Date
Dec. 4, 2024, 3:07 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 35.978257] ================================================================== [ 35.979314] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc8 [ 35.980359] Write of size 8 at addr fff00000c6153d88 by task kunit_try_catch/249 [ 35.981067] [ 35.981504] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 35.983044] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.983768] Hardware name: linux,dummy-virt (DT) [ 35.984459] Call trace: [ 35.984985] show_stack+0x20/0x38 (C) [ 35.985707] dump_stack_lvl+0x8c/0xd0 [ 35.986521] print_report+0x118/0x5e0 [ 35.987142] kasan_report+0xc8/0x118 [ 35.987793] kasan_check_range+0x100/0x1a8 [ 35.988477] __kasan_check_write+0x20/0x30 [ 35.989173] kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc8 [ 35.990063] kasan_bitops_generic+0x11c/0x1c8 [ 35.990788] kunit_try_run_case+0x14c/0x3d0 [ 35.991532] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.992372] kthread+0x24c/0x2d0 [ 35.992967] ret_from_fork+0x10/0x20 [ 35.993716] [ 35.994063] Allocated by task 249: [ 35.994716] kasan_save_stack+0x3c/0x68 [ 35.995430] kasan_save_track+0x20/0x40 [ 35.996092] kasan_save_alloc_info+0x40/0x58 [ 35.996824] __kasan_kmalloc+0xd4/0xd8 [ 35.997449] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.998080] kasan_bitops_generic+0xa0/0x1c8 [ 35.998820] kunit_try_run_case+0x14c/0x3d0 [ 35.999554] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.000350] kthread+0x24c/0x2d0 [ 36.000980] ret_from_fork+0x10/0x20 [ 36.001684] [ 36.002036] The buggy address belongs to the object at fff00000c6153d80 [ 36.002036] which belongs to the cache kmalloc-16 of size 16 [ 36.003655] The buggy address is located 8 bytes inside of [ 36.003655] allocated 9-byte region [fff00000c6153d80, fff00000c6153d89) [ 36.005185] [ 36.005650] The buggy address belongs to the physical page: [ 36.006359] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106153 [ 36.007527] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.008555] page_type: f5(slab) [ 36.009145] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 36.010172] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 36.011261] page dumped because: kasan: bad access detected [ 36.012001] [ 36.012347] Memory state around the buggy address: [ 36.013324] fff00000c6153c80: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 36.014311] fff00000c6153d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 36.015297] >fff00000c6153d80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.016361] ^ [ 36.016980] fff00000c6153e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.017974] fff00000c6153e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.018899] ================================================================== [ 36.183371] ================================================================== [ 36.184262] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa44/0xbc8 [ 36.185226] Read of size 8 at addr fff00000c6153d88 by task kunit_try_catch/249 [ 36.186244] [ 36.186709] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 36.187881] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.188532] Hardware name: linux,dummy-virt (DT) [ 36.189232] Call trace: [ 36.189648] show_stack+0x20/0x38 (C) [ 36.190228] dump_stack_lvl+0x8c/0xd0 [ 36.190893] print_report+0x118/0x5e0 [ 36.191413] kasan_report+0xc8/0x118 [ 36.192140] __asan_report_load8_noabort+0x20/0x30 [ 36.192814] kasan_bitops_test_and_modify.constprop.0+0xa44/0xbc8 [ 36.193683] kasan_bitops_generic+0x11c/0x1c8 [ 36.194278] kunit_try_run_case+0x14c/0x3d0 [ 36.195051] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.195819] kthread+0x24c/0x2d0 [ 36.196450] ret_from_fork+0x10/0x20 [ 36.197063] [ 36.197400] Allocated by task 249: [ 36.197922] kasan_save_stack+0x3c/0x68 [ 36.198458] kasan_save_track+0x20/0x40 [ 36.199167] kasan_save_alloc_info+0x40/0x58 [ 36.199802] __kasan_kmalloc+0xd4/0xd8 [ 36.200341] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.201111] kasan_bitops_generic+0xa0/0x1c8 [ 36.201744] kunit_try_run_case+0x14c/0x3d0 [ 36.202347] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.203092] kthread+0x24c/0x2d0 [ 36.203609] ret_from_fork+0x10/0x20 [ 36.204137] [ 36.204468] The buggy address belongs to the object at fff00000c6153d80 [ 36.204468] which belongs to the cache kmalloc-16 of size 16 [ 36.205914] The buggy address is located 8 bytes inside of [ 36.205914] allocated 9-byte region [fff00000c6153d80, fff00000c6153d89) [ 36.207381] [ 36.207803] The buggy address belongs to the physical page: [ 36.208500] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106153 [ 36.209457] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.210338] page_type: f5(slab) [ 36.210877] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 36.211814] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 36.212731] page dumped because: kasan: bad access detected [ 36.213455] [ 36.213844] Memory state around the buggy address: [ 36.214566] fff00000c6153c80: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 36.215400] fff00000c6153d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 36.216293] >fff00000c6153d80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.217169] ^ [ 36.217670] fff00000c6153e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.218662] fff00000c6153e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.219572] ================================================================== [ 36.222155] ================================================================== [ 36.223482] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa8c/0xbc8 [ 36.224206] Read of size 8 at addr fff00000c6153d88 by task kunit_try_catch/249 [ 36.224867] [ 36.225143] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 36.226695] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.227700] Hardware name: linux,dummy-virt (DT) [ 36.228450] Call trace: [ 36.228958] show_stack+0x20/0x38 (C) [ 36.229719] dump_stack_lvl+0x8c/0xd0 [ 36.230441] print_report+0x118/0x5e0 [ 36.231050] kasan_report+0xc8/0x118 [ 36.231585] __asan_report_load8_noabort+0x20/0x30 [ 36.232234] kasan_bitops_test_and_modify.constprop.0+0xa8c/0xbc8 [ 36.233342] kasan_bitops_generic+0x11c/0x1c8 [ 36.234128] kunit_try_run_case+0x14c/0x3d0 [ 36.234819] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.235585] kthread+0x24c/0x2d0 [ 36.236442] ret_from_fork+0x10/0x20 [ 36.237120] [ 36.237333] Allocated by task 249: [ 36.237597] kasan_save_stack+0x3c/0x68 [ 36.238197] kasan_save_track+0x20/0x40 [ 36.238931] kasan_save_alloc_info+0x40/0x58 [ 36.239831] __kasan_kmalloc+0xd4/0xd8 [ 36.240447] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.241240] kasan_bitops_generic+0xa0/0x1c8 [ 36.241929] kunit_try_run_case+0x14c/0x3d0 [ 36.242642] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.243436] kthread+0x24c/0x2d0 [ 36.244016] ret_from_fork+0x10/0x20 [ 36.244659] [ 36.245015] The buggy address belongs to the object at fff00000c6153d80 [ 36.245015] which belongs to the cache kmalloc-16 of size 16 [ 36.246650] The buggy address is located 8 bytes inside of [ 36.246650] allocated 9-byte region [fff00000c6153d80, fff00000c6153d89) [ 36.248221] [ 36.248713] The buggy address belongs to the physical page: [ 36.249405] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106153 [ 36.250561] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.251467] page_type: f5(slab) [ 36.251984] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 36.253053] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 36.254115] page dumped because: kasan: bad access detected [ 36.255004] [ 36.255520] Memory state around the buggy address: [ 36.256121] fff00000c6153c80: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 36.257094] fff00000c6153d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 36.257865] >fff00000c6153d80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.258922] ^ [ 36.259417] fff00000c6153e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.260249] fff00000c6153e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.261219] ================================================================== [ 35.888022] ================================================================== [ 35.889188] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc8 [ 35.891645] Write of size 8 at addr fff00000c6153d88 by task kunit_try_catch/249 [ 35.893231] [ 35.893552] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 35.895823] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.897361] Hardware name: linux,dummy-virt (DT) [ 35.898285] Call trace: [ 35.898870] show_stack+0x20/0x38 (C) [ 35.899496] dump_stack_lvl+0x8c/0xd0 [ 35.900091] print_report+0x118/0x5e0 [ 35.900675] kasan_report+0xc8/0x118 [ 35.901367] kasan_check_range+0x100/0x1a8 [ 35.902082] __kasan_check_write+0x20/0x30 [ 35.902415] kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc8 [ 35.903135] kasan_bitops_generic+0x11c/0x1c8 [ 35.904185] kunit_try_run_case+0x14c/0x3d0 [ 35.905062] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.906027] kthread+0x24c/0x2d0 [ 35.906718] ret_from_fork+0x10/0x20 [ 35.907347] [ 35.907731] Allocated by task 249: [ 35.908323] kasan_save_stack+0x3c/0x68 [ 35.909018] kasan_save_track+0x20/0x40 [ 35.909728] kasan_save_alloc_info+0x40/0x58 [ 35.910409] __kasan_kmalloc+0xd4/0xd8 [ 35.911060] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.911789] kasan_bitops_generic+0xa0/0x1c8 [ 35.912454] kunit_try_run_case+0x14c/0x3d0 [ 35.913094] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.913965] kthread+0x24c/0x2d0 [ 35.914545] ret_from_fork+0x10/0x20 [ 35.915173] [ 35.915658] The buggy address belongs to the object at fff00000c6153d80 [ 35.915658] which belongs to the cache kmalloc-16 of size 16 [ 35.917200] The buggy address is located 8 bytes inside of [ 35.917200] allocated 9-byte region [fff00000c6153d80, fff00000c6153d89) [ 35.918672] [ 35.919067] The buggy address belongs to the physical page: [ 35.919824] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106153 [ 35.920907] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.921919] page_type: f5(slab) [ 35.922519] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 35.923508] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 35.924473] page dumped because: kasan: bad access detected [ 35.924985] [ 35.925242] Memory state around the buggy address: [ 35.925922] fff00000c6153c80: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 35.926890] fff00000c6153d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 35.928018] >fff00000c6153d80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.929105] ^ [ 35.929743] fff00000c6153e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.930740] fff00000c6153e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.931793] ================================================================== [ 36.021213] ================================================================== [ 36.022175] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa50/0xbc8 [ 36.023360] Read of size 8 at addr fff00000c6153d88 by task kunit_try_catch/249 [ 36.024218] [ 36.024791] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 36.026147] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.026929] Hardware name: linux,dummy-virt (DT) [ 36.027655] Call trace: [ 36.028118] show_stack+0x20/0x38 (C) [ 36.028824] dump_stack_lvl+0x8c/0xd0 [ 36.029537] print_report+0x118/0x5e0 [ 36.030207] kasan_report+0xc8/0x118 [ 36.030858] __asan_report_load8_noabort+0x20/0x30 [ 36.031605] kasan_bitops_test_and_modify.constprop.0+0xa50/0xbc8 [ 36.032461] kasan_bitops_generic+0x11c/0x1c8 [ 36.033155] kunit_try_run_case+0x14c/0x3d0 [ 36.033858] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.034698] kthread+0x24c/0x2d0 [ 36.035327] ret_from_fork+0x10/0x20 [ 36.035980] [ 36.036364] Allocated by task 249: [ 36.037022] kasan_save_stack+0x3c/0x68 [ 36.037679] kasan_save_track+0x20/0x40 [ 36.038441] kasan_save_alloc_info+0x40/0x58 [ 36.039355] __kasan_kmalloc+0xd4/0xd8 [ 36.040041] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.040722] kasan_bitops_generic+0xa0/0x1c8 [ 36.041456] kunit_try_run_case+0x14c/0x3d0 [ 36.042230] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.043162] kthread+0x24c/0x2d0 [ 36.043830] ret_from_fork+0x10/0x20 [ 36.044413] [ 36.044823] The buggy address belongs to the object at fff00000c6153d80 [ 36.044823] which belongs to the cache kmalloc-16 of size 16 [ 36.046401] The buggy address is located 8 bytes inside of [ 36.046401] allocated 9-byte region [fff00000c6153d80, fff00000c6153d89) [ 36.047991] [ 36.048458] The buggy address belongs to the physical page: [ 36.049324] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106153 [ 36.050387] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.051211] page_type: f5(slab) [ 36.051692] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 36.052872] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 36.053829] page dumped because: kasan: bad access detected [ 36.054589] [ 36.055023] Memory state around the buggy address: [ 36.055704] fff00000c6153c80: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 36.056794] fff00000c6153d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 36.057762] >fff00000c6153d80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.058693] ^ [ 36.059387] fff00000c6153e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.060342] fff00000c6153e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.061261] ================================================================== [ 36.063457] ================================================================== [ 36.064359] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc8 [ 36.065380] Write of size 8 at addr fff00000c6153d88 by task kunit_try_catch/249 [ 36.066382] [ 36.066958] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 36.068363] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.068999] Hardware name: linux,dummy-virt (DT) [ 36.069767] Call trace: [ 36.070317] show_stack+0x20/0x38 (C) [ 36.070952] dump_stack_lvl+0x8c/0xd0 [ 36.071706] print_report+0x118/0x5e0 [ 36.072299] kasan_report+0xc8/0x118 [ 36.072882] kasan_check_range+0x100/0x1a8 [ 36.073476] __kasan_check_write+0x20/0x30 [ 36.074131] kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc8 [ 36.075226] kasan_bitops_generic+0x11c/0x1c8 [ 36.075589] kunit_try_run_case+0x14c/0x3d0 [ 36.076060] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.076951] kthread+0x24c/0x2d0 [ 36.077560] ret_from_fork+0x10/0x20 [ 36.078346] [ 36.078718] Allocated by task 249: [ 36.079563] kasan_save_stack+0x3c/0x68 [ 36.080235] kasan_save_track+0x20/0x40 [ 36.080763] kasan_save_alloc_info+0x40/0x58 [ 36.081383] __kasan_kmalloc+0xd4/0xd8 [ 36.081887] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.082750] kasan_bitops_generic+0xa0/0x1c8 [ 36.083344] kunit_try_run_case+0x14c/0x3d0 [ 36.084031] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.084744] kthread+0x24c/0x2d0 [ 36.085314] ret_from_fork+0x10/0x20 [ 36.085878] [ 36.086295] The buggy address belongs to the object at fff00000c6153d80 [ 36.086295] which belongs to the cache kmalloc-16 of size 16 [ 36.087708] The buggy address is located 8 bytes inside of [ 36.087708] allocated 9-byte region [fff00000c6153d80, fff00000c6153d89) [ 36.089130] [ 36.089495] The buggy address belongs to the physical page: [ 36.090375] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106153 [ 36.091274] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.092260] page_type: f5(slab) [ 36.092759] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 36.093780] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 36.094720] page dumped because: kasan: bad access detected [ 36.095357] [ 36.095751] Memory state around the buggy address: [ 36.096269] fff00000c6153c80: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 36.097256] fff00000c6153d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 36.098045] >fff00000c6153d80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.099002] ^ [ 36.099520] fff00000c6153e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.100377] fff00000c6153e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.101227] ================================================================== [ 35.934036] ================================================================== [ 35.934947] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa08/0xbc8 [ 35.936527] Read of size 8 at addr fff00000c6153d88 by task kunit_try_catch/249 [ 35.937483] [ 35.938008] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 35.939279] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.940038] Hardware name: linux,dummy-virt (DT) [ 35.940742] Call trace: [ 35.941193] show_stack+0x20/0x38 (C) [ 35.941923] dump_stack_lvl+0x8c/0xd0 [ 35.942564] print_report+0x118/0x5e0 [ 35.943258] kasan_report+0xc8/0x118 [ 35.943977] __asan_report_load8_noabort+0x20/0x30 [ 35.944731] kasan_bitops_test_and_modify.constprop.0+0xa08/0xbc8 [ 35.945655] kasan_bitops_generic+0x11c/0x1c8 [ 35.946350] kunit_try_run_case+0x14c/0x3d0 [ 35.947211] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.948025] kthread+0x24c/0x2d0 [ 35.948655] ret_from_fork+0x10/0x20 [ 35.949306] [ 35.949678] Allocated by task 249: [ 35.950409] kasan_save_stack+0x3c/0x68 [ 35.951102] kasan_save_track+0x20/0x40 [ 35.951837] kasan_save_alloc_info+0x40/0x58 [ 35.952646] __kasan_kmalloc+0xd4/0xd8 [ 35.953290] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.954131] kasan_bitops_generic+0xa0/0x1c8 [ 35.954895] kunit_try_run_case+0x14c/0x3d0 [ 35.955568] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.956378] kthread+0x24c/0x2d0 [ 35.956981] ret_from_fork+0x10/0x20 [ 35.957616] [ 35.958052] The buggy address belongs to the object at fff00000c6153d80 [ 35.958052] which belongs to the cache kmalloc-16 of size 16 [ 35.959619] The buggy address is located 8 bytes inside of [ 35.959619] allocated 9-byte region [fff00000c6153d80, fff00000c6153d89) [ 35.961116] [ 35.961555] The buggy address belongs to the physical page: [ 35.962356] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106153 [ 35.963474] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.964430] page_type: f5(slab) [ 35.965011] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 35.966101] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 35.967136] page dumped because: kasan: bad access detected [ 35.967923] [ 35.968388] Memory state around the buggy address: [ 35.969125] fff00000c6153c80: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 35.970186] fff00000c6153d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 35.971313] >fff00000c6153d80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.972253] ^ [ 35.972867] fff00000c6153e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.973819] fff00000c6153e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.974821] ================================================================== [ 36.143036] ================================================================== [ 36.143787] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x334/0xbc8 [ 36.145386] Write of size 8 at addr fff00000c6153d88 by task kunit_try_catch/249 [ 36.146426] [ 36.146885] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 36.148220] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.148825] Hardware name: linux,dummy-virt (DT) [ 36.149579] Call trace: [ 36.149958] show_stack+0x20/0x38 (C) [ 36.150694] dump_stack_lvl+0x8c/0xd0 [ 36.151387] print_report+0x118/0x5e0 [ 36.152012] kasan_report+0xc8/0x118 [ 36.152613] kasan_check_range+0x100/0x1a8 [ 36.153189] __kasan_check_write+0x20/0x30 [ 36.153929] kasan_bitops_test_and_modify.constprop.0+0x334/0xbc8 [ 36.154790] kasan_bitops_generic+0x11c/0x1c8 [ 36.155446] kunit_try_run_case+0x14c/0x3d0 [ 36.156141] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.156941] kthread+0x24c/0x2d0 [ 36.157590] ret_from_fork+0x10/0x20 [ 36.158194] [ 36.158524] Allocated by task 249: [ 36.159021] kasan_save_stack+0x3c/0x68 [ 36.159737] kasan_save_track+0x20/0x40 [ 36.160233] kasan_save_alloc_info+0x40/0x58 [ 36.160951] __kasan_kmalloc+0xd4/0xd8 [ 36.161459] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.162215] kasan_bitops_generic+0xa0/0x1c8 [ 36.162829] kunit_try_run_case+0x14c/0x3d0 [ 36.163436] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.164329] kthread+0x24c/0x2d0 [ 36.164914] ret_from_fork+0x10/0x20 [ 36.165466] [ 36.165843] The buggy address belongs to the object at fff00000c6153d80 [ 36.165843] which belongs to the cache kmalloc-16 of size 16 [ 36.167184] The buggy address is located 8 bytes inside of [ 36.167184] allocated 9-byte region [fff00000c6153d80, fff00000c6153d89) [ 36.168733] [ 36.169047] The buggy address belongs to the physical page: [ 36.170007] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106153 [ 36.170973] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.171867] page_type: f5(slab) [ 36.172338] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 36.173401] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 36.174329] page dumped because: kasan: bad access detected [ 36.175025] [ 36.175424] Memory state around the buggy address: [ 36.176097] fff00000c6153c80: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 36.176999] fff00000c6153d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 36.177865] >fff00000c6153d80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.178681] ^ [ 36.179264] fff00000c6153e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.180200] fff00000c6153e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.181189] ================================================================== [ 36.103274] ================================================================== [ 36.104008] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xad4/0xbc8 [ 36.105602] Read of size 8 at addr fff00000c6153d88 by task kunit_try_catch/249 [ 36.106587] [ 36.106936] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 36.108686] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.109202] Hardware name: linux,dummy-virt (DT) [ 36.110468] Call trace: [ 36.111084] show_stack+0x20/0x38 (C) [ 36.111729] dump_stack_lvl+0x8c/0xd0 [ 36.112277] print_report+0x118/0x5e0 [ 36.112921] kasan_report+0xc8/0x118 [ 36.113405] __asan_report_load8_noabort+0x20/0x30 [ 36.114219] kasan_bitops_test_and_modify.constprop.0+0xad4/0xbc8 [ 36.115111] kasan_bitops_generic+0x11c/0x1c8 [ 36.115867] kunit_try_run_case+0x14c/0x3d0 [ 36.116414] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.117200] kthread+0x24c/0x2d0 [ 36.117853] ret_from_fork+0x10/0x20 [ 36.118528] [ 36.118849] Allocated by task 249: [ 36.119455] kasan_save_stack+0x3c/0x68 [ 36.119966] kasan_save_track+0x20/0x40 [ 36.120659] kasan_save_alloc_info+0x40/0x58 [ 36.121295] __kasan_kmalloc+0xd4/0xd8 [ 36.121938] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.122712] kasan_bitops_generic+0xa0/0x1c8 [ 36.123359] kunit_try_run_case+0x14c/0x3d0 [ 36.123933] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.124744] kthread+0x24c/0x2d0 [ 36.125240] ret_from_fork+0x10/0x20 [ 36.125814] [ 36.126222] The buggy address belongs to the object at fff00000c6153d80 [ 36.126222] which belongs to the cache kmalloc-16 of size 16 [ 36.127683] The buggy address is located 8 bytes inside of [ 36.127683] allocated 9-byte region [fff00000c6153d80, fff00000c6153d89) [ 36.129130] [ 36.129461] The buggy address belongs to the physical page: [ 36.130127] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106153 [ 36.131130] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.132076] page_type: f5(slab) [ 36.132557] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 36.133521] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 36.134655] page dumped because: kasan: bad access detected [ 36.135390] [ 36.135747] Memory state around the buggy address: [ 36.136429] fff00000c6153c80: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 36.137315] fff00000c6153d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 36.138134] >fff00000c6153d80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.139148] ^ [ 36.139683] fff00000c6153e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.140593] fff00000c6153e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.141607] ==================================================================
[ 26.943249] ================================================================== [ 26.944093] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90 [ 26.944848] Write of size 8 at addr ffff888102795348 by task kunit_try_catch/269 [ 26.946203] [ 26.947542] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 26.948720] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.949302] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.950099] Call Trace: [ 26.950391] <TASK> [ 26.950708] dump_stack_lvl+0x73/0xb0 [ 26.951134] print_report+0xd1/0x640 [ 26.951437] ? __virt_addr_valid+0x1db/0x2d0 [ 26.952115] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.953159] kasan_report+0x102/0x140 [ 26.954443] ? kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90 [ 26.955177] ? kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90 [ 26.956537] kasan_check_range+0x10c/0x1c0 [ 26.957426] __kasan_check_write+0x18/0x20 [ 26.957723] kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90 [ 26.958254] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 26.958936] ? __kmalloc_cache_noprof+0x184/0x410 [ 26.959526] ? kasan_bitops_generic+0x93/0x1c0 [ 26.960020] kasan_bitops_generic+0x122/0x1c0 [ 26.960685] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 26.961215] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 26.961943] kunit_try_run_case+0x1b3/0x490 [ 26.962530] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.963051] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 26.963700] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.964231] ? __kthread_parkme+0x82/0x160 [ 26.964718] ? preempt_count_sub+0x50/0x80 [ 26.965153] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.965708] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.966301] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.966996] kthread+0x257/0x310 [ 26.967418] ? __pfx_kthread+0x10/0x10 [ 26.967693] ret_from_fork+0x41/0x80 [ 26.968283] ? __pfx_kthread+0x10/0x10 [ 26.968849] ret_from_fork_asm+0x1a/0x30 [ 26.969201] </TASK> [ 26.969625] [ 26.969895] Allocated by task 269: [ 26.970327] kasan_save_stack+0x3d/0x60 [ 26.970617] kasan_save_track+0x18/0x40 [ 26.971207] kasan_save_alloc_info+0x3b/0x50 [ 26.971730] __kasan_kmalloc+0xb7/0xc0 [ 26.972258] __kmalloc_cache_noprof+0x184/0x410 [ 26.972907] kasan_bitops_generic+0x93/0x1c0 [ 26.973493] kunit_try_run_case+0x1b3/0x490 [ 26.974115] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.974484] kthread+0x257/0x310 [ 26.974918] ret_from_fork+0x41/0x80 [ 26.975366] ret_from_fork_asm+0x1a/0x30 [ 26.975699] [ 26.975984] The buggy address belongs to the object at ffff888102795340 [ 26.975984] which belongs to the cache kmalloc-16 of size 16 [ 26.977098] The buggy address is located 8 bytes inside of [ 26.977098] allocated 9-byte region [ffff888102795340, ffff888102795349) [ 26.978183] [ 26.978400] The buggy address belongs to the physical page: [ 26.979218] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102795 [ 26.979861] flags: 0x200000000000000(node=0|zone=2) [ 26.980462] page_type: f5(slab) [ 26.980716] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 26.981754] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 26.982591] page dumped because: kasan: bad access detected [ 26.983165] [ 26.983346] Memory state around the buggy address: [ 26.983656] ffff888102795200: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 26.984756] ffff888102795280: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 26.985586] >ffff888102795300: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 26.986403] ^ [ 26.987066] ffff888102795380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.987677] ffff888102795400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.988370] ================================================================== [ 26.752963] ================================================================== [ 26.753530] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90 [ 26.754879] Write of size 8 at addr ffff888102795348 by task kunit_try_catch/269 [ 26.756369] [ 26.756586] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 26.757631] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.758195] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.759173] Call Trace: [ 26.759418] <TASK> [ 26.759760] dump_stack_lvl+0x73/0xb0 [ 26.760090] print_report+0xd1/0x640 [ 26.760392] ? __virt_addr_valid+0x1db/0x2d0 [ 26.760972] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.761579] kasan_report+0x102/0x140 [ 26.762016] ? kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90 [ 26.762590] ? kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90 [ 26.763191] kasan_check_range+0x10c/0x1c0 [ 26.763614] __kasan_check_write+0x18/0x20 [ 26.764135] kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90 [ 26.764590] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 26.765341] ? __kmalloc_cache_noprof+0x184/0x410 [ 26.765823] ? kasan_bitops_generic+0x93/0x1c0 [ 26.766287] kasan_bitops_generic+0x122/0x1c0 [ 26.766611] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 26.767208] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 26.767866] kunit_try_run_case+0x1b3/0x490 [ 26.768409] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.768817] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 26.769381] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.769804] ? __kthread_parkme+0x82/0x160 [ 26.770138] ? preempt_count_sub+0x50/0x80 [ 26.770732] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.771238] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.771835] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.772336] kthread+0x257/0x310 [ 26.772598] ? __pfx_kthread+0x10/0x10 [ 26.773107] ret_from_fork+0x41/0x80 [ 26.773617] ? __pfx_kthread+0x10/0x10 [ 26.774132] ret_from_fork_asm+0x1a/0x30 [ 26.774586] </TASK> [ 26.774901] [ 26.775070] Allocated by task 269: [ 26.775345] kasan_save_stack+0x3d/0x60 [ 26.775746] kasan_save_track+0x18/0x40 [ 26.776193] kasan_save_alloc_info+0x3b/0x50 [ 26.776766] __kasan_kmalloc+0xb7/0xc0 [ 26.777178] __kmalloc_cache_noprof+0x184/0x410 [ 26.777525] kasan_bitops_generic+0x93/0x1c0 [ 26.777914] kunit_try_run_case+0x1b3/0x490 [ 26.778416] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.779079] kthread+0x257/0x310 [ 26.779511] ret_from_fork+0x41/0x80 [ 26.779841] ret_from_fork_asm+0x1a/0x30 [ 26.780355] [ 26.780617] The buggy address belongs to the object at ffff888102795340 [ 26.780617] which belongs to the cache kmalloc-16 of size 16 [ 26.781530] The buggy address is located 8 bytes inside of [ 26.781530] allocated 9-byte region [ffff888102795340, ffff888102795349) [ 26.782553] [ 26.782779] The buggy address belongs to the physical page: [ 26.783410] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102795 [ 26.783969] flags: 0x200000000000000(node=0|zone=2) [ 26.784550] page_type: f5(slab) [ 26.785002] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 26.785726] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 26.786160] page dumped because: kasan: bad access detected [ 26.787717] [ 26.788103] Memory state around the buggy address: [ 26.788519] ffff888102795200: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 26.789583] ffff888102795280: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 26.790518] >ffff888102795300: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 26.790976] ^ [ 26.791889] ffff888102795380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.792775] ffff888102795400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.793468] ================================================================== [ 26.842051] ================================================================== [ 26.842752] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90 [ 26.843296] Write of size 8 at addr ffff888102795348 by task kunit_try_catch/269 [ 26.844293] [ 26.844517] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 26.845207] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.845914] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.846572] Call Trace: [ 26.846789] <TASK> [ 26.846986] dump_stack_lvl+0x73/0xb0 [ 26.847302] print_report+0xd1/0x640 [ 26.847788] ? __virt_addr_valid+0x1db/0x2d0 [ 26.848393] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.850098] kasan_report+0x102/0x140 [ 26.851915] ? kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90 [ 26.852621] ? kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90 [ 26.853407] kasan_check_range+0x10c/0x1c0 [ 26.854102] __kasan_check_write+0x18/0x20 [ 26.854598] kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90 [ 26.855317] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 26.856071] ? __kmalloc_cache_noprof+0x184/0x410 [ 26.856355] ? kasan_bitops_generic+0x93/0x1c0 [ 26.857038] kasan_bitops_generic+0x122/0x1c0 [ 26.857738] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 26.858308] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 26.858954] kunit_try_run_case+0x1b3/0x490 [ 26.859614] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.860360] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 26.861288] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.861729] ? __kthread_parkme+0x82/0x160 [ 26.862108] ? preempt_count_sub+0x50/0x80 [ 26.862543] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.863192] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.864593] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.865099] kthread+0x257/0x310 [ 26.865363] ? __pfx_kthread+0x10/0x10 [ 26.865608] ret_from_fork+0x41/0x80 [ 26.866271] ? __pfx_kthread+0x10/0x10 [ 26.866801] ret_from_fork_asm+0x1a/0x30 [ 26.867784] </TASK> [ 26.868121] [ 26.868817] Allocated by task 269: [ 26.869165] kasan_save_stack+0x3d/0x60 [ 26.869675] kasan_save_track+0x18/0x40 [ 26.870284] kasan_save_alloc_info+0x3b/0x50 [ 26.870962] __kasan_kmalloc+0xb7/0xc0 [ 26.871637] __kmalloc_cache_noprof+0x184/0x410 [ 26.872332] kasan_bitops_generic+0x93/0x1c0 [ 26.872662] kunit_try_run_case+0x1b3/0x490 [ 26.873279] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.874207] kthread+0x257/0x310 [ 26.874604] ret_from_fork+0x41/0x80 [ 26.875065] ret_from_fork_asm+0x1a/0x30 [ 26.875806] [ 26.876022] The buggy address belongs to the object at ffff888102795340 [ 26.876022] which belongs to the cache kmalloc-16 of size 16 [ 26.877206] The buggy address is located 8 bytes inside of [ 26.877206] allocated 9-byte region [ffff888102795340, ffff888102795349) [ 26.878606] [ 26.878999] The buggy address belongs to the physical page: [ 26.879745] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102795 [ 26.880853] flags: 0x200000000000000(node=0|zone=2) [ 26.881293] page_type: f5(slab) [ 26.881746] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 26.882599] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 26.883198] page dumped because: kasan: bad access detected [ 26.884079] [ 26.884293] Memory state around the buggy address: [ 26.884676] ffff888102795200: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 26.885523] ffff888102795280: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 26.886573] >ffff888102795300: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 26.887432] ^ [ 26.888030] ffff888102795380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.888943] ffff888102795400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.889775] ================================================================== [ 26.707102] ================================================================== [ 26.708605] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90 [ 26.709539] Write of size 8 at addr ffff888102795348 by task kunit_try_catch/269 [ 26.710162] [ 26.710463] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 26.711583] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.712001] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.712966] Call Trace: [ 26.713207] <TASK> [ 26.713627] dump_stack_lvl+0x73/0xb0 [ 26.714021] print_report+0xd1/0x640 [ 26.714538] ? __virt_addr_valid+0x1db/0x2d0 [ 26.715091] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.715877] kasan_report+0x102/0x140 [ 26.716180] ? kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90 [ 26.716866] ? kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90 [ 26.717685] kasan_check_range+0x10c/0x1c0 [ 26.718142] __kasan_check_write+0x18/0x20 [ 26.718615] kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90 [ 26.719082] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 26.719975] ? __kmalloc_cache_noprof+0x184/0x410 [ 26.720411] ? kasan_bitops_generic+0x93/0x1c0 [ 26.720975] kasan_bitops_generic+0x122/0x1c0 [ 26.721430] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 26.721913] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 26.722566] kunit_try_run_case+0x1b3/0x490 [ 26.722911] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.723543] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 26.724025] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.724649] ? __kthread_parkme+0x82/0x160 [ 26.725334] ? preempt_count_sub+0x50/0x80 [ 26.725888] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.726379] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.726925] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.727852] kthread+0x257/0x310 [ 26.728156] ? __pfx_kthread+0x10/0x10 [ 26.728784] ret_from_fork+0x41/0x80 [ 26.729148] ? __pfx_kthread+0x10/0x10 [ 26.730037] ret_from_fork_asm+0x1a/0x30 [ 26.730551] </TASK> [ 26.730843] [ 26.731278] Allocated by task 269: [ 26.731883] kasan_save_stack+0x3d/0x60 [ 26.732439] kasan_save_track+0x18/0x40 [ 26.732897] kasan_save_alloc_info+0x3b/0x50 [ 26.733581] __kasan_kmalloc+0xb7/0xc0 [ 26.734111] __kmalloc_cache_noprof+0x184/0x410 [ 26.734750] kasan_bitops_generic+0x93/0x1c0 [ 26.735301] kunit_try_run_case+0x1b3/0x490 [ 26.735906] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.736483] kthread+0x257/0x310 [ 26.737025] ret_from_fork+0x41/0x80 [ 26.737530] ret_from_fork_asm+0x1a/0x30 [ 26.738033] [ 26.738367] The buggy address belongs to the object at ffff888102795340 [ 26.738367] which belongs to the cache kmalloc-16 of size 16 [ 26.739641] The buggy address is located 8 bytes inside of [ 26.739641] allocated 9-byte region [ffff888102795340, ffff888102795349) [ 26.740943] [ 26.741122] The buggy address belongs to the physical page: [ 26.741863] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102795 [ 26.742575] flags: 0x200000000000000(node=0|zone=2) [ 26.743102] page_type: f5(slab) [ 26.743638] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 26.744435] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 26.745279] page dumped because: kasan: bad access detected [ 26.745920] [ 26.746123] Memory state around the buggy address: [ 26.746915] ffff888102795200: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 26.747732] ffff888102795280: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 26.748432] >ffff888102795300: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 26.749466] ^ [ 26.749915] ffff888102795380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.750805] ffff888102795400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.751649] ================================================================== [ 26.661448] ================================================================== [ 26.663122] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x102/0xd90 [ 26.664025] Write of size 8 at addr ffff888102795348 by task kunit_try_catch/269 [ 26.664907] [ 26.665144] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 26.666407] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.667110] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.668430] Call Trace: [ 26.668969] <TASK> [ 26.669197] dump_stack_lvl+0x73/0xb0 [ 26.669785] print_report+0xd1/0x640 [ 26.670184] ? __virt_addr_valid+0x1db/0x2d0 [ 26.670740] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.671277] kasan_report+0x102/0x140 [ 26.671842] ? kasan_bitops_test_and_modify.constprop.0+0x102/0xd90 [ 26.672497] ? kasan_bitops_test_and_modify.constprop.0+0x102/0xd90 [ 26.673061] kasan_check_range+0x10c/0x1c0 [ 26.673489] __kasan_check_write+0x18/0x20 [ 26.673941] kasan_bitops_test_and_modify.constprop.0+0x102/0xd90 [ 26.674602] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 26.675351] ? __kmalloc_cache_noprof+0x184/0x410 [ 26.675765] ? kasan_bitops_generic+0x93/0x1c0 [ 26.676401] kasan_bitops_generic+0x122/0x1c0 [ 26.676762] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 26.677598] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 26.678063] kunit_try_run_case+0x1b3/0x490 [ 26.678785] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.679303] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 26.679759] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.680254] ? __kthread_parkme+0x82/0x160 [ 26.680999] ? preempt_count_sub+0x50/0x80 [ 26.681420] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.682115] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.682783] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.683205] kthread+0x257/0x310 [ 26.683610] ? __pfx_kthread+0x10/0x10 [ 26.684198] ret_from_fork+0x41/0x80 [ 26.684752] ? __pfx_kthread+0x10/0x10 [ 26.685160] ret_from_fork_asm+0x1a/0x30 [ 26.685695] </TASK> [ 26.686127] [ 26.686440] Allocated by task 269: [ 26.686685] kasan_save_stack+0x3d/0x60 [ 26.687206] kasan_save_track+0x18/0x40 [ 26.687855] kasan_save_alloc_info+0x3b/0x50 [ 26.688356] __kasan_kmalloc+0xb7/0xc0 [ 26.688960] __kmalloc_cache_noprof+0x184/0x410 [ 26.689811] kasan_bitops_generic+0x93/0x1c0 [ 26.690210] kunit_try_run_case+0x1b3/0x490 [ 26.690868] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.691304] kthread+0x257/0x310 [ 26.691767] ret_from_fork+0x41/0x80 [ 26.692180] ret_from_fork_asm+0x1a/0x30 [ 26.692736] [ 26.692985] The buggy address belongs to the object at ffff888102795340 [ 26.692985] which belongs to the cache kmalloc-16 of size 16 [ 26.695295] The buggy address is located 8 bytes inside of [ 26.695295] allocated 9-byte region [ffff888102795340, ffff888102795349) [ 26.696355] [ 26.696667] The buggy address belongs to the physical page: [ 26.697190] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102795 [ 26.697905] flags: 0x200000000000000(node=0|zone=2) [ 26.698376] page_type: f5(slab) [ 26.698896] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 26.699559] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 26.700338] page dumped because: kasan: bad access detected [ 26.700894] [ 26.701140] Memory state around the buggy address: [ 26.701606] ffff888102795200: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 26.702236] ffff888102795280: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 26.703055] >ffff888102795300: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 26.703612] ^ [ 26.704124] ffff888102795380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.705067] ffff888102795400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.705619] ================================================================== [ 26.795564] ================================================================== [ 26.797004] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90 [ 26.798276] Write of size 8 at addr ffff888102795348 by task kunit_try_catch/269 [ 26.799176] [ 26.799354] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 26.801103] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.801535] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.802802] Call Trace: [ 26.803427] <TASK> [ 26.803951] dump_stack_lvl+0x73/0xb0 [ 26.804597] print_report+0xd1/0x640 [ 26.805441] ? __virt_addr_valid+0x1db/0x2d0 [ 26.805847] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.806414] kasan_report+0x102/0x140 [ 26.807225] ? kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90 [ 26.807817] ? kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90 [ 26.808670] kasan_check_range+0x10c/0x1c0 [ 26.809148] __kasan_check_write+0x18/0x20 [ 26.809898] kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90 [ 26.810695] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 26.811375] ? __kmalloc_cache_noprof+0x184/0x410 [ 26.812123] ? kasan_bitops_generic+0x93/0x1c0 [ 26.812775] kasan_bitops_generic+0x122/0x1c0 [ 26.813485] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 26.814423] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 26.814862] kunit_try_run_case+0x1b3/0x490 [ 26.815336] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.816188] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 26.816643] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.817400] ? __kthread_parkme+0x82/0x160 [ 26.818034] ? preempt_count_sub+0x50/0x80 [ 26.818435] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.818950] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.819613] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.820190] kthread+0x257/0x310 [ 26.820568] ? __pfx_kthread+0x10/0x10 [ 26.820994] ret_from_fork+0x41/0x80 [ 26.821547] ? __pfx_kthread+0x10/0x10 [ 26.822237] ret_from_fork_asm+0x1a/0x30 [ 26.822699] </TASK> [ 26.823088] [ 26.823321] Allocated by task 269: [ 26.823786] kasan_save_stack+0x3d/0x60 [ 26.824224] kasan_save_track+0x18/0x40 [ 26.824555] kasan_save_alloc_info+0x3b/0x50 [ 26.825391] __kasan_kmalloc+0xb7/0xc0 [ 26.825735] __kmalloc_cache_noprof+0x184/0x410 [ 26.826824] kasan_bitops_generic+0x93/0x1c0 [ 26.827352] kunit_try_run_case+0x1b3/0x490 [ 26.827658] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.828392] kthread+0x257/0x310 [ 26.829025] ret_from_fork+0x41/0x80 [ 26.829870] ret_from_fork_asm+0x1a/0x30 [ 26.830172] [ 26.830443] The buggy address belongs to the object at ffff888102795340 [ 26.830443] which belongs to the cache kmalloc-16 of size 16 [ 26.831386] The buggy address is located 8 bytes inside of [ 26.831386] allocated 9-byte region [ffff888102795340, ffff888102795349) [ 26.832409] [ 26.832686] The buggy address belongs to the physical page: [ 26.833335] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102795 [ 26.834016] flags: 0x200000000000000(node=0|zone=2) [ 26.834418] page_type: f5(slab) [ 26.834826] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 26.835384] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 26.836161] page dumped because: kasan: bad access detected [ 26.836613] [ 26.836839] Memory state around the buggy address: [ 26.837147] ffff888102795200: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 26.837789] ffff888102795280: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 26.838422] >ffff888102795300: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 26.839087] ^ [ 26.839553] ffff888102795380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.839972] ffff888102795400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.840735] ================================================================== [ 26.989548] ================================================================== [ 26.990629] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x558/0xd90 [ 26.991171] Read of size 8 at addr ffff888102795348 by task kunit_try_catch/269 [ 26.992054] [ 26.992372] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 26.992973] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.993262] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.994349] Call Trace: [ 26.994714] <TASK> [ 26.994997] dump_stack_lvl+0x73/0xb0 [ 26.995561] print_report+0xd1/0x640 [ 26.996168] ? __virt_addr_valid+0x1db/0x2d0 [ 26.996659] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.997199] kasan_report+0x102/0x140 [ 26.997642] ? kasan_bitops_test_and_modify.constprop.0+0x558/0xd90 [ 26.998335] ? kasan_bitops_test_and_modify.constprop.0+0x558/0xd90 [ 26.999093] kasan_check_range+0x10c/0x1c0 [ 26.999587] __kasan_check_read+0x15/0x20 [ 27.000014] kasan_bitops_test_and_modify.constprop.0+0x558/0xd90 [ 27.000658] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 27.001417] ? __kmalloc_cache_noprof+0x184/0x410 [ 27.001861] ? kasan_bitops_generic+0x93/0x1c0 [ 27.002488] kasan_bitops_generic+0x122/0x1c0 [ 27.003047] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 27.003570] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 27.004378] kunit_try_run_case+0x1b3/0x490 [ 27.004739] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.005164] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 27.005916] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.006303] ? __kthread_parkme+0x82/0x160 [ 27.006791] ? preempt_count_sub+0x50/0x80 [ 27.007201] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.007713] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.008492] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.009288] kthread+0x257/0x310 [ 27.009652] ? __pfx_kthread+0x10/0x10 [ 27.010149] ret_from_fork+0x41/0x80 [ 27.010579] ? __pfx_kthread+0x10/0x10 [ 27.010942] ret_from_fork_asm+0x1a/0x30 [ 27.011477] </TASK> [ 27.011836] [ 27.012183] Allocated by task 269: [ 27.012528] kasan_save_stack+0x3d/0x60 [ 27.012967] kasan_save_track+0x18/0x40 [ 27.013457] kasan_save_alloc_info+0x3b/0x50 [ 27.013757] __kasan_kmalloc+0xb7/0xc0 [ 27.014340] __kmalloc_cache_noprof+0x184/0x410 [ 27.015079] kasan_bitops_generic+0x93/0x1c0 [ 27.015544] kunit_try_run_case+0x1b3/0x490 [ 27.015968] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.016497] kthread+0x257/0x310 [ 27.016748] ret_from_fork+0x41/0x80 [ 27.017228] ret_from_fork_asm+0x1a/0x30 [ 27.017562] [ 27.017717] The buggy address belongs to the object at ffff888102795340 [ 27.017717] which belongs to the cache kmalloc-16 of size 16 [ 27.019174] The buggy address is located 8 bytes inside of [ 27.019174] allocated 9-byte region [ffff888102795340, ffff888102795349) [ 27.020379] [ 27.020610] The buggy address belongs to the physical page: [ 27.021497] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102795 [ 27.021946] flags: 0x200000000000000(node=0|zone=2) [ 27.022287] page_type: f5(slab) [ 27.022715] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 27.023576] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 27.024632] page dumped because: kasan: bad access detected [ 27.025349] [ 27.025525] Memory state around the buggy address: [ 27.026025] ffff888102795200: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 27.026598] ffff888102795280: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.027395] >ffff888102795300: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 27.028096] ^ [ 27.028454] ffff888102795380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.028855] ffff888102795400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.029801] ================================================================== [ 27.031495] ================================================================== [ 27.032066] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90 [ 27.033385] Read of size 8 at addr ffff888102795348 by task kunit_try_catch/269 [ 27.034303] [ 27.034498] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 27.035389] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.035906] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.036576] Call Trace: [ 27.036777] <TASK> [ 27.037115] dump_stack_lvl+0x73/0xb0 [ 27.037862] print_report+0xd1/0x640 [ 27.038343] ? __virt_addr_valid+0x1db/0x2d0 [ 27.038662] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.039029] kasan_report+0x102/0x140 [ 27.039585] ? kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90 [ 27.040406] ? kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90 [ 27.041305] __asan_report_load8_noabort+0x18/0x20 [ 27.041831] kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90 [ 27.042392] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 27.043003] ? __kmalloc_cache_noprof+0x184/0x410 [ 27.043423] ? kasan_bitops_generic+0x93/0x1c0 [ 27.043863] kasan_bitops_generic+0x122/0x1c0 [ 27.044182] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 27.044681] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 27.045552] kunit_try_run_case+0x1b3/0x490 [ 27.046322] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.046666] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 27.047311] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.047916] ? __kthread_parkme+0x82/0x160 [ 27.048321] ? preempt_count_sub+0x50/0x80 [ 27.048895] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.049220] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.050023] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.050626] kthread+0x257/0x310 [ 27.050984] ? __pfx_kthread+0x10/0x10 [ 27.051466] ret_from_fork+0x41/0x80 [ 27.051832] ? __pfx_kthread+0x10/0x10 [ 27.052569] ret_from_fork_asm+0x1a/0x30 [ 27.052886] </TASK> [ 27.053078] [ 27.053238] Allocated by task 269: [ 27.054035] kasan_save_stack+0x3d/0x60 [ 27.054711] kasan_save_track+0x18/0x40 [ 27.055441] kasan_save_alloc_info+0x3b/0x50 [ 27.056306] __kasan_kmalloc+0xb7/0xc0 [ 27.057044] __kmalloc_cache_noprof+0x184/0x410 [ 27.057640] kasan_bitops_generic+0x93/0x1c0 [ 27.058162] kunit_try_run_case+0x1b3/0x490 [ 27.058593] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.059144] kthread+0x257/0x310 [ 27.059629] ret_from_fork+0x41/0x80 [ 27.060159] ret_from_fork_asm+0x1a/0x30 [ 27.060616] [ 27.060964] The buggy address belongs to the object at ffff888102795340 [ 27.060964] which belongs to the cache kmalloc-16 of size 16 [ 27.062092] The buggy address is located 8 bytes inside of [ 27.062092] allocated 9-byte region [ffff888102795340, ffff888102795349) [ 27.063238] [ 27.063508] The buggy address belongs to the physical page: [ 27.063977] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102795 [ 27.064819] flags: 0x200000000000000(node=0|zone=2) [ 27.065428] page_type: f5(slab) [ 27.065808] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 27.066451] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 27.067342] page dumped because: kasan: bad access detected [ 27.067857] [ 27.068015] Memory state around the buggy address: [ 27.068693] ffff888102795200: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 27.069236] ffff888102795280: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.070095] >ffff888102795300: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 27.070755] ^ [ 27.071424] ffff888102795380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.072167] ffff888102795400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.072801] ================================================================== [ 26.891342] ================================================================== [ 26.892068] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90 [ 26.893087] Write of size 8 at addr ffff888102795348 by task kunit_try_catch/269 [ 26.893885] [ 26.894068] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 26.895340] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.896428] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.897736] Call Trace: [ 26.898040] <TASK> [ 26.898345] dump_stack_lvl+0x73/0xb0 [ 26.898677] print_report+0xd1/0x640 [ 26.899899] ? __virt_addr_valid+0x1db/0x2d0 [ 26.900682] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.901565] kasan_report+0x102/0x140 [ 26.902858] ? kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90 [ 26.903649] ? kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90 [ 26.904595] kasan_check_range+0x10c/0x1c0 [ 26.904929] __kasan_check_write+0x18/0x20 [ 26.905576] kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90 [ 26.906425] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 26.907354] ? __kmalloc_cache_noprof+0x184/0x410 [ 26.907838] ? kasan_bitops_generic+0x93/0x1c0 [ 26.908280] kasan_bitops_generic+0x122/0x1c0 [ 26.908700] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 26.909660] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 26.910253] kunit_try_run_case+0x1b3/0x490 [ 26.910859] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.911533] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 26.912213] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.912690] ? __kthread_parkme+0x82/0x160 [ 26.913471] ? preempt_count_sub+0x50/0x80 [ 26.913775] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.914480] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.915189] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.916009] kthread+0x257/0x310 [ 26.916497] ? __pfx_kthread+0x10/0x10 [ 26.917095] ret_from_fork+0x41/0x80 [ 26.917463] ? __pfx_kthread+0x10/0x10 [ 26.918195] ret_from_fork_asm+0x1a/0x30 [ 26.919187] </TASK> [ 26.919434] [ 26.919575] Allocated by task 269: [ 26.920413] kasan_save_stack+0x3d/0x60 [ 26.921092] kasan_save_track+0x18/0x40 [ 26.921676] kasan_save_alloc_info+0x3b/0x50 [ 26.922301] __kasan_kmalloc+0xb7/0xc0 [ 26.923080] __kmalloc_cache_noprof+0x184/0x410 [ 26.923643] kasan_bitops_generic+0x93/0x1c0 [ 26.924378] kunit_try_run_case+0x1b3/0x490 [ 26.925070] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.925566] kthread+0x257/0x310 [ 26.926151] ret_from_fork+0x41/0x80 [ 26.926959] ret_from_fork_asm+0x1a/0x30 [ 26.927528] [ 26.927724] The buggy address belongs to the object at ffff888102795340 [ 26.927724] which belongs to the cache kmalloc-16 of size 16 [ 26.929179] The buggy address is located 8 bytes inside of [ 26.929179] allocated 9-byte region [ffff888102795340, ffff888102795349) [ 26.930529] [ 26.931048] The buggy address belongs to the physical page: [ 26.931549] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102795 [ 26.933252] flags: 0x200000000000000(node=0|zone=2) [ 26.934120] page_type: f5(slab) [ 26.934558] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 26.935318] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 26.935615] page dumped because: kasan: bad access detected [ 26.936004] [ 26.936170] Memory state around the buggy address: [ 26.936627] ffff888102795200: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 26.937379] ffff888102795280: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 26.938195] >ffff888102795300: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 26.939758] ^ [ 26.940351] ffff888102795380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.940936] ffff888102795400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.941590] ==================================================================