Hay
Date
July 15, 2025, 2:10 p.m.

Environment
qemu-arm64
qemu-x86_64

[  105.664204] ==================================================================
[  105.665947] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0xd8/0x200
[  105.666636] Write of size 2 at addr ffff0000c67cd677 by task kunit_try_catch/221
[  105.667246] 
[  105.667490] CPU: 0 PID: 221 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[  105.668224] Hardware name: linux,dummy-virt (DT)
[  105.669509] Call trace:
[  105.669799]  dump_backtrace+0xe0/0x134
[  105.670261]  show_stack+0x20/0x2c
[  105.670691]  dump_stack_lvl+0x88/0xb4
[  105.671174]  print_report+0x158/0x44c
[  105.671625]  kasan_report+0xc8/0x180
[  105.672090]  kasan_check_range+0xe4/0x190
[  105.673437]  memset+0x40/0x70
[  105.673852]  kmalloc_oob_memset_2+0xd8/0x200
[  105.674349]  kunit_try_run_case+0x8c/0x124
[  105.674850]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  105.675401]  kthread+0x15c/0x170
[  105.675808]  ret_from_fork+0x10/0x20
[  105.676241] 
[  105.676442] Allocated by task 221:
[  105.676788]  kasan_save_stack+0x3c/0x70
[  105.677290]  kasan_set_track+0x2c/0x40
[  105.677688]  kasan_save_alloc_info+0x24/0x34
[  105.678653]  __kasan_kmalloc+0xd4/0xe0
[  105.679108]  kmalloc_trace+0x8c/0x150
[  105.679544]  kmalloc_oob_memset_2+0xa0/0x200
[  105.680079]  kunit_try_run_case+0x8c/0x124
[  105.681427]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  105.682019]  kthread+0x15c/0x170
[  105.682441]  ret_from_fork+0x10/0x20
[  105.682878] 
[  105.683070] The buggy address belongs to the object at ffff0000c67cd600
[  105.683070]  which belongs to the cache kmalloc-128 of size 128
[  105.684024] The buggy address is located 119 bytes inside of
[  105.684024]  128-byte region [ffff0000c67cd600, ffff0000c67cd680)
[  105.685020] 
[  105.685263] The buggy address belongs to the physical page:
[  105.685738] page:00000000e8cb511a refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1067cd
[  105.686528] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  105.687217] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  105.688247] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  105.689641] page dumped because: kasan: bad access detected
[  105.690147] 
[  105.690332] Memory state around the buggy address:
[  105.690804]  ffff0000c67cd500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  105.691424]  ffff0000c67cd580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  105.692042] >ffff0000c67cd600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[  105.693046]                                                                 ^
[  105.693614]  ffff0000c67cd680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  105.694266]  ffff0000c67cd700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  105.694862] ==================================================================

[   75.418564] ==================================================================
[   75.419412] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0xac/0x154
[   75.420103] Write of size 2 at addr ffff0000c5a76777 by task kunit_try_catch/137
[   75.420649] 
[   75.420898] CPU: 0 PID: 137 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   75.421823] Hardware name: linux,dummy-virt (DT)
[   75.422251] Call trace:
[   75.422515]  dump_backtrace+0xf8/0x118
[   75.423176]  show_stack+0x18/0x24
[   75.423605]  __dump_stack+0x28/0x38
[   75.424072]  dump_stack_lvl+0x54/0x6c
[   75.424497]  print_address_description+0x7c/0x1ec
[   75.425507]  print_report+0x50/0x68
[   75.425958]  kasan_report+0xac/0x100
[   75.426415]  kasan_check_range+0x260/0x2a0
[   75.426904]  memset+0x40/0x70
[   75.427299]  kmalloc_oob_memset_2+0xac/0x154
[   75.427774]  kunit_try_run_case+0x80/0x184
[   75.428243]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.429310]  kthread+0x16c/0x21c
[   75.429778]  ret_from_fork+0x10/0x20
[   75.430219] 
[   75.430408] Allocated by task 137:
[   75.430752]  kasan_set_track+0x4c/0x80
[   75.431234]  kasan_save_alloc_info+0x28/0x34
[   75.431721]  __kasan_kmalloc+0x88/0xa0
[   75.432171]  kmalloc_trace+0x54/0x68
[   75.432629]  kmalloc_oob_memset_2+0x48/0x154
[   75.433140]  kunit_try_run_case+0x80/0x184
[   75.433625]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.434190]  kthread+0x16c/0x21c
[   75.434590]  ret_from_fork+0x10/0x20
[   75.435483] 
[   75.435681] The buggy address belongs to the object at ffff0000c5a76700
[   75.435681]  which belongs to the cache kmalloc-128 of size 128
[   75.436939] The buggy address is located 119 bytes inside of
[   75.436939]  128-byte region [ffff0000c5a76700, ffff0000c5a76780)
[   75.437814] 
[   75.438035] The buggy address belongs to the physical page:
[   75.438514] page:00000000e5b61371 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a76
[   75.439308] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   75.440006] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   75.441200] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   75.441822] page dumped because: kasan: bad access detected
[   75.442289] 
[   75.442499] Memory state around the buggy address:
[   75.442970]  ffff0000c5a76600: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.443608]  ffff0000c5a76680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.444242] >ffff0000c5a76700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   75.445143]                                                                 ^
[   75.445713]  ffff0000c5a76780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.446357]  ffff0000c5a76800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.446960] ==================================================================

[   74.446923] ==================================================================
[   74.447671] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0xac/0x154
[   74.448661] Write of size 2 at addr ffff0000c5a09877 by task kunit_try_catch/137
[   74.449601] 
[   74.449876] CPU: 0 PID: 137 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   74.451047] Hardware name: linux,dummy-virt (DT)
[   74.451588] Call trace:
[   74.451916]  dump_backtrace+0xf4/0x114
[   74.452580]  show_stack+0x18/0x24
[   74.453172]  __dump_stack+0x28/0x38
[   74.453783]  dump_stack_lvl+0x50/0x68
[   74.454361]  print_address_description+0x7c/0x1ec
[   74.455060]  print_report+0x50/0x68
[   74.455827]  kasan_report+0xac/0xfc
[   74.456522]  kasan_check_range+0x258/0x290
[   74.457000]  memset+0x40/0x70
[   74.457353]  kmalloc_oob_memset_2+0xac/0x154
[   74.457786]  kunit_try_run_case+0x80/0x184
[   74.458208]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   74.458714]  kthread+0x16c/0x21c
[   74.459253]  ret_from_fork+0x10/0x20
[   74.459671] 
[   74.459928] Allocated by task 137:
[   74.460338]  kasan_set_track+0x4c/0x80
[   74.461143]  kasan_save_alloc_info+0x28/0x34
[   74.461704]  __kasan_kmalloc+0x88/0xa0
[   74.462278]  kmalloc_trace+0x54/0x68
[   74.462685]  kmalloc_oob_memset_2+0x48/0x154
[   74.463210]  kunit_try_run_case+0x80/0x184
[   74.463939]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   74.464520]  kthread+0x16c/0x21c
[   74.465083]  ret_from_fork+0x10/0x20
[   74.465668] 
[   74.465962] The buggy address belongs to the object at ffff0000c5a09800
[   74.465962]  which belongs to the cache kmalloc-128 of size 128
[   74.466828] The buggy address is located 119 bytes inside of
[   74.466828]  128-byte region [ffff0000c5a09800, ffff0000c5a09880)
[   74.467539] 
[   74.468035] The buggy address belongs to the physical page:
[   74.468717] page:000000009f2754ee refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a09
[   74.469850] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   74.470794] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   74.472059] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   74.472978] page dumped because: kasan: bad access detected
[   74.473656] 
[   74.473941] Memory state around the buggy address:
[   74.474565]  ffff0000c5a09700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   74.475449]  ffff0000c5a09780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.476613] >ffff0000c5a09800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   74.477230]                                                                 ^
[   74.477707]  ffff0000c5a09880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.478304]  ffff0000c5a09900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.478946] ==================================================================

[   73.053373] ==================================================================
[   73.054926] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0xd0/0x200
[   73.055941] Write of size 2 at addr ffff0000c5915177 by task kunit_try_catch/137
[   73.056682] 
[   73.056875] CPU: 0 PID: 137 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   73.057429] Hardware name: linux,dummy-virt (DT)
[   73.058031] Call trace:
[   73.058504]  dump_backtrace.part.0+0xdc/0xf0
[   73.059205]  show_stack+0x18/0x30
[   73.059795]  dump_stack_lvl+0x64/0x80
[   73.060381]  print_report+0x158/0x438
[   73.060986]  kasan_report+0xb4/0xf4
[   73.061547]  kasan_check_range+0xe4/0x190
[   73.062246]  memset+0x40/0x70
[   73.062794]  kmalloc_oob_memset_2+0xd0/0x200
[   73.063456]  kunit_try_run_case+0x84/0x120
[   73.064088]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   73.064845]  kthread+0x180/0x190
[   73.065224]  ret_from_fork+0x10/0x20
[   73.065578] 
[   73.065777] Allocated by task 137:
[   73.066266]  kasan_save_stack+0x3c/0x70
[   73.066860]  kasan_set_track+0x2c/0x40
[   73.067391]  kasan_save_alloc_info+0x24/0x34
[   73.068021]  __kasan_kmalloc+0xb8/0xc0
[   73.068563]  kmalloc_trace+0x58/0x6c
[   73.069105]  kmalloc_oob_memset_2+0x98/0x200
[   73.069739]  kunit_try_run_case+0x84/0x120
[   73.070442]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   73.071273]  kthread+0x180/0x190
[   73.071734]  ret_from_fork+0x10/0x20
[   73.072071] 
[   73.072238] The buggy address belongs to the object at ffff0000c5915100
[   73.072238]  which belongs to the cache kmalloc-128 of size 128
[   73.072940] The buggy address is located 119 bytes inside of
[   73.072940]  128-byte region [ffff0000c5915100, ffff0000c5915180)
[   73.073872] 
[   73.074142] The buggy address belongs to the physical page:
[   73.074989] page:0000000033330a0d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105915
[   73.076221] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   73.077200] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   73.078229] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   73.079250] page dumped because: kasan: bad access detected
[   73.079922] 
[   73.080174] Memory state around the buggy address:
[   73.080782]  ffff0000c5915000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   73.081625]  ffff0000c5915080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.082467] >ffff0000c5915100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   73.083275]                                                                 ^
[   73.084112]  ffff0000c5915180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.084953]  ffff0000c5915200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.085768] ==================================================================

[   64.613574] ==================================================================
[   64.614518] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0xe4/0x1f0
[   64.615279] Write of size 2 at addr ffff0000c58b8777 by task kunit_try_catch/135
[   64.615804] 
[   64.616010] CPU: 0 PID: 135 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   64.616633] Hardware name: linux,dummy-virt (DT)
[   64.617053] Call trace:
[   64.617322]  dump_backtrace+0x110/0x120
[   64.617905]  show_stack+0x18/0x28
[   64.618318]  dump_stack_lvl+0x68/0x84
[   64.618758]  print_report+0x158/0x484
[   64.619114]  kasan_report+0x98/0xe0
[   64.619461]  kasan_check_range+0x160/0x1d8
[   64.619904]  memset+0x3c/0x80
[   64.620252]  kmalloc_oob_memset_2+0xe4/0x1f0
[   64.620661]  kunit_try_run_case+0x7c/0x120
[   64.621091]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   64.621617]  kthread+0x1a4/0x1b8
[   64.621982]  ret_from_fork+0x10/0x20
[   64.622359] 
[   64.622534] Allocated by task 135:
[   64.622821]  kasan_save_stack+0x2c/0x58
[   64.623248]  kasan_set_track+0x2c/0x40
[   64.623633]  kasan_save_alloc_info+0x24/0x38
[   64.624031]  __kasan_kmalloc+0xa0/0xb8
[   64.624412]  kmalloc_trace+0x50/0x68
[   64.624780]  kmalloc_oob_memset_2+0xa8/0x1f0
[   64.625193]  kunit_try_run_case+0x7c/0x120
[   64.625690]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   64.626171]  kthread+0x1a4/0x1b8
[   64.626484]  ret_from_fork+0x10/0x20
[   64.626873] 
[   64.627078] The buggy address belongs to the object at ffff0000c58b8700
[   64.627078]  which belongs to the cache kmalloc-128 of size 128
[   64.627997] The buggy address is located 119 bytes inside of
[   64.627997]  128-byte region [ffff0000c58b8700, ffff0000c58b8780)
[   64.629044] 
[   64.629251] The buggy address belongs to the physical page:
[   64.629697] page:0000000079d9b0ef refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058b8
[   64.630334] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   64.631017] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   64.631636] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   64.632177] page dumped because: kasan: bad access detected
[   64.632599] 
[   64.632776] Memory state around the buggy address:
[   64.633152]  ffff0000c58b8600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   64.633847]  ffff0000c58b8680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.634385] >ffff0000c58b8700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   64.634896]                                                                 ^
[   64.635465]  ffff0000c58b8780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.636069]  ffff0000c58b8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.636691] ==================================================================

[   30.901899] ==================================================================
[   30.902713] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0xd9/0x1d0
[   30.903017] Write of size 2 at addr ffff888103497577 by task kunit_try_catch/241
[   30.903327] 
[   30.903428] CPU: 0 PID: 241 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   30.904424] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.904787] Call Trace:
[   30.905134]  <TASK>
[   30.905527]  dump_stack_lvl+0x49/0x62
[   30.905944]  print_report+0x189/0x492
[   30.906516]  ? kasan_complete_mode_report_info+0x3c/0x200
[   30.906819]  ? kmalloc_oob_memset_2+0xd9/0x1d0
[   30.907012]  kasan_report+0x10c/0x190
[   30.907207]  ? kmalloc_oob_memset_2+0xd9/0x1d0
[   30.907917]  kasan_check_range+0x10b/0x1c0
[   30.908534]  memset+0x23/0x50
[   30.909051]  kmalloc_oob_memset_2+0xd9/0x1d0
[   30.909620]  ? kmalloc_oob_memset_4+0x1d0/0x1d0
[   30.910233]  ? __kunit_add_resource+0xd1/0x100
[   30.910970]  kunit_try_run_case+0x8f/0xd0
[   30.911627]  ? kunit_catch_run_case+0x80/0x80
[   30.912223]  ? kunit_try_catch_throw+0x40/0x40
[   30.912466]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   30.913251]  kthread+0x17b/0x1b0
[   30.913725]  ? kthread_complete_and_exit+0x30/0x30
[   30.914218]  ret_from_fork+0x22/0x30
[   30.914442]  </TASK>
[   30.914892] 
[   30.915072] Allocated by task 241:
[   30.915608]  kasan_save_stack+0x41/0x70
[   30.916119]  kasan_set_track+0x25/0x40
[   30.916737]  kasan_save_alloc_info+0x1e/0x30
[   30.916941]  __kasan_kmalloc+0xb6/0xc0
[   30.917117]  kmalloc_trace+0x48/0xb0
[   30.917311]  kmalloc_oob_memset_2+0x9b/0x1d0
[   30.917724]  kunit_try_run_case+0x8f/0xd0
[   30.918300]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   30.918675]  kthread+0x17b/0x1b0
[   30.919135]  ret_from_fork+0x22/0x30
[   30.919690] 
[   30.919813] The buggy address belongs to the object at ffff888103497500
[   30.919813]  which belongs to the cache kmalloc-128 of size 128
[   30.920704] The buggy address is located 119 bytes inside of
[   30.920704]  128-byte region [ffff888103497500, ffff888103497580)
[   30.921232] 
[   30.921356] The buggy address belongs to the physical page:
[   30.922001] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103497
[   30.922660] flags: 0x200000000000200(slab|node=0|zone=2)
[   30.923198] raw: 0200000000000200 0000000000000000 dead000000000122 ffff8881000418c0
[   30.923479] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   30.923884] page dumped because: kasan: bad access detected
[   30.924649] 
[   30.924919] Memory state around the buggy address:
[   30.925551]  ffff888103497400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.926079]  ffff888103497480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.926692] >ffff888103497500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.926941]                                                                 ^
[   30.927207]  ffff888103497580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.927457]  ffff888103497600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.927692] ==================================================================