Hay
Date
July 20, 2025, 11:12 p.m.

Environment
qemu-arm64
qemu-x86_64

[   18.800908] ==================================================================
[   18.800992] BUG: KASAN: slab-out-of-bounds in memcmp+0x198/0x1d8
[   18.801099] Read of size 1 at addr fff00000c79c3918 by task kunit_try_catch/257
[   18.801152] 
[   18.801188] CPU: 1 UID: 0 PID: 257 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   18.801339] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.801601] Hardware name: linux,dummy-virt (DT)
[   18.801744] Call trace:
[   18.801771]  show_stack+0x20/0x38 (C)
[   18.801971]  dump_stack_lvl+0x8c/0xd0
[   18.802023]  print_report+0x118/0x5d0
[   18.802091]  kasan_report+0xdc/0x128
[   18.802141]  __asan_report_load1_noabort+0x20/0x30
[   18.802195]  memcmp+0x198/0x1d8
[   18.802240]  kasan_memcmp+0x16c/0x300
[   18.802288]  kunit_try_run_case+0x170/0x3f0
[   18.802339]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.802398]  kthread+0x328/0x630
[   18.802443]  ret_from_fork+0x10/0x20
[   18.802493] 
[   18.802515] Allocated by task 257:
[   18.802547]  kasan_save_stack+0x3c/0x68
[   18.802591]  kasan_save_track+0x20/0x40
[   18.802640]  kasan_save_alloc_info+0x40/0x58
[   18.802682]  __kasan_kmalloc+0xd4/0xd8
[   18.803217]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.803268]  kasan_memcmp+0xbc/0x300
[   18.803306]  kunit_try_run_case+0x170/0x3f0
[   18.803464]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.803511]  kthread+0x328/0x630
[   18.803548]  ret_from_fork+0x10/0x20
[   18.803659] 
[   18.803715] The buggy address belongs to the object at fff00000c79c3900
[   18.803715]  which belongs to the cache kmalloc-32 of size 32
[   18.803781] The buggy address is located 0 bytes to the right of
[   18.803781]  allocated 24-byte region [fff00000c79c3900, fff00000c79c3918)
[   18.803850] 
[   18.803908] The buggy address belongs to the physical page:
[   18.803978] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079c3
[   18.804043] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.804096] page_type: f5(slab)
[   18.804139] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   18.804351] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   18.804400] page dumped because: kasan: bad access detected
[   18.804435] 
[   18.804464] Memory state around the buggy address:
[   18.804616]  fff00000c79c3800: 00 00 00 fc fc fc fc fc 00 00 00 04 fc fc fc fc
[   18.804664]  fff00000c79c3880: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   18.804709] >fff00000c79c3900: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.804753]                             ^
[   18.804785]  fff00000c79c3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.805085]  fff00000c79c3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.805515] ==================================================================

[   19.015817] ==================================================================
[   19.015886] BUG: KASAN: slab-out-of-bounds in memcmp+0x198/0x1d8
[   19.015948] Read of size 1 at addr fff00000c5b41158 by task kunit_try_catch/257
[   19.016004] 
[   19.016045] CPU: 1 UID: 0 PID: 257 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   19.016669] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.016714] Hardware name: linux,dummy-virt (DT)
[   19.016754] Call trace:
[   19.016781]  show_stack+0x20/0x38 (C)
[   19.017364]  dump_stack_lvl+0x8c/0xd0
[   19.017448]  print_report+0x118/0x5d0
[   19.017610]  kasan_report+0xdc/0x128
[   19.017970]  __asan_report_load1_noabort+0x20/0x30
[   19.018098]  memcmp+0x198/0x1d8
[   19.018431]  kasan_memcmp+0x16c/0x300
[   19.018789]  kunit_try_run_case+0x170/0x3f0
[   19.019122]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.019396]  kthread+0x328/0x630
[   19.019633]  ret_from_fork+0x10/0x20
[   19.019695] 
[   19.019717] Allocated by task 257:
[   19.019752]  kasan_save_stack+0x3c/0x68
[   19.019820]  kasan_save_track+0x20/0x40
[   19.019863]  kasan_save_alloc_info+0x40/0x58
[   19.019905]  __kasan_kmalloc+0xd4/0xd8
[   19.019945]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.020027]  kasan_memcmp+0xbc/0x300
[   19.020065]  kunit_try_run_case+0x170/0x3f0
[   19.020110]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.020248]  kthread+0x328/0x630
[   19.020284]  ret_from_fork+0x10/0x20
[   19.020740] 
[   19.020830] The buggy address belongs to the object at fff00000c5b41140
[   19.020830]  which belongs to the cache kmalloc-32 of size 32
[   19.021024] The buggy address is located 0 bytes to the right of
[   19.021024]  allocated 24-byte region [fff00000c5b41140, fff00000c5b41158)
[   19.021100] 
[   19.021306] The buggy address belongs to the physical page:
[   19.021357] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b41
[   19.021448] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.021688] page_type: f5(slab)
[   19.021878] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   19.021942] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   19.021988] page dumped because: kasan: bad access detected
[   19.022703] 
[   19.022729] Memory state around the buggy address:
[   19.022769]  fff00000c5b41000: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   19.023118]  fff00000c5b41080: 00 00 00 04 fc fc fc fc 00 00 07 fc fc fc fc fc
[   19.023466] >fff00000c5b41100: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   19.023712]                                                     ^
[   19.023858]  fff00000c5b41180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.023918]  fff00000c5b41200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.023961] ==================================================================

[   14.587547] ==================================================================
[   14.588133] BUG: KASAN: slab-out-of-bounds in memcmp+0x1b4/0x1d0
[   14.588829] Read of size 1 at addr ffff888103951458 by task kunit_try_catch/275
[   14.589609] 
[   14.589851] CPU: 1 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   14.589968] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.589982] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.590003] Call Trace:
[   14.590017]  <TASK>
[   14.590037]  dump_stack_lvl+0x73/0xb0
[   14.590070]  print_report+0xd1/0x610
[   14.590096]  ? __virt_addr_valid+0x1db/0x2d0
[   14.590121]  ? memcmp+0x1b4/0x1d0
[   14.590141]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.590164]  ? memcmp+0x1b4/0x1d0
[   14.590184]  kasan_report+0x141/0x180
[   14.590206]  ? memcmp+0x1b4/0x1d0
[   14.590232]  __asan_report_load1_noabort+0x18/0x20
[   14.590256]  memcmp+0x1b4/0x1d0
[   14.590278]  kasan_memcmp+0x18f/0x390
[   14.590298]  ? trace_hardirqs_on+0x37/0xe0
[   14.590324]  ? __pfx_kasan_memcmp+0x10/0x10
[   14.590345]  ? finish_task_switch.isra.0+0x153/0x700
[   14.590368]  ? __switch_to+0x47/0xf50
[   14.590412]  ? __pfx_read_tsc+0x10/0x10
[   14.590434]  ? ktime_get_ts64+0x86/0x230
[   14.590459]  kunit_try_run_case+0x1a5/0x480
[   14.590486]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.590509]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.590533]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.590558]  ? __kthread_parkme+0x82/0x180
[   14.590580]  ? preempt_count_sub+0x50/0x80
[   14.590607]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.590632]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.590656]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.590680]  kthread+0x337/0x6f0
[   14.590700]  ? trace_preempt_on+0x20/0xc0
[   14.590722]  ? __pfx_kthread+0x10/0x10
[   14.590744]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.590766]  ? calculate_sigpending+0x7b/0xa0
[   14.590792]  ? __pfx_kthread+0x10/0x10
[   14.590814]  ret_from_fork+0x116/0x1d0
[   14.590834]  ? __pfx_kthread+0x10/0x10
[   14.590855]  ret_from_fork_asm+0x1a/0x30
[   14.590889]  </TASK>
[   14.590900] 
[   14.604218] Allocated by task 275:
[   14.604497]  kasan_save_stack+0x45/0x70
[   14.604694]  kasan_save_track+0x18/0x40
[   14.604935]  kasan_save_alloc_info+0x3b/0x50
[   14.605304]  __kasan_kmalloc+0xb7/0xc0
[   14.605582]  __kmalloc_cache_noprof+0x189/0x420
[   14.605846]  kasan_memcmp+0xb7/0x390
[   14.606006]  kunit_try_run_case+0x1a5/0x480
[   14.606326]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.606665]  kthread+0x337/0x6f0
[   14.606804]  ret_from_fork+0x116/0x1d0
[   14.606939]  ret_from_fork_asm+0x1a/0x30
[   14.607191] 
[   14.607574] The buggy address belongs to the object at ffff888103951440
[   14.607574]  which belongs to the cache kmalloc-32 of size 32
[   14.608084] The buggy address is located 0 bytes to the right of
[   14.608084]  allocated 24-byte region [ffff888103951440, ffff888103951458)
[   14.608554] 
[   14.608801] The buggy address belongs to the physical page:
[   14.609136] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103951
[   14.609799] flags: 0x200000000000000(node=0|zone=2)
[   14.610057] page_type: f5(slab)
[   14.610332] raw: 0200000000000000 ffff888100041780 dead000000000122 0000000000000000
[   14.610728] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   14.611008] page dumped because: kasan: bad access detected
[   14.611268] 
[   14.611475] Memory state around the buggy address:
[   14.611806]  ffff888103951300: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   14.612074]  ffff888103951380: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   14.612577] >ffff888103951400: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   14.613150]                                                     ^
[   14.613606]  ffff888103951480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.613956]  ffff888103951500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.614379] ==================================================================

[   14.673311] ==================================================================
[   14.674581] BUG: KASAN: slab-out-of-bounds in memcmp+0x1b4/0x1d0
[   14.675478] Read of size 1 at addr ffff8881039bc1d8 by task kunit_try_catch/275
[   14.675913] 
[   14.676013] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   14.676064] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.676076] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.676100] Call Trace:
[   14.676115]  <TASK>
[   14.676134]  dump_stack_lvl+0x73/0xb0
[   14.676179]  print_report+0xd1/0x610
[   14.676206]  ? __virt_addr_valid+0x1db/0x2d0
[   14.676230]  ? memcmp+0x1b4/0x1d0
[   14.676248]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.676270]  ? memcmp+0x1b4/0x1d0
[   14.676288]  kasan_report+0x141/0x180
[   14.676309]  ? memcmp+0x1b4/0x1d0
[   14.676336]  __asan_report_load1_noabort+0x18/0x20
[   14.676360]  memcmp+0x1b4/0x1d0
[   14.676379]  kasan_memcmp+0x18f/0x390
[   14.676399]  ? trace_hardirqs_on+0x37/0xe0
[   14.676424]  ? __pfx_kasan_memcmp+0x10/0x10
[   14.676444]  ? finish_task_switch.isra.0+0x153/0x700
[   14.676467]  ? __switch_to+0x47/0xf50
[   14.676496]  ? __pfx_read_tsc+0x10/0x10
[   14.676519]  ? ktime_get_ts64+0x86/0x230
[   14.676543]  kunit_try_run_case+0x1a5/0x480
[   14.676570]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.676592]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.676617]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.676640]  ? __kthread_parkme+0x82/0x180
[   14.676661]  ? preempt_count_sub+0x50/0x80
[   14.676683]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.676707]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.676730]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.676754]  kthread+0x337/0x6f0
[   14.676773]  ? trace_preempt_on+0x20/0xc0
[   14.676795]  ? __pfx_kthread+0x10/0x10
[   14.676815]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.676836]  ? calculate_sigpending+0x7b/0xa0
[   14.676873]  ? __pfx_kthread+0x10/0x10
[   14.676895]  ret_from_fork+0x116/0x1d0
[   14.676913]  ? __pfx_kthread+0x10/0x10
[   14.676933]  ret_from_fork_asm+0x1a/0x30
[   14.676965]  </TASK>
[   14.676976] 
[   14.690117] Allocated by task 275:
[   14.690272]  kasan_save_stack+0x45/0x70
[   14.690635]  kasan_save_track+0x18/0x40
[   14.691027]  kasan_save_alloc_info+0x3b/0x50
[   14.691478]  __kasan_kmalloc+0xb7/0xc0
[   14.691912]  __kmalloc_cache_noprof+0x189/0x420
[   14.692195]  kasan_memcmp+0xb7/0x390
[   14.692349]  kunit_try_run_case+0x1a5/0x480
[   14.692716]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.693289]  kthread+0x337/0x6f0
[   14.693686]  ret_from_fork+0x116/0x1d0
[   14.694094]  ret_from_fork_asm+0x1a/0x30
[   14.694573] 
[   14.694655] The buggy address belongs to the object at ffff8881039bc1c0
[   14.694655]  which belongs to the cache kmalloc-32 of size 32
[   14.695380] The buggy address is located 0 bytes to the right of
[   14.695380]  allocated 24-byte region [ffff8881039bc1c0, ffff8881039bc1d8)
[   14.696636] 
[   14.696717] The buggy address belongs to the physical page:
[   14.697003] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039bc
[   14.697799] flags: 0x200000000000000(node=0|zone=2)
[   14.698348] page_type: f5(slab)
[   14.698551] raw: 0200000000000000 ffff888100041780 dead000000000122 0000000000000000
[   14.698798] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   14.699606] page dumped because: kasan: bad access detected
[   14.700095] 
[   14.700274] Memory state around the buggy address:
[   14.700857]  ffff8881039bc080: fa fb fb fb fc fc fc fc 00 00 07 fc fc fc fc fc
[   14.701437]  ffff8881039bc100: 00 00 00 fc fc fc fc fc 00 00 00 04 fc fc fc fc
[   14.702119] >ffff8881039bc180: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   14.702581]                                                     ^
[   14.703183]  ffff8881039bc200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.703621]  ffff8881039bc280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.703840] ==================================================================