Hay
Date
July 15, 2025, 2:10 p.m.

Environment
qemu-arm64
qemu-x86_64

[  105.012715] ==================================================================
[  105.013687] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0xc8/0x200
[  105.014440] Write of size 1 at addr ffff0000c654df00 by task kunit_try_catch/212
[  105.015065] 
[  105.015312] CPU: 1 PID: 212 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[  105.016104] Hardware name: linux,dummy-virt (DT)
[  105.017036] Call trace:
[  105.017330]  dump_backtrace+0xe0/0x134
[  105.017796]  show_stack+0x20/0x2c
[  105.018196]  dump_stack_lvl+0x88/0xb4
[  105.018677]  print_report+0x158/0x44c
[  105.019113]  kasan_report+0xc8/0x180
[  105.019546]  __asan_store1+0x68/0x7c
[  105.019959]  kmalloc_large_oob_right+0xc8/0x200
[  105.021374]  kunit_try_run_case+0x8c/0x124
[  105.021848]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  105.022411]  kthread+0x15c/0x170
[  105.022807]  ret_from_fork+0x10/0x20
[  105.023212] 
[  105.023423] Allocated by task 212:
[  105.023788]  kasan_save_stack+0x3c/0x70
[  105.024266]  kasan_set_track+0x2c/0x40
[  105.024673]  kasan_save_alloc_info+0x24/0x34
[  105.025188]  __kasan_kmalloc+0xd4/0xe0
[  105.025625]  kmalloc_trace+0x8c/0x150
[  105.026401]  kmalloc_large_oob_right+0x9c/0x200
[  105.026944]  kunit_try_run_case+0x8c/0x124
[  105.027390]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  105.027979]  kthread+0x15c/0x170
[  105.028365]  ret_from_fork+0x10/0x20
[  105.029580] 
[  105.029804] The buggy address belongs to the object at ffff0000c654c000
[  105.029804]  which belongs to the cache kmalloc-8k of size 8192
[  105.030729] The buggy address is located 7936 bytes inside of
[  105.030729]  8192-byte region [ffff0000c654c000, ffff0000c654e000)
[  105.031638] 
[  105.031874] The buggy address belongs to the physical page:
[  105.032346] page:000000000a5b8ac5 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106548
[  105.033637] head:000000000a5b8ac5 order:3 compound_mapcount:0 compound_pincount:0
[  105.034263] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[  105.034971] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002c00
[  105.035598] raw: 0000000000000000 0000000080020002 00000001ffffffff 0000000000000000
[  105.036244] page dumped because: kasan: bad access detected
[  105.037477] 
[  105.037706] Memory state around the buggy address:
[  105.038177]  ffff0000c654de00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  105.038815]  ffff0000c654de80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  105.039437] >ffff0000c654df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  105.040014]                    ^
[  105.040335]  ffff0000c654df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  105.040967]  ffff0000c654e000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  105.041561] ==================================================================

[   74.795207] ==================================================================
[   74.795920] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0xa0/0x14c
[   74.796505] Write of size 1 at addr ffff0000c4085f00 by task kunit_try_catch/128
[   74.797712] 
[   74.798035] CPU: 1 PID: 128 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   74.799088] Hardware name: linux,dummy-virt (DT)
[   74.799678] Call trace:
[   74.800059]  dump_backtrace+0xf8/0x118
[   74.800765]  show_stack+0x18/0x24
[   74.801457]  __dump_stack+0x28/0x38
[   74.802039]  dump_stack_lvl+0x54/0x6c
[   74.802630]  print_address_description+0x7c/0x1ec
[   74.803377]  print_report+0x50/0x68
[   74.803993]  kasan_report+0xac/0x100
[   74.804437]  __asan_store1+0x6c/0x70
[   74.805148]  kmalloc_large_oob_right+0xa0/0x14c
[   74.805864]  kunit_try_run_case+0x80/0x184
[   74.806511]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   74.807311]  kthread+0x16c/0x21c
[   74.807804]  ret_from_fork+0x10/0x20
[   74.808180] 
[   74.808367] Allocated by task 128:
[   74.808653]  kasan_set_track+0x4c/0x80
[   74.809453]  kasan_save_alloc_info+0x28/0x34
[   74.810116]  __kasan_kmalloc+0x88/0xa0
[   74.810742]  kmalloc_trace+0x54/0x68
[   74.811335]  kmalloc_large_oob_right+0x48/0x14c
[   74.812027]  kunit_try_run_case+0x80/0x184
[   74.812724]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   74.813540]  kthread+0x16c/0x21c
[   74.814117]  ret_from_fork+0x10/0x20
[   74.814694] 
[   74.814972] The buggy address belongs to the object at ffff0000c4084000
[   74.814972]  which belongs to the cache kmalloc-8k of size 8192
[   74.816354] The buggy address is located 7936 bytes inside of
[   74.816354]  8192-byte region [ffff0000c4084000, ffff0000c4086000)
[   74.817971] 
[   74.818289] The buggy address belongs to the physical page:
[   74.819054] page:000000002acc5e88 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104080
[   74.819781] head:000000002acc5e88 order:3 compound_mapcount:0 compound_pincount:0
[   74.820278] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[   74.821134] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002c00
[   74.822130] raw: 0000000000000000 0000000080020002 00000001ffffffff 0000000000000000
[   74.823028] page dumped because: kasan: bad access detected
[   74.823694] 
[   74.823972] Memory state around the buggy address:
[   74.824608]  ffff0000c4085e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   74.825525]  ffff0000c4085e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   74.826401] >ffff0000c4085f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.827248]                    ^
[   74.827730]  ffff0000c4085f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.828628]  ffff0000c4086000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.829578] ==================================================================

[   73.806788] ==================================================================
[   73.808479] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0xa0/0x14c
[   73.809964] Write of size 1 at addr ffff0000c59f1f00 by task kunit_try_catch/128
[   73.811476] 
[   73.811875] CPU: 0 PID: 128 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   73.813204] Hardware name: linux,dummy-virt (DT)
[   73.813992] Call trace:
[   73.814508]  dump_backtrace+0xf4/0x114
[   73.815321]  show_stack+0x18/0x24
[   73.816043]  __dump_stack+0x28/0x38
[   73.816902]  dump_stack_lvl+0x50/0x68
[   73.817795]  print_address_description+0x7c/0x1ec
[   73.818843]  print_report+0x50/0x68
[   73.819611]  kasan_report+0xac/0xfc
[   73.820051]  __asan_store1+0x6c/0x70
[   73.820473]  kmalloc_large_oob_right+0xa0/0x14c
[   73.821147]  kunit_try_run_case+0x80/0x184
[   73.821848]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   73.822672]  kthread+0x16c/0x21c
[   73.823278]  ret_from_fork+0x10/0x20
[   73.823935] 
[   73.824252] Allocated by task 128:
[   73.824776]  kasan_set_track+0x4c/0x80
[   73.825442]  kasan_save_alloc_info+0x28/0x34
[   73.826119]  __kasan_kmalloc+0x88/0xa0
[   73.826778]  kmalloc_trace+0x54/0x68
[   73.827389]  kmalloc_large_oob_right+0x48/0x14c
[   73.828197]  kunit_try_run_case+0x80/0x184
[   73.828934]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   73.829791]  kthread+0x16c/0x21c
[   73.830379]  ret_from_fork+0x10/0x20
[   73.830770] 
[   73.831121] The buggy address belongs to the object at ffff0000c59f0000
[   73.831121]  which belongs to the cache kmalloc-8k of size 8192
[   73.832780] The buggy address is located 7936 bytes inside of
[   73.832780]  8192-byte region [ffff0000c59f0000, ffff0000c59f2000)
[   73.834073] 
[   73.834259] The buggy address belongs to the physical page:
[   73.834620] page:000000007696d2f2 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059f0
[   73.835900] head:000000007696d2f2 order:3 compound_mapcount:0 compound_pincount:0
[   73.837070] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[   73.838099] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002c00
[   73.839097] raw: 0000000000000000 0000000080020002 00000001ffffffff 0000000000000000
[   73.840124] page dumped because: kasan: bad access detected
[   73.840829] 
[   73.841014] Memory state around the buggy address:
[   73.841380]  ffff0000c59f1e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   73.841878]  ffff0000c59f1e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   73.842367] >ffff0000c59f1f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.842911]                    ^
[   73.843422]  ffff0000c59f1f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.844458]  ffff0000c59f2000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.845351] ==================================================================

[   72.413249] ==================================================================
[   72.414217] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0xc0/0x1f0
[   72.414915] Write of size 1 at addr ffff0000c5a19f00 by task kunit_try_catch/128
[   72.415525] 
[   72.415729] CPU: 1 PID: 128 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   72.416851] Hardware name: linux,dummy-virt (DT)
[   72.417256] Call trace:
[   72.417540]  dump_backtrace.part.0+0xdc/0xf0
[   72.418597]  show_stack+0x18/0x30
[   72.419097]  dump_stack_lvl+0x64/0x80
[   72.419581]  print_report+0x158/0x438
[   72.420029]  kasan_report+0xb4/0xf4
[   72.420496]  __asan_store1+0x68/0x7c
[   72.420922]  kmalloc_large_oob_right+0xc0/0x1f0
[   72.421449]  kunit_try_run_case+0x84/0x120
[   72.422546]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   72.423158]  kthread+0x180/0x190
[   72.423579]  ret_from_fork+0x10/0x20
[   72.424017] 
[   72.424211] Allocated by task 128:
[   72.424587]  kasan_save_stack+0x3c/0x70
[   72.425060]  kasan_set_track+0x2c/0x40
[   72.425485]  kasan_save_alloc_info+0x24/0x34
[   72.426144]  __kasan_kmalloc+0xb8/0xc0
[   72.426596]  kmalloc_trace+0x58/0x6c
[   72.427210]  kmalloc_large_oob_right+0x94/0x1f0
[   72.427759]  kunit_try_run_case+0x84/0x120
[   72.428243]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   72.428800]  kthread+0x180/0x190
[   72.429197]  ret_from_fork+0x10/0x20
[   72.429628] 
[   72.429977] The buggy address belongs to the object at ffff0000c5a18000
[   72.429977]  which belongs to the cache kmalloc-8k of size 8192
[   72.431343] The buggy address is located 7936 bytes inside of
[   72.431343]  8192-byte region [ffff0000c5a18000, ffff0000c5a1a000)
[   72.432313] 
[   72.432564] The buggy address belongs to the physical page:
[   72.433037] page:00000000873a2410 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a18
[   72.433776] head:00000000873a2410 order:3 compound_mapcount:0 compound_pincount:0
[   72.434425] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[   72.435378] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002c00
[   72.436082] raw: 0000000000000000 0000000080020002 00000001ffffffff 0000000000000000
[   72.436711] page dumped because: kasan: bad access detected
[   72.437190] 
[   72.437382] Memory state around the buggy address:
[   72.437815]  ffff0000c5a19e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   72.438602]  ffff0000c5a19e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   72.439590] >ffff0000c5a19f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.440186]                    ^
[   72.440513]  ffff0000c5a19f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.441125]  ffff0000c5a1a000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.441714] ==================================================================

[   64.113003] ==================================================================
[   64.114513] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0xd8/0x1f0
[   64.115810] Write of size 1 at addr ffff0000c17ddf00 by task kunit_try_catch/126
[   64.117002] 
[   64.117327] CPU: 0 PID: 126 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   64.118501] Hardware name: linux,dummy-virt (DT)
[   64.119065] Call trace:
[   64.119438]  dump_backtrace+0x110/0x120
[   64.120100]  show_stack+0x18/0x28
[   64.120668]  dump_stack_lvl+0x68/0x84
[   64.121251]  print_report+0x158/0x484
[   64.121883]  kasan_report+0x98/0xe0
[   64.122492]  __asan_store1+0x68/0x78
[   64.123072]  kmalloc_large_oob_right+0xd8/0x1f0
[   64.123769]  kunit_try_run_case+0x7c/0x120
[   64.124382]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   64.124913]  kthread+0x1a4/0x1b8
[   64.125209]  ret_from_fork+0x10/0x20
[   64.125613] 
[   64.125785] Allocated by task 126:
[   64.126082]  kasan_save_stack+0x2c/0x58
[   64.126653]  kasan_set_track+0x2c/0x40
[   64.127245]  kasan_save_alloc_info+0x24/0x38
[   64.127682]  __kasan_kmalloc+0xa0/0xb8
[   64.128072]  kmalloc_trace+0x50/0x68
[   64.128456]  kmalloc_large_oob_right+0xa8/0x1f0
[   64.128892]  kunit_try_run_case+0x7c/0x120
[   64.129334]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   64.130364]  kthread+0x1a4/0x1b8
[   64.130729]  ret_from_fork+0x10/0x20
[   64.131114] 
[   64.131321] The buggy address belongs to the object at ffff0000c17dc000
[   64.131321]  which belongs to the cache kmalloc-8k of size 8192
[   64.132208] The buggy address is located 7936 bytes inside of
[   64.132208]  8192-byte region [ffff0000c17dc000, ffff0000c17de000)
[   64.133086] 
[   64.133324] The buggy address belongs to the physical page:
[   64.133918] page:0000000063f2cd7d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1017d8
[   64.134776] head:0000000063f2cd7d order:3 compound_mapcount:0 compound_pincount:0
[   64.135366] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[   64.136001] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002c00
[   64.136631] raw: 0000000000000000 0000000080020002 00000001ffffffff 0000000000000000
[   64.137185] page dumped because: kasan: bad access detected
[   64.138074] 
[   64.138297] Memory state around the buggy address:
[   64.138733]  ffff0000c17dde00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   64.139316]  ffff0000c17dde80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   64.139893] >ffff0000c17ddf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.140461]                    ^
[   64.140768]  ffff0000c17ddf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.141362]  ffff0000c17de000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.142172] ==================================================================

[   30.423116] ==================================================================
[   30.423707] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0xcc/0x1e0
[   30.424125] Write of size 1 at addr ffff8881035f1f00 by task kunit_try_catch/232
[   30.424455] 
[   30.424581] CPU: 0 PID: 232 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   30.424988] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.425921] Call Trace:
[   30.426094]  <TASK>
[   30.426266]  dump_stack_lvl+0x49/0x62
[   30.426618]  print_report+0x189/0x492
[   30.426856]  ? kasan_complete_mode_report_info+0x3c/0x200
[   30.427154]  ? kmalloc_large_oob_right+0xcc/0x1e0
[   30.427714]  kasan_report+0x10c/0x190
[   30.427971]  ? kmalloc_large_oob_right+0xcc/0x1e0
[   30.428298]  __asan_store1+0x65/0x70
[   30.428627]  kmalloc_large_oob_right+0xcc/0x1e0
[   30.428880]  ? kmalloc_oob_16+0x250/0x250
[   30.429095]  ? __kunit_add_resource+0xd1/0x100
[   30.429400]  ? kasan_test_init+0x13e/0x1b0
[   30.429658]  kunit_try_run_case+0x8f/0xd0
[   30.429878]  ? kunit_catch_run_case+0x80/0x80
[   30.430102]  ? kunit_try_catch_throw+0x40/0x40
[   30.430365]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   30.430667]  kthread+0x17b/0x1b0
[   30.430879]  ? kthread_complete_and_exit+0x30/0x30
[   30.431148]  ret_from_fork+0x22/0x30
[   30.431584]  </TASK>
[   30.431730] 
[   30.431817] Allocated by task 232:
[   30.432014]  kasan_save_stack+0x41/0x70
[   30.432304]  kasan_set_track+0x25/0x40
[   30.432581]  kasan_save_alloc_info+0x1e/0x30
[   30.432830]  __kasan_kmalloc+0xb6/0xc0
[   30.433024]  kmalloc_trace+0x48/0xb0
[   30.433280]  kmalloc_large_oob_right+0x99/0x1e0
[   30.433830]  kunit_try_run_case+0x8f/0xd0
[   30.434053]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   30.434357]  kthread+0x17b/0x1b0
[   30.434663]  ret_from_fork+0x22/0x30
[   30.434860] 
[   30.434970] The buggy address belongs to the object at ffff8881035f0000
[   30.434970]  which belongs to the cache kmalloc-8k of size 8192
[   30.435589] The buggy address is located 7936 bytes inside of
[   30.435589]  8192-byte region [ffff8881035f0000, ffff8881035f2000)
[   30.436141] 
[   30.436243] The buggy address belongs to the physical page:
[   30.436617] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1035f0
[   30.437003] head:(____ptrval____) order:3 compound_mapcount:0 compound_pincount:0
[   30.437489] flags: 0x200000000010200(slab|head|node=0|zone=2)
[   30.437778] raw: 0200000000010200 0000000000000000 dead000000000122 ffff888100042280
[   30.438124] raw: 0000000000000000 0000000080020002 00000001ffffffff 0000000000000000
[   30.438774] page dumped because: kasan: bad access detected
[   30.439040] 
[   30.439154] Memory state around the buggy address:
[   30.439392]  ffff8881035f1e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.439822]  ffff8881035f1e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.440153] >ffff8881035f1f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.440564]                    ^
[   30.440764]  ffff8881035f1f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.441087]  ffff8881035f2000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.441515] ==================================================================