Date
Nov. 28, 2024, 2:36 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 34.189910] ================================================================== [ 34.190665] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc8 [ 34.191473] Write of size 8 at addr fff00000c4005ea8 by task kunit_try_catch/249 [ 34.192712] [ 34.192994] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 34.194249] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.194932] Hardware name: linux,dummy-virt (DT) [ 34.195675] Call trace: [ 34.196283] show_stack+0x20/0x38 (C) [ 34.196970] dump_stack_lvl+0x8c/0xd0 [ 34.197566] print_report+0x118/0x5e0 [ 34.198109] kasan_report+0xc8/0x118 [ 34.198652] kasan_check_range+0x100/0x1a8 [ 34.199531] __kasan_check_write+0x20/0x30 [ 34.200095] kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc8 [ 34.200871] kasan_bitops_generic+0x11c/0x1c8 [ 34.201523] kunit_try_run_case+0x14c/0x3d0 [ 34.202081] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.202854] kthread+0x24c/0x2d0 [ 34.203347] ret_from_fork+0x10/0x20 [ 34.203950] [ 34.204312] Allocated by task 249: [ 34.204748] kasan_save_stack+0x3c/0x68 [ 34.205355] kasan_save_track+0x20/0x40 [ 34.205899] kasan_save_alloc_info+0x40/0x58 [ 34.206444] __kasan_kmalloc+0xd4/0xd8 [ 34.207028] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.207557] kasan_bitops_generic+0xa0/0x1c8 [ 34.208187] kunit_try_run_case+0x14c/0x3d0 [ 34.208771] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.209451] kthread+0x24c/0x2d0 [ 34.209944] ret_from_fork+0x10/0x20 [ 34.210484] [ 34.210836] The buggy address belongs to the object at fff00000c4005ea0 [ 34.210836] which belongs to the cache kmalloc-16 of size 16 [ 34.211918] The buggy address is located 8 bytes inside of [ 34.211918] allocated 9-byte region [fff00000c4005ea0, fff00000c4005ea9) [ 34.213108] [ 34.213478] The buggy address belongs to the physical page: [ 34.214038] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104005 [ 34.215000] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.215654] page_type: f5(slab) [ 34.216212] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 34.217143] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 34.217907] page dumped because: kasan: bad access detected [ 34.218558] [ 34.218875] Memory state around the buggy address: [ 34.219521] fff00000c4005d80: 00 05 fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 34.220260] fff00000c4005e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.221057] >fff00000c4005e80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 34.222016] ^ [ 34.222579] fff00000c4005f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.223290] fff00000c4005f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.224063] ================================================================== [ 34.260533] ================================================================== [ 34.261305] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc8 [ 34.262163] Write of size 8 at addr fff00000c4005ea8 by task kunit_try_catch/249 [ 34.262830] [ 34.263217] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 34.264272] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.264814] Hardware name: linux,dummy-virt (DT) [ 34.265309] Call trace: [ 34.265737] show_stack+0x20/0x38 (C) [ 34.266374] dump_stack_lvl+0x8c/0xd0 [ 34.266931] print_report+0x118/0x5e0 [ 34.267488] kasan_report+0xc8/0x118 [ 34.268070] kasan_check_range+0x100/0x1a8 [ 34.268707] __kasan_check_write+0x20/0x30 [ 34.269373] kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc8 [ 34.270139] kasan_bitops_generic+0x11c/0x1c8 [ 34.270690] kunit_try_run_case+0x14c/0x3d0 [ 34.271354] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.272065] kthread+0x24c/0x2d0 [ 34.272660] ret_from_fork+0x10/0x20 [ 34.273257] [ 34.273567] Allocated by task 249: [ 34.274094] kasan_save_stack+0x3c/0x68 [ 34.274695] kasan_save_track+0x20/0x40 [ 34.275268] kasan_save_alloc_info+0x40/0x58 [ 34.275776] __kasan_kmalloc+0xd4/0xd8 [ 34.276374] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.276941] kasan_bitops_generic+0xa0/0x1c8 [ 34.277500] kunit_try_run_case+0x14c/0x3d0 [ 34.278094] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.278816] kthread+0x24c/0x2d0 [ 34.279376] ret_from_fork+0x10/0x20 [ 34.279932] [ 34.280303] The buggy address belongs to the object at fff00000c4005ea0 [ 34.280303] which belongs to the cache kmalloc-16 of size 16 [ 34.281495] The buggy address is located 8 bytes inside of [ 34.281495] allocated 9-byte region [fff00000c4005ea0, fff00000c4005ea9) [ 34.282589] [ 34.282947] The buggy address belongs to the physical page: [ 34.283806] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104005 [ 34.284616] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.285610] page_type: f5(slab) [ 34.286095] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 34.287026] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 34.287790] page dumped because: kasan: bad access detected [ 34.288507] [ 34.288847] Memory state around the buggy address: [ 34.289391] fff00000c4005d80: 00 05 fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 34.290229] fff00000c4005e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.291091] >fff00000c4005e80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 34.291787] ^ [ 34.292424] fff00000c4005f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.293125] fff00000c4005f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.293929] ================================================================== [ 34.296652] ================================================================== [ 34.297680] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa50/0xbc8 [ 34.298528] Read of size 8 at addr fff00000c4005ea8 by task kunit_try_catch/249 [ 34.298906] [ 34.299083] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 34.299825] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.300367] Hardware name: linux,dummy-virt (DT) [ 34.300911] Call trace: [ 34.301416] show_stack+0x20/0x38 (C) [ 34.302037] dump_stack_lvl+0x8c/0xd0 [ 34.302758] print_report+0x118/0x5e0 [ 34.303423] kasan_report+0xc8/0x118 [ 34.304097] __asan_report_load8_noabort+0x20/0x30 [ 34.304859] kasan_bitops_test_and_modify.constprop.0+0xa50/0xbc8 [ 34.305703] kasan_bitops_generic+0x11c/0x1c8 [ 34.306008] kunit_try_run_case+0x14c/0x3d0 [ 34.306486] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.307278] kthread+0x24c/0x2d0 [ 34.307753] ret_from_fork+0x10/0x20 [ 34.308415] [ 34.308799] Allocated by task 249: [ 34.309320] kasan_save_stack+0x3c/0x68 [ 34.309958] kasan_save_track+0x20/0x40 [ 34.310555] kasan_save_alloc_info+0x40/0x58 [ 34.311248] __kasan_kmalloc+0xd4/0xd8 [ 34.311831] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.312485] kasan_bitops_generic+0xa0/0x1c8 [ 34.313137] kunit_try_run_case+0x14c/0x3d0 [ 34.313692] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.314356] kthread+0x24c/0x2d0 [ 34.314907] ret_from_fork+0x10/0x20 [ 34.315494] [ 34.315794] The buggy address belongs to the object at fff00000c4005ea0 [ 34.315794] which belongs to the cache kmalloc-16 of size 16 [ 34.316945] The buggy address is located 8 bytes inside of [ 34.316945] allocated 9-byte region [fff00000c4005ea0, fff00000c4005ea9) [ 34.318104] [ 34.318460] The buggy address belongs to the physical page: [ 34.319159] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104005 [ 34.320075] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.320773] page_type: f5(slab) [ 34.321309] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 34.322085] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 34.322985] page dumped because: kasan: bad access detected [ 34.323647] [ 34.324004] Memory state around the buggy address: [ 34.324654] fff00000c4005d80: 00 05 fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 34.325340] fff00000c4005e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.326203] >fff00000c4005e80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 34.326822] ^ [ 34.327457] fff00000c4005f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.328229] fff00000c4005f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.328997] ================================================================== [ 34.473439] ================================================================== [ 34.474588] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa8c/0xbc8 [ 34.475470] Read of size 8 at addr fff00000c4005ea8 by task kunit_try_catch/249 [ 34.476481] [ 34.477385] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 34.478737] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.479319] Hardware name: linux,dummy-virt (DT) [ 34.479882] Call trace: [ 34.480289] show_stack+0x20/0x38 (C) [ 34.480798] dump_stack_lvl+0x8c/0xd0 [ 34.481424] print_report+0x118/0x5e0 [ 34.481945] kasan_report+0xc8/0x118 [ 34.482544] __asan_report_load8_noabort+0x20/0x30 [ 34.483174] kasan_bitops_test_and_modify.constprop.0+0xa8c/0xbc8 [ 34.483828] kasan_bitops_generic+0x11c/0x1c8 [ 34.484498] kunit_try_run_case+0x14c/0x3d0 [ 34.485146] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.485991] kthread+0x24c/0x2d0 [ 34.486565] ret_from_fork+0x10/0x20 [ 34.486845] [ 34.487000] Allocated by task 249: [ 34.487322] kasan_save_stack+0x3c/0x68 [ 34.487917] kasan_save_track+0x20/0x40 [ 34.488441] kasan_save_alloc_info+0x40/0x58 [ 34.489087] __kasan_kmalloc+0xd4/0xd8 [ 34.489689] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.490333] kasan_bitops_generic+0xa0/0x1c8 [ 34.490823] kunit_try_run_case+0x14c/0x3d0 [ 34.491453] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.492194] kthread+0x24c/0x2d0 [ 34.492745] ret_from_fork+0x10/0x20 [ 34.493239] [ 34.493574] The buggy address belongs to the object at fff00000c4005ea0 [ 34.493574] which belongs to the cache kmalloc-16 of size 16 [ 34.494750] The buggy address is located 8 bytes inside of [ 34.494750] allocated 9-byte region [fff00000c4005ea0, fff00000c4005ea9) [ 34.495834] [ 34.496198] The buggy address belongs to the physical page: [ 34.496865] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104005 [ 34.497790] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.498513] page_type: f5(slab) [ 34.499049] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 34.499817] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 34.500698] page dumped because: kasan: bad access detected [ 34.501411] [ 34.501751] Memory state around the buggy address: [ 34.502257] fff00000c4005d80: 00 05 fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 34.503444] fff00000c4005e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.504590] >fff00000c4005e80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 34.505389] ^ [ 34.505907] fff00000c4005f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.507130] fff00000c4005f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.507899] ================================================================== [ 34.366136] ================================================================== [ 34.366944] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xad4/0xbc8 [ 34.367706] Read of size 8 at addr fff00000c4005ea8 by task kunit_try_catch/249 [ 34.368525] [ 34.368904] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 34.369927] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.370480] Hardware name: linux,dummy-virt (DT) [ 34.371101] Call trace: [ 34.371546] show_stack+0x20/0x38 (C) [ 34.372149] dump_stack_lvl+0x8c/0xd0 [ 34.372698] print_report+0x118/0x5e0 [ 34.373207] kasan_report+0xc8/0x118 [ 34.373793] __asan_report_load8_noabort+0x20/0x30 [ 34.374449] kasan_bitops_test_and_modify.constprop.0+0xad4/0xbc8 [ 34.375276] kasan_bitops_generic+0x11c/0x1c8 [ 34.375919] kunit_try_run_case+0x14c/0x3d0 [ 34.376546] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.377290] kthread+0x24c/0x2d0 [ 34.377813] ret_from_fork+0x10/0x20 [ 34.378372] [ 34.378708] Allocated by task 249: [ 34.379139] kasan_save_stack+0x3c/0x68 [ 34.379741] kasan_save_track+0x20/0x40 [ 34.380296] kasan_save_alloc_info+0x40/0x58 [ 34.380852] __kasan_kmalloc+0xd4/0xd8 [ 34.381446] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.381968] kasan_bitops_generic+0xa0/0x1c8 [ 34.382614] kunit_try_run_case+0x14c/0x3d0 [ 34.383229] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.383970] kthread+0x24c/0x2d0 [ 34.384528] ret_from_fork+0x10/0x20 [ 34.385041] [ 34.385373] The buggy address belongs to the object at fff00000c4005ea0 [ 34.385373] which belongs to the cache kmalloc-16 of size 16 [ 34.386614] The buggy address is located 8 bytes inside of [ 34.386614] allocated 9-byte region [fff00000c4005ea0, fff00000c4005ea9) [ 34.387750] [ 34.388109] The buggy address belongs to the physical page: [ 34.388669] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104005 [ 34.389561] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.390353] page_type: f5(slab) [ 34.390887] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 34.391605] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 34.392565] page dumped because: kasan: bad access detected [ 34.393396] [ 34.393905] Memory state around the buggy address: [ 34.394485] fff00000c4005d80: 00 05 fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 34.395475] fff00000c4005e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.396432] >fff00000c4005e80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 34.397359] ^ [ 34.398106] fff00000c4005f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.399053] fff00000c4005f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.400006] ================================================================== [ 34.225640] ================================================================== [ 34.226414] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa08/0xbc8 [ 34.227737] Read of size 8 at addr fff00000c4005ea8 by task kunit_try_catch/249 [ 34.228603] [ 34.228977] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 34.230231] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.230579] Hardware name: linux,dummy-virt (DT) [ 34.230945] Call trace: [ 34.232211] show_stack+0x20/0x38 (C) [ 34.233026] dump_stack_lvl+0x8c/0xd0 [ 34.233632] print_report+0x118/0x5e0 [ 34.234223] kasan_report+0xc8/0x118 [ 34.234799] __asan_report_load8_noabort+0x20/0x30 [ 34.235442] kasan_bitops_test_and_modify.constprop.0+0xa08/0xbc8 [ 34.236187] kasan_bitops_generic+0x11c/0x1c8 [ 34.236778] kunit_try_run_case+0x14c/0x3d0 [ 34.237368] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.238105] kthread+0x24c/0x2d0 [ 34.238627] ret_from_fork+0x10/0x20 [ 34.239190] [ 34.239513] Allocated by task 249: [ 34.239995] kasan_save_stack+0x3c/0x68 [ 34.240611] kasan_save_track+0x20/0x40 [ 34.241168] kasan_save_alloc_info+0x40/0x58 [ 34.241808] __kasan_kmalloc+0xd4/0xd8 [ 34.242405] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.243049] kasan_bitops_generic+0xa0/0x1c8 [ 34.243608] kunit_try_run_case+0x14c/0x3d0 [ 34.244234] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.244880] kthread+0x24c/0x2d0 [ 34.245444] ret_from_fork+0x10/0x20 [ 34.245897] [ 34.246257] The buggy address belongs to the object at fff00000c4005ea0 [ 34.246257] which belongs to the cache kmalloc-16 of size 16 [ 34.247260] The buggy address is located 8 bytes inside of [ 34.247260] allocated 9-byte region [fff00000c4005ea0, fff00000c4005ea9) [ 34.248559] [ 34.248911] The buggy address belongs to the physical page: [ 34.249466] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104005 [ 34.250390] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.251061] page_type: f5(slab) [ 34.251585] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 34.252427] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 34.253199] page dumped because: kasan: bad access detected [ 34.253878] [ 34.254246] Memory state around the buggy address: [ 34.254822] fff00000c4005d80: 00 05 fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 34.255621] fff00000c4005e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.256363] >fff00000c4005e80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 34.257076] ^ [ 34.257681] fff00000c4005f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.258407] fff00000c4005f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.259198] ================================================================== [ 34.402042] ================================================================== [ 34.402927] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x334/0xbc8 [ 34.404368] Write of size 8 at addr fff00000c4005ea8 by task kunit_try_catch/249 [ 34.406332] [ 34.406679] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 34.407621] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.408749] Hardware name: linux,dummy-virt (DT) [ 34.409622] Call trace: [ 34.410183] show_stack+0x20/0x38 (C) [ 34.410857] dump_stack_lvl+0x8c/0xd0 [ 34.411463] print_report+0x118/0x5e0 [ 34.412062] kasan_report+0xc8/0x118 [ 34.412667] kasan_check_range+0x100/0x1a8 [ 34.413253] __kasan_check_write+0x20/0x30 [ 34.413875] kasan_bitops_test_and_modify.constprop.0+0x334/0xbc8 [ 34.414647] kasan_bitops_generic+0x11c/0x1c8 [ 34.415239] kunit_try_run_case+0x14c/0x3d0 [ 34.415796] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.416591] kthread+0x24c/0x2d0 [ 34.417162] ret_from_fork+0x10/0x20 [ 34.417836] [ 34.418236] Allocated by task 249: [ 34.418865] kasan_save_stack+0x3c/0x68 [ 34.419535] kasan_save_track+0x20/0x40 [ 34.420179] kasan_save_alloc_info+0x40/0x58 [ 34.420844] __kasan_kmalloc+0xd4/0xd8 [ 34.421351] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.421712] kasan_bitops_generic+0xa0/0x1c8 [ 34.421980] kunit_try_run_case+0x14c/0x3d0 [ 34.422398] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.423194] kthread+0x24c/0x2d0 [ 34.423806] ret_from_fork+0x10/0x20 [ 34.424432] [ 34.424809] The buggy address belongs to the object at fff00000c4005ea0 [ 34.424809] which belongs to the cache kmalloc-16 of size 16 [ 34.426036] The buggy address is located 8 bytes inside of [ 34.426036] allocated 9-byte region [fff00000c4005ea0, fff00000c4005ea9) [ 34.427274] [ 34.427607] The buggy address belongs to the physical page: [ 34.428244] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104005 [ 34.429087] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.429780] page_type: f5(slab) [ 34.430224] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 34.431162] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 34.432060] page dumped because: kasan: bad access detected [ 34.432763] [ 34.433077] Memory state around the buggy address: [ 34.433572] fff00000c4005d80: 00 05 fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 34.434423] fff00000c4005e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.435161] >fff00000c4005e80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 34.435907] ^ [ 34.436563] fff00000c4005f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.437381] fff00000c4005f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.438227] ================================================================== [ 34.439640] ================================================================== [ 34.440385] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa44/0xbc8 [ 34.441284] Read of size 8 at addr fff00000c4005ea8 by task kunit_try_catch/249 [ 34.442165] [ 34.442556] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 34.443615] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.444095] Hardware name: linux,dummy-virt (DT) [ 34.444723] Call trace: [ 34.445166] show_stack+0x20/0x38 (C) [ 34.445755] dump_stack_lvl+0x8c/0xd0 [ 34.446301] print_report+0x118/0x5e0 [ 34.446878] kasan_report+0xc8/0x118 [ 34.447390] __asan_report_load8_noabort+0x20/0x30 [ 34.448059] kasan_bitops_test_and_modify.constprop.0+0xa44/0xbc8 [ 34.448880] kasan_bitops_generic+0x11c/0x1c8 [ 34.449413] kunit_try_run_case+0x14c/0x3d0 [ 34.450062] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.450831] kthread+0x24c/0x2d0 [ 34.451344] ret_from_fork+0x10/0x20 [ 34.451935] [ 34.452311] Allocated by task 249: [ 34.452723] kasan_save_stack+0x3c/0x68 [ 34.453326] kasan_save_track+0x20/0x40 [ 34.453826] kasan_save_alloc_info+0x40/0x58 [ 34.454468] __kasan_kmalloc+0xd4/0xd8 [ 34.454983] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.455660] kasan_bitops_generic+0xa0/0x1c8 [ 34.456294] kunit_try_run_case+0x14c/0x3d0 [ 34.456837] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.457549] kthread+0x24c/0x2d0 [ 34.458106] ret_from_fork+0x10/0x20 [ 34.458675] [ 34.459005] The buggy address belongs to the object at fff00000c4005ea0 [ 34.459005] which belongs to the cache kmalloc-16 of size 16 [ 34.460270] The buggy address is located 8 bytes inside of [ 34.460270] allocated 9-byte region [fff00000c4005ea0, fff00000c4005ea9) [ 34.461245] [ 34.461594] The buggy address belongs to the physical page: [ 34.462293] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104005 [ 34.463196] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.463974] page_type: f5(slab) [ 34.464517] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 34.465336] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 34.466181] page dumped because: kasan: bad access detected [ 34.466715] [ 34.467066] Memory state around the buggy address: [ 34.467697] fff00000c4005d80: 00 05 fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 34.468434] fff00000c4005e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.469239] >fff00000c4005e80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 34.469891] ^ [ 34.470524] fff00000c4005f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.471282] fff00000c4005f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.471999] ================================================================== [ 34.330381] ================================================================== [ 34.331108] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc8 [ 34.332482] Write of size 8 at addr fff00000c4005ea8 by task kunit_try_catch/249 [ 34.333344] [ 34.333726] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 34.334812] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.335291] Hardware name: linux,dummy-virt (DT) [ 34.335905] Call trace: [ 34.336327] show_stack+0x20/0x38 (C) [ 34.336882] dump_stack_lvl+0x8c/0xd0 [ 34.337509] print_report+0x118/0x5e0 [ 34.338129] kasan_report+0xc8/0x118 [ 34.338725] kasan_check_range+0x100/0x1a8 [ 34.339340] __kasan_check_write+0x20/0x30 [ 34.339973] kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc8 [ 34.340733] kasan_bitops_generic+0x11c/0x1c8 [ 34.341316] kunit_try_run_case+0x14c/0x3d0 [ 34.341966] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.342657] kthread+0x24c/0x2d0 [ 34.343212] ret_from_fork+0x10/0x20 [ 34.343706] [ 34.344061] Allocated by task 249: [ 34.344608] kasan_save_stack+0x3c/0x68 [ 34.345155] kasan_save_track+0x20/0x40 [ 34.345721] kasan_save_alloc_info+0x40/0x58 [ 34.346299] __kasan_kmalloc+0xd4/0xd8 [ 34.346854] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.347519] kasan_bitops_generic+0xa0/0x1c8 [ 34.348155] kunit_try_run_case+0x14c/0x3d0 [ 34.348729] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.349347] kthread+0x24c/0x2d0 [ 34.349888] ret_from_fork+0x10/0x20 [ 34.350461] [ 34.350793] The buggy address belongs to the object at fff00000c4005ea0 [ 34.350793] which belongs to the cache kmalloc-16 of size 16 [ 34.351928] The buggy address is located 8 bytes inside of [ 34.351928] allocated 9-byte region [fff00000c4005ea0, fff00000c4005ea9) [ 34.353194] [ 34.353535] The buggy address belongs to the physical page: [ 34.354141] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104005 [ 34.355014] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.355660] page_type: f5(slab) [ 34.356216] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 34.357108] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 34.358006] page dumped because: kasan: bad access detected [ 34.358650] [ 34.358999] Memory state around the buggy address: [ 34.359627] fff00000c4005d80: 00 05 fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 34.360434] fff00000c4005e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.361213] >fff00000c4005e80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 34.361980] ^ [ 34.362620] fff00000c4005f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.363314] fff00000c4005f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.364168] ==================================================================
[ 25.469983] ================================================================== [ 25.470866] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x558/0xd90 [ 25.471762] Read of size 8 at addr ffff888101094fa8 by task kunit_try_catch/269 [ 25.472493] [ 25.472774] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 25.473838] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.474279] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.475275] Call Trace: [ 25.475536] <TASK> [ 25.475890] dump_stack_lvl+0x73/0xb0 [ 25.476407] print_report+0xd1/0x640 [ 25.476775] ? __virt_addr_valid+0x1db/0x2d0 [ 25.477228] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.477953] kasan_report+0x102/0x140 [ 25.478482] ? kasan_bitops_test_and_modify.constprop.0+0x558/0xd90 [ 25.479640] ? kasan_bitops_test_and_modify.constprop.0+0x558/0xd90 [ 25.480602] kasan_check_range+0x10c/0x1c0 [ 25.481177] __kasan_check_read+0x15/0x20 [ 25.481713] kasan_bitops_test_and_modify.constprop.0+0x558/0xd90 [ 25.482406] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 25.483028] ? __kmalloc_cache_noprof+0x184/0x410 [ 25.483523] ? kasan_bitops_generic+0x93/0x1c0 [ 25.483905] kasan_bitops_generic+0x122/0x1c0 [ 25.484435] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 25.484840] ? __pfx_read_tsc+0x10/0x10 [ 25.485295] ? ktime_get_ts64+0x84/0x230 [ 25.485657] kunit_try_run_case+0x1b3/0x490 [ 25.486221] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.486764] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 25.487243] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.487790] ? __kthread_parkme+0x82/0x160 [ 25.488371] ? preempt_count_sub+0x50/0x80 [ 25.488795] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.489428] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.489893] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.490445] kthread+0x257/0x310 [ 25.490872] ? __pfx_kthread+0x10/0x10 [ 25.491260] ret_from_fork+0x41/0x80 [ 25.491737] ? __pfx_kthread+0x10/0x10 [ 25.492103] ret_from_fork_asm+0x1a/0x30 [ 25.492463] </TASK> [ 25.492767] [ 25.492999] Allocated by task 269: [ 25.493382] kasan_save_stack+0x3d/0x60 [ 25.493705] kasan_save_track+0x18/0x40 [ 25.493981] kasan_save_alloc_info+0x3b/0x50 [ 25.494614] __kasan_kmalloc+0xb7/0xc0 [ 25.494996] __kmalloc_cache_noprof+0x184/0x410 [ 25.495468] kasan_bitops_generic+0x93/0x1c0 [ 25.495813] kunit_try_run_case+0x1b3/0x490 [ 25.496377] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.496996] kthread+0x257/0x310 [ 25.497375] ret_from_fork+0x41/0x80 [ 25.497744] ret_from_fork_asm+0x1a/0x30 [ 25.498122] [ 25.498277] The buggy address belongs to the object at ffff888101094fa0 [ 25.498277] which belongs to the cache kmalloc-16 of size 16 [ 25.499435] The buggy address is located 8 bytes inside of [ 25.499435] allocated 9-byte region [ffff888101094fa0, ffff888101094fa9) [ 25.500216] [ 25.500418] The buggy address belongs to the physical page: [ 25.501048] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101094 [ 25.501728] flags: 0x200000000000000(node=0|zone=2) [ 25.502109] page_type: f5(slab) [ 25.502512] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 25.503314] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 25.503944] page dumped because: kasan: bad access detected [ 25.504540] [ 25.504780] Memory state around the buggy address: [ 25.505251] ffff888101094e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.505694] ffff888101094f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.506546] >ffff888101094f80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 25.507209] ^ [ 25.507698] ffff888101095000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 25.508408] ffff888101095080: 00 fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 [ 25.509017] ================================================================== [ 25.379175] ================================================================== [ 25.381325] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90 [ 25.382722] Write of size 8 at addr ffff888101094fa8 by task kunit_try_catch/269 [ 25.383458] [ 25.383724] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 25.385065] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.385836] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.386763] Call Trace: [ 25.387129] <TASK> [ 25.387585] dump_stack_lvl+0x73/0xb0 [ 25.388172] print_report+0xd1/0x640 [ 25.388783] ? __virt_addr_valid+0x1db/0x2d0 [ 25.389462] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.390020] kasan_report+0x102/0x140 [ 25.390834] ? kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90 [ 25.391611] ? kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90 [ 25.392197] kasan_check_range+0x10c/0x1c0 [ 25.392603] __kasan_check_write+0x18/0x20 [ 25.393096] kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90 [ 25.393773] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 25.394479] ? __kmalloc_cache_noprof+0x184/0x410 [ 25.394895] ? kasan_bitops_generic+0x93/0x1c0 [ 25.395754] kasan_bitops_generic+0x122/0x1c0 [ 25.396093] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 25.396385] ? __pfx_read_tsc+0x10/0x10 [ 25.397008] ? ktime_get_ts64+0x84/0x230 [ 25.397399] kunit_try_run_case+0x1b3/0x490 [ 25.398188] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.398772] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 25.399234] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.399665] ? __kthread_parkme+0x82/0x160 [ 25.400049] ? preempt_count_sub+0x50/0x80 [ 25.400542] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.400979] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.401566] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.402116] kthread+0x257/0x310 [ 25.402468] ? __pfx_kthread+0x10/0x10 [ 25.402837] ret_from_fork+0x41/0x80 [ 25.403364] ? __pfx_kthread+0x10/0x10 [ 25.403814] ret_from_fork_asm+0x1a/0x30 [ 25.404253] </TASK> [ 25.404566] [ 25.404802] Allocated by task 269: [ 25.405233] kasan_save_stack+0x3d/0x60 [ 25.405608] kasan_save_track+0x18/0x40 [ 25.406043] kasan_save_alloc_info+0x3b/0x50 [ 25.406587] __kasan_kmalloc+0xb7/0xc0 [ 25.406957] __kmalloc_cache_noprof+0x184/0x410 [ 25.407355] kasan_bitops_generic+0x93/0x1c0 [ 25.407845] kunit_try_run_case+0x1b3/0x490 [ 25.408325] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.408737] kthread+0x257/0x310 [ 25.409192] ret_from_fork+0x41/0x80 [ 25.409672] ret_from_fork_asm+0x1a/0x30 [ 25.410061] [ 25.411132] The buggy address belongs to the object at ffff888101094fa0 [ 25.411132] which belongs to the cache kmalloc-16 of size 16 [ 25.411901] The buggy address is located 8 bytes inside of [ 25.411901] allocated 9-byte region [ffff888101094fa0, ffff888101094fa9) [ 25.412767] [ 25.412923] The buggy address belongs to the physical page: [ 25.413397] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101094 [ 25.414054] flags: 0x200000000000000(node=0|zone=2) [ 25.414673] page_type: f5(slab) [ 25.414959] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 25.415612] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 25.416310] page dumped because: kasan: bad access detected [ 25.416860] [ 25.417030] Memory state around the buggy address: [ 25.417427] ffff888101094e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.418230] ffff888101094f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.419111] >ffff888101094f80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 25.419804] ^ [ 25.420158] ffff888101095000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 25.420876] ffff888101095080: 00 fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 [ 25.421656] ================================================================== [ 25.196735] ================================================================== [ 25.197849] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90 [ 25.198682] Write of size 8 at addr ffff888101094fa8 by task kunit_try_catch/269 [ 25.199448] [ 25.199786] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 25.200693] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.201366] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.202358] Call Trace: [ 25.202568] <TASK> [ 25.202912] dump_stack_lvl+0x73/0xb0 [ 25.203531] print_report+0xd1/0x640 [ 25.203855] ? __virt_addr_valid+0x1db/0x2d0 [ 25.204736] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.205295] kasan_report+0x102/0x140 [ 25.205801] ? kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90 [ 25.206525] ? kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90 [ 25.207357] kasan_check_range+0x10c/0x1c0 [ 25.207904] __kasan_check_write+0x18/0x20 [ 25.208357] kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90 [ 25.208897] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 25.209480] ? __kmalloc_cache_noprof+0x184/0x410 [ 25.210048] ? kasan_bitops_generic+0x93/0x1c0 [ 25.210719] kasan_bitops_generic+0x122/0x1c0 [ 25.211284] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 25.211851] ? __pfx_read_tsc+0x10/0x10 [ 25.212433] ? ktime_get_ts64+0x84/0x230 [ 25.212982] kunit_try_run_case+0x1b3/0x490 [ 25.213541] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.214215] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 25.214715] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.215317] ? __kthread_parkme+0x82/0x160 [ 25.215790] ? preempt_count_sub+0x50/0x80 [ 25.216360] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.216927] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.217675] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.218278] kthread+0x257/0x310 [ 25.218735] ? __pfx_kthread+0x10/0x10 [ 25.219192] ret_from_fork+0x41/0x80 [ 25.219709] ? __pfx_kthread+0x10/0x10 [ 25.220132] ret_from_fork_asm+0x1a/0x30 [ 25.220645] </TASK> [ 25.220996] [ 25.221265] Allocated by task 269: [ 25.221697] kasan_save_stack+0x3d/0x60 [ 25.222175] kasan_save_track+0x18/0x40 [ 25.222577] kasan_save_alloc_info+0x3b/0x50 [ 25.223190] __kasan_kmalloc+0xb7/0xc0 [ 25.223645] __kmalloc_cache_noprof+0x184/0x410 [ 25.224364] kasan_bitops_generic+0x93/0x1c0 [ 25.224664] kunit_try_run_case+0x1b3/0x490 [ 25.225284] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.225985] kthread+0x257/0x310 [ 25.226370] ret_from_fork+0x41/0x80 [ 25.226754] ret_from_fork_asm+0x1a/0x30 [ 25.227260] [ 25.227434] The buggy address belongs to the object at ffff888101094fa0 [ 25.227434] which belongs to the cache kmalloc-16 of size 16 [ 25.228756] The buggy address is located 8 bytes inside of [ 25.228756] allocated 9-byte region [ffff888101094fa0, ffff888101094fa9) [ 25.229688] [ 25.229905] The buggy address belongs to the physical page: [ 25.230627] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101094 [ 25.231213] flags: 0x200000000000000(node=0|zone=2) [ 25.231894] page_type: f5(slab) [ 25.232409] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 25.232999] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 25.233739] page dumped because: kasan: bad access detected [ 25.234418] [ 25.234611] Memory state around the buggy address: [ 25.235188] ffff888101094e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.236040] ffff888101094f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.237226] >ffff888101094f80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 25.238003] ^ [ 25.238523] ffff888101095000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 25.239197] ffff888101095080: 00 fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 [ 25.240073] ================================================================== [ 25.422712] ================================================================== [ 25.423537] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90 [ 25.424178] Write of size 8 at addr ffff888101094fa8 by task kunit_try_catch/269 [ 25.424918] [ 25.425254] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 25.426048] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.426480] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.427194] Call Trace: [ 25.427528] <TASK> [ 25.427767] dump_stack_lvl+0x73/0xb0 [ 25.428262] print_report+0xd1/0x640 [ 25.428747] ? __virt_addr_valid+0x1db/0x2d0 [ 25.429212] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.429636] kasan_report+0x102/0x140 [ 25.430188] ? kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90 [ 25.430712] ? kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90 [ 25.431413] kasan_check_range+0x10c/0x1c0 [ 25.431930] __kasan_check_write+0x18/0x20 [ 25.432365] kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90 [ 25.432931] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 25.433542] ? __kmalloc_cache_noprof+0x184/0x410 [ 25.434046] ? kasan_bitops_generic+0x93/0x1c0 [ 25.434543] kasan_bitops_generic+0x122/0x1c0 [ 25.435200] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 25.435666] ? __pfx_read_tsc+0x10/0x10 [ 25.436152] ? ktime_get_ts64+0x84/0x230 [ 25.436499] kunit_try_run_case+0x1b3/0x490 [ 25.436967] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.437504] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 25.437982] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.438630] ? __kthread_parkme+0x82/0x160 [ 25.439012] ? preempt_count_sub+0x50/0x80 [ 25.439395] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.439922] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.441030] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.441686] kthread+0x257/0x310 [ 25.441969] ? __pfx_kthread+0x10/0x10 [ 25.442851] ret_from_fork+0x41/0x80 [ 25.443759] ? __pfx_kthread+0x10/0x10 [ 25.444077] ret_from_fork_asm+0x1a/0x30 [ 25.444905] </TASK> [ 25.445284] [ 25.445493] Allocated by task 269: [ 25.445841] kasan_save_stack+0x3d/0x60 [ 25.446208] kasan_save_track+0x18/0x40 [ 25.447240] kasan_save_alloc_info+0x3b/0x50 [ 25.447621] __kasan_kmalloc+0xb7/0xc0 [ 25.448121] __kmalloc_cache_noprof+0x184/0x410 [ 25.448780] kasan_bitops_generic+0x93/0x1c0 [ 25.449484] kunit_try_run_case+0x1b3/0x490 [ 25.449985] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.450799] kthread+0x257/0x310 [ 25.451446] ret_from_fork+0x41/0x80 [ 25.452040] ret_from_fork_asm+0x1a/0x30 [ 25.452964] [ 25.453855] The buggy address belongs to the object at ffff888101094fa0 [ 25.453855] which belongs to the cache kmalloc-16 of size 16 [ 25.455212] The buggy address is located 8 bytes inside of [ 25.455212] allocated 9-byte region [ffff888101094fa0, ffff888101094fa9) [ 25.456642] [ 25.456907] The buggy address belongs to the physical page: [ 25.457895] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101094 [ 25.458992] flags: 0x200000000000000(node=0|zone=2) [ 25.459867] page_type: f5(slab) [ 25.460574] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 25.461407] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 25.462194] page dumped because: kasan: bad access detected [ 25.462854] [ 25.463154] Memory state around the buggy address: [ 25.464107] ffff888101094e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.464810] ffff888101094f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.465872] >ffff888101094f80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 25.466592] ^ [ 25.467212] ffff888101095000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 25.467927] ffff888101095080: 00 fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 [ 25.468855] ================================================================== [ 25.330678] ================================================================== [ 25.331715] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90 [ 25.332690] Write of size 8 at addr ffff888101094fa8 by task kunit_try_catch/269 [ 25.333324] [ 25.333643] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 25.334607] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.334999] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.335878] Call Trace: [ 25.336237] <TASK> [ 25.336513] dump_stack_lvl+0x73/0xb0 [ 25.337035] print_report+0xd1/0x640 [ 25.337423] ? __virt_addr_valid+0x1db/0x2d0 [ 25.337911] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.338580] kasan_report+0x102/0x140 [ 25.339048] ? kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90 [ 25.339536] ? kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90 [ 25.340443] kasan_check_range+0x10c/0x1c0 [ 25.340970] __kasan_check_write+0x18/0x20 [ 25.341840] kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90 [ 25.342713] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 25.343765] ? __kmalloc_cache_noprof+0x184/0x410 [ 25.344375] ? kasan_bitops_generic+0x93/0x1c0 [ 25.344820] kasan_bitops_generic+0x122/0x1c0 [ 25.345259] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 25.345786] ? __pfx_read_tsc+0x10/0x10 [ 25.346146] ? ktime_get_ts64+0x84/0x230 [ 25.347423] kunit_try_run_case+0x1b3/0x490 [ 25.347839] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.348193] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 25.348916] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.349670] ? __kthread_parkme+0x82/0x160 [ 25.350102] ? preempt_count_sub+0x50/0x80 [ 25.350655] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.351435] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.352087] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.352734] kthread+0x257/0x310 [ 25.353094] ? __pfx_kthread+0x10/0x10 [ 25.353854] ret_from_fork+0x41/0x80 [ 25.354694] ? __pfx_kthread+0x10/0x10 [ 25.355568] ret_from_fork_asm+0x1a/0x30 [ 25.355922] </TASK> [ 25.356198] [ 25.356384] Allocated by task 269: [ 25.356756] kasan_save_stack+0x3d/0x60 [ 25.357261] kasan_save_track+0x18/0x40 [ 25.357638] kasan_save_alloc_info+0x3b/0x50 [ 25.357970] __kasan_kmalloc+0xb7/0xc0 [ 25.358624] __kmalloc_cache_noprof+0x184/0x410 [ 25.359510] kasan_bitops_generic+0x93/0x1c0 [ 25.359825] kunit_try_run_case+0x1b3/0x490 [ 25.360444] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.361328] kthread+0x257/0x310 [ 25.362189] ret_from_fork+0x41/0x80 [ 25.362670] ret_from_fork_asm+0x1a/0x30 [ 25.363301] [ 25.363558] The buggy address belongs to the object at ffff888101094fa0 [ 25.363558] which belongs to the cache kmalloc-16 of size 16 [ 25.364732] The buggy address is located 8 bytes inside of [ 25.364732] allocated 9-byte region [ffff888101094fa0, ffff888101094fa9) [ 25.365960] [ 25.366269] The buggy address belongs to the physical page: [ 25.367047] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101094 [ 25.367836] flags: 0x200000000000000(node=0|zone=2) [ 25.368377] page_type: f5(slab) [ 25.368765] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 25.370301] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 25.371312] page dumped because: kasan: bad access detected [ 25.371952] [ 25.372197] Memory state around the buggy address: [ 25.372783] ffff888101094e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.373482] ffff888101094f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.373988] >ffff888101094f80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 25.375235] ^ [ 25.375813] ffff888101095000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 25.376628] ffff888101095080: 00 fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 [ 25.377733] ================================================================== [ 25.241389] ================================================================== [ 25.242479] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90 [ 25.243556] Write of size 8 at addr ffff888101094fa8 by task kunit_try_catch/269 [ 25.244688] [ 25.244915] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 25.245856] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.246393] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.247211] Call Trace: [ 25.247495] <TASK> [ 25.247859] dump_stack_lvl+0x73/0xb0 [ 25.248443] print_report+0xd1/0x640 [ 25.248747] ? __virt_addr_valid+0x1db/0x2d0 [ 25.249365] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.250014] kasan_report+0x102/0x140 [ 25.250350] ? kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90 [ 25.251032] ? kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90 [ 25.251744] kasan_check_range+0x10c/0x1c0 [ 25.252401] __kasan_check_write+0x18/0x20 [ 25.252942] kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90 [ 25.253550] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 25.254369] ? __kmalloc_cache_noprof+0x184/0x410 [ 25.255061] ? kasan_bitops_generic+0x93/0x1c0 [ 25.255505] kasan_bitops_generic+0x122/0x1c0 [ 25.256309] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 25.256797] ? __pfx_read_tsc+0x10/0x10 [ 25.257288] ? ktime_get_ts64+0x84/0x230 [ 25.257683] kunit_try_run_case+0x1b3/0x490 [ 25.258270] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.258833] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 25.259156] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.259789] ? __kthread_parkme+0x82/0x160 [ 25.260383] ? preempt_count_sub+0x50/0x80 [ 25.261145] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.261550] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.262297] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.262839] kthread+0x257/0x310 [ 25.263095] ? __pfx_kthread+0x10/0x10 [ 25.263638] ret_from_fork+0x41/0x80 [ 25.264118] ? __pfx_kthread+0x10/0x10 [ 25.264535] ret_from_fork_asm+0x1a/0x30 [ 25.265077] </TASK> [ 25.265419] [ 25.265659] Allocated by task 269: [ 25.265898] kasan_save_stack+0x3d/0x60 [ 25.266539] kasan_save_track+0x18/0x40 [ 25.267044] kasan_save_alloc_info+0x3b/0x50 [ 25.268253] __kasan_kmalloc+0xb7/0xc0 [ 25.268860] __kmalloc_cache_noprof+0x184/0x410 [ 25.269217] kasan_bitops_generic+0x93/0x1c0 [ 25.269694] kunit_try_run_case+0x1b3/0x490 [ 25.270184] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.270778] kthread+0x257/0x310 [ 25.271226] ret_from_fork+0x41/0x80 [ 25.271689] ret_from_fork_asm+0x1a/0x30 [ 25.272246] [ 25.272566] The buggy address belongs to the object at ffff888101094fa0 [ 25.272566] which belongs to the cache kmalloc-16 of size 16 [ 25.273570] The buggy address is located 8 bytes inside of [ 25.273570] allocated 9-byte region [ffff888101094fa0, ffff888101094fa9) [ 25.274707] [ 25.275021] The buggy address belongs to the physical page: [ 25.275442] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101094 [ 25.276309] flags: 0x200000000000000(node=0|zone=2) [ 25.276661] page_type: f5(slab) [ 25.277208] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 25.277967] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 25.278748] page dumped because: kasan: bad access detected [ 25.279378] [ 25.279627] Memory state around the buggy address: [ 25.280064] ffff888101094e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.280759] ffff888101094f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.281476] >ffff888101094f80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 25.282089] ^ [ 25.282651] ffff888101095000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 25.283330] ffff888101095080: 00 fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 [ 25.284134] ================================================================== [ 25.510912] ================================================================== [ 25.511644] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90 [ 25.512866] Read of size 8 at addr ffff888101094fa8 by task kunit_try_catch/269 [ 25.513444] [ 25.513671] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 25.514456] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.514887] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.515629] Call Trace: [ 25.515909] <TASK> [ 25.516262] dump_stack_lvl+0x73/0xb0 [ 25.516759] print_report+0xd1/0x640 [ 25.517129] ? __virt_addr_valid+0x1db/0x2d0 [ 25.517649] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.518280] kasan_report+0x102/0x140 [ 25.518583] ? kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90 [ 25.519277] ? kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90 [ 25.519921] __asan_report_load8_noabort+0x18/0x20 [ 25.520486] kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90 [ 25.521311] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 25.521969] ? __kmalloc_cache_noprof+0x184/0x410 [ 25.522476] ? kasan_bitops_generic+0x93/0x1c0 [ 25.522992] kasan_bitops_generic+0x122/0x1c0 [ 25.523593] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 25.524003] ? __pfx_read_tsc+0x10/0x10 [ 25.524452] ? ktime_get_ts64+0x84/0x230 [ 25.524915] kunit_try_run_case+0x1b3/0x490 [ 25.525322] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.525830] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 25.526361] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.526797] ? __kthread_parkme+0x82/0x160 [ 25.527138] ? preempt_count_sub+0x50/0x80 [ 25.527668] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.528267] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.528799] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.529254] kthread+0x257/0x310 [ 25.529548] ? __pfx_kthread+0x10/0x10 [ 25.530025] ret_from_fork+0x41/0x80 [ 25.530522] ? __pfx_kthread+0x10/0x10 [ 25.530886] ret_from_fork_asm+0x1a/0x30 [ 25.531394] </TASK> [ 25.531589] [ 25.531740] Allocated by task 269: [ 25.532117] kasan_save_stack+0x3d/0x60 [ 25.532647] kasan_save_track+0x18/0x40 [ 25.533182] kasan_save_alloc_info+0x3b/0x50 [ 25.533750] __kasan_kmalloc+0xb7/0xc0 [ 25.534062] __kmalloc_cache_noprof+0x184/0x410 [ 25.534697] kasan_bitops_generic+0x93/0x1c0 [ 25.535112] kunit_try_run_case+0x1b3/0x490 [ 25.535598] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.535945] kthread+0x257/0x310 [ 25.536421] ret_from_fork+0x41/0x80 [ 25.536896] ret_from_fork_asm+0x1a/0x30 [ 25.537414] [ 25.537622] The buggy address belongs to the object at ffff888101094fa0 [ 25.537622] which belongs to the cache kmalloc-16 of size 16 [ 25.538462] The buggy address is located 8 bytes inside of [ 25.538462] allocated 9-byte region [ffff888101094fa0, ffff888101094fa9) [ 25.539488] [ 25.539713] The buggy address belongs to the physical page: [ 25.540321] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101094 [ 25.541634] flags: 0x200000000000000(node=0|zone=2) [ 25.541971] page_type: f5(slab) [ 25.542424] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 25.543116] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 25.543689] page dumped because: kasan: bad access detected [ 25.544228] [ 25.544445] Memory state around the buggy address: [ 25.544948] ffff888101094e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.545597] ffff888101094f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.546212] >ffff888101094f80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 25.546849] ^ [ 25.547292] ffff888101095000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 25.547980] ffff888101095080: 00 fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 [ 25.548470] ================================================================== [ 25.145100] ================================================================== [ 25.145875] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x102/0xd90 [ 25.147464] Write of size 8 at addr ffff888101094fa8 by task kunit_try_catch/269 [ 25.148979] [ 25.149497] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 25.150843] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.151313] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.152543] Call Trace: [ 25.153032] <TASK> [ 25.153353] dump_stack_lvl+0x73/0xb0 [ 25.153813] print_report+0xd1/0x640 [ 25.154182] ? __virt_addr_valid+0x1db/0x2d0 [ 25.155285] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.155900] kasan_report+0x102/0x140 [ 25.156427] ? kasan_bitops_test_and_modify.constprop.0+0x102/0xd90 [ 25.156993] ? kasan_bitops_test_and_modify.constprop.0+0x102/0xd90 [ 25.157911] kasan_check_range+0x10c/0x1c0 [ 25.158316] __kasan_check_write+0x18/0x20 [ 25.158995] kasan_bitops_test_and_modify.constprop.0+0x102/0xd90 [ 25.160302] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 25.160939] ? __kmalloc_cache_noprof+0x184/0x410 [ 25.161390] ? kasan_bitops_generic+0x93/0x1c0 [ 25.161997] kasan_bitops_generic+0x122/0x1c0 [ 25.162560] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 25.163218] ? __pfx_read_tsc+0x10/0x10 [ 25.163947] ? ktime_get_ts64+0x84/0x230 [ 25.164578] kunit_try_run_case+0x1b3/0x490 [ 25.164924] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.165642] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 25.165993] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.166682] ? __kthread_parkme+0x82/0x160 [ 25.167125] ? preempt_count_sub+0x50/0x80 [ 25.167643] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.168628] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.169024] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.169692] kthread+0x257/0x310 [ 25.169978] ? __pfx_kthread+0x10/0x10 [ 25.170536] ret_from_fork+0x41/0x80 [ 25.171491] ? __pfx_kthread+0x10/0x10 [ 25.171982] ret_from_fork_asm+0x1a/0x30 [ 25.172604] </TASK> [ 25.172918] [ 25.173212] Allocated by task 269: [ 25.173600] kasan_save_stack+0x3d/0x60 [ 25.174024] kasan_save_track+0x18/0x40 [ 25.174753] kasan_save_alloc_info+0x3b/0x50 [ 25.175314] __kasan_kmalloc+0xb7/0xc0 [ 25.176220] __kmalloc_cache_noprof+0x184/0x410 [ 25.176681] kasan_bitops_generic+0x93/0x1c0 [ 25.176983] kunit_try_run_case+0x1b3/0x490 [ 25.177925] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.178746] kthread+0x257/0x310 [ 25.179153] ret_from_fork+0x41/0x80 [ 25.179865] ret_from_fork_asm+0x1a/0x30 [ 25.180258] [ 25.180514] The buggy address belongs to the object at ffff888101094fa0 [ 25.180514] which belongs to the cache kmalloc-16 of size 16 [ 25.182212] The buggy address is located 8 bytes inside of [ 25.182212] allocated 9-byte region [ffff888101094fa0, ffff888101094fa9) [ 25.183663] [ 25.183962] The buggy address belongs to the physical page: [ 25.184459] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101094 [ 25.185849] flags: 0x200000000000000(node=0|zone=2) [ 25.186528] page_type: f5(slab) [ 25.187124] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 25.187934] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 25.188774] page dumped because: kasan: bad access detected [ 25.189440] [ 25.190096] Memory state around the buggy address: [ 25.190697] ffff888101094e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.191496] ffff888101094f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.192381] >ffff888101094f80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 25.193186] ^ [ 25.193622] ffff888101095000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 25.194598] ffff888101095080: 00 fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 [ 25.195598] ================================================================== [ 25.285436] ================================================================== [ 25.286277] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90 [ 25.287526] Write of size 8 at addr ffff888101094fa8 by task kunit_try_catch/269 [ 25.288404] [ 25.289648] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 25.290702] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.291037] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.291928] Call Trace: [ 25.292245] <TASK> [ 25.292634] dump_stack_lvl+0x73/0xb0 [ 25.293074] print_report+0xd1/0x640 [ 25.293490] ? __virt_addr_valid+0x1db/0x2d0 [ 25.294362] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.294902] kasan_report+0x102/0x140 [ 25.295308] ? kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90 [ 25.295968] ? kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90 [ 25.296656] kasan_check_range+0x10c/0x1c0 [ 25.296997] __kasan_check_write+0x18/0x20 [ 25.297508] kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90 [ 25.298488] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 25.299455] ? __kmalloc_cache_noprof+0x184/0x410 [ 25.300129] ? kasan_bitops_generic+0x93/0x1c0 [ 25.300803] kasan_bitops_generic+0x122/0x1c0 [ 25.301273] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 25.301805] ? __pfx_read_tsc+0x10/0x10 [ 25.302357] ? ktime_get_ts64+0x84/0x230 [ 25.302741] kunit_try_run_case+0x1b3/0x490 [ 25.303187] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.303747] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 25.304069] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.304890] ? __kthread_parkme+0x82/0x160 [ 25.305447] ? preempt_count_sub+0x50/0x80 [ 25.305899] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.306758] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.307659] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.308299] kthread+0x257/0x310 [ 25.308812] ? __pfx_kthread+0x10/0x10 [ 25.309437] ret_from_fork+0x41/0x80 [ 25.309798] ? __pfx_kthread+0x10/0x10 [ 25.310679] ret_from_fork_asm+0x1a/0x30 [ 25.311567] </TASK> [ 25.311740] [ 25.312045] Allocated by task 269: [ 25.312633] kasan_save_stack+0x3d/0x60 [ 25.312997] kasan_save_track+0x18/0x40 [ 25.313507] kasan_save_alloc_info+0x3b/0x50 [ 25.313999] __kasan_kmalloc+0xb7/0xc0 [ 25.314467] __kmalloc_cache_noprof+0x184/0x410 [ 25.314881] kasan_bitops_generic+0x93/0x1c0 [ 25.315296] kunit_try_run_case+0x1b3/0x490 [ 25.315723] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.316064] kthread+0x257/0x310 [ 25.316581] ret_from_fork+0x41/0x80 [ 25.317155] ret_from_fork_asm+0x1a/0x30 [ 25.317589] [ 25.317743] The buggy address belongs to the object at ffff888101094fa0 [ 25.317743] which belongs to the cache kmalloc-16 of size 16 [ 25.318907] The buggy address is located 8 bytes inside of [ 25.318907] allocated 9-byte region [ffff888101094fa0, ffff888101094fa9) [ 25.320012] [ 25.320327] The buggy address belongs to the physical page: [ 25.320957] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101094 [ 25.321807] flags: 0x200000000000000(node=0|zone=2) [ 25.322216] page_type: f5(slab) [ 25.322660] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 25.323272] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 25.324163] page dumped because: kasan: bad access detected [ 25.324673] [ 25.324859] Memory state around the buggy address: [ 25.325371] ffff888101094e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.326206] ffff888101094f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.326802] >ffff888101094f80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 25.327646] ^ [ 25.328115] ffff888101095000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 25.328679] ffff888101095080: 00 fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 [ 25.329505] ==================================================================