Hay
Date
July 11, 2025, 11:09 p.m.

Environment
qemu-arm64
qemu-x86_64

[   16.760697] ==================================================================
[   16.760951] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0
[   16.761503] Read of size 18446744073709551614 at addr fff00000c6f45c04 by task kunit_try_catch/181
[   16.761688] 
[   16.761731] CPU: 0 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   16.761815] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.761851] Hardware name: linux,dummy-virt (DT)
[   16.761882] Call trace:
[   16.761906]  show_stack+0x20/0x38 (C)
[   16.762258]  dump_stack_lvl+0x8c/0xd0
[   16.762313]  print_report+0x118/0x608
[   16.762359]  kasan_report+0xdc/0x128
[   16.762402]  kasan_check_range+0x100/0x1a8
[   16.762918]  __asan_memmove+0x3c/0x98
[   16.762973]  kmalloc_memmove_negative_size+0x154/0x2e0
[   16.763138]  kunit_try_run_case+0x170/0x3f0
[   16.763210]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.763261]  kthread+0x328/0x630
[   16.763302]  ret_from_fork+0x10/0x20
[   16.763357] 
[   16.763376] Allocated by task 181:
[   16.763404]  kasan_save_stack+0x3c/0x68
[   16.763501]  kasan_save_track+0x20/0x40
[   16.763658]  kasan_save_alloc_info+0x40/0x58
[   16.763776]  __kasan_kmalloc+0xd4/0xd8
[   16.763813]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.764290]  kmalloc_memmove_negative_size+0xb0/0x2e0
[   16.764552]  kunit_try_run_case+0x170/0x3f0
[   16.764630]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.764672]  kthread+0x328/0x630
[   16.764703]  ret_from_fork+0x10/0x20
[   16.764740] 
[   16.764762] The buggy address belongs to the object at fff00000c6f45c00
[   16.764762]  which belongs to the cache kmalloc-64 of size 64
[   16.764836] The buggy address is located 4 bytes inside of
[   16.764836]  64-byte region [fff00000c6f45c00, fff00000c6f45c40)
[   16.764918] 
[   16.764939] The buggy address belongs to the physical page:
[   16.764975] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106f45
[   16.765543] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.765653] page_type: f5(slab)
[   16.765697] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   16.765915] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.766007] page dumped because: kasan: bad access detected
[   16.766041] 
[   16.766059] Memory state around the buggy address:
[   16.766165]  fff00000c6f45b00: 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc fc
[   16.766230]  fff00000c6f45b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.766334] >fff00000c6f45c00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   16.766372]                    ^
[   16.766455]  fff00000c6f45c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.766608]  fff00000c6f45d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.766670] ==================================================================

[   12.550161] ==================================================================
[   12.550668] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x171/0x330
[   12.551008] Read of size 18446744073709551614 at addr ffff888102c61b84 by task kunit_try_catch/197
[   12.551464] 
[   12.551558] CPU: 0 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   12.551598] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.551609] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.551627] Call Trace:
[   12.551638]  <TASK>
[   12.551652]  dump_stack_lvl+0x73/0xb0
[   12.551681]  print_report+0xd1/0x650
[   12.551703]  ? __virt_addr_valid+0x1db/0x2d0
[   12.551725]  ? kmalloc_memmove_negative_size+0x171/0x330
[   12.551750]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.551773]  ? kmalloc_memmove_negative_size+0x171/0x330
[   12.551798]  kasan_report+0x141/0x180
[   12.551820]  ? kmalloc_memmove_negative_size+0x171/0x330
[   12.551850]  kasan_check_range+0x10c/0x1c0
[   12.551873]  __asan_memmove+0x27/0x70
[   12.551979]  kmalloc_memmove_negative_size+0x171/0x330
[   12.552005]  ? __pfx_kmalloc_memmove_negative_size+0x10/0x10
[   12.552066]  ? __schedule+0x10cc/0x2b60
[   12.552089]  ? __pfx_read_tsc+0x10/0x10
[   12.552110]  ? ktime_get_ts64+0x86/0x230
[   12.552134]  kunit_try_run_case+0x1a5/0x480
[   12.552158]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.552180]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.552204]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.552227]  ? __kthread_parkme+0x82/0x180
[   12.552247]  ? preempt_count_sub+0x50/0x80
[   12.552270]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.552294]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.552318]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.552342]  kthread+0x337/0x6f0
[   12.552360]  ? trace_preempt_on+0x20/0xc0
[   12.552383]  ? __pfx_kthread+0x10/0x10
[   12.552403]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.552424]  ? calculate_sigpending+0x7b/0xa0
[   12.552448]  ? __pfx_kthread+0x10/0x10
[   12.552469]  ret_from_fork+0x116/0x1d0
[   12.552486]  ? __pfx_kthread+0x10/0x10
[   12.552506]  ret_from_fork_asm+0x1a/0x30
[   12.552537]  </TASK>
[   12.552547] 
[   12.560095] Allocated by task 197:
[   12.560227]  kasan_save_stack+0x45/0x70
[   12.560371]  kasan_save_track+0x18/0x40
[   12.560563]  kasan_save_alloc_info+0x3b/0x50
[   12.560775]  __kasan_kmalloc+0xb7/0xc0
[   12.560984]  __kmalloc_cache_noprof+0x189/0x420
[   12.561392]  kmalloc_memmove_negative_size+0xac/0x330
[   12.561567]  kunit_try_run_case+0x1a5/0x480
[   12.561714]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.562266]  kthread+0x337/0x6f0
[   12.562547]  ret_from_fork+0x116/0x1d0
[   12.562719]  ret_from_fork_asm+0x1a/0x30
[   12.562900] 
[   12.563017] The buggy address belongs to the object at ffff888102c61b80
[   12.563017]  which belongs to the cache kmalloc-64 of size 64
[   12.563561] The buggy address is located 4 bytes inside of
[   12.563561]  64-byte region [ffff888102c61b80, ffff888102c61bc0)
[   12.564031] 
[   12.564157] The buggy address belongs to the physical page:
[   12.564443] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c61
[   12.564788] flags: 0x200000000000000(node=0|zone=2)
[   12.564987] page_type: f5(slab)
[   12.565107] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   12.565339] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   12.565616] page dumped because: kasan: bad access detected
[   12.566111] 
[   12.566207] Memory state around the buggy address:
[   12.566407]  ffff888102c61a80: 00 00 00 00 05 fc fc fc fc fc fc fc fc fc fc fc
[   12.566626]  ffff888102c61b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   12.567066] >ffff888102c61b80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   12.567392]                    ^
[   12.567557]  ffff888102c61c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.567872]  ffff888102c61c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.568324] ==================================================================