Hay
Date
July 15, 2025, 2:10 p.m.

Environment
qemu-arm64
qemu-x86_64

[  106.792992] ==================================================================
[  106.793867] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0xe4/0x1f0
[  106.794550] Read of size 1 at addr ffff0000c6629b80 by task kunit_try_catch/241
[  106.795134] 
[  106.795379] CPU: 1 PID: 241 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[  106.796102] Hardware name: linux,dummy-virt (DT)
[  106.797475] Call trace:
[  106.797768]  dump_backtrace+0xe0/0x134
[  106.798217]  show_stack+0x20/0x2c
[  106.798613]  dump_stack_lvl+0x88/0xb4
[  106.799060]  print_report+0x158/0x44c
[  106.799477]  kasan_report+0xc8/0x180
[  106.799905]  __asan_load1+0x68/0x74
[  106.800314]  ksize_unpoisons_memory+0xe4/0x1f0
[  106.800872]  kunit_try_run_case+0x8c/0x124
[  106.801356]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  106.802584]  kthread+0x15c/0x170
[  106.803034]  ret_from_fork+0x10/0x20
[  106.803440] 
[  106.803655] Allocated by task 241:
[  106.803991]  kasan_save_stack+0x3c/0x70
[  106.804667]  kasan_set_track+0x2c/0x40
[  106.805103]  kasan_save_alloc_info+0x24/0x34
[  106.805599]  __kasan_kmalloc+0xd4/0xe0
[  106.805999]  kmalloc_trace+0x8c/0x150
[  106.806445]  ksize_unpoisons_memory+0xa0/0x1f0
[  106.806976]  kunit_try_run_case+0x8c/0x124
[  106.807414]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  106.807988]  kthread+0x15c/0x170
[  106.808369]  ret_from_fork+0x10/0x20
[  106.808831] 
[  106.809037] The buggy address belongs to the object at ffff0000c6629b00
[  106.809037]  which belongs to the cache kmalloc-128 of size 128
[  106.810006] The buggy address is located 0 bytes to the right of
[  106.810006]  128-byte region [ffff0000c6629b00, ffff0000c6629b80)
[  106.811142] 
[  106.811367] The buggy address belongs to the physical page:
[  106.811845] page:0000000080e159f7 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106629
[  106.812852] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  106.813533] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  106.814217] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  106.814847] page dumped because: kasan: bad access detected
[  106.815330] 
[  106.815534] Memory state around the buggy address:
[  106.816009]  ffff0000c6629a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  106.816838]  ffff0000c6629b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  106.817444] >ffff0000c6629b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  106.818052]                    ^
[  106.818387]  ffff0000c6629c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  106.819667]  ffff0000c6629c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  106.820300] ==================================================================

[   76.443052] ==================================================================
[   76.443936] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0xb8/0x164
[   76.444885] Read of size 1 at addr ffff0000c5a88280 by task kunit_try_catch/157
[   76.445641] 
[   76.446149] CPU: 0 PID: 157 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   76.446982] Hardware name: linux,dummy-virt (DT)
[   76.447501] Call trace:
[   76.447792]  dump_backtrace+0xf8/0x118
[   76.448255]  show_stack+0x18/0x24
[   76.448863]  __dump_stack+0x28/0x38
[   76.449297]  dump_stack_lvl+0x54/0x6c
[   76.449742]  print_address_description+0x7c/0x1ec
[   76.450286]  print_report+0x50/0x68
[   76.450732]  kasan_report+0xac/0x100
[   76.451185]  __asan_load1+0x6c/0x70
[   76.451620]  ksize_unpoisons_memory+0xb8/0x164
[   76.452113]  kunit_try_run_case+0x80/0x184
[   76.452586]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.453151]  kthread+0x16c/0x21c
[   76.453558]  ret_from_fork+0x10/0x20
[   76.453986] 
[   76.454178] Allocated by task 157:
[   76.454513]  kasan_set_track+0x4c/0x80
[   76.455163]  kasan_save_alloc_info+0x28/0x34
[   76.455626]  __kasan_kmalloc+0x88/0xa0
[   76.456092]  kmalloc_trace+0x54/0x68
[   76.456558]  ksize_unpoisons_memory+0x48/0x164
[   76.457209]  kunit_try_run_case+0x80/0x184
[   76.457668]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.458270]  kthread+0x16c/0x21c
[   76.458674]  ret_from_fork+0x10/0x20
[   76.459109] 
[   76.459328] The buggy address belongs to the object at ffff0000c5a88200
[   76.459328]  which belongs to the cache kmalloc-128 of size 128
[   76.460273] The buggy address is located 0 bytes to the right of
[   76.460273]  128-byte region [ffff0000c5a88200, ffff0000c5a88280)
[   76.461470] 
[   76.461685] The buggy address belongs to the physical page:
[   76.462158] page:00000000927d1208 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a88
[   76.462976] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   76.463635] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   76.465221] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   76.465841] page dumped because: kasan: bad access detected
[   76.466313] 
[   76.466501] Memory state around the buggy address:
[   76.466964]  ffff0000c5a88180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.467615]  ffff0000c5a88200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   76.468271] >ffff0000c5a88280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.469297]                    ^
[   76.469637]  ffff0000c5a88300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.470299]  ffff0000c5a88380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.470913] ==================================================================

[   75.502787] ==================================================================
[   75.503684] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0xb8/0x164
[   75.505192] Read of size 1 at addr ffff0000c5a06580 by task kunit_try_catch/157
[   75.506517] 
[   75.506990] CPU: 0 PID: 157 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   75.508343] Hardware name: linux,dummy-virt (DT)
[   75.508985] Call trace:
[   75.509674]  dump_backtrace+0xf4/0x114
[   75.510494]  show_stack+0x18/0x24
[   75.511181]  __dump_stack+0x28/0x38
[   75.511578]  dump_stack_lvl+0x50/0x68
[   75.512409]  print_address_description+0x7c/0x1ec
[   75.513342]  print_report+0x50/0x68
[   75.514061]  kasan_report+0xac/0xfc
[   75.514757]  __asan_load1+0x6c/0x70
[   75.515481]  ksize_unpoisons_memory+0xb8/0x164
[   75.516448]  kunit_try_run_case+0x80/0x184
[   75.517175]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.517851]  kthread+0x16c/0x21c
[   75.518249]  ret_from_fork+0x10/0x20
[   75.518629] 
[   75.518899] Allocated by task 157:
[   75.519434]  kasan_set_track+0x4c/0x80
[   75.520218]  kasan_save_alloc_info+0x28/0x34
[   75.520996]  __kasan_kmalloc+0x88/0xa0
[   75.521691]  kmalloc_trace+0x54/0x68
[   75.522341]  ksize_unpoisons_memory+0x48/0x164
[   75.523082]  kunit_try_run_case+0x80/0x184
[   75.523812]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.524887]  kthread+0x16c/0x21c
[   75.525613]  ret_from_fork+0x10/0x20
[   75.526278] 
[   75.526610] The buggy address belongs to the object at ffff0000c5a06500
[   75.526610]  which belongs to the cache kmalloc-128 of size 128
[   75.528219] The buggy address is located 0 bytes to the right of
[   75.528219]  128-byte region [ffff0000c5a06500, ffff0000c5a06580)
[   75.529951] 
[   75.530150] The buggy address belongs to the physical page:
[   75.530528] page:00000000cc3fd307 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a06
[   75.531780] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   75.532923] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   75.533992] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   75.534948] page dumped because: kasan: bad access detected
[   75.535665] 
[   75.536058] Memory state around the buggy address:
[   75.536867]  ffff0000c5a06480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.537852]  ffff0000c5a06500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   75.538628] >ffff0000c5a06580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.539110]                    ^
[   75.539415]  ffff0000c5a06600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.540186]  ffff0000c5a06680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.541244] ==================================================================

[   74.134671] ==================================================================
[   74.135414] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0xdc/0x1e0
[   74.136132] Read of size 1 at addr ffff0000c5938180 by task kunit_try_catch/157
[   74.137058] 
[   74.137252] CPU: 1 PID: 157 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   74.137970] Hardware name: linux,dummy-virt (DT)
[   74.138805] Call trace:
[   74.139251]  dump_backtrace.part.0+0xdc/0xf0
[   74.139966]  show_stack+0x18/0x30
[   74.140570]  dump_stack_lvl+0x64/0x80
[   74.141151]  print_report+0x158/0x438
[   74.141790]  kasan_report+0xb4/0xf4
[   74.142445]  __asan_load1+0x68/0x74
[   74.143020]  ksize_unpoisons_memory+0xdc/0x1e0
[   74.143719]  kunit_try_run_case+0x84/0x120
[   74.144360]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   74.145147]  kthread+0x180/0x190
[   74.145624]  ret_from_fork+0x10/0x20
[   74.145977] 
[   74.146148] Allocated by task 157:
[   74.146455]  kasan_save_stack+0x3c/0x70
[   74.147070]  kasan_set_track+0x2c/0x40
[   74.147652]  kasan_save_alloc_info+0x24/0x34
[   74.148302]  __kasan_kmalloc+0xb8/0xc0
[   74.148874]  kmalloc_trace+0x58/0x6c
[   74.149451]  ksize_unpoisons_memory+0x98/0x1e0
[   74.150227]  kunit_try_run_case+0x84/0x120
[   74.150915]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   74.151726]  kthread+0x180/0x190
[   74.152257]  ret_from_fork+0x10/0x20
[   74.152837] 
[   74.153134] The buggy address belongs to the object at ffff0000c5938100
[   74.153134]  which belongs to the cache kmalloc-128 of size 128
[   74.154564] The buggy address is located 0 bytes to the right of
[   74.154564]  128-byte region [ffff0000c5938100, ffff0000c5938180)
[   74.155857] 
[   74.156142] The buggy address belongs to the physical page:
[   74.156648] page:000000003af4cecf refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105938
[   74.157213] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   74.157898] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   74.158570] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   74.159154] page dumped because: kasan: bad access detected
[   74.159690] 
[   74.159888] Memory state around the buggy address:
[   74.160356]  ffff0000c5938080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.160997]  ffff0000c5938100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   74.161603] >ffff0000c5938180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.162379]                    ^
[   74.162791]  ffff0000c5938200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.163461]  ffff0000c5938280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.164068] ==================================================================

[   65.613147] ==================================================================
[   65.613875] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0xf0/0x1e8
[   65.614515] Read of size 1 at addr ffff0000c58add80 by task kunit_try_catch/155
[   65.615937] 
[   65.616399] CPU: 0 PID: 155 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   65.617589] Hardware name: linux,dummy-virt (DT)
[   65.618334] Call trace:
[   65.618751]  dump_backtrace+0x110/0x120
[   65.619402]  show_stack+0x18/0x28
[   65.619993]  dump_stack_lvl+0x68/0x84
[   65.620628]  print_report+0x158/0x484
[   65.621194]  kasan_report+0x98/0xe0
[   65.621860]  __asan_load1+0x68/0x78
[   65.622490]  ksize_unpoisons_memory+0xf0/0x1e8
[   65.623176]  kunit_try_run_case+0x7c/0x120
[   65.623818]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   65.624594]  kthread+0x1a4/0x1b8
[   65.625120]  ret_from_fork+0x10/0x20
[   65.625756] 
[   65.625951] Allocated by task 155:
[   65.626598]  kasan_save_stack+0x2c/0x58
[   65.627206]  kasan_set_track+0x2c/0x40
[   65.627771]  kasan_save_alloc_info+0x24/0x38
[   65.628292]  __kasan_kmalloc+0xa0/0xb8
[   65.628606]  kmalloc_trace+0x50/0x68
[   65.628920]  ksize_unpoisons_memory+0xa8/0x1e8
[   65.629314]  kunit_try_run_case+0x7c/0x120
[   65.629668]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   65.630089]  kthread+0x1a4/0x1b8
[   65.630582]  ret_from_fork+0x10/0x20
[   65.631480] 
[   65.631774] The buggy address belongs to the object at ffff0000c58add00
[   65.631774]  which belongs to the cache kmalloc-128 of size 128
[   65.633199] The buggy address is located 0 bytes to the right of
[   65.633199]  128-byte region [ffff0000c58add00, ffff0000c58add80)
[   65.634831] 
[   65.635126] The buggy address belongs to the physical page:
[   65.635790] page:00000000f12428ca refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ad
[   65.636840] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   65.637983] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   65.638909] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   65.639776] page dumped because: kasan: bad access detected
[   65.640447] 
[   65.640708] Memory state around the buggy address:
[   65.641323]  ffff0000c58adc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.642286]  ffff0000c58add00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   65.643281] >ffff0000c58add80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.644120]                    ^
[   65.644585]  ffff0000c58ade00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.645299]  ffff0000c58ade80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.645712] ==================================================================

[   31.812133] ==================================================================
[   31.813371] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0xe5/0x1f0
[   31.814423] Read of size 1 at addr ffff888103497f80 by task kunit_try_catch/261
[   31.815504] 
[   31.815621] CPU: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   31.815934] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.816290] Call Trace:
[   31.816455]  <TASK>
[   31.816605]  dump_stack_lvl+0x49/0x62
[   31.816856]  print_report+0x189/0x492
[   31.817099]  ? kasan_complete_mode_report_info+0x3c/0x200
[   31.817573]  ? ksize_unpoisons_memory+0xe5/0x1f0
[   31.817904]  kasan_report+0x10c/0x190
[   31.818179]  ? ksize_unpoisons_memory+0xe5/0x1f0
[   31.819052]  __asan_load1+0x62/0x70
[   31.819324]  ksize_unpoisons_memory+0xe5/0x1f0
[   31.819743]  ? ksize_uaf+0x2f0/0x2f0
[   31.820003]  ? __kunit_add_resource+0xd1/0x100
[   31.820416]  kunit_try_run_case+0x8f/0xd0
[   31.820690]  ? kunit_catch_run_case+0x80/0x80
[   31.820978]  ? kunit_try_catch_throw+0x40/0x40
[   31.821257]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   31.821647]  kthread+0x17b/0x1b0
[   31.821860]  ? kthread_complete_and_exit+0x30/0x30
[   31.822150]  ret_from_fork+0x22/0x30
[   31.822653]  </TASK>
[   31.822837] 
[   31.822950] Allocated by task 261:
[   31.823149]  kasan_save_stack+0x41/0x70
[   31.823567]  kasan_set_track+0x25/0x40
[   31.823826]  kasan_save_alloc_info+0x1e/0x30
[   31.824040]  __kasan_kmalloc+0xb6/0xc0
[   31.824292]  kmalloc_trace+0x48/0xb0
[   31.824619]  ksize_unpoisons_memory+0x9b/0x1f0
[   31.824893]  kunit_try_run_case+0x8f/0xd0
[   31.825149]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   31.825626]  kthread+0x17b/0x1b0
[   31.825809]  ret_from_fork+0x22/0x30
[   31.826039] 
[   31.826183] The buggy address belongs to the object at ffff888103497f00
[   31.826183]  which belongs to the cache kmalloc-128 of size 128
[   31.826762] The buggy address is located 0 bytes to the right of
[   31.826762]  128-byte region [ffff888103497f00, ffff888103497f80)
[   31.827688] 
[   31.827848] The buggy address belongs to the physical page:
[   31.828122] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103497
[   31.828743] flags: 0x200000000000200(slab|node=0|zone=2)
[   31.829064] raw: 0200000000000200 0000000000000000 dead000000000122 ffff8881000418c0
[   31.829555] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   31.829894] page dumped because: kasan: bad access detected
[   31.830195] 
[   31.830512] Memory state around the buggy address:
[   31.830823]  ffff888103497e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.831195]  ffff888103497f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.831680] >ffff888103497f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.832089]                    ^
[   31.832408]  ffff888103498000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   31.832787]  ffff888103498080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   31.833132] ==================================================================