Hay
Date
July 15, 2025, 2:10 p.m.

Environment
qemu-arm64
qemu-x86_64

[  107.020204] ==================================================================
[  107.021814] BUG: KASAN: slab-out-of-bounds in memchr+0x28/0x80
[  107.022407] Read of size 1 at addr ffff0000c66ad218 by task kunit_try_catch/246
[  107.023009] 
[  107.023265] CPU: 0 PID: 246 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[  107.023993] Hardware name: linux,dummy-virt (DT)
[  107.024507] Call trace:
[  107.024884]  dump_backtrace+0xe0/0x134
[  107.025498]  show_stack+0x20/0x2c
[  107.025917]  dump_stack_lvl+0x88/0xb4
[  107.026353]  print_report+0x158/0x44c
[  107.026776]  kasan_report+0xc8/0x180
[  107.027211]  __asan_load1+0x68/0x74
[  107.027612]  memchr+0x28/0x80
[  107.027987]  kasan_memchr+0xd4/0x200
[  107.028438]  kunit_try_run_case+0x8c/0x124
[  107.029003]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  107.029561]  kthread+0x15c/0x170
[  107.030003]  ret_from_fork+0x10/0x20
[  107.030407] 
[  107.030605] Allocated by task 246:
[  107.030959]  kasan_save_stack+0x3c/0x70
[  107.031418]  kasan_set_track+0x2c/0x40
[  107.031824]  kasan_save_alloc_info+0x24/0x34
[  107.032286]  __kasan_kmalloc+0xd4/0xe0
[  107.032871]  kmalloc_trace+0x8c/0x150
[  107.033313]  kasan_memchr+0xa0/0x200
[  107.033728]  kunit_try_run_case+0x8c/0x124
[  107.034208]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  107.034814]  kthread+0x15c/0x170
[  107.035206]  ret_from_fork+0x10/0x20
[  107.035627] 
[  107.035854] The buggy address belongs to the object at ffff0000c66ad200
[  107.035854]  which belongs to the cache kmalloc-128 of size 128
[  107.037038] The buggy address is located 24 bytes inside of
[  107.037038]  128-byte region [ffff0000c66ad200, ffff0000c66ad280)
[  107.037886] 
[  107.038077] The buggy address belongs to the physical page:
[  107.038447] page:00000000f51d9fab refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ad
[  107.039367] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  107.040297] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  107.041978] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  107.042576] page dumped because: kasan: bad access detected
[  107.043070] 
[  107.043291] Memory state around the buggy address:
[  107.043716]  ffff0000c66ad100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[  107.044393]  ffff0000c66ad180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  107.045157] >ffff0000c66ad200: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  107.045863]                             ^
[  107.046453]  ffff0000c66ad280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  107.047191]  ffff0000c66ad300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  107.047649] ==================================================================

[   76.728121] ==================================================================
[   76.728973] BUG: KASAN: slab-out-of-bounds in memchr+0x34/0x64
[   76.730182] Read of size 1 at addr ffff0000c5a87518 by task kunit_try_catch/162
[   76.731070] 
[   76.731276] CPU: 1 PID: 162 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   76.732056] Hardware name: linux,dummy-virt (DT)
[   76.732753] Call trace:
[   76.733289]  dump_backtrace+0xf8/0x118
[   76.734001]  show_stack+0x18/0x24
[   76.734637]  __dump_stack+0x28/0x38
[   76.735269]  dump_stack_lvl+0x54/0x6c
[   76.735900]  print_address_description+0x7c/0x1ec
[   76.736664]  print_report+0x50/0x68
[   76.737435]  kasan_report+0xac/0x100
[   76.738096]  __asan_load1+0x6c/0x70
[   76.738729]  memchr+0x34/0x64
[   76.739264]  kasan_memchr+0xa8/0x158
[   76.739795]  kunit_try_run_case+0x80/0x184
[   76.740235]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.740736]  kthread+0x16c/0x21c
[   76.741142]  ret_from_fork+0x10/0x20
[   76.741607] 
[   76.741869] Allocated by task 162:
[   76.742268]  kasan_set_track+0x4c/0x80
[   76.742769]  kasan_save_alloc_info+0x28/0x34
[   76.743264]  __kasan_kmalloc+0x88/0xa0
[   76.743753]  kmalloc_trace+0x54/0x68
[   76.744285]  kasan_memchr+0x48/0x158
[   76.745116]  kunit_try_run_case+0x80/0x184
[   76.746321]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.747166]  kthread+0x16c/0x21c
[   76.747779]  ret_from_fork+0x10/0x20
[   76.748378] 
[   76.748669] The buggy address belongs to the object at ffff0000c5a87500
[   76.748669]  which belongs to the cache kmalloc-128 of size 128
[   76.749411] The buggy address is located 24 bytes inside of
[   76.749411]  128-byte region [ffff0000c5a87500, ffff0000c5a87580)
[   76.750289] 
[   76.750529] The buggy address belongs to the physical page:
[   76.751040] page:000000005da1e2c0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a87
[   76.751947] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   76.752659] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   76.753386] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   76.754018] page dumped because: kasan: bad access detected
[   76.754491] 
[   76.754675] Memory state around the buggy address:
[   76.755636]  ffff0000c5a87400: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.756307]  ffff0000c5a87480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.756950] >ffff0000c5a87500: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.757546]                             ^
[   76.757969]  ffff0000c5a87580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.758589]  ffff0000c5a87600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.759207] ==================================================================

[   75.837771] ==================================================================
[   75.838719] BUG: KASAN: slab-out-of-bounds in memchr+0x34/0x64
[   75.839322] Read of size 1 at addr ffff0000c58a7118 by task kunit_try_catch/162
[   75.840487] 
[   75.840708] CPU: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   75.841555] Hardware name: linux,dummy-virt (DT)
[   75.841930] Call trace:
[   75.842174]  dump_backtrace+0xf4/0x114
[   75.842601]  show_stack+0x18/0x24
[   75.843584]  __dump_stack+0x28/0x38
[   75.844464]  dump_stack_lvl+0x50/0x68
[   75.845237]  print_address_description+0x7c/0x1ec
[   75.846142]  print_report+0x50/0x68
[   75.846919]  kasan_report+0xac/0xfc
[   75.847711]  __asan_load1+0x6c/0x70
[   75.848599]  memchr+0x34/0x64
[   75.849263]  kasan_memchr+0xa8/0x158
[   75.849918]  kunit_try_run_case+0x80/0x184
[   75.850597]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.851429]  kthread+0x16c/0x21c
[   75.852260]  ret_from_fork+0x10/0x20
[   75.852902] 
[   75.853201] Allocated by task 162:
[   75.853703]  kasan_set_track+0x4c/0x80
[   75.854373]  kasan_save_alloc_info+0x28/0x34
[   75.854854]  __kasan_kmalloc+0x88/0xa0
[   75.855280]  kmalloc_trace+0x54/0x68
[   75.855663]  kasan_memchr+0x48/0x158
[   75.856377]  kunit_try_run_case+0x80/0x184
[   75.857180]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.858069]  kthread+0x16c/0x21c
[   75.858656]  ret_from_fork+0x10/0x20
[   75.859269] 
[   75.859566] The buggy address belongs to the object at ffff0000c58a7100
[   75.859566]  which belongs to the cache kmalloc-128 of size 128
[   75.861204] The buggy address is located 24 bytes inside of
[   75.861204]  128-byte region [ffff0000c58a7100, ffff0000c58a7180)
[   75.862625] 
[   75.862936] The buggy address belongs to the physical page:
[   75.863638] page:00000000333134b1 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7
[   75.864930] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   75.865993] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   75.866995] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   75.867584] page dumped because: kasan: bad access detected
[   75.868307] 
[   75.868662] Memory state around the buggy address:
[   75.869331]  ffff0000c58a7000: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.870257]  ffff0000c58a7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.871178] >ffff0000c58a7100: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.871998]                             ^
[   75.872684]  ffff0000c58a7180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.873385]  ffff0000c58a7200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.873872] ==================================================================

[   74.433459] ==================================================================
[   74.434376] BUG: KASAN: slab-out-of-bounds in memchr+0x28/0x80
[   74.435023] Read of size 1 at addr ffff0000c5938418 by task kunit_try_catch/162
[   74.435743] 
[   74.436250] CPU: 1 PID: 162 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   74.437035] Hardware name: linux,dummy-virt (DT)
[   74.437525] Call trace:
[   74.438611]  dump_backtrace.part.0+0xdc/0xf0
[   74.439388]  show_stack+0x18/0x30
[   74.440121]  dump_stack_lvl+0x64/0x80
[   74.440779]  print_report+0x158/0x438
[   74.441618]  kasan_report+0xb4/0xf4
[   74.442361]  __asan_load1+0x68/0x74
[   74.443132]  memchr+0x28/0x80
[   74.443778]  kasan_memchr+0xcc/0x200
[   74.444627]  kunit_try_run_case+0x84/0x120
[   74.445178]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   74.446248]  kthread+0x180/0x190
[   74.447104]  ret_from_fork+0x10/0x20
[   74.447940] 
[   74.448302] Allocated by task 162:
[   74.448863]  kasan_save_stack+0x3c/0x70
[   74.449237]  kasan_set_track+0x2c/0x40
[   74.450050]  kasan_save_alloc_info+0x24/0x34
[   74.450963]  __kasan_kmalloc+0xb8/0xc0
[   74.451806]  kmalloc_trace+0x58/0x6c
[   74.452587]  kasan_memchr+0x98/0x200
[   74.453380]  kunit_try_run_case+0x84/0x120
[   74.454362]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   74.455455]  kthread+0x180/0x190
[   74.456242]  ret_from_fork+0x10/0x20
[   74.456833] 
[   74.457016] The buggy address belongs to the object at ffff0000c5938400
[   74.457016]  which belongs to the cache kmalloc-128 of size 128
[   74.458669] The buggy address is located 24 bytes inside of
[   74.458669]  128-byte region [ffff0000c5938400, ffff0000c5938480)
[   74.460327] 
[   74.460786] The buggy address belongs to the physical page:
[   74.461660] page:000000003af4cecf refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105938
[   74.462254] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   74.463092] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   74.463878] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   74.464908] page dumped because: kasan: bad access detected
[   74.465447] 
[   74.465615] Memory state around the buggy address:
[   74.465958]  ffff0000c5938300: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.466434]  ffff0000c5938380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.467060] >ffff0000c5938400: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.467621]                             ^
[   74.467931]  ffff0000c5938480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.468387]  ffff0000c5938500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.468951] ==================================================================

[   65.885096] ==================================================================
[   65.886546] BUG: KASAN: slab-out-of-bounds in memchr+0x28/0x78
[   65.887356] Read of size 1 at addr ffff0000c586c218 by task kunit_try_catch/160
[   65.888242] 
[   65.888535] CPU: 0 PID: 160 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   65.889521] Hardware name: linux,dummy-virt (DT)
[   65.890104] Call trace:
[   65.890483]  dump_backtrace+0x110/0x120
[   65.891092]  show_stack+0x18/0x28
[   65.891646]  dump_stack_lvl+0x68/0x84
[   65.892221]  print_report+0x158/0x484
[   65.892771]  kasan_report+0x98/0xe0
[   65.893185]  __asan_load1+0x68/0x78
[   65.893512]  memchr+0x28/0x78
[   65.893800]  kasan_memchr+0xe0/0x1f0
[   65.894172]  kunit_try_run_case+0x7c/0x120
[   65.894701]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   65.895280]  kthread+0x1a4/0x1b8
[   65.895686]  ret_from_fork+0x10/0x20
[   65.896100] 
[   65.896318] Allocated by task 160:
[   65.896662]  kasan_save_stack+0x2c/0x58
[   65.897096]  kasan_set_track+0x2c/0x40
[   65.897510]  kasan_save_alloc_info+0x24/0x38
[   65.897945]  __kasan_kmalloc+0xa0/0xb8
[   65.898329]  kmalloc_trace+0x50/0x68
[   65.898688]  kasan_memchr+0xa8/0x1f0
[   65.899073]  kunit_try_run_case+0x7c/0x120
[   65.899482]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   65.900031]  kthread+0x1a4/0x1b8
[   65.900383]  ret_from_fork+0x10/0x20
[   65.900776] 
[   65.900982] The buggy address belongs to the object at ffff0000c586c200
[   65.900982]  which belongs to the cache kmalloc-128 of size 128
[   65.901869] The buggy address is located 24 bytes inside of
[   65.901869]  128-byte region [ffff0000c586c200, ffff0000c586c280)
[   65.902676] 
[   65.902887] The buggy address belongs to the physical page:
[   65.903320] page:000000006cfe4e9f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10586c
[   65.904025] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   65.904615] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   65.905204] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   65.905758] page dumped because: kasan: bad access detected
[   65.906127] 
[   65.906327] Memory state around the buggy address:
[   65.906773]  ffff0000c586c100: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.907364]  ffff0000c586c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.907953] >ffff0000c586c200: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.908510]                             ^
[   65.908907]  ffff0000c586c280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.909464]  ffff0000c586c300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.910037] ==================================================================

[   32.025608] ==================================================================
[   32.026182] BUG: KASAN: slab-out-of-bounds in memchr+0x23/0x50
[   32.026907] Read of size 1 at addr ffff888103734158 by task kunit_try_catch/266
[   32.027372] 
[   32.027495] CPU: 1 PID: 266 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   32.028186] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.028809] Call Trace:
[   32.029069]  <TASK>
[   32.029223]  dump_stack_lvl+0x49/0x62
[   32.029638]  print_report+0x189/0x492
[   32.029996]  ? kasan_complete_mode_report_info+0x3c/0x200
[   32.030449]  ? memchr+0x23/0x50
[   32.030771]  kasan_report+0x10c/0x190
[   32.031107]  ? memchr+0x23/0x50
[   32.031470]  __asan_load1+0x62/0x70
[   32.031701]  memchr+0x23/0x50
[   32.031894]  kasan_memchr+0xd9/0x1e0
[   32.032107]  ? kasan_memcmp+0x260/0x260
[   32.032636]  ? kasan_memcmp+0x260/0x260
[   32.032946]  ? kunit_try_run_case+0x84/0xd0
[   32.033295]  ? __kunit_add_resource+0xd1/0x100
[   32.033649]  kunit_try_run_case+0x8f/0xd0
[   32.033965]  ? kunit_catch_run_case+0x80/0x80
[   32.034368]  ? kunit_try_catch_throw+0x40/0x40
[   32.034720]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   32.035018]  kthread+0x17b/0x1b0
[   32.035228]  ? kthread_complete_and_exit+0x30/0x30
[   32.035656]  ret_from_fork+0x22/0x30
[   32.035975]  </TASK>
[   32.036199] 
[   32.036368] Allocated by task 266:
[   32.036561]  kasan_save_stack+0x41/0x70
[   32.036924]  kasan_set_track+0x25/0x40
[   32.037239]  kasan_save_alloc_info+0x1e/0x30
[   32.037506]  __kasan_kmalloc+0xb6/0xc0
[   32.037739]  kmalloc_trace+0x48/0xb0
[   32.037939]  kasan_memchr+0x9b/0x1e0
[   32.038138]  kunit_try_run_case+0x8f/0xd0
[   32.038670]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   32.038943]  kthread+0x17b/0x1b0
[   32.039280]  ret_from_fork+0x22/0x30
[   32.039578] 
[   32.039673] The buggy address belongs to the object at ffff888103734140
[   32.039673]  which belongs to the cache kmalloc-32 of size 32
[   32.040461] The buggy address is located 24 bytes inside of
[   32.040461]  32-byte region [ffff888103734140, ffff888103734160)
[   32.041111] 
[   32.041232] The buggy address belongs to the physical page:
[   32.041715] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103734
[   32.042140] flags: 0x200000000000200(slab|node=0|zone=2)
[   32.042671] raw: 0200000000000200 0000000000000000 dead000000000122 ffff888100041500
[   32.043129] raw: 0000000000000000 0000000080400040 00000001ffffffff 0000000000000000
[   32.043593] page dumped because: kasan: bad access detected
[   32.043958] 
[   32.044170] Memory state around the buggy address:
[   32.044546]  ffff888103734000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   32.044962]  ffff888103734080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   32.045486] >ffff888103734100: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   32.045904]                                                     ^
[   32.046332]  ffff888103734180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.046663]  ffff888103734200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.046983] ==================================================================