Hay
Date
Nov. 28, 2024, 2:36 a.m.

Environment
qemu-arm64
qemu-x86_64

[   30.580329] ==================================================================
[   30.581923] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8
[   30.582620] Write of size 2 at addr fff00000c5b58b77 by task kunit_try_catch/160
[   30.583402] 
[   30.583776] CPU: 1 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   30.584803] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.585339] Hardware name: linux,dummy-virt (DT)
[   30.585945] Call trace:
[   30.586384]  show_stack+0x20/0x38 (C)
[   30.586887]  dump_stack_lvl+0x8c/0xd0
[   30.587570]  print_report+0x118/0x5e0
[   30.588176]  kasan_report+0xc8/0x118
[   30.588710]  kasan_check_range+0x100/0x1a8
[   30.589591]  __asan_memset+0x34/0x78
[   30.590167]  kmalloc_oob_memset_2+0x150/0x2f8
[   30.590704]  kunit_try_run_case+0x14c/0x3d0
[   30.591364]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.592095]  kthread+0x24c/0x2d0
[   30.592628]  ret_from_fork+0x10/0x20
[   30.593503] 
[   30.593837] Allocated by task 160:
[   30.594352]  kasan_save_stack+0x3c/0x68
[   30.594858]  kasan_save_track+0x20/0x40
[   30.595437]  kasan_save_alloc_info+0x40/0x58
[   30.595917]  __kasan_kmalloc+0xd4/0xd8
[   30.596504]  __kmalloc_cache_noprof+0x15c/0x3c0
[   30.597471]  kmalloc_oob_memset_2+0xb0/0x2f8
[   30.597908]  kunit_try_run_case+0x14c/0x3d0
[   30.598542]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.599164]  kthread+0x24c/0x2d0
[   30.599700]  ret_from_fork+0x10/0x20
[   30.600198] 
[   30.600550] The buggy address belongs to the object at fff00000c5b58b00
[   30.600550]  which belongs to the cache kmalloc-128 of size 128
[   30.602003] The buggy address is located 119 bytes inside of
[   30.602003]  allocated 120-byte region [fff00000c5b58b00, fff00000c5b58b78)
[   30.603193] 
[   30.603511] The buggy address belongs to the physical page:
[   30.604200] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b58
[   30.605237] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.606049] page_type: f5(slab)
[   30.606582] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.607300] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   30.608214] page dumped because: kasan: bad access detected
[   30.608848] 
[   30.609439] Memory state around the buggy address:
[   30.610004]  fff00000c5b58a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   30.610826]  fff00000c5b58a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.611598] >fff00000c5b58b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.612430]                                                                 ^
[   30.613348]  fff00000c5b58b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.614145]  fff00000c5b58c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.614837] ==================================================================
[   30.628646] ==================================================================
[   30.630318] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300
[   30.631011] Write of size 4 at addr fff00000c638e775 by task kunit_try_catch/162
[   30.631809] 
[   30.632168] CPU: 0 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   30.633073] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.634134] Hardware name: linux,dummy-virt (DT)
[   30.634711] Call trace:
[   30.635157]  show_stack+0x20/0x38 (C)
[   30.635738]  dump_stack_lvl+0x8c/0xd0
[   30.636280]  print_report+0x118/0x5e0
[   30.636870]  kasan_report+0xc8/0x118
[   30.637492]  kasan_check_range+0x100/0x1a8
[   30.638077]  __asan_memset+0x34/0x78
[   30.639233]  kmalloc_oob_memset_4+0x150/0x300
[   30.639795]  kunit_try_run_case+0x14c/0x3d0
[   30.640390]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.641296]  kthread+0x24c/0x2d0
[   30.642087]  ret_from_fork+0x10/0x20
[   30.642612] 
[   30.642954] Allocated by task 162:
[   30.643486]  kasan_save_stack+0x3c/0x68
[   30.644071]  kasan_save_track+0x20/0x40
[   30.644564]  kasan_save_alloc_info+0x40/0x58
[   30.645457]  __kasan_kmalloc+0xd4/0xd8
[   30.645955]  __kmalloc_cache_noprof+0x15c/0x3c0
[   30.646489]  kmalloc_oob_memset_4+0xb0/0x300
[   30.647108]  kunit_try_run_case+0x14c/0x3d0
[   30.648387]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.648990]  kthread+0x24c/0x2d0
[   30.649701]  ret_from_fork+0x10/0x20
[   30.650435] 
[   30.650778] The buggy address belongs to the object at fff00000c638e700
[   30.650778]  which belongs to the cache kmalloc-128 of size 128
[   30.651870] The buggy address is located 117 bytes inside of
[   30.651870]  allocated 120-byte region [fff00000c638e700, fff00000c638e778)
[   30.653018] 
[   30.653343] The buggy address belongs to the physical page:
[   30.654007] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10638e
[   30.654941] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.656411] page_type: f5(slab)
[   30.657133] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.658066] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   30.659100] page dumped because: kasan: bad access detected
[   30.659782] 
[   30.660411] Memory state around the buggy address:
[   30.661544]  fff00000c638e600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   30.662158]  fff00000c638e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.662854] >fff00000c638e700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.663841]                                                                 ^
[   30.664769]  fff00000c638e780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.665736]  fff00000c638e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.666480] ==================================================================
[   30.677708] ==================================================================
[   30.678866] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8
[   30.679724] Write of size 8 at addr fff00000c638e971 by task kunit_try_catch/164
[   30.680561] 
[   30.681013] CPU: 0 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   30.682066] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.682538] Hardware name: linux,dummy-virt (DT)
[   30.683039] Call trace:
[   30.683982]  show_stack+0x20/0x38 (C)
[   30.684549]  dump_stack_lvl+0x8c/0xd0
[   30.685044]  print_report+0x118/0x5e0
[   30.685594]  kasan_report+0xc8/0x118
[   30.686086]  kasan_check_range+0x100/0x1a8
[   30.687249]  __asan_memset+0x34/0x78
[   30.687938]  kmalloc_oob_memset_8+0x150/0x2f8
[   30.688680]  kunit_try_run_case+0x14c/0x3d0
[   30.689653]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.690442]  kthread+0x24c/0x2d0
[   30.691091]  ret_from_fork+0x10/0x20
[   30.691743] 
[   30.692127] Allocated by task 164:
[   30.692700]  kasan_save_stack+0x3c/0x68
[   30.693528]  kasan_save_track+0x20/0x40
[   30.694412]  kasan_save_alloc_info+0x40/0x58
[   30.695086]  __kasan_kmalloc+0xd4/0xd8
[   30.695692]  __kmalloc_cache_noprof+0x15c/0x3c0
[   30.696409]  kmalloc_oob_memset_8+0xb0/0x2f8
[   30.697032]  kunit_try_run_case+0x14c/0x3d0
[   30.697600]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.698612]  kthread+0x24c/0x2d0
[   30.699263]  ret_from_fork+0x10/0x20
[   30.699877] 
[   30.700319] The buggy address belongs to the object at fff00000c638e900
[   30.700319]  which belongs to the cache kmalloc-128 of size 128
[   30.701995] The buggy address is located 113 bytes inside of
[   30.701995]  allocated 120-byte region [fff00000c638e900, fff00000c638e978)
[   30.703338] 
[   30.703753] The buggy address belongs to the physical page:
[   30.704538] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10638e
[   30.705556] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.706626] page_type: f5(slab)
[   30.707166] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.708082] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   30.708957] page dumped because: kasan: bad access detected
[   30.709946] 
[   30.710272] Memory state around the buggy address:
[   30.710824]  fff00000c638e800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   30.711628]  fff00000c638e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.712347] >fff00000c638e900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.713509]                                                                 ^
[   30.714386]  fff00000c638e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.715233]  fff00000c638ea00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.716045] ==================================================================
[   30.728475] ==================================================================
[   30.729513] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8
[   30.730646] Write of size 16 at addr fff00000c638ea69 by task kunit_try_catch/166
[   30.731531] 
[   30.732504] CPU: 0 UID: 0 PID: 166 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   30.734110] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.734855] Hardware name: linux,dummy-virt (DT)
[   30.735619] Call trace:
[   30.736226]  show_stack+0x20/0x38 (C)
[   30.736956]  dump_stack_lvl+0x8c/0xd0
[   30.738063]  print_report+0x118/0x5e0
[   30.738610]  kasan_report+0xc8/0x118
[   30.739270]  kasan_check_range+0x100/0x1a8
[   30.739880]  __asan_memset+0x34/0x78
[   30.740489]  kmalloc_oob_memset_16+0x150/0x2f8
[   30.741156]  kunit_try_run_case+0x14c/0x3d0
[   30.741890]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.742675]  kthread+0x24c/0x2d0
[   30.743248]  ret_from_fork+0x10/0x20
[   30.743866] 
[   30.744216] Allocated by task 166:
[   30.744642]  kasan_save_stack+0x3c/0x68
[   30.745343]  kasan_save_track+0x20/0x40
[   30.746107]  kasan_save_alloc_info+0x40/0x58
[   30.746730]  __kasan_kmalloc+0xd4/0xd8
[   30.747309]  __kmalloc_cache_noprof+0x15c/0x3c0
[   30.747979]  kmalloc_oob_memset_16+0xb0/0x2f8
[   30.748915]  kunit_try_run_case+0x14c/0x3d0
[   30.749915]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.750692]  kthread+0x24c/0x2d0
[   30.751279]  ret_from_fork+0x10/0x20
[   30.751869] 
[   30.752222] The buggy address belongs to the object at fff00000c638ea00
[   30.752222]  which belongs to the cache kmalloc-128 of size 128
[   30.754196] The buggy address is located 105 bytes inside of
[   30.754196]  allocated 120-byte region [fff00000c638ea00, fff00000c638ea78)
[   30.755266] 
[   30.755616] The buggy address belongs to the physical page:
[   30.756224] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10638e
[   30.757184] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.757984] page_type: f5(slab)
[   30.758564] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.759416] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   30.760258] page dumped because: kasan: bad access detected
[   30.761551] 
[   30.762230] Memory state around the buggy address:
[   30.762741]  fff00000c638e900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.763431]  fff00000c638e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.764107] >fff00000c638ea00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.765374]                                                                 ^
[   30.766250]  fff00000c638ea80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.767066]  fff00000c638eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.767960] ==================================================================

[   21.500087] ==================================================================
[   21.501004] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x167/0x330
[   21.502063] Write of size 2 at addr ffff888102a1d277 by task kunit_try_catch/180
[   21.502741] 
[   21.503105] CPU: 0 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   21.503941] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.504710] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.505470] Call Trace:
[   21.506536]  <TASK>
[   21.507163]  dump_stack_lvl+0x73/0xb0
[   21.507758]  print_report+0xd1/0x640
[   21.508193]  ? __virt_addr_valid+0x1db/0x2d0
[   21.508542]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.509176]  kasan_report+0x102/0x140
[   21.509614]  ? kmalloc_oob_memset_2+0x167/0x330
[   21.510786]  ? kmalloc_oob_memset_2+0x167/0x330
[   21.511209]  kasan_check_range+0x10c/0x1c0
[   21.511816]  __asan_memset+0x27/0x50
[   21.512380]  kmalloc_oob_memset_2+0x167/0x330
[   21.513095]  ? __pfx_kmalloc_oob_memset_2+0x10/0x10
[   21.513766]  ? __schedule+0xc3e/0x2790
[   21.514469]  ? __pfx_read_tsc+0x10/0x10
[   21.514777]  ? ktime_get_ts64+0x84/0x230
[   21.515159]  kunit_try_run_case+0x1b3/0x490
[   21.515655]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.516203]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   21.516682]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.517015]  ? __kthread_parkme+0x82/0x160
[   21.517553]  ? preempt_count_sub+0x50/0x80
[   21.518381]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.518973]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.519577]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.520227]  kthread+0x257/0x310
[   21.520619]  ? __pfx_kthread+0x10/0x10
[   21.521695]  ret_from_fork+0x41/0x80
[   21.522206]  ? __pfx_kthread+0x10/0x10
[   21.523036]  ret_from_fork_asm+0x1a/0x30
[   21.523821]  </TASK>
[   21.524039] 
[   21.524295] Allocated by task 180:
[   21.525101]  kasan_save_stack+0x3d/0x60
[   21.525874]  kasan_save_track+0x18/0x40
[   21.526491]  kasan_save_alloc_info+0x3b/0x50
[   21.526998]  __kasan_kmalloc+0xb7/0xc0
[   21.527518]  __kmalloc_cache_noprof+0x184/0x410
[   21.528035]  kmalloc_oob_memset_2+0xad/0x330
[   21.528670]  kunit_try_run_case+0x1b3/0x490
[   21.529170]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.529807]  kthread+0x257/0x310
[   21.530254]  ret_from_fork+0x41/0x80
[   21.530992]  ret_from_fork_asm+0x1a/0x30
[   21.531251] 
[   21.531739] The buggy address belongs to the object at ffff888102a1d200
[   21.531739]  which belongs to the cache kmalloc-128 of size 128
[   21.533514] The buggy address is located 119 bytes inside of
[   21.533514]  allocated 120-byte region [ffff888102a1d200, ffff888102a1d278)
[   21.534791] 
[   21.535046] The buggy address belongs to the physical page:
[   21.535860] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1d
[   21.537162] flags: 0x200000000000000(node=0|zone=2)
[   21.537814] page_type: f5(slab)
[   21.538308] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   21.538952] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   21.539562] page dumped because: kasan: bad access detected
[   21.540032] 
[   21.540223] Memory state around the buggy address:
[   21.540854]  ffff888102a1d100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.541628]  ffff888102a1d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.542708] >ffff888102a1d200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   21.543894]                                                                 ^
[   21.544693]  ffff888102a1d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.545255]  ffff888102a1d300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.545846] ==================================================================
[   21.651017] ==================================================================
[   21.652216] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x167/0x330
[   21.652905] Write of size 16 at addr ffff888101b56869 by task kunit_try_catch/186
[   21.653646] 
[   21.653920] CPU: 1 UID: 0 PID: 186 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   21.655435] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.656035] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.657475] Call Trace:
[   21.657953]  <TASK>
[   21.658710]  dump_stack_lvl+0x73/0xb0
[   21.659527]  print_report+0xd1/0x640
[   21.660359]  ? __virt_addr_valid+0x1db/0x2d0
[   21.661067]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.661847]  kasan_report+0x102/0x140
[   21.662284]  ? kmalloc_oob_memset_16+0x167/0x330
[   21.663057]  ? kmalloc_oob_memset_16+0x167/0x330
[   21.663794]  kasan_check_range+0x10c/0x1c0
[   21.664330]  __asan_memset+0x27/0x50
[   21.664779]  kmalloc_oob_memset_16+0x167/0x330
[   21.665216]  ? __pfx_kmalloc_oob_memset_16+0x10/0x10
[   21.665899]  ? __schedule+0xc3e/0x2790
[   21.666262]  ? __pfx_read_tsc+0x10/0x10
[   21.667290]  ? ktime_get_ts64+0x84/0x230
[   21.667613]  kunit_try_run_case+0x1b3/0x490
[   21.668139]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.668925]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   21.669610]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.670159]  ? __kthread_parkme+0x82/0x160
[   21.670748]  ? preempt_count_sub+0x50/0x80
[   21.671169]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.672064]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.673159]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.673622]  kthread+0x257/0x310
[   21.673985]  ? __pfx_kthread+0x10/0x10
[   21.674561]  ret_from_fork+0x41/0x80
[   21.675111]  ? __pfx_kthread+0x10/0x10
[   21.675821]  ret_from_fork_asm+0x1a/0x30
[   21.676583]  </TASK>
[   21.676898] 
[   21.677114] Allocated by task 186:
[   21.678016]  kasan_save_stack+0x3d/0x60
[   21.678840]  kasan_save_track+0x18/0x40
[   21.679479]  kasan_save_alloc_info+0x3b/0x50
[   21.680026]  __kasan_kmalloc+0xb7/0xc0
[   21.680574]  __kmalloc_cache_noprof+0x184/0x410
[   21.681403]  kmalloc_oob_memset_16+0xad/0x330
[   21.681951]  kunit_try_run_case+0x1b3/0x490
[   21.683061]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.683879]  kthread+0x257/0x310
[   21.684242]  ret_from_fork+0x41/0x80
[   21.684624]  ret_from_fork_asm+0x1a/0x30
[   21.685032] 
[   21.685234] The buggy address belongs to the object at ffff888101b56800
[   21.685234]  which belongs to the cache kmalloc-128 of size 128
[   21.686914] The buggy address is located 105 bytes inside of
[   21.686914]  allocated 120-byte region [ffff888101b56800, ffff888101b56878)
[   21.688051] 
[   21.688795] The buggy address belongs to the physical page:
[   21.689958] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b56
[   21.690850] flags: 0x200000000000000(node=0|zone=2)
[   21.691180] page_type: f5(slab)
[   21.691760] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   21.692659] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   21.693820] page dumped because: kasan: bad access detected
[   21.694385] 
[   21.694934] Memory state around the buggy address:
[   21.695418]  ffff888101b56700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   21.696680]  ffff888101b56780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.697184] >ffff888101b56800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   21.698194]                                                                 ^
[   21.698766]  ffff888101b56880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.699863]  ffff888101b56900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.700436] ==================================================================
[   21.599896] ==================================================================
[   21.600774] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x167/0x330
[   21.601372] Write of size 8 at addr ffff888101b56671 by task kunit_try_catch/184
[   21.602100] 
[   21.602322] CPU: 1 UID: 0 PID: 184 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   21.603706] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.604233] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.605090] Call Trace:
[   21.605495]  <TASK>
[   21.605825]  dump_stack_lvl+0x73/0xb0
[   21.606172]  print_report+0xd1/0x640
[   21.606765]  ? __virt_addr_valid+0x1db/0x2d0
[   21.607538]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.608049]  kasan_report+0x102/0x140
[   21.608537]  ? kmalloc_oob_memset_8+0x167/0x330
[   21.609056]  ? kmalloc_oob_memset_8+0x167/0x330
[   21.609427]  kasan_check_range+0x10c/0x1c0
[   21.610014]  __asan_memset+0x27/0x50
[   21.610517]  kmalloc_oob_memset_8+0x167/0x330
[   21.610805]  ? __pfx_kmalloc_oob_memset_8+0x10/0x10
[   21.611162]  ? __schedule+0xc3e/0x2790
[   21.611892]  ? __pfx_read_tsc+0x10/0x10
[   21.612928]  ? ktime_get_ts64+0x84/0x230
[   21.613868]  kunit_try_run_case+0x1b3/0x490
[   21.614666]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.615782]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   21.616600]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.617263]  ? __kthread_parkme+0x82/0x160
[   21.617764]  ? preempt_count_sub+0x50/0x80
[   21.618152]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.619263]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.619824]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.620359]  kthread+0x257/0x310
[   21.620762]  ? __pfx_kthread+0x10/0x10
[   21.621388]  ret_from_fork+0x41/0x80
[   21.621875]  ? __pfx_kthread+0x10/0x10
[   21.622492]  ret_from_fork_asm+0x1a/0x30
[   21.623254]  </TASK>
[   21.623590] 
[   21.623804] Allocated by task 184:
[   21.624122]  kasan_save_stack+0x3d/0x60
[   21.624784]  kasan_save_track+0x18/0x40
[   21.625118]  kasan_save_alloc_info+0x3b/0x50
[   21.625681]  __kasan_kmalloc+0xb7/0xc0
[   21.626143]  __kmalloc_cache_noprof+0x184/0x410
[   21.627004]  kmalloc_oob_memset_8+0xad/0x330
[   21.627669]  kunit_try_run_case+0x1b3/0x490
[   21.628109]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.628938]  kthread+0x257/0x310
[   21.629279]  ret_from_fork+0x41/0x80
[   21.629883]  ret_from_fork_asm+0x1a/0x30
[   21.630520] 
[   21.630843] The buggy address belongs to the object at ffff888101b56600
[   21.630843]  which belongs to the cache kmalloc-128 of size 128
[   21.631798] The buggy address is located 113 bytes inside of
[   21.631798]  allocated 120-byte region [ffff888101b56600, ffff888101b56678)
[   21.633159] 
[   21.633524] The buggy address belongs to the physical page:
[   21.633947] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b56
[   21.634923] flags: 0x200000000000000(node=0|zone=2)
[   21.635686] page_type: f5(slab)
[   21.636034] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   21.636807] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   21.638121] page dumped because: kasan: bad access detected
[   21.638828] 
[   21.639074] Memory state around the buggy address:
[   21.639629]  ffff888101b56500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   21.640426]  ffff888101b56580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.641041] >ffff888101b56600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   21.641746]                                                                 ^
[   21.643068]  ffff888101b56680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.643951]  ffff888101b56700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.644540] ==================================================================
[   21.551751] ==================================================================
[   21.552648] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x167/0x330
[   21.553728] Write of size 4 at addr ffff888102a1d375 by task kunit_try_catch/182
[   21.554591] 
[   21.554824] CPU: 0 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   21.555751] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.556014] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.557156] Call Trace:
[   21.557516]  <TASK>
[   21.557775]  dump_stack_lvl+0x73/0xb0
[   21.558330]  print_report+0xd1/0x640
[   21.558711]  ? __virt_addr_valid+0x1db/0x2d0
[   21.559317]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.559831]  kasan_report+0x102/0x140
[   21.560300]  ? kmalloc_oob_memset_4+0x167/0x330
[   21.560810]  ? kmalloc_oob_memset_4+0x167/0x330
[   21.561456]  kasan_check_range+0x10c/0x1c0
[   21.561881]  __asan_memset+0x27/0x50
[   21.562300]  kmalloc_oob_memset_4+0x167/0x330
[   21.562629]  ? __pfx_kmalloc_oob_memset_4+0x10/0x10
[   21.563118]  ? __schedule+0xc3e/0x2790
[   21.563493]  ? __pfx_read_tsc+0x10/0x10
[   21.563882]  ? ktime_get_ts64+0x84/0x230
[   21.564293]  kunit_try_run_case+0x1b3/0x490
[   21.564875]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.565192]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   21.565525]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.566273]  ? __kthread_parkme+0x82/0x160
[   21.567007]  ? preempt_count_sub+0x50/0x80
[   21.567375]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.568500]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.569106]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.569673]  kthread+0x257/0x310
[   21.570085]  ? __pfx_kthread+0x10/0x10
[   21.570465]  ret_from_fork+0x41/0x80
[   21.570941]  ? __pfx_kthread+0x10/0x10
[   21.571409]  ret_from_fork_asm+0x1a/0x30
[   21.571712]  </TASK>
[   21.572200] 
[   21.572635] Allocated by task 182:
[   21.573035]  kasan_save_stack+0x3d/0x60
[   21.573514]  kasan_save_track+0x18/0x40
[   21.574706]  kasan_save_alloc_info+0x3b/0x50
[   21.575572]  __kasan_kmalloc+0xb7/0xc0
[   21.576001]  __kmalloc_cache_noprof+0x184/0x410
[   21.576548]  kmalloc_oob_memset_4+0xad/0x330
[   21.577033]  kunit_try_run_case+0x1b3/0x490
[   21.578034]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.578631]  kthread+0x257/0x310
[   21.579012]  ret_from_fork+0x41/0x80
[   21.579482]  ret_from_fork_asm+0x1a/0x30
[   21.579954] 
[   21.580196] The buggy address belongs to the object at ffff888102a1d300
[   21.580196]  which belongs to the cache kmalloc-128 of size 128
[   21.581174] The buggy address is located 117 bytes inside of
[   21.581174]  allocated 120-byte region [ffff888102a1d300, ffff888102a1d378)
[   21.582881] 
[   21.583184] The buggy address belongs to the physical page:
[   21.583998] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1d
[   21.584889] flags: 0x200000000000000(node=0|zone=2)
[   21.585562] page_type: f5(slab)
[   21.585932] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   21.586544] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   21.587355] page dumped because: kasan: bad access detected
[   21.587789] 
[   21.588026] Memory state around the buggy address:
[   21.588567]  ffff888102a1d200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.589400]  ffff888102a1d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.590384] >ffff888102a1d300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   21.591716]                                                                 ^
[   21.592777]  ffff888102a1d380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.593486]  ffff888102a1d400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.594134] ==================================================================