Date
Dec. 3, 2024, 11:38 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 34.488423] ================================================================== [ 34.489444] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa44/0xbc8 [ 34.490629] Read of size 8 at addr fff00000c5732788 by task kunit_try_catch/250 [ 34.491744] [ 34.492491] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 34.493885] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.494482] Hardware name: linux,dummy-virt (DT) [ 34.495134] Call trace: [ 34.495575] show_stack+0x20/0x38 (C) [ 34.496140] dump_stack_lvl+0x8c/0xd0 [ 34.496728] print_report+0x118/0x5e0 [ 34.497255] kasan_report+0xc8/0x118 [ 34.497786] __asan_report_load8_noabort+0x20/0x30 [ 34.498723] kasan_bitops_test_and_modify.constprop.0+0xa44/0xbc8 [ 34.499584] kasan_bitops_generic+0x11c/0x1c8 [ 34.500356] kunit_try_run_case+0x14c/0x3d0 [ 34.501169] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.501913] kthread+0x24c/0x2d0 [ 34.502448] ret_from_fork+0x10/0x20 [ 34.502969] [ 34.503300] Allocated by task 250: [ 34.504088] kasan_save_stack+0x3c/0x68 [ 34.504738] kasan_save_track+0x20/0x40 [ 34.505394] kasan_save_alloc_info+0x40/0x58 [ 34.506037] __kasan_kmalloc+0xd4/0xd8 [ 34.506623] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.507297] kasan_bitops_generic+0xa0/0x1c8 [ 34.507888] kunit_try_run_case+0x14c/0x3d0 [ 34.508566] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.509223] kthread+0x24c/0x2d0 [ 34.509824] ret_from_fork+0x10/0x20 [ 34.510469] [ 34.510816] The buggy address belongs to the object at fff00000c5732780 [ 34.510816] which belongs to the cache kmalloc-16 of size 16 [ 34.512160] The buggy address is located 8 bytes inside of [ 34.512160] allocated 9-byte region [fff00000c5732780, fff00000c5732789) [ 34.513506] [ 34.513943] The buggy address belongs to the physical page: [ 34.514649] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105732 [ 34.515604] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.516464] page_type: f5(slab) [ 34.516944] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 34.517964] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 34.518836] page dumped because: kasan: bad access detected [ 34.519552] [ 34.519868] Memory state around the buggy address: [ 34.520525] fff00000c5732680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.521371] fff00000c5732700: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 34.522243] >fff00000c5732780: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.523171] ^ [ 34.523720] fff00000c5732800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.524754] fff00000c5732880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.525754] ================================================================== [ 34.449859] ================================================================== [ 34.450733] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x334/0xbc8 [ 34.451855] Write of size 8 at addr fff00000c5732788 by task kunit_try_catch/250 [ 34.452866] [ 34.453197] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 34.454440] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.455073] Hardware name: linux,dummy-virt (DT) [ 34.455624] Call trace: [ 34.456085] show_stack+0x20/0x38 (C) [ 34.456686] dump_stack_lvl+0x8c/0xd0 [ 34.457377] print_report+0x118/0x5e0 [ 34.457901] kasan_report+0xc8/0x118 [ 34.458605] kasan_check_range+0x100/0x1a8 [ 34.459226] __kasan_check_write+0x20/0x30 [ 34.459937] kasan_bitops_test_and_modify.constprop.0+0x334/0xbc8 [ 34.460853] kasan_bitops_generic+0x11c/0x1c8 [ 34.461557] kunit_try_run_case+0x14c/0x3d0 [ 34.462234] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.463008] kthread+0x24c/0x2d0 [ 34.463642] ret_from_fork+0x10/0x20 [ 34.464238] [ 34.464627] Allocated by task 250: [ 34.465121] kasan_save_stack+0x3c/0x68 [ 34.465655] kasan_save_track+0x20/0x40 [ 34.466288] kasan_save_alloc_info+0x40/0x58 [ 34.466998] __kasan_kmalloc+0xd4/0xd8 [ 34.467599] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.468271] kasan_bitops_generic+0xa0/0x1c8 [ 34.468878] kunit_try_run_case+0x14c/0x3d0 [ 34.469589] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.470294] kthread+0x24c/0x2d0 [ 34.470808] ret_from_fork+0x10/0x20 [ 34.471347] [ 34.471808] The buggy address belongs to the object at fff00000c5732780 [ 34.471808] which belongs to the cache kmalloc-16 of size 16 [ 34.473227] The buggy address is located 8 bytes inside of [ 34.473227] allocated 9-byte region [fff00000c5732780, fff00000c5732789) [ 34.474573] [ 34.474904] The buggy address belongs to the physical page: [ 34.475601] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105732 [ 34.476569] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.477395] page_type: f5(slab) [ 34.477978] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 34.478877] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 34.479828] page dumped because: kasan: bad access detected [ 34.480597] [ 34.480925] Memory state around the buggy address: [ 34.481527] fff00000c5732680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.482566] fff00000c5732700: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 34.483442] >fff00000c5732780: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.484282] ^ [ 34.484917] fff00000c5732800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.485875] fff00000c5732880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.486738] ================================================================== [ 34.527835] ================================================================== [ 34.529003] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa8c/0xbc8 [ 34.530670] Read of size 8 at addr fff00000c5732788 by task kunit_try_catch/250 [ 34.531572] [ 34.531987] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 34.533968] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.534261] Hardware name: linux,dummy-virt (DT) [ 34.534769] Call trace: [ 34.535289] show_stack+0x20/0x38 (C) [ 34.535914] dump_stack_lvl+0x8c/0xd0 [ 34.536631] print_report+0x118/0x5e0 [ 34.537410] kasan_report+0xc8/0x118 [ 34.538008] __asan_report_load8_noabort+0x20/0x30 [ 34.538820] kasan_bitops_test_and_modify.constprop.0+0xa8c/0xbc8 [ 34.539702] kasan_bitops_generic+0x11c/0x1c8 [ 34.540463] kunit_try_run_case+0x14c/0x3d0 [ 34.541182] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.542221] kthread+0x24c/0x2d0 [ 34.542817] ret_from_fork+0x10/0x20 [ 34.543526] [ 34.543829] Allocated by task 250: [ 34.544488] kasan_save_stack+0x3c/0x68 [ 34.544967] kasan_save_track+0x20/0x40 [ 34.545601] kasan_save_alloc_info+0x40/0x58 [ 34.546289] __kasan_kmalloc+0xd4/0xd8 [ 34.546767] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.547667] kasan_bitops_generic+0xa0/0x1c8 [ 34.548473] kunit_try_run_case+0x14c/0x3d0 [ 34.549076] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.549796] kthread+0x24c/0x2d0 [ 34.550417] ret_from_fork+0x10/0x20 [ 34.551033] [ 34.551450] The buggy address belongs to the object at fff00000c5732780 [ 34.551450] which belongs to the cache kmalloc-16 of size 16 [ 34.552778] The buggy address is located 8 bytes inside of [ 34.552778] allocated 9-byte region [fff00000c5732780, fff00000c5732789) [ 34.554105] [ 34.554491] The buggy address belongs to the physical page: [ 34.555303] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105732 [ 34.556279] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.557129] page_type: f5(slab) [ 34.557613] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 34.558578] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 34.559552] page dumped because: kasan: bad access detected [ 34.560243] [ 34.560563] Memory state around the buggy address: [ 34.561173] fff00000c5732680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.562070] fff00000c5732700: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 34.562977] >fff00000c5732780: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.563801] ^ [ 34.564376] fff00000c5732800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.565144] fff00000c5732880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.566004] ================================================================== [ 34.253865] ================================================================== [ 34.254716] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa08/0xbc8 [ 34.256158] Read of size 8 at addr fff00000c5732788 by task kunit_try_catch/250 [ 34.256974] [ 34.257404] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 34.258662] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.259190] Hardware name: linux,dummy-virt (DT) [ 34.259958] Call trace: [ 34.260374] show_stack+0x20/0x38 (C) [ 34.260908] dump_stack_lvl+0x8c/0xd0 [ 34.261531] print_report+0x118/0x5e0 [ 34.262212] kasan_report+0xc8/0x118 [ 34.262880] __asan_report_load8_noabort+0x20/0x30 [ 34.263616] kasan_bitops_test_and_modify.constprop.0+0xa08/0xbc8 [ 34.264354] kasan_bitops_generic+0x11c/0x1c8 [ 34.264975] kunit_try_run_case+0x14c/0x3d0 [ 34.265670] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.266515] kthread+0x24c/0x2d0 [ 34.267111] ret_from_fork+0x10/0x20 [ 34.267725] [ 34.268101] Allocated by task 250: [ 34.268599] kasan_save_stack+0x3c/0x68 [ 34.269282] kasan_save_track+0x20/0x40 [ 34.269965] kasan_save_alloc_info+0x40/0x58 [ 34.270616] __kasan_kmalloc+0xd4/0xd8 [ 34.271251] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.271921] kasan_bitops_generic+0xa0/0x1c8 [ 34.272600] kunit_try_run_case+0x14c/0x3d0 [ 34.273232] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.274017] kthread+0x24c/0x2d0 [ 34.274564] ret_from_fork+0x10/0x20 [ 34.275059] [ 34.275463] The buggy address belongs to the object at fff00000c5732780 [ 34.275463] which belongs to the cache kmalloc-16 of size 16 [ 34.276832] The buggy address is located 8 bytes inside of [ 34.276832] allocated 9-byte region [fff00000c5732780, fff00000c5732789) [ 34.278283] [ 34.278629] The buggy address belongs to the physical page: [ 34.279437] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105732 [ 34.280350] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.281238] page_type: f5(slab) [ 34.281740] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 34.282769] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 34.283764] page dumped because: kasan: bad access detected [ 34.284593] [ 34.284884] Memory state around the buggy address: [ 34.285529] fff00000c5732680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.286468] fff00000c5732700: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 34.287357] >fff00000c5732780: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.288205] ^ [ 34.288674] fff00000c5732800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.289593] fff00000c5732880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.290574] ================================================================== [ 34.293601] ================================================================== [ 34.294646] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc8 [ 34.296758] Write of size 8 at addr fff00000c5732788 by task kunit_try_catch/250 [ 34.297320] [ 34.298067] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 34.299455] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.299977] Hardware name: linux,dummy-virt (DT) [ 34.300727] Call trace: [ 34.301075] show_stack+0x20/0x38 (C) [ 34.301847] dump_stack_lvl+0x8c/0xd0 [ 34.302433] print_report+0x118/0x5e0 [ 34.302998] kasan_report+0xc8/0x118 [ 34.303618] kasan_check_range+0x100/0x1a8 [ 34.304215] __kasan_check_write+0x20/0x30 [ 34.304868] kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc8 [ 34.305721] kasan_bitops_generic+0x11c/0x1c8 [ 34.306308] kunit_try_run_case+0x14c/0x3d0 [ 34.306961] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.307927] kthread+0x24c/0x2d0 [ 34.308463] ret_from_fork+0x10/0x20 [ 34.309115] [ 34.309571] Allocated by task 250: [ 34.310281] kasan_save_stack+0x3c/0x68 [ 34.310870] kasan_save_track+0x20/0x40 [ 34.311528] kasan_save_alloc_info+0x40/0x58 [ 34.312141] __kasan_kmalloc+0xd4/0xd8 [ 34.312700] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.313233] kasan_bitops_generic+0xa0/0x1c8 [ 34.313963] kunit_try_run_case+0x14c/0x3d0 [ 34.314549] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.315232] kthread+0x24c/0x2d0 [ 34.315747] ret_from_fork+0x10/0x20 [ 34.316301] [ 34.316608] The buggy address belongs to the object at fff00000c5732780 [ 34.316608] which belongs to the cache kmalloc-16 of size 16 [ 34.317996] The buggy address is located 8 bytes inside of [ 34.317996] allocated 9-byte region [fff00000c5732780, fff00000c5732789) [ 34.319406] [ 34.319735] The buggy address belongs to the physical page: [ 34.320510] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105732 [ 34.321527] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.322418] page_type: f5(slab) [ 34.322973] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 34.324346] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 34.325226] page dumped because: kasan: bad access detected [ 34.325933] [ 34.326243] Memory state around the buggy address: [ 34.326883] fff00000c5732680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.327827] fff00000c5732700: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 34.328691] >fff00000c5732780: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.329669] ^ [ 34.330187] fff00000c5732800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.331093] fff00000c5732880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.332011] ================================================================== [ 34.333586] ================================================================== [ 34.334273] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa50/0xbc8 [ 34.335514] Read of size 8 at addr fff00000c5732788 by task kunit_try_catch/250 [ 34.336417] [ 34.336777] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 34.338098] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.338698] Hardware name: linux,dummy-virt (DT) [ 34.339287] Call trace: [ 34.339851] show_stack+0x20/0x38 (C) [ 34.340436] dump_stack_lvl+0x8c/0xd0 [ 34.341140] print_report+0x118/0x5e0 [ 34.341732] kasan_report+0xc8/0x118 [ 34.342365] __asan_report_load8_noabort+0x20/0x30 [ 34.343223] kasan_bitops_test_and_modify.constprop.0+0xa50/0xbc8 [ 34.344104] kasan_bitops_generic+0x11c/0x1c8 [ 34.344751] kunit_try_run_case+0x14c/0x3d0 [ 34.345394] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.346140] kthread+0x24c/0x2d0 [ 34.346669] ret_from_fork+0x10/0x20 [ 34.347207] [ 34.347696] Allocated by task 250: [ 34.348238] kasan_save_stack+0x3c/0x68 [ 34.348764] kasan_save_track+0x20/0x40 [ 34.349522] kasan_save_alloc_info+0x40/0x58 [ 34.350229] __kasan_kmalloc+0xd4/0xd8 [ 34.350915] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.351536] kasan_bitops_generic+0xa0/0x1c8 [ 34.352216] kunit_try_run_case+0x14c/0x3d0 [ 34.352814] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.353609] kthread+0x24c/0x2d0 [ 34.354220] ret_from_fork+0x10/0x20 [ 34.354789] [ 34.355076] The buggy address belongs to the object at fff00000c5732780 [ 34.355076] which belongs to the cache kmalloc-16 of size 16 [ 34.356527] The buggy address is located 8 bytes inside of [ 34.356527] allocated 9-byte region [fff00000c5732780, fff00000c5732789) [ 34.357926] [ 34.358351] The buggy address belongs to the physical page: [ 34.359016] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105732 [ 34.360043] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.360863] page_type: f5(slab) [ 34.361344] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 34.362359] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 34.363259] page dumped because: kasan: bad access detected [ 34.364024] [ 34.364396] Memory state around the buggy address: [ 34.365008] fff00000c5732680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.365996] fff00000c5732700: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 34.366822] >fff00000c5732780: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.367675] ^ [ 34.368205] fff00000c5732800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.369120] fff00000c5732880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.370003] ================================================================== [ 34.410450] ================================================================== [ 34.411270] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xad4/0xbc8 [ 34.412225] Read of size 8 at addr fff00000c5732788 by task kunit_try_catch/250 [ 34.414170] [ 34.414513] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 34.416160] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.416734] Hardware name: linux,dummy-virt (DT) [ 34.417361] Call trace: [ 34.417813] show_stack+0x20/0x38 (C) [ 34.418469] dump_stack_lvl+0x8c/0xd0 [ 34.418946] print_report+0x118/0x5e0 [ 34.419690] kasan_report+0xc8/0x118 [ 34.420378] __asan_report_load8_noabort+0x20/0x30 [ 34.421007] kasan_bitops_test_and_modify.constprop.0+0xad4/0xbc8 [ 34.421808] kasan_bitops_generic+0x11c/0x1c8 [ 34.422508] kunit_try_run_case+0x14c/0x3d0 [ 34.423123] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.423835] kthread+0x24c/0x2d0 [ 34.424526] ret_from_fork+0x10/0x20 [ 34.425168] [ 34.425534] Allocated by task 250: [ 34.426156] kasan_save_stack+0x3c/0x68 [ 34.426684] kasan_save_track+0x20/0x40 [ 34.427308] kasan_save_alloc_info+0x40/0x58 [ 34.427948] __kasan_kmalloc+0xd4/0xd8 [ 34.428544] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.429206] kasan_bitops_generic+0xa0/0x1c8 [ 34.429730] kunit_try_run_case+0x14c/0x3d0 [ 34.430452] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.431057] kthread+0x24c/0x2d0 [ 34.431667] ret_from_fork+0x10/0x20 [ 34.432394] [ 34.432707] The buggy address belongs to the object at fff00000c5732780 [ 34.432707] which belongs to the cache kmalloc-16 of size 16 [ 34.434186] The buggy address is located 8 bytes inside of [ 34.434186] allocated 9-byte region [fff00000c5732780, fff00000c5732789) [ 34.435615] [ 34.435901] The buggy address belongs to the physical page: [ 34.436728] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105732 [ 34.437633] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.438512] page_type: f5(slab) [ 34.439092] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 34.440030] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 34.441042] page dumped because: kasan: bad access detected [ 34.441805] [ 34.442160] Memory state around the buggy address: [ 34.442829] fff00000c5732680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.443677] fff00000c5732700: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 34.444604] >fff00000c5732780: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.445555] ^ [ 34.446052] fff00000c5732800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.446944] fff00000c5732880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.447870] ================================================================== [ 34.215604] ================================================================== [ 34.216504] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc8 [ 34.217437] Write of size 8 at addr fff00000c5732788 by task kunit_try_catch/250 [ 34.218834] [ 34.219368] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 34.220565] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.221100] Hardware name: linux,dummy-virt (DT) [ 34.221689] Call trace: [ 34.222160] show_stack+0x20/0x38 (C) [ 34.222736] dump_stack_lvl+0x8c/0xd0 [ 34.223285] print_report+0x118/0x5e0 [ 34.223938] kasan_report+0xc8/0x118 [ 34.224539] kasan_check_range+0x100/0x1a8 [ 34.225107] __kasan_check_write+0x20/0x30 [ 34.225805] kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc8 [ 34.226597] kasan_bitops_generic+0x11c/0x1c8 [ 34.227220] kunit_try_run_case+0x14c/0x3d0 [ 34.227934] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.228770] kthread+0x24c/0x2d0 [ 34.229362] ret_from_fork+0x10/0x20 [ 34.229994] [ 34.230379] Allocated by task 250: [ 34.230925] kasan_save_stack+0x3c/0x68 [ 34.231478] kasan_save_track+0x20/0x40 [ 34.232044] kasan_save_alloc_info+0x40/0x58 [ 34.232721] __kasan_kmalloc+0xd4/0xd8 [ 34.233285] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.233935] kasan_bitops_generic+0xa0/0x1c8 [ 34.234568] kunit_try_run_case+0x14c/0x3d0 [ 34.235154] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.235824] kthread+0x24c/0x2d0 [ 34.236399] ret_from_fork+0x10/0x20 [ 34.236949] [ 34.237257] The buggy address belongs to the object at fff00000c5732780 [ 34.237257] which belongs to the cache kmalloc-16 of size 16 [ 34.238816] The buggy address is located 8 bytes inside of [ 34.238816] allocated 9-byte region [fff00000c5732780, fff00000c5732789) [ 34.240092] [ 34.240414] The buggy address belongs to the physical page: [ 34.241175] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105732 [ 34.242252] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.243028] page_type: f5(slab) [ 34.243661] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 34.244703] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 34.245703] page dumped because: kasan: bad access detected [ 34.246402] [ 34.246727] Memory state around the buggy address: [ 34.247348] fff00000c5732680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.248168] fff00000c5732700: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 34.249056] >fff00000c5732780: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.249987] ^ [ 34.250466] fff00000c5732800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.251361] fff00000c5732880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.252231] ================================================================== [ 34.372222] ================================================================== [ 34.373049] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc8 [ 34.374051] Write of size 8 at addr fff00000c5732788 by task kunit_try_catch/250 [ 34.374905] [ 34.375269] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 34.376549] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.377101] Hardware name: linux,dummy-virt (DT) [ 34.377750] Call trace: [ 34.378239] show_stack+0x20/0x38 (C) [ 34.378796] dump_stack_lvl+0x8c/0xd0 [ 34.379464] print_report+0x118/0x5e0 [ 34.380034] kasan_report+0xc8/0x118 [ 34.380627] kasan_check_range+0x100/0x1a8 [ 34.381258] __kasan_check_write+0x20/0x30 [ 34.382007] kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc8 [ 34.382906] kasan_bitops_generic+0x11c/0x1c8 [ 34.383535] kunit_try_run_case+0x14c/0x3d0 [ 34.384121] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.384896] kthread+0x24c/0x2d0 [ 34.385438] ret_from_fork+0x10/0x20 [ 34.386113] [ 34.386447] Allocated by task 250: [ 34.386969] kasan_save_stack+0x3c/0x68 [ 34.387695] kasan_save_track+0x20/0x40 [ 34.388119] kasan_save_alloc_info+0x40/0x58 [ 34.388867] __kasan_kmalloc+0xd4/0xd8 [ 34.389416] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.390164] kasan_bitops_generic+0xa0/0x1c8 [ 34.390720] kunit_try_run_case+0x14c/0x3d0 [ 34.391443] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.392104] kthread+0x24c/0x2d0 [ 34.392705] ret_from_fork+0x10/0x20 [ 34.393207] [ 34.393567] The buggy address belongs to the object at fff00000c5732780 [ 34.393567] which belongs to the cache kmalloc-16 of size 16 [ 34.394958] The buggy address is located 8 bytes inside of [ 34.394958] allocated 9-byte region [fff00000c5732780, fff00000c5732789) [ 34.396230] [ 34.396564] The buggy address belongs to the physical page: [ 34.397195] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105732 [ 34.398168] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.399099] page_type: f5(slab) [ 34.399588] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 34.400613] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 34.401494] page dumped because: kasan: bad access detected [ 34.402253] [ 34.402588] Memory state around the buggy address: [ 34.403200] fff00000c5732680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.404096] fff00000c5732700: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 34.405005] >fff00000c5732780: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.405843] ^ [ 34.406359] fff00000c5732800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.407266] fff00000c5732880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.408131] ==================================================================
[ 29.487299] ================================================================== [ 29.487888] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90 [ 29.488673] Write of size 8 at addr ffff888101adffe8 by task kunit_try_catch/270 [ 29.489208] [ 29.489428] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 29.490256] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.490739] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.491385] Call Trace: [ 29.491731] <TASK> [ 29.492017] dump_stack_lvl+0x73/0xb0 [ 29.492634] print_report+0xd1/0x640 [ 29.492866] ? __virt_addr_valid+0x1db/0x2d0 [ 29.493172] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.493690] kasan_report+0x102/0x140 [ 29.494105] ? kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90 [ 29.494524] ? kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90 [ 29.495011] kasan_check_range+0x10c/0x1c0 [ 29.495577] __kasan_check_write+0x18/0x20 [ 29.495855] kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90 [ 29.496221] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 29.496980] ? __kmalloc_cache_noprof+0x184/0x410 [ 29.497596] ? trace_hardirqs_on+0x37/0xe0 [ 29.498028] ? kasan_bitops_generic+0x93/0x1c0 [ 29.498645] kasan_bitops_generic+0x122/0x1c0 [ 29.499578] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 29.500887] ? __pfx_read_tsc+0x10/0x10 [ 29.501306] ? ktime_get_ts64+0x86/0x230 [ 29.502666] kunit_try_run_case+0x1b3/0x490 [ 29.502940] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.503558] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.504146] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.504741] ? __kthread_parkme+0x82/0x160 [ 29.505128] ? preempt_count_sub+0x50/0x80 [ 29.505458] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.506035] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.506925] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.507541] kthread+0x257/0x310 [ 29.507879] ? __pfx_kthread+0x10/0x10 [ 29.508199] ret_from_fork+0x41/0x80 [ 29.508640] ? __pfx_kthread+0x10/0x10 [ 29.509096] ret_from_fork_asm+0x1a/0x30 [ 29.509912] </TASK> [ 29.510155] [ 29.510304] Allocated by task 270: [ 29.510866] kasan_save_stack+0x3d/0x60 [ 29.511432] kasan_save_track+0x18/0x40 [ 29.511696] kasan_save_alloc_info+0x3b/0x50 [ 29.512244] __kasan_kmalloc+0xb7/0xc0 [ 29.512861] __kmalloc_cache_noprof+0x184/0x410 [ 29.513367] kasan_bitops_generic+0x93/0x1c0 [ 29.514016] kunit_try_run_case+0x1b3/0x490 [ 29.514594] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.515077] kthread+0x257/0x310 [ 29.515431] ret_from_fork+0x41/0x80 [ 29.515897] ret_from_fork_asm+0x1a/0x30 [ 29.516361] [ 29.516668] The buggy address belongs to the object at ffff888101adffe0 [ 29.516668] which belongs to the cache kmalloc-16 of size 16 [ 29.517599] The buggy address is located 8 bytes inside of [ 29.517599] allocated 9-byte region [ffff888101adffe0, ffff888101adffe9) [ 29.518920] [ 29.519093] The buggy address belongs to the physical page: [ 29.519551] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101adf [ 29.520332] flags: 0x200000000000000(node=0|zone=2) [ 29.521119] page_type: f5(slab) [ 29.521353] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 29.522099] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 29.522682] page dumped because: kasan: bad access detected [ 29.523273] [ 29.523542] Memory state around the buggy address: [ 29.524158] ffff888101adfe80: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 29.524887] ffff888101adff00: 00 02 fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 29.525492] >ffff888101adff80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 29.526240] ^ [ 29.526769] ffff888101ae0000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.527484] ffff888101ae0080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb [ 29.527962] ================================================================== [ 29.529338] ================================================================== [ 29.530767] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90 [ 29.531466] Write of size 8 at addr ffff888101adffe8 by task kunit_try_catch/270 [ 29.531993] [ 29.532243] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 29.532896] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.533306] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.534219] Call Trace: [ 29.534504] <TASK> [ 29.534727] dump_stack_lvl+0x73/0xb0 [ 29.535169] print_report+0xd1/0x640 [ 29.535492] ? __virt_addr_valid+0x1db/0x2d0 [ 29.535854] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.536311] kasan_report+0x102/0x140 [ 29.536761] ? kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90 [ 29.537296] ? kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90 [ 29.537864] kasan_check_range+0x10c/0x1c0 [ 29.538171] __kasan_check_write+0x18/0x20 [ 29.538633] kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90 [ 29.539208] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 29.539835] ? __kmalloc_cache_noprof+0x184/0x410 [ 29.540248] ? trace_hardirqs_on+0x37/0xe0 [ 29.540588] ? kasan_bitops_generic+0x93/0x1c0 [ 29.541034] kasan_bitops_generic+0x122/0x1c0 [ 29.541527] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 29.542012] ? __pfx_read_tsc+0x10/0x10 [ 29.542370] ? ktime_get_ts64+0x86/0x230 [ 29.542799] kunit_try_run_case+0x1b3/0x490 [ 29.543126] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.543539] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.544001] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.544540] ? __kthread_parkme+0x82/0x160 [ 29.544893] ? preempt_count_sub+0x50/0x80 [ 29.545251] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.545645] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.545986] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.546569] kthread+0x257/0x310 [ 29.546947] ? __pfx_kthread+0x10/0x10 [ 29.547365] ret_from_fork+0x41/0x80 [ 29.547766] ? __pfx_kthread+0x10/0x10 [ 29.548126] ret_from_fork_asm+0x1a/0x30 [ 29.548602] </TASK> [ 29.548794] [ 29.548928] Allocated by task 270: [ 29.549284] kasan_save_stack+0x3d/0x60 [ 29.549726] kasan_save_track+0x18/0x40 [ 29.550123] kasan_save_alloc_info+0x3b/0x50 [ 29.550409] __kasan_kmalloc+0xb7/0xc0 [ 29.550836] __kmalloc_cache_noprof+0x184/0x410 [ 29.551168] kasan_bitops_generic+0x93/0x1c0 [ 29.551626] kunit_try_run_case+0x1b3/0x490 [ 29.551994] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.552390] kthread+0x257/0x310 [ 29.552791] ret_from_fork+0x41/0x80 [ 29.553175] ret_from_fork_asm+0x1a/0x30 [ 29.555307] [ 29.558428] The buggy address belongs to the object at ffff888101adffe0 [ 29.558428] which belongs to the cache kmalloc-16 of size 16 [ 29.559254] The buggy address is located 8 bytes inside of [ 29.559254] allocated 9-byte region [ffff888101adffe0, ffff888101adffe9) [ 29.560250] [ 29.560947] The buggy address belongs to the physical page: [ 29.561389] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101adf [ 29.562021] flags: 0x200000000000000(node=0|zone=2) [ 29.562540] page_type: f5(slab) [ 29.562949] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 29.563518] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 29.564033] page dumped because: kasan: bad access detected [ 29.564658] [ 29.564859] Memory state around the buggy address: [ 29.565172] ffff888101adfe80: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 29.566092] ffff888101adff00: 00 02 fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 29.566672] >ffff888101adff80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 29.567194] ^ [ 29.567841] ffff888101ae0000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.568523] ffff888101ae0080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb [ 29.568968] ================================================================== [ 29.365594] ================================================================== [ 29.366528] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x102/0xd90 [ 29.367456] Write of size 8 at addr ffff888101adffe8 by task kunit_try_catch/270 [ 29.368049] [ 29.368242] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 29.369408] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.370021] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.371129] Call Trace: [ 29.371500] <TASK> [ 29.371836] dump_stack_lvl+0x73/0xb0 [ 29.372338] print_report+0xd1/0x640 [ 29.372802] ? __virt_addr_valid+0x1db/0x2d0 [ 29.373164] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.374130] kasan_report+0x102/0x140 [ 29.374614] ? kasan_bitops_test_and_modify.constprop.0+0x102/0xd90 [ 29.375171] ? kasan_bitops_test_and_modify.constprop.0+0x102/0xd90 [ 29.375620] kasan_check_range+0x10c/0x1c0 [ 29.376170] __kasan_check_write+0x18/0x20 [ 29.376662] kasan_bitops_test_and_modify.constprop.0+0x102/0xd90 [ 29.377366] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 29.377948] ? __kmalloc_cache_noprof+0x184/0x410 [ 29.378216] ? trace_hardirqs_on+0x37/0xe0 [ 29.378726] ? kasan_bitops_generic+0x93/0x1c0 [ 29.379072] kasan_bitops_generic+0x122/0x1c0 [ 29.379544] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 29.379965] ? __pfx_read_tsc+0x10/0x10 [ 29.380421] ? ktime_get_ts64+0x86/0x230 [ 29.380723] kunit_try_run_case+0x1b3/0x490 [ 29.381244] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.381673] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.382189] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.382658] ? __kthread_parkme+0x82/0x160 [ 29.383049] ? preempt_count_sub+0x50/0x80 [ 29.383373] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.383872] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.384491] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.384973] kthread+0x257/0x310 [ 29.385313] ? __pfx_kthread+0x10/0x10 [ 29.385592] ret_from_fork+0x41/0x80 [ 29.386101] ? __pfx_kthread+0x10/0x10 [ 29.386509] ret_from_fork_asm+0x1a/0x30 [ 29.386962] </TASK> [ 29.387169] [ 29.387356] Allocated by task 270: [ 29.387776] kasan_save_stack+0x3d/0x60 [ 29.388197] kasan_save_track+0x18/0x40 [ 29.388697] kasan_save_alloc_info+0x3b/0x50 [ 29.388996] __kasan_kmalloc+0xb7/0xc0 [ 29.389423] __kmalloc_cache_noprof+0x184/0x410 [ 29.389836] kasan_bitops_generic+0x93/0x1c0 [ 29.390297] kunit_try_run_case+0x1b3/0x490 [ 29.390631] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.390945] kthread+0x257/0x310 [ 29.391298] ret_from_fork+0x41/0x80 [ 29.391849] ret_from_fork_asm+0x1a/0x30 [ 29.392277] [ 29.392508] The buggy address belongs to the object at ffff888101adffe0 [ 29.392508] which belongs to the cache kmalloc-16 of size 16 [ 29.393148] The buggy address is located 8 bytes inside of [ 29.393148] allocated 9-byte region [ffff888101adffe0, ffff888101adffe9) [ 29.394386] [ 29.394598] The buggy address belongs to the physical page: [ 29.395199] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101adf [ 29.395601] flags: 0x200000000000000(node=0|zone=2) [ 29.395895] page_type: f5(slab) [ 29.396227] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 29.396881] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 29.397531] page dumped because: kasan: bad access detected [ 29.398332] [ 29.398567] Memory state around the buggy address: [ 29.398829] ffff888101adfe80: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 29.399489] ffff888101adff00: 00 02 fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 29.399934] >ffff888101adff80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 29.400482] ^ [ 29.401077] ffff888101ae0000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.401441] ffff888101ae0080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb [ 29.401790] ================================================================== [ 29.607870] ================================================================== [ 29.608571] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90 [ 29.610370] Write of size 8 at addr ffff888101adffe8 by task kunit_try_catch/270 [ 29.611102] [ 29.611346] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 29.612164] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.612417] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.612885] Call Trace: [ 29.613097] <TASK> [ 29.613411] dump_stack_lvl+0x73/0xb0 [ 29.613967] print_report+0xd1/0x640 [ 29.614425] ? __virt_addr_valid+0x1db/0x2d0 [ 29.614873] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.615466] kasan_report+0x102/0x140 [ 29.615871] ? kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90 [ 29.616530] ? kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90 [ 29.617133] kasan_check_range+0x10c/0x1c0 [ 29.617632] __kasan_check_write+0x18/0x20 [ 29.618092] kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90 [ 29.618731] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 29.619225] ? __kmalloc_cache_noprof+0x184/0x410 [ 29.619577] ? trace_hardirqs_on+0x37/0xe0 [ 29.619940] ? kasan_bitops_generic+0x93/0x1c0 [ 29.620479] kasan_bitops_generic+0x122/0x1c0 [ 29.620994] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 29.621846] ? __pfx_read_tsc+0x10/0x10 [ 29.622299] ? ktime_get_ts64+0x86/0x230 [ 29.622770] kunit_try_run_case+0x1b3/0x490 [ 29.623515] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.623895] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.624385] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.625543] ? __kthread_parkme+0x82/0x160 [ 29.625980] ? preempt_count_sub+0x50/0x80 [ 29.626297] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.626832] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.627934] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.628246] kthread+0x257/0x310 [ 29.628892] ? __pfx_kthread+0x10/0x10 [ 29.629365] ret_from_fork+0x41/0x80 [ 29.629832] ? __pfx_kthread+0x10/0x10 [ 29.630249] ret_from_fork_asm+0x1a/0x30 [ 29.630794] </TASK> [ 29.631082] [ 29.631282] Allocated by task 270: [ 29.631733] kasan_save_stack+0x3d/0x60 [ 29.632035] kasan_save_track+0x18/0x40 [ 29.632525] kasan_save_alloc_info+0x3b/0x50 [ 29.632985] __kasan_kmalloc+0xb7/0xc0 [ 29.633389] __kmalloc_cache_noprof+0x184/0x410 [ 29.633945] kasan_bitops_generic+0x93/0x1c0 [ 29.634380] kunit_try_run_case+0x1b3/0x490 [ 29.634751] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.635265] kthread+0x257/0x310 [ 29.635684] ret_from_fork+0x41/0x80 [ 29.636086] ret_from_fork_asm+0x1a/0x30 [ 29.636594] [ 29.636793] The buggy address belongs to the object at ffff888101adffe0 [ 29.636793] which belongs to the cache kmalloc-16 of size 16 [ 29.637806] The buggy address is located 8 bytes inside of [ 29.637806] allocated 9-byte region [ffff888101adffe0, ffff888101adffe9) [ 29.638735] [ 29.638986] The buggy address belongs to the physical page: [ 29.639488] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101adf [ 29.640138] flags: 0x200000000000000(node=0|zone=2) [ 29.640707] page_type: f5(slab) [ 29.641135] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 29.641643] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 29.642412] page dumped because: kasan: bad access detected [ 29.642945] [ 29.643257] Memory state around the buggy address: [ 29.643805] ffff888101adfe80: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 29.644700] ffff888101adff00: 00 02 fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 29.645380] >ffff888101adff80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 29.645934] ^ [ 29.646743] ffff888101ae0000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.647424] ffff888101ae0080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb [ 29.647963] ================================================================== [ 29.446156] ================================================================== [ 29.446802] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90 [ 29.447776] Write of size 8 at addr ffff888101adffe8 by task kunit_try_catch/270 [ 29.448521] [ 29.448877] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 29.449589] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.449980] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.451011] Call Trace: [ 29.451272] <TASK> [ 29.451598] dump_stack_lvl+0x73/0xb0 [ 29.452037] print_report+0xd1/0x640 [ 29.452663] ? __virt_addr_valid+0x1db/0x2d0 [ 29.453192] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.453828] kasan_report+0x102/0x140 [ 29.454110] ? kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90 [ 29.454710] ? kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90 [ 29.455584] kasan_check_range+0x10c/0x1c0 [ 29.456028] __kasan_check_write+0x18/0x20 [ 29.456593] kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90 [ 29.457209] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 29.457816] ? __kmalloc_cache_noprof+0x184/0x410 [ 29.458481] ? trace_hardirqs_on+0x37/0xe0 [ 29.458998] ? kasan_bitops_generic+0x93/0x1c0 [ 29.459360] kasan_bitops_generic+0x122/0x1c0 [ 29.460018] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 29.460626] ? __pfx_read_tsc+0x10/0x10 [ 29.461139] ? ktime_get_ts64+0x86/0x230 [ 29.461571] kunit_try_run_case+0x1b3/0x490 [ 29.462126] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.462654] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.463243] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.463723] ? __kthread_parkme+0x82/0x160 [ 29.464196] ? preempt_count_sub+0x50/0x80 [ 29.464674] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.465146] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.465741] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.466283] kthread+0x257/0x310 [ 29.466856] ? __pfx_kthread+0x10/0x10 [ 29.467185] ret_from_fork+0x41/0x80 [ 29.467702] ? __pfx_kthread+0x10/0x10 [ 29.468203] ret_from_fork_asm+0x1a/0x30 [ 29.468800] </TASK> [ 29.469092] [ 29.469389] Allocated by task 270: [ 29.469740] kasan_save_stack+0x3d/0x60 [ 29.470269] kasan_save_track+0x18/0x40 [ 29.470773] kasan_save_alloc_info+0x3b/0x50 [ 29.471213] __kasan_kmalloc+0xb7/0xc0 [ 29.471608] __kmalloc_cache_noprof+0x184/0x410 [ 29.472195] kasan_bitops_generic+0x93/0x1c0 [ 29.472617] kunit_try_run_case+0x1b3/0x490 [ 29.472893] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.473393] kthread+0x257/0x310 [ 29.474003] ret_from_fork+0x41/0x80 [ 29.474390] ret_from_fork_asm+0x1a/0x30 [ 29.474979] [ 29.475362] The buggy address belongs to the object at ffff888101adffe0 [ 29.475362] which belongs to the cache kmalloc-16 of size 16 [ 29.476030] The buggy address is located 8 bytes inside of [ 29.476030] allocated 9-byte region [ffff888101adffe0, ffff888101adffe9) [ 29.477211] [ 29.477364] The buggy address belongs to the physical page: [ 29.477954] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101adf [ 29.478774] flags: 0x200000000000000(node=0|zone=2) [ 29.479252] page_type: f5(slab) [ 29.479639] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 29.480391] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 29.481176] page dumped because: kasan: bad access detected [ 29.481693] [ 29.481975] Memory state around the buggy address: [ 29.482433] ffff888101adfe80: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 29.483140] ffff888101adff00: 00 02 fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 29.483571] >ffff888101adff80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 29.484175] ^ [ 29.484767] ffff888101ae0000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.485374] ffff888101ae0080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb [ 29.485921] ================================================================== [ 29.690931] ================================================================== [ 29.691569] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90 [ 29.692251] Read of size 8 at addr ffff888101adffe8 by task kunit_try_catch/270 [ 29.692913] [ 29.693225] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 29.693860] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.694330] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.695025] Call Trace: [ 29.695339] <TASK> [ 29.695704] dump_stack_lvl+0x73/0xb0 [ 29.696148] print_report+0xd1/0x640 [ 29.696585] ? __virt_addr_valid+0x1db/0x2d0 [ 29.697127] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.697679] kasan_report+0x102/0x140 [ 29.698138] ? kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90 [ 29.698693] ? kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90 [ 29.699333] __asan_report_load8_noabort+0x18/0x20 [ 29.699916] kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90 [ 29.700424] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 29.701102] ? __kmalloc_cache_noprof+0x184/0x410 [ 29.701551] ? trace_hardirqs_on+0x37/0xe0 [ 29.702066] ? kasan_bitops_generic+0x93/0x1c0 [ 29.702504] kasan_bitops_generic+0x122/0x1c0 [ 29.703026] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 29.703527] ? __pfx_read_tsc+0x10/0x10 [ 29.704000] ? ktime_get_ts64+0x86/0x230 [ 29.704466] kunit_try_run_case+0x1b3/0x490 [ 29.704900] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.705318] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.705806] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.706219] ? __kthread_parkme+0x82/0x160 [ 29.706644] ? preempt_count_sub+0x50/0x80 [ 29.706983] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.707630] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.708072] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.708698] kthread+0x257/0x310 [ 29.709026] ? __pfx_kthread+0x10/0x10 [ 29.709494] ret_from_fork+0x41/0x80 [ 29.709846] ? __pfx_kthread+0x10/0x10 [ 29.710132] ret_from_fork_asm+0x1a/0x30 [ 29.710429] </TASK> [ 29.710775] [ 29.711416] Allocated by task 270: [ 29.712258] kasan_save_stack+0x3d/0x60 [ 29.712700] kasan_save_track+0x18/0x40 [ 29.712937] kasan_save_alloc_info+0x3b/0x50 [ 29.714007] __kasan_kmalloc+0xb7/0xc0 [ 29.714415] __kmalloc_cache_noprof+0x184/0x410 [ 29.714787] kasan_bitops_generic+0x93/0x1c0 [ 29.715234] kunit_try_run_case+0x1b3/0x490 [ 29.715752] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.716309] kthread+0x257/0x310 [ 29.717110] ret_from_fork+0x41/0x80 [ 29.717614] ret_from_fork_asm+0x1a/0x30 [ 29.717880] [ 29.718145] The buggy address belongs to the object at ffff888101adffe0 [ 29.718145] which belongs to the cache kmalloc-16 of size 16 [ 29.719027] The buggy address is located 8 bytes inside of [ 29.719027] allocated 9-byte region [ffff888101adffe0, ffff888101adffe9) [ 29.719996] [ 29.720526] The buggy address belongs to the physical page: [ 29.721411] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101adf [ 29.721800] flags: 0x200000000000000(node=0|zone=2) [ 29.722199] page_type: f5(slab) [ 29.723026] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 29.723991] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 29.724478] page dumped because: kasan: bad access detected [ 29.725046] [ 29.725318] Memory state around the buggy address: [ 29.726043] ffff888101adfe80: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 29.727105] ffff888101adff00: 00 02 fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 29.727631] >ffff888101adff80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 29.728156] ^ [ 29.729135] ffff888101ae0000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.729800] ffff888101ae0080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb [ 29.730347] ================================================================== [ 29.570654] ================================================================== [ 29.571327] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90 [ 29.572030] Write of size 8 at addr ffff888101adffe8 by task kunit_try_catch/270 [ 29.572595] [ 29.572863] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 29.573684] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.574105] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.574741] Call Trace: [ 29.574993] <TASK> [ 29.575311] dump_stack_lvl+0x73/0xb0 [ 29.575751] print_report+0xd1/0x640 [ 29.576208] ? __virt_addr_valid+0x1db/0x2d0 [ 29.576662] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.577088] kasan_report+0x102/0x140 [ 29.577527] ? kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90 [ 29.578112] ? kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90 [ 29.578737] kasan_check_range+0x10c/0x1c0 [ 29.579190] __kasan_check_write+0x18/0x20 [ 29.579536] kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90 [ 29.580152] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 29.580632] ? __kmalloc_cache_noprof+0x184/0x410 [ 29.581134] ? trace_hardirqs_on+0x37/0xe0 [ 29.581625] ? kasan_bitops_generic+0x93/0x1c0 [ 29.581976] kasan_bitops_generic+0x122/0x1c0 [ 29.582498] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 29.582913] ? __pfx_read_tsc+0x10/0x10 [ 29.583323] ? ktime_get_ts64+0x86/0x230 [ 29.583805] kunit_try_run_case+0x1b3/0x490 [ 29.584173] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.584644] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.585121] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.585717] ? __kthread_parkme+0x82/0x160 [ 29.586087] ? preempt_count_sub+0x50/0x80 [ 29.586586] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.586903] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.587286] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.587888] kthread+0x257/0x310 [ 29.588308] ? __pfx_kthread+0x10/0x10 [ 29.588789] ret_from_fork+0x41/0x80 [ 29.589224] ? __pfx_kthread+0x10/0x10 [ 29.589680] ret_from_fork_asm+0x1a/0x30 [ 29.590074] </TASK> [ 29.590346] [ 29.590629] Allocated by task 270: [ 29.590874] kasan_save_stack+0x3d/0x60 [ 29.591154] kasan_save_track+0x18/0x40 [ 29.591406] kasan_save_alloc_info+0x3b/0x50 [ 29.591701] __kasan_kmalloc+0xb7/0xc0 [ 29.591947] __kmalloc_cache_noprof+0x184/0x410 [ 29.592426] kasan_bitops_generic+0x93/0x1c0 [ 29.592853] kunit_try_run_case+0x1b3/0x490 [ 29.593376] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.593922] kthread+0x257/0x310 [ 29.594277] ret_from_fork+0x41/0x80 [ 29.594761] ret_from_fork_asm+0x1a/0x30 [ 29.595214] [ 29.595423] The buggy address belongs to the object at ffff888101adffe0 [ 29.595423] which belongs to the cache kmalloc-16 of size 16 [ 29.596471] The buggy address is located 8 bytes inside of [ 29.596471] allocated 9-byte region [ffff888101adffe0, ffff888101adffe9) [ 29.597320] [ 29.597518] The buggy address belongs to the physical page: [ 29.597817] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101adf [ 29.598392] flags: 0x200000000000000(node=0|zone=2) [ 29.598981] page_type: f5(slab) [ 29.599384] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 29.600092] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 29.600793] page dumped because: kasan: bad access detected [ 29.601325] [ 29.601560] Memory state around the buggy address: [ 29.601892] ffff888101adfe80: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 29.602376] ffff888101adff00: 00 02 fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 29.602887] >ffff888101adff80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 29.603542] ^ [ 29.604131] ffff888101ae0000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.604728] ffff888101ae0080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb [ 29.605345] ================================================================== [ 29.402816] ================================================================== [ 29.403518] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90 [ 29.404366] Write of size 8 at addr ffff888101adffe8 by task kunit_try_catch/270 [ 29.405244] [ 29.405530] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 29.406690] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.407424] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.409330] Call Trace: [ 29.409750] <TASK> [ 29.411280] dump_stack_lvl+0x73/0xb0 [ 29.412001] print_report+0xd1/0x640 [ 29.412372] ? __virt_addr_valid+0x1db/0x2d0 [ 29.412939] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.413417] kasan_report+0x102/0x140 [ 29.413820] ? kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90 [ 29.414336] ? kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90 [ 29.415039] kasan_check_range+0x10c/0x1c0 [ 29.415558] __kasan_check_write+0x18/0x20 [ 29.416072] kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90 [ 29.416453] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 29.417290] ? __kmalloc_cache_noprof+0x184/0x410 [ 29.417640] ? trace_hardirqs_on+0x37/0xe0 [ 29.418345] ? kasan_bitops_generic+0x93/0x1c0 [ 29.418929] kasan_bitops_generic+0x122/0x1c0 [ 29.419643] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 29.420146] ? __pfx_read_tsc+0x10/0x10 [ 29.420386] ? ktime_get_ts64+0x86/0x230 [ 29.421078] kunit_try_run_case+0x1b3/0x490 [ 29.421628] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.422086] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.422594] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.423128] ? __kthread_parkme+0x82/0x160 [ 29.423567] ? preempt_count_sub+0x50/0x80 [ 29.424018] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.424520] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.425099] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.425615] kthread+0x257/0x310 [ 29.425988] ? __pfx_kthread+0x10/0x10 [ 29.426410] ret_from_fork+0x41/0x80 [ 29.426953] ? __pfx_kthread+0x10/0x10 [ 29.427352] ret_from_fork_asm+0x1a/0x30 [ 29.427884] </TASK> [ 29.428227] [ 29.428375] Allocated by task 270: [ 29.428836] kasan_save_stack+0x3d/0x60 [ 29.429306] kasan_save_track+0x18/0x40 [ 29.429688] kasan_save_alloc_info+0x3b/0x50 [ 29.430160] __kasan_kmalloc+0xb7/0xc0 [ 29.430609] __kmalloc_cache_noprof+0x184/0x410 [ 29.431081] kasan_bitops_generic+0x93/0x1c0 [ 29.431544] kunit_try_run_case+0x1b3/0x490 [ 29.431946] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.432563] kthread+0x257/0x310 [ 29.432885] ret_from_fork+0x41/0x80 [ 29.433331] ret_from_fork_asm+0x1a/0x30 [ 29.433794] [ 29.434027] The buggy address belongs to the object at ffff888101adffe0 [ 29.434027] which belongs to the cache kmalloc-16 of size 16 [ 29.434600] The buggy address is located 8 bytes inside of [ 29.434600] allocated 9-byte region [ffff888101adffe0, ffff888101adffe9) [ 29.435671] [ 29.435890] The buggy address belongs to the physical page: [ 29.436363] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101adf [ 29.436888] flags: 0x200000000000000(node=0|zone=2) [ 29.437515] page_type: f5(slab) [ 29.437873] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 29.438567] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 29.439375] page dumped because: kasan: bad access detected [ 29.439979] [ 29.440348] Memory state around the buggy address: [ 29.440846] ffff888101adfe80: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 29.441485] ffff888101adff00: 00 02 fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 29.442093] >ffff888101adff80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 29.442856] ^ [ 29.443600] ffff888101ae0000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.443965] ffff888101ae0080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb [ 29.444707] ================================================================== [ 29.649390] ================================================================== [ 29.650169] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x558/0xd90 [ 29.651035] Read of size 8 at addr ffff888101adffe8 by task kunit_try_catch/270 [ 29.651543] [ 29.651871] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 29.652714] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.653129] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.653901] Call Trace: [ 29.654192] <TASK> [ 29.654765] dump_stack_lvl+0x73/0xb0 [ 29.655243] print_report+0xd1/0x640 [ 29.655760] ? __virt_addr_valid+0x1db/0x2d0 [ 29.656194] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.656855] kasan_report+0x102/0x140 [ 29.657246] ? kasan_bitops_test_and_modify.constprop.0+0x558/0xd90 [ 29.657919] ? kasan_bitops_test_and_modify.constprop.0+0x558/0xd90 [ 29.658421] kasan_check_range+0x10c/0x1c0 [ 29.658973] __kasan_check_read+0x15/0x20 [ 29.659410] kasan_bitops_test_and_modify.constprop.0+0x558/0xd90 [ 29.660065] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 29.660718] ? __kmalloc_cache_noprof+0x184/0x410 [ 29.661100] ? trace_hardirqs_on+0x37/0xe0 [ 29.661631] ? kasan_bitops_generic+0x93/0x1c0 [ 29.662115] kasan_bitops_generic+0x122/0x1c0 [ 29.662620] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 29.663079] ? __pfx_read_tsc+0x10/0x10 [ 29.663557] ? ktime_get_ts64+0x86/0x230 [ 29.664037] kunit_try_run_case+0x1b3/0x490 [ 29.664619] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.665064] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.665509] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.666141] ? __kthread_parkme+0x82/0x160 [ 29.666630] ? preempt_count_sub+0x50/0x80 [ 29.667000] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.667643] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.668263] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.668811] kthread+0x257/0x310 [ 29.669285] ? __pfx_kthread+0x10/0x10 [ 29.669784] ret_from_fork+0x41/0x80 [ 29.670261] ? __pfx_kthread+0x10/0x10 [ 29.670688] ret_from_fork_asm+0x1a/0x30 [ 29.670990] </TASK> [ 29.671281] [ 29.671502] Allocated by task 270: [ 29.671849] kasan_save_stack+0x3d/0x60 [ 29.672267] kasan_save_track+0x18/0x40 [ 29.672655] kasan_save_alloc_info+0x3b/0x50 [ 29.673049] __kasan_kmalloc+0xb7/0xc0 [ 29.673729] __kmalloc_cache_noprof+0x184/0x410 [ 29.674024] kasan_bitops_generic+0x93/0x1c0 [ 29.674311] kunit_try_run_case+0x1b3/0x490 [ 29.674575] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.675109] kthread+0x257/0x310 [ 29.675468] ret_from_fork+0x41/0x80 [ 29.675854] ret_from_fork_asm+0x1a/0x30 [ 29.676275] [ 29.676497] The buggy address belongs to the object at ffff888101adffe0 [ 29.676497] which belongs to the cache kmalloc-16 of size 16 [ 29.678304] The buggy address is located 8 bytes inside of [ 29.678304] allocated 9-byte region [ffff888101adffe0, ffff888101adffe9) [ 29.679792] [ 29.680175] The buggy address belongs to the physical page: [ 29.680505] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101adf [ 29.681190] flags: 0x200000000000000(node=0|zone=2) [ 29.681820] page_type: f5(slab) [ 29.682265] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 29.682884] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 29.683312] page dumped because: kasan: bad access detected [ 29.684117] [ 29.684264] Memory state around the buggy address: [ 29.684754] ffff888101adfe80: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 29.685321] ffff888101adff00: 00 02 fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 29.685914] >ffff888101adff80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 29.686574] ^ [ 29.687209] ffff888101ae0000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.687702] ffff888101ae0080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb [ 29.688314] ==================================================================