Hay
Date
July 15, 2025, 2:10 p.m.

Environment
qemu-arm64
qemu-x86_64

[  107.054786] ==================================================================
[  107.055633] BUG: KASAN: slab-out-of-bounds in memcmp+0x44/0xd0
[  107.056712] Read of size 1 at addr ffff0000c66ab318 by task kunit_try_catch/247
[  107.058035] 
[  107.058463] CPU: 1 PID: 247 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[  107.059609] Hardware name: linux,dummy-virt (DT)
[  107.060259] Call trace:
[  107.060606]  dump_backtrace+0xe0/0x134
[  107.061007]  show_stack+0x20/0x2c
[  107.061498]  dump_stack_lvl+0x88/0xb4
[  107.062174]  print_report+0x158/0x44c
[  107.062786]  kasan_report+0xc8/0x180
[  107.063394]  __asan_load1+0x68/0x74
[  107.064009]  memcmp+0x44/0xd0
[  107.064686]  kasan_memcmp+0x100/0x210
[  107.065678]  kunit_try_run_case+0x8c/0x124
[  107.066323]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  107.066925]  kthread+0x15c/0x170
[  107.067607]  ret_from_fork+0x10/0x20
[  107.068248] 
[  107.068700] Allocated by task 247:
[  107.069506]  kasan_save_stack+0x3c/0x70
[  107.070243]  kasan_set_track+0x2c/0x40
[  107.070867]  kasan_save_alloc_info+0x24/0x34
[  107.071639]  __kasan_kmalloc+0xd4/0xe0
[  107.072341]  kmalloc_trace+0x8c/0x150
[  107.073118]  kasan_memcmp+0xbc/0x210
[  107.073776]  kunit_try_run_case+0x8c/0x124
[  107.074200]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  107.074687]  kthread+0x15c/0x170
[  107.075483]  ret_from_fork+0x10/0x20
[  107.076093] 
[  107.076485] The buggy address belongs to the object at ffff0000c66ab300
[  107.076485]  which belongs to the cache kmalloc-128 of size 128
[  107.078256] The buggy address is located 24 bytes inside of
[  107.078256]  128-byte region [ffff0000c66ab300, ffff0000c66ab380)
[  107.080024] 
[  107.080422] The buggy address belongs to the physical page:
[  107.081324] page:0000000069500412 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ab
[  107.082550] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[  107.083709] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[  107.084827] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  107.085840] page dumped because: kasan: bad access detected
[  107.086227] 
[  107.086406] Memory state around the buggy address:
[  107.086788]  ffff0000c66ab200: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  107.087956]  ffff0000c66ab280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  107.088969] >ffff0000c66ab300: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[  107.089900]                             ^
[  107.090502]  ffff0000c66ab380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  107.091417]  ffff0000c66ab400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  107.092298] ==================================================================

[   76.766266] ==================================================================
[   76.766988] BUG: KASAN: slab-out-of-bounds in memcmp+0x8c/0xd8
[   76.768004] Read of size 1 at addr ffff0000c5a87618 by task kunit_try_catch/163
[   76.768806] 
[   76.769166] CPU: 1 PID: 163 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   76.770046] Hardware name: linux,dummy-virt (DT)
[   76.770625] Call trace:
[   76.770958]  dump_backtrace+0xf8/0x118
[   76.771482]  show_stack+0x18/0x24
[   76.771984]  __dump_stack+0x28/0x38
[   76.772488]  dump_stack_lvl+0x54/0x6c
[   76.773135]  print_address_description+0x7c/0x1ec
[   76.773953]  print_report+0x50/0x68
[   76.774432]  kasan_report+0xac/0x100
[   76.774914]  __asan_load1+0x6c/0x70
[   76.775346]  memcmp+0x8c/0xd8
[   76.775719]  kasan_memcmp+0xc8/0x178
[   76.776169]  kunit_try_run_case+0x80/0x184
[   76.776654]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.777228]  kthread+0x16c/0x21c
[   76.777631]  ret_from_fork+0x10/0x20
[   76.778109] 
[   76.778378] Allocated by task 163:
[   76.778798]  kasan_set_track+0x4c/0x80
[   76.779225]  kasan_save_alloc_info+0x28/0x34
[   76.779632]  __kasan_kmalloc+0x88/0xa0
[   76.780288]  kmalloc_trace+0x54/0x68
[   76.780924]  kasan_memcmp+0x58/0x178
[   76.781558]  kunit_try_run_case+0x80/0x184
[   76.782471]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.783296]  kthread+0x16c/0x21c
[   76.783875]  ret_from_fork+0x10/0x20
[   76.784458] 
[   76.784734] The buggy address belongs to the object at ffff0000c5a87600
[   76.784734]  which belongs to the cache kmalloc-128 of size 128
[   76.786132] The buggy address is located 24 bytes inside of
[   76.786132]  128-byte region [ffff0000c5a87600, ffff0000c5a87680)
[   76.787464] 
[   76.787737] The buggy address belongs to the physical page:
[   76.788301] page:000000005da1e2c0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a87
[   76.789885] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   76.790847] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   76.791809] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   76.792302] page dumped because: kasan: bad access detected
[   76.792674] 
[   76.792955] Memory state around the buggy address:
[   76.793566]  ffff0000c5a87500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   76.794447]  ffff0000c5a87580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.795345] >ffff0000c5a87600: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.796206]                             ^
[   76.797360]  ffff0000c5a87680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.798271]  ffff0000c5a87700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.799130] ==================================================================

[   75.877435] ==================================================================
[   75.878180] BUG: KASAN: slab-out-of-bounds in memcmp+0x8c/0xd8
[   75.878666] Read of size 1 at addr ffff0000c58a3b18 by task kunit_try_catch/163
[   75.879775] 
[   75.880121] CPU: 1 PID: 163 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   75.881222] Hardware name: linux,dummy-virt (DT)
[   75.881873] Call trace:
[   75.882276]  dump_backtrace+0xf4/0x114
[   75.882957]  show_stack+0x18/0x24
[   75.883578]  __dump_stack+0x28/0x38
[   75.884347]  dump_stack_lvl+0x50/0x68
[   75.884986]  print_address_description+0x7c/0x1ec
[   75.885772]  print_report+0x50/0x68
[   75.886409]  kasan_report+0xac/0xfc
[   75.887047]  __asan_load1+0x6c/0x70
[   75.887685]  memcmp+0x8c/0xd8
[   75.888272]  kasan_memcmp+0xc8/0x178
[   75.888888]  kunit_try_run_case+0x80/0x184
[   75.889432]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.890195]  kthread+0x16c/0x21c
[   75.890779]  ret_from_fork+0x10/0x20
[   75.891362] 
[   75.891634] Allocated by task 163:
[   75.892221]  kasan_set_track+0x4c/0x80
[   75.892894]  kasan_save_alloc_info+0x28/0x34
[   75.893547]  __kasan_kmalloc+0x88/0xa0
[   75.894189]  kmalloc_trace+0x54/0x68
[   75.894615]  kasan_memcmp+0x58/0x178
[   75.895020]  kunit_try_run_case+0x80/0x184
[   75.895441]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.896342]  kthread+0x16c/0x21c
[   75.896954]  ret_from_fork+0x10/0x20
[   75.897547] 
[   75.897834] The buggy address belongs to the object at ffff0000c58a3b00
[   75.897834]  which belongs to the cache kmalloc-128 of size 128
[   75.899235] The buggy address is located 24 bytes inside of
[   75.899235]  128-byte region [ffff0000c58a3b00, ffff0000c58a3b80)
[   75.900731] 
[   75.901135] The buggy address belongs to the physical page:
[   75.901871] page:000000002b58a59c refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a3
[   75.902999] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   75.904045] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   75.905044] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   75.905779] page dumped because: kasan: bad access detected
[   75.906459] 
[   75.906730] Memory state around the buggy address:
[   75.907258]  ffff0000c58a3a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   75.908029]  ffff0000c58a3a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.909021] >ffff0000c58a3b00: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.909907]                             ^
[   75.910471]  ffff0000c58a3b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.911370]  ffff0000c58a3c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.912285] ==================================================================

[   74.474977] ==================================================================
[   74.476084] BUG: KASAN: slab-out-of-bounds in memcmp+0x44/0xd0
[   74.476949] Read of size 1 at addr ffff0000c5840618 by task kunit_try_catch/163
[   74.477609] 
[   74.478410] CPU: 0 PID: 163 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   74.479119] Hardware name: linux,dummy-virt (DT)
[   74.479556] Call trace:
[   74.479816]  dump_backtrace.part.0+0xdc/0xf0
[   74.480332]  show_stack+0x18/0x30
[   74.480765]  dump_stack_lvl+0x64/0x80
[   74.481198]  print_report+0x158/0x438
[   74.481654]  kasan_report+0xb4/0xf4
[   74.482331]  __asan_load1+0x68/0x74
[   74.482760]  memcmp+0x44/0xd0
[   74.483145]  kasan_memcmp+0xf4/0x200
[   74.483617]  kunit_try_run_case+0x84/0x120
[   74.484229]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   74.484749]  kthread+0x180/0x190
[   74.485069]  ret_from_fork+0x10/0x20
[   74.485435] 
[   74.485692] Allocated by task 163:
[   74.486687]  kasan_save_stack+0x3c/0x70
[   74.487263]  kasan_set_track+0x2c/0x40
[   74.487820]  kasan_save_alloc_info+0x24/0x34
[   74.488452]  __kasan_kmalloc+0xb8/0xc0
[   74.488998]  kmalloc_trace+0x58/0x6c
[   74.489552]  kasan_memcmp+0xb0/0x200
[   74.490426]  kunit_try_run_case+0x84/0x120
[   74.491046]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   74.491803]  kthread+0x180/0x190
[   74.492301]  ret_from_fork+0x10/0x20
[   74.492665] 
[   74.492836] The buggy address belongs to the object at ffff0000c5840600
[   74.492836]  which belongs to the cache kmalloc-128 of size 128
[   74.493696] The buggy address is located 24 bytes inside of
[   74.493696]  128-byte region [ffff0000c5840600, ffff0000c5840680)
[   74.495544] 
[   74.495819] The buggy address belongs to the physical page:
[   74.496490] page:0000000081b5a301 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105840
[   74.497553] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   74.498735] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   74.499844] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   74.500320] page dumped because: kasan: bad access detected
[   74.501228] 
[   74.501565] Memory state around the buggy address:
[   74.502307]  ffff0000c5840500: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.503445]  ffff0000c5840580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.504368] >ffff0000c5840600: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.505244]                             ^
[   74.506108]  ffff0000c5840680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.506774]  ffff0000c5840700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.507267] ==================================================================

[   65.914021] ==================================================================
[   65.914834] BUG: KASAN: slab-out-of-bounds in memcmp+0x34/0xe0
[   65.915357] Read of size 1 at addr ffff0000c586c318 by task kunit_try_catch/161
[   65.915966] 
[   65.916171] CPU: 0 PID: 161 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   65.916789] Hardware name: linux,dummy-virt (DT)
[   65.917251] Call trace:
[   65.917504]  dump_backtrace+0x110/0x120
[   65.918051]  show_stack+0x18/0x28
[   65.918470]  dump_stack_lvl+0x68/0x84
[   65.918898]  print_report+0x158/0x484
[   65.919287]  kasan_report+0x98/0xe0
[   65.919667]  __asan_load1+0x68/0x78
[   65.920021]  memcmp+0x34/0xe0
[   65.920385]  kasan_memcmp+0x104/0x210
[   65.920802]  kunit_try_run_case+0x7c/0x120
[   65.921261]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   65.921859]  kthread+0x1a4/0x1b8
[   65.922321]  ret_from_fork+0x10/0x20
[   65.922695] 
[   65.922922] Allocated by task 161:
[   65.923244]  kasan_save_stack+0x2c/0x58
[   65.923671]  kasan_set_track+0x2c/0x40
[   65.924058]  kasan_save_alloc_info+0x24/0x38
[   65.924518]  __kasan_kmalloc+0xa0/0xb8
[   65.924908]  kmalloc_trace+0x50/0x68
[   65.925308]  kasan_memcmp+0xb8/0x210
[   65.925884]  kunit_try_run_case+0x7c/0x120
[   65.926344]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   65.926903]  kthread+0x1a4/0x1b8
[   65.927267]  ret_from_fork+0x10/0x20
[   65.927663] 
[   65.927851] The buggy address belongs to the object at ffff0000c586c300
[   65.927851]  which belongs to the cache kmalloc-128 of size 128
[   65.928710] The buggy address is located 24 bytes inside of
[   65.928710]  128-byte region [ffff0000c586c300, ffff0000c586c380)
[   65.929718] 
[   65.929894] The buggy address belongs to the physical page:
[   65.930303] page:000000006cfe4e9f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10586c
[   65.931059] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   65.931790] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   65.932400] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   65.932993] page dumped because: kasan: bad access detected
[   65.933591] 
[   65.933781] Memory state around the buggy address:
[   65.934160]  ffff0000c586c200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   65.934739]  ffff0000c586c280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.935307] >ffff0000c586c300: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.935834]                             ^
[   65.936191]  ffff0000c586c380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.936750]  ffff0000c586c400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.937296] ==================================================================

[   32.051953] ==================================================================
[   32.052771] BUG: KASAN: slab-out-of-bounds in memcmp+0x39/0xb0
[   32.053095] Read of size 1 at addr ffff888103734198 by task kunit_try_catch/267
[   32.053606] 
[   32.053956] CPU: 1 PID: 267 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   32.054480] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   32.054997] Call Trace:
[   32.055337]  <TASK>
[   32.055593]  dump_stack_lvl+0x49/0x62
[   32.055947]  print_report+0x189/0x492
[   32.056339]  ? kasan_complete_mode_report_info+0x3c/0x200
[   32.056742]  ? memcmp+0x39/0xb0
[   32.057058]  kasan_report+0x10c/0x190
[   32.057424]  ? memcmp+0x39/0xb0
[   32.057662]  __asan_load1+0x62/0x70
[   32.057846]  memcmp+0x39/0xb0
[   32.058034]  kasan_memcmp+0x127/0x260
[   32.058565]  ? kmalloc_oob_in_memset+0x1d0/0x1d0
[   32.058933]  ? preempt_count_sub+0x4c/0x70
[   32.059346]  kunit_try_run_case+0x8f/0xd0
[   32.059690]  ? kunit_catch_run_case+0x80/0x80
[   32.060032]  ? kunit_try_catch_throw+0x40/0x40
[   32.060444]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   32.060852]  kthread+0x17b/0x1b0
[   32.061180]  ? kthread_complete_and_exit+0x30/0x30
[   32.061573]  ret_from_fork+0x22/0x30
[   32.061910]  </TASK>
[   32.062215] 
[   32.062335] Allocated by task 267:
[   32.062541]  kasan_save_stack+0x41/0x70
[   32.062906]  kasan_set_track+0x25/0x40
[   32.063234]  kasan_save_alloc_info+0x1e/0x30
[   32.063597]  __kasan_kmalloc+0xb6/0xc0
[   32.063840]  kmalloc_trace+0x48/0xb0
[   32.064033]  kasan_memcmp+0xd8/0x260
[   32.064479]  kunit_try_run_case+0x8f/0xd0
[   32.064717]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   32.065088]  kthread+0x17b/0x1b0
[   32.065406]  ret_from_fork+0x22/0x30
[   32.065731] 
[   32.065934] The buggy address belongs to the object at ffff888103734180
[   32.065934]  which belongs to the cache kmalloc-32 of size 32
[   32.066625] The buggy address is located 24 bytes inside of
[   32.066625]  32-byte region [ffff888103734180, ffff8881037341a0)
[   32.067077] 
[   32.067206] The buggy address belongs to the physical page:
[   32.067507] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103734
[   32.068302] flags: 0x200000000000200(slab|node=0|zone=2)
[   32.068609] raw: 0200000000000200 0000000000000000 dead000000000122 ffff888100041500
[   32.068967] raw: 0000000000000000 0000000080400040 00000001ffffffff 0000000000000000
[   32.069504] page dumped because: kasan: bad access detected
[   32.069866] 
[   32.069979] Memory state around the buggy address:
[   32.070433]  ffff888103734080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   32.070861]  ffff888103734100: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   32.071321] >ffff888103734180: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.071792]                             ^
[   32.072095]  ffff888103734200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.072637]  ffff888103734280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.073065] ==================================================================