Date
July 18, 2025, 2:09 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 17.122371] ================================================================== [ 17.122484] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x154/0x2e0 [ 17.122567] Read of size 64 at addr fff00000c6c74604 by task kunit_try_catch/182 [ 17.122618] [ 17.122665] CPU: 0 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 17.122752] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.122779] Hardware name: linux,dummy-virt (DT) [ 17.122812] Call trace: [ 17.122838] show_stack+0x20/0x38 (C) [ 17.122909] dump_stack_lvl+0x8c/0xd0 [ 17.122961] print_report+0x118/0x5d0 [ 17.123008] kasan_report+0xdc/0x128 [ 17.123052] kasan_check_range+0x100/0x1a8 [ 17.123099] __asan_memmove+0x3c/0x98 [ 17.123142] kmalloc_memmove_invalid_size+0x154/0x2e0 [ 17.123189] kunit_try_run_case+0x170/0x3f0 [ 17.123237] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.123289] kthread+0x328/0x630 [ 17.123354] ret_from_fork+0x10/0x20 [ 17.123406] [ 17.123424] Allocated by task 182: [ 17.123484] kasan_save_stack+0x3c/0x68 [ 17.123529] kasan_save_track+0x20/0x40 [ 17.123566] kasan_save_alloc_info+0x40/0x58 [ 17.123606] __kasan_kmalloc+0xd4/0xd8 [ 17.123641] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.123682] kmalloc_memmove_invalid_size+0xb0/0x2e0 [ 17.123723] kunit_try_run_case+0x170/0x3f0 [ 17.123761] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.123804] kthread+0x328/0x630 [ 17.123835] ret_from_fork+0x10/0x20 [ 17.123882] [ 17.123902] The buggy address belongs to the object at fff00000c6c74600 [ 17.123902] which belongs to the cache kmalloc-64 of size 64 [ 17.123961] The buggy address is located 4 bytes inside of [ 17.123961] allocated 64-byte region [fff00000c6c74600, fff00000c6c74640) [ 17.124021] [ 17.124044] The buggy address belongs to the physical page: [ 17.124079] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106c74 [ 17.124135] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.124188] page_type: f5(slab) [ 17.124232] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 17.124283] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 17.124325] page dumped because: kasan: bad access detected [ 17.124357] [ 17.124375] Memory state around the buggy address: [ 17.124409] fff00000c6c74500: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 17.124452] fff00000c6c74580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 17.124494] >fff00000c6c74600: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 17.124532] ^ [ 17.124564] fff00000c6c74680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.124605] fff00000c6c74700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.124643] ==================================================================
[ 16.746860] ================================================================== [ 16.746985] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x154/0x2e0 [ 16.747088] Read of size 64 at addr fff00000c7951184 by task kunit_try_catch/182 [ 16.747490] [ 16.747577] CPU: 1 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 16.747665] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.747692] Hardware name: linux,dummy-virt (DT) [ 16.747794] Call trace: [ 16.747862] show_stack+0x20/0x38 (C) [ 16.747936] dump_stack_lvl+0x8c/0xd0 [ 16.748034] print_report+0x118/0x5d0 [ 16.748083] kasan_report+0xdc/0x128 [ 16.748127] kasan_check_range+0x100/0x1a8 [ 16.748332] __asan_memmove+0x3c/0x98 [ 16.748532] kmalloc_memmove_invalid_size+0x154/0x2e0 [ 16.748604] kunit_try_run_case+0x170/0x3f0 [ 16.748744] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.748873] kthread+0x328/0x630 [ 16.748978] ret_from_fork+0x10/0x20 [ 16.749027] [ 16.749046] Allocated by task 182: [ 16.749100] kasan_save_stack+0x3c/0x68 [ 16.749144] kasan_save_track+0x20/0x40 [ 16.749362] kasan_save_alloc_info+0x40/0x58 [ 16.749546] __kasan_kmalloc+0xd4/0xd8 [ 16.749614] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.749725] kmalloc_memmove_invalid_size+0xb0/0x2e0 [ 16.749835] kunit_try_run_case+0x170/0x3f0 [ 16.749955] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.750082] kthread+0x328/0x630 [ 16.750131] ret_from_fork+0x10/0x20 [ 16.750168] [ 16.750536] The buggy address belongs to the object at fff00000c7951180 [ 16.750536] which belongs to the cache kmalloc-64 of size 64 [ 16.750667] The buggy address is located 4 bytes inside of [ 16.750667] allocated 64-byte region [fff00000c7951180, fff00000c79511c0) [ 16.750730] [ 16.750757] The buggy address belongs to the physical page: [ 16.750800] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107951 [ 16.750871] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.750930] page_type: f5(slab) [ 16.750977] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 16.751034] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.751076] page dumped because: kasan: bad access detected [ 16.751107] [ 16.751125] Memory state around the buggy address: [ 16.751170] fff00000c7951080: 00 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc [ 16.751232] fff00000c7951100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.751280] >fff00000c7951180: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 16.751348] ^ [ 16.751383] fff00000c7951200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.751434] fff00000c7951280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.751471] ==================================================================
[ 16.777964] ================================================================== [ 16.778025] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x154/0x2e0 [ 16.778117] Read of size 64 at addr fff00000c771ad84 by task kunit_try_catch/182 [ 16.778168] [ 16.778217] CPU: 0 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 16.778299] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.778326] Hardware name: linux,dummy-virt (DT) [ 16.778374] Call trace: [ 16.778398] show_stack+0x20/0x38 (C) [ 16.778522] dump_stack_lvl+0x8c/0xd0 [ 16.778691] print_report+0x118/0x5d0 [ 16.778799] kasan_report+0xdc/0x128 [ 16.778855] kasan_check_range+0x100/0x1a8 [ 16.778956] __asan_memmove+0x3c/0x98 [ 16.779011] kmalloc_memmove_invalid_size+0x154/0x2e0 [ 16.779059] kunit_try_run_case+0x170/0x3f0 [ 16.779106] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.779158] kthread+0x328/0x630 [ 16.779198] ret_from_fork+0x10/0x20 [ 16.779245] [ 16.779263] Allocated by task 182: [ 16.779291] kasan_save_stack+0x3c/0x68 [ 16.779333] kasan_save_track+0x20/0x40 [ 16.779507] kasan_save_alloc_info+0x40/0x58 [ 16.779554] __kasan_kmalloc+0xd4/0xd8 [ 16.779672] __kmalloc_cache_noprof+0x16c/0x3c0 [ 16.779780] kmalloc_memmove_invalid_size+0xb0/0x2e0 [ 16.779844] kunit_try_run_case+0x170/0x3f0 [ 16.779882] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 16.779931] kthread+0x328/0x630 [ 16.779963] ret_from_fork+0x10/0x20 [ 16.780000] [ 16.780019] The buggy address belongs to the object at fff00000c771ad80 [ 16.780019] which belongs to the cache kmalloc-64 of size 64 [ 16.780096] The buggy address is located 4 bytes inside of [ 16.780096] allocated 64-byte region [fff00000c771ad80, fff00000c771adc0) [ 16.780157] [ 16.780184] The buggy address belongs to the physical page: [ 16.780215] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10771a [ 16.780265] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 16.780312] page_type: f5(slab) [ 16.780350] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 16.780399] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.780441] page dumped because: kasan: bad access detected [ 16.780472] [ 16.780489] Memory state around the buggy address: [ 16.780521] fff00000c771ac80: 00 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc [ 16.780564] fff00000c771ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.780627] >fff00000c771ad80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 16.780664] ^ [ 16.780697] fff00000c771ae00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.780749] fff00000c771ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.780787] ==================================================================
[ 12.463821] ================================================================== [ 12.464360] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x16f/0x330 [ 12.464685] Read of size 64 at addr ffff888102e2d784 by task kunit_try_catch/199 [ 12.465161] [ 12.465280] CPU: 0 UID: 0 PID: 199 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 12.465327] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.465338] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.465359] Call Trace: [ 12.465370] <TASK> [ 12.465387] dump_stack_lvl+0x73/0xb0 [ 12.465416] print_report+0xd1/0x610 [ 12.465439] ? __virt_addr_valid+0x1db/0x2d0 [ 12.465462] ? kmalloc_memmove_invalid_size+0x16f/0x330 [ 12.465487] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.465509] ? kmalloc_memmove_invalid_size+0x16f/0x330 [ 12.465533] kasan_report+0x141/0x180 [ 12.465556] ? kmalloc_memmove_invalid_size+0x16f/0x330 [ 12.465586] kasan_check_range+0x10c/0x1c0 [ 12.465609] __asan_memmove+0x27/0x70 [ 12.465628] kmalloc_memmove_invalid_size+0x16f/0x330 [ 12.465653] ? __pfx_kmalloc_memmove_invalid_size+0x10/0x10 [ 12.465679] ? __schedule+0x10cc/0x2b60 [ 12.465701] ? __pfx_read_tsc+0x10/0x10 [ 12.465722] ? ktime_get_ts64+0x86/0x230 [ 12.465747] kunit_try_run_case+0x1a5/0x480 [ 12.465771] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.465793] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.465817] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.465840] ? __kthread_parkme+0x82/0x180 [ 12.465861] ? preempt_count_sub+0x50/0x80 [ 12.465885] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.465923] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.465947] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.465970] kthread+0x337/0x6f0 [ 12.466035] ? trace_preempt_on+0x20/0xc0 [ 12.466061] ? __pfx_kthread+0x10/0x10 [ 12.466082] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.466103] ? calculate_sigpending+0x7b/0xa0 [ 12.466127] ? __pfx_kthread+0x10/0x10 [ 12.466148] ret_from_fork+0x116/0x1d0 [ 12.466167] ? __pfx_kthread+0x10/0x10 [ 12.466187] ret_from_fork_asm+0x1a/0x30 [ 12.466219] </TASK> [ 12.466229] [ 12.473833] Allocated by task 199: [ 12.474027] kasan_save_stack+0x45/0x70 [ 12.474175] kasan_save_track+0x18/0x40 [ 12.474311] kasan_save_alloc_info+0x3b/0x50 [ 12.474462] __kasan_kmalloc+0xb7/0xc0 [ 12.474860] __kmalloc_cache_noprof+0x189/0x420 [ 12.475106] kmalloc_memmove_invalid_size+0xac/0x330 [ 12.475367] kunit_try_run_case+0x1a5/0x480 [ 12.475644] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.475913] kthread+0x337/0x6f0 [ 12.476107] ret_from_fork+0x116/0x1d0 [ 12.476297] ret_from_fork_asm+0x1a/0x30 [ 12.476475] [ 12.476635] The buggy address belongs to the object at ffff888102e2d780 [ 12.476635] which belongs to the cache kmalloc-64 of size 64 [ 12.477068] The buggy address is located 4 bytes inside of [ 12.477068] allocated 64-byte region [ffff888102e2d780, ffff888102e2d7c0) [ 12.477427] [ 12.477581] The buggy address belongs to the physical page: [ 12.477838] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102e2d [ 12.478224] flags: 0x200000000000000(node=0|zone=2) [ 12.478459] page_type: f5(slab) [ 12.478692] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 12.478948] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 12.479264] page dumped because: kasan: bad access detected [ 12.479734] [ 12.479833] Memory state around the buggy address: [ 12.480071] ffff888102e2d680: 00 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc [ 12.480406] ffff888102e2d700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 12.480770] >ffff888102e2d780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 12.481079] ^ [ 12.481250] ffff888102e2d800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.481466] ffff888102e2d880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.481827] ==================================================================
[ 12.212591] ================================================================== [ 12.213745] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x16f/0x330 [ 12.214864] Read of size 64 at addr ffff8881026d7f04 by task kunit_try_catch/200 [ 12.215146] [ 12.215237] CPU: 1 UID: 0 PID: 200 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 12.215281] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.215292] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.215312] Call Trace: [ 12.215324] <TASK> [ 12.215339] dump_stack_lvl+0x73/0xb0 [ 12.215370] print_report+0xd1/0x610 [ 12.215392] ? __virt_addr_valid+0x1db/0x2d0 [ 12.215415] ? kmalloc_memmove_invalid_size+0x16f/0x330 [ 12.215454] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.215476] ? kmalloc_memmove_invalid_size+0x16f/0x330 [ 12.215501] kasan_report+0x141/0x180 [ 12.215522] ? kmalloc_memmove_invalid_size+0x16f/0x330 [ 12.215561] kasan_check_range+0x10c/0x1c0 [ 12.215584] __asan_memmove+0x27/0x70 [ 12.215603] kmalloc_memmove_invalid_size+0x16f/0x330 [ 12.215628] ? __pfx_kmalloc_memmove_invalid_size+0x10/0x10 [ 12.215654] ? __schedule+0x10cc/0x2b60 [ 12.215677] ? __pfx_read_tsc+0x10/0x10 [ 12.215697] ? ktime_get_ts64+0x86/0x230 [ 12.215722] kunit_try_run_case+0x1a5/0x480 [ 12.215746] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.215767] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.215790] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.215813] ? __kthread_parkme+0x82/0x180 [ 12.215833] ? preempt_count_sub+0x50/0x80 [ 12.215856] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.215880] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.215903] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.215926] kthread+0x337/0x6f0 [ 12.215944] ? trace_preempt_on+0x20/0xc0 [ 12.215968] ? __pfx_kthread+0x10/0x10 [ 12.215987] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.216008] ? calculate_sigpending+0x7b/0xa0 [ 12.216031] ? __pfx_kthread+0x10/0x10 [ 12.216052] ret_from_fork+0x116/0x1d0 [ 12.216069] ? __pfx_kthread+0x10/0x10 [ 12.216088] ret_from_fork_asm+0x1a/0x30 [ 12.216120] </TASK> [ 12.216129] [ 12.231128] Allocated by task 200: [ 12.231312] kasan_save_stack+0x45/0x70 [ 12.231841] kasan_save_track+0x18/0x40 [ 12.232221] kasan_save_alloc_info+0x3b/0x50 [ 12.232483] __kasan_kmalloc+0xb7/0xc0 [ 12.232649] __kmalloc_cache_noprof+0x189/0x420 [ 12.233071] kmalloc_memmove_invalid_size+0xac/0x330 [ 12.233343] kunit_try_run_case+0x1a5/0x480 [ 12.233835] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.234198] kthread+0x337/0x6f0 [ 12.234334] ret_from_fork+0x116/0x1d0 [ 12.234544] ret_from_fork_asm+0x1a/0x30 [ 12.234737] [ 12.234826] The buggy address belongs to the object at ffff8881026d7f00 [ 12.234826] which belongs to the cache kmalloc-64 of size 64 [ 12.235336] The buggy address is located 4 bytes inside of [ 12.235336] allocated 64-byte region [ffff8881026d7f00, ffff8881026d7f40) [ 12.236830] [ 12.237144] The buggy address belongs to the physical page: [ 12.237960] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026d7 [ 12.238214] flags: 0x200000000000000(node=0|zone=2) [ 12.238383] page_type: f5(slab) [ 12.238976] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 12.239862] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 12.240759] page dumped because: kasan: bad access detected [ 12.241418] [ 12.241520] Memory state around the buggy address: [ 12.242170] ffff8881026d7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 12.242973] ffff8881026d7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 12.243539] >ffff8881026d7f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 12.244052] ^ [ 12.244226] ffff8881026d7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.244504] ffff8881026d8000: 00 00 00 00 00 00 00 fc fc fc fc 00 00 00 00 00 [ 12.245196] ==================================================================
[ 12.404157] ================================================================== [ 12.404655] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x16f/0x330 [ 12.404930] Read of size 64 at addr ffff8881029b2c84 by task kunit_try_catch/199 [ 12.405314] [ 12.405440] CPU: 0 UID: 0 PID: 199 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 12.405489] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.405500] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.405521] Call Trace: [ 12.405535] <TASK> [ 12.405553] dump_stack_lvl+0x73/0xb0 [ 12.405586] print_report+0xd1/0x610 [ 12.405610] ? __virt_addr_valid+0x1db/0x2d0 [ 12.405634] ? kmalloc_memmove_invalid_size+0x16f/0x330 [ 12.405660] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.405682] ? kmalloc_memmove_invalid_size+0x16f/0x330 [ 12.405706] kasan_report+0x141/0x180 [ 12.405727] ? kmalloc_memmove_invalid_size+0x16f/0x330 [ 12.405768] kasan_check_range+0x10c/0x1c0 [ 12.405791] __asan_memmove+0x27/0x70 [ 12.405810] kmalloc_memmove_invalid_size+0x16f/0x330 [ 12.405834] ? __pfx_kmalloc_memmove_invalid_size+0x10/0x10 [ 12.405859] ? __schedule+0x10cc/0x2b60 [ 12.405881] ? __pfx_read_tsc+0x10/0x10 [ 12.405902] ? ktime_get_ts64+0x86/0x230 [ 12.405927] kunit_try_run_case+0x1a5/0x480 [ 12.405953] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.405974] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.405998] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.406035] ? __kthread_parkme+0x82/0x180 [ 12.406056] ? preempt_count_sub+0x50/0x80 [ 12.406079] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.406103] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.406126] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.406150] kthread+0x337/0x6f0 [ 12.406169] ? trace_preempt_on+0x20/0xc0 [ 12.406191] ? __pfx_kthread+0x10/0x10 [ 12.406211] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.406231] ? calculate_sigpending+0x7b/0xa0 [ 12.406256] ? __pfx_kthread+0x10/0x10 [ 12.406276] ret_from_fork+0x116/0x1d0 [ 12.406294] ? __pfx_kthread+0x10/0x10 [ 12.406314] ret_from_fork_asm+0x1a/0x30 [ 12.406344] </TASK> [ 12.406355] [ 12.414098] Allocated by task 199: [ 12.414305] kasan_save_stack+0x45/0x70 [ 12.414718] kasan_save_track+0x18/0x40 [ 12.414902] kasan_save_alloc_info+0x3b/0x50 [ 12.415437] __kasan_kmalloc+0xb7/0xc0 [ 12.415642] __kmalloc_cache_noprof+0x189/0x420 [ 12.415841] kmalloc_memmove_invalid_size+0xac/0x330 [ 12.416106] kunit_try_run_case+0x1a5/0x480 [ 12.416306] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.416568] kthread+0x337/0x6f0 [ 12.416710] ret_from_fork+0x116/0x1d0 [ 12.416869] ret_from_fork_asm+0x1a/0x30 [ 12.417163] [ 12.417266] The buggy address belongs to the object at ffff8881029b2c80 [ 12.417266] which belongs to the cache kmalloc-64 of size 64 [ 12.417743] The buggy address is located 4 bytes inside of [ 12.417743] allocated 64-byte region [ffff8881029b2c80, ffff8881029b2cc0) [ 12.418227] [ 12.418384] The buggy address belongs to the physical page: [ 12.418753] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b2 [ 12.419210] flags: 0x200000000000000(node=0|zone=2) [ 12.419418] page_type: f5(slab) [ 12.419865] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 12.420232] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 12.420511] page dumped because: kasan: bad access detected [ 12.420681] [ 12.420750] Memory state around the buggy address: [ 12.420914] ffff8881029b2b80: 00 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc [ 12.421142] ffff8881029b2c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 12.421455] >ffff8881029b2c80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 12.421832] ^ [ 12.422150] ffff8881029b2d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.422384] ffff8881029b2d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.422966] ==================================================================