Date
Dec. 3, 2024, 11:38 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 33.798524] ================================================================== [ 33.799213] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa4c/0xbc8 [ 33.800656] Read of size 8 at addr fff00000c5732788 by task kunit_try_catch/250 [ 33.802765] [ 33.804074] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 33.805553] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.806058] Hardware name: linux,dummy-virt (DT) [ 33.806811] Call trace: [ 33.807695] show_stack+0x20/0x38 (C) [ 33.808262] dump_stack_lvl+0x8c/0xd0 [ 33.808771] print_report+0x118/0x5e0 [ 33.810417] kasan_report+0xc8/0x118 [ 33.810908] __asan_report_load8_noabort+0x20/0x30 [ 33.811639] kasan_bitops_modify.constprop.0+0xa4c/0xbc8 [ 33.812303] kasan_bitops_generic+0x110/0x1c8 [ 33.812929] kunit_try_run_case+0x14c/0x3d0 [ 33.813953] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.814743] kthread+0x24c/0x2d0 [ 33.816118] ret_from_fork+0x10/0x20 [ 33.816781] [ 33.817157] Allocated by task 250: [ 33.817709] kasan_save_stack+0x3c/0x68 [ 33.818259] kasan_save_track+0x20/0x40 [ 33.819441] kasan_save_alloc_info+0x40/0x58 [ 33.820103] __kasan_kmalloc+0xd4/0xd8 [ 33.820649] __kmalloc_cache_noprof+0x15c/0x3c0 [ 33.821279] kasan_bitops_generic+0xa0/0x1c8 [ 33.821939] kunit_try_run_case+0x14c/0x3d0 [ 33.822587] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.823848] kthread+0x24c/0x2d0 [ 33.824420] ret_from_fork+0x10/0x20 [ 33.824892] [ 33.825244] The buggy address belongs to the object at fff00000c5732780 [ 33.825244] which belongs to the cache kmalloc-16 of size 16 [ 33.827595] The buggy address is located 8 bytes inside of [ 33.827595] allocated 9-byte region [fff00000c5732780, fff00000c5732789) [ 33.828908] [ 33.829193] The buggy address belongs to the physical page: [ 33.830134] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105732 [ 33.831118] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.832445] page_type: f5(slab) [ 33.833149] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 33.834221] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 33.835352] page dumped because: kasan: bad access detected [ 33.836283] [ 33.836672] Memory state around the buggy address: [ 33.837290] fff00000c5732680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 33.838146] fff00000c5732700: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 33.839572] >fff00000c5732780: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.840903] ^ [ 33.841415] fff00000c5732800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.842244] fff00000c5732880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.843075] ================================================================== [ 34.124449] ================================================================== [ 34.125086] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc8 [ 34.125950] Write of size 8 at addr fff00000c5732788 by task kunit_try_catch/250 [ 34.126895] [ 34.127226] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 34.128481] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.129185] Hardware name: linux,dummy-virt (DT) [ 34.130371] Call trace: [ 34.130781] show_stack+0x20/0x38 (C) [ 34.131318] dump_stack_lvl+0x8c/0xd0 [ 34.131987] print_report+0x118/0x5e0 [ 34.133243] kasan_report+0xc8/0x118 [ 34.133915] kasan_check_range+0x100/0x1a8 [ 34.134663] __kasan_check_write+0x20/0x30 [ 34.135759] kasan_bitops_modify.constprop.0+0x3b0/0xbc8 [ 34.136536] kasan_bitops_generic+0x110/0x1c8 [ 34.137359] kunit_try_run_case+0x14c/0x3d0 [ 34.138080] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.138806] kthread+0x24c/0x2d0 [ 34.140160] ret_from_fork+0x10/0x20 [ 34.140759] [ 34.141115] Allocated by task 250: [ 34.141701] kasan_save_stack+0x3c/0x68 [ 34.142174] kasan_save_track+0x20/0x40 [ 34.142894] kasan_save_alloc_info+0x40/0x58 [ 34.143608] __kasan_kmalloc+0xd4/0xd8 [ 34.144292] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.145744] kasan_bitops_generic+0xa0/0x1c8 [ 34.146366] kunit_try_run_case+0x14c/0x3d0 [ 34.146942] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.147742] kthread+0x24c/0x2d0 [ 34.148349] ret_from_fork+0x10/0x20 [ 34.148822] [ 34.149203] The buggy address belongs to the object at fff00000c5732780 [ 34.149203] which belongs to the cache kmalloc-16 of size 16 [ 34.150949] The buggy address is located 8 bytes inside of [ 34.150949] allocated 9-byte region [fff00000c5732780, fff00000c5732789) [ 34.152299] [ 34.154098] The buggy address belongs to the physical page: [ 34.155538] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105732 [ 34.156630] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.157681] page_type: f5(slab) [ 34.158208] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 34.159196] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 34.160072] page dumped because: kasan: bad access detected [ 34.162238] [ 34.162582] Memory state around the buggy address: [ 34.163239] fff00000c5732680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.164936] fff00000c5732700: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 34.165790] >fff00000c5732780: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.166828] ^ [ 34.168093] fff00000c5732800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.168915] fff00000c5732880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.169878] ================================================================== [ 33.891382] ================================================================== [ 33.892192] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa88/0xbc8 [ 33.894398] Read of size 8 at addr fff00000c5732788 by task kunit_try_catch/250 [ 33.895486] [ 33.895849] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 33.897033] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.897804] Hardware name: linux,dummy-virt (DT) [ 33.898471] Call trace: [ 33.898879] show_stack+0x20/0x38 (C) [ 33.899653] dump_stack_lvl+0x8c/0xd0 [ 33.900343] print_report+0x118/0x5e0 [ 33.900804] kasan_report+0xc8/0x118 [ 33.902170] __asan_report_load8_noabort+0x20/0x30 [ 33.902822] kasan_bitops_modify.constprop.0+0xa88/0xbc8 [ 33.903932] kasan_bitops_generic+0x110/0x1c8 [ 33.904598] kunit_try_run_case+0x14c/0x3d0 [ 33.905234] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.905947] kthread+0x24c/0x2d0 [ 33.906584] ret_from_fork+0x10/0x20 [ 33.908030] [ 33.908484] Allocated by task 250: [ 33.908750] kasan_save_stack+0x3c/0x68 [ 33.909049] kasan_save_track+0x20/0x40 [ 33.909359] kasan_save_alloc_info+0x40/0x58 [ 33.910702] __kasan_kmalloc+0xd4/0xd8 [ 33.911813] __kmalloc_cache_noprof+0x15c/0x3c0 [ 33.912408] kasan_bitops_generic+0xa0/0x1c8 [ 33.912727] kunit_try_run_case+0x14c/0x3d0 [ 33.913033] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.913498] kthread+0x24c/0x2d0 [ 33.914118] ret_from_fork+0x10/0x20 [ 33.915473] [ 33.915872] The buggy address belongs to the object at fff00000c5732780 [ 33.915872] which belongs to the cache kmalloc-16 of size 16 [ 33.917522] The buggy address is located 8 bytes inside of [ 33.917522] allocated 9-byte region [fff00000c5732780, fff00000c5732789) [ 33.919463] [ 33.919871] The buggy address belongs to the physical page: [ 33.920761] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105732 [ 33.922763] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.924172] page_type: f5(slab) [ 33.925593] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 33.926665] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 33.928002] page dumped because: kasan: bad access detected [ 33.928858] [ 33.929224] Memory state around the buggy address: [ 33.929909] fff00000c5732680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 33.930863] fff00000c5732700: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 33.931892] >fff00000c5732780: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.933109] ^ [ 33.933625] fff00000c5732800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.935362] fff00000c5732880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.936557] ================================================================== [ 33.846763] ================================================================== [ 33.847815] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc8 [ 33.848757] Write of size 8 at addr fff00000c5732788 by task kunit_try_catch/250 [ 33.850168] [ 33.850717] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 33.851991] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.852648] Hardware name: linux,dummy-virt (DT) [ 33.853269] Call trace: [ 33.854094] show_stack+0x20/0x38 (C) [ 33.854737] dump_stack_lvl+0x8c/0xd0 [ 33.855465] print_report+0x118/0x5e0 [ 33.856870] kasan_report+0xc8/0x118 [ 33.857388] kasan_check_range+0x100/0x1a8 [ 33.858059] __kasan_check_write+0x20/0x30 [ 33.858741] kasan_bitops_modify.constprop.0+0x1dc/0xbc8 [ 33.860044] kasan_bitops_generic+0x110/0x1c8 [ 33.860711] kunit_try_run_case+0x14c/0x3d0 [ 33.861316] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.862167] kthread+0x24c/0x2d0 [ 33.862789] ret_from_fork+0x10/0x20 [ 33.863633] [ 33.864003] Allocated by task 250: [ 33.864510] kasan_save_stack+0x3c/0x68 [ 33.865070] kasan_save_track+0x20/0x40 [ 33.866168] kasan_save_alloc_info+0x40/0x58 [ 33.866818] __kasan_kmalloc+0xd4/0xd8 [ 33.868078] __kmalloc_cache_noprof+0x15c/0x3c0 [ 33.868884] kasan_bitops_generic+0xa0/0x1c8 [ 33.869658] kunit_try_run_case+0x14c/0x3d0 [ 33.870244] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.871043] kthread+0x24c/0x2d0 [ 33.871778] ret_from_fork+0x10/0x20 [ 33.872415] [ 33.872662] The buggy address belongs to the object at fff00000c5732780 [ 33.872662] which belongs to the cache kmalloc-16 of size 16 [ 33.874297] The buggy address is located 8 bytes inside of [ 33.874297] allocated 9-byte region [fff00000c5732780, fff00000c5732789) [ 33.876160] [ 33.876625] The buggy address belongs to the physical page: [ 33.877354] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105732 [ 33.878538] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.879766] page_type: f5(slab) [ 33.880362] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 33.881392] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 33.882276] page dumped because: kasan: bad access detected [ 33.882959] [ 33.884269] Memory state around the buggy address: [ 33.884803] fff00000c5732680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 33.885690] fff00000c5732700: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 33.886627] >fff00000c5732780: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.887742] ^ [ 33.888250] fff00000c5732800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.889213] fff00000c5732880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.890118] ================================================================== [ 34.075793] ================================================================== [ 34.076422] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc8 [ 34.077754] Write of size 8 at addr fff00000c5732788 by task kunit_try_catch/250 [ 34.079182] [ 34.079928] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 34.081356] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.082001] Hardware name: linux,dummy-virt (DT) [ 34.082641] Call trace: [ 34.083021] show_stack+0x20/0x38 (C) [ 34.084073] dump_stack_lvl+0x8c/0xd0 [ 34.085219] print_report+0x118/0x5e0 [ 34.085786] kasan_report+0xc8/0x118 [ 34.086301] kasan_check_range+0x100/0x1a8 [ 34.087007] __kasan_check_write+0x20/0x30 [ 34.087645] kasan_bitops_modify.constprop.0+0x344/0xbc8 [ 34.088684] kasan_bitops_generic+0x110/0x1c8 [ 34.089198] kunit_try_run_case+0x14c/0x3d0 [ 34.089936] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.090924] kthread+0x24c/0x2d0 [ 34.091945] ret_from_fork+0x10/0x20 [ 34.092600] [ 34.092923] Allocated by task 250: [ 34.093986] kasan_save_stack+0x3c/0x68 [ 34.094527] kasan_save_track+0x20/0x40 [ 34.095043] kasan_save_alloc_info+0x40/0x58 [ 34.095764] __kasan_kmalloc+0xd4/0xd8 [ 34.096242] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.097017] kasan_bitops_generic+0xa0/0x1c8 [ 34.097817] kunit_try_run_case+0x14c/0x3d0 [ 34.098517] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.099268] kthread+0x24c/0x2d0 [ 34.099805] ret_from_fork+0x10/0x20 [ 34.100818] [ 34.101315] The buggy address belongs to the object at fff00000c5732780 [ 34.101315] which belongs to the cache kmalloc-16 of size 16 [ 34.102629] The buggy address is located 8 bytes inside of [ 34.102629] allocated 9-byte region [fff00000c5732780, fff00000c5732789) [ 34.105096] [ 34.106139] The buggy address belongs to the physical page: [ 34.108897] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105732 [ 34.110650] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.111833] page_type: f5(slab) [ 34.112620] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 34.113566] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 34.114472] page dumped because: kasan: bad access detected [ 34.115125] [ 34.115919] Memory state around the buggy address: [ 34.116477] fff00000c5732680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.117292] fff00000c5732700: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 34.118684] >fff00000c5732780: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.119312] ^ [ 34.119888] fff00000c5732800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.120775] fff00000c5732880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.121402] ================================================================== [ 33.754615] ================================================================== [ 33.756426] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc8 [ 33.757977] Write of size 8 at addr fff00000c5732788 by task kunit_try_catch/250 [ 33.759366] [ 33.759718] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 33.761068] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.761881] Hardware name: linux,dummy-virt (DT) [ 33.762468] Call trace: [ 33.762887] show_stack+0x20/0x38 (C) [ 33.763905] dump_stack_lvl+0x8c/0xd0 [ 33.764499] print_report+0x118/0x5e0 [ 33.765177] kasan_report+0xc8/0x118 [ 33.765670] kasan_check_range+0x100/0x1a8 [ 33.766436] __kasan_check_write+0x20/0x30 [ 33.767734] kasan_bitops_modify.constprop.0+0x100/0xbc8 [ 33.768462] kasan_bitops_generic+0x110/0x1c8 [ 33.769127] kunit_try_run_case+0x14c/0x3d0 [ 33.769752] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.770543] kthread+0x24c/0x2d0 [ 33.771090] ret_from_fork+0x10/0x20 [ 33.772006] [ 33.772365] Allocated by task 250: [ 33.773110] kasan_save_stack+0x3c/0x68 [ 33.773818] kasan_save_track+0x20/0x40 [ 33.774562] kasan_save_alloc_info+0x40/0x58 [ 33.775146] __kasan_kmalloc+0xd4/0xd8 [ 33.775741] __kmalloc_cache_noprof+0x15c/0x3c0 [ 33.776413] kasan_bitops_generic+0xa0/0x1c8 [ 33.777016] kunit_try_run_case+0x14c/0x3d0 [ 33.777677] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.778510] kthread+0x24c/0x2d0 [ 33.779062] ret_from_fork+0x10/0x20 [ 33.779573] [ 33.780018] The buggy address belongs to the object at fff00000c5732780 [ 33.780018] which belongs to the cache kmalloc-16 of size 16 [ 33.781426] The buggy address is located 8 bytes inside of [ 33.781426] allocated 9-byte region [fff00000c5732780, fff00000c5732789) [ 33.782866] [ 33.783583] The buggy address belongs to the physical page: [ 33.784271] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105732 [ 33.785258] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.786100] page_type: f5(slab) [ 33.786681] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 33.788448] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 33.789512] page dumped because: kasan: bad access detected [ 33.790158] [ 33.790522] Memory state around the buggy address: [ 33.791213] fff00000c5732680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 33.792036] fff00000c5732700: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 33.793371] >fff00000c5732780: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.794303] ^ [ 33.794846] fff00000c5732800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.796049] fff00000c5732880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.796868] ================================================================== [ 34.032268] ================================================================== [ 34.032932] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaf4/0xbc8 [ 34.034187] Read of size 8 at addr fff00000c5732788 by task kunit_try_catch/250 [ 34.035347] [ 34.036623] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 34.038291] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.039185] Hardware name: linux,dummy-virt (DT) [ 34.039981] Call trace: [ 34.040576] show_stack+0x20/0x38 (C) [ 34.041229] dump_stack_lvl+0x8c/0xd0 [ 34.041876] print_report+0x118/0x5e0 [ 34.042437] kasan_report+0xc8/0x118 [ 34.043412] __asan_report_load8_noabort+0x20/0x30 [ 34.044159] kasan_bitops_modify.constprop.0+0xaf4/0xbc8 [ 34.044892] kasan_bitops_generic+0x110/0x1c8 [ 34.045971] kunit_try_run_case+0x14c/0x3d0 [ 34.046623] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.048007] kthread+0x24c/0x2d0 [ 34.048516] ret_from_fork+0x10/0x20 [ 34.049107] [ 34.049448] Allocated by task 250: [ 34.050118] kasan_save_stack+0x3c/0x68 [ 34.050696] kasan_save_track+0x20/0x40 [ 34.051458] kasan_save_alloc_info+0x40/0x58 [ 34.051886] __kasan_kmalloc+0xd4/0xd8 [ 34.053114] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.054165] kasan_bitops_generic+0xa0/0x1c8 [ 34.054809] kunit_try_run_case+0x14c/0x3d0 [ 34.055660] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.056587] kthread+0x24c/0x2d0 [ 34.056865] ret_from_fork+0x10/0x20 [ 34.057167] [ 34.057379] The buggy address belongs to the object at fff00000c5732780 [ 34.057379] which belongs to the cache kmalloc-16 of size 16 [ 34.058070] The buggy address is located 8 bytes inside of [ 34.058070] allocated 9-byte region [fff00000c5732780, fff00000c5732789) [ 34.058748] [ 34.058928] The buggy address belongs to the physical page: [ 34.060533] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105732 [ 34.061503] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.062147] page_type: f5(slab) [ 34.062820] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 34.064809] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 34.065678] page dumped because: kasan: bad access detected [ 34.066612] [ 34.067290] Memory state around the buggy address: [ 34.068590] fff00000c5732680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.069785] fff00000c5732700: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 34.070716] >fff00000c5732780: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.071858] ^ [ 34.072559] fff00000c5732800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.073293] fff00000c5732880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.074172] ================================================================== [ 33.987497] ================================================================== [ 33.988440] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc8 [ 33.989465] Write of size 8 at addr fff00000c5732788 by task kunit_try_catch/250 [ 33.990460] [ 33.990874] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 33.992713] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.993400] Hardware name: linux,dummy-virt (DT) [ 33.994246] Call trace: [ 33.994763] show_stack+0x20/0x38 (C) [ 33.996080] dump_stack_lvl+0x8c/0xd0 [ 33.996640] print_report+0x118/0x5e0 [ 33.997358] kasan_report+0xc8/0x118 [ 33.997957] kasan_check_range+0x100/0x1a8 [ 33.998614] __kasan_check_write+0x20/0x30 [ 33.999317] kasan_bitops_modify.constprop.0+0x320/0xbc8 [ 34.000091] kasan_bitops_generic+0x110/0x1c8 [ 34.000745] kunit_try_run_case+0x14c/0x3d0 [ 34.001728] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.002531] kthread+0x24c/0x2d0 [ 34.003790] ret_from_fork+0x10/0x20 [ 34.004353] [ 34.004651] Allocated by task 250: [ 34.005114] kasan_save_stack+0x3c/0x68 [ 34.005841] kasan_save_track+0x20/0x40 [ 34.006398] kasan_save_alloc_info+0x40/0x58 [ 34.007472] __kasan_kmalloc+0xd4/0xd8 [ 34.007987] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.008658] kasan_bitops_generic+0xa0/0x1c8 [ 34.009315] kunit_try_run_case+0x14c/0x3d0 [ 34.009946] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.010646] kthread+0x24c/0x2d0 [ 34.011798] ret_from_fork+0x10/0x20 [ 34.012440] [ 34.012779] The buggy address belongs to the object at fff00000c5732780 [ 34.012779] which belongs to the cache kmalloc-16 of size 16 [ 34.014376] The buggy address is located 8 bytes inside of [ 34.014376] allocated 9-byte region [fff00000c5732780, fff00000c5732789) [ 34.015936] [ 34.016306] The buggy address belongs to the physical page: [ 34.017078] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105732 [ 34.018366] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.019291] page_type: f5(slab) [ 34.019800] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 34.021776] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 34.022935] page dumped because: kasan: bad access detected [ 34.023691] [ 34.024021] Memory state around the buggy address: [ 34.025275] fff00000c5732680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.026238] fff00000c5732700: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 34.027455] >fff00000c5732780: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.028358] ^ [ 34.028831] fff00000c5732800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.029586] fff00000c5732880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.030538] ================================================================== [ 34.173887] ================================================================== [ 34.174734] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa28/0xbc8 [ 34.175936] Read of size 8 at addr fff00000c5732788 by task kunit_try_catch/250 [ 34.176665] [ 34.177023] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 34.179322] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.179901] Hardware name: linux,dummy-virt (DT) [ 34.180518] Call trace: [ 34.180994] show_stack+0x20/0x38 (C) [ 34.181689] dump_stack_lvl+0x8c/0xd0 [ 34.182179] print_report+0x118/0x5e0 [ 34.182885] kasan_report+0xc8/0x118 [ 34.183478] __asan_report_load8_noabort+0x20/0x30 [ 34.184185] kasan_bitops_modify.constprop.0+0xa28/0xbc8 [ 34.184925] kasan_bitops_generic+0x110/0x1c8 [ 34.185558] kunit_try_run_case+0x14c/0x3d0 [ 34.186231] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.187138] kthread+0x24c/0x2d0 [ 34.187714] ret_from_fork+0x10/0x20 [ 34.188296] [ 34.188602] Allocated by task 250: [ 34.189173] kasan_save_stack+0x3c/0x68 [ 34.189784] kasan_save_track+0x20/0x40 [ 34.190587] kasan_save_alloc_info+0x40/0x58 [ 34.191251] __kasan_kmalloc+0xd4/0xd8 [ 34.192021] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.192661] kasan_bitops_generic+0xa0/0x1c8 [ 34.193347] kunit_try_run_case+0x14c/0x3d0 [ 34.193870] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.194686] kthread+0x24c/0x2d0 [ 34.195250] ret_from_fork+0x10/0x20 [ 34.195820] [ 34.196192] The buggy address belongs to the object at fff00000c5732780 [ 34.196192] which belongs to the cache kmalloc-16 of size 16 [ 34.197599] The buggy address is located 8 bytes inside of [ 34.197599] allocated 9-byte region [fff00000c5732780, fff00000c5732789) [ 34.199052] [ 34.199353] The buggy address belongs to the physical page: [ 34.200007] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105732 [ 34.201230] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.202210] page_type: f5(slab) [ 34.202878] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 34.203777] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 34.204885] page dumped because: kasan: bad access detected [ 34.205887] [ 34.206420] Memory state around the buggy address: [ 34.207285] fff00000c5732680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.208526] fff00000c5732700: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 34.209537] >fff00000c5732780: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.210441] ^ [ 34.210931] fff00000c5732800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.211923] fff00000c5732880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.212789] ================================================================== [ 33.938160] ================================================================== [ 33.938911] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc8 [ 33.941175] Write of size 8 at addr fff00000c5732788 by task kunit_try_catch/250 [ 33.942297] [ 33.942749] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 33.944955] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.945590] Hardware name: linux,dummy-virt (DT) [ 33.945982] Call trace: [ 33.946201] show_stack+0x20/0x38 (C) [ 33.946940] dump_stack_lvl+0x8c/0xd0 [ 33.947859] print_report+0x118/0x5e0 [ 33.948767] kasan_report+0xc8/0x118 [ 33.949561] kasan_check_range+0x100/0x1a8 [ 33.950429] __kasan_check_write+0x20/0x30 [ 33.951533] kasan_bitops_modify.constprop.0+0x2b4/0xbc8 [ 33.952758] kasan_bitops_generic+0x110/0x1c8 [ 33.953363] kunit_try_run_case+0x14c/0x3d0 [ 33.954033] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.954873] kthread+0x24c/0x2d0 [ 33.955448] ret_from_fork+0x10/0x20 [ 33.956065] [ 33.956449] Allocated by task 250: [ 33.956955] kasan_save_stack+0x3c/0x68 [ 33.958509] kasan_save_track+0x20/0x40 [ 33.959002] kasan_save_alloc_info+0x40/0x58 [ 33.960030] __kasan_kmalloc+0xd4/0xd8 [ 33.960656] __kmalloc_cache_noprof+0x15c/0x3c0 [ 33.961294] kasan_bitops_generic+0xa0/0x1c8 [ 33.961943] kunit_try_run_case+0x14c/0x3d0 [ 33.962572] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.963578] kthread+0x24c/0x2d0 [ 33.964074] ret_from_fork+0x10/0x20 [ 33.964601] [ 33.965011] The buggy address belongs to the object at fff00000c5732780 [ 33.965011] which belongs to the cache kmalloc-16 of size 16 [ 33.967211] The buggy address is located 8 bytes inside of [ 33.967211] allocated 9-byte region [fff00000c5732780, fff00000c5732789) [ 33.968925] [ 33.969258] The buggy address belongs to the physical page: [ 33.970128] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105732 [ 33.970765] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.972616] page_type: f5(slab) [ 33.973568] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 33.974803] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 33.975945] page dumped because: kasan: bad access detected [ 33.976868] [ 33.977230] Memory state around the buggy address: [ 33.977961] fff00000c5732680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 33.979823] fff00000c5732700: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 33.980635] >fff00000c5732780: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.981590] ^ [ 33.982056] fff00000c5732800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.982871] fff00000c5732880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.984180] ==================================================================
[ 29.246598] ================================================================== [ 29.247795] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40f/0xd50 [ 29.248509] Write of size 8 at addr ffff888101adffe8 by task kunit_try_catch/270 [ 29.248876] [ 29.249067] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 29.249783] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.250206] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.252115] Call Trace: [ 29.252423] <TASK> [ 29.253899] dump_stack_lvl+0x73/0xb0 [ 29.254201] print_report+0xd1/0x640 [ 29.254463] ? __virt_addr_valid+0x1db/0x2d0 [ 29.254838] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.255381] kasan_report+0x102/0x140 [ 29.256666] ? kasan_bitops_modify.constprop.0+0x40f/0xd50 [ 29.257309] ? kasan_bitops_modify.constprop.0+0x40f/0xd50 [ 29.257929] kasan_check_range+0x10c/0x1c0 [ 29.258358] __kasan_check_write+0x18/0x20 [ 29.258738] kasan_bitops_modify.constprop.0+0x40f/0xd50 [ 29.259303] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 29.259708] ? __kmalloc_cache_noprof+0x184/0x410 [ 29.260196] ? trace_hardirqs_on+0x37/0xe0 [ 29.260664] ? kasan_bitops_generic+0x93/0x1c0 [ 29.260981] kasan_bitops_generic+0x117/0x1c0 [ 29.261455] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 29.261922] ? __pfx_read_tsc+0x10/0x10 [ 29.262258] ? ktime_get_ts64+0x86/0x230 [ 29.262696] kunit_try_run_case+0x1b3/0x490 [ 29.262991] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.263486] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.263897] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.264313] ? __kthread_parkme+0x82/0x160 [ 29.264693] ? preempt_count_sub+0x50/0x80 [ 29.265113] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.265523] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.265978] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.266370] kthread+0x257/0x310 [ 29.266618] ? __pfx_kthread+0x10/0x10 [ 29.266881] ret_from_fork+0x41/0x80 [ 29.267286] ? __pfx_kthread+0x10/0x10 [ 29.267773] ret_from_fork_asm+0x1a/0x30 [ 29.268215] </TASK> [ 29.268510] [ 29.268717] Allocated by task 270: [ 29.269076] kasan_save_stack+0x3d/0x60 [ 29.269479] kasan_save_track+0x18/0x40 [ 29.269912] kasan_save_alloc_info+0x3b/0x50 [ 29.270217] __kasan_kmalloc+0xb7/0xc0 [ 29.270506] __kmalloc_cache_noprof+0x184/0x410 [ 29.270927] kasan_bitops_generic+0x93/0x1c0 [ 29.271353] kunit_try_run_case+0x1b3/0x490 [ 29.271869] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.272218] kthread+0x257/0x310 [ 29.272458] ret_from_fork+0x41/0x80 [ 29.272865] ret_from_fork_asm+0x1a/0x30 [ 29.273268] [ 29.273499] The buggy address belongs to the object at ffff888101adffe0 [ 29.273499] which belongs to the cache kmalloc-16 of size 16 [ 29.274205] The buggy address is located 8 bytes inside of [ 29.274205] allocated 9-byte region [ffff888101adffe0, ffff888101adffe9) [ 29.275358] [ 29.275603] The buggy address belongs to the physical page: [ 29.275934] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101adf [ 29.276592] flags: 0x200000000000000(node=0|zone=2) [ 29.277048] page_type: f5(slab) [ 29.277321] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 29.277702] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 29.278306] page dumped because: kasan: bad access detected [ 29.278903] [ 29.279232] Memory state around the buggy address: [ 29.279796] ffff888101adfe80: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 29.280288] ffff888101adff00: 00 02 fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 29.281183] >ffff888101adff80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 29.281535] ^ [ 29.282001] ffff888101ae0000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.282610] ffff888101ae0080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb [ 29.283363] ================================================================== [ 29.319273] ================================================================== [ 29.320047] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x548/0xd50 [ 29.320905] Write of size 8 at addr ffff888101adffe8 by task kunit_try_catch/270 [ 29.321541] [ 29.321777] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 29.322631] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.323012] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.323881] Call Trace: [ 29.324110] <TASK> [ 29.324379] dump_stack_lvl+0x73/0xb0 [ 29.324769] print_report+0xd1/0x640 [ 29.325040] ? __virt_addr_valid+0x1db/0x2d0 [ 29.325505] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.326149] kasan_report+0x102/0x140 [ 29.326513] ? kasan_bitops_modify.constprop.0+0x548/0xd50 [ 29.326900] ? kasan_bitops_modify.constprop.0+0x548/0xd50 [ 29.327264] kasan_check_range+0x10c/0x1c0 [ 29.327583] __kasan_check_write+0x18/0x20 [ 29.328003] kasan_bitops_modify.constprop.0+0x548/0xd50 [ 29.328608] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 29.329146] ? __kmalloc_cache_noprof+0x184/0x410 [ 29.329586] ? trace_hardirqs_on+0x37/0xe0 [ 29.329929] ? kasan_bitops_generic+0x93/0x1c0 [ 29.330253] kasan_bitops_generic+0x117/0x1c0 [ 29.330818] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 29.331156] ? __pfx_read_tsc+0x10/0x10 [ 29.331422] ? ktime_get_ts64+0x86/0x230 [ 29.331688] kunit_try_run_case+0x1b3/0x490 [ 29.331969] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.332438] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.332994] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.333484] ? __kthread_parkme+0x82/0x160 [ 29.333997] ? preempt_count_sub+0x50/0x80 [ 29.334440] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.334855] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.335414] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.335923] kthread+0x257/0x310 [ 29.336279] ? __pfx_kthread+0x10/0x10 [ 29.336672] ret_from_fork+0x41/0x80 [ 29.337047] ? __pfx_kthread+0x10/0x10 [ 29.337439] ret_from_fork_asm+0x1a/0x30 [ 29.338537] </TASK> [ 29.338728] [ 29.338879] Allocated by task 270: [ 29.339122] kasan_save_stack+0x3d/0x60 [ 29.339519] kasan_save_track+0x18/0x40 [ 29.339911] kasan_save_alloc_info+0x3b/0x50 [ 29.340349] __kasan_kmalloc+0xb7/0xc0 [ 29.340841] __kmalloc_cache_noprof+0x184/0x410 [ 29.341158] kasan_bitops_generic+0x93/0x1c0 [ 29.341436] kunit_try_run_case+0x1b3/0x490 [ 29.341960] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.342470] kthread+0x257/0x310 [ 29.342823] ret_from_fork+0x41/0x80 [ 29.343163] ret_from_fork_asm+0x1a/0x30 [ 29.343615] [ 29.343770] The buggy address belongs to the object at ffff888101adffe0 [ 29.343770] which belongs to the cache kmalloc-16 of size 16 [ 29.346133] The buggy address is located 8 bytes inside of [ 29.346133] allocated 9-byte region [ffff888101adffe0, ffff888101adffe9) [ 29.349147] [ 29.349391] The buggy address belongs to the physical page: [ 29.349881] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101adf [ 29.350294] flags: 0x200000000000000(node=0|zone=2) [ 29.350591] page_type: f5(slab) [ 29.350816] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 29.353405] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 29.354086] page dumped because: kasan: bad access detected [ 29.355947] [ 29.356191] Memory state around the buggy address: [ 29.356748] ffff888101adfe80: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 29.357387] ffff888101adff00: 00 02 fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 29.359306] >ffff888101adff80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 29.360091] ^ [ 29.360778] ffff888101ae0000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.362006] ffff888101ae0080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb [ 29.362387] ================================================================== [ 29.164280] ================================================================== [ 29.164892] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d6/0xd50 [ 29.165876] Write of size 8 at addr ffff888101adffe8 by task kunit_try_catch/270 [ 29.166461] [ 29.166954] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 29.167850] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.168289] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.169628] Call Trace: [ 29.169854] <TASK> [ 29.170244] dump_stack_lvl+0x73/0xb0 [ 29.170916] print_report+0xd1/0x640 [ 29.171300] ? __virt_addr_valid+0x1db/0x2d0 [ 29.171763] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.172432] kasan_report+0x102/0x140 [ 29.172815] ? kasan_bitops_modify.constprop.0+0x2d6/0xd50 [ 29.173401] ? kasan_bitops_modify.constprop.0+0x2d6/0xd50 [ 29.173807] kasan_check_range+0x10c/0x1c0 [ 29.174296] __kasan_check_write+0x18/0x20 [ 29.174686] kasan_bitops_modify.constprop.0+0x2d6/0xd50 [ 29.175285] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 29.178695] ? __kmalloc_cache_noprof+0x184/0x410 [ 29.179071] ? trace_hardirqs_on+0x37/0xe0 [ 29.179477] ? kasan_bitops_generic+0x93/0x1c0 [ 29.179996] kasan_bitops_generic+0x117/0x1c0 [ 29.180500] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 29.180904] ? __pfx_read_tsc+0x10/0x10 [ 29.181345] ? ktime_get_ts64+0x86/0x230 [ 29.181742] kunit_try_run_case+0x1b3/0x490 [ 29.182339] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.182688] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.183372] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.183831] ? __kthread_parkme+0x82/0x160 [ 29.184272] ? preempt_count_sub+0x50/0x80 [ 29.184782] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.186134] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.186532] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.187087] kthread+0x257/0x310 [ 29.187353] ? __pfx_kthread+0x10/0x10 [ 29.187848] ret_from_fork+0x41/0x80 [ 29.188440] ? __pfx_kthread+0x10/0x10 [ 29.189392] ret_from_fork_asm+0x1a/0x30 [ 29.189977] </TASK> [ 29.190264] [ 29.190498] Allocated by task 270: [ 29.190818] kasan_save_stack+0x3d/0x60 [ 29.191128] kasan_save_track+0x18/0x40 [ 29.191578] kasan_save_alloc_info+0x3b/0x50 [ 29.191955] __kasan_kmalloc+0xb7/0xc0 [ 29.192368] __kmalloc_cache_noprof+0x184/0x410 [ 29.192665] kasan_bitops_generic+0x93/0x1c0 [ 29.193166] kunit_try_run_case+0x1b3/0x490 [ 29.193783] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.194219] kthread+0x257/0x310 [ 29.194658] ret_from_fork+0x41/0x80 [ 29.194950] ret_from_fork_asm+0x1a/0x30 [ 29.195403] [ 29.195569] The buggy address belongs to the object at ffff888101adffe0 [ 29.195569] which belongs to the cache kmalloc-16 of size 16 [ 29.196519] The buggy address is located 8 bytes inside of [ 29.196519] allocated 9-byte region [ffff888101adffe0, ffff888101adffe9) [ 29.197348] [ 29.197659] The buggy address belongs to the physical page: [ 29.198084] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101adf [ 29.198653] flags: 0x200000000000000(node=0|zone=2) [ 29.199090] page_type: f5(slab) [ 29.199472] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 29.200130] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 29.200753] page dumped because: kasan: bad access detected [ 29.201043] [ 29.201268] Memory state around the buggy address: [ 29.201839] ffff888101adfe80: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 29.202724] ffff888101adff00: 00 02 fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 29.203143] >ffff888101adff80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 29.203880] ^ [ 29.204489] ffff888101ae0000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.204885] ffff888101ae0080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb [ 29.205501] ================================================================== [ 29.119015] ================================================================== [ 29.120418] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23b/0xd50 [ 29.121160] Write of size 8 at addr ffff888101adffe8 by task kunit_try_catch/270 [ 29.122000] [ 29.122317] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 29.123126] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.123449] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.124215] Call Trace: [ 29.124432] <TASK> [ 29.124688] dump_stack_lvl+0x73/0xb0 [ 29.125250] print_report+0xd1/0x640 [ 29.125735] ? __virt_addr_valid+0x1db/0x2d0 [ 29.126413] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.126794] kasan_report+0x102/0x140 [ 29.127269] ? kasan_bitops_modify.constprop.0+0x23b/0xd50 [ 29.127893] ? kasan_bitops_modify.constprop.0+0x23b/0xd50 [ 29.128532] kasan_check_range+0x10c/0x1c0 [ 29.128819] __kasan_check_write+0x18/0x20 [ 29.129301] kasan_bitops_modify.constprop.0+0x23b/0xd50 [ 29.129930] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 29.130490] ? __kmalloc_cache_noprof+0x184/0x410 [ 29.130975] ? trace_hardirqs_on+0x37/0xe0 [ 29.133175] ? kasan_bitops_generic+0x93/0x1c0 [ 29.133735] kasan_bitops_generic+0x117/0x1c0 [ 29.134517] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 29.135105] ? __pfx_read_tsc+0x10/0x10 [ 29.135383] ? ktime_get_ts64+0x86/0x230 [ 29.135862] kunit_try_run_case+0x1b3/0x490 [ 29.136341] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.136841] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.137207] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.137755] ? __kthread_parkme+0x82/0x160 [ 29.138217] ? preempt_count_sub+0x50/0x80 [ 29.138681] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.139985] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.140642] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.140956] kthread+0x257/0x310 [ 29.142213] ? __pfx_kthread+0x10/0x10 [ 29.143141] ret_from_fork+0x41/0x80 [ 29.143415] ? __pfx_kthread+0x10/0x10 [ 29.143846] ret_from_fork_asm+0x1a/0x30 [ 29.144260] </TASK> [ 29.144458] [ 29.144662] Allocated by task 270: [ 29.145003] kasan_save_stack+0x3d/0x60 [ 29.145670] kasan_save_track+0x18/0x40 [ 29.146116] kasan_save_alloc_info+0x3b/0x50 [ 29.146945] __kasan_kmalloc+0xb7/0xc0 [ 29.147387] __kmalloc_cache_noprof+0x184/0x410 [ 29.148218] kasan_bitops_generic+0x93/0x1c0 [ 29.148743] kunit_try_run_case+0x1b3/0x490 [ 29.149148] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.150194] kthread+0x257/0x310 [ 29.150871] ret_from_fork+0x41/0x80 [ 29.151184] ret_from_fork_asm+0x1a/0x30 [ 29.151606] [ 29.151853] The buggy address belongs to the object at ffff888101adffe0 [ 29.151853] which belongs to the cache kmalloc-16 of size 16 [ 29.152680] The buggy address is located 8 bytes inside of [ 29.152680] allocated 9-byte region [ffff888101adffe0, ffff888101adffe9) [ 29.153418] [ 29.154560] The buggy address belongs to the physical page: [ 29.154857] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101adf [ 29.155552] flags: 0x200000000000000(node=0|zone=2) [ 29.155891] page_type: f5(slab) [ 29.156293] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 29.156817] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 29.157313] page dumped because: kasan: bad access detected [ 29.157855] [ 29.158149] Memory state around the buggy address: [ 29.158657] ffff888101adfe80: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 29.159116] ffff888101adff00: 00 02 fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 29.159873] >ffff888101adff80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 29.160344] ^ [ 29.160721] ffff888101ae0000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.161378] ffff888101ae0080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb [ 29.161985] ================================================================== [ 29.284419] ================================================================== [ 29.285112] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ad/0xd50 [ 29.286188] Write of size 8 at addr ffff888101adffe8 by task kunit_try_catch/270 [ 29.286623] [ 29.286801] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 29.287582] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.288155] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.289228] Call Trace: [ 29.289441] <TASK> [ 29.289634] dump_stack_lvl+0x73/0xb0 [ 29.289915] print_report+0xd1/0x640 [ 29.290292] ? __virt_addr_valid+0x1db/0x2d0 [ 29.290810] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.291340] kasan_report+0x102/0x140 [ 29.291871] ? kasan_bitops_modify.constprop.0+0x4ad/0xd50 [ 29.292420] ? kasan_bitops_modify.constprop.0+0x4ad/0xd50 [ 29.292967] kasan_check_range+0x10c/0x1c0 [ 29.293285] __kasan_check_write+0x18/0x20 [ 29.293559] kasan_bitops_modify.constprop.0+0x4ad/0xd50 [ 29.293880] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 29.294484] ? __kmalloc_cache_noprof+0x184/0x410 [ 29.294951] ? trace_hardirqs_on+0x37/0xe0 [ 29.295379] ? kasan_bitops_generic+0x93/0x1c0 [ 29.295852] kasan_bitops_generic+0x117/0x1c0 [ 29.296302] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 29.296976] ? __pfx_read_tsc+0x10/0x10 [ 29.297284] ? ktime_get_ts64+0x86/0x230 [ 29.297564] kunit_try_run_case+0x1b3/0x490 [ 29.297843] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.298151] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.298453] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.298761] ? __kthread_parkme+0x82/0x160 [ 29.299032] ? preempt_count_sub+0x50/0x80 [ 29.299479] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.299942] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.300520] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.301024] kthread+0x257/0x310 [ 29.301419] ? __pfx_kthread+0x10/0x10 [ 29.301833] ret_from_fork+0x41/0x80 [ 29.302223] ? __pfx_kthread+0x10/0x10 [ 29.302665] ret_from_fork_asm+0x1a/0x30 [ 29.303113] </TASK> [ 29.303384] [ 29.303635] Allocated by task 270: [ 29.303865] kasan_save_stack+0x3d/0x60 [ 29.304191] kasan_save_track+0x18/0x40 [ 29.304604] kasan_save_alloc_info+0x3b/0x50 [ 29.305012] __kasan_kmalloc+0xb7/0xc0 [ 29.305378] __kmalloc_cache_noprof+0x184/0x410 [ 29.305737] kasan_bitops_generic+0x93/0x1c0 [ 29.306014] kunit_try_run_case+0x1b3/0x490 [ 29.306294] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.306714] kthread+0x257/0x310 [ 29.307230] ret_from_fork+0x41/0x80 [ 29.307644] ret_from_fork_asm+0x1a/0x30 [ 29.308034] [ 29.308255] The buggy address belongs to the object at ffff888101adffe0 [ 29.308255] which belongs to the cache kmalloc-16 of size 16 [ 29.309428] The buggy address is located 8 bytes inside of [ 29.309428] allocated 9-byte region [ffff888101adffe0, ffff888101adffe9) [ 29.310106] [ 29.310266] The buggy address belongs to the physical page: [ 29.310554] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101adf [ 29.310943] flags: 0x200000000000000(node=0|zone=2) [ 29.311441] page_type: f5(slab) [ 29.311790] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 29.312807] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 29.313901] page dumped because: kasan: bad access detected [ 29.314390] [ 29.314656] Memory state around the buggy address: [ 29.315106] ffff888101adfe80: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 29.315735] ffff888101adff00: 00 02 fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 29.316376] >ffff888101adff80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 29.316962] ^ [ 29.317318] ffff888101ae0000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.317672] ffff888101ae0080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb [ 29.318016] ================================================================== [ 29.019341] ================================================================== [ 29.020498] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x102/0xd50 [ 29.021005] Write of size 8 at addr ffff888101adffe8 by task kunit_try_catch/270 [ 29.021335] [ 29.021503] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 29.023358] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.024068] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.025372] Call Trace: [ 29.025713] <TASK> [ 29.026303] dump_stack_lvl+0x73/0xb0 [ 29.027175] print_report+0xd1/0x640 [ 29.027604] ? __virt_addr_valid+0x1db/0x2d0 [ 29.028249] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.028987] kasan_report+0x102/0x140 [ 29.029401] ? kasan_bitops_modify.constprop.0+0x102/0xd50 [ 29.029952] ? kasan_bitops_modify.constprop.0+0x102/0xd50 [ 29.031147] kasan_check_range+0x10c/0x1c0 [ 29.031452] __kasan_check_write+0x18/0x20 [ 29.032108] kasan_bitops_modify.constprop.0+0x102/0xd50 [ 29.032979] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 29.033515] ? __kmalloc_cache_noprof+0x184/0x410 [ 29.033894] ? trace_hardirqs_on+0x37/0xe0 [ 29.034229] ? kasan_bitops_generic+0x93/0x1c0 [ 29.035801] kasan_bitops_generic+0x117/0x1c0 [ 29.036265] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 29.036635] ? __pfx_read_tsc+0x10/0x10 [ 29.037188] ? ktime_get_ts64+0x86/0x230 [ 29.037515] kunit_try_run_case+0x1b3/0x490 [ 29.038312] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.039317] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.040212] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.040511] ? __kthread_parkme+0x82/0x160 [ 29.041529] ? preempt_count_sub+0x50/0x80 [ 29.041799] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.042357] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.042866] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.043291] kthread+0x257/0x310 [ 29.043571] ? __pfx_kthread+0x10/0x10 [ 29.043869] ret_from_fork+0x41/0x80 [ 29.045086] ? __pfx_kthread+0x10/0x10 [ 29.046087] ret_from_fork_asm+0x1a/0x30 [ 29.047024] </TASK> [ 29.047378] [ 29.047608] Allocated by task 270: [ 29.048187] kasan_save_stack+0x3d/0x60 [ 29.048741] kasan_save_track+0x18/0x40 [ 29.049601] kasan_save_alloc_info+0x3b/0x50 [ 29.049981] __kasan_kmalloc+0xb7/0xc0 [ 29.050322] __kmalloc_cache_noprof+0x184/0x410 [ 29.050950] kasan_bitops_generic+0x93/0x1c0 [ 29.051302] kunit_try_run_case+0x1b3/0x490 [ 29.051803] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.052233] kthread+0x257/0x310 [ 29.052915] ret_from_fork+0x41/0x80 [ 29.053303] ret_from_fork_asm+0x1a/0x30 [ 29.054570] [ 29.054834] The buggy address belongs to the object at ffff888101adffe0 [ 29.054834] which belongs to the cache kmalloc-16 of size 16 [ 29.055718] The buggy address is located 8 bytes inside of [ 29.055718] allocated 9-byte region [ffff888101adffe0, ffff888101adffe9) [ 29.056697] [ 29.057358] The buggy address belongs to the physical page: [ 29.058071] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101adf [ 29.058655] flags: 0x200000000000000(node=0|zone=2) [ 29.059403] page_type: f5(slab) [ 29.059719] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 29.060631] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 29.061829] page dumped because: kasan: bad access detected [ 29.062389] [ 29.062557] Memory state around the buggy address: [ 29.063139] ffff888101adfe80: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 29.063741] ffff888101adff00: 00 02 fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 29.064508] >ffff888101adff80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 29.065374] ^ [ 29.065940] ffff888101ae0000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.066583] ffff888101ae0080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb [ 29.067925] ================================================================== [ 29.208956] ================================================================== [ 29.209407] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x374/0xd50 [ 29.210876] Write of size 8 at addr ffff888101adffe8 by task kunit_try_catch/270 [ 29.211398] [ 29.211641] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 29.212274] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.212531] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.213309] Call Trace: [ 29.213724] <TASK> [ 29.213996] dump_stack_lvl+0x73/0xb0 [ 29.214464] print_report+0xd1/0x640 [ 29.214826] ? __virt_addr_valid+0x1db/0x2d0 [ 29.215147] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.215616] kasan_report+0x102/0x140 [ 29.216118] ? kasan_bitops_modify.constprop.0+0x374/0xd50 [ 29.216719] ? kasan_bitops_modify.constprop.0+0x374/0xd50 [ 29.217299] kasan_check_range+0x10c/0x1c0 [ 29.217839] __kasan_check_write+0x18/0x20 [ 29.218167] kasan_bitops_modify.constprop.0+0x374/0xd50 [ 29.218592] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 29.220282] ? __kmalloc_cache_noprof+0x184/0x410 [ 29.221308] ? trace_hardirqs_on+0x37/0xe0 [ 29.222045] ? kasan_bitops_generic+0x93/0x1c0 [ 29.222443] kasan_bitops_generic+0x117/0x1c0 [ 29.223069] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 29.223805] ? __pfx_read_tsc+0x10/0x10 [ 29.224165] ? ktime_get_ts64+0x86/0x230 [ 29.224706] kunit_try_run_case+0x1b3/0x490 [ 29.225023] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.225459] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.225855] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.226253] ? __kthread_parkme+0x82/0x160 [ 29.227284] ? preempt_count_sub+0x50/0x80 [ 29.227627] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.228235] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.228726] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.229235] kthread+0x257/0x310 [ 29.229579] ? __pfx_kthread+0x10/0x10 [ 29.229878] ret_from_fork+0x41/0x80 [ 29.230221] ? __pfx_kthread+0x10/0x10 [ 29.230649] ret_from_fork_asm+0x1a/0x30 [ 29.230984] </TASK> [ 29.231254] [ 29.231482] Allocated by task 270: [ 29.231736] kasan_save_stack+0x3d/0x60 [ 29.232117] kasan_save_track+0x18/0x40 [ 29.232372] kasan_save_alloc_info+0x3b/0x50 [ 29.232691] __kasan_kmalloc+0xb7/0xc0 [ 29.233136] __kmalloc_cache_noprof+0x184/0x410 [ 29.233641] kasan_bitops_generic+0x93/0x1c0 [ 29.234082] kunit_try_run_case+0x1b3/0x490 [ 29.234418] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.234802] kthread+0x257/0x310 [ 29.235034] ret_from_fork+0x41/0x80 [ 29.235404] ret_from_fork_asm+0x1a/0x30 [ 29.235811] [ 29.236004] The buggy address belongs to the object at ffff888101adffe0 [ 29.236004] which belongs to the cache kmalloc-16 of size 16 [ 29.236907] The buggy address is located 8 bytes inside of [ 29.236907] allocated 9-byte region [ffff888101adffe0, ffff888101adffe9) [ 29.237722] [ 29.237895] The buggy address belongs to the physical page: [ 29.238322] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101adf [ 29.239006] flags: 0x200000000000000(node=0|zone=2) [ 29.239417] page_type: f5(slab) [ 29.239741] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 29.240247] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 29.240726] page dumped because: kasan: bad access detected [ 29.241211] [ 29.241418] Memory state around the buggy address: [ 29.241811] ffff888101adfe80: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 29.242265] ffff888101adff00: 00 02 fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 29.242975] >ffff888101adff80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 29.243421] ^ [ 29.243845] ffff888101ae0000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.244452] ffff888101ae0080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb [ 29.244948] ================================================================== [ 29.070069] ================================================================== [ 29.070724] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19d/0xd50 [ 29.071623] Write of size 8 at addr ffff888101adffe8 by task kunit_try_catch/270 [ 29.072364] [ 29.073263] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 29.074008] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.074676] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.075477] Call Trace: [ 29.075906] <TASK> [ 29.076277] dump_stack_lvl+0x73/0xb0 [ 29.076702] print_report+0xd1/0x640 [ 29.077202] ? __virt_addr_valid+0x1db/0x2d0 [ 29.078230] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.078957] kasan_report+0x102/0x140 [ 29.079372] ? kasan_bitops_modify.constprop.0+0x19d/0xd50 [ 29.080210] ? kasan_bitops_modify.constprop.0+0x19d/0xd50 [ 29.080732] kasan_check_range+0x10c/0x1c0 [ 29.081181] __kasan_check_write+0x18/0x20 [ 29.081718] kasan_bitops_modify.constprop.0+0x19d/0xd50 [ 29.082734] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 29.083303] ? __kmalloc_cache_noprof+0x184/0x410 [ 29.084011] ? trace_hardirqs_on+0x37/0xe0 [ 29.084385] ? kasan_bitops_generic+0x93/0x1c0 [ 29.084934] kasan_bitops_generic+0x117/0x1c0 [ 29.085490] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 29.085972] ? __pfx_read_tsc+0x10/0x10 [ 29.086488] ? ktime_get_ts64+0x86/0x230 [ 29.087125] kunit_try_run_case+0x1b3/0x490 [ 29.087923] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.088403] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.088987] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.089737] ? __kthread_parkme+0x82/0x160 [ 29.090283] ? preempt_count_sub+0x50/0x80 [ 29.090806] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.091413] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.092040] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.092969] kthread+0x257/0x310 [ 29.093347] ? __pfx_kthread+0x10/0x10 [ 29.094312] ret_from_fork+0x41/0x80 [ 29.094677] ? __pfx_kthread+0x10/0x10 [ 29.095296] ret_from_fork_asm+0x1a/0x30 [ 29.095756] </TASK> [ 29.096067] [ 29.096254] Allocated by task 270: [ 29.096830] kasan_save_stack+0x3d/0x60 [ 29.097389] kasan_save_track+0x18/0x40 [ 29.097705] kasan_save_alloc_info+0x3b/0x50 [ 29.098192] __kasan_kmalloc+0xb7/0xc0 [ 29.098772] __kmalloc_cache_noprof+0x184/0x410 [ 29.099369] kasan_bitops_generic+0x93/0x1c0 [ 29.099667] kunit_try_run_case+0x1b3/0x490 [ 29.100728] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.101244] kthread+0x257/0x310 [ 29.101538] ret_from_fork+0x41/0x80 [ 29.102116] ret_from_fork_asm+0x1a/0x30 [ 29.102542] [ 29.102827] The buggy address belongs to the object at ffff888101adffe0 [ 29.102827] which belongs to the cache kmalloc-16 of size 16 [ 29.104378] The buggy address is located 8 bytes inside of [ 29.104378] allocated 9-byte region [ffff888101adffe0, ffff888101adffe9) [ 29.105335] [ 29.105487] The buggy address belongs to the physical page: [ 29.106179] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101adf [ 29.107617] flags: 0x200000000000000(node=0|zone=2) [ 29.108358] page_type: f5(slab) [ 29.108919] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 29.109498] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 29.110186] page dumped because: kasan: bad access detected [ 29.110820] [ 29.111027] Memory state around the buggy address: [ 29.111907] ffff888101adfe80: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 29.112718] ffff888101adff00: 00 02 fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 29.113699] >ffff888101adff80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 29.114229] ^ [ 29.115068] ffff888101ae0000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.115850] ffff888101ae0080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb [ 29.116501] ==================================================================