Hay
Date
June 26, 2025, 9:10 a.m.

Environment
dragonboard-845c
qemu-arm64
qemu-x86_64

[   39.829617] ==================================================================
[   39.841175] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0
[   39.848853] Read of size 18446744073709551614 at addr ffff000093903884 by task kunit_try_catch/266
[   39.857932] 
[   39.859467] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   39.859495] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.859504] Hardware name: Thundercomm Dragonboard 845c (DT)
[   39.859516] Call trace:
[   39.859523]  show_stack+0x20/0x38 (C)
[   39.859542]  dump_stack_lvl+0x8c/0xd0
[   39.859562]  print_report+0x118/0x608
[   39.859582]  kasan_report+0xdc/0x128
[   39.859600]  kasan_check_range+0x100/0x1a8
[   39.859621]  __asan_memmove+0x3c/0x98
[   39.859636]  kmalloc_memmove_negative_size+0x154/0x2e0
[   39.859656]  kunit_try_run_case+0x170/0x3f0
[   39.859675]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.859697]  kthread+0x328/0x630
[   39.859711]  ret_from_fork+0x10/0x20
[   39.859730] 
[   39.929399] Allocated by task 266:
[   39.932865]  kasan_save_stack+0x3c/0x68
[   39.936771]  kasan_save_track+0x20/0x40
[   39.940675]  kasan_save_alloc_info+0x40/0x58
[   39.945019]  __kasan_kmalloc+0xd4/0xd8
[   39.948837]  __kmalloc_cache_noprof+0x16c/0x3c0
[   39.953444]  kmalloc_memmove_negative_size+0xb0/0x2e0
[   39.958581]  kunit_try_run_case+0x170/0x3f0
[   39.962840]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.968408]  kthread+0x328/0x630
[   39.971693]  ret_from_fork+0x10/0x20
[   39.975338] 
[   39.976868] The buggy address belongs to the object at ffff000093903880
[   39.976868]  which belongs to the cache kmalloc-64 of size 64
[   39.989356] The buggy address is located 4 bytes inside of
[   39.989356]  64-byte region [ffff000093903880, ffff0000939038c0)
[   40.000970] 
[   40.002500] The buggy address belongs to the physical page:
[   40.008144] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x113903
[   40.016249] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   40.022873] page_type: f5(slab)
[   40.026075] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000
[   40.033921] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   40.041763] page dumped because: kasan: bad access detected
[   40.047408] 
[   40.048938] Memory state around the buggy address:
[   40.053796]  ffff000093903780: 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc fc
[   40.061110]  ffff000093903800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   40.068426] >ffff000093903880: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   40.075738]                    ^
[   40.079022]  ffff000093903900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.086337]  ffff000093903980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.093649] ==================================================================

[   26.909899] ==================================================================
[   26.909977] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0
[   26.910032] Read of size 18446744073709551614 at addr fff00000c5753204 by task kunit_try_catch/192
[   26.910126] 
[   26.910162] CPU: 0 UID: 0 PID: 192 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   26.910262] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.910288] Hardware name: linux,dummy-virt (DT)
[   26.910407] Call trace:
[   26.910458]  show_stack+0x20/0x38 (C)
[   26.910621]  dump_stack_lvl+0x8c/0xd0
[   26.910670]  print_report+0x118/0x608
[   26.910717]  kasan_report+0xdc/0x128
[   26.910761]  kasan_check_range+0x100/0x1a8
[   26.910808]  __asan_memmove+0x3c/0x98
[   26.910851]  kmalloc_memmove_negative_size+0x154/0x2e0
[   26.910902]  kunit_try_run_case+0x170/0x3f0
[   26.910948]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.911001]  kthread+0x328/0x630
[   26.911042]  ret_from_fork+0x10/0x20
[   26.911098] 
[   26.911125] Allocated by task 192:
[   26.911153]  kasan_save_stack+0x3c/0x68
[   26.911191]  kasan_save_track+0x20/0x40
[   26.911229]  kasan_save_alloc_info+0x40/0x58
[   26.911266]  __kasan_kmalloc+0xd4/0xd8
[   26.911302]  __kmalloc_cache_noprof+0x16c/0x3c0
[   26.911341]  kmalloc_memmove_negative_size+0xb0/0x2e0
[   26.911418]  kunit_try_run_case+0x170/0x3f0
[   26.911530]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.911653]  kthread+0x328/0x630
[   26.911752]  ret_from_fork+0x10/0x20
[   26.911840] 
[   26.911859] The buggy address belongs to the object at fff00000c5753200
[   26.911859]  which belongs to the cache kmalloc-64 of size 64
[   26.912185] The buggy address is located 4 bytes inside of
[   26.912185]  64-byte region [fff00000c5753200, fff00000c5753240)
[   26.912246] 
[   26.912272] The buggy address belongs to the physical page:
[   26.912302] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105753
[   26.912386] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.912479] page_type: f5(slab)
[   26.912521] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   26.912606] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.912763] page dumped because: kasan: bad access detected
[   26.912900] 
[   26.912918] Memory state around the buggy address:
[   26.913011]  fff00000c5753100: 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc fc
[   26.913134]  fff00000c5753180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.913175] >fff00000c5753200: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   26.913214]                    ^
[   26.913245]  fff00000c5753280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.913421]  fff00000c5753300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.913458] ==================================================================

[   22.301935] ==================================================================
[   22.302438] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x171/0x330
[   22.302693] Read of size 18446744073709551614 at addr ffff8881024d1904 by task kunit_try_catch/209
[   22.304138] 
[   22.304357] CPU: 0 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) 
[   22.304412] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.304425] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.304449] Call Trace:
[   22.304464]  <TASK>
[   22.304483]  dump_stack_lvl+0x73/0xb0
[   22.304518]  print_report+0xd1/0x650
[   22.304541]  ? __virt_addr_valid+0x1db/0x2d0
[   22.304565]  ? kmalloc_memmove_negative_size+0x171/0x330
[   22.304589]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.304615]  ? kmalloc_memmove_negative_size+0x171/0x330
[   22.304663]  kasan_report+0x141/0x180
[   22.304685]  ? kmalloc_memmove_negative_size+0x171/0x330
[   22.304712]  kasan_check_range+0x10c/0x1c0
[   22.304734]  __asan_memmove+0x27/0x70
[   22.304756]  kmalloc_memmove_negative_size+0x171/0x330
[   22.304780]  ? __pfx_kmalloc_memmove_negative_size+0x10/0x10
[   22.304939]  ? __schedule+0x10cc/0x2b60
[   22.304968]  ? __pfx_read_tsc+0x10/0x10
[   22.305005]  ? ktime_get_ts64+0x86/0x230
[   22.305030]  kunit_try_run_case+0x1a5/0x480
[   22.305094]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.305117]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.305140]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.305164]  ? __kthread_parkme+0x82/0x180
[   22.305185]  ? preempt_count_sub+0x50/0x80
[   22.305208]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.305240]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.305263]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.305286]  kthread+0x337/0x6f0
[   22.305304]  ? trace_preempt_on+0x20/0xc0
[   22.305328]  ? __pfx_kthread+0x10/0x10
[   22.305347]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.305370]  ? calculate_sigpending+0x7b/0xa0
[   22.305393]  ? __pfx_kthread+0x10/0x10
[   22.305413]  ret_from_fork+0x116/0x1d0
[   22.305431]  ? __pfx_kthread+0x10/0x10
[   22.305451]  ret_from_fork_asm+0x1a/0x30
[   22.305482]  </TASK>
[   22.305494] 
[   22.317449] Allocated by task 209:
[   22.317725]  kasan_save_stack+0x45/0x70
[   22.318091]  kasan_save_track+0x18/0x40
[   22.318238]  kasan_save_alloc_info+0x3b/0x50
[   22.318417]  __kasan_kmalloc+0xb7/0xc0
[   22.318655]  __kmalloc_cache_noprof+0x189/0x420
[   22.319123]  kmalloc_memmove_negative_size+0xac/0x330
[   22.319504]  kunit_try_run_case+0x1a5/0x480
[   22.319755]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.319927]  kthread+0x337/0x6f0
[   22.320208]  ret_from_fork+0x116/0x1d0
[   22.320605]  ret_from_fork_asm+0x1a/0x30
[   22.320833] 
[   22.320953] The buggy address belongs to the object at ffff8881024d1900
[   22.320953]  which belongs to the cache kmalloc-64 of size 64
[   22.321464] The buggy address is located 4 bytes inside of
[   22.321464]  64-byte region [ffff8881024d1900, ffff8881024d1940)
[   22.322021] 
[   22.322112] The buggy address belongs to the physical page:
[   22.322485] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024d1
[   22.322820] flags: 0x200000000000000(node=0|zone=2)
[   22.323252] page_type: f5(slab)
[   22.323481] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.323810] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.324276] page dumped because: kasan: bad access detected
[   22.324518] 
[   22.324629] Memory state around the buggy address:
[   22.324898]  ffff8881024d1800: 00 00 00 00 05 fc fc fc fc fc fc fc fc fc fc fc
[   22.325413]  ffff8881024d1880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.325758] >ffff8881024d1900: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   22.326198]                    ^
[   22.326439]  ffff8881024d1980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.326684]  ffff8881024d1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.327266] ==================================================================