Date
June 2, 2025, 2:11 p.m.
Environment | |
---|---|
e850-96 | |
qemu-arm64 | |
qemu-x86_64 |
[ 26.475302] ================================================================== [ 26.485148] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0 [ 26.492698] Read of size 18446744073709551614 at addr ffff000800cab184 by task kunit_try_catch/227 [ 26.501637] [ 26.503124] CPU: 6 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 26.503175] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.503189] Hardware name: WinLink E850-96 board (DT) [ 26.503212] Call trace: [ 26.503230] show_stack+0x20/0x38 (C) [ 26.503265] dump_stack_lvl+0x8c/0xd0 [ 26.503300] print_report+0x118/0x608 [ 26.503333] kasan_report+0xdc/0x128 [ 26.503364] kasan_check_range+0x100/0x1a8 [ 26.503398] __asan_memmove+0x3c/0x98 [ 26.503430] kmalloc_memmove_negative_size+0x154/0x2e0 [ 26.503471] kunit_try_run_case+0x170/0x3f0 [ 26.503509] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.503547] kthread+0x328/0x630 [ 26.503583] ret_from_fork+0x10/0x20 [ 26.503621] [ 26.569866] Allocated by task 227: [ 26.573252] kasan_save_stack+0x3c/0x68 [ 26.577070] kasan_save_track+0x20/0x40 [ 26.580889] kasan_save_alloc_info+0x40/0x58 [ 26.585143] __kasan_kmalloc+0xd4/0xd8 [ 26.588875] __kmalloc_cache_noprof+0x16c/0x3c0 [ 26.593389] kmalloc_memmove_negative_size+0xb0/0x2e0 [ 26.598425] kunit_try_run_case+0x170/0x3f0 [ 26.602589] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.608059] kthread+0x328/0x630 [ 26.611271] ret_from_fork+0x10/0x20 [ 26.614829] [ 26.616308] The buggy address belongs to the object at ffff000800cab180 [ 26.616308] which belongs to the cache kmalloc-64 of size 64 [ 26.628635] The buggy address is located 4 bytes inside of [ 26.628635] 64-byte region [ffff000800cab180, ffff000800cab1c0) [ 26.640089] [ 26.641569] The buggy address belongs to the physical page: [ 26.647125] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880cab [ 26.655110] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.661618] page_type: f5(slab) [ 26.664755] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 26.672474] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.680193] page dumped because: kasan: bad access detected [ 26.685748] [ 26.687224] Memory state around the buggy address: [ 26.692006] ffff000800cab080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.699207] ffff000800cab100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.706412] >ffff000800cab180: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 26.713613] ^ [ 26.716829] ffff000800cab200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.724032] ffff000800cab280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.731234] ==================================================================
[ 18.268860] ================================================================== [ 18.268957] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0 [ 18.269034] Read of size 18446744073709551614 at addr fff00000ffe7afc4 by task kunit_try_catch/183 [ 18.269116] [ 18.269155] CPU: 1 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 18.281479] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.281586] Hardware name: linux,dummy-virt (DT) [ 18.281631] Call trace: [ 18.281678] show_stack+0x20/0x38 (C) [ 18.281740] dump_stack_lvl+0x8c/0xd0 [ 18.281791] print_report+0x118/0x608 [ 18.281837] kasan_report+0xdc/0x128 [ 18.281989] kasan_check_range+0x100/0x1a8 [ 18.285444] __asan_memmove+0x3c/0x98 [ 18.287504] kmalloc_memmove_negative_size+0x154/0x2e0 [ 18.287582] kunit_try_run_case+0x170/0x3f0 [ 18.288574] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.290855] kthread+0x328/0x630 [ 18.290960] ret_from_fork+0x10/0x20 [ 18.293403] [ 18.293447] Allocated by task 2846403498: [ 18.298216] ------------[ cut here ]------------ [ 18.298291] pool index 44973 out of bounds (211) for stack id adacafae [ 18.301263] WARNING: CPU: 1 PID: 183 at lib/stackdepot.c:451 depot_fetch_stack+0x6c/0x90 [ 19.010058] Modules linked in: [ 19.011688] CPU: 1 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 19.013148] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.013871] Hardware name: linux,dummy-virt (DT) [ 19.014688] pstate: 624020c9 (nZCv daIF +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 19.015906] pc : depot_fetch_stack+0x6c/0x90 [ 19.016559] lr : depot_fetch_stack+0x6c/0x90 [ 19.017307] sp : ffff800080977a20 [ 19.017951] x29: ffff800080977a20 x28: ffffaf0a3e9f1000 x27: 1ffff00010010f60 [ 19.019065] x26: 1ffff00010010f5f x25: 0000000000000000 x24: ffffaf0a37949884 [ 19.019880] x23: ffffc1ffc3ff9e80 x22: ffffaf0a3c3dd278 x21: ffffaf0a3c3e0498 [ 19.020857] x20: fff00000ffe7afc4 x19: ffff800080977b30 x18: 00000000fc2f539e [ 19.021864] x17: 0000000000000001 x16: 00000000f1f1f1f1 x15: 0000000000000007 [ 19.022643] x14: 0000000000000000 x13: 0000000000000007 x12: ffff70001012eea1 [ 19.023018] x11: 1ffff0001012eea0 x10: ffff70001012eea0 x9 : ffffaf0a372e4724 [ 19.023436] x8 : ffff800080977507 x7 : 0000000000000001 x6 : ffff70001012eea0 [ 19.023786] x5 : ffff800080977500 x4 : 1ffe000018ef9799 x3 : dfff800000000000 [ 19.024142] x2 : 0000000000000000 x1 : 0000000000000000 x0 : fff00000c77cbcc0 [ 19.024783] Call trace: [ 19.025084] depot_fetch_stack+0x6c/0x90 (P) [ 19.025547] stack_depot_print+0x24/0x60 [ 19.025958] print_report+0x5e4/0x608 [ 19.026344] kasan_report+0xdc/0x128 [ 19.026735] kasan_check_range+0x100/0x1a8 [ 19.027194] __asan_memmove+0x3c/0x98 [ 19.027592] kmalloc_memmove_negative_size+0x154/0x2e0 [ 19.028097] kunit_try_run_case+0x170/0x3f0 [ 19.028543] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.029474] kthread+0x328/0x630 [ 19.029992] ret_from_fork+0x10/0x20 [ 19.030678] ---[ end trace 0000000000000000 ]--- [ 19.031668] ------------[ cut here ]------------ [ 19.031719] corrupt handle or use after stack_depot_put() [ 19.031810] WARNING: CPU: 1 PID: 183 at lib/stackdepot.c:723 stack_depot_print+0x54/0x60 [ 19.034074] Modules linked in: [ 19.034562] CPU: 1 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 19.035612] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 19.036227] Hardware name: linux,dummy-virt (DT) [ 19.036828] pstate: 624020c9 (nZCv daIF +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 19.037422] pc : stack_depot_print+0x54/0x60 [ 19.037641] lr : stack_depot_print+0x54/0x60 [ 19.037840] sp : ffff800080977a30 [ 19.037997] x29: ffff800080977a30 x28: ffffaf0a3e9f1000 x27: 1ffff00010010f60 [ 19.038368] x26: 1ffff00010010f5f x25: 0000000000000000 x24: ffffaf0a37949884 [ 19.039406] x23: ffffc1ffc3ff9e80 x22: ffffaf0a3c3dd278 x21: ffffaf0a3c3e0498 [ 19.040170] x20: fff00000ffe7afc4 x19: ffff800080977b30 x18: 00000000fc2f539e [ 19.040935] x17: 0000000000000001 x16: 00000000f1f1f1f1 x15: 00000000f3f3f3f3 [ 19.041710] x14: ffff70001012ef26 x13: 1ffe000018ef9799 x12: ffff75e147c20809 [ 19.042464] x11: 1ffff5e147c20808 x10: ffff75e147c20808 x9 : ffffaf0a372e4724 [ 19.043216] x8 : ffffaf0a3e104043 x7 : 0000000000000001 x6 : ffff75e147c20808 [ 19.043971] x5 : ffffaf0a3e104040 x4 : 1ffe000018ef9799 x3 : dfff800000000000 [ 19.044724] x2 : 0000000000000000 x1 : 0000000000000000 x0 : fff00000c77cbcc0 [ 19.045482] Call trace: [ 19.045787] stack_depot_print+0x54/0x60 (P) [ 19.046158] print_report+0x5e4/0x608 [ 19.046552] kasan_report+0xdc/0x128 [ 19.046863] kasan_check_range+0x100/0x1a8 [ 19.047078] __asan_memmove+0x3c/0x98 [ 19.047267] kmalloc_memmove_negative_size+0x154/0x2e0 [ 19.047854] kunit_try_run_case+0x170/0x3f0 [ 19.048320] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.048895] kthread+0x328/0x630 [ 19.049277] ret_from_fork+0x10/0x20 [ 19.049707] ---[ end trace 0000000000000000 ]--- [ 19.050211] [ 19.050245] Last potentially related work creation: [ 19.050283] ------------[ cut here ]------------ [ 19.050310] pool index 43945 out of bounds (211) for stack id a9a8abaa [ 19.050431] WARNING: CPU: 1 PID: 183 at lib/stackdepot.c:451 depot_fetch_stack+0x6c/0x90 [ 19.052151] Modules linked in: [ 19.052343] CPU: 1 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 19.053323] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 19.053849] Hardware name: linux,dummy-virt (DT) [ 19.054329] pstate: 624020c9 (nZCv daIF +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 19.055012] pc : depot_fetch_stack+0x6c/0x90 [ 19.055489] lr : depot_fetch_stack+0x6c/0x90 [ 19.055922] sp : ffff800080977a00 [ 19.056083] x29: ffff800080977a00 x28: ffffaf0a3e9f1000 x27: 1ffff00010010f60 [ 19.056443] x26: 1ffff00010010f5f x25: 0000000000000000 x24: ffffaf0a37949884 [ 19.056791] x23: ffffc1ffc3ff9e80 x22: ffffaf0a3c3dd278 x21: ffffaf0a3c3e0498 [ 19.057135] x20: fff00000ffe7afc4 x19: fff00000ffe7a040 x18: 00000000fc2f539e [ 19.057759] x17: 0000000000000001 x16: 00000000f1f1f1f1 x15: 0000000000000007 [ 19.058515] x14: 0000000000000000 x13: 0000000000000007 x12: ffff75e147c20809 [ 19.059288] x11: 1ffff5e147c20808 x10: ffff75e147c20808 x9 : ffffaf0a372e4724 [ 19.060042] x8 : ffffaf0a3e104043 x7 : 0000000000000001 x6 : ffff75e147c20808 [ 19.060790] x5 : ffffaf0a3e104040 x4 : 1ffe000018ef9799 x3 : dfff800000000000 [ 19.061670] x2 : 0000000000000000 x1 : 0000000000000000 x0 : fff00000c77cbcc0 [ 19.062454] Call trace: [ 19.062734] depot_fetch_stack+0x6c/0x90 (P) [ 19.063227] stack_depot_print+0x24/0x60 [ 19.063490] kasan_print_aux_stacks+0x50/0x98 [ 19.063713] print_report+0x348/0x608 [ 19.063902] kasan_report+0xdc/0x128 [ 19.064082] kasan_check_range+0x100/0x1a8 [ 19.064280] __asan_memmove+0x3c/0x98 [ 19.064710] kmalloc_memmove_negative_size+0x154/0x2e0 [ 19.065264] kunit_try_run_case+0x170/0x3f0 [ 19.065738] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.066306] kthread+0x328/0x630 [ 19.066701] ret_from_fork+0x10/0x20 [ 19.067115] ---[ end trace 0000000000000000 ]--- [ 19.067621] ------------[ cut here ]------------ [ 19.067649] corrupt handle or use after stack_depot_put() [ 19.067731] WARNING: CPU: 1 PID: 183 at lib/stackdepot.c:723 stack_depot_print+0x54/0x60 [ 19.069458] Modules linked in: [ 19.069820] CPU: 1 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 19.070658] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 19.070866] Hardware name: linux,dummy-virt (DT) [ 19.071071] pstate: 624020c9 (nZCv daIF +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 19.071365] pc : stack_depot_print+0x54/0x60 [ 19.071820] lr : stack_depot_print+0x54/0x60 [ 19.072286] sp : ffff800080977a10 [ 19.072635] x29: ffff800080977a10 x28: ffffaf0a3e9f1000 x27: 1ffff00010010f60 [ 19.073387] x26: 1ffff00010010f5f x25: 0000000000000000 x24: ffffaf0a37949884 [ 19.074156] x23: ffffc1ffc3ff9e80 x22: ffffaf0a3c3dd278 x21: ffffaf0a3c3e0498 [ 19.074906] x20: fff00000ffe7afc4 x19: fff00000ffe7a040 x18: 00000000fc2f539e [ 19.075671] x17: 0000000000000001 x16: 00000000f1f1f1f1 x15: 00000000f3f3f3f3 [ 19.076406] x14: ffff70001012ef22 x13: 1ffe000018ef9799 x12: ffff75e147c20809 [ 19.076761] x11: 1ffff5e147c20808 x10: ffff75e147c20808 x9 : ffffaf0a372e4724 [ 19.077109] x8 : ffffaf0a3e104043 x7 : 0000000000000001 x6 : ffff75e147c20808 [ 19.077476] x5 : ffffaf0a3e104040 x4 : 1ffe000018ef9799 x3 : dfff800000000000 [ 19.077917] x2 : 0000000000000000 x1 : 0000000000000000 x0 : fff00000c77cbcc0 [ 19.078309] Call trace: [ 19.078499] stack_depot_print+0x54/0x60 (P) [ 19.078766] kasan_print_aux_stacks+0x50/0x98 [ 19.079053] print_report+0x348/0x608 [ 19.079296] kasan_report+0xdc/0x128 [ 19.079536] kasan_check_range+0x100/0x1a8 [ 19.079782] __asan_memmove+0x3c/0x98 [ 19.080052] kmalloc_memmove_negative_size+0x154/0x2e0 [ 19.080382] kunit_try_run_case+0x170/0x3f0 [ 19.080669] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.081023] kthread+0x328/0x630 [ 19.081235] ret_from_fork+0x10/0x20 [ 19.081521] ---[ end trace 0000000000000000 ]--- [ 19.081790] [ 19.081827] Second to last potentially related work creation: [ 19.081879] ------------[ cut here ]------------ [ 19.081906] pool index 44973 out of bounds (211) for stack id adacafae [ 19.082025] WARNING: CPU: 1 PID: 183 at lib/stackdepot.c:451 depot_fetch_stack+0x6c/0x90 [ 19.083329] Modules linked in: [ 19.083572] CPU: 1 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 19.084123] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 19.084463] Hardware name: linux,dummy-virt (DT) [ 19.084739] pstate: 624020c9 (nZCv daIF +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 19.085109] pc : depot_fetch_stack+0x6c/0x90 [ 19.085391] lr : depot_fetch_stack+0x6c/0x90 [ 19.085649] sp : ffff800080977a00 [ 19.085860] x29: ffff800080977a00 x28: ffffaf0a3e9f1000 x27: 1ffff00010010f60 [ 19.086285] x26: 1ffff00010010f5f x25: 0000000000000000 x24: ffffaf0a37949884 [ 19.086745] x23: ffffc1ffc3ff9e80 x22: ffffaf0a3c3dd278 x21: ffffaf0a3c3e0498 [ 19.087227] x20: fff00000ffe7afc4 x19: fff00000ffe7a040 x18: 00000000fc2f539e [ 19.087677] x17: 0000000000000001 x16: 00000000f1f1f1f1 x15: 0000000000000007 [ 19.088077] x14: 0000000000000000 x13: 0000000000000007 x12: ffff75e147c20809 [ 19.088562] x11: 1ffff5e147c20808 x10: ffff75e147c20808 x9 : ffffaf0a372e4724 [ 19.088983] x8 : ffffaf0a3e104043 x7 : 0000000000000001 x6 : ffff75e147c20808 [ 19.089445] x5 : ffffaf0a3e104040 x4 : 1ffe000018ef9799 x3 : dfff800000000000 [ 19.089914] x2 : 0000000000000000 x1 : 0000000000000000 x0 : fff00000c77cbcc0 [ 19.090329] Call trace: [ 19.090511] depot_fetch_stack+0x6c/0x90 (P) [ 19.090803] stack_depot_print+0x24/0x60 [ 19.091076] kasan_print_aux_stacks+0x78/0x98 [ 19.091345] print_report+0x348/0x608 [ 19.091610] kasan_report+0xdc/0x128 [ 19.091871] kasan_check_range+0x100/0x1a8 [ 19.092132] __asan_memmove+0x3c/0x98 [ 19.092375] kmalloc_memmove_negative_size+0x154/0x2e0 [ 19.092695] kunit_try_run_case+0x170/0x3f0 [ 19.092985] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.093294] kthread+0x328/0x630 [ 19.093496] ret_from_fork+0x10/0x20 [ 19.093773] ---[ end trace 0000000000000000 ]--- [ 19.093991] ------------[ cut here ]------------ [ 19.094020] corrupt handle or use after stack_depot_put() [ 19.094097] WARNING: CPU: 1 PID: 183 at lib/stackdepot.c:723 stack_depot_print+0x54/0x60 [ 19.095030] Modules linked in: [ 19.095266] CPU: 1 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 19.095717] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 19.096002] Hardware name: linux,dummy-virt (DT) [ 19.096229] pstate: 624020c9 (nZCv daIF +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 19.096650] pc : stack_depot_print+0x54/0x60 [ 19.096935] lr : stack_depot_print+0x54/0x60 [ 19.097185] sp : ffff800080977a10 [ 19.097403] x29: ffff800080977a10 x28: ffffaf0a3e9f1000 x27: 1ffff00010010f60 [ 19.097851] x26: 1ffff00010010f5f x25: 0000000000000000 x24: ffffaf0a37949884 [ 19.098270] x23: ffffc1ffc3ff9e80 x22: ffffaf0a3c3dd278 x21: ffffaf0a3c3e0498 [ 19.098728] x20: fff00000ffe7afc4 x19: fff00000ffe7a040 x18: 00000000fc2f539e [ 19.099163] x17: 0000000000000001 x16: 00000000f1f1f1f1 x15: 00000000f3f3f3f3 [ 19.099638] x14: ffff70001012ef22 x13: 1ffe000018ef9799 x12: ffff75e147c20809 [ 19.100133] x11: 1ffff5e147c20808 x10: ffff75e147c20808 x9 : ffffaf0a372e4724 [ 19.100622] x8 : ffffaf0a3e104043 x7 : 0000000000000001 x6 : ffff75e147c20808 [ 19.101093] x5 : ffffaf0a3e104040 x4 : 1ffe000018ef9799 x3 : dfff800000000000 [ 19.101572] x2 : 0000000000000000 x1 : 0000000000000000 x0 : fff00000c77cbcc0 [ 19.101980] Call trace: [ 19.102156] stack_depot_print+0x54/0x60 (P) [ 19.102469] kasan_print_aux_stacks+0x78/0x98 [ 19.102744] print_report+0x348/0x608 [ 19.103016] kasan_report+0xdc/0x128 [ 19.103257] kasan_check_range+0x100/0x1a8 [ 19.103540] __asan_memmove+0x3c/0x98 [ 19.103804] kmalloc_memmove_negative_size+0x154/0x2e0 [ 19.104123] kunit_try_run_case+0x170/0x3f0 [ 19.104403] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.104733] kthread+0x328/0x630 [ 19.104979] ret_from_fork+0x10/0x20 [ 19.105229] ---[ end trace 0000000000000000 ]--- [ 19.105539] [ 19.105580] The buggy address belongs to the object at fff00000ffe7a000 [ 19.105580] which belongs to the cache kmalloc-64 of size 64 [ 19.105654] The buggy address is located 3972 bytes to the right of [ 19.105654] 64-byte region [fff00000ffe7a000, fff00000ffe7a040) [ 19.105730] [ 19.105754] The buggy address belongs to the physical page: [ 19.105789] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x13fe7a [ 19.105850] memcg:fff00000d9d6f461 [ 19.105881] flags: 0xbfffe0000002000(reserved|node=0|zone=2|lastcpupid=0x1ffff) [ 19.105941] page_type: f5(slab) [ 19.105983] raw: 0bfffe0000002000 fff00000c00018c0 ffffc1ffc3ff9e88 0000000000000000 [ 19.106035] raw: 0000000000000000 0000000000010000 00000001f5000000 fff00000d9d6f461 [ 19.106076] page dumped because: kasan: bad access detected [ 19.106108] [ 19.106128] Memory state around the buggy address: [ 19.106163] fff00000ffe7ae80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.106207] fff00000ffe7af00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.106251] >fff00000ffe7af80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.106289] ^ [ 19.106326] fff00000ffe7b000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.106380] fff00000ffe7b080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.106419] ==================================================================
[ 16.759929] ================================================================== [ 16.760654] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x171/0x330 [ 16.761458] Read of size 18446744073709551614 at addr ffff888101deef84 by task kunit_try_catch/201 [ 16.763076] [ 16.763585] CPU: 1 UID: 0 PID: 201 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT(voluntary) [ 16.763721] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.763761] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.763954] Call Trace: [ 16.763996] <TASK> [ 16.764038] dump_stack_lvl+0x73/0xb0 [ 16.764151] print_report+0xd1/0x650 [ 16.764216] ? __virt_addr_valid+0x1db/0x2d0 [ 16.764263] ? kmalloc_memmove_negative_size+0x171/0x330 [ 16.764305] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.764340] ? kmalloc_memmove_negative_size+0x171/0x330 [ 16.764426] kasan_report+0x141/0x180 [ 16.764464] ? kmalloc_memmove_negative_size+0x171/0x330 [ 16.764536] kasan_check_range+0x10c/0x1c0 [ 16.764563] __asan_memmove+0x27/0x70 [ 16.764587] kmalloc_memmove_negative_size+0x171/0x330 [ 16.764613] ? __pfx_kmalloc_memmove_negative_size+0x10/0x10 [ 16.764640] ? __schedule+0x10cc/0x2b30 [ 16.764665] ? __pfx_read_tsc+0x10/0x10 [ 16.764688] ? ktime_get_ts64+0x86/0x230 [ 16.764718] kunit_try_run_case+0x1a5/0x480 [ 16.764746] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.764795] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.764822] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.764846] ? __kthread_parkme+0x82/0x180 [ 16.764870] ? preempt_count_sub+0x50/0x80 [ 16.764899] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.764924] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.764948] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.764972] kthread+0x337/0x6f0 [ 16.764991] ? trace_preempt_on+0x20/0xc0 [ 16.765018] ? __pfx_kthread+0x10/0x10 [ 16.765037] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.765059] ? calculate_sigpending+0x7b/0xa0 [ 16.765084] ? __pfx_kthread+0x10/0x10 [ 16.765117] ret_from_fork+0x41/0x80 [ 16.765158] ? __pfx_kthread+0x10/0x10 [ 16.765180] ret_from_fork_asm+0x1a/0x30 [ 16.765238] </TASK> [ 16.765262] [ 16.785005] Allocated by task 201: [ 16.786130] kasan_save_stack+0x45/0x70 [ 16.787178] kasan_save_track+0x18/0x40 [ 16.788185] kasan_save_alloc_info+0x3b/0x50 [ 16.788921] __kasan_kmalloc+0xb7/0xc0 [ 16.789918] __kmalloc_cache_noprof+0x189/0x420 [ 16.790205] kmalloc_memmove_negative_size+0xac/0x330 [ 16.790659] kunit_try_run_case+0x1a5/0x480 [ 16.791099] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.791342] kthread+0x337/0x6f0 [ 16.791715] ret_from_fork+0x41/0x80 [ 16.792147] ret_from_fork_asm+0x1a/0x30 [ 16.792470] [ 16.792642] The buggy address belongs to the object at ffff888101deef80 [ 16.792642] which belongs to the cache kmalloc-64 of size 64 [ 16.793504] The buggy address is located 4 bytes inside of [ 16.793504] 64-byte region [ffff888101deef80, ffff888101deefc0) [ 16.794216] [ 16.794477] The buggy address belongs to the physical page: [ 16.795032] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101dee [ 16.795585] flags: 0x200000000000000(node=0|zone=2) [ 16.796025] page_type: f5(slab) [ 16.796378] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.796825] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 16.797286] page dumped because: kasan: bad access detected [ 16.797845] [ 16.797944] Memory state around the buggy address: [ 16.798103] ffff888101deee80: 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc fc [ 16.798314] ffff888101deef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 16.798510] >ffff888101deef80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 16.798968] ^ [ 16.799326] ffff888101def000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.799805] ffff888101def080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.800264] ==================================================================