Date
Dec. 6, 2024, 3:11 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 34.633721] ================================================================== [ 34.634730] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc8 [ 34.635869] Write of size 8 at addr fff00000c5b518c8 by task kunit_try_catch/250 [ 34.636611] [ 34.637024] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 34.638244] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.638928] Hardware name: linux,dummy-virt (DT) [ 34.639665] Call trace: [ 34.640155] show_stack+0x20/0x38 (C) [ 34.640837] dump_stack_lvl+0x8c/0xd0 [ 34.641558] print_report+0x118/0x5e0 [ 34.642256] kasan_report+0xc8/0x118 [ 34.642917] kasan_check_range+0x100/0x1a8 [ 34.643582] __kasan_check_write+0x20/0x30 [ 34.644209] kasan_bitops_modify.constprop.0+0x344/0xbc8 [ 34.645040] kasan_bitops_generic+0x110/0x1c8 [ 34.645749] kunit_try_run_case+0x14c/0x3d0 [ 34.646434] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.647270] kthread+0x24c/0x2d0 [ 34.647910] ret_from_fork+0x10/0x20 [ 34.648317] [ 34.648788] Allocated by task 250: [ 34.649533] kasan_save_stack+0x3c/0x68 [ 34.650199] kasan_save_track+0x20/0x40 [ 34.650838] kasan_save_alloc_info+0x40/0x58 [ 34.651613] __kasan_kmalloc+0xd4/0xd8 [ 34.652295] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.652948] kasan_bitops_generic+0xa0/0x1c8 [ 34.653591] kunit_try_run_case+0x14c/0x3d0 [ 34.654246] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.655018] kthread+0x24c/0x2d0 [ 34.655620] ret_from_fork+0x10/0x20 [ 34.656198] [ 34.656630] The buggy address belongs to the object at fff00000c5b518c0 [ 34.656630] which belongs to the cache kmalloc-16 of size 16 [ 34.658022] The buggy address is located 8 bytes inside of [ 34.658022] allocated 9-byte region [fff00000c5b518c0, fff00000c5b518c9) [ 34.659329] [ 34.659738] The buggy address belongs to the physical page: [ 34.660541] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b51 [ 34.661482] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.662362] page_type: f5(slab) [ 34.662934] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 34.663912] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 34.664831] page dumped because: kasan: bad access detected [ 34.665507] [ 34.665917] Memory state around the buggy address: [ 34.666668] fff00000c5b51780: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.667454] fff00000c5b51800: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.668404] >fff00000c5b51880: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 34.669246] ^ [ 34.669955] fff00000c5b51900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.670784] fff00000c5b51980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.671626] ================================================================== [ 34.353003] ================================================================== [ 34.354558] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc8 [ 34.355542] Write of size 8 at addr fff00000c5b518c8 by task kunit_try_catch/250 [ 34.356411] [ 34.356919] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 34.358229] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.358801] Hardware name: linux,dummy-virt (DT) [ 34.359433] Call trace: [ 34.359868] show_stack+0x20/0x38 (C) [ 34.360475] dump_stack_lvl+0x8c/0xd0 [ 34.361219] print_report+0x118/0x5e0 [ 34.361862] kasan_report+0xc8/0x118 [ 34.362766] kasan_check_range+0x100/0x1a8 [ 34.363368] __kasan_check_write+0x20/0x30 [ 34.364075] kasan_bitops_modify.constprop.0+0x100/0xbc8 [ 34.364790] kasan_bitops_generic+0x110/0x1c8 [ 34.365492] kunit_try_run_case+0x14c/0x3d0 [ 34.366150] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.366983] kthread+0x24c/0x2d0 [ 34.367586] ret_from_fork+0x10/0x20 [ 34.368158] [ 34.368743] Allocated by task 250: [ 34.369397] kasan_save_stack+0x3c/0x68 [ 34.370066] kasan_save_track+0x20/0x40 [ 34.370795] kasan_save_alloc_info+0x40/0x58 [ 34.371481] __kasan_kmalloc+0xd4/0xd8 [ 34.372120] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.372768] kasan_bitops_generic+0xa0/0x1c8 [ 34.373373] kunit_try_run_case+0x14c/0x3d0 [ 34.374012] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.375262] kthread+0x24c/0x2d0 [ 34.375922] ret_from_fork+0x10/0x20 [ 34.376482] [ 34.376878] The buggy address belongs to the object at fff00000c5b518c0 [ 34.376878] which belongs to the cache kmalloc-16 of size 16 [ 34.378196] The buggy address is located 8 bytes inside of [ 34.378196] allocated 9-byte region [fff00000c5b518c0, fff00000c5b518c9) [ 34.379332] [ 34.379733] The buggy address belongs to the physical page: [ 34.380417] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b51 [ 34.381773] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.382538] page_type: f5(slab) [ 34.383122] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 34.383958] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 34.384872] page dumped because: kasan: bad access detected [ 34.385461] [ 34.385838] Memory state around the buggy address: [ 34.386496] fff00000c5b51780: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.387322] fff00000c5b51800: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.388186] >fff00000c5b51880: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 34.388913] ^ [ 34.389696] fff00000c5b51900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.390485] fff00000c5b51980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.391260] ================================================================== [ 34.393249] ================================================================== [ 34.395189] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa4c/0xbc8 [ 34.395942] Read of size 8 at addr fff00000c5b518c8 by task kunit_try_catch/250 [ 34.397593] [ 34.398092] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 34.399532] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.400152] Hardware name: linux,dummy-virt (DT) [ 34.400779] Call trace: [ 34.401184] show_stack+0x20/0x38 (C) [ 34.402076] dump_stack_lvl+0x8c/0xd0 [ 34.402753] print_report+0x118/0x5e0 [ 34.403456] kasan_report+0xc8/0x118 [ 34.404126] __asan_report_load8_noabort+0x20/0x30 [ 34.404887] kasan_bitops_modify.constprop.0+0xa4c/0xbc8 [ 34.405674] kasan_bitops_generic+0x110/0x1c8 [ 34.406261] kunit_try_run_case+0x14c/0x3d0 [ 34.406973] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.407793] kthread+0x24c/0x2d0 [ 34.408393] ret_from_fork+0x10/0x20 [ 34.409038] [ 34.409403] Allocated by task 250: [ 34.410022] kasan_save_stack+0x3c/0x68 [ 34.410607] kasan_save_track+0x20/0x40 [ 34.411287] kasan_save_alloc_info+0x40/0x58 [ 34.411881] __kasan_kmalloc+0xd4/0xd8 [ 34.412568] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.413209] kasan_bitops_generic+0xa0/0x1c8 [ 34.413945] kunit_try_run_case+0x14c/0x3d0 [ 34.414587] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.415405] kthread+0x24c/0x2d0 [ 34.416007] ret_from_fork+0x10/0x20 [ 34.416613] [ 34.416976] The buggy address belongs to the object at fff00000c5b518c0 [ 34.416976] which belongs to the cache kmalloc-16 of size 16 [ 34.418225] The buggy address is located 8 bytes inside of [ 34.418225] allocated 9-byte region [fff00000c5b518c0, fff00000c5b518c9) [ 34.419574] [ 34.419993] The buggy address belongs to the physical page: [ 34.420778] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b51 [ 34.421794] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.422676] page_type: f5(slab) [ 34.423221] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 34.424154] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 34.425097] page dumped because: kasan: bad access detected [ 34.425807] [ 34.426226] Memory state around the buggy address: [ 34.426927] fff00000c5b51780: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.427823] fff00000c5b51800: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.428695] >fff00000c5b51880: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 34.429552] ^ [ 34.430353] fff00000c5b51900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.431311] fff00000c5b51980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.432216] ================================================================== [ 34.674355] ================================================================== [ 34.675438] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc8 [ 34.676549] Write of size 8 at addr fff00000c5b518c8 by task kunit_try_catch/250 [ 34.677263] [ 34.677653] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 34.679215] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.679682] Hardware name: linux,dummy-virt (DT) [ 34.680193] Call trace: [ 34.680588] show_stack+0x20/0x38 (C) [ 34.681265] dump_stack_lvl+0x8c/0xd0 [ 34.682016] print_report+0x118/0x5e0 [ 34.682597] kasan_report+0xc8/0x118 [ 34.683285] kasan_check_range+0x100/0x1a8 [ 34.683922] __kasan_check_write+0x20/0x30 [ 34.684660] kasan_bitops_modify.constprop.0+0x3b0/0xbc8 [ 34.685535] kasan_bitops_generic+0x110/0x1c8 [ 34.686170] kunit_try_run_case+0x14c/0x3d0 [ 34.686949] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.687779] kthread+0x24c/0x2d0 [ 34.688395] ret_from_fork+0x10/0x20 [ 34.689025] [ 34.689442] Allocated by task 250: [ 34.690056] kasan_save_stack+0x3c/0x68 [ 34.690737] kasan_save_track+0x20/0x40 [ 34.691304] kasan_save_alloc_info+0x40/0x58 [ 34.692027] __kasan_kmalloc+0xd4/0xd8 [ 34.692720] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.693320] kasan_bitops_generic+0xa0/0x1c8 [ 34.694043] kunit_try_run_case+0x14c/0x3d0 [ 34.694842] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.695441] kthread+0x24c/0x2d0 [ 34.696007] ret_from_fork+0x10/0x20 [ 34.696690] [ 34.697062] The buggy address belongs to the object at fff00000c5b518c0 [ 34.697062] which belongs to the cache kmalloc-16 of size 16 [ 34.698436] The buggy address is located 8 bytes inside of [ 34.698436] allocated 9-byte region [fff00000c5b518c0, fff00000c5b518c9) [ 34.699849] [ 34.700258] The buggy address belongs to the physical page: [ 34.700964] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b51 [ 34.701905] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.702745] page_type: f5(slab) [ 34.703301] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 34.704301] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 34.705257] page dumped because: kasan: bad access detected [ 34.705966] [ 34.706348] Memory state around the buggy address: [ 34.707008] fff00000c5b51780: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.708036] fff00000c5b51800: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.709075] >fff00000c5b51880: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 34.709961] ^ [ 34.710782] fff00000c5b51900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.711625] fff00000c5b51980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.712502] ================================================================== [ 34.595982] ================================================================== [ 34.596731] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaf4/0xbc8 [ 34.597549] Read of size 8 at addr fff00000c5b518c8 by task kunit_try_catch/250 [ 34.598453] [ 34.598890] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 34.600030] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.600559] Hardware name: linux,dummy-virt (DT) [ 34.601186] Call trace: [ 34.601686] show_stack+0x20/0x38 (C) [ 34.602355] dump_stack_lvl+0x8c/0xd0 [ 34.602939] print_report+0x118/0x5e0 [ 34.603639] kasan_report+0xc8/0x118 [ 34.604272] __asan_report_load8_noabort+0x20/0x30 [ 34.604904] kasan_bitops_modify.constprop.0+0xaf4/0xbc8 [ 34.605732] kasan_bitops_generic+0x110/0x1c8 [ 34.606290] kunit_try_run_case+0x14c/0x3d0 [ 34.607008] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.607680] kthread+0x24c/0x2d0 [ 34.608283] ret_from_fork+0x10/0x20 [ 34.608941] [ 34.609314] Allocated by task 250: [ 34.609784] kasan_save_stack+0x3c/0x68 [ 34.610394] kasan_save_track+0x20/0x40 [ 34.611061] kasan_save_alloc_info+0x40/0x58 [ 34.611755] __kasan_kmalloc+0xd4/0xd8 [ 34.612399] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.613011] kasan_bitops_generic+0xa0/0x1c8 [ 34.613657] kunit_try_run_case+0x14c/0x3d0 [ 34.614264] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.614971] kthread+0x24c/0x2d0 [ 34.615573] ret_from_fork+0x10/0x20 [ 34.616219] [ 34.616619] The buggy address belongs to the object at fff00000c5b518c0 [ 34.616619] which belongs to the cache kmalloc-16 of size 16 [ 34.617776] The buggy address is located 8 bytes inside of [ 34.617776] allocated 9-byte region [fff00000c5b518c0, fff00000c5b518c9) [ 34.618992] [ 34.619371] The buggy address belongs to the physical page: [ 34.620131] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b51 [ 34.620982] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.621796] page_type: f5(slab) [ 34.622371] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 34.623285] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 34.624172] page dumped because: kasan: bad access detected [ 34.624928] [ 34.625275] Memory state around the buggy address: [ 34.625884] fff00000c5b51780: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.626774] fff00000c5b51800: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.627636] >fff00000c5b51880: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 34.628315] ^ [ 34.629114] fff00000c5b51900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.629934] fff00000c5b51980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.630840] ================================================================== [ 34.556056] ================================================================== [ 34.556885] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc8 [ 34.559283] Write of size 8 at addr fff00000c5b518c8 by task kunit_try_catch/250 [ 34.560158] [ 34.560501] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 34.561616] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.562228] Hardware name: linux,dummy-virt (DT) [ 34.562762] Call trace: [ 34.563243] show_stack+0x20/0x38 (C) [ 34.564178] dump_stack_lvl+0x8c/0xd0 [ 34.564819] print_report+0x118/0x5e0 [ 34.565429] kasan_report+0xc8/0x118 [ 34.566033] kasan_check_range+0x100/0x1a8 [ 34.566730] __kasan_check_write+0x20/0x30 [ 34.567342] kasan_bitops_modify.constprop.0+0x320/0xbc8 [ 34.568159] kasan_bitops_generic+0x110/0x1c8 [ 34.568975] kunit_try_run_case+0x14c/0x3d0 [ 34.569644] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.570310] kthread+0x24c/0x2d0 [ 34.570943] ret_from_fork+0x10/0x20 [ 34.571546] [ 34.571924] Allocated by task 250: [ 34.572403] kasan_save_stack+0x3c/0x68 [ 34.573047] kasan_save_track+0x20/0x40 [ 34.573642] kasan_save_alloc_info+0x40/0x58 [ 34.574209] __kasan_kmalloc+0xd4/0xd8 [ 34.574852] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.575407] kasan_bitops_generic+0xa0/0x1c8 [ 34.576123] kunit_try_run_case+0x14c/0x3d0 [ 34.576679] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.577465] kthread+0x24c/0x2d0 [ 34.577982] ret_from_fork+0x10/0x20 [ 34.578525] [ 34.578910] The buggy address belongs to the object at fff00000c5b518c0 [ 34.578910] which belongs to the cache kmalloc-16 of size 16 [ 34.580059] The buggy address is located 8 bytes inside of [ 34.580059] allocated 9-byte region [fff00000c5b518c0, fff00000c5b518c9) [ 34.581283] [ 34.581690] The buggy address belongs to the physical page: [ 34.582416] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b51 [ 34.583446] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.584271] page_type: f5(slab) [ 34.584854] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 34.585776] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 34.586706] page dumped because: kasan: bad access detected [ 34.587453] [ 34.587804] Memory state around the buggy address: [ 34.588317] fff00000c5b51780: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.589249] fff00000c5b51800: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.590029] >fff00000c5b51880: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 34.590837] ^ [ 34.591637] fff00000c5b51900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.592361] fff00000c5b51980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.593276] ================================================================== [ 34.476019] ================================================================== [ 34.477078] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa88/0xbc8 [ 34.477978] Read of size 8 at addr fff00000c5b518c8 by task kunit_try_catch/250 [ 34.479205] [ 34.479838] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 34.481217] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.481881] Hardware name: linux,dummy-virt (DT) [ 34.482631] Call trace: [ 34.483132] show_stack+0x20/0x38 (C) [ 34.483870] dump_stack_lvl+0x8c/0xd0 [ 34.484410] print_report+0x118/0x5e0 [ 34.484932] kasan_report+0xc8/0x118 [ 34.485589] __asan_report_load8_noabort+0x20/0x30 [ 34.486297] kasan_bitops_modify.constprop.0+0xa88/0xbc8 [ 34.487092] kasan_bitops_generic+0x110/0x1c8 [ 34.487803] kunit_try_run_case+0x14c/0x3d0 [ 34.488498] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.489263] kthread+0x24c/0x2d0 [ 34.489780] ret_from_fork+0x10/0x20 [ 34.490406] [ 34.490805] Allocated by task 250: [ 34.491280] kasan_save_stack+0x3c/0x68 [ 34.491937] kasan_save_track+0x20/0x40 [ 34.492500] kasan_save_alloc_info+0x40/0x58 [ 34.493210] __kasan_kmalloc+0xd4/0xd8 [ 34.493857] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.494459] kasan_bitops_generic+0xa0/0x1c8 [ 34.495123] kunit_try_run_case+0x14c/0x3d0 [ 34.495851] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.496617] kthread+0x24c/0x2d0 [ 34.497166] ret_from_fork+0x10/0x20 [ 34.497708] [ 34.498086] The buggy address belongs to the object at fff00000c5b518c0 [ 34.498086] which belongs to the cache kmalloc-16 of size 16 [ 34.499311] The buggy address is located 8 bytes inside of [ 34.499311] allocated 9-byte region [fff00000c5b518c0, fff00000c5b518c9) [ 34.500637] [ 34.500960] The buggy address belongs to the physical page: [ 34.501830] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b51 [ 34.502764] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.503856] page_type: f5(slab) [ 34.504447] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 34.505397] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 34.506355] page dumped because: kasan: bad access detected [ 34.507029] [ 34.507411] Memory state around the buggy address: [ 34.508035] fff00000c5b51780: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.508818] fff00000c5b51800: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.509602] >fff00000c5b51880: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 34.510371] ^ [ 34.511172] fff00000c5b51900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.512127] fff00000c5b51980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.512894] ================================================================== [ 34.436341] ================================================================== [ 34.437120] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc8 [ 34.437914] Write of size 8 at addr fff00000c5b518c8 by task kunit_try_catch/250 [ 34.439309] [ 34.439824] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 34.441093] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.441806] Hardware name: linux,dummy-virt (DT) [ 34.442438] Call trace: [ 34.442969] show_stack+0x20/0x38 (C) [ 34.443677] dump_stack_lvl+0x8c/0xd0 [ 34.444255] print_report+0x118/0x5e0 [ 34.444979] kasan_report+0xc8/0x118 [ 34.445630] kasan_check_range+0x100/0x1a8 [ 34.446251] __kasan_check_write+0x20/0x30 [ 34.447012] kasan_bitops_modify.constprop.0+0x1dc/0xbc8 [ 34.447821] kasan_bitops_generic+0x110/0x1c8 [ 34.448548] kunit_try_run_case+0x14c/0x3d0 [ 34.449288] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.450173] kthread+0x24c/0x2d0 [ 34.450758] ret_from_fork+0x10/0x20 [ 34.451456] [ 34.451887] Allocated by task 250: [ 34.452363] kasan_save_stack+0x3c/0x68 [ 34.453063] kasan_save_track+0x20/0x40 [ 34.453706] kasan_save_alloc_info+0x40/0x58 [ 34.454267] __kasan_kmalloc+0xd4/0xd8 [ 34.454782] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.455416] kasan_bitops_generic+0xa0/0x1c8 [ 34.455955] kunit_try_run_case+0x14c/0x3d0 [ 34.456648] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.457279] kthread+0x24c/0x2d0 [ 34.457875] ret_from_fork+0x10/0x20 [ 34.458487] [ 34.458869] The buggy address belongs to the object at fff00000c5b518c0 [ 34.458869] which belongs to the cache kmalloc-16 of size 16 [ 34.460160] The buggy address is located 8 bytes inside of [ 34.460160] allocated 9-byte region [fff00000c5b518c0, fff00000c5b518c9) [ 34.461387] [ 34.461788] The buggy address belongs to the physical page: [ 34.462558] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b51 [ 34.463472] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.464249] page_type: f5(slab) [ 34.464779] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 34.465735] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 34.466636] page dumped because: kasan: bad access detected [ 34.467329] [ 34.467690] Memory state around the buggy address: [ 34.468200] fff00000c5b51780: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.469146] fff00000c5b51800: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.469867] >fff00000c5b51880: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 34.470779] ^ [ 34.471469] fff00000c5b51900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.472273] fff00000c5b51980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.473121] ================================================================== [ 34.715947] ================================================================== [ 34.716753] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa28/0xbc8 [ 34.717652] Read of size 8 at addr fff00000c5b518c8 by task kunit_try_catch/250 [ 34.718461] [ 34.719234] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 34.720302] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.720880] Hardware name: linux,dummy-virt (DT) [ 34.721452] Call trace: [ 34.721931] show_stack+0x20/0x38 (C) [ 34.722587] dump_stack_lvl+0x8c/0xd0 [ 34.723176] print_report+0x118/0x5e0 [ 34.723730] kasan_report+0xc8/0x118 [ 34.724372] __asan_report_load8_noabort+0x20/0x30 [ 34.725047] kasan_bitops_modify.constprop.0+0xa28/0xbc8 [ 34.725792] kasan_bitops_generic+0x110/0x1c8 [ 34.726418] kunit_try_run_case+0x14c/0x3d0 [ 34.727080] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.727739] kthread+0x24c/0x2d0 [ 34.728338] ret_from_fork+0x10/0x20 [ 34.728929] [ 34.729305] Allocated by task 250: [ 34.729819] kasan_save_stack+0x3c/0x68 [ 34.730456] kasan_save_track+0x20/0x40 [ 34.731087] kasan_save_alloc_info+0x40/0x58 [ 34.731717] __kasan_kmalloc+0xd4/0xd8 [ 34.732252] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.732969] kasan_bitops_generic+0xa0/0x1c8 [ 34.733544] kunit_try_run_case+0x14c/0x3d0 [ 34.734213] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.734875] kthread+0x24c/0x2d0 [ 34.735462] ret_from_fork+0x10/0x20 [ 34.736075] [ 34.736433] The buggy address belongs to the object at fff00000c5b518c0 [ 34.736433] which belongs to the cache kmalloc-16 of size 16 [ 34.737764] The buggy address is located 8 bytes inside of [ 34.737764] allocated 9-byte region [fff00000c5b518c0, fff00000c5b518c9) [ 34.738981] [ 34.739357] The buggy address belongs to the physical page: [ 34.740118] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b51 [ 34.740908] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.741816] page_type: f5(slab) [ 34.742382] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 34.743356] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 34.744164] page dumped because: kasan: bad access detected [ 34.744867] [ 34.745240] Memory state around the buggy address: [ 34.745863] fff00000c5b51780: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.746657] fff00000c5b51800: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.747599] >fff00000c5b51880: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 34.748384] ^ [ 34.749098] fff00000c5b51900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.749955] fff00000c5b51980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.750839] ================================================================== [ 34.516926] ================================================================== [ 34.517706] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc8 [ 34.518450] Write of size 8 at addr fff00000c5b518c8 by task kunit_try_catch/250 [ 34.519533] [ 34.520137] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 34.521473] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.522151] Hardware name: linux,dummy-virt (DT) [ 34.522708] Call trace: [ 34.523632] show_stack+0x20/0x38 (C) [ 34.524675] dump_stack_lvl+0x8c/0xd0 [ 34.525266] print_report+0x118/0x5e0 [ 34.525929] kasan_report+0xc8/0x118 [ 34.526884] kasan_check_range+0x100/0x1a8 [ 34.527418] __kasan_check_write+0x20/0x30 [ 34.528140] kasan_bitops_modify.constprop.0+0x2b4/0xbc8 [ 34.528807] kasan_bitops_generic+0x110/0x1c8 [ 34.529533] kunit_try_run_case+0x14c/0x3d0 [ 34.530160] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.530975] kthread+0x24c/0x2d0 [ 34.531619] ret_from_fork+0x10/0x20 [ 34.532202] [ 34.532597] Allocated by task 250: [ 34.533031] kasan_save_stack+0x3c/0x68 [ 34.533695] kasan_save_track+0x20/0x40 [ 34.534256] kasan_save_alloc_info+0x40/0x58 [ 34.534959] __kasan_kmalloc+0xd4/0xd8 [ 34.535489] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.536239] kasan_bitops_generic+0xa0/0x1c8 [ 34.536866] kunit_try_run_case+0x14c/0x3d0 [ 34.537381] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.538332] kthread+0x24c/0x2d0 [ 34.538730] ret_from_fork+0x10/0x20 [ 34.539339] [ 34.539725] The buggy address belongs to the object at fff00000c5b518c0 [ 34.539725] which belongs to the cache kmalloc-16 of size 16 [ 34.540926] The buggy address is located 8 bytes inside of [ 34.540926] allocated 9-byte region [fff00000c5b518c0, fff00000c5b518c9) [ 34.542263] [ 34.542606] The buggy address belongs to the physical page: [ 34.543327] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b51 [ 34.544244] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.544928] page_type: f5(slab) [ 34.545493] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 34.546435] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 34.547419] page dumped because: kasan: bad access detected [ 34.548034] [ 34.548409] Memory state around the buggy address: [ 34.549112] fff00000c5b51780: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.549861] fff00000c5b51800: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.550749] >fff00000c5b51880: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 34.551480] ^ [ 34.552278] fff00000c5b51900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.553113] fff00000c5b51980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.553996] ==================================================================
[ 27.349466] ================================================================== [ 27.351168] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x102/0xd50 [ 27.352283] Write of size 8 at addr ffff888101b3cce8 by task kunit_try_catch/269 [ 27.353131] [ 27.353402] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 27.355019] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.355969] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.357424] Call Trace: [ 27.358530] <TASK> [ 27.359470] dump_stack_lvl+0x73/0xb0 [ 27.359909] print_report+0xd1/0x640 [ 27.360852] ? __virt_addr_valid+0x1db/0x2d0 [ 27.362152] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.362765] kasan_report+0x102/0x140 [ 27.363323] ? kasan_bitops_modify.constprop.0+0x102/0xd50 [ 27.364124] ? kasan_bitops_modify.constprop.0+0x102/0xd50 [ 27.364851] kasan_check_range+0x10c/0x1c0 [ 27.365201] __kasan_check_write+0x18/0x20 [ 27.366052] kasan_bitops_modify.constprop.0+0x102/0xd50 [ 27.366715] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 27.367254] ? __kmalloc_cache_noprof+0x184/0x410 [ 27.367948] ? trace_hardirqs_on+0x37/0xe0 [ 27.369377] ? kasan_bitops_generic+0x93/0x1c0 [ 27.370182] kasan_bitops_generic+0x117/0x1c0 [ 27.370554] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 27.371670] ? __pfx_read_tsc+0x10/0x10 [ 27.372444] ? ktime_get_ts64+0x86/0x230 [ 27.372735] kunit_try_run_case+0x1b3/0x490 [ 27.373703] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.374203] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 27.374571] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.376041] ? __kthread_parkme+0x82/0x160 [ 27.376469] ? preempt_count_sub+0x50/0x80 [ 27.376867] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.377170] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.377554] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.378505] kthread+0x257/0x310 [ 27.379086] ? __pfx_kthread+0x10/0x10 [ 27.379523] ret_from_fork+0x41/0x80 [ 27.380377] ? __pfx_kthread+0x10/0x10 [ 27.380694] ret_from_fork_asm+0x1a/0x30 [ 27.381041] </TASK> [ 27.382647] [ 27.382974] Allocated by task 269: [ 27.383977] kasan_save_stack+0x3d/0x60 [ 27.384272] kasan_save_track+0x18/0x40 [ 27.385795] kasan_save_alloc_info+0x3b/0x50 [ 27.386437] __kasan_kmalloc+0xb7/0xc0 [ 27.387476] __kmalloc_cache_noprof+0x184/0x410 [ 27.387718] kasan_bitops_generic+0x93/0x1c0 [ 27.387912] kunit_try_run_case+0x1b3/0x490 [ 27.388212] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.390264] kthread+0x257/0x310 [ 27.390648] ret_from_fork+0x41/0x80 [ 27.391374] ret_from_fork_asm+0x1a/0x30 [ 27.392001] [ 27.392819] The buggy address belongs to the object at ffff888101b3cce0 [ 27.392819] which belongs to the cache kmalloc-16 of size 16 [ 27.394608] The buggy address is located 8 bytes inside of [ 27.394608] allocated 9-byte region [ffff888101b3cce0, ffff888101b3cce9) [ 27.395661] [ 27.395994] The buggy address belongs to the physical page: [ 27.396794] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3c [ 27.397429] flags: 0x200000000000000(node=0|zone=2) [ 27.398990] page_type: f5(slab) [ 27.399306] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 27.400303] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 27.401157] page dumped because: kasan: bad access detected [ 27.402370] [ 27.402654] Memory state around the buggy address: [ 27.403232] ffff888101b3cb80: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc [ 27.404062] ffff888101b3cc00: 00 02 fc fc 00 02 fc fc 00 05 fc fc fa fb fc fc [ 27.404833] >ffff888101b3cc80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 27.405621] ^ [ 27.406263] ffff888101b3cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.407751] ffff888101b3cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.408370] ================================================================== [ 27.769426] ================================================================== [ 27.770667] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x548/0xd50 [ 27.773172] Write of size 8 at addr ffff888101b3cce8 by task kunit_try_catch/269 [ 27.773891] [ 27.774842] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 27.775901] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.776364] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.777495] Call Trace: [ 27.777799] <TASK> [ 27.778079] dump_stack_lvl+0x73/0xb0 [ 27.778472] print_report+0xd1/0x640 [ 27.778883] ? __virt_addr_valid+0x1db/0x2d0 [ 27.780863] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.782665] kasan_report+0x102/0x140 [ 27.783144] ? kasan_bitops_modify.constprop.0+0x548/0xd50 [ 27.784330] ? kasan_bitops_modify.constprop.0+0x548/0xd50 [ 27.784745] kasan_check_range+0x10c/0x1c0 [ 27.785192] __kasan_check_write+0x18/0x20 [ 27.785619] kasan_bitops_modify.constprop.0+0x548/0xd50 [ 27.787424] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 27.787970] ? __kmalloc_cache_noprof+0x184/0x410 [ 27.788893] ? trace_hardirqs_on+0x37/0xe0 [ 27.789845] ? kasan_bitops_generic+0x93/0x1c0 [ 27.790571] kasan_bitops_generic+0x117/0x1c0 [ 27.791421] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 27.793075] ? __pfx_read_tsc+0x10/0x10 [ 27.793721] ? ktime_get_ts64+0x86/0x230 [ 27.794850] kunit_try_run_case+0x1b3/0x490 [ 27.795180] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.796727] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 27.798067] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.798403] ? __kthread_parkme+0x82/0x160 [ 27.799069] ? preempt_count_sub+0x50/0x80 [ 27.800626] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.801123] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.801686] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.802616] kthread+0x257/0x310 [ 27.803468] ? __pfx_kthread+0x10/0x10 [ 27.804331] ret_from_fork+0x41/0x80 [ 27.805120] ? __pfx_kthread+0x10/0x10 [ 27.805953] ret_from_fork_asm+0x1a/0x30 [ 27.807127] </TASK> [ 27.807448] [ 27.807679] Allocated by task 269: [ 27.808064] kasan_save_stack+0x3d/0x60 [ 27.808494] kasan_save_track+0x18/0x40 [ 27.808894] kasan_save_alloc_info+0x3b/0x50 [ 27.809730] __kasan_kmalloc+0xb7/0xc0 [ 27.811167] __kmalloc_cache_noprof+0x184/0x410 [ 27.811684] kasan_bitops_generic+0x93/0x1c0 [ 27.812062] kunit_try_run_case+0x1b3/0x490 [ 27.812507] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.812915] kthread+0x257/0x310 [ 27.814025] ret_from_fork+0x41/0x80 [ 27.814623] ret_from_fork_asm+0x1a/0x30 [ 27.815048] [ 27.816260] The buggy address belongs to the object at ffff888101b3cce0 [ 27.816260] which belongs to the cache kmalloc-16 of size 16 [ 27.818610] The buggy address is located 8 bytes inside of [ 27.818610] allocated 9-byte region [ffff888101b3cce0, ffff888101b3cce9) [ 27.819773] [ 27.820033] The buggy address belongs to the physical page: [ 27.821173] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3c [ 27.822864] flags: 0x200000000000000(node=0|zone=2) [ 27.823745] page_type: f5(slab) [ 27.825416] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 27.826354] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 27.827013] page dumped because: kasan: bad access detected [ 27.827563] [ 27.828400] Memory state around the buggy address: [ 27.829139] ffff888101b3cb80: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc [ 27.830804] ffff888101b3cc00: 00 02 fc fc 00 02 fc fc 00 05 fc fc fa fb fc fc [ 27.832247] >ffff888101b3cc80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 27.832637] ^ [ 27.833542] ffff888101b3cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.834663] ffff888101b3cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.835184] ================================================================== [ 27.608004] ================================================================== [ 27.609379] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x374/0xd50 [ 27.610153] Write of size 8 at addr ffff888101b3cce8 by task kunit_try_catch/269 [ 27.610839] [ 27.612794] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 27.613467] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.614234] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.615829] Call Trace: [ 27.616191] <TASK> [ 27.616919] dump_stack_lvl+0x73/0xb0 [ 27.618053] print_report+0xd1/0x640 [ 27.618533] ? __virt_addr_valid+0x1db/0x2d0 [ 27.618925] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.619430] kasan_report+0x102/0x140 [ 27.619792] ? kasan_bitops_modify.constprop.0+0x374/0xd50 [ 27.621317] ? kasan_bitops_modify.constprop.0+0x374/0xd50 [ 27.622204] kasan_check_range+0x10c/0x1c0 [ 27.623153] __kasan_check_write+0x18/0x20 [ 27.623953] kasan_bitops_modify.constprop.0+0x374/0xd50 [ 27.624799] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 27.626040] ? __kmalloc_cache_noprof+0x184/0x410 [ 27.626542] ? trace_hardirqs_on+0x37/0xe0 [ 27.627051] ? kasan_bitops_generic+0x93/0x1c0 [ 27.627878] kasan_bitops_generic+0x117/0x1c0 [ 27.628338] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 27.628966] ? __pfx_read_tsc+0x10/0x10 [ 27.629984] ? ktime_get_ts64+0x86/0x230 [ 27.630449] kunit_try_run_case+0x1b3/0x490 [ 27.630972] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.631970] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 27.632702] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.633548] ? __kthread_parkme+0x82/0x160 [ 27.634060] ? preempt_count_sub+0x50/0x80 [ 27.634510] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.636616] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.637699] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.638241] kthread+0x257/0x310 [ 27.638833] ? __pfx_kthread+0x10/0x10 [ 27.639723] ret_from_fork+0x41/0x80 [ 27.640188] ? __pfx_kthread+0x10/0x10 [ 27.640408] ret_from_fork_asm+0x1a/0x30 [ 27.641621] </TASK> [ 27.642182] [ 27.642495] Allocated by task 269: [ 27.643096] kasan_save_stack+0x3d/0x60 [ 27.644188] kasan_save_track+0x18/0x40 [ 27.645156] kasan_save_alloc_info+0x3b/0x50 [ 27.645851] __kasan_kmalloc+0xb7/0xc0 [ 27.646132] __kmalloc_cache_noprof+0x184/0x410 [ 27.646629] kasan_bitops_generic+0x93/0x1c0 [ 27.647000] kunit_try_run_case+0x1b3/0x490 [ 27.647522] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.649070] kthread+0x257/0x310 [ 27.649505] ret_from_fork+0x41/0x80 [ 27.650083] ret_from_fork_asm+0x1a/0x30 [ 27.650381] [ 27.650603] The buggy address belongs to the object at ffff888101b3cce0 [ 27.650603] which belongs to the cache kmalloc-16 of size 16 [ 27.651741] The buggy address is located 8 bytes inside of [ 27.651741] allocated 9-byte region [ffff888101b3cce0, ffff888101b3cce9) [ 27.653849] [ 27.654139] The buggy address belongs to the physical page: [ 27.654569] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3c [ 27.655406] flags: 0x200000000000000(node=0|zone=2) [ 27.655919] page_type: f5(slab) [ 27.656234] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 27.657221] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 27.658057] page dumped because: kasan: bad access detected [ 27.658400] [ 27.658765] Memory state around the buggy address: [ 27.659328] ffff888101b3cb80: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc [ 27.660015] ffff888101b3cc00: 00 02 fc fc 00 02 fc fc 00 05 fc fc fa fb fc fc [ 27.660787] >ffff888101b3cc80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 27.661260] ^ [ 27.662198] ffff888101b3cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.662846] ffff888101b3cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.663705] ================================================================== [ 27.720757] ================================================================== [ 27.722290] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ad/0xd50 [ 27.723290] Write of size 8 at addr ffff888101b3cce8 by task kunit_try_catch/269 [ 27.724193] [ 27.724789] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 27.725411] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.726149] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.726802] Call Trace: [ 27.727496] <TASK> [ 27.727813] dump_stack_lvl+0x73/0xb0 [ 27.728284] print_report+0xd1/0x640 [ 27.728577] ? __virt_addr_valid+0x1db/0x2d0 [ 27.728885] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.729845] kasan_report+0x102/0x140 [ 27.731401] ? kasan_bitops_modify.constprop.0+0x4ad/0xd50 [ 27.732175] ? kasan_bitops_modify.constprop.0+0x4ad/0xd50 [ 27.732993] kasan_check_range+0x10c/0x1c0 [ 27.733836] __kasan_check_write+0x18/0x20 [ 27.734308] kasan_bitops_modify.constprop.0+0x4ad/0xd50 [ 27.735159] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 27.736025] ? __kmalloc_cache_noprof+0x184/0x410 [ 27.736386] ? trace_hardirqs_on+0x37/0xe0 [ 27.737655] ? kasan_bitops_generic+0x93/0x1c0 [ 27.738533] kasan_bitops_generic+0x117/0x1c0 [ 27.739070] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 27.739499] ? __pfx_read_tsc+0x10/0x10 [ 27.739804] ? ktime_get_ts64+0x86/0x230 [ 27.740663] kunit_try_run_case+0x1b3/0x490 [ 27.741240] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.742020] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 27.742464] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.742954] ? __kthread_parkme+0x82/0x160 [ 27.743441] ? preempt_count_sub+0x50/0x80 [ 27.744006] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.744494] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.745045] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.745530] kthread+0x257/0x310 [ 27.745862] ? __pfx_kthread+0x10/0x10 [ 27.747178] ret_from_fork+0x41/0x80 [ 27.747536] ? __pfx_kthread+0x10/0x10 [ 27.748094] ret_from_fork_asm+0x1a/0x30 [ 27.748400] </TASK> [ 27.748595] [ 27.748799] Allocated by task 269: [ 27.749253] kasan_save_stack+0x3d/0x60 [ 27.749747] kasan_save_track+0x18/0x40 [ 27.750398] kasan_save_alloc_info+0x3b/0x50 [ 27.751047] __kasan_kmalloc+0xb7/0xc0 [ 27.751322] __kmalloc_cache_noprof+0x184/0x410 [ 27.751655] kasan_bitops_generic+0x93/0x1c0 [ 27.752141] kunit_try_run_case+0x1b3/0x490 [ 27.752678] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.753258] kthread+0x257/0x310 [ 27.753570] ret_from_fork+0x41/0x80 [ 27.754076] ret_from_fork_asm+0x1a/0x30 [ 27.755495] [ 27.755681] The buggy address belongs to the object at ffff888101b3cce0 [ 27.755681] which belongs to the cache kmalloc-16 of size 16 [ 27.756876] The buggy address is located 8 bytes inside of [ 27.756876] allocated 9-byte region [ffff888101b3cce0, ffff888101b3cce9) [ 27.758317] [ 27.758496] The buggy address belongs to the physical page: [ 27.758832] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3c [ 27.759791] flags: 0x200000000000000(node=0|zone=2) [ 27.760353] page_type: f5(slab) [ 27.760759] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 27.761653] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 27.762181] page dumped because: kasan: bad access detected [ 27.762517] [ 27.762673] Memory state around the buggy address: [ 27.763149] ffff888101b3cb80: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc [ 27.763923] ffff888101b3cc00: 00 02 fc fc 00 02 fc fc 00 05 fc fc fa fb fc fc [ 27.764679] >ffff888101b3cc80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 27.765921] ^ [ 27.767241] ffff888101b3cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.767850] ffff888101b3cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.768460] ================================================================== [ 27.411447] ================================================================== [ 27.412122] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19d/0xd50 [ 27.412990] Write of size 8 at addr ffff888101b3cce8 by task kunit_try_catch/269 [ 27.414167] [ 27.414645] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 27.416255] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.416892] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.418257] Call Trace: [ 27.419142] <TASK> [ 27.419533] dump_stack_lvl+0x73/0xb0 [ 27.420282] print_report+0xd1/0x640 [ 27.420646] ? __virt_addr_valid+0x1db/0x2d0 [ 27.421371] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.422460] kasan_report+0x102/0x140 [ 27.423253] ? kasan_bitops_modify.constprop.0+0x19d/0xd50 [ 27.423737] ? kasan_bitops_modify.constprop.0+0x19d/0xd50 [ 27.424025] kasan_check_range+0x10c/0x1c0 [ 27.424722] __kasan_check_write+0x18/0x20 [ 27.425867] kasan_bitops_modify.constprop.0+0x19d/0xd50 [ 27.427007] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 27.428372] ? __kmalloc_cache_noprof+0x184/0x410 [ 27.429056] ? trace_hardirqs_on+0x37/0xe0 [ 27.430140] ? kasan_bitops_generic+0x93/0x1c0 [ 27.431429] kasan_bitops_generic+0x117/0x1c0 [ 27.431815] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 27.432647] ? __pfx_read_tsc+0x10/0x10 [ 27.433995] ? ktime_get_ts64+0x86/0x230 [ 27.435058] kunit_try_run_case+0x1b3/0x490 [ 27.435873] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.436204] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 27.437479] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.438048] ? __kthread_parkme+0x82/0x160 [ 27.440228] ? preempt_count_sub+0x50/0x80 [ 27.440825] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.441951] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.442511] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.443315] kthread+0x257/0x310 [ 27.444034] ? __pfx_kthread+0x10/0x10 [ 27.444815] ret_from_fork+0x41/0x80 [ 27.446571] ? __pfx_kthread+0x10/0x10 [ 27.447018] ret_from_fork_asm+0x1a/0x30 [ 27.448020] </TASK> [ 27.448468] [ 27.449092] Allocated by task 269: [ 27.449743] kasan_save_stack+0x3d/0x60 [ 27.451453] kasan_save_track+0x18/0x40 [ 27.451845] kasan_save_alloc_info+0x3b/0x50 [ 27.453025] __kasan_kmalloc+0xb7/0xc0 [ 27.453817] __kmalloc_cache_noprof+0x184/0x410 [ 27.454415] kasan_bitops_generic+0x93/0x1c0 [ 27.454860] kunit_try_run_case+0x1b3/0x490 [ 27.455235] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.455799] kthread+0x257/0x310 [ 27.456433] ret_from_fork+0x41/0x80 [ 27.456706] ret_from_fork_asm+0x1a/0x30 [ 27.457970] [ 27.458291] The buggy address belongs to the object at ffff888101b3cce0 [ 27.458291] which belongs to the cache kmalloc-16 of size 16 [ 27.459519] The buggy address is located 8 bytes inside of [ 27.459519] allocated 9-byte region [ffff888101b3cce0, ffff888101b3cce9) [ 27.460750] [ 27.461167] The buggy address belongs to the physical page: [ 27.461642] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3c [ 27.463232] flags: 0x200000000000000(node=0|zone=2) [ 27.464452] page_type: f5(slab) [ 27.464817] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 27.465985] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 27.467141] page dumped because: kasan: bad access detected [ 27.468739] [ 27.468867] Memory state around the buggy address: [ 27.470017] ffff888101b3cb80: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc [ 27.471181] ffff888101b3cc00: 00 02 fc fc 00 02 fc fc 00 05 fc fc fa fb fc fc [ 27.472091] >ffff888101b3cc80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 27.472686] ^ [ 27.473794] ffff888101b3cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.475513] ffff888101b3cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.476148] ================================================================== [ 27.546300] ================================================================== [ 27.547275] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d6/0xd50 [ 27.549225] Write of size 8 at addr ffff888101b3cce8 by task kunit_try_catch/269 [ 27.551309] [ 27.551705] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 27.552290] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.554166] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.555440] Call Trace: [ 27.555606] <TASK> [ 27.556168] dump_stack_lvl+0x73/0xb0 [ 27.556393] print_report+0xd1/0x640 [ 27.557663] ? __virt_addr_valid+0x1db/0x2d0 [ 27.558327] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.558714] kasan_report+0x102/0x140 [ 27.559824] ? kasan_bitops_modify.constprop.0+0x2d6/0xd50 [ 27.560783] ? kasan_bitops_modify.constprop.0+0x2d6/0xd50 [ 27.561667] kasan_check_range+0x10c/0x1c0 [ 27.562318] __kasan_check_write+0x18/0x20 [ 27.563324] kasan_bitops_modify.constprop.0+0x2d6/0xd50 [ 27.564318] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 27.565280] ? __kmalloc_cache_noprof+0x184/0x410 [ 27.566419] ? trace_hardirqs_on+0x37/0xe0 [ 27.567333] ? kasan_bitops_generic+0x93/0x1c0 [ 27.568278] kasan_bitops_generic+0x117/0x1c0 [ 27.569008] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 27.569680] ? __pfx_read_tsc+0x10/0x10 [ 27.571034] ? ktime_get_ts64+0x86/0x230 [ 27.571532] kunit_try_run_case+0x1b3/0x490 [ 27.571964] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.573403] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 27.574066] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.575170] ? __kthread_parkme+0x82/0x160 [ 27.575428] ? preempt_count_sub+0x50/0x80 [ 27.575627] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.575836] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.576834] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.577237] kthread+0x257/0x310 [ 27.577913] ? __pfx_kthread+0x10/0x10 [ 27.579611] ret_from_fork+0x41/0x80 [ 27.580078] ? __pfx_kthread+0x10/0x10 [ 27.581365] ret_from_fork_asm+0x1a/0x30 [ 27.582087] </TASK> [ 27.582334] [ 27.582539] Allocated by task 269: [ 27.582916] kasan_save_stack+0x3d/0x60 [ 27.583387] kasan_save_track+0x18/0x40 [ 27.583890] kasan_save_alloc_info+0x3b/0x50 [ 27.584483] __kasan_kmalloc+0xb7/0xc0 [ 27.584892] __kmalloc_cache_noprof+0x184/0x410 [ 27.585621] kasan_bitops_generic+0x93/0x1c0 [ 27.585993] kunit_try_run_case+0x1b3/0x490 [ 27.586330] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.587549] kthread+0x257/0x310 [ 27.587919] ret_from_fork+0x41/0x80 [ 27.588313] ret_from_fork_asm+0x1a/0x30 [ 27.588676] [ 27.588917] The buggy address belongs to the object at ffff888101b3cce0 [ 27.588917] which belongs to the cache kmalloc-16 of size 16 [ 27.591253] The buggy address is located 8 bytes inside of [ 27.591253] allocated 9-byte region [ffff888101b3cce0, ffff888101b3cce9) [ 27.592406] [ 27.593242] The buggy address belongs to the physical page: [ 27.593926] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3c [ 27.595747] flags: 0x200000000000000(node=0|zone=2) [ 27.596195] page_type: f5(slab) [ 27.596548] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 27.597876] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 27.598810] page dumped because: kasan: bad access detected [ 27.600404] [ 27.600651] Memory state around the buggy address: [ 27.601036] ffff888101b3cb80: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc [ 27.601923] ffff888101b3cc00: 00 02 fc fc 00 02 fc fc 00 05 fc fc fa fb fc fc [ 27.603077] >ffff888101b3cc80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 27.603788] ^ [ 27.604702] ffff888101b3cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.605326] ffff888101b3cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.606458] ================================================================== [ 27.479307] ================================================================== [ 27.480153] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23b/0xd50 [ 27.482515] Write of size 8 at addr ffff888101b3cce8 by task kunit_try_catch/269 [ 27.483058] [ 27.483240] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 27.485556] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.486614] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.487639] Call Trace: [ 27.487873] <TASK> [ 27.488437] dump_stack_lvl+0x73/0xb0 [ 27.489204] print_report+0xd1/0x640 [ 27.489863] ? __virt_addr_valid+0x1db/0x2d0 [ 27.491027] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.491847] kasan_report+0x102/0x140 [ 27.492448] ? kasan_bitops_modify.constprop.0+0x23b/0xd50 [ 27.493305] ? kasan_bitops_modify.constprop.0+0x23b/0xd50 [ 27.493835] kasan_check_range+0x10c/0x1c0 [ 27.495056] __kasan_check_write+0x18/0x20 [ 27.495496] kasan_bitops_modify.constprop.0+0x23b/0xd50 [ 27.496545] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 27.497292] ? __kmalloc_cache_noprof+0x184/0x410 [ 27.497924] ? trace_hardirqs_on+0x37/0xe0 [ 27.498617] ? kasan_bitops_generic+0x93/0x1c0 [ 27.499347] kasan_bitops_generic+0x117/0x1c0 [ 27.500084] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 27.501236] ? __pfx_read_tsc+0x10/0x10 [ 27.501484] ? ktime_get_ts64+0x86/0x230 [ 27.502042] kunit_try_run_case+0x1b3/0x490 [ 27.502748] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.503813] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 27.504430] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.504989] ? __kthread_parkme+0x82/0x160 [ 27.505364] ? preempt_count_sub+0x50/0x80 [ 27.506270] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.506717] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.508377] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.509369] kthread+0x257/0x310 [ 27.510203] ? __pfx_kthread+0x10/0x10 [ 27.511143] ret_from_fork+0x41/0x80 [ 27.511790] ? __pfx_kthread+0x10/0x10 [ 27.512215] ret_from_fork_asm+0x1a/0x30 [ 27.512668] </TASK> [ 27.512994] [ 27.513195] Allocated by task 269: [ 27.513646] kasan_save_stack+0x3d/0x60 [ 27.515114] kasan_save_track+0x18/0x40 [ 27.516111] kasan_save_alloc_info+0x3b/0x50 [ 27.516855] __kasan_kmalloc+0xb7/0xc0 [ 27.517127] __kmalloc_cache_noprof+0x184/0x410 [ 27.517360] kasan_bitops_generic+0x93/0x1c0 [ 27.517668] kunit_try_run_case+0x1b3/0x490 [ 27.519363] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.520543] kthread+0x257/0x310 [ 27.521047] ret_from_fork+0x41/0x80 [ 27.522150] ret_from_fork_asm+0x1a/0x30 [ 27.523077] [ 27.523617] The buggy address belongs to the object at ffff888101b3cce0 [ 27.523617] which belongs to the cache kmalloc-16 of size 16 [ 27.525710] The buggy address is located 8 bytes inside of [ 27.525710] allocated 9-byte region [ffff888101b3cce0, ffff888101b3cce9) [ 27.527081] [ 27.527310] The buggy address belongs to the physical page: [ 27.529268] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3c [ 27.529952] flags: 0x200000000000000(node=0|zone=2) [ 27.531200] page_type: f5(slab) [ 27.531829] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 27.533187] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 27.534125] page dumped because: kasan: bad access detected [ 27.535162] [ 27.535348] Memory state around the buggy address: [ 27.535671] ffff888101b3cb80: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc [ 27.537326] ffff888101b3cc00: 00 02 fc fc 00 02 fc fc 00 05 fc fc fa fb fc fc [ 27.538147] >ffff888101b3cc80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 27.539495] ^ [ 27.540911] ffff888101b3cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.542127] ffff888101b3cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.543526] ================================================================== [ 27.665965] ================================================================== [ 27.667195] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40f/0xd50 [ 27.668044] Write of size 8 at addr ffff888101b3cce8 by task kunit_try_catch/269 [ 27.668865] [ 27.669132] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 27.671005] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.671618] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.673642] Call Trace: [ 27.674126] <TASK> [ 27.674355] dump_stack_lvl+0x73/0xb0 [ 27.675084] print_report+0xd1/0x640 [ 27.675397] ? __virt_addr_valid+0x1db/0x2d0 [ 27.676298] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.676766] kasan_report+0x102/0x140 [ 27.677234] ? kasan_bitops_modify.constprop.0+0x40f/0xd50 [ 27.678589] ? kasan_bitops_modify.constprop.0+0x40f/0xd50 [ 27.679239] kasan_check_range+0x10c/0x1c0 [ 27.679571] __kasan_check_write+0x18/0x20 [ 27.680108] kasan_bitops_modify.constprop.0+0x40f/0xd50 [ 27.680615] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 27.681486] ? __kmalloc_cache_noprof+0x184/0x410 [ 27.682234] ? trace_hardirqs_on+0x37/0xe0 [ 27.682569] ? kasan_bitops_generic+0x93/0x1c0 [ 27.682893] kasan_bitops_generic+0x117/0x1c0 [ 27.683720] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 27.684380] ? __pfx_read_tsc+0x10/0x10 [ 27.684683] ? ktime_get_ts64+0x86/0x230 [ 27.685338] kunit_try_run_case+0x1b3/0x490 [ 27.685922] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.686495] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 27.687090] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.687518] ? __kthread_parkme+0x82/0x160 [ 27.689196] ? preempt_count_sub+0x50/0x80 [ 27.689583] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.690434] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.691046] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.691793] kthread+0x257/0x310 [ 27.692339] ? __pfx_kthread+0x10/0x10 [ 27.692698] ret_from_fork+0x41/0x80 [ 27.693085] ? __pfx_kthread+0x10/0x10 [ 27.693970] ret_from_fork_asm+0x1a/0x30 [ 27.694685] </TASK> [ 27.694966] [ 27.696052] Allocated by task 269: [ 27.696399] kasan_save_stack+0x3d/0x60 [ 27.696800] kasan_save_track+0x18/0x40 [ 27.697383] kasan_save_alloc_info+0x3b/0x50 [ 27.697812] __kasan_kmalloc+0xb7/0xc0 [ 27.698253] __kmalloc_cache_noprof+0x184/0x410 [ 27.698788] kasan_bitops_generic+0x93/0x1c0 [ 27.699319] kunit_try_run_case+0x1b3/0x490 [ 27.699810] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.701582] kthread+0x257/0x310 [ 27.702240] ret_from_fork+0x41/0x80 [ 27.703352] ret_from_fork_asm+0x1a/0x30 [ 27.704059] [ 27.704594] The buggy address belongs to the object at ffff888101b3cce0 [ 27.704594] which belongs to the cache kmalloc-16 of size 16 [ 27.706008] The buggy address is located 8 bytes inside of [ 27.706008] allocated 9-byte region [ffff888101b3cce0, ffff888101b3cce9) [ 27.708092] [ 27.708271] The buggy address belongs to the physical page: [ 27.708968] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3c [ 27.709720] flags: 0x200000000000000(node=0|zone=2) [ 27.710742] page_type: f5(slab) [ 27.711138] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 27.711870] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 27.712663] page dumped because: kasan: bad access detected [ 27.714259] [ 27.714535] Memory state around the buggy address: [ 27.714829] ffff888101b3cb80: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc [ 27.715797] ffff888101b3cc00: 00 02 fc fc 00 02 fc fc 00 05 fc fc fa fb fc fc [ 27.716651] >ffff888101b3cc80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 27.717250] ^ [ 27.718040] ffff888101b3cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.718774] ffff888101b3cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.719189] ==================================================================