Date
Nov. 28, 2024, 2:36 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 33.995981] ================================================================== [ 33.996747] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc8 [ 33.997608] Write of size 8 at addr fff00000c4005ea8 by task kunit_try_catch/249 [ 33.998463] [ 33.998856] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 33.999975] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.000537] Hardware name: linux,dummy-virt (DT) [ 34.001157] Call trace: [ 34.001616] show_stack+0x20/0x38 (C) [ 34.002272] dump_stack_lvl+0x8c/0xd0 [ 34.002835] print_report+0x118/0x5e0 [ 34.003342] kasan_report+0xc8/0x118 [ 34.003826] kasan_check_range+0x100/0x1a8 [ 34.004390] __kasan_check_write+0x20/0x30 [ 34.004930] kasan_bitops_modify.constprop.0+0x320/0xbc8 [ 34.005759] kasan_bitops_generic+0x110/0x1c8 [ 34.006470] kunit_try_run_case+0x14c/0x3d0 [ 34.007173] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.007927] kthread+0x24c/0x2d0 [ 34.008544] ret_from_fork+0x10/0x20 [ 34.009106] [ 34.009502] Allocated by task 249: [ 34.010008] kasan_save_stack+0x3c/0x68 [ 34.010641] kasan_save_track+0x20/0x40 [ 34.011174] kasan_save_alloc_info+0x40/0x58 [ 34.011837] __kasan_kmalloc+0xd4/0xd8 [ 34.012482] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.013331] kasan_bitops_generic+0xa0/0x1c8 [ 34.014071] kunit_try_run_case+0x14c/0x3d0 [ 34.014687] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.015581] kthread+0x24c/0x2d0 [ 34.016267] ret_from_fork+0x10/0x20 [ 34.016809] [ 34.017467] The buggy address belongs to the object at fff00000c4005ea0 [ 34.017467] which belongs to the cache kmalloc-16 of size 16 [ 34.018573] The buggy address is located 8 bytes inside of [ 34.018573] allocated 9-byte region [fff00000c4005ea0, fff00000c4005ea9) [ 34.019474] [ 34.019834] The buggy address belongs to the physical page: [ 34.020548] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104005 [ 34.021551] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.022340] page_type: f5(slab) [ 34.022915] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 34.023781] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 34.024643] page dumped because: kasan: bad access detected [ 34.025324] [ 34.025659] Memory state around the buggy address: [ 34.026329] fff00000c4005d80: 00 05 fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 34.027133] fff00000c4005e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.027989] >fff00000c4005e80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 34.028780] ^ [ 34.029357] fff00000c4005f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.030197] fff00000c4005f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.030989] ================================================================== [ 33.804395] ================================================================== [ 33.805618] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc8 [ 33.806587] Write of size 8 at addr fff00000c4005ea8 by task kunit_try_catch/249 [ 33.807490] [ 33.807830] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 33.808718] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.809330] Hardware name: linux,dummy-virt (DT) [ 33.810082] Call trace: [ 33.810661] show_stack+0x20/0x38 (C) [ 33.811354] dump_stack_lvl+0x8c/0xd0 [ 33.812052] print_report+0x118/0x5e0 [ 33.812755] kasan_report+0xc8/0x118 [ 33.813413] kasan_check_range+0x100/0x1a8 [ 33.814092] __kasan_check_write+0x20/0x30 [ 33.814789] kasan_bitops_modify.constprop.0+0x100/0xbc8 [ 33.815546] kasan_bitops_generic+0x110/0x1c8 [ 33.816248] kunit_try_run_case+0x14c/0x3d0 [ 33.816940] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.817746] kthread+0x24c/0x2d0 [ 33.818263] ret_from_fork+0x10/0x20 [ 33.818830] [ 33.819228] Allocated by task 249: [ 33.819779] kasan_save_stack+0x3c/0x68 [ 33.820422] kasan_save_track+0x20/0x40 [ 33.820981] kasan_save_alloc_info+0x40/0x58 [ 33.821606] __kasan_kmalloc+0xd4/0xd8 [ 33.822158] __kmalloc_cache_noprof+0x15c/0x3c0 [ 33.822841] kasan_bitops_generic+0xa0/0x1c8 [ 33.823453] kunit_try_run_case+0x14c/0x3d0 [ 33.824100] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.824840] kthread+0x24c/0x2d0 [ 33.825420] ret_from_fork+0x10/0x20 [ 33.826015] [ 33.826360] The buggy address belongs to the object at fff00000c4005ea0 [ 33.826360] which belongs to the cache kmalloc-16 of size 16 [ 33.827649] The buggy address is located 8 bytes inside of [ 33.827649] allocated 9-byte region [fff00000c4005ea0, fff00000c4005ea9) [ 33.828867] [ 33.829353] The buggy address belongs to the physical page: [ 33.830303] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104005 [ 33.831361] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.832320] page_type: f5(slab) [ 33.833003] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 33.834017] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 33.834973] page dumped because: kasan: bad access detected [ 33.835550] [ 33.835785] Memory state around the buggy address: [ 33.836302] fff00000c4005d80: 00 05 fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 33.837008] fff00000c4005e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 33.837782] >fff00000c4005e80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 33.838703] ^ [ 33.839385] fff00000c4005f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.840269] fff00000c4005f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.840963] ================================================================== [ 33.842915] ================================================================== [ 33.843897] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa4c/0xbc8 [ 33.844528] Read of size 8 at addr fff00000c4005ea8 by task kunit_try_catch/249 [ 33.845210] [ 33.846848] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 33.848078] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.848787] Hardware name: linux,dummy-virt (DT) [ 33.849543] Call trace: [ 33.850123] show_stack+0x20/0x38 (C) [ 33.850821] dump_stack_lvl+0x8c/0xd0 [ 33.851546] print_report+0x118/0x5e0 [ 33.852264] kasan_report+0xc8/0x118 [ 33.852819] __asan_report_load8_noabort+0x20/0x30 [ 33.853720] kasan_bitops_modify.constprop.0+0xa4c/0xbc8 [ 33.854564] kasan_bitops_generic+0x110/0x1c8 [ 33.855334] kunit_try_run_case+0x14c/0x3d0 [ 33.855936] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.856590] kthread+0x24c/0x2d0 [ 33.857058] ret_from_fork+0x10/0x20 [ 33.858007] [ 33.858467] Allocated by task 249: [ 33.858935] kasan_save_stack+0x3c/0x68 [ 33.859443] kasan_save_track+0x20/0x40 [ 33.859945] kasan_save_alloc_info+0x40/0x58 [ 33.860510] __kasan_kmalloc+0xd4/0xd8 [ 33.861015] __kmalloc_cache_noprof+0x15c/0x3c0 [ 33.861619] kasan_bitops_generic+0xa0/0x1c8 [ 33.862536] kunit_try_run_case+0x14c/0x3d0 [ 33.863166] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.863815] kthread+0x24c/0x2d0 [ 33.864326] ret_from_fork+0x10/0x20 [ 33.864822] [ 33.865199] The buggy address belongs to the object at fff00000c4005ea0 [ 33.865199] which belongs to the cache kmalloc-16 of size 16 [ 33.866346] The buggy address is located 8 bytes inside of [ 33.866346] allocated 9-byte region [fff00000c4005ea0, fff00000c4005ea9) [ 33.867488] [ 33.867839] The buggy address belongs to the physical page: [ 33.868485] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104005 [ 33.869324] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.870089] page_type: f5(slab) [ 33.870648] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 33.871561] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 33.872436] page dumped because: kasan: bad access detected [ 33.873015] [ 33.873377] Memory state around the buggy address: [ 33.873986] fff00000c4005d80: 00 05 fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 33.874767] fff00000c4005e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 33.875460] >fff00000c4005e80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 33.876304] ^ [ 33.876867] fff00000c4005f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.877601] fff00000c4005f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.878396] ================================================================== [ 33.882576] ================================================================== [ 33.883324] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc8 [ 33.884079] Write of size 8 at addr fff00000c4005ea8 by task kunit_try_catch/249 [ 33.885024] [ 33.885414] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 33.886441] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.886951] Hardware name: linux,dummy-virt (DT) [ 33.887570] Call trace: [ 33.888101] show_stack+0x20/0x38 (C) [ 33.888722] dump_stack_lvl+0x8c/0xd0 [ 33.889316] print_report+0x118/0x5e0 [ 33.889948] kasan_report+0xc8/0x118 [ 33.890526] kasan_check_range+0x100/0x1a8 [ 33.891191] __kasan_check_write+0x20/0x30 [ 33.891821] kasan_bitops_modify.constprop.0+0x1dc/0xbc8 [ 33.892537] kasan_bitops_generic+0x110/0x1c8 [ 33.893154] kunit_try_run_case+0x14c/0x3d0 [ 33.893757] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.894493] kthread+0x24c/0x2d0 [ 33.895070] ret_from_fork+0x10/0x20 [ 33.895650] [ 33.896035] Allocated by task 249: [ 33.896559] kasan_save_stack+0x3c/0x68 [ 33.897208] kasan_save_track+0x20/0x40 [ 33.897778] kasan_save_alloc_info+0x40/0x58 [ 33.898457] __kasan_kmalloc+0xd4/0xd8 [ 33.899012] __kmalloc_cache_noprof+0x15c/0x3c0 [ 33.899701] kasan_bitops_generic+0xa0/0x1c8 [ 33.900251] kunit_try_run_case+0x14c/0x3d0 [ 33.900918] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.901610] kthread+0x24c/0x2d0 [ 33.902185] ret_from_fork+0x10/0x20 [ 33.902769] [ 33.903136] The buggy address belongs to the object at fff00000c4005ea0 [ 33.903136] which belongs to the cache kmalloc-16 of size 16 [ 33.904389] The buggy address is located 8 bytes inside of [ 33.904389] allocated 9-byte region [fff00000c4005ea0, fff00000c4005ea9) [ 33.905604] [ 33.906013] The buggy address belongs to the physical page: [ 33.906604] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104005 [ 33.907601] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.908353] page_type: f5(slab) [ 33.908903] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 33.909779] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 33.910622] page dumped because: kasan: bad access detected [ 33.911304] [ 33.911640] Memory state around the buggy address: [ 33.912327] fff00000c4005d80: 00 05 fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 33.913066] fff00000c4005e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 33.913920] >fff00000c4005e80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 33.914739] ^ [ 33.915484] fff00000c4005f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.916221] fff00000c4005f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.917067] ================================================================== [ 34.032728] ================================================================== [ 34.033418] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaf4/0xbc8 [ 34.034401] Read of size 8 at addr fff00000c4005ea8 by task kunit_try_catch/249 [ 34.035258] [ 34.035622] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 34.036788] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.037344] Hardware name: linux,dummy-virt (DT) [ 34.037960] Call trace: [ 34.038449] show_stack+0x20/0x38 (C) [ 34.039008] dump_stack_lvl+0x8c/0xd0 [ 34.039665] print_report+0x118/0x5e0 [ 34.040214] kasan_report+0xc8/0x118 [ 34.040848] __asan_report_load8_noabort+0x20/0x30 [ 34.041599] kasan_bitops_modify.constprop.0+0xaf4/0xbc8 [ 34.042346] kasan_bitops_generic+0x110/0x1c8 [ 34.043004] kunit_try_run_case+0x14c/0x3d0 [ 34.043637] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.044404] kthread+0x24c/0x2d0 [ 34.044953] ret_from_fork+0x10/0x20 [ 34.045522] [ 34.045910] Allocated by task 249: [ 34.046451] kasan_save_stack+0x3c/0x68 [ 34.047084] kasan_save_track+0x20/0x40 [ 34.047684] kasan_save_alloc_info+0x40/0x58 [ 34.048448] __kasan_kmalloc+0xd4/0xd8 [ 34.049204] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.049944] kasan_bitops_generic+0xa0/0x1c8 [ 34.050656] kunit_try_run_case+0x14c/0x3d0 [ 34.051377] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.052050] kthread+0x24c/0x2d0 [ 34.052546] ret_from_fork+0x10/0x20 [ 34.053025] [ 34.053614] The buggy address belongs to the object at fff00000c4005ea0 [ 34.053614] which belongs to the cache kmalloc-16 of size 16 [ 34.054685] The buggy address is located 8 bytes inside of [ 34.054685] allocated 9-byte region [fff00000c4005ea0, fff00000c4005ea9) [ 34.055678] [ 34.056028] The buggy address belongs to the physical page: [ 34.056712] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104005 [ 34.057605] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.058360] page_type: f5(slab) [ 34.058901] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 34.059755] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 34.060546] page dumped because: kasan: bad access detected [ 34.061255] [ 34.061549] Memory state around the buggy address: [ 34.062164] fff00000c4005d80: 00 05 fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 34.062992] fff00000c4005e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.063771] >fff00000c4005e80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 34.064500] ^ [ 34.065069] fff00000c4005f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.065817] fff00000c4005f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.066540] ================================================================== [ 34.068292] ================================================================== [ 34.069181] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc8 [ 34.070242] Write of size 8 at addr fff00000c4005ea8 by task kunit_try_catch/249 [ 34.071142] [ 34.071642] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 34.072887] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.073748] Hardware name: linux,dummy-virt (DT) [ 34.074372] Call trace: [ 34.074824] show_stack+0x20/0x38 (C) [ 34.075529] dump_stack_lvl+0x8c/0xd0 [ 34.076576] print_report+0x118/0x5e0 [ 34.077273] kasan_report+0xc8/0x118 [ 34.077982] kasan_check_range+0x100/0x1a8 [ 34.078717] __kasan_check_write+0x20/0x30 [ 34.079289] kasan_bitops_modify.constprop.0+0x344/0xbc8 [ 34.079962] kasan_bitops_generic+0x110/0x1c8 [ 34.080563] kunit_try_run_case+0x14c/0x3d0 [ 34.081649] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.082272] kthread+0x24c/0x2d0 [ 34.082972] ret_from_fork+0x10/0x20 [ 34.083699] [ 34.084180] Allocated by task 249: [ 34.084808] kasan_save_stack+0x3c/0x68 [ 34.085545] kasan_save_track+0x20/0x40 [ 34.086261] kasan_save_alloc_info+0x40/0x58 [ 34.086985] __kasan_kmalloc+0xd4/0xd8 [ 34.087669] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.088431] kasan_bitops_generic+0xa0/0x1c8 [ 34.089197] kunit_try_run_case+0x14c/0x3d0 [ 34.089900] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.090558] kthread+0x24c/0x2d0 [ 34.091012] ret_from_fork+0x10/0x20 [ 34.091504] [ 34.091814] The buggy address belongs to the object at fff00000c4005ea0 [ 34.091814] which belongs to the cache kmalloc-16 of size 16 [ 34.093374] The buggy address is located 8 bytes inside of [ 34.093374] allocated 9-byte region [fff00000c4005ea0, fff00000c4005ea9) [ 34.094847] [ 34.095360] The buggy address belongs to the physical page: [ 34.096100] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104005 [ 34.097150] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.098044] page_type: f5(slab) [ 34.098731] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 34.099749] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 34.100728] page dumped because: kasan: bad access detected [ 34.101549] [ 34.101867] Memory state around the buggy address: [ 34.102447] fff00000c4005d80: 00 05 fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 34.103546] fff00000c4005e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.104447] >fff00000c4005e80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 34.105234] ^ [ 34.105855] fff00000c4005f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.106632] fff00000c4005f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.107343] ================================================================== [ 34.146822] ================================================================== [ 34.147576] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa28/0xbc8 [ 34.149151] Read of size 8 at addr fff00000c4005ea8 by task kunit_try_catch/249 [ 34.149928] [ 34.150286] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 34.151511] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.152159] Hardware name: linux,dummy-virt (DT) [ 34.152898] Call trace: [ 34.153471] show_stack+0x20/0x38 (C) [ 34.154193] dump_stack_lvl+0x8c/0xd0 [ 34.154893] print_report+0x118/0x5e0 [ 34.155575] kasan_report+0xc8/0x118 [ 34.156085] __asan_report_load8_noabort+0x20/0x30 [ 34.156735] kasan_bitops_modify.constprop.0+0xa28/0xbc8 [ 34.157405] kasan_bitops_generic+0x110/0x1c8 [ 34.157972] kunit_try_run_case+0x14c/0x3d0 [ 34.159220] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.160049] kthread+0x24c/0x2d0 [ 34.160729] ret_from_fork+0x10/0x20 [ 34.161446] [ 34.161911] Allocated by task 249: [ 34.162383] kasan_save_stack+0x3c/0x68 [ 34.163172] kasan_save_track+0x20/0x40 [ 34.163881] kasan_save_alloc_info+0x40/0x58 [ 34.164645] __kasan_kmalloc+0xd4/0xd8 [ 34.165345] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.166073] kasan_bitops_generic+0xa0/0x1c8 [ 34.166814] kunit_try_run_case+0x14c/0x3d0 [ 34.167607] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.168463] kthread+0x24c/0x2d0 [ 34.168922] ret_from_fork+0x10/0x20 [ 34.169688] [ 34.170190] The buggy address belongs to the object at fff00000c4005ea0 [ 34.170190] which belongs to the cache kmalloc-16 of size 16 [ 34.171450] The buggy address is located 8 bytes inside of [ 34.171450] allocated 9-byte region [fff00000c4005ea0, fff00000c4005ea9) [ 34.172620] [ 34.172934] The buggy address belongs to the physical page: [ 34.174013] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104005 [ 34.175035] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.175942] page_type: f5(slab) [ 34.176623] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 34.177602] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 34.178587] page dumped because: kasan: bad access detected [ 34.179391] [ 34.179877] Memory state around the buggy address: [ 34.180416] fff00000c4005d80: 00 05 fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 34.181454] fff00000c4005e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.182363] >fff00000c4005e80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 34.183313] ^ [ 34.184048] fff00000c4005f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.184826] fff00000c4005f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.185795] ================================================================== [ 34.108706] ================================================================== [ 34.109650] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc8 [ 34.111211] Write of size 8 at addr fff00000c4005ea8 by task kunit_try_catch/249 [ 34.112163] [ 34.112575] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 34.113755] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.114463] Hardware name: linux,dummy-virt (DT) [ 34.115054] Call trace: [ 34.115425] show_stack+0x20/0x38 (C) [ 34.116017] dump_stack_lvl+0x8c/0xd0 [ 34.116697] print_report+0x118/0x5e0 [ 34.117349] kasan_report+0xc8/0x118 [ 34.117939] kasan_check_range+0x100/0x1a8 [ 34.118566] __kasan_check_write+0x20/0x30 [ 34.119249] kasan_bitops_modify.constprop.0+0x3b0/0xbc8 [ 34.119972] kasan_bitops_generic+0x110/0x1c8 [ 34.120610] kunit_try_run_case+0x14c/0x3d0 [ 34.121296] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.122029] kthread+0x24c/0x2d0 [ 34.122607] ret_from_fork+0x10/0x20 [ 34.123198] [ 34.123537] Allocated by task 249: [ 34.124108] kasan_save_stack+0x3c/0x68 [ 34.124735] kasan_save_track+0x20/0x40 [ 34.125266] kasan_save_alloc_info+0x40/0x58 [ 34.125930] __kasan_kmalloc+0xd4/0xd8 [ 34.126546] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.127251] kasan_bitops_generic+0xa0/0x1c8 [ 34.127849] kunit_try_run_case+0x14c/0x3d0 [ 34.128521] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.129175] kthread+0x24c/0x2d0 [ 34.129748] ret_from_fork+0x10/0x20 [ 34.130315] [ 34.130701] The buggy address belongs to the object at fff00000c4005ea0 [ 34.130701] which belongs to the cache kmalloc-16 of size 16 [ 34.131892] The buggy address is located 8 bytes inside of [ 34.131892] allocated 9-byte region [fff00000c4005ea0, fff00000c4005ea9) [ 34.133109] [ 34.133477] The buggy address belongs to the physical page: [ 34.134057] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104005 [ 34.135040] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.135797] page_type: f5(slab) [ 34.136342] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 34.137238] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 34.138065] page dumped because: kasan: bad access detected [ 34.138722] [ 34.139064] Memory state around the buggy address: [ 34.139750] fff00000c4005d80: 00 05 fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 34.140537] fff00000c4005e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.141408] >fff00000c4005e80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 34.142227] ^ [ 34.142815] fff00000c4005f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.143679] fff00000c4005f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.144677] ================================================================== [ 33.919537] ================================================================== [ 33.920528] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa88/0xbc8 [ 33.921446] Read of size 8 at addr fff00000c4005ea8 by task kunit_try_catch/249 [ 33.922739] [ 33.923189] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 33.924427] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.924974] Hardware name: linux,dummy-virt (DT) [ 33.925556] Call trace: [ 33.925986] show_stack+0x20/0x38 (C) [ 33.926619] dump_stack_lvl+0x8c/0xd0 [ 33.927232] print_report+0x118/0x5e0 [ 33.927812] kasan_report+0xc8/0x118 [ 33.928417] __asan_report_load8_noabort+0x20/0x30 [ 33.929140] kasan_bitops_modify.constprop.0+0xa88/0xbc8 [ 33.929856] kasan_bitops_generic+0x110/0x1c8 [ 33.930528] kunit_try_run_case+0x14c/0x3d0 [ 33.931167] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.931914] kthread+0x24c/0x2d0 [ 33.932490] ret_from_fork+0x10/0x20 [ 33.933073] [ 33.933428] Allocated by task 249: [ 33.933991] kasan_save_stack+0x3c/0x68 [ 33.934513] kasan_save_track+0x20/0x40 [ 33.935156] kasan_save_alloc_info+0x40/0x58 [ 33.935788] __kasan_kmalloc+0xd4/0xd8 [ 33.936397] __kmalloc_cache_noprof+0x15c/0x3c0 [ 33.937047] kasan_bitops_generic+0xa0/0x1c8 [ 33.937656] kunit_try_run_case+0x14c/0x3d0 [ 33.938304] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.939022] kthread+0x24c/0x2d0 [ 33.939527] ret_from_fork+0x10/0x20 [ 33.940066] [ 33.940468] The buggy address belongs to the object at fff00000c4005ea0 [ 33.940468] which belongs to the cache kmalloc-16 of size 16 [ 33.941672] The buggy address is located 8 bytes inside of [ 33.941672] allocated 9-byte region [fff00000c4005ea0, fff00000c4005ea9) [ 33.942909] [ 33.943287] The buggy address belongs to the physical page: [ 33.943965] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104005 [ 33.944933] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.945718] page_type: f5(slab) [ 33.946226] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 33.947100] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 33.947905] page dumped because: kasan: bad access detected [ 33.948568] [ 33.948952] Memory state around the buggy address: [ 33.949575] fff00000c4005d80: 00 05 fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 33.950442] fff00000c4005e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 33.951275] >fff00000c4005e80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 33.952065] ^ [ 33.952667] fff00000c4005f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.953513] fff00000c4005f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.954309] ================================================================== [ 33.957312] ================================================================== [ 33.958039] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc8 [ 33.959420] Write of size 8 at addr fff00000c4005ea8 by task kunit_try_catch/249 [ 33.960069] [ 33.960507] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 33.961957] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.962681] Hardware name: linux,dummy-virt (DT) [ 33.963422] Call trace: [ 33.963801] show_stack+0x20/0x38 (C) [ 33.964384] dump_stack_lvl+0x8c/0xd0 [ 33.964937] print_report+0x118/0x5e0 [ 33.965848] kasan_report+0xc8/0x118 [ 33.966553] kasan_check_range+0x100/0x1a8 [ 33.967310] __kasan_check_write+0x20/0x30 [ 33.968050] kasan_bitops_modify.constprop.0+0x2b4/0xbc8 [ 33.968892] kasan_bitops_generic+0x110/0x1c8 [ 33.969629] kunit_try_run_case+0x14c/0x3d0 [ 33.970387] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.971238] kthread+0x24c/0x2d0 [ 33.971914] ret_from_fork+0x10/0x20 [ 33.972589] [ 33.972928] Allocated by task 249: [ 33.973412] kasan_save_stack+0x3c/0x68 [ 33.973919] kasan_save_track+0x20/0x40 [ 33.975040] kasan_save_alloc_info+0x40/0x58 [ 33.975598] __kasan_kmalloc+0xd4/0xd8 [ 33.976188] __kmalloc_cache_noprof+0x15c/0x3c0 [ 33.976788] kasan_bitops_generic+0xa0/0x1c8 [ 33.977418] kunit_try_run_case+0x14c/0x3d0 [ 33.977988] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.978622] kthread+0x24c/0x2d0 [ 33.979153] ret_from_fork+0x10/0x20 [ 33.979612] [ 33.979967] The buggy address belongs to the object at fff00000c4005ea0 [ 33.979967] which belongs to the cache kmalloc-16 of size 16 [ 33.981189] The buggy address is located 8 bytes inside of [ 33.981189] allocated 9-byte region [fff00000c4005ea0, fff00000c4005ea9) [ 33.982385] [ 33.982779] The buggy address belongs to the physical page: [ 33.983474] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104005 [ 33.984419] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.985093] page_type: f5(slab) [ 33.985646] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 33.986620] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 33.987489] page dumped because: kasan: bad access detected [ 33.988184] [ 33.988567] Memory state around the buggy address: [ 33.989094] fff00000c4005d80: 00 05 fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 33.990002] fff00000c4005e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 33.990784] >fff00000c4005e80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 33.991592] ^ [ 33.992215] fff00000c4005f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.993039] fff00000c4005f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.993835] ==================================================================
[ 24.989168] ================================================================== [ 24.989743] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40f/0xd50 [ 24.990635] Write of size 8 at addr ffff888101094fa8 by task kunit_try_catch/269 [ 24.991551] [ 24.991843] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 24.993442] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.993756] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.994901] Call Trace: [ 24.995482] <TASK> [ 24.995996] dump_stack_lvl+0x73/0xb0 [ 24.996810] print_report+0xd1/0x640 [ 24.997369] ? __virt_addr_valid+0x1db/0x2d0 [ 24.997865] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.998730] kasan_report+0x102/0x140 [ 24.999295] ? kasan_bitops_modify.constprop.0+0x40f/0xd50 [ 24.999918] ? kasan_bitops_modify.constprop.0+0x40f/0xd50 [ 25.000923] kasan_check_range+0x10c/0x1c0 [ 25.001743] __kasan_check_write+0x18/0x20 [ 25.002418] kasan_bitops_modify.constprop.0+0x40f/0xd50 [ 25.002910] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 25.004272] ? __kmalloc_cache_noprof+0x184/0x410 [ 25.004839] ? kasan_bitops_generic+0x93/0x1c0 [ 25.005463] kasan_bitops_generic+0x117/0x1c0 [ 25.006156] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 25.007228] ? __pfx_read_tsc+0x10/0x10 [ 25.008002] ? ktime_get_ts64+0x84/0x230 [ 25.008804] kunit_try_run_case+0x1b3/0x490 [ 25.009644] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.010207] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 25.010839] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.011815] ? __kthread_parkme+0x82/0x160 [ 25.012914] ? preempt_count_sub+0x50/0x80 [ 25.013450] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.014091] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.014713] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.015678] kthread+0x257/0x310 [ 25.016084] ? __pfx_kthread+0x10/0x10 [ 25.016426] ret_from_fork+0x41/0x80 [ 25.016961] ? __pfx_kthread+0x10/0x10 [ 25.017458] ret_from_fork_asm+0x1a/0x30 [ 25.018002] </TASK> [ 25.018369] [ 25.018816] Allocated by task 269: [ 25.019130] kasan_save_stack+0x3d/0x60 [ 25.019638] kasan_save_track+0x18/0x40 [ 25.020146] kasan_save_alloc_info+0x3b/0x50 [ 25.021437] __kasan_kmalloc+0xb7/0xc0 [ 25.021724] __kmalloc_cache_noprof+0x184/0x410 [ 25.022016] kasan_bitops_generic+0x93/0x1c0 [ 25.022722] kunit_try_run_case+0x1b3/0x490 [ 25.023070] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.024076] kthread+0x257/0x310 [ 25.024503] ret_from_fork+0x41/0x80 [ 25.024876] ret_from_fork_asm+0x1a/0x30 [ 25.025255] [ 25.025686] The buggy address belongs to the object at ffff888101094fa0 [ 25.025686] which belongs to the cache kmalloc-16 of size 16 [ 25.026898] The buggy address is located 8 bytes inside of [ 25.026898] allocated 9-byte region [ffff888101094fa0, ffff888101094fa9) [ 25.028322] [ 25.028533] The buggy address belongs to the physical page: [ 25.029472] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101094 [ 25.030015] flags: 0x200000000000000(node=0|zone=2) [ 25.031066] page_type: f5(slab) [ 25.031742] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 25.032399] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 25.033659] page dumped because: kasan: bad access detected [ 25.034363] [ 25.034583] Memory state around the buggy address: [ 25.035562] ffff888101094e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.036561] ffff888101094f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.037138] >ffff888101094f80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 25.038098] ^ [ 25.038639] ffff888101095000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 25.039794] ffff888101095080: 00 fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 [ 25.040379] ================================================================== [ 24.942377] ================================================================== [ 24.942995] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x374/0xd50 [ 24.944403] Write of size 8 at addr ffff888101094fa8 by task kunit_try_catch/269 [ 24.944953] [ 24.945420] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 24.946385] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.946816] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.947869] Call Trace: [ 24.948215] <TASK> [ 24.948627] dump_stack_lvl+0x73/0xb0 [ 24.949036] print_report+0xd1/0x640 [ 24.949512] ? __virt_addr_valid+0x1db/0x2d0 [ 24.949877] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.950491] kasan_report+0x102/0x140 [ 24.950852] ? kasan_bitops_modify.constprop.0+0x374/0xd50 [ 24.951801] ? kasan_bitops_modify.constprop.0+0x374/0xd50 [ 24.952598] kasan_check_range+0x10c/0x1c0 [ 24.953143] __kasan_check_write+0x18/0x20 [ 24.953668] kasan_bitops_modify.constprop.0+0x374/0xd50 [ 24.954484] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 24.954922] ? __kmalloc_cache_noprof+0x184/0x410 [ 24.955777] ? kasan_bitops_generic+0x93/0x1c0 [ 24.956264] kasan_bitops_generic+0x117/0x1c0 [ 24.956782] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 24.957300] ? __pfx_read_tsc+0x10/0x10 [ 24.957682] ? ktime_get_ts64+0x84/0x230 [ 24.958062] kunit_try_run_case+0x1b3/0x490 [ 24.958575] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.958999] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 24.959770] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.960510] ? __kthread_parkme+0x82/0x160 [ 24.960869] ? preempt_count_sub+0x50/0x80 [ 24.961410] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.961995] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.962762] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.963593] kthread+0x257/0x310 [ 24.963996] ? __pfx_kthread+0x10/0x10 [ 24.964625] ret_from_fork+0x41/0x80 [ 24.965321] ? __pfx_kthread+0x10/0x10 [ 24.965759] ret_from_fork_asm+0x1a/0x30 [ 24.966308] </TASK> [ 24.966634] [ 24.966827] Allocated by task 269: [ 24.967157] kasan_save_stack+0x3d/0x60 [ 24.967890] kasan_save_track+0x18/0x40 [ 24.968431] kasan_save_alloc_info+0x3b/0x50 [ 24.968990] __kasan_kmalloc+0xb7/0xc0 [ 24.969460] __kmalloc_cache_noprof+0x184/0x410 [ 24.970027] kasan_bitops_generic+0x93/0x1c0 [ 24.970751] kunit_try_run_case+0x1b3/0x490 [ 24.971635] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.972244] kthread+0x257/0x310 [ 24.972816] ret_from_fork+0x41/0x80 [ 24.973111] ret_from_fork_asm+0x1a/0x30 [ 24.973847] [ 24.974099] The buggy address belongs to the object at ffff888101094fa0 [ 24.974099] which belongs to the cache kmalloc-16 of size 16 [ 24.975641] The buggy address is located 8 bytes inside of [ 24.975641] allocated 9-byte region [ffff888101094fa0, ffff888101094fa9) [ 24.976936] [ 24.977356] The buggy address belongs to the physical page: [ 24.977898] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101094 [ 24.978934] flags: 0x200000000000000(node=0|zone=2) [ 24.979773] page_type: f5(slab) [ 24.980161] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 24.981007] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 24.981845] page dumped because: kasan: bad access detected [ 24.982423] [ 24.982606] Memory state around the buggy address: [ 24.983157] ffff888101094e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.984149] ffff888101094f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.984907] >ffff888101094f80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 24.985757] ^ [ 24.986461] ffff888101095000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.987545] ffff888101095080: 00 fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 [ 24.988150] ================================================================== [ 24.738567] ================================================================== [ 24.739724] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x102/0xd50 [ 24.741852] Write of size 8 at addr ffff888101094fa8 by task kunit_try_catch/269 [ 24.743541] [ 24.743819] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 24.745565] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.746877] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.748243] Call Trace: [ 24.748473] <TASK> [ 24.749095] dump_stack_lvl+0x73/0xb0 [ 24.749549] print_report+0xd1/0x640 [ 24.749963] ? __virt_addr_valid+0x1db/0x2d0 [ 24.750368] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.750850] kasan_report+0x102/0x140 [ 24.751213] ? kasan_bitops_modify.constprop.0+0x102/0xd50 [ 24.752905] ? kasan_bitops_modify.constprop.0+0x102/0xd50 [ 24.753371] kasan_check_range+0x10c/0x1c0 [ 24.753841] __kasan_check_write+0x18/0x20 [ 24.754154] kasan_bitops_modify.constprop.0+0x102/0xd50 [ 24.755089] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 24.755758] ? __kmalloc_cache_noprof+0x184/0x410 [ 24.756323] ? kasan_bitops_generic+0x93/0x1c0 [ 24.756731] kasan_bitops_generic+0x117/0x1c0 [ 24.757174] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 24.759210] ? __pfx_read_tsc+0x10/0x10 [ 24.759515] ? ktime_get_ts64+0x84/0x230 [ 24.760414] kunit_try_run_case+0x1b3/0x490 [ 24.760987] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.761607] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 24.762120] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.762706] ? __kthread_parkme+0x82/0x160 [ 24.763207] ? preempt_count_sub+0x50/0x80 [ 24.763621] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.763998] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.765129] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.766154] kthread+0x257/0x310 [ 24.766390] ? __pfx_kthread+0x10/0x10 [ 24.766575] ret_from_fork+0x41/0x80 [ 24.766755] ? __pfx_kthread+0x10/0x10 [ 24.766930] ret_from_fork_asm+0x1a/0x30 [ 24.767128] </TASK> [ 24.767243] [ 24.767356] Allocated by task 269: [ 24.767724] kasan_save_stack+0x3d/0x60 [ 24.768138] kasan_save_track+0x18/0x40 [ 24.768614] kasan_save_alloc_info+0x3b/0x50 [ 24.769476] __kasan_kmalloc+0xb7/0xc0 [ 24.770176] __kmalloc_cache_noprof+0x184/0x410 [ 24.770501] kasan_bitops_generic+0x93/0x1c0 [ 24.771327] kunit_try_run_case+0x1b3/0x490 [ 24.772119] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.773730] kthread+0x257/0x310 [ 24.774078] ret_from_fork+0x41/0x80 [ 24.774483] ret_from_fork_asm+0x1a/0x30 [ 24.774894] [ 24.775091] The buggy address belongs to the object at ffff888101094fa0 [ 24.775091] which belongs to the cache kmalloc-16 of size 16 [ 24.776804] The buggy address is located 8 bytes inside of [ 24.776804] allocated 9-byte region [ffff888101094fa0, ffff888101094fa9) [ 24.779313] [ 24.779493] The buggy address belongs to the physical page: [ 24.780041] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101094 [ 24.781576] flags: 0x200000000000000(node=0|zone=2) [ 24.782706] page_type: f5(slab) [ 24.783054] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 24.783835] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 24.784556] page dumped because: kasan: bad access detected [ 24.785118] [ 24.785751] Memory state around the buggy address: [ 24.786100] ffff888101094e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.786840] ffff888101094f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.787484] >ffff888101094f80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 24.788303] ^ [ 24.788687] ffff888101095000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.789835] ffff888101095080: 00 fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 [ 24.790858] ================================================================== [ 24.895086] ================================================================== [ 24.895571] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d6/0xd50 [ 24.896236] Write of size 8 at addr ffff888101094fa8 by task kunit_try_catch/269 [ 24.896948] [ 24.897365] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 24.898749] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.899721] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.900796] Call Trace: [ 24.901022] <TASK> [ 24.901572] dump_stack_lvl+0x73/0xb0 [ 24.902006] print_report+0xd1/0x640 [ 24.902974] ? __virt_addr_valid+0x1db/0x2d0 [ 24.903603] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.904140] kasan_report+0x102/0x140 [ 24.904747] ? kasan_bitops_modify.constprop.0+0x2d6/0xd50 [ 24.905395] ? kasan_bitops_modify.constprop.0+0x2d6/0xd50 [ 24.906134] kasan_check_range+0x10c/0x1c0 [ 24.906923] __kasan_check_write+0x18/0x20 [ 24.907318] kasan_bitops_modify.constprop.0+0x2d6/0xd50 [ 24.908036] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 24.908630] ? __kmalloc_cache_noprof+0x184/0x410 [ 24.909095] ? kasan_bitops_generic+0x93/0x1c0 [ 24.909653] kasan_bitops_generic+0x117/0x1c0 [ 24.910036] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 24.910803] ? __pfx_read_tsc+0x10/0x10 [ 24.911125] ? ktime_get_ts64+0x84/0x230 [ 24.911828] kunit_try_run_case+0x1b3/0x490 [ 24.912595] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.912988] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 24.913603] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.914127] ? __kthread_parkme+0x82/0x160 [ 24.914827] ? preempt_count_sub+0x50/0x80 [ 24.915373] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.915745] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.916327] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.916823] kthread+0x257/0x310 [ 24.917225] ? __pfx_kthread+0x10/0x10 [ 24.917668] ret_from_fork+0x41/0x80 [ 24.918049] ? __pfx_kthread+0x10/0x10 [ 24.918778] ret_from_fork_asm+0x1a/0x30 [ 24.919219] </TASK> [ 24.919553] [ 24.919705] Allocated by task 269: [ 24.920115] kasan_save_stack+0x3d/0x60 [ 24.920905] kasan_save_track+0x18/0x40 [ 24.921265] kasan_save_alloc_info+0x3b/0x50 [ 24.922655] __kasan_kmalloc+0xb7/0xc0 [ 24.923143] __kmalloc_cache_noprof+0x184/0x410 [ 24.923620] kasan_bitops_generic+0x93/0x1c0 [ 24.923996] kunit_try_run_case+0x1b3/0x490 [ 24.924574] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.925434] kthread+0x257/0x310 [ 24.925878] ret_from_fork+0x41/0x80 [ 24.926791] ret_from_fork_asm+0x1a/0x30 [ 24.927411] [ 24.927662] The buggy address belongs to the object at ffff888101094fa0 [ 24.927662] which belongs to the cache kmalloc-16 of size 16 [ 24.928985] The buggy address is located 8 bytes inside of [ 24.928985] allocated 9-byte region [ffff888101094fa0, ffff888101094fa9) [ 24.930107] [ 24.930737] The buggy address belongs to the physical page: [ 24.931291] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101094 [ 24.932148] flags: 0x200000000000000(node=0|zone=2) [ 24.932621] page_type: f5(slab) [ 24.933002] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 24.933693] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 24.934591] page dumped because: kasan: bad access detected [ 24.935611] [ 24.935836] Memory state around the buggy address: [ 24.936607] ffff888101094e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.937323] ffff888101094f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.938201] >ffff888101094f80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 24.939137] ^ [ 24.939893] ffff888101095000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.940859] ffff888101095080: 00 fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 [ 24.941612] ================================================================== [ 25.092592] ================================================================== [ 25.093138] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x548/0xd50 [ 25.094139] Write of size 8 at addr ffff888101094fa8 by task kunit_try_catch/269 [ 25.094716] [ 25.094889] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 25.096168] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.097132] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.098881] Call Trace: [ 25.099157] <TASK> [ 25.099551] dump_stack_lvl+0x73/0xb0 [ 25.099925] print_report+0xd1/0x640 [ 25.100223] ? __virt_addr_valid+0x1db/0x2d0 [ 25.100559] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.101203] kasan_report+0x102/0x140 [ 25.101690] ? kasan_bitops_modify.constprop.0+0x548/0xd50 [ 25.102383] ? kasan_bitops_modify.constprop.0+0x548/0xd50 [ 25.103619] kasan_check_range+0x10c/0x1c0 [ 25.103954] __kasan_check_write+0x18/0x20 [ 25.104811] kasan_bitops_modify.constprop.0+0x548/0xd50 [ 25.105658] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 25.106808] ? __kmalloc_cache_noprof+0x184/0x410 [ 25.107596] ? kasan_bitops_generic+0x93/0x1c0 [ 25.108175] kasan_bitops_generic+0x117/0x1c0 [ 25.108851] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 25.109385] ? __pfx_read_tsc+0x10/0x10 [ 25.109797] ? ktime_get_ts64+0x84/0x230 [ 25.110169] kunit_try_run_case+0x1b3/0x490 [ 25.111182] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.111864] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 25.112938] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.113403] ? __kthread_parkme+0x82/0x160 [ 25.114169] ? preempt_count_sub+0x50/0x80 [ 25.115018] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.115846] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.116463] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.117437] kthread+0x257/0x310 [ 25.118253] ? __pfx_kthread+0x10/0x10 [ 25.118782] ret_from_fork+0x41/0x80 [ 25.119315] ? __pfx_kthread+0x10/0x10 [ 25.119856] ret_from_fork_asm+0x1a/0x30 [ 25.120411] </TASK> [ 25.120965] [ 25.121621] Allocated by task 269: [ 25.121893] kasan_save_stack+0x3d/0x60 [ 25.122731] kasan_save_track+0x18/0x40 [ 25.123076] kasan_save_alloc_info+0x3b/0x50 [ 25.123702] __kasan_kmalloc+0xb7/0xc0 [ 25.124112] __kmalloc_cache_noprof+0x184/0x410 [ 25.124612] kasan_bitops_generic+0x93/0x1c0 [ 25.124991] kunit_try_run_case+0x1b3/0x490 [ 25.125755] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.126148] kthread+0x257/0x310 [ 25.126417] ret_from_fork+0x41/0x80 [ 25.127458] ret_from_fork_asm+0x1a/0x30 [ 25.127960] [ 25.128966] The buggy address belongs to the object at ffff888101094fa0 [ 25.128966] which belongs to the cache kmalloc-16 of size 16 [ 25.130269] The buggy address is located 8 bytes inside of [ 25.130269] allocated 9-byte region [ffff888101094fa0, ffff888101094fa9) [ 25.131530] [ 25.131759] The buggy address belongs to the physical page: [ 25.133413] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101094 [ 25.134085] flags: 0x200000000000000(node=0|zone=2) [ 25.134747] page_type: f5(slab) [ 25.135296] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 25.135996] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 25.136666] page dumped because: kasan: bad access detected [ 25.137246] [ 25.137558] Memory state around the buggy address: [ 25.138457] ffff888101094e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.139389] ffff888101094f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.140369] >ffff888101094f80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 25.141623] ^ [ 25.142112] ffff888101095000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 25.142852] ffff888101095080: 00 fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 [ 25.143477] ================================================================== [ 25.042539] ================================================================== [ 25.043040] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ad/0xd50 [ 25.043979] Write of size 8 at addr ffff888101094fa8 by task kunit_try_catch/269 [ 25.045431] [ 25.045879] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 25.047289] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.047833] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.048749] Call Trace: [ 25.049582] <TASK> [ 25.049939] dump_stack_lvl+0x73/0xb0 [ 25.050400] print_report+0xd1/0x640 [ 25.051060] ? __virt_addr_valid+0x1db/0x2d0 [ 25.051853] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.052182] kasan_report+0x102/0x140 [ 25.052994] ? kasan_bitops_modify.constprop.0+0x4ad/0xd50 [ 25.054414] ? kasan_bitops_modify.constprop.0+0x4ad/0xd50 [ 25.055146] kasan_check_range+0x10c/0x1c0 [ 25.055864] __kasan_check_write+0x18/0x20 [ 25.056481] kasan_bitops_modify.constprop.0+0x4ad/0xd50 [ 25.056984] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 25.057434] ? __kmalloc_cache_noprof+0x184/0x410 [ 25.058033] ? kasan_bitops_generic+0x93/0x1c0 [ 25.058624] kasan_bitops_generic+0x117/0x1c0 [ 25.059152] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 25.060160] ? __pfx_read_tsc+0x10/0x10 [ 25.060629] ? ktime_get_ts64+0x84/0x230 [ 25.060996] kunit_try_run_case+0x1b3/0x490 [ 25.061853] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.062366] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 25.062952] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.063724] ? __kthread_parkme+0x82/0x160 [ 25.064261] ? preempt_count_sub+0x50/0x80 [ 25.064778] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.065462] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.066044] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.066837] kthread+0x257/0x310 [ 25.067817] ? __pfx_kthread+0x10/0x10 [ 25.068615] ret_from_fork+0x41/0x80 [ 25.068912] ? __pfx_kthread+0x10/0x10 [ 25.069268] ret_from_fork_asm+0x1a/0x30 [ 25.070006] </TASK> [ 25.070415] [ 25.070635] Allocated by task 269: [ 25.070869] kasan_save_stack+0x3d/0x60 [ 25.071427] kasan_save_track+0x18/0x40 [ 25.071794] kasan_save_alloc_info+0x3b/0x50 [ 25.072664] __kasan_kmalloc+0xb7/0xc0 [ 25.073177] __kmalloc_cache_noprof+0x184/0x410 [ 25.073816] kasan_bitops_generic+0x93/0x1c0 [ 25.074454] kunit_try_run_case+0x1b3/0x490 [ 25.074818] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.075719] kthread+0x257/0x310 [ 25.076092] ret_from_fork+0x41/0x80 [ 25.076439] ret_from_fork_asm+0x1a/0x30 [ 25.077014] [ 25.077496] The buggy address belongs to the object at ffff888101094fa0 [ 25.077496] which belongs to the cache kmalloc-16 of size 16 [ 25.078781] The buggy address is located 8 bytes inside of [ 25.078781] allocated 9-byte region [ffff888101094fa0, ffff888101094fa9) [ 25.080154] [ 25.080328] The buggy address belongs to the physical page: [ 25.081186] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101094 [ 25.081926] flags: 0x200000000000000(node=0|zone=2) [ 25.082948] page_type: f5(slab) [ 25.083619] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 25.084067] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 25.085369] page dumped because: kasan: bad access detected [ 25.085898] [ 25.086052] Memory state around the buggy address: [ 25.086360] ffff888101094e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.087372] ffff888101094f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.088233] >ffff888101094f80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 25.088963] ^ [ 25.089656] ffff888101095000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 25.090498] ffff888101095080: 00 fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 [ 25.090977] ================================================================== [ 24.793767] ================================================================== [ 24.794307] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19d/0xd50 [ 24.795033] Write of size 8 at addr ffff888101094fa8 by task kunit_try_catch/269 [ 24.796241] [ 24.796527] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 24.798508] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.798856] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.799637] Call Trace: [ 24.800012] <TASK> [ 24.800357] dump_stack_lvl+0x73/0xb0 [ 24.800810] print_report+0xd1/0x640 [ 24.801160] ? __virt_addr_valid+0x1db/0x2d0 [ 24.801690] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.802071] kasan_report+0x102/0x140 [ 24.802491] ? kasan_bitops_modify.constprop.0+0x19d/0xd50 [ 24.803013] ? kasan_bitops_modify.constprop.0+0x19d/0xd50 [ 24.803761] kasan_check_range+0x10c/0x1c0 [ 24.804451] __kasan_check_write+0x18/0x20 [ 24.804858] kasan_bitops_modify.constprop.0+0x19d/0xd50 [ 24.805217] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 24.805874] ? __kmalloc_cache_noprof+0x184/0x410 [ 24.806427] ? kasan_bitops_generic+0x93/0x1c0 [ 24.806962] kasan_bitops_generic+0x117/0x1c0 [ 24.807827] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 24.808173] ? __pfx_read_tsc+0x10/0x10 [ 24.808944] ? ktime_get_ts64+0x84/0x230 [ 24.809257] kunit_try_run_case+0x1b3/0x490 [ 24.809912] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.810770] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 24.811111] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.811793] ? __kthread_parkme+0x82/0x160 [ 24.812703] ? preempt_count_sub+0x50/0x80 [ 24.813064] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.813518] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.814133] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.814744] kthread+0x257/0x310 [ 24.815019] ? __pfx_kthread+0x10/0x10 [ 24.815581] ret_from_fork+0x41/0x80 [ 24.815917] ? __pfx_kthread+0x10/0x10 [ 24.816577] ret_from_fork_asm+0x1a/0x30 [ 24.817417] </TASK> [ 24.817637] [ 24.817832] Allocated by task 269: [ 24.818273] kasan_save_stack+0x3d/0x60 [ 24.818597] kasan_save_track+0x18/0x40 [ 24.819029] kasan_save_alloc_info+0x3b/0x50 [ 24.819736] __kasan_kmalloc+0xb7/0xc0 [ 24.820026] __kmalloc_cache_noprof+0x184/0x410 [ 24.820330] kasan_bitops_generic+0x93/0x1c0 [ 24.820646] kunit_try_run_case+0x1b3/0x490 [ 24.821700] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.822603] kthread+0x257/0x310 [ 24.823028] ret_from_fork+0x41/0x80 [ 24.823574] ret_from_fork_asm+0x1a/0x30 [ 24.823858] [ 24.824009] The buggy address belongs to the object at ffff888101094fa0 [ 24.824009] which belongs to the cache kmalloc-16 of size 16 [ 24.825997] The buggy address is located 8 bytes inside of [ 24.825997] allocated 9-byte region [ffff888101094fa0, ffff888101094fa9) [ 24.827475] [ 24.827656] The buggy address belongs to the physical page: [ 24.828085] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101094 [ 24.829573] flags: 0x200000000000000(node=0|zone=2) [ 24.830149] page_type: f5(slab) [ 24.830638] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 24.832122] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 24.833112] page dumped because: kasan: bad access detected [ 24.833978] [ 24.834119] Memory state around the buggy address: [ 24.834687] ffff888101094e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.835578] ffff888101094f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.836522] >ffff888101094f80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 24.837452] ^ [ 24.838206] ffff888101095000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.839678] ffff888101095080: 00 fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 [ 24.840555] ================================================================== [ 24.842593] ================================================================== [ 24.844060] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23b/0xd50 [ 24.845766] Write of size 8 at addr ffff888101094fa8 by task kunit_try_catch/269 [ 24.846628] [ 24.847127] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 24.849293] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.849566] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.849897] Call Trace: [ 24.850582] <TASK> [ 24.850777] dump_stack_lvl+0x73/0xb0 [ 24.851102] print_report+0xd1/0x640 [ 24.851669] ? __virt_addr_valid+0x1db/0x2d0 [ 24.852029] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.852872] kasan_report+0x102/0x140 [ 24.853473] ? kasan_bitops_modify.constprop.0+0x23b/0xd50 [ 24.854117] ? kasan_bitops_modify.constprop.0+0x23b/0xd50 [ 24.854620] kasan_check_range+0x10c/0x1c0 [ 24.855236] __kasan_check_write+0x18/0x20 [ 24.855651] kasan_bitops_modify.constprop.0+0x23b/0xd50 [ 24.856027] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 24.857036] ? __kmalloc_cache_noprof+0x184/0x410 [ 24.857434] ? kasan_bitops_generic+0x93/0x1c0 [ 24.858067] kasan_bitops_generic+0x117/0x1c0 [ 24.858609] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 24.859077] ? __pfx_read_tsc+0x10/0x10 [ 24.859476] ? ktime_get_ts64+0x84/0x230 [ 24.859789] kunit_try_run_case+0x1b3/0x490 [ 24.860227] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.862147] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 24.863167] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.864375] ? __kthread_parkme+0x82/0x160 [ 24.864986] ? preempt_count_sub+0x50/0x80 [ 24.865467] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.866178] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.866949] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.867915] kthread+0x257/0x310 [ 24.868797] ? __pfx_kthread+0x10/0x10 [ 24.869263] ret_from_fork+0x41/0x80 [ 24.869975] ? __pfx_kthread+0x10/0x10 [ 24.870695] ret_from_fork_asm+0x1a/0x30 [ 24.871693] </TASK> [ 24.872014] [ 24.872264] Allocated by task 269: [ 24.873079] kasan_save_stack+0x3d/0x60 [ 24.874062] kasan_save_track+0x18/0x40 [ 24.874445] kasan_save_alloc_info+0x3b/0x50 [ 24.875593] __kasan_kmalloc+0xb7/0xc0 [ 24.876001] __kmalloc_cache_noprof+0x184/0x410 [ 24.876721] kasan_bitops_generic+0x93/0x1c0 [ 24.877119] kunit_try_run_case+0x1b3/0x490 [ 24.877507] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.878107] kthread+0x257/0x310 [ 24.878785] ret_from_fork+0x41/0x80 [ 24.879056] ret_from_fork_asm+0x1a/0x30 [ 24.879987] [ 24.880451] The buggy address belongs to the object at ffff888101094fa0 [ 24.880451] which belongs to the cache kmalloc-16 of size 16 [ 24.881743] The buggy address is located 8 bytes inside of [ 24.881743] allocated 9-byte region [ffff888101094fa0, ffff888101094fa9) [ 24.883209] [ 24.883464] The buggy address belongs to the physical page: [ 24.884012] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101094 [ 24.884882] flags: 0x200000000000000(node=0|zone=2) [ 24.885559] page_type: f5(slab) [ 24.885934] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 24.887000] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 24.887781] page dumped because: kasan: bad access detected [ 24.888457] [ 24.888709] Memory state around the buggy address: [ 24.889356] ffff888101094e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.890045] ffff888101094f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.891257] >ffff888101094f80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 24.891876] ^ [ 24.892496] ffff888101095000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.893046] ffff888101095080: 00 fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 [ 24.893872] ==================================================================