Date
Dec. 4, 2024, 3:07 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 35.620370] ================================================================== [ 35.621885] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc8 [ 35.623406] Write of size 8 at addr fff00000c6153d88 by task kunit_try_catch/249 [ 35.624196] [ 35.624569] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 35.625879] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.626511] Hardware name: linux,dummy-virt (DT) [ 35.627834] Call trace: [ 35.628263] show_stack+0x20/0x38 (C) [ 35.628759] dump_stack_lvl+0x8c/0xd0 [ 35.629270] print_report+0x118/0x5e0 [ 35.629819] kasan_report+0xc8/0x118 [ 35.631145] kasan_check_range+0x100/0x1a8 [ 35.631933] __kasan_check_write+0x20/0x30 [ 35.632613] kasan_bitops_modify.constprop.0+0x2b4/0xbc8 [ 35.633482] kasan_bitops_generic+0x110/0x1c8 [ 35.635134] kunit_try_run_case+0x14c/0x3d0 [ 35.635943] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.636902] kthread+0x24c/0x2d0 [ 35.637583] ret_from_fork+0x10/0x20 [ 35.638696] [ 35.639037] Allocated by task 249: [ 35.639682] kasan_save_stack+0x3c/0x68 [ 35.640189] kasan_save_track+0x20/0x40 [ 35.640874] kasan_save_alloc_info+0x40/0x58 [ 35.641402] __kasan_kmalloc+0xd4/0xd8 [ 35.642990] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.643773] kasan_bitops_generic+0xa0/0x1c8 [ 35.644329] kunit_try_run_case+0x14c/0x3d0 [ 35.645044] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.645913] kthread+0x24c/0x2d0 [ 35.646717] ret_from_fork+0x10/0x20 [ 35.647395] [ 35.647837] The buggy address belongs to the object at fff00000c6153d80 [ 35.647837] which belongs to the cache kmalloc-16 of size 16 [ 35.649339] The buggy address is located 8 bytes inside of [ 35.649339] allocated 9-byte region [fff00000c6153d80, fff00000c6153d89) [ 35.651739] [ 35.652442] The buggy address belongs to the physical page: [ 35.653442] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106153 [ 35.654934] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.656036] page_type: f5(slab) [ 35.656879] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 35.658322] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 35.659575] page dumped because: kasan: bad access detected [ 35.660855] [ 35.661184] Memory state around the buggy address: [ 35.662231] fff00000c6153c80: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 35.664300] fff00000c6153d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 35.665264] >fff00000c6153d80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.666526] ^ [ 35.668325] fff00000c6153e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.669473] fff00000c6153e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.670653] ================================================================== [ 35.718215] ================================================================== [ 35.719056] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaf4/0xbc8 [ 35.719908] Read of size 8 at addr fff00000c6153d88 by task kunit_try_catch/249 [ 35.720957] [ 35.721340] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 35.723427] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.724070] Hardware name: linux,dummy-virt (DT) [ 35.725138] Call trace: [ 35.725459] show_stack+0x20/0x38 (C) [ 35.726146] dump_stack_lvl+0x8c/0xd0 [ 35.727494] print_report+0x118/0x5e0 [ 35.728280] kasan_report+0xc8/0x118 [ 35.728872] __asan_report_load8_noabort+0x20/0x30 [ 35.729678] kasan_bitops_modify.constprop.0+0xaf4/0xbc8 [ 35.730414] kasan_bitops_generic+0x110/0x1c8 [ 35.731055] kunit_try_run_case+0x14c/0x3d0 [ 35.732050] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.732701] kthread+0x24c/0x2d0 [ 35.733357] ret_from_fork+0x10/0x20 [ 35.734566] [ 35.734946] Allocated by task 249: [ 35.735451] kasan_save_stack+0x3c/0x68 [ 35.736131] kasan_save_track+0x20/0x40 [ 35.737357] kasan_save_alloc_info+0x40/0x58 [ 35.738431] __kasan_kmalloc+0xd4/0xd8 [ 35.739234] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.740006] kasan_bitops_generic+0xa0/0x1c8 [ 35.740869] kunit_try_run_case+0x14c/0x3d0 [ 35.741579] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.742361] kthread+0x24c/0x2d0 [ 35.742933] ret_from_fork+0x10/0x20 [ 35.743504] [ 35.744323] The buggy address belongs to the object at fff00000c6153d80 [ 35.744323] which belongs to the cache kmalloc-16 of size 16 [ 35.745667] The buggy address is located 8 bytes inside of [ 35.745667] allocated 9-byte region [fff00000c6153d80, fff00000c6153d89) [ 35.748256] [ 35.748496] The buggy address belongs to the physical page: [ 35.749390] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106153 [ 35.750930] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.751809] page_type: f5(slab) [ 35.752362] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 35.753397] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 35.755208] page dumped because: kasan: bad access detected [ 35.756469] [ 35.756792] Memory state around the buggy address: [ 35.757860] fff00000c6153c80: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 35.759135] fff00000c6153d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 35.759969] >fff00000c6153d80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.761230] ^ [ 35.761738] fff00000c6153e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.763168] fff00000c6153e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.763608] ================================================================== [ 35.476872] ================================================================== [ 35.477826] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa4c/0xbc8 [ 35.478958] Read of size 8 at addr fff00000c6153d88 by task kunit_try_catch/249 [ 35.481082] [ 35.481895] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 35.483533] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.484084] Hardware name: linux,dummy-virt (DT) [ 35.484936] Call trace: [ 35.485321] show_stack+0x20/0x38 (C) [ 35.486130] dump_stack_lvl+0x8c/0xd0 [ 35.486567] print_report+0x118/0x5e0 [ 35.487047] kasan_report+0xc8/0x118 [ 35.487526] __asan_report_load8_noabort+0x20/0x30 [ 35.488644] kasan_bitops_modify.constprop.0+0xa4c/0xbc8 [ 35.489069] kasan_bitops_generic+0x110/0x1c8 [ 35.489394] kunit_try_run_case+0x14c/0x3d0 [ 35.489903] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.491768] kthread+0x24c/0x2d0 [ 35.492336] ret_from_fork+0x10/0x20 [ 35.493108] [ 35.493616] Allocated by task 249: [ 35.494447] kasan_save_stack+0x3c/0x68 [ 35.494976] kasan_save_track+0x20/0x40 [ 35.495856] kasan_save_alloc_info+0x40/0x58 [ 35.496407] __kasan_kmalloc+0xd4/0xd8 [ 35.496998] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.498227] kasan_bitops_generic+0xa0/0x1c8 [ 35.499083] kunit_try_run_case+0x14c/0x3d0 [ 35.499706] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.500609] kthread+0x24c/0x2d0 [ 35.501170] ret_from_fork+0x10/0x20 [ 35.501744] [ 35.502731] The buggy address belongs to the object at fff00000c6153d80 [ 35.502731] which belongs to the cache kmalloc-16 of size 16 [ 35.504149] The buggy address is located 8 bytes inside of [ 35.504149] allocated 9-byte region [fff00000c6153d80, fff00000c6153d89) [ 35.506139] [ 35.506960] The buggy address belongs to the physical page: [ 35.507936] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106153 [ 35.508941] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.509839] page_type: f5(slab) [ 35.510319] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 35.511474] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 35.512787] page dumped because: kasan: bad access detected [ 35.513414] [ 35.514069] Memory state around the buggy address: [ 35.515232] fff00000c6153c80: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 35.516160] fff00000c6153d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 35.516881] >fff00000c6153d80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.517713] ^ [ 35.518214] fff00000c6153e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.519610] fff00000c6153e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.520876] ================================================================== [ 35.672874] ================================================================== [ 35.674232] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc8 [ 35.675204] Write of size 8 at addr fff00000c6153d88 by task kunit_try_catch/249 [ 35.676156] [ 35.676531] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 35.677787] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.678517] Hardware name: linux,dummy-virt (DT) [ 35.679260] Call trace: [ 35.679743] show_stack+0x20/0x38 (C) [ 35.680268] dump_stack_lvl+0x8c/0xd0 [ 35.681049] print_report+0x118/0x5e0 [ 35.681757] kasan_report+0xc8/0x118 [ 35.682263] kasan_check_range+0x100/0x1a8 [ 35.683585] __kasan_check_write+0x20/0x30 [ 35.684108] kasan_bitops_modify.constprop.0+0x320/0xbc8 [ 35.684977] kasan_bitops_generic+0x110/0x1c8 [ 35.686403] kunit_try_run_case+0x14c/0x3d0 [ 35.687096] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.687797] kthread+0x24c/0x2d0 [ 35.688428] ret_from_fork+0x10/0x20 [ 35.689033] [ 35.689408] Allocated by task 249: [ 35.690833] kasan_save_stack+0x3c/0x68 [ 35.691341] kasan_save_track+0x20/0x40 [ 35.692077] kasan_save_alloc_info+0x40/0x58 [ 35.692760] __kasan_kmalloc+0xd4/0xd8 [ 35.693292] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.694653] kasan_bitops_generic+0xa0/0x1c8 [ 35.695230] kunit_try_run_case+0x14c/0x3d0 [ 35.695890] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.696718] kthread+0x24c/0x2d0 [ 35.697197] ret_from_fork+0x10/0x20 [ 35.698167] [ 35.698542] The buggy address belongs to the object at fff00000c6153d80 [ 35.698542] which belongs to the cache kmalloc-16 of size 16 [ 35.699885] The buggy address is located 8 bytes inside of [ 35.699885] allocated 9-byte region [fff00000c6153d80, fff00000c6153d89) [ 35.701754] [ 35.702173] The buggy address belongs to the physical page: [ 35.702981] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106153 [ 35.704067] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.704935] page_type: f5(slab) [ 35.705663] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 35.707617] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 35.708272] page dumped because: kasan: bad access detected [ 35.708693] [ 35.709328] Memory state around the buggy address: [ 35.710270] fff00000c6153c80: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 35.711105] fff00000c6153d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 35.711997] >fff00000c6153d80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.712930] ^ [ 35.713667] fff00000c6153e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.714533] fff00000c6153e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.715764] ================================================================== [ 35.571011] ================================================================== [ 35.571945] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa88/0xbc8 [ 35.572832] Read of size 8 at addr fff00000c6153d88 by task kunit_try_catch/249 [ 35.573687] [ 35.574044] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 35.575892] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.576655] Hardware name: linux,dummy-virt (DT) [ 35.577228] Call trace: [ 35.578103] show_stack+0x20/0x38 (C) [ 35.578576] dump_stack_lvl+0x8c/0xd0 [ 35.579305] print_report+0x118/0x5e0 [ 35.580382] kasan_report+0xc8/0x118 [ 35.580973] __asan_report_load8_noabort+0x20/0x30 [ 35.581793] kasan_bitops_modify.constprop.0+0xa88/0xbc8 [ 35.582583] kasan_bitops_generic+0x110/0x1c8 [ 35.583258] kunit_try_run_case+0x14c/0x3d0 [ 35.584251] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.585077] kthread+0x24c/0x2d0 [ 35.585699] ret_from_fork+0x10/0x20 [ 35.586528] [ 35.587645] Allocated by task 249: [ 35.588548] kasan_save_stack+0x3c/0x68 [ 35.589164] kasan_save_track+0x20/0x40 [ 35.589930] kasan_save_alloc_info+0x40/0x58 [ 35.590558] __kasan_kmalloc+0xd4/0xd8 [ 35.591095] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.592052] kasan_bitops_generic+0xa0/0x1c8 [ 35.592737] kunit_try_run_case+0x14c/0x3d0 [ 35.593330] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.594251] kthread+0x24c/0x2d0 [ 35.594974] ret_from_fork+0x10/0x20 [ 35.596301] [ 35.596711] The buggy address belongs to the object at fff00000c6153d80 [ 35.596711] which belongs to the cache kmalloc-16 of size 16 [ 35.598117] The buggy address is located 8 bytes inside of [ 35.598117] allocated 9-byte region [fff00000c6153d80, fff00000c6153d89) [ 35.600402] [ 35.601021] The buggy address belongs to the physical page: [ 35.602171] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106153 [ 35.603484] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.605258] page_type: f5(slab) [ 35.606327] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 35.608036] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 35.609029] page dumped because: kasan: bad access detected [ 35.610132] [ 35.610475] Memory state around the buggy address: [ 35.611218] fff00000c6153c80: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 35.612926] fff00000c6153d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 35.613885] >fff00000c6153d80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.614315] ^ [ 35.614581] fff00000c6153e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.616499] fff00000c6153e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.617458] ================================================================== [ 35.522453] ================================================================== [ 35.523922] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc8 [ 35.524735] Write of size 8 at addr fff00000c6153d88 by task kunit_try_catch/249 [ 35.525326] [ 35.526301] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 35.528110] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.528766] Hardware name: linux,dummy-virt (DT) [ 35.529484] Call trace: [ 35.530575] show_stack+0x20/0x38 (C) [ 35.531075] dump_stack_lvl+0x8c/0xd0 [ 35.532064] print_report+0x118/0x5e0 [ 35.532672] kasan_report+0xc8/0x118 [ 35.533251] kasan_check_range+0x100/0x1a8 [ 35.534047] __kasan_check_write+0x20/0x30 [ 35.534671] kasan_bitops_modify.constprop.0+0x1dc/0xbc8 [ 35.535468] kasan_bitops_generic+0x110/0x1c8 [ 35.536383] kunit_try_run_case+0x14c/0x3d0 [ 35.537104] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.537881] kthread+0x24c/0x2d0 [ 35.538356] ret_from_fork+0x10/0x20 [ 35.539237] [ 35.539594] Allocated by task 249: [ 35.540072] kasan_save_stack+0x3c/0x68 [ 35.540692] kasan_save_track+0x20/0x40 [ 35.541342] kasan_save_alloc_info+0x40/0x58 [ 35.542416] __kasan_kmalloc+0xd4/0xd8 [ 35.543015] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.544527] kasan_bitops_generic+0xa0/0x1c8 [ 35.545355] kunit_try_run_case+0x14c/0x3d0 [ 35.546412] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.547278] kthread+0x24c/0x2d0 [ 35.547817] ret_from_fork+0x10/0x20 [ 35.548439] [ 35.548781] The buggy address belongs to the object at fff00000c6153d80 [ 35.548781] which belongs to the cache kmalloc-16 of size 16 [ 35.550110] The buggy address is located 8 bytes inside of [ 35.550110] allocated 9-byte region [fff00000c6153d80, fff00000c6153d89) [ 35.551811] [ 35.552107] The buggy address belongs to the physical page: [ 35.553874] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106153 [ 35.554844] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.555925] page_type: f5(slab) [ 35.556466] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 35.557600] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 35.558954] page dumped because: kasan: bad access detected [ 35.560232] [ 35.560558] Memory state around the buggy address: [ 35.561191] fff00000c6153c80: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 35.562258] fff00000c6153d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 35.563546] >fff00000c6153d80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.564367] ^ [ 35.564907] fff00000c6153e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.566468] fff00000c6153e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.567967] ================================================================== [ 35.765329] ================================================================== [ 35.767433] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc8 [ 35.768316] Write of size 8 at addr fff00000c6153d88 by task kunit_try_catch/249 [ 35.769166] [ 35.769565] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 35.770847] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.771478] Hardware name: linux,dummy-virt (DT) [ 35.772954] Call trace: [ 35.773366] show_stack+0x20/0x38 (C) [ 35.774231] dump_stack_lvl+0x8c/0xd0 [ 35.774819] print_report+0x118/0x5e0 [ 35.775694] kasan_report+0xc8/0x118 [ 35.776279] kasan_check_range+0x100/0x1a8 [ 35.777418] __kasan_check_write+0x20/0x30 [ 35.778392] kasan_bitops_modify.constprop.0+0x344/0xbc8 [ 35.779159] kasan_bitops_generic+0x110/0x1c8 [ 35.780007] kunit_try_run_case+0x14c/0x3d0 [ 35.780761] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.781724] kthread+0x24c/0x2d0 [ 35.782362] ret_from_fork+0x10/0x20 [ 35.783138] [ 35.783566] Allocated by task 249: [ 35.784305] kasan_save_stack+0x3c/0x68 [ 35.784927] kasan_save_track+0x20/0x40 [ 35.785678] kasan_save_alloc_info+0x40/0x58 [ 35.786476] __kasan_kmalloc+0xd4/0xd8 [ 35.787226] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.787893] kasan_bitops_generic+0xa0/0x1c8 [ 35.788678] kunit_try_run_case+0x14c/0x3d0 [ 35.789445] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.790293] kthread+0x24c/0x2d0 [ 35.790811] ret_from_fork+0x10/0x20 [ 35.791302] [ 35.791772] The buggy address belongs to the object at fff00000c6153d80 [ 35.791772] which belongs to the cache kmalloc-16 of size 16 [ 35.793067] The buggy address is located 8 bytes inside of [ 35.793067] allocated 9-byte region [fff00000c6153d80, fff00000c6153d89) [ 35.794606] [ 35.794981] The buggy address belongs to the physical page: [ 35.795746] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106153 [ 35.796745] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.797673] page_type: f5(slab) [ 35.798161] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 35.799117] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 35.800008] page dumped because: kasan: bad access detected [ 35.800738] [ 35.801122] Memory state around the buggy address: [ 35.801772] fff00000c6153c80: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 35.802850] fff00000c6153d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 35.803691] >fff00000c6153d80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.804608] ^ [ 35.805163] fff00000c6153e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.806172] fff00000c6153e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.807057] ================================================================== [ 35.850927] ================================================================== [ 35.851757] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa28/0xbc8 [ 35.852558] Read of size 8 at addr fff00000c6153d88 by task kunit_try_catch/249 [ 35.853512] [ 35.853988] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 35.855476] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.855998] Hardware name: linux,dummy-virt (DT) [ 35.856649] Call trace: [ 35.857132] show_stack+0x20/0x38 (C) [ 35.857772] dump_stack_lvl+0x8c/0xd0 [ 35.858461] print_report+0x118/0x5e0 [ 35.859070] kasan_report+0xc8/0x118 [ 35.859655] __asan_report_load8_noabort+0x20/0x30 [ 35.860292] kasan_bitops_modify.constprop.0+0xa28/0xbc8 [ 35.861153] kasan_bitops_generic+0x110/0x1c8 [ 35.861673] kunit_try_run_case+0x14c/0x3d0 [ 35.862405] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.863115] kthread+0x24c/0x2d0 [ 35.863770] ret_from_fork+0x10/0x20 [ 35.864331] [ 35.864721] Allocated by task 249: [ 35.865155] kasan_save_stack+0x3c/0x68 [ 35.865807] kasan_save_track+0x20/0x40 [ 35.866390] kasan_save_alloc_info+0x40/0x58 [ 35.866972] __kasan_kmalloc+0xd4/0xd8 [ 35.867678] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.868409] kasan_bitops_generic+0xa0/0x1c8 [ 35.869087] kunit_try_run_case+0x14c/0x3d0 [ 35.869719] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.870457] kthread+0x24c/0x2d0 [ 35.870974] ret_from_fork+0x10/0x20 [ 35.871593] [ 35.871963] The buggy address belongs to the object at fff00000c6153d80 [ 35.871963] which belongs to the cache kmalloc-16 of size 16 [ 35.873378] The buggy address is located 8 bytes inside of [ 35.873378] allocated 9-byte region [fff00000c6153d80, fff00000c6153d89) [ 35.874754] [ 35.875090] The buggy address belongs to the physical page: [ 35.875895] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106153 [ 35.876804] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.877800] page_type: f5(slab) [ 35.878276] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 35.879267] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 35.880175] page dumped because: kasan: bad access detected [ 35.880899] [ 35.881244] Memory state around the buggy address: [ 35.881874] fff00000c6153c80: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 35.882860] fff00000c6153d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 35.883668] >fff00000c6153d80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.884615] ^ [ 35.885034] fff00000c6153e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.885661] fff00000c6153e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.886262] ================================================================== [ 35.808905] ================================================================== [ 35.810228] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc8 [ 35.811335] Write of size 8 at addr fff00000c6153d88 by task kunit_try_catch/249 [ 35.812162] [ 35.812614] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 35.814517] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.815067] Hardware name: linux,dummy-virt (DT) [ 35.815733] Call trace: [ 35.816152] show_stack+0x20/0x38 (C) [ 35.816744] dump_stack_lvl+0x8c/0xd0 [ 35.817343] print_report+0x118/0x5e0 [ 35.817970] kasan_report+0xc8/0x118 [ 35.818502] kasan_check_range+0x100/0x1a8 [ 35.819270] __kasan_check_write+0x20/0x30 [ 35.820000] kasan_bitops_modify.constprop.0+0x3b0/0xbc8 [ 35.820927] kasan_bitops_generic+0x110/0x1c8 [ 35.821549] kunit_try_run_case+0x14c/0x3d0 [ 35.822252] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.823047] kthread+0x24c/0x2d0 [ 35.823687] ret_from_fork+0x10/0x20 [ 35.824409] [ 35.824846] Allocated by task 249: [ 35.825275] kasan_save_stack+0x3c/0x68 [ 35.825962] kasan_save_track+0x20/0x40 [ 35.826569] kasan_save_alloc_info+0x40/0x58 [ 35.827303] __kasan_kmalloc+0xd4/0xd8 [ 35.827835] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.828562] kasan_bitops_generic+0xa0/0x1c8 [ 35.829211] kunit_try_run_case+0x14c/0x3d0 [ 35.830054] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.830769] kthread+0x24c/0x2d0 [ 35.831348] ret_from_fork+0x10/0x20 [ 35.831983] [ 35.832418] The buggy address belongs to the object at fff00000c6153d80 [ 35.832418] which belongs to the cache kmalloc-16 of size 16 [ 35.833786] The buggy address is located 8 bytes inside of [ 35.833786] allocated 9-byte region [fff00000c6153d80, fff00000c6153d89) [ 35.835338] [ 35.835734] The buggy address belongs to the physical page: [ 35.836382] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106153 [ 35.837340] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.838293] page_type: f5(slab) [ 35.838972] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 35.839949] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 35.840800] page dumped because: kasan: bad access detected [ 35.841547] [ 35.841897] Memory state around the buggy address: [ 35.842495] fff00000c6153c80: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 35.843439] fff00000c6153d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 35.844390] >fff00000c6153d80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.845389] ^ [ 35.845875] fff00000c6153e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.846855] fff00000c6153e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.847805] ================================================================== [ 35.424650] ================================================================== [ 35.425834] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc8 [ 35.426941] Write of size 8 at addr fff00000c6153d88 by task kunit_try_catch/249 [ 35.429296] [ 35.430297] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 35.432065] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.432957] Hardware name: linux,dummy-virt (DT) [ 35.433442] Call trace: [ 35.434355] show_stack+0x20/0x38 (C) [ 35.435483] dump_stack_lvl+0x8c/0xd0 [ 35.436466] print_report+0x118/0x5e0 [ 35.437122] kasan_report+0xc8/0x118 [ 35.438032] kasan_check_range+0x100/0x1a8 [ 35.439057] __kasan_check_write+0x20/0x30 [ 35.439834] kasan_bitops_modify.constprop.0+0x100/0xbc8 [ 35.440597] kasan_bitops_generic+0x110/0x1c8 [ 35.441434] kunit_try_run_case+0x14c/0x3d0 [ 35.442180] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.442992] kthread+0x24c/0x2d0 [ 35.443579] ret_from_fork+0x10/0x20 [ 35.444968] [ 35.445291] Allocated by task 249: [ 35.445795] kasan_save_stack+0x3c/0x68 [ 35.446396] kasan_save_track+0x20/0x40 [ 35.447019] kasan_save_alloc_info+0x40/0x58 [ 35.447751] __kasan_kmalloc+0xd4/0xd8 [ 35.448321] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.450529] kasan_bitops_generic+0xa0/0x1c8 [ 35.451242] kunit_try_run_case+0x14c/0x3d0 [ 35.452163] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.453052] kthread+0x24c/0x2d0 [ 35.453860] ret_from_fork+0x10/0x20 [ 35.454688] [ 35.455092] The buggy address belongs to the object at fff00000c6153d80 [ 35.455092] which belongs to the cache kmalloc-16 of size 16 [ 35.456679] The buggy address is located 8 bytes inside of [ 35.456679] allocated 9-byte region [fff00000c6153d80, fff00000c6153d89) [ 35.458539] [ 35.459035] The buggy address belongs to the physical page: [ 35.459983] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106153 [ 35.460949] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.462011] page_type: f5(slab) [ 35.462801] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 35.464023] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 35.464897] page dumped because: kasan: bad access detected [ 35.466545] [ 35.467315] Memory state around the buggy address: [ 35.468401] fff00000c6153c80: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 35.469594] fff00000c6153d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 35.470856] >fff00000c6153d80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.472515] ^ [ 35.472959] fff00000c6153e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.474583] fff00000c6153e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.475386] ==================================================================
[ 26.615623] ================================================================== [ 26.616441] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x548/0xd50 [ 26.617679] Write of size 8 at addr ffff888102795348 by task kunit_try_catch/269 [ 26.618163] [ 26.618577] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 26.619396] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.619653] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.621002] Call Trace: [ 26.621528] <TASK> [ 26.622139] dump_stack_lvl+0x73/0xb0 [ 26.622550] print_report+0xd1/0x640 [ 26.623292] ? __virt_addr_valid+0x1db/0x2d0 [ 26.623749] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.624117] kasan_report+0x102/0x140 [ 26.624669] ? kasan_bitops_modify.constprop.0+0x548/0xd50 [ 26.625977] ? kasan_bitops_modify.constprop.0+0x548/0xd50 [ 26.626629] kasan_check_range+0x10c/0x1c0 [ 26.626959] __kasan_check_write+0x18/0x20 [ 26.627493] kasan_bitops_modify.constprop.0+0x548/0xd50 [ 26.628448] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 26.629619] ? __kmalloc_cache_noprof+0x184/0x410 [ 26.630167] ? kasan_bitops_generic+0x93/0x1c0 [ 26.630521] kasan_bitops_generic+0x117/0x1c0 [ 26.631042] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 26.632030] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 26.632601] kunit_try_run_case+0x1b3/0x490 [ 26.633173] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.633563] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 26.634108] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.635036] ? __kthread_parkme+0x82/0x160 [ 26.635463] ? preempt_count_sub+0x50/0x80 [ 26.635872] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.636654] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.637692] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.638610] kthread+0x257/0x310 [ 26.638979] ? __pfx_kthread+0x10/0x10 [ 26.639510] ret_from_fork+0x41/0x80 [ 26.639999] ? __pfx_kthread+0x10/0x10 [ 26.640464] ret_from_fork_asm+0x1a/0x30 [ 26.640993] </TASK> [ 26.641344] [ 26.641636] Allocated by task 269: [ 26.642129] kasan_save_stack+0x3d/0x60 [ 26.642591] kasan_save_track+0x18/0x40 [ 26.643166] kasan_save_alloc_info+0x3b/0x50 [ 26.643627] __kasan_kmalloc+0xb7/0xc0 [ 26.644079] __kmalloc_cache_noprof+0x184/0x410 [ 26.644587] kasan_bitops_generic+0x93/0x1c0 [ 26.645049] kunit_try_run_case+0x1b3/0x490 [ 26.645618] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.646306] kthread+0x257/0x310 [ 26.646813] ret_from_fork+0x41/0x80 [ 26.647160] ret_from_fork_asm+0x1a/0x30 [ 26.647570] [ 26.647916] The buggy address belongs to the object at ffff888102795340 [ 26.647916] which belongs to the cache kmalloc-16 of size 16 [ 26.648957] The buggy address is located 8 bytes inside of [ 26.648957] allocated 9-byte region [ffff888102795340, ffff888102795349) [ 26.649993] [ 26.650322] The buggy address belongs to the physical page: [ 26.650929] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102795 [ 26.651794] flags: 0x200000000000000(node=0|zone=2) [ 26.652194] page_type: f5(slab) [ 26.652633] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 26.653554] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 26.654383] page dumped because: kasan: bad access detected [ 26.655002] [ 26.655274] Memory state around the buggy address: [ 26.655814] ffff888102795200: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 26.656493] ffff888102795280: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 26.657076] >ffff888102795300: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 26.657767] ^ [ 26.658220] ffff888102795380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.658914] ffff888102795400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.659644] ================================================================== [ 26.346335] ================================================================== [ 26.346993] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23b/0xd50 [ 26.347718] Write of size 8 at addr ffff888102795348 by task kunit_try_catch/269 [ 26.349080] [ 26.349706] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 26.350936] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.351491] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.352197] Call Trace: [ 26.352761] <TASK> [ 26.353196] dump_stack_lvl+0x73/0xb0 [ 26.353720] print_report+0xd1/0x640 [ 26.354066] ? __virt_addr_valid+0x1db/0x2d0 [ 26.354665] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.355274] kasan_report+0x102/0x140 [ 26.355788] ? kasan_bitops_modify.constprop.0+0x23b/0xd50 [ 26.356278] ? kasan_bitops_modify.constprop.0+0x23b/0xd50 [ 26.357471] kasan_check_range+0x10c/0x1c0 [ 26.358055] __kasan_check_write+0x18/0x20 [ 26.358525] kasan_bitops_modify.constprop.0+0x23b/0xd50 [ 26.359080] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 26.359570] ? __kmalloc_cache_noprof+0x184/0x410 [ 26.360734] ? kasan_bitops_generic+0x93/0x1c0 [ 26.361236] kasan_bitops_generic+0x117/0x1c0 [ 26.361740] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 26.362615] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 26.363136] kunit_try_run_case+0x1b3/0x490 [ 26.363736] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.364421] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 26.365102] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.366182] ? __kthread_parkme+0x82/0x160 [ 26.366600] ? preempt_count_sub+0x50/0x80 [ 26.367289] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.367741] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.368532] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.369170] kthread+0x257/0x310 [ 26.369790] ? __pfx_kthread+0x10/0x10 [ 26.370161] ret_from_fork+0x41/0x80 [ 26.370787] ? __pfx_kthread+0x10/0x10 [ 26.371451] ret_from_fork_asm+0x1a/0x30 [ 26.371926] </TASK> [ 26.372153] [ 26.372331] Allocated by task 269: [ 26.372793] kasan_save_stack+0x3d/0x60 [ 26.373256] kasan_save_track+0x18/0x40 [ 26.373554] kasan_save_alloc_info+0x3b/0x50 [ 26.374516] __kasan_kmalloc+0xb7/0xc0 [ 26.375029] __kmalloc_cache_noprof+0x184/0x410 [ 26.375745] kasan_bitops_generic+0x93/0x1c0 [ 26.376295] kunit_try_run_case+0x1b3/0x490 [ 26.376637] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.377291] kthread+0x257/0x310 [ 26.377716] ret_from_fork+0x41/0x80 [ 26.378426] ret_from_fork_asm+0x1a/0x30 [ 26.378746] [ 26.379206] The buggy address belongs to the object at ffff888102795340 [ 26.379206] which belongs to the cache kmalloc-16 of size 16 [ 26.380691] The buggy address is located 8 bytes inside of [ 26.380691] allocated 9-byte region [ffff888102795340, ffff888102795349) [ 26.381672] [ 26.381832] The buggy address belongs to the physical page: [ 26.382571] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102795 [ 26.383885] flags: 0x200000000000000(node=0|zone=2) [ 26.384404] page_type: f5(slab) [ 26.384662] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 26.385592] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 26.386647] page dumped because: kasan: bad access detected [ 26.387180] [ 26.387394] Memory state around the buggy address: [ 26.388466] ffff888102795200: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 26.389523] ffff888102795280: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 26.390202] >ffff888102795300: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 26.391103] ^ [ 26.391611] ffff888102795380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.393258] ffff888102795400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.394050] ================================================================== [ 26.559939] ================================================================== [ 26.561302] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ad/0xd50 [ 26.562516] Write of size 8 at addr ffff888102795348 by task kunit_try_catch/269 [ 26.563301] [ 26.563481] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 26.565488] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.565950] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.567271] Call Trace: [ 26.567546] <TASK> [ 26.567852] dump_stack_lvl+0x73/0xb0 [ 26.569067] print_report+0xd1/0x640 [ 26.569601] ? __virt_addr_valid+0x1db/0x2d0 [ 26.570215] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.570721] kasan_report+0x102/0x140 [ 26.571676] ? kasan_bitops_modify.constprop.0+0x4ad/0xd50 [ 26.572377] ? kasan_bitops_modify.constprop.0+0x4ad/0xd50 [ 26.573158] kasan_check_range+0x10c/0x1c0 [ 26.573875] __kasan_check_write+0x18/0x20 [ 26.574512] kasan_bitops_modify.constprop.0+0x4ad/0xd50 [ 26.575763] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 26.576685] ? __kmalloc_cache_noprof+0x184/0x410 [ 26.577118] ? kasan_bitops_generic+0x93/0x1c0 [ 26.578061] kasan_bitops_generic+0x117/0x1c0 [ 26.578513] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 26.579819] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 26.580284] kunit_try_run_case+0x1b3/0x490 [ 26.581007] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.581885] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 26.582583] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.583808] ? __kthread_parkme+0x82/0x160 [ 26.584192] ? preempt_count_sub+0x50/0x80 [ 26.585271] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.585844] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.586942] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.587431] kthread+0x257/0x310 [ 26.588077] ? __pfx_kthread+0x10/0x10 [ 26.588513] ret_from_fork+0x41/0x80 [ 26.589009] ? __pfx_kthread+0x10/0x10 [ 26.589535] ret_from_fork_asm+0x1a/0x30 [ 26.589807] </TASK> [ 26.589977] [ 26.590210] Allocated by task 269: [ 26.591136] kasan_save_stack+0x3d/0x60 [ 26.591598] kasan_save_track+0x18/0x40 [ 26.592305] kasan_save_alloc_info+0x3b/0x50 [ 26.592924] __kasan_kmalloc+0xb7/0xc0 [ 26.593195] __kmalloc_cache_noprof+0x184/0x410 [ 26.593782] kasan_bitops_generic+0x93/0x1c0 [ 26.595423] kunit_try_run_case+0x1b3/0x490 [ 26.596144] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.597055] kthread+0x257/0x310 [ 26.597725] ret_from_fork+0x41/0x80 [ 26.598134] ret_from_fork_asm+0x1a/0x30 [ 26.598448] [ 26.598752] The buggy address belongs to the object at ffff888102795340 [ 26.598752] which belongs to the cache kmalloc-16 of size 16 [ 26.601505] The buggy address is located 8 bytes inside of [ 26.601505] allocated 9-byte region [ffff888102795340, ffff888102795349) [ 26.602756] [ 26.603690] The buggy address belongs to the physical page: [ 26.604993] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102795 [ 26.606000] flags: 0x200000000000000(node=0|zone=2) [ 26.606618] page_type: f5(slab) [ 26.607009] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 26.608056] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 26.608854] page dumped because: kasan: bad access detected [ 26.609284] [ 26.609521] Memory state around the buggy address: [ 26.610325] ffff888102795200: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 26.611402] ffff888102795280: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 26.611764] >ffff888102795300: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 26.612365] ^ [ 26.613263] ffff888102795380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.613975] ffff888102795400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.614486] ================================================================== [ 26.448912] ================================================================== [ 26.449921] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x374/0xd50 [ 26.450301] Write of size 8 at addr ffff888102795348 by task kunit_try_catch/269 [ 26.451725] [ 26.452375] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 26.454071] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.454678] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.455934] Call Trace: [ 26.456490] <TASK> [ 26.456697] dump_stack_lvl+0x73/0xb0 [ 26.457498] print_report+0xd1/0x640 [ 26.458040] ? __virt_addr_valid+0x1db/0x2d0 [ 26.458622] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.459847] kasan_report+0x102/0x140 [ 26.460550] ? kasan_bitops_modify.constprop.0+0x374/0xd50 [ 26.461168] ? kasan_bitops_modify.constprop.0+0x374/0xd50 [ 26.462827] kasan_check_range+0x10c/0x1c0 [ 26.464045] __kasan_check_write+0x18/0x20 [ 26.464665] kasan_bitops_modify.constprop.0+0x374/0xd50 [ 26.465812] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 26.466328] ? __kmalloc_cache_noprof+0x184/0x410 [ 26.467274] ? kasan_bitops_generic+0x93/0x1c0 [ 26.467936] kasan_bitops_generic+0x117/0x1c0 [ 26.468420] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 26.469862] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 26.470256] kunit_try_run_case+0x1b3/0x490 [ 26.471269] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.472161] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 26.473006] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.473889] ? __kthread_parkme+0x82/0x160 [ 26.474256] ? preempt_count_sub+0x50/0x80 [ 26.475129] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.476381] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.476891] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.477393] kthread+0x257/0x310 [ 26.477733] ? __pfx_kthread+0x10/0x10 [ 26.478161] ret_from_fork+0x41/0x80 [ 26.479121] ? __pfx_kthread+0x10/0x10 [ 26.479782] ret_from_fork_asm+0x1a/0x30 [ 26.480632] </TASK> [ 26.481099] [ 26.481751] Allocated by task 269: [ 26.482091] kasan_save_stack+0x3d/0x60 [ 26.483148] kasan_save_track+0x18/0x40 [ 26.483582] kasan_save_alloc_info+0x3b/0x50 [ 26.483984] __kasan_kmalloc+0xb7/0xc0 [ 26.484654] __kmalloc_cache_noprof+0x184/0x410 [ 26.485207] kasan_bitops_generic+0x93/0x1c0 [ 26.485776] kunit_try_run_case+0x1b3/0x490 [ 26.486607] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.486961] kthread+0x257/0x310 [ 26.487869] ret_from_fork+0x41/0x80 [ 26.488185] ret_from_fork_asm+0x1a/0x30 [ 26.488861] [ 26.489089] The buggy address belongs to the object at ffff888102795340 [ 26.489089] which belongs to the cache kmalloc-16 of size 16 [ 26.490071] The buggy address is located 8 bytes inside of [ 26.490071] allocated 9-byte region [ffff888102795340, ffff888102795349) [ 26.491487] [ 26.491645] The buggy address belongs to the physical page: [ 26.492247] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102795 [ 26.493273] flags: 0x200000000000000(node=0|zone=2) [ 26.494079] page_type: f5(slab) [ 26.494355] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 26.495797] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 26.496622] page dumped because: kasan: bad access detected [ 26.496960] [ 26.497217] Memory state around the buggy address: [ 26.498284] ffff888102795200: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 26.499203] ffff888102795280: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 26.500055] >ffff888102795300: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 26.500746] ^ [ 26.501336] ffff888102795380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.502443] ffff888102795400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.503583] ================================================================== [ 26.504748] ================================================================== [ 26.505661] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40f/0xd50 [ 26.506293] Write of size 8 at addr ffff888102795348 by task kunit_try_catch/269 [ 26.507321] [ 26.507499] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 26.510061] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.510667] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.511860] Call Trace: [ 26.512089] <TASK> [ 26.512390] dump_stack_lvl+0x73/0xb0 [ 26.512923] print_report+0xd1/0x640 [ 26.513643] ? __virt_addr_valid+0x1db/0x2d0 [ 26.514242] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.514769] kasan_report+0x102/0x140 [ 26.516030] ? kasan_bitops_modify.constprop.0+0x40f/0xd50 [ 26.516676] ? kasan_bitops_modify.constprop.0+0x40f/0xd50 [ 26.517317] kasan_check_range+0x10c/0x1c0 [ 26.518418] __kasan_check_write+0x18/0x20 [ 26.519134] kasan_bitops_modify.constprop.0+0x40f/0xd50 [ 26.519680] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 26.520575] ? __kmalloc_cache_noprof+0x184/0x410 [ 26.521091] ? kasan_bitops_generic+0x93/0x1c0 [ 26.521993] kasan_bitops_generic+0x117/0x1c0 [ 26.522982] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 26.523456] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 26.524299] kunit_try_run_case+0x1b3/0x490 [ 26.524885] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.525818] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 26.526396] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.527716] ? __kthread_parkme+0x82/0x160 [ 26.528191] ? preempt_count_sub+0x50/0x80 [ 26.528812] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.529311] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.530201] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.531262] kthread+0x257/0x310 [ 26.531781] ? __pfx_kthread+0x10/0x10 [ 26.532250] ret_from_fork+0x41/0x80 [ 26.532698] ? __pfx_kthread+0x10/0x10 [ 26.533290] ret_from_fork_asm+0x1a/0x30 [ 26.533713] </TASK> [ 26.534216] [ 26.534500] Allocated by task 269: [ 26.534786] kasan_save_stack+0x3d/0x60 [ 26.536180] kasan_save_track+0x18/0x40 [ 26.536655] kasan_save_alloc_info+0x3b/0x50 [ 26.537470] __kasan_kmalloc+0xb7/0xc0 [ 26.537886] __kmalloc_cache_noprof+0x184/0x410 [ 26.538718] kasan_bitops_generic+0x93/0x1c0 [ 26.539185] kunit_try_run_case+0x1b3/0x490 [ 26.539487] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.540627] kthread+0x257/0x310 [ 26.541285] ret_from_fork+0x41/0x80 [ 26.541909] ret_from_fork_asm+0x1a/0x30 [ 26.542330] [ 26.542567] The buggy address belongs to the object at ffff888102795340 [ 26.542567] which belongs to the cache kmalloc-16 of size 16 [ 26.543938] The buggy address is located 8 bytes inside of [ 26.543938] allocated 9-byte region [ffff888102795340, ffff888102795349) [ 26.545944] [ 26.546122] The buggy address belongs to the physical page: [ 26.546776] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102795 [ 26.548087] flags: 0x200000000000000(node=0|zone=2) [ 26.548447] page_type: f5(slab) [ 26.549050] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 26.550501] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 26.551340] page dumped because: kasan: bad access detected [ 26.551941] [ 26.552196] Memory state around the buggy address: [ 26.552911] ffff888102795200: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 26.553373] ffff888102795280: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 26.554135] >ffff888102795300: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 26.555701] ^ [ 26.556496] ffff888102795380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.557307] ffff888102795400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.558259] ================================================================== [ 26.395566] ================================================================== [ 26.396007] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d6/0xd50 [ 26.398548] Write of size 8 at addr ffff888102795348 by task kunit_try_catch/269 [ 26.400078] [ 26.400525] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 26.401728] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.402137] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.403396] Call Trace: [ 26.403658] <TASK> [ 26.404230] dump_stack_lvl+0x73/0xb0 [ 26.404788] print_report+0xd1/0x640 [ 26.405294] ? __virt_addr_valid+0x1db/0x2d0 [ 26.405830] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.407039] kasan_report+0x102/0x140 [ 26.407672] ? kasan_bitops_modify.constprop.0+0x2d6/0xd50 [ 26.408823] ? kasan_bitops_modify.constprop.0+0x2d6/0xd50 [ 26.409484] kasan_check_range+0x10c/0x1c0 [ 26.410039] __kasan_check_write+0x18/0x20 [ 26.410691] kasan_bitops_modify.constprop.0+0x2d6/0xd50 [ 26.411523] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 26.412133] ? __kmalloc_cache_noprof+0x184/0x410 [ 26.413034] ? kasan_bitops_generic+0x93/0x1c0 [ 26.413381] kasan_bitops_generic+0x117/0x1c0 [ 26.414278] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 26.414721] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 26.415443] kunit_try_run_case+0x1b3/0x490 [ 26.416137] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.416959] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 26.417375] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.418454] ? __kthread_parkme+0x82/0x160 [ 26.418925] ? preempt_count_sub+0x50/0x80 [ 26.419340] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.420139] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.421128] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.422153] kthread+0x257/0x310 [ 26.422646] ? __pfx_kthread+0x10/0x10 [ 26.423093] ret_from_fork+0x41/0x80 [ 26.423712] ? __pfx_kthread+0x10/0x10 [ 26.424227] ret_from_fork_asm+0x1a/0x30 [ 26.424875] </TASK> [ 26.425296] [ 26.425796] Allocated by task 269: [ 26.426171] kasan_save_stack+0x3d/0x60 [ 26.426937] kasan_save_track+0x18/0x40 [ 26.427454] kasan_save_alloc_info+0x3b/0x50 [ 26.428159] __kasan_kmalloc+0xb7/0xc0 [ 26.429164] __kmalloc_cache_noprof+0x184/0x410 [ 26.429914] kasan_bitops_generic+0x93/0x1c0 [ 26.430437] kunit_try_run_case+0x1b3/0x490 [ 26.431191] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.431728] kthread+0x257/0x310 [ 26.432053] ret_from_fork+0x41/0x80 [ 26.432509] ret_from_fork_asm+0x1a/0x30 [ 26.433023] [ 26.433241] The buggy address belongs to the object at ffff888102795340 [ 26.433241] which belongs to the cache kmalloc-16 of size 16 [ 26.434269] The buggy address is located 8 bytes inside of [ 26.434269] allocated 9-byte region [ffff888102795340, ffff888102795349) [ 26.435873] [ 26.436070] The buggy address belongs to the physical page: [ 26.436448] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102795 [ 26.437834] flags: 0x200000000000000(node=0|zone=2) [ 26.438179] page_type: f5(slab) [ 26.439072] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 26.439792] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 26.440504] page dumped because: kasan: bad access detected [ 26.441396] [ 26.441544] Memory state around the buggy address: [ 26.442149] ffff888102795200: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 26.443417] ffff888102795280: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 26.443924] >ffff888102795300: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 26.444894] ^ [ 26.445573] ffff888102795380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.446183] ffff888102795400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.446898] ================================================================== [ 26.239743] ================================================================== [ 26.240788] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x102/0xd50 [ 26.241945] Write of size 8 at addr ffff888102795348 by task kunit_try_catch/269 [ 26.243171] [ 26.243988] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 26.245433] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.245943] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.247562] Call Trace: [ 26.247764] <TASK> [ 26.248138] dump_stack_lvl+0x73/0xb0 [ 26.249123] print_report+0xd1/0x640 [ 26.249989] ? __virt_addr_valid+0x1db/0x2d0 [ 26.251004] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.251616] kasan_report+0x102/0x140 [ 26.252232] ? kasan_bitops_modify.constprop.0+0x102/0xd50 [ 26.252942] ? kasan_bitops_modify.constprop.0+0x102/0xd50 [ 26.253425] kasan_check_range+0x10c/0x1c0 [ 26.254140] __kasan_check_write+0x18/0x20 [ 26.254622] kasan_bitops_modify.constprop.0+0x102/0xd50 [ 26.255172] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 26.255939] ? __kmalloc_cache_noprof+0x184/0x410 [ 26.256634] ? kasan_bitops_generic+0x93/0x1c0 [ 26.257001] kasan_bitops_generic+0x117/0x1c0 [ 26.257723] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 26.258526] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 26.258910] kunit_try_run_case+0x1b3/0x490 [ 26.259767] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.260247] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 26.260973] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.261806] ? __kthread_parkme+0x82/0x160 [ 26.262364] ? preempt_count_sub+0x50/0x80 [ 26.262967] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.263588] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.264291] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.265227] kthread+0x257/0x310 [ 26.265703] ? __pfx_kthread+0x10/0x10 [ 26.266104] ret_from_fork+0x41/0x80 [ 26.266634] ? __pfx_kthread+0x10/0x10 [ 26.267241] ret_from_fork_asm+0x1a/0x30 [ 26.267685] </TASK> [ 26.268160] [ 26.268514] Allocated by task 269: [ 26.268989] kasan_save_stack+0x3d/0x60 [ 26.269611] kasan_save_track+0x18/0x40 [ 26.270003] kasan_save_alloc_info+0x3b/0x50 [ 26.270766] __kasan_kmalloc+0xb7/0xc0 [ 26.271307] __kmalloc_cache_noprof+0x184/0x410 [ 26.271759] kasan_bitops_generic+0x93/0x1c0 [ 26.272512] kunit_try_run_case+0x1b3/0x490 [ 26.272939] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.273672] kthread+0x257/0x310 [ 26.274458] ret_from_fork+0x41/0x80 [ 26.274882] ret_from_fork_asm+0x1a/0x30 [ 26.275182] [ 26.275433] The buggy address belongs to the object at ffff888102795340 [ 26.275433] which belongs to the cache kmalloc-16 of size 16 [ 26.277461] The buggy address is located 8 bytes inside of [ 26.277461] allocated 9-byte region [ffff888102795340, ffff888102795349) [ 26.278693] [ 26.279147] The buggy address belongs to the physical page: [ 26.279667] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102795 [ 26.280353] flags: 0x200000000000000(node=0|zone=2) [ 26.280758] page_type: f5(slab) [ 26.281166] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 26.282793] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 26.283839] page dumped because: kasan: bad access detected [ 26.284815] [ 26.285577] Memory state around the buggy address: [ 26.286056] ffff888102795200: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 26.287180] ffff888102795280: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 26.288826] >ffff888102795300: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 26.289911] ^ [ 26.290287] ffff888102795380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.291363] ffff888102795400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.292169] ================================================================== [ 26.296001] ================================================================== [ 26.296959] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19d/0xd50 [ 26.298117] Write of size 8 at addr ffff888102795348 by task kunit_try_catch/269 [ 26.299051] [ 26.299911] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 26.302020] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.302802] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.303716] Call Trace: [ 26.303998] <TASK> [ 26.304295] dump_stack_lvl+0x73/0xb0 [ 26.305278] print_report+0xd1/0x640 [ 26.305966] ? __virt_addr_valid+0x1db/0x2d0 [ 26.306869] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.307557] kasan_report+0x102/0x140 [ 26.308338] ? kasan_bitops_modify.constprop.0+0x19d/0xd50 [ 26.309005] ? kasan_bitops_modify.constprop.0+0x19d/0xd50 [ 26.309921] kasan_check_range+0x10c/0x1c0 [ 26.310648] __kasan_check_write+0x18/0x20 [ 26.311257] kasan_bitops_modify.constprop.0+0x19d/0xd50 [ 26.312039] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 26.312904] ? __kmalloc_cache_noprof+0x184/0x410 [ 26.313127] ? kasan_bitops_generic+0x93/0x1c0 [ 26.313923] kasan_bitops_generic+0x117/0x1c0 [ 26.314395] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 26.314866] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 26.316016] kunit_try_run_case+0x1b3/0x490 [ 26.316475] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.316911] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 26.317370] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.317837] ? __kthread_parkme+0x82/0x160 [ 26.318773] ? preempt_count_sub+0x50/0x80 [ 26.319192] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.319795] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.320534] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.321008] kthread+0x257/0x310 [ 26.321515] ? __pfx_kthread+0x10/0x10 [ 26.321977] ret_from_fork+0x41/0x80 [ 26.322704] ? __pfx_kthread+0x10/0x10 [ 26.323102] ret_from_fork_asm+0x1a/0x30 [ 26.323809] </TASK> [ 26.324016] [ 26.324415] Allocated by task 269: [ 26.324876] kasan_save_stack+0x3d/0x60 [ 26.325521] kasan_save_track+0x18/0x40 [ 26.325892] kasan_save_alloc_info+0x3b/0x50 [ 26.326698] __kasan_kmalloc+0xb7/0xc0 [ 26.327136] __kmalloc_cache_noprof+0x184/0x410 [ 26.327691] kasan_bitops_generic+0x93/0x1c0 [ 26.328071] kunit_try_run_case+0x1b3/0x490 [ 26.328609] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.329199] kthread+0x257/0x310 [ 26.329537] ret_from_fork+0x41/0x80 [ 26.329848] ret_from_fork_asm+0x1a/0x30 [ 26.330134] [ 26.330771] The buggy address belongs to the object at ffff888102795340 [ 26.330771] which belongs to the cache kmalloc-16 of size 16 [ 26.332075] The buggy address is located 8 bytes inside of [ 26.332075] allocated 9-byte region [ffff888102795340, ffff888102795349) [ 26.333401] [ 26.333567] The buggy address belongs to the physical page: [ 26.334114] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102795 [ 26.335602] flags: 0x200000000000000(node=0|zone=2) [ 26.336195] page_type: f5(slab) [ 26.336667] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 26.337389] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 26.338059] page dumped because: kasan: bad access detected [ 26.338499] [ 26.338735] Memory state around the buggy address: [ 26.339142] ffff888102795200: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 26.340598] ffff888102795280: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 26.341453] >ffff888102795300: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 26.342105] ^ [ 26.342834] ffff888102795380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.343823] ffff888102795400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.344572] ==================================================================