Date
Nov. 22, 2024, 6:35 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 38.081525] ================================================================== [ 38.082379] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa08/0xbc8 [ 38.083810] Read of size 8 at addr fff00000c5ce6808 by task kunit_try_catch/250 [ 38.085055] [ 38.085430] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 38.086620] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.087456] Hardware name: linux,dummy-virt (DT) [ 38.088547] Call trace: [ 38.088871] show_stack+0x20/0x38 (C) [ 38.089577] dump_stack_lvl+0x8c/0xd0 [ 38.090146] print_report+0x118/0x5e0 [ 38.092063] kasan_report+0xc8/0x118 [ 38.092905] __asan_report_load8_noabort+0x20/0x30 [ 38.093621] kasan_bitops_test_and_modify.constprop.0+0xa08/0xbc8 [ 38.094172] kasan_bitops_generic+0x11c/0x1c8 [ 38.095045] kunit_try_run_case+0x14c/0x3d0 [ 38.095626] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.096605] kthread+0x24c/0x2d0 [ 38.097137] ret_from_fork+0x10/0x20 [ 38.097693] [ 38.098149] Allocated by task 250: [ 38.098721] kasan_save_stack+0x3c/0x68 [ 38.099526] kasan_save_track+0x20/0x40 [ 38.100327] kasan_save_alloc_info+0x40/0x58 [ 38.100971] __kasan_kmalloc+0xd4/0xd8 [ 38.101723] __kmalloc_cache_noprof+0x15c/0x3c8 [ 38.102421] kasan_bitops_generic+0xa0/0x1c8 [ 38.103187] kunit_try_run_case+0x14c/0x3d0 [ 38.103918] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.104660] kthread+0x24c/0x2d0 [ 38.105115] ret_from_fork+0x10/0x20 [ 38.105808] [ 38.106205] The buggy address belongs to the object at fff00000c5ce6800 [ 38.106205] which belongs to the cache kmalloc-16 of size 16 [ 38.107421] The buggy address is located 8 bytes inside of [ 38.107421] allocated 9-byte region [fff00000c5ce6800, fff00000c5ce6809) [ 38.109020] [ 38.109331] The buggy address belongs to the physical page: [ 38.110116] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ce6 [ 38.111183] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.111875] page_type: f5(slab) [ 38.112578] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 38.113508] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 38.114419] page dumped because: kasan: bad access detected [ 38.115111] [ 38.115507] Memory state around the buggy address: [ 38.116091] fff00000c5ce6700: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 38.117165] fff00000c5ce6780: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc [ 38.117982] >fff00000c5ce6800: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.119030] ^ [ 38.119660] fff00000c5ce6880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.120536] fff00000c5ce6900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.121418] ================================================================== [ 38.381117] ================================================================== [ 38.382083] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa8c/0xbc8 [ 38.383166] Read of size 8 at addr fff00000c5ce6808 by task kunit_try_catch/250 [ 38.384197] [ 38.384815] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 38.386020] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.386797] Hardware name: linux,dummy-virt (DT) [ 38.387531] Call trace: [ 38.388107] show_stack+0x20/0x38 (C) [ 38.388803] dump_stack_lvl+0x8c/0xd0 [ 38.389567] print_report+0x118/0x5e0 [ 38.390319] kasan_report+0xc8/0x118 [ 38.391040] __asan_report_load8_noabort+0x20/0x30 [ 38.391787] kasan_bitops_test_and_modify.constprop.0+0xa8c/0xbc8 [ 38.392684] kasan_bitops_generic+0x11c/0x1c8 [ 38.393499] kunit_try_run_case+0x14c/0x3d0 [ 38.394345] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.395208] kthread+0x24c/0x2d0 [ 38.395834] ret_from_fork+0x10/0x20 [ 38.396499] [ 38.396837] Allocated by task 250: [ 38.397656] kasan_save_stack+0x3c/0x68 [ 38.398210] kasan_save_track+0x20/0x40 [ 38.399112] kasan_save_alloc_info+0x40/0x58 [ 38.399944] __kasan_kmalloc+0xd4/0xd8 [ 38.400748] __kmalloc_cache_noprof+0x15c/0x3c8 [ 38.401692] kasan_bitops_generic+0xa0/0x1c8 [ 38.402594] kunit_try_run_case+0x14c/0x3d0 [ 38.403501] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.404372] kthread+0x24c/0x2d0 [ 38.404938] ret_from_fork+0x10/0x20 [ 38.405984] [ 38.406273] The buggy address belongs to the object at fff00000c5ce6800 [ 38.406273] which belongs to the cache kmalloc-16 of size 16 [ 38.407794] The buggy address is located 8 bytes inside of [ 38.407794] allocated 9-byte region [fff00000c5ce6800, fff00000c5ce6809) [ 38.409291] [ 38.409818] The buggy address belongs to the physical page: [ 38.410531] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ce6 [ 38.411554] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.412408] page_type: f5(slab) [ 38.412895] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 38.413893] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 38.414800] page dumped because: kasan: bad access detected [ 38.415506] [ 38.415834] Memory state around the buggy address: [ 38.416368] fff00000c5ce6700: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 38.417377] fff00000c5ce6780: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc [ 38.418178] >fff00000c5ce6800: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.419100] ^ [ 38.419762] fff00000c5ce6880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.420681] fff00000c5ce6900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.421702] ================================================================== [ 38.215282] ================================================================== [ 38.216177] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc8 [ 38.217397] Write of size 8 at addr fff00000c5ce6808 by task kunit_try_catch/250 [ 38.218147] [ 38.218488] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 38.221049] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.222404] Hardware name: linux,dummy-virt (DT) [ 38.223083] Call trace: [ 38.223667] show_stack+0x20/0x38 (C) [ 38.224235] dump_stack_lvl+0x8c/0xd0 [ 38.224924] print_report+0x118/0x5e0 [ 38.225585] kasan_report+0xc8/0x118 [ 38.226256] kasan_check_range+0x100/0x1a8 [ 38.227000] __kasan_check_write+0x20/0x30 [ 38.227708] kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc8 [ 38.228560] kasan_bitops_generic+0x11c/0x1c8 [ 38.229236] kunit_try_run_case+0x14c/0x3d0 [ 38.229900] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.230799] kthread+0x24c/0x2d0 [ 38.231315] ret_from_fork+0x10/0x20 [ 38.231946] [ 38.232317] Allocated by task 250: [ 38.232886] kasan_save_stack+0x3c/0x68 [ 38.233425] kasan_save_track+0x20/0x40 [ 38.234133] kasan_save_alloc_info+0x40/0x58 [ 38.234739] __kasan_kmalloc+0xd4/0xd8 [ 38.235475] __kmalloc_cache_noprof+0x15c/0x3c8 [ 38.236113] kasan_bitops_generic+0xa0/0x1c8 [ 38.236957] kunit_try_run_case+0x14c/0x3d0 [ 38.237638] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.238385] kthread+0x24c/0x2d0 [ 38.238928] ret_from_fork+0x10/0x20 [ 38.239492] [ 38.239825] The buggy address belongs to the object at fff00000c5ce6800 [ 38.239825] which belongs to the cache kmalloc-16 of size 16 [ 38.241332] The buggy address is located 8 bytes inside of [ 38.241332] allocated 9-byte region [fff00000c5ce6800, fff00000c5ce6809) [ 38.242828] [ 38.243238] The buggy address belongs to the physical page: [ 38.244095] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ce6 [ 38.245045] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.246023] page_type: f5(slab) [ 38.246571] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 38.247515] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 38.248509] page dumped because: kasan: bad access detected [ 38.249187] [ 38.249561] Memory state around the buggy address: [ 38.250197] fff00000c5ce6700: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 38.251115] fff00000c5ce6780: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc [ 38.252113] >fff00000c5ce6800: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.252945] ^ [ 38.253585] fff00000c5ce6880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.254478] fff00000c5ce6900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.255227] ================================================================== [ 38.298067] ================================================================== [ 38.298883] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x334/0xbc8 [ 38.299840] Write of size 8 at addr fff00000c5ce6808 by task kunit_try_catch/250 [ 38.300584] [ 38.301077] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 38.302334] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.302933] Hardware name: linux,dummy-virt (DT) [ 38.303598] Call trace: [ 38.304100] show_stack+0x20/0x38 (C) [ 38.304868] dump_stack_lvl+0x8c/0xd0 [ 38.305535] print_report+0x118/0x5e0 [ 38.306190] kasan_report+0xc8/0x118 [ 38.306903] kasan_check_range+0x100/0x1a8 [ 38.307577] __kasan_check_write+0x20/0x30 [ 38.308208] kasan_bitops_test_and_modify.constprop.0+0x334/0xbc8 [ 38.308949] kasan_bitops_generic+0x11c/0x1c8 [ 38.309737] kunit_try_run_case+0x14c/0x3d0 [ 38.310562] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.311347] kthread+0x24c/0x2d0 [ 38.312035] ret_from_fork+0x10/0x20 [ 38.312688] [ 38.313032] Allocated by task 250: [ 38.313517] kasan_save_stack+0x3c/0x68 [ 38.314203] kasan_save_track+0x20/0x40 [ 38.314811] kasan_save_alloc_info+0x40/0x58 [ 38.315348] __kasan_kmalloc+0xd4/0xd8 [ 38.316047] __kmalloc_cache_noprof+0x15c/0x3c8 [ 38.316590] kasan_bitops_generic+0xa0/0x1c8 [ 38.317303] kunit_try_run_case+0x14c/0x3d0 [ 38.317936] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.318836] kthread+0x24c/0x2d0 [ 38.319274] ret_from_fork+0x10/0x20 [ 38.319940] [ 38.320275] The buggy address belongs to the object at fff00000c5ce6800 [ 38.320275] which belongs to the cache kmalloc-16 of size 16 [ 38.321948] The buggy address is located 8 bytes inside of [ 38.321948] allocated 9-byte region [fff00000c5ce6800, fff00000c5ce6809) [ 38.323356] [ 38.323750] The buggy address belongs to the physical page: [ 38.324376] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ce6 [ 38.325485] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.326429] page_type: f5(slab) [ 38.326911] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 38.327866] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 38.328847] page dumped because: kasan: bad access detected [ 38.329565] [ 38.329920] Memory state around the buggy address: [ 38.330510] fff00000c5ce6700: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 38.331465] fff00000c5ce6780: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc [ 38.332394] >fff00000c5ce6800: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.333339] ^ [ 38.333898] fff00000c5ce6880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.334748] fff00000c5ce6900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.335546] ================================================================== [ 38.168388] ================================================================== [ 38.169470] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa50/0xbc8 [ 38.170814] Read of size 8 at addr fff00000c5ce6808 by task kunit_try_catch/250 [ 38.171749] [ 38.172159] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 38.174947] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.175406] Hardware name: linux,dummy-virt (DT) [ 38.175862] Call trace: [ 38.176163] show_stack+0x20/0x38 (C) [ 38.176617] dump_stack_lvl+0x8c/0xd0 [ 38.177041] print_report+0x118/0x5e0 [ 38.177657] kasan_report+0xc8/0x118 [ 38.179981] __asan_report_load8_noabort+0x20/0x30 [ 38.182495] kasan_bitops_test_and_modify.constprop.0+0xa50/0xbc8 [ 38.184558] kasan_bitops_generic+0x11c/0x1c8 [ 38.186343] kunit_try_run_case+0x14c/0x3d0 [ 38.187691] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.188364] kthread+0x24c/0x2d0 [ 38.189052] ret_from_fork+0x10/0x20 [ 38.189610] [ 38.190012] Allocated by task 250: [ 38.190702] kasan_save_stack+0x3c/0x68 [ 38.191571] kasan_save_track+0x20/0x40 [ 38.192168] kasan_save_alloc_info+0x40/0x58 [ 38.192977] __kasan_kmalloc+0xd4/0xd8 [ 38.193612] __kmalloc_cache_noprof+0x15c/0x3c8 [ 38.194251] kasan_bitops_generic+0xa0/0x1c8 [ 38.194858] kunit_try_run_case+0x14c/0x3d0 [ 38.195573] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.196303] kthread+0x24c/0x2d0 [ 38.196856] ret_from_fork+0x10/0x20 [ 38.197381] [ 38.197820] The buggy address belongs to the object at fff00000c5ce6800 [ 38.197820] which belongs to the cache kmalloc-16 of size 16 [ 38.199227] The buggy address is located 8 bytes inside of [ 38.199227] allocated 9-byte region [fff00000c5ce6800, fff00000c5ce6809) [ 38.200696] [ 38.201100] The buggy address belongs to the physical page: [ 38.201805] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ce6 [ 38.202864] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.203756] page_type: f5(slab) [ 38.204375] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 38.205328] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 38.206199] page dumped because: kasan: bad access detected [ 38.206966] [ 38.207307] Memory state around the buggy address: [ 38.208035] fff00000c5ce6700: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 38.208900] fff00000c5ce6780: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc [ 38.209889] >fff00000c5ce6800: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.210701] ^ [ 38.211281] fff00000c5ce6880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.212063] fff00000c5ce6900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.212991] ================================================================== [ 38.042325] ================================================================== [ 38.043183] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc8 [ 38.044132] Write of size 8 at addr fff00000c5ce6808 by task kunit_try_catch/250 [ 38.045074] [ 38.045425] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 38.046718] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.047383] Hardware name: linux,dummy-virt (DT) [ 38.047955] Call trace: [ 38.048453] show_stack+0x20/0x38 (C) [ 38.049019] dump_stack_lvl+0x8c/0xd0 [ 38.049708] print_report+0x118/0x5e0 [ 38.050301] kasan_report+0xc8/0x118 [ 38.050858] kasan_check_range+0x100/0x1a8 [ 38.051415] __kasan_check_write+0x20/0x30 [ 38.052142] kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc8 [ 38.053021] kasan_bitops_generic+0x11c/0x1c8 [ 38.053720] kunit_try_run_case+0x14c/0x3d0 [ 38.054516] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.055342] kthread+0x24c/0x2d0 [ 38.055865] ret_from_fork+0x10/0x20 [ 38.056538] [ 38.056845] Allocated by task 250: [ 38.057455] kasan_save_stack+0x3c/0x68 [ 38.058152] kasan_save_track+0x20/0x40 [ 38.058727] kasan_save_alloc_info+0x40/0x58 [ 38.059363] __kasan_kmalloc+0xd4/0xd8 [ 38.059980] __kmalloc_cache_noprof+0x15c/0x3c8 [ 38.060512] kasan_bitops_generic+0xa0/0x1c8 [ 38.061234] kunit_try_run_case+0x14c/0x3d0 [ 38.061755] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.062592] kthread+0x24c/0x2d0 [ 38.063202] ret_from_fork+0x10/0x20 [ 38.063779] [ 38.064081] The buggy address belongs to the object at fff00000c5ce6800 [ 38.064081] which belongs to the cache kmalloc-16 of size 16 [ 38.065547] The buggy address is located 8 bytes inside of [ 38.065547] allocated 9-byte region [fff00000c5ce6800, fff00000c5ce6809) [ 38.066971] [ 38.067310] The buggy address belongs to the physical page: [ 38.068098] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ce6 [ 38.069129] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.070045] page_type: f5(slab) [ 38.070740] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 38.071701] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 38.072599] page dumped because: kasan: bad access detected [ 38.073225] [ 38.073621] Memory state around the buggy address: [ 38.074340] fff00000c5ce6700: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 38.075235] fff00000c5ce6780: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc [ 38.076081] >fff00000c5ce6800: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.077000] ^ [ 38.077506] fff00000c5ce6880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.078319] fff00000c5ce6900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.079326] ================================================================== [ 38.338556] ================================================================== [ 38.340216] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa44/0xbc8 [ 38.341239] Read of size 8 at addr fff00000c5ce6808 by task kunit_try_catch/250 [ 38.341979] [ 38.342297] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 38.343672] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.344550] Hardware name: linux,dummy-virt (DT) [ 38.345522] Call trace: [ 38.345919] show_stack+0x20/0x38 (C) [ 38.346536] dump_stack_lvl+0x8c/0xd0 [ 38.347140] print_report+0x118/0x5e0 [ 38.347856] kasan_report+0xc8/0x118 [ 38.348549] __asan_report_load8_noabort+0x20/0x30 [ 38.349211] kasan_bitops_test_and_modify.constprop.0+0xa44/0xbc8 [ 38.350131] kasan_bitops_generic+0x11c/0x1c8 [ 38.350716] kunit_try_run_case+0x14c/0x3d0 [ 38.351475] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.352124] kthread+0x24c/0x2d0 [ 38.352810] ret_from_fork+0x10/0x20 [ 38.353464] [ 38.353808] Allocated by task 250: [ 38.354456] kasan_save_stack+0x3c/0x68 [ 38.355164] kasan_save_track+0x20/0x40 [ 38.355849] kasan_save_alloc_info+0x40/0x58 [ 38.356533] __kasan_kmalloc+0xd4/0xd8 [ 38.357088] __kmalloc_cache_noprof+0x15c/0x3c8 [ 38.357660] kasan_bitops_generic+0xa0/0x1c8 [ 38.358386] kunit_try_run_case+0x14c/0x3d0 [ 38.359079] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.359978] kthread+0x24c/0x2d0 [ 38.360466] ret_from_fork+0x10/0x20 [ 38.361051] [ 38.361926] The buggy address belongs to the object at fff00000c5ce6800 [ 38.361926] which belongs to the cache kmalloc-16 of size 16 [ 38.363319] The buggy address is located 8 bytes inside of [ 38.363319] allocated 9-byte region [fff00000c5ce6800, fff00000c5ce6809) [ 38.364763] [ 38.365121] The buggy address belongs to the physical page: [ 38.365852] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ce6 [ 38.366909] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.368274] page_type: f5(slab) [ 38.368816] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 38.369943] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 38.370973] page dumped because: kasan: bad access detected [ 38.371809] [ 38.372302] Memory state around the buggy address: [ 38.373097] fff00000c5ce6700: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 38.373975] fff00000c5ce6780: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc [ 38.375069] >fff00000c5ce6800: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.376052] ^ [ 38.376763] fff00000c5ce6880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.377653] fff00000c5ce6900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.378569] ================================================================== [ 38.256964] ================================================================== [ 38.257911] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xad4/0xbc8 [ 38.259765] Read of size 8 at addr fff00000c5ce6808 by task kunit_try_catch/250 [ 38.260866] [ 38.261076] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 38.261790] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.262482] Hardware name: linux,dummy-virt (DT) [ 38.263238] Call trace: [ 38.263731] show_stack+0x20/0x38 (C) [ 38.264260] dump_stack_lvl+0x8c/0xd0 [ 38.264978] print_report+0x118/0x5e0 [ 38.265812] kasan_report+0xc8/0x118 [ 38.266416] __asan_report_load8_noabort+0x20/0x30 [ 38.267176] kasan_bitops_test_and_modify.constprop.0+0xad4/0xbc8 [ 38.267775] kasan_bitops_generic+0x11c/0x1c8 [ 38.268221] kunit_try_run_case+0x14c/0x3d0 [ 38.268675] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.269154] kthread+0x24c/0x2d0 [ 38.269550] ret_from_fork+0x10/0x20 [ 38.269981] [ 38.270260] Allocated by task 250: [ 38.270677] kasan_save_stack+0x3c/0x68 [ 38.271179] kasan_save_track+0x20/0x40 [ 38.271858] kasan_save_alloc_info+0x40/0x58 [ 38.272563] __kasan_kmalloc+0xd4/0xd8 [ 38.273921] __kmalloc_cache_noprof+0x15c/0x3c8 [ 38.274822] kasan_bitops_generic+0xa0/0x1c8 [ 38.277398] kunit_try_run_case+0x14c/0x3d0 [ 38.278117] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.278790] kthread+0x24c/0x2d0 [ 38.279325] ret_from_fork+0x10/0x20 [ 38.279874] [ 38.280156] The buggy address belongs to the object at fff00000c5ce6800 [ 38.280156] which belongs to the cache kmalloc-16 of size 16 [ 38.281594] The buggy address is located 8 bytes inside of [ 38.281594] allocated 9-byte region [fff00000c5ce6800, fff00000c5ce6809) [ 38.283008] [ 38.283351] The buggy address belongs to the physical page: [ 38.284123] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ce6 [ 38.285212] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.286109] page_type: f5(slab) [ 38.286738] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 38.287767] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 38.288734] page dumped because: kasan: bad access detected [ 38.289460] [ 38.289810] Memory state around the buggy address: [ 38.290410] fff00000c5ce6700: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 38.291333] fff00000c5ce6780: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc [ 38.292113] >fff00000c5ce6800: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.293086] ^ [ 38.293597] fff00000c5ce6880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.294515] fff00000c5ce6900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.295401] ================================================================== [ 38.123184] ================================================================== [ 38.124806] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc8 [ 38.125895] Write of size 8 at addr fff00000c5ce6808 by task kunit_try_catch/250 [ 38.127335] [ 38.127925] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 38.129318] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.130202] Hardware name: linux,dummy-virt (DT) [ 38.131081] Call trace: [ 38.131729] show_stack+0x20/0x38 (C) [ 38.132556] dump_stack_lvl+0x8c/0xd0 [ 38.133144] print_report+0x118/0x5e0 [ 38.134293] kasan_report+0xc8/0x118 [ 38.135054] kasan_check_range+0x100/0x1a8 [ 38.135853] __kasan_check_write+0x20/0x30 [ 38.136748] kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc8 [ 38.137778] kasan_bitops_generic+0x11c/0x1c8 [ 38.138596] kunit_try_run_case+0x14c/0x3d0 [ 38.139209] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.139951] kthread+0x24c/0x2d0 [ 38.141051] ret_from_fork+0x10/0x20 [ 38.141668] [ 38.142203] Allocated by task 250: [ 38.142678] kasan_save_stack+0x3c/0x68 [ 38.143299] kasan_save_track+0x20/0x40 [ 38.143926] kasan_save_alloc_info+0x40/0x58 [ 38.144670] __kasan_kmalloc+0xd4/0xd8 [ 38.145529] __kmalloc_cache_noprof+0x15c/0x3c8 [ 38.146333] kasan_bitops_generic+0xa0/0x1c8 [ 38.147139] kunit_try_run_case+0x14c/0x3d0 [ 38.147919] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.148791] kthread+0x24c/0x2d0 [ 38.149312] ret_from_fork+0x10/0x20 [ 38.150214] [ 38.150554] The buggy address belongs to the object at fff00000c5ce6800 [ 38.150554] which belongs to the cache kmalloc-16 of size 16 [ 38.152381] The buggy address is located 8 bytes inside of [ 38.152381] allocated 9-byte region [fff00000c5ce6800, fff00000c5ce6809) [ 38.154145] [ 38.154744] The buggy address belongs to the physical page: [ 38.155569] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ce6 [ 38.156566] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.157390] page_type: f5(slab) [ 38.157923] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 38.158891] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 38.159831] page dumped because: kasan: bad access detected [ 38.160627] [ 38.161008] Memory state around the buggy address: [ 38.161648] fff00000c5ce6700: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 38.162713] fff00000c5ce6780: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc [ 38.163517] >fff00000c5ce6800: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.164503] ^ [ 38.164953] fff00000c5ce6880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.165969] fff00000c5ce6900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.166952] ==================================================================
[ 28.840533] ================================================================== [ 28.842343] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90 [ 28.843045] Write of size 8 at addr ffff888100f9bce8 by task kunit_try_catch/269 [ 28.843427] [ 28.843667] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 28.844518] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.844801] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.845395] Call Trace: [ 28.845605] <TASK> [ 28.845812] dump_stack_lvl+0x73/0xb0 [ 28.846352] print_report+0xd1/0x640 [ 28.846801] ? __virt_addr_valid+0x1db/0x2d0 [ 28.847294] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.847733] kasan_report+0x102/0x140 [ 28.848077] ? kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90 [ 28.848912] ? kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90 [ 28.849305] kasan_check_range+0x10c/0x1c0 [ 28.849761] __kasan_check_write+0x18/0x20 [ 28.850136] kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90 [ 28.850765] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 28.851414] ? __kmalloc_cache_noprof+0x184/0x410 [ 28.851717] ? trace_hardirqs_on+0x37/0xe0 [ 28.852155] ? kasan_bitops_generic+0x93/0x1c0 [ 28.852695] kasan_bitops_generic+0x122/0x1c0 [ 28.853172] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 28.853577] ? __pfx_read_tsc+0x10/0x10 [ 28.853880] ? ktime_get_ts64+0x84/0x230 [ 28.854294] kunit_try_run_case+0x1b3/0x490 [ 28.854804] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.855318] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 28.855729] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.856072] ? __kthread_parkme+0x82/0x160 [ 28.856358] ? preempt_count_sub+0x50/0x80 [ 28.856651] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.858965] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.859551] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.860170] kthread+0x257/0x310 [ 28.860549] ? __pfx_kthread+0x10/0x10 [ 28.861900] ret_from_fork+0x41/0x80 [ 28.862909] ? __pfx_kthread+0x10/0x10 [ 28.864073] ret_from_fork_asm+0x1a/0x30 [ 28.864478] </TASK> [ 28.864949] [ 28.865289] Allocated by task 269: [ 28.865696] kasan_save_stack+0x3d/0x60 [ 28.866330] kasan_save_track+0x18/0x40 [ 28.866866] kasan_save_alloc_info+0x3b/0x50 [ 28.867464] __kasan_kmalloc+0xb7/0xc0 [ 28.867886] __kmalloc_cache_noprof+0x184/0x410 [ 28.868348] kasan_bitops_generic+0x93/0x1c0 [ 28.868746] kunit_try_run_case+0x1b3/0x490 [ 28.869583] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.870135] kthread+0x257/0x310 [ 28.871135] ret_from_fork+0x41/0x80 [ 28.871506] ret_from_fork_asm+0x1a/0x30 [ 28.871948] [ 28.872160] The buggy address belongs to the object at ffff888100f9bce0 [ 28.872160] which belongs to the cache kmalloc-16 of size 16 [ 28.873069] The buggy address is located 8 bytes inside of [ 28.873069] allocated 9-byte region [ffff888100f9bce0, ffff888100f9bce9) [ 28.873850] [ 28.874080] The buggy address belongs to the physical page: [ 28.874564] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100f9b [ 28.875321] flags: 0x200000000000000(node=0|zone=2) [ 28.875812] page_type: f5(slab) [ 28.876173] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 28.876765] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 28.877325] page dumped because: kasan: bad access detected [ 28.877890] [ 28.878184] Memory state around the buggy address: [ 28.878615] ffff888100f9bb80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 28.879143] ffff888100f9bc00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 28.879607] >ffff888100f9bc80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 28.880297] ^ [ 28.880874] ffff888100f9bd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.881336] ffff888100f9bd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.882010] ================================================================== [ 28.921765] ================================================================== [ 28.922531] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90 [ 28.923371] Write of size 8 at addr ffff888100f9bce8 by task kunit_try_catch/269 [ 28.924071] [ 28.924354] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 28.925296] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.925711] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.926616] Call Trace: [ 28.926952] <TASK> [ 28.927231] dump_stack_lvl+0x73/0xb0 [ 28.927671] print_report+0xd1/0x640 [ 28.928022] ? __virt_addr_valid+0x1db/0x2d0 [ 28.928491] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.928944] kasan_report+0x102/0x140 [ 28.929414] ? kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90 [ 28.930050] ? kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90 [ 28.930780] kasan_check_range+0x10c/0x1c0 [ 28.931338] __kasan_check_write+0x18/0x20 [ 28.931771] kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90 [ 28.932449] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 28.933154] ? __kmalloc_cache_noprof+0x184/0x410 [ 28.934709] ? trace_hardirqs_on+0x37/0xe0 [ 28.935206] ? kasan_bitops_generic+0x93/0x1c0 [ 28.936241] kasan_bitops_generic+0x122/0x1c0 [ 28.936732] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 28.937116] ? __pfx_read_tsc+0x10/0x10 [ 28.937391] ? ktime_get_ts64+0x84/0x230 [ 28.937792] kunit_try_run_case+0x1b3/0x490 [ 28.938456] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.939524] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 28.940148] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.940518] ? __kthread_parkme+0x82/0x160 [ 28.941082] ? preempt_count_sub+0x50/0x80 [ 28.941573] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.942382] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.943042] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.943388] kthread+0x257/0x310 [ 28.943634] ? __pfx_kthread+0x10/0x10 [ 28.944054] ret_from_fork+0x41/0x80 [ 28.944614] ? __pfx_kthread+0x10/0x10 [ 28.945201] ret_from_fork_asm+0x1a/0x30 [ 28.945770] </TASK> [ 28.946176] [ 28.946521] Allocated by task 269: [ 28.947069] kasan_save_stack+0x3d/0x60 [ 28.947532] kasan_save_track+0x18/0x40 [ 28.948063] kasan_save_alloc_info+0x3b/0x50 [ 28.948789] __kasan_kmalloc+0xb7/0xc0 [ 28.949397] __kmalloc_cache_noprof+0x184/0x410 [ 28.950035] kasan_bitops_generic+0x93/0x1c0 [ 28.950627] kunit_try_run_case+0x1b3/0x490 [ 28.951154] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.952043] kthread+0x257/0x310 [ 28.952498] ret_from_fork+0x41/0x80 [ 28.952810] ret_from_fork_asm+0x1a/0x30 [ 28.953237] [ 28.953499] The buggy address belongs to the object at ffff888100f9bce0 [ 28.953499] which belongs to the cache kmalloc-16 of size 16 [ 28.954391] The buggy address is located 8 bytes inside of [ 28.954391] allocated 9-byte region [ffff888100f9bce0, ffff888100f9bce9) [ 28.955335] [ 28.955594] The buggy address belongs to the physical page: [ 28.956039] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100f9b [ 28.956734] flags: 0x200000000000000(node=0|zone=2) [ 28.957202] page_type: f5(slab) [ 28.957605] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 28.958300] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 28.958943] page dumped because: kasan: bad access detected [ 28.959241] [ 28.959500] Memory state around the buggy address: [ 28.960009] ffff888100f9bb80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 28.960649] ffff888100f9bc00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 28.961366] >ffff888100f9bc80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 28.961940] ^ [ 28.962503] ffff888100f9bd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.963097] ffff888100f9bd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.963634] ================================================================== [ 29.002630] ================================================================== [ 29.004485] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90 [ 29.005367] Write of size 8 at addr ffff888100f9bce8 by task kunit_try_catch/269 [ 29.006053] [ 29.006367] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 29.007036] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.007510] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.008107] Call Trace: [ 29.008503] <TASK> [ 29.008729] dump_stack_lvl+0x73/0xb0 [ 29.009229] print_report+0xd1/0x640 [ 29.009620] ? __virt_addr_valid+0x1db/0x2d0 [ 29.009961] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.010348] kasan_report+0x102/0x140 [ 29.010622] ? kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90 [ 29.011161] ? kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90 [ 29.011868] kasan_check_range+0x10c/0x1c0 [ 29.012406] __kasan_check_write+0x18/0x20 [ 29.012871] kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90 [ 29.013548] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 29.014223] ? __kmalloc_cache_noprof+0x184/0x410 [ 29.014782] ? trace_hardirqs_on+0x37/0xe0 [ 29.015280] ? kasan_bitops_generic+0x93/0x1c0 [ 29.015740] kasan_bitops_generic+0x122/0x1c0 [ 29.016240] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 29.016794] ? __pfx_read_tsc+0x10/0x10 [ 29.017096] ? ktime_get_ts64+0x84/0x230 [ 29.017431] kunit_try_run_case+0x1b3/0x490 [ 29.017725] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.018059] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.018485] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.019089] ? __kthread_parkme+0x82/0x160 [ 29.019615] ? preempt_count_sub+0x50/0x80 [ 29.020155] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.020677] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.021341] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.021915] kthread+0x257/0x310 [ 29.022385] ? __pfx_kthread+0x10/0x10 [ 29.022795] ret_from_fork+0x41/0x80 [ 29.023223] ? __pfx_kthread+0x10/0x10 [ 29.023716] ret_from_fork_asm+0x1a/0x30 [ 29.024187] </TASK> [ 29.024535] [ 29.024780] Allocated by task 269: [ 29.025068] kasan_save_stack+0x3d/0x60 [ 29.025378] kasan_save_track+0x18/0x40 [ 29.025634] kasan_save_alloc_info+0x3b/0x50 [ 29.026027] __kasan_kmalloc+0xb7/0xc0 [ 29.026437] __kmalloc_cache_noprof+0x184/0x410 [ 29.026919] kasan_bitops_generic+0x93/0x1c0 [ 29.027389] kunit_try_run_case+0x1b3/0x490 [ 29.029865] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.030470] kthread+0x257/0x310 [ 29.030859] ret_from_fork+0x41/0x80 [ 29.031262] ret_from_fork_asm+0x1a/0x30 [ 29.031560] [ 29.031709] The buggy address belongs to the object at ffff888100f9bce0 [ 29.031709] which belongs to the cache kmalloc-16 of size 16 [ 29.034774] The buggy address is located 8 bytes inside of [ 29.034774] allocated 9-byte region [ffff888100f9bce0, ffff888100f9bce9) [ 29.036053] [ 29.036285] The buggy address belongs to the physical page: [ 29.038947] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100f9b [ 29.039489] flags: 0x200000000000000(node=0|zone=2) [ 29.039908] page_type: f5(slab) [ 29.040438] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 29.041230] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 29.041760] page dumped because: kasan: bad access detected [ 29.042237] [ 29.042463] Memory state around the buggy address: [ 29.042943] ffff888100f9bb80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 29.043334] ffff888100f9bc00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 29.043957] >ffff888100f9bc80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 29.044510] ^ [ 29.045166] ffff888100f9bd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.045539] ffff888100f9bd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.046179] ================================================================== [ 29.047810] ================================================================== [ 29.048397] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90 [ 29.049168] Write of size 8 at addr ffff888100f9bce8 by task kunit_try_catch/269 [ 29.049855] [ 29.050114] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 29.051157] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.051467] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.052598] Call Trace: [ 29.052944] <TASK> [ 29.053223] dump_stack_lvl+0x73/0xb0 [ 29.053648] print_report+0xd1/0x640 [ 29.054026] ? __virt_addr_valid+0x1db/0x2d0 [ 29.054855] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.055496] kasan_report+0x102/0x140 [ 29.055774] ? kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90 [ 29.056189] ? kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90 [ 29.056987] kasan_check_range+0x10c/0x1c0 [ 29.057655] __kasan_check_write+0x18/0x20 [ 29.058119] kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90 [ 29.058880] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 29.059840] ? __kmalloc_cache_noprof+0x184/0x410 [ 29.060472] ? trace_hardirqs_on+0x37/0xe0 [ 29.061000] ? kasan_bitops_generic+0x93/0x1c0 [ 29.061707] kasan_bitops_generic+0x122/0x1c0 [ 29.062418] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 29.062799] ? __pfx_read_tsc+0x10/0x10 [ 29.063290] ? ktime_get_ts64+0x84/0x230 [ 29.063780] kunit_try_run_case+0x1b3/0x490 [ 29.064301] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.065048] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.065452] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.066121] ? __kthread_parkme+0x82/0x160 [ 29.066776] ? preempt_count_sub+0x50/0x80 [ 29.067318] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.068020] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.068778] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.069498] kthread+0x257/0x310 [ 29.069786] ? __pfx_kthread+0x10/0x10 [ 29.070232] ret_from_fork+0x41/0x80 [ 29.070573] ? __pfx_kthread+0x10/0x10 [ 29.070945] ret_from_fork_asm+0x1a/0x30 [ 29.071936] </TASK> [ 29.072139] [ 29.072279] Allocated by task 269: [ 29.072423] kasan_save_stack+0x3d/0x60 [ 29.072574] kasan_save_track+0x18/0x40 [ 29.072714] kasan_save_alloc_info+0x3b/0x50 [ 29.073592] __kasan_kmalloc+0xb7/0xc0 [ 29.074483] __kmalloc_cache_noprof+0x184/0x410 [ 29.074924] kasan_bitops_generic+0x93/0x1c0 [ 29.075844] kunit_try_run_case+0x1b3/0x490 [ 29.076286] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.076753] kthread+0x257/0x310 [ 29.077068] ret_from_fork+0x41/0x80 [ 29.077422] ret_from_fork_asm+0x1a/0x30 [ 29.077789] [ 29.078992] The buggy address belongs to the object at ffff888100f9bce0 [ 29.078992] which belongs to the cache kmalloc-16 of size 16 [ 29.080442] The buggy address is located 8 bytes inside of [ 29.080442] allocated 9-byte region [ffff888100f9bce0, ffff888100f9bce9) [ 29.081265] [ 29.081488] The buggy address belongs to the physical page: [ 29.082191] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100f9b [ 29.082644] flags: 0x200000000000000(node=0|zone=2) [ 29.083110] page_type: f5(slab) [ 29.083495] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 29.084444] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 29.084958] page dumped because: kasan: bad access detected [ 29.085439] [ 29.085737] Memory state around the buggy address: [ 29.086102] ffff888100f9bb80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 29.086465] ffff888100f9bc00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 29.087098] >ffff888100f9bc80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 29.087664] ^ [ 29.088351] ffff888100f9bd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.088981] ffff888100f9bd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.089857] ================================================================== [ 29.092740] ================================================================== [ 29.093666] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x558/0xd90 [ 29.094335] Read of size 8 at addr ffff888100f9bce8 by task kunit_try_catch/269 [ 29.094892] [ 29.095065] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 29.095932] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.096364] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.097352] Call Trace: [ 29.097557] <TASK> [ 29.097747] dump_stack_lvl+0x73/0xb0 [ 29.098449] print_report+0xd1/0x640 [ 29.098904] ? __virt_addr_valid+0x1db/0x2d0 [ 29.099401] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.099914] kasan_report+0x102/0x140 [ 29.100299] ? kasan_bitops_test_and_modify.constprop.0+0x558/0xd90 [ 29.100954] ? kasan_bitops_test_and_modify.constprop.0+0x558/0xd90 [ 29.101518] kasan_check_range+0x10c/0x1c0 [ 29.101814] __kasan_check_read+0x15/0x20 [ 29.102132] kasan_bitops_test_and_modify.constprop.0+0x558/0xd90 [ 29.102739] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 29.103468] ? __kmalloc_cache_noprof+0x184/0x410 [ 29.103982] ? trace_hardirqs_on+0x37/0xe0 [ 29.104386] ? kasan_bitops_generic+0x93/0x1c0 [ 29.105790] kasan_bitops_generic+0x122/0x1c0 [ 29.106668] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 29.107181] ? __pfx_read_tsc+0x10/0x10 [ 29.108063] ? ktime_get_ts64+0x84/0x230 [ 29.108591] kunit_try_run_case+0x1b3/0x490 [ 29.109054] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.109883] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.110470] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.110945] ? __kthread_parkme+0x82/0x160 [ 29.111414] ? preempt_count_sub+0x50/0x80 [ 29.111788] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.112300] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.112781] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.113249] kthread+0x257/0x310 [ 29.113676] ? __pfx_kthread+0x10/0x10 [ 29.114045] ret_from_fork+0x41/0x80 [ 29.114608] ? __pfx_kthread+0x10/0x10 [ 29.115004] ret_from_fork_asm+0x1a/0x30 [ 29.115309] </TASK> [ 29.115591] [ 29.115804] Allocated by task 269: [ 29.116194] kasan_save_stack+0x3d/0x60 [ 29.116615] kasan_save_track+0x18/0x40 [ 29.116945] kasan_save_alloc_info+0x3b/0x50 [ 29.117507] __kasan_kmalloc+0xb7/0xc0 [ 29.117804] __kmalloc_cache_noprof+0x184/0x410 [ 29.118346] kasan_bitops_generic+0x93/0x1c0 [ 29.118634] kunit_try_run_case+0x1b3/0x490 [ 29.118947] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.119307] kthread+0x257/0x310 [ 29.119678] ret_from_fork+0x41/0x80 [ 29.120081] ret_from_fork_asm+0x1a/0x30 [ 29.120707] [ 29.121016] The buggy address belongs to the object at ffff888100f9bce0 [ 29.121016] which belongs to the cache kmalloc-16 of size 16 [ 29.122364] The buggy address is located 8 bytes inside of [ 29.122364] allocated 9-byte region [ffff888100f9bce0, ffff888100f9bce9) [ 29.123366] [ 29.123561] The buggy address belongs to the physical page: [ 29.124059] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100f9b [ 29.124698] flags: 0x200000000000000(node=0|zone=2) [ 29.125022] page_type: f5(slab) [ 29.125262] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 29.125644] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 29.126328] page dumped because: kasan: bad access detected [ 29.126907] [ 29.127236] Memory state around the buggy address: [ 29.127875] ffff888100f9bb80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 29.128590] ffff888100f9bc00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 29.129292] >ffff888100f9bc80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 29.129784] ^ [ 29.130262] ffff888100f9bd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.130803] ffff888100f9bd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.131180] ================================================================== [ 28.883217] ================================================================== [ 28.883918] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90 [ 28.884699] Write of size 8 at addr ffff888100f9bce8 by task kunit_try_catch/269 [ 28.885806] [ 28.886126] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 28.886766] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.887161] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.887993] Call Trace: [ 28.888384] <TASK> [ 28.888593] dump_stack_lvl+0x73/0xb0 [ 28.888944] print_report+0xd1/0x640 [ 28.889352] ? __virt_addr_valid+0x1db/0x2d0 [ 28.889717] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.890376] kasan_report+0x102/0x140 [ 28.890782] ? kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90 [ 28.891475] ? kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90 [ 28.892121] kasan_check_range+0x10c/0x1c0 [ 28.892625] __kasan_check_write+0x18/0x20 [ 28.893138] kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90 [ 28.893760] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 28.894324] ? __kmalloc_cache_noprof+0x184/0x410 [ 28.894817] ? trace_hardirqs_on+0x37/0xe0 [ 28.895214] ? kasan_bitops_generic+0x93/0x1c0 [ 28.895724] kasan_bitops_generic+0x122/0x1c0 [ 28.896161] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 28.896735] ? __pfx_read_tsc+0x10/0x10 [ 28.897131] ? ktime_get_ts64+0x84/0x230 [ 28.897634] kunit_try_run_case+0x1b3/0x490 [ 28.898166] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.898545] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 28.899045] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.899614] ? __kthread_parkme+0x82/0x160 [ 28.899991] ? preempt_count_sub+0x50/0x80 [ 28.900469] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.900975] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.901538] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.902010] kthread+0x257/0x310 [ 28.902434] ? __pfx_kthread+0x10/0x10 [ 28.902873] ret_from_fork+0x41/0x80 [ 28.903351] ? __pfx_kthread+0x10/0x10 [ 28.903760] ret_from_fork_asm+0x1a/0x30 [ 28.904162] </TASK> [ 28.904467] [ 28.904683] Allocated by task 269: [ 28.904997] kasan_save_stack+0x3d/0x60 [ 28.905264] kasan_save_track+0x18/0x40 [ 28.905521] kasan_save_alloc_info+0x3b/0x50 [ 28.905797] __kasan_kmalloc+0xb7/0xc0 [ 28.906235] __kmalloc_cache_noprof+0x184/0x410 [ 28.906741] kasan_bitops_generic+0x93/0x1c0 [ 28.907214] kunit_try_run_case+0x1b3/0x490 [ 28.907701] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.908243] kthread+0x257/0x310 [ 28.908651] ret_from_fork+0x41/0x80 [ 28.909027] ret_from_fork_asm+0x1a/0x30 [ 28.909493] [ 28.909714] The buggy address belongs to the object at ffff888100f9bce0 [ 28.909714] which belongs to the cache kmalloc-16 of size 16 [ 28.910793] The buggy address is located 8 bytes inside of [ 28.910793] allocated 9-byte region [ffff888100f9bce0, ffff888100f9bce9) [ 28.911917] [ 28.912108] The buggy address belongs to the physical page: [ 28.912654] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100f9b [ 28.913201] flags: 0x200000000000000(node=0|zone=2) [ 28.913632] page_type: f5(slab) [ 28.914007] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 28.914716] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 28.915436] page dumped because: kasan: bad access detected [ 28.915966] [ 28.916179] Memory state around the buggy address: [ 28.916676] ffff888100f9bb80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 28.917422] ffff888100f9bc00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 28.918106] >ffff888100f9bc80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 28.918611] ^ [ 28.919057] ffff888100f9bd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.919588] ffff888100f9bd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.920168] ================================================================== [ 29.132540] ================================================================== [ 29.133374] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90 [ 29.134929] Read of size 8 at addr ffff888100f9bce8 by task kunit_try_catch/269 [ 29.135812] [ 29.136018] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 29.139955] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.140573] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.141165] Call Trace: [ 29.141571] <TASK> [ 29.141947] dump_stack_lvl+0x73/0xb0 [ 29.142344] print_report+0xd1/0x640 [ 29.142764] ? __virt_addr_valid+0x1db/0x2d0 [ 29.143169] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.143876] kasan_report+0x102/0x140 [ 29.144417] ? kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90 [ 29.145203] ? kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90 [ 29.146074] __asan_report_load8_noabort+0x18/0x20 [ 29.146718] kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90 [ 29.147344] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 29.147991] ? __kmalloc_cache_noprof+0x184/0x410 [ 29.148527] ? trace_hardirqs_on+0x37/0xe0 [ 29.149046] ? kasan_bitops_generic+0x93/0x1c0 [ 29.149578] kasan_bitops_generic+0x122/0x1c0 [ 29.150279] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 29.150698] ? __pfx_read_tsc+0x10/0x10 [ 29.151326] ? ktime_get_ts64+0x84/0x230 [ 29.151739] kunit_try_run_case+0x1b3/0x490 [ 29.152063] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.152676] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.153325] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.153650] ? __kthread_parkme+0x82/0x160 [ 29.154117] ? preempt_count_sub+0x50/0x80 [ 29.154694] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.155201] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.155859] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.156485] kthread+0x257/0x310 [ 29.156749] ? __pfx_kthread+0x10/0x10 [ 29.157331] ret_from_fork+0x41/0x80 [ 29.157860] ? __pfx_kthread+0x10/0x10 [ 29.158417] ret_from_fork_asm+0x1a/0x30 [ 29.158890] </TASK> [ 29.159178] [ 29.159522] Allocated by task 269: [ 29.159876] kasan_save_stack+0x3d/0x60 [ 29.160451] kasan_save_track+0x18/0x40 [ 29.160713] kasan_save_alloc_info+0x3b/0x50 [ 29.161295] __kasan_kmalloc+0xb7/0xc0 [ 29.161708] __kmalloc_cache_noprof+0x184/0x410 [ 29.162195] kasan_bitops_generic+0x93/0x1c0 [ 29.162702] kunit_try_run_case+0x1b3/0x490 [ 29.163190] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.163555] kthread+0x257/0x310 [ 29.163967] ret_from_fork+0x41/0x80 [ 29.164376] ret_from_fork_asm+0x1a/0x30 [ 29.164797] [ 29.165228] The buggy address belongs to the object at ffff888100f9bce0 [ 29.165228] which belongs to the cache kmalloc-16 of size 16 [ 29.166189] The buggy address is located 8 bytes inside of [ 29.166189] allocated 9-byte region [ffff888100f9bce0, ffff888100f9bce9) [ 29.166944] [ 29.167286] The buggy address belongs to the physical page: [ 29.167802] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100f9b [ 29.168507] flags: 0x200000000000000(node=0|zone=2) [ 29.168996] page_type: f5(slab) [ 29.169492] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 29.170102] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 29.170791] page dumped because: kasan: bad access detected [ 29.171206] [ 29.171546] Memory state around the buggy address: [ 29.172052] ffff888100f9bb80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 29.172474] ffff888100f9bc00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 29.173043] >ffff888100f9bc80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 29.173781] ^ [ 29.174457] ffff888100f9bd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.175171] ffff888100f9bd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.175710] ================================================================== [ 28.793224] ================================================================== [ 28.793618] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x102/0xd90 [ 28.796315] Write of size 8 at addr ffff888100f9bce8 by task kunit_try_catch/269 [ 28.796929] [ 28.797082] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 28.797529] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.797759] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.800539] Call Trace: [ 28.800732] <TASK> [ 28.800963] dump_stack_lvl+0x73/0xb0 [ 28.801228] print_report+0xd1/0x640 [ 28.801495] ? __virt_addr_valid+0x1db/0x2d0 [ 28.801769] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.804868] kasan_report+0x102/0x140 [ 28.805593] ? kasan_bitops_test_and_modify.constprop.0+0x102/0xd90 [ 28.806336] ? kasan_bitops_test_and_modify.constprop.0+0x102/0xd90 [ 28.807189] kasan_check_range+0x10c/0x1c0 [ 28.807878] __kasan_check_write+0x18/0x20 [ 28.808255] kasan_bitops_test_and_modify.constprop.0+0x102/0xd90 [ 28.809093] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 28.809898] ? __kmalloc_cache_noprof+0x184/0x410 [ 28.810269] ? trace_hardirqs_on+0x37/0xe0 [ 28.810701] ? kasan_bitops_generic+0x93/0x1c0 [ 28.811295] kasan_bitops_generic+0x122/0x1c0 [ 28.811852] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 28.812510] ? __pfx_read_tsc+0x10/0x10 [ 28.813058] ? ktime_get_ts64+0x84/0x230 [ 28.813575] kunit_try_run_case+0x1b3/0x490 [ 28.813919] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.814545] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 28.815121] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.815938] ? __kthread_parkme+0x82/0x160 [ 28.816458] ? preempt_count_sub+0x50/0x80 [ 28.816998] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.817609] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.818058] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.818538] kthread+0x257/0x310 [ 28.818913] ? __pfx_kthread+0x10/0x10 [ 28.819358] ret_from_fork+0x41/0x80 [ 28.819817] ? __pfx_kthread+0x10/0x10 [ 28.820129] ret_from_fork_asm+0x1a/0x30 [ 28.820656] </TASK> [ 28.820971] [ 28.821173] Allocated by task 269: [ 28.821536] kasan_save_stack+0x3d/0x60 [ 28.821947] kasan_save_track+0x18/0x40 [ 28.822304] kasan_save_alloc_info+0x3b/0x50 [ 28.822775] __kasan_kmalloc+0xb7/0xc0 [ 28.823235] __kmalloc_cache_noprof+0x184/0x410 [ 28.823762] kasan_bitops_generic+0x93/0x1c0 [ 28.824374] kunit_try_run_case+0x1b3/0x490 [ 28.824683] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.825283] kthread+0x257/0x310 [ 28.825612] ret_from_fork+0x41/0x80 [ 28.826002] ret_from_fork_asm+0x1a/0x30 [ 28.827488] [ 28.828027] The buggy address belongs to the object at ffff888100f9bce0 [ 28.828027] which belongs to the cache kmalloc-16 of size 16 [ 28.829037] The buggy address is located 8 bytes inside of [ 28.829037] allocated 9-byte region [ffff888100f9bce0, ffff888100f9bce9) [ 28.829928] [ 28.830304] The buggy address belongs to the physical page: [ 28.831543] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100f9b [ 28.832201] flags: 0x200000000000000(node=0|zone=2) [ 28.832929] page_type: f5(slab) [ 28.833379] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 28.834175] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 28.834961] page dumped because: kasan: bad access detected [ 28.835567] [ 28.835916] Memory state around the buggy address: [ 28.836611] ffff888100f9bb80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 28.837427] ffff888100f9bc00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 28.838050] >ffff888100f9bc80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 28.838282] ^ [ 28.838483] ffff888100f9bd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.838688] ffff888100f9bd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.839009] ================================================================== [ 28.966242] ================================================================== [ 28.966660] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90 [ 28.967095] Write of size 8 at addr ffff888100f9bce8 by task kunit_try_catch/269 [ 28.967871] [ 28.968100] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 28.968985] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.969355] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.970059] Call Trace: [ 28.970319] <TASK> [ 28.970645] dump_stack_lvl+0x73/0xb0 [ 28.971028] print_report+0xd1/0x640 [ 28.971544] ? __virt_addr_valid+0x1db/0x2d0 [ 28.971936] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.972315] kasan_report+0x102/0x140 [ 28.972591] ? kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90 [ 28.973243] ? kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90 [ 28.973891] kasan_check_range+0x10c/0x1c0 [ 28.974413] __kasan_check_write+0x18/0x20 [ 28.974870] kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90 [ 28.975360] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 28.976060] ? __kmalloc_cache_noprof+0x184/0x410 [ 28.976415] ? trace_hardirqs_on+0x37/0xe0 [ 28.976727] ? kasan_bitops_generic+0x93/0x1c0 [ 28.977323] kasan_bitops_generic+0x122/0x1c0 [ 28.977818] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 28.978465] ? __pfx_read_tsc+0x10/0x10 [ 28.978910] ? ktime_get_ts64+0x84/0x230 [ 28.979312] kunit_try_run_case+0x1b3/0x490 [ 28.979691] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.980195] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 28.980552] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.981036] ? __kthread_parkme+0x82/0x160 [ 28.981595] ? preempt_count_sub+0x50/0x80 [ 28.982070] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.982638] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.983169] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.983596] kthread+0x257/0x310 [ 28.984031] ? __pfx_kthread+0x10/0x10 [ 28.984523] ret_from_fork+0x41/0x80 [ 28.984895] ? __pfx_kthread+0x10/0x10 [ 28.985165] ret_from_fork_asm+0x1a/0x30 [ 28.985522] </TASK> [ 28.985843] [ 28.986074] Allocated by task 269: [ 28.986480] kasan_save_stack+0x3d/0x60 [ 28.986916] kasan_save_track+0x18/0x40 [ 28.987388] kasan_save_alloc_info+0x3b/0x50 [ 28.987854] __kasan_kmalloc+0xb7/0xc0 [ 28.988322] __kmalloc_cache_noprof+0x184/0x410 [ 28.988713] kasan_bitops_generic+0x93/0x1c0 [ 28.989027] kunit_try_run_case+0x1b3/0x490 [ 28.989347] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.989921] kthread+0x257/0x310 [ 28.990327] ret_from_fork+0x41/0x80 [ 28.990725] ret_from_fork_asm+0x1a/0x30 [ 28.991195] [ 28.991457] The buggy address belongs to the object at ffff888100f9bce0 [ 28.991457] which belongs to the cache kmalloc-16 of size 16 [ 28.992283] The buggy address is located 8 bytes inside of [ 28.992283] allocated 9-byte region [ffff888100f9bce0, ffff888100f9bce9) [ 28.992858] [ 28.993131] The buggy address belongs to the physical page: [ 28.993684] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100f9b [ 28.994452] flags: 0x200000000000000(node=0|zone=2) [ 28.994975] page_type: f5(slab) [ 28.995357] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 28.996002] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 28.996485] page dumped because: kasan: bad access detected [ 28.997043] [ 28.997297] Memory state around the buggy address: [ 28.997593] ffff888100f9bb80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 28.998166] ffff888100f9bc00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 28.998845] >ffff888100f9bc80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 28.999389] ^ [ 28.999963] ffff888100f9bd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.000378] ffff888100f9bd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.000737] ==================================================================