Date
Dec. 5, 2024, 2:07 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 33.478827] ================================================================== [ 33.479778] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc8 [ 33.480696] Write of size 8 at addr fff00000c61b4368 by task kunit_try_catch/250 [ 33.482347] [ 33.482830] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 33.484049] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.484578] Hardware name: linux,dummy-virt (DT) [ 33.485181] Call trace: [ 33.485562] show_stack+0x20/0x38 (C) [ 33.486189] dump_stack_lvl+0x8c/0xd0 [ 33.486785] print_report+0x118/0x5e0 [ 33.487364] kasan_report+0xc8/0x118 [ 33.487934] kasan_check_range+0x100/0x1a8 [ 33.488582] __kasan_check_write+0x20/0x30 [ 33.489227] kasan_bitops_modify.constprop.0+0x320/0xbc8 [ 33.489939] kasan_bitops_generic+0x110/0x1c8 [ 33.490580] kunit_try_run_case+0x14c/0x3d0 [ 33.491219] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.492015] kthread+0x24c/0x2d0 [ 33.492628] ret_from_fork+0x10/0x20 [ 33.493277] [ 33.493659] Allocated by task 250: [ 33.494193] kasan_save_stack+0x3c/0x68 [ 33.494973] kasan_save_track+0x20/0x40 [ 33.495479] kasan_save_alloc_info+0x40/0x58 [ 33.496221] __kasan_kmalloc+0xd4/0xd8 [ 33.496765] __kmalloc_cache_noprof+0x15c/0x3c0 [ 33.497508] kasan_bitops_generic+0xa0/0x1c8 [ 33.498129] kunit_try_run_case+0x14c/0x3d0 [ 33.498738] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.499449] kthread+0x24c/0x2d0 [ 33.500200] ret_from_fork+0x10/0x20 [ 33.500734] [ 33.501074] The buggy address belongs to the object at fff00000c61b4360 [ 33.501074] which belongs to the cache kmalloc-16 of size 16 [ 33.502750] The buggy address is located 8 bytes inside of [ 33.502750] allocated 9-byte region [fff00000c61b4360, fff00000c61b4369) [ 33.504357] [ 33.504655] The buggy address belongs to the physical page: [ 33.505442] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061b4 [ 33.506687] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.507710] page_type: f5(slab) [ 33.508330] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 33.509253] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 33.510458] page dumped because: kasan: bad access detected [ 33.511430] [ 33.512377] Memory state around the buggy address: [ 33.512979] fff00000c61b4200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 33.513842] fff00000c61b4280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 33.514764] >fff00000c61b4300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 33.515636] ^ [ 33.516447] fff00000c61b4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.517347] fff00000c61b4400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.518317] ================================================================== [ 33.558209] ================================================================== [ 33.559535] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc8 [ 33.560434] Write of size 8 at addr fff00000c61b4368 by task kunit_try_catch/250 [ 33.561422] [ 33.561752] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 33.564153] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.564637] Hardware name: linux,dummy-virt (DT) [ 33.565369] Call trace: [ 33.565914] show_stack+0x20/0x38 (C) [ 33.566688] dump_stack_lvl+0x8c/0xd0 [ 33.567269] print_report+0x118/0x5e0 [ 33.567825] kasan_report+0xc8/0x118 [ 33.568557] kasan_check_range+0x100/0x1a8 [ 33.569169] __kasan_check_write+0x20/0x30 [ 33.569783] kasan_bitops_modify.constprop.0+0x344/0xbc8 [ 33.570545] kasan_bitops_generic+0x110/0x1c8 [ 33.571228] kunit_try_run_case+0x14c/0x3d0 [ 33.571905] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.572692] kthread+0x24c/0x2d0 [ 33.573302] ret_from_fork+0x10/0x20 [ 33.573892] [ 33.574234] Allocated by task 250: [ 33.574687] kasan_save_stack+0x3c/0x68 [ 33.575371] kasan_save_track+0x20/0x40 [ 33.575978] kasan_save_alloc_info+0x40/0x58 [ 33.576610] __kasan_kmalloc+0xd4/0xd8 [ 33.577193] __kmalloc_cache_noprof+0x15c/0x3c0 [ 33.577852] kasan_bitops_generic+0xa0/0x1c8 [ 33.578465] kunit_try_run_case+0x14c/0x3d0 [ 33.579059] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.579831] kthread+0x24c/0x2d0 [ 33.580371] ret_from_fork+0x10/0x20 [ 33.580922] [ 33.581247] The buggy address belongs to the object at fff00000c61b4360 [ 33.581247] which belongs to the cache kmalloc-16 of size 16 [ 33.582702] The buggy address is located 8 bytes inside of [ 33.582702] allocated 9-byte region [fff00000c61b4360, fff00000c61b4369) [ 33.584046] [ 33.584358] The buggy address belongs to the physical page: [ 33.585042] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061b4 [ 33.586059] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.586786] page_type: f5(slab) [ 33.587401] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 33.588337] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 33.589239] page dumped because: kasan: bad access detected [ 33.589909] [ 33.590246] Memory state around the buggy address: [ 33.590831] fff00000c61b4200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 33.591658] fff00000c61b4280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 33.592580] >fff00000c61b4300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 33.593535] ^ [ 33.594346] fff00000c61b4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.595280] fff00000c61b4400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.596198] ================================================================== [ 33.362400] ================================================================== [ 33.363206] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc8 [ 33.364146] Write of size 8 at addr fff00000c61b4368 by task kunit_try_catch/250 [ 33.365087] [ 33.365592] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 33.366800] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.367336] Hardware name: linux,dummy-virt (DT) [ 33.367938] Call trace: [ 33.368402] show_stack+0x20/0x38 (C) [ 33.369096] dump_stack_lvl+0x8c/0xd0 [ 33.369663] print_report+0x118/0x5e0 [ 33.370221] kasan_report+0xc8/0x118 [ 33.370798] kasan_check_range+0x100/0x1a8 [ 33.371412] __kasan_check_write+0x20/0x30 [ 33.372051] kasan_bitops_modify.constprop.0+0x1dc/0xbc8 [ 33.372827] kasan_bitops_generic+0x110/0x1c8 [ 33.373377] kunit_try_run_case+0x14c/0x3d0 [ 33.374128] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.374940] kthread+0x24c/0x2d0 [ 33.375477] ret_from_fork+0x10/0x20 [ 33.376155] [ 33.376451] Allocated by task 250: [ 33.376969] kasan_save_stack+0x3c/0x68 [ 33.377422] kasan_save_track+0x20/0x40 [ 33.378061] kasan_save_alloc_info+0x40/0x58 [ 33.378972] __kasan_kmalloc+0xd4/0xd8 [ 33.379531] __kmalloc_cache_noprof+0x15c/0x3c0 [ 33.380202] kasan_bitops_generic+0xa0/0x1c8 [ 33.380947] kunit_try_run_case+0x14c/0x3d0 [ 33.381540] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.382245] kthread+0x24c/0x2d0 [ 33.382781] ret_from_fork+0x10/0x20 [ 33.383288] [ 33.383603] The buggy address belongs to the object at fff00000c61b4360 [ 33.383603] which belongs to the cache kmalloc-16 of size 16 [ 33.384996] The buggy address is located 8 bytes inside of [ 33.384996] allocated 9-byte region [fff00000c61b4360, fff00000c61b4369) [ 33.386421] [ 33.386781] The buggy address belongs to the physical page: [ 33.387564] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061b4 [ 33.388508] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.389341] page_type: f5(slab) [ 33.389962] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 33.390906] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 33.391796] page dumped because: kasan: bad access detected [ 33.392512] [ 33.392827] Memory state around the buggy address: [ 33.393502] fff00000c61b4200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 33.394348] fff00000c61b4280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 33.395255] >fff00000c61b4300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 33.396094] ^ [ 33.396870] fff00000c61b4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.397727] fff00000c61b4400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.398602] ================================================================== [ 33.520930] ================================================================== [ 33.521652] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaf4/0xbc8 [ 33.522560] Read of size 8 at addr fff00000c61b4368 by task kunit_try_catch/250 [ 33.523575] [ 33.524065] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 33.525235] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.525914] Hardware name: linux,dummy-virt (DT) [ 33.526490] Call trace: [ 33.527051] show_stack+0x20/0x38 (C) [ 33.527648] dump_stack_lvl+0x8c/0xd0 [ 33.528231] print_report+0x118/0x5e0 [ 33.528842] kasan_report+0xc8/0x118 [ 33.529393] __asan_report_load8_noabort+0x20/0x30 [ 33.530074] kasan_bitops_modify.constprop.0+0xaf4/0xbc8 [ 33.530945] kasan_bitops_generic+0x110/0x1c8 [ 33.531703] kunit_try_run_case+0x14c/0x3d0 [ 33.532361] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.532996] kthread+0x24c/0x2d0 [ 33.533568] ret_from_fork+0x10/0x20 [ 33.534159] [ 33.534627] Allocated by task 250: [ 33.535077] kasan_save_stack+0x3c/0x68 [ 33.535762] kasan_save_track+0x20/0x40 [ 33.536354] kasan_save_alloc_info+0x40/0x58 [ 33.537061] __kasan_kmalloc+0xd4/0xd8 [ 33.537557] __kmalloc_cache_noprof+0x15c/0x3c0 [ 33.538311] kasan_bitops_generic+0xa0/0x1c8 [ 33.538889] kunit_try_run_case+0x14c/0x3d0 [ 33.539557] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.540275] kthread+0x24c/0x2d0 [ 33.540778] ret_from_fork+0x10/0x20 [ 33.541379] [ 33.541770] The buggy address belongs to the object at fff00000c61b4360 [ 33.541770] which belongs to the cache kmalloc-16 of size 16 [ 33.543212] The buggy address is located 8 bytes inside of [ 33.543212] allocated 9-byte region [fff00000c61b4360, fff00000c61b4369) [ 33.544551] [ 33.544915] The buggy address belongs to the physical page: [ 33.545674] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061b4 [ 33.546554] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.547449] page_type: f5(slab) [ 33.548012] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 33.549009] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 33.549913] page dumped because: kasan: bad access detected [ 33.550569] [ 33.550930] Memory state around the buggy address: [ 33.551564] fff00000c61b4200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 33.552354] fff00000c61b4280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 33.553296] >fff00000c61b4300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 33.554113] ^ [ 33.555008] fff00000c61b4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.555891] fff00000c61b4400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.556749] ================================================================== [ 33.600092] ================================================================== [ 33.600854] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc8 [ 33.601699] Write of size 8 at addr fff00000c61b4368 by task kunit_try_catch/250 [ 33.602613] [ 33.603092] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 33.604387] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.605071] Hardware name: linux,dummy-virt (DT) [ 33.605653] Call trace: [ 33.606573] show_stack+0x20/0x38 (C) [ 33.607197] dump_stack_lvl+0x8c/0xd0 [ 33.607794] print_report+0x118/0x5e0 [ 33.608374] kasan_report+0xc8/0x118 [ 33.609405] kasan_check_range+0x100/0x1a8 [ 33.610053] __kasan_check_write+0x20/0x30 [ 33.610649] kasan_bitops_modify.constprop.0+0x3b0/0xbc8 [ 33.611489] kasan_bitops_generic+0x110/0x1c8 [ 33.613058] kunit_try_run_case+0x14c/0x3d0 [ 33.614128] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.615302] kthread+0x24c/0x2d0 [ 33.616028] ret_from_fork+0x10/0x20 [ 33.616761] [ 33.617205] Allocated by task 250: [ 33.617901] kasan_save_stack+0x3c/0x68 [ 33.618700] kasan_save_track+0x20/0x40 [ 33.619494] kasan_save_alloc_info+0x40/0x58 [ 33.620371] __kasan_kmalloc+0xd4/0xd8 [ 33.621102] __kmalloc_cache_noprof+0x15c/0x3c0 [ 33.621632] kasan_bitops_generic+0xa0/0x1c8 [ 33.622300] kunit_try_run_case+0x14c/0x3d0 [ 33.622990] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.623671] kthread+0x24c/0x2d0 [ 33.624217] ret_from_fork+0x10/0x20 [ 33.624733] [ 33.625393] The buggy address belongs to the object at fff00000c61b4360 [ 33.625393] which belongs to the cache kmalloc-16 of size 16 [ 33.627002] The buggy address is located 8 bytes inside of [ 33.627002] allocated 9-byte region [fff00000c61b4360, fff00000c61b4369) [ 33.628527] [ 33.628840] The buggy address belongs to the physical page: [ 33.629695] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061b4 [ 33.630727] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.631618] page_type: f5(slab) [ 33.632203] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 33.633205] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 33.634155] page dumped because: kasan: bad access detected [ 33.634928] [ 33.635276] Memory state around the buggy address: [ 33.635992] fff00000c61b4200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 33.637071] fff00000c61b4280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 33.637970] >fff00000c61b4300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 33.638894] ^ [ 33.639750] fff00000c61b4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.640618] fff00000c61b4400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.641540] ================================================================== [ 33.643341] ================================================================== [ 33.644241] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa28/0xbc8 [ 33.645515] Read of size 8 at addr fff00000c61b4368 by task kunit_try_catch/250 [ 33.647119] [ 33.647493] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 33.648800] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.649411] Hardware name: linux,dummy-virt (DT) [ 33.650097] Call trace: [ 33.650534] show_stack+0x20/0x38 (C) [ 33.651219] dump_stack_lvl+0x8c/0xd0 [ 33.651943] print_report+0x118/0x5e0 [ 33.652564] kasan_report+0xc8/0x118 [ 33.653249] __asan_report_load8_noabort+0x20/0x30 [ 33.653982] kasan_bitops_modify.constprop.0+0xa28/0xbc8 [ 33.654802] kasan_bitops_generic+0x110/0x1c8 [ 33.655572] kunit_try_run_case+0x14c/0x3d0 [ 33.656334] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.657225] kthread+0x24c/0x2d0 [ 33.657856] ret_from_fork+0x10/0x20 [ 33.658609] [ 33.659304] Allocated by task 250: [ 33.659687] kasan_save_stack+0x3c/0x68 [ 33.660154] kasan_save_track+0x20/0x40 [ 33.660603] kasan_save_alloc_info+0x40/0x58 [ 33.661169] __kasan_kmalloc+0xd4/0xd8 [ 33.662418] __kmalloc_cache_noprof+0x15c/0x3c0 [ 33.663291] kasan_bitops_generic+0xa0/0x1c8 [ 33.663916] kunit_try_run_case+0x14c/0x3d0 [ 33.664497] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.665452] kthread+0x24c/0x2d0 [ 33.666334] ret_from_fork+0x10/0x20 [ 33.667008] [ 33.667306] The buggy address belongs to the object at fff00000c61b4360 [ 33.667306] which belongs to the cache kmalloc-16 of size 16 [ 33.668638] The buggy address is located 8 bytes inside of [ 33.668638] allocated 9-byte region [fff00000c61b4360, fff00000c61b4369) [ 33.670467] [ 33.670840] The buggy address belongs to the physical page: [ 33.671519] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061b4 [ 33.672510] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.673283] page_type: f5(slab) [ 33.673760] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 33.674695] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 33.675507] page dumped because: kasan: bad access detected [ 33.676329] [ 33.676680] Memory state around the buggy address: [ 33.677344] fff00000c61b4200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 33.678271] fff00000c61b4280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 33.679204] >fff00000c61b4300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 33.679931] ^ [ 33.680906] fff00000c61b4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.681828] fff00000c61b4400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.682623] ================================================================== [ 33.400769] ================================================================== [ 33.401604] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa88/0xbc8 [ 33.402483] Read of size 8 at addr fff00000c61b4368 by task kunit_try_catch/250 [ 33.404136] [ 33.404489] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 33.405694] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.406332] Hardware name: linux,dummy-virt (DT) [ 33.406974] Call trace: [ 33.407409] show_stack+0x20/0x38 (C) [ 33.408018] dump_stack_lvl+0x8c/0xd0 [ 33.408671] print_report+0x118/0x5e0 [ 33.409725] kasan_report+0xc8/0x118 [ 33.410502] __asan_report_load8_noabort+0x20/0x30 [ 33.411344] kasan_bitops_modify.constprop.0+0xa88/0xbc8 [ 33.412097] kasan_bitops_generic+0x110/0x1c8 [ 33.412732] kunit_try_run_case+0x14c/0x3d0 [ 33.413388] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.414227] kthread+0x24c/0x2d0 [ 33.414736] ret_from_fork+0x10/0x20 [ 33.415391] [ 33.415805] Allocated by task 250: [ 33.416384] kasan_save_stack+0x3c/0x68 [ 33.416974] kasan_save_track+0x20/0x40 [ 33.417472] kasan_save_alloc_info+0x40/0x58 [ 33.418201] __kasan_kmalloc+0xd4/0xd8 [ 33.418803] __kmalloc_cache_noprof+0x15c/0x3c0 [ 33.419515] kasan_bitops_generic+0xa0/0x1c8 [ 33.420109] kunit_try_run_case+0x14c/0x3d0 [ 33.420769] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.421504] kthread+0x24c/0x2d0 [ 33.422000] ret_from_fork+0x10/0x20 [ 33.422548] [ 33.422933] The buggy address belongs to the object at fff00000c61b4360 [ 33.422933] which belongs to the cache kmalloc-16 of size 16 [ 33.424368] The buggy address is located 8 bytes inside of [ 33.424368] allocated 9-byte region [fff00000c61b4360, fff00000c61b4369) [ 33.425693] [ 33.426031] The buggy address belongs to the physical page: [ 33.426667] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061b4 [ 33.427701] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.428560] page_type: f5(slab) [ 33.429009] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 33.429952] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 33.430926] page dumped because: kasan: bad access detected [ 33.431575] [ 33.431921] Memory state around the buggy address: [ 33.432601] fff00000c61b4200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 33.433423] fff00000c61b4280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 33.434301] >fff00000c61b4300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 33.435244] ^ [ 33.436071] fff00000c61b4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.436941] fff00000c61b4400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.437785] ================================================================== [ 33.283192] ================================================================== [ 33.284449] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc8 [ 33.285498] Write of size 8 at addr fff00000c61b4368 by task kunit_try_catch/250 [ 33.286663] [ 33.287127] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 33.288499] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.289041] Hardware name: linux,dummy-virt (DT) [ 33.289582] Call trace: [ 33.290102] show_stack+0x20/0x38 (C) [ 33.290832] dump_stack_lvl+0x8c/0xd0 [ 33.291487] print_report+0x118/0x5e0 [ 33.292059] kasan_report+0xc8/0x118 [ 33.292665] kasan_check_range+0x100/0x1a8 [ 33.293365] __kasan_check_write+0x20/0x30 [ 33.294011] kasan_bitops_modify.constprop.0+0x100/0xbc8 [ 33.294734] kasan_bitops_generic+0x110/0x1c8 [ 33.295433] kunit_try_run_case+0x14c/0x3d0 [ 33.296068] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.296836] kthread+0x24c/0x2d0 [ 33.297307] ret_from_fork+0x10/0x20 [ 33.297972] [ 33.298337] Allocated by task 250: [ 33.298792] kasan_save_stack+0x3c/0x68 [ 33.299511] kasan_save_track+0x20/0x40 [ 33.300170] kasan_save_alloc_info+0x40/0x58 [ 33.300801] __kasan_kmalloc+0xd4/0xd8 [ 33.301342] __kmalloc_cache_noprof+0x15c/0x3c0 [ 33.302102] kasan_bitops_generic+0xa0/0x1c8 [ 33.302604] kunit_try_run_case+0x14c/0x3d0 [ 33.303383] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.304142] kthread+0x24c/0x2d0 [ 33.304603] ret_from_fork+0x10/0x20 [ 33.305155] [ 33.305530] The buggy address belongs to the object at fff00000c61b4360 [ 33.305530] which belongs to the cache kmalloc-16 of size 16 [ 33.306978] The buggy address is located 8 bytes inside of [ 33.306978] allocated 9-byte region [fff00000c61b4360, fff00000c61b4369) [ 33.308300] [ 33.308605] The buggy address belongs to the physical page: [ 33.309446] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061b4 [ 33.310322] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.311276] page_type: f5(slab) [ 33.311733] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 33.312762] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 33.313689] page dumped because: kasan: bad access detected [ 33.314417] [ 33.314739] Memory state around the buggy address: [ 33.315430] fff00000c61b4200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 33.316571] fff00000c61b4280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 33.317435] >fff00000c61b4300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 33.318546] ^ [ 33.319525] fff00000c61b4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.320510] fff00000c61b4400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.321356] ================================================================== [ 33.439947] ================================================================== [ 33.440897] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc8 [ 33.441820] Write of size 8 at addr fff00000c61b4368 by task kunit_try_catch/250 [ 33.442519] [ 33.442868] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 33.444118] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.444673] Hardware name: linux,dummy-virt (DT) [ 33.445302] Call trace: [ 33.445787] show_stack+0x20/0x38 (C) [ 33.446331] dump_stack_lvl+0x8c/0xd0 [ 33.446954] print_report+0x118/0x5e0 [ 33.447589] kasan_report+0xc8/0x118 [ 33.448209] kasan_check_range+0x100/0x1a8 [ 33.448813] __kasan_check_write+0x20/0x30 [ 33.449443] kasan_bitops_modify.constprop.0+0x2b4/0xbc8 [ 33.450149] kasan_bitops_generic+0x110/0x1c8 [ 33.450865] kunit_try_run_case+0x14c/0x3d0 [ 33.451510] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.452307] kthread+0x24c/0x2d0 [ 33.452851] ret_from_fork+0x10/0x20 [ 33.453446] [ 33.453726] Allocated by task 250: [ 33.454379] kasan_save_stack+0x3c/0x68 [ 33.454894] kasan_save_track+0x20/0x40 [ 33.455510] kasan_save_alloc_info+0x40/0x58 [ 33.456318] __kasan_kmalloc+0xd4/0xd8 [ 33.456856] __kmalloc_cache_noprof+0x15c/0x3c0 [ 33.457593] kasan_bitops_generic+0xa0/0x1c8 [ 33.458204] kunit_try_run_case+0x14c/0x3d0 [ 33.458922] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.459552] kthread+0x24c/0x2d0 [ 33.460172] ret_from_fork+0x10/0x20 [ 33.460707] [ 33.461033] The buggy address belongs to the object at fff00000c61b4360 [ 33.461033] which belongs to the cache kmalloc-16 of size 16 [ 33.462455] The buggy address is located 8 bytes inside of [ 33.462455] allocated 9-byte region [fff00000c61b4360, fff00000c61b4369) [ 33.463785] [ 33.464159] The buggy address belongs to the physical page: [ 33.464924] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061b4 [ 33.465815] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.466669] page_type: f5(slab) [ 33.467176] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 33.468208] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 33.469154] page dumped because: kasan: bad access detected [ 33.469801] [ 33.470115] Memory state around the buggy address: [ 33.470717] fff00000c61b4200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 33.471845] fff00000c61b4280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 33.472806] >fff00000c61b4300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 33.473668] ^ [ 33.474511] fff00000c61b4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.475404] fff00000c61b4400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.476248] ================================================================== [ 33.323052] ================================================================== [ 33.324983] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa4c/0xbc8 [ 33.326003] Read of size 8 at addr fff00000c61b4368 by task kunit_try_catch/250 [ 33.327058] [ 33.327536] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 33.328808] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.329426] Hardware name: linux,dummy-virt (DT) [ 33.330038] Call trace: [ 33.330434] show_stack+0x20/0x38 (C) [ 33.331064] dump_stack_lvl+0x8c/0xd0 [ 33.331603] print_report+0x118/0x5e0 [ 33.332300] kasan_report+0xc8/0x118 [ 33.332924] __asan_report_load8_noabort+0x20/0x30 [ 33.333729] kasan_bitops_modify.constprop.0+0xa4c/0xbc8 [ 33.334486] kasan_bitops_generic+0x110/0x1c8 [ 33.335139] kunit_try_run_case+0x14c/0x3d0 [ 33.335793] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.336566] kthread+0x24c/0x2d0 [ 33.337164] ret_from_fork+0x10/0x20 [ 33.337700] [ 33.338031] Allocated by task 250: [ 33.338535] kasan_save_stack+0x3c/0x68 [ 33.339212] kasan_save_track+0x20/0x40 [ 33.339780] kasan_save_alloc_info+0x40/0x58 [ 33.340418] __kasan_kmalloc+0xd4/0xd8 [ 33.340980] __kmalloc_cache_noprof+0x15c/0x3c0 [ 33.341640] kasan_bitops_generic+0xa0/0x1c8 [ 33.342242] kunit_try_run_case+0x14c/0x3d0 [ 33.342766] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.343582] kthread+0x24c/0x2d0 [ 33.344112] ret_from_fork+0x10/0x20 [ 33.344595] [ 33.345076] The buggy address belongs to the object at fff00000c61b4360 [ 33.345076] which belongs to the cache kmalloc-16 of size 16 [ 33.346513] The buggy address is located 8 bytes inside of [ 33.346513] allocated 9-byte region [fff00000c61b4360, fff00000c61b4369) [ 33.347827] [ 33.348197] The buggy address belongs to the physical page: [ 33.348938] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061b4 [ 33.349823] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.350726] page_type: f5(slab) [ 33.351299] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 33.352169] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 33.353116] page dumped because: kasan: bad access detected [ 33.353797] [ 33.354156] Memory state around the buggy address: [ 33.354742] fff00000c61b4200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 33.355673] fff00000c61b4280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 33.356512] >fff00000c61b4300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 33.357376] ^ [ 33.358168] fff00000c61b4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.359001] fff00000c61b4400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.359823] ==================================================================
[ 31.287018] ================================================================== [ 31.288450] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d6/0xd50 [ 31.289052] Write of size 8 at addr ffff8881025ed7e8 by task kunit_try_catch/268 [ 31.289481] [ 31.289725] CPU: 1 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 31.290435] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.290833] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.291347] Call Trace: [ 31.291722] <TASK> [ 31.292197] dump_stack_lvl+0x73/0xb0 [ 31.292585] print_report+0xd1/0x640 [ 31.292902] ? __virt_addr_valid+0x1db/0x2d0 [ 31.293599] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.293983] kasan_report+0x102/0x140 [ 31.294268] ? kasan_bitops_modify.constprop.0+0x2d6/0xd50 [ 31.294833] ? kasan_bitops_modify.constprop.0+0x2d6/0xd50 [ 31.295490] kasan_check_range+0x10c/0x1c0 [ 31.296093] __kasan_check_write+0x18/0x20 [ 31.296577] kasan_bitops_modify.constprop.0+0x2d6/0xd50 [ 31.297141] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 31.297528] ? __kmalloc_cache_noprof+0x184/0x410 [ 31.297884] ? trace_hardirqs_on+0x37/0xe0 [ 31.298392] ? kasan_bitops_generic+0x93/0x1c0 [ 31.298993] kasan_bitops_generic+0x117/0x1c0 [ 31.299540] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 31.300352] ? __pfx_read_tsc+0x10/0x10 [ 31.300738] ? ktime_get_ts64+0x86/0x230 [ 31.301169] kunit_try_run_case+0x1b3/0x490 [ 31.301563] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.302051] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.302386] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.302749] ? __kthread_parkme+0x82/0x160 [ 31.303079] ? preempt_count_sub+0x50/0x80 [ 31.303757] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.304348] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.304926] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.305438] kthread+0x257/0x310 [ 31.305782] ? __pfx_kthread+0x10/0x10 [ 31.306228] ret_from_fork+0x41/0x80 [ 31.306552] ? __pfx_kthread+0x10/0x10 [ 31.306942] ret_from_fork_asm+0x1a/0x30 [ 31.307411] </TASK> [ 31.307638] [ 31.307873] Allocated by task 268: [ 31.308274] kasan_save_stack+0x3d/0x60 [ 31.308770] kasan_save_track+0x18/0x40 [ 31.309145] kasan_save_alloc_info+0x3b/0x50 [ 31.309545] __kasan_kmalloc+0xb7/0xc0 [ 31.310023] __kmalloc_cache_noprof+0x184/0x410 [ 31.310381] kasan_bitops_generic+0x93/0x1c0 [ 31.310709] kunit_try_run_case+0x1b3/0x490 [ 31.311241] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.311914] kthread+0x257/0x310 [ 31.312298] ret_from_fork+0x41/0x80 [ 31.312798] ret_from_fork_asm+0x1a/0x30 [ 31.313119] [ 31.313284] The buggy address belongs to the object at ffff8881025ed7e0 [ 31.313284] which belongs to the cache kmalloc-16 of size 16 [ 31.314190] The buggy address is located 8 bytes inside of [ 31.314190] allocated 9-byte region [ffff8881025ed7e0, ffff8881025ed7e9) [ 31.315195] [ 31.315439] The buggy address belongs to the physical page: [ 31.316100] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ed [ 31.316556] flags: 0x200000000000000(node=0|zone=2) [ 31.317096] page_type: f5(slab) [ 31.317507] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 31.318661] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 31.319408] page dumped because: kasan: bad access detected [ 31.320037] [ 31.320197] Memory state around the buggy address: [ 31.320508] ffff8881025ed680: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 31.322034] ffff8881025ed700: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 31.322879] >ffff8881025ed780: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 31.323369] ^ [ 31.323865] ffff8881025ed800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.324713] ffff8881025ed880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.325405] ================================================================== [ 31.327083] ================================================================== [ 31.328524] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x374/0xd50 [ 31.329442] Write of size 8 at addr ffff8881025ed7e8 by task kunit_try_catch/268 [ 31.330072] [ 31.330301] CPU: 1 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 31.331302] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.331578] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.332580] Call Trace: [ 31.333440] <TASK> [ 31.333633] dump_stack_lvl+0x73/0xb0 [ 31.334268] print_report+0xd1/0x640 [ 31.334715] ? __virt_addr_valid+0x1db/0x2d0 [ 31.335438] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.336008] kasan_report+0x102/0x140 [ 31.336555] ? kasan_bitops_modify.constprop.0+0x374/0xd50 [ 31.337309] ? kasan_bitops_modify.constprop.0+0x374/0xd50 [ 31.337905] kasan_check_range+0x10c/0x1c0 [ 31.338517] __kasan_check_write+0x18/0x20 [ 31.339072] kasan_bitops_modify.constprop.0+0x374/0xd50 [ 31.339753] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 31.340504] ? __kmalloc_cache_noprof+0x184/0x410 [ 31.341066] ? trace_hardirqs_on+0x37/0xe0 [ 31.341549] ? kasan_bitops_generic+0x93/0x1c0 [ 31.342106] kasan_bitops_generic+0x117/0x1c0 [ 31.342696] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 31.343248] ? __pfx_read_tsc+0x10/0x10 [ 31.343813] ? ktime_get_ts64+0x86/0x230 [ 31.344258] kunit_try_run_case+0x1b3/0x490 [ 31.344659] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.345240] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.345727] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.346282] ? __kthread_parkme+0x82/0x160 [ 31.346667] ? preempt_count_sub+0x50/0x80 [ 31.347220] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.347598] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.348406] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.348959] kthread+0x257/0x310 [ 31.349285] ? __pfx_kthread+0x10/0x10 [ 31.349865] ret_from_fork+0x41/0x80 [ 31.350182] ? __pfx_kthread+0x10/0x10 [ 31.350715] ret_from_fork_asm+0x1a/0x30 [ 31.351136] </TASK> [ 31.351488] [ 31.351847] Allocated by task 268: [ 31.352173] kasan_save_stack+0x3d/0x60 [ 31.352714] kasan_save_track+0x18/0x40 [ 31.353153] kasan_save_alloc_info+0x3b/0x50 [ 31.353673] __kasan_kmalloc+0xb7/0xc0 [ 31.354048] __kmalloc_cache_noprof+0x184/0x410 [ 31.354597] kasan_bitops_generic+0x93/0x1c0 [ 31.355210] kunit_try_run_case+0x1b3/0x490 [ 31.355580] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.356330] kthread+0x257/0x310 [ 31.356621] ret_from_fork+0x41/0x80 [ 31.357188] ret_from_fork_asm+0x1a/0x30 [ 31.357573] [ 31.357897] The buggy address belongs to the object at ffff8881025ed7e0 [ 31.357897] which belongs to the cache kmalloc-16 of size 16 [ 31.358908] The buggy address is located 8 bytes inside of [ 31.358908] allocated 9-byte region [ffff8881025ed7e0, ffff8881025ed7e9) [ 31.360011] [ 31.360221] The buggy address belongs to the physical page: [ 31.361719] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ed [ 31.362825] flags: 0x200000000000000(node=0|zone=2) [ 31.363317] page_type: f5(slab) [ 31.363658] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 31.364464] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 31.365896] page dumped because: kasan: bad access detected [ 31.366423] [ 31.366809] Memory state around the buggy address: [ 31.367265] ffff8881025ed680: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 31.367970] ffff8881025ed700: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 31.368640] >ffff8881025ed780: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 31.369343] ^ [ 31.370030] ffff8881025ed800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.370577] ffff8881025ed880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.371367] ================================================================== [ 31.415874] ================================================================== [ 31.416895] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ad/0xd50 [ 31.417501] Write of size 8 at addr ffff8881025ed7e8 by task kunit_try_catch/268 [ 31.418359] [ 31.418610] CPU: 1 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 31.419647] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.420087] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.420836] Call Trace: [ 31.421270] <TASK> [ 31.421589] dump_stack_lvl+0x73/0xb0 [ 31.422062] print_report+0xd1/0x640 [ 31.422553] ? __virt_addr_valid+0x1db/0x2d0 [ 31.423031] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.423721] kasan_report+0x102/0x140 [ 31.424100] ? kasan_bitops_modify.constprop.0+0x4ad/0xd50 [ 31.424746] ? kasan_bitops_modify.constprop.0+0x4ad/0xd50 [ 31.425448] kasan_check_range+0x10c/0x1c0 [ 31.425907] __kasan_check_write+0x18/0x20 [ 31.426209] kasan_bitops_modify.constprop.0+0x4ad/0xd50 [ 31.426744] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 31.427379] ? __kmalloc_cache_noprof+0x184/0x410 [ 31.427953] ? trace_hardirqs_on+0x37/0xe0 [ 31.428858] ? kasan_bitops_generic+0x93/0x1c0 [ 31.429408] kasan_bitops_generic+0x117/0x1c0 [ 31.430070] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 31.430761] ? __pfx_read_tsc+0x10/0x10 [ 31.431247] ? ktime_get_ts64+0x86/0x230 [ 31.432097] kunit_try_run_case+0x1b3/0x490 [ 31.432458] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.432875] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.433314] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.433853] ? __kthread_parkme+0x82/0x160 [ 31.434302] ? preempt_count_sub+0x50/0x80 [ 31.434726] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.435232] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.436000] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.436477] kthread+0x257/0x310 [ 31.437024] ? __pfx_kthread+0x10/0x10 [ 31.437403] ret_from_fork+0x41/0x80 [ 31.437941] ? __pfx_kthread+0x10/0x10 [ 31.438388] ret_from_fork_asm+0x1a/0x30 [ 31.438922] </TASK> [ 31.439304] [ 31.439498] Allocated by task 268: [ 31.439961] kasan_save_stack+0x3d/0x60 [ 31.440479] kasan_save_track+0x18/0x40 [ 31.440889] kasan_save_alloc_info+0x3b/0x50 [ 31.441430] __kasan_kmalloc+0xb7/0xc0 [ 31.441915] __kmalloc_cache_noprof+0x184/0x410 [ 31.442525] kasan_bitops_generic+0x93/0x1c0 [ 31.443121] kunit_try_run_case+0x1b3/0x490 [ 31.443668] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.444321] kthread+0x257/0x310 [ 31.444807] ret_from_fork+0x41/0x80 [ 31.445242] ret_from_fork_asm+0x1a/0x30 [ 31.445834] [ 31.446146] The buggy address belongs to the object at ffff8881025ed7e0 [ 31.446146] which belongs to the cache kmalloc-16 of size 16 [ 31.447193] The buggy address is located 8 bytes inside of [ 31.447193] allocated 9-byte region [ffff8881025ed7e0, ffff8881025ed7e9) [ 31.448315] [ 31.448481] The buggy address belongs to the physical page: [ 31.449193] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ed [ 31.449848] flags: 0x200000000000000(node=0|zone=2) [ 31.450422] page_type: f5(slab) [ 31.450735] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 31.451524] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 31.452231] page dumped because: kasan: bad access detected [ 31.452756] [ 31.453059] Memory state around the buggy address: [ 31.453515] ffff8881025ed680: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 31.454226] ffff8881025ed700: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 31.454977] >ffff8881025ed780: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 31.455629] ^ [ 31.456453] ffff8881025ed800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.457773] ffff8881025ed880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.458589] ================================================================== [ 31.244502] ================================================================== [ 31.245505] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23b/0xd50 [ 31.246628] Write of size 8 at addr ffff8881025ed7e8 by task kunit_try_catch/268 [ 31.247442] [ 31.247732] CPU: 1 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 31.248710] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.249105] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.249972] Call Trace: [ 31.250292] <TASK> [ 31.250662] dump_stack_lvl+0x73/0xb0 [ 31.251396] print_report+0xd1/0x640 [ 31.251775] ? __virt_addr_valid+0x1db/0x2d0 [ 31.252492] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.253099] kasan_report+0x102/0x140 [ 31.253423] ? kasan_bitops_modify.constprop.0+0x23b/0xd50 [ 31.254186] ? kasan_bitops_modify.constprop.0+0x23b/0xd50 [ 31.254608] kasan_check_range+0x10c/0x1c0 [ 31.255244] __kasan_check_write+0x18/0x20 [ 31.255652] kasan_bitops_modify.constprop.0+0x23b/0xd50 [ 31.256291] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 31.257078] ? __kmalloc_cache_noprof+0x184/0x410 [ 31.257701] ? trace_hardirqs_on+0x37/0xe0 [ 31.258250] ? kasan_bitops_generic+0x93/0x1c0 [ 31.259735] kasan_bitops_generic+0x117/0x1c0 [ 31.260080] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 31.260458] ? __pfx_read_tsc+0x10/0x10 [ 31.261008] ? ktime_get_ts64+0x86/0x230 [ 31.261320] kunit_try_run_case+0x1b3/0x490 [ 31.261913] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.262252] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.262836] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.263278] ? __kthread_parkme+0x82/0x160 [ 31.263643] ? preempt_count_sub+0x50/0x80 [ 31.264136] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.264616] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.265340] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.265960] kthread+0x257/0x310 [ 31.266294] ? __pfx_kthread+0x10/0x10 [ 31.266707] ret_from_fork+0x41/0x80 [ 31.267033] ? __pfx_kthread+0x10/0x10 [ 31.267404] ret_from_fork_asm+0x1a/0x30 [ 31.268046] </TASK> [ 31.268338] [ 31.268504] Allocated by task 268: [ 31.268854] kasan_save_stack+0x3d/0x60 [ 31.269324] kasan_save_track+0x18/0x40 [ 31.269863] kasan_save_alloc_info+0x3b/0x50 [ 31.270254] __kasan_kmalloc+0xb7/0xc0 [ 31.270667] __kmalloc_cache_noprof+0x184/0x410 [ 31.271077] kasan_bitops_generic+0x93/0x1c0 [ 31.271386] kunit_try_run_case+0x1b3/0x490 [ 31.271970] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.272611] kthread+0x257/0x310 [ 31.272887] ret_from_fork+0x41/0x80 [ 31.273374] ret_from_fork_asm+0x1a/0x30 [ 31.273892] [ 31.274156] The buggy address belongs to the object at ffff8881025ed7e0 [ 31.274156] which belongs to the cache kmalloc-16 of size 16 [ 31.275190] The buggy address is located 8 bytes inside of [ 31.275190] allocated 9-byte region [ffff8881025ed7e0, ffff8881025ed7e9) [ 31.276212] [ 31.276384] The buggy address belongs to the physical page: [ 31.276867] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ed [ 31.277771] flags: 0x200000000000000(node=0|zone=2) [ 31.278109] page_type: f5(slab) [ 31.278398] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 31.279488] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 31.280282] page dumped because: kasan: bad access detected [ 31.280655] [ 31.280842] Memory state around the buggy address: [ 31.281154] ffff8881025ed680: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 31.282256] ffff8881025ed700: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 31.282674] >ffff8881025ed780: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 31.283653] ^ [ 31.284454] ffff8881025ed800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.285381] ffff8881025ed880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.286029] ================================================================== [ 31.372722] ================================================================== [ 31.373541] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40f/0xd50 [ 31.374458] Write of size 8 at addr ffff8881025ed7e8 by task kunit_try_catch/268 [ 31.375306] [ 31.375631] CPU: 1 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 31.376664] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.377042] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.377779] Call Trace: [ 31.378132] <TASK> [ 31.378403] dump_stack_lvl+0x73/0xb0 [ 31.378939] print_report+0xd1/0x640 [ 31.379410] ? __virt_addr_valid+0x1db/0x2d0 [ 31.379939] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.380494] kasan_report+0x102/0x140 [ 31.381042] ? kasan_bitops_modify.constprop.0+0x40f/0xd50 [ 31.381560] ? kasan_bitops_modify.constprop.0+0x40f/0xd50 [ 31.382292] kasan_check_range+0x10c/0x1c0 [ 31.382651] __kasan_check_write+0x18/0x20 [ 31.383245] kasan_bitops_modify.constprop.0+0x40f/0xd50 [ 31.383993] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 31.384556] ? __kmalloc_cache_noprof+0x184/0x410 [ 31.385110] ? trace_hardirqs_on+0x37/0xe0 [ 31.385698] ? kasan_bitops_generic+0x93/0x1c0 [ 31.386299] kasan_bitops_generic+0x117/0x1c0 [ 31.386837] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 31.387498] ? __pfx_read_tsc+0x10/0x10 [ 31.387958] ? ktime_get_ts64+0x86/0x230 [ 31.388435] kunit_try_run_case+0x1b3/0x490 [ 31.389023] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.389507] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.390114] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.390561] ? __kthread_parkme+0x82/0x160 [ 31.391053] ? preempt_count_sub+0x50/0x80 [ 31.391513] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.392201] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.393016] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.393590] kthread+0x257/0x310 [ 31.393995] ? __pfx_kthread+0x10/0x10 [ 31.394387] ret_from_fork+0x41/0x80 [ 31.394950] ? __pfx_kthread+0x10/0x10 [ 31.395392] ret_from_fork_asm+0x1a/0x30 [ 31.395941] </TASK> [ 31.396290] [ 31.396552] Allocated by task 268: [ 31.397099] kasan_save_stack+0x3d/0x60 [ 31.397450] kasan_save_track+0x18/0x40 [ 31.398024] kasan_save_alloc_info+0x3b/0x50 [ 31.398498] __kasan_kmalloc+0xb7/0xc0 [ 31.398924] __kmalloc_cache_noprof+0x184/0x410 [ 31.399502] kasan_bitops_generic+0x93/0x1c0 [ 31.400028] kunit_try_run_case+0x1b3/0x490 [ 31.400484] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.401244] kthread+0x257/0x310 [ 31.401575] ret_from_fork+0x41/0x80 [ 31.402072] ret_from_fork_asm+0x1a/0x30 [ 31.402501] [ 31.402840] The buggy address belongs to the object at ffff8881025ed7e0 [ 31.402840] which belongs to the cache kmalloc-16 of size 16 [ 31.403905] The buggy address is located 8 bytes inside of [ 31.403905] allocated 9-byte region [ffff8881025ed7e0, ffff8881025ed7e9) [ 31.405096] [ 31.405387] The buggy address belongs to the physical page: [ 31.405985] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ed [ 31.406634] flags: 0x200000000000000(node=0|zone=2) [ 31.407225] page_type: f5(slab) [ 31.407546] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 31.408419] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 31.409227] page dumped because: kasan: bad access detected [ 31.409706] [ 31.409917] Memory state around the buggy address: [ 31.410317] ffff8881025ed680: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 31.411013] ffff8881025ed700: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 31.411631] >ffff8881025ed780: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 31.412437] ^ [ 31.413004] ffff8881025ed800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.413924] ffff8881025ed880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.414556] ================================================================== [ 31.149674] ================================================================== [ 31.150412] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x102/0xd50 [ 31.150806] Write of size 8 at addr ffff8881025ed7e8 by task kunit_try_catch/268 [ 31.151718] [ 31.151957] CPU: 1 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 31.153156] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.154397] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.155352] Call Trace: [ 31.155670] <TASK> [ 31.156007] dump_stack_lvl+0x73/0xb0 [ 31.156317] print_report+0xd1/0x640 [ 31.156744] ? __virt_addr_valid+0x1db/0x2d0 [ 31.157260] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.157814] kasan_report+0x102/0x140 [ 31.158136] ? kasan_bitops_modify.constprop.0+0x102/0xd50 [ 31.158720] ? kasan_bitops_modify.constprop.0+0x102/0xd50 [ 31.159404] kasan_check_range+0x10c/0x1c0 [ 31.159866] __kasan_check_write+0x18/0x20 [ 31.160322] kasan_bitops_modify.constprop.0+0x102/0xd50 [ 31.160831] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 31.161455] ? __kmalloc_cache_noprof+0x184/0x410 [ 31.161998] ? trace_hardirqs_on+0x37/0xe0 [ 31.162361] ? kasan_bitops_generic+0x93/0x1c0 [ 31.162907] kasan_bitops_generic+0x117/0x1c0 [ 31.163255] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 31.163866] ? __pfx_read_tsc+0x10/0x10 [ 31.164330] ? ktime_get_ts64+0x86/0x230 [ 31.164722] kunit_try_run_case+0x1b3/0x490 [ 31.165130] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.165701] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.166299] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.166759] ? __kthread_parkme+0x82/0x160 [ 31.167271] ? preempt_count_sub+0x50/0x80 [ 31.167710] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.168149] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.168834] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.169375] kthread+0x257/0x310 [ 31.169801] ? __pfx_kthread+0x10/0x10 [ 31.170145] ret_from_fork+0x41/0x80 [ 31.170586] ? __pfx_kthread+0x10/0x10 [ 31.171121] ret_from_fork_asm+0x1a/0x30 [ 31.171514] </TASK> [ 31.171938] [ 31.172183] Allocated by task 268: [ 31.172534] kasan_save_stack+0x3d/0x60 [ 31.172910] kasan_save_track+0x18/0x40 [ 31.173385] kasan_save_alloc_info+0x3b/0x50 [ 31.173818] __kasan_kmalloc+0xb7/0xc0 [ 31.174229] __kmalloc_cache_noprof+0x184/0x410 [ 31.174831] kasan_bitops_generic+0x93/0x1c0 [ 31.175292] kunit_try_run_case+0x1b3/0x490 [ 31.175627] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.176319] kthread+0x257/0x310 [ 31.176661] ret_from_fork+0x41/0x80 [ 31.177164] ret_from_fork_asm+0x1a/0x30 [ 31.177476] [ 31.177726] The buggy address belongs to the object at ffff8881025ed7e0 [ 31.177726] which belongs to the cache kmalloc-16 of size 16 [ 31.178758] The buggy address is located 8 bytes inside of [ 31.178758] allocated 9-byte region [ffff8881025ed7e0, ffff8881025ed7e9) [ 31.179839] [ 31.180011] The buggy address belongs to the physical page: [ 31.180351] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ed [ 31.181264] flags: 0x200000000000000(node=0|zone=2) [ 31.181896] page_type: f5(slab) [ 31.182305] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 31.183070] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 31.183964] page dumped because: kasan: bad access detected [ 31.184502] [ 31.184664] Memory state around the buggy address: [ 31.185095] ffff8881025ed680: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 31.185832] ffff8881025ed700: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 31.186473] >ffff8881025ed780: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 31.187382] ^ [ 31.188015] ffff8881025ed800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.188756] ffff8881025ed880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.189446] ================================================================== [ 31.191951] ================================================================== [ 31.192695] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19d/0xd50 [ 31.194479] Write of size 8 at addr ffff8881025ed7e8 by task kunit_try_catch/268 [ 31.196286] [ 31.196554] CPU: 1 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 31.197262] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.197449] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.198010] Call Trace: [ 31.198459] <TASK> [ 31.198830] dump_stack_lvl+0x73/0xb0 [ 31.199452] print_report+0xd1/0x640 [ 31.200179] ? __virt_addr_valid+0x1db/0x2d0 [ 31.200926] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.201641] kasan_report+0x102/0x140 [ 31.202358] ? kasan_bitops_modify.constprop.0+0x19d/0xd50 [ 31.202937] ? kasan_bitops_modify.constprop.0+0x19d/0xd50 [ 31.204053] kasan_check_range+0x10c/0x1c0 [ 31.204649] __kasan_check_write+0x18/0x20 [ 31.205018] kasan_bitops_modify.constprop.0+0x19d/0xd50 [ 31.205950] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 31.206477] ? __kmalloc_cache_noprof+0x184/0x410 [ 31.207043] ? trace_hardirqs_on+0x37/0xe0 [ 31.208000] ? kasan_bitops_generic+0x93/0x1c0 [ 31.208625] kasan_bitops_generic+0x117/0x1c0 [ 31.209246] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 31.209715] ? __pfx_read_tsc+0x10/0x10 [ 31.210456] ? ktime_get_ts64+0x86/0x230 [ 31.211138] kunit_try_run_case+0x1b3/0x490 [ 31.211538] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.212474] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.213236] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.213721] ? __kthread_parkme+0x82/0x160 [ 31.214397] ? preempt_count_sub+0x50/0x80 [ 31.215040] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.215625] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.216543] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.217147] kthread+0x257/0x310 [ 31.217759] ? __pfx_kthread+0x10/0x10 [ 31.218375] ret_from_fork+0x41/0x80 [ 31.218810] ? __pfx_kthread+0x10/0x10 [ 31.219206] ret_from_fork_asm+0x1a/0x30 [ 31.219635] </TASK> [ 31.220456] [ 31.220629] Allocated by task 268: [ 31.221635] kasan_save_stack+0x3d/0x60 [ 31.222446] kasan_save_track+0x18/0x40 [ 31.223154] kasan_save_alloc_info+0x3b/0x50 [ 31.223742] __kasan_kmalloc+0xb7/0xc0 [ 31.224392] __kmalloc_cache_noprof+0x184/0x410 [ 31.225063] kasan_bitops_generic+0x93/0x1c0 [ 31.225671] kunit_try_run_case+0x1b3/0x490 [ 31.226485] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.227627] kthread+0x257/0x310 [ 31.227993] ret_from_fork+0x41/0x80 [ 31.228609] ret_from_fork_asm+0x1a/0x30 [ 31.229287] [ 31.230107] The buggy address belongs to the object at ffff8881025ed7e0 [ 31.230107] which belongs to the cache kmalloc-16 of size 16 [ 31.231476] The buggy address is located 8 bytes inside of [ 31.231476] allocated 9-byte region [ffff8881025ed7e0, ffff8881025ed7e9) [ 31.233278] [ 31.233775] The buggy address belongs to the physical page: [ 31.234202] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ed [ 31.235088] flags: 0x200000000000000(node=0|zone=2) [ 31.235482] page_type: f5(slab) [ 31.235854] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 31.236490] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 31.237219] page dumped because: kasan: bad access detected [ 31.237784] [ 31.238149] Memory state around the buggy address: [ 31.238626] ffff8881025ed680: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 31.239250] ffff8881025ed700: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 31.239954] >ffff8881025ed780: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 31.240655] ^ [ 31.241274] ffff8881025ed800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.241972] ffff8881025ed880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.242724] ================================================================== [ 31.459795] ================================================================== [ 31.461579] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x548/0xd50 [ 31.463023] Write of size 8 at addr ffff8881025ed7e8 by task kunit_try_catch/268 [ 31.464622] [ 31.464961] CPU: 1 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 31.466009] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.466415] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.467552] Call Trace: [ 31.468470] <TASK> [ 31.468980] dump_stack_lvl+0x73/0xb0 [ 31.469391] print_report+0xd1/0x640 [ 31.469802] ? __virt_addr_valid+0x1db/0x2d0 [ 31.470338] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.470713] kasan_report+0x102/0x140 [ 31.471105] ? kasan_bitops_modify.constprop.0+0x548/0xd50 [ 31.471514] ? kasan_bitops_modify.constprop.0+0x548/0xd50 [ 31.472153] kasan_check_range+0x10c/0x1c0 [ 31.472542] __kasan_check_write+0x18/0x20 [ 31.472961] kasan_bitops_modify.constprop.0+0x548/0xd50 [ 31.473601] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 31.474026] ? __kmalloc_cache_noprof+0x184/0x410 [ 31.474584] ? trace_hardirqs_on+0x37/0xe0 [ 31.474903] ? kasan_bitops_generic+0x93/0x1c0 [ 31.475449] kasan_bitops_generic+0x117/0x1c0 [ 31.476029] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 31.476423] ? __pfx_read_tsc+0x10/0x10 [ 31.476911] ? ktime_get_ts64+0x86/0x230 [ 31.477236] kunit_try_run_case+0x1b3/0x490 [ 31.477699] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.478067] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.478624] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.479187] ? __kthread_parkme+0x82/0x160 [ 31.479500] ? preempt_count_sub+0x50/0x80 [ 31.480151] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.480618] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.481029] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.481817] kthread+0x257/0x310 [ 31.482270] ? __pfx_kthread+0x10/0x10 [ 31.482656] ret_from_fork+0x41/0x80 [ 31.483176] ? __pfx_kthread+0x10/0x10 [ 31.483539] ret_from_fork_asm+0x1a/0x30 [ 31.484181] </TASK> [ 31.484398] [ 31.484559] Allocated by task 268: [ 31.484831] kasan_save_stack+0x3d/0x60 [ 31.485117] kasan_save_track+0x18/0x40 [ 31.485572] kasan_save_alloc_info+0x3b/0x50 [ 31.486124] __kasan_kmalloc+0xb7/0xc0 [ 31.486953] __kmalloc_cache_noprof+0x184/0x410 [ 31.487665] kasan_bitops_generic+0x93/0x1c0 [ 31.488925] kunit_try_run_case+0x1b3/0x490 [ 31.489217] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.489470] kthread+0x257/0x310 [ 31.489634] ret_from_fork+0x41/0x80 [ 31.490313] ret_from_fork_asm+0x1a/0x30 [ 31.491051] [ 31.491417] The buggy address belongs to the object at ffff8881025ed7e0 [ 31.491417] which belongs to the cache kmalloc-16 of size 16 [ 31.492739] The buggy address is located 8 bytes inside of [ 31.492739] allocated 9-byte region [ffff8881025ed7e0, ffff8881025ed7e9) [ 31.493932] [ 31.494257] The buggy address belongs to the physical page: [ 31.494823] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ed [ 31.495751] flags: 0x200000000000000(node=0|zone=2) [ 31.496294] page_type: f5(slab) [ 31.496741] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 31.497491] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 31.498354] page dumped because: kasan: bad access detected [ 31.498789] [ 31.499181] Memory state around the buggy address: [ 31.499721] ffff8881025ed680: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 31.500472] ffff8881025ed700: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 31.501303] >ffff8881025ed780: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 31.502083] ^ [ 31.502579] ffff8881025ed800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.503451] ffff8881025ed880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.504266] ==================================================================