Date
Nov. 26, 2024, 6:09 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 34.863639] ================================================================== [ 34.864448] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc8 [ 34.865704] Write of size 8 at addr fff00000c57c32c8 by task kunit_try_catch/250 [ 34.867610] [ 34.868079] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 34.869203] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.869729] Hardware name: linux,dummy-virt (DT) [ 34.870759] Call trace: [ 34.871230] show_stack+0x20/0x38 (C) [ 34.871802] dump_stack_lvl+0x8c/0xd0 [ 34.872720] print_report+0x118/0x5e0 [ 34.874004] kasan_report+0xc8/0x118 [ 34.874601] kasan_check_range+0x100/0x1a8 [ 34.875295] __kasan_check_write+0x20/0x30 [ 34.875948] kasan_bitops_modify.constprop.0+0x320/0xbc8 [ 34.877024] kasan_bitops_generic+0x110/0x1c8 [ 34.877786] kunit_try_run_case+0x14c/0x3d0 [ 34.878243] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.878607] kthread+0x24c/0x2d0 [ 34.878867] ret_from_fork+0x10/0x20 [ 34.879510] [ 34.880013] Allocated by task 250: [ 34.881010] kasan_save_stack+0x3c/0x68 [ 34.881715] kasan_save_track+0x20/0x40 [ 34.882343] kasan_save_alloc_info+0x40/0x58 [ 34.883027] __kasan_kmalloc+0xd4/0xd8 [ 34.883924] __kmalloc_cache_noprof+0x15c/0x3c8 [ 34.885223] kasan_bitops_generic+0xa0/0x1c8 [ 34.885770] kunit_try_run_case+0x14c/0x3d0 [ 34.886524] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.887367] kthread+0x24c/0x2d0 [ 34.888048] ret_from_fork+0x10/0x20 [ 34.888993] [ 34.889467] The buggy address belongs to the object at fff00000c57c32c0 [ 34.889467] which belongs to the cache kmalloc-16 of size 16 [ 34.890383] The buggy address is located 8 bytes inside of [ 34.890383] allocated 9-byte region [fff00000c57c32c0, fff00000c57c32c9) [ 34.891796] [ 34.892198] The buggy address belongs to the physical page: [ 34.893241] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057c3 [ 34.894185] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.894868] page_type: f5(slab) [ 34.895535] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 34.896855] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 34.897503] page dumped because: kasan: bad access detected [ 34.898132] [ 34.898713] Memory state around the buggy address: [ 34.899493] fff00000c57c3180: fa fb fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 34.900252] fff00000c57c3200: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 34.901502] >fff00000c57c3280: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 34.902348] ^ [ 34.903149] fff00000c57c3300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.904048] fff00000c57c3380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.904891] ================================================================== [ 34.906027] ================================================================== [ 34.906724] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaf4/0xbc8 [ 34.909327] Read of size 8 at addr fff00000c57c32c8 by task kunit_try_catch/250 [ 34.910302] [ 34.910726] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 34.913154] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.913967] Hardware name: linux,dummy-virt (DT) [ 34.914611] Call trace: [ 34.915094] show_stack+0x20/0x38 (C) [ 34.915800] dump_stack_lvl+0x8c/0xd0 [ 34.916566] print_report+0x118/0x5e0 [ 34.917067] kasan_report+0xc8/0x118 [ 34.917694] __asan_report_load8_noabort+0x20/0x30 [ 34.918319] kasan_bitops_modify.constprop.0+0xaf4/0xbc8 [ 34.918926] kasan_bitops_generic+0x110/0x1c8 [ 34.919615] kunit_try_run_case+0x14c/0x3d0 [ 34.920317] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.921206] kthread+0x24c/0x2d0 [ 34.921797] ret_from_fork+0x10/0x20 [ 34.922463] [ 34.922835] Allocated by task 250: [ 34.924193] kasan_save_stack+0x3c/0x68 [ 34.924779] kasan_save_track+0x20/0x40 [ 34.925462] kasan_save_alloc_info+0x40/0x58 [ 34.926471] __kasan_kmalloc+0xd4/0xd8 [ 34.927025] __kmalloc_cache_noprof+0x15c/0x3c8 [ 34.927701] kasan_bitops_generic+0xa0/0x1c8 [ 34.928303] kunit_try_run_case+0x14c/0x3d0 [ 34.928937] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.929715] kthread+0x24c/0x2d0 [ 34.931174] ret_from_fork+0x10/0x20 [ 34.931708] [ 34.932097] The buggy address belongs to the object at fff00000c57c32c0 [ 34.932097] which belongs to the cache kmalloc-16 of size 16 [ 34.933689] The buggy address is located 8 bytes inside of [ 34.933689] allocated 9-byte region [fff00000c57c32c0, fff00000c57c32c9) [ 34.934924] [ 34.935293] The buggy address belongs to the physical page: [ 34.935877] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057c3 [ 34.937130] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.937867] page_type: f5(slab) [ 34.938313] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 34.940253] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 34.941474] page dumped because: kasan: bad access detected [ 34.942071] [ 34.942434] Memory state around the buggy address: [ 34.943049] fff00000c57c3180: fa fb fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 34.943792] fff00000c57c3200: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 34.944823] >fff00000c57c3280: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 34.945596] ^ [ 34.946268] fff00000c57c3300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.947543] fff00000c57c3380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.948840] ================================================================== [ 35.038201] ================================================================== [ 35.038861] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa28/0xbc8 [ 35.039550] Read of size 8 at addr fff00000c57c32c8 by task kunit_try_catch/250 [ 35.040285] [ 35.040699] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 35.042369] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.042836] Hardware name: linux,dummy-virt (DT) [ 35.043516] Call trace: [ 35.043979] show_stack+0x20/0x38 (C) [ 35.045355] dump_stack_lvl+0x8c/0xd0 [ 35.046074] print_report+0x118/0x5e0 [ 35.046759] kasan_report+0xc8/0x118 [ 35.047436] __asan_report_load8_noabort+0x20/0x30 [ 35.048219] kasan_bitops_modify.constprop.0+0xa28/0xbc8 [ 35.049481] kasan_bitops_generic+0x110/0x1c8 [ 35.050093] kunit_try_run_case+0x14c/0x3d0 [ 35.050824] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.051565] kthread+0x24c/0x2d0 [ 35.052202] ret_from_fork+0x10/0x20 [ 35.053048] [ 35.053671] Allocated by task 250: [ 35.054770] kasan_save_stack+0x3c/0x68 [ 35.055385] kasan_save_track+0x20/0x40 [ 35.055884] kasan_save_alloc_info+0x40/0x58 [ 35.056731] __kasan_kmalloc+0xd4/0xd8 [ 35.057351] __kmalloc_cache_noprof+0x15c/0x3c8 [ 35.058171] kasan_bitops_generic+0xa0/0x1c8 [ 35.058884] kunit_try_run_case+0x14c/0x3d0 [ 35.059418] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.060204] kthread+0x24c/0x2d0 [ 35.061073] ret_from_fork+0x10/0x20 [ 35.062366] [ 35.062973] The buggy address belongs to the object at fff00000c57c32c0 [ 35.062973] which belongs to the cache kmalloc-16 of size 16 [ 35.064204] The buggy address is located 8 bytes inside of [ 35.064204] allocated 9-byte region [fff00000c57c32c0, fff00000c57c32c9) [ 35.066123] [ 35.066537] The buggy address belongs to the physical page: [ 35.067319] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057c3 [ 35.068462] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.069357] page_type: f5(slab) [ 35.069766] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 35.070561] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 35.071212] page dumped because: kasan: bad access detected [ 35.071973] [ 35.072342] Memory state around the buggy address: [ 35.073615] fff00000c57c3180: fa fb fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 35.074334] fff00000c57c3200: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 35.075176] >fff00000c57c3280: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 35.076081] ^ [ 35.077132] fff00000c57c3300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.078151] fff00000c57c3380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.079481] ================================================================== [ 34.637750] ================================================================== [ 34.638781] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc8 [ 34.639612] Write of size 8 at addr fff00000c57c32c8 by task kunit_try_catch/250 [ 34.640445] [ 34.641120] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 34.642680] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.643309] Hardware name: linux,dummy-virt (DT) [ 34.643785] Call trace: [ 34.644165] show_stack+0x20/0x38 (C) [ 34.645734] dump_stack_lvl+0x8c/0xd0 [ 34.646560] print_report+0x118/0x5e0 [ 34.647292] kasan_report+0xc8/0x118 [ 34.648052] kasan_check_range+0x100/0x1a8 [ 34.649494] __kasan_check_write+0x20/0x30 [ 34.650170] kasan_bitops_modify.constprop.0+0x100/0xbc8 [ 34.650973] kasan_bitops_generic+0x110/0x1c8 [ 34.651631] kunit_try_run_case+0x14c/0x3d0 [ 34.652203] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.652814] kthread+0x24c/0x2d0 [ 34.653829] ret_from_fork+0x10/0x20 [ 34.654462] [ 34.654825] Allocated by task 250: [ 34.655428] kasan_save_stack+0x3c/0x68 [ 34.656073] kasan_save_track+0x20/0x40 [ 34.656762] kasan_save_alloc_info+0x40/0x58 [ 34.657391] __kasan_kmalloc+0xd4/0xd8 [ 34.657877] __kmalloc_cache_noprof+0x15c/0x3c8 [ 34.659414] kasan_bitops_generic+0xa0/0x1c8 [ 34.659940] kunit_try_run_case+0x14c/0x3d0 [ 34.660506] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.661234] kthread+0x24c/0x2d0 [ 34.661808] ret_from_fork+0x10/0x20 [ 34.662723] [ 34.663070] The buggy address belongs to the object at fff00000c57c32c0 [ 34.663070] which belongs to the cache kmalloc-16 of size 16 [ 34.665205] The buggy address is located 8 bytes inside of [ 34.665205] allocated 9-byte region [fff00000c57c32c0, fff00000c57c32c9) [ 34.666477] [ 34.666863] The buggy address belongs to the physical page: [ 34.667831] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057c3 [ 34.668836] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.669728] page_type: f5(slab) [ 34.670300] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 34.671250] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 34.672048] page dumped because: kasan: bad access detected [ 34.673590] [ 34.673931] Memory state around the buggy address: [ 34.674492] fff00000c57c3180: fa fb fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 34.675342] fff00000c57c3200: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 34.676168] >fff00000c57c3280: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 34.677392] ^ [ 34.678048] fff00000c57c3300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.678824] fff00000c57c3380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.679615] ================================================================== [ 34.950708] ================================================================== [ 34.951622] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc8 [ 34.952391] Write of size 8 at addr fff00000c57c32c8 by task kunit_try_catch/250 [ 34.953249] [ 34.953665] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 34.955281] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.956013] Hardware name: linux,dummy-virt (DT) [ 34.956677] Call trace: [ 34.957130] show_stack+0x20/0x38 (C) [ 34.957790] dump_stack_lvl+0x8c/0xd0 [ 34.959225] print_report+0x118/0x5e0 [ 34.959760] kasan_report+0xc8/0x118 [ 34.960622] kasan_check_range+0x100/0x1a8 [ 34.961307] __kasan_check_write+0x20/0x30 [ 34.962189] kasan_bitops_modify.constprop.0+0x344/0xbc8 [ 34.963044] kasan_bitops_generic+0x110/0x1c8 [ 34.963720] kunit_try_run_case+0x14c/0x3d0 [ 34.965164] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.965876] kthread+0x24c/0x2d0 [ 34.966428] ret_from_fork+0x10/0x20 [ 34.967105] [ 34.967454] Allocated by task 250: [ 34.967919] kasan_save_stack+0x3c/0x68 [ 34.968845] kasan_save_track+0x20/0x40 [ 34.969672] kasan_save_alloc_info+0x40/0x58 [ 34.970243] __kasan_kmalloc+0xd4/0xd8 [ 34.970857] __kmalloc_cache_noprof+0x15c/0x3c8 [ 34.971483] kasan_bitops_generic+0xa0/0x1c8 [ 34.972097] kunit_try_run_case+0x14c/0x3d0 [ 34.973162] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.973873] kthread+0x24c/0x2d0 [ 34.974483] ret_from_fork+0x10/0x20 [ 34.975250] [ 34.975877] The buggy address belongs to the object at fff00000c57c32c0 [ 34.975877] which belongs to the cache kmalloc-16 of size 16 [ 34.977490] The buggy address is located 8 bytes inside of [ 34.977490] allocated 9-byte region [fff00000c57c32c0, fff00000c57c32c9) [ 34.978487] [ 34.978670] The buggy address belongs to the physical page: [ 34.979043] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057c3 [ 34.979961] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.981743] page_type: f5(slab) [ 34.982793] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 34.983778] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 34.984888] page dumped because: kasan: bad access detected [ 34.985540] [ 34.985865] Memory state around the buggy address: [ 34.986488] fff00000c57c3180: fa fb fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 34.987330] fff00000c57c3200: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 34.988111] >fff00000c57c3280: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 34.989579] ^ [ 34.990297] fff00000c57c3300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.991765] fff00000c57c3380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.993457] ================================================================== [ 34.995190] ================================================================== [ 34.996859] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc8 [ 34.997817] Write of size 8 at addr fff00000c57c32c8 by task kunit_try_catch/250 [ 34.999255] [ 34.999536] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 35.000993] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.002103] Hardware name: linux,dummy-virt (DT) [ 35.002810] Call trace: [ 35.003293] show_stack+0x20/0x38 (C) [ 35.003964] dump_stack_lvl+0x8c/0xd0 [ 35.004679] print_report+0x118/0x5e0 [ 35.005660] kasan_report+0xc8/0x118 [ 35.006516] kasan_check_range+0x100/0x1a8 [ 35.007175] __kasan_check_write+0x20/0x30 [ 35.007485] kasan_bitops_modify.constprop.0+0x3b0/0xbc8 [ 35.007810] kasan_bitops_generic+0x110/0x1c8 [ 35.008125] kunit_try_run_case+0x14c/0x3d0 [ 35.008874] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.010406] kthread+0x24c/0x2d0 [ 35.011005] ret_from_fork+0x10/0x20 [ 35.011614] [ 35.012047] Allocated by task 250: [ 35.012864] kasan_save_stack+0x3c/0x68 [ 35.013652] kasan_save_track+0x20/0x40 [ 35.014286] kasan_save_alloc_info+0x40/0x58 [ 35.014888] __kasan_kmalloc+0xd4/0xd8 [ 35.015627] __kmalloc_cache_noprof+0x15c/0x3c8 [ 35.016735] kasan_bitops_generic+0xa0/0x1c8 [ 35.017244] kunit_try_run_case+0x14c/0x3d0 [ 35.017714] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.018566] kthread+0x24c/0x2d0 [ 35.019140] ret_from_fork+0x10/0x20 [ 35.019632] [ 35.020042] The buggy address belongs to the object at fff00000c57c32c0 [ 35.020042] which belongs to the cache kmalloc-16 of size 16 [ 35.021999] The buggy address is located 8 bytes inside of [ 35.021999] allocated 9-byte region [fff00000c57c32c0, fff00000c57c32c9) [ 35.023349] [ 35.023726] The buggy address belongs to the physical page: [ 35.024464] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057c3 [ 35.025364] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.026352] page_type: f5(slab) [ 35.026952] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 35.027861] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 35.029233] page dumped because: kasan: bad access detected [ 35.030140] [ 35.030505] Memory state around the buggy address: [ 35.031136] fff00000c57c3180: fa fb fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 35.031959] fff00000c57c3200: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 35.033141] >fff00000c57c3280: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 35.034111] ^ [ 35.034616] fff00000c57c3300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.035632] fff00000c57c3380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.036931] ================================================================== [ 34.773056] ================================================================== [ 34.774260] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa88/0xbc8 [ 34.775047] Read of size 8 at addr fff00000c57c32c8 by task kunit_try_catch/250 [ 34.776030] [ 34.776878] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 34.778649] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.779167] Hardware name: linux,dummy-virt (DT) [ 34.779699] Call trace: [ 34.780867] show_stack+0x20/0x38 (C) [ 34.781681] dump_stack_lvl+0x8c/0xd0 [ 34.782315] print_report+0x118/0x5e0 [ 34.782947] kasan_report+0xc8/0x118 [ 34.783551] __asan_report_load8_noabort+0x20/0x30 [ 34.784231] kasan_bitops_modify.constprop.0+0xa88/0xbc8 [ 34.785000] kasan_bitops_generic+0x110/0x1c8 [ 34.786351] kunit_try_run_case+0x14c/0x3d0 [ 34.787033] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.787782] kthread+0x24c/0x2d0 [ 34.788439] ret_from_fork+0x10/0x20 [ 34.789214] [ 34.789594] Allocated by task 250: [ 34.790232] kasan_save_stack+0x3c/0x68 [ 34.790924] kasan_save_track+0x20/0x40 [ 34.791568] kasan_save_alloc_info+0x40/0x58 [ 34.792223] __kasan_kmalloc+0xd4/0xd8 [ 34.792965] __kmalloc_cache_noprof+0x15c/0x3c8 [ 34.793683] kasan_bitops_generic+0xa0/0x1c8 [ 34.794407] kunit_try_run_case+0x14c/0x3d0 [ 34.795186] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.796057] kthread+0x24c/0x2d0 [ 34.796734] ret_from_fork+0x10/0x20 [ 34.797487] [ 34.797987] The buggy address belongs to the object at fff00000c57c32c0 [ 34.797987] which belongs to the cache kmalloc-16 of size 16 [ 34.799709] The buggy address is located 8 bytes inside of [ 34.799709] allocated 9-byte region [fff00000c57c32c0, fff00000c57c32c9) [ 34.801204] [ 34.801519] The buggy address belongs to the physical page: [ 34.802188] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057c3 [ 34.802948] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.803807] page_type: f5(slab) [ 34.804410] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 34.806011] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 34.807074] page dumped because: kasan: bad access detected [ 34.807942] [ 34.808583] Memory state around the buggy address: [ 34.809670] fff00000c57c3180: fa fb fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 34.810694] fff00000c57c3200: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 34.811703] >fff00000c57c3280: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 34.812778] ^ [ 34.813327] fff00000c57c3300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.814082] fff00000c57c3380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.815023] ================================================================== [ 34.682172] ================================================================== [ 34.683635] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa4c/0xbc8 [ 34.685032] Read of size 8 at addr fff00000c57c32c8 by task kunit_try_catch/250 [ 34.686070] [ 34.686479] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 34.687703] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.688554] Hardware name: linux,dummy-virt (DT) [ 34.689100] Call trace: [ 34.689454] show_stack+0x20/0x38 (C) [ 34.690063] dump_stack_lvl+0x8c/0xd0 [ 34.690765] print_report+0x118/0x5e0 [ 34.691461] kasan_report+0xc8/0x118 [ 34.692144] __asan_report_load8_noabort+0x20/0x30 [ 34.692938] kasan_bitops_modify.constprop.0+0xa4c/0xbc8 [ 34.694121] kasan_bitops_generic+0x110/0x1c8 [ 34.694771] kunit_try_run_case+0x14c/0x3d0 [ 34.695553] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.696336] kthread+0x24c/0x2d0 [ 34.696936] ret_from_fork+0x10/0x20 [ 34.697480] [ 34.697852] Allocated by task 250: [ 34.699245] kasan_save_stack+0x3c/0x68 [ 34.699857] kasan_save_track+0x20/0x40 [ 34.700724] kasan_save_alloc_info+0x40/0x58 [ 34.701562] __kasan_kmalloc+0xd4/0xd8 [ 34.702169] __kmalloc_cache_noprof+0x15c/0x3c8 [ 34.702835] kasan_bitops_generic+0xa0/0x1c8 [ 34.703523] kunit_try_run_case+0x14c/0x3d0 [ 34.704153] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.705586] kthread+0x24c/0x2d0 [ 34.705931] ret_from_fork+0x10/0x20 [ 34.706481] [ 34.706925] The buggy address belongs to the object at fff00000c57c32c0 [ 34.706925] which belongs to the cache kmalloc-16 of size 16 [ 34.708575] The buggy address is located 8 bytes inside of [ 34.708575] allocated 9-byte region [fff00000c57c32c0, fff00000c57c32c9) [ 34.710234] [ 34.710891] The buggy address belongs to the physical page: [ 34.711582] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057c3 [ 34.713549] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.714516] page_type: f5(slab) [ 34.715274] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 34.716184] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 34.717649] page dumped because: kasan: bad access detected [ 34.718533] [ 34.719068] Memory state around the buggy address: [ 34.719813] fff00000c57c3180: fa fb fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 34.720984] fff00000c57c3200: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 34.722478] >fff00000c57c3280: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 34.722847] ^ [ 34.723812] fff00000c57c3300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.724978] fff00000c57c3380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.725829] ================================================================== [ 34.817175] ================================================================== [ 34.817859] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc8 [ 34.818853] Write of size 8 at addr fff00000c57c32c8 by task kunit_try_catch/250 [ 34.821082] [ 34.821398] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 34.823296] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.823922] Hardware name: linux,dummy-virt (DT) [ 34.824868] Call trace: [ 34.825373] show_stack+0x20/0x38 (C) [ 34.826043] dump_stack_lvl+0x8c/0xd0 [ 34.826707] print_report+0x118/0x5e0 [ 34.828039] kasan_report+0xc8/0x118 [ 34.828764] kasan_check_range+0x100/0x1a8 [ 34.829444] __kasan_check_write+0x20/0x30 [ 34.829995] kasan_bitops_modify.constprop.0+0x2b4/0xbc8 [ 34.830627] kasan_bitops_generic+0x110/0x1c8 [ 34.832049] kunit_try_run_case+0x14c/0x3d0 [ 34.833354] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.833881] kthread+0x24c/0x2d0 [ 34.834357] ret_from_fork+0x10/0x20 [ 34.835052] [ 34.835489] Allocated by task 250: [ 34.836144] kasan_save_stack+0x3c/0x68 [ 34.836766] kasan_save_track+0x20/0x40 [ 34.837887] kasan_save_alloc_info+0x40/0x58 [ 34.838719] __kasan_kmalloc+0xd4/0xd8 [ 34.839282] __kmalloc_cache_noprof+0x15c/0x3c8 [ 34.839873] kasan_bitops_generic+0xa0/0x1c8 [ 34.841110] kunit_try_run_case+0x14c/0x3d0 [ 34.841683] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.842879] kthread+0x24c/0x2d0 [ 34.843365] ret_from_fork+0x10/0x20 [ 34.844117] [ 34.844752] The buggy address belongs to the object at fff00000c57c32c0 [ 34.844752] which belongs to the cache kmalloc-16 of size 16 [ 34.846019] The buggy address is located 8 bytes inside of [ 34.846019] allocated 9-byte region [fff00000c57c32c0, fff00000c57c32c9) [ 34.847553] [ 34.848144] The buggy address belongs to the physical page: [ 34.849038] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057c3 [ 34.849878] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.851546] page_type: f5(slab) [ 34.852074] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 34.853381] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 34.854224] page dumped because: kasan: bad access detected [ 34.854892] [ 34.855320] Memory state around the buggy address: [ 34.855978] fff00000c57c3180: fa fb fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 34.857032] fff00000c57c3200: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 34.858583] >fff00000c57c3280: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 34.859390] ^ [ 34.860062] fff00000c57c3300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.861272] fff00000c57c3380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.862095] ================================================================== [ 34.727236] ================================================================== [ 34.728019] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc8 [ 34.728916] Write of size 8 at addr fff00000c57c32c8 by task kunit_try_catch/250 [ 34.729736] [ 34.731287] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 34.732579] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.733264] Hardware name: linux,dummy-virt (DT) [ 34.733843] Call trace: [ 34.734254] show_stack+0x20/0x38 (C) [ 34.734865] dump_stack_lvl+0x8c/0xd0 [ 34.735554] print_report+0x118/0x5e0 [ 34.736075] kasan_report+0xc8/0x118 [ 34.737404] kasan_check_range+0x100/0x1a8 [ 34.738005] __kasan_check_write+0x20/0x30 [ 34.738541] kasan_bitops_modify.constprop.0+0x1dc/0xbc8 [ 34.739918] kasan_bitops_generic+0x110/0x1c8 [ 34.740756] kunit_try_run_case+0x14c/0x3d0 [ 34.741630] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.742547] kthread+0x24c/0x2d0 [ 34.743295] ret_from_fork+0x10/0x20 [ 34.744101] [ 34.744733] Allocated by task 250: [ 34.745271] kasan_save_stack+0x3c/0x68 [ 34.746362] kasan_save_track+0x20/0x40 [ 34.747099] kasan_save_alloc_info+0x40/0x58 [ 34.747639] __kasan_kmalloc+0xd4/0xd8 [ 34.748127] __kmalloc_cache_noprof+0x15c/0x3c8 [ 34.749517] kasan_bitops_generic+0xa0/0x1c8 [ 34.750173] kunit_try_run_case+0x14c/0x3d0 [ 34.750733] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.751785] kthread+0x24c/0x2d0 [ 34.752646] ret_from_fork+0x10/0x20 [ 34.753219] [ 34.753574] The buggy address belongs to the object at fff00000c57c32c0 [ 34.753574] which belongs to the cache kmalloc-16 of size 16 [ 34.754753] The buggy address is located 8 bytes inside of [ 34.754753] allocated 9-byte region [fff00000c57c32c0, fff00000c57c32c9) [ 34.756265] [ 34.756697] The buggy address belongs to the physical page: [ 34.757980] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057c3 [ 34.759038] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.760018] page_type: f5(slab) [ 34.760762] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 34.762092] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 34.762876] page dumped because: kasan: bad access detected [ 34.764057] [ 34.764620] Memory state around the buggy address: [ 34.765648] fff00000c57c3180: fa fb fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 34.766531] fff00000c57c3200: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 34.767531] >fff00000c57c3280: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 34.769112] ^ [ 34.769803] fff00000c57c3300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.770675] fff00000c57c3380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.771519] ==================================================================
[ 34.750583] ================================================================== [ 34.751343] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc8 [ 34.752164] Write of size 8 at addr fff00000c5e082a8 by task kunit_try_catch/250 [ 34.753041] [ 34.753450] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 34.754563] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.755108] Hardware name: linux,dummy-virt (DT) [ 34.757245] Call trace: [ 34.757716] show_stack+0x20/0x38 (C) [ 34.758602] dump_stack_lvl+0x8c/0xd0 [ 34.759180] print_report+0x118/0x5e0 [ 34.759856] kasan_report+0xc8/0x118 [ 34.760496] kasan_check_range+0x100/0x1a8 [ 34.761384] __kasan_check_write+0x20/0x30 [ 34.763031] kasan_bitops_modify.constprop.0+0x1dc/0xbc8 [ 34.763761] kasan_bitops_generic+0x110/0x1c8 [ 34.764610] kunit_try_run_case+0x14c/0x3d0 [ 34.765257] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.766024] kthread+0x24c/0x2d0 [ 34.766644] ret_from_fork+0x10/0x20 [ 34.767268] [ 34.768271] Allocated by task 250: [ 34.768864] kasan_save_stack+0x3c/0x68 [ 34.769435] kasan_save_track+0x20/0x40 [ 34.771081] kasan_save_alloc_info+0x40/0x58 [ 34.771634] __kasan_kmalloc+0xd4/0xd8 [ 34.772267] __kmalloc_cache_noprof+0x15c/0x3c8 [ 34.773042] kasan_bitops_generic+0xa0/0x1c8 [ 34.773859] kunit_try_run_case+0x14c/0x3d0 [ 34.774442] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.775227] kthread+0x24c/0x2d0 [ 34.775773] ret_from_fork+0x10/0x20 [ 34.776273] [ 34.777194] The buggy address belongs to the object at fff00000c5e082a0 [ 34.777194] which belongs to the cache kmalloc-16 of size 16 [ 34.779069] The buggy address is located 8 bytes inside of [ 34.779069] allocated 9-byte region [fff00000c5e082a0, fff00000c5e082a9) [ 34.780012] [ 34.780236] The buggy address belongs to the physical page: [ 34.780594] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e08 [ 34.781331] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.782845] page_type: f5(slab) [ 34.783429] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 34.784346] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 34.785274] page dumped because: kasan: bad access detected [ 34.786038] [ 34.786365] Memory state around the buggy address: [ 34.787916] fff00000c5e08180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.789237] fff00000c5e08200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.790088] >fff00000c5e08280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 34.791016] ^ [ 34.791717] fff00000c5e08300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.792712] fff00000c5e08380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.793705] ================================================================== [ 34.795596] ================================================================== [ 34.796306] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa88/0xbc8 [ 34.797309] Read of size 8 at addr fff00000c5e082a8 by task kunit_try_catch/250 [ 34.799103] [ 34.799448] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 34.800671] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.801297] Hardware name: linux,dummy-virt (DT) [ 34.801918] Call trace: [ 34.803111] show_stack+0x20/0x38 (C) [ 34.803777] dump_stack_lvl+0x8c/0xd0 [ 34.804276] print_report+0x118/0x5e0 [ 34.804805] kasan_report+0xc8/0x118 [ 34.805456] __asan_report_load8_noabort+0x20/0x30 [ 34.806193] kasan_bitops_modify.constprop.0+0xa88/0xbc8 [ 34.807047] kasan_bitops_generic+0x110/0x1c8 [ 34.807799] kunit_try_run_case+0x14c/0x3d0 [ 34.808565] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.809336] kthread+0x24c/0x2d0 [ 34.810188] ret_from_fork+0x10/0x20 [ 34.811732] [ 34.812546] Allocated by task 250: [ 34.813020] kasan_save_stack+0x3c/0x68 [ 34.813638] kasan_save_track+0x20/0x40 [ 34.814691] kasan_save_alloc_info+0x40/0x58 [ 34.815263] __kasan_kmalloc+0xd4/0xd8 [ 34.815958] __kmalloc_cache_noprof+0x15c/0x3c8 [ 34.816651] kasan_bitops_generic+0xa0/0x1c8 [ 34.817268] kunit_try_run_case+0x14c/0x3d0 [ 34.818091] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.819026] kthread+0x24c/0x2d0 [ 34.819461] ret_from_fork+0x10/0x20 [ 34.820471] [ 34.820876] The buggy address belongs to the object at fff00000c5e082a0 [ 34.820876] which belongs to the cache kmalloc-16 of size 16 [ 34.822670] The buggy address is located 8 bytes inside of [ 34.822670] allocated 9-byte region [fff00000c5e082a0, fff00000c5e082a9) [ 34.823980] [ 34.824409] The buggy address belongs to the physical page: [ 34.825049] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e08 [ 34.826594] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.827204] page_type: f5(slab) [ 34.827787] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 34.828812] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 34.829905] page dumped because: kasan: bad access detected [ 34.830728] [ 34.831112] Memory state around the buggy address: [ 34.831831] fff00000c5e08180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.833322] fff00000c5e08200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.834644] >fff00000c5e08280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 34.835267] ^ [ 34.835982] fff00000c5e08300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.837161] fff00000c5e08380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.837952] ================================================================== [ 34.704954] ================================================================== [ 34.705678] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa4c/0xbc8 [ 34.707820] Read of size 8 at addr fff00000c5e082a8 by task kunit_try_catch/250 [ 34.708699] [ 34.709152] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 34.710825] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.711491] Hardware name: linux,dummy-virt (DT) [ 34.712225] Call trace: [ 34.712716] show_stack+0x20/0x38 (C) [ 34.713304] dump_stack_lvl+0x8c/0xd0 [ 34.714107] print_report+0x118/0x5e0 [ 34.714582] kasan_report+0xc8/0x118 [ 34.715045] __asan_report_load8_noabort+0x20/0x30 [ 34.716457] kasan_bitops_modify.constprop.0+0xa4c/0xbc8 [ 34.717242] kasan_bitops_generic+0x110/0x1c8 [ 34.717971] kunit_try_run_case+0x14c/0x3d0 [ 34.718691] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.719591] kthread+0x24c/0x2d0 [ 34.720748] ret_from_fork+0x10/0x20 [ 34.721278] [ 34.721674] Allocated by task 250: [ 34.722244] kasan_save_stack+0x3c/0x68 [ 34.722921] kasan_save_track+0x20/0x40 [ 34.723467] kasan_save_alloc_info+0x40/0x58 [ 34.724163] __kasan_kmalloc+0xd4/0xd8 [ 34.725746] __kmalloc_cache_noprof+0x15c/0x3c8 [ 34.726364] kasan_bitops_generic+0xa0/0x1c8 [ 34.726950] kunit_try_run_case+0x14c/0x3d0 [ 34.728043] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.729164] kthread+0x24c/0x2d0 [ 34.730353] ret_from_fork+0x10/0x20 [ 34.730935] [ 34.731228] The buggy address belongs to the object at fff00000c5e082a0 [ 34.731228] which belongs to the cache kmalloc-16 of size 16 [ 34.732736] The buggy address is located 8 bytes inside of [ 34.732736] allocated 9-byte region [fff00000c5e082a0, fff00000c5e082a9) [ 34.733898] [ 34.734799] The buggy address belongs to the physical page: [ 34.735616] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e08 [ 34.736731] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.737760] page_type: f5(slab) [ 34.738670] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 34.739685] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 34.740944] page dumped because: kasan: bad access detected [ 34.741261] [ 34.741423] Memory state around the buggy address: [ 34.741872] fff00000c5e08180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.743215] fff00000c5e08200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.744188] >fff00000c5e08280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 34.745215] ^ [ 34.746393] fff00000c5e08300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.747922] fff00000c5e08380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.748790] ================================================================== [ 34.890004] ================================================================== [ 34.890867] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc8 [ 34.891784] Write of size 8 at addr fff00000c5e082a8 by task kunit_try_catch/250 [ 34.893249] [ 34.894787] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 34.895870] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.896734] Hardware name: linux,dummy-virt (DT) [ 34.897413] Call trace: [ 34.898203] show_stack+0x20/0x38 (C) [ 34.898844] dump_stack_lvl+0x8c/0xd0 [ 34.899434] print_report+0x118/0x5e0 [ 34.900213] kasan_report+0xc8/0x118 [ 34.900839] kasan_check_range+0x100/0x1a8 [ 34.901483] __kasan_check_write+0x20/0x30 [ 34.902900] kasan_bitops_modify.constprop.0+0x320/0xbc8 [ 34.903889] kasan_bitops_generic+0x110/0x1c8 [ 34.904626] kunit_try_run_case+0x14c/0x3d0 [ 34.905337] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.906410] kthread+0x24c/0x2d0 [ 34.907268] ret_from_fork+0x10/0x20 [ 34.907913] [ 34.908321] Allocated by task 250: [ 34.908858] kasan_save_stack+0x3c/0x68 [ 34.909491] kasan_save_track+0x20/0x40 [ 34.910092] kasan_save_alloc_info+0x40/0x58 [ 34.911777] __kasan_kmalloc+0xd4/0xd8 [ 34.912346] __kmalloc_cache_noprof+0x15c/0x3c8 [ 34.913090] kasan_bitops_generic+0xa0/0x1c8 [ 34.914366] kunit_try_run_case+0x14c/0x3d0 [ 34.915284] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.916175] kthread+0x24c/0x2d0 [ 34.916843] ret_from_fork+0x10/0x20 [ 34.917497] [ 34.917948] The buggy address belongs to the object at fff00000c5e082a0 [ 34.917948] which belongs to the cache kmalloc-16 of size 16 [ 34.919488] The buggy address is located 8 bytes inside of [ 34.919488] allocated 9-byte region [fff00000c5e082a0, fff00000c5e082a9) [ 34.921490] [ 34.921906] The buggy address belongs to the physical page: [ 34.922644] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e08 [ 34.923835] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.925099] page_type: f5(slab) [ 34.925924] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 34.927463] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 34.928558] page dumped because: kasan: bad access detected [ 34.929255] [ 34.929685] Memory state around the buggy address: [ 34.930337] fff00000c5e08180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.931032] fff00000c5e08200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.932389] >fff00000c5e08280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 34.933225] ^ [ 34.934072] fff00000c5e08300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.934908] fff00000c5e08380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.935797] ================================================================== [ 34.937736] ================================================================== [ 34.938663] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaf4/0xbc8 [ 34.940163] Read of size 8 at addr fff00000c5e082a8 by task kunit_try_catch/250 [ 34.941216] [ 34.941919] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 34.944050] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.944718] Hardware name: linux,dummy-virt (DT) [ 34.945264] Call trace: [ 34.945837] show_stack+0x20/0x38 (C) [ 34.946556] dump_stack_lvl+0x8c/0xd0 [ 34.947617] print_report+0x118/0x5e0 [ 34.948185] kasan_report+0xc8/0x118 [ 34.948894] __asan_report_load8_noabort+0x20/0x30 [ 34.949975] kasan_bitops_modify.constprop.0+0xaf4/0xbc8 [ 34.951198] kasan_bitops_generic+0x110/0x1c8 [ 34.951910] kunit_try_run_case+0x14c/0x3d0 [ 34.952719] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.953768] kthread+0x24c/0x2d0 [ 34.954513] ret_from_fork+0x10/0x20 [ 34.955120] [ 34.955556] Allocated by task 250: [ 34.956084] kasan_save_stack+0x3c/0x68 [ 34.956794] kasan_save_track+0x20/0x40 [ 34.957450] kasan_save_alloc_info+0x40/0x58 [ 34.958381] __kasan_kmalloc+0xd4/0xd8 [ 34.959096] __kmalloc_cache_noprof+0x15c/0x3c8 [ 34.960862] kasan_bitops_generic+0xa0/0x1c8 [ 34.961395] kunit_try_run_case+0x14c/0x3d0 [ 34.962412] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.963215] kthread+0x24c/0x2d0 [ 34.963798] ret_from_fork+0x10/0x20 [ 34.964423] [ 34.964866] The buggy address belongs to the object at fff00000c5e082a0 [ 34.964866] which belongs to the cache kmalloc-16 of size 16 [ 34.966325] The buggy address is located 8 bytes inside of [ 34.966325] allocated 9-byte region [fff00000c5e082a0, fff00000c5e082a9) [ 34.968135] [ 34.969033] The buggy address belongs to the physical page: [ 34.970111] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e08 [ 34.971133] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.972050] page_type: f5(slab) [ 34.972618] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 34.973550] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 34.974347] page dumped because: kasan: bad access detected [ 34.975804] [ 34.976177] Memory state around the buggy address: [ 34.976903] fff00000c5e08180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.978714] fff00000c5e08200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.979444] >fff00000c5e08280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 34.980295] ^ [ 34.981022] fff00000c5e08300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.982039] fff00000c5e08380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.983045] ================================================================== [ 34.984377] ================================================================== [ 34.985304] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc8 [ 34.986878] Write of size 8 at addr fff00000c5e082a8 by task kunit_try_catch/250 [ 34.987517] [ 34.987908] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 34.988842] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.989479] Hardware name: linux,dummy-virt (DT) [ 34.990860] Call trace: [ 34.991431] show_stack+0x20/0x38 (C) [ 34.992234] dump_stack_lvl+0x8c/0xd0 [ 34.993088] print_report+0x118/0x5e0 [ 34.994104] kasan_report+0xc8/0x118 [ 34.995468] kasan_check_range+0x100/0x1a8 [ 34.996336] __kasan_check_write+0x20/0x30 [ 34.997064] kasan_bitops_modify.constprop.0+0x344/0xbc8 [ 34.998309] kasan_bitops_generic+0x110/0x1c8 [ 34.999094] kunit_try_run_case+0x14c/0x3d0 [ 34.999836] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.000632] kthread+0x24c/0x2d0 [ 35.001159] ret_from_fork+0x10/0x20 [ 35.002779] [ 35.003134] Allocated by task 250: [ 35.003547] kasan_save_stack+0x3c/0x68 [ 35.004272] kasan_save_track+0x20/0x40 [ 35.004978] kasan_save_alloc_info+0x40/0x58 [ 35.005553] __kasan_kmalloc+0xd4/0xd8 [ 35.006178] __kmalloc_cache_noprof+0x15c/0x3c8 [ 35.007371] kasan_bitops_generic+0xa0/0x1c8 [ 35.008097] kunit_try_run_case+0x14c/0x3d0 [ 35.008710] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.009594] kthread+0x24c/0x2d0 [ 35.010241] ret_from_fork+0x10/0x20 [ 35.010884] [ 35.011663] The buggy address belongs to the object at fff00000c5e082a0 [ 35.011663] which belongs to the cache kmalloc-16 of size 16 [ 35.013286] The buggy address is located 8 bytes inside of [ 35.013286] allocated 9-byte region [fff00000c5e082a0, fff00000c5e082a9) [ 35.014980] [ 35.015293] The buggy address belongs to the physical page: [ 35.016064] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e08 [ 35.017134] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.018279] page_type: f5(slab) [ 35.018845] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 35.019750] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 35.021308] page dumped because: kasan: bad access detected [ 35.022691] [ 35.023060] Memory state around the buggy address: [ 35.023841] fff00000c5e08180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 35.024880] fff00000c5e08200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 35.025853] >fff00000c5e08280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 35.026461] ^ [ 35.027030] fff00000c5e08300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.028318] fff00000c5e08380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.029871] ================================================================== [ 35.031608] ================================================================== [ 35.032623] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc8 [ 35.033712] Write of size 8 at addr fff00000c5e082a8 by task kunit_try_catch/250 [ 35.034982] [ 35.035642] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 35.036590] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.037273] Hardware name: linux,dummy-virt (DT) [ 35.038044] Call trace: [ 35.038517] show_stack+0x20/0x38 (C) [ 35.039274] dump_stack_lvl+0x8c/0xd0 [ 35.039653] print_report+0x118/0x5e0 [ 35.040039] kasan_report+0xc8/0x118 [ 35.040727] kasan_check_range+0x100/0x1a8 [ 35.041506] __kasan_check_write+0x20/0x30 [ 35.042243] kasan_bitops_modify.constprop.0+0x3b0/0xbc8 [ 35.043792] kasan_bitops_generic+0x110/0x1c8 [ 35.044415] kunit_try_run_case+0x14c/0x3d0 [ 35.045183] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.046334] kthread+0x24c/0x2d0 [ 35.046880] ret_from_fork+0x10/0x20 [ 35.047597] [ 35.047968] Allocated by task 250: [ 35.048491] kasan_save_stack+0x3c/0x68 [ 35.049173] kasan_save_track+0x20/0x40 [ 35.050478] kasan_save_alloc_info+0x40/0x58 [ 35.051089] __kasan_kmalloc+0xd4/0xd8 [ 35.051563] __kmalloc_cache_noprof+0x15c/0x3c8 [ 35.052277] kasan_bitops_generic+0xa0/0x1c8 [ 35.053364] kunit_try_run_case+0x14c/0x3d0 [ 35.054547] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.055440] kthread+0x24c/0x2d0 [ 35.055949] ret_from_fork+0x10/0x20 [ 35.056471] [ 35.056929] The buggy address belongs to the object at fff00000c5e082a0 [ 35.056929] which belongs to the cache kmalloc-16 of size 16 [ 35.058210] The buggy address is located 8 bytes inside of [ 35.058210] allocated 9-byte region [fff00000c5e082a0, fff00000c5e082a9) [ 35.060646] [ 35.061041] The buggy address belongs to the physical page: [ 35.062109] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e08 [ 35.063209] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.064160] page_type: f5(slab) [ 35.064731] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 35.065680] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 35.067016] page dumped because: kasan: bad access detected [ 35.067796] [ 35.068173] Memory state around the buggy address: [ 35.068805] fff00000c5e08180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 35.069734] fff00000c5e08200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 35.070564] >fff00000c5e08280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 35.071325] ^ [ 35.072104] fff00000c5e08300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.073015] fff00000c5e08380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.073982] ================================================================== [ 35.076094] ================================================================== [ 35.078183] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa28/0xbc8 [ 35.079275] Read of size 8 at addr fff00000c5e082a8 by task kunit_try_catch/250 [ 35.080704] [ 35.081115] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 35.082890] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.083440] Hardware name: linux,dummy-virt (DT) [ 35.084512] Call trace: [ 35.085240] show_stack+0x20/0x38 (C) [ 35.085866] dump_stack_lvl+0x8c/0xd0 [ 35.086635] print_report+0x118/0x5e0 [ 35.087392] kasan_report+0xc8/0x118 [ 35.088139] __asan_report_load8_noabort+0x20/0x30 [ 35.089083] kasan_bitops_modify.constprop.0+0xa28/0xbc8 [ 35.089885] kasan_bitops_generic+0x110/0x1c8 [ 35.090632] kunit_try_run_case+0x14c/0x3d0 [ 35.091309] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.092050] kthread+0x24c/0x2d0 [ 35.092600] ret_from_fork+0x10/0x20 [ 35.093176] [ 35.093572] Allocated by task 250: [ 35.094105] kasan_save_stack+0x3c/0x68 [ 35.094757] kasan_save_track+0x20/0x40 [ 35.095393] kasan_save_alloc_info+0x40/0x58 [ 35.096096] __kasan_kmalloc+0xd4/0xd8 [ 35.096695] __kmalloc_cache_noprof+0x15c/0x3c8 [ 35.097262] kasan_bitops_generic+0xa0/0x1c8 [ 35.097951] kunit_try_run_case+0x14c/0x3d0 [ 35.098628] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.099396] kthread+0x24c/0x2d0 [ 35.099998] ret_from_fork+0x10/0x20 [ 35.100629] [ 35.101013] The buggy address belongs to the object at fff00000c5e082a0 [ 35.101013] which belongs to the cache kmalloc-16 of size 16 [ 35.102233] The buggy address is located 8 bytes inside of [ 35.102233] allocated 9-byte region [fff00000c5e082a0, fff00000c5e082a9) [ 35.103449] [ 35.103858] The buggy address belongs to the physical page: [ 35.104633] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e08 [ 35.105415] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.106335] page_type: f5(slab) [ 35.106868] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 35.107790] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 35.108615] page dumped because: kasan: bad access detected [ 35.109354] [ 35.109758] Memory state around the buggy address: [ 35.110452] fff00000c5e08180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 35.111159] fff00000c5e08200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 35.112102] >fff00000c5e08280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 35.112915] ^ [ 35.113594] fff00000c5e08300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.114391] fff00000c5e08380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.115315] ================================================================== [ 34.840451] ================================================================== [ 34.841798] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc8 [ 34.843016] Write of size 8 at addr fff00000c5e082a8 by task kunit_try_catch/250 [ 34.843757] [ 34.844077] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 34.845267] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.846902] Hardware name: linux,dummy-virt (DT) [ 34.847727] Call trace: [ 34.848219] show_stack+0x20/0x38 (C) [ 34.848943] dump_stack_lvl+0x8c/0xd0 [ 34.849788] print_report+0x118/0x5e0 [ 34.850412] kasan_report+0xc8/0x118 [ 34.851080] kasan_check_range+0x100/0x1a8 [ 34.851772] __kasan_check_write+0x20/0x30 [ 34.852484] kasan_bitops_modify.constprop.0+0x2b4/0xbc8 [ 34.853419] kasan_bitops_generic+0x110/0x1c8 [ 34.854628] kunit_try_run_case+0x14c/0x3d0 [ 34.855157] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.855931] kthread+0x24c/0x2d0 [ 34.856463] ret_from_fork+0x10/0x20 [ 34.857091] [ 34.857412] Allocated by task 250: [ 34.858567] kasan_save_stack+0x3c/0x68 [ 34.859202] kasan_save_track+0x20/0x40 [ 34.859794] kasan_save_alloc_info+0x40/0x58 [ 34.860421] __kasan_kmalloc+0xd4/0xd8 [ 34.861412] __kmalloc_cache_noprof+0x15c/0x3c8 [ 34.862457] kasan_bitops_generic+0xa0/0x1c8 [ 34.863450] kunit_try_run_case+0x14c/0x3d0 [ 34.864323] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.865356] kthread+0x24c/0x2d0 [ 34.866381] ret_from_fork+0x10/0x20 [ 34.866938] [ 34.867316] The buggy address belongs to the object at fff00000c5e082a0 [ 34.867316] which belongs to the cache kmalloc-16 of size 16 [ 34.868593] The buggy address is located 8 bytes inside of [ 34.868593] allocated 9-byte region [fff00000c5e082a0, fff00000c5e082a9) [ 34.869862] [ 34.870671] The buggy address belongs to the physical page: [ 34.871613] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e08 [ 34.872289] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.873025] page_type: f5(slab) [ 34.873624] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 34.875099] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 34.876007] page dumped because: kasan: bad access detected [ 34.876694] [ 34.877057] Memory state around the buggy address: [ 34.877766] fff00000c5e08180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.878704] fff00000c5e08200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.880449] >fff00000c5e08280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 34.881264] ^ [ 34.881904] fff00000c5e08300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.882699] fff00000c5e08380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.884158] ================================================================== [ 34.660042] ================================================================== [ 34.661140] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc8 [ 34.662108] Write of size 8 at addr fff00000c5e082a8 by task kunit_try_catch/250 [ 34.662703] [ 34.663121] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 34.664446] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.665934] Hardware name: linux,dummy-virt (DT) [ 34.666752] Call trace: [ 34.667349] show_stack+0x20/0x38 (C) [ 34.668085] dump_stack_lvl+0x8c/0xd0 [ 34.668861] print_report+0x118/0x5e0 [ 34.669619] kasan_report+0xc8/0x118 [ 34.670640] kasan_check_range+0x100/0x1a8 [ 34.671486] __kasan_check_write+0x20/0x30 [ 34.672035] kasan_bitops_modify.constprop.0+0x100/0xbc8 [ 34.672916] kasan_bitops_generic+0x110/0x1c8 [ 34.673763] kunit_try_run_case+0x14c/0x3d0 [ 34.674950] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.675801] kthread+0x24c/0x2d0 [ 34.676177] ret_from_fork+0x10/0x20 [ 34.676752] [ 34.677137] Allocated by task 250: [ 34.678189] kasan_save_stack+0x3c/0x68 [ 34.678746] kasan_save_track+0x20/0x40 [ 34.679326] kasan_save_alloc_info+0x40/0x58 [ 34.679947] __kasan_kmalloc+0xd4/0xd8 [ 34.680492] __kmalloc_cache_noprof+0x15c/0x3c8 [ 34.681141] kasan_bitops_generic+0xa0/0x1c8 [ 34.681708] kunit_try_run_case+0x14c/0x3d0 [ 34.682371] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.683292] kthread+0x24c/0x2d0 [ 34.683895] ret_from_fork+0x10/0x20 [ 34.684472] [ 34.686090] The buggy address belongs to the object at fff00000c5e082a0 [ 34.686090] which belongs to the cache kmalloc-16 of size 16 [ 34.687334] The buggy address is located 8 bytes inside of [ 34.687334] allocated 9-byte region [fff00000c5e082a0, fff00000c5e082a9) [ 34.688681] [ 34.689135] The buggy address belongs to the physical page: [ 34.690120] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e08 [ 34.691163] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.692323] page_type: f5(slab) [ 34.692971] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 34.694246] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 34.695375] page dumped because: kasan: bad access detected [ 34.696012] [ 34.696429] Memory state around the buggy address: [ 34.697169] fff00000c5e08180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.698854] fff00000c5e08200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.699686] >fff00000c5e08280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 34.700625] ^ [ 34.701346] fff00000c5e08300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.702491] fff00000c5e08380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.703339] ==================================================================
[ 28.959279] ================================================================== [ 28.959663] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23b/0xd50 [ 28.959663] Write of size 8 at addr ffff888101a46908 by task kunit_try_catch/270 [ 28.959663] [ 28.959663] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 28.959663] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.959663] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.959663] Call Trace: [ 28.959663] <TASK> [ 28.959663] dump_stack_lvl+0x73/0xb0 [ 28.959663] print_report+0xd1/0x640 [ 28.959663] ? __virt_addr_valid+0x1db/0x2d0 [ 28.959663] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.959663] kasan_report+0x102/0x140 [ 28.959663] ? kasan_bitops_modify.constprop.0+0x23b/0xd50 [ 28.959663] ? kasan_bitops_modify.constprop.0+0x23b/0xd50 [ 28.959663] kasan_check_range+0x10c/0x1c0 [ 28.959663] __kasan_check_write+0x18/0x20 [ 28.959663] kasan_bitops_modify.constprop.0+0x23b/0xd50 [ 28.959663] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 28.959663] ? __kmalloc_cache_noprof+0x184/0x410 [ 28.959663] ? __pfx_read_hpet+0x10/0x10 [ 28.959663] ? kasan_bitops_generic+0x93/0x1c0 [ 28.959663] kasan_bitops_generic+0x117/0x1c0 [ 28.959663] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 28.959663] ? ktime_get_ts64+0x84/0x230 [ 28.959663] kunit_try_run_case+0x1b3/0x490 [ 28.959663] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.959663] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 28.959663] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.959663] ? __kthread_parkme+0x82/0x160 [ 28.959663] ? preempt_count_sub+0x50/0x80 [ 28.959663] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.959663] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.959663] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.959663] kthread+0x257/0x310 [ 28.959663] ? __pfx_kthread+0x10/0x10 [ 28.959663] ret_from_fork+0x41/0x80 [ 28.959663] ? __pfx_kthread+0x10/0x10 [ 28.959663] ret_from_fork_asm+0x1a/0x30 [ 28.959663] </TASK> [ 28.959663] [ 28.959663] Allocated by task 270: [ 28.959663] kasan_save_stack+0x3d/0x60 [ 28.959663] kasan_save_track+0x18/0x40 [ 28.959663] kasan_save_alloc_info+0x3b/0x50 [ 28.959663] __kasan_kmalloc+0xb7/0xc0 [ 28.959663] __kmalloc_cache_noprof+0x184/0x410 [ 28.959663] kasan_bitops_generic+0x93/0x1c0 [ 28.959663] kunit_try_run_case+0x1b3/0x490 [ 28.959663] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.959663] kthread+0x257/0x310 [ 28.959663] ret_from_fork+0x41/0x80 [ 28.959663] ret_from_fork_asm+0x1a/0x30 [ 28.959663] [ 28.959663] The buggy address belongs to the object at ffff888101a46900 [ 28.959663] which belongs to the cache kmalloc-16 of size 16 [ 28.959663] The buggy address is located 8 bytes inside of [ 28.959663] allocated 9-byte region [ffff888101a46900, ffff888101a46909) [ 28.959663] [ 28.959663] The buggy address belongs to the physical page: [ 28.959663] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101a46 [ 28.959663] flags: 0x200000000000000(node=0|zone=2) [ 28.959663] page_type: f5(slab) [ 28.959663] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 28.959663] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 28.959663] page dumped because: kasan: bad access detected [ 28.959663] [ 28.959663] Memory state around the buggy address: [ 28.959663] ffff888101a46800: 00 05 fc fc fa fb fc fc 00 04 fc fc fa fb fc fc [ 28.959663] ffff888101a46880: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 28.959663] >ffff888101a46900: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.959663] ^ [ 28.959663] ffff888101a46980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.959663] ffff888101a46a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.959663] ================================================================== [ 28.910155] ================================================================== [ 28.910155] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19d/0xd50 [ 28.910155] Write of size 8 at addr ffff888101a46908 by task kunit_try_catch/270 [ 28.910155] [ 28.910155] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 28.910155] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.910155] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.910155] Call Trace: [ 28.910155] <TASK> [ 28.910155] dump_stack_lvl+0x73/0xb0 [ 28.910155] print_report+0xd1/0x640 [ 28.910155] ? __virt_addr_valid+0x1db/0x2d0 [ 28.910155] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.910155] kasan_report+0x102/0x140 [ 28.910155] ? kasan_bitops_modify.constprop.0+0x19d/0xd50 [ 28.910155] ? kasan_bitops_modify.constprop.0+0x19d/0xd50 [ 28.910155] kasan_check_range+0x10c/0x1c0 [ 28.910155] __kasan_check_write+0x18/0x20 [ 28.910155] kasan_bitops_modify.constprop.0+0x19d/0xd50 [ 28.910155] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 28.910155] ? __kmalloc_cache_noprof+0x184/0x410 [ 28.910155] ? __pfx_read_hpet+0x10/0x10 [ 28.910155] ? kasan_bitops_generic+0x93/0x1c0 [ 28.910155] kasan_bitops_generic+0x117/0x1c0 [ 28.910155] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 28.910155] ? ktime_get_ts64+0x84/0x230 [ 28.910155] kunit_try_run_case+0x1b3/0x490 [ 28.910155] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.910155] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 28.910155] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.910155] ? __kthread_parkme+0x82/0x160 [ 28.910155] ? preempt_count_sub+0x50/0x80 [ 28.910155] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.910155] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.910155] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.910155] kthread+0x257/0x310 [ 28.910155] ? __pfx_kthread+0x10/0x10 [ 28.910155] ret_from_fork+0x41/0x80 [ 28.910155] ? __pfx_kthread+0x10/0x10 [ 28.910155] ret_from_fork_asm+0x1a/0x30 [ 28.910155] </TASK> [ 28.910155] [ 28.910155] Allocated by task 270: [ 28.910155] kasan_save_stack+0x3d/0x60 [ 28.910155] kasan_save_track+0x18/0x40 [ 28.910155] kasan_save_alloc_info+0x3b/0x50 [ 28.910155] __kasan_kmalloc+0xb7/0xc0 [ 28.910155] __kmalloc_cache_noprof+0x184/0x410 [ 28.910155] kasan_bitops_generic+0x93/0x1c0 [ 28.910155] kunit_try_run_case+0x1b3/0x490 [ 28.910155] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.910155] kthread+0x257/0x310 [ 28.910155] ret_from_fork+0x41/0x80 [ 28.910155] ret_from_fork_asm+0x1a/0x30 [ 28.910155] [ 28.910155] The buggy address belongs to the object at ffff888101a46900 [ 28.910155] which belongs to the cache kmalloc-16 of size 16 [ 28.910155] The buggy address is located 8 bytes inside of [ 28.910155] allocated 9-byte region [ffff888101a46900, ffff888101a46909) [ 28.910155] [ 28.910155] The buggy address belongs to the physical page: [ 28.910155] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101a46 [ 28.910155] flags: 0x200000000000000(node=0|zone=2) [ 28.910155] page_type: f5(slab) [ 28.910155] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 28.910155] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 28.910155] page dumped because: kasan: bad access detected [ 28.910155] [ 28.910155] Memory state around the buggy address: [ 28.910155] ffff888101a46800: 00 05 fc fc fa fb fc fc 00 04 fc fc fa fb fc fc [ 28.910155] ffff888101a46880: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 28.910155] >ffff888101a46900: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.910155] ^ [ 28.910155] ffff888101a46980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.910155] ffff888101a46a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.910155] ================================================================== [ 29.010290] ================================================================== [ 29.010772] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d6/0xd50 [ 29.011084] Write of size 8 at addr ffff888101a46908 by task kunit_try_catch/270 [ 29.011084] [ 29.011084] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 29.011084] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.011084] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.011084] Call Trace: [ 29.011084] <TASK> [ 29.011084] dump_stack_lvl+0x73/0xb0 [ 29.011084] print_report+0xd1/0x640 [ 29.011084] ? __virt_addr_valid+0x1db/0x2d0 [ 29.011084] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.011084] kasan_report+0x102/0x140 [ 29.011084] ? kasan_bitops_modify.constprop.0+0x2d6/0xd50 [ 29.011084] ? kasan_bitops_modify.constprop.0+0x2d6/0xd50 [ 29.011084] kasan_check_range+0x10c/0x1c0 [ 29.011084] __kasan_check_write+0x18/0x20 [ 29.011084] kasan_bitops_modify.constprop.0+0x2d6/0xd50 [ 29.011084] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 29.011084] ? __kmalloc_cache_noprof+0x184/0x410 [ 29.011084] ? __pfx_read_hpet+0x10/0x10 [ 29.011084] ? kasan_bitops_generic+0x93/0x1c0 [ 29.011084] kasan_bitops_generic+0x117/0x1c0 [ 29.011084] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 29.011084] ? ktime_get_ts64+0x84/0x230 [ 29.011084] kunit_try_run_case+0x1b3/0x490 [ 29.011084] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.011084] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.011084] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.011084] ? __kthread_parkme+0x82/0x160 [ 29.011084] ? preempt_count_sub+0x50/0x80 [ 29.011084] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.011084] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.011084] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.011084] kthread+0x257/0x310 [ 29.011084] ? __pfx_kthread+0x10/0x10 [ 29.011084] ret_from_fork+0x41/0x80 [ 29.011084] ? __pfx_kthread+0x10/0x10 [ 29.011084] ret_from_fork_asm+0x1a/0x30 [ 29.011084] </TASK> [ 29.011084] [ 29.011084] Allocated by task 270: [ 29.011084] kasan_save_stack+0x3d/0x60 [ 29.011084] kasan_save_track+0x18/0x40 [ 29.011084] kasan_save_alloc_info+0x3b/0x50 [ 29.011084] __kasan_kmalloc+0xb7/0xc0 [ 29.011084] __kmalloc_cache_noprof+0x184/0x410 [ 29.011084] kasan_bitops_generic+0x93/0x1c0 [ 29.011084] kunit_try_run_case+0x1b3/0x490 [ 29.011084] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.011084] kthread+0x257/0x310 [ 29.011084] ret_from_fork+0x41/0x80 [ 29.011084] ret_from_fork_asm+0x1a/0x30 [ 29.011084] [ 29.011084] The buggy address belongs to the object at ffff888101a46900 [ 29.011084] which belongs to the cache kmalloc-16 of size 16 [ 29.011084] The buggy address is located 8 bytes inside of [ 29.011084] allocated 9-byte region [ffff888101a46900, ffff888101a46909) [ 29.011084] [ 29.011084] The buggy address belongs to the physical page: [ 29.011084] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101a46 [ 29.011084] flags: 0x200000000000000(node=0|zone=2) [ 29.011084] page_type: f5(slab) [ 29.011084] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 29.011084] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 29.011084] page dumped because: kasan: bad access detected [ 29.011084] [ 29.011084] Memory state around the buggy address: [ 29.011084] ffff888101a46800: 00 05 fc fc fa fb fc fc 00 04 fc fc fa fb fc fc [ 29.011084] ffff888101a46880: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 29.011084] >ffff888101a46900: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.011084] ^ [ 29.011084] ffff888101a46980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.011084] ffff888101a46a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.011084] ================================================================== [ 29.062210] ================================================================== [ 29.062210] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x374/0xd50 [ 29.062210] Write of size 8 at addr ffff888101a46908 by task kunit_try_catch/270 [ 29.062210] [ 29.062210] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 29.062210] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.062210] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.062210] Call Trace: [ 29.062210] <TASK> [ 29.062210] dump_stack_lvl+0x73/0xb0 [ 29.062210] print_report+0xd1/0x640 [ 29.062210] ? __virt_addr_valid+0x1db/0x2d0 [ 29.062210] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.062210] kasan_report+0x102/0x140 [ 29.062210] ? kasan_bitops_modify.constprop.0+0x374/0xd50 [ 29.062210] ? kasan_bitops_modify.constprop.0+0x374/0xd50 [ 29.062210] kasan_check_range+0x10c/0x1c0 [ 29.062210] __kasan_check_write+0x18/0x20 [ 29.062210] kasan_bitops_modify.constprop.0+0x374/0xd50 [ 29.062210] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 29.062210] ? __kmalloc_cache_noprof+0x184/0x410 [ 29.062210] ? __pfx_read_hpet+0x10/0x10 [ 29.062210] ? kasan_bitops_generic+0x93/0x1c0 [ 29.062210] kasan_bitops_generic+0x117/0x1c0 [ 29.062210] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 29.062210] ? ktime_get_ts64+0x84/0x230 [ 29.062210] kunit_try_run_case+0x1b3/0x490 [ 29.062210] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.062210] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.062210] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.062210] ? __kthread_parkme+0x82/0x160 [ 29.062210] ? preempt_count_sub+0x50/0x80 [ 29.062210] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.062210] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.062210] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.062210] kthread+0x257/0x310 [ 29.062210] ? __pfx_kthread+0x10/0x10 [ 29.062210] ret_from_fork+0x41/0x80 [ 29.062210] ? __pfx_kthread+0x10/0x10 [ 29.062210] ret_from_fork_asm+0x1a/0x30 [ 29.062210] </TASK> [ 29.062210] [ 29.062210] Allocated by task 270: [ 29.062210] kasan_save_stack+0x3d/0x60 [ 29.062210] kasan_save_track+0x18/0x40 [ 29.062210] kasan_save_alloc_info+0x3b/0x50 [ 29.062210] __kasan_kmalloc+0xb7/0xc0 [ 29.062210] __kmalloc_cache_noprof+0x184/0x410 [ 29.062210] kasan_bitops_generic+0x93/0x1c0 [ 29.062210] kunit_try_run_case+0x1b3/0x490 [ 29.062210] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.062210] kthread+0x257/0x310 [ 29.062210] ret_from_fork+0x41/0x80 [ 29.062210] ret_from_fork_asm+0x1a/0x30 [ 29.062210] [ 29.062210] The buggy address belongs to the object at ffff888101a46900 [ 29.062210] which belongs to the cache kmalloc-16 of size 16 [ 29.062210] The buggy address is located 8 bytes inside of [ 29.062210] allocated 9-byte region [ffff888101a46900, ffff888101a46909) [ 29.062210] [ 29.062210] The buggy address belongs to the physical page: [ 29.062210] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101a46 [ 29.062210] flags: 0x200000000000000(node=0|zone=2) [ 29.062210] page_type: f5(slab) [ 29.062210] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 29.062210] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 29.062210] page dumped because: kasan: bad access detected [ 29.062210] [ 29.062210] Memory state around the buggy address: [ 29.062210] ffff888101a46800: 00 05 fc fc fa fb fc fc 00 04 fc fc fa fb fc fc [ 29.062210] ffff888101a46880: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 29.062210] >ffff888101a46900: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.062210] ^ [ 29.062210] ffff888101a46980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.062210] ffff888101a46a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.062210] ================================================================== [ 29.159764] ================================================================== [ 29.160481] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ad/0xd50 [ 29.160481] Write of size 8 at addr ffff888101a46908 by task kunit_try_catch/270 [ 29.160481] [ 29.160481] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 29.160481] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.160481] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.160481] Call Trace: [ 29.160481] <TASK> [ 29.160481] dump_stack_lvl+0x73/0xb0 [ 29.160481] print_report+0xd1/0x640 [ 29.160481] ? __virt_addr_valid+0x1db/0x2d0 [ 29.160481] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.160481] kasan_report+0x102/0x140 [ 29.160481] ? kasan_bitops_modify.constprop.0+0x4ad/0xd50 [ 29.160481] ? kasan_bitops_modify.constprop.0+0x4ad/0xd50 [ 29.160481] kasan_check_range+0x10c/0x1c0 [ 29.160481] __kasan_check_write+0x18/0x20 [ 29.160481] kasan_bitops_modify.constprop.0+0x4ad/0xd50 [ 29.160481] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 29.160481] ? __kmalloc_cache_noprof+0x184/0x410 [ 29.160481] ? __pfx_read_hpet+0x10/0x10 [ 29.160481] ? kasan_bitops_generic+0x93/0x1c0 [ 29.160481] kasan_bitops_generic+0x117/0x1c0 [ 29.160481] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 29.160481] ? ktime_get_ts64+0x84/0x230 [ 29.160481] kunit_try_run_case+0x1b3/0x490 [ 29.160481] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.160481] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.160481] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.160481] ? __kthread_parkme+0x82/0x160 [ 29.160481] ? preempt_count_sub+0x50/0x80 [ 29.160481] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.160481] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.160481] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.160481] kthread+0x257/0x310 [ 29.160481] ? __pfx_kthread+0x10/0x10 [ 29.160481] ret_from_fork+0x41/0x80 [ 29.160481] ? __pfx_kthread+0x10/0x10 [ 29.160481] ret_from_fork_asm+0x1a/0x30 [ 29.160481] </TASK> [ 29.160481] [ 29.160481] Allocated by task 270: [ 29.160481] kasan_save_stack+0x3d/0x60 [ 29.160481] kasan_save_track+0x18/0x40 [ 29.160481] kasan_save_alloc_info+0x3b/0x50 [ 29.160481] __kasan_kmalloc+0xb7/0xc0 [ 29.160481] __kmalloc_cache_noprof+0x184/0x410 [ 29.160481] kasan_bitops_generic+0x93/0x1c0 [ 29.160481] kunit_try_run_case+0x1b3/0x490 [ 29.160481] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.160481] kthread+0x257/0x310 [ 29.160481] ret_from_fork+0x41/0x80 [ 29.160481] ret_from_fork_asm+0x1a/0x30 [ 29.160481] [ 29.160481] The buggy address belongs to the object at ffff888101a46900 [ 29.160481] which belongs to the cache kmalloc-16 of size 16 [ 29.160481] The buggy address is located 8 bytes inside of [ 29.160481] allocated 9-byte region [ffff888101a46900, ffff888101a46909) [ 29.160481] [ 29.160481] The buggy address belongs to the physical page: [ 29.160481] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101a46 [ 29.160481] flags: 0x200000000000000(node=0|zone=2) [ 29.160481] page_type: f5(slab) [ 29.160481] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 29.160481] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 29.160481] page dumped because: kasan: bad access detected [ 29.160481] [ 29.160481] Memory state around the buggy address: [ 29.160481] ffff888101a46800: 00 05 fc fc fa fb fc fc 00 04 fc fc fa fb fc fc [ 29.160481] ffff888101a46880: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 29.160481] >ffff888101a46900: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.160481] ^ [ 29.160481] ffff888101a46980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.160481] ffff888101a46a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.160481] ================================================================== [ 29.201005] ================================================================== [ 29.201255] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x548/0xd50 [ 29.201255] Write of size 8 at addr ffff888101a46908 by task kunit_try_catch/270 [ 29.201255] [ 29.201255] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 29.201255] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.201255] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.201255] Call Trace: [ 29.201255] <TASK> [ 29.201255] dump_stack_lvl+0x73/0xb0 [ 29.201255] print_report+0xd1/0x640 [ 29.201255] ? __virt_addr_valid+0x1db/0x2d0 [ 29.201255] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.201255] kasan_report+0x102/0x140 [ 29.201255] ? kasan_bitops_modify.constprop.0+0x548/0xd50 [ 29.201255] ? kasan_bitops_modify.constprop.0+0x548/0xd50 [ 29.201255] kasan_check_range+0x10c/0x1c0 [ 29.201255] __kasan_check_write+0x18/0x20 [ 29.201255] kasan_bitops_modify.constprop.0+0x548/0xd50 [ 29.201255] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 29.201255] ? __kmalloc_cache_noprof+0x184/0x410 [ 29.201255] ? __pfx_read_hpet+0x10/0x10 [ 29.201255] ? kasan_bitops_generic+0x93/0x1c0 [ 29.201255] kasan_bitops_generic+0x117/0x1c0 [ 29.201255] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 29.201255] ? ktime_get_ts64+0x84/0x230 [ 29.201255] kunit_try_run_case+0x1b3/0x490 [ 29.201255] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.201255] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.201255] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.201255] ? __kthread_parkme+0x82/0x160 [ 29.201255] ? preempt_count_sub+0x50/0x80 [ 29.201255] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.201255] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.201255] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.201255] kthread+0x257/0x310 [ 29.201255] ? __pfx_kthread+0x10/0x10 [ 29.201255] ret_from_fork+0x41/0x80 [ 29.201255] ? __pfx_kthread+0x10/0x10 [ 29.201255] ret_from_fork_asm+0x1a/0x30 [ 29.201255] </TASK> [ 29.201255] [ 29.201255] Allocated by task 270: [ 29.201255] kasan_save_stack+0x3d/0x60 [ 29.201255] kasan_save_track+0x18/0x40 [ 29.201255] kasan_save_alloc_info+0x3b/0x50 [ 29.201255] __kasan_kmalloc+0xb7/0xc0 [ 29.201255] __kmalloc_cache_noprof+0x184/0x410 [ 29.201255] kasan_bitops_generic+0x93/0x1c0 [ 29.201255] kunit_try_run_case+0x1b3/0x490 [ 29.201255] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.201255] kthread+0x257/0x310 [ 29.201255] ret_from_fork+0x41/0x80 [ 29.201255] ret_from_fork_asm+0x1a/0x30 [ 29.201255] [ 29.201255] The buggy address belongs to the object at ffff888101a46900 [ 29.201255] which belongs to the cache kmalloc-16 of size 16 [ 29.201255] The buggy address is located 8 bytes inside of [ 29.201255] allocated 9-byte region [ffff888101a46900, ffff888101a46909) [ 29.201255] [ 29.201255] The buggy address belongs to the physical page: [ 29.201255] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101a46 [ 29.201255] flags: 0x200000000000000(node=0|zone=2) [ 29.201255] page_type: f5(slab) [ 29.201255] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 29.201255] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 29.201255] page dumped because: kasan: bad access detected [ 29.201255] [ 29.201255] Memory state around the buggy address: [ 29.201255] ffff888101a46800: 00 05 fc fc fa fb fc fc 00 04 fc fc fa fb fc fc [ 29.201255] ffff888101a46880: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 29.201255] >ffff888101a46900: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.201255] ^ [ 29.201255] ffff888101a46980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.201255] ffff888101a46a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.201255] ================================================================== [ 28.857750] ================================================================== [ 28.858196] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x102/0xd50 [ 28.858196] Write of size 8 at addr ffff888101a46908 by task kunit_try_catch/270 [ 28.858196] [ 28.858196] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 28.858196] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.858196] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.858196] Call Trace: [ 28.858196] <TASK> [ 28.858196] dump_stack_lvl+0x73/0xb0 [ 28.858196] print_report+0xd1/0x640 [ 28.858196] ? __virt_addr_valid+0x1db/0x2d0 [ 28.858196] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.858196] kasan_report+0x102/0x140 [ 28.858196] ? kasan_bitops_modify.constprop.0+0x102/0xd50 [ 28.858196] ? kasan_bitops_modify.constprop.0+0x102/0xd50 [ 28.858196] kasan_check_range+0x10c/0x1c0 [ 28.858196] __kasan_check_write+0x18/0x20 [ 28.858196] kasan_bitops_modify.constprop.0+0x102/0xd50 [ 28.858196] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 28.858196] ? __kmalloc_cache_noprof+0x184/0x410 [ 28.858196] ? __pfx_read_hpet+0x10/0x10 [ 28.858196] ? kasan_bitops_generic+0x93/0x1c0 [ 28.858196] kasan_bitops_generic+0x117/0x1c0 [ 28.858196] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 28.858196] ? ktime_get_ts64+0x84/0x230 [ 28.858196] kunit_try_run_case+0x1b3/0x490 [ 28.858196] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.858196] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 28.858196] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.858196] ? __kthread_parkme+0x82/0x160 [ 28.858196] ? preempt_count_sub+0x50/0x80 [ 28.858196] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.858196] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.858196] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.858196] kthread+0x257/0x310 [ 28.858196] ? __pfx_kthread+0x10/0x10 [ 28.858196] ret_from_fork+0x41/0x80 [ 28.858196] ? __pfx_kthread+0x10/0x10 [ 28.858196] ret_from_fork_asm+0x1a/0x30 [ 28.858196] </TASK> [ 28.858196] [ 28.858196] Allocated by task 270: [ 28.858196] kasan_save_stack+0x3d/0x60 [ 28.858196] kasan_save_track+0x18/0x40 [ 28.858196] kasan_save_alloc_info+0x3b/0x50 [ 28.858196] __kasan_kmalloc+0xb7/0xc0 [ 28.858196] __kmalloc_cache_noprof+0x184/0x410 [ 28.858196] kasan_bitops_generic+0x93/0x1c0 [ 28.858196] kunit_try_run_case+0x1b3/0x490 [ 28.858196] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.858196] kthread+0x257/0x310 [ 28.858196] ret_from_fork+0x41/0x80 [ 28.858196] ret_from_fork_asm+0x1a/0x30 [ 28.858196] [ 28.858196] The buggy address belongs to the object at ffff888101a46900 [ 28.858196] which belongs to the cache kmalloc-16 of size 16 [ 28.858196] The buggy address is located 8 bytes inside of [ 28.858196] allocated 9-byte region [ffff888101a46900, ffff888101a46909) [ 28.858196] [ 28.858196] The buggy address belongs to the physical page: [ 28.858196] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101a46 [ 28.858196] flags: 0x200000000000000(node=0|zone=2) [ 28.858196] page_type: f5(slab) [ 28.858196] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 28.858196] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 28.858196] page dumped because: kasan: bad access detected [ 28.858196] [ 28.858196] Memory state around the buggy address: [ 28.858196] ffff888101a46800: 00 05 fc fc fa fb fc fc 00 04 fc fc fa fb fc fc [ 28.858196] ffff888101a46880: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 28.858196] >ffff888101a46900: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.858196] ^ [ 28.858196] ffff888101a46980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.858196] ffff888101a46a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.858196] ================================================================== [ 29.114179] ================================================================== [ 29.114179] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40f/0xd50 [ 29.114179] Write of size 8 at addr ffff888101a46908 by task kunit_try_catch/270 [ 29.114179] [ 29.114179] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 29.114179] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.114179] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.114179] Call Trace: [ 29.114179] <TASK> [ 29.114179] dump_stack_lvl+0x73/0xb0 [ 29.114179] print_report+0xd1/0x640 [ 29.114179] ? __virt_addr_valid+0x1db/0x2d0 [ 29.114179] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.114179] kasan_report+0x102/0x140 [ 29.114179] ? kasan_bitops_modify.constprop.0+0x40f/0xd50 [ 29.114179] ? kasan_bitops_modify.constprop.0+0x40f/0xd50 [ 29.114179] kasan_check_range+0x10c/0x1c0 [ 29.114179] __kasan_check_write+0x18/0x20 [ 29.114179] kasan_bitops_modify.constprop.0+0x40f/0xd50 [ 29.114179] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 29.114179] ? __kmalloc_cache_noprof+0x184/0x410 [ 29.114179] ? __pfx_read_hpet+0x10/0x10 [ 29.114179] ? kasan_bitops_generic+0x93/0x1c0 [ 29.114179] kasan_bitops_generic+0x117/0x1c0 [ 29.114179] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 29.114179] ? ktime_get_ts64+0x84/0x230 [ 29.114179] kunit_try_run_case+0x1b3/0x490 [ 29.114179] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.114179] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.114179] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.114179] ? __kthread_parkme+0x82/0x160 [ 29.114179] ? preempt_count_sub+0x50/0x80 [ 29.114179] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.114179] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.114179] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.114179] kthread+0x257/0x310 [ 29.114179] ? __pfx_kthread+0x10/0x10 [ 29.114179] ret_from_fork+0x41/0x80 [ 29.114179] ? __pfx_kthread+0x10/0x10 [ 29.114179] ret_from_fork_asm+0x1a/0x30 [ 29.114179] </TASK> [ 29.114179] [ 29.114179] Allocated by task 270: [ 29.114179] kasan_save_stack+0x3d/0x60 [ 29.114179] kasan_save_track+0x18/0x40 [ 29.114179] kasan_save_alloc_info+0x3b/0x50 [ 29.114179] __kasan_kmalloc+0xb7/0xc0 [ 29.114179] __kmalloc_cache_noprof+0x184/0x410 [ 29.114179] kasan_bitops_generic+0x93/0x1c0 [ 29.114179] kunit_try_run_case+0x1b3/0x490 [ 29.114179] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.114179] kthread+0x257/0x310 [ 29.114179] ret_from_fork+0x41/0x80 [ 29.114179] ret_from_fork_asm+0x1a/0x30 [ 29.114179] [ 29.114179] The buggy address belongs to the object at ffff888101a46900 [ 29.114179] which belongs to the cache kmalloc-16 of size 16 [ 29.114179] The buggy address is located 8 bytes inside of [ 29.114179] allocated 9-byte region [ffff888101a46900, ffff888101a46909) [ 29.114179] [ 29.114179] The buggy address belongs to the physical page: [ 29.114179] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101a46 [ 29.114179] flags: 0x200000000000000(node=0|zone=2) [ 29.114179] page_type: f5(slab) [ 29.114179] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 29.114179] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 29.114179] page dumped because: kasan: bad access detected [ 29.114179] [ 29.114179] Memory state around the buggy address: [ 29.114179] ffff888101a46800: 00 05 fc fc fa fb fc fc 00 04 fc fc fa fb fc fc [ 29.114179] ffff888101a46880: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 29.114179] >ffff888101a46900: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.114179] ^ [ 29.114179] ffff888101a46980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.114179] ffff888101a46a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.114179] ==================================================================
[ 23.870079] ================================================================== [ 23.871611] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x374/0xd50 [ 23.872233] Write of size 8 at addr ffff8881028a7088 by task kunit_try_catch/268 [ 23.872662] [ 23.873272] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 23.874543] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.874917] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.875930] Call Trace: [ 23.876411] <TASK> [ 23.876929] dump_stack_lvl+0x73/0xb0 [ 23.877456] print_report+0xd1/0x640 [ 23.878101] ? __virt_addr_valid+0x1db/0x2d0 [ 23.878737] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.879433] kasan_report+0x102/0x140 [ 23.880061] ? kasan_bitops_modify.constprop.0+0x374/0xd50 [ 23.880591] ? kasan_bitops_modify.constprop.0+0x374/0xd50 [ 23.881420] kasan_check_range+0x10c/0x1c0 [ 23.882105] __kasan_check_write+0x18/0x20 [ 23.882718] kasan_bitops_modify.constprop.0+0x374/0xd50 [ 23.883221] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 23.884176] ? __kmalloc_cache_noprof+0x184/0x410 [ 23.884846] ? trace_hardirqs_on+0x37/0xe0 [ 23.885426] ? kasan_bitops_generic+0x93/0x1c0 [ 23.886175] kasan_bitops_generic+0x117/0x1c0 [ 23.886706] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 23.887303] ? __pfx_read_tsc+0x10/0x10 [ 23.887732] ? ktime_get_ts64+0x84/0x230 [ 23.888110] kunit_try_run_case+0x1b3/0x490 [ 23.889281] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.889712] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 23.890417] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.890939] ? __kthread_parkme+0x82/0x160 [ 23.891331] ? preempt_count_sub+0x50/0x80 [ 23.891847] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.892266] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.892785] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.893332] kthread+0x257/0x310 [ 23.893782] ? __pfx_kthread+0x10/0x10 [ 23.894199] ret_from_fork+0x41/0x80 [ 23.894475] ? __pfx_kthread+0x10/0x10 [ 23.894963] ret_from_fork_asm+0x1a/0x30 [ 23.895520] </TASK> [ 23.895857] [ 23.896039] Allocated by task 268: [ 23.896270] kasan_save_stack+0x3d/0x60 [ 23.896668] kasan_save_track+0x18/0x40 [ 23.897193] kasan_save_alloc_info+0x3b/0x50 [ 23.897674] __kasan_kmalloc+0xb7/0xc0 [ 23.897945] __kmalloc_cache_noprof+0x184/0x410 [ 23.898238] kasan_bitops_generic+0x93/0x1c0 [ 23.898741] kunit_try_run_case+0x1b3/0x490 [ 23.899347] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.899997] kthread+0x257/0x310 [ 23.900342] ret_from_fork+0x41/0x80 [ 23.900764] ret_from_fork_asm+0x1a/0x30 [ 23.901042] [ 23.901199] The buggy address belongs to the object at ffff8881028a7080 [ 23.901199] which belongs to the cache kmalloc-16 of size 16 [ 23.902059] The buggy address is located 8 bytes inside of [ 23.902059] allocated 9-byte region [ffff8881028a7080, ffff8881028a7089) [ 23.903057] [ 23.903223] The buggy address belongs to the physical page: [ 23.903533] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028a7 [ 23.904257] flags: 0x200000000000000(node=0|zone=2) [ 23.904817] page_type: f5(slab) [ 23.905222] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 23.905921] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 23.906321] page dumped because: kasan: bad access detected [ 23.906867] [ 23.907149] Memory state around the buggy address: [ 23.907591] ffff8881028a6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.908139] ffff8881028a7000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 23.908535] >ffff8881028a7080: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.909186] ^ [ 23.909631] ffff8881028a7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.910357] ffff8881028a7180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.910892] ================================================================== [ 23.696676] ================================================================== [ 23.697849] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x102/0xd50 [ 23.698537] Write of size 8 at addr ffff8881028a7088 by task kunit_try_catch/268 [ 23.699971] [ 23.700248] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 23.701316] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.701751] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.702840] Call Trace: [ 23.703176] <TASK> [ 23.703766] dump_stack_lvl+0x73/0xb0 [ 23.704077] print_report+0xd1/0x640 [ 23.704872] ? __virt_addr_valid+0x1db/0x2d0 [ 23.705285] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.706211] kasan_report+0x102/0x140 [ 23.707030] ? kasan_bitops_modify.constprop.0+0x102/0xd50 [ 23.707509] ? kasan_bitops_modify.constprop.0+0x102/0xd50 [ 23.708035] kasan_check_range+0x10c/0x1c0 [ 23.708776] __kasan_check_write+0x18/0x20 [ 23.709234] kasan_bitops_modify.constprop.0+0x102/0xd50 [ 23.710084] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 23.710843] ? __kmalloc_cache_noprof+0x184/0x410 [ 23.711259] ? trace_hardirqs_on+0x37/0xe0 [ 23.712016] ? kasan_bitops_generic+0x93/0x1c0 [ 23.713045] kasan_bitops_generic+0x117/0x1c0 [ 23.713461] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 23.714215] ? __pfx_read_tsc+0x10/0x10 [ 23.714599] ? ktime_get_ts64+0x84/0x230 [ 23.715518] kunit_try_run_case+0x1b3/0x490 [ 23.715941] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.716560] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 23.716936] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.717348] ? __kthread_parkme+0x82/0x160 [ 23.718285] ? preempt_count_sub+0x50/0x80 [ 23.718662] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.719469] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.720231] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.721238] kthread+0x257/0x310 [ 23.721585] ? __pfx_kthread+0x10/0x10 [ 23.722134] ret_from_fork+0x41/0x80 [ 23.722570] ? __pfx_kthread+0x10/0x10 [ 23.722874] ret_from_fork_asm+0x1a/0x30 [ 23.723280] </TASK> [ 23.724149] [ 23.724311] Allocated by task 268: [ 23.724917] kasan_save_stack+0x3d/0x60 [ 23.725437] kasan_save_track+0x18/0x40 [ 23.725967] kasan_save_alloc_info+0x3b/0x50 [ 23.726466] __kasan_kmalloc+0xb7/0xc0 [ 23.726983] __kmalloc_cache_noprof+0x184/0x410 [ 23.727503] kasan_bitops_generic+0x93/0x1c0 [ 23.727979] kunit_try_run_case+0x1b3/0x490 [ 23.728438] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.728852] kthread+0x257/0x310 [ 23.729199] ret_from_fork+0x41/0x80 [ 23.729632] ret_from_fork_asm+0x1a/0x30 [ 23.729958] [ 23.730174] The buggy address belongs to the object at ffff8881028a7080 [ 23.730174] which belongs to the cache kmalloc-16 of size 16 [ 23.731125] The buggy address is located 8 bytes inside of [ 23.731125] allocated 9-byte region [ffff8881028a7080, ffff8881028a7089) [ 23.731896] [ 23.732131] The buggy address belongs to the physical page: [ 23.732711] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028a7 [ 23.733235] flags: 0x200000000000000(node=0|zone=2) [ 23.733621] page_type: f5(slab) [ 23.733983] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 23.734658] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 23.735147] page dumped because: kasan: bad access detected [ 23.735749] [ 23.735911] Memory state around the buggy address: [ 23.736194] ffff8881028a6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.736661] ffff8881028a7000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 23.737287] >ffff8881028a7080: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.737957] ^ [ 23.738346] ffff8881028a7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.739027] ffff8881028a7180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.739453] ================================================================== [ 23.826899] ================================================================== [ 23.827674] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d6/0xd50 [ 23.828537] Write of size 8 at addr ffff8881028a7088 by task kunit_try_catch/268 [ 23.829304] [ 23.829694] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 23.831122] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.831603] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.832698] Call Trace: [ 23.832982] <TASK> [ 23.833239] dump_stack_lvl+0x73/0xb0 [ 23.833804] print_report+0xd1/0x640 [ 23.834051] ? __virt_addr_valid+0x1db/0x2d0 [ 23.834233] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.834419] kasan_report+0x102/0x140 [ 23.834857] ? kasan_bitops_modify.constprop.0+0x2d6/0xd50 [ 23.835386] ? kasan_bitops_modify.constprop.0+0x2d6/0xd50 [ 23.836196] kasan_check_range+0x10c/0x1c0 [ 23.836531] __kasan_check_write+0x18/0x20 [ 23.836974] kasan_bitops_modify.constprop.0+0x2d6/0xd50 [ 23.837553] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 23.838480] ? __kmalloc_cache_noprof+0x184/0x410 [ 23.839507] ? trace_hardirqs_on+0x37/0xe0 [ 23.840045] ? kasan_bitops_generic+0x93/0x1c0 [ 23.840445] kasan_bitops_generic+0x117/0x1c0 [ 23.840830] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 23.841209] ? __pfx_read_tsc+0x10/0x10 [ 23.841521] ? ktime_get_ts64+0x84/0x230 [ 23.841965] kunit_try_run_case+0x1b3/0x490 [ 23.842444] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.842985] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 23.843327] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.843897] ? __kthread_parkme+0x82/0x160 [ 23.844567] ? preempt_count_sub+0x50/0x80 [ 23.845085] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.845445] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.846122] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.846639] kthread+0x257/0x310 [ 23.847028] ? __pfx_kthread+0x10/0x10 [ 23.847427] ret_from_fork+0x41/0x80 [ 23.848145] ? __pfx_kthread+0x10/0x10 [ 23.848626] ret_from_fork_asm+0x1a/0x30 [ 23.849249] </TASK> [ 23.849687] [ 23.849931] Allocated by task 268: [ 23.850392] kasan_save_stack+0x3d/0x60 [ 23.851004] kasan_save_track+0x18/0x40 [ 23.851559] kasan_save_alloc_info+0x3b/0x50 [ 23.852131] __kasan_kmalloc+0xb7/0xc0 [ 23.852546] __kmalloc_cache_noprof+0x184/0x410 [ 23.853254] kasan_bitops_generic+0x93/0x1c0 [ 23.853802] kunit_try_run_case+0x1b3/0x490 [ 23.854652] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.855118] kthread+0x257/0x310 [ 23.855445] ret_from_fork+0x41/0x80 [ 23.856330] ret_from_fork_asm+0x1a/0x30 [ 23.856661] [ 23.857105] The buggy address belongs to the object at ffff8881028a7080 [ 23.857105] which belongs to the cache kmalloc-16 of size 16 [ 23.858247] The buggy address is located 8 bytes inside of [ 23.858247] allocated 9-byte region [ffff8881028a7080, ffff8881028a7089) [ 23.859097] [ 23.859334] The buggy address belongs to the physical page: [ 23.859885] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028a7 [ 23.860294] flags: 0x200000000000000(node=0|zone=2) [ 23.860835] page_type: f5(slab) [ 23.861274] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 23.862017] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 23.862804] page dumped because: kasan: bad access detected [ 23.863362] [ 23.863733] Memory state around the buggy address: [ 23.864328] ffff8881028a6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.865152] ffff8881028a7000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 23.865998] >ffff8881028a7080: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.866829] ^ [ 23.867127] ffff8881028a7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.867852] ffff8881028a7180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.868415] ================================================================== [ 23.781540] ================================================================== [ 23.782941] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23b/0xd50 [ 23.783707] Write of size 8 at addr ffff8881028a7088 by task kunit_try_catch/268 [ 23.784189] [ 23.784378] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 23.785321] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.785868] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.786538] Call Trace: [ 23.786941] <TASK> [ 23.787228] dump_stack_lvl+0x73/0xb0 [ 23.787709] print_report+0xd1/0x640 [ 23.788167] ? __virt_addr_valid+0x1db/0x2d0 [ 23.788641] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.788991] kasan_report+0x102/0x140 [ 23.789275] ? kasan_bitops_modify.constprop.0+0x23b/0xd50 [ 23.789793] ? kasan_bitops_modify.constprop.0+0x23b/0xd50 [ 23.790408] kasan_check_range+0x10c/0x1c0 [ 23.790949] __kasan_check_write+0x18/0x20 [ 23.791404] kasan_bitops_modify.constprop.0+0x23b/0xd50 [ 23.792048] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 23.792558] ? __kmalloc_cache_noprof+0x184/0x410 [ 23.792981] ? trace_hardirqs_on+0x37/0xe0 [ 23.793477] ? kasan_bitops_generic+0x93/0x1c0 [ 23.793913] kasan_bitops_generic+0x117/0x1c0 [ 23.794452] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 23.794914] ? __pfx_read_tsc+0x10/0x10 [ 23.795467] ? ktime_get_ts64+0x84/0x230 [ 23.795855] kunit_try_run_case+0x1b3/0x490 [ 23.796160] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.797546] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 23.798931] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.800182] ? __kthread_parkme+0x82/0x160 [ 23.800694] ? preempt_count_sub+0x50/0x80 [ 23.801004] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.801510] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.802353] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.803348] kthread+0x257/0x310 [ 23.803812] ? __pfx_kthread+0x10/0x10 [ 23.804662] ret_from_fork+0x41/0x80 [ 23.805271] ? __pfx_kthread+0x10/0x10 [ 23.806186] ret_from_fork_asm+0x1a/0x30 [ 23.806676] </TASK> [ 23.806920] [ 23.807092] Allocated by task 268: [ 23.807405] kasan_save_stack+0x3d/0x60 [ 23.807795] kasan_save_track+0x18/0x40 [ 23.808162] kasan_save_alloc_info+0x3b/0x50 [ 23.809718] __kasan_kmalloc+0xb7/0xc0 [ 23.810271] __kmalloc_cache_noprof+0x184/0x410 [ 23.810797] kasan_bitops_generic+0x93/0x1c0 [ 23.811149] kunit_try_run_case+0x1b3/0x490 [ 23.811799] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.812153] kthread+0x257/0x310 [ 23.812593] ret_from_fork+0x41/0x80 [ 23.812932] ret_from_fork_asm+0x1a/0x30 [ 23.813377] [ 23.813793] The buggy address belongs to the object at ffff8881028a7080 [ 23.813793] which belongs to the cache kmalloc-16 of size 16 [ 23.814733] The buggy address is located 8 bytes inside of [ 23.814733] allocated 9-byte region [ffff8881028a7080, ffff8881028a7089) [ 23.815443] [ 23.815984] The buggy address belongs to the physical page: [ 23.816508] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028a7 [ 23.818328] flags: 0x200000000000000(node=0|zone=2) [ 23.818831] page_type: f5(slab) [ 23.819284] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 23.820020] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 23.820754] page dumped because: kasan: bad access detected [ 23.821369] [ 23.821613] Memory state around the buggy address: [ 23.822297] ffff8881028a6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.823386] ffff8881028a7000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 23.823810] >ffff8881028a7080: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.824035] ^ [ 23.824167] ffff8881028a7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.824376] ffff8881028a7180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.824684] ================================================================== [ 23.741701] ================================================================== [ 23.742397] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19d/0xd50 [ 23.743715] Write of size 8 at addr ffff8881028a7088 by task kunit_try_catch/268 [ 23.744267] [ 23.744455] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 23.745374] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.745746] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.747366] Call Trace: [ 23.747714] <TASK> [ 23.747922] dump_stack_lvl+0x73/0xb0 [ 23.748215] print_report+0xd1/0x640 [ 23.748521] ? __virt_addr_valid+0x1db/0x2d0 [ 23.749040] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.749659] kasan_report+0x102/0x140 [ 23.750110] ? kasan_bitops_modify.constprop.0+0x19d/0xd50 [ 23.750733] ? kasan_bitops_modify.constprop.0+0x19d/0xd50 [ 23.751295] kasan_check_range+0x10c/0x1c0 [ 23.751824] __kasan_check_write+0x18/0x20 [ 23.752247] kasan_bitops_modify.constprop.0+0x19d/0xd50 [ 23.752745] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 23.753321] ? __kmalloc_cache_noprof+0x184/0x410 [ 23.753766] ? trace_hardirqs_on+0x37/0xe0 [ 23.754076] ? kasan_bitops_generic+0x93/0x1c0 [ 23.754399] kasan_bitops_generic+0x117/0x1c0 [ 23.754783] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 23.755350] ? __pfx_read_tsc+0x10/0x10 [ 23.755850] ? ktime_get_ts64+0x84/0x230 [ 23.756303] kunit_try_run_case+0x1b3/0x490 [ 23.756826] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.757315] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 23.757872] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.758387] ? __kthread_parkme+0x82/0x160 [ 23.758895] ? preempt_count_sub+0x50/0x80 [ 23.759312] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.759694] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.760284] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.760890] kthread+0x257/0x310 [ 23.761285] ? __pfx_kthread+0x10/0x10 [ 23.761761] ret_from_fork+0x41/0x80 [ 23.762070] ? __pfx_kthread+0x10/0x10 [ 23.762468] ret_from_fork_asm+0x1a/0x30 [ 23.762846] </TASK> [ 23.763132] [ 23.763342] Allocated by task 268: [ 23.763765] kasan_save_stack+0x3d/0x60 [ 23.764180] kasan_save_track+0x18/0x40 [ 23.764616] kasan_save_alloc_info+0x3b/0x50 [ 23.764941] __kasan_kmalloc+0xb7/0xc0 [ 23.765256] __kmalloc_cache_noprof+0x184/0x410 [ 23.765654] kasan_bitops_generic+0x93/0x1c0 [ 23.766108] kunit_try_run_case+0x1b3/0x490 [ 23.766608] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.767143] kthread+0x257/0x310 [ 23.767431] ret_from_fork+0x41/0x80 [ 23.767771] ret_from_fork_asm+0x1a/0x30 [ 23.768043] [ 23.768265] The buggy address belongs to the object at ffff8881028a7080 [ 23.768265] which belongs to the cache kmalloc-16 of size 16 [ 23.769325] The buggy address is located 8 bytes inside of [ 23.769325] allocated 9-byte region [ffff8881028a7080, ffff8881028a7089) [ 23.770287] [ 23.770478] The buggy address belongs to the physical page: [ 23.771053] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028a7 [ 23.771531] flags: 0x200000000000000(node=0|zone=2) [ 23.772009] page_type: f5(slab) [ 23.772372] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 23.773106] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 23.773542] page dumped because: kasan: bad access detected [ 23.774105] [ 23.774325] Memory state around the buggy address: [ 23.774729] ffff8881028a6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.775106] ffff8881028a7000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 23.775833] >ffff8881028a7080: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.776446] ^ [ 23.776888] ffff8881028a7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.777462] ffff8881028a7180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.780147] ================================================================== [ 23.949474] ================================================================== [ 23.951865] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ad/0xd50 [ 23.952641] Write of size 8 at addr ffff8881028a7088 by task kunit_try_catch/268 [ 23.954621] [ 23.954898] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 23.955460] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.955978] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.958285] Call Trace: [ 23.958630] <TASK> [ 23.958915] dump_stack_lvl+0x73/0xb0 [ 23.959345] print_report+0xd1/0x640 [ 23.960980] ? __virt_addr_valid+0x1db/0x2d0 [ 23.962790] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.963109] kasan_report+0x102/0x140 [ 23.963365] ? kasan_bitops_modify.constprop.0+0x4ad/0xd50 [ 23.964869] ? kasan_bitops_modify.constprop.0+0x4ad/0xd50 [ 23.965542] kasan_check_range+0x10c/0x1c0 [ 23.966425] __kasan_check_write+0x18/0x20 [ 23.966900] kasan_bitops_modify.constprop.0+0x4ad/0xd50 [ 23.967470] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 23.968150] ? __kmalloc_cache_noprof+0x184/0x410 [ 23.968506] ? trace_hardirqs_on+0x37/0xe0 [ 23.969039] ? kasan_bitops_generic+0x93/0x1c0 [ 23.969551] kasan_bitops_generic+0x117/0x1c0 [ 23.970179] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 23.970935] ? __pfx_read_tsc+0x10/0x10 [ 23.971316] ? ktime_get_ts64+0x84/0x230 [ 23.971817] kunit_try_run_case+0x1b3/0x490 [ 23.972263] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.972789] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 23.973107] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.973426] ? __kthread_parkme+0x82/0x160 [ 23.973799] ? preempt_count_sub+0x50/0x80 [ 23.974276] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.975168] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.975902] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.976545] kthread+0x257/0x310 [ 23.976917] ? __pfx_kthread+0x10/0x10 [ 23.977275] ret_from_fork+0x41/0x80 [ 23.977651] ? __pfx_kthread+0x10/0x10 [ 23.978066] ret_from_fork_asm+0x1a/0x30 [ 23.978633] </TASK> [ 23.978862] [ 23.979018] Allocated by task 268: [ 23.979241] kasan_save_stack+0x3d/0x60 [ 23.979755] kasan_save_track+0x18/0x40 [ 23.980200] kasan_save_alloc_info+0x3b/0x50 [ 23.980723] __kasan_kmalloc+0xb7/0xc0 [ 23.981180] __kmalloc_cache_noprof+0x184/0x410 [ 23.981512] kasan_bitops_generic+0x93/0x1c0 [ 23.982062] kunit_try_run_case+0x1b3/0x490 [ 23.982559] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.983018] kthread+0x257/0x310 [ 23.983399] ret_from_fork+0x41/0x80 [ 23.983830] ret_from_fork_asm+0x1a/0x30 [ 23.984297] [ 23.984534] The buggy address belongs to the object at ffff8881028a7080 [ 23.984534] which belongs to the cache kmalloc-16 of size 16 [ 23.985364] The buggy address is located 8 bytes inside of [ 23.985364] allocated 9-byte region [ffff8881028a7080, ffff8881028a7089) [ 23.986263] [ 23.986431] The buggy address belongs to the physical page: [ 23.986797] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028a7 [ 23.987450] flags: 0x200000000000000(node=0|zone=2) [ 23.988011] page_type: f5(slab) [ 23.988408] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 23.989156] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 23.989845] page dumped because: kasan: bad access detected [ 23.990164] [ 23.990318] Memory state around the buggy address: [ 23.990725] ffff8881028a6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.991364] ffff8881028a7000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 23.992126] >ffff8881028a7080: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.992827] ^ [ 23.993207] ffff8881028a7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.994161] ffff8881028a7180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.995375] ================================================================== [ 23.913030] ================================================================== [ 23.913850] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40f/0xd50 [ 23.914693] Write of size 8 at addr ffff8881028a7088 by task kunit_try_catch/268 [ 23.915175] [ 23.915364] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 23.916307] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.916784] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.917620] Call Trace: [ 23.917916] <TASK> [ 23.918129] dump_stack_lvl+0x73/0xb0 [ 23.918419] print_report+0xd1/0x640 [ 23.918880] ? __virt_addr_valid+0x1db/0x2d0 [ 23.919505] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.920093] kasan_report+0x102/0x140 [ 23.920577] ? kasan_bitops_modify.constprop.0+0x40f/0xd50 [ 23.921198] ? kasan_bitops_modify.constprop.0+0x40f/0xd50 [ 23.921648] kasan_check_range+0x10c/0x1c0 [ 23.922153] __kasan_check_write+0x18/0x20 [ 23.922593] kasan_bitops_modify.constprop.0+0x40f/0xd50 [ 23.923107] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 23.923466] ? __kmalloc_cache_noprof+0x184/0x410 [ 23.923978] ? trace_hardirqs_on+0x37/0xe0 [ 23.924610] ? kasan_bitops_generic+0x93/0x1c0 [ 23.925111] kasan_bitops_generic+0x117/0x1c0 [ 23.925503] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 23.926050] ? __pfx_read_tsc+0x10/0x10 [ 23.926441] ? ktime_get_ts64+0x84/0x230 [ 23.927011] kunit_try_run_case+0x1b3/0x490 [ 23.927354] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.927939] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 23.928308] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.928883] ? __kthread_parkme+0x82/0x160 [ 23.929272] ? preempt_count_sub+0x50/0x80 [ 23.929595] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.929902] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.930281] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.930751] kthread+0x257/0x310 [ 23.931144] ? __pfx_kthread+0x10/0x10 [ 23.931588] ret_from_fork+0x41/0x80 [ 23.932121] ? __pfx_kthread+0x10/0x10 [ 23.932582] ret_from_fork_asm+0x1a/0x30 [ 23.933072] </TASK> [ 23.933346] [ 23.933621] Allocated by task 268: [ 23.933984] kasan_save_stack+0x3d/0x60 [ 23.934415] kasan_save_track+0x18/0x40 [ 23.934987] kasan_save_alloc_info+0x3b/0x50 [ 23.935386] __kasan_kmalloc+0xb7/0xc0 [ 23.935782] __kmalloc_cache_noprof+0x184/0x410 [ 23.936276] kasan_bitops_generic+0x93/0x1c0 [ 23.936603] kunit_try_run_case+0x1b3/0x490 [ 23.937090] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.937447] kthread+0x257/0x310 [ 23.937903] ret_from_fork+0x41/0x80 [ 23.938339] ret_from_fork_asm+0x1a/0x30 [ 23.938851] [ 23.939049] The buggy address belongs to the object at ffff8881028a7080 [ 23.939049] which belongs to the cache kmalloc-16 of size 16 [ 23.939638] The buggy address is located 8 bytes inside of [ 23.939638] allocated 9-byte region [ffff8881028a7080, ffff8881028a7089) [ 23.940705] [ 23.940966] The buggy address belongs to the physical page: [ 23.941659] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028a7 [ 23.942172] flags: 0x200000000000000(node=0|zone=2) [ 23.942503] page_type: f5(slab) [ 23.942727] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 23.943073] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 23.943411] page dumped because: kasan: bad access detected [ 23.943702] [ 23.943840] Memory state around the buggy address: [ 23.944083] ffff8881028a6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.944422] ffff8881028a7000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 23.944814] >ffff8881028a7080: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.945306] ^ [ 23.945706] ffff8881028a7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.946388] ffff8881028a7180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.947131] ================================================================== [ 23.997453] ================================================================== [ 23.999276] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x548/0xd50 [ 24.000690] Write of size 8 at addr ffff8881028a7088 by task kunit_try_catch/268 [ 24.001310] [ 24.001536] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 24.002053] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.002443] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.003330] Call Trace: [ 24.004403] <TASK> [ 24.004661] dump_stack_lvl+0x73/0xb0 [ 24.004949] print_report+0xd1/0x640 [ 24.005226] ? __virt_addr_valid+0x1db/0x2d0 [ 24.005727] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.006236] kasan_report+0x102/0x140 [ 24.007725] ? kasan_bitops_modify.constprop.0+0x548/0xd50 [ 24.008278] ? kasan_bitops_modify.constprop.0+0x548/0xd50 [ 24.009023] kasan_check_range+0x10c/0x1c0 [ 24.009427] __kasan_check_write+0x18/0x20 [ 24.010095] kasan_bitops_modify.constprop.0+0x548/0xd50 [ 24.010785] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 24.011439] ? __kmalloc_cache_noprof+0x184/0x410 [ 24.011824] ? trace_hardirqs_on+0x37/0xe0 [ 24.012257] ? kasan_bitops_generic+0x93/0x1c0 [ 24.012805] kasan_bitops_generic+0x117/0x1c0 [ 24.013431] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 24.014117] ? __pfx_read_tsc+0x10/0x10 [ 24.014655] ? ktime_get_ts64+0x84/0x230 [ 24.015253] kunit_try_run_case+0x1b3/0x490 [ 24.015901] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.016455] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 24.016894] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.017321] ? __kthread_parkme+0x82/0x160 [ 24.017810] ? preempt_count_sub+0x50/0x80 [ 24.018202] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.018732] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.019293] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.019825] kthread+0x257/0x310 [ 24.020327] ? __pfx_kthread+0x10/0x10 [ 24.020901] ret_from_fork+0x41/0x80 [ 24.021403] ? __pfx_kthread+0x10/0x10 [ 24.021867] ret_from_fork_asm+0x1a/0x30 [ 24.022425] </TASK> [ 24.022758] [ 24.022917] Allocated by task 268: [ 24.023191] kasan_save_stack+0x3d/0x60 [ 24.023797] kasan_save_track+0x18/0x40 [ 24.024256] kasan_save_alloc_info+0x3b/0x50 [ 24.024844] __kasan_kmalloc+0xb7/0xc0 [ 24.025296] __kmalloc_cache_noprof+0x184/0x410 [ 24.025907] kasan_bitops_generic+0x93/0x1c0 [ 24.026306] kunit_try_run_case+0x1b3/0x490 [ 24.026843] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.027409] kthread+0x257/0x310 [ 24.027858] ret_from_fork+0x41/0x80 [ 24.028347] ret_from_fork_asm+0x1a/0x30 [ 24.028815] [ 24.029071] The buggy address belongs to the object at ffff8881028a7080 [ 24.029071] which belongs to the cache kmalloc-16 of size 16 [ 24.029832] The buggy address is located 8 bytes inside of [ 24.029832] allocated 9-byte region [ffff8881028a7080, ffff8881028a7089) [ 24.030870] [ 24.031177] The buggy address belongs to the physical page: [ 24.031733] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028a7 [ 24.032399] flags: 0x200000000000000(node=0|zone=2) [ 24.032925] page_type: f5(slab) [ 24.033273] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 24.034008] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 24.034846] page dumped because: kasan: bad access detected [ 24.035390] [ 24.035751] Memory state around the buggy address: [ 24.036073] ffff8881028a6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.036446] ffff8881028a7000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.037229] >ffff8881028a7080: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.037922] ^ [ 24.038313] ffff8881028a7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.038973] ffff8881028a7180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.040665] ==================================================================