Date
Nov. 20, 2024, 6:35 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 40.404573] ================================================================== [ 40.406187] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa08/0xbc8 [ 40.407183] Read of size 8 at addr fff00000c1bb3c08 by task kunit_try_catch/250 [ 40.407952] [ 40.408355] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 40.410107] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.410693] Hardware name: linux,dummy-virt (DT) [ 40.411331] Call trace: [ 40.411776] show_stack+0x20/0x38 (C) [ 40.412369] dump_stack_lvl+0x8c/0xd0 [ 40.412868] print_report+0x118/0x5e0 [ 40.413482] kasan_report+0xc8/0x118 [ 40.414057] __asan_report_load8_noabort+0x20/0x30 [ 40.414702] kasan_bitops_test_and_modify.constprop.0+0xa08/0xbc8 [ 40.415600] kasan_bitops_generic+0x11c/0x1c8 [ 40.416133] kunit_try_run_case+0x14c/0x3d0 [ 40.416814] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.417485] kthread+0x24c/0x2d0 [ 40.418030] ret_from_fork+0x10/0x20 [ 40.418634] [ 40.418930] Allocated by task 250: [ 40.419421] kasan_save_stack+0x3c/0x68 [ 40.420025] kasan_save_track+0x20/0x40 [ 40.420586] kasan_save_alloc_info+0x40/0x58 [ 40.421131] __kasan_kmalloc+0xd4/0xd8 [ 40.421722] __kmalloc_cache_noprof+0x15c/0x3c8 [ 40.422347] kasan_bitops_generic+0xa0/0x1c8 [ 40.423082] kunit_try_run_case+0x14c/0x3d0 [ 40.423692] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.424407] kthread+0x24c/0x2d0 [ 40.424958] ret_from_fork+0x10/0x20 [ 40.425522] [ 40.425875] The buggy address belongs to the object at fff00000c1bb3c00 [ 40.425875] which belongs to the cache kmalloc-16 of size 16 [ 40.426973] The buggy address is located 8 bytes inside of [ 40.426973] allocated 9-byte region [fff00000c1bb3c00, fff00000c1bb3c09) [ 40.428160] [ 40.428532] The buggy address belongs to the physical page: [ 40.429162] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bb3 [ 40.429999] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 40.430793] page_type: f5(slab) [ 40.431291] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 40.432116] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 40.432901] page dumped because: kasan: bad access detected [ 40.433609] [ 40.433950] Memory state around the buggy address: [ 40.434510] fff00000c1bb3b00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 40.435302] fff00000c1bb3b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 40.436178] >fff00000c1bb3c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.436970] ^ [ 40.437521] fff00000c1bb3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.438251] fff00000c1bb3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.439106] ================================================================== [ 40.661116] ================================================================== [ 40.661814] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa8c/0xbc8 [ 40.662729] Read of size 8 at addr fff00000c1bb3c08 by task kunit_try_catch/250 [ 40.664087] [ 40.664479] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 40.665400] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.666000] Hardware name: linux,dummy-virt (DT) [ 40.666621] Call trace: [ 40.666969] show_stack+0x20/0x38 (C) [ 40.667603] dump_stack_lvl+0x8c/0xd0 [ 40.668167] print_report+0x118/0x5e0 [ 40.668744] kasan_report+0xc8/0x118 [ 40.669236] __asan_report_load8_noabort+0x20/0x30 [ 40.669929] kasan_bitops_test_and_modify.constprop.0+0xa8c/0xbc8 [ 40.670586] kasan_bitops_generic+0x11c/0x1c8 [ 40.671231] kunit_try_run_case+0x14c/0x3d0 [ 40.671831] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.672592] kthread+0x24c/0x2d0 [ 40.673134] ret_from_fork+0x10/0x20 [ 40.673684] [ 40.674002] Allocated by task 250: [ 40.674554] kasan_save_stack+0x3c/0x68 [ 40.675093] kasan_save_track+0x20/0x40 [ 40.675635] kasan_save_alloc_info+0x40/0x58 [ 40.676289] __kasan_kmalloc+0xd4/0xd8 [ 40.676871] __kmalloc_cache_noprof+0x15c/0x3c8 [ 40.677494] kasan_bitops_generic+0xa0/0x1c8 [ 40.678096] kunit_try_run_case+0x14c/0x3d0 [ 40.678734] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.679462] kthread+0x24c/0x2d0 [ 40.679997] ret_from_fork+0x10/0x20 [ 40.680596] [ 40.680943] The buggy address belongs to the object at fff00000c1bb3c00 [ 40.680943] which belongs to the cache kmalloc-16 of size 16 [ 40.682023] The buggy address is located 8 bytes inside of [ 40.682023] allocated 9-byte region [fff00000c1bb3c00, fff00000c1bb3c09) [ 40.683331] [ 40.683706] The buggy address belongs to the physical page: [ 40.684272] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bb3 [ 40.685177] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 40.685977] page_type: f5(slab) [ 40.686514] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 40.687272] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 40.688162] page dumped because: kasan: bad access detected [ 40.688797] [ 40.689149] Memory state around the buggy address: [ 40.689687] fff00000c1bb3b00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 40.690526] fff00000c1bb3b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 40.691282] >fff00000c1bb3c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.692027] ^ [ 40.692588] fff00000c1bb3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.693316] fff00000c1bb3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.694083] ================================================================== [ 40.478582] ================================================================== [ 40.479367] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa50/0xbc8 [ 40.481035] Read of size 8 at addr fff00000c1bb3c08 by task kunit_try_catch/250 [ 40.481769] [ 40.482165] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 40.483314] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.484416] Hardware name: linux,dummy-virt (DT) [ 40.485234] Call trace: [ 40.485885] show_stack+0x20/0x38 (C) [ 40.486650] dump_stack_lvl+0x8c/0xd0 [ 40.487361] print_report+0x118/0x5e0 [ 40.488080] kasan_report+0xc8/0x118 [ 40.488799] __asan_report_load8_noabort+0x20/0x30 [ 40.489600] kasan_bitops_test_and_modify.constprop.0+0xa50/0xbc8 [ 40.490491] kasan_bitops_generic+0x11c/0x1c8 [ 40.491070] kunit_try_run_case+0x14c/0x3d0 [ 40.491653] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.492313] kthread+0x24c/0x2d0 [ 40.492898] ret_from_fork+0x10/0x20 [ 40.493504] [ 40.493860] Allocated by task 250: [ 40.494350] kasan_save_stack+0x3c/0x68 [ 40.495020] kasan_save_track+0x20/0x40 [ 40.495560] kasan_save_alloc_info+0x40/0x58 [ 40.496101] __kasan_kmalloc+0xd4/0xd8 [ 40.496674] __kmalloc_cache_noprof+0x15c/0x3c8 [ 40.497208] kasan_bitops_generic+0xa0/0x1c8 [ 40.497848] kunit_try_run_case+0x14c/0x3d0 [ 40.498424] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.499046] kthread+0x24c/0x2d0 [ 40.499590] ret_from_fork+0x10/0x20 [ 40.500094] [ 40.500462] The buggy address belongs to the object at fff00000c1bb3c00 [ 40.500462] which belongs to the cache kmalloc-16 of size 16 [ 40.501576] The buggy address is located 8 bytes inside of [ 40.501576] allocated 9-byte region [fff00000c1bb3c00, fff00000c1bb3c09) [ 40.502792] [ 40.503154] The buggy address belongs to the physical page: [ 40.503696] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bb3 [ 40.504673] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 40.505369] page_type: f5(slab) [ 40.505915] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 40.506665] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 40.507559] page dumped because: kasan: bad access detected [ 40.508250] [ 40.508578] Memory state around the buggy address: [ 40.509215] fff00000c1bb3b00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 40.509904] fff00000c1bb3b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 40.510776] >fff00000c1bb3c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.511425] ^ [ 40.511973] fff00000c1bb3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.512709] fff00000c1bb3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.513562] ================================================================== [ 40.515869] ================================================================== [ 40.516697] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc8 [ 40.517638] Write of size 8 at addr fff00000c1bb3c08 by task kunit_try_catch/250 [ 40.518533] [ 40.518920] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 40.519857] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.520436] Hardware name: linux,dummy-virt (DT) [ 40.521064] Call trace: [ 40.521524] show_stack+0x20/0x38 (C) [ 40.522028] dump_stack_lvl+0x8c/0xd0 [ 40.522652] print_report+0x118/0x5e0 [ 40.523199] kasan_report+0xc8/0x118 [ 40.523757] kasan_check_range+0x100/0x1a8 [ 40.524320] __kasan_check_write+0x20/0x30 [ 40.525032] kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc8 [ 40.525758] kasan_bitops_generic+0x11c/0x1c8 [ 40.526414] kunit_try_run_case+0x14c/0x3d0 [ 40.527074] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.527777] kthread+0x24c/0x2d0 [ 40.528364] ret_from_fork+0x10/0x20 [ 40.528995] [ 40.529341] Allocated by task 250: [ 40.529855] kasan_save_stack+0x3c/0x68 [ 40.530328] kasan_save_track+0x20/0x40 [ 40.530952] kasan_save_alloc_info+0x40/0x58 [ 40.531490] __kasan_kmalloc+0xd4/0xd8 [ 40.532059] __kmalloc_cache_noprof+0x15c/0x3c8 [ 40.532671] kasan_bitops_generic+0xa0/0x1c8 [ 40.533292] kunit_try_run_case+0x14c/0x3d0 [ 40.533844] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.534594] kthread+0x24c/0x2d0 [ 40.535191] ret_from_fork+0x10/0x20 [ 40.535769] [ 40.536072] The buggy address belongs to the object at fff00000c1bb3c00 [ 40.536072] which belongs to the cache kmalloc-16 of size 16 [ 40.537259] The buggy address is located 8 bytes inside of [ 40.537259] allocated 9-byte region [fff00000c1bb3c00, fff00000c1bb3c09) [ 40.539051] [ 40.539595] The buggy address belongs to the physical page: [ 40.540228] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bb3 [ 40.541096] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 40.541832] page_type: f5(slab) [ 40.542319] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 40.543094] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 40.543927] page dumped because: kasan: bad access detected [ 40.544580] [ 40.544953] Memory state around the buggy address: [ 40.545500] fff00000c1bb3b00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 40.546308] fff00000c1bb3b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 40.547086] >fff00000c1bb3c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.547775] ^ [ 40.548327] fff00000c1bb3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.549114] fff00000c1bb3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.549970] ================================================================== [ 40.588965] ================================================================== [ 40.590230] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x334/0xbc8 [ 40.591327] Write of size 8 at addr fff00000c1bb3c08 by task kunit_try_catch/250 [ 40.592208] [ 40.592588] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 40.593650] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.594206] Hardware name: linux,dummy-virt (DT) [ 40.594842] Call trace: [ 40.595266] show_stack+0x20/0x38 (C) [ 40.595892] dump_stack_lvl+0x8c/0xd0 [ 40.596455] print_report+0x118/0x5e0 [ 40.597058] kasan_report+0xc8/0x118 [ 40.597652] kasan_check_range+0x100/0x1a8 [ 40.598287] __kasan_check_write+0x20/0x30 [ 40.598941] kasan_bitops_test_and_modify.constprop.0+0x334/0xbc8 [ 40.599718] kasan_bitops_generic+0x11c/0x1c8 [ 40.600371] kunit_try_run_case+0x14c/0x3d0 [ 40.601028] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.601710] kthread+0x24c/0x2d0 [ 40.602281] ret_from_fork+0x10/0x20 [ 40.602881] [ 40.603234] Allocated by task 250: [ 40.603757] kasan_save_stack+0x3c/0x68 [ 40.604361] kasan_save_track+0x20/0x40 [ 40.604912] kasan_save_alloc_info+0x40/0x58 [ 40.605497] __kasan_kmalloc+0xd4/0xd8 [ 40.606020] __kmalloc_cache_noprof+0x15c/0x3c8 [ 40.606661] kasan_bitops_generic+0xa0/0x1c8 [ 40.607183] kunit_try_run_case+0x14c/0x3d0 [ 40.607815] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.608474] kthread+0x24c/0x2d0 [ 40.608914] ret_from_fork+0x10/0x20 [ 40.609478] [ 40.609817] The buggy address belongs to the object at fff00000c1bb3c00 [ 40.609817] which belongs to the cache kmalloc-16 of size 16 [ 40.610866] The buggy address is located 8 bytes inside of [ 40.610866] allocated 9-byte region [fff00000c1bb3c00, fff00000c1bb3c09) [ 40.612049] [ 40.612407] The buggy address belongs to the physical page: [ 40.613043] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bb3 [ 40.613937] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 40.614684] page_type: f5(slab) [ 40.615187] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 40.616046] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 40.616877] page dumped because: kasan: bad access detected [ 40.617529] [ 40.617869] Memory state around the buggy address: [ 40.618437] fff00000c1bb3b00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 40.619296] fff00000c1bb3b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 40.620113] >fff00000c1bb3c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.620895] ^ [ 40.621330] fff00000c1bb3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.622092] fff00000c1bb3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.622952] ================================================================== [ 40.442352] ================================================================== [ 40.443106] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc8 [ 40.443991] Write of size 8 at addr fff00000c1bb3c08 by task kunit_try_catch/250 [ 40.444794] [ 40.445255] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 40.446574] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.447089] Hardware name: linux,dummy-virt (DT) [ 40.447651] Call trace: [ 40.448015] show_stack+0x20/0x38 (C) [ 40.448690] dump_stack_lvl+0x8c/0xd0 [ 40.449328] print_report+0x118/0x5e0 [ 40.449878] kasan_report+0xc8/0x118 [ 40.450511] kasan_check_range+0x100/0x1a8 [ 40.451056] __kasan_check_write+0x20/0x30 [ 40.451694] kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc8 [ 40.452454] kasan_bitops_generic+0x11c/0x1c8 [ 40.453108] kunit_try_run_case+0x14c/0x3d0 [ 40.453726] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.454507] kthread+0x24c/0x2d0 [ 40.455121] ret_from_fork+0x10/0x20 [ 40.455729] [ 40.456054] Allocated by task 250: [ 40.456506] kasan_save_stack+0x3c/0x68 [ 40.457118] kasan_save_track+0x20/0x40 [ 40.457728] kasan_save_alloc_info+0x40/0x58 [ 40.458366] __kasan_kmalloc+0xd4/0xd8 [ 40.458921] __kmalloc_cache_noprof+0x15c/0x3c8 [ 40.459583] kasan_bitops_generic+0xa0/0x1c8 [ 40.460105] kunit_try_run_case+0x14c/0x3d0 [ 40.460766] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.461494] kthread+0x24c/0x2d0 [ 40.462027] ret_from_fork+0x10/0x20 [ 40.462582] [ 40.462928] The buggy address belongs to the object at fff00000c1bb3c00 [ 40.462928] which belongs to the cache kmalloc-16 of size 16 [ 40.464138] The buggy address is located 8 bytes inside of [ 40.464138] allocated 9-byte region [fff00000c1bb3c00, fff00000c1bb3c09) [ 40.465419] [ 40.465788] The buggy address belongs to the physical page: [ 40.466409] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bb3 [ 40.467263] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 40.468086] page_type: f5(slab) [ 40.468642] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 40.469572] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 40.470425] page dumped because: kasan: bad access detected [ 40.471129] [ 40.471485] Memory state around the buggy address: [ 40.471996] fff00000c1bb3b00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 40.472864] fff00000c1bb3b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 40.473632] >fff00000c1bb3c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.474360] ^ [ 40.475267] fff00000c1bb3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.476215] fff00000c1bb3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.477187] ================================================================== [ 40.625185] ================================================================== [ 40.625919] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa44/0xbc8 [ 40.626941] Read of size 8 at addr fff00000c1bb3c08 by task kunit_try_catch/250 [ 40.627748] [ 40.628135] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 40.629268] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.629713] Hardware name: linux,dummy-virt (DT) [ 40.630327] Call trace: [ 40.630832] show_stack+0x20/0x38 (C) [ 40.631432] dump_stack_lvl+0x8c/0xd0 [ 40.631988] print_report+0x118/0x5e0 [ 40.632619] kasan_report+0xc8/0x118 [ 40.633204] __asan_report_load8_noabort+0x20/0x30 [ 40.633899] kasan_bitops_test_and_modify.constprop.0+0xa44/0xbc8 [ 40.634645] kasan_bitops_generic+0x11c/0x1c8 [ 40.635276] kunit_try_run_case+0x14c/0x3d0 [ 40.635852] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.636577] kthread+0x24c/0x2d0 [ 40.637019] ret_from_fork+0x10/0x20 [ 40.637633] [ 40.637951] Allocated by task 250: [ 40.638511] kasan_save_stack+0x3c/0x68 [ 40.639011] kasan_save_track+0x20/0x40 [ 40.639631] kasan_save_alloc_info+0x40/0x58 [ 40.640266] __kasan_kmalloc+0xd4/0xd8 [ 40.640862] __kmalloc_cache_noprof+0x15c/0x3c8 [ 40.641546] kasan_bitops_generic+0xa0/0x1c8 [ 40.642095] kunit_try_run_case+0x14c/0x3d0 [ 40.642758] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.643415] kthread+0x24c/0x2d0 [ 40.643975] ret_from_fork+0x10/0x20 [ 40.644561] [ 40.644900] The buggy address belongs to the object at fff00000c1bb3c00 [ 40.644900] which belongs to the cache kmalloc-16 of size 16 [ 40.646054] The buggy address is located 8 bytes inside of [ 40.646054] allocated 9-byte region [fff00000c1bb3c00, fff00000c1bb3c09) [ 40.647148] [ 40.647510] The buggy address belongs to the physical page: [ 40.648210] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bb3 [ 40.649119] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 40.649831] page_type: f5(slab) [ 40.650236] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 40.651581] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 40.652399] page dumped because: kasan: bad access detected [ 40.652993] [ 40.653349] Memory state around the buggy address: [ 40.653950] fff00000c1bb3b00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 40.654819] fff00000c1bb3b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 40.655544] >fff00000c1bb3c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.656394] ^ [ 40.656898] fff00000c1bb3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.657644] fff00000c1bb3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.658461] ================================================================== [ 40.551825] ================================================================== [ 40.552624] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xad4/0xbc8 [ 40.554053] Read of size 8 at addr fff00000c1bb3c08 by task kunit_try_catch/250 [ 40.555240] [ 40.555619] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 40.557455] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.557986] Hardware name: linux,dummy-virt (DT) [ 40.558571] Call trace: [ 40.558954] show_stack+0x20/0x38 (C) [ 40.559859] dump_stack_lvl+0x8c/0xd0 [ 40.560430] print_report+0x118/0x5e0 [ 40.561092] kasan_report+0xc8/0x118 [ 40.561723] __asan_report_load8_noabort+0x20/0x30 [ 40.562306] kasan_bitops_test_and_modify.constprop.0+0xad4/0xbc8 [ 40.563155] kasan_bitops_generic+0x11c/0x1c8 [ 40.563799] kunit_try_run_case+0x14c/0x3d0 [ 40.564434] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.565118] kthread+0x24c/0x2d0 [ 40.565672] ret_from_fork+0x10/0x20 [ 40.566284] [ 40.566683] Allocated by task 250: [ 40.567173] kasan_save_stack+0x3c/0x68 [ 40.567723] kasan_save_track+0x20/0x40 [ 40.568339] kasan_save_alloc_info+0x40/0x58 [ 40.568917] __kasan_kmalloc+0xd4/0xd8 [ 40.569529] __kmalloc_cache_noprof+0x15c/0x3c8 [ 40.570143] kasan_bitops_generic+0xa0/0x1c8 [ 40.570817] kunit_try_run_case+0x14c/0x3d0 [ 40.571353] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.572102] kthread+0x24c/0x2d0 [ 40.572660] ret_from_fork+0x10/0x20 [ 40.573164] [ 40.573570] The buggy address belongs to the object at fff00000c1bb3c00 [ 40.573570] which belongs to the cache kmalloc-16 of size 16 [ 40.574797] The buggy address is located 8 bytes inside of [ 40.574797] allocated 9-byte region [fff00000c1bb3c00, fff00000c1bb3c09) [ 40.575992] [ 40.576377] The buggy address belongs to the physical page: [ 40.577127] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bb3 [ 40.577911] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 40.578792] page_type: f5(slab) [ 40.579306] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 40.580197] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 40.581056] page dumped because: kasan: bad access detected [ 40.581694] [ 40.582058] Memory state around the buggy address: [ 40.582750] fff00000c1bb3b00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 40.583582] fff00000c1bb3b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 40.584392] >fff00000c1bb3c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.585113] ^ [ 40.585661] fff00000c1bb3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.586469] fff00000c1bb3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.587223] ================================================================== [ 40.368789] ================================================================== [ 40.369621] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc8 [ 40.370591] Write of size 8 at addr fff00000c1bb3c08 by task kunit_try_catch/250 [ 40.371336] [ 40.371740] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 40.372912] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.373390] Hardware name: linux,dummy-virt (DT) [ 40.374028] Call trace: [ 40.374475] show_stack+0x20/0x38 (C) [ 40.375124] dump_stack_lvl+0x8c/0xd0 [ 40.375703] print_report+0x118/0x5e0 [ 40.376315] kasan_report+0xc8/0x118 [ 40.376911] kasan_check_range+0x100/0x1a8 [ 40.377550] __kasan_check_write+0x20/0x30 [ 40.378173] kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc8 [ 40.378945] kasan_bitops_generic+0x11c/0x1c8 [ 40.379549] kunit_try_run_case+0x14c/0x3d0 [ 40.380167] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.380819] kthread+0x24c/0x2d0 [ 40.381391] ret_from_fork+0x10/0x20 [ 40.382019] [ 40.382317] Allocated by task 250: [ 40.382858] kasan_save_stack+0x3c/0x68 [ 40.383345] kasan_save_track+0x20/0x40 [ 40.383949] kasan_save_alloc_info+0x40/0x58 [ 40.384578] __kasan_kmalloc+0xd4/0xd8 [ 40.385088] __kmalloc_cache_noprof+0x15c/0x3c8 [ 40.385755] kasan_bitops_generic+0xa0/0x1c8 [ 40.386381] kunit_try_run_case+0x14c/0x3d0 [ 40.386971] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.387682] kthread+0x24c/0x2d0 [ 40.388222] ret_from_fork+0x10/0x20 [ 40.388806] [ 40.389111] The buggy address belongs to the object at fff00000c1bb3c00 [ 40.389111] which belongs to the cache kmalloc-16 of size 16 [ 40.390291] The buggy address is located 8 bytes inside of [ 40.390291] allocated 9-byte region [fff00000c1bb3c00, fff00000c1bb3c09) [ 40.391325] [ 40.391698] The buggy address belongs to the physical page: [ 40.392397] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bb3 [ 40.393314] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 40.394118] page_type: f5(slab) [ 40.394663] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 40.395634] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 40.396358] page dumped because: kasan: bad access detected [ 40.397073] [ 40.397415] Memory state around the buggy address: [ 40.397912] fff00000c1bb3b00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 40.398796] fff00000c1bb3b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 40.399543] >fff00000c1bb3c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.400334] ^ [ 40.400888] fff00000c1bb3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.401715] fff00000c1bb3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.402560] ==================================================================
[ 32.413346] ================================================================== [ 32.414547] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x558/0xd90 [ 32.415413] Read of size 8 at addr ffff888101a98528 by task kunit_try_catch/268 [ 32.416248] [ 32.416430] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 32.417372] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.417808] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 32.418556] Call Trace: [ 32.418920] <TASK> [ 32.419123] dump_stack_lvl+0x73/0xb0 [ 32.419533] print_report+0xd1/0x640 [ 32.420573] ? __virt_addr_valid+0x1db/0x2d0 [ 32.421155] ? kasan_complete_mode_report_info+0x2a/0x200 [ 32.421721] kasan_report+0x102/0x140 [ 32.422167] ? kasan_bitops_test_and_modify.constprop.0+0x558/0xd90 [ 32.422691] ? kasan_bitops_test_and_modify.constprop.0+0x558/0xd90 [ 32.424087] kasan_check_range+0x10c/0x1c0 [ 32.424506] __kasan_check_read+0x15/0x20 [ 32.424923] kasan_bitops_test_and_modify.constprop.0+0x558/0xd90 [ 32.425457] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 32.426538] ? __kmalloc_cache_noprof+0x184/0x410 [ 32.427191] ? trace_hardirqs_on+0x37/0xe0 [ 32.427828] ? kasan_bitops_generic+0x93/0x1c0 [ 32.428377] kasan_bitops_generic+0x122/0x1c0 [ 32.428938] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 32.429501] ? __pfx_read_tsc+0x10/0x10 [ 32.430085] ? ktime_get_ts64+0x84/0x230 [ 32.430455] kunit_try_run_case+0x1b3/0x490 [ 32.430947] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.431416] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 32.431990] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 32.432537] ? __kthread_parkme+0x82/0x160 [ 32.433068] ? preempt_count_sub+0x50/0x80 [ 32.433503] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.433850] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 32.434717] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.435279] kthread+0x257/0x310 [ 32.435802] ? __pfx_kthread+0x10/0x10 [ 32.436267] ret_from_fork+0x41/0x80 [ 32.436684] ? __pfx_kthread+0x10/0x10 [ 32.437244] ret_from_fork_asm+0x1a/0x30 [ 32.437619] </TASK> [ 32.438016] [ 32.438290] Allocated by task 268: [ 32.438562] kasan_save_stack+0x3d/0x60 [ 32.439113] kasan_save_track+0x18/0x40 [ 32.439601] kasan_save_alloc_info+0x3b/0x50 [ 32.440315] __kasan_kmalloc+0xb7/0xc0 [ 32.440586] __kmalloc_cache_noprof+0x184/0x410 [ 32.441437] kasan_bitops_generic+0x93/0x1c0 [ 32.442035] kunit_try_run_case+0x1b3/0x490 [ 32.442670] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.443183] kthread+0x257/0x310 [ 32.443569] ret_from_fork+0x41/0x80 [ 32.443958] ret_from_fork_asm+0x1a/0x30 [ 32.444539] [ 32.444917] The buggy address belongs to the object at ffff888101a98520 [ 32.444917] which belongs to the cache kmalloc-16 of size 16 [ 32.447063] The buggy address is located 8 bytes inside of [ 32.447063] allocated 9-byte region [ffff888101a98520, ffff888101a98529) [ 32.448409] [ 32.448649] The buggy address belongs to the physical page: [ 32.449346] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101a98 [ 32.449980] flags: 0x200000000000000(node=0|zone=2) [ 32.450524] page_type: f5(slab) [ 32.450931] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 32.451825] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 32.452544] page dumped because: kasan: bad access detected [ 32.453134] [ 32.453383] Memory state around the buggy address: [ 32.454048] ffff888101a98400: fa fb fc fc 00 01 fc fc 00 01 fc fc fa fb fc fc [ 32.454654] ffff888101a98480: 00 01 fc fc 00 01 fc fc fa fb fc fc fa fb fc fc [ 32.455423] >ffff888101a98500: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 32.456302] ^ [ 32.456845] ffff888101a98580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.457576] ffff888101a98600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.458300] ================================================================== [ 32.232560] ================================================================== [ 32.234808] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90 [ 32.235805] Write of size 8 at addr ffff888101a98528 by task kunit_try_catch/268 [ 32.236505] [ 32.236811] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 32.238376] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.239249] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 32.240597] Call Trace: [ 32.241122] <TASK> [ 32.241399] dump_stack_lvl+0x73/0xb0 [ 32.241839] print_report+0xd1/0x640 [ 32.242728] ? __virt_addr_valid+0x1db/0x2d0 [ 32.243350] ? kasan_complete_mode_report_info+0x2a/0x200 [ 32.243916] kasan_report+0x102/0x140 [ 32.244108] ? kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90 [ 32.244369] ? kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90 [ 32.244657] kasan_check_range+0x10c/0x1c0 [ 32.245125] __kasan_check_write+0x18/0x20 [ 32.245579] kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90 [ 32.246342] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 32.247152] ? __kmalloc_cache_noprof+0x184/0x410 [ 32.247676] ? trace_hardirqs_on+0x37/0xe0 [ 32.248375] ? kasan_bitops_generic+0x93/0x1c0 [ 32.249235] kasan_bitops_generic+0x122/0x1c0 [ 32.249842] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 32.250454] ? __pfx_read_tsc+0x10/0x10 [ 32.250945] ? ktime_get_ts64+0x84/0x230 [ 32.251327] kunit_try_run_case+0x1b3/0x490 [ 32.252041] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.252468] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 32.252966] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 32.253470] ? __kthread_parkme+0x82/0x160 [ 32.254259] ? preempt_count_sub+0x50/0x80 [ 32.254761] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.255255] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 32.255848] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.256374] kthread+0x257/0x310 [ 32.256926] ? __pfx_kthread+0x10/0x10 [ 32.257504] ret_from_fork+0x41/0x80 [ 32.257866] ? __pfx_kthread+0x10/0x10 [ 32.258480] ret_from_fork_asm+0x1a/0x30 [ 32.258927] </TASK> [ 32.259195] [ 32.259351] Allocated by task 268: [ 32.259909] kasan_save_stack+0x3d/0x60 [ 32.260176] kasan_save_track+0x18/0x40 [ 32.260468] kasan_save_alloc_info+0x3b/0x50 [ 32.260894] __kasan_kmalloc+0xb7/0xc0 [ 32.261247] __kmalloc_cache_noprof+0x184/0x410 [ 32.261688] kasan_bitops_generic+0x93/0x1c0 [ 32.262137] kunit_try_run_case+0x1b3/0x490 [ 32.262666] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.263209] kthread+0x257/0x310 [ 32.263464] ret_from_fork+0x41/0x80 [ 32.263954] ret_from_fork_asm+0x1a/0x30 [ 32.264311] [ 32.264465] The buggy address belongs to the object at ffff888101a98520 [ 32.264465] which belongs to the cache kmalloc-16 of size 16 [ 32.265530] The buggy address is located 8 bytes inside of [ 32.265530] allocated 9-byte region [ffff888101a98520, ffff888101a98529) [ 32.266496] [ 32.266812] The buggy address belongs to the physical page: [ 32.267335] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101a98 [ 32.267878] flags: 0x200000000000000(node=0|zone=2) [ 32.268419] page_type: f5(slab) [ 32.268868] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 32.269328] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 32.270075] page dumped because: kasan: bad access detected [ 32.270757] [ 32.270977] Memory state around the buggy address: [ 32.271278] ffff888101a98400: fa fb fc fc 00 01 fc fc 00 01 fc fc fa fb fc fc [ 32.272068] ffff888101a98480: 00 01 fc fc 00 01 fc fc fa fb fc fc fa fb fc fc [ 32.272560] >ffff888101a98500: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 32.273356] ^ [ 32.274734] ffff888101a98580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.275355] ffff888101a98600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.275929] ================================================================== [ 32.369010] ================================================================== [ 32.369837] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90 [ 32.370531] Write of size 8 at addr ffff888101a98528 by task kunit_try_catch/268 [ 32.371213] [ 32.371465] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 32.372330] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.372832] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 32.375502] Call Trace: [ 32.376055] <TASK> [ 32.376363] dump_stack_lvl+0x73/0xb0 [ 32.377187] print_report+0xd1/0x640 [ 32.377533] ? __virt_addr_valid+0x1db/0x2d0 [ 32.378126] ? kasan_complete_mode_report_info+0x2a/0x200 [ 32.378662] kasan_report+0x102/0x140 [ 32.378952] ? kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90 [ 32.380256] ? kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90 [ 32.380899] kasan_check_range+0x10c/0x1c0 [ 32.381372] __kasan_check_write+0x18/0x20 [ 32.382354] kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90 [ 32.382817] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 32.383642] ? __kmalloc_cache_noprof+0x184/0x410 [ 32.384104] ? trace_hardirqs_on+0x37/0xe0 [ 32.384519] ? kasan_bitops_generic+0x93/0x1c0 [ 32.385178] kasan_bitops_generic+0x122/0x1c0 [ 32.385770] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 32.386634] ? __pfx_read_tsc+0x10/0x10 [ 32.387123] ? ktime_get_ts64+0x84/0x230 [ 32.387570] kunit_try_run_case+0x1b3/0x490 [ 32.388263] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.389053] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 32.389793] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 32.390020] ? __kthread_parkme+0x82/0x160 [ 32.390218] ? preempt_count_sub+0x50/0x80 [ 32.390410] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.390625] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 32.391529] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.392401] kthread+0x257/0x310 [ 32.393149] ? __pfx_kthread+0x10/0x10 [ 32.393672] ret_from_fork+0x41/0x80 [ 32.394259] ? __pfx_kthread+0x10/0x10 [ 32.394938] ret_from_fork_asm+0x1a/0x30 [ 32.395298] </TASK> [ 32.395925] [ 32.396162] Allocated by task 268: [ 32.396558] kasan_save_stack+0x3d/0x60 [ 32.396970] kasan_save_track+0x18/0x40 [ 32.397293] kasan_save_alloc_info+0x3b/0x50 [ 32.398126] __kasan_kmalloc+0xb7/0xc0 [ 32.398408] __kmalloc_cache_noprof+0x184/0x410 [ 32.398987] kasan_bitops_generic+0x93/0x1c0 [ 32.399336] kunit_try_run_case+0x1b3/0x490 [ 32.399853] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.400259] kthread+0x257/0x310 [ 32.400755] ret_from_fork+0x41/0x80 [ 32.401126] ret_from_fork_asm+0x1a/0x30 [ 32.401538] [ 32.401843] The buggy address belongs to the object at ffff888101a98520 [ 32.401843] which belongs to the cache kmalloc-16 of size 16 [ 32.402666] The buggy address is located 8 bytes inside of [ 32.402666] allocated 9-byte region [ffff888101a98520, ffff888101a98529) [ 32.403817] [ 32.404049] The buggy address belongs to the physical page: [ 32.404486] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101a98 [ 32.405197] flags: 0x200000000000000(node=0|zone=2) [ 32.405533] page_type: f5(slab) [ 32.406011] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 32.406654] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 32.407328] page dumped because: kasan: bad access detected [ 32.407880] [ 32.408099] Memory state around the buggy address: [ 32.408472] ffff888101a98400: fa fb fc fc 00 01 fc fc 00 01 fc fc fa fb fc fc [ 32.409134] ffff888101a98480: 00 01 fc fc 00 01 fc fc fa fb fc fc fa fb fc fc [ 32.409770] >ffff888101a98500: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 32.410320] ^ [ 32.410849] ffff888101a98580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.411467] ffff888101a98600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.412196] ================================================================== [ 32.068259] ================================================================== [ 32.069007] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x102/0xd90 [ 32.070659] Write of size 8 at addr ffff888101a98528 by task kunit_try_catch/268 [ 32.072236] [ 32.072462] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 32.073395] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.074676] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 32.075863] Call Trace: [ 32.076470] <TASK> [ 32.076795] dump_stack_lvl+0x73/0xb0 [ 32.077803] print_report+0xd1/0x640 [ 32.078650] ? __virt_addr_valid+0x1db/0x2d0 [ 32.079072] ? kasan_complete_mode_report_info+0x2a/0x200 [ 32.080019] kasan_report+0x102/0x140 [ 32.080503] ? kasan_bitops_test_and_modify.constprop.0+0x102/0xd90 [ 32.081503] ? kasan_bitops_test_and_modify.constprop.0+0x102/0xd90 [ 32.082755] kasan_check_range+0x10c/0x1c0 [ 32.083313] __kasan_check_write+0x18/0x20 [ 32.083608] kasan_bitops_test_and_modify.constprop.0+0x102/0xd90 [ 32.084895] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 32.085918] ? __kmalloc_cache_noprof+0x184/0x410 [ 32.086412] ? trace_hardirqs_on+0x37/0xe0 [ 32.087159] ? kasan_bitops_generic+0x93/0x1c0 [ 32.088013] kasan_bitops_generic+0x122/0x1c0 [ 32.088461] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 32.089223] ? __pfx_read_tsc+0x10/0x10 [ 32.089512] ? ktime_get_ts64+0x84/0x230 [ 32.090446] kunit_try_run_case+0x1b3/0x490 [ 32.091183] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.091905] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 32.092556] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 32.093499] ? __kthread_parkme+0x82/0x160 [ 32.093932] ? preempt_count_sub+0x50/0x80 [ 32.094977] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.095410] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 32.096350] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.096869] kthread+0x257/0x310 [ 32.097226] ? __pfx_kthread+0x10/0x10 [ 32.097587] ret_from_fork+0x41/0x80 [ 32.098736] ? __pfx_kthread+0x10/0x10 [ 32.099400] ret_from_fork_asm+0x1a/0x30 [ 32.100063] </TASK> [ 32.100446] [ 32.100978] Allocated by task 268: [ 32.101441] kasan_save_stack+0x3d/0x60 [ 32.101860] kasan_save_track+0x18/0x40 [ 32.102764] kasan_save_alloc_info+0x3b/0x50 [ 32.103216] __kasan_kmalloc+0xb7/0xc0 [ 32.103643] __kmalloc_cache_noprof+0x184/0x410 [ 32.104053] kasan_bitops_generic+0x93/0x1c0 [ 32.104507] kunit_try_run_case+0x1b3/0x490 [ 32.105271] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.106026] kthread+0x257/0x310 [ 32.106835] ret_from_fork+0x41/0x80 [ 32.107414] ret_from_fork_asm+0x1a/0x30 [ 32.108011] [ 32.108272] The buggy address belongs to the object at ffff888101a98520 [ 32.108272] which belongs to the cache kmalloc-16 of size 16 [ 32.109825] The buggy address is located 8 bytes inside of [ 32.109825] allocated 9-byte region [ffff888101a98520, ffff888101a98529) [ 32.111981] [ 32.112619] The buggy address belongs to the physical page: [ 32.113450] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101a98 [ 32.114509] flags: 0x200000000000000(node=0|zone=2) [ 32.115797] page_type: f5(slab) [ 32.116196] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 32.117296] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 32.118599] page dumped because: kasan: bad access detected [ 32.119320] [ 32.119519] Memory state around the buggy address: [ 32.120536] ffff888101a98400: fa fb fc fc 00 01 fc fc 00 01 fc fc fa fb fc fc [ 32.121349] ffff888101a98480: 00 01 fc fc 00 01 fc fc fa fb fc fc fa fb fc fc [ 32.122062] >ffff888101a98500: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 32.123252] ^ [ 32.123916] ffff888101a98580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.124985] ffff888101a98600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.125906] ================================================================== [ 32.277374] ================================================================== [ 32.278320] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90 [ 32.280023] Write of size 8 at addr ffff888101a98528 by task kunit_try_catch/268 [ 32.281149] [ 32.281328] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 32.282268] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.283571] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 32.285606] Call Trace: [ 32.286064] <TASK> [ 32.286253] dump_stack_lvl+0x73/0xb0 [ 32.286792] print_report+0xd1/0x640 [ 32.287166] ? __virt_addr_valid+0x1db/0x2d0 [ 32.287603] ? kasan_complete_mode_report_info+0x2a/0x200 [ 32.288479] kasan_report+0x102/0x140 [ 32.288962] ? kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90 [ 32.289570] ? kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90 [ 32.290215] kasan_check_range+0x10c/0x1c0 [ 32.290770] __kasan_check_write+0x18/0x20 [ 32.291162] kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90 [ 32.292298] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 32.292975] ? __kmalloc_cache_noprof+0x184/0x410 [ 32.293468] ? trace_hardirqs_on+0x37/0xe0 [ 32.294144] ? kasan_bitops_generic+0x93/0x1c0 [ 32.294905] kasan_bitops_generic+0x122/0x1c0 [ 32.295537] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 32.296320] ? __pfx_read_tsc+0x10/0x10 [ 32.296689] ? ktime_get_ts64+0x84/0x230 [ 32.297162] kunit_try_run_case+0x1b3/0x490 [ 32.297579] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.298496] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 32.299212] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 32.300050] ? __kthread_parkme+0x82/0x160 [ 32.300617] ? preempt_count_sub+0x50/0x80 [ 32.301588] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.302060] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 32.302635] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.303479] kthread+0x257/0x310 [ 32.304124] ? __pfx_kthread+0x10/0x10 [ 32.304564] ret_from_fork+0x41/0x80 [ 32.305268] ? __pfx_kthread+0x10/0x10 [ 32.305590] ret_from_fork_asm+0x1a/0x30 [ 32.306175] </TASK> [ 32.306436] [ 32.307263] Allocated by task 268: [ 32.307571] kasan_save_stack+0x3d/0x60 [ 32.308214] kasan_save_track+0x18/0x40 [ 32.308626] kasan_save_alloc_info+0x3b/0x50 [ 32.309095] __kasan_kmalloc+0xb7/0xc0 [ 32.309490] __kmalloc_cache_noprof+0x184/0x410 [ 32.309970] kasan_bitops_generic+0x93/0x1c0 [ 32.310975] kunit_try_run_case+0x1b3/0x490 [ 32.311478] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.312275] kthread+0x257/0x310 [ 32.312828] ret_from_fork+0x41/0x80 [ 32.313609] ret_from_fork_asm+0x1a/0x30 [ 32.314293] [ 32.314569] The buggy address belongs to the object at ffff888101a98520 [ 32.314569] which belongs to the cache kmalloc-16 of size 16 [ 32.315535] The buggy address is located 8 bytes inside of [ 32.315535] allocated 9-byte region [ffff888101a98520, ffff888101a98529) [ 32.317265] [ 32.317595] The buggy address belongs to the physical page: [ 32.318354] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101a98 [ 32.319081] flags: 0x200000000000000(node=0|zone=2) [ 32.319608] page_type: f5(slab) [ 32.320687] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 32.321333] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 32.322394] page dumped because: kasan: bad access detected [ 32.323218] [ 32.323592] Memory state around the buggy address: [ 32.324185] ffff888101a98400: fa fb fc fc 00 01 fc fc 00 01 fc fc fa fb fc fc [ 32.325348] ffff888101a98480: 00 01 fc fc 00 01 fc fc fa fb fc fc fa fb fc fc [ 32.325948] >ffff888101a98500: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 32.326958] ^ [ 32.327554] ffff888101a98580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.328367] ffff888101a98600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.328716] ================================================================== [ 32.126751] ================================================================== [ 32.128036] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90 [ 32.129823] Write of size 8 at addr ffff888101a98528 by task kunit_try_catch/268 [ 32.130750] [ 32.131457] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 32.132572] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.133453] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 32.135527] Call Trace: [ 32.135979] <TASK> [ 32.136109] dump_stack_lvl+0x73/0xb0 [ 32.136842] print_report+0xd1/0x640 [ 32.137472] ? __virt_addr_valid+0x1db/0x2d0 [ 32.138545] ? kasan_complete_mode_report_info+0x2a/0x200 [ 32.139579] kasan_report+0x102/0x140 [ 32.140018] ? kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90 [ 32.141032] ? kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90 [ 32.141956] kasan_check_range+0x10c/0x1c0 [ 32.142651] __kasan_check_write+0x18/0x20 [ 32.143509] kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90 [ 32.144119] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 32.145122] ? __kmalloc_cache_noprof+0x184/0x410 [ 32.145855] ? trace_hardirqs_on+0x37/0xe0 [ 32.146718] ? kasan_bitops_generic+0x93/0x1c0 [ 32.147397] kasan_bitops_generic+0x122/0x1c0 [ 32.147866] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 32.148286] ? __pfx_read_tsc+0x10/0x10 [ 32.148659] ? ktime_get_ts64+0x84/0x230 [ 32.149061] kunit_try_run_case+0x1b3/0x490 [ 32.149486] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.150567] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 32.151683] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 32.152256] ? __kthread_parkme+0x82/0x160 [ 32.152922] ? preempt_count_sub+0x50/0x80 [ 32.153557] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.154150] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 32.155082] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.156067] kthread+0x257/0x310 [ 32.156779] ? __pfx_kthread+0x10/0x10 [ 32.157147] ret_from_fork+0x41/0x80 [ 32.157537] ? __pfx_kthread+0x10/0x10 [ 32.157869] ret_from_fork_asm+0x1a/0x30 [ 32.158626] </TASK> [ 32.158957] [ 32.159144] Allocated by task 268: [ 32.159383] kasan_save_stack+0x3d/0x60 [ 32.160021] kasan_save_track+0x18/0x40 [ 32.160339] kasan_save_alloc_info+0x3b/0x50 [ 32.160814] __kasan_kmalloc+0xb7/0xc0 [ 32.161447] __kmalloc_cache_noprof+0x184/0x410 [ 32.161777] kasan_bitops_generic+0x93/0x1c0 [ 32.162506] kunit_try_run_case+0x1b3/0x490 [ 32.163442] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.163959] kthread+0x257/0x310 [ 32.164199] ret_from_fork+0x41/0x80 [ 32.164664] ret_from_fork_asm+0x1a/0x30 [ 32.165324] [ 32.165499] The buggy address belongs to the object at ffff888101a98520 [ 32.165499] which belongs to the cache kmalloc-16 of size 16 [ 32.166749] The buggy address is located 8 bytes inside of [ 32.166749] allocated 9-byte region [ffff888101a98520, ffff888101a98529) [ 32.168062] [ 32.168270] The buggy address belongs to the physical page: [ 32.168595] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101a98 [ 32.169609] flags: 0x200000000000000(node=0|zone=2) [ 32.170032] page_type: f5(slab) [ 32.170289] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 32.171364] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 32.172140] page dumped because: kasan: bad access detected [ 32.172901] [ 32.173055] Memory state around the buggy address: [ 32.173406] ffff888101a98400: fa fb fc fc 00 01 fc fc 00 01 fc fc fa fb fc fc [ 32.174536] ffff888101a98480: 00 01 fc fc 00 01 fc fc fa fb fc fc fa fb fc fc [ 32.175551] >ffff888101a98500: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 32.176015] ^ [ 32.176520] ffff888101a98580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.177212] ffff888101a98600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.178212] ================================================================== [ 32.178928] ================================================================== [ 32.179659] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90 [ 32.180458] Write of size 8 at addr ffff888101a98528 by task kunit_try_catch/268 [ 32.181177] [ 32.181595] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 32.182546] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.182839] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 32.183819] Call Trace: [ 32.184159] <TASK> [ 32.184452] dump_stack_lvl+0x73/0xb0 [ 32.184907] print_report+0xd1/0x640 [ 32.185340] ? __virt_addr_valid+0x1db/0x2d0 [ 32.185653] ? kasan_complete_mode_report_info+0x2a/0x200 [ 32.186412] kasan_report+0x102/0x140 [ 32.186891] ? kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90 [ 32.187598] ? kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90 [ 32.188526] kasan_check_range+0x10c/0x1c0 [ 32.188906] __kasan_check_write+0x18/0x20 [ 32.189456] kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90 [ 32.189876] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 32.190879] ? __kmalloc_cache_noprof+0x184/0x410 [ 32.191561] ? trace_hardirqs_on+0x37/0xe0 [ 32.192244] ? kasan_bitops_generic+0x93/0x1c0 [ 32.192689] kasan_bitops_generic+0x122/0x1c0 [ 32.193093] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 32.193496] ? __pfx_read_tsc+0x10/0x10 [ 32.194029] ? ktime_get_ts64+0x84/0x230 [ 32.194342] kunit_try_run_case+0x1b3/0x490 [ 32.194650] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.195231] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 32.195729] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 32.196265] ? __kthread_parkme+0x82/0x160 [ 32.196628] ? preempt_count_sub+0x50/0x80 [ 32.196954] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.197509] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 32.198435] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.199034] kthread+0x257/0x310 [ 32.199313] ? __pfx_kthread+0x10/0x10 [ 32.199597] ret_from_fork+0x41/0x80 [ 32.200089] ? __pfx_kthread+0x10/0x10 [ 32.200930] ret_from_fork_asm+0x1a/0x30 [ 32.201794] </TASK> [ 32.202071] [ 32.202557] Allocated by task 268: [ 32.202821] kasan_save_stack+0x3d/0x60 [ 32.203096] kasan_save_track+0x18/0x40 [ 32.203600] kasan_save_alloc_info+0x3b/0x50 [ 32.204138] __kasan_kmalloc+0xb7/0xc0 [ 32.204928] __kmalloc_cache_noprof+0x184/0x410 [ 32.205398] kasan_bitops_generic+0x93/0x1c0 [ 32.205867] kunit_try_run_case+0x1b3/0x490 [ 32.206426] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.207064] kthread+0x257/0x310 [ 32.207503] ret_from_fork+0x41/0x80 [ 32.207955] ret_from_fork_asm+0x1a/0x30 [ 32.208378] [ 32.208611] The buggy address belongs to the object at ffff888101a98520 [ 32.208611] which belongs to the cache kmalloc-16 of size 16 [ 32.209393] The buggy address is located 8 bytes inside of [ 32.209393] allocated 9-byte region [ffff888101a98520, ffff888101a98529) [ 32.212448] [ 32.212602] The buggy address belongs to the physical page: [ 32.213843] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101a98 [ 32.214502] flags: 0x200000000000000(node=0|zone=2) [ 32.215433] page_type: f5(slab) [ 32.216543] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 32.217816] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 32.219436] page dumped because: kasan: bad access detected [ 32.220861] [ 32.221242] Memory state around the buggy address: [ 32.222444] ffff888101a98400: fa fb fc fc 00 01 fc fc 00 01 fc fc fa fb fc fc [ 32.224139] ffff888101a98480: 00 01 fc fc 00 01 fc fc fa fb fc fc fa fb fc fc [ 32.225511] >ffff888101a98500: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 32.227406] ^ [ 32.227686] ffff888101a98580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.230071] ffff888101a98600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.231128] ================================================================== [ 32.459775] ================================================================== [ 32.461250] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90 [ 32.462388] Read of size 8 at addr ffff888101a98528 by task kunit_try_catch/268 [ 32.462968] [ 32.463264] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 32.464357] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.464889] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 32.465595] Call Trace: [ 32.466319] <TASK> [ 32.466648] dump_stack_lvl+0x73/0xb0 [ 32.467164] print_report+0xd1/0x640 [ 32.467476] ? __virt_addr_valid+0x1db/0x2d0 [ 32.467931] ? kasan_complete_mode_report_info+0x2a/0x200 [ 32.468733] kasan_report+0x102/0x140 [ 32.469434] ? kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90 [ 32.470288] ? kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90 [ 32.470568] __asan_report_load8_noabort+0x18/0x20 [ 32.471390] kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90 [ 32.472673] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 32.473397] ? __kmalloc_cache_noprof+0x184/0x410 [ 32.473861] ? trace_hardirqs_on+0x37/0xe0 [ 32.474381] ? kasan_bitops_generic+0x93/0x1c0 [ 32.474772] kasan_bitops_generic+0x122/0x1c0 [ 32.475327] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 32.475749] ? __pfx_read_tsc+0x10/0x10 [ 32.476139] ? ktime_get_ts64+0x84/0x230 [ 32.476609] kunit_try_run_case+0x1b3/0x490 [ 32.477085] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.477524] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 32.478214] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 32.478910] ? __kthread_parkme+0x82/0x160 [ 32.479369] ? preempt_count_sub+0x50/0x80 [ 32.480021] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.480642] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 32.481316] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.481835] kthread+0x257/0x310 [ 32.482105] ? __pfx_kthread+0x10/0x10 [ 32.482620] ret_from_fork+0x41/0x80 [ 32.483101] ? __pfx_kthread+0x10/0x10 [ 32.483613] ret_from_fork_asm+0x1a/0x30 [ 32.484062] </TASK> [ 32.485893] [ 32.486560] Allocated by task 268: [ 32.487901] kasan_save_stack+0x3d/0x60 [ 32.488160] kasan_save_track+0x18/0x40 [ 32.488549] kasan_save_alloc_info+0x3b/0x50 [ 32.488932] __kasan_kmalloc+0xb7/0xc0 [ 32.489925] __kmalloc_cache_noprof+0x184/0x410 [ 32.490232] kasan_bitops_generic+0x93/0x1c0 [ 32.491790] kunit_try_run_case+0x1b3/0x490 [ 32.492052] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.492364] kthread+0x257/0x310 [ 32.493615] ret_from_fork+0x41/0x80 [ 32.494388] ret_from_fork_asm+0x1a/0x30 [ 32.495275] [ 32.495522] The buggy address belongs to the object at ffff888101a98520 [ 32.495522] which belongs to the cache kmalloc-16 of size 16 [ 32.497361] The buggy address is located 8 bytes inside of [ 32.497361] allocated 9-byte region [ffff888101a98520, ffff888101a98529) [ 32.497980] [ 32.498126] The buggy address belongs to the physical page: [ 32.498409] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101a98 [ 32.500096] flags: 0x200000000000000(node=0|zone=2) [ 32.500944] page_type: f5(slab) [ 32.501345] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 32.501917] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 32.502730] page dumped because: kasan: bad access detected [ 32.503188] [ 32.503433] Memory state around the buggy address: [ 32.503851] ffff888101a98400: fa fb fc fc 00 01 fc fc 00 01 fc fc fa fb fc fc [ 32.504454] ffff888101a98480: 00 01 fc fc 00 01 fc fc fa fb fc fc fa fb fc fc [ 32.505144] >ffff888101a98500: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 32.505718] ^ [ 32.506125] ffff888101a98580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.506916] ffff888101a98600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.507424] ================================================================== [ 32.329888] ================================================================== [ 32.330938] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90 [ 32.332119] Write of size 8 at addr ffff888101a98528 by task kunit_try_catch/268 [ 32.333349] [ 32.333561] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 32.334920] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.335100] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 32.335427] Call Trace: [ 32.335553] <TASK> [ 32.335750] dump_stack_lvl+0x73/0xb0 [ 32.336134] print_report+0xd1/0x640 [ 32.336406] ? __virt_addr_valid+0x1db/0x2d0 [ 32.336754] ? kasan_complete_mode_report_info+0x2a/0x200 [ 32.337099] kasan_report+0x102/0x140 [ 32.337383] ? kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90 [ 32.338264] ? kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90 [ 32.339252] kasan_check_range+0x10c/0x1c0 [ 32.339878] __kasan_check_write+0x18/0x20 [ 32.340305] kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90 [ 32.340888] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 32.341288] ? __kmalloc_cache_noprof+0x184/0x410 [ 32.341640] ? trace_hardirqs_on+0x37/0xe0 [ 32.342090] ? kasan_bitops_generic+0x93/0x1c0 [ 32.342621] kasan_bitops_generic+0x122/0x1c0 [ 32.342999] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 32.343554] ? __pfx_read_tsc+0x10/0x10 [ 32.343951] ? ktime_get_ts64+0x84/0x230 [ 32.344446] kunit_try_run_case+0x1b3/0x490 [ 32.344926] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.345304] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 32.345933] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 32.346374] ? __kthread_parkme+0x82/0x160 [ 32.346897] ? preempt_count_sub+0x50/0x80 [ 32.347270] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.347726] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 32.348350] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.348939] kthread+0x257/0x310 [ 32.349201] ? __pfx_kthread+0x10/0x10 [ 32.349758] ret_from_fork+0x41/0x80 [ 32.350203] ? __pfx_kthread+0x10/0x10 [ 32.350721] ret_from_fork_asm+0x1a/0x30 [ 32.351252] </TASK> [ 32.351499] [ 32.351727] Allocated by task 268: [ 32.352141] kasan_save_stack+0x3d/0x60 [ 32.352664] kasan_save_track+0x18/0x40 [ 32.352997] kasan_save_alloc_info+0x3b/0x50 [ 32.353294] __kasan_kmalloc+0xb7/0xc0 [ 32.353843] __kmalloc_cache_noprof+0x184/0x410 [ 32.354385] kasan_bitops_generic+0x93/0x1c0 [ 32.354936] kunit_try_run_case+0x1b3/0x490 [ 32.355311] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.355846] kthread+0x257/0x310 [ 32.356200] ret_from_fork+0x41/0x80 [ 32.356588] ret_from_fork_asm+0x1a/0x30 [ 32.357127] [ 32.357303] The buggy address belongs to the object at ffff888101a98520 [ 32.357303] which belongs to the cache kmalloc-16 of size 16 [ 32.358246] The buggy address is located 8 bytes inside of [ 32.358246] allocated 9-byte region [ffff888101a98520, ffff888101a98529) [ 32.359230] [ 32.359450] The buggy address belongs to the physical page: [ 32.359946] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101a98 [ 32.360497] flags: 0x200000000000000(node=0|zone=2) [ 32.361150] page_type: f5(slab) [ 32.361564] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 32.362284] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 32.363071] page dumped because: kasan: bad access detected [ 32.363506] [ 32.363799] Memory state around the buggy address: [ 32.364099] ffff888101a98400: fa fb fc fc 00 01 fc fc 00 01 fc fc fa fb fc fc [ 32.364918] ffff888101a98480: 00 01 fc fc 00 01 fc fc fa fb fc fc fa fb fc fc [ 32.365472] >ffff888101a98500: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 32.366252] ^ [ 32.366723] ffff888101a98580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.367192] ffff888101a98600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.367918] ==================================================================