Date
Dec. 5, 2024, 2:07 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 33.956599] ================================================================== [ 33.958251] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa44/0xbc8 [ 33.959280] Read of size 8 at addr fff00000c61b4368 by task kunit_try_catch/250 [ 33.959977] [ 33.960274] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 33.961435] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.962094] Hardware name: linux,dummy-virt (DT) [ 33.962784] Call trace: [ 33.963191] show_stack+0x20/0x38 (C) [ 33.963772] dump_stack_lvl+0x8c/0xd0 [ 33.964399] print_report+0x118/0x5e0 [ 33.964970] kasan_report+0xc8/0x118 [ 33.965457] __asan_report_load8_noabort+0x20/0x30 [ 33.966182] kasan_bitops_test_and_modify.constprop.0+0xa44/0xbc8 [ 33.967141] kasan_bitops_generic+0x11c/0x1c8 [ 33.967804] kunit_try_run_case+0x14c/0x3d0 [ 33.968564] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.969230] kthread+0x24c/0x2d0 [ 33.969833] ret_from_fork+0x10/0x20 [ 33.970424] [ 33.970824] Allocated by task 250: [ 33.971427] kasan_save_stack+0x3c/0x68 [ 33.972034] kasan_save_track+0x20/0x40 [ 33.972525] kasan_save_alloc_info+0x40/0x58 [ 33.973243] __kasan_kmalloc+0xd4/0xd8 [ 33.973804] __kmalloc_cache_noprof+0x15c/0x3c0 [ 33.974651] kasan_bitops_generic+0xa0/0x1c8 [ 33.975252] kunit_try_run_case+0x14c/0x3d0 [ 33.975928] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.976634] kthread+0x24c/0x2d0 [ 33.977221] ret_from_fork+0x10/0x20 [ 33.977685] [ 33.978079] The buggy address belongs to the object at fff00000c61b4360 [ 33.978079] which belongs to the cache kmalloc-16 of size 16 [ 33.979488] The buggy address is located 8 bytes inside of [ 33.979488] allocated 9-byte region [fff00000c61b4360, fff00000c61b4369) [ 33.980823] [ 33.981145] The buggy address belongs to the physical page: [ 33.981935] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061b4 [ 33.982858] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.983675] page_type: f5(slab) [ 33.984206] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 33.985165] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 33.986071] page dumped because: kasan: bad access detected [ 33.986756] [ 33.987154] Memory state around the buggy address: [ 33.987937] fff00000c61b4200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 33.988596] fff00000c61b4280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 33.989486] >fff00000c61b4300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 33.990265] ^ [ 33.991162] fff00000c61b4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.992092] fff00000c61b4400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.992977] ================================================================== [ 33.919085] ================================================================== [ 33.919853] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x334/0xbc8 [ 33.920861] Write of size 8 at addr fff00000c61b4368 by task kunit_try_catch/250 [ 33.921646] [ 33.922122] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 33.923307] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.923856] Hardware name: linux,dummy-virt (DT) [ 33.924430] Call trace: [ 33.924977] show_stack+0x20/0x38 (C) [ 33.925548] dump_stack_lvl+0x8c/0xd0 [ 33.926183] print_report+0x118/0x5e0 [ 33.926745] kasan_report+0xc8/0x118 [ 33.927408] kasan_check_range+0x100/0x1a8 [ 33.928012] __kasan_check_write+0x20/0x30 [ 33.928658] kasan_bitops_test_and_modify.constprop.0+0x334/0xbc8 [ 33.929386] kasan_bitops_generic+0x11c/0x1c8 [ 33.930141] kunit_try_run_case+0x14c/0x3d0 [ 33.930784] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.931599] kthread+0x24c/0x2d0 [ 33.932198] ret_from_fork+0x10/0x20 [ 33.932849] [ 33.933163] Allocated by task 250: [ 33.933767] kasan_save_stack+0x3c/0x68 [ 33.934425] kasan_save_track+0x20/0x40 [ 33.935027] kasan_save_alloc_info+0x40/0x58 [ 33.935625] __kasan_kmalloc+0xd4/0xd8 [ 33.936193] __kmalloc_cache_noprof+0x15c/0x3c0 [ 33.936862] kasan_bitops_generic+0xa0/0x1c8 [ 33.937348] kunit_try_run_case+0x14c/0x3d0 [ 33.938029] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.938765] kthread+0x24c/0x2d0 [ 33.939249] ret_from_fork+0x10/0x20 [ 33.939765] [ 33.940149] The buggy address belongs to the object at fff00000c61b4360 [ 33.940149] which belongs to the cache kmalloc-16 of size 16 [ 33.941555] The buggy address is located 8 bytes inside of [ 33.941555] allocated 9-byte region [fff00000c61b4360, fff00000c61b4369) [ 33.942964] [ 33.943412] The buggy address belongs to the physical page: [ 33.944106] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061b4 [ 33.944960] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.945818] page_type: f5(slab) [ 33.946353] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 33.947284] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 33.948161] page dumped because: kasan: bad access detected [ 33.948779] [ 33.949141] Memory state around the buggy address: [ 33.949660] fff00000c61b4200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 33.950709] fff00000c61b4280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 33.951549] >fff00000c61b4300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 33.952379] ^ [ 33.953136] fff00000c61b4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.954065] fff00000c61b4400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.954978] ================================================================== [ 33.880421] ================================================================== [ 33.881297] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xad4/0xbc8 [ 33.883487] Read of size 8 at addr fff00000c61b4368 by task kunit_try_catch/250 [ 33.884535] [ 33.885011] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 33.886457] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.887044] Hardware name: linux,dummy-virt (DT) [ 33.887716] Call trace: [ 33.888098] show_stack+0x20/0x38 (C) [ 33.888728] dump_stack_lvl+0x8c/0xd0 [ 33.889289] print_report+0x118/0x5e0 [ 33.889913] kasan_report+0xc8/0x118 [ 33.890449] __asan_report_load8_noabort+0x20/0x30 [ 33.891230] kasan_bitops_test_and_modify.constprop.0+0xad4/0xbc8 [ 33.891911] kasan_bitops_generic+0x11c/0x1c8 [ 33.892720] kunit_try_run_case+0x14c/0x3d0 [ 33.893368] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.894151] kthread+0x24c/0x2d0 [ 33.894662] ret_from_fork+0x10/0x20 [ 33.895351] [ 33.895664] Allocated by task 250: [ 33.896206] kasan_save_stack+0x3c/0x68 [ 33.896773] kasan_save_track+0x20/0x40 [ 33.897290] kasan_save_alloc_info+0x40/0x58 [ 33.898012] __kasan_kmalloc+0xd4/0xd8 [ 33.898766] __kmalloc_cache_noprof+0x15c/0x3c0 [ 33.899668] kasan_bitops_generic+0xa0/0x1c8 [ 33.900084] kunit_try_run_case+0x14c/0x3d0 [ 33.900593] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.901311] kthread+0x24c/0x2d0 [ 33.901786] ret_from_fork+0x10/0x20 [ 33.902476] [ 33.902794] The buggy address belongs to the object at fff00000c61b4360 [ 33.902794] which belongs to the cache kmalloc-16 of size 16 [ 33.904118] The buggy address is located 8 bytes inside of [ 33.904118] allocated 9-byte region [fff00000c61b4360, fff00000c61b4369) [ 33.905426] [ 33.905792] The buggy address belongs to the physical page: [ 33.906529] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061b4 [ 33.907393] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.908334] page_type: f5(slab) [ 33.908827] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 33.909698] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 33.910726] page dumped because: kasan: bad access detected [ 33.911411] [ 33.911734] Memory state around the buggy address: [ 33.912456] fff00000c61b4200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 33.913283] fff00000c61b4280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 33.914252] >fff00000c61b4300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 33.915090] ^ [ 33.916027] fff00000c61b4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.916864] fff00000c61b4400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.917703] ================================================================== [ 33.994241] ================================================================== [ 33.995082] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa8c/0xbc8 [ 33.996264] Read of size 8 at addr fff00000c61b4368 by task kunit_try_catch/250 [ 33.997285] [ 33.997607] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 33.998833] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.999495] Hardware name: linux,dummy-virt (DT) [ 34.000142] Call trace: [ 34.000537] show_stack+0x20/0x38 (C) [ 34.001205] dump_stack_lvl+0x8c/0xd0 [ 34.001778] print_report+0x118/0x5e0 [ 34.002286] kasan_report+0xc8/0x118 [ 34.002988] __asan_report_load8_noabort+0x20/0x30 [ 34.003648] kasan_bitops_test_and_modify.constprop.0+0xa8c/0xbc8 [ 34.004668] kasan_bitops_generic+0x11c/0x1c8 [ 34.005306] kunit_try_run_case+0x14c/0x3d0 [ 34.005822] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.006665] kthread+0x24c/0x2d0 [ 34.007279] ret_from_fork+0x10/0x20 [ 34.007768] [ 34.008178] Allocated by task 250: [ 34.008719] kasan_save_stack+0x3c/0x68 [ 34.009516] kasan_save_track+0x20/0x40 [ 34.010047] kasan_save_alloc_info+0x40/0x58 [ 34.010800] __kasan_kmalloc+0xd4/0xd8 [ 34.011430] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.012079] kasan_bitops_generic+0xa0/0x1c8 [ 34.012633] kunit_try_run_case+0x14c/0x3d0 [ 34.013263] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.013974] kthread+0x24c/0x2d0 [ 34.014507] ret_from_fork+0x10/0x20 [ 34.015052] [ 34.015367] The buggy address belongs to the object at fff00000c61b4360 [ 34.015367] which belongs to the cache kmalloc-16 of size 16 [ 34.016804] The buggy address is located 8 bytes inside of [ 34.016804] allocated 9-byte region [fff00000c61b4360, fff00000c61b4369) [ 34.018220] [ 34.018594] The buggy address belongs to the physical page: [ 34.019413] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061b4 [ 34.020516] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.021428] page_type: f5(slab) [ 34.022020] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 34.022981] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 34.023861] page dumped because: kasan: bad access detected [ 34.024563] [ 34.024846] Memory state around the buggy address: [ 34.025531] fff00000c61b4200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.026363] fff00000c61b4280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.027293] >fff00000c61b4300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 34.028136] ^ [ 34.028954] fff00000c61b4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.029931] fff00000c61b4400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.030822] ================================================================== [ 33.723104] ================================================================== [ 33.724270] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa08/0xbc8 [ 33.725355] Read of size 8 at addr fff00000c61b4368 by task kunit_try_catch/250 [ 33.727199] [ 33.727563] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 33.728751] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.729306] Hardware name: linux,dummy-virt (DT) [ 33.729932] Call trace: [ 33.730410] show_stack+0x20/0x38 (C) [ 33.731004] dump_stack_lvl+0x8c/0xd0 [ 33.731625] print_report+0x118/0x5e0 [ 33.732233] kasan_report+0xc8/0x118 [ 33.732804] __asan_report_load8_noabort+0x20/0x30 [ 33.733464] kasan_bitops_test_and_modify.constprop.0+0xa08/0xbc8 [ 33.734205] kasan_bitops_generic+0x11c/0x1c8 [ 33.734861] kunit_try_run_case+0x14c/0x3d0 [ 33.735529] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.737136] kthread+0x24c/0x2d0 [ 33.737750] ret_from_fork+0x10/0x20 [ 33.738281] [ 33.738645] Allocated by task 250: [ 33.739109] kasan_save_stack+0x3c/0x68 [ 33.739755] kasan_save_track+0x20/0x40 [ 33.740576] kasan_save_alloc_info+0x40/0x58 [ 33.741366] __kasan_kmalloc+0xd4/0xd8 [ 33.742050] __kmalloc_cache_noprof+0x15c/0x3c0 [ 33.742653] kasan_bitops_generic+0xa0/0x1c8 [ 33.743237] kunit_try_run_case+0x14c/0x3d0 [ 33.744073] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.744929] kthread+0x24c/0x2d0 [ 33.745530] ret_from_fork+0x10/0x20 [ 33.746196] [ 33.746568] The buggy address belongs to the object at fff00000c61b4360 [ 33.746568] which belongs to the cache kmalloc-16 of size 16 [ 33.747887] The buggy address is located 8 bytes inside of [ 33.747887] allocated 9-byte region [fff00000c61b4360, fff00000c61b4369) [ 33.749350] [ 33.749727] The buggy address belongs to the physical page: [ 33.750468] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061b4 [ 33.751549] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.752605] page_type: f5(slab) [ 33.753197] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 33.754249] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 33.755210] page dumped because: kasan: bad access detected [ 33.755951] [ 33.756341] Memory state around the buggy address: [ 33.757060] fff00000c61b4200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 33.757986] fff00000c61b4280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 33.758982] >fff00000c61b4300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 33.759928] ^ [ 33.760651] fff00000c61b4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.761483] fff00000c61b4400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.762431] ================================================================== [ 33.763947] ================================================================== [ 33.764679] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc8 [ 33.765752] Write of size 8 at addr fff00000c61b4368 by task kunit_try_catch/250 [ 33.766856] [ 33.768161] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 33.769313] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.769802] Hardware name: linux,dummy-virt (DT) [ 33.770346] Call trace: [ 33.770711] show_stack+0x20/0x38 (C) [ 33.771324] dump_stack_lvl+0x8c/0xd0 [ 33.772012] print_report+0x118/0x5e0 [ 33.772593] kasan_report+0xc8/0x118 [ 33.773264] kasan_check_range+0x100/0x1a8 [ 33.773780] __kasan_check_write+0x20/0x30 [ 33.774490] kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc8 [ 33.775308] kasan_bitops_generic+0x11c/0x1c8 [ 33.775984] kunit_try_run_case+0x14c/0x3d0 [ 33.776613] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.777388] kthread+0x24c/0x2d0 [ 33.778067] ret_from_fork+0x10/0x20 [ 33.778668] [ 33.778994] Allocated by task 250: [ 33.779689] kasan_save_stack+0x3c/0x68 [ 33.780179] kasan_save_track+0x20/0x40 [ 33.780903] kasan_save_alloc_info+0x40/0x58 [ 33.781442] __kasan_kmalloc+0xd4/0xd8 [ 33.782064] __kmalloc_cache_noprof+0x15c/0x3c0 [ 33.782749] kasan_bitops_generic+0xa0/0x1c8 [ 33.783411] kunit_try_run_case+0x14c/0x3d0 [ 33.784037] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.784733] kthread+0x24c/0x2d0 [ 33.785252] ret_from_fork+0x10/0x20 [ 33.785790] [ 33.786130] The buggy address belongs to the object at fff00000c61b4360 [ 33.786130] which belongs to the cache kmalloc-16 of size 16 [ 33.787537] The buggy address is located 8 bytes inside of [ 33.787537] allocated 9-byte region [fff00000c61b4360, fff00000c61b4369) [ 33.788998] [ 33.789298] The buggy address belongs to the physical page: [ 33.790122] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061b4 [ 33.791002] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.791864] page_type: f5(slab) [ 33.792412] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 33.793366] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 33.794262] page dumped because: kasan: bad access detected [ 33.795033] [ 33.795331] Memory state around the buggy address: [ 33.795922] fff00000c61b4200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 33.796796] fff00000c61b4280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 33.797684] >fff00000c61b4300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 33.798571] ^ [ 33.799367] fff00000c61b4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.800248] fff00000c61b4400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.801144] ================================================================== [ 33.841720] ================================================================== [ 33.843112] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc8 [ 33.844142] Write of size 8 at addr fff00000c61b4368 by task kunit_try_catch/250 [ 33.845016] [ 33.845345] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 33.846563] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.847148] Hardware name: linux,dummy-virt (DT) [ 33.847798] Call trace: [ 33.848237] show_stack+0x20/0x38 (C) [ 33.849115] dump_stack_lvl+0x8c/0xd0 [ 33.849634] print_report+0x118/0x5e0 [ 33.850176] kasan_report+0xc8/0x118 [ 33.850894] kasan_check_range+0x100/0x1a8 [ 33.851482] __kasan_check_write+0x20/0x30 [ 33.852203] kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc8 [ 33.853043] kasan_bitops_generic+0x11c/0x1c8 [ 33.853749] kunit_try_run_case+0x14c/0x3d0 [ 33.854465] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.855224] kthread+0x24c/0x2d0 [ 33.855818] ret_from_fork+0x10/0x20 [ 33.856370] [ 33.856746] Allocated by task 250: [ 33.857276] kasan_save_stack+0x3c/0x68 [ 33.857810] kasan_save_track+0x20/0x40 [ 33.858474] kasan_save_alloc_info+0x40/0x58 [ 33.859100] __kasan_kmalloc+0xd4/0xd8 [ 33.859648] __kmalloc_cache_noprof+0x15c/0x3c0 [ 33.860275] kasan_bitops_generic+0xa0/0x1c8 [ 33.860929] kunit_try_run_case+0x14c/0x3d0 [ 33.861483] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.862270] kthread+0x24c/0x2d0 [ 33.862869] ret_from_fork+0x10/0x20 [ 33.863716] [ 33.864067] The buggy address belongs to the object at fff00000c61b4360 [ 33.864067] which belongs to the cache kmalloc-16 of size 16 [ 33.865472] The buggy address is located 8 bytes inside of [ 33.865472] allocated 9-byte region [fff00000c61b4360, fff00000c61b4369) [ 33.866868] [ 33.867174] The buggy address belongs to the physical page: [ 33.867993] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061b4 [ 33.868836] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.869717] page_type: f5(slab) [ 33.870225] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 33.871254] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 33.872224] page dumped because: kasan: bad access detected [ 33.872891] [ 33.873235] Memory state around the buggy address: [ 33.873861] fff00000c61b4200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 33.874705] fff00000c61b4280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 33.875609] >fff00000c61b4300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 33.876449] ^ [ 33.877224] fff00000c61b4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.878201] fff00000c61b4400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.879038] ================================================================== [ 33.684789] ================================================================== [ 33.686067] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc8 [ 33.687083] Write of size 8 at addr fff00000c61b4368 by task kunit_try_catch/250 [ 33.687825] [ 33.688219] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 33.689225] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.689852] Hardware name: linux,dummy-virt (DT) [ 33.690606] Call trace: [ 33.691032] show_stack+0x20/0x38 (C) [ 33.691607] dump_stack_lvl+0x8c/0xd0 [ 33.692203] print_report+0x118/0x5e0 [ 33.692768] kasan_report+0xc8/0x118 [ 33.693333] kasan_check_range+0x100/0x1a8 [ 33.693861] __kasan_check_write+0x20/0x30 [ 33.694402] kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc8 [ 33.695399] kasan_bitops_generic+0x11c/0x1c8 [ 33.696174] kunit_try_run_case+0x14c/0x3d0 [ 33.697045] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.697707] kthread+0x24c/0x2d0 [ 33.698380] ret_from_fork+0x10/0x20 [ 33.699088] [ 33.699423] Allocated by task 250: [ 33.699845] kasan_save_stack+0x3c/0x68 [ 33.700541] kasan_save_track+0x20/0x40 [ 33.701132] kasan_save_alloc_info+0x40/0x58 [ 33.701712] __kasan_kmalloc+0xd4/0xd8 [ 33.702354] __kmalloc_cache_noprof+0x15c/0x3c0 [ 33.703105] kasan_bitops_generic+0xa0/0x1c8 [ 33.703759] kunit_try_run_case+0x14c/0x3d0 [ 33.704383] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.705092] kthread+0x24c/0x2d0 [ 33.705582] ret_from_fork+0x10/0x20 [ 33.706128] [ 33.706515] The buggy address belongs to the object at fff00000c61b4360 [ 33.706515] which belongs to the cache kmalloc-16 of size 16 [ 33.707909] The buggy address is located 8 bytes inside of [ 33.707909] allocated 9-byte region [fff00000c61b4360, fff00000c61b4369) [ 33.709284] [ 33.709605] The buggy address belongs to the physical page: [ 33.710426] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061b4 [ 33.711357] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.712182] page_type: f5(slab) [ 33.712652] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 33.713553] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 33.714513] page dumped because: kasan: bad access detected [ 33.715192] [ 33.715505] Memory state around the buggy address: [ 33.716152] fff00000c61b4200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 33.717014] fff00000c61b4280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 33.717852] >fff00000c61b4300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 33.718720] ^ [ 33.719625] fff00000c61b4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.720505] fff00000c61b4400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.721378] ================================================================== [ 33.802524] ================================================================== [ 33.803630] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa50/0xbc8 [ 33.804966] Read of size 8 at addr fff00000c61b4368 by task kunit_try_catch/250 [ 33.806305] [ 33.806729] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 33.808111] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.808642] Hardware name: linux,dummy-virt (DT) [ 33.809249] Call trace: [ 33.809627] show_stack+0x20/0x38 (C) [ 33.810422] dump_stack_lvl+0x8c/0xd0 [ 33.811246] print_report+0x118/0x5e0 [ 33.811790] kasan_report+0xc8/0x118 [ 33.812441] __asan_report_load8_noabort+0x20/0x30 [ 33.813118] kasan_bitops_test_and_modify.constprop.0+0xa50/0xbc8 [ 33.813950] kasan_bitops_generic+0x11c/0x1c8 [ 33.814682] kunit_try_run_case+0x14c/0x3d0 [ 33.815316] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.816085] kthread+0x24c/0x2d0 [ 33.816688] ret_from_fork+0x10/0x20 [ 33.817182] [ 33.817566] Allocated by task 250: [ 33.818193] kasan_save_stack+0x3c/0x68 [ 33.818773] kasan_save_track+0x20/0x40 [ 33.819260] kasan_save_alloc_info+0x40/0x58 [ 33.820026] __kasan_kmalloc+0xd4/0xd8 [ 33.820732] __kmalloc_cache_noprof+0x15c/0x3c0 [ 33.821349] kasan_bitops_generic+0xa0/0x1c8 [ 33.822081] kunit_try_run_case+0x14c/0x3d0 [ 33.822675] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.823374] kthread+0x24c/0x2d0 [ 33.824028] ret_from_fork+0x10/0x20 [ 33.824567] [ 33.825004] The buggy address belongs to the object at fff00000c61b4360 [ 33.825004] which belongs to the cache kmalloc-16 of size 16 [ 33.826434] The buggy address is located 8 bytes inside of [ 33.826434] allocated 9-byte region [fff00000c61b4360, fff00000c61b4369) [ 33.827866] [ 33.828184] The buggy address belongs to the physical page: [ 33.828980] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061b4 [ 33.829806] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.830728] page_type: f5(slab) [ 33.831166] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 33.832151] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 33.833139] page dumped because: kasan: bad access detected [ 33.833823] [ 33.834199] Memory state around the buggy address: [ 33.834836] fff00000c61b4200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 33.835659] fff00000c61b4280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 33.836544] >fff00000c61b4300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 33.837471] ^ [ 33.838287] fff00000c61b4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.839158] fff00000c61b4400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.839979] ==================================================================
[ 31.593236] ================================================================== [ 31.595120] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90 [ 31.597813] Write of size 8 at addr ffff8881025ed7e8 by task kunit_try_catch/268 [ 31.598671] [ 31.598989] CPU: 1 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 31.600357] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.600744] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.601647] Call Trace: [ 31.602173] <TASK> [ 31.602516] dump_stack_lvl+0x73/0xb0 [ 31.603165] print_report+0xd1/0x640 [ 31.603633] ? __virt_addr_valid+0x1db/0x2d0 [ 31.604246] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.604973] kasan_report+0x102/0x140 [ 31.605445] ? kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90 [ 31.606521] ? kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90 [ 31.607295] kasan_check_range+0x10c/0x1c0 [ 31.608228] __kasan_check_write+0x18/0x20 [ 31.608639] kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90 [ 31.609593] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 31.610330] ? __kmalloc_cache_noprof+0x184/0x410 [ 31.611378] ? trace_hardirqs_on+0x37/0xe0 [ 31.611782] ? kasan_bitops_generic+0x93/0x1c0 [ 31.612767] kasan_bitops_generic+0x122/0x1c0 [ 31.613295] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 31.613806] ? __pfx_read_tsc+0x10/0x10 [ 31.614219] ? ktime_get_ts64+0x86/0x230 [ 31.614659] kunit_try_run_case+0x1b3/0x490 [ 31.615027] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.615543] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.615993] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.616456] ? __kthread_parkme+0x82/0x160 [ 31.617086] ? preempt_count_sub+0x50/0x80 [ 31.617502] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.618083] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.618634] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.619378] kthread+0x257/0x310 [ 31.619927] ? __pfx_kthread+0x10/0x10 [ 31.620228] ret_from_fork+0x41/0x80 [ 31.620816] ? __pfx_kthread+0x10/0x10 [ 31.621228] ret_from_fork_asm+0x1a/0x30 [ 31.621646] </TASK> [ 31.622061] [ 31.622271] Allocated by task 268: [ 31.622705] kasan_save_stack+0x3d/0x60 [ 31.623221] kasan_save_track+0x18/0x40 [ 31.623657] kasan_save_alloc_info+0x3b/0x50 [ 31.624322] __kasan_kmalloc+0xb7/0xc0 [ 31.624744] __kmalloc_cache_noprof+0x184/0x410 [ 31.625388] kasan_bitops_generic+0x93/0x1c0 [ 31.625899] kunit_try_run_case+0x1b3/0x490 [ 31.626486] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.626936] kthread+0x257/0x310 [ 31.627429] ret_from_fork+0x41/0x80 [ 31.627860] ret_from_fork_asm+0x1a/0x30 [ 31.628393] [ 31.628600] The buggy address belongs to the object at ffff8881025ed7e0 [ 31.628600] which belongs to the cache kmalloc-16 of size 16 [ 31.630651] The buggy address is located 8 bytes inside of [ 31.630651] allocated 9-byte region [ffff8881025ed7e0, ffff8881025ed7e9) [ 31.632459] [ 31.632768] The buggy address belongs to the physical page: [ 31.633369] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ed [ 31.634059] flags: 0x200000000000000(node=0|zone=2) [ 31.635340] page_type: f5(slab) [ 31.635975] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 31.636988] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 31.638225] page dumped because: kasan: bad access detected [ 31.638696] [ 31.638971] Memory state around the buggy address: [ 31.639521] ffff8881025ed680: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 31.640791] ffff8881025ed700: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 31.642221] >ffff8881025ed780: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 31.642788] ^ [ 31.643501] ffff8881025ed800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.644639] ffff8881025ed880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.645839] ================================================================== [ 31.815268] ================================================================== [ 31.815927] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90 [ 31.816968] Write of size 8 at addr ffff8881025ed7e8 by task kunit_try_catch/268 [ 31.817636] [ 31.818098] CPU: 1 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 31.819142] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.819847] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.820593] Call Trace: [ 31.820926] <TASK> [ 31.821233] dump_stack_lvl+0x73/0xb0 [ 31.821842] print_report+0xd1/0x640 [ 31.822456] ? __virt_addr_valid+0x1db/0x2d0 [ 31.823061] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.823432] kasan_report+0x102/0x140 [ 31.824179] ? kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90 [ 31.824971] ? kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90 [ 31.825819] kasan_check_range+0x10c/0x1c0 [ 31.826340] __kasan_check_write+0x18/0x20 [ 31.826978] kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90 [ 31.827645] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 31.829621] ? __kmalloc_cache_noprof+0x184/0x410 [ 31.831228] ? trace_hardirqs_on+0x37/0xe0 [ 31.832536] ? kasan_bitops_generic+0x93/0x1c0 [ 31.833491] kasan_bitops_generic+0x122/0x1c0 [ 31.834413] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 31.835676] ? __pfx_read_tsc+0x10/0x10 [ 31.836905] ? ktime_get_ts64+0x86/0x230 [ 31.837196] kunit_try_run_case+0x1b3/0x490 [ 31.837509] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.838952] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.840561] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.842206] ? __kthread_parkme+0x82/0x160 [ 31.843533] ? preempt_count_sub+0x50/0x80 [ 31.845290] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.845622] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.846024] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.846376] kthread+0x257/0x310 [ 31.846643] ? __pfx_kthread+0x10/0x10 [ 31.849003] ret_from_fork+0x41/0x80 [ 31.850153] ? __pfx_kthread+0x10/0x10 [ 31.851152] ret_from_fork_asm+0x1a/0x30 [ 31.852617] </TASK> [ 31.853601] [ 31.854408] Allocated by task 268: [ 31.855152] kasan_save_stack+0x3d/0x60 [ 31.856865] kasan_save_track+0x18/0x40 [ 31.857706] kasan_save_alloc_info+0x3b/0x50 [ 31.859122] __kasan_kmalloc+0xb7/0xc0 [ 31.860176] __kmalloc_cache_noprof+0x184/0x410 [ 31.861505] kasan_bitops_generic+0x93/0x1c0 [ 31.862228] kunit_try_run_case+0x1b3/0x490 [ 31.862771] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.863221] kthread+0x257/0x310 [ 31.863653] ret_from_fork+0x41/0x80 [ 31.864404] ret_from_fork_asm+0x1a/0x30 [ 31.865856] [ 31.866102] The buggy address belongs to the object at ffff8881025ed7e0 [ 31.866102] which belongs to the cache kmalloc-16 of size 16 [ 31.866660] The buggy address is located 8 bytes inside of [ 31.866660] allocated 9-byte region [ffff8881025ed7e0, ffff8881025ed7e9) [ 31.869971] [ 31.870423] The buggy address belongs to the physical page: [ 31.871657] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ed [ 31.873337] flags: 0x200000000000000(node=0|zone=2) [ 31.874754] page_type: f5(slab) [ 31.875054] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 31.875490] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 31.877233] page dumped because: kasan: bad access detected [ 31.878858] [ 31.880107] Memory state around the buggy address: [ 31.881363] ffff8881025ed680: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 31.882641] ffff8881025ed700: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 31.884116] >ffff8881025ed780: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 31.885016] ^ [ 31.885893] ffff8881025ed800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.886326] ffff8881025ed880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.887015] ================================================================== [ 31.944218] ================================================================== [ 31.945314] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90 [ 31.946113] Read of size 8 at addr ffff8881025ed7e8 by task kunit_try_catch/268 [ 31.946979] [ 31.947266] CPU: 1 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 31.948862] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.949495] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.950329] Call Trace: [ 31.950628] <TASK> [ 31.951170] dump_stack_lvl+0x73/0xb0 [ 31.952075] print_report+0xd1/0x640 [ 31.952576] ? __virt_addr_valid+0x1db/0x2d0 [ 31.953108] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.953661] kasan_report+0x102/0x140 [ 31.954073] ? kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90 [ 31.954637] ? kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90 [ 31.955626] __asan_report_load8_noabort+0x18/0x20 [ 31.956162] kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90 [ 31.956868] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 31.957514] ? __kmalloc_cache_noprof+0x184/0x410 [ 31.958245] ? trace_hardirqs_on+0x37/0xe0 [ 31.958659] ? kasan_bitops_generic+0x93/0x1c0 [ 31.959373] kasan_bitops_generic+0x122/0x1c0 [ 31.959595] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 31.960251] ? __pfx_read_tsc+0x10/0x10 [ 31.960552] ? ktime_get_ts64+0x86/0x230 [ 31.961051] kunit_try_run_case+0x1b3/0x490 [ 31.961537] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.962113] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.962640] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.963257] ? __kthread_parkme+0x82/0x160 [ 31.963718] ? preempt_count_sub+0x50/0x80 [ 31.964219] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.964670] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.965450] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.966040] kthread+0x257/0x310 [ 31.966482] ? __pfx_kthread+0x10/0x10 [ 31.966933] ret_from_fork+0x41/0x80 [ 31.967444] ? __pfx_kthread+0x10/0x10 [ 31.967924] ret_from_fork_asm+0x1a/0x30 [ 31.968506] </TASK> [ 31.968929] [ 31.969092] Allocated by task 268: [ 31.969535] kasan_save_stack+0x3d/0x60 [ 31.970063] kasan_save_track+0x18/0x40 [ 31.970616] kasan_save_alloc_info+0x3b/0x50 [ 31.971135] __kasan_kmalloc+0xb7/0xc0 [ 31.971660] __kmalloc_cache_noprof+0x184/0x410 [ 31.972190] kasan_bitops_generic+0x93/0x1c0 [ 31.972814] kunit_try_run_case+0x1b3/0x490 [ 31.973359] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.973960] kthread+0x257/0x310 [ 31.974445] ret_from_fork+0x41/0x80 [ 31.974941] ret_from_fork_asm+0x1a/0x30 [ 31.975385] [ 31.975720] The buggy address belongs to the object at ffff8881025ed7e0 [ 31.975720] which belongs to the cache kmalloc-16 of size 16 [ 31.976656] The buggy address is located 8 bytes inside of [ 31.976656] allocated 9-byte region [ffff8881025ed7e0, ffff8881025ed7e9) [ 31.977893] [ 31.978199] The buggy address belongs to the physical page: [ 31.978886] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ed [ 31.979705] flags: 0x200000000000000(node=0|zone=2) [ 31.980244] page_type: f5(slab) [ 31.980607] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 31.981372] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 31.982182] page dumped because: kasan: bad access detected [ 31.982609] [ 31.982961] Memory state around the buggy address: [ 31.983415] ffff8881025ed680: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 31.984233] ffff8881025ed700: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 31.984985] >ffff8881025ed780: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 31.985611] ^ [ 31.986260] ffff8881025ed800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.986935] ffff8881025ed880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.987639] ================================================================== [ 31.889080] ================================================================== [ 31.889948] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x558/0xd90 [ 31.891043] Read of size 8 at addr ffff8881025ed7e8 by task kunit_try_catch/268 [ 31.892209] [ 31.892497] CPU: 1 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 31.893615] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.894230] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.895169] Call Trace: [ 31.895813] <TASK> [ 31.896245] dump_stack_lvl+0x73/0xb0 [ 31.896537] print_report+0xd1/0x640 [ 31.896882] ? __virt_addr_valid+0x1db/0x2d0 [ 31.897457] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.897888] kasan_report+0x102/0x140 [ 31.898415] ? kasan_bitops_test_and_modify.constprop.0+0x558/0xd90 [ 31.899301] ? kasan_bitops_test_and_modify.constprop.0+0x558/0xd90 [ 31.899794] kasan_check_range+0x10c/0x1c0 [ 31.900417] __kasan_check_read+0x15/0x20 [ 31.901049] kasan_bitops_test_and_modify.constprop.0+0x558/0xd90 [ 31.901857] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 31.902479] ? __kmalloc_cache_noprof+0x184/0x410 [ 31.903401] ? trace_hardirqs_on+0x37/0xe0 [ 31.903813] ? kasan_bitops_generic+0x93/0x1c0 [ 31.904402] kasan_bitops_generic+0x122/0x1c0 [ 31.905298] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 31.905653] ? __pfx_read_tsc+0x10/0x10 [ 31.906087] ? ktime_get_ts64+0x86/0x230 [ 31.906558] kunit_try_run_case+0x1b3/0x490 [ 31.906906] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.907494] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.908142] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.908660] ? __kthread_parkme+0x82/0x160 [ 31.908970] ? preempt_count_sub+0x50/0x80 [ 31.909575] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.910399] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.911034] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.911661] kthread+0x257/0x310 [ 31.912194] ? __pfx_kthread+0x10/0x10 [ 31.912609] ret_from_fork+0x41/0x80 [ 31.913403] ? __pfx_kthread+0x10/0x10 [ 31.913934] ret_from_fork_asm+0x1a/0x30 [ 31.914655] </TASK> [ 31.915991] [ 31.916148] Allocated by task 268: [ 31.916365] kasan_save_stack+0x3d/0x60 [ 31.916627] kasan_save_track+0x18/0x40 [ 31.916909] kasan_save_alloc_info+0x3b/0x50 [ 31.917185] __kasan_kmalloc+0xb7/0xc0 [ 31.917424] __kmalloc_cache_noprof+0x184/0x410 [ 31.919934] kasan_bitops_generic+0x93/0x1c0 [ 31.920922] kunit_try_run_case+0x1b3/0x490 [ 31.922500] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.924051] kthread+0x257/0x310 [ 31.924927] ret_from_fork+0x41/0x80 [ 31.925116] ret_from_fork_asm+0x1a/0x30 [ 31.925302] [ 31.925405] The buggy address belongs to the object at ffff8881025ed7e0 [ 31.925405] which belongs to the cache kmalloc-16 of size 16 [ 31.927558] The buggy address is located 8 bytes inside of [ 31.927558] allocated 9-byte region [ffff8881025ed7e0, ffff8881025ed7e9) [ 31.929221] [ 31.929825] The buggy address belongs to the physical page: [ 31.930662] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ed [ 31.931419] flags: 0x200000000000000(node=0|zone=2) [ 31.932101] page_type: f5(slab) [ 31.932629] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 31.933647] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 31.934590] page dumped because: kasan: bad access detected [ 31.935739] [ 31.936142] Memory state around the buggy address: [ 31.936824] ffff8881025ed680: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 31.937766] ffff8881025ed700: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 31.938722] >ffff8881025ed780: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 31.939677] ^ [ 31.940362] ffff8881025ed800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.941392] ffff8881025ed880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.942290] ================================================================== [ 31.699203] ================================================================== [ 31.699929] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90 [ 31.701165] Write of size 8 at addr ffff8881025ed7e8 by task kunit_try_catch/268 [ 31.702290] [ 31.702500] CPU: 1 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 31.703915] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.704540] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.705641] Call Trace: [ 31.705933] <TASK> [ 31.706531] dump_stack_lvl+0x73/0xb0 [ 31.707396] print_report+0xd1/0x640 [ 31.707832] ? __virt_addr_valid+0x1db/0x2d0 [ 31.708817] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.709395] kasan_report+0x102/0x140 [ 31.709987] ? kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90 [ 31.710585] ? kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90 [ 31.711228] kasan_check_range+0x10c/0x1c0 [ 31.711437] __kasan_check_write+0x18/0x20 [ 31.711628] kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90 [ 31.712417] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 31.713175] ? __kmalloc_cache_noprof+0x184/0x410 [ 31.713665] ? trace_hardirqs_on+0x37/0xe0 [ 31.714148] ? kasan_bitops_generic+0x93/0x1c0 [ 31.714564] kasan_bitops_generic+0x122/0x1c0 [ 31.715078] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 31.715818] ? __pfx_read_tsc+0x10/0x10 [ 31.716293] ? ktime_get_ts64+0x86/0x230 [ 31.716703] kunit_try_run_case+0x1b3/0x490 [ 31.717257] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.717747] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.718310] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.718941] ? __kthread_parkme+0x82/0x160 [ 31.719341] ? preempt_count_sub+0x50/0x80 [ 31.719918] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.720453] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.721096] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.721655] kthread+0x257/0x310 [ 31.722152] ? __pfx_kthread+0x10/0x10 [ 31.722655] ret_from_fork+0x41/0x80 [ 31.723072] ? __pfx_kthread+0x10/0x10 [ 31.723566] ret_from_fork_asm+0x1a/0x30 [ 31.724112] </TASK> [ 31.724434] [ 31.724713] Allocated by task 268: [ 31.725224] kasan_save_stack+0x3d/0x60 [ 31.725752] kasan_save_track+0x18/0x40 [ 31.726326] kasan_save_alloc_info+0x3b/0x50 [ 31.726907] __kasan_kmalloc+0xb7/0xc0 [ 31.727326] __kmalloc_cache_noprof+0x184/0x410 [ 31.727731] kasan_bitops_generic+0x93/0x1c0 [ 31.728358] kunit_try_run_case+0x1b3/0x490 [ 31.728849] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.729448] kthread+0x257/0x310 [ 31.730016] ret_from_fork+0x41/0x80 [ 31.730460] ret_from_fork_asm+0x1a/0x30 [ 31.730916] [ 31.731183] The buggy address belongs to the object at ffff8881025ed7e0 [ 31.731183] which belongs to the cache kmalloc-16 of size 16 [ 31.732255] The buggy address is located 8 bytes inside of [ 31.732255] allocated 9-byte region [ffff8881025ed7e0, ffff8881025ed7e9) [ 31.733485] [ 31.733759] The buggy address belongs to the physical page: [ 31.734385] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ed [ 31.735099] flags: 0x200000000000000(node=0|zone=2) [ 31.736378] page_type: f5(slab) [ 31.736778] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 31.737853] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 31.738939] page dumped because: kasan: bad access detected [ 31.739440] [ 31.739659] Memory state around the buggy address: [ 31.740507] ffff8881025ed680: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 31.741194] ffff8881025ed700: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 31.741835] >ffff8881025ed780: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 31.742423] ^ [ 31.743139] ffff8881025ed800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.744627] ffff8881025ed880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.745017] ================================================================== [ 31.506043] ================================================================== [ 31.506749] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x102/0xd90 [ 31.507788] Write of size 8 at addr ffff8881025ed7e8 by task kunit_try_catch/268 [ 31.508456] [ 31.508761] CPU: 1 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 31.509597] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.510219] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.511043] Call Trace: [ 31.511286] <TASK> [ 31.511662] dump_stack_lvl+0x73/0xb0 [ 31.512079] print_report+0xd1/0x640 [ 31.512532] ? __virt_addr_valid+0x1db/0x2d0 [ 31.513075] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.513773] kasan_report+0x102/0x140 [ 31.514259] ? kasan_bitops_test_and_modify.constprop.0+0x102/0xd90 [ 31.514983] ? kasan_bitops_test_and_modify.constprop.0+0x102/0xd90 [ 31.515534] kasan_check_range+0x10c/0x1c0 [ 31.516091] __kasan_check_write+0x18/0x20 [ 31.516494] kasan_bitops_test_and_modify.constprop.0+0x102/0xd90 [ 31.517102] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 31.517873] ? __kmalloc_cache_noprof+0x184/0x410 [ 31.518301] ? trace_hardirqs_on+0x37/0xe0 [ 31.518828] ? kasan_bitops_generic+0x93/0x1c0 [ 31.519440] kasan_bitops_generic+0x122/0x1c0 [ 31.520171] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 31.520581] ? __pfx_read_tsc+0x10/0x10 [ 31.521177] ? ktime_get_ts64+0x86/0x230 [ 31.521590] kunit_try_run_case+0x1b3/0x490 [ 31.522029] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.522870] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.523958] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.524455] ? __kthread_parkme+0x82/0x160 [ 31.525226] ? preempt_count_sub+0x50/0x80 [ 31.525627] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.526162] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.526666] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.527525] kthread+0x257/0x310 [ 31.528119] ? __pfx_kthread+0x10/0x10 [ 31.528657] ret_from_fork+0x41/0x80 [ 31.529094] ? __pfx_kthread+0x10/0x10 [ 31.529466] ret_from_fork_asm+0x1a/0x30 [ 31.529893] </TASK> [ 31.530609] [ 31.530776] Allocated by task 268: [ 31.531156] kasan_save_stack+0x3d/0x60 [ 31.532021] kasan_save_track+0x18/0x40 [ 31.532426] kasan_save_alloc_info+0x3b/0x50 [ 31.532896] __kasan_kmalloc+0xb7/0xc0 [ 31.533281] __kmalloc_cache_noprof+0x184/0x410 [ 31.534385] kasan_bitops_generic+0x93/0x1c0 [ 31.535097] kunit_try_run_case+0x1b3/0x490 [ 31.535817] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.536584] kthread+0x257/0x310 [ 31.537326] ret_from_fork+0x41/0x80 [ 31.538086] ret_from_fork_asm+0x1a/0x30 [ 31.538290] [ 31.538390] The buggy address belongs to the object at ffff8881025ed7e0 [ 31.538390] which belongs to the cache kmalloc-16 of size 16 [ 31.538919] The buggy address is located 8 bytes inside of [ 31.538919] allocated 9-byte region [ffff8881025ed7e0, ffff8881025ed7e9) [ 31.540505] [ 31.540676] The buggy address belongs to the physical page: [ 31.541357] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ed [ 31.542653] flags: 0x200000000000000(node=0|zone=2) [ 31.543203] page_type: f5(slab) [ 31.543657] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 31.544372] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 31.545046] page dumped because: kasan: bad access detected [ 31.545603] [ 31.545922] Memory state around the buggy address: [ 31.546408] ffff8881025ed680: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 31.547127] ffff8881025ed700: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 31.547949] >ffff8881025ed780: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 31.548556] ^ [ 31.549240] ffff8881025ed800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.549973] ffff8881025ed880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.550663] ================================================================== [ 31.748034] ================================================================== [ 31.751127] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90 [ 31.752150] Write of size 8 at addr ffff8881025ed7e8 by task kunit_try_catch/268 [ 31.752547] [ 31.752742] CPU: 1 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 31.756578] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.758171] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.760521] Call Trace: [ 31.761578] <TASK> [ 31.761801] dump_stack_lvl+0x73/0xb0 [ 31.762090] print_report+0xd1/0x640 [ 31.762370] ? __virt_addr_valid+0x1db/0x2d0 [ 31.762708] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.765263] kasan_report+0x102/0x140 [ 31.766494] ? kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90 [ 31.768429] ? kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90 [ 31.770084] kasan_check_range+0x10c/0x1c0 [ 31.771562] __kasan_check_write+0x18/0x20 [ 31.772181] kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90 [ 31.772676] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 31.773295] ? __kmalloc_cache_noprof+0x184/0x410 [ 31.774126] ? trace_hardirqs_on+0x37/0xe0 [ 31.774414] ? kasan_bitops_generic+0x93/0x1c0 [ 31.774745] kasan_bitops_generic+0x122/0x1c0 [ 31.777261] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 31.779069] ? __pfx_read_tsc+0x10/0x10 [ 31.780534] ? ktime_get_ts64+0x86/0x230 [ 31.782050] kunit_try_run_case+0x1b3/0x490 [ 31.782757] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.784285] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.784838] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.785285] ? __kthread_parkme+0x82/0x160 [ 31.785699] ? preempt_count_sub+0x50/0x80 [ 31.786099] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.786550] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.788261] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.789381] kthread+0x257/0x310 [ 31.790011] ? __pfx_kthread+0x10/0x10 [ 31.790449] ret_from_fork+0x41/0x80 [ 31.791036] ? __pfx_kthread+0x10/0x10 [ 31.791580] ret_from_fork_asm+0x1a/0x30 [ 31.792304] </TASK> [ 31.792723] [ 31.793074] Allocated by task 268: [ 31.793559] kasan_save_stack+0x3d/0x60 [ 31.794249] kasan_save_track+0x18/0x40 [ 31.794605] kasan_save_alloc_info+0x3b/0x50 [ 31.795213] __kasan_kmalloc+0xb7/0xc0 [ 31.795827] __kmalloc_cache_noprof+0x184/0x410 [ 31.796377] kasan_bitops_generic+0x93/0x1c0 [ 31.797028] kunit_try_run_case+0x1b3/0x490 [ 31.797482] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.798152] kthread+0x257/0x310 [ 31.798706] ret_from_fork+0x41/0x80 [ 31.799308] ret_from_fork_asm+0x1a/0x30 [ 31.799751] [ 31.800213] The buggy address belongs to the object at ffff8881025ed7e0 [ 31.800213] which belongs to the cache kmalloc-16 of size 16 [ 31.801522] The buggy address is located 8 bytes inside of [ 31.801522] allocated 9-byte region [ffff8881025ed7e0, ffff8881025ed7e9) [ 31.802745] [ 31.803038] The buggy address belongs to the physical page: [ 31.803627] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ed [ 31.804497] flags: 0x200000000000000(node=0|zone=2) [ 31.805149] page_type: f5(slab) [ 31.805654] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 31.806452] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 31.807301] page dumped because: kasan: bad access detected [ 31.807912] [ 31.808111] Memory state around the buggy address: [ 31.808912] ffff8881025ed680: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 31.809500] ffff8881025ed700: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 31.810321] >ffff8881025ed780: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 31.811122] ^ [ 31.811915] ffff8881025ed800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.812650] ffff8881025ed880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.813390] ================================================================== [ 31.552485] ================================================================== [ 31.553196] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90 [ 31.553999] Write of size 8 at addr ffff8881025ed7e8 by task kunit_try_catch/268 [ 31.554285] [ 31.554400] CPU: 1 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 31.554962] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.555761] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.557505] Call Trace: [ 31.557992] <TASK> [ 31.558286] dump_stack_lvl+0x73/0xb0 [ 31.559109] print_report+0xd1/0x640 [ 31.559566] ? __virt_addr_valid+0x1db/0x2d0 [ 31.560069] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.560604] kasan_report+0x102/0x140 [ 31.561059] ? kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90 [ 31.561742] ? kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90 [ 31.562387] kasan_check_range+0x10c/0x1c0 [ 31.562851] __kasan_check_write+0x18/0x20 [ 31.563158] kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90 [ 31.563931] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 31.564612] ? __kmalloc_cache_noprof+0x184/0x410 [ 31.565093] ? trace_hardirqs_on+0x37/0xe0 [ 31.565395] ? kasan_bitops_generic+0x93/0x1c0 [ 31.566015] kasan_bitops_generic+0x122/0x1c0 [ 31.566542] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 31.567068] ? __pfx_read_tsc+0x10/0x10 [ 31.567451] ? ktime_get_ts64+0x86/0x230 [ 31.567966] kunit_try_run_case+0x1b3/0x490 [ 31.568467] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.568937] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.569441] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.570061] ? __kthread_parkme+0x82/0x160 [ 31.570474] ? preempt_count_sub+0x50/0x80 [ 31.570959] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.571306] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.572070] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.572604] kthread+0x257/0x310 [ 31.572994] ? __pfx_kthread+0x10/0x10 [ 31.573469] ret_from_fork+0x41/0x80 [ 31.573956] ? __pfx_kthread+0x10/0x10 [ 31.574251] ret_from_fork_asm+0x1a/0x30 [ 31.574813] </TASK> [ 31.575063] [ 31.575260] Allocated by task 268: [ 31.575540] kasan_save_stack+0x3d/0x60 [ 31.575956] kasan_save_track+0x18/0x40 [ 31.576445] kasan_save_alloc_info+0x3b/0x50 [ 31.577032] __kasan_kmalloc+0xb7/0xc0 [ 31.577312] __kmalloc_cache_noprof+0x184/0x410 [ 31.577952] kasan_bitops_generic+0x93/0x1c0 [ 31.578305] kunit_try_run_case+0x1b3/0x490 [ 31.578614] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.579291] kthread+0x257/0x310 [ 31.579729] ret_from_fork+0x41/0x80 [ 31.580241] ret_from_fork_asm+0x1a/0x30 [ 31.580609] [ 31.580862] The buggy address belongs to the object at ffff8881025ed7e0 [ 31.580862] which belongs to the cache kmalloc-16 of size 16 [ 31.581734] The buggy address is located 8 bytes inside of [ 31.581734] allocated 9-byte region [ffff8881025ed7e0, ffff8881025ed7e9) [ 31.582799] [ 31.583071] The buggy address belongs to the physical page: [ 31.583561] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ed [ 31.584253] flags: 0x200000000000000(node=0|zone=2) [ 31.584578] page_type: f5(slab) [ 31.584957] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 31.585855] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 31.586398] page dumped because: kasan: bad access detected [ 31.586759] [ 31.586969] Memory state around the buggy address: [ 31.587323] ffff8881025ed680: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 31.588128] ffff8881025ed700: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 31.588946] >ffff8881025ed780: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 31.590004] ^ [ 31.590571] ffff8881025ed800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.591191] ffff8881025ed880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.591940] ================================================================== [ 31.648571] ================================================================== [ 31.649628] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90 [ 31.650513] Write of size 8 at addr ffff8881025ed7e8 by task kunit_try_catch/268 [ 31.651360] [ 31.651546] CPU: 1 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 31.653310] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.653697] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.655111] Call Trace: [ 31.655386] <TASK> [ 31.655604] dump_stack_lvl+0x73/0xb0 [ 31.656465] print_report+0xd1/0x640 [ 31.657156] ? __virt_addr_valid+0x1db/0x2d0 [ 31.657556] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.658248] kasan_report+0x102/0x140 [ 31.658625] ? kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90 [ 31.659746] ? kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90 [ 31.660297] kasan_check_range+0x10c/0x1c0 [ 31.661205] __kasan_check_write+0x18/0x20 [ 31.661600] kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90 [ 31.662706] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 31.663283] ? __kmalloc_cache_noprof+0x184/0x410 [ 31.663916] ? trace_hardirqs_on+0x37/0xe0 [ 31.664358] ? kasan_bitops_generic+0x93/0x1c0 [ 31.665189] kasan_bitops_generic+0x122/0x1c0 [ 31.665584] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 31.666304] ? __pfx_read_tsc+0x10/0x10 [ 31.666704] ? ktime_get_ts64+0x86/0x230 [ 31.667363] kunit_try_run_case+0x1b3/0x490 [ 31.668064] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.668505] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.669094] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.669675] ? __kthread_parkme+0x82/0x160 [ 31.670225] ? preempt_count_sub+0x50/0x80 [ 31.670629] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.671103] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.671635] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.672644] kthread+0x257/0x310 [ 31.673002] ? __pfx_kthread+0x10/0x10 [ 31.673766] ret_from_fork+0x41/0x80 [ 31.674415] ? __pfx_kthread+0x10/0x10 [ 31.675265] ret_from_fork_asm+0x1a/0x30 [ 31.675629] </TASK> [ 31.676588] [ 31.676820] Allocated by task 268: [ 31.677056] kasan_save_stack+0x3d/0x60 [ 31.677786] kasan_save_track+0x18/0x40 [ 31.678251] kasan_save_alloc_info+0x3b/0x50 [ 31.678654] __kasan_kmalloc+0xb7/0xc0 [ 31.679643] __kmalloc_cache_noprof+0x184/0x410 [ 31.680192] kasan_bitops_generic+0x93/0x1c0 [ 31.680822] kunit_try_run_case+0x1b3/0x490 [ 31.681434] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.682145] kthread+0x257/0x310 [ 31.682422] ret_from_fork+0x41/0x80 [ 31.682864] ret_from_fork_asm+0x1a/0x30 [ 31.683635] [ 31.683920] The buggy address belongs to the object at ffff8881025ed7e0 [ 31.683920] which belongs to the cache kmalloc-16 of size 16 [ 31.685327] The buggy address is located 8 bytes inside of [ 31.685327] allocated 9-byte region [ffff8881025ed7e0, ffff8881025ed7e9) [ 31.686476] [ 31.686714] The buggy address belongs to the physical page: [ 31.687651] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ed [ 31.688459] flags: 0x200000000000000(node=0|zone=2) [ 31.688925] page_type: f5(slab) [ 31.689466] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 31.690249] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 31.690842] page dumped because: kasan: bad access detected [ 31.691350] [ 31.691590] Memory state around the buggy address: [ 31.691998] ffff8881025ed680: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 31.692491] ffff8881025ed700: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 31.693333] >ffff8881025ed780: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 31.694065] ^ [ 31.694733] ffff8881025ed800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.695513] ffff8881025ed880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.695967] ==================================================================