Date
July 9, 2025, 2:07 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 17.067630] ================================================================== [ 17.067747] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0 [ 17.067819] Read of size 18446744073709551614 at addr fff00000ffe70004 by task kunit_try_catch/180 [ 17.067904] [ 17.067951] CPU: 0 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 17.068046] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.068073] Hardware name: linux,dummy-virt (DT) [ 17.068407] Call trace: [ 17.068642] show_stack+0x20/0x38 (C) [ 17.068707] dump_stack_lvl+0x8c/0xd0 [ 17.068759] print_report+0x118/0x608 [ 17.069065] kasan_report+0xdc/0x128 [ 17.069243] kasan_check_range+0x100/0x1a8 [ 17.069318] __asan_memmove+0x3c/0x98 [ 17.069373] kmalloc_memmove_negative_size+0x154/0x2e0 [ 17.069463] kunit_try_run_case+0x170/0x3f0 [ 17.069851] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.070033] kthread+0x328/0x630 [ 17.070828] ret_from_fork+0x10/0x20 [ 17.071185] [ 17.071763] Allocated by task 2846403498: [ 17.072124] ------------[ cut here ]------------ [ 17.072380] pool index 44973 out of bounds (211) for stack id adacafae [ 17.076622] WARNING: CPU: 0 PID: 180 at lib/stackdepot.c:451 depot_fetch_stack+0x6c/0x90 [ 17.627792] Modules linked in: [ 17.629288] CPU: 0 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 17.629930] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.630584] Hardware name: linux,dummy-virt (DT) [ 17.631569] pstate: 624020c9 (nZCv daIF +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 17.632394] pc : depot_fetch_stack+0x6c/0x90 [ 17.632768] lr : depot_fetch_stack+0x6c/0x90 [ 17.633628] sp : ffff800080a27a20 [ 17.633877] x29: ffff800080a27a20 x28: ffffa8ee9a94f000 x27: 1ffff00010010f60 [ 17.634639] x26: 1ffff00010010f5f x25: 0000000000000000 x24: ffffa8ee9375f5c4 [ 17.635172] x23: ffffc1ffc3ff9c00 x22: ffffa8ee982b1b28 x21: ffffa8ee982b4e38 [ 17.635631] x20: fff00000ffe70004 x19: ffff800080a27b30 x18: 000000005bc8891d [ 17.636111] x17: 0000000000000001 x16: 00000000f1f1f1f1 x15: 0000000000000007 [ 17.636594] x14: 0000000000000000 x13: 0000000000000007 x12: ffff700010144ea1 [ 17.637068] x11: 1ffff00010144ea0 x10: ffff700010144ea0 x9 : ffffa8ee930ebbbc [ 17.637591] x8 : ffff800080a27507 x7 : 0000000000000001 x6 : ffff700010144ea0 [ 17.637939] x5 : ffff800080a27500 x4 : 1ffe000018f06799 x3 : dfff800000000000 [ 17.638296] x2 : 0000000000000000 x1 : 0000000000000000 x0 : fff00000c7833cc0 [ 17.638783] Call trace: [ 17.638981] depot_fetch_stack+0x6c/0x90 (P) [ 17.639320] stack_depot_print+0x24/0x60 [ 17.639627] print_report+0x5e4/0x608 [ 17.639888] kasan_report+0xdc/0x128 [ 17.640199] kasan_check_range+0x100/0x1a8 [ 17.640492] __asan_memmove+0x3c/0x98 [ 17.640753] kmalloc_memmove_negative_size+0x154/0x2e0 [ 17.641116] kunit_try_run_case+0x170/0x3f0 [ 17.641431] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.641779] kthread+0x328/0x630 [ 17.642032] ret_from_fork+0x10/0x20 [ 17.642396] ---[ end trace 0000000000000000 ]--- [ 17.643005] ------------[ cut here ]------------ [ 17.643061] corrupt handle or use after stack_depot_put() [ 17.643168] WARNING: CPU: 0 PID: 180 at lib/stackdepot.c:723 stack_depot_print+0x54/0x60 [ 17.644040] Modules linked in: [ 17.644344] CPU: 0 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5 #1 PREEMPT [ 17.644864] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 17.645119] Hardware name: linux,dummy-virt (DT) [ 17.645360] pstate: 624020c9 (nZCv daIF +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 17.645688] pc : stack_depot_print+0x54/0x60 [ 17.645922] lr : stack_depot_print+0x54/0x60 [ 17.646223] sp : ffff800080a27a30 [ 17.646410] x29: ffff800080a27a30 x28: ffffa8ee9a94f000 x27: 1ffff00010010f60 [ 17.646976] x26: 1ffff00010010f5f x25: 0000000000000000 x24: ffffa8ee9375f5c4 [ 17.647490] x23: ffffc1ffc3ff9c00 x22: ffffa8ee982b1b28 x21: ffffa8ee982b4e38 [ 17.647967] x20: fff00000ffe70004 x19: ffff800080a27b30 x18: 000000005bc8891d [ 17.648447] x17: 0000000000000001 x16: 00000000f1f1f1f1 x15: 00000000f3f3f3f3 [ 17.648907] x14: ffff700010144f26 x13: 1ffe000018f06799 x12: ffff751dd340a659 [ 17.649391] x11: 1ffff51dd340a658 x10: ffff751dd340a658 x9 : ffffa8ee930ebbbc [ 17.649847] x8 : ffffa8ee9a0532c3 x7 : 0000000000000001 x6 : ffff751dd340a658 [ 17.650318] x5 : ffffa8ee9a0532c0 x4 : 1ffe000018f06799 x3 : dfff800000000000 [ 17.650782] x2 : 0000000000000000 x1 : 0000000000000000 x0 : fff00000c7833cc0 [ 17.651251] Call trace: [ 17.651432] stack_depot_print+0x54/0x60 (P) [ 17.651710] print_report+0x5e4/0x608 [ 17.651959] kasan_report+0xdc/0x128 [ 17.652280] kasan_check_range+0x100/0x1a8 [ 17.652550] __asan_memmove+0x3c/0x98 [ 17.652865] kmalloc_memmove_negative_size+0x154/0x2e0 [ 17.653187] kunit_try_run_case+0x170/0x3f0 [ 17.653484] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.653831] kthread+0x328/0x630 [ 17.654069] ret_from_fork+0x10/0x20 [ 17.654351] ---[ end trace 0000000000000000 ]--- [ 17.654669] [ 17.654702] Last potentially related work creation: [ 17.654770] ------------[ cut here ]------------ [ 17.654795] pool index 43945 out of bounds (211) for stack id a9a8abaa [ 17.654897] WARNING: CPU: 0 PID: 180 at lib/stackdepot.c:451 depot_fetch_stack+0x6c/0x90 [ 17.656195] Modules linked in: [ 17.656470] CPU: 0 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5 #1 PREEMPT [ 17.657034] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 17.657350] Hardware name: linux,dummy-virt (DT) [ 17.657640] pstate: 624020c9 (nZCv daIF +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 17.658040] pc : depot_fetch_stack+0x6c/0x90 [ 17.658325] lr : depot_fetch_stack+0x6c/0x90 [ 17.658607] sp : ffff800080a27a00 [ 17.658808] x29: ffff800080a27a00 x28: ffffa8ee9a94f000 x27: 1ffff00010010f60 [ 17.659326] x26: 1ffff00010010f5f x25: 0000000000000000 x24: ffffa8ee9375f5c4 [ 17.659799] x23: ffffc1ffc3ff9c00 x22: ffffa8ee982b1b28 x21: ffffa8ee982b4e38 [ 17.660258] x20: fff00000ffe70004 x19: fff00000ffe70040 x18: 000000005bc8891d [ 17.660706] x17: 0000000000000001 x16: 00000000f1f1f1f1 x15: 0000000000000007 [ 17.661163] x14: 0000000000000000 x13: 0000000000000007 x12: ffff751dd340a659 [ 17.661605] x11: 1ffff51dd340a658 x10: ffff751dd340a658 x9 : ffffa8ee930ebbbc [ 17.662043] x8 : ffffa8ee9a0532c3 x7 : 0000000000000001 x6 : ffff751dd340a658 [ 17.662493] x5 : ffffa8ee9a0532c0 x4 : 1ffe000018f06799 x3 : dfff800000000000 [ 17.662930] x2 : 0000000000000000 x1 : 0000000000000000 x0 : fff00000c7833cc0 [ 17.663377] Call trace: [ 17.663568] depot_fetch_stack+0x6c/0x90 (P) [ 17.663837] stack_depot_print+0x24/0x60 [ 17.664040] kasan_print_aux_stacks+0x50/0x98 [ 17.664258] print_report+0x348/0x608 [ 17.664447] kasan_report+0xdc/0x128 [ 17.664750] kasan_check_range+0x100/0x1a8 [ 17.665030] __asan_memmove+0x3c/0x98 [ 17.665336] kmalloc_memmove_negative_size+0x154/0x2e0 [ 17.665640] kunit_try_run_case+0x170/0x3f0 [ 17.665935] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.666309] kthread+0x328/0x630 [ 17.666552] ret_from_fork+0x10/0x20 [ 17.666829] ---[ end trace 0000000000000000 ]--- [ 17.667164] ------------[ cut here ]------------ [ 17.667195] corrupt handle or use after stack_depot_put() [ 17.667276] WARNING: CPU: 0 PID: 180 at lib/stackdepot.c:723 stack_depot_print+0x54/0x60 [ 17.668243] Modules linked in: [ 17.668534] CPU: 0 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5 #1 PREEMPT [ 17.669091] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 17.669333] Hardware name: linux,dummy-virt (DT) [ 17.669567] pstate: 624020c9 (nZCv daIF +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 17.669942] pc : stack_depot_print+0x54/0x60 [ 17.670256] lr : stack_depot_print+0x54/0x60 [ 17.670465] sp : ffff800080a27a10 [ 17.670718] x29: ffff800080a27a10 x28: ffffa8ee9a94f000 x27: 1ffff00010010f60 [ 17.671179] x26: 1ffff00010010f5f x25: 0000000000000000 x24: ffffa8ee9375f5c4 [ 17.671675] x23: ffffc1ffc3ff9c00 x22: ffffa8ee982b1b28 x21: ffffa8ee982b4e38 [ 17.672142] x20: fff00000ffe70004 x19: fff00000ffe70040 x18: 000000005bc8891d [ 17.672603] x17: 0000000000000001 x16: 00000000f1f1f1f1 x15: 00000000f3f3f3f3 [ 17.673042] x14: ffff700010144f22 x13: 1ffe000018f06799 x12: ffff751dd340a659 [ 17.673487] x11: 1ffff51dd340a658 x10: ffff751dd340a658 x9 : ffffa8ee930ebbbc [ 17.673919] x8 : ffffa8ee9a0532c3 x7 : 0000000000000001 x6 : ffff751dd340a658 [ 17.674386] x5 : ffffa8ee9a0532c0 x4 : 1ffe000018f06799 x3 : dfff800000000000 [ 17.674822] x2 : 0000000000000000 x1 : 0000000000000000 x0 : fff00000c7833cc0 [ 17.675260] Call trace: [ 17.675450] stack_depot_print+0x54/0x60 (P) [ 17.675723] kasan_print_aux_stacks+0x50/0x98 [ 17.676080] print_report+0x348/0x608 [ 17.676341] kasan_report+0xdc/0x128 [ 17.676576] kasan_check_range+0x100/0x1a8 [ 17.676902] __asan_memmove+0x3c/0x98 [ 17.677185] kmalloc_memmove_negative_size+0x154/0x2e0 [ 17.677549] kunit_try_run_case+0x170/0x3f0 [ 17.677834] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.678224] kthread+0x328/0x630 [ 17.678458] ret_from_fork+0x10/0x20 [ 17.678708] ---[ end trace 0000000000000000 ]--- [ 17.679019] [ 17.679100] Second to last potentially related work creation: [ 17.679138] ------------[ cut here ]------------ [ 17.679164] pool index 44973 out of bounds (211) for stack id adacafae [ 17.679265] WARNING: CPU: 0 PID: 180 at lib/stackdepot.c:451 depot_fetch_stack+0x6c/0x90 [ 17.680423] Modules linked in: [ 17.681453] CPU: 0 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5 #1 PREEMPT [ 17.682891] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 17.683131] Hardware name: linux,dummy-virt (DT) [ 17.683335] pstate: 624020c9 (nZCv daIF +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 17.684817] pc : depot_fetch_stack+0x6c/0x90 [ 17.685502] lr : depot_fetch_stack+0x6c/0x90 [ 17.685727] sp : ffff800080a27a00 [ 17.685884] x29: ffff800080a27a00 x28: ffffa8ee9a94f000 x27: 1ffff00010010f60 [ 17.686282] x26: 1ffff00010010f5f x25: 0000000000000000 x24: ffffa8ee9375f5c4 [ 17.686633] x23: ffffc1ffc3ff9c00 x22: ffffa8ee982b1b28 x21: ffffa8ee982b4e38 [ 17.686980] x20: fff00000ffe70004 x19: fff00000ffe70040 x18: 000000005bc8891d [ 17.689666] x17: 0000000000000001 x16: 00000000f1f1f1f1 x15: 0000000000000007 [ 17.690839] x14: 0000000000000000 x13: 0000000000000007 x12: ffff751dd340a659 [ 17.692121] x11: 1ffff51dd340a658 x10: ffff751dd340a658 x9 : ffffa8ee930ebbbc [ 17.693268] x8 : ffffa8ee9a0532c3 x7 : 0000000000000001 x6 : ffff751dd340a658 [ 17.694525] x5 : ffffa8ee9a0532c0 x4 : 1ffe000018f06799 x3 : dfff800000000000 [ 17.695665] x2 : 0000000000000000 x1 : 0000000000000000 x0 : fff00000c7833cc0 [ 17.696036] Call trace: [ 17.696185] depot_fetch_stack+0x6c/0x90 (P) [ 17.696751] stack_depot_print+0x24/0x60 [ 17.697157] kasan_print_aux_stacks+0x78/0x98 [ 17.697581] print_report+0x348/0x608 [ 17.697835] kasan_report+0xdc/0x128 [ 17.698347] kasan_check_range+0x100/0x1a8 [ 17.698807] __asan_memmove+0x3c/0x98 [ 17.699195] kmalloc_memmove_negative_size+0x154/0x2e0 [ 17.699529] kunit_try_run_case+0x170/0x3f0 [ 17.699777] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.700137] kthread+0x328/0x630 [ 17.700416] ret_from_fork+0x10/0x20 [ 17.700621] ---[ end trace 0000000000000000 ]--- [ 17.700954] ------------[ cut here ]------------ [ 17.700985] corrupt handle or use after stack_depot_put() [ 17.701117] WARNING: CPU: 0 PID: 180 at lib/stackdepot.c:723 stack_depot_print+0x54/0x60 [ 17.701905] Modules linked in: [ 17.702106] CPU: 0 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc5 #1 PREEMPT [ 17.702501] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 17.702769] Hardware name: linux,dummy-virt (DT) [ 17.703104] pstate: 624020c9 (nZCv daIF +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 17.703457] pc : stack_depot_print+0x54/0x60 [ 17.703715] lr : stack_depot_print+0x54/0x60 [ 17.704033] sp : ffff800080a27a10 [ 17.704301] x29: ffff800080a27a10 x28: ffffa8ee9a94f000 x27: 1ffff00010010f60 [ 17.704703] x26: 1ffff00010010f5f x25: 0000000000000000 x24: ffffa8ee9375f5c4 [ 17.705214] x23: ffffc1ffc3ff9c00 x22: ffffa8ee982b1b28 x21: ffffa8ee982b4e38 [ 17.705633] x20: fff00000ffe70004 x19: fff00000ffe70040 x18: 000000005bc8891d [ 17.706048] x17: 0000000000000001 x16: 00000000f1f1f1f1 x15: 00000000f3f3f3f3 [ 17.706469] x14: ffff700010144f22 x13: 1ffe000018f06799 x12: ffff751dd340a659 [ 17.706879] x11: 1ffff51dd340a658 x10: ffff751dd340a658 x9 : ffffa8ee930ebbbc [ 17.707310] x8 : ffffa8ee9a0532c3 x7 : 0000000000000001 x6 : ffff751dd340a658 [ 17.707728] x5 : ffffa8ee9a0532c0 x4 : 1ffe000018f06799 x3 : dfff800000000000 [ 17.708161] x2 : 0000000000000000 x1 : 0000000000000000 x0 : fff00000c7833cc0 [ 17.708656] Call trace: [ 17.708826] stack_depot_print+0x54/0x60 (P) [ 17.709161] kasan_print_aux_stacks+0x78/0x98 [ 17.709494] print_report+0x348/0x608 [ 17.709698] kasan_report+0xdc/0x128 [ 17.709938] kasan_check_range+0x100/0x1a8 [ 17.710193] __asan_memmove+0x3c/0x98 [ 17.710383] kmalloc_memmove_negative_size+0x154/0x2e0 [ 17.710651] kunit_try_run_case+0x170/0x3f0 [ 17.710903] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.711221] kthread+0x328/0x630 [ 17.711450] ret_from_fork+0x10/0x20 [ 17.711672] ---[ end trace 0000000000000000 ]--- [ 17.711935] [ 17.711980] The buggy address belongs to the object at fff00000ffe70000 [ 17.711980] which belongs to the cache kmalloc-64 of size 64 [ 17.712054] The buggy address is located 4 bytes inside of [ 17.712054] 64-byte region [fff00000ffe70000, fff00000ffe70040) [ 17.712129] [ 17.712151] The buggy address belongs to the physical page: [ 17.712186] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x13fe70 [ 17.712249] memcg:fff00000d9d40db9 [ 17.712282] flags: 0xbfffe0000002000(reserved|node=0|zone=2|lastcpupid=0x1ffff) [ 17.712343] page_type: f5(slab) [ 17.712420] raw: 0bfffe0000002000 fff00000c00018c0 ffffc1ffc3ff9c08 0000000000000000 [ 17.712487] raw: 0000000000000000 0000000000010000 00000001f5000000 fff00000d9d40db9 [ 17.712549] page dumped because: kasan: bad access detected [ 17.712582] [ 17.712602] Memory state around the buggy address: [ 17.712647] fff00000ffe6ff00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.712692] fff00000ffe6ff80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.712736] >fff00000ffe70000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.712777] ^ [ 17.712805] fff00000ffe70080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.712849] fff00000ffe70100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.712890] ==================================================================
[ 12.960621] ================================================================== [ 12.961959] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x171/0x330 [ 12.962225] Read of size 18446744073709551614 at addr ffff8881029b5704 by task kunit_try_catch/197 [ 12.962531] [ 12.962645] CPU: 0 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 12.962695] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.962706] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.962729] Call Trace: [ 12.962742] <TASK> [ 12.963440] dump_stack_lvl+0x73/0xb0 [ 12.963486] print_report+0xd1/0x650 [ 12.963518] ? __virt_addr_valid+0x1db/0x2d0 [ 12.963543] ? kmalloc_memmove_negative_size+0x171/0x330 [ 12.963568] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.963590] ? kmalloc_memmove_negative_size+0x171/0x330 [ 12.963647] kasan_report+0x141/0x180 [ 12.963669] ? kmalloc_memmove_negative_size+0x171/0x330 [ 12.963698] kasan_check_range+0x10c/0x1c0 [ 12.963721] __asan_memmove+0x27/0x70 [ 12.963740] kmalloc_memmove_negative_size+0x171/0x330 [ 12.963766] ? __pfx_kmalloc_memmove_negative_size+0x10/0x10 [ 12.963794] ? __schedule+0x10cc/0x2b60 [ 12.963860] ? __pfx_read_tsc+0x10/0x10 [ 12.963881] ? ktime_get_ts64+0x86/0x230 [ 12.963906] kunit_try_run_case+0x1a5/0x480 [ 12.963931] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.963954] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.963978] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.964001] ? __kthread_parkme+0x82/0x180 [ 12.964022] ? preempt_count_sub+0x50/0x80 [ 12.964046] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.964070] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.964093] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.964118] kthread+0x337/0x6f0 [ 12.964137] ? trace_preempt_on+0x20/0xc0 [ 12.964160] ? __pfx_kthread+0x10/0x10 [ 12.964180] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.964201] ? calculate_sigpending+0x7b/0xa0 [ 12.964225] ? __pfx_kthread+0x10/0x10 [ 12.964245] ret_from_fork+0x116/0x1d0 [ 12.964263] ? __pfx_kthread+0x10/0x10 [ 12.964283] ret_from_fork_asm+0x1a/0x30 [ 12.964315] </TASK> [ 12.964326] [ 12.972449] Allocated by task 197: [ 12.972670] kasan_save_stack+0x45/0x70 [ 12.972876] kasan_save_track+0x18/0x40 [ 12.973067] kasan_save_alloc_info+0x3b/0x50 [ 12.973521] __kasan_kmalloc+0xb7/0xc0 [ 12.973749] __kmalloc_cache_noprof+0x189/0x420 [ 12.974202] kmalloc_memmove_negative_size+0xac/0x330 [ 12.974440] kunit_try_run_case+0x1a5/0x480 [ 12.974642] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.975493] kthread+0x337/0x6f0 [ 12.975707] ret_from_fork+0x116/0x1d0 [ 12.975942] ret_from_fork_asm+0x1a/0x30 [ 12.976130] [ 12.976221] The buggy address belongs to the object at ffff8881029b5700 [ 12.976221] which belongs to the cache kmalloc-64 of size 64 [ 12.976720] The buggy address is located 4 bytes inside of [ 12.976720] 64-byte region [ffff8881029b5700, ffff8881029b5740) [ 12.977986] [ 12.978244] The buggy address belongs to the physical page: [ 12.978722] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029b5 [ 12.979314] flags: 0x200000000000000(node=0|zone=2) [ 12.979689] page_type: f5(slab) [ 12.980102] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 12.980740] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 12.981233] page dumped because: kasan: bad access detected [ 12.981458] [ 12.981549] Memory state around the buggy address: [ 12.981766] ffff8881029b5600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 12.982567] ffff8881029b5680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 12.983229] >ffff8881029b5700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 12.983916] ^ [ 12.984157] ffff8881029b5780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.984456] ffff8881029b5800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.984753] ==================================================================