Hay
Date
July 15, 2025, 2:10 p.m.

Environment
qemu-arm64
qemu-x86_64

[  105.700559] ==================================================================
[  105.702089] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0xd8/0x200
[  105.702799] Write of size 4 at addr ffff0000c67cd775 by task kunit_try_catch/222
[  105.703458] 
[  105.703679] CPU: 0 PID: 222 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[  105.704359] Hardware name: linux,dummy-virt (DT)
[  105.704806] Call trace:
[  105.705106]  dump_backtrace+0xe0/0x134
[  105.705529]  show_stack+0x20/0x2c
[  105.705966]  dump_stack_lvl+0x88/0xb4
[  105.706414]  print_report+0x158/0x44c
[  105.706839]  kasan_report+0xc8/0x180
[  105.707261]  kasan_check_range+0xe4/0x190
[  105.707698]  memset+0x40/0x70
[  105.708078]  kmalloc_oob_memset_4+0xd8/0x200
[  105.708551]  kunit_try_run_case+0x8c/0x124
[  105.709023]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  105.709579]  kthread+0x15c/0x170
[  105.710002]  ret_from_fork+0x10/0x20
[  105.710396] 
[  105.710608] Allocated by task 222:
[  105.710983]  kasan_save_stack+0x3c/0x70
[  105.711426]  kasan_set_track+0x2c/0x40
[  105.711828]  kasan_save_alloc_info+0x24/0x34
[  105.712289]  __kasan_kmalloc+0xd4/0xe0
[  105.712740]  kmalloc_trace+0x8c/0x150
[  105.713184]  kmalloc_oob_memset_4+0xa0/0x200
[  105.713657]  kunit_try_run_case+0x8c/0x124
[  105.714139]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  105.714691]  kthread+0x15c/0x170
[  105.715117]  ret_from_fork+0x10/0x20
[  105.715500] 
[  105.715708] The buggy address belongs to the object at ffff0000c67cd700
[  105.715708]  which belongs to the cache kmalloc-128 of size 128
[  105.716627] The buggy address is located 117 bytes inside of
[  105.716627]  128-byte region [ffff0000c67cd700, ffff0000c67cd780)
[  105.717553] 
[  105.717782] The buggy address belongs to the physical page:
[  105.718218] page:00000000e8cb511a refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1067cd
[  105.719044] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  105.719680] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  105.720345] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  105.720989] page dumped because: kasan: bad access detected
[  105.721461] 
[  105.721643] Memory state around the buggy address:
[  105.722116]  ffff0000c67cd600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  105.722751]  ffff0000c67cd680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  105.723367] >ffff0000c67cd700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[  105.723967]                                                                 ^
[  105.725201]  ffff0000c67cd780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  105.726019]  ffff0000c67cd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  105.726582] ==================================================================

[   75.450912] ==================================================================
[   75.451633] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0xac/0x154
[   75.452673] Write of size 4 at addr ffff0000c5a76875 by task kunit_try_catch/138
[   75.453655] 
[   75.453878] CPU: 0 PID: 138 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   75.454695] Hardware name: linux,dummy-virt (DT)
[   75.455157] Call trace:
[   75.455392]  dump_backtrace+0xf8/0x118
[   75.455833]  show_stack+0x18/0x24
[   75.456490]  __dump_stack+0x28/0x38
[   75.457018]  dump_stack_lvl+0x54/0x6c
[   75.457641]  print_address_description+0x7c/0x1ec
[   75.458237]  print_report+0x50/0x68
[   75.458695]  kasan_report+0xac/0x100
[   75.459161]  kasan_check_range+0x260/0x2a0
[   75.459646]  memset+0x40/0x70
[   75.460058]  kmalloc_oob_memset_4+0xac/0x154
[   75.460560]  kunit_try_run_case+0x80/0x184
[   75.461157]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.461719]  kthread+0x16c/0x21c
[   75.462164]  ret_from_fork+0x10/0x20
[   75.462598] 
[   75.462847] Allocated by task 138:
[   75.463223]  kasan_set_track+0x4c/0x80
[   75.463725]  kasan_save_alloc_info+0x28/0x34
[   75.464209]  __kasan_kmalloc+0x88/0xa0
[   75.464718]  kmalloc_trace+0x54/0x68
[   75.465174]  kmalloc_oob_memset_4+0x48/0x154
[   75.465649]  kunit_try_run_case+0x80/0x184
[   75.466227]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.466823]  kthread+0x16c/0x21c
[   75.467254]  ret_from_fork+0x10/0x20
[   75.467707] 
[   75.467928] The buggy address belongs to the object at ffff0000c5a76800
[   75.467928]  which belongs to the cache kmalloc-128 of size 128
[   75.468944] The buggy address is located 117 bytes inside of
[   75.468944]  128-byte region [ffff0000c5a76800, ffff0000c5a76880)
[   75.470042] 
[   75.470243] The buggy address belongs to the physical page:
[   75.470714] page:00000000e5b61371 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a76
[   75.471789] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   75.473172] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   75.473876] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   75.474603] page dumped because: kasan: bad access detected
[   75.475165] 
[   75.475472] Memory state around the buggy address:
[   75.476057]  ffff0000c5a76700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   75.477008]  ffff0000c5a76780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.477606] >ffff0000c5a76800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   75.478451]                                                                 ^
[   75.479147]  ffff0000c5a76880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.479857]  ffff0000c5a76900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.480527] ==================================================================

[   74.482558] ==================================================================
[   74.483303] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0xac/0x154
[   74.484685] Write of size 4 at addr ffff0000c5919d75 by task kunit_try_catch/138
[   74.485829] 
[   74.486299] CPU: 1 PID: 138 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   74.487528] Hardware name: linux,dummy-virt (DT)
[   74.488397] Call trace:
[   74.488959]  dump_backtrace+0xf4/0x114
[   74.489761]  show_stack+0x18/0x24
[   74.490503]  __dump_stack+0x28/0x38
[   74.491264]  dump_stack_lvl+0x50/0x68
[   74.492102]  print_address_description+0x7c/0x1ec
[   74.493006]  print_report+0x50/0x68
[   74.493433]  kasan_report+0xac/0xfc
[   74.494134]  kasan_check_range+0x258/0x290
[   74.494986]  memset+0x40/0x70
[   74.495609]  kmalloc_oob_memset_4+0xac/0x154
[   74.496460]  kunit_try_run_case+0x80/0x184
[   74.497244]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   74.498092]  kthread+0x16c/0x21c
[   74.498687]  ret_from_fork+0x10/0x20
[   74.499307] 
[   74.499604] Allocated by task 138:
[   74.500345]  kasan_set_track+0x4c/0x80
[   74.501023]  kasan_save_alloc_info+0x28/0x34
[   74.501706]  __kasan_kmalloc+0x88/0xa0
[   74.502239]  kmalloc_trace+0x54/0x68
[   74.502617]  kmalloc_oob_memset_4+0x48/0x154
[   74.503321]  kunit_try_run_case+0x80/0x184
[   74.504098]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   74.504958]  kthread+0x16c/0x21c
[   74.505554]  ret_from_fork+0x10/0x20
[   74.506164] 
[   74.506460] The buggy address belongs to the object at ffff0000c5919d00
[   74.506460]  which belongs to the cache kmalloc-128 of size 128
[   74.507981] The buggy address is located 117 bytes inside of
[   74.507981]  128-byte region [ffff0000c5919d00, ffff0000c5919d80)
[   74.508983] 
[   74.509171] The buggy address belongs to the physical page:
[   74.509539] page:0000000087a007df refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105919
[   74.510677] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   74.511641] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   74.512777] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   74.513692] page dumped because: kasan: bad access detected
[   74.514377] 
[   74.514656] Memory state around the buggy address:
[   74.515286]  ffff0000c5919c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   74.516259]  ffff0000c5919c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.517170] >ffff0000c5919d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   74.518030]                                                                 ^
[   74.518609]  ffff0000c5919d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.519494]  ffff0000c5919e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.520513] ==================================================================

[   73.089956] ==================================================================
[   73.091443] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0xd0/0x200
[   73.092116] Write of size 4 at addr ffff0000c5916e75 by task kunit_try_catch/138
[   73.092766] 
[   73.093088] CPU: 1 PID: 138 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   73.093812] Hardware name: linux,dummy-virt (DT)
[   73.094662] Call trace:
[   73.094905]  dump_backtrace.part.0+0xdc/0xf0
[   73.095402]  show_stack+0x18/0x30
[   73.095865]  dump_stack_lvl+0x64/0x80
[   73.096326]  print_report+0x158/0x438
[   73.096765]  kasan_report+0xb4/0xf4
[   73.097143]  kasan_check_range+0xe4/0x190
[   73.097587]  memset+0x40/0x70
[   73.097999]  kmalloc_oob_memset_4+0xd0/0x200
[   73.098540]  kunit_try_run_case+0x84/0x120
[   73.099012]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   73.099579]  kthread+0x180/0x190
[   73.099952]  ret_from_fork+0x10/0x20
[   73.100344] 
[   73.100800] Allocated by task 138:
[   73.101126]  kasan_save_stack+0x3c/0x70
[   73.101536]  kasan_set_track+0x2c/0x40
[   73.102091]  kasan_save_alloc_info+0x24/0x34
[   73.102541]  __kasan_kmalloc+0xb8/0xc0
[   73.102945]  kmalloc_trace+0x58/0x6c
[   73.103361]  kmalloc_oob_memset_4+0x98/0x200
[   73.103863]  kunit_try_run_case+0x84/0x120
[   73.104306]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   73.105011]  kthread+0x180/0x190
[   73.105378]  ret_from_fork+0x10/0x20
[   73.105787] 
[   73.106175] The buggy address belongs to the object at ffff0000c5916e00
[   73.106175]  which belongs to the cache kmalloc-128 of size 128
[   73.107107] The buggy address is located 117 bytes inside of
[   73.107107]  128-byte region [ffff0000c5916e00, ffff0000c5916e80)
[   73.108003] 
[   73.108174] The buggy address belongs to the physical page:
[   73.108806] page:00000000a76cf208 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105916
[   73.109575] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   73.110499] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   73.111143] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   73.111754] page dumped because: kasan: bad access detected
[   73.112173] 
[   73.112377] Memory state around the buggy address:
[   73.112758]  ffff0000c5916d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   73.113389]  ffff0000c5916d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.114020] >ffff0000c5916e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   73.114565]                                                                 ^
[   73.115118]  ffff0000c5916e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.115698]  ffff0000c5916f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.116263] ==================================================================

[   64.640789] ==================================================================
[   64.641586] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0xe4/0x1f8
[   64.642193] Write of size 4 at addr ffff0000c58b8875 by task kunit_try_catch/136
[   64.642982] 
[   64.643265] CPU: 0 PID: 136 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   64.643906] Hardware name: linux,dummy-virt (DT)
[   64.644320] Call trace:
[   64.644645]  dump_backtrace+0x110/0x120
[   64.645147]  show_stack+0x18/0x28
[   64.645670]  dump_stack_lvl+0x68/0x84
[   64.646055]  print_report+0x158/0x484
[   64.646460]  kasan_report+0x98/0xe0
[   64.646861]  kasan_check_range+0x160/0x1d8
[   64.647268]  memset+0x3c/0x80
[   64.647598]  kmalloc_oob_memset_4+0xe4/0x1f8
[   64.648056]  kunit_try_run_case+0x7c/0x120
[   64.648470]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   64.648991]  kthread+0x1a4/0x1b8
[   64.649352]  ret_from_fork+0x10/0x20
[   64.649840] 
[   64.650059] Allocated by task 136:
[   64.650372]  kasan_save_stack+0x2c/0x58
[   64.650748]  kasan_set_track+0x2c/0x40
[   64.651144]  kasan_save_alloc_info+0x24/0x38
[   64.651564]  __kasan_kmalloc+0xa0/0xb8
[   64.651938]  kmalloc_trace+0x50/0x68
[   64.652325]  kmalloc_oob_memset_4+0xa8/0x1f8
[   64.652764]  kunit_try_run_case+0x7c/0x120
[   64.653173]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   64.653823]  kthread+0x1a4/0x1b8
[   64.654184]  ret_from_fork+0x10/0x20
[   64.654554] 
[   64.654715] The buggy address belongs to the object at ffff0000c58b8800
[   64.654715]  which belongs to the cache kmalloc-128 of size 128
[   64.655556] The buggy address is located 117 bytes inside of
[   64.655556]  128-byte region [ffff0000c58b8800, ffff0000c58b8880)
[   64.656362] 
[   64.656527] The buggy address belongs to the physical page:
[   64.656936] page:0000000079d9b0ef refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058b8
[   64.657675] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   64.658307] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   64.659070] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   64.659636] page dumped because: kasan: bad access detected
[   64.660044] 
[   64.660222] Memory state around the buggy address:
[   64.660645]  ffff0000c58b8700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   64.661190]  ffff0000c58b8780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.661886] >ffff0000c58b8800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   64.662417]                                                                 ^
[   64.662905]  ffff0000c58b8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.663612]  ffff0000c58b8900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.664118] ==================================================================

[   30.931699] ==================================================================
[   30.933588] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0xd9/0x1d0
[   30.934907] Write of size 4 at addr ffff8881030ded75 by task kunit_try_catch/242
[   30.935599] 
[   30.936142] CPU: 1 PID: 242 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   30.937094] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.938092] Call Trace:
[   30.938610]  <TASK>
[   30.938754]  dump_stack_lvl+0x49/0x62
[   30.938964]  print_report+0x189/0x492
[   30.939150]  ? kasan_complete_mode_report_info+0x3c/0x200
[   30.939669]  ? kmalloc_oob_memset_4+0xd9/0x1d0
[   30.939967]  kasan_report+0x10c/0x190
[   30.940250]  ? kmalloc_oob_memset_4+0xd9/0x1d0
[   30.940848]  kasan_check_range+0x10b/0x1c0
[   30.941581]  memset+0x23/0x50
[   30.942036]  kmalloc_oob_memset_4+0xd9/0x1d0
[   30.942667]  ? kmalloc_oob_memset_8+0x1d0/0x1d0
[   30.943176]  ? __kunit_add_resource+0xd1/0x100
[   30.943777]  kunit_try_run_case+0x8f/0xd0
[   30.944081]  ? kunit_catch_run_case+0x80/0x80
[   30.944644]  ? kunit_try_catch_throw+0x40/0x40
[   30.945141]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   30.945588]  kthread+0x17b/0x1b0
[   30.945965]  ? kthread_complete_and_exit+0x30/0x30
[   30.946311]  ret_from_fork+0x22/0x30
[   30.947035]  </TASK>
[   30.947218] 
[   30.947425] Allocated by task 242:
[   30.947764]  kasan_save_stack+0x41/0x70
[   30.947953]  kasan_set_track+0x25/0x40
[   30.948123]  kasan_save_alloc_info+0x1e/0x30
[   30.948699]  __kasan_kmalloc+0xb6/0xc0
[   30.949188]  kmalloc_trace+0x48/0xb0
[   30.949688]  kmalloc_oob_memset_4+0x9b/0x1d0
[   30.950185]  kunit_try_run_case+0x8f/0xd0
[   30.950757]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   30.951255]  kthread+0x17b/0x1b0
[   30.951615]  ret_from_fork+0x22/0x30
[   30.952006] 
[   30.952214] The buggy address belongs to the object at ffff8881030ded00
[   30.952214]  which belongs to the cache kmalloc-128 of size 128
[   30.953193] The buggy address is located 117 bytes inside of
[   30.953193]  128-byte region [ffff8881030ded00, ffff8881030ded80)
[   30.954138] 
[   30.954349] The buggy address belongs to the physical page:
[   30.954939] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1030de
[   30.955889] flags: 0x200000000000200(slab|node=0|zone=2)
[   30.956138] raw: 0200000000000200 0000000000000000 dead000000000122 ffff8881000418c0
[   30.956669] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   30.957401] page dumped because: kasan: bad access detected
[   30.958191] 
[   30.958397] Memory state around the buggy address:
[   30.958875]  ffff8881030dec00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   30.959129]  ffff8881030dec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.959765] >ffff8881030ded00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.960655]                                                                 ^
[   30.961352]  ffff8881030ded80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.961904]  ffff8881030dee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.962146] ==================================================================