Date
Nov. 27, 2024, 3:37 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 51.346870] ================================================================== [ 51.347783] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa88/0xbc8 [ 51.348693] Read of size 8 at addr fff00000c5f55328 by task kunit_try_catch/250 [ 51.349646] [ 51.349972] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 51.351239] Tainted: [B]=BAD_PAGE, [N]=TEST [ 51.351891] Hardware name: linux,dummy-virt (DT) [ 51.352428] Call trace: [ 51.352963] show_stack+0x20/0x38 (C) [ 51.353506] dump_stack_lvl+0x8c/0xd0 [ 51.354167] print_report+0x118/0x5e0 [ 51.354781] kasan_report+0xc8/0x118 [ 51.355472] __asan_report_load8_noabort+0x20/0x30 [ 51.356503] kasan_bitops_modify.constprop.0+0xa88/0xbc8 [ 51.357691] kasan_bitops_generic+0x110/0x1c8 [ 51.358481] kunit_try_run_case+0x14c/0x3d0 [ 51.359029] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.359936] kthread+0x24c/0x2d0 [ 51.360612] ret_from_fork+0x10/0x20 [ 51.361135] [ 51.361461] Allocated by task 250: [ 51.361900] kasan_save_stack+0x3c/0x68 [ 51.362592] kasan_save_track+0x20/0x40 [ 51.363137] kasan_save_alloc_info+0x40/0x58 [ 51.363810] __kasan_kmalloc+0xd4/0xd8 [ 51.364271] __kmalloc_cache_noprof+0x15c/0x3c0 [ 51.365015] kasan_bitops_generic+0xa0/0x1c8 [ 51.365673] kunit_try_run_case+0x14c/0x3d0 [ 51.366352] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.367028] kthread+0x24c/0x2d0 [ 51.367656] ret_from_fork+0x10/0x20 [ 51.368126] [ 51.368524] The buggy address belongs to the object at fff00000c5f55320 [ 51.368524] which belongs to the cache kmalloc-16 of size 16 [ 51.369915] The buggy address is located 8 bytes inside of [ 51.369915] allocated 9-byte region [fff00000c5f55320, fff00000c5f55329) [ 51.371307] [ 51.371638] The buggy address belongs to the physical page: [ 51.372311] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f55 [ 51.373358] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 51.374134] page_type: f5(slab) [ 51.374640] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 51.375495] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 51.376484] page dumped because: kasan: bad access detected [ 51.377111] [ 51.377449] Memory state around the buggy address: [ 51.377990] fff00000c5f55200: 00 05 fc fc fa fb fc fc 00 02 fc fc fa fb fc fc [ 51.378947] fff00000c5f55280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 51.379753] >fff00000c5f55300: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 51.380613] ^ [ 51.381151] fff00000c5f55380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.382048] fff00000c5f55400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.382943] ================================================================== [ 51.232184] ================================================================== [ 51.233400] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc8 [ 51.234274] Write of size 8 at addr fff00000c5f55328 by task kunit_try_catch/250 [ 51.235188] [ 51.235630] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 51.236790] Tainted: [B]=BAD_PAGE, [N]=TEST [ 51.237349] Hardware name: linux,dummy-virt (DT) [ 51.238146] Call trace: [ 51.238694] show_stack+0x20/0x38 (C) [ 51.239241] dump_stack_lvl+0x8c/0xd0 [ 51.239854] print_report+0x118/0x5e0 [ 51.240526] kasan_report+0xc8/0x118 [ 51.241085] kasan_check_range+0x100/0x1a8 [ 51.241764] __kasan_check_write+0x20/0x30 [ 51.242353] kasan_bitops_modify.constprop.0+0x100/0xbc8 [ 51.243195] kasan_bitops_generic+0x110/0x1c8 [ 51.243901] kunit_try_run_case+0x14c/0x3d0 [ 51.244499] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.245272] kthread+0x24c/0x2d0 [ 51.245895] ret_from_fork+0x10/0x20 [ 51.246581] [ 51.246904] Allocated by task 250: [ 51.247586] kasan_save_stack+0x3c/0x68 [ 51.248100] kasan_save_track+0x20/0x40 [ 51.248876] kasan_save_alloc_info+0x40/0x58 [ 51.249445] __kasan_kmalloc+0xd4/0xd8 [ 51.250064] __kmalloc_cache_noprof+0x15c/0x3c0 [ 51.250722] kasan_bitops_generic+0xa0/0x1c8 [ 51.251287] kunit_try_run_case+0x14c/0x3d0 [ 51.251953] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.252619] kthread+0x24c/0x2d0 [ 51.253160] ret_from_fork+0x10/0x20 [ 51.253625] [ 51.254004] The buggy address belongs to the object at fff00000c5f55320 [ 51.254004] which belongs to the cache kmalloc-16 of size 16 [ 51.255512] The buggy address is located 8 bytes inside of [ 51.255512] allocated 9-byte region [fff00000c5f55320, fff00000c5f55329) [ 51.256945] [ 51.257243] The buggy address belongs to the physical page: [ 51.258030] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f55 [ 51.258941] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 51.259821] page_type: f5(slab) [ 51.260416] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 51.261370] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 51.262364] page dumped because: kasan: bad access detected [ 51.263057] [ 51.263361] Memory state around the buggy address: [ 51.263970] fff00000c5f55200: 00 05 fc fc fa fb fc fc 00 02 fc fc fa fb fc fc [ 51.264864] fff00000c5f55280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 51.265698] >fff00000c5f55300: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 51.266611] ^ [ 51.267216] fff00000c5f55380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.268109] fff00000c5f55400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.268982] ================================================================== [ 51.462428] ================================================================== [ 51.463187] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaf4/0xbc8 [ 51.464262] Read of size 8 at addr fff00000c5f55328 by task kunit_try_catch/250 [ 51.466340] [ 51.466747] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 51.467983] Tainted: [B]=BAD_PAGE, [N]=TEST [ 51.468564] Hardware name: linux,dummy-virt (DT) [ 51.469132] Call trace: [ 51.469601] show_stack+0x20/0x38 (C) [ 51.470214] dump_stack_lvl+0x8c/0xd0 [ 51.470831] print_report+0x118/0x5e0 [ 51.471412] kasan_report+0xc8/0x118 [ 51.471967] __asan_report_load8_noabort+0x20/0x30 [ 51.472618] kasan_bitops_modify.constprop.0+0xaf4/0xbc8 [ 51.473329] kasan_bitops_generic+0x110/0x1c8 [ 51.474005] kunit_try_run_case+0x14c/0x3d0 [ 51.474680] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.475370] kthread+0x24c/0x2d0 [ 51.475983] ret_from_fork+0x10/0x20 [ 51.476547] [ 51.476926] Allocated by task 250: [ 51.477511] kasan_save_stack+0x3c/0x68 [ 51.478130] kasan_save_track+0x20/0x40 [ 51.478755] kasan_save_alloc_info+0x40/0x58 [ 51.479265] __kasan_kmalloc+0xd4/0xd8 [ 51.479905] __kmalloc_cache_noprof+0x15c/0x3c0 [ 51.480543] kasan_bitops_generic+0xa0/0x1c8 [ 51.481234] kunit_try_run_case+0x14c/0x3d0 [ 51.481855] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.482680] kthread+0x24c/0x2d0 [ 51.483236] ret_from_fork+0x10/0x20 [ 51.483850] [ 51.484161] The buggy address belongs to the object at fff00000c5f55320 [ 51.484161] which belongs to the cache kmalloc-16 of size 16 [ 51.485485] The buggy address is located 8 bytes inside of [ 51.485485] allocated 9-byte region [fff00000c5f55320, fff00000c5f55329) [ 51.486831] [ 51.487151] The buggy address belongs to the physical page: [ 51.487740] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f55 [ 51.488857] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 51.489758] page_type: f5(slab) [ 51.490330] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 51.491213] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 51.492191] page dumped because: kasan: bad access detected [ 51.492833] [ 51.493175] Memory state around the buggy address: [ 51.493755] fff00000c5f55200: 00 05 fc fc fa fb fc fc 00 02 fc fc fa fb fc fc [ 51.494632] fff00000c5f55280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 51.495475] >fff00000c5f55300: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 51.496398] ^ [ 51.496968] fff00000c5f55380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.497887] fff00000c5f55400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.498765] ================================================================== [ 51.584032] ================================================================== [ 51.585445] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa28/0xbc8 [ 51.586376] Read of size 8 at addr fff00000c5f55328 by task kunit_try_catch/250 [ 51.587222] [ 51.588655] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 51.590127] Tainted: [B]=BAD_PAGE, [N]=TEST [ 51.590883] Hardware name: linux,dummy-virt (DT) [ 51.591514] Call trace: [ 51.591904] show_stack+0x20/0x38 (C) [ 51.592611] dump_stack_lvl+0x8c/0xd0 [ 51.593228] print_report+0x118/0x5e0 [ 51.593863] kasan_report+0xc8/0x118 [ 51.594471] __asan_report_load8_noabort+0x20/0x30 [ 51.595115] kasan_bitops_modify.constprop.0+0xa28/0xbc8 [ 51.595898] kasan_bitops_generic+0x110/0x1c8 [ 51.596595] kunit_try_run_case+0x14c/0x3d0 [ 51.597272] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.598055] kthread+0x24c/0x2d0 [ 51.598679] ret_from_fork+0x10/0x20 [ 51.599735] [ 51.599998] Allocated by task 250: [ 51.600851] kasan_save_stack+0x3c/0x68 [ 51.601503] kasan_save_track+0x20/0x40 [ 51.602043] kasan_save_alloc_info+0x40/0x58 [ 51.602490] __kasan_kmalloc+0xd4/0xd8 [ 51.603010] __kmalloc_cache_noprof+0x15c/0x3c0 [ 51.603597] kasan_bitops_generic+0xa0/0x1c8 [ 51.604098] kunit_try_run_case+0x14c/0x3d0 [ 51.604885] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.605595] kthread+0x24c/0x2d0 [ 51.606113] ret_from_fork+0x10/0x20 [ 51.606723] [ 51.607055] The buggy address belongs to the object at fff00000c5f55320 [ 51.607055] which belongs to the cache kmalloc-16 of size 16 [ 51.608539] The buggy address is located 8 bytes inside of [ 51.608539] allocated 9-byte region [fff00000c5f55320, fff00000c5f55329) [ 51.609843] [ 51.610133] The buggy address belongs to the physical page: [ 51.610929] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f55 [ 51.611859] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 51.612630] page_type: f5(slab) [ 51.613177] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 51.614118] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 51.614890] page dumped because: kasan: bad access detected [ 51.615549] [ 51.615896] Memory state around the buggy address: [ 51.616527] fff00000c5f55200: 00 05 fc fc fa fb fc fc 00 02 fc fc fa fb fc fc [ 51.617461] fff00000c5f55280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 51.618388] >fff00000c5f55300: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 51.619212] ^ [ 51.619893] fff00000c5f55380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.620711] fff00000c5f55400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.621670] ================================================================== [ 51.270566] ================================================================== [ 51.272236] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa4c/0xbc8 [ 51.273122] Read of size 8 at addr fff00000c5f55328 by task kunit_try_catch/250 [ 51.274015] [ 51.274387] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 51.275542] Tainted: [B]=BAD_PAGE, [N]=TEST [ 51.276008] Hardware name: linux,dummy-virt (DT) [ 51.276682] Call trace: [ 51.277030] show_stack+0x20/0x38 (C) [ 51.277649] dump_stack_lvl+0x8c/0xd0 [ 51.278319] print_report+0x118/0x5e0 [ 51.278860] kasan_report+0xc8/0x118 [ 51.279393] __asan_report_load8_noabort+0x20/0x30 [ 51.280157] kasan_bitops_modify.constprop.0+0xa4c/0xbc8 [ 51.280866] kasan_bitops_generic+0x110/0x1c8 [ 51.281452] kunit_try_run_case+0x14c/0x3d0 [ 51.282023] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.282876] kthread+0x24c/0x2d0 [ 51.283374] ret_from_fork+0x10/0x20 [ 51.283992] [ 51.284319] Allocated by task 250: [ 51.284824] kasan_save_stack+0x3c/0x68 [ 51.285523] kasan_save_track+0x20/0x40 [ 51.286160] kasan_save_alloc_info+0x40/0x58 [ 51.286795] __kasan_kmalloc+0xd4/0xd8 [ 51.287388] __kmalloc_cache_noprof+0x15c/0x3c0 [ 51.287889] kasan_bitops_generic+0xa0/0x1c8 [ 51.288594] kunit_try_run_case+0x14c/0x3d0 [ 51.289078] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.289901] kthread+0x24c/0x2d0 [ 51.290469] ret_from_fork+0x10/0x20 [ 51.291081] [ 51.291470] The buggy address belongs to the object at fff00000c5f55320 [ 51.291470] which belongs to the cache kmalloc-16 of size 16 [ 51.292770] The buggy address is located 8 bytes inside of [ 51.292770] allocated 9-byte region [fff00000c5f55320, fff00000c5f55329) [ 51.294047] [ 51.294397] The buggy address belongs to the physical page: [ 51.295080] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f55 [ 51.295971] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 51.296847] page_type: f5(slab) [ 51.297379] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 51.298236] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 51.299230] page dumped because: kasan: bad access detected [ 51.299950] [ 51.300253] Memory state around the buggy address: [ 51.300862] fff00000c5f55200: 00 05 fc fc fa fb fc fc 00 02 fc fc fa fb fc fc [ 51.301685] fff00000c5f55280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 51.302584] >fff00000c5f55300: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 51.303479] ^ [ 51.304064] fff00000c5f55380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.304938] fff00000c5f55400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.305821] ================================================================== [ 51.422659] ================================================================== [ 51.423605] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc8 [ 51.425283] Write of size 8 at addr fff00000c5f55328 by task kunit_try_catch/250 [ 51.427066] [ 51.427390] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 51.428702] Tainted: [B]=BAD_PAGE, [N]=TEST [ 51.429544] Hardware name: linux,dummy-virt (DT) [ 51.430392] Call trace: [ 51.431232] show_stack+0x20/0x38 (C) [ 51.431822] dump_stack_lvl+0x8c/0xd0 [ 51.432541] print_report+0x118/0x5e0 [ 51.433119] kasan_report+0xc8/0x118 [ 51.433877] kasan_check_range+0x100/0x1a8 [ 51.434565] __kasan_check_write+0x20/0x30 [ 51.435154] kasan_bitops_modify.constprop.0+0x320/0xbc8 [ 51.435876] kasan_bitops_generic+0x110/0x1c8 [ 51.436503] kunit_try_run_case+0x14c/0x3d0 [ 51.437080] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.437832] kthread+0x24c/0x2d0 [ 51.438404] ret_from_fork+0x10/0x20 [ 51.439050] [ 51.439389] Allocated by task 250: [ 51.439868] kasan_save_stack+0x3c/0x68 [ 51.440423] kasan_save_track+0x20/0x40 [ 51.441039] kasan_save_alloc_info+0x40/0x58 [ 51.441660] __kasan_kmalloc+0xd4/0xd8 [ 51.442245] __kmalloc_cache_noprof+0x15c/0x3c0 [ 51.442875] kasan_bitops_generic+0xa0/0x1c8 [ 51.443504] kunit_try_run_case+0x14c/0x3d0 [ 51.444094] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.444820] kthread+0x24c/0x2d0 [ 51.445433] ret_from_fork+0x10/0x20 [ 51.445974] [ 51.446255] The buggy address belongs to the object at fff00000c5f55320 [ 51.446255] which belongs to the cache kmalloc-16 of size 16 [ 51.447766] The buggy address is located 8 bytes inside of [ 51.447766] allocated 9-byte region [fff00000c5f55320, fff00000c5f55329) [ 51.449092] [ 51.449407] The buggy address belongs to the physical page: [ 51.450051] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f55 [ 51.451060] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 51.451852] page_type: f5(slab) [ 51.452352] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 51.453332] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 51.454226] page dumped because: kasan: bad access detected [ 51.454903] [ 51.455243] Memory state around the buggy address: [ 51.455832] fff00000c5f55200: 00 05 fc fc fa fb fc fc 00 02 fc fc fa fb fc fc [ 51.456725] fff00000c5f55280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 51.457582] >fff00000c5f55300: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 51.458519] ^ [ 51.459075] fff00000c5f55380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.459989] fff00000c5f55400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.460877] ================================================================== [ 51.542818] ================================================================== [ 51.543578] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc8 [ 51.544570] Write of size 8 at addr fff00000c5f55328 by task kunit_try_catch/250 [ 51.545404] [ 51.545967] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 51.547453] Tainted: [B]=BAD_PAGE, [N]=TEST [ 51.548020] Hardware name: linux,dummy-virt (DT) [ 51.548673] Call trace: [ 51.549215] show_stack+0x20/0x38 (C) [ 51.549953] dump_stack_lvl+0x8c/0xd0 [ 51.550604] print_report+0x118/0x5e0 [ 51.551235] kasan_report+0xc8/0x118 [ 51.551872] kasan_check_range+0x100/0x1a8 [ 51.552549] __kasan_check_write+0x20/0x30 [ 51.553214] kasan_bitops_modify.constprop.0+0x3b0/0xbc8 [ 51.553996] kasan_bitops_generic+0x110/0x1c8 [ 51.554710] kunit_try_run_case+0x14c/0x3d0 [ 51.555408] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.556187] kthread+0x24c/0x2d0 [ 51.556827] ret_from_fork+0x10/0x20 [ 51.557513] [ 51.557908] Allocated by task 250: [ 51.558478] kasan_save_stack+0x3c/0x68 [ 51.559188] kasan_save_track+0x20/0x40 [ 51.559831] kasan_save_alloc_info+0x40/0x58 [ 51.560564] __kasan_kmalloc+0xd4/0xd8 [ 51.561187] __kmalloc_cache_noprof+0x15c/0x3c0 [ 51.561925] kasan_bitops_generic+0xa0/0x1c8 [ 51.562697] kunit_try_run_case+0x14c/0x3d0 [ 51.563374] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.564228] kthread+0x24c/0x2d0 [ 51.564932] ret_from_fork+0x10/0x20 [ 51.565561] [ 51.565905] The buggy address belongs to the object at fff00000c5f55320 [ 51.565905] which belongs to the cache kmalloc-16 of size 16 [ 51.567381] The buggy address is located 8 bytes inside of [ 51.567381] allocated 9-byte region [fff00000c5f55320, fff00000c5f55329) [ 51.568885] [ 51.569352] The buggy address belongs to the physical page: [ 51.570093] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f55 [ 51.571163] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 51.571992] page_type: f5(slab) [ 51.572536] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 51.573539] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 51.574568] page dumped because: kasan: bad access detected [ 51.575285] [ 51.575652] Memory state around the buggy address: [ 51.576379] fff00000c5f55200: 00 05 fc fc fa fb fc fc 00 02 fc fc fa fb fc fc [ 51.577407] fff00000c5f55280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 51.578521] >fff00000c5f55300: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 51.579575] ^ [ 51.580091] fff00000c5f55380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.580997] fff00000c5f55400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.581794] ================================================================== [ 51.307538] ================================================================== [ 51.308145] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc8 [ 51.310059] Write of size 8 at addr fff00000c5f55328 by task kunit_try_catch/250 [ 51.310767] [ 51.311094] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 51.312375] Tainted: [B]=BAD_PAGE, [N]=TEST [ 51.313212] Hardware name: linux,dummy-virt (DT) [ 51.313776] Call trace: [ 51.314220] show_stack+0x20/0x38 (C) [ 51.314797] dump_stack_lvl+0x8c/0xd0 [ 51.315330] print_report+0x118/0x5e0 [ 51.315970] kasan_report+0xc8/0x118 [ 51.316567] kasan_check_range+0x100/0x1a8 [ 51.317093] __kasan_check_write+0x20/0x30 [ 51.317792] kasan_bitops_modify.constprop.0+0x1dc/0xbc8 [ 51.318473] kasan_bitops_generic+0x110/0x1c8 [ 51.319218] kunit_try_run_case+0x14c/0x3d0 [ 51.319829] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.320608] kthread+0x24c/0x2d0 [ 51.321144] ret_from_fork+0x10/0x20 [ 51.321785] [ 51.322080] Allocated by task 250: [ 51.322698] kasan_save_stack+0x3c/0x68 [ 51.323287] kasan_save_track+0x20/0x40 [ 51.323890] kasan_save_alloc_info+0x40/0x58 [ 51.324518] __kasan_kmalloc+0xd4/0xd8 [ 51.325078] __kmalloc_cache_noprof+0x15c/0x3c0 [ 51.325663] kasan_bitops_generic+0xa0/0x1c8 [ 51.326313] kunit_try_run_case+0x14c/0x3d0 [ 51.326888] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.327631] kthread+0x24c/0x2d0 [ 51.328158] ret_from_fork+0x10/0x20 [ 51.328683] [ 51.329027] The buggy address belongs to the object at fff00000c5f55320 [ 51.329027] which belongs to the cache kmalloc-16 of size 16 [ 51.330514] The buggy address is located 8 bytes inside of [ 51.330514] allocated 9-byte region [fff00000c5f55320, fff00000c5f55329) [ 51.331834] [ 51.332157] The buggy address belongs to the physical page: [ 51.332786] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f55 [ 51.333758] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 51.334611] page_type: f5(slab) [ 51.335189] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 51.336208] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 51.337120] page dumped because: kasan: bad access detected [ 51.337744] [ 51.338031] Memory state around the buggy address: [ 51.338779] fff00000c5f55200: 00 05 fc fc fa fb fc fc 00 02 fc fc fa fb fc fc [ 51.339686] fff00000c5f55280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 51.340526] >fff00000c5f55300: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 51.341355] ^ [ 51.341965] fff00000c5f55380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.342805] fff00000c5f55400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.343671] ================================================================== [ 51.500423] ================================================================== [ 51.502243] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc8 [ 51.503686] Write of size 8 at addr fff00000c5f55328 by task kunit_try_catch/250 [ 51.504605] [ 51.504911] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 51.506218] Tainted: [B]=BAD_PAGE, [N]=TEST [ 51.507002] Hardware name: linux,dummy-virt (DT) [ 51.507733] Call trace: [ 51.508250] show_stack+0x20/0x38 (C) [ 51.508939] dump_stack_lvl+0x8c/0xd0 [ 51.509593] print_report+0x118/0x5e0 [ 51.510158] kasan_report+0xc8/0x118 [ 51.510905] kasan_check_range+0x100/0x1a8 [ 51.511635] __kasan_check_write+0x20/0x30 [ 51.512282] kasan_bitops_modify.constprop.0+0x344/0xbc8 [ 51.513124] kasan_bitops_generic+0x110/0x1c8 [ 51.513890] kunit_try_run_case+0x14c/0x3d0 [ 51.514680] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.515468] kthread+0x24c/0x2d0 [ 51.516071] ret_from_fork+0x10/0x20 [ 51.516682] [ 51.517030] Allocated by task 250: [ 51.517710] kasan_save_stack+0x3c/0x68 [ 51.518325] kasan_save_track+0x20/0x40 [ 51.518985] kasan_save_alloc_info+0x40/0x58 [ 51.519692] __kasan_kmalloc+0xd4/0xd8 [ 51.520399] __kmalloc_cache_noprof+0x15c/0x3c0 [ 51.521066] kasan_bitops_generic+0xa0/0x1c8 [ 51.521732] kunit_try_run_case+0x14c/0x3d0 [ 51.522412] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.523138] kthread+0x24c/0x2d0 [ 51.523691] ret_from_fork+0x10/0x20 [ 51.524362] [ 51.524775] The buggy address belongs to the object at fff00000c5f55320 [ 51.524775] which belongs to the cache kmalloc-16 of size 16 [ 51.526263] The buggy address is located 8 bytes inside of [ 51.526263] allocated 9-byte region [fff00000c5f55320, fff00000c5f55329) [ 51.527810] [ 51.528150] The buggy address belongs to the physical page: [ 51.528960] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f55 [ 51.529995] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 51.530873] page_type: f5(slab) [ 51.531422] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 51.532428] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 51.533410] page dumped because: kasan: bad access detected [ 51.534158] [ 51.534632] Memory state around the buggy address: [ 51.535250] fff00000c5f55200: 00 05 fc fc fa fb fc fc 00 02 fc fc fa fb fc fc [ 51.536271] fff00000c5f55280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 51.537143] >fff00000c5f55300: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 51.538030] ^ [ 51.538761] fff00000c5f55380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.539674] fff00000c5f55400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.540640] ================================================================== [ 51.385004] ================================================================== [ 51.385711] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc8 [ 51.387047] Write of size 8 at addr fff00000c5f55328 by task kunit_try_catch/250 [ 51.388123] [ 51.388450] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 51.389822] Tainted: [B]=BAD_PAGE, [N]=TEST [ 51.390268] Hardware name: linux,dummy-virt (DT) [ 51.390963] Call trace: [ 51.391383] show_stack+0x20/0x38 (C) [ 51.392093] dump_stack_lvl+0x8c/0xd0 [ 51.392872] print_report+0x118/0x5e0 [ 51.393430] kasan_report+0xc8/0x118 [ 51.394056] kasan_check_range+0x100/0x1a8 [ 51.394849] __kasan_check_write+0x20/0x30 [ 51.395418] kasan_bitops_modify.constprop.0+0x2b4/0xbc8 [ 51.396146] kasan_bitops_generic+0x110/0x1c8 [ 51.396799] kunit_try_run_case+0x14c/0x3d0 [ 51.397389] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.398140] kthread+0x24c/0x2d0 [ 51.398751] ret_from_fork+0x10/0x20 [ 51.399314] [ 51.399612] Allocated by task 250: [ 51.400146] kasan_save_stack+0x3c/0x68 [ 51.400787] kasan_save_track+0x20/0x40 [ 51.401417] kasan_save_alloc_info+0x40/0x58 [ 51.402016] __kasan_kmalloc+0xd4/0xd8 [ 51.402610] __kmalloc_cache_noprof+0x15c/0x3c0 [ 51.403175] kasan_bitops_generic+0xa0/0x1c8 [ 51.403856] kunit_try_run_case+0x14c/0x3d0 [ 51.404473] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.405094] kthread+0x24c/0x2d0 [ 51.405710] ret_from_fork+0x10/0x20 [ 51.406251] [ 51.406662] The buggy address belongs to the object at fff00000c5f55320 [ 51.406662] which belongs to the cache kmalloc-16 of size 16 [ 51.407956] The buggy address is located 8 bytes inside of [ 51.407956] allocated 9-byte region [fff00000c5f55320, fff00000c5f55329) [ 51.409278] [ 51.409633] The buggy address belongs to the physical page: [ 51.410396] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f55 [ 51.411233] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 51.412095] page_type: f5(slab) [ 51.412701] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 51.413636] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 51.414593] page dumped because: kasan: bad access detected [ 51.415255] [ 51.415559] Memory state around the buggy address: [ 51.416130] fff00000c5f55200: 00 05 fc fc fa fb fc fc 00 02 fc fc fa fb fc fc [ 51.417040] fff00000c5f55280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 51.417802] >fff00000c5f55300: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 51.418698] ^ [ 51.419307] fff00000c5f55380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.420185] fff00000c5f55400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.421106] ==================================================================
[ 28.903550] ================================================================== [ 28.904841] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40f/0xd50 [ 28.906030] Write of size 8 at addr ffff888102699d88 by task kunit_try_catch/269 [ 28.907713] [ 28.908425] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 28.910193] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.911485] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.912257] Call Trace: [ 28.912568] <TASK> [ 28.912782] dump_stack_lvl+0x73/0xb0 [ 28.913220] print_report+0xd1/0x640 [ 28.914381] ? __virt_addr_valid+0x1db/0x2d0 [ 28.914622] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.914856] kasan_report+0x102/0x140 [ 28.915266] ? kasan_bitops_modify.constprop.0+0x40f/0xd50 [ 28.916620] ? kasan_bitops_modify.constprop.0+0x40f/0xd50 [ 28.917693] kasan_check_range+0x10c/0x1c0 [ 28.918601] __kasan_check_write+0x18/0x20 [ 28.919404] kasan_bitops_modify.constprop.0+0x40f/0xd50 [ 28.919891] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 28.920853] ? __kmalloc_cache_noprof+0x184/0x410 [ 28.921475] ? kasan_bitops_generic+0x93/0x1c0 [ 28.922530] kasan_bitops_generic+0x117/0x1c0 [ 28.922980] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 28.923734] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 28.924447] kunit_try_run_case+0x1b3/0x490 [ 28.924882] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.925611] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 28.926505] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.927152] ? __kthread_parkme+0x82/0x160 [ 28.927889] ? preempt_count_sub+0x50/0x80 [ 28.928833] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.929710] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.931012] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.931684] kthread+0x257/0x310 [ 28.932266] ? __pfx_kthread+0x10/0x10 [ 28.932647] ret_from_fork+0x41/0x80 [ 28.933074] ? __pfx_kthread+0x10/0x10 [ 28.933670] ret_from_fork_asm+0x1a/0x30 [ 28.934529] </TASK> [ 28.934846] [ 28.935236] Allocated by task 269: [ 28.935644] kasan_save_stack+0x3d/0x60 [ 28.936403] kasan_save_track+0x18/0x40 [ 28.936865] kasan_save_alloc_info+0x3b/0x50 [ 28.937491] __kasan_kmalloc+0xb7/0xc0 [ 28.938379] __kmalloc_cache_noprof+0x184/0x410 [ 28.938708] kasan_bitops_generic+0x93/0x1c0 [ 28.939415] kunit_try_run_case+0x1b3/0x490 [ 28.940002] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.940606] kthread+0x257/0x310 [ 28.941048] ret_from_fork+0x41/0x80 [ 28.941346] ret_from_fork_asm+0x1a/0x30 [ 28.941924] [ 28.942264] The buggy address belongs to the object at ffff888102699d80 [ 28.942264] which belongs to the cache kmalloc-16 of size 16 [ 28.943783] The buggy address is located 8 bytes inside of [ 28.943783] allocated 9-byte region [ffff888102699d80, ffff888102699d89) [ 28.944928] [ 28.946142] The buggy address belongs to the physical page: [ 28.946641] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102699 [ 28.947347] flags: 0x200000000000000(node=0|zone=2) [ 28.947777] page_type: f5(slab) [ 28.948430] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 28.949501] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 28.950293] page dumped because: kasan: bad access detected [ 28.951132] [ 28.951577] Memory state around the buggy address: [ 28.951882] ffff888102699c80: fa fb fc fc fa fb fc fc 00 05 fc fc 00 04 fc fc [ 28.953087] ffff888102699d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 28.954369] >ffff888102699d80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.955201] ^ [ 28.955763] ffff888102699e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.956898] ffff888102699e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.957699] ================================================================== [ 28.794637] ================================================================== [ 28.795563] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d6/0xd50 [ 28.797222] Write of size 8 at addr ffff888102699d88 by task kunit_try_catch/269 [ 28.798096] [ 28.799200] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 28.799959] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.800810] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.801768] Call Trace: [ 28.802454] <TASK> [ 28.802683] dump_stack_lvl+0x73/0xb0 [ 28.803494] print_report+0xd1/0x640 [ 28.803868] ? __virt_addr_valid+0x1db/0x2d0 [ 28.804485] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.805085] kasan_report+0x102/0x140 [ 28.805695] ? kasan_bitops_modify.constprop.0+0x2d6/0xd50 [ 28.806406] ? kasan_bitops_modify.constprop.0+0x2d6/0xd50 [ 28.807158] kasan_check_range+0x10c/0x1c0 [ 28.807690] __kasan_check_write+0x18/0x20 [ 28.808161] kasan_bitops_modify.constprop.0+0x2d6/0xd50 [ 28.809105] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 28.809672] ? __kmalloc_cache_noprof+0x184/0x410 [ 28.810309] ? kasan_bitops_generic+0x93/0x1c0 [ 28.810889] kasan_bitops_generic+0x117/0x1c0 [ 28.811486] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 28.812372] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 28.812902] kunit_try_run_case+0x1b3/0x490 [ 28.813481] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.813881] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 28.814566] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.815187] ? __kthread_parkme+0x82/0x160 [ 28.815627] ? preempt_count_sub+0x50/0x80 [ 28.816395] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.816819] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.817263] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.818225] kthread+0x257/0x310 [ 28.818527] ? __pfx_kthread+0x10/0x10 [ 28.819030] ret_from_fork+0x41/0x80 [ 28.819757] ? __pfx_kthread+0x10/0x10 [ 28.820351] ret_from_fork_asm+0x1a/0x30 [ 28.820904] </TASK> [ 28.821230] [ 28.821475] Allocated by task 269: [ 28.821873] kasan_save_stack+0x3d/0x60 [ 28.823383] kasan_save_track+0x18/0x40 [ 28.824309] kasan_save_alloc_info+0x3b/0x50 [ 28.824783] __kasan_kmalloc+0xb7/0xc0 [ 28.825714] __kmalloc_cache_noprof+0x184/0x410 [ 28.826458] kasan_bitops_generic+0x93/0x1c0 [ 28.827258] kunit_try_run_case+0x1b3/0x490 [ 28.827645] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.827881] kthread+0x257/0x310 [ 28.828758] ret_from_fork+0x41/0x80 [ 28.829346] ret_from_fork_asm+0x1a/0x30 [ 28.830278] [ 28.830650] The buggy address belongs to the object at ffff888102699d80 [ 28.830650] which belongs to the cache kmalloc-16 of size 16 [ 28.831612] The buggy address is located 8 bytes inside of [ 28.831612] allocated 9-byte region [ffff888102699d80, ffff888102699d89) [ 28.832614] [ 28.832811] The buggy address belongs to the physical page: [ 28.834250] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102699 [ 28.834574] flags: 0x200000000000000(node=0|zone=2) [ 28.834778] page_type: f5(slab) [ 28.834930] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 28.836102] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 28.837359] page dumped because: kasan: bad access detected [ 28.837690] [ 28.837946] Memory state around the buggy address: [ 28.839003] ffff888102699c80: fa fb fc fc fa fb fc fc 00 05 fc fc 00 04 fc fc [ 28.839809] ffff888102699d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 28.841309] >ffff888102699d80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.841957] ^ [ 28.842501] ffff888102699e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.843419] ffff888102699e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.844331] ================================================================== [ 28.845841] ================================================================== [ 28.847011] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x374/0xd50 [ 28.848860] Write of size 8 at addr ffff888102699d88 by task kunit_try_catch/269 [ 28.850183] [ 28.850472] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 28.851655] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.852328] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.853597] Call Trace: [ 28.854296] <TASK> [ 28.854765] dump_stack_lvl+0x73/0xb0 [ 28.855147] print_report+0xd1/0x640 [ 28.855417] ? __virt_addr_valid+0x1db/0x2d0 [ 28.855627] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.855861] kasan_report+0x102/0x140 [ 28.856208] ? kasan_bitops_modify.constprop.0+0x374/0xd50 [ 28.856606] ? kasan_bitops_modify.constprop.0+0x374/0xd50 [ 28.857843] kasan_check_range+0x10c/0x1c0 [ 28.858701] __kasan_check_write+0x18/0x20 [ 28.859734] kasan_bitops_modify.constprop.0+0x374/0xd50 [ 28.860904] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 28.862182] ? __kmalloc_cache_noprof+0x184/0x410 [ 28.862633] ? kasan_bitops_generic+0x93/0x1c0 [ 28.863632] kasan_bitops_generic+0x117/0x1c0 [ 28.864761] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 28.865562] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 28.866589] kunit_try_run_case+0x1b3/0x490 [ 28.867052] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.868124] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 28.868829] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.869637] ? __kthread_parkme+0x82/0x160 [ 28.870781] ? preempt_count_sub+0x50/0x80 [ 28.871515] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.872617] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.873535] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.874015] kthread+0x257/0x310 [ 28.874730] ? __pfx_kthread+0x10/0x10 [ 28.875369] ret_from_fork+0x41/0x80 [ 28.876253] ? __pfx_kthread+0x10/0x10 [ 28.876673] ret_from_fork_asm+0x1a/0x30 [ 28.877610] </TASK> [ 28.877835] [ 28.878493] Allocated by task 269: [ 28.879028] kasan_save_stack+0x3d/0x60 [ 28.879517] kasan_save_track+0x18/0x40 [ 28.879871] kasan_save_alloc_info+0x3b/0x50 [ 28.880785] __kasan_kmalloc+0xb7/0xc0 [ 28.881083] __kmalloc_cache_noprof+0x184/0x410 [ 28.882413] kasan_bitops_generic+0x93/0x1c0 [ 28.882841] kunit_try_run_case+0x1b3/0x490 [ 28.883593] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.884353] kthread+0x257/0x310 [ 28.884748] ret_from_fork+0x41/0x80 [ 28.885581] ret_from_fork_asm+0x1a/0x30 [ 28.886583] [ 28.886728] The buggy address belongs to the object at ffff888102699d80 [ 28.886728] which belongs to the cache kmalloc-16 of size 16 [ 28.888716] The buggy address is located 8 bytes inside of [ 28.888716] allocated 9-byte region [ffff888102699d80, ffff888102699d89) [ 28.890612] [ 28.890715] The buggy address belongs to the physical page: [ 28.891038] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102699 [ 28.892425] flags: 0x200000000000000(node=0|zone=2) [ 28.893033] page_type: f5(slab) [ 28.893479] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 28.894533] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 28.895315] page dumped because: kasan: bad access detected [ 28.896057] [ 28.896224] Memory state around the buggy address: [ 28.897143] ffff888102699c80: fa fb fc fc fa fb fc fc 00 05 fc fc 00 04 fc fc [ 28.897882] ffff888102699d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 28.898755] >ffff888102699d80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.899718] ^ [ 28.900034] ffff888102699e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.900622] ffff888102699e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.902300] ================================================================== [ 29.009445] ================================================================== [ 29.009975] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x548/0xd50 [ 29.011293] Write of size 8 at addr ffff888102699d88 by task kunit_try_catch/269 [ 29.011873] [ 29.012104] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 29.013080] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.013906] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.014631] Call Trace: [ 29.015158] <TASK> [ 29.015721] dump_stack_lvl+0x73/0xb0 [ 29.016471] print_report+0xd1/0x640 [ 29.016835] ? __virt_addr_valid+0x1db/0x2d0 [ 29.017512] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.018405] kasan_report+0x102/0x140 [ 29.019455] ? kasan_bitops_modify.constprop.0+0x548/0xd50 [ 29.020285] ? kasan_bitops_modify.constprop.0+0x548/0xd50 [ 29.020879] kasan_check_range+0x10c/0x1c0 [ 29.021673] __kasan_check_write+0x18/0x20 [ 29.022409] kasan_bitops_modify.constprop.0+0x548/0xd50 [ 29.023261] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 29.023865] ? __kmalloc_cache_noprof+0x184/0x410 [ 29.024502] ? kasan_bitops_generic+0x93/0x1c0 [ 29.025280] kasan_bitops_generic+0x117/0x1c0 [ 29.025791] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 29.026206] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 29.027084] kunit_try_run_case+0x1b3/0x490 [ 29.027525] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.028230] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.028626] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.029906] ? __kthread_parkme+0x82/0x160 [ 29.030535] ? preempt_count_sub+0x50/0x80 [ 29.031330] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.032210] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.032798] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.033800] kthread+0x257/0x310 [ 29.034158] ? __pfx_kthread+0x10/0x10 [ 29.034703] ret_from_fork+0x41/0x80 [ 29.035350] ? __pfx_kthread+0x10/0x10 [ 29.035773] ret_from_fork_asm+0x1a/0x30 [ 29.036814] </TASK> [ 29.037530] [ 29.037785] Allocated by task 269: [ 29.038681] kasan_save_stack+0x3d/0x60 [ 29.039219] kasan_save_track+0x18/0x40 [ 29.039772] kasan_save_alloc_info+0x3b/0x50 [ 29.040387] __kasan_kmalloc+0xb7/0xc0 [ 29.040749] __kmalloc_cache_noprof+0x184/0x410 [ 29.041485] kasan_bitops_generic+0x93/0x1c0 [ 29.042104] kunit_try_run_case+0x1b3/0x490 [ 29.043186] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.043730] kthread+0x257/0x310 [ 29.044530] ret_from_fork+0x41/0x80 [ 29.044821] ret_from_fork_asm+0x1a/0x30 [ 29.045426] [ 29.046211] The buggy address belongs to the object at ffff888102699d80 [ 29.046211] which belongs to the cache kmalloc-16 of size 16 [ 29.046696] The buggy address is located 8 bytes inside of [ 29.046696] allocated 9-byte region [ffff888102699d80, ffff888102699d89) [ 29.047766] [ 29.048066] The buggy address belongs to the physical page: [ 29.048715] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102699 [ 29.049783] flags: 0x200000000000000(node=0|zone=2) [ 29.051021] page_type: f5(slab) [ 29.051960] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 29.053629] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 29.054517] page dumped because: kasan: bad access detected [ 29.054877] [ 29.055169] Memory state around the buggy address: [ 29.055736] ffff888102699c80: fa fb fc fc fa fb fc fc 00 05 fc fc 00 04 fc fc [ 29.057298] ffff888102699d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 29.058031] >ffff888102699d80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.059045] ^ [ 29.059584] ffff888102699e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.060593] ffff888102699e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.061154] ================================================================== [ 28.639340] ================================================================== [ 28.640510] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x102/0xd50 [ 28.641420] Write of size 8 at addr ffff888102699d88 by task kunit_try_catch/269 [ 28.642330] [ 28.642625] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 28.644159] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.644685] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.646535] Call Trace: [ 28.646873] <TASK> [ 28.647681] dump_stack_lvl+0x73/0xb0 [ 28.648066] print_report+0xd1/0x640 [ 28.648877] ? __virt_addr_valid+0x1db/0x2d0 [ 28.649664] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.651266] kasan_report+0x102/0x140 [ 28.651793] ? kasan_bitops_modify.constprop.0+0x102/0xd50 [ 28.652407] ? kasan_bitops_modify.constprop.0+0x102/0xd50 [ 28.653591] kasan_check_range+0x10c/0x1c0 [ 28.654023] __kasan_check_write+0x18/0x20 [ 28.654775] kasan_bitops_modify.constprop.0+0x102/0xd50 [ 28.655639] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 28.655900] ? __kmalloc_cache_noprof+0x184/0x410 [ 28.657262] ? kasan_bitops_generic+0x93/0x1c0 [ 28.658335] kasan_bitops_generic+0x117/0x1c0 [ 28.658803] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 28.659643] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 28.660511] kunit_try_run_case+0x1b3/0x490 [ 28.661668] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.662205] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 28.662682] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.663241] ? __kthread_parkme+0x82/0x160 [ 28.664395] ? preempt_count_sub+0x50/0x80 [ 28.664790] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.666069] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.666763] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.667634] kthread+0x257/0x310 [ 28.668429] ? __pfx_kthread+0x10/0x10 [ 28.668719] ret_from_fork+0x41/0x80 [ 28.669570] ? __pfx_kthread+0x10/0x10 [ 28.669953] ret_from_fork_asm+0x1a/0x30 [ 28.670753] </TASK> [ 28.671069] [ 28.671710] Allocated by task 269: [ 28.672214] kasan_save_stack+0x3d/0x60 [ 28.672877] kasan_save_track+0x18/0x40 [ 28.673710] kasan_save_alloc_info+0x3b/0x50 [ 28.674816] __kasan_kmalloc+0xb7/0xc0 [ 28.675432] __kmalloc_cache_noprof+0x184/0x410 [ 28.676643] kasan_bitops_generic+0x93/0x1c0 [ 28.677033] kunit_try_run_case+0x1b3/0x490 [ 28.677529] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.677947] kthread+0x257/0x310 [ 28.678787] ret_from_fork+0x41/0x80 [ 28.679704] ret_from_fork_asm+0x1a/0x30 [ 28.680334] [ 28.680484] The buggy address belongs to the object at ffff888102699d80 [ 28.680484] which belongs to the cache kmalloc-16 of size 16 [ 28.681899] The buggy address is located 8 bytes inside of [ 28.681899] allocated 9-byte region [ffff888102699d80, ffff888102699d89) [ 28.683177] [ 28.683494] The buggy address belongs to the physical page: [ 28.683939] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102699 [ 28.684802] flags: 0x200000000000000(node=0|zone=2) [ 28.685668] page_type: f5(slab) [ 28.685951] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 28.686965] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 28.687944] page dumped because: kasan: bad access detected [ 28.688540] [ 28.688739] Memory state around the buggy address: [ 28.689506] ffff888102699c80: fa fb fc fc fa fb fc fc 00 05 fc fc 00 04 fc fc [ 28.690447] ffff888102699d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 28.691078] >ffff888102699d80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.692003] ^ [ 28.692550] ffff888102699e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.693203] ffff888102699e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.694092] ================================================================== [ 28.744787] ================================================================== [ 28.745501] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23b/0xd50 [ 28.746024] Write of size 8 at addr ffff888102699d88 by task kunit_try_catch/269 [ 28.746900] [ 28.747091] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 28.748137] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.748712] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.749810] Call Trace: [ 28.750427] <TASK> [ 28.750832] dump_stack_lvl+0x73/0xb0 [ 28.751174] print_report+0xd1/0x640 [ 28.752170] ? __virt_addr_valid+0x1db/0x2d0 [ 28.752579] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.753169] kasan_report+0x102/0x140 [ 28.753455] ? kasan_bitops_modify.constprop.0+0x23b/0xd50 [ 28.754273] ? kasan_bitops_modify.constprop.0+0x23b/0xd50 [ 28.755232] kasan_check_range+0x10c/0x1c0 [ 28.755664] __kasan_check_write+0x18/0x20 [ 28.756630] kasan_bitops_modify.constprop.0+0x23b/0xd50 [ 28.757220] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 28.758089] ? __kmalloc_cache_noprof+0x184/0x410 [ 28.758585] ? kasan_bitops_generic+0x93/0x1c0 [ 28.759243] kasan_bitops_generic+0x117/0x1c0 [ 28.759619] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 28.760270] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 28.760876] kunit_try_run_case+0x1b3/0x490 [ 28.762440] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.762916] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 28.763508] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.763954] ? __kthread_parkme+0x82/0x160 [ 28.764640] ? preempt_count_sub+0x50/0x80 [ 28.765093] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.766095] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.766610] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.767468] kthread+0x257/0x310 [ 28.768121] ? __pfx_kthread+0x10/0x10 [ 28.768675] ret_from_fork+0x41/0x80 [ 28.769247] ? __pfx_kthread+0x10/0x10 [ 28.769856] ret_from_fork_asm+0x1a/0x30 [ 28.770565] </TASK> [ 28.770906] [ 28.771173] Allocated by task 269: [ 28.771741] kasan_save_stack+0x3d/0x60 [ 28.772287] kasan_save_track+0x18/0x40 [ 28.773273] kasan_save_alloc_info+0x3b/0x50 [ 28.773683] __kasan_kmalloc+0xb7/0xc0 [ 28.774028] __kmalloc_cache_noprof+0x184/0x410 [ 28.774691] kasan_bitops_generic+0x93/0x1c0 [ 28.775330] kunit_try_run_case+0x1b3/0x490 [ 28.775871] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.776657] kthread+0x257/0x310 [ 28.777111] ret_from_fork+0x41/0x80 [ 28.777786] ret_from_fork_asm+0x1a/0x30 [ 28.778300] [ 28.778684] The buggy address belongs to the object at ffff888102699d80 [ 28.778684] which belongs to the cache kmalloc-16 of size 16 [ 28.779661] The buggy address is located 8 bytes inside of [ 28.779661] allocated 9-byte region [ffff888102699d80, ffff888102699d89) [ 28.781673] [ 28.781832] The buggy address belongs to the physical page: [ 28.782410] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102699 [ 28.783455] flags: 0x200000000000000(node=0|zone=2) [ 28.783854] page_type: f5(slab) [ 28.784364] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 28.785399] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 28.786159] page dumped because: kasan: bad access detected [ 28.786676] [ 28.786893] Memory state around the buggy address: [ 28.787551] ffff888102699c80: fa fb fc fc fa fb fc fc 00 05 fc fc 00 04 fc fc [ 28.788348] ffff888102699d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 28.789131] >ffff888102699d80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.790288] ^ [ 28.790666] ffff888102699e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.792573] ffff888102699e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.793473] ================================================================== [ 28.958734] ================================================================== [ 28.959500] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ad/0xd50 [ 28.961449] Write of size 8 at addr ffff888102699d88 by task kunit_try_catch/269 [ 28.962458] [ 28.962653] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 28.963643] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.964004] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.964703] Call Trace: [ 28.964942] <TASK> [ 28.966057] dump_stack_lvl+0x73/0xb0 [ 28.966457] print_report+0xd1/0x640 [ 28.966733] ? __virt_addr_valid+0x1db/0x2d0 [ 28.967460] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.968527] kasan_report+0x102/0x140 [ 28.968920] ? kasan_bitops_modify.constprop.0+0x4ad/0xd50 [ 28.970080] ? kasan_bitops_modify.constprop.0+0x4ad/0xd50 [ 28.970899] kasan_check_range+0x10c/0x1c0 [ 28.972128] __kasan_check_write+0x18/0x20 [ 28.973209] kasan_bitops_modify.constprop.0+0x4ad/0xd50 [ 28.973463] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 28.973716] ? __kmalloc_cache_noprof+0x184/0x410 [ 28.973924] ? kasan_bitops_generic+0x93/0x1c0 [ 28.974955] kasan_bitops_generic+0x117/0x1c0 [ 28.975974] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 28.976862] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 28.977735] kunit_try_run_case+0x1b3/0x490 [ 28.978506] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.979205] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 28.979671] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.980274] ? __kthread_parkme+0x82/0x160 [ 28.980682] ? preempt_count_sub+0x50/0x80 [ 28.981128] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.982087] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.982752] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.983289] kthread+0x257/0x310 [ 28.983632] ? __pfx_kthread+0x10/0x10 [ 28.984343] ret_from_fork+0x41/0x80 [ 28.984789] ? __pfx_kthread+0x10/0x10 [ 28.985378] ret_from_fork_asm+0x1a/0x30 [ 28.985939] </TASK> [ 28.986904] [ 28.987362] Allocated by task 269: [ 28.987605] kasan_save_stack+0x3d/0x60 [ 28.988184] kasan_save_track+0x18/0x40 [ 28.988748] kasan_save_alloc_info+0x3b/0x50 [ 28.989261] __kasan_kmalloc+0xb7/0xc0 [ 28.989551] __kmalloc_cache_noprof+0x184/0x410 [ 28.990307] kasan_bitops_generic+0x93/0x1c0 [ 28.990722] kunit_try_run_case+0x1b3/0x490 [ 28.991054] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.992073] kthread+0x257/0x310 [ 28.992655] ret_from_fork+0x41/0x80 [ 28.993023] ret_from_fork_asm+0x1a/0x30 [ 28.993655] [ 28.993829] The buggy address belongs to the object at ffff888102699d80 [ 28.993829] which belongs to the cache kmalloc-16 of size 16 [ 28.995260] The buggy address is located 8 bytes inside of [ 28.995260] allocated 9-byte region [ffff888102699d80, ffff888102699d89) [ 28.996617] [ 28.996831] The buggy address belongs to the physical page: [ 28.997182] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102699 [ 28.998249] flags: 0x200000000000000(node=0|zone=2) [ 28.999088] page_type: f5(slab) [ 28.999532] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 29.000798] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 29.001533] page dumped because: kasan: bad access detected [ 29.002014] [ 29.002174] Memory state around the buggy address: [ 29.002944] ffff888102699c80: fa fb fc fc fa fb fc fc 00 05 fc fc 00 04 fc fc [ 29.003823] ffff888102699d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 29.004978] >ffff888102699d80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.006488] ^ [ 29.006651] ffff888102699e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.006916] ffff888102699e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.008084] ================================================================== [ 28.695601] ================================================================== [ 28.696332] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19d/0xd50 [ 28.697188] Write of size 8 at addr ffff888102699d88 by task kunit_try_catch/269 [ 28.697898] [ 28.698929] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 28.700426] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.700912] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.701708] Call Trace: [ 28.702344] <TASK> [ 28.702604] dump_stack_lvl+0x73/0xb0 [ 28.703150] print_report+0xd1/0x640 [ 28.703763] ? __virt_addr_valid+0x1db/0x2d0 [ 28.704197] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.705093] kasan_report+0x102/0x140 [ 28.705498] ? kasan_bitops_modify.constprop.0+0x19d/0xd50 [ 28.706102] ? kasan_bitops_modify.constprop.0+0x19d/0xd50 [ 28.706756] kasan_check_range+0x10c/0x1c0 [ 28.707622] __kasan_check_write+0x18/0x20 [ 28.707952] kasan_bitops_modify.constprop.0+0x19d/0xd50 [ 28.708753] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 28.709451] ? __kmalloc_cache_noprof+0x184/0x410 [ 28.710078] ? kasan_bitops_generic+0x93/0x1c0 [ 28.710862] kasan_bitops_generic+0x117/0x1c0 [ 28.711297] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 28.711805] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 28.712700] kunit_try_run_case+0x1b3/0x490 [ 28.713218] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.713930] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 28.714586] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.715756] ? __kthread_parkme+0x82/0x160 [ 28.716182] ? preempt_count_sub+0x50/0x80 [ 28.716881] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.717444] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.718004] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.718805] kthread+0x257/0x310 [ 28.719209] ? __pfx_kthread+0x10/0x10 [ 28.719753] ret_from_fork+0x41/0x80 [ 28.720699] ? __pfx_kthread+0x10/0x10 [ 28.721087] ret_from_fork_asm+0x1a/0x30 [ 28.721571] </TASK> [ 28.722040] [ 28.722519] Allocated by task 269: [ 28.722842] kasan_save_stack+0x3d/0x60 [ 28.723247] kasan_save_track+0x18/0x40 [ 28.724094] kasan_save_alloc_info+0x3b/0x50 [ 28.724469] __kasan_kmalloc+0xb7/0xc0 [ 28.725041] __kmalloc_cache_noprof+0x184/0x410 [ 28.725450] kasan_bitops_generic+0x93/0x1c0 [ 28.726186] kunit_try_run_case+0x1b3/0x490 [ 28.726587] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.727136] kthread+0x257/0x310 [ 28.727803] ret_from_fork+0x41/0x80 [ 28.728498] ret_from_fork_asm+0x1a/0x30 [ 28.729024] [ 28.729194] The buggy address belongs to the object at ffff888102699d80 [ 28.729194] which belongs to the cache kmalloc-16 of size 16 [ 28.730389] The buggy address is located 8 bytes inside of [ 28.730389] allocated 9-byte region [ffff888102699d80, ffff888102699d89) [ 28.731942] [ 28.732354] The buggy address belongs to the physical page: [ 28.732802] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102699 [ 28.733789] flags: 0x200000000000000(node=0|zone=2) [ 28.734433] page_type: f5(slab) [ 28.734683] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 28.735946] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 28.737648] page dumped because: kasan: bad access detected [ 28.738089] [ 28.738344] Memory state around the buggy address: [ 28.738953] ffff888102699c80: fa fb fc fc fa fb fc fc 00 05 fc fc 00 04 fc fc [ 28.739716] ffff888102699d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 28.740738] >ffff888102699d80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.741367] ^ [ 28.742048] ffff888102699e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.742536] ffff888102699e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.743532] ==================================================================