Hay
Date
Dec. 3, 2024, 11:38 p.m.

Environment
qemu-arm64
qemu-x86_64

[   30.464501] ==================================================================
[   30.465637] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8
[   30.466495] Write of size 2 at addr fff00000c58d3877 by task kunit_try_catch/161
[   30.467226] 
[   30.467648] CPU: 0 UID: 0 PID: 161 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   30.468886] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.470153] Hardware name: linux,dummy-virt (DT)
[   30.471435] Call trace:
[   30.472193]  show_stack+0x20/0x38 (C)
[   30.473615]  dump_stack_lvl+0x8c/0xd0
[   30.474509]  print_report+0x118/0x5e0
[   30.475423]  kasan_report+0xc8/0x118
[   30.476416]  kasan_check_range+0x100/0x1a8
[   30.477343]  __asan_memset+0x34/0x78
[   30.477953]  kmalloc_oob_memset_2+0x150/0x2f8
[   30.478682]  kunit_try_run_case+0x14c/0x3d0
[   30.479813]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.480919]  kthread+0x24c/0x2d0
[   30.481355]  ret_from_fork+0x10/0x20
[   30.481797] 
[   30.482238] Allocated by task 161:
[   30.482781]  kasan_save_stack+0x3c/0x68
[   30.483295]  kasan_save_track+0x20/0x40
[   30.484096]  kasan_save_alloc_info+0x40/0x58
[   30.484836]  __kasan_kmalloc+0xd4/0xd8
[   30.485482]  __kmalloc_cache_noprof+0x15c/0x3c0
[   30.486423]  kmalloc_oob_memset_2+0xb0/0x2f8
[   30.487753]  kunit_try_run_case+0x14c/0x3d0
[   30.488977]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.489606]  kthread+0x24c/0x2d0
[   30.490495]  ret_from_fork+0x10/0x20
[   30.491156] 
[   30.491510] The buggy address belongs to the object at fff00000c58d3800
[   30.491510]  which belongs to the cache kmalloc-128 of size 128
[   30.493592] The buggy address is located 119 bytes inside of
[   30.493592]  allocated 120-byte region [fff00000c58d3800, fff00000c58d3878)
[   30.494898] 
[   30.495740] The buggy address belongs to the physical page:
[   30.496404] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d3
[   30.497904] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.498915] page_type: f5(slab)
[   30.499713] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.500902] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.501963] page dumped because: kasan: bad access detected
[   30.502774] 
[   30.503412] Memory state around the buggy address:
[   30.504191]  fff00000c58d3700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   30.505386]  fff00000c58d3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.506495] >fff00000c58d3800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.508099]                                                                 ^
[   30.509063]  fff00000c58d3880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.509797]  fff00000c58d3900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.511209] ==================================================================
[   30.521596] ==================================================================
[   30.522676] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300
[   30.523608] Write of size 4 at addr fff00000c58d3975 by task kunit_try_catch/163
[   30.524698] 
[   30.525136] CPU: 0 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   30.526789] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.527412] Hardware name: linux,dummy-virt (DT)
[   30.527991] Call trace:
[   30.528482]  show_stack+0x20/0x38 (C)
[   30.529105]  dump_stack_lvl+0x8c/0xd0
[   30.529862]  print_report+0x118/0x5e0
[   30.530397]  kasan_report+0xc8/0x118
[   30.531111]  kasan_check_range+0x100/0x1a8
[   30.531893]  __asan_memset+0x34/0x78
[   30.532622]  kmalloc_oob_memset_4+0x150/0x300
[   30.533247]  kunit_try_run_case+0x14c/0x3d0
[   30.534640]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.535417]  kthread+0x24c/0x2d0
[   30.535971]  ret_from_fork+0x10/0x20
[   30.536552] 
[   30.536975] Allocated by task 163:
[   30.537452]  kasan_save_stack+0x3c/0x68
[   30.538122]  kasan_save_track+0x20/0x40
[   30.538751]  kasan_save_alloc_info+0x40/0x58
[   30.540119]  __kasan_kmalloc+0xd4/0xd8
[   30.540704]  __kmalloc_cache_noprof+0x15c/0x3c0
[   30.541380]  kmalloc_oob_memset_4+0xb0/0x300
[   30.541930]  kunit_try_run_case+0x14c/0x3d0
[   30.542603]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.543633]  kthread+0x24c/0x2d0
[   30.544412]  ret_from_fork+0x10/0x20
[   30.544990] 
[   30.545311] The buggy address belongs to the object at fff00000c58d3900
[   30.545311]  which belongs to the cache kmalloc-128 of size 128
[   30.546756] The buggy address is located 117 bytes inside of
[   30.546756]  allocated 120-byte region [fff00000c58d3900, fff00000c58d3978)
[   30.549746] 
[   30.550176] The buggy address belongs to the physical page:
[   30.550882] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d3
[   30.552644] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.553498] page_type: f5(slab)
[   30.554160] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.555281] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.556228] page dumped because: kasan: bad access detected
[   30.557343] 
[   30.557745] Memory state around the buggy address:
[   30.558491]  fff00000c58d3800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.559639]  fff00000c58d3880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.560947] >fff00000c58d3900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.561738]                                                                 ^
[   30.562478]  fff00000c58d3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.563872]  fff00000c58d3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.564992] ==================================================================
[   30.574914] ==================================================================
[   30.576739] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8
[   30.577761] Write of size 8 at addr fff00000c58d3a71 by task kunit_try_catch/165
[   30.578725] 
[   30.579503] CPU: 0 UID: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   30.580721] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.581513] Hardware name: linux,dummy-virt (DT)
[   30.582234] Call trace:
[   30.582643]  show_stack+0x20/0x38 (C)
[   30.583294]  dump_stack_lvl+0x8c/0xd0
[   30.584145]  print_report+0x118/0x5e0
[   30.585094]  kasan_report+0xc8/0x118
[   30.585588]  kasan_check_range+0x100/0x1a8
[   30.586309]  __asan_memset+0x34/0x78
[   30.587039]  kmalloc_oob_memset_8+0x150/0x2f8
[   30.588118]  kunit_try_run_case+0x14c/0x3d0
[   30.588939]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.589764]  kthread+0x24c/0x2d0
[   30.590417]  ret_from_fork+0x10/0x20
[   30.591574] 
[   30.591848] Allocated by task 165:
[   30.592492]  kasan_save_stack+0x3c/0x68
[   30.593216]  kasan_save_track+0x20/0x40
[   30.593932]  kasan_save_alloc_info+0x40/0x58
[   30.594491]  __kasan_kmalloc+0xd4/0xd8
[   30.595724]  __kmalloc_cache_noprof+0x15c/0x3c0
[   30.596550]  kmalloc_oob_memset_8+0xb0/0x2f8
[   30.597198]  kunit_try_run_case+0x14c/0x3d0
[   30.597894]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.598556]  kthread+0x24c/0x2d0
[   30.599457]  ret_from_fork+0x10/0x20
[   30.599860] 
[   30.600198] The buggy address belongs to the object at fff00000c58d3a00
[   30.600198]  which belongs to the cache kmalloc-128 of size 128
[   30.602241] The buggy address is located 113 bytes inside of
[   30.602241]  allocated 120-byte region [fff00000c58d3a00, fff00000c58d3a78)
[   30.604285] 
[   30.604721] The buggy address belongs to the physical page:
[   30.605687] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d3
[   30.606864] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.607825] page_type: f5(slab)
[   30.608289] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.609451] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.610537] page dumped because: kasan: bad access detected
[   30.611343] 
[   30.611601] Memory state around the buggy address:
[   30.612289]  fff00000c58d3900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.613346]  fff00000c58d3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.614180] >fff00000c58d3a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.615504]                                                                 ^
[   30.616361]  fff00000c58d3a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.617435]  fff00000c58d3b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.618303] ==================================================================
[   30.628503] ==================================================================
[   30.629696] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8
[   30.630585] Write of size 16 at addr fff00000c58d3b69 by task kunit_try_catch/167
[   30.631362] 
[   30.631738] CPU: 0 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   30.632813] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.633558] Hardware name: linux,dummy-virt (DT)
[   30.634440] Call trace:
[   30.634804]  show_stack+0x20/0x38 (C)
[   30.635502]  dump_stack_lvl+0x8c/0xd0
[   30.636171]  print_report+0x118/0x5e0
[   30.636893]  kasan_report+0xc8/0x118
[   30.637470]  kasan_check_range+0x100/0x1a8
[   30.638102]  __asan_memset+0x34/0x78
[   30.638790]  kmalloc_oob_memset_16+0x150/0x2f8
[   30.639440]  kunit_try_run_case+0x14c/0x3d0
[   30.640139]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.640927]  kthread+0x24c/0x2d0
[   30.641581]  ret_from_fork+0x10/0x20
[   30.642200] 
[   30.642508] Allocated by task 167:
[   30.643068]  kasan_save_stack+0x3c/0x68
[   30.643791]  kasan_save_track+0x20/0x40
[   30.644405]  kasan_save_alloc_info+0x40/0x58
[   30.644975]  __kasan_kmalloc+0xd4/0xd8
[   30.645517]  __kmalloc_cache_noprof+0x15c/0x3c0
[   30.646216]  kmalloc_oob_memset_16+0xb0/0x2f8
[   30.646840]  kunit_try_run_case+0x14c/0x3d0
[   30.647451]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.648176]  kthread+0x24c/0x2d0
[   30.648634]  ret_from_fork+0x10/0x20
[   30.649225] 
[   30.649588] The buggy address belongs to the object at fff00000c58d3b00
[   30.649588]  which belongs to the cache kmalloc-128 of size 128
[   30.651036] The buggy address is located 105 bytes inside of
[   30.651036]  allocated 120-byte region [fff00000c58d3b00, fff00000c58d3b78)
[   30.652431] 
[   30.652745] The buggy address belongs to the physical page:
[   30.653585] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d3
[   30.654525] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.655366] page_type: f5(slab)
[   30.655985] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.656853] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.657926] page dumped because: kasan: bad access detected
[   30.658559] 
[   30.658889] Memory state around the buggy address:
[   30.659580]  fff00000c58d3a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.660460]  fff00000c58d3a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.661264] >fff00000c58d3b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.662150]                                                                 ^
[   30.663023]  fff00000c58d3b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.663968]  fff00000c58d3c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.664912] ==================================================================

[   26.109849] ==================================================================
[   26.110590] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x167/0x330
[   26.112084] Write of size 4 at addr ffff888102985375 by task kunit_try_catch/183
[   26.113293] 
[   26.113489] CPU: 0 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   26.115047] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.115383] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.116610] Call Trace:
[   26.117090]  <TASK>
[   26.117610]  dump_stack_lvl+0x73/0xb0
[   26.118351]  print_report+0xd1/0x640
[   26.118734]  ? __virt_addr_valid+0x1db/0x2d0
[   26.119231]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.120007]  kasan_report+0x102/0x140
[   26.120254]  ? kmalloc_oob_memset_4+0x167/0x330
[   26.121260]  ? kmalloc_oob_memset_4+0x167/0x330
[   26.122218]  kasan_check_range+0x10c/0x1c0
[   26.122595]  __asan_memset+0x27/0x50
[   26.122844]  kmalloc_oob_memset_4+0x167/0x330
[   26.123598]  ? __pfx_kmalloc_oob_memset_4+0x10/0x10
[   26.124927]  ? __schedule+0xc3e/0x2790
[   26.125273]  ? __pfx_read_tsc+0x10/0x10
[   26.126122]  ? ktime_get_ts64+0x86/0x230
[   26.126521]  kunit_try_run_case+0x1b3/0x490
[   26.126944]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.127523]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   26.128246]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.129217]  ? __kthread_parkme+0x82/0x160
[   26.129577]  ? preempt_count_sub+0x50/0x80
[   26.130275]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.130954]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.131541]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.132171]  kthread+0x257/0x310
[   26.132652]  ? __pfx_kthread+0x10/0x10
[   26.133439]  ret_from_fork+0x41/0x80
[   26.133892]  ? __pfx_kthread+0x10/0x10
[   26.134323]  ret_from_fork_asm+0x1a/0x30
[   26.135153]  </TASK>
[   26.135519] 
[   26.135917] Allocated by task 183:
[   26.136221]  kasan_save_stack+0x3d/0x60
[   26.137186]  kasan_save_track+0x18/0x40
[   26.137864]  kasan_save_alloc_info+0x3b/0x50
[   26.138283]  __kasan_kmalloc+0xb7/0xc0
[   26.138648]  __kmalloc_cache_noprof+0x184/0x410
[   26.139148]  kmalloc_oob_memset_4+0xad/0x330
[   26.139756]  kunit_try_run_case+0x1b3/0x490
[   26.140190]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.140814]  kthread+0x257/0x310
[   26.141189]  ret_from_fork+0x41/0x80
[   26.142127]  ret_from_fork_asm+0x1a/0x30
[   26.142434] 
[   26.142858] The buggy address belongs to the object at ffff888102985300
[   26.142858]  which belongs to the cache kmalloc-128 of size 128
[   26.143676] The buggy address is located 117 bytes inside of
[   26.143676]  allocated 120-byte region [ffff888102985300, ffff888102985378)
[   26.145095] 
[   26.145327] The buggy address belongs to the physical page:
[   26.145839] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102985
[   26.146809] flags: 0x200000000000000(node=0|zone=2)
[   26.148014] page_type: f5(slab)
[   26.148460] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   26.149094] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.149905] page dumped because: kasan: bad access detected
[   26.150524] 
[   26.150684] Memory state around the buggy address:
[   26.151688]  ffff888102985200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.152420]  ffff888102985280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.153258] >ffff888102985300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   26.153856]                                                                 ^
[   26.154547]  ffff888102985380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.155030]  ffff888102985400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.155758] ==================================================================
[   26.210048] ==================================================================
[   26.210978] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x167/0x330
[   26.211780] Write of size 16 at addr ffff888102a11869 by task kunit_try_catch/187
[   26.212151] 
[   26.213043] CPU: 1 UID: 0 PID: 187 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   26.213780] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.214327] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.215176] Call Trace:
[   26.215669]  <TASK>
[   26.215875]  dump_stack_lvl+0x73/0xb0
[   26.216203]  print_report+0xd1/0x640
[   26.217176]  ? __virt_addr_valid+0x1db/0x2d0
[   26.217710]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.218165]  kasan_report+0x102/0x140
[   26.218506]  ? kmalloc_oob_memset_16+0x167/0x330
[   26.218891]  ? kmalloc_oob_memset_16+0x167/0x330
[   26.219362]  kasan_check_range+0x10c/0x1c0
[   26.219834]  __asan_memset+0x27/0x50
[   26.220406]  kmalloc_oob_memset_16+0x167/0x330
[   26.220954]  ? __pfx_kmalloc_oob_memset_16+0x10/0x10
[   26.221542]  ? __schedule+0xc3e/0x2790
[   26.221874]  ? __pfx_read_tsc+0x10/0x10
[   26.222341]  ? ktime_get_ts64+0x86/0x230
[   26.222780]  kunit_try_run_case+0x1b3/0x490
[   26.223239]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.223767]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   26.224247]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.224844]  ? __kthread_parkme+0x82/0x160
[   26.225330]  ? preempt_count_sub+0x50/0x80
[   26.225770]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.226373]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.226887]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.227507]  kthread+0x257/0x310
[   26.227837]  ? __pfx_kthread+0x10/0x10
[   26.228320]  ret_from_fork+0x41/0x80
[   26.228775]  ? __pfx_kthread+0x10/0x10
[   26.229194]  ret_from_fork_asm+0x1a/0x30
[   26.229698]  </TASK>
[   26.229988] 
[   26.230232] Allocated by task 187:
[   26.230567]  kasan_save_stack+0x3d/0x60
[   26.230967]  kasan_save_track+0x18/0x40
[   26.231431]  kasan_save_alloc_info+0x3b/0x50
[   26.231904]  __kasan_kmalloc+0xb7/0xc0
[   26.232348]  __kmalloc_cache_noprof+0x184/0x410
[   26.232898]  kmalloc_oob_memset_16+0xad/0x330
[   26.233251]  kunit_try_run_case+0x1b3/0x490
[   26.233734]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.234240]  kthread+0x257/0x310
[   26.234671]  ret_from_fork+0x41/0x80
[   26.235126]  ret_from_fork_asm+0x1a/0x30
[   26.235543] 
[   26.235853] The buggy address belongs to the object at ffff888102a11800
[   26.235853]  which belongs to the cache kmalloc-128 of size 128
[   26.236798] The buggy address is located 105 bytes inside of
[   26.236798]  allocated 120-byte region [ffff888102a11800, ffff888102a11878)
[   26.237732] 
[   26.238017] The buggy address belongs to the physical page:
[   26.238412] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a11
[   26.239187] flags: 0x200000000000000(node=0|zone=2)
[   26.239733] page_type: f5(slab)
[   26.240085] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   26.240703] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.241141] page dumped because: kasan: bad access detected
[   26.241419] 
[   26.241561] Memory state around the buggy address:
[   26.241822]  ffff888102a11700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.242585]  ffff888102a11780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.243215] >ffff888102a11800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   26.243907]                                                                 ^
[   26.244691]  ffff888102a11880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.245130]  ffff888102a11900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.245521] ==================================================================
[   26.057034] ==================================================================
[   26.057666] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x167/0x330
[   26.058237] Write of size 2 at addr ffff888102a11577 by task kunit_try_catch/181
[   26.058685] 
[   26.058861] CPU: 1 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   26.060071] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.062006] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.062972] Call Trace:
[   26.063516]  <TASK>
[   26.063760]  dump_stack_lvl+0x73/0xb0
[   26.064109]  print_report+0xd1/0x640
[   26.064604]  ? __virt_addr_valid+0x1db/0x2d0
[   26.064929]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.066437]  kasan_report+0x102/0x140
[   26.066920]  ? kmalloc_oob_memset_2+0x167/0x330
[   26.067549]  ? kmalloc_oob_memset_2+0x167/0x330
[   26.068070]  kasan_check_range+0x10c/0x1c0
[   26.068434]  __asan_memset+0x27/0x50
[   26.069664]  kmalloc_oob_memset_2+0x167/0x330
[   26.070022]  ? __pfx_kmalloc_oob_memset_2+0x10/0x10
[   26.070870]  ? __schedule+0xc3e/0x2790
[   26.071162]  ? __pfx_read_tsc+0x10/0x10
[   26.071923]  ? ktime_get_ts64+0x86/0x230
[   26.072319]  kunit_try_run_case+0x1b3/0x490
[   26.073296]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.073641]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   26.074150]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.074623]  ? __kthread_parkme+0x82/0x160
[   26.075271]  ? preempt_count_sub+0x50/0x80
[   26.075634]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.075990]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.076661]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.077366]  kthread+0x257/0x310
[   26.078071]  ? __pfx_kthread+0x10/0x10
[   26.078439]  ret_from_fork+0x41/0x80
[   26.079433]  ? __pfx_kthread+0x10/0x10
[   26.080120]  ret_from_fork_asm+0x1a/0x30
[   26.080510]  </TASK>
[   26.081331] 
[   26.081466] Allocated by task 181:
[   26.081791]  kasan_save_stack+0x3d/0x60
[   26.082316]  kasan_save_track+0x18/0x40
[   26.083240]  kasan_save_alloc_info+0x3b/0x50
[   26.084132]  __kasan_kmalloc+0xb7/0xc0
[   26.084455]  __kmalloc_cache_noprof+0x184/0x410
[   26.085114]  kmalloc_oob_memset_2+0xad/0x330
[   26.085756]  kunit_try_run_case+0x1b3/0x490
[   26.086637]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.087042]  kthread+0x257/0x310
[   26.087737]  ret_from_fork+0x41/0x80
[   26.087982]  ret_from_fork_asm+0x1a/0x30
[   26.088387] 
[   26.089242] The buggy address belongs to the object at ffff888102a11500
[   26.089242]  which belongs to the cache kmalloc-128 of size 128
[   26.089971] The buggy address is located 119 bytes inside of
[   26.089971]  allocated 120-byte region [ffff888102a11500, ffff888102a11578)
[   26.091443] 
[   26.092136] The buggy address belongs to the physical page:
[   26.092903] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a11
[   26.093708] flags: 0x200000000000000(node=0|zone=2)
[   26.094321] page_type: f5(slab)
[   26.094889] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   26.095486] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.096157] page dumped because: kasan: bad access detected
[   26.096743] 
[   26.097018] Memory state around the buggy address:
[   26.097802]  ffff888102a11400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.099313]  ffff888102a11480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.099844] >ffff888102a11500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   26.100403]                                                                 ^
[   26.101345]  ffff888102a11580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.102346]  ffff888102a11600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.103314] ==================================================================
[   26.163835] ==================================================================
[   26.164767] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x167/0x330
[   26.165393] Write of size 8 at addr ffff888102a11771 by task kunit_try_catch/185
[   26.166119] 
[   26.166296] CPU: 1 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   26.168324] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.168604] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.169516] Call Trace:
[   26.169841]  <TASK>
[   26.170226]  dump_stack_lvl+0x73/0xb0
[   26.171026]  print_report+0xd1/0x640
[   26.171452]  ? __virt_addr_valid+0x1db/0x2d0
[   26.171916]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.172357]  kasan_report+0x102/0x140
[   26.172653]  ? kmalloc_oob_memset_8+0x167/0x330
[   26.173302]  ? kmalloc_oob_memset_8+0x167/0x330
[   26.173911]  kasan_check_range+0x10c/0x1c0
[   26.174252]  __asan_memset+0x27/0x50
[   26.175029]  kmalloc_oob_memset_8+0x167/0x330
[   26.175525]  ? __pfx_kmalloc_oob_memset_8+0x10/0x10
[   26.176104]  ? __schedule+0xc3e/0x2790
[   26.176560]  ? __pfx_read_tsc+0x10/0x10
[   26.177144]  ? ktime_get_ts64+0x86/0x230
[   26.177534]  kunit_try_run_case+0x1b3/0x490
[   26.178129]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.178984]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   26.179454]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.179981]  ? __kthread_parkme+0x82/0x160
[   26.180429]  ? preempt_count_sub+0x50/0x80
[   26.181107]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.181431]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.182022]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.182371]  kthread+0x257/0x310
[   26.182731]  ? __pfx_kthread+0x10/0x10
[   26.183119]  ret_from_fork+0x41/0x80
[   26.183493]  ? __pfx_kthread+0x10/0x10
[   26.183753]  ret_from_fork_asm+0x1a/0x30
[   26.184937]  </TASK>
[   26.185213] 
[   26.185420] Allocated by task 185:
[   26.185931]  kasan_save_stack+0x3d/0x60
[   26.186314]  kasan_save_track+0x18/0x40
[   26.186606]  kasan_save_alloc_info+0x3b/0x50
[   26.187173]  __kasan_kmalloc+0xb7/0xc0
[   26.187579]  __kmalloc_cache_noprof+0x184/0x410
[   26.188462]  kmalloc_oob_memset_8+0xad/0x330
[   26.189106]  kunit_try_run_case+0x1b3/0x490
[   26.189380]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.189996]  kthread+0x257/0x310
[   26.190287]  ret_from_fork+0x41/0x80
[   26.190571]  ret_from_fork_asm+0x1a/0x30
[   26.190972] 
[   26.191338] The buggy address belongs to the object at ffff888102a11700
[   26.191338]  which belongs to the cache kmalloc-128 of size 128
[   26.192704] The buggy address is located 113 bytes inside of
[   26.192704]  allocated 120-byte region [ffff888102a11700, ffff888102a11778)
[   26.193525] 
[   26.193750] The buggy address belongs to the physical page:
[   26.194241] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a11
[   26.194745] flags: 0x200000000000000(node=0|zone=2)
[   26.195352] page_type: f5(slab)
[   26.196033] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   26.196920] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.197756] page dumped because: kasan: bad access detected
[   26.198149] 
[   26.198294] Memory state around the buggy address:
[   26.198890]  ffff888102a11600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.199494]  ffff888102a11680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.199863] >ffff888102a11700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   26.200453]                                                                 ^
[   26.201019]  ffff888102a11780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.202220]  ffff888102a11800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.202868] ==================================================================