Date
Nov. 26, 2024, 6:09 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 35.170250] ================================================================== [ 35.171046] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc8 [ 35.171793] Write of size 8 at addr fff00000c57c32c8 by task kunit_try_catch/250 [ 35.172773] [ 35.173244] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 35.174478] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.175135] Hardware name: linux,dummy-virt (DT) [ 35.175726] Call trace: [ 35.176210] show_stack+0x20/0x38 (C) [ 35.176746] dump_stack_lvl+0x8c/0xd0 [ 35.177300] print_report+0x118/0x5e0 [ 35.177890] kasan_report+0xc8/0x118 [ 35.178413] kasan_check_range+0x100/0x1a8 [ 35.179169] __kasan_check_write+0x20/0x30 [ 35.179930] kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc8 [ 35.180829] kasan_bitops_generic+0x11c/0x1c8 [ 35.181532] kunit_try_run_case+0x14c/0x3d0 [ 35.182132] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.182988] kthread+0x24c/0x2d0 [ 35.183634] ret_from_fork+0x10/0x20 [ 35.184291] [ 35.184699] Allocated by task 250: [ 35.185315] kasan_save_stack+0x3c/0x68 [ 35.185834] kasan_save_track+0x20/0x40 [ 35.186492] kasan_save_alloc_info+0x40/0x58 [ 35.187163] __kasan_kmalloc+0xd4/0xd8 [ 35.187855] __kmalloc_cache_noprof+0x15c/0x3c8 [ 35.188549] kasan_bitops_generic+0xa0/0x1c8 [ 35.189275] kunit_try_run_case+0x14c/0x3d0 [ 35.189992] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.190680] kthread+0x24c/0x2d0 [ 35.191288] ret_from_fork+0x10/0x20 [ 35.191850] [ 35.192249] The buggy address belongs to the object at fff00000c57c32c0 [ 35.192249] which belongs to the cache kmalloc-16 of size 16 [ 35.193554] The buggy address is located 8 bytes inside of [ 35.193554] allocated 9-byte region [fff00000c57c32c0, fff00000c57c32c9) [ 35.194776] [ 35.195201] The buggy address belongs to the physical page: [ 35.196027] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057c3 [ 35.196882] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.197790] page_type: f5(slab) [ 35.198423] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 35.199351] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 35.200146] page dumped because: kasan: bad access detected [ 35.200940] [ 35.201338] Memory state around the buggy address: [ 35.201996] fff00000c57c3180: fa fb fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 35.202792] fff00000c57c3200: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 35.203711] >fff00000c57c3280: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 35.204422] ^ [ 35.205589] fff00000c57c3300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.206501] fff00000c57c3380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.207345] ================================================================== [ 35.249838] ================================================================== [ 35.250615] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc8 [ 35.251073] Write of size 8 at addr fff00000c57c32c8 by task kunit_try_catch/250 [ 35.251438] [ 35.251614] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 35.252985] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.253988] Hardware name: linux,dummy-virt (DT) [ 35.254804] Call trace: [ 35.255236] show_stack+0x20/0x38 (C) [ 35.255995] dump_stack_lvl+0x8c/0xd0 [ 35.256619] print_report+0x118/0x5e0 [ 35.257270] kasan_report+0xc8/0x118 [ 35.257888] kasan_check_range+0x100/0x1a8 [ 35.258582] __kasan_check_write+0x20/0x30 [ 35.259248] kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc8 [ 35.260096] kasan_bitops_generic+0x11c/0x1c8 [ 35.260726] kunit_try_run_case+0x14c/0x3d0 [ 35.261426] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.262222] kthread+0x24c/0x2d0 [ 35.262811] ret_from_fork+0x10/0x20 [ 35.263457] [ 35.263811] Allocated by task 250: [ 35.264428] kasan_save_stack+0x3c/0x68 [ 35.265016] kasan_save_track+0x20/0x40 [ 35.265714] kasan_save_alloc_info+0x40/0x58 [ 35.266331] __kasan_kmalloc+0xd4/0xd8 [ 35.267005] __kmalloc_cache_noprof+0x15c/0x3c8 [ 35.267653] kasan_bitops_generic+0xa0/0x1c8 [ 35.268362] kunit_try_run_case+0x14c/0x3d0 [ 35.268973] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.269772] kthread+0x24c/0x2d0 [ 35.270233] ret_from_fork+0x10/0x20 [ 35.270839] [ 35.271258] The buggy address belongs to the object at fff00000c57c32c0 [ 35.271258] which belongs to the cache kmalloc-16 of size 16 [ 35.273015] The buggy address is located 8 bytes inside of [ 35.273015] allocated 9-byte region [fff00000c57c32c0, fff00000c57c32c9) [ 35.274303] [ 35.274710] The buggy address belongs to the physical page: [ 35.275399] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057c3 [ 35.276442] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.277268] page_type: f5(slab) [ 35.277804] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 35.278735] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 35.279609] page dumped because: kasan: bad access detected [ 35.280300] [ 35.280672] Memory state around the buggy address: [ 35.281419] fff00000c57c3180: fa fb fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 35.282257] fff00000c57c3200: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 35.283048] >fff00000c57c3280: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 35.283937] ^ [ 35.284615] fff00000c57c3300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.285572] fff00000c57c3380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.286487] ================================================================== [ 35.123622] ================================================================== [ 35.125242] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa08/0xbc8 [ 35.126547] Read of size 8 at addr fff00000c57c32c8 by task kunit_try_catch/250 [ 35.127814] [ 35.128308] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 35.129613] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.130477] Hardware name: linux,dummy-virt (DT) [ 35.131322] Call trace: [ 35.131973] show_stack+0x20/0x38 (C) [ 35.132784] dump_stack_lvl+0x8c/0xd0 [ 35.133683] print_report+0x118/0x5e0 [ 35.134256] kasan_report+0xc8/0x118 [ 35.134865] __asan_report_load8_noabort+0x20/0x30 [ 35.136013] kasan_bitops_test_and_modify.constprop.0+0xa08/0xbc8 [ 35.137074] kasan_bitops_generic+0x11c/0x1c8 [ 35.137896] kunit_try_run_case+0x14c/0x3d0 [ 35.138730] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.139665] kthread+0x24c/0x2d0 [ 35.141079] ret_from_fork+0x10/0x20 [ 35.141378] [ 35.141538] Allocated by task 250: [ 35.141767] kasan_save_stack+0x3c/0x68 [ 35.142821] kasan_save_track+0x20/0x40 [ 35.143543] kasan_save_alloc_info+0x40/0x58 [ 35.144256] __kasan_kmalloc+0xd4/0xd8 [ 35.144832] __kmalloc_cache_noprof+0x15c/0x3c8 [ 35.145652] kasan_bitops_generic+0xa0/0x1c8 [ 35.146390] kunit_try_run_case+0x14c/0x3d0 [ 35.147171] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.147849] kthread+0x24c/0x2d0 [ 35.148475] ret_from_fork+0x10/0x20 [ 35.149065] [ 35.149726] The buggy address belongs to the object at fff00000c57c32c0 [ 35.149726] which belongs to the cache kmalloc-16 of size 16 [ 35.152128] The buggy address is located 8 bytes inside of [ 35.152128] allocated 9-byte region [fff00000c57c32c0, fff00000c57c32c9) [ 35.153555] [ 35.153938] The buggy address belongs to the physical page: [ 35.154672] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057c3 [ 35.155707] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.157048] page_type: f5(slab) [ 35.157474] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 35.158173] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 35.158968] page dumped because: kasan: bad access detected [ 35.159582] [ 35.159973] Memory state around the buggy address: [ 35.160867] fff00000c57c3180: fa fb fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 35.161684] fff00000c57c3200: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 35.162422] >fff00000c57c3280: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 35.163582] ^ [ 35.164751] fff00000c57c3300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.165895] fff00000c57c3380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.166702] ================================================================== [ 35.328505] ================================================================== [ 35.329341] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x334/0xbc8 [ 35.330432] Write of size 8 at addr fff00000c57c32c8 by task kunit_try_catch/250 [ 35.331372] [ 35.331788] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 35.333113] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.333845] Hardware name: linux,dummy-virt (DT) [ 35.334541] Call trace: [ 35.335099] show_stack+0x20/0x38 (C) [ 35.335832] dump_stack_lvl+0x8c/0xd0 [ 35.336537] print_report+0x118/0x5e0 [ 35.337220] kasan_report+0xc8/0x118 [ 35.337950] kasan_check_range+0x100/0x1a8 [ 35.338683] __kasan_check_write+0x20/0x30 [ 35.339421] kasan_bitops_test_and_modify.constprop.0+0x334/0xbc8 [ 35.340364] kasan_bitops_generic+0x11c/0x1c8 [ 35.341117] kunit_try_run_case+0x14c/0x3d0 [ 35.341885] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.342610] kthread+0x24c/0x2d0 [ 35.343199] ret_from_fork+0x10/0x20 [ 35.343879] [ 35.344309] Allocated by task 250: [ 35.344790] kasan_save_stack+0x3c/0x68 [ 35.345547] kasan_save_track+0x20/0x40 [ 35.346160] kasan_save_alloc_info+0x40/0x58 [ 35.346792] __kasan_kmalloc+0xd4/0xd8 [ 35.347457] __kmalloc_cache_noprof+0x15c/0x3c8 [ 35.348080] kasan_bitops_generic+0xa0/0x1c8 [ 35.348781] kunit_try_run_case+0x14c/0x3d0 [ 35.349417] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.350197] kthread+0x24c/0x2d0 [ 35.350712] ret_from_fork+0x10/0x20 [ 35.351365] [ 35.351748] The buggy address belongs to the object at fff00000c57c32c0 [ 35.351748] which belongs to the cache kmalloc-16 of size 16 [ 35.352978] The buggy address is located 8 bytes inside of [ 35.352978] allocated 9-byte region [fff00000c57c32c0, fff00000c57c32c9) [ 35.354270] [ 35.354724] The buggy address belongs to the physical page: [ 35.355335] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057c3 [ 35.356380] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.357147] page_type: f5(slab) [ 35.357756] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 35.358662] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 35.359564] page dumped because: kasan: bad access detected [ 35.360265] [ 35.360612] Memory state around the buggy address: [ 35.361310] fff00000c57c3180: fa fb fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 35.362185] fff00000c57c3200: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 35.363072] >fff00000c57c3280: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 35.363894] ^ [ 35.364589] fff00000c57c3300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.365509] fff00000c57c3380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.366291] ================================================================== [ 35.209318] ================================================================== [ 35.211180] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa50/0xbc8 [ 35.212063] Read of size 8 at addr fff00000c57c32c8 by task kunit_try_catch/250 [ 35.213133] [ 35.213545] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 35.214652] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.215229] Hardware name: linux,dummy-virt (DT) [ 35.215851] Call trace: [ 35.216315] show_stack+0x20/0x38 (C) [ 35.216989] dump_stack_lvl+0x8c/0xd0 [ 35.217620] print_report+0x118/0x5e0 [ 35.218235] kasan_report+0xc8/0x118 [ 35.218760] __asan_report_load8_noabort+0x20/0x30 [ 35.219468] kasan_bitops_test_and_modify.constprop.0+0xa50/0xbc8 [ 35.220291] kasan_bitops_generic+0x11c/0x1c8 [ 35.221117] kunit_try_run_case+0x14c/0x3d0 [ 35.221713] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.222443] kthread+0x24c/0x2d0 [ 35.223100] ret_from_fork+0x10/0x20 [ 35.223725] [ 35.224133] Allocated by task 250: [ 35.224746] kasan_save_stack+0x3c/0x68 [ 35.225416] kasan_save_track+0x20/0x40 [ 35.226080] kasan_save_alloc_info+0x40/0x58 [ 35.226698] __kasan_kmalloc+0xd4/0xd8 [ 35.227339] __kmalloc_cache_noprof+0x15c/0x3c8 [ 35.228025] kasan_bitops_generic+0xa0/0x1c8 [ 35.228736] kunit_try_run_case+0x14c/0x3d0 [ 35.229339] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.230164] kthread+0x24c/0x2d0 [ 35.230676] ret_from_fork+0x10/0x20 [ 35.231334] [ 35.231714] The buggy address belongs to the object at fff00000c57c32c0 [ 35.231714] which belongs to the cache kmalloc-16 of size 16 [ 35.233035] The buggy address is located 8 bytes inside of [ 35.233035] allocated 9-byte region [fff00000c57c32c0, fff00000c57c32c9) [ 35.234302] [ 35.234722] The buggy address belongs to the physical page: [ 35.235542] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057c3 [ 35.236453] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.237248] page_type: f5(slab) [ 35.237843] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 35.238736] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 35.239624] page dumped because: kasan: bad access detected [ 35.240314] [ 35.240701] Memory state around the buggy address: [ 35.241395] fff00000c57c3180: fa fb fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 35.242265] fff00000c57c3200: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 35.243164] >fff00000c57c3280: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 35.243988] ^ [ 35.244674] fff00000c57c3300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.245589] fff00000c57c3380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.246433] ================================================================== [ 35.405682] ================================================================== [ 35.406535] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa8c/0xbc8 [ 35.407812] Read of size 8 at addr fff00000c57c32c8 by task kunit_try_catch/250 [ 35.408559] [ 35.409027] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 35.410195] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.410783] Hardware name: linux,dummy-virt (DT) [ 35.411370] Call trace: [ 35.411867] show_stack+0x20/0x38 (C) [ 35.412500] dump_stack_lvl+0x8c/0xd0 [ 35.413099] print_report+0x118/0x5e0 [ 35.413794] kasan_report+0xc8/0x118 [ 35.414431] __asan_report_load8_noabort+0x20/0x30 [ 35.415117] kasan_bitops_test_and_modify.constprop.0+0xa8c/0xbc8 [ 35.416039] kasan_bitops_generic+0x11c/0x1c8 [ 35.416696] kunit_try_run_case+0x14c/0x3d0 [ 35.417362] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.418253] kthread+0x24c/0x2d0 [ 35.418751] ret_from_fork+0x10/0x20 [ 35.419425] [ 35.420088] Allocated by task 250: [ 35.420758] kasan_save_stack+0x3c/0x68 [ 35.421292] kasan_save_track+0x20/0x40 [ 35.421843] kasan_save_alloc_info+0x40/0x58 [ 35.422577] __kasan_kmalloc+0xd4/0xd8 [ 35.423084] __kmalloc_cache_noprof+0x15c/0x3c8 [ 35.423700] kasan_bitops_generic+0xa0/0x1c8 [ 35.424292] kunit_try_run_case+0x14c/0x3d0 [ 35.424832] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.425655] kthread+0x24c/0x2d0 [ 35.426233] ret_from_fork+0x10/0x20 [ 35.426741] [ 35.427126] The buggy address belongs to the object at fff00000c57c32c0 [ 35.427126] which belongs to the cache kmalloc-16 of size 16 [ 35.428339] The buggy address is located 8 bytes inside of [ 35.428339] allocated 9-byte region [fff00000c57c32c0, fff00000c57c32c9) [ 35.429359] [ 35.429731] The buggy address belongs to the physical page: [ 35.430480] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057c3 [ 35.431337] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.432115] page_type: f5(slab) [ 35.432673] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 35.433551] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 35.434518] page dumped because: kasan: bad access detected [ 35.435206] [ 35.435576] Memory state around the buggy address: [ 35.436246] fff00000c57c3180: fa fb fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 35.437056] fff00000c57c3200: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 35.437935] >fff00000c57c3280: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 35.438708] ^ [ 35.439297] fff00000c57c3300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.440214] fff00000c57c3380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.440989] ================================================================== [ 35.368052] ================================================================== [ 35.368924] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa44/0xbc8 [ 35.370017] Read of size 8 at addr fff00000c57c32c8 by task kunit_try_catch/250 [ 35.370993] [ 35.371427] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 35.372425] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.373112] Hardware name: linux,dummy-virt (DT) [ 35.373726] Call trace: [ 35.374276] show_stack+0x20/0x38 (C) [ 35.374945] dump_stack_lvl+0x8c/0xd0 [ 35.375663] print_report+0x118/0x5e0 [ 35.376286] kasan_report+0xc8/0x118 [ 35.376971] __asan_report_load8_noabort+0x20/0x30 [ 35.377602] kasan_bitops_test_and_modify.constprop.0+0xa44/0xbc8 [ 35.378502] kasan_bitops_generic+0x11c/0x1c8 [ 35.379130] kunit_try_run_case+0x14c/0x3d0 [ 35.379850] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.380600] kthread+0x24c/0x2d0 [ 35.381186] ret_from_fork+0x10/0x20 [ 35.381820] [ 35.382255] Allocated by task 250: [ 35.382838] kasan_save_stack+0x3c/0x68 [ 35.383472] kasan_save_track+0x20/0x40 [ 35.384142] kasan_save_alloc_info+0x40/0x58 [ 35.384777] __kasan_kmalloc+0xd4/0xd8 [ 35.385487] __kmalloc_cache_noprof+0x15c/0x3c8 [ 35.386120] kasan_bitops_generic+0xa0/0x1c8 [ 35.386798] kunit_try_run_case+0x14c/0x3d0 [ 35.387441] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.388212] kthread+0x24c/0x2d0 [ 35.388764] ret_from_fork+0x10/0x20 [ 35.389320] [ 35.389729] The buggy address belongs to the object at fff00000c57c32c0 [ 35.389729] which belongs to the cache kmalloc-16 of size 16 [ 35.390955] The buggy address is located 8 bytes inside of [ 35.390955] allocated 9-byte region [fff00000c57c32c0, fff00000c57c32c9) [ 35.392220] [ 35.392621] The buggy address belongs to the physical page: [ 35.393272] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057c3 [ 35.394226] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.395097] page_type: f5(slab) [ 35.395676] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 35.396541] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 35.397427] page dumped because: kasan: bad access detected [ 35.398144] [ 35.398526] Memory state around the buggy address: [ 35.399107] fff00000c57c3180: fa fb fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 35.400025] fff00000c57c3200: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 35.400874] >fff00000c57c3280: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 35.401706] ^ [ 35.402421] fff00000c57c3300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.403281] fff00000c57c3380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.404107] ================================================================== [ 35.289086] ================================================================== [ 35.289795] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xad4/0xbc8 [ 35.290751] Read of size 8 at addr fff00000c57c32c8 by task kunit_try_catch/250 [ 35.291423] [ 35.291871] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 35.293139] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.293733] Hardware name: linux,dummy-virt (DT) [ 35.294422] Call trace: [ 35.294941] show_stack+0x20/0x38 (C) [ 35.295534] dump_stack_lvl+0x8c/0xd0 [ 35.296233] print_report+0x118/0x5e0 [ 35.296865] kasan_report+0xc8/0x118 [ 35.297558] __asan_report_load8_noabort+0x20/0x30 [ 35.298252] kasan_bitops_test_and_modify.constprop.0+0xad4/0xbc8 [ 35.299120] kasan_bitops_generic+0x11c/0x1c8 [ 35.299822] kunit_try_run_case+0x14c/0x3d0 [ 35.300465] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.301285] kthread+0x24c/0x2d0 [ 35.301863] ret_from_fork+0x10/0x20 [ 35.302506] [ 35.302931] Allocated by task 250: [ 35.303439] kasan_save_stack+0x3c/0x68 [ 35.304069] kasan_save_track+0x20/0x40 [ 35.304729] kasan_save_alloc_info+0x40/0x58 [ 35.305408] __kasan_kmalloc+0xd4/0xd8 [ 35.306075] __kmalloc_cache_noprof+0x15c/0x3c8 [ 35.306685] kasan_bitops_generic+0xa0/0x1c8 [ 35.307390] kunit_try_run_case+0x14c/0x3d0 [ 35.308004] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.308815] kthread+0x24c/0x2d0 [ 35.309337] ret_from_fork+0x10/0x20 [ 35.309987] [ 35.310363] The buggy address belongs to the object at fff00000c57c32c0 [ 35.310363] which belongs to the cache kmalloc-16 of size 16 [ 35.311693] The buggy address is located 8 bytes inside of [ 35.311693] allocated 9-byte region [fff00000c57c32c0, fff00000c57c32c9) [ 35.312946] [ 35.313327] The buggy address belongs to the physical page: [ 35.313990] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057c3 [ 35.315046] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.315924] page_type: f5(slab) [ 35.316406] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 35.317500] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 35.318355] page dumped because: kasan: bad access detected [ 35.319049] [ 35.319455] Memory state around the buggy address: [ 35.320097] fff00000c57c3180: fa fb fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 35.320857] fff00000c57c3200: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 35.321779] >fff00000c57c3280: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 35.322617] ^ [ 35.323311] fff00000c57c3300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.324175] fff00000c57c3380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.325012] ================================================================== [ 35.081189] ================================================================== [ 35.081783] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc8 [ 35.082519] Write of size 8 at addr fff00000c57c32c8 by task kunit_try_catch/250 [ 35.083471] [ 35.083878] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 35.086078] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.086766] Hardware name: linux,dummy-virt (DT) [ 35.087519] Call trace: [ 35.087990] show_stack+0x20/0x38 (C) [ 35.088884] dump_stack_lvl+0x8c/0xd0 [ 35.089755] print_report+0x118/0x5e0 [ 35.090327] kasan_report+0xc8/0x118 [ 35.091029] kasan_check_range+0x100/0x1a8 [ 35.091607] __kasan_check_write+0x20/0x30 [ 35.092279] kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc8 [ 35.093581] kasan_bitops_generic+0x11c/0x1c8 [ 35.094050] kunit_try_run_case+0x14c/0x3d0 [ 35.094611] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.095283] kthread+0x24c/0x2d0 [ 35.095875] ret_from_fork+0x10/0x20 [ 35.096815] [ 35.097206] Allocated by task 250: [ 35.097795] kasan_save_stack+0x3c/0x68 [ 35.098294] kasan_save_track+0x20/0x40 [ 35.098763] kasan_save_alloc_info+0x40/0x58 [ 35.099449] __kasan_kmalloc+0xd4/0xd8 [ 35.100072] __kmalloc_cache_noprof+0x15c/0x3c8 [ 35.100756] kasan_bitops_generic+0xa0/0x1c8 [ 35.101436] kunit_try_run_case+0x14c/0x3d0 [ 35.102031] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.103798] kthread+0x24c/0x2d0 [ 35.104516] ret_from_fork+0x10/0x20 [ 35.105088] [ 35.105368] The buggy address belongs to the object at fff00000c57c32c0 [ 35.105368] which belongs to the cache kmalloc-16 of size 16 [ 35.106427] The buggy address is located 8 bytes inside of [ 35.106427] allocated 9-byte region [fff00000c57c32c0, fff00000c57c32c9) [ 35.107879] [ 35.108335] The buggy address belongs to the physical page: [ 35.109445] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057c3 [ 35.110586] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.111533] page_type: f5(slab) [ 35.112217] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 35.113715] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 35.114470] page dumped because: kasan: bad access detected [ 35.115437] [ 35.115966] Memory state around the buggy address: [ 35.117023] fff00000c57c3180: fa fb fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 35.117820] fff00000c57c3200: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 35.118406] >fff00000c57c3280: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 35.119216] ^ [ 35.120051] fff00000c57c3300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.121376] fff00000c57c3380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.121931] ==================================================================
[ 35.117252] ================================================================== [ 35.117975] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc8 [ 35.119403] Write of size 8 at addr fff00000c5e082a8 by task kunit_try_catch/250 [ 35.120657] [ 35.121083] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 35.122163] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.122435] Hardware name: linux,dummy-virt (DT) [ 35.122914] Call trace: [ 35.123431] show_stack+0x20/0x38 (C) [ 35.124201] dump_stack_lvl+0x8c/0xd0 [ 35.124959] print_report+0x118/0x5e0 [ 35.125681] kasan_report+0xc8/0x118 [ 35.126351] kasan_check_range+0x100/0x1a8 [ 35.127190] __kasan_check_write+0x20/0x30 [ 35.128067] kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc8 [ 35.128888] kasan_bitops_generic+0x11c/0x1c8 [ 35.129762] kunit_try_run_case+0x14c/0x3d0 [ 35.130598] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.131298] kthread+0x24c/0x2d0 [ 35.131877] ret_from_fork+0x10/0x20 [ 35.132601] [ 35.132906] Allocated by task 250: [ 35.133385] kasan_save_stack+0x3c/0x68 [ 35.134053] kasan_save_track+0x20/0x40 [ 35.134706] kasan_save_alloc_info+0x40/0x58 [ 35.135357] __kasan_kmalloc+0xd4/0xd8 [ 35.135909] __kmalloc_cache_noprof+0x15c/0x3c8 [ 35.136579] kasan_bitops_generic+0xa0/0x1c8 [ 35.137198] kunit_try_run_case+0x14c/0x3d0 [ 35.137823] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.138571] kthread+0x24c/0x2d0 [ 35.139125] ret_from_fork+0x10/0x20 [ 35.139787] [ 35.140175] The buggy address belongs to the object at fff00000c5e082a0 [ 35.140175] which belongs to the cache kmalloc-16 of size 16 [ 35.141170] The buggy address is located 8 bytes inside of [ 35.141170] allocated 9-byte region [fff00000c5e082a0, fff00000c5e082a9) [ 35.142489] [ 35.142893] The buggy address belongs to the physical page: [ 35.143638] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e08 [ 35.144615] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.145295] page_type: f5(slab) [ 35.145888] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 35.146785] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 35.147751] page dumped because: kasan: bad access detected [ 35.148394] [ 35.148791] Memory state around the buggy address: [ 35.149454] fff00000c5e08180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 35.150307] fff00000c5e08200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 35.151222] >fff00000c5e08280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 35.152097] ^ [ 35.152806] fff00000c5e08300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.153611] fff00000c5e08380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.154386] ================================================================== [ 35.238410] ================================================================== [ 35.239196] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa50/0xbc8 [ 35.240159] Read of size 8 at addr fff00000c5e082a8 by task kunit_try_catch/250 [ 35.241021] [ 35.241410] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 35.242632] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.243262] Hardware name: linux,dummy-virt (DT) [ 35.243961] Call trace: [ 35.244341] show_stack+0x20/0x38 (C) [ 35.245069] dump_stack_lvl+0x8c/0xd0 [ 35.245720] print_report+0x118/0x5e0 [ 35.246400] kasan_report+0xc8/0x118 [ 35.246991] __asan_report_load8_noabort+0x20/0x30 [ 35.247791] kasan_bitops_test_and_modify.constprop.0+0xa50/0xbc8 [ 35.248758] kasan_bitops_generic+0x11c/0x1c8 [ 35.249508] kunit_try_run_case+0x14c/0x3d0 [ 35.250110] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.250985] kthread+0x24c/0x2d0 [ 35.251560] ret_from_fork+0x10/0x20 [ 35.252223] [ 35.252625] Allocated by task 250: [ 35.253240] kasan_save_stack+0x3c/0x68 [ 35.253869] kasan_save_track+0x20/0x40 [ 35.254510] kasan_save_alloc_info+0x40/0x58 [ 35.255251] __kasan_kmalloc+0xd4/0xd8 [ 35.255857] __kmalloc_cache_noprof+0x15c/0x3c8 [ 35.256618] kasan_bitops_generic+0xa0/0x1c8 [ 35.257229] kunit_try_run_case+0x14c/0x3d0 [ 35.257959] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.258658] kthread+0x24c/0x2d0 [ 35.259268] ret_from_fork+0x10/0x20 [ 35.259877] [ 35.260298] The buggy address belongs to the object at fff00000c5e082a0 [ 35.260298] which belongs to the cache kmalloc-16 of size 16 [ 35.261509] The buggy address is located 8 bytes inside of [ 35.261509] allocated 9-byte region [fff00000c5e082a0, fff00000c5e082a9) [ 35.262849] [ 35.263271] The buggy address belongs to the physical page: [ 35.264011] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e08 [ 35.265032] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.265928] page_type: f5(slab) [ 35.266484] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 35.267638] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 35.268479] page dumped because: kasan: bad access detected [ 35.269248] [ 35.269678] Memory state around the buggy address: [ 35.270303] fff00000c5e08180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 35.271161] fff00000c5e08200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 35.272042] >fff00000c5e08280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 35.272962] ^ [ 35.273564] fff00000c5e08300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.274447] fff00000c5e08380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.275328] ================================================================== [ 35.428598] ================================================================== [ 35.429350] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa8c/0xbc8 [ 35.430397] Read of size 8 at addr fff00000c5e082a8 by task kunit_try_catch/250 [ 35.431698] [ 35.432058] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 35.433100] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.434165] Hardware name: linux,dummy-virt (DT) [ 35.434821] Call trace: [ 35.435194] show_stack+0x20/0x38 (C) [ 35.435848] dump_stack_lvl+0x8c/0xd0 [ 35.436435] print_report+0x118/0x5e0 [ 35.437406] kasan_report+0xc8/0x118 [ 35.437928] __asan_report_load8_noabort+0x20/0x30 [ 35.438701] kasan_bitops_test_and_modify.constprop.0+0xa8c/0xbc8 [ 35.439365] kasan_bitops_generic+0x11c/0x1c8 [ 35.440088] kunit_try_run_case+0x14c/0x3d0 [ 35.440775] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.441403] kthread+0x24c/0x2d0 [ 35.442016] ret_from_fork+0x10/0x20 [ 35.442666] [ 35.442983] Allocated by task 250: [ 35.443564] kasan_save_stack+0x3c/0x68 [ 35.444174] kasan_save_track+0x20/0x40 [ 35.444773] kasan_save_alloc_info+0x40/0x58 [ 35.445462] __kasan_kmalloc+0xd4/0xd8 [ 35.446008] __kmalloc_cache_noprof+0x15c/0x3c8 [ 35.446677] kasan_bitops_generic+0xa0/0x1c8 [ 35.447271] kunit_try_run_case+0x14c/0x3d0 [ 35.447952] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.448683] kthread+0x24c/0x2d0 [ 35.449303] ret_from_fork+0x10/0x20 [ 35.449936] [ 35.450307] The buggy address belongs to the object at fff00000c5e082a0 [ 35.450307] which belongs to the cache kmalloc-16 of size 16 [ 35.451486] The buggy address is located 8 bytes inside of [ 35.451486] allocated 9-byte region [fff00000c5e082a0, fff00000c5e082a9) [ 35.452944] [ 35.453310] The buggy address belongs to the physical page: [ 35.453987] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e08 [ 35.454802] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.455703] page_type: f5(slab) [ 35.456213] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 35.457164] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 35.458049] page dumped because: kasan: bad access detected [ 35.458766] [ 35.459124] Memory state around the buggy address: [ 35.459742] fff00000c5e08180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 35.460698] fff00000c5e08200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 35.461436] >fff00000c5e08280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 35.462305] ^ [ 35.462903] fff00000c5e08300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.463723] fff00000c5e08380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.464609] ================================================================== [ 35.196426] ================================================================== [ 35.197781] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc8 [ 35.199102] Write of size 8 at addr fff00000c5e082a8 by task kunit_try_catch/250 [ 35.199950] [ 35.200357] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 35.202622] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.203131] Hardware name: linux,dummy-virt (DT) [ 35.203816] Call trace: [ 35.204251] show_stack+0x20/0x38 (C) [ 35.204871] dump_stack_lvl+0x8c/0xd0 [ 35.205508] print_report+0x118/0x5e0 [ 35.206192] kasan_report+0xc8/0x118 [ 35.206846] kasan_check_range+0x100/0x1a8 [ 35.207447] __kasan_check_write+0x20/0x30 [ 35.208158] kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc8 [ 35.209051] kasan_bitops_generic+0x11c/0x1c8 [ 35.209694] kunit_try_run_case+0x14c/0x3d0 [ 35.210257] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.211078] kthread+0x24c/0x2d0 [ 35.211704] ret_from_fork+0x10/0x20 [ 35.212243] [ 35.212653] Allocated by task 250: [ 35.213196] kasan_save_stack+0x3c/0x68 [ 35.213736] kasan_save_track+0x20/0x40 [ 35.214357] kasan_save_alloc_info+0x40/0x58 [ 35.214968] __kasan_kmalloc+0xd4/0xd8 [ 35.215568] __kmalloc_cache_noprof+0x15c/0x3c8 [ 35.216278] kasan_bitops_generic+0xa0/0x1c8 [ 35.216932] kunit_try_run_case+0x14c/0x3d0 [ 35.217511] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.218316] kthread+0x24c/0x2d0 [ 35.218861] ret_from_fork+0x10/0x20 [ 35.219468] [ 35.219856] The buggy address belongs to the object at fff00000c5e082a0 [ 35.219856] which belongs to the cache kmalloc-16 of size 16 [ 35.221130] The buggy address is located 8 bytes inside of [ 35.221130] allocated 9-byte region [fff00000c5e082a0, fff00000c5e082a9) [ 35.222651] [ 35.223114] The buggy address belongs to the physical page: [ 35.224017] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e08 [ 35.225032] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.225900] page_type: f5(slab) [ 35.226492] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 35.227505] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 35.228479] page dumped because: kasan: bad access detected [ 35.229215] [ 35.229650] Memory state around the buggy address: [ 35.230391] fff00000c5e08180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 35.231424] fff00000c5e08200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 35.232333] >fff00000c5e08280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 35.233125] ^ [ 35.233861] fff00000c5e08300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.234663] fff00000c5e08380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.235681] ================================================================== [ 35.276980] ================================================================== [ 35.278135] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc8 [ 35.279131] Write of size 8 at addr fff00000c5e082a8 by task kunit_try_catch/250 [ 35.280165] [ 35.280851] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 35.282656] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.283225] Hardware name: linux,dummy-virt (DT) [ 35.283862] Call trace: [ 35.284289] show_stack+0x20/0x38 (C) [ 35.285079] dump_stack_lvl+0x8c/0xd0 [ 35.285651] print_report+0x118/0x5e0 [ 35.286232] kasan_report+0xc8/0x118 [ 35.286842] kasan_check_range+0x100/0x1a8 [ 35.287465] __kasan_check_write+0x20/0x30 [ 35.288104] kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc8 [ 35.288876] kasan_bitops_generic+0x11c/0x1c8 [ 35.289607] kunit_try_run_case+0x14c/0x3d0 [ 35.290229] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.291062] kthread+0x24c/0x2d0 [ 35.291626] ret_from_fork+0x10/0x20 [ 35.292214] [ 35.292575] Allocated by task 250: [ 35.293143] kasan_save_stack+0x3c/0x68 [ 35.293744] kasan_save_track+0x20/0x40 [ 35.294379] kasan_save_alloc_info+0x40/0x58 [ 35.294996] __kasan_kmalloc+0xd4/0xd8 [ 35.295481] __kmalloc_cache_noprof+0x15c/0x3c8 [ 35.296214] kasan_bitops_generic+0xa0/0x1c8 [ 35.296763] kunit_try_run_case+0x14c/0x3d0 [ 35.297430] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.298075] kthread+0x24c/0x2d0 [ 35.298669] ret_from_fork+0x10/0x20 [ 35.299185] [ 35.299584] The buggy address belongs to the object at fff00000c5e082a0 [ 35.299584] which belongs to the cache kmalloc-16 of size 16 [ 35.300745] The buggy address is located 8 bytes inside of [ 35.300745] allocated 9-byte region [fff00000c5e082a0, fff00000c5e082a9) [ 35.302183] [ 35.302550] The buggy address belongs to the physical page: [ 35.303313] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e08 [ 35.304173] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.305053] page_type: f5(slab) [ 35.305651] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 35.306594] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 35.307391] page dumped because: kasan: bad access detected [ 35.308106] [ 35.308485] Memory state around the buggy address: [ 35.309119] fff00000c5e08180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 35.310001] fff00000c5e08200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 35.310895] >fff00000c5e08280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 35.311697] ^ [ 35.312376] fff00000c5e08300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.313153] fff00000c5e08380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.313981] ================================================================== [ 35.315457] ================================================================== [ 35.316132] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xad4/0xbc8 [ 35.317120] Read of size 8 at addr fff00000c5e082a8 by task kunit_try_catch/250 [ 35.318118] [ 35.318496] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 35.319593] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.320144] Hardware name: linux,dummy-virt (DT) [ 35.320770] Call trace: [ 35.321244] show_stack+0x20/0x38 (C) [ 35.321915] dump_stack_lvl+0x8c/0xd0 [ 35.322478] print_report+0x118/0x5e0 [ 35.323138] kasan_report+0xc8/0x118 [ 35.323726] __asan_report_load8_noabort+0x20/0x30 [ 35.324399] kasan_bitops_test_and_modify.constprop.0+0xad4/0xbc8 [ 35.325287] kasan_bitops_generic+0x11c/0x1c8 [ 35.326017] kunit_try_run_case+0x14c/0x3d0 [ 35.326718] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.327547] kthread+0x24c/0x2d0 [ 35.328140] ret_from_fork+0x10/0x20 [ 35.328803] [ 35.329163] Allocated by task 250: [ 35.329677] kasan_save_stack+0x3c/0x68 [ 35.330301] kasan_save_track+0x20/0x40 [ 35.330810] kasan_save_alloc_info+0x40/0x58 [ 35.331476] __kasan_kmalloc+0xd4/0xd8 [ 35.332157] __kmalloc_cache_noprof+0x15c/0x3c8 [ 35.332795] kasan_bitops_generic+0xa0/0x1c8 [ 35.333393] kunit_try_run_case+0x14c/0x3d0 [ 35.334096] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.334894] kthread+0x24c/0x2d0 [ 35.335483] ret_from_fork+0x10/0x20 [ 35.336120] [ 35.336448] The buggy address belongs to the object at fff00000c5e082a0 [ 35.336448] which belongs to the cache kmalloc-16 of size 16 [ 35.337643] The buggy address is located 8 bytes inside of [ 35.337643] allocated 9-byte region [fff00000c5e082a0, fff00000c5e082a9) [ 35.338952] [ 35.339273] The buggy address belongs to the physical page: [ 35.340056] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e08 [ 35.341095] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.341898] page_type: f5(slab) [ 35.342433] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 35.343339] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 35.344323] page dumped because: kasan: bad access detected [ 35.344897] [ 35.345274] Memory state around the buggy address: [ 35.345995] fff00000c5e08180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 35.346798] fff00000c5e08200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 35.347726] >fff00000c5e08280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 35.348453] ^ [ 35.349175] fff00000c5e08300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.350026] fff00000c5e08380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.350778] ================================================================== [ 35.352073] ================================================================== [ 35.353661] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x334/0xbc8 [ 35.354556] Write of size 8 at addr fff00000c5e082a8 by task kunit_try_catch/250 [ 35.355443] [ 35.355806] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 35.356939] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.357577] Hardware name: linux,dummy-virt (DT) [ 35.358152] Call trace: [ 35.358646] show_stack+0x20/0x38 (C) [ 35.359289] dump_stack_lvl+0x8c/0xd0 [ 35.359887] print_report+0x118/0x5e0 [ 35.360555] kasan_report+0xc8/0x118 [ 35.361147] kasan_check_range+0x100/0x1a8 [ 35.361852] __kasan_check_write+0x20/0x30 [ 35.362394] kasan_bitops_test_and_modify.constprop.0+0x334/0xbc8 [ 35.363256] kasan_bitops_generic+0x11c/0x1c8 [ 35.363988] kunit_try_run_case+0x14c/0x3d0 [ 35.364565] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.365381] kthread+0x24c/0x2d0 [ 35.365906] ret_from_fork+0x10/0x20 [ 35.366586] [ 35.366958] Allocated by task 250: [ 35.367544] kasan_save_stack+0x3c/0x68 [ 35.368189] kasan_save_track+0x20/0x40 [ 35.368718] kasan_save_alloc_info+0x40/0x58 [ 35.369390] __kasan_kmalloc+0xd4/0xd8 [ 35.369944] __kmalloc_cache_noprof+0x15c/0x3c8 [ 35.370662] kasan_bitops_generic+0xa0/0x1c8 [ 35.371249] kunit_try_run_case+0x14c/0x3d0 [ 35.371943] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.372605] kthread+0x24c/0x2d0 [ 35.373181] ret_from_fork+0x10/0x20 [ 35.373769] [ 35.374136] The buggy address belongs to the object at fff00000c5e082a0 [ 35.374136] which belongs to the cache kmalloc-16 of size 16 [ 35.375371] The buggy address is located 8 bytes inside of [ 35.375371] allocated 9-byte region [fff00000c5e082a0, fff00000c5e082a9) [ 35.376597] [ 35.376990] The buggy address belongs to the physical page: [ 35.377611] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e08 [ 35.378644] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.379287] page_type: f5(slab) [ 35.379886] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 35.380901] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 35.381626] page dumped because: kasan: bad access detected [ 35.382380] [ 35.382775] Memory state around the buggy address: [ 35.383300] fff00000c5e08180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 35.384240] fff00000c5e08200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 35.384923] >fff00000c5e08280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 35.385850] ^ [ 35.386481] fff00000c5e08300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.387450] fff00000c5e08380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.388283] ================================================================== [ 35.390696] ================================================================== [ 35.391598] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa44/0xbc8 [ 35.392516] Read of size 8 at addr fff00000c5e082a8 by task kunit_try_catch/250 [ 35.393269] [ 35.393668] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 35.394967] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.395587] Hardware name: linux,dummy-virt (DT) [ 35.396286] Call trace: [ 35.396754] show_stack+0x20/0x38 (C) [ 35.397396] dump_stack_lvl+0x8c/0xd0 [ 35.397922] print_report+0x118/0x5e0 [ 35.398579] kasan_report+0xc8/0x118 [ 35.399167] __asan_report_load8_noabort+0x20/0x30 [ 35.399830] kasan_bitops_test_and_modify.constprop.0+0xa44/0xbc8 [ 35.400723] kasan_bitops_generic+0x11c/0x1c8 [ 35.401405] kunit_try_run_case+0x14c/0x3d0 [ 35.402002] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.402830] kthread+0x24c/0x2d0 [ 35.403448] ret_from_fork+0x10/0x20 [ 35.404113] [ 35.404492] Allocated by task 250: [ 35.405048] kasan_save_stack+0x3c/0x68 [ 35.405666] kasan_save_track+0x20/0x40 [ 35.406313] kasan_save_alloc_info+0x40/0x58 [ 35.407010] __kasan_kmalloc+0xd4/0xd8 [ 35.407612] __kmalloc_cache_noprof+0x15c/0x3c8 [ 35.408229] kasan_bitops_generic+0xa0/0x1c8 [ 35.408941] kunit_try_run_case+0x14c/0x3d0 [ 35.409635] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.410335] kthread+0x24c/0x2d0 [ 35.410942] ret_from_fork+0x10/0x20 [ 35.411574] [ 35.411916] The buggy address belongs to the object at fff00000c5e082a0 [ 35.411916] which belongs to the cache kmalloc-16 of size 16 [ 35.413084] The buggy address is located 8 bytes inside of [ 35.413084] allocated 9-byte region [fff00000c5e082a0, fff00000c5e082a9) [ 35.414364] [ 35.414744] The buggy address belongs to the physical page: [ 35.415508] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e08 [ 35.417043] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.417839] page_type: f5(slab) [ 35.418400] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 35.419211] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 35.420062] page dumped because: kasan: bad access detected [ 35.420847] [ 35.421162] Memory state around the buggy address: [ 35.421821] fff00000c5e08180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 35.422635] fff00000c5e08200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 35.423474] >fff00000c5e08280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 35.424322] ^ [ 35.424847] fff00000c5e08300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.425778] fff00000c5e08380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.426624] ================================================================== [ 35.157714] ================================================================== [ 35.158773] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa08/0xbc8 [ 35.159823] Read of size 8 at addr fff00000c5e082a8 by task kunit_try_catch/250 [ 35.160584] [ 35.161088] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 35.162485] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.163134] Hardware name: linux,dummy-virt (DT) [ 35.163848] Call trace: [ 35.165338] show_stack+0x20/0x38 (C) [ 35.165874] dump_stack_lvl+0x8c/0xd0 [ 35.166378] print_report+0x118/0x5e0 [ 35.167036] kasan_report+0xc8/0x118 [ 35.167615] __asan_report_load8_noabort+0x20/0x30 [ 35.168304] kasan_bitops_test_and_modify.constprop.0+0xa08/0xbc8 [ 35.169173] kasan_bitops_generic+0x11c/0x1c8 [ 35.169878] kunit_try_run_case+0x14c/0x3d0 [ 35.170478] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.171160] kthread+0x24c/0x2d0 [ 35.171772] ret_from_fork+0x10/0x20 [ 35.172412] [ 35.172749] Allocated by task 250: [ 35.173310] kasan_save_stack+0x3c/0x68 [ 35.173966] kasan_save_track+0x20/0x40 [ 35.174562] kasan_save_alloc_info+0x40/0x58 [ 35.175091] __kasan_kmalloc+0xd4/0xd8 [ 35.175732] __kmalloc_cache_noprof+0x15c/0x3c8 [ 35.176441] kasan_bitops_generic+0xa0/0x1c8 [ 35.177058] kunit_try_run_case+0x14c/0x3d0 [ 35.177591] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.178375] kthread+0x24c/0x2d0 [ 35.178973] ret_from_fork+0x10/0x20 [ 35.179457] [ 35.179858] The buggy address belongs to the object at fff00000c5e082a0 [ 35.179858] which belongs to the cache kmalloc-16 of size 16 [ 35.181102] The buggy address is located 8 bytes inside of [ 35.181102] allocated 9-byte region [fff00000c5e082a0, fff00000c5e082a9) [ 35.182401] [ 35.182803] The buggy address belongs to the physical page: [ 35.183579] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e08 [ 35.184412] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.185270] page_type: f5(slab) [ 35.185849] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 35.186721] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 35.187723] page dumped because: kasan: bad access detected [ 35.188486] [ 35.188845] Memory state around the buggy address: [ 35.189890] fff00000c5e08180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 35.190773] fff00000c5e08200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 35.191575] >fff00000c5e08280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 35.192387] ^ [ 35.193015] fff00000c5e08300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.193957] fff00000c5e08380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.194672] ==================================================================
[ 29.602969] ================================================================== [ 29.603370] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90 [ 29.603452] Read of size 8 at addr ffff888101a46908 by task kunit_try_catch/270 [ 29.603452] [ 29.605097] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 29.605097] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.605097] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.605097] Call Trace: [ 29.605097] <TASK> [ 29.605097] dump_stack_lvl+0x73/0xb0 [ 29.605097] print_report+0xd1/0x640 [ 29.605097] ? __virt_addr_valid+0x1db/0x2d0 [ 29.605097] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.605097] kasan_report+0x102/0x140 [ 29.605097] ? kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90 [ 29.605097] ? kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90 [ 29.605097] __asan_report_load8_noabort+0x18/0x20 [ 29.605097] kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90 [ 29.605097] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 29.605097] ? __kmalloc_cache_noprof+0x184/0x410 [ 29.605097] ? __pfx_read_hpet+0x10/0x10 [ 29.605097] ? kasan_bitops_generic+0x93/0x1c0 [ 29.605097] kasan_bitops_generic+0x122/0x1c0 [ 29.605097] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 29.605097] ? ktime_get_ts64+0x84/0x230 [ 29.605097] kunit_try_run_case+0x1b3/0x490 [ 29.605097] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.605097] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.605097] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.605097] ? __kthread_parkme+0x82/0x160 [ 29.605097] ? preempt_count_sub+0x50/0x80 [ 29.605097] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.605097] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.605097] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.605097] kthread+0x257/0x310 [ 29.605097] ? __pfx_kthread+0x10/0x10 [ 29.605097] ret_from_fork+0x41/0x80 [ 29.605097] ? __pfx_kthread+0x10/0x10 [ 29.605097] ret_from_fork_asm+0x1a/0x30 [ 29.605097] </TASK> [ 29.605097] [ 29.605097] Allocated by task 270: [ 29.605097] kasan_save_stack+0x3d/0x60 [ 29.605097] kasan_save_track+0x18/0x40 [ 29.605097] kasan_save_alloc_info+0x3b/0x50 [ 29.605097] __kasan_kmalloc+0xb7/0xc0 [ 29.605097] __kmalloc_cache_noprof+0x184/0x410 [ 29.605097] kasan_bitops_generic+0x93/0x1c0 [ 29.605097] kunit_try_run_case+0x1b3/0x490 [ 29.605097] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.605097] kthread+0x257/0x310 [ 29.605097] ret_from_fork+0x41/0x80 [ 29.605097] ret_from_fork_asm+0x1a/0x30 [ 29.605097] [ 29.605097] The buggy address belongs to the object at ffff888101a46900 [ 29.605097] which belongs to the cache kmalloc-16 of size 16 [ 29.605097] The buggy address is located 8 bytes inside of [ 29.605097] allocated 9-byte region [ffff888101a46900, ffff888101a46909) [ 29.605097] [ 29.605097] The buggy address belongs to the physical page: [ 29.605097] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101a46 [ 29.605097] flags: 0x200000000000000(node=0|zone=2) [ 29.605097] page_type: f5(slab) [ 29.605097] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 29.605097] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 29.605097] page dumped because: kasan: bad access detected [ 29.605097] [ 29.605097] Memory state around the buggy address: [ 29.605097] ffff888101a46800: 00 05 fc fc fa fb fc fc 00 04 fc fc fa fb fc fc [ 29.605097] ffff888101a46880: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 29.605097] >ffff888101a46900: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.605097] ^ [ 29.605097] ffff888101a46980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.605097] ffff888101a46a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.605097] ================================================================== [ 29.286711] ================================================================== [ 29.287372] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90 [ 29.287372] Write of size 8 at addr ffff888101a46908 by task kunit_try_catch/270 [ 29.287372] [ 29.287372] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 29.287372] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.287372] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.287372] Call Trace: [ 29.287372] <TASK> [ 29.287372] dump_stack_lvl+0x73/0xb0 [ 29.287372] print_report+0xd1/0x640 [ 29.287372] ? __virt_addr_valid+0x1db/0x2d0 [ 29.287372] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.287372] kasan_report+0x102/0x140 [ 29.287372] ? kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90 [ 29.287372] ? kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90 [ 29.287372] kasan_check_range+0x10c/0x1c0 [ 29.287372] __kasan_check_write+0x18/0x20 [ 29.287372] kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90 [ 29.287372] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 29.287372] ? __kmalloc_cache_noprof+0x184/0x410 [ 29.287372] ? __pfx_read_hpet+0x10/0x10 [ 29.287372] ? kasan_bitops_generic+0x93/0x1c0 [ 29.287372] kasan_bitops_generic+0x122/0x1c0 [ 29.287372] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 29.287372] ? ktime_get_ts64+0x84/0x230 [ 29.287372] kunit_try_run_case+0x1b3/0x490 [ 29.287372] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.287372] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.287372] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.287372] ? __kthread_parkme+0x82/0x160 [ 29.287372] ? preempt_count_sub+0x50/0x80 [ 29.287372] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.287372] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.287372] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.287372] kthread+0x257/0x310 [ 29.287372] ? __pfx_kthread+0x10/0x10 [ 29.287372] ret_from_fork+0x41/0x80 [ 29.287372] ? __pfx_kthread+0x10/0x10 [ 29.287372] ret_from_fork_asm+0x1a/0x30 [ 29.287372] </TASK> [ 29.287372] [ 29.287372] Allocated by task 270: [ 29.287372] kasan_save_stack+0x3d/0x60 [ 29.287372] kasan_save_track+0x18/0x40 [ 29.287372] kasan_save_alloc_info+0x3b/0x50 [ 29.287372] __kasan_kmalloc+0xb7/0xc0 [ 29.287372] __kmalloc_cache_noprof+0x184/0x410 [ 29.287372] kasan_bitops_generic+0x93/0x1c0 [ 29.287372] kunit_try_run_case+0x1b3/0x490 [ 29.287372] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.287372] kthread+0x257/0x310 [ 29.287372] ret_from_fork+0x41/0x80 [ 29.287372] ret_from_fork_asm+0x1a/0x30 [ 29.287372] [ 29.287372] The buggy address belongs to the object at ffff888101a46900 [ 29.287372] which belongs to the cache kmalloc-16 of size 16 [ 29.287372] The buggy address is located 8 bytes inside of [ 29.287372] allocated 9-byte region [ffff888101a46900, ffff888101a46909) [ 29.287372] [ 29.287372] The buggy address belongs to the physical page: [ 29.287372] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101a46 [ 29.287372] flags: 0x200000000000000(node=0|zone=2) [ 29.287372] page_type: f5(slab) [ 29.287372] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 29.287372] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 29.287372] page dumped because: kasan: bad access detected [ 29.287372] [ 29.287372] Memory state around the buggy address: [ 29.287372] ffff888101a46800: 00 05 fc fc fa fb fc fc 00 04 fc fc fa fb fc fc [ 29.287372] ffff888101a46880: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 29.287372] >ffff888101a46900: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.287372] ^ [ 29.287372] ffff888101a46980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.287372] ffff888101a46a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.287372] ================================================================== [ 29.464087] ================================================================== [ 29.464602] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90 [ 29.464602] Write of size 8 at addr ffff888101a46908 by task kunit_try_catch/270 [ 29.466518] [ 29.466518] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 29.466518] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.466518] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.466518] Call Trace: [ 29.466518] <TASK> [ 29.466518] dump_stack_lvl+0x73/0xb0 [ 29.466518] print_report+0xd1/0x640 [ 29.466518] ? __virt_addr_valid+0x1db/0x2d0 [ 29.466518] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.466518] kasan_report+0x102/0x140 [ 29.466518] ? kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90 [ 29.466518] ? kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90 [ 29.466518] kasan_check_range+0x10c/0x1c0 [ 29.466518] __kasan_check_write+0x18/0x20 [ 29.466518] kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90 [ 29.466518] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 29.466518] ? __kmalloc_cache_noprof+0x184/0x410 [ 29.466518] ? __pfx_read_hpet+0x10/0x10 [ 29.466518] ? kasan_bitops_generic+0x93/0x1c0 [ 29.466518] kasan_bitops_generic+0x122/0x1c0 [ 29.466518] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 29.466518] ? ktime_get_ts64+0x84/0x230 [ 29.466518] kunit_try_run_case+0x1b3/0x490 [ 29.466518] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.466518] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.466518] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.466518] ? __kthread_parkme+0x82/0x160 [ 29.466518] ? preempt_count_sub+0x50/0x80 [ 29.466518] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.466518] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.466518] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.466518] kthread+0x257/0x310 [ 29.466518] ? __pfx_kthread+0x10/0x10 [ 29.466518] ret_from_fork+0x41/0x80 [ 29.466518] ? __pfx_kthread+0x10/0x10 [ 29.466518] ret_from_fork_asm+0x1a/0x30 [ 29.466518] </TASK> [ 29.466518] [ 29.466518] Allocated by task 270: [ 29.466518] kasan_save_stack+0x3d/0x60 [ 29.466518] kasan_save_track+0x18/0x40 [ 29.466518] kasan_save_alloc_info+0x3b/0x50 [ 29.466518] __kasan_kmalloc+0xb7/0xc0 [ 29.466518] __kmalloc_cache_noprof+0x184/0x410 [ 29.466518] kasan_bitops_generic+0x93/0x1c0 [ 29.466518] kunit_try_run_case+0x1b3/0x490 [ 29.466518] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.466518] kthread+0x257/0x310 [ 29.466518] ret_from_fork+0x41/0x80 [ 29.466518] ret_from_fork_asm+0x1a/0x30 [ 29.466518] [ 29.466518] The buggy address belongs to the object at ffff888101a46900 [ 29.466518] which belongs to the cache kmalloc-16 of size 16 [ 29.466518] The buggy address is located 8 bytes inside of [ 29.466518] allocated 9-byte region [ffff888101a46900, ffff888101a46909) [ 29.466518] [ 29.466518] The buggy address belongs to the physical page: [ 29.466518] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101a46 [ 29.466518] flags: 0x200000000000000(node=0|zone=2) [ 29.466518] page_type: f5(slab) [ 29.466518] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 29.466518] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 29.466518] page dumped because: kasan: bad access detected [ 29.466518] [ 29.466518] Memory state around the buggy address: [ 29.466518] ffff888101a46800: 00 05 fc fc fa fb fc fc 00 04 fc fc fa fb fc fc [ 29.466518] ffff888101a46880: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 29.466518] >ffff888101a46900: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.466518] ^ [ 29.466518] ffff888101a46980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.466518] ffff888101a46a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.466518] ================================================================== [ 29.552758] ================================================================== [ 29.553437] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x558/0xd90 [ 29.553437] Read of size 8 at addr ffff888101a46908 by task kunit_try_catch/270 [ 29.553437] [ 29.553437] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 29.553437] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.553437] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.553437] Call Trace: [ 29.553437] <TASK> [ 29.553437] dump_stack_lvl+0x73/0xb0 [ 29.553437] print_report+0xd1/0x640 [ 29.553437] ? __virt_addr_valid+0x1db/0x2d0 [ 29.553437] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.553437] kasan_report+0x102/0x140 [ 29.553437] ? kasan_bitops_test_and_modify.constprop.0+0x558/0xd90 [ 29.553437] ? kasan_bitops_test_and_modify.constprop.0+0x558/0xd90 [ 29.553437] kasan_check_range+0x10c/0x1c0 [ 29.553437] __kasan_check_read+0x15/0x20 [ 29.553437] kasan_bitops_test_and_modify.constprop.0+0x558/0xd90 [ 29.553437] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 29.553437] ? __kmalloc_cache_noprof+0x184/0x410 [ 29.553437] ? __pfx_read_hpet+0x10/0x10 [ 29.553437] ? kasan_bitops_generic+0x93/0x1c0 [ 29.553437] kasan_bitops_generic+0x122/0x1c0 [ 29.553437] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 29.553437] ? ktime_get_ts64+0x84/0x230 [ 29.553437] kunit_try_run_case+0x1b3/0x490 [ 29.553437] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.553437] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.553437] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.553437] ? __kthread_parkme+0x82/0x160 [ 29.553437] ? preempt_count_sub+0x50/0x80 [ 29.553437] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.553437] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.553437] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.553437] kthread+0x257/0x310 [ 29.553437] ? __pfx_kthread+0x10/0x10 [ 29.553437] ret_from_fork+0x41/0x80 [ 29.553437] ? __pfx_kthread+0x10/0x10 [ 29.553437] ret_from_fork_asm+0x1a/0x30 [ 29.553437] </TASK> [ 29.553437] [ 29.553437] Allocated by task 270: [ 29.553437] kasan_save_stack+0x3d/0x60 [ 29.553437] kasan_save_track+0x18/0x40 [ 29.553437] kasan_save_alloc_info+0x3b/0x50 [ 29.553437] __kasan_kmalloc+0xb7/0xc0 [ 29.553437] __kmalloc_cache_noprof+0x184/0x410 [ 29.553437] kasan_bitops_generic+0x93/0x1c0 [ 29.553437] kunit_try_run_case+0x1b3/0x490 [ 29.553437] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.553437] kthread+0x257/0x310 [ 29.553437] ret_from_fork+0x41/0x80 [ 29.553437] ret_from_fork_asm+0x1a/0x30 [ 29.553437] [ 29.553437] The buggy address belongs to the object at ffff888101a46900 [ 29.553437] which belongs to the cache kmalloc-16 of size 16 [ 29.553437] The buggy address is located 8 bytes inside of [ 29.553437] allocated 9-byte region [ffff888101a46900, ffff888101a46909) [ 29.553437] [ 29.553437] The buggy address belongs to the physical page: [ 29.553437] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101a46 [ 29.553437] flags: 0x200000000000000(node=0|zone=2) [ 29.553437] page_type: f5(slab) [ 29.553437] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 29.553437] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 29.553437] page dumped because: kasan: bad access detected [ 29.553437] [ 29.553437] Memory state around the buggy address: [ 29.553437] ffff888101a46800: 00 05 fc fc fa fb fc fc 00 04 fc fc fa fb fc fc [ 29.553437] ffff888101a46880: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 29.553437] >ffff888101a46900: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.553437] ^ [ 29.553437] ffff888101a46980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.553437] ffff888101a46a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.553437] ================================================================== [ 29.425016] ================================================================== [ 29.425509] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90 [ 29.425509] Write of size 8 at addr ffff888101a46908 by task kunit_try_catch/270 [ 29.425509] [ 29.425509] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 29.425509] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.425509] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.425509] Call Trace: [ 29.425509] <TASK> [ 29.425509] dump_stack_lvl+0x73/0xb0 [ 29.425509] print_report+0xd1/0x640 [ 29.425509] ? __virt_addr_valid+0x1db/0x2d0 [ 29.425509] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.425509] kasan_report+0x102/0x140 [ 29.425509] ? kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90 [ 29.425509] ? kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90 [ 29.425509] kasan_check_range+0x10c/0x1c0 [ 29.425509] __kasan_check_write+0x18/0x20 [ 29.425509] kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90 [ 29.425509] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 29.425509] ? __kmalloc_cache_noprof+0x184/0x410 [ 29.425509] ? __pfx_read_hpet+0x10/0x10 [ 29.425509] ? kasan_bitops_generic+0x93/0x1c0 [ 29.425509] kasan_bitops_generic+0x122/0x1c0 [ 29.425509] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 29.425509] ? ktime_get_ts64+0x84/0x230 [ 29.425509] kunit_try_run_case+0x1b3/0x490 [ 29.425509] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.425509] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.425509] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.425509] ? __kthread_parkme+0x82/0x160 [ 29.425509] ? preempt_count_sub+0x50/0x80 [ 29.425509] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.425509] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.425509] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.425509] kthread+0x257/0x310 [ 29.425509] ? __pfx_kthread+0x10/0x10 [ 29.425509] ret_from_fork+0x41/0x80 [ 29.425509] ? __pfx_kthread+0x10/0x10 [ 29.425509] ret_from_fork_asm+0x1a/0x30 [ 29.425509] </TASK> [ 29.425509] [ 29.425509] Allocated by task 270: [ 29.425509] kasan_save_stack+0x3d/0x60 [ 29.425509] kasan_save_track+0x18/0x40 [ 29.425509] kasan_save_alloc_info+0x3b/0x50 [ 29.425509] __kasan_kmalloc+0xb7/0xc0 [ 29.425509] __kmalloc_cache_noprof+0x184/0x410 [ 29.425509] kasan_bitops_generic+0x93/0x1c0 [ 29.425509] kunit_try_run_case+0x1b3/0x490 [ 29.425509] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.425509] kthread+0x257/0x310 [ 29.425509] ret_from_fork+0x41/0x80 [ 29.425509] ret_from_fork_asm+0x1a/0x30 [ 29.425509] [ 29.425509] The buggy address belongs to the object at ffff888101a46900 [ 29.425509] which belongs to the cache kmalloc-16 of size 16 [ 29.425509] The buggy address is located 8 bytes inside of [ 29.425509] allocated 9-byte region [ffff888101a46900, ffff888101a46909) [ 29.425509] [ 29.425509] The buggy address belongs to the physical page: [ 29.425509] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101a46 [ 29.425509] flags: 0x200000000000000(node=0|zone=2) [ 29.425509] page_type: f5(slab) [ 29.425509] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 29.425509] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 29.425509] page dumped because: kasan: bad access detected [ 29.425509] [ 29.425509] Memory state around the buggy address: [ 29.425509] ffff888101a46800: 00 05 fc fc fa fb fc fc 00 04 fc fc fa fb fc fc [ 29.425509] ffff888101a46880: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 29.425509] >ffff888101a46900: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.425509] ^ [ 29.425509] ffff888101a46980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.425509] ffff888101a46a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.425509] ================================================================== [ 29.385375] ================================================================== [ 29.385705] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90 [ 29.385705] Write of size 8 at addr ffff888101a46908 by task kunit_try_catch/270 [ 29.386365] [ 29.386365] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 29.386365] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.386365] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.386365] Call Trace: [ 29.386365] <TASK> [ 29.386365] dump_stack_lvl+0x73/0xb0 [ 29.386365] print_report+0xd1/0x640 [ 29.386365] ? __virt_addr_valid+0x1db/0x2d0 [ 29.386365] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.386365] kasan_report+0x102/0x140 [ 29.386365] ? kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90 [ 29.386365] ? kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90 [ 29.386365] kasan_check_range+0x10c/0x1c0 [ 29.386365] __kasan_check_write+0x18/0x20 [ 29.386365] kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90 [ 29.386365] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 29.386365] ? __kmalloc_cache_noprof+0x184/0x410 [ 29.386365] ? __pfx_read_hpet+0x10/0x10 [ 29.386365] ? kasan_bitops_generic+0x93/0x1c0 [ 29.386365] kasan_bitops_generic+0x122/0x1c0 [ 29.386365] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 29.386365] ? ktime_get_ts64+0x84/0x230 [ 29.386365] kunit_try_run_case+0x1b3/0x490 [ 29.386365] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.386365] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.386365] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.386365] ? __kthread_parkme+0x82/0x160 [ 29.386365] ? preempt_count_sub+0x50/0x80 [ 29.386365] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.386365] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.386365] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.386365] kthread+0x257/0x310 [ 29.386365] ? __pfx_kthread+0x10/0x10 [ 29.386365] ret_from_fork+0x41/0x80 [ 29.386365] ? __pfx_kthread+0x10/0x10 [ 29.386365] ret_from_fork_asm+0x1a/0x30 [ 29.386365] </TASK> [ 29.386365] [ 29.386365] Allocated by task 270: [ 29.386365] kasan_save_stack+0x3d/0x60 [ 29.386365] kasan_save_track+0x18/0x40 [ 29.386365] kasan_save_alloc_info+0x3b/0x50 [ 29.386365] __kasan_kmalloc+0xb7/0xc0 [ 29.386365] __kmalloc_cache_noprof+0x184/0x410 [ 29.386365] kasan_bitops_generic+0x93/0x1c0 [ 29.386365] kunit_try_run_case+0x1b3/0x490 [ 29.386365] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.386365] kthread+0x257/0x310 [ 29.386365] ret_from_fork+0x41/0x80 [ 29.386365] ret_from_fork_asm+0x1a/0x30 [ 29.386365] [ 29.386365] The buggy address belongs to the object at ffff888101a46900 [ 29.386365] which belongs to the cache kmalloc-16 of size 16 [ 29.386365] The buggy address is located 8 bytes inside of [ 29.386365] allocated 9-byte region [ffff888101a46900, ffff888101a46909) [ 29.386365] [ 29.386365] The buggy address belongs to the physical page: [ 29.386365] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101a46 [ 29.386365] flags: 0x200000000000000(node=0|zone=2) [ 29.386365] page_type: f5(slab) [ 29.386365] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 29.386365] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 29.386365] page dumped because: kasan: bad access detected [ 29.386365] [ 29.386365] Memory state around the buggy address: [ 29.386365] ffff888101a46800: 00 05 fc fc fa fb fc fc 00 04 fc fc fa fb fc fc [ 29.386365] ffff888101a46880: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 29.386365] >ffff888101a46900: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.386365] ^ [ 29.386365] ffff888101a46980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.386365] ffff888101a46a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.386365] ================================================================== [ 29.509934] ================================================================== [ 29.510206] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90 [ 29.510206] Write of size 8 at addr ffff888101a46908 by task kunit_try_catch/270 [ 29.510206] [ 29.510206] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 29.510206] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.510206] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.510206] Call Trace: [ 29.510206] <TASK> [ 29.510206] dump_stack_lvl+0x73/0xb0 [ 29.510206] print_report+0xd1/0x640 [ 29.510206] ? __virt_addr_valid+0x1db/0x2d0 [ 29.510206] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.510206] kasan_report+0x102/0x140 [ 29.510206] ? kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90 [ 29.510206] ? kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90 [ 29.510206] kasan_check_range+0x10c/0x1c0 [ 29.510206] __kasan_check_write+0x18/0x20 [ 29.510206] kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90 [ 29.510206] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 29.510206] ? __kmalloc_cache_noprof+0x184/0x410 [ 29.510206] ? __pfx_read_hpet+0x10/0x10 [ 29.510206] ? kasan_bitops_generic+0x93/0x1c0 [ 29.510206] kasan_bitops_generic+0x122/0x1c0 [ 29.510206] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 29.510206] ? ktime_get_ts64+0x84/0x230 [ 29.510206] kunit_try_run_case+0x1b3/0x490 [ 29.510206] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.510206] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.510206] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.510206] ? __kthread_parkme+0x82/0x160 [ 29.510206] ? preempt_count_sub+0x50/0x80 [ 29.510206] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.510206] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.510206] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.510206] kthread+0x257/0x310 [ 29.510206] ? __pfx_kthread+0x10/0x10 [ 29.510206] ret_from_fork+0x41/0x80 [ 29.510206] ? __pfx_kthread+0x10/0x10 [ 29.510206] ret_from_fork_asm+0x1a/0x30 [ 29.510206] </TASK> [ 29.510206] [ 29.510206] Allocated by task 270: [ 29.510206] kasan_save_stack+0x3d/0x60 [ 29.510206] kasan_save_track+0x18/0x40 [ 29.510206] kasan_save_alloc_info+0x3b/0x50 [ 29.510206] __kasan_kmalloc+0xb7/0xc0 [ 29.510206] __kmalloc_cache_noprof+0x184/0x410 [ 29.510206] kasan_bitops_generic+0x93/0x1c0 [ 29.510206] kunit_try_run_case+0x1b3/0x490 [ 29.510206] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.510206] kthread+0x257/0x310 [ 29.510206] ret_from_fork+0x41/0x80 [ 29.510206] ret_from_fork_asm+0x1a/0x30 [ 29.510206] [ 29.510206] The buggy address belongs to the object at ffff888101a46900 [ 29.510206] which belongs to the cache kmalloc-16 of size 16 [ 29.510206] The buggy address is located 8 bytes inside of [ 29.510206] allocated 9-byte region [ffff888101a46900, ffff888101a46909) [ 29.510206] [ 29.510206] The buggy address belongs to the physical page: [ 29.510206] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101a46 [ 29.510206] flags: 0x200000000000000(node=0|zone=2) [ 29.510206] page_type: f5(slab) [ 29.510206] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 29.510206] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 29.510206] page dumped because: kasan: bad access detected [ 29.510206] [ 29.510206] Memory state around the buggy address: [ 29.510206] ffff888101a46800: 00 05 fc fc fa fb fc fc 00 04 fc fc fa fb fc fc [ 29.510206] ffff888101a46880: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 29.510206] >ffff888101a46900: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.510206] ^ [ 29.510206] ffff888101a46980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.510206] ffff888101a46a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.510206] ================================================================== [ 29.248612] ================================================================== [ 29.249241] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x102/0xd90 [ 29.249241] Write of size 8 at addr ffff888101a46908 by task kunit_try_catch/270 [ 29.249241] [ 29.249241] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 29.249241] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.249241] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.249241] Call Trace: [ 29.249241] <TASK> [ 29.249241] dump_stack_lvl+0x73/0xb0 [ 29.249241] print_report+0xd1/0x640 [ 29.249241] ? __virt_addr_valid+0x1db/0x2d0 [ 29.249241] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.249241] kasan_report+0x102/0x140 [ 29.249241] ? kasan_bitops_test_and_modify.constprop.0+0x102/0xd90 [ 29.249241] ? kasan_bitops_test_and_modify.constprop.0+0x102/0xd90 [ 29.249241] kasan_check_range+0x10c/0x1c0 [ 29.249241] __kasan_check_write+0x18/0x20 [ 29.249241] kasan_bitops_test_and_modify.constprop.0+0x102/0xd90 [ 29.249241] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 29.249241] ? __kmalloc_cache_noprof+0x184/0x410 [ 29.249241] ? __pfx_read_hpet+0x10/0x10 [ 29.249241] ? kasan_bitops_generic+0x93/0x1c0 [ 29.249241] kasan_bitops_generic+0x122/0x1c0 [ 29.249241] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 29.249241] ? ktime_get_ts64+0x84/0x230 [ 29.249241] kunit_try_run_case+0x1b3/0x490 [ 29.249241] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.249241] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.249241] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.249241] ? __kthread_parkme+0x82/0x160 [ 29.249241] ? preempt_count_sub+0x50/0x80 [ 29.249241] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.249241] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.249241] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.249241] kthread+0x257/0x310 [ 29.249241] ? __pfx_kthread+0x10/0x10 [ 29.249241] ret_from_fork+0x41/0x80 [ 29.249241] ? __pfx_kthread+0x10/0x10 [ 29.249241] ret_from_fork_asm+0x1a/0x30 [ 29.249241] </TASK> [ 29.249241] [ 29.249241] Allocated by task 270: [ 29.249241] kasan_save_stack+0x3d/0x60 [ 29.249241] kasan_save_track+0x18/0x40 [ 29.249241] kasan_save_alloc_info+0x3b/0x50 [ 29.249241] __kasan_kmalloc+0xb7/0xc0 [ 29.249241] __kmalloc_cache_noprof+0x184/0x410 [ 29.249241] kasan_bitops_generic+0x93/0x1c0 [ 29.249241] kunit_try_run_case+0x1b3/0x490 [ 29.249241] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.249241] kthread+0x257/0x310 [ 29.249241] ret_from_fork+0x41/0x80 [ 29.249241] ret_from_fork_asm+0x1a/0x30 [ 29.249241] [ 29.249241] The buggy address belongs to the object at ffff888101a46900 [ 29.249241] which belongs to the cache kmalloc-16 of size 16 [ 29.249241] The buggy address is located 8 bytes inside of [ 29.249241] allocated 9-byte region [ffff888101a46900, ffff888101a46909) [ 29.249241] [ 29.249241] The buggy address belongs to the physical page: [ 29.249241] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101a46 [ 29.249241] flags: 0x200000000000000(node=0|zone=2) [ 29.249241] page_type: f5(slab) [ 29.249241] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 29.249241] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 29.249241] page dumped because: kasan: bad access detected [ 29.249241] [ 29.249241] Memory state around the buggy address: [ 29.249241] ffff888101a46800: 00 05 fc fc fa fb fc fc 00 04 fc fc fa fb fc fc [ 29.249241] ffff888101a46880: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 29.249241] >ffff888101a46900: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.249241] ^ [ 29.249241] ffff888101a46980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.249241] ffff888101a46a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.249241] ================================================================== [ 29.333103] ================================================================== [ 29.333781] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90 [ 29.333781] Write of size 8 at addr ffff888101a46908 by task kunit_try_catch/270 [ 29.333781] [ 29.333781] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 29.333781] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.333781] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.333781] Call Trace: [ 29.333781] <TASK> [ 29.333781] dump_stack_lvl+0x73/0xb0 [ 29.333781] print_report+0xd1/0x640 [ 29.333781] ? __virt_addr_valid+0x1db/0x2d0 [ 29.333781] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.333781] kasan_report+0x102/0x140 [ 29.333781] ? kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90 [ 29.333781] ? kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90 [ 29.333781] kasan_check_range+0x10c/0x1c0 [ 29.333781] __kasan_check_write+0x18/0x20 [ 29.333781] kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90 [ 29.333781] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 29.333781] ? __kmalloc_cache_noprof+0x184/0x410 [ 29.333781] ? __pfx_read_hpet+0x10/0x10 [ 29.333781] ? kasan_bitops_generic+0x93/0x1c0 [ 29.333781] kasan_bitops_generic+0x122/0x1c0 [ 29.333781] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 29.333781] ? ktime_get_ts64+0x84/0x230 [ 29.333781] kunit_try_run_case+0x1b3/0x490 [ 29.333781] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.333781] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.333781] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.333781] ? __kthread_parkme+0x82/0x160 [ 29.333781] ? preempt_count_sub+0x50/0x80 [ 29.333781] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.333781] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.333781] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.333781] kthread+0x257/0x310 [ 29.333781] ? __pfx_kthread+0x10/0x10 [ 29.333781] ret_from_fork+0x41/0x80 [ 29.333781] ? __pfx_kthread+0x10/0x10 [ 29.333781] ret_from_fork_asm+0x1a/0x30 [ 29.333781] </TASK> [ 29.333781] [ 29.333781] Allocated by task 270: [ 29.333781] kasan_save_stack+0x3d/0x60 [ 29.333781] kasan_save_track+0x18/0x40 [ 29.333781] kasan_save_alloc_info+0x3b/0x50 [ 29.333781] __kasan_kmalloc+0xb7/0xc0 [ 29.333781] __kmalloc_cache_noprof+0x184/0x410 [ 29.333781] kasan_bitops_generic+0x93/0x1c0 [ 29.333781] kunit_try_run_case+0x1b3/0x490 [ 29.333781] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.333781] kthread+0x257/0x310 [ 29.333781] ret_from_fork+0x41/0x80 [ 29.333781] ret_from_fork_asm+0x1a/0x30 [ 29.333781] [ 29.333781] The buggy address belongs to the object at ffff888101a46900 [ 29.333781] which belongs to the cache kmalloc-16 of size 16 [ 29.333781] The buggy address is located 8 bytes inside of [ 29.333781] allocated 9-byte region [ffff888101a46900, ffff888101a46909) [ 29.333781] [ 29.333781] The buggy address belongs to the physical page: [ 29.333781] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101a46 [ 29.333781] flags: 0x200000000000000(node=0|zone=2) [ 29.333781] page_type: f5(slab) [ 29.333781] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 29.333781] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 29.333781] page dumped because: kasan: bad access detected [ 29.333781] [ 29.333781] Memory state around the buggy address: [ 29.333781] ffff888101a46800: 00 05 fc fc fa fb fc fc 00 04 fc fc fa fb fc fc [ 29.333781] ffff888101a46880: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 29.333781] >ffff888101a46900: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.333781] ^ [ 29.333781] ffff888101a46980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.333781] ffff888101a46a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.333781] ==================================================================
[ 24.293921] ================================================================== [ 24.295130] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90 [ 24.296073] Write of size 8 at addr ffff8881028a7088 by task kunit_try_catch/268 [ 24.296826] [ 24.297083] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 24.298065] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.298536] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.299274] Call Trace: [ 24.299544] <TASK> [ 24.299914] dump_stack_lvl+0x73/0xb0 [ 24.300326] print_report+0xd1/0x640 [ 24.300808] ? __virt_addr_valid+0x1db/0x2d0 [ 24.301318] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.301814] kasan_report+0x102/0x140 [ 24.302256] ? kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90 [ 24.302763] ? kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90 [ 24.303163] kasan_check_range+0x10c/0x1c0 [ 24.303690] __kasan_check_write+0x18/0x20 [ 24.304190] kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90 [ 24.304857] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 24.305622] ? __kmalloc_cache_noprof+0x184/0x410 [ 24.306169] ? trace_hardirqs_on+0x37/0xe0 [ 24.306641] ? kasan_bitops_generic+0x93/0x1c0 [ 24.306973] kasan_bitops_generic+0x122/0x1c0 [ 24.307479] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 24.308079] ? __pfx_read_tsc+0x10/0x10 [ 24.308447] ? ktime_get_ts64+0x84/0x230 [ 24.309004] kunit_try_run_case+0x1b3/0x490 [ 24.309501] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.309947] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 24.310413] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.310959] ? __kthread_parkme+0x82/0x160 [ 24.311411] ? preempt_count_sub+0x50/0x80 [ 24.311973] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.312347] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.312950] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.313513] kthread+0x257/0x310 [ 24.313952] ? __pfx_kthread+0x10/0x10 [ 24.314390] ret_from_fork+0x41/0x80 [ 24.314781] ? __pfx_kthread+0x10/0x10 [ 24.315067] ret_from_fork_asm+0x1a/0x30 [ 24.315678] </TASK> [ 24.315961] [ 24.316181] Allocated by task 268: [ 24.316554] kasan_save_stack+0x3d/0x60 [ 24.317021] kasan_save_track+0x18/0x40 [ 24.317289] kasan_save_alloc_info+0x3b/0x50 [ 24.317647] __kasan_kmalloc+0xb7/0xc0 [ 24.317923] __kmalloc_cache_noprof+0x184/0x410 [ 24.318228] kasan_bitops_generic+0x93/0x1c0 [ 24.318539] kunit_try_run_case+0x1b3/0x490 [ 24.319053] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.319669] kthread+0x257/0x310 [ 24.320050] ret_from_fork+0x41/0x80 [ 24.320449] ret_from_fork_asm+0x1a/0x30 [ 24.321266] [ 24.321508] The buggy address belongs to the object at ffff8881028a7080 [ 24.321508] which belongs to the cache kmalloc-16 of size 16 [ 24.324334] The buggy address is located 8 bytes inside of [ 24.324334] allocated 9-byte region [ffff8881028a7080, ffff8881028a7089) [ 24.325443] [ 24.326568] The buggy address belongs to the physical page: [ 24.327008] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028a7 [ 24.327658] flags: 0x200000000000000(node=0|zone=2) [ 24.328181] page_type: f5(slab) [ 24.328452] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 24.329122] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 24.329816] page dumped because: kasan: bad access detected [ 24.330263] [ 24.330541] Memory state around the buggy address: [ 24.330923] ffff8881028a6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.331453] ffff8881028a7000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.332060] >ffff8881028a7080: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.332523] ^ [ 24.332976] ffff8881028a7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.333663] ffff8881028a7180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.334141] ================================================================== [ 24.250994] ================================================================== [ 24.251689] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90 [ 24.252469] Write of size 8 at addr ffff8881028a7088 by task kunit_try_catch/268 [ 24.254065] [ 24.254305] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 24.254956] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.255403] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.255986] Call Trace: [ 24.256208] <TASK> [ 24.256414] dump_stack_lvl+0x73/0xb0 [ 24.256920] print_report+0xd1/0x640 [ 24.257341] ? __virt_addr_valid+0x1db/0x2d0 [ 24.257917] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.258503] kasan_report+0x102/0x140 [ 24.260252] ? kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90 [ 24.261033] ? kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90 [ 24.261613] kasan_check_range+0x10c/0x1c0 [ 24.262074] __kasan_check_write+0x18/0x20 [ 24.262527] kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90 [ 24.263184] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 24.263672] ? __kmalloc_cache_noprof+0x184/0x410 [ 24.264193] ? trace_hardirqs_on+0x37/0xe0 [ 24.264669] ? kasan_bitops_generic+0x93/0x1c0 [ 24.265166] kasan_bitops_generic+0x122/0x1c0 [ 24.265709] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 24.266172] ? __pfx_read_tsc+0x10/0x10 [ 24.266632] ? ktime_get_ts64+0x84/0x230 [ 24.267123] kunit_try_run_case+0x1b3/0x490 [ 24.267635] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.267957] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 24.268279] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.268748] ? __kthread_parkme+0x82/0x160 [ 24.269250] ? preempt_count_sub+0x50/0x80 [ 24.269768] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.270270] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.270935] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.271504] kthread+0x257/0x310 [ 24.271973] ? __pfx_kthread+0x10/0x10 [ 24.272404] ret_from_fork+0x41/0x80 [ 24.272899] ? __pfx_kthread+0x10/0x10 [ 24.273187] ret_from_fork_asm+0x1a/0x30 [ 24.273533] </TASK> [ 24.273894] [ 24.274169] Allocated by task 268: [ 24.274557] kasan_save_stack+0x3d/0x60 [ 24.275043] kasan_save_track+0x18/0x40 [ 24.275470] kasan_save_alloc_info+0x3b/0x50 [ 24.275987] __kasan_kmalloc+0xb7/0xc0 [ 24.276442] __kmalloc_cache_noprof+0x184/0x410 [ 24.276911] kasan_bitops_generic+0x93/0x1c0 [ 24.277207] kunit_try_run_case+0x1b3/0x490 [ 24.277517] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.277893] kthread+0x257/0x310 [ 24.278155] ret_from_fork+0x41/0x80 [ 24.278661] ret_from_fork_asm+0x1a/0x30 [ 24.279096] [ 24.279317] The buggy address belongs to the object at ffff8881028a7080 [ 24.279317] which belongs to the cache kmalloc-16 of size 16 [ 24.280391] The buggy address is located 8 bytes inside of [ 24.280391] allocated 9-byte region [ffff8881028a7080, ffff8881028a7089) [ 24.281511] [ 24.281789] The buggy address belongs to the physical page: [ 24.282229] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028a7 [ 24.282964] flags: 0x200000000000000(node=0|zone=2) [ 24.283503] page_type: f5(slab) [ 24.283797] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 24.284187] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 24.284654] page dumped because: kasan: bad access detected [ 24.285162] [ 24.285430] Memory state around the buggy address: [ 24.285958] ffff8881028a6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.286729] ffff8881028a7000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.287403] >ffff8881028a7080: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.288096] ^ [ 24.288747] ffff8881028a7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.290249] ffff8881028a7180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.291232] ================================================================== [ 24.083937] ================================================================== [ 24.085282] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90 [ 24.085854] Write of size 8 at addr ffff8881028a7088 by task kunit_try_catch/268 [ 24.086299] [ 24.086555] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 24.087442] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.087928] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.088406] Call Trace: [ 24.088783] <TASK> [ 24.089072] dump_stack_lvl+0x73/0xb0 [ 24.089507] print_report+0xd1/0x640 [ 24.089891] ? __virt_addr_valid+0x1db/0x2d0 [ 24.090282] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.090863] kasan_report+0x102/0x140 [ 24.091276] ? kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90 [ 24.093157] ? kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90 [ 24.093585] kasan_check_range+0x10c/0x1c0 [ 24.094052] __kasan_check_write+0x18/0x20 [ 24.095521] kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90 [ 24.096323] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 24.097126] ? __kmalloc_cache_noprof+0x184/0x410 [ 24.097924] ? trace_hardirqs_on+0x37/0xe0 [ 24.098567] ? kasan_bitops_generic+0x93/0x1c0 [ 24.099224] kasan_bitops_generic+0x122/0x1c0 [ 24.099964] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 24.100563] ? __pfx_read_tsc+0x10/0x10 [ 24.101260] ? ktime_get_ts64+0x84/0x230 [ 24.101658] kunit_try_run_case+0x1b3/0x490 [ 24.102056] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.102466] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 24.103425] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.104126] ? __kthread_parkme+0x82/0x160 [ 24.104793] ? preempt_count_sub+0x50/0x80 [ 24.105103] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.105873] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.106405] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.107344] kthread+0x257/0x310 [ 24.107996] ? __pfx_kthread+0x10/0x10 [ 24.108533] ret_from_fork+0x41/0x80 [ 24.109149] ? __pfx_kthread+0x10/0x10 [ 24.109501] ret_from_fork_asm+0x1a/0x30 [ 24.110111] </TASK> [ 24.110403] [ 24.110976] Allocated by task 268: [ 24.111326] kasan_save_stack+0x3d/0x60 [ 24.112158] kasan_save_track+0x18/0x40 [ 24.112536] kasan_save_alloc_info+0x3b/0x50 [ 24.113172] __kasan_kmalloc+0xb7/0xc0 [ 24.113609] __kmalloc_cache_noprof+0x184/0x410 [ 24.114215] kasan_bitops_generic+0x93/0x1c0 [ 24.114672] kunit_try_run_case+0x1b3/0x490 [ 24.115346] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.115669] kthread+0x257/0x310 [ 24.116343] ret_from_fork+0x41/0x80 [ 24.116823] ret_from_fork_asm+0x1a/0x30 [ 24.117192] [ 24.117418] The buggy address belongs to the object at ffff8881028a7080 [ 24.117418] which belongs to the cache kmalloc-16 of size 16 [ 24.118148] The buggy address is located 8 bytes inside of [ 24.118148] allocated 9-byte region [ffff8881028a7080, ffff8881028a7089) [ 24.119241] [ 24.119506] The buggy address belongs to the physical page: [ 24.119865] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028a7 [ 24.120443] flags: 0x200000000000000(node=0|zone=2) [ 24.120931] page_type: f5(slab) [ 24.121392] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 24.122024] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 24.122416] page dumped because: kasan: bad access detected [ 24.122946] [ 24.123237] Memory state around the buggy address: [ 24.123664] ffff8881028a6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.124178] ffff8881028a7000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.124979] >ffff8881028a7080: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.125419] ^ [ 24.125832] ffff8881028a7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.126400] ffff8881028a7180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.126789] ================================================================== [ 24.041734] ================================================================== [ 24.042325] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x102/0xd90 [ 24.044531] Write of size 8 at addr ffff8881028a7088 by task kunit_try_catch/268 [ 24.045172] [ 24.045428] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 24.046259] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.046633] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.047216] Call Trace: [ 24.047551] <TASK> [ 24.048399] dump_stack_lvl+0x73/0xb0 [ 24.048957] print_report+0xd1/0x640 [ 24.049389] ? __virt_addr_valid+0x1db/0x2d0 [ 24.049940] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.050472] kasan_report+0x102/0x140 [ 24.050760] ? kasan_bitops_test_and_modify.constprop.0+0x102/0xd90 [ 24.051414] ? kasan_bitops_test_and_modify.constprop.0+0x102/0xd90 [ 24.052015] kasan_check_range+0x10c/0x1c0 [ 24.052509] __kasan_check_write+0x18/0x20 [ 24.052817] kasan_bitops_test_and_modify.constprop.0+0x102/0xd90 [ 24.053508] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 24.054121] ? __kmalloc_cache_noprof+0x184/0x410 [ 24.054657] ? trace_hardirqs_on+0x37/0xe0 [ 24.055017] ? kasan_bitops_generic+0x93/0x1c0 [ 24.055579] kasan_bitops_generic+0x122/0x1c0 [ 24.056107] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 24.056442] ? __pfx_read_tsc+0x10/0x10 [ 24.056959] ? ktime_get_ts64+0x84/0x230 [ 24.057408] kunit_try_run_case+0x1b3/0x490 [ 24.058080] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.058423] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 24.058937] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.059652] ? __kthread_parkme+0x82/0x160 [ 24.060031] ? preempt_count_sub+0x50/0x80 [ 24.060335] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.060678] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.061275] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.061956] kthread+0x257/0x310 [ 24.062366] ? __pfx_kthread+0x10/0x10 [ 24.062926] ret_from_fork+0x41/0x80 [ 24.063345] ? __pfx_kthread+0x10/0x10 [ 24.063787] ret_from_fork_asm+0x1a/0x30 [ 24.064292] </TASK> [ 24.064599] [ 24.064768] Allocated by task 268: [ 24.065146] kasan_save_stack+0x3d/0x60 [ 24.065578] kasan_save_track+0x18/0x40 [ 24.066011] kasan_save_alloc_info+0x3b/0x50 [ 24.066317] __kasan_kmalloc+0xb7/0xc0 [ 24.066651] __kmalloc_cache_noprof+0x184/0x410 [ 24.067117] kasan_bitops_generic+0x93/0x1c0 [ 24.067646] kunit_try_run_case+0x1b3/0x490 [ 24.068136] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.068545] kthread+0x257/0x310 [ 24.068799] ret_from_fork+0x41/0x80 [ 24.069054] ret_from_fork_asm+0x1a/0x30 [ 24.069469] [ 24.069806] The buggy address belongs to the object at ffff8881028a7080 [ 24.069806] which belongs to the cache kmalloc-16 of size 16 [ 24.072126] The buggy address is located 8 bytes inside of [ 24.072126] allocated 9-byte region [ffff8881028a7080, ffff8881028a7089) [ 24.072996] [ 24.073223] The buggy address belongs to the physical page: [ 24.073914] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028a7 [ 24.075716] flags: 0x200000000000000(node=0|zone=2) [ 24.076458] page_type: f5(slab) [ 24.076935] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 24.077408] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 24.077958] page dumped because: kasan: bad access detected [ 24.078423] [ 24.078731] Memory state around the buggy address: [ 24.079094] ffff8881028a6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.079781] ffff8881028a7000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.080225] >ffff8881028a7080: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.080786] ^ [ 24.081025] ffff8881028a7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.081682] ffff8881028a7180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.082239] ================================================================== [ 24.172900] ================================================================== [ 24.173352] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90 [ 24.174919] Write of size 8 at addr ffff8881028a7088 by task kunit_try_catch/268 [ 24.175884] [ 24.176205] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 24.177562] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.177979] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.178830] Call Trace: [ 24.179052] <TASK> [ 24.179324] dump_stack_lvl+0x73/0xb0 [ 24.179787] print_report+0xd1/0x640 [ 24.180197] ? __virt_addr_valid+0x1db/0x2d0 [ 24.180551] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.181163] kasan_report+0x102/0x140 [ 24.181465] ? kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90 [ 24.182078] ? kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90 [ 24.182676] kasan_check_range+0x10c/0x1c0 [ 24.183142] __kasan_check_write+0x18/0x20 [ 24.183553] kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90 [ 24.184189] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 24.184693] ? __kmalloc_cache_noprof+0x184/0x410 [ 24.185179] ? trace_hardirqs_on+0x37/0xe0 [ 24.185608] ? kasan_bitops_generic+0x93/0x1c0 [ 24.186100] kasan_bitops_generic+0x122/0x1c0 [ 24.186620] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 24.187043] ? __pfx_read_tsc+0x10/0x10 [ 24.187323] ? ktime_get_ts64+0x84/0x230 [ 24.187833] kunit_try_run_case+0x1b3/0x490 [ 24.188298] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.188843] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 24.189235] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.189652] ? __kthread_parkme+0x82/0x160 [ 24.190114] ? preempt_count_sub+0x50/0x80 [ 24.190559] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.190984] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.191529] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.191922] kthread+0x257/0x310 [ 24.192191] ? __pfx_kthread+0x10/0x10 [ 24.192673] ret_from_fork+0x41/0x80 [ 24.193081] ? __pfx_kthread+0x10/0x10 [ 24.193524] ret_from_fork_asm+0x1a/0x30 [ 24.194025] </TASK> [ 24.194309] [ 24.194546] Allocated by task 268: [ 24.194950] kasan_save_stack+0x3d/0x60 [ 24.195395] kasan_save_track+0x18/0x40 [ 24.196684] kasan_save_alloc_info+0x3b/0x50 [ 24.197039] __kasan_kmalloc+0xb7/0xc0 [ 24.197303] __kmalloc_cache_noprof+0x184/0x410 [ 24.197762] kasan_bitops_generic+0x93/0x1c0 [ 24.198204] kunit_try_run_case+0x1b3/0x490 [ 24.198685] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.199193] kthread+0x257/0x310 [ 24.199622] ret_from_fork+0x41/0x80 [ 24.200022] ret_from_fork_asm+0x1a/0x30 [ 24.200332] [ 24.200512] The buggy address belongs to the object at ffff8881028a7080 [ 24.200512] which belongs to the cache kmalloc-16 of size 16 [ 24.201480] The buggy address is located 8 bytes inside of [ 24.201480] allocated 9-byte region [ffff8881028a7080, ffff8881028a7089) [ 24.202116] [ 24.202281] The buggy address belongs to the physical page: [ 24.202694] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028a7 [ 24.203380] flags: 0x200000000000000(node=0|zone=2) [ 24.203929] page_type: f5(slab) [ 24.204285] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 24.205021] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 24.205775] page dumped because: kasan: bad access detected [ 24.206285] [ 24.206527] Memory state around the buggy address: [ 24.206969] ffff8881028a6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.207402] ffff8881028a7000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.207996] >ffff8881028a7080: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.208357] ^ [ 24.208739] ffff8881028a7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.209377] ffff8881028a7180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.210056] ================================================================== [ 24.335861] ================================================================== [ 24.337569] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x558/0xd90 [ 24.338408] Read of size 8 at addr ffff8881028a7088 by task kunit_try_catch/268 [ 24.338912] [ 24.339193] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 24.340048] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.340465] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.341091] Call Trace: [ 24.341448] <TASK> [ 24.341785] dump_stack_lvl+0x73/0xb0 [ 24.342244] print_report+0xd1/0x640 [ 24.342554] ? __virt_addr_valid+0x1db/0x2d0 [ 24.343118] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.343737] kasan_report+0x102/0x140 [ 24.344126] ? kasan_bitops_test_and_modify.constprop.0+0x558/0xd90 [ 24.344875] ? kasan_bitops_test_and_modify.constprop.0+0x558/0xd90 [ 24.345539] kasan_check_range+0x10c/0x1c0 [ 24.346889] __kasan_check_read+0x15/0x20 [ 24.347317] kasan_bitops_test_and_modify.constprop.0+0x558/0xd90 [ 24.347997] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 24.348415] ? __kmalloc_cache_noprof+0x184/0x410 [ 24.349007] ? trace_hardirqs_on+0x37/0xe0 [ 24.349467] ? kasan_bitops_generic+0x93/0x1c0 [ 24.350065] kasan_bitops_generic+0x122/0x1c0 [ 24.350398] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 24.351353] ? __pfx_read_tsc+0x10/0x10 [ 24.352369] ? ktime_get_ts64+0x84/0x230 [ 24.353216] kunit_try_run_case+0x1b3/0x490 [ 24.353881] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.354380] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 24.355178] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.355671] ? __kthread_parkme+0x82/0x160 [ 24.356415] ? preempt_count_sub+0x50/0x80 [ 24.357078] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.357607] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.358436] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.359173] kthread+0x257/0x310 [ 24.359577] ? __pfx_kthread+0x10/0x10 [ 24.360221] ret_from_fork+0x41/0x80 [ 24.360944] ? __pfx_kthread+0x10/0x10 [ 24.361604] ret_from_fork_asm+0x1a/0x30 [ 24.362091] </TASK> [ 24.362669] [ 24.362825] Allocated by task 268: [ 24.363193] kasan_save_stack+0x3d/0x60 [ 24.363997] kasan_save_track+0x18/0x40 [ 24.364365] kasan_save_alloc_info+0x3b/0x50 [ 24.364927] __kasan_kmalloc+0xb7/0xc0 [ 24.365280] __kmalloc_cache_noprof+0x184/0x410 [ 24.366420] kasan_bitops_generic+0x93/0x1c0 [ 24.366982] kunit_try_run_case+0x1b3/0x490 [ 24.367897] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.368458] kthread+0x257/0x310 [ 24.369178] ret_from_fork+0x41/0x80 [ 24.369560] ret_from_fork_asm+0x1a/0x30 [ 24.370455] [ 24.370954] The buggy address belongs to the object at ffff8881028a7080 [ 24.370954] which belongs to the cache kmalloc-16 of size 16 [ 24.372092] The buggy address is located 8 bytes inside of [ 24.372092] allocated 9-byte region [ffff8881028a7080, ffff8881028a7089) [ 24.373447] [ 24.373783] The buggy address belongs to the physical page: [ 24.374749] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028a7 [ 24.375428] flags: 0x200000000000000(node=0|zone=2) [ 24.376202] page_type: f5(slab) [ 24.376625] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 24.377547] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 24.378180] page dumped because: kasan: bad access detected [ 24.379043] [ 24.379263] Memory state around the buggy address: [ 24.380128] ffff8881028a6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.380666] ffff8881028a7000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.381538] >ffff8881028a7080: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.382217] ^ [ 24.382551] ffff8881028a7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.383288] ffff8881028a7180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.384051] ================================================================== [ 24.212438] ================================================================== [ 24.213318] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90 [ 24.214127] Write of size 8 at addr ffff8881028a7088 by task kunit_try_catch/268 [ 24.214757] [ 24.214959] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 24.215610] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.215877] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.216709] Call Trace: [ 24.217021] <TASK> [ 24.217305] dump_stack_lvl+0x73/0xb0 [ 24.217694] print_report+0xd1/0x640 [ 24.218131] ? __virt_addr_valid+0x1db/0x2d0 [ 24.218553] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.218946] kasan_report+0x102/0x140 [ 24.219217] ? kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90 [ 24.219662] ? kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90 [ 24.220252] kasan_check_range+0x10c/0x1c0 [ 24.220765] __kasan_check_write+0x18/0x20 [ 24.221204] kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90 [ 24.221863] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 24.222524] ? __kmalloc_cache_noprof+0x184/0x410 [ 24.223051] ? trace_hardirqs_on+0x37/0xe0 [ 24.223498] ? kasan_bitops_generic+0x93/0x1c0 [ 24.223889] kasan_bitops_generic+0x122/0x1c0 [ 24.224202] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 24.224745] ? __pfx_read_tsc+0x10/0x10 [ 24.225162] ? ktime_get_ts64+0x84/0x230 [ 24.225713] kunit_try_run_case+0x1b3/0x490 [ 24.226191] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.226791] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 24.227274] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.227750] ? __kthread_parkme+0x82/0x160 [ 24.228045] ? preempt_count_sub+0x50/0x80 [ 24.228342] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.230196] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.231090] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.231961] kthread+0x257/0x310 [ 24.232350] ? __pfx_kthread+0x10/0x10 [ 24.233147] ret_from_fork+0x41/0x80 [ 24.233601] ? __pfx_kthread+0x10/0x10 [ 24.234016] ret_from_fork_asm+0x1a/0x30 [ 24.234531] </TASK> [ 24.234850] [ 24.235065] Allocated by task 268: [ 24.235333] kasan_save_stack+0x3d/0x60 [ 24.235810] kasan_save_track+0x18/0x40 [ 24.236233] kasan_save_alloc_info+0x3b/0x50 [ 24.236757] __kasan_kmalloc+0xb7/0xc0 [ 24.237082] __kmalloc_cache_noprof+0x184/0x410 [ 24.237394] kasan_bitops_generic+0x93/0x1c0 [ 24.237891] kunit_try_run_case+0x1b3/0x490 [ 24.238346] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.238834] kthread+0x257/0x310 [ 24.239187] ret_from_fork+0x41/0x80 [ 24.239626] ret_from_fork_asm+0x1a/0x30 [ 24.240062] [ 24.240270] The buggy address belongs to the object at ffff8881028a7080 [ 24.240270] which belongs to the cache kmalloc-16 of size 16 [ 24.241027] The buggy address is located 8 bytes inside of [ 24.241027] allocated 9-byte region [ffff8881028a7080, ffff8881028a7089) [ 24.241852] [ 24.242080] The buggy address belongs to the physical page: [ 24.242642] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028a7 [ 24.243069] flags: 0x200000000000000(node=0|zone=2) [ 24.243566] page_type: f5(slab) [ 24.243971] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 24.244380] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 24.244840] page dumped because: kasan: bad access detected [ 24.245147] [ 24.245351] Memory state around the buggy address: [ 24.245881] ffff8881028a6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.246541] ffff8881028a7000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.247214] >ffff8881028a7080: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.247897] ^ [ 24.248253] ffff8881028a7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.248786] ffff8881028a7180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.249404] ================================================================== [ 24.127817] ================================================================== [ 24.130371] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90 [ 24.130920] Write of size 8 at addr ffff8881028a7088 by task kunit_try_catch/268 [ 24.131610] [ 24.131814] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 24.133662] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.134102] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.134874] Call Trace: [ 24.135127] <TASK> [ 24.135378] dump_stack_lvl+0x73/0xb0 [ 24.136742] print_report+0xd1/0x640 [ 24.137389] ? __virt_addr_valid+0x1db/0x2d0 [ 24.137979] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.138479] kasan_report+0x102/0x140 [ 24.138924] ? kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90 [ 24.139313] ? kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90 [ 24.140010] kasan_check_range+0x10c/0x1c0 [ 24.140569] __kasan_check_write+0x18/0x20 [ 24.140998] kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90 [ 24.141707] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 24.142266] ? __kmalloc_cache_noprof+0x184/0x410 [ 24.142986] ? trace_hardirqs_on+0x37/0xe0 [ 24.143567] ? kasan_bitops_generic+0x93/0x1c0 [ 24.144026] kasan_bitops_generic+0x122/0x1c0 [ 24.144432] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 24.144962] ? __pfx_read_tsc+0x10/0x10 [ 24.145369] ? ktime_get_ts64+0x84/0x230 [ 24.145832] kunit_try_run_case+0x1b3/0x490 [ 24.146393] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.146923] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 24.147414] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.148021] ? __kthread_parkme+0x82/0x160 [ 24.148542] ? preempt_count_sub+0x50/0x80 [ 24.148942] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.149425] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.150095] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.150744] kthread+0x257/0x310 [ 24.151071] ? __pfx_kthread+0x10/0x10 [ 24.151471] ret_from_fork+0x41/0x80 [ 24.151950] ? __pfx_kthread+0x10/0x10 [ 24.152374] ret_from_fork_asm+0x1a/0x30 [ 24.152847] </TASK> [ 24.153038] [ 24.153249] Allocated by task 268: [ 24.153716] kasan_save_stack+0x3d/0x60 [ 24.154182] kasan_save_track+0x18/0x40 [ 24.154547] kasan_save_alloc_info+0x3b/0x50 [ 24.154999] __kasan_kmalloc+0xb7/0xc0 [ 24.155423] __kmalloc_cache_noprof+0x184/0x410 [ 24.155969] kasan_bitops_generic+0x93/0x1c0 [ 24.156430] kunit_try_run_case+0x1b3/0x490 [ 24.156947] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.157476] kthread+0x257/0x310 [ 24.157942] ret_from_fork+0x41/0x80 [ 24.158355] ret_from_fork_asm+0x1a/0x30 [ 24.158884] [ 24.159054] The buggy address belongs to the object at ffff8881028a7080 [ 24.159054] which belongs to the cache kmalloc-16 of size 16 [ 24.159765] The buggy address is located 8 bytes inside of [ 24.159765] allocated 9-byte region [ffff8881028a7080, ffff8881028a7089) [ 24.160814] [ 24.161045] The buggy address belongs to the physical page: [ 24.161570] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028a7 [ 24.162274] flags: 0x200000000000000(node=0|zone=2) [ 24.162863] page_type: f5(slab) [ 24.163100] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 24.163878] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 24.164383] page dumped because: kasan: bad access detected [ 24.165720] [ 24.165934] Memory state around the buggy address: [ 24.166397] ffff8881028a6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.167044] ffff8881028a7000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.168358] >ffff8881028a7080: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.169329] ^ [ 24.169715] ffff8881028a7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.170342] ffff8881028a7180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.170967] ================================================================== [ 24.386983] ================================================================== [ 24.387637] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90 [ 24.388595] Read of size 8 at addr ffff8881028a7088 by task kunit_try_catch/268 [ 24.389444] [ 24.389748] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 24.390838] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.391144] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.391976] Call Trace: [ 24.392327] <TASK> [ 24.392570] dump_stack_lvl+0x73/0xb0 [ 24.393093] print_report+0xd1/0x640 [ 24.393552] ? __virt_addr_valid+0x1db/0x2d0 [ 24.393867] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.394580] kasan_report+0x102/0x140 [ 24.395003] ? kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90 [ 24.395715] ? kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90 [ 24.396713] __asan_report_load8_noabort+0x18/0x20 [ 24.397264] kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90 [ 24.398019] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 24.398661] ? __kmalloc_cache_noprof+0x184/0x410 [ 24.399104] ? trace_hardirqs_on+0x37/0xe0 [ 24.399521] ? kasan_bitops_generic+0x93/0x1c0 [ 24.400021] kasan_bitops_generic+0x122/0x1c0 [ 24.400460] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 24.400979] ? __pfx_read_tsc+0x10/0x10 [ 24.401367] ? ktime_get_ts64+0x84/0x230 [ 24.401833] kunit_try_run_case+0x1b3/0x490 [ 24.402302] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.402797] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 24.403114] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.403427] ? __kthread_parkme+0x82/0x160 [ 24.403928] ? preempt_count_sub+0x50/0x80 [ 24.404423] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.405079] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.405751] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.406346] kthread+0x257/0x310 [ 24.406841] ? __pfx_kthread+0x10/0x10 [ 24.407170] ret_from_fork+0x41/0x80 [ 24.407695] ? __pfx_kthread+0x10/0x10 [ 24.408090] ret_from_fork_asm+0x1a/0x30 [ 24.408404] </TASK> [ 24.408662] [ 24.408819] Allocated by task 268: [ 24.409171] kasan_save_stack+0x3d/0x60 [ 24.409738] kasan_save_track+0x18/0x40 [ 24.410211] kasan_save_alloc_info+0x3b/0x50 [ 24.410794] __kasan_kmalloc+0xb7/0xc0 [ 24.411211] __kmalloc_cache_noprof+0x184/0x410 [ 24.411779] kasan_bitops_generic+0x93/0x1c0 [ 24.412271] kunit_try_run_case+0x1b3/0x490 [ 24.412695] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.413191] kthread+0x257/0x310 [ 24.413642] ret_from_fork+0x41/0x80 [ 24.414057] ret_from_fork_asm+0x1a/0x30 [ 24.414502] [ 24.414730] The buggy address belongs to the object at ffff8881028a7080 [ 24.414730] which belongs to the cache kmalloc-16 of size 16 [ 24.415461] The buggy address is located 8 bytes inside of [ 24.415461] allocated 9-byte region [ffff8881028a7080, ffff8881028a7089) [ 24.416694] [ 24.416909] The buggy address belongs to the physical page: [ 24.417211] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028a7 [ 24.417672] flags: 0x200000000000000(node=0|zone=2) [ 24.418001] page_type: f5(slab) [ 24.418412] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 24.419131] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 24.420650] page dumped because: kasan: bad access detected [ 24.421185] [ 24.421410] Memory state around the buggy address: [ 24.422004] ffff8881028a6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.422718] ffff8881028a7000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.423336] >ffff8881028a7080: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.423774] ^ [ 24.424015] ffff8881028a7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.424477] ffff8881028a7180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.425343] ==================================================================