Date
July 23, 2025, 3:10 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 30.483423] ================================================================== [ 30.483823] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0 [ 30.483919] Read of size 18446744073709551614 at addr fff00000ffebe004 by task kunit_try_catch/213 [ 30.484268] [ 30.484352] CPU: 0 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 30.484682] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.484841] Hardware name: linux,dummy-virt (DT) [ 30.484986] Call trace: [ 30.485014] show_stack+0x20/0x38 (C) [ 30.485068] dump_stack_lvl+0x8c/0xd0 [ 30.485262] print_report+0x118/0x5e8 [ 30.485414] kasan_report+0xdc/0x128 [ 30.485569] kasan_check_range+0x100/0x1a8 [ 30.485640] __asan_memmove+0x3c/0x98 [ 30.486045] kmalloc_memmove_negative_size+0x154/0x2e0 [ 30.486166] kunit_try_run_case+0x170/0x3f0 [ 30.486293] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.486538] kthread+0x328/0x630 [ 30.486798] ret_from_fork+0x10/0x20 [ 30.487151] [ 30.487197] Allocated by task 2846403498: [ 30.487723] ------------[ cut here ]------------ [ 30.487945] pool index 44973 out of bounds (219) for stack id adacafae [ 30.491715] WARNING: lib/stackdepot.c:500 at depot_fetch_stack+0x68/0x88, CPU#0: kunit_try_catch/213 [ 31.038074] Modules linked in: [ 31.039604] CPU: 0 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 31.040876] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.041532] Hardware name: linux,dummy-virt (DT) [ 31.042293] pstate: 614000c9 (nZCv daIF +PAN -UAO -TCO +DIT -SSBS BTYPE=--) [ 31.043298] pc : depot_fetch_stack+0x68/0x88 [ 31.043998] lr : depot_fetch_stack+0x68/0x88 [ 31.044662] sp : ffff8000809c7a20 [ 31.045263] x29: ffff8000809c7a20 x28: ffff91bcfe190000 x27: 1ffff00010010f61 [ 31.046414] x26: 1ffff00010010f60 x25: 0000000000000000 x24: ffff91bcf6f7f6c4 [ 31.047408] x23: ffffc1ffc3ffaf80 x22: ffff91bcfbaa5360 x21: ffff91bcfbaa86c0 [ 31.048298] x20: fff00000ffebe004 x19: ffff8000809c7b30 x18: 00000000f558d2a4 [ 31.048663] x17: 000000006a14b336 x16: 00000000f1f1f1f1 x15: 0000000000000007 [ 31.049017] x14: 0000000000000000 x13: 0000000000000007 x12: ffff700010138ea1 [ 31.049358] x11: 1ffff00010138ea0 x10: ffff700010138ea0 x9 : ffff91bcf68f11ec [ 31.049748] x8 : ffff8000809c7507 x7 : 0000000000000001 x6 : ffff700010138ea0 [ 31.050936] x5 : ffff8000809c7500 x4 : 1ffe000019367289 x3 : dfff800000000000 [ 31.052016] x2 : 0000000000000000 x1 : 0000000000000000 x0 : fff00000c9b39440 [ 31.052948] Call trace: [ 31.053121] depot_fetch_stack+0x68/0x88 (P) [ 31.053343] stack_depot_print+0x24/0x60 [ 31.053535] print_report+0x5dc/0x5e8 [ 31.053720] kasan_report+0xdc/0x128 [ 31.054304] kasan_check_range+0x100/0x1a8 [ 31.054867] __asan_memmove+0x3c/0x98 [ 31.055465] kmalloc_memmove_negative_size+0x154/0x2e0 [ 31.056305] kunit_try_run_case+0x170/0x3f0 [ 31.056840] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.057663] kthread+0x328/0x630 [ 31.058210] ret_from_fork+0x10/0x20 [ 31.058841] ---[ end trace 0000000000000000 ]--- [ 31.059815] ------------[ cut here ]------------ [ 31.059875] corrupt handle or use after stack_depot_put() [ 31.060163] WARNING: lib/stackdepot.c:772 at stack_depot_print+0x54/0x60, CPU#0: kunit_try_catch/213 [ 31.062284] Modules linked in: [ 31.062505] CPU: 0 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 31.063232] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 31.063976] Hardware name: linux,dummy-virt (DT) [ 31.064668] pstate: 614000c9 (nZCv daIF +PAN -UAO -TCO +DIT -SSBS BTYPE=--) [ 31.065618] pc : stack_depot_print+0x54/0x60 [ 31.066265] lr : stack_depot_print+0x54/0x60 [ 31.066913] sp : ffff8000809c7a30 [ 31.067507] x29: ffff8000809c7a30 x28: ffff91bcfe190000 x27: 1ffff00010010f61 [ 31.068344] x26: 1ffff00010010f60 x25: 0000000000000000 x24: ffff91bcf6f7f6c4 [ 31.068714] x23: ffffc1ffc3ffaf80 x22: ffff91bcfbaa5360 x21: ffff91bcfbaa86c0 [ 31.069803] x20: fff00000ffebe004 x19: ffff8000809c7b30 x18: 00000000f558d2a4 [ 31.070936] x17: 000000006a14b336 x16: 00000000f1f1f1f1 x15: 00000000f3f3f3f3 [ 31.071974] x14: ffff700010138f26 x13: 1ffe000019367289 x12: ffff72379fb15509 [ 31.073015] x11: 1ffff2379fb15508 x10: ffff72379fb15508 x9 : ffff91bcf68f11ec [ 31.073771] x8 : ffff91bcfd8aa843 x7 : 0000000000000001 x6 : ffff72379fb15508 [ 31.074152] x5 : ffff91bcfd8aa840 x4 : 1ffe000019367289 x3 : dfff800000000000 [ 31.074509] x2 : 0000000000000000 x1 : 0000000000000000 x0 : fff00000c9b39440 [ 31.074857] Call trace: [ 31.075526] stack_depot_print+0x54/0x60 (P) [ 31.076478] print_report+0x5dc/0x5e8 [ 31.077040] kasan_report+0xdc/0x128 [ 31.077631] kasan_check_range+0x100/0x1a8 [ 31.078338] __asan_memmove+0x3c/0x98 [ 31.078949] kmalloc_memmove_negative_size+0x154/0x2e0 [ 31.079728] kunit_try_run_case+0x170/0x3f0 [ 31.080373] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.081185] kthread+0x328/0x630 [ 31.081717] ret_from_fork+0x10/0x20 [ 31.082170] ---[ end trace 0000000000000000 ]--- [ 31.082494] [ 31.082528] Last potentially related work creation: [ 31.082567] ------------[ cut here ]------------ [ 31.082591] pool index 43945 out of bounds (219) for stack id a9a8abaa [ 31.082694] WARNING: lib/stackdepot.c:500 at depot_fetch_stack+0x68/0x88, CPU#0: kunit_try_catch/213 [ 31.083950] Modules linked in: [ 31.084192] CPU: 0 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 31.084727] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 31.084985] Hardware name: linux,dummy-virt (DT) [ 31.085246] pstate: 614000c9 (nZCv daIF +PAN -UAO -TCO +DIT -SSBS BTYPE=--) [ 31.085612] pc : depot_fetch_stack+0x68/0x88 [ 31.085871] lr : depot_fetch_stack+0x68/0x88 [ 31.086092] sp : ffff8000809c7a00 [ 31.086285] x29: ffff8000809c7a00 x28: ffff91bcfe190000 x27: 1ffff00010010f61 [ 31.086748] x26: 1ffff00010010f60 x25: 0000000000000000 x24: ffff91bcf6f7f6c4 [ 31.087160] x23: ffffc1ffc3ffaf80 x22: ffff91bcfbaa5360 x21: ffff91bcfbaa86c0 [ 31.087574] x20: fff00000ffebe004 x19: fff00000ffebe040 x18: 00000000f558d2a4 [ 31.088012] x17: 000000006a14b336 x16: 00000000f1f1f1f1 x15: 0000000000000007 [ 31.088416] x14: 0000000000000000 x13: 0000000000000007 x12: ffff72379fb15509 [ 31.088828] x11: 1ffff2379fb15508 x10: ffff72379fb15508 x9 : ffff91bcf68f11ec [ 31.089235] x8 : ffff91bcfd8aa843 x7 : 0000000000000001 x6 : ffff72379fb15508 [ 31.089664] x5 : ffff91bcfd8aa840 x4 : 1ffe000019367289 x3 : dfff800000000000 [ 31.090081] x2 : 0000000000000000 x1 : 0000000000000000 x0 : fff00000c9b39440 [ 31.090538] Call trace: [ 31.090684] depot_fetch_stack+0x68/0x88 (P) [ 31.090971] stack_depot_print+0x24/0x60 [ 31.091228] kasan_print_aux_stacks+0x50/0x98 [ 31.091480] print_report+0x348/0x5e8 [ 31.091737] kasan_report+0xdc/0x128 [ 31.091974] kasan_check_range+0x100/0x1a8 [ 31.092195] __asan_memmove+0x3c/0x98 [ 31.092436] kmalloc_memmove_negative_size+0x154/0x2e0 [ 31.092721] kunit_try_run_case+0x170/0x3f0 [ 31.092966] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.093278] kthread+0x328/0x630 [ 31.093490] ret_from_fork+0x10/0x20 [ 31.093692] ---[ end trace 0000000000000000 ]--- [ 31.093946] ------------[ cut here ]------------ [ 31.093974] corrupt handle or use after stack_depot_put() [ 31.094060] WARNING: lib/stackdepot.c:772 at stack_depot_print+0x54/0x60, CPU#0: kunit_try_catch/213 [ 31.095024] Modules linked in: [ 31.095269] CPU: 0 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 31.095817] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 31.096059] Hardware name: linux,dummy-virt (DT) [ 31.096330] pstate: 614000c9 (nZCv daIF +PAN -UAO -TCO +DIT -SSBS BTYPE=--) [ 31.096688] pc : stack_depot_print+0x54/0x60 [ 31.096973] lr : stack_depot_print+0x54/0x60 [ 31.097211] sp : ffff8000809c7a10 [ 31.097421] x29: ffff8000809c7a10 x28: ffff91bcfe190000 x27: 1ffff00010010f61 [ 31.097848] x26: 1ffff00010010f60 x25: 0000000000000000 x24: ffff91bcf6f7f6c4 [ 31.098277] x23: ffffc1ffc3ffaf80 x22: ffff91bcfbaa5360 x21: ffff91bcfbaa86c0 [ 31.098691] x20: fff00000ffebe004 x19: fff00000ffebe040 x18: 00000000f558d2a4 [ 31.099106] x17: 000000006a14b336 x16: 00000000f1f1f1f1 x15: 00000000f3f3f3f3 [ 31.099568] x14: ffff700010138f22 x13: 1ffe000019367289 x12: ffff72379fb15509 [ 31.100027] x11: 1ffff2379fb15508 x10: ffff72379fb15508 x9 : ffff91bcf68f11ec [ 31.100451] x8 : ffff91bcfd8aa843 x7 : 0000000000000001 x6 : ffff72379fb15508 [ 31.100865] x5 : ffff91bcfd8aa840 x4 : 1ffe000019367289 x3 : dfff800000000000 [ 31.101288] x2 : 0000000000000000 x1 : 0000000000000000 x0 : fff00000c9b39440 [ 31.101697] Call trace: [ 31.101870] stack_depot_print+0x54/0x60 (P) [ 31.102138] kasan_print_aux_stacks+0x50/0x98 [ 31.102403] print_report+0x348/0x5e8 [ 31.102650] kasan_report+0xdc/0x128 [ 31.102863] kasan_check_range+0x100/0x1a8 [ 31.103133] __asan_memmove+0x3c/0x98 [ 31.103363] kmalloc_memmove_negative_size+0x154/0x2e0 [ 31.103670] kunit_try_run_case+0x170/0x3f0 [ 31.103944] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.104251] kthread+0x328/0x630 [ 31.104447] ret_from_fork+0x10/0x20 [ 31.104695] ---[ end trace 0000000000000000 ]--- [ 31.104988] [ 31.105030] Second to last potentially related work creation: [ 31.105069] ------------[ cut here ]------------ [ 31.105094] pool index 44973 out of bounds (219) for stack id adacafae [ 31.105200] WARNING: lib/stackdepot.c:500 at depot_fetch_stack+0x68/0x88, CPU#0: kunit_try_catch/213 [ 31.106545] Modules linked in: [ 31.106796] CPU: 0 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 31.107355] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 31.107600] Hardware name: linux,dummy-virt (DT) [ 31.107873] pstate: 614000c9 (nZCv daIF +PAN -UAO -TCO +DIT -SSBS BTYPE=--) [ 31.108204] pc : depot_fetch_stack+0x68/0x88 [ 31.108472] lr : depot_fetch_stack+0x68/0x88 [ 31.108735] sp : ffff8000809c7a00 [ 31.108942] x29: ffff8000809c7a00 x28: ffff91bcfe190000 x27: 1ffff00010010f61 [ 31.109369] x26: 1ffff00010010f60 x25: 0000000000000000 x24: ffff91bcf6f7f6c4 [ 31.109756] x23: ffffc1ffc3ffaf80 x22: ffff91bcfbaa5360 x21: ffff91bcfbaa86c0 [ 31.110151] x20: fff00000ffebe004 x19: fff00000ffebe040 x18: 00000000f558d2a4 [ 31.110607] x17: 000000006a14b336 x16: 00000000f1f1f1f1 x15: 0000000000000007 [ 31.111046] x14: 0000000000000000 x13: 0000000000000007 x12: ffff72379fb15509 [ 31.111473] x11: 1ffff2379fb15508 x10: ffff72379fb15508 x9 : ffff91bcf68f11ec [ 31.111889] x8 : ffff91bcfd8aa843 x7 : 0000000000000001 x6 : ffff72379fb15508 [ 31.112318] x5 : ffff91bcfd8aa840 x4 : 1ffe000019367289 x3 : dfff800000000000 [ 31.112709] x2 : 0000000000000000 x1 : 0000000000000000 x0 : fff00000c9b39440 [ 31.113158] Call trace: [ 31.113323] depot_fetch_stack+0x68/0x88 (P) [ 31.113598] stack_depot_print+0x24/0x60 [ 31.113802] kasan_print_aux_stacks+0x78/0x98 [ 31.114090] print_report+0x348/0x5e8 [ 31.114282] kasan_report+0xdc/0x128 [ 31.114530] kasan_check_range+0x100/0x1a8 [ 31.114767] __asan_memmove+0x3c/0x98 [ 31.115022] kmalloc_memmove_negative_size+0x154/0x2e0 [ 31.115299] kunit_try_run_case+0x170/0x3f0 [ 31.115544] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.115856] kthread+0x328/0x630 [ 31.116091] ret_from_fork+0x10/0x20 [ 31.116294] ---[ end trace 0000000000000000 ]--- [ 31.116576] ------------[ cut here ]------------ [ 31.116607] corrupt handle or use after stack_depot_put() [ 31.116697] WARNING: lib/stackdepot.c:772 at stack_depot_print+0x54/0x60, CPU#0: kunit_try_catch/213 [ 31.117618] Modules linked in: [ 31.117859] CPU: 0 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250723 #1 PREEMPT [ 31.118426] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 31.118675] Hardware name: linux,dummy-virt (DT) [ 31.118954] pstate: 614000c9 (nZCv daIF +PAN -UAO -TCO +DIT -SSBS BTYPE=--) [ 31.119309] pc : stack_depot_print+0x54/0x60 [ 31.119565] lr : stack_depot_print+0x54/0x60 [ 31.119811] sp : ffff8000809c7a10 [ 31.120007] x29: ffff8000809c7a10 x28: ffff91bcfe190000 x27: 1ffff00010010f61 [ 31.120417] x26: 1ffff00010010f60 x25: 0000000000000000 x24: ffff91bcf6f7f6c4 [ 31.120869] x23: ffffc1ffc3ffaf80 x22: ffff91bcfbaa5360 x21: ffff91bcfbaa86c0 [ 31.121254] x20: fff00000ffebe004 x19: fff00000ffebe040 x18: 00000000f558d2a4 [ 31.121715] x17: 000000006a14b336 x16: 00000000f1f1f1f1 x15: 00000000f3f3f3f3 [ 31.122178] x14: ffff700010138f22 x13: 1ffe000019367289 x12: ffff72379fb15509 [ 31.122609] x11: 1ffff2379fb15508 x10: ffff72379fb15508 x9 : ffff91bcf68f11ec [ 31.123035] x8 : ffff91bcfd8aa843 x7 : 0000000000000001 x6 : ffff72379fb15508 [ 31.123444] x5 : ffff91bcfd8aa840 x4 : 1ffe000019367289 x3 : dfff800000000000 [ 31.123853] x2 : 0000000000000000 x1 : 0000000000000000 x0 : fff00000c9b39440 [ 31.124268] Call trace: [ 31.124439] stack_depot_print+0x54/0x60 (P) [ 31.124694] kasan_print_aux_stacks+0x78/0x98 [ 31.124957] print_report+0x348/0x5e8 [ 31.125189] kasan_report+0xdc/0x128 [ 31.125407] kasan_check_range+0x100/0x1a8 [ 31.125690] __asan_memmove+0x3c/0x98 [ 31.125928] kmalloc_memmove_negative_size+0x154/0x2e0 [ 31.126221] kunit_try_run_case+0x170/0x3f0 [ 31.126470] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.126794] kthread+0x328/0x630 [ 31.127006] ret_from_fork+0x10/0x20 [ 31.127254] ---[ end trace 0000000000000000 ]--- [ 31.127569] [ 31.127612] The buggy address belongs to the object at fff00000ffebe000 [ 31.127612] which belongs to the cache kmalloc-64 of size 64 [ 31.127676] The buggy address is located 4 bytes inside of [ 31.127676] 64-byte region [fff00000ffebe000, fff00000ffebe040) [ 31.127735] [ 31.127760] The buggy address belongs to the physical page: [ 31.127799] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x13febe [ 31.127863] memcg:fff00000d9d43e71 [ 31.127892] flags: 0xbfffe0000002000(reserved|node=0|zone=2|lastcpupid=0x1ffff) [ 31.127968] page_type: f5(slab) [ 31.128009] raw: 0bfffe0000002000 fff00000c00018c0 ffffc1ffc3ffaf88 0000000000000000 [ 31.128061] raw: 0000000000000000 0000000000010000 00000001f5000000 fff00000d9d43e71 [ 31.128102] page dumped because: kasan: bad access detected [ 31.128131] [ 31.128151] Memory state around the buggy address: [ 31.128185] fff00000ffebdf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.128229] fff00000ffebdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.128272] >fff00000ffebe000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.128310] ^ [ 31.128343] fff00000ffebe080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.128385] fff00000ffebe100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.128427] ==================================================================
[ 25.361347] ================================================================== [ 25.361838] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x171/0x330 [ 25.362235] Read of size 18446744073709551614 at addr ffff888104793d04 by task kunit_try_catch/229 [ 25.362750] [ 25.362860] CPU: 1 UID: 0 PID: 229 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250723 #1 PREEMPT(voluntary) [ 25.362915] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.362927] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.363192] Call Trace: [ 25.363214] <TASK> [ 25.363234] dump_stack_lvl+0x73/0xb0 [ 25.363283] print_report+0xd1/0x640 [ 25.363307] ? __virt_addr_valid+0x1db/0x2d0 [ 25.363333] ? kmalloc_memmove_negative_size+0x171/0x330 [ 25.363359] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.363409] ? kmalloc_memmove_negative_size+0x171/0x330 [ 25.363456] kasan_report+0x141/0x180 [ 25.363479] ? kmalloc_memmove_negative_size+0x171/0x330 [ 25.363508] kasan_check_range+0x10c/0x1c0 [ 25.363670] __asan_memmove+0x27/0x70 [ 25.363701] kmalloc_memmove_negative_size+0x171/0x330 [ 25.363836] ? __pfx_kmalloc_memmove_negative_size+0x10/0x10 [ 25.363864] ? __schedule+0x10da/0x2b60 [ 25.363892] ? __pfx_read_tsc+0x10/0x10 [ 25.363915] ? ktime_get_ts64+0x86/0x230 [ 25.363941] kunit_try_run_case+0x1a5/0x480 [ 25.363968] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.363990] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.364015] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.364040] ? __kthread_parkme+0x82/0x180 [ 25.364061] ? preempt_count_sub+0x50/0x80 [ 25.364084] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.364108] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.364132] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.364169] kthread+0x337/0x6f0 [ 25.364190] ? trace_preempt_on+0x20/0xc0 [ 25.364215] ? __pfx_kthread+0x10/0x10 [ 25.364235] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.364258] ? calculate_sigpending+0x7b/0xa0 [ 25.364283] ? __pfx_kthread+0x10/0x10 [ 25.364304] ret_from_fork+0x116/0x1d0 [ 25.364325] ? __pfx_kthread+0x10/0x10 [ 25.364346] ret_from_fork_asm+0x1a/0x30 [ 25.364378] </TASK> [ 25.364392] [ 25.374207] Allocated by task 229: [ 25.374533] kasan_save_stack+0x45/0x70 [ 25.374887] kasan_save_track+0x18/0x40 [ 25.375283] kasan_save_alloc_info+0x3b/0x50 [ 25.376122] __kasan_kmalloc+0xb7/0xc0 [ 25.376549] __kmalloc_cache_noprof+0x189/0x420 [ 25.377040] kmalloc_memmove_negative_size+0xac/0x330 [ 25.377642] kunit_try_run_case+0x1a5/0x480 [ 25.378133] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.378707] kthread+0x337/0x6f0 [ 25.379023] ret_from_fork+0x116/0x1d0 [ 25.379529] ret_from_fork_asm+0x1a/0x30 [ 25.380028] [ 25.380485] The buggy address belongs to the object at ffff888104793d00 [ 25.380485] which belongs to the cache kmalloc-64 of size 64 [ 25.381630] The buggy address is located 4 bytes inside of [ 25.381630] 64-byte region [ffff888104793d00, ffff888104793d40) [ 25.382292] [ 25.382453] The buggy address belongs to the physical page: [ 25.382918] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104793 [ 25.383178] flags: 0x200000000000000(node=0|zone=2) [ 25.383340] page_type: f5(slab) [ 25.383796] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.384592] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.385352] page dumped because: kasan: bad access detected [ 25.385915] [ 25.386080] Memory state around the buggy address: [ 25.386563] ffff888104793c00: 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc fc [ 25.386890] ffff888104793c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.387479] >ffff888104793d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 25.388260] ^ [ 25.388405] ffff888104793d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.389088] ffff888104793e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.389726] ==================================================================