Hay
Date
Dec. 9, 2024, 6:35 a.m.

Environment
qemu-arm64
qemu-x86_64

[   24.300837] ==================================================================
[   24.301769] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300
[   24.302474] Write of size 4 at addr fff00000c639f875 by task kunit_try_catch/162
[   24.303433] 
[   24.303827] CPU: 0 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   24.305167] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.305664] Hardware name: linux,dummy-virt (DT)
[   24.306275] Call trace:
[   24.307988]  show_stack+0x20/0x38 (C)
[   24.308497]  dump_stack_lvl+0x8c/0xd0
[   24.309052]  print_report+0x118/0x5e0
[   24.309620]  kasan_report+0xc8/0x118
[   24.310237]  kasan_check_range+0x100/0x1a8
[   24.311220]  __asan_memset+0x34/0x78
[   24.311758]  kmalloc_oob_memset_4+0x150/0x300
[   24.312357]  kunit_try_run_case+0x14c/0x3d0
[   24.313010]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.313632]  kthread+0x24c/0x2d0
[   24.314198]  ret_from_fork+0x10/0x20
[   24.314780] 
[   24.315779] Allocated by task 162:
[   24.316354]  kasan_save_stack+0x3c/0x68
[   24.317074]  kasan_save_track+0x20/0x40
[   24.317685]  kasan_save_alloc_info+0x40/0x58
[   24.318357]  __kasan_kmalloc+0xd4/0xd8
[   24.318874]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.319390]  kmalloc_oob_memset_4+0xb0/0x300
[   24.319953]  kunit_try_run_case+0x14c/0x3d0
[   24.320548]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.321369]  kthread+0x24c/0x2d0
[   24.322196]  ret_from_fork+0x10/0x20
[   24.322726] 
[   24.323068] The buggy address belongs to the object at fff00000c639f800
[   24.323068]  which belongs to the cache kmalloc-128 of size 128
[   24.325021] The buggy address is located 117 bytes inside of
[   24.325021]  allocated 120-byte region [fff00000c639f800, fff00000c639f878)
[   24.326337] 
[   24.326690] The buggy address belongs to the physical page:
[   24.327807] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10639f
[   24.328718] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.329482] page_type: f5(slab)
[   24.330010] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   24.330791] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.332246] page dumped because: kasan: bad access detected
[   24.333013] 
[   24.333320] Memory state around the buggy address:
[   24.333890]  fff00000c639f700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.334619]  fff00000c639f780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.335508] >fff00000c639f800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   24.336742]                                                                 ^
[   24.337420]  fff00000c639f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.338095]  fff00000c639f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.339180] ==================================================================
[   24.349716] ==================================================================
[   24.350798] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8
[   24.352573] Write of size 8 at addr fff00000c6387b71 by task kunit_try_catch/164
[   24.353288] 
[   24.353688] CPU: 1 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   24.354814] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.355551] Hardware name: linux,dummy-virt (DT)
[   24.356185] Call trace:
[   24.356617]  show_stack+0x20/0x38 (C)
[   24.357139]  dump_stack_lvl+0x8c/0xd0
[   24.357812]  print_report+0x118/0x5e0
[   24.358455]  kasan_report+0xc8/0x118
[   24.359284]  kasan_check_range+0x100/0x1a8
[   24.360057]  __asan_memset+0x34/0x78
[   24.360632]  kmalloc_oob_memset_8+0x150/0x2f8
[   24.361302]  kunit_try_run_case+0x14c/0x3d0
[   24.361930]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.362680]  kthread+0x24c/0x2d0
[   24.363381]  ret_from_fork+0x10/0x20
[   24.363961] 
[   24.364249] Allocated by task 164:
[   24.364678]  kasan_save_stack+0x3c/0x68
[   24.365303]  kasan_save_track+0x20/0x40
[   24.365820]  kasan_save_alloc_info+0x40/0x58
[   24.366387]  __kasan_kmalloc+0xd4/0xd8
[   24.367071]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.368063]  kmalloc_oob_memset_8+0xb0/0x2f8
[   24.368721]  kunit_try_run_case+0x14c/0x3d0
[   24.369298]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.370069]  kthread+0x24c/0x2d0
[   24.370557]  ret_from_fork+0x10/0x20
[   24.371368] 
[   24.371692] The buggy address belongs to the object at fff00000c6387b00
[   24.371692]  which belongs to the cache kmalloc-128 of size 128
[   24.372798] The buggy address is located 113 bytes inside of
[   24.372798]  allocated 120-byte region [fff00000c6387b00, fff00000c6387b78)
[   24.374659] 
[   24.375125] The buggy address belongs to the physical page:
[   24.376381] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106387
[   24.377166] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.377766] page_type: f5(slab)
[   24.378263] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   24.379453] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.380267] page dumped because: kasan: bad access detected
[   24.380961] 
[   24.381288] Memory state around the buggy address:
[   24.381939]  fff00000c6387a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   24.383076]  fff00000c6387a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.383802] >fff00000c6387b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   24.384614]                                                                 ^
[   24.385416]  fff00000c6387b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.386291]  fff00000c6387c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.387239] ==================================================================
[   24.394876] ==================================================================
[   24.396278] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8
[   24.397056] Write of size 16 at addr fff00000c639fb69 by task kunit_try_catch/166
[   24.398390] 
[   24.398715] CPU: 0 UID: 0 PID: 166 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   24.399789] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.400313] Hardware name: linux,dummy-virt (DT)
[   24.401119] Call trace:
[   24.401461]  show_stack+0x20/0x38 (C)
[   24.402287]  dump_stack_lvl+0x8c/0xd0
[   24.403237]  print_report+0x118/0x5e0
[   24.403774]  kasan_report+0xc8/0x118
[   24.404278]  kasan_check_range+0x100/0x1a8
[   24.404924]  __asan_memset+0x34/0x78
[   24.405444]  kmalloc_oob_memset_16+0x150/0x2f8
[   24.406031]  kunit_try_run_case+0x14c/0x3d0
[   24.406684]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.408056]  kthread+0x24c/0x2d0
[   24.408546]  ret_from_fork+0x10/0x20
[   24.409168] 
[   24.409452] Allocated by task 166:
[   24.409955]  kasan_save_stack+0x3c/0x68
[   24.410559]  kasan_save_track+0x20/0x40
[   24.411469]  kasan_save_alloc_info+0x40/0x58
[   24.411895]  __kasan_kmalloc+0xd4/0xd8
[   24.412434]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.413012]  kmalloc_oob_memset_16+0xb0/0x2f8
[   24.413561]  kunit_try_run_case+0x14c/0x3d0
[   24.414274]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.415417]  kthread+0x24c/0x2d0
[   24.415793]  ret_from_fork+0x10/0x20
[   24.416390] 
[   24.416763] The buggy address belongs to the object at fff00000c639fb00
[   24.416763]  which belongs to the cache kmalloc-128 of size 128
[   24.418002] The buggy address is located 105 bytes inside of
[   24.418002]  allocated 120-byte region [fff00000c639fb00, fff00000c639fb78)
[   24.419241] 
[   24.419605] The buggy address belongs to the physical page:
[   24.420180] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10639f
[   24.421090] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.422112] page_type: f5(slab)
[   24.422665] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   24.424255] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.425206] page dumped because: kasan: bad access detected
[   24.425889] 
[   24.426206] Memory state around the buggy address:
[   24.426963]  fff00000c639fa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   24.427869]  fff00000c639fa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.428654] >fff00000c639fb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   24.429566]                                                                 ^
[   24.430427]  fff00000c639fb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.431416]  fff00000c639fc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.431967] ==================================================================
[   24.252155] ==================================================================
[   24.253347] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8
[   24.254071] Write of size 2 at addr fff00000c639f777 by task kunit_try_catch/160
[   24.254670] 
[   24.255764] CPU: 0 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   24.257092] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.257782] Hardware name: linux,dummy-virt (DT)
[   24.258499] Call trace:
[   24.259387]  show_stack+0x20/0x38 (C)
[   24.259911]  dump_stack_lvl+0x8c/0xd0
[   24.260485]  print_report+0x118/0x5e0
[   24.261364]  kasan_report+0xc8/0x118
[   24.262035]  kasan_check_range+0x100/0x1a8
[   24.262557]  __asan_memset+0x34/0x78
[   24.263595]  kmalloc_oob_memset_2+0x150/0x2f8
[   24.264225]  kunit_try_run_case+0x14c/0x3d0
[   24.265094]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.266126]  kthread+0x24c/0x2d0
[   24.266782]  ret_from_fork+0x10/0x20
[   24.267492] 
[   24.268057] Allocated by task 160:
[   24.268590]  kasan_save_stack+0x3c/0x68
[   24.269141]  kasan_save_track+0x20/0x40
[   24.269787]  kasan_save_alloc_info+0x40/0x58
[   24.270454]  __kasan_kmalloc+0xd4/0xd8
[   24.270945]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.272201]  kmalloc_oob_memset_2+0xb0/0x2f8
[   24.272912]  kunit_try_run_case+0x14c/0x3d0
[   24.273512]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.274209]  kthread+0x24c/0x2d0
[   24.274780]  ret_from_fork+0x10/0x20
[   24.275445] 
[   24.275790] The buggy address belongs to the object at fff00000c639f700
[   24.275790]  which belongs to the cache kmalloc-128 of size 128
[   24.277084] The buggy address is located 119 bytes inside of
[   24.277084]  allocated 120-byte region [fff00000c639f700, fff00000c639f778)
[   24.278733] 
[   24.279752] The buggy address belongs to the physical page:
[   24.280252] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10639f
[   24.281106] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.281865] page_type: f5(slab)
[   24.282325] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   24.283269] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.284144] page dumped because: kasan: bad access detected
[   24.284805] 
[   24.285108] Memory state around the buggy address:
[   24.285643]  fff00000c639f600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.286445]  fff00000c639f680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.287588] >fff00000c639f700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   24.288317]                                                                 ^
[   24.289224]  fff00000c639f780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.290282]  fff00000c639f800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.291164] ==================================================================

[   24.153670] ==================================================================
[   24.155133] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x167/0x330
[   24.156062] Write of size 2 at addr ffff888102957177 by task kunit_try_catch/179
[   24.157285] 
[   24.157561] CPU: 0 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   24.159148] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.159712] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.160966] Call Trace:
[   24.161328]  <TASK>
[   24.161990]  dump_stack_lvl+0x73/0xb0
[   24.162677]  print_report+0xd1/0x640
[   24.163419]  ? __virt_addr_valid+0x1db/0x2d0
[   24.164331]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.165128]  kasan_report+0x102/0x140
[   24.165830]  ? kmalloc_oob_memset_2+0x167/0x330
[   24.166315]  ? kmalloc_oob_memset_2+0x167/0x330
[   24.166783]  kasan_check_range+0x10c/0x1c0
[   24.167175]  __asan_memset+0x27/0x50
[   24.168528]  kmalloc_oob_memset_2+0x167/0x330
[   24.168997]  ? __pfx_kmalloc_oob_memset_2+0x10/0x10
[   24.169895]  ? __schedule+0xc70/0x27e0
[   24.170422]  ? __pfx_read_tsc+0x10/0x10
[   24.171139]  ? ktime_get_ts64+0x86/0x230
[   24.171698]  kunit_try_run_case+0x1b3/0x490
[   24.172120]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.173047]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   24.173839]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.174552]  ? __kthread_parkme+0x82/0x160
[   24.175390]  ? preempt_count_sub+0x50/0x80
[   24.176438]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.176963]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.177865]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.178952]  kthread+0x257/0x310
[   24.179286]  ? __pfx_kthread+0x10/0x10
[   24.180072]  ret_from_fork+0x41/0x80
[   24.180859]  ? __pfx_kthread+0x10/0x10
[   24.181290]  ret_from_fork_asm+0x1a/0x30
[   24.182089]  </TASK>
[   24.182578] 
[   24.182771] Allocated by task 179:
[   24.183763]  kasan_save_stack+0x3d/0x60
[   24.184324]  kasan_save_track+0x18/0x40
[   24.184707]  kasan_save_alloc_info+0x3b/0x50
[   24.185591]  __kasan_kmalloc+0xb7/0xc0
[   24.186432]  __kmalloc_cache_noprof+0x184/0x410
[   24.186736]  kmalloc_oob_memset_2+0xad/0x330
[   24.187246]  kunit_try_run_case+0x1b3/0x490
[   24.188281]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.189006]  kthread+0x257/0x310
[   24.189180]  ret_from_fork+0x41/0x80
[   24.190469]  ret_from_fork_asm+0x1a/0x30
[   24.191583] 
[   24.192176] The buggy address belongs to the object at ffff888102957100
[   24.192176]  which belongs to the cache kmalloc-128 of size 128
[   24.193795] The buggy address is located 119 bytes inside of
[   24.193795]  allocated 120-byte region [ffff888102957100, ffff888102957178)
[   24.195478] 
[   24.195693] The buggy address belongs to the physical page:
[   24.196605] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102957
[   24.197987] flags: 0x200000000000000(node=0|zone=2)
[   24.198489] page_type: f5(slab)
[   24.199369] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   24.200393] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.201336] page dumped because: kasan: bad access detected
[   24.201871] 
[   24.202683] Memory state around the buggy address:
[   24.203284]  ffff888102957000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   24.204347]  ffff888102957080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.205219] >ffff888102957100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   24.206491]                                                                 ^
[   24.207837]  ffff888102957180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.208701]  ffff888102957200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.209771] ==================================================================
[   24.339608] ==================================================================
[   24.340820] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x167/0x330
[   24.342348] Write of size 16 at addr ffff888102406869 by task kunit_try_catch/185
[   24.343531] 
[   24.343722] CPU: 1 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   24.345267] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.346309] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.347488] Call Trace:
[   24.348347]  <TASK>
[   24.348655]  dump_stack_lvl+0x73/0xb0
[   24.349085]  print_report+0xd1/0x640
[   24.349759]  ? __virt_addr_valid+0x1db/0x2d0
[   24.350781]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.351714]  kasan_report+0x102/0x140
[   24.352515]  ? kmalloc_oob_memset_16+0x167/0x330
[   24.353172]  ? kmalloc_oob_memset_16+0x167/0x330
[   24.353500]  kasan_check_range+0x10c/0x1c0
[   24.354758]  __asan_memset+0x27/0x50
[   24.355405]  kmalloc_oob_memset_16+0x167/0x330
[   24.355829]  ? __pfx_kmalloc_oob_memset_16+0x10/0x10
[   24.356284]  ? __schedule+0xc70/0x27e0
[   24.356716]  ? __pfx_read_tsc+0x10/0x10
[   24.357143]  ? ktime_get_ts64+0x86/0x230
[   24.358214]  kunit_try_run_case+0x1b3/0x490
[   24.358974]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.359373]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   24.360446]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.361092]  ? __kthread_parkme+0x82/0x160
[   24.361852]  ? preempt_count_sub+0x50/0x80
[   24.362368]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.363415]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.364206]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.364886]  kthread+0x257/0x310
[   24.365476]  ? __pfx_kthread+0x10/0x10
[   24.366147]  ret_from_fork+0x41/0x80
[   24.366709]  ? __pfx_kthread+0x10/0x10
[   24.367181]  ret_from_fork_asm+0x1a/0x30
[   24.368216]  </TASK>
[   24.368575] 
[   24.368841] Allocated by task 185:
[   24.369240]  kasan_save_stack+0x3d/0x60
[   24.370189]  kasan_save_track+0x18/0x40
[   24.370959]  kasan_save_alloc_info+0x3b/0x50
[   24.371730]  __kasan_kmalloc+0xb7/0xc0
[   24.372407]  __kmalloc_cache_noprof+0x184/0x410
[   24.373217]  kmalloc_oob_memset_16+0xad/0x330
[   24.374457]  kunit_try_run_case+0x1b3/0x490
[   24.374824]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.375398]  kthread+0x257/0x310
[   24.375742]  ret_from_fork+0x41/0x80
[   24.376908]  ret_from_fork_asm+0x1a/0x30
[   24.377317] 
[   24.377722] The buggy address belongs to the object at ffff888102406800
[   24.377722]  which belongs to the cache kmalloc-128 of size 128
[   24.378862] The buggy address is located 105 bytes inside of
[   24.378862]  allocated 120-byte region [ffff888102406800, ffff888102406878)
[   24.380950] 
[   24.381215] The buggy address belongs to the physical page:
[   24.382195] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102406
[   24.383106] flags: 0x200000000000000(node=0|zone=2)
[   24.383811] page_type: f5(slab)
[   24.384313] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   24.385189] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.385938] page dumped because: kasan: bad access detected
[   24.386822] 
[   24.387078] Memory state around the buggy address:
[   24.387424]  ffff888102406700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.389100]  ffff888102406780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.389749] >ffff888102406800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   24.390674]                                                                 ^
[   24.391799]  ffff888102406880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.392284]  ffff888102406900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.393615] ==================================================================
[   24.216897] ==================================================================
[   24.218189] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x167/0x330
[   24.219958] Write of size 4 at addr ffff888102406575 by task kunit_try_catch/181
[   24.221630] 
[   24.222072] CPU: 1 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   24.223520] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.224375] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.225184] Call Trace:
[   24.225575]  <TASK>
[   24.226075]  dump_stack_lvl+0x73/0xb0
[   24.226695]  print_report+0xd1/0x640
[   24.227178]  ? __virt_addr_valid+0x1db/0x2d0
[   24.228134]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.229139]  kasan_report+0x102/0x140
[   24.229863]  ? kmalloc_oob_memset_4+0x167/0x330
[   24.230581]  ? kmalloc_oob_memset_4+0x167/0x330
[   24.231336]  kasan_check_range+0x10c/0x1c0
[   24.231798]  __asan_memset+0x27/0x50
[   24.232791]  kmalloc_oob_memset_4+0x167/0x330
[   24.233680]  ? __pfx_kmalloc_oob_memset_4+0x10/0x10
[   24.234148]  ? __schedule+0xc70/0x27e0
[   24.235039]  ? __pfx_read_tsc+0x10/0x10
[   24.235750]  ? ktime_get_ts64+0x86/0x230
[   24.236539]  kunit_try_run_case+0x1b3/0x490
[   24.237621]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.238140]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   24.239049]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.240007]  ? __kthread_parkme+0x82/0x160
[   24.240546]  ? preempt_count_sub+0x50/0x80
[   24.242006]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.242719]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.243557]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.244502]  kthread+0x257/0x310
[   24.245541]  ? __pfx_kthread+0x10/0x10
[   24.246075]  ret_from_fork+0x41/0x80
[   24.246607]  ? __pfx_kthread+0x10/0x10
[   24.247171]  ret_from_fork_asm+0x1a/0x30
[   24.247691]  </TASK>
[   24.248824] 
[   24.248989] Allocated by task 181:
[   24.249539]  kasan_save_stack+0x3d/0x60
[   24.250672]  kasan_save_track+0x18/0x40
[   24.251473]  kasan_save_alloc_info+0x3b/0x50
[   24.252730]  __kasan_kmalloc+0xb7/0xc0
[   24.253574]  __kmalloc_cache_noprof+0x184/0x410
[   24.254715]  kmalloc_oob_memset_4+0xad/0x330
[   24.255960]  kunit_try_run_case+0x1b3/0x490
[   24.256752]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.257779]  kthread+0x257/0x310
[   24.258499]  ret_from_fork+0x41/0x80
[   24.259119]  ret_from_fork_asm+0x1a/0x30
[   24.259904] 
[   24.260345] The buggy address belongs to the object at ffff888102406500
[   24.260345]  which belongs to the cache kmalloc-128 of size 128
[   24.262174] The buggy address is located 117 bytes inside of
[   24.262174]  allocated 120-byte region [ffff888102406500, ffff888102406578)
[   24.264309] 
[   24.264783] The buggy address belongs to the physical page:
[   24.265738] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102406
[   24.267379] flags: 0x200000000000000(node=0|zone=2)
[   24.268499] page_type: f5(slab)
[   24.268798] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   24.269967] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.271014] page dumped because: kasan: bad access detected
[   24.271402] 
[   24.271867] Memory state around the buggy address:
[   24.272336]  ffff888102406400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   24.273892]  ffff888102406480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.275409] >ffff888102406500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   24.276597]                                                                 ^
[   24.277525]  ffff888102406580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.277813]  ffff888102406600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.278090] ==================================================================
[   24.284866] ==================================================================
[   24.286083] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x167/0x330
[   24.287220] Write of size 8 at addr ffff888102406771 by task kunit_try_catch/183
[   24.288271] 
[   24.288491] CPU: 1 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   24.289540] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.289982] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.290691] Call Trace:
[   24.291026]  <TASK>
[   24.291366]  dump_stack_lvl+0x73/0xb0
[   24.292085]  print_report+0xd1/0x640
[   24.292461]  ? __virt_addr_valid+0x1db/0x2d0
[   24.293415]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.294074]  kasan_report+0x102/0x140
[   24.294528]  ? kmalloc_oob_memset_8+0x167/0x330
[   24.295431]  ? kmalloc_oob_memset_8+0x167/0x330
[   24.295766]  kasan_check_range+0x10c/0x1c0
[   24.296717]  __asan_memset+0x27/0x50
[   24.297223]  kmalloc_oob_memset_8+0x167/0x330
[   24.297606]  ? __pfx_kmalloc_oob_memset_8+0x10/0x10
[   24.298540]  ? __schedule+0xc70/0x27e0
[   24.299094]  ? __pfx_read_tsc+0x10/0x10
[   24.299573]  ? ktime_get_ts64+0x86/0x230
[   24.300036]  kunit_try_run_case+0x1b3/0x490
[   24.300589]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.300995]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   24.301708]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.302207]  ? __kthread_parkme+0x82/0x160
[   24.302707]  ? preempt_count_sub+0x50/0x80
[   24.303800]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.304240]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.304798]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.305598]  kthread+0x257/0x310
[   24.306107]  ? __pfx_kthread+0x10/0x10
[   24.306540]  ret_from_fork+0x41/0x80
[   24.307274]  ? __pfx_kthread+0x10/0x10
[   24.308108]  ret_from_fork_asm+0x1a/0x30
[   24.308579]  </TASK>
[   24.309008] 
[   24.309562] Allocated by task 183:
[   24.309803]  kasan_save_stack+0x3d/0x60
[   24.310409]  kasan_save_track+0x18/0x40
[   24.311425]  kasan_save_alloc_info+0x3b/0x50
[   24.311846]  __kasan_kmalloc+0xb7/0xc0
[   24.312279]  __kmalloc_cache_noprof+0x184/0x410
[   24.313224]  kmalloc_oob_memset_8+0xad/0x330
[   24.313770]  kunit_try_run_case+0x1b3/0x490
[   24.314627]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.315484]  kthread+0x257/0x310
[   24.316120]  ret_from_fork+0x41/0x80
[   24.316520]  ret_from_fork_asm+0x1a/0x30
[   24.317357] 
[   24.317775] The buggy address belongs to the object at ffff888102406700
[   24.317775]  which belongs to the cache kmalloc-128 of size 128
[   24.318875] The buggy address is located 113 bytes inside of
[   24.318875]  allocated 120-byte region [ffff888102406700, ffff888102406778)
[   24.320362] 
[   24.320782] The buggy address belongs to the physical page:
[   24.321377] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102406
[   24.322336] flags: 0x200000000000000(node=0|zone=2)
[   24.322688] page_type: f5(slab)
[   24.323180] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   24.323855] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.324588] page dumped because: kasan: bad access detected
[   24.325324] 
[   24.325580] Memory state around the buggy address:
[   24.326358]  ffff888102406600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   24.327329]  ffff888102406680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.328277] >ffff888102406700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   24.329607]                                                                 ^
[   24.330448]  ffff888102406780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.331608]  ffff888102406800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.332347] ==================================================================