Date
Nov. 22, 2024, 6:35 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 37.959697] ================================================================== [ 37.960885] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc8 [ 37.963118] Write of size 8 at addr fff00000c5ce6808 by task kunit_try_catch/250 [ 37.964151] [ 37.964469] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 37.965830] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.966475] Hardware name: linux,dummy-virt (DT) [ 37.967075] Call trace: [ 37.967802] show_stack+0x20/0x38 (C) [ 37.968559] dump_stack_lvl+0x8c/0xd0 [ 37.969200] print_report+0x118/0x5e0 [ 37.969993] kasan_report+0xc8/0x118 [ 37.970668] kasan_check_range+0x100/0x1a8 [ 37.971394] __kasan_check_write+0x20/0x30 [ 37.972071] kasan_bitops_modify.constprop.0+0x3b0/0xbc8 [ 37.972937] kasan_bitops_generic+0x110/0x1c8 [ 37.973497] kunit_try_run_case+0x14c/0x3d0 [ 37.974241] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.975041] kthread+0x24c/0x2d0 [ 37.975693] ret_from_fork+0x10/0x20 [ 37.976330] [ 37.976782] Allocated by task 250: [ 37.977273] kasan_save_stack+0x3c/0x68 [ 37.977992] kasan_save_track+0x20/0x40 [ 37.978645] kasan_save_alloc_info+0x40/0x58 [ 37.979330] __kasan_kmalloc+0xd4/0xd8 [ 37.979866] __kmalloc_cache_noprof+0x15c/0x3c8 [ 37.980642] kasan_bitops_generic+0xa0/0x1c8 [ 37.981268] kunit_try_run_case+0x14c/0x3d0 [ 37.981810] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.982664] kthread+0x24c/0x2d0 [ 37.983240] ret_from_fork+0x10/0x20 [ 37.983802] [ 37.984255] The buggy address belongs to the object at fff00000c5ce6800 [ 37.984255] which belongs to the cache kmalloc-16 of size 16 [ 37.985786] The buggy address is located 8 bytes inside of [ 37.985786] allocated 9-byte region [fff00000c5ce6800, fff00000c5ce6809) [ 37.987205] [ 37.987541] The buggy address belongs to the physical page: [ 37.988271] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ce6 [ 37.989273] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.990065] page_type: f5(slab) [ 37.990744] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 37.991751] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 37.992700] page dumped because: kasan: bad access detected [ 37.993419] [ 37.993815] Memory state around the buggy address: [ 37.994332] fff00000c5ce6700: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 37.995403] fff00000c5ce6780: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc [ 37.996357] >fff00000c5ce6800: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.997308] ^ [ 37.997841] fff00000c5ce6880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.998876] fff00000c5ce6900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.999766] ================================================================== [ 37.714481] ================================================================== [ 37.715237] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa88/0xbc8 [ 37.716129] Read of size 8 at addr fff00000c5ce6808 by task kunit_try_catch/250 [ 37.716942] [ 37.718335] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 37.719617] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.720293] Hardware name: linux,dummy-virt (DT) [ 37.721180] Call trace: [ 37.721617] show_stack+0x20/0x38 (C) [ 37.722204] dump_stack_lvl+0x8c/0xd0 [ 37.723255] print_report+0x118/0x5e0 [ 37.724104] kasan_report+0xc8/0x118 [ 37.724794] __asan_report_load8_noabort+0x20/0x30 [ 37.725879] kasan_bitops_modify.constprop.0+0xa88/0xbc8 [ 37.726608] kasan_bitops_generic+0x110/0x1c8 [ 37.727220] kunit_try_run_case+0x14c/0x3d0 [ 37.727952] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.728721] kthread+0x24c/0x2d0 [ 37.729184] ret_from_fork+0x10/0x20 [ 37.730352] [ 37.730795] Allocated by task 250: [ 37.731410] kasan_save_stack+0x3c/0x68 [ 37.732034] kasan_save_track+0x20/0x40 [ 37.732984] kasan_save_alloc_info+0x40/0x58 [ 37.733597] __kasan_kmalloc+0xd4/0xd8 [ 37.734256] __kmalloc_cache_noprof+0x15c/0x3c8 [ 37.735008] kasan_bitops_generic+0xa0/0x1c8 [ 37.735731] kunit_try_run_case+0x14c/0x3d0 [ 37.736391] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.738792] kthread+0x24c/0x2d0 [ 37.739563] ret_from_fork+0x10/0x20 [ 37.740115] [ 37.740810] The buggy address belongs to the object at fff00000c5ce6800 [ 37.740810] which belongs to the cache kmalloc-16 of size 16 [ 37.742687] The buggy address is located 8 bytes inside of [ 37.742687] allocated 9-byte region [fff00000c5ce6800, fff00000c5ce6809) [ 37.744083] [ 37.744420] The buggy address belongs to the physical page: [ 37.745809] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ce6 [ 37.746847] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.747660] page_type: f5(slab) [ 37.748193] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 37.749516] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 37.750378] page dumped because: kasan: bad access detected [ 37.751182] [ 37.751577] Memory state around the buggy address: [ 37.752290] fff00000c5ce6700: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 37.753530] fff00000c5ce6780: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc [ 37.754392] >fff00000c5ce6800: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.755493] ^ [ 37.755985] fff00000c5ce6880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.757385] fff00000c5ce6900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.758619] ================================================================== [ 37.761039] ================================================================== [ 37.761779] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc8 [ 37.763953] Write of size 8 at addr fff00000c5ce6808 by task kunit_try_catch/250 [ 37.765549] [ 37.765895] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 37.767063] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.767654] Hardware name: linux,dummy-virt (DT) [ 37.768495] Call trace: [ 37.768857] show_stack+0x20/0x38 (C) [ 37.769832] dump_stack_lvl+0x8c/0xd0 [ 37.770519] print_report+0x118/0x5e0 [ 37.771112] kasan_report+0xc8/0x118 [ 37.771831] kasan_check_range+0x100/0x1a8 [ 37.773017] __kasan_check_write+0x20/0x30 [ 37.773634] kasan_bitops_modify.constprop.0+0x2b4/0xbc8 [ 37.774458] kasan_bitops_generic+0x110/0x1c8 [ 37.775115] kunit_try_run_case+0x14c/0x3d0 [ 37.775762] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.776990] kthread+0x24c/0x2d0 [ 37.777515] ret_from_fork+0x10/0x20 [ 37.778078] [ 37.778484] Allocated by task 250: [ 37.778969] kasan_save_stack+0x3c/0x68 [ 37.779775] kasan_save_track+0x20/0x40 [ 37.780358] kasan_save_alloc_info+0x40/0x58 [ 37.782387] __kasan_kmalloc+0xd4/0xd8 [ 37.783009] __kmalloc_cache_noprof+0x15c/0x3c8 [ 37.783655] kasan_bitops_generic+0xa0/0x1c8 [ 37.784321] kunit_try_run_case+0x14c/0x3d0 [ 37.785194] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.786724] kthread+0x24c/0x2d0 [ 37.787256] ret_from_fork+0x10/0x20 [ 37.787787] [ 37.788208] The buggy address belongs to the object at fff00000c5ce6800 [ 37.788208] which belongs to the cache kmalloc-16 of size 16 [ 37.790348] The buggy address is located 8 bytes inside of [ 37.790348] allocated 9-byte region [fff00000c5ce6800, fff00000c5ce6809) [ 37.791802] [ 37.792293] The buggy address belongs to the physical page: [ 37.793501] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ce6 [ 37.794713] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.795629] page_type: f5(slab) [ 37.796127] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 37.797745] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 37.798684] page dumped because: kasan: bad access detected [ 37.799546] [ 37.800038] Memory state around the buggy address: [ 37.801886] fff00000c5ce6700: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 37.803122] fff00000c5ce6780: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc [ 37.804254] >fff00000c5ce6800: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.805345] ^ [ 37.805900] fff00000c5ce6880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.807031] fff00000c5ce6900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.808389] ================================================================== [ 37.858032] ================================================================== [ 37.859344] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaf4/0xbc8 [ 37.860551] Read of size 8 at addr fff00000c5ce6808 by task kunit_try_catch/250 [ 37.861651] [ 37.862025] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 37.863651] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.864410] Hardware name: linux,dummy-virt (DT) [ 37.865495] Call trace: [ 37.866009] show_stack+0x20/0x38 (C) [ 37.866693] dump_stack_lvl+0x8c/0xd0 [ 37.867363] print_report+0x118/0x5e0 [ 37.868109] kasan_report+0xc8/0x118 [ 37.869159] __asan_report_load8_noabort+0x20/0x30 [ 37.870079] kasan_bitops_modify.constprop.0+0xaf4/0xbc8 [ 37.870888] kasan_bitops_generic+0x110/0x1c8 [ 37.871642] kunit_try_run_case+0x14c/0x3d0 [ 37.872389] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.873600] kthread+0x24c/0x2d0 [ 37.874564] ret_from_fork+0x10/0x20 [ 37.875093] [ 37.875470] Allocated by task 250: [ 37.876084] kasan_save_stack+0x3c/0x68 [ 37.877131] kasan_save_track+0x20/0x40 [ 37.877912] kasan_save_alloc_info+0x40/0x58 [ 37.878741] __kasan_kmalloc+0xd4/0xd8 [ 37.879424] __kmalloc_cache_noprof+0x15c/0x3c8 [ 37.880115] kasan_bitops_generic+0xa0/0x1c8 [ 37.880832] kunit_try_run_case+0x14c/0x3d0 [ 37.881570] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.882372] kthread+0x24c/0x2d0 [ 37.882928] ret_from_fork+0x10/0x20 [ 37.884567] [ 37.884988] The buggy address belongs to the object at fff00000c5ce6800 [ 37.884988] which belongs to the cache kmalloc-16 of size 16 [ 37.886380] The buggy address is located 8 bytes inside of [ 37.886380] allocated 9-byte region [fff00000c5ce6800, fff00000c5ce6809) [ 37.888145] [ 37.888937] The buggy address belongs to the physical page: [ 37.889754] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ce6 [ 37.890581] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.891001] page_type: f5(slab) [ 37.891260] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 37.891747] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 37.892177] page dumped because: kasan: bad access detected [ 37.892708] [ 37.893142] Memory state around the buggy address: [ 37.894593] fff00000c5ce6700: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 37.896231] fff00000c5ce6780: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc [ 37.898025] >fff00000c5ce6800: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.898818] ^ [ 37.899889] fff00000c5ce6880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.900540] fff00000c5ce6900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.901114] ================================================================== [ 37.557069] ================================================================== [ 37.558491] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc8 [ 37.559795] Write of size 8 at addr fff00000c5ce6808 by task kunit_try_catch/250 [ 37.561614] [ 37.562217] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 37.563905] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.564453] Hardware name: linux,dummy-virt (DT) [ 37.565874] Call trace: [ 37.566354] show_stack+0x20/0x38 (C) [ 37.567104] dump_stack_lvl+0x8c/0xd0 [ 37.567772] print_report+0x118/0x5e0 [ 37.568324] kasan_report+0xc8/0x118 [ 37.569262] kasan_check_range+0x100/0x1a8 [ 37.569866] __kasan_check_write+0x20/0x30 [ 37.570627] kasan_bitops_modify.constprop.0+0x100/0xbc8 [ 37.571472] kasan_bitops_generic+0x110/0x1c8 [ 37.572096] kunit_try_run_case+0x14c/0x3d0 [ 37.573343] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.574115] kthread+0x24c/0x2d0 [ 37.574792] ret_from_fork+0x10/0x20 [ 37.575337] [ 37.575898] Allocated by task 250: [ 37.576498] kasan_save_stack+0x3c/0x68 [ 37.577869] kasan_save_track+0x20/0x40 [ 37.578609] kasan_save_alloc_info+0x40/0x58 [ 37.579163] __kasan_kmalloc+0xd4/0xd8 [ 37.580342] __kmalloc_cache_noprof+0x15c/0x3c8 [ 37.581406] kasan_bitops_generic+0xa0/0x1c8 [ 37.582012] kunit_try_run_case+0x14c/0x3d0 [ 37.582710] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.583425] kthread+0x24c/0x2d0 [ 37.583984] ret_from_fork+0x10/0x20 [ 37.584571] [ 37.585040] The buggy address belongs to the object at fff00000c5ce6800 [ 37.585040] which belongs to the cache kmalloc-16 of size 16 [ 37.586539] The buggy address is located 8 bytes inside of [ 37.586539] allocated 9-byte region [fff00000c5ce6800, fff00000c5ce6809) [ 37.589028] [ 37.589403] The buggy address belongs to the physical page: [ 37.590179] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ce6 [ 37.591119] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.591913] page_type: f5(slab) [ 37.592513] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 37.594162] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 37.595272] page dumped because: kasan: bad access detected [ 37.596124] [ 37.597405] Memory state around the buggy address: [ 37.597967] fff00000c5ce6700: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 37.599282] fff00000c5ce6780: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc [ 37.600399] >fff00000c5ce6800: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.601836] ^ [ 37.602364] fff00000c5ce6880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.603260] fff00000c5ce6900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.604085] ================================================================== [ 37.902216] ================================================================== [ 37.902862] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc8 [ 37.905702] Write of size 8 at addr fff00000c5ce6808 by task kunit_try_catch/250 [ 37.907046] [ 37.909583] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 37.913148] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.914948] Hardware name: linux,dummy-virt (DT) [ 37.915905] Call trace: [ 37.916919] show_stack+0x20/0x38 (C) [ 37.919132] dump_stack_lvl+0x8c/0xd0 [ 37.920204] print_report+0x118/0x5e0 [ 37.921727] kasan_report+0xc8/0x118 [ 37.922608] kasan_check_range+0x100/0x1a8 [ 37.923109] __kasan_check_write+0x20/0x30 [ 37.923695] kasan_bitops_modify.constprop.0+0x344/0xbc8 [ 37.924923] kasan_bitops_generic+0x110/0x1c8 [ 37.926302] kunit_try_run_case+0x14c/0x3d0 [ 37.927234] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.928353] kthread+0x24c/0x2d0 [ 37.929459] ret_from_fork+0x10/0x20 [ 37.930023] [ 37.930486] Allocated by task 250: [ 37.931136] kasan_save_stack+0x3c/0x68 [ 37.931693] kasan_save_track+0x20/0x40 [ 37.932523] kasan_save_alloc_info+0x40/0x58 [ 37.933566] __kasan_kmalloc+0xd4/0xd8 [ 37.934622] __kmalloc_cache_noprof+0x15c/0x3c8 [ 37.935943] kasan_bitops_generic+0xa0/0x1c8 [ 37.936670] kunit_try_run_case+0x14c/0x3d0 [ 37.937243] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.938049] kthread+0x24c/0x2d0 [ 37.938743] ret_from_fork+0x10/0x20 [ 37.939264] [ 37.939731] The buggy address belongs to the object at fff00000c5ce6800 [ 37.939731] which belongs to the cache kmalloc-16 of size 16 [ 37.941397] The buggy address is located 8 bytes inside of [ 37.941397] allocated 9-byte region [fff00000c5ce6800, fff00000c5ce6809) [ 37.943199] [ 37.943603] The buggy address belongs to the physical page: [ 37.944318] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ce6 [ 37.946319] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.946961] page_type: f5(slab) [ 37.947259] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 37.948512] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 37.949982] page dumped because: kasan: bad access detected [ 37.950663] [ 37.950987] Memory state around the buggy address: [ 37.951772] fff00000c5ce6700: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 37.953655] fff00000c5ce6780: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc [ 37.954896] >fff00000c5ce6800: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.955716] ^ [ 37.956474] fff00000c5ce6880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.957619] fff00000c5ce6900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.958060] ================================================================== [ 37.665577] ================================================================== [ 37.667466] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc8 [ 37.669181] Write of size 8 at addr fff00000c5ce6808 by task kunit_try_catch/250 [ 37.670602] [ 37.671111] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 37.672369] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.673571] Hardware name: linux,dummy-virt (DT) [ 37.674278] Call trace: [ 37.674684] show_stack+0x20/0x38 (C) [ 37.675267] dump_stack_lvl+0x8c/0xd0 [ 37.675871] print_report+0x118/0x5e0 [ 37.676547] kasan_report+0xc8/0x118 [ 37.677670] kasan_check_range+0x100/0x1a8 [ 37.678398] __kasan_check_write+0x20/0x30 [ 37.679246] kasan_bitops_modify.constprop.0+0x1dc/0xbc8 [ 37.680075] kasan_bitops_generic+0x110/0x1c8 [ 37.680828] kunit_try_run_case+0x14c/0x3d0 [ 37.682009] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.682853] kthread+0x24c/0x2d0 [ 37.683486] ret_from_fork+0x10/0x20 [ 37.684086] [ 37.684527] Allocated by task 250: [ 37.685363] kasan_save_stack+0x3c/0x68 [ 37.686093] kasan_save_track+0x20/0x40 [ 37.686564] kasan_save_alloc_info+0x40/0x58 [ 37.687300] __kasan_kmalloc+0xd4/0xd8 [ 37.687932] __kmalloc_cache_noprof+0x15c/0x3c8 [ 37.688853] kasan_bitops_generic+0xa0/0x1c8 [ 37.690121] kunit_try_run_case+0x14c/0x3d0 [ 37.690701] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.691450] kthread+0x24c/0x2d0 [ 37.691923] ret_from_fork+0x10/0x20 [ 37.692752] [ 37.693663] The buggy address belongs to the object at fff00000c5ce6800 [ 37.693663] which belongs to the cache kmalloc-16 of size 16 [ 37.695580] The buggy address is located 8 bytes inside of [ 37.695580] allocated 9-byte region [fff00000c5ce6800, fff00000c5ce6809) [ 37.696424] [ 37.697194] The buggy address belongs to the physical page: [ 37.698075] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ce6 [ 37.699743] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.700810] page_type: f5(slab) [ 37.701280] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 37.702251] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 37.703968] page dumped because: kasan: bad access detected [ 37.704326] [ 37.704701] Memory state around the buggy address: [ 37.705846] fff00000c5ce6700: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 37.706813] fff00000c5ce6780: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc [ 37.707764] >fff00000c5ce6800: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.708969] ^ [ 37.709661] fff00000c5ce6880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.711523] fff00000c5ce6900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.712616] ================================================================== [ 37.607545] ================================================================== [ 37.608421] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa4c/0xbc8 [ 37.610908] Read of size 8 at addr fff00000c5ce6808 by task kunit_try_catch/250 [ 37.611967] [ 37.612401] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 37.613638] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.614160] Hardware name: linux,dummy-virt (DT) [ 37.615055] Call trace: [ 37.615471] show_stack+0x20/0x38 (C) [ 37.616052] dump_stack_lvl+0x8c/0xd0 [ 37.616996] print_report+0x118/0x5e0 [ 37.617757] kasan_report+0xc8/0x118 [ 37.619100] __asan_report_load8_noabort+0x20/0x30 [ 37.620007] kasan_bitops_modify.constprop.0+0xa4c/0xbc8 [ 37.620959] kasan_bitops_generic+0x110/0x1c8 [ 37.621781] kunit_try_run_case+0x14c/0x3d0 [ 37.622524] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.623338] kthread+0x24c/0x2d0 [ 37.623941] ret_from_fork+0x10/0x20 [ 37.624717] [ 37.625016] Allocated by task 250: [ 37.625534] kasan_save_stack+0x3c/0x68 [ 37.625986] kasan_save_track+0x20/0x40 [ 37.627650] kasan_save_alloc_info+0x40/0x58 [ 37.628263] __kasan_kmalloc+0xd4/0xd8 [ 37.628699] __kmalloc_cache_noprof+0x15c/0x3c8 [ 37.629144] kasan_bitops_generic+0xa0/0x1c8 [ 37.629601] kunit_try_run_case+0x14c/0x3d0 [ 37.632928] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.635123] kthread+0x24c/0x2d0 [ 37.635860] ret_from_fork+0x10/0x20 [ 37.637607] [ 37.638577] The buggy address belongs to the object at fff00000c5ce6800 [ 37.638577] which belongs to the cache kmalloc-16 of size 16 [ 37.642623] The buggy address is located 8 bytes inside of [ 37.642623] allocated 9-byte region [fff00000c5ce6800, fff00000c5ce6809) [ 37.644542] [ 37.644840] The buggy address belongs to the physical page: [ 37.645340] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ce6 [ 37.648102] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.649185] page_type: f5(slab) [ 37.650336] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 37.651626] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 37.652809] page dumped because: kasan: bad access detected [ 37.653314] [ 37.654586] Memory state around the buggy address: [ 37.655850] fff00000c5ce6700: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 37.657131] fff00000c5ce6780: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc [ 37.658202] >fff00000c5ce6800: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.659596] ^ [ 37.660095] fff00000c5ce6880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.661788] fff00000c5ce6900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.662723] ================================================================== [ 38.001455] ================================================================== [ 38.003054] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa28/0xbc8 [ 38.004140] Read of size 8 at addr fff00000c5ce6808 by task kunit_try_catch/250 [ 38.005168] [ 38.005596] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 38.006783] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.007378] Hardware name: linux,dummy-virt (DT) [ 38.008135] Call trace: [ 38.008520] show_stack+0x20/0x38 (C) [ 38.009247] dump_stack_lvl+0x8c/0xd0 [ 38.009899] print_report+0x118/0x5e0 [ 38.010600] kasan_report+0xc8/0x118 [ 38.011296] __asan_report_load8_noabort+0x20/0x30 [ 38.011935] kasan_bitops_modify.constprop.0+0xa28/0xbc8 [ 38.012747] kasan_bitops_generic+0x110/0x1c8 [ 38.013533] kunit_try_run_case+0x14c/0x3d0 [ 38.014186] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.015067] kthread+0x24c/0x2d0 [ 38.015589] ret_from_fork+0x10/0x20 [ 38.016254] [ 38.016572] Allocated by task 250: [ 38.017085] kasan_save_stack+0x3c/0x68 [ 38.017756] kasan_save_track+0x20/0x40 [ 38.018515] kasan_save_alloc_info+0x40/0x58 [ 38.019157] __kasan_kmalloc+0xd4/0xd8 [ 38.019717] __kmalloc_cache_noprof+0x15c/0x3c8 [ 38.020483] kasan_bitops_generic+0xa0/0x1c8 [ 38.021089] kunit_try_run_case+0x14c/0x3d0 [ 38.021725] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.022477] kthread+0x24c/0x2d0 [ 38.023027] ret_from_fork+0x10/0x20 [ 38.023581] [ 38.023994] The buggy address belongs to the object at fff00000c5ce6800 [ 38.023994] which belongs to the cache kmalloc-16 of size 16 [ 38.025582] The buggy address is located 8 bytes inside of [ 38.025582] allocated 9-byte region [fff00000c5ce6800, fff00000c5ce6809) [ 38.027012] [ 38.027404] The buggy address belongs to the physical page: [ 38.028213] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ce6 [ 38.029200] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.030142] page_type: f5(slab) [ 38.030674] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 38.031792] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 38.032797] page dumped because: kasan: bad access detected [ 38.033489] [ 38.033872] Memory state around the buggy address: [ 38.034534] fff00000c5ce6700: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 38.035461] fff00000c5ce6780: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc [ 38.036397] >fff00000c5ce6800: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.037330] ^ [ 38.037951] fff00000c5ce6880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.038809] fff00000c5ce6900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.039752] ================================================================== [ 37.810904] ================================================================== [ 37.811857] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc8 [ 37.813290] Write of size 8 at addr fff00000c5ce6808 by task kunit_try_catch/250 [ 37.814662] [ 37.814971] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 37.816054] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.816703] Hardware name: linux,dummy-virt (DT) [ 37.817319] Call trace: [ 37.817905] show_stack+0x20/0x38 (C) [ 37.818833] dump_stack_lvl+0x8c/0xd0 [ 37.819591] print_report+0x118/0x5e0 [ 37.820305] kasan_report+0xc8/0x118 [ 37.821260] kasan_check_range+0x100/0x1a8 [ 37.821910] __kasan_check_write+0x20/0x30 [ 37.822513] kasan_bitops_modify.constprop.0+0x320/0xbc8 [ 37.823376] kasan_bitops_generic+0x110/0x1c8 [ 37.824036] kunit_try_run_case+0x14c/0x3d0 [ 37.824796] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.825590] kthread+0x24c/0x2d0 [ 37.826166] ret_from_fork+0x10/0x20 [ 37.827197] [ 37.827540] Allocated by task 250: [ 37.827972] kasan_save_stack+0x3c/0x68 [ 37.829115] kasan_save_track+0x20/0x40 [ 37.829826] kasan_save_alloc_info+0x40/0x58 [ 37.830646] __kasan_kmalloc+0xd4/0xd8 [ 37.830981] __kmalloc_cache_noprof+0x15c/0x3c8 [ 37.831297] kasan_bitops_generic+0xa0/0x1c8 [ 37.831736] kunit_try_run_case+0x14c/0x3d0 [ 37.832523] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.833490] kthread+0x24c/0x2d0 [ 37.834102] ret_from_fork+0x10/0x20 [ 37.835410] [ 37.836684] The buggy address belongs to the object at fff00000c5ce6800 [ 37.836684] which belongs to the cache kmalloc-16 of size 16 [ 37.838932] The buggy address is located 8 bytes inside of [ 37.838932] allocated 9-byte region [fff00000c5ce6800, fff00000c5ce6809) [ 37.840410] [ 37.840991] The buggy address belongs to the physical page: [ 37.842088] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ce6 [ 37.843370] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.844311] page_type: f5(slab) [ 37.845404] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 37.846704] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 37.847819] page dumped because: kasan: bad access detected [ 37.848986] [ 37.849315] Memory state around the buggy address: [ 37.850160] fff00000c5ce6700: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 37.851137] fff00000c5ce6780: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc [ 37.852169] >fff00000c5ce6800: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.853234] ^ [ 37.854099] fff00000c5ce6880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.855239] fff00000c5ce6900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.856370] ==================================================================
[ 28.712185] ================================================================== [ 28.712545] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ad/0xd50 [ 28.714227] Write of size 8 at addr ffff888100f9bce8 by task kunit_try_catch/269 [ 28.715191] [ 28.715428] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 28.716876] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.717369] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.718028] Call Trace: [ 28.718383] <TASK> [ 28.718672] dump_stack_lvl+0x73/0xb0 [ 28.719097] print_report+0xd1/0x640 [ 28.719668] ? __virt_addr_valid+0x1db/0x2d0 [ 28.720178] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.720925] kasan_report+0x102/0x140 [ 28.721530] ? kasan_bitops_modify.constprop.0+0x4ad/0xd50 [ 28.722233] ? kasan_bitops_modify.constprop.0+0x4ad/0xd50 [ 28.722985] kasan_check_range+0x10c/0x1c0 [ 28.723487] __kasan_check_write+0x18/0x20 [ 28.723974] kasan_bitops_modify.constprop.0+0x4ad/0xd50 [ 28.724412] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 28.725005] ? __kmalloc_cache_noprof+0x184/0x410 [ 28.725474] ? trace_hardirqs_on+0x37/0xe0 [ 28.726000] ? kasan_bitops_generic+0x93/0x1c0 [ 28.726373] kasan_bitops_generic+0x117/0x1c0 [ 28.726990] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 28.727343] ? __pfx_read_tsc+0x10/0x10 [ 28.727787] ? ktime_get_ts64+0x84/0x230 [ 28.728278] kunit_try_run_case+0x1b3/0x490 [ 28.728801] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.729134] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 28.729665] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.730358] ? __kthread_parkme+0x82/0x160 [ 28.730768] ? preempt_count_sub+0x50/0x80 [ 28.731087] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.731773] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.732475] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.732899] kthread+0x257/0x310 [ 28.733307] ? __pfx_kthread+0x10/0x10 [ 28.733684] ret_from_fork+0x41/0x80 [ 28.733988] ? __pfx_kthread+0x10/0x10 [ 28.734256] ret_from_fork_asm+0x1a/0x30 [ 28.734854] </TASK> [ 28.735226] [ 28.735460] Allocated by task 269: [ 28.735840] kasan_save_stack+0x3d/0x60 [ 28.736252] kasan_save_track+0x18/0x40 [ 28.736643] kasan_save_alloc_info+0x3b/0x50 [ 28.737090] __kasan_kmalloc+0xb7/0xc0 [ 28.737458] __kmalloc_cache_noprof+0x184/0x410 [ 28.737946] kasan_bitops_generic+0x93/0x1c0 [ 28.738234] kunit_try_run_case+0x1b3/0x490 [ 28.738791] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.739355] kthread+0x257/0x310 [ 28.739797] ret_from_fork+0x41/0x80 [ 28.740154] ret_from_fork_asm+0x1a/0x30 [ 28.740428] [ 28.740670] The buggy address belongs to the object at ffff888100f9bce0 [ 28.740670] which belongs to the cache kmalloc-16 of size 16 [ 28.741992] The buggy address is located 8 bytes inside of [ 28.741992] allocated 9-byte region [ffff888100f9bce0, ffff888100f9bce9) [ 28.742596] [ 28.742839] The buggy address belongs to the physical page: [ 28.743367] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100f9b [ 28.744034] flags: 0x200000000000000(node=0|zone=2) [ 28.744540] page_type: f5(slab) [ 28.744932] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 28.745482] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 28.746194] page dumped because: kasan: bad access detected [ 28.746488] [ 28.746634] Memory state around the buggy address: [ 28.747016] ffff888100f9bb80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 28.747395] ffff888100f9bc00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 28.747756] >ffff888100f9bc80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 28.748394] ^ [ 28.749215] ffff888100f9bd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.749940] ffff888100f9bd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.750524] ================================================================== [ 28.752349] ================================================================== [ 28.753187] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x548/0xd50 [ 28.753806] Write of size 8 at addr ffff888100f9bce8 by task kunit_try_catch/269 [ 28.754531] [ 28.754866] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 28.755655] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.755931] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.756860] Call Trace: [ 28.757202] <TASK> [ 28.757534] dump_stack_lvl+0x73/0xb0 [ 28.757845] print_report+0xd1/0x640 [ 28.758378] ? __virt_addr_valid+0x1db/0x2d0 [ 28.758874] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.759401] kasan_report+0x102/0x140 [ 28.759859] ? kasan_bitops_modify.constprop.0+0x548/0xd50 [ 28.760442] ? kasan_bitops_modify.constprop.0+0x548/0xd50 [ 28.761076] kasan_check_range+0x10c/0x1c0 [ 28.761738] __kasan_check_write+0x18/0x20 [ 28.762138] kasan_bitops_modify.constprop.0+0x548/0xd50 [ 28.763017] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 28.763675] ? __kmalloc_cache_noprof+0x184/0x410 [ 28.764188] ? trace_hardirqs_on+0x37/0xe0 [ 28.764652] ? kasan_bitops_generic+0x93/0x1c0 [ 28.764996] kasan_bitops_generic+0x117/0x1c0 [ 28.765486] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 28.765952] ? __pfx_read_tsc+0x10/0x10 [ 28.766468] ? ktime_get_ts64+0x84/0x230 [ 28.767075] kunit_try_run_case+0x1b3/0x490 [ 28.767647] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.768496] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 28.769063] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.769386] ? __kthread_parkme+0x82/0x160 [ 28.769755] ? preempt_count_sub+0x50/0x80 [ 28.770387] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.770985] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.771601] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.772214] kthread+0x257/0x310 [ 28.772642] ? __pfx_kthread+0x10/0x10 [ 28.772945] ret_from_fork+0x41/0x80 [ 28.773322] ? __pfx_kthread+0x10/0x10 [ 28.773778] ret_from_fork_asm+0x1a/0x30 [ 28.774270] </TASK> [ 28.774486] [ 28.774638] Allocated by task 269: [ 28.774966] kasan_save_stack+0x3d/0x60 [ 28.775430] kasan_save_track+0x18/0x40 [ 28.775858] kasan_save_alloc_info+0x3b/0x50 [ 28.776424] __kasan_kmalloc+0xb7/0xc0 [ 28.776917] __kmalloc_cache_noprof+0x184/0x410 [ 28.777542] kasan_bitops_generic+0x93/0x1c0 [ 28.777943] kunit_try_run_case+0x1b3/0x490 [ 28.778416] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.779088] kthread+0x257/0x310 [ 28.779326] ret_from_fork+0x41/0x80 [ 28.779775] ret_from_fork_asm+0x1a/0x30 [ 28.780295] [ 28.780507] The buggy address belongs to the object at ffff888100f9bce0 [ 28.780507] which belongs to the cache kmalloc-16 of size 16 [ 28.781410] The buggy address is located 8 bytes inside of [ 28.781410] allocated 9-byte region [ffff888100f9bce0, ffff888100f9bce9) [ 28.782526] [ 28.782847] The buggy address belongs to the physical page: [ 28.783223] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100f9b [ 28.783960] flags: 0x200000000000000(node=0|zone=2) [ 28.784427] page_type: f5(slab) [ 28.784790] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 28.785513] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 28.786232] page dumped because: kasan: bad access detected [ 28.786741] [ 28.787026] Memory state around the buggy address: [ 28.787622] ffff888100f9bb80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 28.788127] ffff888100f9bc00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 28.788683] >ffff888100f9bc80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 28.789415] ^ [ 28.790036] ffff888100f9bd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.790884] ffff888100f9bd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.791267] ================================================================== [ 28.670892] ================================================================== [ 28.671614] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40f/0xd50 [ 28.672168] Write of size 8 at addr ffff888100f9bce8 by task kunit_try_catch/269 [ 28.672548] [ 28.672724] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 28.673656] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.674133] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.674753] Call Trace: [ 28.675174] <TASK> [ 28.675425] dump_stack_lvl+0x73/0xb0 [ 28.675910] print_report+0xd1/0x640 [ 28.676340] ? __virt_addr_valid+0x1db/0x2d0 [ 28.676713] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.677209] kasan_report+0x102/0x140 [ 28.677483] ? kasan_bitops_modify.constprop.0+0x40f/0xd50 [ 28.677839] ? kasan_bitops_modify.constprop.0+0x40f/0xd50 [ 28.678506] kasan_check_range+0x10c/0x1c0 [ 28.678964] __kasan_check_write+0x18/0x20 [ 28.679508] kasan_bitops_modify.constprop.0+0x40f/0xd50 [ 28.680044] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 28.680734] ? __kmalloc_cache_noprof+0x184/0x410 [ 28.681140] ? trace_hardirqs_on+0x37/0xe0 [ 28.681498] ? kasan_bitops_generic+0x93/0x1c0 [ 28.682165] kasan_bitops_generic+0x117/0x1c0 [ 28.682659] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 28.683192] ? __pfx_read_tsc+0x10/0x10 [ 28.683620] ? ktime_get_ts64+0x84/0x230 [ 28.684114] kunit_try_run_case+0x1b3/0x490 [ 28.684706] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.685151] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 28.685695] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.686223] ? __kthread_parkme+0x82/0x160 [ 28.686638] ? preempt_count_sub+0x50/0x80 [ 28.687019] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.687338] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.688095] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.688795] kthread+0x257/0x310 [ 28.689084] ? __pfx_kthread+0x10/0x10 [ 28.689402] ret_from_fork+0x41/0x80 [ 28.689910] ? __pfx_kthread+0x10/0x10 [ 28.690350] ret_from_fork_asm+0x1a/0x30 [ 28.690839] </TASK> [ 28.691064] [ 28.691280] Allocated by task 269: [ 28.691698] kasan_save_stack+0x3d/0x60 [ 28.692158] kasan_save_track+0x18/0x40 [ 28.692693] kasan_save_alloc_info+0x3b/0x50 [ 28.693063] __kasan_kmalloc+0xb7/0xc0 [ 28.693325] __kmalloc_cache_noprof+0x184/0x410 [ 28.693600] kasan_bitops_generic+0x93/0x1c0 [ 28.693927] kunit_try_run_case+0x1b3/0x490 [ 28.694427] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.695196] kthread+0x257/0x310 [ 28.695610] ret_from_fork+0x41/0x80 [ 28.696078] ret_from_fork_asm+0x1a/0x30 [ 28.696660] [ 28.696876] The buggy address belongs to the object at ffff888100f9bce0 [ 28.696876] which belongs to the cache kmalloc-16 of size 16 [ 28.697762] The buggy address is located 8 bytes inside of [ 28.697762] allocated 9-byte region [ffff888100f9bce0, ffff888100f9bce9) [ 28.699156] [ 28.699313] The buggy address belongs to the physical page: [ 28.699600] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100f9b [ 28.700012] flags: 0x200000000000000(node=0|zone=2) [ 28.700304] page_type: f5(slab) [ 28.700664] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 28.701413] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 28.702193] page dumped because: kasan: bad access detected [ 28.702766] [ 28.703006] Memory state around the buggy address: [ 28.704389] ffff888100f9bb80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 28.705550] ffff888100f9bc00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 28.706219] >ffff888100f9bc80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 28.708022] ^ [ 28.708552] ffff888100f9bd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.709003] ffff888100f9bd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.710160] ================================================================== [ 28.474536] ================================================================== [ 28.475488] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19d/0xd50 [ 28.476431] Write of size 8 at addr ffff888100f9bce8 by task kunit_try_catch/269 [ 28.477020] [ 28.477302] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 28.478618] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.479006] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.479765] Call Trace: [ 28.480471] <TASK> [ 28.480750] dump_stack_lvl+0x73/0xb0 [ 28.481481] print_report+0xd1/0x640 [ 28.481807] ? __virt_addr_valid+0x1db/0x2d0 [ 28.482333] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.483214] kasan_report+0x102/0x140 [ 28.484677] ? kasan_bitops_modify.constprop.0+0x19d/0xd50 [ 28.485025] ? kasan_bitops_modify.constprop.0+0x19d/0xd50 [ 28.485780] kasan_check_range+0x10c/0x1c0 [ 28.486785] __kasan_check_write+0x18/0x20 [ 28.487396] kasan_bitops_modify.constprop.0+0x19d/0xd50 [ 28.487784] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 28.488296] ? __kmalloc_cache_noprof+0x184/0x410 [ 28.488699] ? trace_hardirqs_on+0x37/0xe0 [ 28.489684] ? kasan_bitops_generic+0x93/0x1c0 [ 28.490568] kasan_bitops_generic+0x117/0x1c0 [ 28.491243] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 28.492095] ? __pfx_read_tsc+0x10/0x10 [ 28.492558] ? ktime_get_ts64+0x84/0x230 [ 28.493478] kunit_try_run_case+0x1b3/0x490 [ 28.494069] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.494725] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 28.495451] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.496014] ? __kthread_parkme+0x82/0x160 [ 28.496656] ? preempt_count_sub+0x50/0x80 [ 28.497576] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.498297] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.499007] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.499678] kthread+0x257/0x310 [ 28.500321] ? __pfx_kthread+0x10/0x10 [ 28.500648] ret_from_fork+0x41/0x80 [ 28.501713] ? __pfx_kthread+0x10/0x10 [ 28.502337] ret_from_fork_asm+0x1a/0x30 [ 28.502767] </TASK> [ 28.503363] [ 28.503584] Allocated by task 269: [ 28.504127] kasan_save_stack+0x3d/0x60 [ 28.504671] kasan_save_track+0x18/0x40 [ 28.505721] kasan_save_alloc_info+0x3b/0x50 [ 28.506411] __kasan_kmalloc+0xb7/0xc0 [ 28.506735] __kmalloc_cache_noprof+0x184/0x410 [ 28.507465] kasan_bitops_generic+0x93/0x1c0 [ 28.507771] kunit_try_run_case+0x1b3/0x490 [ 28.508427] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.508937] kthread+0x257/0x310 [ 28.509179] ret_from_fork+0x41/0x80 [ 28.509566] ret_from_fork_asm+0x1a/0x30 [ 28.510680] [ 28.510916] The buggy address belongs to the object at ffff888100f9bce0 [ 28.510916] which belongs to the cache kmalloc-16 of size 16 [ 28.511847] The buggy address is located 8 bytes inside of [ 28.511847] allocated 9-byte region [ffff888100f9bce0, ffff888100f9bce9) [ 28.513356] [ 28.513602] The buggy address belongs to the physical page: [ 28.514722] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100f9b [ 28.515461] flags: 0x200000000000000(node=0|zone=2) [ 28.515996] page_type: f5(slab) [ 28.516583] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 28.517343] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 28.518147] page dumped because: kasan: bad access detected [ 28.518659] [ 28.518897] Memory state around the buggy address: [ 28.520165] ffff888100f9bb80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 28.521035] ffff888100f9bc00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 28.521658] >ffff888100f9bc80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 28.522531] ^ [ 28.523210] ffff888100f9bd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.523942] ffff888100f9bd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.524987] ================================================================== [ 28.625039] ================================================================== [ 28.625764] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x374/0xd50 [ 28.626962] Write of size 8 at addr ffff888100f9bce8 by task kunit_try_catch/269 [ 28.627847] [ 28.628024] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 28.629767] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.630339] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.631285] Call Trace: [ 28.631887] <TASK> [ 28.632145] dump_stack_lvl+0x73/0xb0 [ 28.632638] print_report+0xd1/0x640 [ 28.632989] ? __virt_addr_valid+0x1db/0x2d0 [ 28.633561] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.633992] kasan_report+0x102/0x140 [ 28.634445] ? kasan_bitops_modify.constprop.0+0x374/0xd50 [ 28.634917] ? kasan_bitops_modify.constprop.0+0x374/0xd50 [ 28.635474] kasan_check_range+0x10c/0x1c0 [ 28.635999] __kasan_check_write+0x18/0x20 [ 28.636428] kasan_bitops_modify.constprop.0+0x374/0xd50 [ 28.636792] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 28.637479] ? __kmalloc_cache_noprof+0x184/0x410 [ 28.637967] ? trace_hardirqs_on+0x37/0xe0 [ 28.638488] ? kasan_bitops_generic+0x93/0x1c0 [ 28.638815] kasan_bitops_generic+0x117/0x1c0 [ 28.639244] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 28.639761] ? __pfx_read_tsc+0x10/0x10 [ 28.640221] ? ktime_get_ts64+0x84/0x230 [ 28.640652] kunit_try_run_case+0x1b3/0x490 [ 28.641131] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.641704] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 28.642158] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.642473] ? __kthread_parkme+0x82/0x160 [ 28.642759] ? preempt_count_sub+0x50/0x80 [ 28.643224] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.643751] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.644387] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.644887] kthread+0x257/0x310 [ 28.645295] ? __pfx_kthread+0x10/0x10 [ 28.645645] ret_from_fork+0x41/0x80 [ 28.646400] ? __pfx_kthread+0x10/0x10 [ 28.647285] ret_from_fork_asm+0x1a/0x30 [ 28.648260] </TASK> [ 28.649352] [ 28.649587] Allocated by task 269: [ 28.650409] kasan_save_stack+0x3d/0x60 [ 28.650872] kasan_save_track+0x18/0x40 [ 28.651232] kasan_save_alloc_info+0x3b/0x50 [ 28.652100] __kasan_kmalloc+0xb7/0xc0 [ 28.652529] __kmalloc_cache_noprof+0x184/0x410 [ 28.653040] kasan_bitops_generic+0x93/0x1c0 [ 28.653396] kunit_try_run_case+0x1b3/0x490 [ 28.654098] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.654894] kthread+0x257/0x310 [ 28.655207] ret_from_fork+0x41/0x80 [ 28.656126] ret_from_fork_asm+0x1a/0x30 [ 28.656668] [ 28.656871] The buggy address belongs to the object at ffff888100f9bce0 [ 28.656871] which belongs to the cache kmalloc-16 of size 16 [ 28.657710] The buggy address is located 8 bytes inside of [ 28.657710] allocated 9-byte region [ffff888100f9bce0, ffff888100f9bce9) [ 28.658309] [ 28.658530] The buggy address belongs to the physical page: [ 28.659125] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100f9b [ 28.659897] flags: 0x200000000000000(node=0|zone=2) [ 28.660868] page_type: f5(slab) [ 28.661110] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 28.661492] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 28.662449] page dumped because: kasan: bad access detected [ 28.663025] [ 28.663504] Memory state around the buggy address: [ 28.664104] ffff888100f9bb80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 28.664936] ffff888100f9bc00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 28.665787] >ffff888100f9bc80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 28.666579] ^ [ 28.667104] ffff888100f9bd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.667643] ffff888100f9bd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.668277] ================================================================== [ 28.528567] ================================================================== [ 28.529071] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23b/0xd50 [ 28.530059] Write of size 8 at addr ffff888100f9bce8 by task kunit_try_catch/269 [ 28.530710] [ 28.531337] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 28.532613] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.533183] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.534029] Call Trace: [ 28.534409] <TASK> [ 28.534722] dump_stack_lvl+0x73/0xb0 [ 28.535243] print_report+0xd1/0x640 [ 28.535766] ? __virt_addr_valid+0x1db/0x2d0 [ 28.536430] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.537011] kasan_report+0x102/0x140 [ 28.537843] ? kasan_bitops_modify.constprop.0+0x23b/0xd50 [ 28.538535] ? kasan_bitops_modify.constprop.0+0x23b/0xd50 [ 28.538994] kasan_check_range+0x10c/0x1c0 [ 28.539700] __kasan_check_write+0x18/0x20 [ 28.540455] kasan_bitops_modify.constprop.0+0x23b/0xd50 [ 28.540859] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 28.541776] ? __kmalloc_cache_noprof+0x184/0x410 [ 28.542857] ? trace_hardirqs_on+0x37/0xe0 [ 28.543529] ? kasan_bitops_generic+0x93/0x1c0 [ 28.544292] kasan_bitops_generic+0x117/0x1c0 [ 28.544785] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 28.545810] ? __pfx_read_tsc+0x10/0x10 [ 28.546469] ? ktime_get_ts64+0x84/0x230 [ 28.547211] kunit_try_run_case+0x1b3/0x490 [ 28.547635] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.548172] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 28.548929] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.549726] ? __kthread_parkme+0x82/0x160 [ 28.550185] ? preempt_count_sub+0x50/0x80 [ 28.551282] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.551988] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.553052] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.554025] kthread+0x257/0x310 [ 28.554687] ? __pfx_kthread+0x10/0x10 [ 28.555079] ret_from_fork+0x41/0x80 [ 28.556426] ? __pfx_kthread+0x10/0x10 [ 28.556763] ret_from_fork_asm+0x1a/0x30 [ 28.557667] </TASK> [ 28.557923] [ 28.558100] Allocated by task 269: [ 28.559431] kasan_save_stack+0x3d/0x60 [ 28.559757] kasan_save_track+0x18/0x40 [ 28.560225] kasan_save_alloc_info+0x3b/0x50 [ 28.560704] __kasan_kmalloc+0xb7/0xc0 [ 28.561686] __kmalloc_cache_noprof+0x184/0x410 [ 28.562576] kasan_bitops_generic+0x93/0x1c0 [ 28.563697] kunit_try_run_case+0x1b3/0x490 [ 28.564088] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.564721] kthread+0x257/0x310 [ 28.565071] ret_from_fork+0x41/0x80 [ 28.565529] ret_from_fork_asm+0x1a/0x30 [ 28.566230] [ 28.566401] The buggy address belongs to the object at ffff888100f9bce0 [ 28.566401] which belongs to the cache kmalloc-16 of size 16 [ 28.568045] The buggy address is located 8 bytes inside of [ 28.568045] allocated 9-byte region [ffff888100f9bce0, ffff888100f9bce9) [ 28.569065] [ 28.569493] The buggy address belongs to the physical page: [ 28.569969] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100f9b [ 28.570374] flags: 0x200000000000000(node=0|zone=2) [ 28.570815] page_type: f5(slab) [ 28.571472] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 28.572175] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 28.573352] page dumped because: kasan: bad access detected [ 28.574243] [ 28.574453] Memory state around the buggy address: [ 28.574728] ffff888100f9bb80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 28.575408] ffff888100f9bc00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 28.576589] >ffff888100f9bc80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 28.577272] ^ [ 28.577794] ffff888100f9bd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.578952] ffff888100f9bd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.579745] ================================================================== [ 28.420227] ================================================================== [ 28.421526] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x102/0xd50 [ 28.422181] Write of size 8 at addr ffff888100f9bce8 by task kunit_try_catch/269 [ 28.422729] [ 28.423608] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 28.424596] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.425308] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.426271] Call Trace: [ 28.426603] <TASK> [ 28.427405] dump_stack_lvl+0x73/0xb0 [ 28.427801] print_report+0xd1/0x640 [ 28.428512] ? __virt_addr_valid+0x1db/0x2d0 [ 28.428937] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.429649] kasan_report+0x102/0x140 [ 28.430200] ? kasan_bitops_modify.constprop.0+0x102/0xd50 [ 28.431407] ? kasan_bitops_modify.constprop.0+0x102/0xd50 [ 28.431920] kasan_check_range+0x10c/0x1c0 [ 28.432602] __kasan_check_write+0x18/0x20 [ 28.433315] kasan_bitops_modify.constprop.0+0x102/0xd50 [ 28.434015] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 28.434630] ? __kmalloc_cache_noprof+0x184/0x410 [ 28.435529] ? trace_hardirqs_on+0x37/0xe0 [ 28.436066] ? kasan_bitops_generic+0x93/0x1c0 [ 28.436415] kasan_bitops_generic+0x117/0x1c0 [ 28.437135] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 28.437745] ? __pfx_read_tsc+0x10/0x10 [ 28.438341] ? ktime_get_ts64+0x84/0x230 [ 28.439307] kunit_try_run_case+0x1b3/0x490 [ 28.439804] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.440306] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 28.440695] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.441416] ? __kthread_parkme+0x82/0x160 [ 28.442172] ? preempt_count_sub+0x50/0x80 [ 28.442732] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.443681] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.444470] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.445110] kthread+0x257/0x310 [ 28.445597] ? __pfx_kthread+0x10/0x10 [ 28.446296] ret_from_fork+0x41/0x80 [ 28.446615] ? __pfx_kthread+0x10/0x10 [ 28.447563] ret_from_fork_asm+0x1a/0x30 [ 28.448349] </TASK> [ 28.448719] [ 28.449131] Allocated by task 269: [ 28.449577] kasan_save_stack+0x3d/0x60 [ 28.450230] kasan_save_track+0x18/0x40 [ 28.450690] kasan_save_alloc_info+0x3b/0x50 [ 28.451729] __kasan_kmalloc+0xb7/0xc0 [ 28.452393] __kmalloc_cache_noprof+0x184/0x410 [ 28.452707] kasan_bitops_generic+0x93/0x1c0 [ 28.453402] kunit_try_run_case+0x1b3/0x490 [ 28.454167] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.454619] kthread+0x257/0x310 [ 28.455512] ret_from_fork+0x41/0x80 [ 28.456207] ret_from_fork_asm+0x1a/0x30 [ 28.456663] [ 28.457181] The buggy address belongs to the object at ffff888100f9bce0 [ 28.457181] which belongs to the cache kmalloc-16 of size 16 [ 28.458526] The buggy address is located 8 bytes inside of [ 28.458526] allocated 9-byte region [ffff888100f9bce0, ffff888100f9bce9) [ 28.459703] [ 28.460550] The buggy address belongs to the physical page: [ 28.461293] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100f9b [ 28.462150] flags: 0x200000000000000(node=0|zone=2) [ 28.462793] page_type: f5(slab) [ 28.463756] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 28.464132] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 28.464805] page dumped because: kasan: bad access detected [ 28.465611] [ 28.465761] Memory state around the buggy address: [ 28.466552] ffff888100f9bb80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 28.467637] ffff888100f9bc00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 28.468408] >ffff888100f9bc80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 28.469216] ^ [ 28.469813] ffff888100f9bd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.470655] ffff888100f9bd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.471669] ================================================================== [ 28.581221] ================================================================== [ 28.582354] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d6/0xd50 [ 28.583111] Write of size 8 at addr ffff888100f9bce8 by task kunit_try_catch/269 [ 28.583739] [ 28.584000] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 28.585517] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.585880] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.586379] Call Trace: [ 28.586583] <TASK> [ 28.586758] dump_stack_lvl+0x73/0xb0 [ 28.587076] print_report+0xd1/0x640 [ 28.587551] ? __virt_addr_valid+0x1db/0x2d0 [ 28.588044] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.588591] kasan_report+0x102/0x140 [ 28.589211] ? kasan_bitops_modify.constprop.0+0x2d6/0xd50 [ 28.590025] ? kasan_bitops_modify.constprop.0+0x2d6/0xd50 [ 28.590758] kasan_check_range+0x10c/0x1c0 [ 28.591168] __kasan_check_write+0x18/0x20 [ 28.591454] kasan_bitops_modify.constprop.0+0x2d6/0xd50 [ 28.591788] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 28.592398] ? __kmalloc_cache_noprof+0x184/0x410 [ 28.592976] ? trace_hardirqs_on+0x37/0xe0 [ 28.593491] ? kasan_bitops_generic+0x93/0x1c0 [ 28.594032] kasan_bitops_generic+0x117/0x1c0 [ 28.594630] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 28.595023] ? __pfx_read_tsc+0x10/0x10 [ 28.595327] ? ktime_get_ts64+0x84/0x230 [ 28.595770] kunit_try_run_case+0x1b3/0x490 [ 28.596302] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.596850] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 28.597263] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.597839] ? __kthread_parkme+0x82/0x160 [ 28.598192] ? preempt_count_sub+0x50/0x80 [ 28.598696] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.599169] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.599926] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.600323] kthread+0x257/0x310 [ 28.600581] ? __pfx_kthread+0x10/0x10 [ 28.600878] ret_from_fork+0x41/0x80 [ 28.601280] ? __pfx_kthread+0x10/0x10 [ 28.601761] ret_from_fork_asm+0x1a/0x30 [ 28.602267] </TASK> [ 28.602542] [ 28.602755] Allocated by task 269: [ 28.603165] kasan_save_stack+0x3d/0x60 [ 28.603602] kasan_save_track+0x18/0x40 [ 28.603969] kasan_save_alloc_info+0x3b/0x50 [ 28.604250] __kasan_kmalloc+0xb7/0xc0 [ 28.604507] __kmalloc_cache_noprof+0x184/0x410 [ 28.604778] kasan_bitops_generic+0x93/0x1c0 [ 28.605236] kunit_try_run_case+0x1b3/0x490 [ 28.605817] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.606439] kthread+0x257/0x310 [ 28.606850] ret_from_fork+0x41/0x80 [ 28.607246] ret_from_fork_asm+0x1a/0x30 [ 28.607725] [ 28.607966] The buggy address belongs to the object at ffff888100f9bce0 [ 28.607966] which belongs to the cache kmalloc-16 of size 16 [ 28.609391] The buggy address is located 8 bytes inside of [ 28.609391] allocated 9-byte region [ffff888100f9bce0, ffff888100f9bce9) [ 28.609980] [ 28.610137] The buggy address belongs to the physical page: [ 28.610558] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100f9b [ 28.611268] flags: 0x200000000000000(node=0|zone=2) [ 28.611790] page_type: f5(slab) [ 28.612197] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 28.612817] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 28.613628] page dumped because: kasan: bad access detected [ 28.613968] [ 28.614115] Memory state around the buggy address: [ 28.614516] ffff888100f9bb80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 28.615526] ffff888100f9bc00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 28.616606] >ffff888100f9bc80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 28.618217] ^ [ 28.619411] ffff888100f9bd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.621164] ffff888100f9bd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.622016] ==================================================================