Date
Nov. 20, 2024, 6:35 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 39.971611] ================================================================== [ 39.972854] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc8 [ 39.974607] Write of size 8 at addr fff00000c1bb3c08 by task kunit_try_catch/250 [ 39.975891] [ 39.976228] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 39.977368] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.977922] Hardware name: linux,dummy-virt (DT) [ 39.978456] Call trace: [ 39.978887] show_stack+0x20/0x38 (C) [ 39.979865] dump_stack_lvl+0x8c/0xd0 [ 39.980477] print_report+0x118/0x5e0 [ 39.980992] kasan_report+0xc8/0x118 [ 39.981890] kasan_check_range+0x100/0x1a8 [ 39.982486] __kasan_check_write+0x20/0x30 [ 39.983076] kasan_bitops_modify.constprop.0+0x100/0xbc8 [ 39.983895] kasan_bitops_generic+0x110/0x1c8 [ 39.984554] kunit_try_run_case+0x14c/0x3d0 [ 39.985123] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.986229] kthread+0x24c/0x2d0 [ 39.986708] ret_from_fork+0x10/0x20 [ 39.987296] [ 39.987655] Allocated by task 250: [ 39.988181] kasan_save_stack+0x3c/0x68 [ 39.988717] kasan_save_track+0x20/0x40 [ 39.989285] kasan_save_alloc_info+0x40/0x58 [ 39.989927] __kasan_kmalloc+0xd4/0xd8 [ 39.990415] __kmalloc_cache_noprof+0x15c/0x3c8 [ 39.991083] kasan_bitops_generic+0xa0/0x1c8 [ 39.992184] kunit_try_run_case+0x14c/0x3d0 [ 39.992781] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.994037] kthread+0x24c/0x2d0 [ 39.994471] ret_from_fork+0x10/0x20 [ 39.994982] [ 39.995307] The buggy address belongs to the object at fff00000c1bb3c00 [ 39.995307] which belongs to the cache kmalloc-16 of size 16 [ 39.996202] The buggy address is located 8 bytes inside of [ 39.996202] allocated 9-byte region [fff00000c1bb3c00, fff00000c1bb3c09) [ 39.997671] [ 39.998283] The buggy address belongs to the physical page: [ 39.998920] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bb3 [ 39.999894] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 40.000689] page_type: f5(slab) [ 40.001243] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 40.002153] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 40.003354] page dumped because: kasan: bad access detected [ 40.003990] [ 40.004318] Memory state around the buggy address: [ 40.004878] fff00000c1bb3b00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 40.006228] fff00000c1bb3b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 40.006993] >fff00000c1bb3c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.007841] ^ [ 40.008323] fff00000c1bb3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.009123] fff00000c1bb3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.010415] ================================================================== [ 40.012177] ================================================================== [ 40.013000] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa4c/0xbc8 [ 40.014045] Read of size 8 at addr fff00000c1bb3c08 by task kunit_try_catch/250 [ 40.015805] [ 40.016120] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 40.016987] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.018130] Hardware name: linux,dummy-virt (DT) [ 40.018790] Call trace: [ 40.019307] show_stack+0x20/0x38 (C) [ 40.019968] dump_stack_lvl+0x8c/0xd0 [ 40.020767] print_report+0x118/0x5e0 [ 40.021157] kasan_report+0xc8/0x118 [ 40.021879] __asan_report_load8_noabort+0x20/0x30 [ 40.022839] kasan_bitops_modify.constprop.0+0xa4c/0xbc8 [ 40.023637] kasan_bitops_generic+0x110/0x1c8 [ 40.024428] kunit_try_run_case+0x14c/0x3d0 [ 40.024956] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.025691] kthread+0x24c/0x2d0 [ 40.026710] ret_from_fork+0x10/0x20 [ 40.027416] [ 40.027838] Allocated by task 250: [ 40.028358] kasan_save_stack+0x3c/0x68 [ 40.028994] kasan_save_track+0x20/0x40 [ 40.029513] kasan_save_alloc_info+0x40/0x58 [ 40.030391] __kasan_kmalloc+0xd4/0xd8 [ 40.031046] __kmalloc_cache_noprof+0x15c/0x3c8 [ 40.031748] kasan_bitops_generic+0xa0/0x1c8 [ 40.032354] kunit_try_run_case+0x14c/0x3d0 [ 40.032993] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.034068] kthread+0x24c/0x2d0 [ 40.034540] ret_from_fork+0x10/0x20 [ 40.035071] [ 40.035431] The buggy address belongs to the object at fff00000c1bb3c00 [ 40.035431] which belongs to the cache kmalloc-16 of size 16 [ 40.037703] The buggy address is located 8 bytes inside of [ 40.037703] allocated 9-byte region [fff00000c1bb3c00, fff00000c1bb3c09) [ 40.038752] [ 40.039107] The buggy address belongs to the physical page: [ 40.039714] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bb3 [ 40.040599] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 40.041803] page_type: f5(slab) [ 40.042272] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 40.043046] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 40.043938] page dumped because: kasan: bad access detected [ 40.044640] [ 40.045009] Memory state around the buggy address: [ 40.046019] fff00000c1bb3b00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 40.046793] fff00000c1bb3b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 40.047599] >fff00000c1bb3c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.048458] ^ [ 40.049014] fff00000c1bb3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.049838] fff00000c1bb3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.050962] ================================================================== [ 40.258306] ================================================================== [ 40.258987] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc8 [ 40.259803] Write of size 8 at addr fff00000c1bb3c08 by task kunit_try_catch/250 [ 40.260583] [ 40.260958] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 40.262483] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.263097] Hardware name: linux,dummy-virt (DT) [ 40.263769] Call trace: [ 40.264254] show_stack+0x20/0x38 (C) [ 40.264849] dump_stack_lvl+0x8c/0xd0 [ 40.265505] print_report+0x118/0x5e0 [ 40.266150] kasan_report+0xc8/0x118 [ 40.266787] kasan_check_range+0x100/0x1a8 [ 40.267478] __kasan_check_write+0x20/0x30 [ 40.268083] kasan_bitops_modify.constprop.0+0x344/0xbc8 [ 40.268824] kasan_bitops_generic+0x110/0x1c8 [ 40.269433] kunit_try_run_case+0x14c/0x3d0 [ 40.270139] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.270963] kthread+0x24c/0x2d0 [ 40.271593] ret_from_fork+0x10/0x20 [ 40.272171] [ 40.272549] Allocated by task 250: [ 40.273154] kasan_save_stack+0x3c/0x68 [ 40.273774] kasan_save_track+0x20/0x40 [ 40.274289] kasan_save_alloc_info+0x40/0x58 [ 40.274908] __kasan_kmalloc+0xd4/0xd8 [ 40.275492] __kmalloc_cache_noprof+0x15c/0x3c8 [ 40.276041] kasan_bitops_generic+0xa0/0x1c8 [ 40.276682] kunit_try_run_case+0x14c/0x3d0 [ 40.277297] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.277933] kthread+0x24c/0x2d0 [ 40.278497] ret_from_fork+0x10/0x20 [ 40.279054] [ 40.279402] The buggy address belongs to the object at fff00000c1bb3c00 [ 40.279402] which belongs to the cache kmalloc-16 of size 16 [ 40.280606] The buggy address is located 8 bytes inside of [ 40.280606] allocated 9-byte region [fff00000c1bb3c00, fff00000c1bb3c09) [ 40.281761] [ 40.282111] The buggy address belongs to the physical page: [ 40.282837] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bb3 [ 40.283709] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 40.284402] page_type: f5(slab) [ 40.284843] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 40.285548] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 40.286462] page dumped because: kasan: bad access detected [ 40.287163] [ 40.287513] Memory state around the buggy address: [ 40.288144] fff00000c1bb3b00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 40.288991] fff00000c1bb3b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 40.289671] >fff00000c1bb3c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.290513] ^ [ 40.291048] fff00000c1bb3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.291920] fff00000c1bb3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.292794] ================================================================== [ 40.222149] ================================================================== [ 40.222918] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaf4/0xbc8 [ 40.223812] Read of size 8 at addr fff00000c1bb3c08 by task kunit_try_catch/250 [ 40.224671] [ 40.225097] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 40.226497] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.226882] Hardware name: linux,dummy-virt (DT) [ 40.227286] Call trace: [ 40.227751] show_stack+0x20/0x38 (C) [ 40.228804] dump_stack_lvl+0x8c/0xd0 [ 40.229386] print_report+0x118/0x5e0 [ 40.230109] kasan_report+0xc8/0x118 [ 40.230693] __asan_report_load8_noabort+0x20/0x30 [ 40.231383] kasan_bitops_modify.constprop.0+0xaf4/0xbc8 [ 40.232066] kasan_bitops_generic+0x110/0x1c8 [ 40.232709] kunit_try_run_case+0x14c/0x3d0 [ 40.233399] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.234146] kthread+0x24c/0x2d0 [ 40.234617] ret_from_fork+0x10/0x20 [ 40.235308] [ 40.235623] Allocated by task 250: [ 40.235873] kasan_save_stack+0x3c/0x68 [ 40.236132] kasan_save_track+0x20/0x40 [ 40.236392] kasan_save_alloc_info+0x40/0x58 [ 40.236920] __kasan_kmalloc+0xd4/0xd8 [ 40.237582] __kmalloc_cache_noprof+0x15c/0x3c8 [ 40.238297] kasan_bitops_generic+0xa0/0x1c8 [ 40.238977] kunit_try_run_case+0x14c/0x3d0 [ 40.239672] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.240379] kthread+0x24c/0x2d0 [ 40.241011] ret_from_fork+0x10/0x20 [ 40.241621] [ 40.241977] The buggy address belongs to the object at fff00000c1bb3c00 [ 40.241977] which belongs to the cache kmalloc-16 of size 16 [ 40.243244] The buggy address is located 8 bytes inside of [ 40.243244] allocated 9-byte region [fff00000c1bb3c00, fff00000c1bb3c09) [ 40.244562] [ 40.244904] The buggy address belongs to the physical page: [ 40.245553] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bb3 [ 40.246553] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 40.247315] page_type: f5(slab) [ 40.247812] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 40.248807] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 40.249706] page dumped because: kasan: bad access detected [ 40.250350] [ 40.250680] Memory state around the buggy address: [ 40.251385] fff00000c1bb3b00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 40.252190] fff00000c1bb3b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 40.253022] >fff00000c1bb3c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.253924] ^ [ 40.254455] fff00000c1bb3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.255207] fff00000c1bb3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.256023] ================================================================== [ 40.294843] ================================================================== [ 40.295590] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc8 [ 40.296362] Write of size 8 at addr fff00000c1bb3c08 by task kunit_try_catch/250 [ 40.298050] [ 40.298526] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 40.299989] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.300651] Hardware name: linux,dummy-virt (DT) [ 40.301196] Call trace: [ 40.301682] show_stack+0x20/0x38 (C) [ 40.302303] dump_stack_lvl+0x8c/0xd0 [ 40.302786] print_report+0x118/0x5e0 [ 40.303388] kasan_report+0xc8/0x118 [ 40.304008] kasan_check_range+0x100/0x1a8 [ 40.304667] __kasan_check_write+0x20/0x30 [ 40.305301] kasan_bitops_modify.constprop.0+0x3b0/0xbc8 [ 40.306014] kasan_bitops_generic+0x110/0x1c8 [ 40.306703] kunit_try_run_case+0x14c/0x3d0 [ 40.307264] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.308039] kthread+0x24c/0x2d0 [ 40.308597] ret_from_fork+0x10/0x20 [ 40.309091] [ 40.309431] Allocated by task 250: [ 40.309975] kasan_save_stack+0x3c/0x68 [ 40.310583] kasan_save_track+0x20/0x40 [ 40.311093] kasan_save_alloc_info+0x40/0x58 [ 40.311700] __kasan_kmalloc+0xd4/0xd8 [ 40.312175] __kmalloc_cache_noprof+0x15c/0x3c8 [ 40.312851] kasan_bitops_generic+0xa0/0x1c8 [ 40.313476] kunit_try_run_case+0x14c/0x3d0 [ 40.313990] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.314764] kthread+0x24c/0x2d0 [ 40.315324] ret_from_fork+0x10/0x20 [ 40.315814] [ 40.316164] The buggy address belongs to the object at fff00000c1bb3c00 [ 40.316164] which belongs to the cache kmalloc-16 of size 16 [ 40.317181] The buggy address is located 8 bytes inside of [ 40.317181] allocated 9-byte region [fff00000c1bb3c00, fff00000c1bb3c09) [ 40.318657] [ 40.318876] The buggy address belongs to the physical page: [ 40.319174] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bb3 [ 40.319687] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 40.320509] page_type: f5(slab) [ 40.321344] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 40.322389] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 40.323427] page dumped because: kasan: bad access detected [ 40.324279] [ 40.324638] Memory state around the buggy address: [ 40.325416] fff00000c1bb3b00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 40.326297] fff00000c1bb3b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 40.327151] >fff00000c1bb3c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.327984] ^ [ 40.328532] fff00000c1bb3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.329376] fff00000c1bb3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.330181] ================================================================== [ 40.138340] ================================================================== [ 40.139178] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc8 [ 40.140120] Write of size 8 at addr fff00000c1bb3c08 by task kunit_try_catch/250 [ 40.140996] [ 40.141419] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 40.142972] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.143693] Hardware name: linux,dummy-virt (DT) [ 40.144416] Call trace: [ 40.144884] show_stack+0x20/0x38 (C) [ 40.145696] dump_stack_lvl+0x8c/0xd0 [ 40.146614] print_report+0x118/0x5e0 [ 40.147284] kasan_report+0xc8/0x118 [ 40.147877] kasan_check_range+0x100/0x1a8 [ 40.148560] __kasan_check_write+0x20/0x30 [ 40.149422] kasan_bitops_modify.constprop.0+0x2b4/0xbc8 [ 40.150144] kasan_bitops_generic+0x110/0x1c8 [ 40.150778] kunit_try_run_case+0x14c/0x3d0 [ 40.151399] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.152362] kthread+0x24c/0x2d0 [ 40.152933] ret_from_fork+0x10/0x20 [ 40.153891] [ 40.154237] Allocated by task 250: [ 40.154899] kasan_save_stack+0x3c/0x68 [ 40.155457] kasan_save_track+0x20/0x40 [ 40.156084] kasan_save_alloc_info+0x40/0x58 [ 40.156740] __kasan_kmalloc+0xd4/0xd8 [ 40.157321] __kmalloc_cache_noprof+0x15c/0x3c8 [ 40.158267] kasan_bitops_generic+0xa0/0x1c8 [ 40.158890] kunit_try_run_case+0x14c/0x3d0 [ 40.159489] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.160205] kthread+0x24c/0x2d0 [ 40.160817] ret_from_fork+0x10/0x20 [ 40.161723] [ 40.162354] The buggy address belongs to the object at fff00000c1bb3c00 [ 40.162354] which belongs to the cache kmalloc-16 of size 16 [ 40.164226] The buggy address is located 8 bytes inside of [ 40.164226] allocated 9-byte region [fff00000c1bb3c00, fff00000c1bb3c09) [ 40.166152] [ 40.166843] The buggy address belongs to the physical page: [ 40.167511] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bb3 [ 40.168378] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 40.169142] page_type: f5(slab) [ 40.169705] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 40.170380] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 40.171273] page dumped because: kasan: bad access detected [ 40.172152] [ 40.172518] Memory state around the buggy address: [ 40.173129] fff00000c1bb3b00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 40.174351] fff00000c1bb3b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 40.175255] >fff00000c1bb3c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.176028] ^ [ 40.176566] fff00000c1bb3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.177328] fff00000c1bb3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.178517] ================================================================== [ 40.332406] ================================================================== [ 40.333130] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa28/0xbc8 [ 40.333874] Read of size 8 at addr fff00000c1bb3c08 by task kunit_try_catch/250 [ 40.335821] [ 40.336488] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 40.337553] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.338079] Hardware name: linux,dummy-virt (DT) [ 40.338727] Call trace: [ 40.339157] show_stack+0x20/0x38 (C) [ 40.339728] dump_stack_lvl+0x8c/0xd0 [ 40.340383] print_report+0x118/0x5e0 [ 40.340965] kasan_report+0xc8/0x118 [ 40.341593] __asan_report_load8_noabort+0x20/0x30 [ 40.342207] kasan_bitops_modify.constprop.0+0xa28/0xbc8 [ 40.342983] kasan_bitops_generic+0x110/0x1c8 [ 40.343698] kunit_try_run_case+0x14c/0x3d0 [ 40.344250] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.345069] kthread+0x24c/0x2d0 [ 40.345607] ret_from_fork+0x10/0x20 [ 40.346155] [ 40.346485] Allocated by task 250: [ 40.346954] kasan_save_stack+0x3c/0x68 [ 40.347576] kasan_save_track+0x20/0x40 [ 40.348174] kasan_save_alloc_info+0x40/0x58 [ 40.348805] __kasan_kmalloc+0xd4/0xd8 [ 40.349393] __kmalloc_cache_noprof+0x15c/0x3c8 [ 40.349956] kasan_bitops_generic+0xa0/0x1c8 [ 40.350595] kunit_try_run_case+0x14c/0x3d0 [ 40.351244] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.351920] kthread+0x24c/0x2d0 [ 40.352480] ret_from_fork+0x10/0x20 [ 40.353012] [ 40.353306] The buggy address belongs to the object at fff00000c1bb3c00 [ 40.353306] which belongs to the cache kmalloc-16 of size 16 [ 40.354464] The buggy address is located 8 bytes inside of [ 40.354464] allocated 9-byte region [fff00000c1bb3c00, fff00000c1bb3c09) [ 40.355595] [ 40.355951] The buggy address belongs to the physical page: [ 40.356657] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bb3 [ 40.357543] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 40.358381] page_type: f5(slab) [ 40.358928] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 40.359689] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 40.360625] page dumped because: kasan: bad access detected [ 40.361223] [ 40.361595] Memory state around the buggy address: [ 40.362087] fff00000c1bb3b00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 40.362937] fff00000c1bb3b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 40.363685] >fff00000c1bb3c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.364490] ^ [ 40.364991] fff00000c1bb3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.365787] fff00000c1bb3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.366507] ================================================================== [ 40.180999] ================================================================== [ 40.181779] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc8 [ 40.182429] Write of size 8 at addr fff00000c1bb3c08 by task kunit_try_catch/250 [ 40.183739] [ 40.184126] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 40.185207] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.185828] Hardware name: linux,dummy-virt (DT) [ 40.186639] Call trace: [ 40.187043] show_stack+0x20/0x38 (C) [ 40.187737] dump_stack_lvl+0x8c/0xd0 [ 40.188372] print_report+0x118/0x5e0 [ 40.188982] kasan_report+0xc8/0x118 [ 40.189945] kasan_check_range+0x100/0x1a8 [ 40.190732] __kasan_check_write+0x20/0x30 [ 40.191356] kasan_bitops_modify.constprop.0+0x320/0xbc8 [ 40.192222] kasan_bitops_generic+0x110/0x1c8 [ 40.192885] kunit_try_run_case+0x14c/0x3d0 [ 40.193894] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.194670] kthread+0x24c/0x2d0 [ 40.195199] ret_from_fork+0x10/0x20 [ 40.195755] [ 40.196108] Allocated by task 250: [ 40.196671] kasan_save_stack+0x3c/0x68 [ 40.197218] kasan_save_track+0x20/0x40 [ 40.198111] kasan_save_alloc_info+0x40/0x58 [ 40.198695] __kasan_kmalloc+0xd4/0xd8 [ 40.199217] __kmalloc_cache_noprof+0x15c/0x3c8 [ 40.199821] kasan_bitops_generic+0xa0/0x1c8 [ 40.200479] kunit_try_run_case+0x14c/0x3d0 [ 40.201021] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.202231] kthread+0x24c/0x2d0 [ 40.203175] ret_from_fork+0x10/0x20 [ 40.203568] [ 40.203931] The buggy address belongs to the object at fff00000c1bb3c00 [ 40.203931] which belongs to the cache kmalloc-16 of size 16 [ 40.205256] The buggy address is located 8 bytes inside of [ 40.205256] allocated 9-byte region [fff00000c1bb3c00, fff00000c1bb3c09) [ 40.206420] [ 40.207162] The buggy address belongs to the physical page: [ 40.208086] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bb3 [ 40.209183] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 40.210342] page_type: f5(slab) [ 40.210811] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 40.211677] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 40.212643] page dumped because: kasan: bad access detected [ 40.213393] [ 40.214278] Memory state around the buggy address: [ 40.214906] fff00000c1bb3b00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 40.215836] fff00000c1bb3b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 40.216715] >fff00000c1bb3c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.217550] ^ [ 40.218014] fff00000c1bb3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.218776] fff00000c1bb3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.219903] ================================================================== [ 40.096291] ================================================================== [ 40.096924] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa88/0xbc8 [ 40.098829] Read of size 8 at addr fff00000c1bb3c08 by task kunit_try_catch/250 [ 40.099649] [ 40.101456] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 40.102550] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.103259] Hardware name: linux,dummy-virt (DT) [ 40.104015] Call trace: [ 40.104645] show_stack+0x20/0x38 (C) [ 40.105423] dump_stack_lvl+0x8c/0xd0 [ 40.106352] print_report+0x118/0x5e0 [ 40.106884] kasan_report+0xc8/0x118 [ 40.107496] __asan_report_load8_noabort+0x20/0x30 [ 40.108118] kasan_bitops_modify.constprop.0+0xa88/0xbc8 [ 40.108895] kasan_bitops_generic+0x110/0x1c8 [ 40.109862] kunit_try_run_case+0x14c/0x3d0 [ 40.110482] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.111180] kthread+0x24c/0x2d0 [ 40.111718] ret_from_fork+0x10/0x20 [ 40.112252] [ 40.112618] Allocated by task 250: [ 40.113150] kasan_save_stack+0x3c/0x68 [ 40.114050] kasan_save_track+0x20/0x40 [ 40.114608] kasan_save_alloc_info+0x40/0x58 [ 40.115248] __kasan_kmalloc+0xd4/0xd8 [ 40.115827] __kmalloc_cache_noprof+0x15c/0x3c8 [ 40.116422] kasan_bitops_generic+0xa0/0x1c8 [ 40.117004] kunit_try_run_case+0x14c/0x3d0 [ 40.118158] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.118727] kthread+0x24c/0x2d0 [ 40.119117] ret_from_fork+0x10/0x20 [ 40.119583] [ 40.119936] The buggy address belongs to the object at fff00000c1bb3c00 [ 40.119936] which belongs to the cache kmalloc-16 of size 16 [ 40.121555] The buggy address is located 8 bytes inside of [ 40.121555] allocated 9-byte region [fff00000c1bb3c00, fff00000c1bb3c09) [ 40.123227] [ 40.123600] The buggy address belongs to the physical page: [ 40.124297] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bb3 [ 40.125102] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 40.125773] page_type: f5(slab) [ 40.127063] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 40.128016] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 40.128775] page dumped because: kasan: bad access detected [ 40.129538] [ 40.129845] Memory state around the buggy address: [ 40.130539] fff00000c1bb3b00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 40.131358] fff00000c1bb3b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 40.132565] >fff00000c1bb3c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.133602] ^ [ 40.134254] fff00000c1bb3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.135190] fff00000c1bb3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.135988] ================================================================== [ 40.054608] ================================================================== [ 40.055375] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc8 [ 40.056366] Write of size 8 at addr fff00000c1bb3c08 by task kunit_try_catch/250 [ 40.057297] [ 40.058002] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 40.059158] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.059971] Hardware name: linux,dummy-virt (DT) [ 40.060513] Call trace: [ 40.060835] show_stack+0x20/0x38 (C) [ 40.062001] dump_stack_lvl+0x8c/0xd0 [ 40.062679] print_report+0x118/0x5e0 [ 40.063251] kasan_report+0xc8/0x118 [ 40.063721] kasan_check_range+0x100/0x1a8 [ 40.064453] __kasan_check_write+0x20/0x30 [ 40.065164] kasan_bitops_modify.constprop.0+0x1dc/0xbc8 [ 40.066288] kasan_bitops_generic+0x110/0x1c8 [ 40.066973] kunit_try_run_case+0x14c/0x3d0 [ 40.067630] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.068392] kthread+0x24c/0x2d0 [ 40.068908] ret_from_fork+0x10/0x20 [ 40.069993] [ 40.070367] Allocated by task 250: [ 40.070896] kasan_save_stack+0x3c/0x68 [ 40.071523] kasan_save_track+0x20/0x40 [ 40.072114] kasan_save_alloc_info+0x40/0x58 [ 40.072701] __kasan_kmalloc+0xd4/0xd8 [ 40.073329] __kmalloc_cache_noprof+0x15c/0x3c8 [ 40.073991] kasan_bitops_generic+0xa0/0x1c8 [ 40.075036] kunit_try_run_case+0x14c/0x3d0 [ 40.075681] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.076392] kthread+0x24c/0x2d0 [ 40.076903] ret_from_fork+0x10/0x20 [ 40.077738] [ 40.078607] The buggy address belongs to the object at fff00000c1bb3c00 [ 40.078607] which belongs to the cache kmalloc-16 of size 16 [ 40.080241] The buggy address is located 8 bytes inside of [ 40.080241] allocated 9-byte region [fff00000c1bb3c00, fff00000c1bb3c09) [ 40.081873] [ 40.082308] The buggy address belongs to the physical page: [ 40.083197] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bb3 [ 40.084097] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 40.084796] page_type: f5(slab) [ 40.085482] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 40.086488] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 40.087304] page dumped because: kasan: bad access detected [ 40.087907] [ 40.088267] Memory state around the buggy address: [ 40.088933] fff00000c1bb3b00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 40.090106] fff00000c1bb3b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 40.091123] >fff00000c1bb3c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.091939] ^ [ 40.092414] fff00000c1bb3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.093319] fff00000c1bb3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.094398] ==================================================================
[ 31.813126] ================================================================== [ 31.814001] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d6/0xd50 [ 31.816159] Write of size 8 at addr ffff888101a98528 by task kunit_try_catch/268 [ 31.817459] [ 31.817776] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 31.819085] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.819591] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.820545] Call Trace: [ 31.820998] <TASK> [ 31.821333] dump_stack_lvl+0x73/0xb0 [ 31.821799] print_report+0xd1/0x640 [ 31.823431] ? __virt_addr_valid+0x1db/0x2d0 [ 31.824325] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.824966] kasan_report+0x102/0x140 [ 31.825860] ? kasan_bitops_modify.constprop.0+0x2d6/0xd50 [ 31.826567] ? kasan_bitops_modify.constprop.0+0x2d6/0xd50 [ 31.827139] kasan_check_range+0x10c/0x1c0 [ 31.827564] __kasan_check_write+0x18/0x20 [ 31.828368] kasan_bitops_modify.constprop.0+0x2d6/0xd50 [ 31.829961] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 31.830501] ? __kmalloc_cache_noprof+0x184/0x410 [ 31.831253] ? trace_hardirqs_on+0x37/0xe0 [ 31.832349] ? kasan_bitops_generic+0x93/0x1c0 [ 31.833089] kasan_bitops_generic+0x117/0x1c0 [ 31.833655] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 31.834671] ? __pfx_read_tsc+0x10/0x10 [ 31.835374] ? ktime_get_ts64+0x84/0x230 [ 31.836184] kunit_try_run_case+0x1b3/0x490 [ 31.836463] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.837029] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.837467] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.838533] ? __kthread_parkme+0x82/0x160 [ 31.839292] ? preempt_count_sub+0x50/0x80 [ 31.840136] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.840885] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.841470] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.842110] kthread+0x257/0x310 [ 31.843038] ? __pfx_kthread+0x10/0x10 [ 31.844002] ret_from_fork+0x41/0x80 [ 31.844475] ? __pfx_kthread+0x10/0x10 [ 31.845049] ret_from_fork_asm+0x1a/0x30 [ 31.845729] </TASK> [ 31.846326] [ 31.846499] Allocated by task 268: [ 31.847148] kasan_save_stack+0x3d/0x60 [ 31.847840] kasan_save_track+0x18/0x40 [ 31.848357] kasan_save_alloc_info+0x3b/0x50 [ 31.849095] __kasan_kmalloc+0xb7/0xc0 [ 31.849640] __kmalloc_cache_noprof+0x184/0x410 [ 31.850118] kasan_bitops_generic+0x93/0x1c0 [ 31.850485] kunit_try_run_case+0x1b3/0x490 [ 31.851120] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.851776] kthread+0x257/0x310 [ 31.852391] ret_from_fork+0x41/0x80 [ 31.853158] ret_from_fork_asm+0x1a/0x30 [ 31.853686] [ 31.853864] The buggy address belongs to the object at ffff888101a98520 [ 31.853864] which belongs to the cache kmalloc-16 of size 16 [ 31.855399] The buggy address is located 8 bytes inside of [ 31.855399] allocated 9-byte region [ffff888101a98520, ffff888101a98529) [ 31.856267] [ 31.856661] The buggy address belongs to the physical page: [ 31.857508] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101a98 [ 31.858125] flags: 0x200000000000000(node=0|zone=2) [ 31.858749] page_type: f5(slab) [ 31.859541] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 31.860513] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 31.861837] page dumped because: kasan: bad access detected [ 31.862443] [ 31.862633] Memory state around the buggy address: [ 31.863670] ffff888101a98400: fa fb fc fc 00 01 fc fc 00 01 fc fc fa fb fc fc [ 31.864464] ffff888101a98480: 00 01 fc fc 00 01 fc fc fa fb fc fc fa fb fc fc [ 31.865235] >ffff888101a98500: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 31.866411] ^ [ 31.866736] ffff888101a98580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.868058] ffff888101a98600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.868902] ================================================================== [ 32.018347] ================================================================== [ 32.019269] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x548/0xd50 [ 32.019997] Write of size 8 at addr ffff888101a98528 by task kunit_try_catch/268 [ 32.022267] [ 32.022681] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 32.023937] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.024373] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 32.025131] Call Trace: [ 32.026075] <TASK> [ 32.026388] dump_stack_lvl+0x73/0xb0 [ 32.026770] print_report+0xd1/0x640 [ 32.027733] ? __virt_addr_valid+0x1db/0x2d0 [ 32.028503] ? kasan_complete_mode_report_info+0x2a/0x200 [ 32.029743] kasan_report+0x102/0x140 [ 32.030042] ? kasan_bitops_modify.constprop.0+0x548/0xd50 [ 32.030668] ? kasan_bitops_modify.constprop.0+0x548/0xd50 [ 32.031213] kasan_check_range+0x10c/0x1c0 [ 32.031937] __kasan_check_write+0x18/0x20 [ 32.032483] kasan_bitops_modify.constprop.0+0x548/0xd50 [ 32.033430] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 32.034593] ? __kmalloc_cache_noprof+0x184/0x410 [ 32.035093] ? trace_hardirqs_on+0x37/0xe0 [ 32.035652] ? kasan_bitops_generic+0x93/0x1c0 [ 32.036226] kasan_bitops_generic+0x117/0x1c0 [ 32.036760] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 32.037530] ? __pfx_read_tsc+0x10/0x10 [ 32.037934] ? ktime_get_ts64+0x84/0x230 [ 32.038779] kunit_try_run_case+0x1b3/0x490 [ 32.039111] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.039832] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 32.040347] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 32.040903] ? __kthread_parkme+0x82/0x160 [ 32.041635] ? preempt_count_sub+0x50/0x80 [ 32.042192] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.043136] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 32.043921] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.044532] kthread+0x257/0x310 [ 32.044996] ? __pfx_kthread+0x10/0x10 [ 32.045333] ret_from_fork+0x41/0x80 [ 32.046068] ? __pfx_kthread+0x10/0x10 [ 32.046492] ret_from_fork_asm+0x1a/0x30 [ 32.047072] </TASK> [ 32.047722] [ 32.048091] Allocated by task 268: [ 32.048333] kasan_save_stack+0x3d/0x60 [ 32.048951] kasan_save_track+0x18/0x40 [ 32.049352] kasan_save_alloc_info+0x3b/0x50 [ 32.050165] __kasan_kmalloc+0xb7/0xc0 [ 32.050502] __kmalloc_cache_noprof+0x184/0x410 [ 32.050830] kasan_bitops_generic+0x93/0x1c0 [ 32.051448] kunit_try_run_case+0x1b3/0x490 [ 32.052104] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.053370] kthread+0x257/0x310 [ 32.053785] ret_from_fork+0x41/0x80 [ 32.054123] ret_from_fork_asm+0x1a/0x30 [ 32.054600] [ 32.054779] The buggy address belongs to the object at ffff888101a98520 [ 32.054779] which belongs to the cache kmalloc-16 of size 16 [ 32.055938] The buggy address is located 8 bytes inside of [ 32.055938] allocated 9-byte region [ffff888101a98520, ffff888101a98529) [ 32.057034] [ 32.057189] The buggy address belongs to the physical page: [ 32.057515] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101a98 [ 32.058793] flags: 0x200000000000000(node=0|zone=2) [ 32.059415] page_type: f5(slab) [ 32.060020] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 32.060844] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 32.061279] page dumped because: kasan: bad access detected [ 32.061609] [ 32.062016] Memory state around the buggy address: [ 32.062883] ffff888101a98400: fa fb fc fc 00 01 fc fc 00 01 fc fc fa fb fc fc [ 32.063522] ffff888101a98480: 00 01 fc fc 00 01 fc fc fa fb fc fc fa fb fc fc [ 32.064076] >ffff888101a98500: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 32.064681] ^ [ 32.065400] ffff888101a98580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.066232] ffff888101a98600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.067212] ================================================================== [ 31.644669] ================================================================== [ 31.646266] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x102/0xd50 [ 31.647333] Write of size 8 at addr ffff888101a98528 by task kunit_try_catch/268 [ 31.648934] [ 31.649134] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 31.651591] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.652056] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.653558] Call Trace: [ 31.653896] <TASK> [ 31.654134] dump_stack_lvl+0x73/0xb0 [ 31.655038] print_report+0xd1/0x640 [ 31.655858] ? __virt_addr_valid+0x1db/0x2d0 [ 31.656269] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.657646] kasan_report+0x102/0x140 [ 31.658016] ? kasan_bitops_modify.constprop.0+0x102/0xd50 [ 31.658908] ? kasan_bitops_modify.constprop.0+0x102/0xd50 [ 31.659449] kasan_check_range+0x10c/0x1c0 [ 31.660733] __kasan_check_write+0x18/0x20 [ 31.661127] kasan_bitops_modify.constprop.0+0x102/0xd50 [ 31.662013] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 31.662740] ? __kmalloc_cache_noprof+0x184/0x410 [ 31.663170] ? trace_hardirqs_on+0x37/0xe0 [ 31.663552] ? kasan_bitops_generic+0x93/0x1c0 [ 31.664629] kasan_bitops_generic+0x117/0x1c0 [ 31.665572] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 31.666318] ? __pfx_read_tsc+0x10/0x10 [ 31.666669] ? ktime_get_ts64+0x84/0x230 [ 31.667387] kunit_try_run_case+0x1b3/0x490 [ 31.667976] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.668896] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.669919] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.670762] ? __kthread_parkme+0x82/0x160 [ 31.671194] ? preempt_count_sub+0x50/0x80 [ 31.671557] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.672120] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.673059] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.673861] kthread+0x257/0x310 [ 31.674523] ? __pfx_kthread+0x10/0x10 [ 31.674983] ret_from_fork+0x41/0x80 [ 31.675253] ? __pfx_kthread+0x10/0x10 [ 31.675732] ret_from_fork_asm+0x1a/0x30 [ 31.676177] </TASK> [ 31.676420] [ 31.676614] Allocated by task 268: [ 31.677849] kasan_save_stack+0x3d/0x60 [ 31.678578] kasan_save_track+0x18/0x40 [ 31.679224] kasan_save_alloc_info+0x3b/0x50 [ 31.680119] __kasan_kmalloc+0xb7/0xc0 [ 31.680990] __kmalloc_cache_noprof+0x184/0x410 [ 31.682327] kasan_bitops_generic+0x93/0x1c0 [ 31.682626] kunit_try_run_case+0x1b3/0x490 [ 31.684894] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.685239] kthread+0x257/0x310 [ 31.685459] ret_from_fork+0x41/0x80 [ 31.686542] ret_from_fork_asm+0x1a/0x30 [ 31.686828] [ 31.686963] The buggy address belongs to the object at ffff888101a98520 [ 31.686963] which belongs to the cache kmalloc-16 of size 16 [ 31.690888] The buggy address is located 8 bytes inside of [ 31.690888] allocated 9-byte region [ffff888101a98520, ffff888101a98529) [ 31.693549] [ 31.693688] The buggy address belongs to the physical page: [ 31.695576] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101a98 [ 31.696668] flags: 0x200000000000000(node=0|zone=2) [ 31.698110] page_type: f5(slab) [ 31.698632] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 31.700084] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 31.700909] page dumped because: kasan: bad access detected [ 31.701452] [ 31.702113] Memory state around the buggy address: [ 31.702520] ffff888101a98400: fa fb fc fc 00 01 fc fc 00 01 fc fc fa fb fc fc [ 31.703771] ffff888101a98480: 00 01 fc fc 00 01 fc fc fa fb fc fc fa fb fc fc [ 31.704452] >ffff888101a98500: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 31.705107] ^ [ 31.705554] ffff888101a98580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.707122] ffff888101a98600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.708031] ================================================================== [ 31.970136] ================================================================== [ 31.970838] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ad/0xd50 [ 31.972436] Write of size 8 at addr ffff888101a98528 by task kunit_try_catch/268 [ 31.973495] [ 31.973792] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 31.975006] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.975733] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.976413] Call Trace: [ 31.976903] <TASK> [ 31.977116] dump_stack_lvl+0x73/0xb0 [ 31.977476] print_report+0xd1/0x640 [ 31.978393] ? __virt_addr_valid+0x1db/0x2d0 [ 31.978862] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.979409] kasan_report+0x102/0x140 [ 31.979967] ? kasan_bitops_modify.constprop.0+0x4ad/0xd50 [ 31.980663] ? kasan_bitops_modify.constprop.0+0x4ad/0xd50 [ 31.981554] kasan_check_range+0x10c/0x1c0 [ 31.982203] __kasan_check_write+0x18/0x20 [ 31.982660] kasan_bitops_modify.constprop.0+0x4ad/0xd50 [ 31.983416] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 31.983899] ? __kmalloc_cache_noprof+0x184/0x410 [ 31.984461] ? trace_hardirqs_on+0x37/0xe0 [ 31.985664] ? kasan_bitops_generic+0x93/0x1c0 [ 31.986297] kasan_bitops_generic+0x117/0x1c0 [ 31.987074] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 31.987939] ? __pfx_read_tsc+0x10/0x10 [ 31.988398] ? ktime_get_ts64+0x84/0x230 [ 31.989113] kunit_try_run_case+0x1b3/0x490 [ 31.989883] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.990682] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.991347] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.991995] ? __kthread_parkme+0x82/0x160 [ 31.992437] ? preempt_count_sub+0x50/0x80 [ 31.992840] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.993298] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.994389] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.994981] kthread+0x257/0x310 [ 31.995431] ? __pfx_kthread+0x10/0x10 [ 31.995838] ret_from_fork+0x41/0x80 [ 31.996413] ? __pfx_kthread+0x10/0x10 [ 31.996835] ret_from_fork_asm+0x1a/0x30 [ 31.997632] </TASK> [ 31.998018] [ 31.998375] Allocated by task 268: [ 31.998825] kasan_save_stack+0x3d/0x60 [ 31.999250] kasan_save_track+0x18/0x40 [ 31.999787] kasan_save_alloc_info+0x3b/0x50 [ 32.000317] __kasan_kmalloc+0xb7/0xc0 [ 32.000827] __kmalloc_cache_noprof+0x184/0x410 [ 32.001301] kasan_bitops_generic+0x93/0x1c0 [ 32.001635] kunit_try_run_case+0x1b3/0x490 [ 32.002186] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.002664] kthread+0x257/0x310 [ 32.003495] ret_from_fork+0x41/0x80 [ 32.003947] ret_from_fork_asm+0x1a/0x30 [ 32.004473] [ 32.004718] The buggy address belongs to the object at ffff888101a98520 [ 32.004718] which belongs to the cache kmalloc-16 of size 16 [ 32.005891] The buggy address is located 8 bytes inside of [ 32.005891] allocated 9-byte region [ffff888101a98520, ffff888101a98529) [ 32.006753] [ 32.007013] The buggy address belongs to the physical page: [ 32.007562] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101a98 [ 32.008854] flags: 0x200000000000000(node=0|zone=2) [ 32.009536] page_type: f5(slab) [ 32.009884] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 32.010748] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 32.011752] page dumped because: kasan: bad access detected [ 32.012497] [ 32.012807] Memory state around the buggy address: [ 32.013220] ffff888101a98400: fa fb fc fc 00 01 fc fc 00 01 fc fc fa fb fc fc [ 32.013969] ffff888101a98480: 00 01 fc fc 00 01 fc fc fa fb fc fc fa fb fc fc [ 32.014729] >ffff888101a98500: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 32.015249] ^ [ 32.015758] ffff888101a98580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.016395] ffff888101a98600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.017414] ================================================================== [ 31.919655] ================================================================== [ 31.920443] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40f/0xd50 [ 31.921750] Write of size 8 at addr ffff888101a98528 by task kunit_try_catch/268 [ 31.922616] [ 31.922917] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 31.924536] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.925871] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.926932] Call Trace: [ 31.927190] <TASK> [ 31.927441] dump_stack_lvl+0x73/0xb0 [ 31.927904] print_report+0xd1/0x640 [ 31.928187] ? __virt_addr_valid+0x1db/0x2d0 [ 31.928790] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.929527] kasan_report+0x102/0x140 [ 31.930098] ? kasan_bitops_modify.constprop.0+0x40f/0xd50 [ 31.930792] ? kasan_bitops_modify.constprop.0+0x40f/0xd50 [ 31.931218] kasan_check_range+0x10c/0x1c0 [ 31.931642] __kasan_check_write+0x18/0x20 [ 31.932196] kasan_bitops_modify.constprop.0+0x40f/0xd50 [ 31.932884] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 31.933829] ? __kmalloc_cache_noprof+0x184/0x410 [ 31.934225] ? trace_hardirqs_on+0x37/0xe0 [ 31.934835] ? kasan_bitops_generic+0x93/0x1c0 [ 31.935423] kasan_bitops_generic+0x117/0x1c0 [ 31.935760] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 31.936361] ? __pfx_read_tsc+0x10/0x10 [ 31.936845] ? ktime_get_ts64+0x84/0x230 [ 31.937450] kunit_try_run_case+0x1b3/0x490 [ 31.937913] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.938306] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.938627] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.939099] ? __kthread_parkme+0x82/0x160 [ 31.939690] ? preempt_count_sub+0x50/0x80 [ 31.940247] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.940710] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.941227] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.941598] kthread+0x257/0x310 [ 31.942443] ? __pfx_kthread+0x10/0x10 [ 31.943008] ret_from_fork+0x41/0x80 [ 31.943284] ? __pfx_kthread+0x10/0x10 [ 31.943560] ret_from_fork_asm+0x1a/0x30 [ 31.944174] </TASK> [ 31.944538] [ 31.944788] Allocated by task 268: [ 31.945310] kasan_save_stack+0x3d/0x60 [ 31.946231] kasan_save_track+0x18/0x40 [ 31.946508] kasan_save_alloc_info+0x3b/0x50 [ 31.946951] __kasan_kmalloc+0xb7/0xc0 [ 31.947583] __kmalloc_cache_noprof+0x184/0x410 [ 31.948114] kasan_bitops_generic+0x93/0x1c0 [ 31.948390] kunit_try_run_case+0x1b3/0x490 [ 31.951195] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.952286] kthread+0x257/0x310 [ 31.952504] ret_from_fork+0x41/0x80 [ 31.952782] ret_from_fork_asm+0x1a/0x30 [ 31.953023] [ 31.953154] The buggy address belongs to the object at ffff888101a98520 [ 31.953154] which belongs to the cache kmalloc-16 of size 16 [ 31.953991] The buggy address is located 8 bytes inside of [ 31.953991] allocated 9-byte region [ffff888101a98520, ffff888101a98529) [ 31.954613] [ 31.954823] The buggy address belongs to the physical page: [ 31.955449] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101a98 [ 31.956445] flags: 0x200000000000000(node=0|zone=2) [ 31.959064] page_type: f5(slab) [ 31.959304] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 31.959683] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 31.960077] page dumped because: kasan: bad access detected [ 31.960308] [ 31.960404] Memory state around the buggy address: [ 31.960600] ffff888101a98400: fa fb fc fc 00 01 fc fc 00 01 fc fc fa fb fc fc [ 31.961887] ffff888101a98480: 00 01 fc fc 00 01 fc fc fa fb fc fc fa fb fc fc [ 31.963562] >ffff888101a98500: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 31.966419] ^ [ 31.967315] ffff888101a98580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.968650] ffff888101a98600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.969322] ================================================================== [ 31.869945] ================================================================== [ 31.870921] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x374/0xd50 [ 31.871572] Write of size 8 at addr ffff888101a98528 by task kunit_try_catch/268 [ 31.872435] [ 31.872627] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 31.873561] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.873901] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.875111] Call Trace: [ 31.875654] <TASK> [ 31.875910] dump_stack_lvl+0x73/0xb0 [ 31.876191] print_report+0xd1/0x640 [ 31.876651] ? __virt_addr_valid+0x1db/0x2d0 [ 31.877292] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.877929] kasan_report+0x102/0x140 [ 31.878340] ? kasan_bitops_modify.constprop.0+0x374/0xd50 [ 31.879245] ? kasan_bitops_modify.constprop.0+0x374/0xd50 [ 31.879674] kasan_check_range+0x10c/0x1c0 [ 31.880004] __kasan_check_write+0x18/0x20 [ 31.880934] kasan_bitops_modify.constprop.0+0x374/0xd50 [ 31.881975] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 31.882676] ? __kmalloc_cache_noprof+0x184/0x410 [ 31.883033] ? trace_hardirqs_on+0x37/0xe0 [ 31.883330] ? kasan_bitops_generic+0x93/0x1c0 [ 31.884024] kasan_bitops_generic+0x117/0x1c0 [ 31.884581] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 31.885313] ? __pfx_read_tsc+0x10/0x10 [ 31.885600] ? ktime_get_ts64+0x84/0x230 [ 31.886540] kunit_try_run_case+0x1b3/0x490 [ 31.887252] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.887737] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.888652] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.889108] ? __kthread_parkme+0x82/0x160 [ 31.889619] ? preempt_count_sub+0x50/0x80 [ 31.890083] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.890974] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.891854] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.892897] kthread+0x257/0x310 [ 31.893279] ? __pfx_kthread+0x10/0x10 [ 31.893966] ret_from_fork+0x41/0x80 [ 31.894813] ? __pfx_kthread+0x10/0x10 [ 31.895554] ret_from_fork_asm+0x1a/0x30 [ 31.896246] </TASK> [ 31.897023] [ 31.897295] Allocated by task 268: [ 31.897515] kasan_save_stack+0x3d/0x60 [ 31.898123] kasan_save_track+0x18/0x40 [ 31.898562] kasan_save_alloc_info+0x3b/0x50 [ 31.898998] __kasan_kmalloc+0xb7/0xc0 [ 31.899373] __kmalloc_cache_noprof+0x184/0x410 [ 31.900665] kasan_bitops_generic+0x93/0x1c0 [ 31.901458] kunit_try_run_case+0x1b3/0x490 [ 31.902169] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.902741] kthread+0x257/0x310 [ 31.903501] ret_from_fork+0x41/0x80 [ 31.903898] ret_from_fork_asm+0x1a/0x30 [ 31.904936] [ 31.905229] The buggy address belongs to the object at ffff888101a98520 [ 31.905229] which belongs to the cache kmalloc-16 of size 16 [ 31.906254] The buggy address is located 8 bytes inside of [ 31.906254] allocated 9-byte region [ffff888101a98520, ffff888101a98529) [ 31.907649] [ 31.907868] The buggy address belongs to the physical page: [ 31.908190] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101a98 [ 31.909379] flags: 0x200000000000000(node=0|zone=2) [ 31.909861] page_type: f5(slab) [ 31.910368] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 31.911030] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 31.912055] page dumped because: kasan: bad access detected [ 31.912742] [ 31.912959] Memory state around the buggy address: [ 31.913800] ffff888101a98400: fa fb fc fc 00 01 fc fc 00 01 fc fc fa fb fc fc [ 31.914324] ffff888101a98480: 00 01 fc fc 00 01 fc fc fa fb fc fc fa fb fc fc [ 31.915347] >ffff888101a98500: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 31.916045] ^ [ 31.916428] ffff888101a98580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.917594] ffff888101a98600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.918280] ================================================================== [ 31.709114] ================================================================== [ 31.710261] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19d/0xd50 [ 31.710990] Write of size 8 at addr ffff888101a98528 by task kunit_try_catch/268 [ 31.711879] [ 31.712717] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 31.713833] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.714241] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.715361] Call Trace: [ 31.715981] <TASK> [ 31.716539] dump_stack_lvl+0x73/0xb0 [ 31.717919] print_report+0xd1/0x640 [ 31.718313] ? __virt_addr_valid+0x1db/0x2d0 [ 31.719151] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.720031] kasan_report+0x102/0x140 [ 31.720746] ? kasan_bitops_modify.constprop.0+0x19d/0xd50 [ 31.721314] ? kasan_bitops_modify.constprop.0+0x19d/0xd50 [ 31.722589] kasan_check_range+0x10c/0x1c0 [ 31.723002] __kasan_check_write+0x18/0x20 [ 31.724088] kasan_bitops_modify.constprop.0+0x19d/0xd50 [ 31.724888] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 31.725769] ? __kmalloc_cache_noprof+0x184/0x410 [ 31.726145] ? trace_hardirqs_on+0x37/0xe0 [ 31.727185] ? kasan_bitops_generic+0x93/0x1c0 [ 31.727655] kasan_bitops_generic+0x117/0x1c0 [ 31.728467] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 31.729123] ? __pfx_read_tsc+0x10/0x10 [ 31.729646] ? ktime_get_ts64+0x84/0x230 [ 31.730109] kunit_try_run_case+0x1b3/0x490 [ 31.731168] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.731601] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.732024] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.732494] ? __kthread_parkme+0x82/0x160 [ 31.733402] ? preempt_count_sub+0x50/0x80 [ 31.734037] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.734729] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.735501] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.736381] kthread+0x257/0x310 [ 31.736747] ? __pfx_kthread+0x10/0x10 [ 31.737328] ret_from_fork+0x41/0x80 [ 31.737877] ? __pfx_kthread+0x10/0x10 [ 31.738452] ret_from_fork_asm+0x1a/0x30 [ 31.739036] </TASK> [ 31.739357] [ 31.739662] Allocated by task 268: [ 31.740126] kasan_save_stack+0x3d/0x60 [ 31.740931] kasan_save_track+0x18/0x40 [ 31.741384] kasan_save_alloc_info+0x3b/0x50 [ 31.742078] __kasan_kmalloc+0xb7/0xc0 [ 31.742575] __kmalloc_cache_noprof+0x184/0x410 [ 31.743083] kasan_bitops_generic+0x93/0x1c0 [ 31.743759] kunit_try_run_case+0x1b3/0x490 [ 31.744622] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.745092] kthread+0x257/0x310 [ 31.745656] ret_from_fork+0x41/0x80 [ 31.745999] ret_from_fork_asm+0x1a/0x30 [ 31.746498] [ 31.746830] The buggy address belongs to the object at ffff888101a98520 [ 31.746830] which belongs to the cache kmalloc-16 of size 16 [ 31.748059] The buggy address is located 8 bytes inside of [ 31.748059] allocated 9-byte region [ffff888101a98520, ffff888101a98529) [ 31.748966] [ 31.749322] The buggy address belongs to the physical page: [ 31.750013] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101a98 [ 31.750616] flags: 0x200000000000000(node=0|zone=2) [ 31.751059] page_type: f5(slab) [ 31.751584] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 31.752783] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 31.753605] page dumped because: kasan: bad access detected [ 31.754346] [ 31.754791] Memory state around the buggy address: [ 31.755644] ffff888101a98400: fa fb fc fc 00 01 fc fc 00 01 fc fc fa fb fc fc [ 31.756323] ffff888101a98480: 00 01 fc fc 00 01 fc fc fa fb fc fc fa fb fc fc [ 31.757244] >ffff888101a98500: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 31.757957] ^ [ 31.758403] ffff888101a98580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.759423] ffff888101a98600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.760318] ================================================================== [ 31.761263] ================================================================== [ 31.763029] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23b/0xd50 [ 31.763971] Write of size 8 at addr ffff888101a98528 by task kunit_try_catch/268 [ 31.764986] [ 31.766066] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 31.767923] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.768247] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.769764] Call Trace: [ 31.770324] <TASK> [ 31.770581] dump_stack_lvl+0x73/0xb0 [ 31.770984] print_report+0xd1/0x640 [ 31.771442] ? __virt_addr_valid+0x1db/0x2d0 [ 31.772040] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.772842] kasan_report+0x102/0x140 [ 31.773392] ? kasan_bitops_modify.constprop.0+0x23b/0xd50 [ 31.774029] ? kasan_bitops_modify.constprop.0+0x23b/0xd50 [ 31.774984] kasan_check_range+0x10c/0x1c0 [ 31.775477] __kasan_check_write+0x18/0x20 [ 31.776082] kasan_bitops_modify.constprop.0+0x23b/0xd50 [ 31.776603] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 31.777381] ? __kmalloc_cache_noprof+0x184/0x410 [ 31.777964] ? trace_hardirqs_on+0x37/0xe0 [ 31.778614] ? kasan_bitops_generic+0x93/0x1c0 [ 31.779379] kasan_bitops_generic+0x117/0x1c0 [ 31.779988] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 31.780461] ? __pfx_read_tsc+0x10/0x10 [ 31.781317] ? ktime_get_ts64+0x84/0x230 [ 31.781833] kunit_try_run_case+0x1b3/0x490 [ 31.782254] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.782935] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.783780] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.784291] ? __kthread_parkme+0x82/0x160 [ 31.784972] ? preempt_count_sub+0x50/0x80 [ 31.785426] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.786063] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.786902] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.787561] kthread+0x257/0x310 [ 31.787938] ? __pfx_kthread+0x10/0x10 [ 31.788654] ret_from_fork+0x41/0x80 [ 31.789208] ? __pfx_kthread+0x10/0x10 [ 31.789897] ret_from_fork_asm+0x1a/0x30 [ 31.790393] </TASK> [ 31.790723] [ 31.791042] Allocated by task 268: [ 31.791336] kasan_save_stack+0x3d/0x60 [ 31.791987] kasan_save_track+0x18/0x40 [ 31.792550] kasan_save_alloc_info+0x3b/0x50 [ 31.793174] __kasan_kmalloc+0xb7/0xc0 [ 31.793460] __kmalloc_cache_noprof+0x184/0x410 [ 31.793884] kasan_bitops_generic+0x93/0x1c0 [ 31.794474] kunit_try_run_case+0x1b3/0x490 [ 31.794972] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.795566] kthread+0x257/0x310 [ 31.796088] ret_from_fork+0x41/0x80 [ 31.796742] ret_from_fork_asm+0x1a/0x30 [ 31.797232] [ 31.797621] The buggy address belongs to the object at ffff888101a98520 [ 31.797621] which belongs to the cache kmalloc-16 of size 16 [ 31.798663] The buggy address is located 8 bytes inside of [ 31.798663] allocated 9-byte region [ffff888101a98520, ffff888101a98529) [ 31.800051] [ 31.800206] The buggy address belongs to the physical page: [ 31.800794] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101a98 [ 31.802368] flags: 0x200000000000000(node=0|zone=2) [ 31.802941] page_type: f5(slab) [ 31.803663] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 31.804626] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 31.805905] page dumped because: kasan: bad access detected [ 31.806551] [ 31.806821] Memory state around the buggy address: [ 31.807588] ffff888101a98400: fa fb fc fc 00 01 fc fc 00 01 fc fc fa fb fc fc [ 31.808337] ffff888101a98480: 00 01 fc fc 00 01 fc fc fa fb fc fc fa fb fc fc [ 31.809671] >ffff888101a98500: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 31.810251] ^ [ 31.810711] ffff888101a98580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.811338] ffff888101a98600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.812067] ==================================================================