Hay
Date
July 15, 2025, 2:10 p.m.

Environment
qemu-arm64
qemu-x86_64

[  105.632055] ==================================================================
[  105.633302] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0xd4/0x200
[  105.634043] Write of size 128 at addr ffff0000c67cd500 by task kunit_try_catch/220
[  105.634687] 
[  105.634916] CPU: 0 PID: 220 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[  105.635586] Hardware name: linux,dummy-virt (DT)
[  105.636052] Call trace:
[  105.636359]  dump_backtrace+0xe0/0x134
[  105.636797]  show_stack+0x20/0x2c
[  105.637205]  dump_stack_lvl+0x88/0xb4
[  105.637639]  print_report+0x158/0x44c
[  105.638077]  kasan_report+0xc8/0x180
[  105.638502]  kasan_check_range+0xe4/0x190
[  105.639285]  memset+0x40/0x70
[  105.639685]  kmalloc_oob_in_memset+0xd4/0x200
[  105.640194]  kunit_try_run_case+0x8c/0x124
[  105.640990]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  105.641547]  kthread+0x15c/0x170
[  105.641952]  ret_from_fork+0x10/0x20
[  105.642397] 
[  105.642598] Allocated by task 220:
[  105.642936]  kasan_save_stack+0x3c/0x70
[  105.643419]  kasan_set_track+0x2c/0x40
[  105.643870]  kasan_save_alloc_info+0x24/0x34
[  105.644374]  __kasan_kmalloc+0xd4/0xe0
[  105.644821]  kmalloc_trace+0x8c/0x150
[  105.645261]  kmalloc_oob_in_memset+0xa0/0x200
[  105.645791]  kunit_try_run_case+0x8c/0x124
[  105.646279]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  105.647238]  kthread+0x15c/0x170
[  105.647654]  ret_from_fork+0x10/0x20
[  105.648090] 
[  105.648308] The buggy address belongs to the object at ffff0000c67cd500
[  105.648308]  which belongs to the cache kmalloc-128 of size 128
[  105.649546] The buggy address is located 0 bytes inside of
[  105.649546]  128-byte region [ffff0000c67cd500, ffff0000c67cd580)
[  105.650465] 
[  105.650679] The buggy address belongs to the physical page:
[  105.651178] page:00000000e8cb511a refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1067cd
[  105.651954] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  105.652879] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  105.653523] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  105.654162] page dumped because: kasan: bad access detected
[  105.654651] 
[  105.655048] Memory state around the buggy address:
[  105.655476]  ffff0000c67cd400: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  105.656132]  ffff0000c67cd480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  105.657193] >ffff0000c67cd500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[  105.657789]                                                                 ^
[  105.658387]  ffff0000c67cd580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  105.659008]  ffff0000c67cd600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  105.659626] ==================================================================

[   75.381535] ==================================================================
[   75.382260] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0xa8/0x150
[   75.382915] Write of size 128 at addr ffff0000c5a47e00 by task kunit_try_catch/136
[   75.384282] 
[   75.384817] CPU: 1 PID: 136 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   75.385983] Hardware name: linux,dummy-virt (DT)
[   75.386625] Call trace:
[   75.387063]  dump_backtrace+0xf8/0x118
[   75.387751]  show_stack+0x18/0x24
[   75.388367]  __dump_stack+0x28/0x38
[   75.389051]  dump_stack_lvl+0x54/0x6c
[   75.389686]  print_address_description+0x7c/0x1ec
[   75.390452]  print_report+0x50/0x68
[   75.391092]  kasan_report+0xac/0x100
[   75.391725]  kasan_check_range+0x260/0x2a0
[   75.392428]  memset+0x40/0x70
[   75.393126]  kmalloc_oob_in_memset+0xa8/0x150
[   75.393827]  kunit_try_run_case+0x80/0x184
[   75.394297]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.394822]  kthread+0x16c/0x21c
[   75.395330]  ret_from_fork+0x10/0x20
[   75.395814] 
[   75.395997] Allocated by task 136:
[   75.396292]  kasan_set_track+0x4c/0x80
[   75.397058]  kasan_save_alloc_info+0x28/0x34
[   75.397741]  __kasan_kmalloc+0x88/0xa0
[   75.398426]  kmalloc_trace+0x54/0x68
[   75.399064]  kmalloc_oob_in_memset+0x48/0x150
[   75.399782]  kunit_try_run_case+0x80/0x184
[   75.400478]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.401393]  kthread+0x16c/0x21c
[   75.402047]  ret_from_fork+0x10/0x20
[   75.402658] 
[   75.402975] The buggy address belongs to the object at ffff0000c5a47e00
[   75.402975]  which belongs to the cache kmalloc-128 of size 128
[   75.404355] The buggy address is located 0 bytes inside of
[   75.404355]  128-byte region [ffff0000c5a47e00, ffff0000c5a47e80)
[   75.405691] 
[   75.406023] The buggy address belongs to the physical page:
[   75.406626] page:000000003f689bbf refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a47
[   75.407363] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   75.407943] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   75.408820] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   75.409867] page dumped because: kasan: bad access detected
[   75.410561] 
[   75.410837] Memory state around the buggy address:
[   75.411382]  ffff0000c5a47d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   75.411918]  ffff0000c5a47d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.412409] >ffff0000c5a47e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   75.413181]                                                                 ^
[   75.413834]  ffff0000c5a47e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.414425]  ffff0000c5a47f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.415029] ==================================================================

[   74.410404] ==================================================================
[   74.411356] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0xa8/0x150
[   74.412340] Write of size 128 at addr ffff0000c5919900 by task kunit_try_catch/136
[   74.413849] 
[   74.414156] CPU: 1 PID: 136 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   74.415140] Hardware name: linux,dummy-virt (DT)
[   74.416523] Call trace:
[   74.417475]  dump_backtrace+0xf4/0x114
[   74.417951]  show_stack+0x18/0x24
[   74.418352]  __dump_stack+0x28/0x38
[   74.418772]  dump_stack_lvl+0x50/0x68
[   74.419166]  print_address_description+0x7c/0x1ec
[   74.419643]  print_report+0x50/0x68
[   74.421615]  kasan_report+0xac/0xfc
[   74.422124]  kasan_check_range+0x258/0x290
[   74.422772]  memset+0x40/0x70
[   74.423284]  kmalloc_oob_in_memset+0xa8/0x150
[   74.424062]  kunit_try_run_case+0x80/0x184
[   74.424651]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   74.425356]  kthread+0x16c/0x21c
[   74.425912]  ret_from_fork+0x10/0x20
[   74.426446] 
[   74.426769] Allocated by task 136:
[   74.427089]  kasan_set_track+0x4c/0x80
[   74.427713]  kasan_save_alloc_info+0x28/0x34
[   74.428296]  __kasan_kmalloc+0x88/0xa0
[   74.428979]  kmalloc_trace+0x54/0x68
[   74.429479]  kmalloc_oob_in_memset+0x48/0x150
[   74.430039]  kunit_try_run_case+0x80/0x184
[   74.430517]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   74.431134]  kthread+0x16c/0x21c
[   74.431552]  ret_from_fork+0x10/0x20
[   74.432134] 
[   74.432346] The buggy address belongs to the object at ffff0000c5919900
[   74.432346]  which belongs to the cache kmalloc-128 of size 128
[   74.433287] The buggy address is located 0 bytes inside of
[   74.433287]  128-byte region [ffff0000c5919900, ffff0000c5919980)
[   74.434206] 
[   74.434424] The buggy address belongs to the physical page:
[   74.434905] page:0000000087a007df refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105919
[   74.435697] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   74.436406] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   74.437108] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   74.437718] page dumped because: kasan: bad access detected
[   74.438330] 
[   74.438526] Memory state around the buggy address:
[   74.438973]  ffff0000c5919800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   74.439606]  ffff0000c5919880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.440360] >ffff0000c5919900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   74.440966]                                                                 ^
[   74.441599]  ffff0000c5919980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.442243]  ffff0000c5919a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.442847] ==================================================================

[   73.014362] ==================================================================
[   73.015734] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0xcc/0x1f0
[   73.016373] Write of size 128 at addr ffff0000c5915000 by task kunit_try_catch/136
[   73.016859] 
[   73.017043] CPU: 0 PID: 136 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   73.017590] Hardware name: linux,dummy-virt (DT)
[   73.018468] Call trace:
[   73.019370]  dump_backtrace.part.0+0xdc/0xf0
[   73.020176]  show_stack+0x18/0x30
[   73.020981]  dump_stack_lvl+0x64/0x80
[   73.021436]  print_report+0x158/0x438
[   73.021850]  kasan_report+0xb4/0xf4
[   73.022278]  kasan_check_range+0xe4/0x190
[   73.023390]  memset+0x40/0x70
[   73.023753]  kmalloc_oob_in_memset+0xcc/0x1f0
[   73.024165]  kunit_try_run_case+0x84/0x120
[   73.024570]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   73.025033]  kthread+0x180/0x190
[   73.025352]  ret_from_fork+0x10/0x20
[   73.026429] 
[   73.026903] Allocated by task 136:
[   73.027525]  kasan_save_stack+0x3c/0x70
[   73.028299]  kasan_set_track+0x2c/0x40
[   73.029054]  kasan_save_alloc_info+0x24/0x34
[   73.029933]  __kasan_kmalloc+0xb8/0xc0
[   73.030675]  kmalloc_trace+0x58/0x6c
[   73.031444]  kmalloc_oob_in_memset+0x98/0x1f0
[   73.032259]  kunit_try_run_case+0x84/0x120
[   73.033014]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   73.033917]  kthread+0x180/0x190
[   73.034610]  ret_from_fork+0x10/0x20
[   73.035267] 
[   73.035586] The buggy address belongs to the object at ffff0000c5915000
[   73.035586]  which belongs to the cache kmalloc-128 of size 128
[   73.037005] The buggy address is located 0 bytes inside of
[   73.037005]  128-byte region [ffff0000c5915000, ffff0000c5915080)
[   73.038490] 
[   73.038829] The buggy address belongs to the physical page:
[   73.039595] page:0000000033330a0d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105915
[   73.040701] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   73.041422] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   73.042359] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   73.043241] page dumped because: kasan: bad access detected
[   73.043891] 
[   73.044142] Memory state around the buggy address:
[   73.044584]  ffff0000c5914f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   73.045050]  ffff0000c5914f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   73.045603] >ffff0000c5915000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   73.046578]                                                                 ^
[   73.047494]  ffff0000c5915080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.048443]  ffff0000c5915100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.049340] ==================================================================

[   64.588010] ==================================================================
[   64.588783] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0xe0/0x1e8
[   64.589437] Write of size 128 at addr ffff0000c58b8600 by task kunit_try_catch/134
[   64.589998] 
[   64.590262] CPU: 0 PID: 134 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   64.590850] Hardware name: linux,dummy-virt (DT)
[   64.591285] Call trace:
[   64.591498]  dump_backtrace+0x110/0x120
[   64.591931]  show_stack+0x18/0x28
[   64.592344]  dump_stack_lvl+0x68/0x84
[   64.592733]  print_report+0x158/0x484
[   64.593123]  kasan_report+0x98/0xe0
[   64.593570]  kasan_check_range+0x160/0x1d8
[   64.594049]  memset+0x3c/0x80
[   64.594397]  kmalloc_oob_in_memset+0xe0/0x1e8
[   64.594835]  kunit_try_run_case+0x7c/0x120
[   64.595272]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   64.595765]  kthread+0x1a4/0x1b8
[   64.596105]  ret_from_fork+0x10/0x20
[   64.596494] 
[   64.596662] Allocated by task 134:
[   64.596994]  kasan_save_stack+0x2c/0x58
[   64.597376]  kasan_set_track+0x2c/0x40
[   64.597762]  kasan_save_alloc_info+0x24/0x38
[   64.598212]  __kasan_kmalloc+0xa0/0xb8
[   64.598620]  kmalloc_trace+0x50/0x68
[   64.598957]  kmalloc_oob_in_memset+0xa8/0x1e8
[   64.599421]  kunit_try_run_case+0x7c/0x120
[   64.599852]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   64.600347]  kthread+0x1a4/0x1b8
[   64.600702]  ret_from_fork+0x10/0x20
[   64.601068] 
[   64.601264] The buggy address belongs to the object at ffff0000c58b8600
[   64.601264]  which belongs to the cache kmalloc-128 of size 128
[   64.602068] The buggy address is located 0 bytes inside of
[   64.602068]  128-byte region [ffff0000c58b8600, ffff0000c58b8680)
[   64.603020] 
[   64.603258] The buggy address belongs to the physical page:
[   64.603773] page:0000000079d9b0ef refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058b8
[   64.604397] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   64.605039] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   64.605747] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   64.606319] page dumped because: kasan: bad access detected
[   64.606745] 
[   64.606921] Memory state around the buggy address:
[   64.607321]  ffff0000c58b8500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   64.607846]  ffff0000c58b8580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.608394] >ffff0000c58b8600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   64.608902]                                                                 ^
[   64.609443]  ffff0000c58b8680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.610026]  ffff0000c58b8700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.610573] ==================================================================

[   30.878208] ==================================================================
[   30.878829] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0xd6/0x1d0
[   30.879233] Write of size 128 at addr ffff8881030dea00 by task kunit_try_catch/240
[   30.879717] 
[   30.879842] CPU: 1 PID: 240 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   30.880272] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.880905] Call Trace:
[   30.881074]  <TASK>
[   30.881247]  dump_stack_lvl+0x49/0x62
[   30.881475]  print_report+0x189/0x492
[   30.881919]  ? kasan_complete_mode_report_info+0x3c/0x200
[   30.882239]  ? kmalloc_oob_in_memset+0xd6/0x1d0
[   30.882627]  kasan_report+0x10c/0x190
[   30.882895]  ? kmalloc_oob_in_memset+0xd6/0x1d0
[   30.883200]  kasan_check_range+0x10b/0x1c0
[   30.883838]  memset+0x23/0x50
[   30.884049]  kmalloc_oob_in_memset+0xd6/0x1d0
[   30.884361]  ? kmalloc_oob_memset_2+0x1d0/0x1d0
[   30.884704]  ? __kunit_add_resource+0xd1/0x100
[   30.885009]  kunit_try_run_case+0x8f/0xd0
[   30.885291]  ? kunit_catch_run_case+0x80/0x80
[   30.885642]  ? kunit_try_catch_throw+0x40/0x40
[   30.885884]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   30.886232]  kthread+0x17b/0x1b0
[   30.886528]  ? kthread_complete_and_exit+0x30/0x30
[   30.886831]  ret_from_fork+0x22/0x30
[   30.887143]  </TASK>
[   30.887343] 
[   30.887549] Allocated by task 240:
[   30.887742]  kasan_save_stack+0x41/0x70
[   30.888013]  kasan_set_track+0x25/0x40
[   30.888226]  kasan_save_alloc_info+0x1e/0x30
[   30.888849]  __kasan_kmalloc+0xb6/0xc0
[   30.889085]  kmalloc_trace+0x48/0xb0
[   30.889397]  kmalloc_oob_in_memset+0x9b/0x1d0
[   30.889791]  kunit_try_run_case+0x8f/0xd0
[   30.890035]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   30.890371]  kthread+0x17b/0x1b0
[   30.890657]  ret_from_fork+0x22/0x30
[   30.890897] 
[   30.891011] The buggy address belongs to the object at ffff8881030dea00
[   30.891011]  which belongs to the cache kmalloc-128 of size 128
[   30.891733] The buggy address is located 0 bytes inside of
[   30.891733]  128-byte region [ffff8881030dea00, ffff8881030dea80)
[   30.892268] 
[   30.892391] The buggy address belongs to the physical page:
[   30.892763] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1030de
[   30.893255] flags: 0x200000000000200(slab|node=0|zone=2)
[   30.893661] raw: 0200000000000200 0000000000000000 dead000000000122 ffff8881000418c0
[   30.894157] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   30.894827] page dumped because: kasan: bad access detected
[   30.895101] 
[   30.895227] Memory state around the buggy address:
[   30.895508]  ffff8881030de900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   30.895837]  ffff8881030de980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.896294] >ffff8881030dea00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.896738]                                                                 ^
[   30.897087]  ffff8881030dea80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.897456]  ffff8881030deb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.897801] ==================================================================