Hay
Date
July 15, 2025, 2:10 p.m.

Environment
qemu-arm64
qemu-x86_64

[  105.768944] ==================================================================
[  105.770052] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0xd8/0x200
[  105.770815] Write of size 16 at addr ffff0000c66f6369 by task kunit_try_catch/224
[  105.771457] 
[  105.771698] CPU: 1 PID: 224 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[  105.772375] Hardware name: linux,dummy-virt (DT)
[  105.773641] Call trace:
[  105.773917]  dump_backtrace+0xe0/0x134
[  105.774385]  show_stack+0x20/0x2c
[  105.774802]  dump_stack_lvl+0x88/0xb4
[  105.775218]  print_report+0x158/0x44c
[  105.775565]  kasan_report+0xc8/0x180
[  105.775943]  kasan_check_range+0xe4/0x190
[  105.776433]  memset+0x40/0x70
[  105.776864]  kmalloc_oob_memset_16+0xd8/0x200
[  105.777447]  kunit_try_run_case+0x8c/0x124
[  105.777999]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  105.778613]  kthread+0x15c/0x170
[  105.779847]  ret_from_fork+0x10/0x20
[  105.780283] 
[  105.780484] Allocated by task 224:
[  105.781150]  kasan_save_stack+0x3c/0x70
[  105.781605]  kasan_set_track+0x2c/0x40
[  105.782017]  kasan_save_alloc_info+0x24/0x34
[  105.782509]  __kasan_kmalloc+0xd4/0xe0
[  105.782925]  kmalloc_trace+0x8c/0x150
[  105.783347]  kmalloc_oob_memset_16+0xa0/0x200
[  105.783878]  kunit_try_run_case+0x8c/0x124
[  105.784509]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  105.786111]  kthread+0x15c/0x170
[  105.786652]  ret_from_fork+0x10/0x20
[  105.787225] 
[  105.787496] The buggy address belongs to the object at ffff0000c66f6300
[  105.787496]  which belongs to the cache kmalloc-128 of size 128
[  105.788303] The buggy address is located 105 bytes inside of
[  105.788303]  128-byte region [ffff0000c66f6300, ffff0000c66f6380)
[  105.790012] 
[  105.790291] The buggy address belongs to the physical page:
[  105.790969] page:000000008cb3a959 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066f6
[  105.792050] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  105.793552] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  105.794168] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  105.794814] page dumped because: kasan: bad access detected
[  105.795291] 
[  105.795490] Memory state around the buggy address:
[  105.795952]  ffff0000c66f6200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  105.796662]  ffff0000c66f6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  105.797305] >ffff0000c66f6300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[  105.797913]                                                                 ^
[  105.798503]  ffff0000c66f6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  105.799501]  ffff0000c66f6400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  105.800110] ==================================================================

[   75.528059] ==================================================================
[   75.529016] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0xac/0x154
[   75.530085] Write of size 16 at addr ffff0000c5a46469 by task kunit_try_catch/140
[   75.530932] 
[   75.531199] CPU: 1 PID: 140 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   75.532018] Hardware name: linux,dummy-virt (DT)
[   75.532545] Call trace:
[   75.532997]  dump_backtrace+0xf8/0x118
[   75.533601]  show_stack+0x18/0x24
[   75.534180]  __dump_stack+0x28/0x38
[   75.534637]  dump_stack_lvl+0x54/0x6c
[   75.535147]  print_address_description+0x7c/0x1ec
[   75.535704]  print_report+0x50/0x68
[   75.536281]  kasan_report+0xac/0x100
[   75.537018]  kasan_check_range+0x260/0x2a0
[   75.537619]  memset+0x40/0x70
[   75.538111]  kmalloc_oob_memset_16+0xac/0x154
[   75.538590]  kunit_try_run_case+0x80/0x184
[   75.539182]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.539878]  kthread+0x16c/0x21c
[   75.540422]  ret_from_fork+0x10/0x20
[   75.541012] 
[   75.541342] Allocated by task 140:
[   75.541699]  kasan_set_track+0x4c/0x80
[   75.542366]  kasan_save_alloc_info+0x28/0x34
[   75.542926]  __kasan_kmalloc+0x88/0xa0
[   75.543387]  kmalloc_trace+0x54/0x68
[   75.543920]  kmalloc_oob_memset_16+0x48/0x154
[   75.544418]  kunit_try_run_case+0x80/0x184
[   75.545079]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.545814]  kthread+0x16c/0x21c
[   75.546221]  ret_from_fork+0x10/0x20
[   75.546629] 
[   75.546849] The buggy address belongs to the object at ffff0000c5a46400
[   75.546849]  which belongs to the cache kmalloc-128 of size 128
[   75.547729] The buggy address is located 105 bytes inside of
[   75.547729]  128-byte region [ffff0000c5a46400, ffff0000c5a46480)
[   75.548628] 
[   75.549104] The buggy address belongs to the physical page:
[   75.549555] page:00000000e850444c refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a46
[   75.550346] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   75.551076] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   75.551774] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   75.552444] page dumped because: kasan: bad access detected
[   75.553011] 
[   75.553201] Memory state around the buggy address:
[   75.553558]  ffff0000c5a46300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   75.554089]  ffff0000c5a46380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.554661] >ffff0000c5a46400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   75.555331]                                                                 ^
[   75.555933]  ffff0000c5a46480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.556559]  ffff0000c5a46500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.557145] ==================================================================

[   74.558770] ==================================================================
[   74.559523] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0xac/0x154
[   74.560403] Write of size 16 at addr ffff0000c5a09d69 by task kunit_try_catch/140
[   74.560946] 
[   74.561146] CPU: 0 PID: 140 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   74.561761] Hardware name: linux,dummy-virt (DT)
[   74.562978] Call trace:
[   74.563571]  dump_backtrace+0xf4/0x114
[   74.564430]  show_stack+0x18/0x24
[   74.565201]  __dump_stack+0x28/0x38
[   74.565944]  dump_stack_lvl+0x50/0x68
[   74.566594]  print_address_description+0x7c/0x1ec
[   74.567391]  print_report+0x50/0x68
[   74.568158]  kasan_report+0xac/0xfc
[   74.568937]  kasan_check_range+0x258/0x290
[   74.569658]  memset+0x40/0x70
[   74.570217]  kmalloc_oob_memset_16+0xac/0x154
[   74.570946]  kunit_try_run_case+0x80/0x184
[   74.571649]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   74.572624]  kthread+0x16c/0x21c
[   74.573254]  ret_from_fork+0x10/0x20
[   74.573902] 
[   74.574217] Allocated by task 140:
[   74.574756]  kasan_set_track+0x4c/0x80
[   74.575439]  kasan_save_alloc_info+0x28/0x34
[   74.576191]  __kasan_kmalloc+0x88/0xa0
[   74.576921]  kmalloc_trace+0x54/0x68
[   74.577505]  kmalloc_oob_memset_16+0x48/0x154
[   74.577945]  kunit_try_run_case+0x80/0x184
[   74.578364]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   74.579049]  kthread+0x16c/0x21c
[   74.579661]  ret_from_fork+0x10/0x20
[   74.580338] 
[   74.580628] The buggy address belongs to the object at ffff0000c5a09d00
[   74.580628]  which belongs to the cache kmalloc-128 of size 128
[   74.582073] The buggy address is located 105 bytes inside of
[   74.582073]  128-byte region [ffff0000c5a09d00, ffff0000c5a09d80)
[   74.583470] 
[   74.583827] The buggy address belongs to the physical page:
[   74.584578] page:000000009f2754ee refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a09
[   74.585744] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   74.586706] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   74.587686] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   74.588713] page dumped because: kasan: bad access detected
[   74.589437] 
[   74.589731] Memory state around the buggy address:
[   74.590265]  ffff0000c5a09c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   74.590777]  ffff0000c5a09c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.591674] >ffff0000c5a09d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   74.592694]                                                                 ^
[   74.593820]  ffff0000c5a09d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.594719]  ffff0000c5a09e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.595599] ==================================================================

[   73.159096] ==================================================================
[   73.159829] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0xd0/0x200
[   73.160385] Write of size 16 at addr ffff0000c5915869 by task kunit_try_catch/140
[   73.161413] 
[   73.161729] CPU: 0 PID: 140 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   73.163101] Hardware name: linux,dummy-virt (DT)
[   73.163708] Call trace:
[   73.164069]  dump_backtrace.part.0+0xdc/0xf0
[   73.164739]  show_stack+0x18/0x30
[   73.165292]  dump_stack_lvl+0x64/0x80
[   73.166292]  print_report+0x158/0x438
[   73.166892]  kasan_report+0xb4/0xf4
[   73.167430]  kasan_check_range+0xe4/0x190
[   73.168028]  memset+0x40/0x70
[   73.168527]  kmalloc_oob_memset_16+0xd0/0x200
[   73.169166]  kunit_try_run_case+0x84/0x120
[   73.169928]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   73.170514]  kthread+0x180/0x190
[   73.170841]  ret_from_fork+0x10/0x20
[   73.171183] 
[   73.171348] Allocated by task 140:
[   73.171820]  kasan_save_stack+0x3c/0x70
[   73.172382]  kasan_set_track+0x2c/0x40
[   73.172942]  kasan_save_alloc_info+0x24/0x34
[   73.173570]  __kasan_kmalloc+0xb8/0xc0
[   73.174270]  kmalloc_trace+0x58/0x6c
[   73.174848]  kmalloc_oob_memset_16+0x98/0x200
[   73.175504]  kunit_try_run_case+0x84/0x120
[   73.176109]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   73.176853]  kthread+0x180/0x190
[   73.177353]  ret_from_fork+0x10/0x20
[   73.178078] 
[   73.178843] The buggy address belongs to the object at ffff0000c5915800
[   73.178843]  which belongs to the cache kmalloc-128 of size 128
[   73.179893] The buggy address is located 105 bytes inside of
[   73.179893]  128-byte region [ffff0000c5915800, ffff0000c5915880)
[   73.180586] 
[   73.180799] The buggy address belongs to the physical page:
[   73.181301] page:0000000033330a0d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105915
[   73.182357] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   73.183012] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   73.183675] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   73.184271] page dumped because: kasan: bad access detected
[   73.184670] 
[   73.184889] Memory state around the buggy address:
[   73.185334]  ffff0000c5915700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   73.186133]  ffff0000c5915780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.186752] >ffff0000c5915800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   73.187327]                                                                 ^
[   73.187918]  ffff0000c5915880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.188518]  ffff0000c5915900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.189081] ==================================================================

[   64.694625] ==================================================================
[   64.695422] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0xe4/0x1f0
[   64.696040] Write of size 16 at addr ffff0000c58b8b69 by task kunit_try_catch/138
[   64.696686] 
[   64.696879] CPU: 0 PID: 138 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   64.697525] Hardware name: linux,dummy-virt (DT)
[   64.697873] Call trace:
[   64.698132]  dump_backtrace+0x110/0x120
[   64.698569]  show_stack+0x18/0x28
[   64.699011]  dump_stack_lvl+0x68/0x84
[   64.699468]  print_report+0x158/0x484
[   64.699838]  kasan_report+0x98/0xe0
[   64.700173]  kasan_check_range+0x160/0x1d8
[   64.700589]  memset+0x3c/0x80
[   64.700940]  kmalloc_oob_memset_16+0xe4/0x1f0
[   64.701383]  kunit_try_run_case+0x7c/0x120
[   64.701816]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   64.702359]  kthread+0x1a4/0x1b8
[   64.702734]  ret_from_fork+0x10/0x20
[   64.703114] 
[   64.703372] Allocated by task 138:
[   64.703735]  kasan_save_stack+0x2c/0x58
[   64.704112]  kasan_set_track+0x2c/0x40
[   64.704519]  kasan_save_alloc_info+0x24/0x38
[   64.704955]  __kasan_kmalloc+0xa0/0xb8
[   64.705359]  kmalloc_trace+0x50/0x68
[   64.705707]  kmalloc_oob_memset_16+0xa8/0x1f0
[   64.706147]  kunit_try_run_case+0x7c/0x120
[   64.706567]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   64.707068]  kthread+0x1a4/0x1b8
[   64.707423]  ret_from_fork+0x10/0x20
[   64.707780] 
[   64.707962] The buggy address belongs to the object at ffff0000c58b8b00
[   64.707962]  which belongs to the cache kmalloc-128 of size 128
[   64.708782] The buggy address is located 105 bytes inside of
[   64.708782]  128-byte region [ffff0000c58b8b00, ffff0000c58b8b80)
[   64.709609] 
[   64.709803] The buggy address belongs to the physical page:
[   64.710174] page:0000000079d9b0ef refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058b8
[   64.710925] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   64.711591] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   64.712322] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   64.712866] page dumped because: kasan: bad access detected
[   64.713285] 
[   64.713497] Memory state around the buggy address:
[   64.713942]  ffff0000c58b8a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   64.714517]  ffff0000c58b8a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.715149] >ffff0000c58b8b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   64.715710]                                                                 ^
[   64.716248]  ffff0000c58b8b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.716817]  ffff0000c58b8c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.717289] ==================================================================

[   30.990517] ==================================================================
[   30.991127] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0xd9/0x1d0
[   30.991568] Write of size 16 at addr ffff888103497669 by task kunit_try_catch/244
[   30.991911] 
[   30.992031] CPU: 0 PID: 244 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   30.992451] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.992867] Call Trace:
[   30.993013]  <TASK>
[   30.993174]  dump_stack_lvl+0x49/0x62
[   30.994006]  print_report+0x189/0x492
[   30.994277]  ? kasan_complete_mode_report_info+0x3c/0x200
[   30.994746]  ? kmalloc_oob_memset_16+0xd9/0x1d0
[   30.995014]  kasan_report+0x10c/0x190
[   30.995235]  ? kmalloc_oob_memset_16+0xd9/0x1d0
[   30.995591]  kasan_check_range+0x10b/0x1c0
[   30.995799]  memset+0x23/0x50
[   30.996003]  kmalloc_oob_memset_16+0xd9/0x1d0
[   30.996235]  ? kmalloc_uaf_memset+0x1c0/0x1c0
[   30.996661]  ? __kunit_add_resource+0xd1/0x100
[   30.996929]  kunit_try_run_case+0x8f/0xd0
[   30.997191]  ? kunit_catch_run_case+0x80/0x80
[   30.997418]  ? kunit_try_catch_throw+0x40/0x40
[   30.997809]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   30.998135]  kthread+0x17b/0x1b0
[   30.998352]  ? kthread_complete_and_exit+0x30/0x30
[   30.998656]  ret_from_fork+0x22/0x30
[   30.998993]  </TASK>
[   30.999148] 
[   30.999268] Allocated by task 244:
[   30.999823]  kasan_save_stack+0x41/0x70
[   31.000059]  kasan_set_track+0x25/0x40
[   31.000298]  kasan_save_alloc_info+0x1e/0x30
[   31.000529]  __kasan_kmalloc+0xb6/0xc0
[   31.000735]  kmalloc_trace+0x48/0xb0
[   31.000939]  kmalloc_oob_memset_16+0x9b/0x1d0
[   31.001200]  kunit_try_run_case+0x8f/0xd0
[   31.002000]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   31.002340]  kthread+0x17b/0x1b0
[   31.002718]  ret_from_fork+0x22/0x30
[   31.002908] 
[   31.003143] The buggy address belongs to the object at ffff888103497600
[   31.003143]  which belongs to the cache kmalloc-128 of size 128
[   31.003900] The buggy address is located 105 bytes inside of
[   31.003900]  128-byte region [ffff888103497600, ffff888103497680)
[   31.004851] 
[   31.004988] The buggy address belongs to the physical page:
[   31.005518] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103497
[   31.005942] flags: 0x200000000000200(slab|node=0|zone=2)
[   31.006399] raw: 0200000000000200 0000000000000000 dead000000000122 ffff8881000418c0
[   31.006959] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   31.007571] page dumped because: kasan: bad access detected
[   31.007961] 
[   31.008199] Memory state around the buggy address:
[   31.008723]  ffff888103497500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.009212]  ffff888103497580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.009824] >ffff888103497600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   31.010186]                                                                 ^
[   31.010721]  ffff888103497680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.011048]  ffff888103497700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.011549] ==================================================================