Hay
Date
Dec. 4, 2024, 3:07 p.m.

Environment
qemu-arm64
qemu-x86_64

[   32.036948] ==================================================================
[   32.038575] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8
[   32.039731] Write of size 2 at addr fff00000c6723e77 by task kunit_try_catch/160
[   32.040613] 
[   32.041201] CPU: 1 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   32.042762] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.043403] Hardware name: linux,dummy-virt (DT)
[   32.043923] Call trace:
[   32.044297]  show_stack+0x20/0x38 (C)
[   32.045001]  dump_stack_lvl+0x8c/0xd0
[   32.045567]  print_report+0x118/0x5e0
[   32.046358]  kasan_report+0xc8/0x118
[   32.047407]  kasan_check_range+0x100/0x1a8
[   32.048065]  __asan_memset+0x34/0x78
[   32.048653]  kmalloc_oob_memset_2+0x150/0x2f8
[   32.049326]  kunit_try_run_case+0x14c/0x3d0
[   32.050405]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.051216]  kthread+0x24c/0x2d0
[   32.051591]  ret_from_fork+0x10/0x20
[   32.052177] 
[   32.052572] Allocated by task 160:
[   32.053395]  kasan_save_stack+0x3c/0x68
[   32.054193]  kasan_save_track+0x20/0x40
[   32.054748]  kasan_save_alloc_info+0x40/0x58
[   32.055420]  __kasan_kmalloc+0xd4/0xd8
[   32.056270]  __kmalloc_cache_noprof+0x15c/0x3c0
[   32.056985]  kmalloc_oob_memset_2+0xb0/0x2f8
[   32.057674]  kunit_try_run_case+0x14c/0x3d0
[   32.058781]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.059557]  kthread+0x24c/0x2d0
[   32.060136]  ret_from_fork+0x10/0x20
[   32.060783] 
[   32.061156] The buggy address belongs to the object at fff00000c6723e00
[   32.061156]  which belongs to the cache kmalloc-128 of size 128
[   32.063324] The buggy address is located 119 bytes inside of
[   32.063324]  allocated 120-byte region [fff00000c6723e00, fff00000c6723e78)
[   32.065074] 
[   32.065380] The buggy address belongs to the physical page:
[   32.066504] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106723
[   32.067530] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.068323] page_type: f5(slab)
[   32.068930] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.069868] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.070769] page dumped because: kasan: bad access detected
[   32.071531] 
[   32.072179] Memory state around the buggy address:
[   32.072785]  fff00000c6723d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.073871]  fff00000c6723d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.074762] >fff00000c6723e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   32.075565]                                                                 ^
[   32.076525]  fff00000c6723e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.077366]  fff00000c6723f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.078290] ==================================================================
[   32.148114] ==================================================================
[   32.149309] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8
[   32.150240] Write of size 8 at addr fff00000c6763071 by task kunit_try_catch/164
[   32.151999] 
[   32.152320] CPU: 1 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   32.153681] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.154339] Hardware name: linux,dummy-virt (DT)
[   32.155776] Call trace:
[   32.156465]  show_stack+0x20/0x38 (C)
[   32.157266]  dump_stack_lvl+0x8c/0xd0
[   32.158083]  print_report+0x118/0x5e0
[   32.158831]  kasan_report+0xc8/0x118
[   32.159465]  kasan_check_range+0x100/0x1a8
[   32.160061]  __asan_memset+0x34/0x78
[   32.160849]  kmalloc_oob_memset_8+0x150/0x2f8
[   32.161648]  kunit_try_run_case+0x14c/0x3d0
[   32.162294]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.163561]  kthread+0x24c/0x2d0
[   32.164108]  ret_from_fork+0x10/0x20
[   32.164941] 
[   32.165293] Allocated by task 164:
[   32.166237]  kasan_save_stack+0x3c/0x68
[   32.166928]  kasan_save_track+0x20/0x40
[   32.167690]  kasan_save_alloc_info+0x40/0x58
[   32.168332]  __kasan_kmalloc+0xd4/0xd8
[   32.168913]  __kmalloc_cache_noprof+0x15c/0x3c0
[   32.169658]  kmalloc_oob_memset_8+0xb0/0x2f8
[   32.170938]  kunit_try_run_case+0x14c/0x3d0
[   32.171465]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.172211]  kthread+0x24c/0x2d0
[   32.173335]  ret_from_fork+0x10/0x20
[   32.173930] 
[   32.174351] The buggy address belongs to the object at fff00000c6763000
[   32.174351]  which belongs to the cache kmalloc-128 of size 128
[   32.176157] The buggy address is located 113 bytes inside of
[   32.176157]  allocated 120-byte region [fff00000c6763000, fff00000c6763078)
[   32.177598] 
[   32.178356] The buggy address belongs to the physical page:
[   32.179059] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106763
[   32.180064] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.180891] page_type: f5(slab)
[   32.181403] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.182816] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.183734] page dumped because: kasan: bad access detected
[   32.184323] 
[   32.184707] Memory state around the buggy address:
[   32.185277]  fff00000c6762f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.186756]  fff00000c6762f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.187791] >fff00000c6763000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   32.188670]                                                                 ^
[   32.189579]  fff00000c6763080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.191198]  fff00000c6763100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.191944] ==================================================================
[   32.091212] ==================================================================
[   32.092396] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300
[   32.093115] Write of size 4 at addr fff00000c674d375 by task kunit_try_catch/162
[   32.094173] 
[   32.095910] CPU: 0 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   32.097123] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.097692] Hardware name: linux,dummy-virt (DT)
[   32.098978] Call trace:
[   32.099433]  show_stack+0x20/0x38 (C)
[   32.100200]  dump_stack_lvl+0x8c/0xd0
[   32.100782]  print_report+0x118/0x5e0
[   32.101422]  kasan_report+0xc8/0x118
[   32.102386]  kasan_check_range+0x100/0x1a8
[   32.103024]  __asan_memset+0x34/0x78
[   32.103687]  kmalloc_oob_memset_4+0x150/0x300
[   32.104160]  kunit_try_run_case+0x14c/0x3d0
[   32.105357]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.106581]  kthread+0x24c/0x2d0
[   32.107104]  ret_from_fork+0x10/0x20
[   32.107698] 
[   32.108014] Allocated by task 162:
[   32.108443]  kasan_save_stack+0x3c/0x68
[   32.109141]  kasan_save_track+0x20/0x40
[   32.109604]  kasan_save_alloc_info+0x40/0x58
[   32.110741]  __kasan_kmalloc+0xd4/0xd8
[   32.111474]  __kmalloc_cache_noprof+0x15c/0x3c0
[   32.112499]  kmalloc_oob_memset_4+0xb0/0x300
[   32.113107]  kunit_try_run_case+0x14c/0x3d0
[   32.114249]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.115033]  kthread+0x24c/0x2d0
[   32.115777]  ret_from_fork+0x10/0x20
[   32.116296] 
[   32.116618] The buggy address belongs to the object at fff00000c674d300
[   32.116618]  which belongs to the cache kmalloc-128 of size 128
[   32.118988] The buggy address is located 117 bytes inside of
[   32.118988]  allocated 120-byte region [fff00000c674d300, fff00000c674d378)
[   32.122710] 
[   32.123468] The buggy address belongs to the physical page:
[   32.123959] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10674d
[   32.124427] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.125065] page_type: f5(slab)
[   32.125616] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.126957] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.127592] page dumped because: kasan: bad access detected
[   32.128750] 
[   32.129340] Memory state around the buggy address:
[   32.131405]  fff00000c674d200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   32.132810]  fff00000c674d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.134025] >fff00000c674d300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   32.135526]                                                                 ^
[   32.136019]  fff00000c674d380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.136435]  fff00000c674d400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.137076] ==================================================================
[   32.203199] ==================================================================
[   32.204475] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8
[   32.205307] Write of size 16 at addr fff00000c6763169 by task kunit_try_catch/166
[   32.206857] 
[   32.207613] CPU: 1 UID: 0 PID: 166 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   32.209055] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.210110] Hardware name: linux,dummy-virt (DT)
[   32.210745] Call trace:
[   32.211152]  show_stack+0x20/0x38 (C)
[   32.211939]  dump_stack_lvl+0x8c/0xd0
[   32.212563]  print_report+0x118/0x5e0
[   32.213312]  kasan_report+0xc8/0x118
[   32.214262]  kasan_check_range+0x100/0x1a8
[   32.215129]  __asan_memset+0x34/0x78
[   32.215809]  kmalloc_oob_memset_16+0x150/0x2f8
[   32.216418]  kunit_try_run_case+0x14c/0x3d0
[   32.217046]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.218273]  kthread+0x24c/0x2d0
[   32.219076]  ret_from_fork+0x10/0x20
[   32.219830] 
[   32.220247] Allocated by task 166:
[   32.220876]  kasan_save_stack+0x3c/0x68
[   32.222110]  kasan_save_track+0x20/0x40
[   32.222615]  kasan_save_alloc_info+0x40/0x58
[   32.223434]  __kasan_kmalloc+0xd4/0xd8
[   32.224129]  __kmalloc_cache_noprof+0x15c/0x3c0
[   32.224895]  kmalloc_oob_memset_16+0xb0/0x2f8
[   32.225568]  kunit_try_run_case+0x14c/0x3d0
[   32.227487]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.228191]  kthread+0x24c/0x2d0
[   32.228720]  ret_from_fork+0x10/0x20
[   32.229507] 
[   32.230151] The buggy address belongs to the object at fff00000c6763100
[   32.230151]  which belongs to the cache kmalloc-128 of size 128
[   32.231164] The buggy address is located 105 bytes inside of
[   32.231164]  allocated 120-byte region [fff00000c6763100, fff00000c6763178)
[   32.231956] 
[   32.232369] The buggy address belongs to the physical page:
[   32.233285] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106763
[   32.234370] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.235693] page_type: f5(slab)
[   32.236158] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.237109] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.238736] page dumped because: kasan: bad access detected
[   32.239395] 
[   32.239730] Memory state around the buggy address:
[   32.240456]  fff00000c6763000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.241374]  fff00000c6763080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.242660] >fff00000c6763100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   32.243507]                                                                 ^
[   32.244393]  fff00000c6763180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.245326]  fff00000c6763200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.246457] ==================================================================

[   22.914991] ==================================================================
[   22.915930] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x167/0x330
[   22.916946] Write of size 4 at addr ffff88810298f075 by task kunit_try_catch/182
[   22.917685] 
[   22.917992] CPU: 1 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   22.918906] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.919529] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.921457] Call Trace:
[   22.921854]  <TASK>
[   22.922159]  dump_stack_lvl+0x73/0xb0
[   22.922793]  print_report+0xd1/0x640
[   22.923524]  ? __virt_addr_valid+0x1db/0x2d0
[   22.923913]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.924738]  kasan_report+0x102/0x140
[   22.925206]  ? kmalloc_oob_memset_4+0x167/0x330
[   22.925807]  ? kmalloc_oob_memset_4+0x167/0x330
[   22.926945]  kasan_check_range+0x10c/0x1c0
[   22.927630]  __asan_memset+0x27/0x50
[   22.928558]  kmalloc_oob_memset_4+0x167/0x330
[   22.929072]  ? __pfx_kmalloc_oob_memset_4+0x10/0x10
[   22.929616]  ? irqentry_exit+0x2a/0x60
[   22.930014]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   22.930620]  ? __pfx_read_tsc+0x10/0x10
[   22.930944]  ? ktime_get_ts64+0x86/0x230
[   22.931706]  kunit_try_run_case+0x1b3/0x490
[   22.932969]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   22.933372]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.934635]  ? __kthread_parkme+0x82/0x160
[   22.935185]  ? preempt_count_sub+0x50/0x80
[   22.936097]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.936978]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.937687]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.939508]  kthread+0x257/0x310
[   22.939855]  ? __pfx_kthread+0x10/0x10
[   22.940325]  ret_from_fork+0x41/0x80
[   22.941066]  ? __pfx_kthread+0x10/0x10
[   22.941863]  ret_from_fork_asm+0x1a/0x30
[   22.942555]  </TASK>
[   22.942976] 
[   22.943113] Allocated by task 182:
[   22.943827]  kasan_save_stack+0x3d/0x60
[   22.944940]  kasan_save_track+0x18/0x40
[   22.945991]  kasan_save_alloc_info+0x3b/0x50
[   22.946297]  __kasan_kmalloc+0xb7/0xc0
[   22.946954]  __kmalloc_cache_noprof+0x184/0x410
[   22.948155]  kmalloc_oob_memset_4+0xad/0x330
[   22.949132]  kunit_try_run_case+0x1b3/0x490
[   22.950257]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.951257]  kthread+0x257/0x310
[   22.951917]  ret_from_fork+0x41/0x80
[   22.952711]  ret_from_fork_asm+0x1a/0x30
[   22.953940] 
[   22.954239] The buggy address belongs to the object at ffff88810298f000
[   22.954239]  which belongs to the cache kmalloc-128 of size 128
[   22.955429] The buggy address is located 117 bytes inside of
[   22.955429]  allocated 120-byte region [ffff88810298f000, ffff88810298f078)
[   22.956255] 
[   22.956511] The buggy address belongs to the physical page:
[   22.957103] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10298f
[   22.957941] flags: 0x200000000000000(node=0|zone=2)
[   22.958454] page_type: f5(slab)
[   22.959056] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   22.959459] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.960434] page dumped because: kasan: bad access detected
[   22.960843] 
[   22.961190] Memory state around the buggy address:
[   22.961671]  ffff88810298ef00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.962409]  ffff88810298ef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.963295] >ffff88810298f000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   22.964230]                                                                 ^
[   22.965061]  ffff88810298f080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.965902]  ffff88810298f100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.966615] ==================================================================
[   22.973544] ==================================================================
[   22.974364] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x167/0x330
[   22.975287] Write of size 8 at addr ffff88810298f271 by task kunit_try_catch/184
[   22.976380] 
[   22.976909] CPU: 1 UID: 0 PID: 184 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   22.979067] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.979840] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.980958] Call Trace:
[   22.981696]  <TASK>
[   22.982077]  dump_stack_lvl+0x73/0xb0
[   22.982656]  print_report+0xd1/0x640
[   22.983294]  ? __virt_addr_valid+0x1db/0x2d0
[   22.983750]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.984657]  kasan_report+0x102/0x140
[   22.985156]  ? kmalloc_oob_memset_8+0x167/0x330
[   22.985570]  ? kmalloc_oob_memset_8+0x167/0x330
[   22.986019]  kasan_check_range+0x10c/0x1c0
[   22.986413]  __asan_memset+0x27/0x50
[   22.986842]  kmalloc_oob_memset_8+0x167/0x330
[   22.987574]  ? __pfx_kmalloc_oob_memset_8+0x10/0x10
[   22.987923]  ? __schedule+0xc3e/0x2790
[   22.988338]  ? __pfx_read_tsc+0x10/0x10
[   22.988944]  ? ktime_get_ts64+0x86/0x230
[   22.989767]  kunit_try_run_case+0x1b3/0x490
[   22.990317]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.990794]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   22.991469]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.992850]  ? __kthread_parkme+0x82/0x160
[   22.993532]  ? preempt_count_sub+0x50/0x80
[   22.993942]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.994590]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.995170]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.995950]  kthread+0x257/0x310
[   22.996234]  ? __pfx_kthread+0x10/0x10
[   22.996920]  ret_from_fork+0x41/0x80
[   22.997616]  ? __pfx_kthread+0x10/0x10
[   22.998004]  ret_from_fork_asm+0x1a/0x30
[   22.998689]  </TASK>
[   22.998979] 
[   22.999477] Allocated by task 184:
[   23.000368]  kasan_save_stack+0x3d/0x60
[   23.000978]  kasan_save_track+0x18/0x40
[   23.001491]  kasan_save_alloc_info+0x3b/0x50
[   23.001968]  __kasan_kmalloc+0xb7/0xc0
[   23.002470]  __kmalloc_cache_noprof+0x184/0x410
[   23.003018]  kmalloc_oob_memset_8+0xad/0x330
[   23.003829]  kunit_try_run_case+0x1b3/0x490
[   23.004176]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.005041]  kthread+0x257/0x310
[   23.005794]  ret_from_fork+0x41/0x80
[   23.006483]  ret_from_fork_asm+0x1a/0x30
[   23.006817] 
[   23.007124] The buggy address belongs to the object at ffff88810298f200
[   23.007124]  which belongs to the cache kmalloc-128 of size 128
[   23.008291] The buggy address is located 113 bytes inside of
[   23.008291]  allocated 120-byte region [ffff88810298f200, ffff88810298f278)
[   23.009529] 
[   23.010502] The buggy address belongs to the physical page:
[   23.011434] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10298f
[   23.012187] flags: 0x200000000000000(node=0|zone=2)
[   23.013125] page_type: f5(slab)
[   23.013746] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   23.014650] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.015072] page dumped because: kasan: bad access detected
[   23.015475] 
[   23.015842] Memory state around the buggy address:
[   23.016203]  ffff88810298f100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.017146]  ffff88810298f180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.018560] >ffff88810298f200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   23.019208]                                                                 ^
[   23.020158]  ffff88810298f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.021155]  ffff88810298f300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.022806] ==================================================================
[   22.863269] ==================================================================
[   22.864939] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x167/0x330
[   22.865540] Write of size 2 at addr ffff88810298be77 by task kunit_try_catch/180
[   22.866180] 
[   22.866437] CPU: 1 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   22.867523] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.868018] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.869604] Call Trace:
[   22.869968]  <TASK>
[   22.870199]  dump_stack_lvl+0x73/0xb0
[   22.870791]  print_report+0xd1/0x640
[   22.871404]  ? __virt_addr_valid+0x1db/0x2d0
[   22.871857]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.872495]  kasan_report+0x102/0x140
[   22.872978]  ? kmalloc_oob_memset_2+0x167/0x330
[   22.874009]  ? kmalloc_oob_memset_2+0x167/0x330
[   22.874422]  kasan_check_range+0x10c/0x1c0
[   22.874810]  __asan_memset+0x27/0x50
[   22.875224]  kmalloc_oob_memset_2+0x167/0x330
[   22.875602]  ? __pfx_kmalloc_oob_memset_2+0x10/0x10
[   22.876639]  ? __schedule+0xc3e/0x2790
[   22.877455]  ? __pfx_read_tsc+0x10/0x10
[   22.878047]  ? ktime_get_ts64+0x86/0x230
[   22.878556]  kunit_try_run_case+0x1b3/0x490
[   22.879015]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.880067]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   22.880661]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.881198]  ? __kthread_parkme+0x82/0x160
[   22.881758]  ? preempt_count_sub+0x50/0x80
[   22.882127]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.882724]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.883211]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.883967]  kthread+0x257/0x310
[   22.884812]  ? __pfx_kthread+0x10/0x10
[   22.885519]  ret_from_fork+0x41/0x80
[   22.885900]  ? __pfx_kthread+0x10/0x10
[   22.886283]  ret_from_fork_asm+0x1a/0x30
[   22.886794]  </TASK>
[   22.887390] 
[   22.887573] Allocated by task 180:
[   22.887912]  kasan_save_stack+0x3d/0x60
[   22.888386]  kasan_save_track+0x18/0x40
[   22.888706]  kasan_save_alloc_info+0x3b/0x50
[   22.889230]  __kasan_kmalloc+0xb7/0xc0
[   22.889759]  __kmalloc_cache_noprof+0x184/0x410
[   22.890141]  kmalloc_oob_memset_2+0xad/0x330
[   22.890605]  kunit_try_run_case+0x1b3/0x490
[   22.892403]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.892790]  kthread+0x257/0x310
[   22.893422]  ret_from_fork+0x41/0x80
[   22.893818]  ret_from_fork_asm+0x1a/0x30
[   22.894148] 
[   22.894393] The buggy address belongs to the object at ffff88810298be00
[   22.894393]  which belongs to the cache kmalloc-128 of size 128
[   22.895532] The buggy address is located 119 bytes inside of
[   22.895532]  allocated 120-byte region [ffff88810298be00, ffff88810298be78)
[   22.897027] 
[   22.897674] The buggy address belongs to the physical page:
[   22.898240] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10298b
[   22.899693] flags: 0x200000000000000(node=0|zone=2)
[   22.900113] page_type: f5(slab)
[   22.900547] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   22.901750] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.902459] page dumped because: kasan: bad access detected
[   22.902994] 
[   22.903183] Memory state around the buggy address:
[   22.903655]  ffff88810298bd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   22.905187]  ffff88810298bd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.905684] >ffff88810298be00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   22.905985]                                                                 ^
[   22.906281]  ffff88810298be80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.907406]  ffff88810298bf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.908785] ==================================================================
[   23.028845] ==================================================================
[   23.029807] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x167/0x330
[   23.030579] Write of size 16 at addr ffff88810298f469 by task kunit_try_catch/186
[   23.031432] 
[   23.031637] CPU: 1 UID: 0 PID: 186 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   23.033293] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.034026] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.035322] Call Trace:
[   23.036002]  <TASK>
[   23.036514]  dump_stack_lvl+0x73/0xb0
[   23.036961]  print_report+0xd1/0x640
[   23.037382]  ? __virt_addr_valid+0x1db/0x2d0
[   23.038012]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.038551]  kasan_report+0x102/0x140
[   23.038988]  ? kmalloc_oob_memset_16+0x167/0x330
[   23.039533]  ? kmalloc_oob_memset_16+0x167/0x330
[   23.040080]  kasan_check_range+0x10c/0x1c0
[   23.040503]  __asan_memset+0x27/0x50
[   23.040987]  kmalloc_oob_memset_16+0x167/0x330
[   23.041362]  ? __pfx_kmalloc_oob_memset_16+0x10/0x10
[   23.042122]  ? __schedule+0xc3e/0x2790
[   23.042720]  ? __pfx_read_tsc+0x10/0x10
[   23.043106]  ? ktime_get_ts64+0x86/0x230
[   23.043620]  kunit_try_run_case+0x1b3/0x490
[   23.044171]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.044701]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   23.045230]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.045947]  ? __kthread_parkme+0x82/0x160
[   23.046255]  ? preempt_count_sub+0x50/0x80
[   23.046851]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.047624]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.048261]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.048948]  kthread+0x257/0x310
[   23.049284]  ? __pfx_kthread+0x10/0x10
[   23.049781]  ret_from_fork+0x41/0x80
[   23.050388]  ? __pfx_kthread+0x10/0x10
[   23.050733]  ret_from_fork_asm+0x1a/0x30
[   23.051298]  </TASK>
[   23.051497] 
[   23.051802] Allocated by task 186:
[   23.052305]  kasan_save_stack+0x3d/0x60
[   23.052685]  kasan_save_track+0x18/0x40
[   23.053166]  kasan_save_alloc_info+0x3b/0x50
[   23.053921]  __kasan_kmalloc+0xb7/0xc0
[   23.054197]  __kmalloc_cache_noprof+0x184/0x410
[   23.054790]  kmalloc_oob_memset_16+0xad/0x330
[   23.055261]  kunit_try_run_case+0x1b3/0x490
[   23.055862]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.056405]  kthread+0x257/0x310
[   23.056805]  ret_from_fork+0x41/0x80
[   23.057185]  ret_from_fork_asm+0x1a/0x30
[   23.057671] 
[   23.057839] The buggy address belongs to the object at ffff88810298f400
[   23.057839]  which belongs to the cache kmalloc-128 of size 128
[   23.058930] The buggy address is located 105 bytes inside of
[   23.058930]  allocated 120-byte region [ffff88810298f400, ffff88810298f478)
[   23.060211] 
[   23.060472] The buggy address belongs to the physical page:
[   23.061581] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10298f
[   23.062880] flags: 0x200000000000000(node=0|zone=2)
[   23.063762] page_type: f5(slab)
[   23.064158] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   23.065151] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.066080] page dumped because: kasan: bad access detected
[   23.066855] 
[   23.067146] Memory state around the buggy address:
[   23.068113]  ffff88810298f300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   23.068727]  ffff88810298f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.069526] >ffff88810298f400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   23.070233]                                                                 ^
[   23.071039]  ffff88810298f480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.072324]  ffff88810298f500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.072931] ==================================================================