Hay
Date
Nov. 20, 2024, 6:35 a.m.

Environment
qemu-arm64
qemu-x86_64

[   36.833158] ==================================================================
[   36.834378] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8
[   36.835051] Write of size 8 at addr fff00000c657f971 by task kunit_try_catch/165
[   36.836221] 
[   36.836667] CPU: 1 UID: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   36.838437] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.839115] Hardware name: linux,dummy-virt (DT)
[   36.839833] Call trace:
[   36.840261]  show_stack+0x20/0x38 (C)
[   36.840805]  dump_stack_lvl+0x8c/0xd0
[   36.841388]  print_report+0x118/0x5e0
[   36.842343]  kasan_report+0xc8/0x118
[   36.842880]  kasan_check_range+0x100/0x1a8
[   36.843432]  __asan_memset+0x34/0x78
[   36.844328]  kmalloc_oob_memset_8+0x150/0x2f8
[   36.844866]  kunit_try_run_case+0x14c/0x3d0
[   36.845807]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.846659]  kthread+0x24c/0x2d0
[   36.847283]  ret_from_fork+0x10/0x20
[   36.847962] 
[   36.848268] Allocated by task 165:
[   36.848773]  kasan_save_stack+0x3c/0x68
[   36.849613]  kasan_save_track+0x20/0x40
[   36.850176]  kasan_save_alloc_info+0x40/0x58
[   36.850686]  __kasan_kmalloc+0xd4/0xd8
[   36.851242]  __kmalloc_cache_noprof+0x15c/0x3c8
[   36.851993]  kmalloc_oob_memset_8+0xb0/0x2f8
[   36.852603]  kunit_try_run_case+0x14c/0x3d0
[   36.853862]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.854476]  kthread+0x24c/0x2d0
[   36.854976]  ret_from_fork+0x10/0x20
[   36.855530] 
[   36.855849] The buggy address belongs to the object at fff00000c657f900
[   36.855849]  which belongs to the cache kmalloc-128 of size 128
[   36.856960] The buggy address is located 113 bytes inside of
[   36.856960]  allocated 120-byte region [fff00000c657f900, fff00000c657f978)
[   36.858165] 
[   36.858518] The buggy address belongs to the physical page:
[   36.859153] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10657f
[   36.860501] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.861621] page_type: f5(slab)
[   36.862114] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   36.862911] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   36.863687] page dumped because: kasan: bad access detected
[   36.864353] 
[   36.864702] Memory state around the buggy address:
[   36.865718]  fff00000c657f800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   36.866430]  fff00000c657f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.867216] >fff00000c657f900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   36.867876]                                                                 ^
[   36.868739]  fff00000c657f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.869742]  fff00000c657fa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.870552] ==================================================================
[   36.730905] ==================================================================
[   36.731847] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8
[   36.732673] Write of size 2 at addr fff00000c6575a77 by task kunit_try_catch/161
[   36.733322] 
[   36.733992] CPU: 0 UID: 0 PID: 161 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   36.735056] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.736747] Hardware name: linux,dummy-virt (DT)
[   36.737268] Call trace:
[   36.737797]  show_stack+0x20/0x38 (C)
[   36.738414]  dump_stack_lvl+0x8c/0xd0
[   36.738983]  print_report+0x118/0x5e0
[   36.739822]  kasan_report+0xc8/0x118
[   36.740381]  kasan_check_range+0x100/0x1a8
[   36.741029]  __asan_memset+0x34/0x78
[   36.741955]  kmalloc_oob_memset_2+0x150/0x2f8
[   36.742505]  kunit_try_run_case+0x14c/0x3d0
[   36.743225]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.744046]  kthread+0x24c/0x2d0
[   36.744688]  ret_from_fork+0x10/0x20
[   36.745463] 
[   36.745880] Allocated by task 161:
[   36.746482]  kasan_save_stack+0x3c/0x68
[   36.747008]  kasan_save_track+0x20/0x40
[   36.747606]  kasan_save_alloc_info+0x40/0x58
[   36.748266]  __kasan_kmalloc+0xd4/0xd8
[   36.748915]  __kmalloc_cache_noprof+0x15c/0x3c8
[   36.749666]  kmalloc_oob_memset_2+0xb0/0x2f8
[   36.750537]  kunit_try_run_case+0x14c/0x3d0
[   36.751001]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.751797]  kthread+0x24c/0x2d0
[   36.752264]  ret_from_fork+0x10/0x20
[   36.752818] 
[   36.753162] The buggy address belongs to the object at fff00000c6575a00
[   36.753162]  which belongs to the cache kmalloc-128 of size 128
[   36.755032] The buggy address is located 119 bytes inside of
[   36.755032]  allocated 120-byte region [fff00000c6575a00, fff00000c6575a78)
[   36.756219] 
[   36.756802] The buggy address belongs to the physical page:
[   36.757583] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106575
[   36.758398] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.758951] page_type: f5(slab)
[   36.759512] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   36.760789] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   36.762211] page dumped because: kasan: bad access detected
[   36.763024] 
[   36.763510] Memory state around the buggy address:
[   36.764039]  fff00000c6575900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   36.764827]  fff00000c6575980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.765756] >fff00000c6575a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   36.767010]                                                                 ^
[   36.767573]  fff00000c6575a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.767990]  fff00000c6575b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.768335] ==================================================================
[   36.884585] ==================================================================
[   36.885544] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8
[   36.887665] Write of size 16 at addr fff00000c6575d69 by task kunit_try_catch/167
[   36.889060] 
[   36.889569] CPU: 0 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   36.890819] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.891171] Hardware name: linux,dummy-virt (DT)
[   36.891779] Call trace:
[   36.892138]  show_stack+0x20/0x38 (C)
[   36.892772]  dump_stack_lvl+0x8c/0xd0
[   36.893346]  print_report+0x118/0x5e0
[   36.894500]  kasan_report+0xc8/0x118
[   36.895101]  kasan_check_range+0x100/0x1a8
[   36.895704]  __asan_memset+0x34/0x78
[   36.896194]  kmalloc_oob_memset_16+0x150/0x2f8
[   36.897653]  kunit_try_run_case+0x14c/0x3d0
[   36.898390]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.899174]  kthread+0x24c/0x2d0
[   36.899779]  ret_from_fork+0x10/0x20
[   36.900315] 
[   36.900671] Allocated by task 167:
[   36.901122]  kasan_save_stack+0x3c/0x68
[   36.902075]  kasan_save_track+0x20/0x40
[   36.902485]  kasan_save_alloc_info+0x40/0x58
[   36.902904]  __kasan_kmalloc+0xd4/0xd8
[   36.903660]  __kmalloc_cache_noprof+0x15c/0x3c8
[   36.904502]  kmalloc_oob_memset_16+0xb0/0x2f8
[   36.905211]  kunit_try_run_case+0x14c/0x3d0
[   36.905819]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.906891]  kthread+0x24c/0x2d0
[   36.907402]  ret_from_fork+0x10/0x20
[   36.907968] 
[   36.908309] The buggy address belongs to the object at fff00000c6575d00
[   36.908309]  which belongs to the cache kmalloc-128 of size 128
[   36.910222] The buggy address is located 105 bytes inside of
[   36.910222]  allocated 120-byte region [fff00000c6575d00, fff00000c6575d78)
[   36.911392] 
[   36.911754] The buggy address belongs to the physical page:
[   36.912410] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106575
[   36.914019] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.914809] page_type: f5(slab)
[   36.915365] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   36.916349] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   36.917346] page dumped because: kasan: bad access detected
[   36.917970] 
[   36.918290] Memory state around the buggy address:
[   36.919230]  fff00000c6575c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   36.920520]  fff00000c6575c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.921077] >fff00000c6575d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   36.922167]                                                                 ^
[   36.923132]  fff00000c6575d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.923874]  fff00000c6575e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.924622] ==================================================================
[   36.780346] ==================================================================
[   36.781864] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300
[   36.783373] Write of size 4 at addr fff00000c6575b75 by task kunit_try_catch/163
[   36.784123] 
[   36.784523] CPU: 0 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   36.786118] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.786898] Hardware name: linux,dummy-virt (DT)
[   36.787676] Call trace:
[   36.788018]  show_stack+0x20/0x38 (C)
[   36.788570]  dump_stack_lvl+0x8c/0xd0
[   36.789171]  print_report+0x118/0x5e0
[   36.790356]  kasan_report+0xc8/0x118
[   36.790932]  kasan_check_range+0x100/0x1a8
[   36.791476]  __asan_memset+0x34/0x78
[   36.791893]  kmalloc_oob_memset_4+0x150/0x300
[   36.792640]  kunit_try_run_case+0x14c/0x3d0
[   36.793688]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.794232]  kthread+0x24c/0x2d0
[   36.794829]  ret_from_fork+0x10/0x20
[   36.795500] 
[   36.795902] Allocated by task 163:
[   36.796479]  kasan_save_stack+0x3c/0x68
[   36.797087]  kasan_save_track+0x20/0x40
[   36.797948]  kasan_save_alloc_info+0x40/0x58
[   36.798979]  __kasan_kmalloc+0xd4/0xd8
[   36.799880]  __kmalloc_cache_noprof+0x15c/0x3c8
[   36.800606]  kmalloc_oob_memset_4+0xb0/0x300
[   36.801380]  kunit_try_run_case+0x14c/0x3d0
[   36.802051]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.802665]  kthread+0x24c/0x2d0
[   36.803254]  ret_from_fork+0x10/0x20
[   36.804069] 
[   36.804400] The buggy address belongs to the object at fff00000c6575b00
[   36.804400]  which belongs to the cache kmalloc-128 of size 128
[   36.805680] The buggy address is located 117 bytes inside of
[   36.805680]  allocated 120-byte region [fff00000c6575b00, fff00000c6575b78)
[   36.807664] 
[   36.808257] The buggy address belongs to the physical page:
[   36.808874] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106575
[   36.810041] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.810714] page_type: f5(slab)
[   36.811180] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   36.812092] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   36.812911] page dumped because: kasan: bad access detected
[   36.813715] 
[   36.813955] Memory state around the buggy address:
[   36.814481]  fff00000c6575a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   36.815266]  fff00000c6575a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.816422] >fff00000c6575b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   36.817161]                                                                 ^
[   36.818047]  fff00000c6575b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.819207]  fff00000c6575c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.820206] ==================================================================

[   28.290368] ==================================================================
[   28.291914] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x167/0x330
[   28.293007] Write of size 8 at addr ffff8881029e2f71 by task kunit_try_catch/183
[   28.294158] 
[   28.295040] CPU: 1 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   28.296010] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.297216] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.298074] Call Trace:
[   28.298848]  <TASK>
[   28.299256]  dump_stack_lvl+0x73/0xb0
[   28.299863]  print_report+0xd1/0x640
[   28.300683]  ? __virt_addr_valid+0x1db/0x2d0
[   28.301401]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.302150]  kasan_report+0x102/0x140
[   28.302932]  ? kmalloc_oob_memset_8+0x167/0x330
[   28.303611]  ? kmalloc_oob_memset_8+0x167/0x330
[   28.304118]  kasan_check_range+0x10c/0x1c0
[   28.304556]  __asan_memset+0x27/0x50
[   28.305462]  kmalloc_oob_memset_8+0x167/0x330
[   28.306304]  ? __pfx_kmalloc_oob_memset_8+0x10/0x10
[   28.306835]  ? __schedule+0xc3e/0x2790
[   28.307445]  ? __pfx_read_tsc+0x10/0x10
[   28.307763]  ? ktime_get_ts64+0x84/0x230
[   28.308161]  kunit_try_run_case+0x1b3/0x490
[   28.308641]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.309538]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.310046]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.311083]  ? __kthread_parkme+0x82/0x160
[   28.311608]  ? preempt_count_sub+0x50/0x80
[   28.312359]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.313058]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.314086]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.315442]  kthread+0x257/0x310
[   28.316447]  ? __pfx_kthread+0x10/0x10
[   28.317322]  ret_from_fork+0x41/0x80
[   28.318169]  ? __pfx_kthread+0x10/0x10
[   28.318840]  ret_from_fork_asm+0x1a/0x30
[   28.319206]  </TASK>
[   28.319499] 
[   28.319709] Allocated by task 183:
[   28.320065]  kasan_save_stack+0x3d/0x60
[   28.320409]  kasan_save_track+0x18/0x40
[   28.321233]  kasan_save_alloc_info+0x3b/0x50
[   28.321633]  __kasan_kmalloc+0xb7/0xc0
[   28.322195]  __kmalloc_cache_noprof+0x184/0x410
[   28.323397]  kmalloc_oob_memset_8+0xad/0x330
[   28.324757]  kunit_try_run_case+0x1b3/0x490
[   28.325828]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.326388]  kthread+0x257/0x310
[   28.327094]  ret_from_fork+0x41/0x80
[   28.327916]  ret_from_fork_asm+0x1a/0x30
[   28.328332] 
[   28.328529] The buggy address belongs to the object at ffff8881029e2f00
[   28.328529]  which belongs to the cache kmalloc-128 of size 128
[   28.331347] The buggy address is located 113 bytes inside of
[   28.331347]  allocated 120-byte region [ffff8881029e2f00, ffff8881029e2f78)
[   28.332650] 
[   28.333026] The buggy address belongs to the physical page:
[   28.333584] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e2
[   28.334954] flags: 0x200000000000000(node=0|zone=2)
[   28.335530] page_type: f5(slab)
[   28.335981] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   28.337786] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   28.338759] page dumped because: kasan: bad access detected
[   28.339329] 
[   28.339527] Memory state around the buggy address:
[   28.340280]  ffff8881029e2e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   28.342222]  ffff8881029e2e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.343384] >ffff8881029e2f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   28.344249]                                                                 ^
[   28.345205]  ffff8881029e2f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.346384]  ffff8881029e3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   28.347294] ==================================================================
[   28.353323] ==================================================================
[   28.354570] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x167/0x330
[   28.355816] Write of size 16 at addr ffff8881029e4169 by task kunit_try_catch/185
[   28.356916] 
[   28.357029] CPU: 1 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   28.358437] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.358631] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.358993] Call Trace:
[   28.359229]  <TASK>
[   28.359894]  dump_stack_lvl+0x73/0xb0
[   28.360500]  print_report+0xd1/0x640
[   28.361410]  ? __virt_addr_valid+0x1db/0x2d0
[   28.362296]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.362962]  kasan_report+0x102/0x140
[   28.363854]  ? kmalloc_oob_memset_16+0x167/0x330
[   28.364843]  ? kmalloc_oob_memset_16+0x167/0x330
[   28.365475]  kasan_check_range+0x10c/0x1c0
[   28.366077]  __asan_memset+0x27/0x50
[   28.366857]  kmalloc_oob_memset_16+0x167/0x330
[   28.367589]  ? __pfx_kmalloc_oob_memset_16+0x10/0x10
[   28.368441]  ? __schedule+0xc3e/0x2790
[   28.368961]  ? __pfx_read_tsc+0x10/0x10
[   28.369518]  ? ktime_get_ts64+0x84/0x230
[   28.370347]  kunit_try_run_case+0x1b3/0x490
[   28.371362]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.372092]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.372913]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.373484]  ? __kthread_parkme+0x82/0x160
[   28.374522]  ? preempt_count_sub+0x50/0x80
[   28.375059]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.375823]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.376421]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.376941]  kthread+0x257/0x310
[   28.377276]  ? __pfx_kthread+0x10/0x10
[   28.378420]  ret_from_fork+0x41/0x80
[   28.378985]  ? __pfx_kthread+0x10/0x10
[   28.379727]  ret_from_fork_asm+0x1a/0x30
[   28.380130]  </TASK>
[   28.380388] 
[   28.380537] Allocated by task 185:
[   28.380902]  kasan_save_stack+0x3d/0x60
[   28.381356]  kasan_save_track+0x18/0x40
[   28.381673]  kasan_save_alloc_info+0x3b/0x50
[   28.382797]  __kasan_kmalloc+0xb7/0xc0
[   28.383352]  __kmalloc_cache_noprof+0x184/0x410
[   28.383876]  kmalloc_oob_memset_16+0xad/0x330
[   28.384554]  kunit_try_run_case+0x1b3/0x490
[   28.385013]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.385755]  kthread+0x257/0x310
[   28.386518]  ret_from_fork+0x41/0x80
[   28.387063]  ret_from_fork_asm+0x1a/0x30
[   28.387835] 
[   28.388080] The buggy address belongs to the object at ffff8881029e4100
[   28.388080]  which belongs to the cache kmalloc-128 of size 128
[   28.389437] The buggy address is located 105 bytes inside of
[   28.389437]  allocated 120-byte region [ffff8881029e4100, ffff8881029e4178)
[   28.390990] 
[   28.391416] The buggy address belongs to the physical page:
[   28.392019] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e4
[   28.393013] flags: 0x200000000000000(node=0|zone=2)
[   28.393585] page_type: f5(slab)
[   28.394077] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   28.395096] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   28.396150] page dumped because: kasan: bad access detected
[   28.396419] 
[   28.396515] Memory state around the buggy address:
[   28.397021]  ffff8881029e4000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   28.398835]  ffff8881029e4080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.399603] >ffff8881029e4100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   28.400288]                                                                 ^
[   28.401922]  ffff8881029e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.403200]  ffff8881029e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.403837] ==================================================================
[   28.186728] ==================================================================
[   28.188059] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x167/0x330
[   28.188850] Write of size 2 at addr ffff888101ac5977 by task kunit_try_catch/179
[   28.189634] 
[   28.189911] CPU: 0 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   28.190851] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.191255] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.192484] Call Trace:
[   28.193283]  <TASK>
[   28.193598]  dump_stack_lvl+0x73/0xb0
[   28.194233]  print_report+0xd1/0x640
[   28.194649]  ? __virt_addr_valid+0x1db/0x2d0
[   28.195873]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.196276]  kasan_report+0x102/0x140
[   28.196979]  ? kmalloc_oob_memset_2+0x167/0x330
[   28.197825]  ? kmalloc_oob_memset_2+0x167/0x330
[   28.198464]  kasan_check_range+0x10c/0x1c0
[   28.199033]  __asan_memset+0x27/0x50
[   28.199567]  kmalloc_oob_memset_2+0x167/0x330
[   28.200242]  ? __pfx_kmalloc_oob_memset_2+0x10/0x10
[   28.200808]  ? __schedule+0xc3e/0x2790
[   28.201249]  ? __pfx_read_tsc+0x10/0x10
[   28.201992]  ? ktime_get_ts64+0x84/0x230
[   28.202540]  kunit_try_run_case+0x1b3/0x490
[   28.203335]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.203800]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.204419]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.204986]  ? __kthread_parkme+0x82/0x160
[   28.205505]  ? preempt_count_sub+0x50/0x80
[   28.206086]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.206591]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.207411]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.208298]  kthread+0x257/0x310
[   28.208674]  ? __pfx_kthread+0x10/0x10
[   28.209102]  ret_from_fork+0x41/0x80
[   28.209589]  ? __pfx_kthread+0x10/0x10
[   28.210290]  ret_from_fork_asm+0x1a/0x30
[   28.210720]  </TASK>
[   28.211056] 
[   28.211416] Allocated by task 179:
[   28.212108]  kasan_save_stack+0x3d/0x60
[   28.212406]  kasan_save_track+0x18/0x40
[   28.213186]  kasan_save_alloc_info+0x3b/0x50
[   28.213640]  __kasan_kmalloc+0xb7/0xc0
[   28.214637]  __kmalloc_cache_noprof+0x184/0x410
[   28.216078]  kmalloc_oob_memset_2+0xad/0x330
[   28.216342]  kunit_try_run_case+0x1b3/0x490
[   28.216594]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.216910]  kthread+0x257/0x310
[   28.217123]  ret_from_fork+0x41/0x80
[   28.217355]  ret_from_fork_asm+0x1a/0x30
[   28.217777] 
[   28.217932] The buggy address belongs to the object at ffff888101ac5900
[   28.217932]  which belongs to the cache kmalloc-128 of size 128
[   28.219306] The buggy address is located 119 bytes inside of
[   28.219306]  allocated 120-byte region [ffff888101ac5900, ffff888101ac5978)
[   28.219923] 
[   28.220057] The buggy address belongs to the physical page:
[   28.220343] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101ac5
[   28.220770] flags: 0x200000000000000(node=0|zone=2)
[   28.221378] page_type: f5(slab)
[   28.221624] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   28.222341] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   28.223164] page dumped because: kasan: bad access detected
[   28.223613] 
[   28.223886] Memory state around the buggy address:
[   28.224151]  ffff888101ac5800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   28.224500]  ffff888101ac5880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.225289] >ffff888101ac5900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   28.225746]                                                                 ^
[   28.226433]  ffff888101ac5980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.226858]  ffff888101ac5a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.227252] ==================================================================
[   28.239536] ==================================================================
[   28.240490] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x167/0x330
[   28.241269] Write of size 4 at addr ffff8881029e2c75 by task kunit_try_catch/181
[   28.242163] 
[   28.242415] CPU: 1 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   28.243810] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.244096] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.245108] Call Trace:
[   28.245637]  <TASK>
[   28.246051]  dump_stack_lvl+0x73/0xb0
[   28.246623]  print_report+0xd1/0x640
[   28.247087]  ? __virt_addr_valid+0x1db/0x2d0
[   28.247661]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.248288]  kasan_report+0x102/0x140
[   28.248750]  ? kmalloc_oob_memset_4+0x167/0x330
[   28.249606]  ? kmalloc_oob_memset_4+0x167/0x330
[   28.250309]  kasan_check_range+0x10c/0x1c0
[   28.250677]  __asan_memset+0x27/0x50
[   28.251302]  kmalloc_oob_memset_4+0x167/0x330
[   28.251747]  ? __pfx_kmalloc_oob_memset_4+0x10/0x10
[   28.252092]  ? __schedule+0xc3e/0x2790
[   28.252733]  ? __pfx_read_tsc+0x10/0x10
[   28.253635]  ? ktime_get_ts64+0x84/0x230
[   28.254093]  kunit_try_run_case+0x1b3/0x490
[   28.254661]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.255362]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.255765]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.256635]  ? __kthread_parkme+0x82/0x160
[   28.257524]  ? preempt_count_sub+0x50/0x80
[   28.257977]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.258718]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.259219]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.260271]  kthread+0x257/0x310
[   28.260549]  ? __pfx_kthread+0x10/0x10
[   28.261251]  ret_from_fork+0x41/0x80
[   28.261973]  ? __pfx_kthread+0x10/0x10
[   28.262579]  ret_from_fork_asm+0x1a/0x30
[   28.263114]  </TASK>
[   28.263511] 
[   28.263946] Allocated by task 181:
[   28.264203]  kasan_save_stack+0x3d/0x60
[   28.265264]  kasan_save_track+0x18/0x40
[   28.265537]  kasan_save_alloc_info+0x3b/0x50
[   28.266433]  __kasan_kmalloc+0xb7/0xc0
[   28.266970]  __kmalloc_cache_noprof+0x184/0x410
[   28.267551]  kmalloc_oob_memset_4+0xad/0x330
[   28.268365]  kunit_try_run_case+0x1b3/0x490
[   28.268682]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.269311]  kthread+0x257/0x310
[   28.269949]  ret_from_fork+0x41/0x80
[   28.270250]  ret_from_fork_asm+0x1a/0x30
[   28.271013] 
[   28.271253] The buggy address belongs to the object at ffff8881029e2c00
[   28.271253]  which belongs to the cache kmalloc-128 of size 128
[   28.272774] The buggy address is located 117 bytes inside of
[   28.272774]  allocated 120-byte region [ffff8881029e2c00, ffff8881029e2c78)
[   28.273859] 
[   28.274174] The buggy address belongs to the physical page:
[   28.275116] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e2
[   28.276021] flags: 0x200000000000000(node=0|zone=2)
[   28.276394] page_type: f5(slab)
[   28.276823] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   28.277829] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   28.278299] page dumped because: kasan: bad access detected
[   28.279175] 
[   28.279422] Memory state around the buggy address:
[   28.280108]  ffff8881029e2b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   28.280615]  ffff8881029e2b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.281584] >ffff8881029e2c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   28.282399]                                                                 ^
[   28.283527]  ffff8881029e2c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.284373]  ffff8881029e2d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.285292] ==================================================================