Date
July 15, 2025, 2:10 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 105.806804] ================================================================== [ 105.807684] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0xe4/0x1fc [ 105.808412] Read of size 18446744073709551614 at addr ffff0000c66f6504 by task kunit_try_catch/225 [ 105.809775] [ 105.810007] CPU: 1 PID: 225 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 105.810767] Hardware name: linux,dummy-virt (DT) [ 105.811190] Call trace: [ 105.811465] dump_backtrace+0xe0/0x134 [ 105.811931] show_stack+0x20/0x2c [ 105.812339] dump_stack_lvl+0x88/0xb4 [ 105.812780] print_report+0x158/0x44c [ 105.813195] kasan_report+0xc8/0x180 [ 105.813588] kasan_check_range+0xe4/0x190 [ 105.814036] memmove+0x44/0xc0 [ 105.814421] kmalloc_memmove_negative_size+0xe4/0x1fc [ 105.815300] kunit_try_run_case+0x8c/0x124 [ 105.815783] kunit_generic_run_threadfn_adapter+0x38/0x54 [ 105.816361] kthread+0x15c/0x170 [ 105.817114] ret_from_fork+0x10/0x20 [ 105.817545] [ 105.817734] Allocated by task 225: [ 105.818100] kasan_save_stack+0x3c/0x70 [ 105.818565] kasan_set_track+0x2c/0x40 [ 105.818981] kasan_save_alloc_info+0x24/0x34 [ 105.819438] __kasan_kmalloc+0xd4/0xe0 [ 105.819900] kmalloc_trace+0x8c/0x150 [ 105.820324] kmalloc_memmove_negative_size+0xa0/0x1fc [ 105.821225] kunit_try_run_case+0x8c/0x124 [ 105.821668] kunit_generic_run_threadfn_adapter+0x38/0x54 [ 105.822249] kthread+0x15c/0x170 [ 105.822675] ret_from_fork+0x10/0x20 [ 105.823119] [ 105.823304] The buggy address belongs to the object at ffff0000c66f6500 [ 105.823304] which belongs to the cache kmalloc-128 of size 128 [ 105.824251] The buggy address is located 4 bytes inside of [ 105.824251] 128-byte region [ffff0000c66f6500, ffff0000c66f6580) [ 105.825528] [ 105.825762] The buggy address belongs to the physical page: [ 105.826243] page:000000008cb3a959 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066f6 [ 105.827031] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 105.827708] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 105.828364] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 105.829007] page dumped because: kasan: bad access detected [ 105.829488] [ 105.829683] Memory state around the buggy address: [ 105.830124] ffff0000c66f6400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 105.831121] ffff0000c66f6480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 105.831730] >ffff0000c66f6500: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 105.832332] ^ [ 105.833055] ffff0000c66f6580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 105.833659] ffff0000c66f6600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 105.834267] ==================================================================
[ 75.560813] ================================================================== [ 75.561579] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0xb4/0x164 [ 75.562650] Read of size 18446744073709551614 at addr ffff0000c5a76f04 by task kunit_try_catch/141 [ 75.563279] [ 75.563477] CPU: 0 PID: 141 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 75.564112] Hardware name: linux,dummy-virt (DT) [ 75.564573] Call trace: [ 75.565272] dump_backtrace+0xf8/0x118 [ 75.565779] show_stack+0x18/0x24 [ 75.566215] __dump_stack+0x28/0x38 [ 75.566615] dump_stack_lvl+0x54/0x6c [ 75.567065] print_address_description+0x7c/0x1ec [ 75.567587] print_report+0x50/0x68 [ 75.568037] kasan_report+0xac/0x100 [ 75.568515] kasan_check_range+0x260/0x2a0 [ 75.569043] memmove+0x48/0x90 [ 75.569447] kmalloc_memmove_negative_size+0xb4/0x164 [ 75.569979] kunit_try_run_case+0x80/0x184 [ 75.570442] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 75.571494] kthread+0x16c/0x21c [ 75.571937] ret_from_fork+0x10/0x20 [ 75.572388] [ 75.572573] Allocated by task 141: [ 75.573144] kasan_set_track+0x4c/0x80 [ 75.573650] kasan_save_alloc_info+0x28/0x34 [ 75.574149] __kasan_kmalloc+0x88/0xa0 [ 75.574589] kmalloc_trace+0x54/0x68 [ 75.575038] kmalloc_memmove_negative_size+0x48/0x164 [ 75.575585] kunit_try_run_case+0x80/0x184 [ 75.576039] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 75.577079] kthread+0x16c/0x21c [ 75.577512] ret_from_fork+0x10/0x20 [ 75.577955] [ 75.578145] The buggy address belongs to the object at ffff0000c5a76f00 [ 75.578145] which belongs to the cache kmalloc-128 of size 128 [ 75.579105] The buggy address is located 4 bytes inside of [ 75.579105] 128-byte region [ffff0000c5a76f00, ffff0000c5a76f80) [ 75.580023] [ 75.580252] The buggy address belongs to the physical page: [ 75.580700] page:00000000e5b61371 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a76 [ 75.581709] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 75.582394] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 75.583067] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 75.583652] page dumped because: kasan: bad access detected [ 75.584142] [ 75.584359] Memory state around the buggy address: [ 75.585281] ffff0000c5a76e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 75.585901] ffff0000c5a76e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.586524] >ffff0000c5a76f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 75.587140] ^ [ 75.587489] ffff0000c5a76f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.588129] ffff0000c5a77000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 75.589072] ==================================================================
[ 74.598943] ================================================================== [ 74.599692] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0xb4/0x164 [ 74.601381] Read of size 18446744073709551614 at addr ffff0000c5a09e04 by task kunit_try_catch/141 [ 74.602954] [ 74.603415] CPU: 0 PID: 141 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 74.604690] Hardware name: linux,dummy-virt (DT) [ 74.605058] Call trace: [ 74.605294] dump_backtrace+0xf4/0x114 [ 74.605728] show_stack+0x18/0x24 [ 74.606700] __dump_stack+0x28/0x38 [ 74.607531] dump_stack_lvl+0x50/0x68 [ 74.608465] print_address_description+0x7c/0x1ec [ 74.609575] print_report+0x50/0x68 [ 74.610333] kasan_report+0xac/0xfc [ 74.611164] kasan_check_range+0x258/0x290 [ 74.612130] memmove+0x48/0x90 [ 74.613012] kmalloc_memmove_negative_size+0xb4/0x164 [ 74.613925] kunit_try_run_case+0x80/0x184 [ 74.614849] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 74.616170] kthread+0x16c/0x21c [ 74.616939] ret_from_fork+0x10/0x20 [ 74.617906] [ 74.618393] Allocated by task 141: [ 74.618825] kasan_set_track+0x4c/0x80 [ 74.619254] kasan_save_alloc_info+0x28/0x34 [ 74.619871] __kasan_kmalloc+0x88/0xa0 [ 74.620706] kmalloc_trace+0x54/0x68 [ 74.621610] kmalloc_memmove_negative_size+0x48/0x164 [ 74.622704] kunit_try_run_case+0x80/0x184 [ 74.623609] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 74.624776] kthread+0x16c/0x21c [ 74.625587] ret_from_fork+0x10/0x20 [ 74.626456] [ 74.626893] The buggy address belongs to the object at ffff0000c5a09e00 [ 74.626893] which belongs to the cache kmalloc-128 of size 128 [ 74.628829] The buggy address is located 4 bytes inside of [ 74.628829] 128-byte region [ffff0000c5a09e00, ffff0000c5a09e80) [ 74.630092] [ 74.630288] The buggy address belongs to the physical page: [ 74.630658] page:000000009f2754ee refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a09 [ 74.631886] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 74.633198] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 74.634207] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 74.635136] page dumped because: kasan: bad access detected [ 74.635899] [ 74.636205] Memory state around the buggy address: [ 74.636990] ffff0000c5a09d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 74.637569] ffff0000c5a09d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.638078] >ffff0000c5a09e00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 74.638545] ^ [ 74.638862] ffff0000c5a09e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.639504] ffff0000c5a09f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.640092] ==================================================================
[ 73.193216] ================================================================== [ 73.194866] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0xdc/0x1f0 [ 73.196478] Read of size 18446744073709551614 at addr ffff0000c589d304 by task kunit_try_catch/141 [ 73.197747] [ 73.197951] CPU: 1 PID: 141 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 73.199055] Hardware name: linux,dummy-virt (DT) [ 73.199843] Call trace: [ 73.200472] dump_backtrace.part.0+0xdc/0xf0 [ 73.201571] show_stack+0x18/0x30 [ 73.202177] dump_stack_lvl+0x64/0x80 [ 73.202648] print_report+0x158/0x438 [ 73.203091] kasan_report+0xb4/0xf4 [ 73.203533] kasan_check_range+0xe4/0x190 [ 73.203982] memmove+0x44/0xc0 [ 73.204361] kmalloc_memmove_negative_size+0xdc/0x1f0 [ 73.205425] kunit_try_run_case+0x84/0x120 [ 73.205861] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 73.206747] kthread+0x180/0x190 [ 73.207134] ret_from_fork+0x10/0x20 [ 73.207567] [ 73.207755] Allocated by task 141: [ 73.208076] kasan_save_stack+0x3c/0x70 [ 73.208514] kasan_set_track+0x2c/0x40 [ 73.208942] kasan_save_alloc_info+0x24/0x34 [ 73.209386] __kasan_kmalloc+0xb8/0xc0 [ 73.210373] kmalloc_trace+0x58/0x6c [ 73.210790] kmalloc_memmove_negative_size+0x98/0x1f0 [ 73.211336] kunit_try_run_case+0x84/0x120 [ 73.211812] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 73.212342] kthread+0x180/0x190 [ 73.212713] ret_from_fork+0x10/0x20 [ 73.213113] [ 73.213318] The buggy address belongs to the object at ffff0000c589d300 [ 73.213318] which belongs to the cache kmalloc-128 of size 128 [ 73.214420] The buggy address is located 4 bytes inside of [ 73.214420] 128-byte region [ffff0000c589d300, ffff0000c589d380) [ 73.215324] [ 73.215517] The buggy address belongs to the physical page: [ 73.216054] page:00000000b8b1210d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10589d [ 73.217018] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 73.217712] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 73.218850] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 73.219444] page dumped because: kasan: bad access detected [ 73.219900] [ 73.220098] Memory state around the buggy address: [ 73.220523] ffff0000c589d200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 73.221105] ffff0000c589d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.221724] >ffff0000c589d300: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 73.222565] ^ [ 73.222913] ffff0000c589d380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.223512] ffff0000c589d400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.224066] ==================================================================
[ 64.720376] ================================================================== [ 64.721164] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0xf0/0x1f8 [ 64.722433] Read of size 18446744073709551614 at addr ffff0000c59aaa04 by task kunit_try_catch/139 [ 64.723001] [ 64.723176] CPU: 1 PID: 139 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 64.724157] Hardware name: linux,dummy-virt (DT) [ 64.724715] Call trace: [ 64.725062] dump_backtrace+0x110/0x120 [ 64.726286] show_stack+0x18/0x28 [ 64.726770] dump_stack_lvl+0x68/0x84 [ 64.727272] print_report+0x158/0x484 [ 64.727708] kasan_report+0x98/0xe0 [ 64.728075] kasan_check_range+0x160/0x1d8 [ 64.728668] memmove+0x44/0xb0 [ 64.729091] kmalloc_memmove_negative_size+0xf0/0x1f8 [ 64.729805] kunit_try_run_case+0x7c/0x120 [ 64.730334] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 64.730940] kthread+0x1a4/0x1b8 [ 64.731291] ret_from_fork+0x10/0x20 [ 64.731706] [ 64.731873] Allocated by task 139: [ 64.732161] kasan_save_stack+0x2c/0x58 [ 64.732561] kasan_set_track+0x2c/0x40 [ 64.732888] kasan_save_alloc_info+0x24/0x38 [ 64.733334] __kasan_kmalloc+0xa0/0xb8 [ 64.733730] kmalloc_trace+0x50/0x68 [ 64.734059] kmalloc_memmove_negative_size+0xa8/0x1f8 [ 64.734547] kunit_try_run_case+0x7c/0x120 [ 64.734994] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 64.735506] kthread+0x1a4/0x1b8 [ 64.735855] ret_from_fork+0x10/0x20 [ 64.736212] [ 64.736437] The buggy address belongs to the object at ffff0000c59aaa00 [ 64.736437] which belongs to the cache kmalloc-128 of size 128 [ 64.737261] The buggy address is located 4 bytes inside of [ 64.737261] 128-byte region [ffff0000c59aaa00, ffff0000c59aaa80) [ 64.738160] [ 64.738371] The buggy address belongs to the physical page: [ 64.738849] page:000000007750314d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059aa [ 64.739707] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 64.740311] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 64.740937] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 64.741504] page dumped because: kasan: bad access detected [ 64.741944] [ 64.742192] Memory state around the buggy address: [ 64.742650] ffff0000c59aa900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 64.743252] ffff0000c59aa980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.743853] >ffff0000c59aaa00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 64.744526] ^ [ 64.744819] ffff0000c59aaa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.745359] ffff0000c59aab00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.745994] ==================================================================
[ 31.014512] ================================================================== [ 31.015634] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0xe7/0x1e0 [ 31.016058] Read of size 18446744073709551614 at addr ffff8881030dcc04 by task kunit_try_catch/245 [ 31.016903] [ 31.017107] CPU: 1 PID: 245 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 31.018074] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.019013] Call Trace: [ 31.019352] <TASK> [ 31.019475] dump_stack_lvl+0x49/0x62 [ 31.019675] print_report+0x189/0x492 [ 31.019857] ? kasan_complete_mode_report_info+0x3c/0x200 [ 31.020077] ? kmalloc_memmove_negative_size+0xe7/0x1e0 [ 31.020398] kasan_report+0x10c/0x190 [ 31.020596] ? kmalloc_memmove_negative_size+0xe7/0x1e0 [ 31.021074] kasan_check_range+0x10b/0x1c0 [ 31.021359] memmove+0x23/0x70 [ 31.021575] kmalloc_memmove_negative_size+0xe7/0x1e0 [ 31.021948] ? kmalloc_memmove_invalid_size+0x1e0/0x1e0 [ 31.022251] ? __kunit_add_resource+0xd1/0x100 [ 31.022581] kunit_try_run_case+0x8f/0xd0 [ 31.022846] ? kunit_catch_run_case+0x80/0x80 [ 31.023078] ? kunit_try_catch_throw+0x40/0x40 [ 31.023439] kunit_generic_run_threadfn_adapter+0x2f/0x50 [ 31.023743] kthread+0x17b/0x1b0 [ 31.023952] ? kthread_complete_and_exit+0x30/0x30 [ 31.024182] ret_from_fork+0x22/0x30 [ 31.024523] </TASK> [ 31.024657] [ 31.024754] Allocated by task 245: [ 31.024955] kasan_save_stack+0x41/0x70 [ 31.025206] kasan_set_track+0x25/0x40 [ 31.025749] kasan_save_alloc_info+0x1e/0x30 [ 31.025969] __kasan_kmalloc+0xb6/0xc0 [ 31.026213] kmalloc_trace+0x48/0xb0 [ 31.026410] kmalloc_memmove_negative_size+0x9b/0x1e0 [ 31.026788] kunit_try_run_case+0x8f/0xd0 [ 31.027038] kunit_generic_run_threadfn_adapter+0x2f/0x50 [ 31.027442] kthread+0x17b/0x1b0 [ 31.027650] ret_from_fork+0x22/0x30 [ 31.027842] [ 31.027956] The buggy address belongs to the object at ffff8881030dcc00 [ 31.027956] which belongs to the cache kmalloc-64 of size 64 [ 31.028576] The buggy address is located 4 bytes inside of [ 31.028576] 64-byte region [ffff8881030dcc00, ffff8881030dcc40) [ 31.029088] [ 31.029214] The buggy address belongs to the physical page: [ 31.029575] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1030dc [ 31.029986] flags: 0x200000000000200(slab|node=0|zone=2) [ 31.030352] raw: 0200000000000200 0000000000000000 dead000000000122 ffff888100041640 [ 31.030707] raw: 0000000000000000 0000000080200020 00000001ffffffff 0000000000000000 [ 31.031034] page dumped because: kasan: bad access detected [ 31.031625] [ 31.031745] Memory state around the buggy address: [ 31.031999] ffff8881030dcb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.032425] ffff8881030dcb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.032756] >ffff8881030dcc00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 31.033085] ^ [ 31.033263] ffff8881030dcc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.033694] ffff8881030dcd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.034003] ==================================================================