Hay
Date
July 2, 2025, 11:10 a.m.

Environment
qemu-arm64
qemu-x86_64

[   30.889853] ==================================================================
[   30.889948] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0
[   30.890013] Read of size 18446744073709551614 at addr fff00000c91ed504 by task kunit_try_catch/213
[   30.890098] 
[   30.890130] CPU: 0 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   30.890217] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.890244] Hardware name: linux,dummy-virt (DT)
[   30.890275] Call trace:
[   30.890300]  show_stack+0x20/0x38 (C)
[   30.890354]  dump_stack_lvl+0x8c/0xd0
[   30.890404]  print_report+0x118/0x608
[   30.890461]  kasan_report+0xdc/0x128
[   30.890508]  kasan_check_range+0x100/0x1a8
[   30.890562]  __asan_memmove+0x3c/0x98
[   30.890610]  kmalloc_memmove_negative_size+0x154/0x2e0
[   30.890661]  kunit_try_run_case+0x170/0x3f0
[   30.890711]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.890765]  kthread+0x328/0x630
[   30.890821]  ret_from_fork+0x10/0x20
[   30.890870] 
[   30.890888] Allocated by task 213:
[   30.890916]  kasan_save_stack+0x3c/0x68
[   30.891329]  kasan_save_track+0x20/0x40
[   30.891884]  kasan_save_alloc_info+0x40/0x58
[   30.892039]  __kasan_kmalloc+0xd4/0xd8
[   30.892119]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.892194]  kmalloc_memmove_negative_size+0xb0/0x2e0
[   30.892323]  kunit_try_run_case+0x170/0x3f0
[   30.892378]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.892422]  kthread+0x328/0x630
[   30.892464]  ret_from_fork+0x10/0x20
[   30.892500] 
[   30.892883] The buggy address belongs to the object at fff00000c91ed500
[   30.892883]  which belongs to the cache kmalloc-64 of size 64
[   30.893013] The buggy address is located 4 bytes inside of
[   30.893013]  64-byte region [fff00000c91ed500, fff00000c91ed540)
[   30.893103] 
[   30.893211] The buggy address belongs to the physical page:
[   30.893272] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091ed
[   30.893362] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.893617] page_type: f5(slab)
[   30.893839] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.894054] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.894216] page dumped because: kasan: bad access detected
[   30.894346] 
[   30.894401] Memory state around the buggy address:
[   30.894528]  fff00000c91ed400: 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc fc
[   30.894608]  fff00000c91ed480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.894658] >fff00000c91ed500: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   30.894720]                    ^
[   30.894815]  fff00000c91ed580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.894892]  fff00000c91ed600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.894948] ==================================================================

[   32.651301] ==================================================================
[   32.651370] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0
[   32.651425] Read of size 18446744073709551614 at addr fff00000c990b384 by task kunit_try_catch/211
[   32.651672] 
[   32.651715] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   32.651831] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.651915] Hardware name: linux,dummy-virt (DT)
[   32.651984] Call trace:
[   32.652036]  show_stack+0x20/0x38 (C)
[   32.652137]  dump_stack_lvl+0x8c/0xd0
[   32.652243]  print_report+0x118/0x608
[   32.652299]  kasan_report+0xdc/0x128
[   32.652368]  kasan_check_range+0x100/0x1a8
[   32.652415]  __asan_memmove+0x3c/0x98
[   32.652458]  kmalloc_memmove_negative_size+0x154/0x2e0
[   32.652608]  kunit_try_run_case+0x170/0x3f0
[   32.652685]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.652802]  kthread+0x328/0x630
[   32.652869]  ret_from_fork+0x10/0x20
[   32.652943] 
[   32.653016] Allocated by task 211:
[   32.653066]  kasan_save_stack+0x3c/0x68
[   32.653148]  kasan_save_track+0x20/0x40
[   32.653255]  kasan_save_alloc_info+0x40/0x58
[   32.653313]  __kasan_kmalloc+0xd4/0xd8
[   32.653399]  __kmalloc_cache_noprof+0x16c/0x3c0
[   32.653473]  kmalloc_memmove_negative_size+0xb0/0x2e0
[   32.653545]  kunit_try_run_case+0x170/0x3f0
[   32.653618]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.653699]  kthread+0x328/0x630
[   32.653742]  ret_from_fork+0x10/0x20
[   32.653778] 
[   32.653797] The buggy address belongs to the object at fff00000c990b380
[   32.653797]  which belongs to the cache kmalloc-64 of size 64
[   32.653863] The buggy address is located 4 bytes inside of
[   32.653863]  64-byte region [fff00000c990b380, fff00000c990b3c0)
[   32.653931] 
[   32.653961] The buggy address belongs to the physical page:
[   32.653997] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10990b
[   32.654049] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.654113] page_type: f5(slab)
[   32.654151] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.654220] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.654270] page dumped because: kasan: bad access detected
[   32.654302] 
[   32.654319] Memory state around the buggy address:
[   32.654350]  fff00000c990b280: 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc fc
[   32.654403]  fff00000c990b300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.654446] >fff00000c990b380: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   32.654485]                    ^
[   32.654520]  fff00000c990b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.654563]  fff00000c990b480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.654601] ==================================================================

[   23.236901] ==================================================================
[   23.237389] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x171/0x330
[   23.237737] Read of size 18446744073709551614 at addr ffff888105895684 by task kunit_try_catch/228
[   23.238175] 
[   23.238286] CPU: 0 UID: 0 PID: 228 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   23.238350] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.238363] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.238383] Call Trace:
[   23.238395]  <TASK>
[   23.238410]  dump_stack_lvl+0x73/0xb0
[   23.238437]  print_report+0xd1/0x650
[   23.238459]  ? __virt_addr_valid+0x1db/0x2d0
[   23.238480]  ? kmalloc_memmove_negative_size+0x171/0x330
[   23.238503]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.238528]  ? kmalloc_memmove_negative_size+0x171/0x330
[   23.238552]  kasan_report+0x141/0x180
[   23.238573]  ? kmalloc_memmove_negative_size+0x171/0x330
[   23.238601]  kasan_check_range+0x10c/0x1c0
[   23.238623]  __asan_memmove+0x27/0x70
[   23.238646]  kmalloc_memmove_negative_size+0x171/0x330
[   23.238669]  ? __pfx_kmalloc_memmove_negative_size+0x10/0x10
[   23.238717]  ? __pfx_kmalloc_memmove_negative_size+0x10/0x10
[   23.238745]  kunit_try_run_case+0x1a5/0x480
[   23.238770]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.238792]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.238813]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.238834]  ? __kthread_parkme+0x82/0x180
[   23.238854]  ? preempt_count_sub+0x50/0x80
[   23.238876]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.238900]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.238924]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.238947]  kthread+0x337/0x6f0
[   23.238966]  ? trace_preempt_on+0x20/0xc0
[   23.239005]  ? __pfx_kthread+0x10/0x10
[   23.239026]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.239062]  ? calculate_sigpending+0x7b/0xa0
[   23.239085]  ? __pfx_kthread+0x10/0x10
[   23.239106]  ret_from_fork+0x116/0x1d0
[   23.239124]  ? __pfx_kthread+0x10/0x10
[   23.239144]  ret_from_fork_asm+0x1a/0x30
[   23.239174]  </TASK>
[   23.239185] 
[   23.246911] Allocated by task 228:
[   23.247036]  kasan_save_stack+0x45/0x70
[   23.247165]  kasan_save_track+0x18/0x40
[   23.247335]  kasan_save_alloc_info+0x3b/0x50
[   23.247611]  __kasan_kmalloc+0xb7/0xc0
[   23.248008]  __kmalloc_cache_noprof+0x189/0x420
[   23.248343]  kmalloc_memmove_negative_size+0xac/0x330
[   23.248739]  kunit_try_run_case+0x1a5/0x480
[   23.248958]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.249482]  kthread+0x337/0x6f0
[   23.249754]  ret_from_fork+0x116/0x1d0
[   23.249942]  ret_from_fork_asm+0x1a/0x30
[   23.250089] 
[   23.250154] The buggy address belongs to the object at ffff888105895680
[   23.250154]  which belongs to the cache kmalloc-64 of size 64
[   23.250676] The buggy address is located 4 bytes inside of
[   23.250676]  64-byte region [ffff888105895680, ffff8881058956c0)
[   23.251356] 
[   23.251481] The buggy address belongs to the physical page:
[   23.251856] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105895
[   23.252100] flags: 0x200000000000000(node=0|zone=2)
[   23.252253] page_type: f5(slab)
[   23.252376] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.253032] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.253407] page dumped because: kasan: bad access detected
[   23.253816] 
[   23.253913] Memory state around the buggy address:
[   23.254282]  ffff888105895580: 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc fc
[   23.254670]  ffff888105895600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.254966] >ffff888105895680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   23.255302]                    ^
[   23.255504]  ffff888105895700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.255888]  ffff888105895780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.256179] ==================================================================

[   23.518513] ==================================================================
[   23.518944] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x171/0x330
[   23.519490] Read of size 18446744073709551614 at addr ffff888105a09984 by task kunit_try_catch/229
[   23.520365] 
[   23.520547] CPU: 0 UID: 0 PID: 229 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   23.520600] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.520613] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.520636] Call Trace:
[   23.520650]  <TASK>
[   23.520670]  dump_stack_lvl+0x73/0xb0
[   23.520703]  print_report+0xd1/0x650
[   23.520726]  ? __virt_addr_valid+0x1db/0x2d0
[   23.520750]  ? kmalloc_memmove_negative_size+0x171/0x330
[   23.520775]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.520800]  ? kmalloc_memmove_negative_size+0x171/0x330
[   23.520846]  kasan_report+0x141/0x180
[   23.520867]  ? kmalloc_memmove_negative_size+0x171/0x330
[   23.520895]  kasan_check_range+0x10c/0x1c0
[   23.520918]  __asan_memmove+0x27/0x70
[   23.520942]  kmalloc_memmove_negative_size+0x171/0x330
[   23.520965]  ? __pfx_kmalloc_memmove_negative_size+0x10/0x10
[   23.520992]  ? __pfx_kmalloc_memmove_negative_size+0x10/0x10
[   23.521019]  kunit_try_run_case+0x1a5/0x480
[   23.521046]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.521084]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.521106]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.521128]  ? __kthread_parkme+0x82/0x180
[   23.521148]  ? preempt_count_sub+0x50/0x80
[   23.521172]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.521245]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.521269]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.521293]  kthread+0x337/0x6f0
[   23.521312]  ? trace_preempt_on+0x20/0xc0
[   23.521337]  ? __pfx_kthread+0x10/0x10
[   23.521357]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.521382]  ? calculate_sigpending+0x7b/0xa0
[   23.521405]  ? __pfx_kthread+0x10/0x10
[   23.521427]  ret_from_fork+0x116/0x1d0
[   23.521447]  ? __pfx_kthread+0x10/0x10
[   23.521467]  ret_from_fork_asm+0x1a/0x30
[   23.521498]  </TASK>
[   23.521511] 
[   23.532682] Allocated by task 229:
[   23.532886]  kasan_save_stack+0x45/0x70
[   23.533090]  kasan_save_track+0x18/0x40
[   23.533222]  kasan_save_alloc_info+0x3b/0x50
[   23.533613]  __kasan_kmalloc+0xb7/0xc0
[   23.533808]  __kmalloc_cache_noprof+0x189/0x420
[   23.534006]  kmalloc_memmove_negative_size+0xac/0x330
[   23.534212]  kunit_try_run_case+0x1a5/0x480
[   23.534457]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.534629]  kthread+0x337/0x6f0
[   23.534745]  ret_from_fork+0x116/0x1d0
[   23.534924]  ret_from_fork_asm+0x1a/0x30
[   23.535125] 
[   23.535217] The buggy address belongs to the object at ffff888105a09980
[   23.535217]  which belongs to the cache kmalloc-64 of size 64
[   23.536100] The buggy address is located 4 bytes inside of
[   23.536100]  64-byte region [ffff888105a09980, ffff888105a099c0)
[   23.536565] 
[   23.536648] The buggy address belongs to the physical page:
[   23.536897] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a09
[   23.537277] flags: 0x200000000000000(node=0|zone=2)
[   23.537564] page_type: f5(slab)
[   23.537713] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.538071] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.538357] page dumped because: kasan: bad access detected
[   23.538608] 
[   23.538697] Memory state around the buggy address:
[   23.538870]  ffff888105a09880: 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc fc
[   23.539090]  ffff888105a09900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.539352] >ffff888105a09980: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   23.539698]                    ^
[   23.539858]  ffff888105a09a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.540269]  ffff888105a09a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.540512] ==================================================================