_invalid_size+0xb0/0x2e0
[   16.779844]  kunit_try_run_case+0x170/0x3f0
[   16.779882]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.779931]  kthread+0x328/0x630
[   16.779963]  ret_from_fork+0x10/0x20
[   16.780000] 
[   16.780019] The buggy address belongs to the object at fff00000c771ad80
[   16.780019]  which belongs to the cache kmalloc-64 of size 64
[   16.780096] The buggy address is located 4 bytes inside of
[   16.780096]  allocated 64-byte region [fff00000c771ad80, fff00000c771adc0)
[   16.780157] 
[   16.780184] The buggy address belongs to the physical page:
[   16.780215] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10771a
[   16.780265] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.780312] page_type: f5(slab)
[   16.780350] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   16.780399] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.780441] page dumped because: kasan: bad access detected
[   16.780472] 
[   16.780489] Memory state around the buggy address:
[   16.780521]  fff00000c771ac80: 00 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc
[   16.780564]  fff00000c771ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.780627] >fff00000c771ad80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   16.780664]                                            ^
[   16.780697]  fff00000c771ae00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.780749]  fff00000c771ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.780787] ==================================================================

[   12.463821] ==================================================================
[   12.464360] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x16f/0x330
[   12.464685] Read of size 64 at addr ffff888102e2d784 by task kunit_try_catch/199
[   12.465161] 
[   12.465280] CPU: 0 UID: 0 PID: 199 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.465327] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.465338] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.465359] Call Trace:
[   12.465370]  <TASK>
[   12.465387]  dump_stack_lvl+0x73/0xb0
[   12.465416]  print_report+0xd1/0x610
[   12.465439]  ? __virt_addr_valid+0x1db/0x2d0
[   12.465462]  ? kmalloc_memmove_invalid_size+0x16f/0x330
[   12.465487]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.465509]  ? kmalloc_memmove_invalid_size+0x16f/0x330
[   12.465533]  kasan_report+0x141/0x180
[   12.465556]  ? kmalloc_memmove_invalid_size+0x16f/0x330
[   12.465586]  kasan_check_range+0x10c/0x1c0
[   12.465609]  __asan_memmove+0x27/0x70
[   12.465628]  kmalloc_memmove_invalid_size+0x16f/0x330
[   12.465653]  ? __pfx_kmalloc_memmove_invalid_size+0x10/0x10
[   12.465679]  ? __schedule+0x10cc/0x2b60
[   12.465701]  ? __pfx_read_tsc+0x10/0x10
[   12.465722]  ? ktime_get_ts64+0x86/0x230
[   12.465747]  kunit_try_run_case+0x1a5/0x480
[   12.465771]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.465793]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.465817]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.465840]  ? __kthread_parkme+0x82/0x180
[   12.465861]  ? preempt_count_sub+0x50/0x80
[   12.465885]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.465923]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.465947]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.465970]  kthread+0x337/0x6f0
[   12.466035]  ? trace_preempt_on+0x20/0xc0
[   12.466061]  ? __pfx_kthread+0x10/0x10
[   12.466082]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.466103]  ? calculate_sigpending+0x7b/0xa0
[   12.466127]  ? __pfx_kthread+0x10/0x10
[   12.466148]  ret_from_fork+0x116/0x1d0
[   12.466167]  ? __pfx_kthread+0x10/0x10
[   12.466187]  ret_from_fork_asm+0x1a/0x30
[   12.466219]  </TASK>
[   12.466229] 
[   12.473833] Allocated by task 199:
[   12.474027]  kasan_save_stack+0x45/0x70
[   12.474175]  kasan_save_track+0x18/0x40
[   12.474311]  kasan_save_alloc_info+0x3b/0x50
[   12.474462]  __kasan_kmalloc+0xb7/0xc0
[   12.474860]  __kmalloc_cache_noprof+0x189/0x420
[   12.475106]  kmalloc_memmove_invalid_size+0xac/0x330
[   12.475367]  kunit_try_run_case+0x1a5/0x480
[   12.475644]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.475913]  kthread+0x337/0x6f0
[   12.476107]  ret_from_fork+0x116/0x1d0
[   12.476297]  ret_from_fork_asm+0x1a/0x30
[   12.476475] 
[   12.476635] The buggy address belongs to the object at ffff888102e2d780
[   12.476635]  which belongs to the cache kmalloc-64 of size 64
[   12.477068] The buggy address is located 4 bytes inside of
[   12.477068]  allocated 64-byte region [ffff888102e2d780, ffff888102e2d7c0)
[   12.477427] 
[   12.477581] The buggy address belongs to the physical page:
[   12.477838] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102e2d
[   12.478224] flags: 0x200000000000000(node=0|zone=2)
[   12.478459] page_type: f5(slab)
[   12.478692] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   12.478948] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   12.479264] page dumped because: kasan: bad access detected
[   12.479734] 
[   12.479833] Memory state around the buggy address:
[   12.480071]  ffff888102e2d680: 00 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc
[   12.480406]  ffff888102e2d700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   12.480770] >ffff888102e2d780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   12.481079]                                            ^
[   12.481250]  ffff888102e2d800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.481466]  ffff888102e2d880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.481827] ==================================================================

[   12.212591] ==================================================================
[   12.213745] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x16f/0x330
[   12.214864] Read of size 64 at addr ffff8881026d7f04 by task kunit_try_catch/200
[   12.215146] 
[   12.215237] CPU: 1 UID: 0 PID: 200 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.215281] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.215292] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.215312] Call Trace:
[   12.215324]  <TASK>
[   12.215339]  dump_stack_lvl+0x73/0xb0
[   12.215370]  print_report+0xd1/0x610
[   12.215392]  ? __virt_addr_valid+0x1db/0x2d0
[   12.215415]  ? kmalloc_memmove_invalid_size+0x16f/0x330
[   12.215454]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.215476]  ? kmalloc_memmove_invalid_size+0x16f/0x330
[   12.215501]  kasan_report+0x141/0x180
[   12.215522]  ? kmalloc_memmove_invalid_size+0x16f/0x330
[   12.215561]  kasan_check_range+0x10c/0x1c0
[   12.215584]  __asan_memmove+0x27/0x70
[   12.215603]  kmalloc_memmove_invalid_size+0x16f/0x330
[   12.215628]  ? __pfx_kmalloc_memmove_invalid_size+0x10/0x10
[   12.215654]  ? __schedule+0x10cc/0x2b60
[   12.215677]  ? __pfx_read_tsc+0x10/0x10
[   12.215697]  ? ktime_get_ts64+0x86/0x230
[   12.215722]  kunit_try_run_case+0x1a5/0x480
[   12.215746]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.215767]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.215790]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.215813]  ? __kthread_parkme+0x82/0x180
[   12.215833]  ? preempt_count_sub+0x50/0x80
[   12.215856]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.215880]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.215903]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.215926]  kthread+0x337/0x6f0
[   12.215944]  ? trace_preempt_on+0x20/0xc0
[   12.215968]  ? __pfx_kthread+0x10/0x10
[   12.215987]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.216008]  ? calculate_sigpending+0x7b/0xa0
[   12.216031]  ? __pfx_kthread+0x10/0x10
[   12.216052]  ret_from_fork+0x116/0x1d0
[   12.216069]  ? __pfx_kthread+0x10/0x10
[   12.216088]  ret_from_fork_asm+0x1a/0x30
[   12.216120]  </TASK>
[   12.216129] 
[   12.231128] Allocated by task 200:
[   12.231312]  kasan_save_stack+0x45/0x70
[   12.231841]  kasan_save_track+0x18/0x40
[   12.232221]  kasan_save_alloc_info+0x3b/0x50
[   12.232483]  __kasan_kmalloc+0xb7/0xc0
[   12.232649]  __kmalloc_cache_noprof+0x189/0x420
[   12.233071]  kmalloc_memmove_invalid_size+0xac/0x330
[   12.233343]  kunit_try_run_case+0x1a5/0x480
[   12.233835]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.234198]  kthread+0x337/0x6f0
[   12.234334]  ret_from_fork+0x116/0x1d0
[   12.234544]  ret_from_fork_asm+0x1a/0x30
[   12.234737] 
[   12.234826] The buggy address belongs to the object at ffff8881026d7f00
[   12.234826]  which belongs to the cache kmalloc-64 of size 64
[   12.235336] The buggy address is located 4 bytes inside of
[   12.235336]  allocated 64-byte region [ffff8881026d7f00, ffff8881026d7f40)
[   12.236830] 
[   12.237144] The buggy address belongs to the physical page:
[   12.237960] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d7
[   12.238214] flags: 0x200000000000000(node=0|zone=2)
[   12.238383] page_type: f5(slab)
[   12.238976] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   12.239862] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   12.240759] page dumped because: kasan: bad access detected
[   12.241418] 
[   12.241520] Memory state around the buggy address:
[   12.242170]  ffff8881026d7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   12.242973]  ffff8881026d7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   12.243539] >ffff8881026d7f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   12.244052]                                            ^
[   12.244226]  ffff8881026d7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.244504]  ffff8881026d8000: 00 00 00 00 00 00 00 fc fc fc fc 00 00 00 00 00
[   12.245196] ==================================================================

[   12.404157] ==================================================================
[   12.404655] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x16f/0x330
[   12.404930] Read of size 64 at addr ffff8881029b2c84 by task kunit_try_catch/199
[   12.405314] 
[   12.405440] CPU: 0 UID: 0 PID: 199 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.405489] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.405500] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.405521] Call Trace:
[   12.405535]  <TASK>
[   12.405553]  dump_stack_lvl+0x73/0xb0
[   12.405586]  print_report+0xd1/0x610
[   12.405610]  ? __virt_addr_valid+0x1db/0x2d0
[   12.405634]  ? kmalloc_memmove_invalid_size+0x16f/0x330
[   12.405660]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.405682]  ? kmalloc_memmove_invalid_size+0x16f/0x330
[   12.405706]  kasan_report+0x141/0x180
[   12.405727]  ? kmalloc_memmove_invalid_size+0x16f/0x330
[   12.405768]  kasan_check_range+0x10c/0x1c0
[   12.405791]  __asan_memmove+0x27/0x70
[   12.405810]  kmalloc_memmove_invalid_size+0x16f/0x330
[   12.405834]  ? __pfx_kmalloc_memmove_invalid_size+0x10/0x10
[   12.405859]  ? __schedule+0x10cc/0x2b60
[   12.405881]  ? __pfx_read_tsc+0x10/0x10
[   12.405902]  ? ktime_get_ts64+0x86/0x230
[   12.405927]  kunit_try_run_case+0x1a5/0x480
[   12.405953]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.405974]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.405998]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.406035]  ? __kthread_parkme+0x82/0x180
[   12.406056]  ? preempt_count_sub+0x50/0x80
[   12.406079]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.406103]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.406126]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.406150]  kthread+0x337/0x6f0
[   12.406169]  ? trace_preempt_on+0x20/0xc0
[   12.406191]  ? __pfx_kthread+0x10/0x10
[   12.406211]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.406231]  ? calculate_sigpending+0x7b/0xa0
[   12.406256]  ? __pfx_kthread+0x10/0x10
[   12.406276]  ret_from_fork+0x116/0x1d0
[   12.406294]  ? __pfx_kthread+0x10/0x10
[   12.406314]  ret_from_fork_asm+0x1a/0x30
[   12.406344]  </TASK>
[   12.406355] 
[   12.414098] Allocated by task 199:
[   12.414305]  kasan_save_stack+0x45/0x70
[   12.414718]  kasan_save_track+0x18/0x40
[   12.414902]  kasan_save_alloc_info+0x3b/0x50
[   12.415437]  __kasan_kmalloc+0xb7/0xc0
[   12.415642]  __kmalloc_cache_noprof+0x189/0x420
[   12.415841]  kmalloc_memmove_invalid_size+0xac/0x330
[   12.416106]  kunit_try_run_case+0x1a5/0x480
[   12.416306]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.416568]  kthread+0x337/0x6f0
[   12.416710]  ret_from_fork+0x116/0x1d0
[   12.416869]  ret_from_fork_asm+0x1a/0x30
[   12.417163] 
[   12.417266] The buggy address belongs to the object at ffff8881029b2c80
[   12.417266]  which belongs to the cache kmalloc-64 of size 64
[   12.417743] The buggy address is located 4 bytes inside of
[   12.417743]  allocated 64-byte region [ffff8881029b2c80, ffff8881029b2cc0)
[   12.418227] 
[   12.418384] The buggy address belongs to the physical page:
[   12.418753] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b2
[   12.419210] flags: 0x200000000000000(node=0|zone=2)
[   12.419418] page_type: f5(slab)
[   12.419865] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   12.420232] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   12.420511] page dumped because: kasan: bad access detected
[   12.420681] 
[   12.420750] Memory state around the buggy address:
[   12.420914]  ffff8881029b2b80: 00 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc
[   12.421142]  ffff8881029b2c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   12.421455] >ffff8881029b2c80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   12.421832]                                            ^
[   12.422150]  ffff8881029b2d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.422384]  ffff8881029b2d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.422966] ==================================================================