Hay
Date
July 14, 2025, 10:38 a.m.

Environment
e850-96
qemu-arm64
qemu-x86_64

[   44.363605] ==================================================================
[   44.373289] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0
[   44.380838] Read of size 18446744073709551614 at addr ffff000807bb4b84 by task kunit_try_catch/264
[   44.389779] 
[   44.391265] CPU: 3 UID: 0 PID: 264 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   44.391319] Tainted: [B]=BAD_PAGE, [N]=TEST
[   44.391335] Hardware name: WinLink E850-96 board (DT)
[   44.391354] Call trace:
[   44.391368]  show_stack+0x20/0x38 (C)
[   44.391402]  dump_stack_lvl+0x8c/0xd0
[   44.391436]  print_report+0x118/0x5d0
[   44.391463]  kasan_report+0xdc/0x128
[   44.391491]  kasan_check_range+0x100/0x1a8
[   44.391521]  __asan_memmove+0x3c/0x98
[   44.391552]  kmalloc_memmove_negative_size+0x154/0x2e0
[   44.391587]  kunit_try_run_case+0x170/0x3f0
[   44.391625]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.391656]  kthread+0x328/0x630
[   44.391685]  ret_from_fork+0x10/0x20
[   44.391717] 
[   44.459224] Allocated by task 264:
[   44.462610]  kasan_save_stack+0x3c/0x68
[   44.466427]  kasan_save_track+0x20/0x40
[   44.470246]  kasan_save_alloc_info+0x40/0x58
[   44.474499]  __kasan_kmalloc+0xd4/0xd8
[   44.478232]  __kmalloc_cache_noprof+0x16c/0x3c0
[   44.482746]  kmalloc_memmove_negative_size+0xb0/0x2e0
[   44.487781]  kunit_try_run_case+0x170/0x3f0
[   44.491947]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.497416]  kthread+0x328/0x630
[   44.500627]  ret_from_fork+0x10/0x20
[   44.504187] 
[   44.505664] The buggy address belongs to the object at ffff000807bb4b80
[   44.505664]  which belongs to the cache kmalloc-64 of size 64
[   44.517991] The buggy address is located 4 bytes inside of
[   44.517991]  64-byte region [ffff000807bb4b80, ffff000807bb4bc0)
[   44.529446] 
[   44.530924] The buggy address belongs to the physical page:
[   44.536482] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887bb4
[   44.544466] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   44.550977] page_type: f5(slab)
[   44.554112] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   44.561831] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   44.569550] page dumped because: kasan: bad access detected
[   44.575106] 
[   44.576583] Memory state around the buggy address:
[   44.581362]  ffff000807bb4a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   44.588564]  ffff000807bb4b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   44.595770] >ffff000807bb4b80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   44.602970]                    ^
[   44.606186]  ffff000807bb4c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.613390]  ffff000807bb4c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   44.620592] ==================================================================

[   29.702527] ==================================================================
[   29.702754] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0
[   29.703023] Read of size 18446744073709551614 at addr fff00000c9ad9b04 by task kunit_try_catch/211
[   29.703335] 
[   29.703398] CPU: 0 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   29.703496] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.703523] Hardware name: linux,dummy-virt (DT)
[   29.703646] Call trace:
[   29.703822]  show_stack+0x20/0x38 (C)
[   29.704068]  dump_stack_lvl+0x8c/0xd0
[   29.704167]  print_report+0x118/0x5d0
[   29.704274]  kasan_report+0xdc/0x128
[   29.704330]  kasan_check_range+0x100/0x1a8
[   29.704373]  __asan_memmove+0x3c/0x98
[   29.704415]  kmalloc_memmove_negative_size+0x154/0x2e0
[   29.704466]  kunit_try_run_case+0x170/0x3f0
[   29.704676]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.704730]  kthread+0x328/0x630
[   29.704772]  ret_from_fork+0x10/0x20
[   29.704972] 
[   29.705026] Allocated by task 211:
[   29.705066]  kasan_save_stack+0x3c/0x68
[   29.705111]  kasan_save_track+0x20/0x40
[   29.705149]  kasan_save_alloc_info+0x40/0x58
[   29.705207]  __kasan_kmalloc+0xd4/0xd8
[   29.705387]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.705426]  kmalloc_memmove_negative_size+0xb0/0x2e0
[   29.705613]  kunit_try_run_case+0x170/0x3f0
[   29.705765]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.705811]  kthread+0x328/0x630
[   29.705847]  ret_from_fork+0x10/0x20
[   29.705929] 
[   29.706005] The buggy address belongs to the object at fff00000c9ad9b00
[   29.706005]  which belongs to the cache kmalloc-64 of size 64
[   29.706071] The buggy address is located 4 bytes inside of
[   29.706071]  64-byte region [fff00000c9ad9b00, fff00000c9ad9b40)
[   29.706130] 
[   29.706151] The buggy address belongs to the physical page:
[   29.706183] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ad9
[   29.706239] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.706291] page_type: f5(slab)
[   29.706766] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.706891] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.706934] page dumped because: kasan: bad access detected
[   29.707044] 
[   29.707133] Memory state around the buggy address:
[   29.707167]  fff00000c9ad9a00: 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc fc
[   29.707210]  fff00000c9ad9a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.707251] >fff00000c9ad9b00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   29.707446]                    ^
[   29.707478]  fff00000c9ad9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.707717]  fff00000c9ad9c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.707802] ==================================================================

[   24.464614] ==================================================================
[   24.465174] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x171/0x330
[   24.465424] Read of size 18446744073709551614 at addr ffff888103ea0e84 by task kunit_try_catch/229
[   24.465728] 
[   24.465816] CPU: 0 UID: 0 PID: 229 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) 
[   24.465871] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   24.465884] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.465907] Call Trace:
[   24.465919]  <TASK>
[   24.465937]  dump_stack_lvl+0x73/0xb0
[   24.465969]  print_report+0xd1/0x610
[   24.465990]  ? __virt_addr_valid+0x1db/0x2d0
[   24.466014]  ? kmalloc_memmove_negative_size+0x171/0x330
[   24.466036]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.466067]  ? kmalloc_memmove_negative_size+0x171/0x330
[   24.466107]  kasan_report+0x141/0x180
[   24.466128]  ? kmalloc_memmove_negative_size+0x171/0x330
[   24.466155]  kasan_check_range+0x10c/0x1c0
[   24.466177]  __asan_memmove+0x27/0x70
[   24.466199]  kmalloc_memmove_negative_size+0x171/0x330
[   24.466222]  ? __pfx_kmalloc_memmove_negative_size+0x10/0x10
[   24.466246]  ? __schedule+0x10cc/0x2b60
[   24.466268]  ? __pfx_read_tsc+0x10/0x10
[   24.466289]  ? ktime_get_ts64+0x86/0x230
[   24.466313]  kunit_try_run_case+0x1a5/0x480
[   24.466335]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.466355]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.466377]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.466399]  ? __kthread_parkme+0x82/0x180
[   24.466420]  ? preempt_count_sub+0x50/0x80
[   24.466442]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.466463]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.466487]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.466511]  kthread+0x337/0x6f0
[   24.466529]  ? trace_preempt_on+0x20/0xc0
[   24.466552]  ? __pfx_kthread+0x10/0x10
[   24.466571]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.466591]  ? calculate_sigpending+0x7b/0xa0
[   24.466615]  ? __pfx_kthread+0x10/0x10
[   24.466635]  ret_from_fork+0x116/0x1d0
[   24.466653]  ? __pfx_kthread+0x10/0x10
[   24.466720]  ret_from_fork_asm+0x1a/0x30
[   24.466767]  </TASK>
[   24.466777] 
[   24.485762] Allocated by task 229:
[   24.486341]  kasan_save_stack+0x45/0x70
[   24.486507]  kasan_save_track+0x18/0x40
[   24.486637]  kasan_save_alloc_info+0x3b/0x50
[   24.486960]  __kasan_kmalloc+0xb7/0xc0
[   24.487333]  __kmalloc_cache_noprof+0x189/0x420
[   24.487885]  kmalloc_memmove_negative_size+0xac/0x330
[   24.488404]  kunit_try_run_case+0x1a5/0x480
[   24.488987]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.489400]  kthread+0x337/0x6f0
[   24.489531]  ret_from_fork+0x116/0x1d0
[   24.489670]  ret_from_fork_asm+0x1a/0x30
[   24.489904] 
[   24.490098] The buggy address belongs to the object at ffff888103ea0e80
[   24.490098]  which belongs to the cache kmalloc-64 of size 64
[   24.491296] The buggy address is located 4 bytes inside of
[   24.491296]  64-byte region [ffff888103ea0e80, ffff888103ea0ec0)
[   24.492369] 
[   24.492460] The buggy address belongs to the physical page:
[   24.492628] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ea0
[   24.493199] flags: 0x200000000000000(node=0|zone=2)
[   24.493408] page_type: f5(slab)
[   24.493527] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.493865] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.494584] page dumped because: kasan: bad access detected
[   24.495161] 
[   24.495390] Memory state around the buggy address:
[   24.495873]  ffff888103ea0d80: 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc fc
[   24.496374]  ffff888103ea0e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.496939] >ffff888103ea0e80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   24.497619]                    ^
[   24.497865]  ffff888103ea0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.498382]  ffff888103ea0f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.498922] ==================================================================