Date
Dec. 6, 2024, 3:11 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 34.907738] ================================================================== [ 34.908986] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc8 [ 34.909754] Write of size 8 at addr fff00000c5b518c8 by task kunit_try_catch/250 [ 34.910848] [ 34.911274] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 34.912658] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.913231] Hardware name: linux,dummy-virt (DT) [ 34.913944] Call trace: [ 34.914454] show_stack+0x20/0x38 (C) [ 34.915076] dump_stack_lvl+0x8c/0xd0 [ 34.915819] print_report+0x118/0x5e0 [ 34.916448] kasan_report+0xc8/0x118 [ 34.917181] kasan_check_range+0x100/0x1a8 [ 34.917833] __kasan_check_write+0x20/0x30 [ 34.918586] kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc8 [ 34.919428] kasan_bitops_generic+0x11c/0x1c8 [ 34.920146] kunit_try_run_case+0x14c/0x3d0 [ 34.920848] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.921638] kthread+0x24c/0x2d0 [ 34.922233] ret_from_fork+0x10/0x20 [ 34.922913] [ 34.923307] Allocated by task 250: [ 34.923925] kasan_save_stack+0x3c/0x68 [ 34.924499] kasan_save_track+0x20/0x40 [ 34.925184] kasan_save_alloc_info+0x40/0x58 [ 34.925830] __kasan_kmalloc+0xd4/0xd8 [ 34.926487] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.927138] kasan_bitops_generic+0xa0/0x1c8 [ 34.927864] kunit_try_run_case+0x14c/0x3d0 [ 34.928660] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.929287] kthread+0x24c/0x2d0 [ 34.929919] ret_from_fork+0x10/0x20 [ 34.930652] [ 34.930985] The buggy address belongs to the object at fff00000c5b518c0 [ 34.930985] which belongs to the cache kmalloc-16 of size 16 [ 34.932157] The buggy address is located 8 bytes inside of [ 34.932157] allocated 9-byte region [fff00000c5b518c0, fff00000c5b518c9) [ 34.933006] [ 34.933317] The buggy address belongs to the physical page: [ 34.933874] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b51 [ 34.934856] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.935600] page_type: f5(slab) [ 34.936215] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 34.937039] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 34.938012] page dumped because: kasan: bad access detected [ 34.938711] [ 34.939051] Memory state around the buggy address: [ 34.939709] fff00000c5b51780: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.940433] fff00000c5b51800: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.941302] >fff00000c5b51880: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 34.942140] ^ [ 34.942847] fff00000c5b51900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.943633] fff00000c5b51980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.944431] ================================================================== [ 34.946112] ================================================================== [ 34.947051] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xad4/0xbc8 [ 34.948145] Read of size 8 at addr fff00000c5b518c8 by task kunit_try_catch/250 [ 34.948929] [ 34.949338] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 34.950474] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.951060] Hardware name: linux,dummy-virt (DT) [ 34.951636] Call trace: [ 34.952099] show_stack+0x20/0x38 (C) [ 34.952703] dump_stack_lvl+0x8c/0xd0 [ 34.953331] print_report+0x118/0x5e0 [ 34.953956] kasan_report+0xc8/0x118 [ 34.954609] __asan_report_load8_noabort+0x20/0x30 [ 34.955224] kasan_bitops_test_and_modify.constprop.0+0xad4/0xbc8 [ 34.956139] kasan_bitops_generic+0x11c/0x1c8 [ 34.956766] kunit_try_run_case+0x14c/0x3d0 [ 34.957481] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.958307] kthread+0x24c/0x2d0 [ 34.958942] ret_from_fork+0x10/0x20 [ 34.959561] [ 34.959873] Allocated by task 250: [ 34.960440] kasan_save_stack+0x3c/0x68 [ 34.961102] kasan_save_track+0x20/0x40 [ 34.961662] kasan_save_alloc_info+0x40/0x58 [ 34.962350] __kasan_kmalloc+0xd4/0xd8 [ 34.963004] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.963566] kasan_bitops_generic+0xa0/0x1c8 [ 34.964233] kunit_try_run_case+0x14c/0x3d0 [ 34.964894] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.965593] kthread+0x24c/0x2d0 [ 34.966219] ret_from_fork+0x10/0x20 [ 34.966851] [ 34.967223] The buggy address belongs to the object at fff00000c5b518c0 [ 34.967223] which belongs to the cache kmalloc-16 of size 16 [ 34.968488] The buggy address is located 8 bytes inside of [ 34.968488] allocated 9-byte region [fff00000c5b518c0, fff00000c5b518c9) [ 34.969609] [ 34.969980] The buggy address belongs to the physical page: [ 34.970755] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b51 [ 34.971554] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.972427] page_type: f5(slab) [ 34.973011] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 34.973875] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 34.974769] page dumped because: kasan: bad access detected [ 34.975553] [ 34.975967] Memory state around the buggy address: [ 34.976528] fff00000c5b51780: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.977450] fff00000c5b51800: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.978181] >fff00000c5b51880: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 34.979117] ^ [ 34.979768] fff00000c5b51900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.980671] fff00000c5b51980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.981531] ================================================================== [ 35.063205] ================================================================== [ 35.063959] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa8c/0xbc8 [ 35.064952] Read of size 8 at addr fff00000c5b518c8 by task kunit_try_catch/250 [ 35.065674] [ 35.066081] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 35.067790] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.068343] Hardware name: linux,dummy-virt (DT) [ 35.069077] Call trace: [ 35.069573] show_stack+0x20/0x38 (C) [ 35.070228] dump_stack_lvl+0x8c/0xd0 [ 35.070748] print_report+0x118/0x5e0 [ 35.071340] kasan_report+0xc8/0x118 [ 35.071897] __asan_report_load8_noabort+0x20/0x30 [ 35.072696] kasan_bitops_test_and_modify.constprop.0+0xa8c/0xbc8 [ 35.073618] kasan_bitops_generic+0x11c/0x1c8 [ 35.074332] kunit_try_run_case+0x14c/0x3d0 [ 35.075097] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.075736] kthread+0x24c/0x2d0 [ 35.076347] ret_from_fork+0x10/0x20 [ 35.077022] [ 35.077426] Allocated by task 250: [ 35.077893] kasan_save_stack+0x3c/0x68 [ 35.078469] kasan_save_track+0x20/0x40 [ 35.079072] kasan_save_alloc_info+0x40/0x58 [ 35.079653] __kasan_kmalloc+0xd4/0xd8 [ 35.080267] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.080871] kasan_bitops_generic+0xa0/0x1c8 [ 35.081442] kunit_try_run_case+0x14c/0x3d0 [ 35.082116] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.082847] kthread+0x24c/0x2d0 [ 35.083449] ret_from_fork+0x10/0x20 [ 35.084085] [ 35.084451] The buggy address belongs to the object at fff00000c5b518c0 [ 35.084451] which belongs to the cache kmalloc-16 of size 16 [ 35.085652] The buggy address is located 8 bytes inside of [ 35.085652] allocated 9-byte region [fff00000c5b518c0, fff00000c5b518c9) [ 35.087030] [ 35.087416] The buggy address belongs to the physical page: [ 35.088185] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b51 [ 35.089054] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.089828] page_type: f5(slab) [ 35.090392] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 35.091220] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 35.092110] page dumped because: kasan: bad access detected [ 35.092864] [ 35.093240] Memory state around the buggy address: [ 35.093898] fff00000c5b51780: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 35.094655] fff00000c5b51800: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 35.095606] >fff00000c5b51880: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 35.096394] ^ [ 35.097146] fff00000c5b51900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.098020] fff00000c5b51980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.098892] ================================================================== [ 34.753084] ================================================================== [ 34.754033] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc8 [ 34.755174] Write of size 8 at addr fff00000c5b518c8 by task kunit_try_catch/250 [ 34.756117] [ 34.756665] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 34.757757] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.758933] Hardware name: linux,dummy-virt (DT) [ 34.759807] Call trace: [ 34.760297] show_stack+0x20/0x38 (C) [ 34.761032] dump_stack_lvl+0x8c/0xd0 [ 34.761724] print_report+0x118/0x5e0 [ 34.762390] kasan_report+0xc8/0x118 [ 34.763070] kasan_check_range+0x100/0x1a8 [ 34.763670] __kasan_check_write+0x20/0x30 [ 34.764401] kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc8 [ 34.765289] kasan_bitops_generic+0x11c/0x1c8 [ 34.766023] kunit_try_run_case+0x14c/0x3d0 [ 34.766797] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.767500] kthread+0x24c/0x2d0 [ 34.768181] ret_from_fork+0x10/0x20 [ 34.768892] [ 34.769280] Allocated by task 250: [ 34.769946] kasan_save_stack+0x3c/0x68 [ 34.770695] kasan_save_track+0x20/0x40 [ 34.771327] kasan_save_alloc_info+0x40/0x58 [ 34.772015] __kasan_kmalloc+0xd4/0xd8 [ 34.772552] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.773296] kasan_bitops_generic+0xa0/0x1c8 [ 34.774032] kunit_try_run_case+0x14c/0x3d0 [ 34.774697] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.775454] kthread+0x24c/0x2d0 [ 34.776077] ret_from_fork+0x10/0x20 [ 34.776701] [ 34.777078] The buggy address belongs to the object at fff00000c5b518c0 [ 34.777078] which belongs to the cache kmalloc-16 of size 16 [ 34.778298] The buggy address is located 8 bytes inside of [ 34.778298] allocated 9-byte region [fff00000c5b518c0, fff00000c5b518c9) [ 34.779764] [ 34.780185] The buggy address belongs to the physical page: [ 34.780916] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b51 [ 34.781886] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.782654] page_type: f5(slab) [ 34.783162] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 34.784176] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 34.784961] page dumped because: kasan: bad access detected [ 34.785726] [ 34.786093] Memory state around the buggy address: [ 34.786726] fff00000c5b51780: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.787500] fff00000c5b51800: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.788432] >fff00000c5b51880: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 34.789254] ^ [ 34.790015] fff00000c5b51900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.790918] fff00000c5b51980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.791805] ================================================================== [ 34.983490] ================================================================== [ 34.984745] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x334/0xbc8 [ 34.986330] Write of size 8 at addr fff00000c5b518c8 by task kunit_try_catch/250 [ 34.987318] [ 34.988141] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 34.989322] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.989883] Hardware name: linux,dummy-virt (DT) [ 34.990481] Call trace: [ 34.991217] show_stack+0x20/0x38 (C) [ 34.991770] dump_stack_lvl+0x8c/0xd0 [ 34.992427] print_report+0x118/0x5e0 [ 34.993125] kasan_report+0xc8/0x118 [ 34.993787] kasan_check_range+0x100/0x1a8 [ 34.994460] __kasan_check_write+0x20/0x30 [ 34.995166] kasan_bitops_test_and_modify.constprop.0+0x334/0xbc8 [ 34.996041] kasan_bitops_generic+0x11c/0x1c8 [ 34.996756] kunit_try_run_case+0x14c/0x3d0 [ 34.997443] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.998252] kthread+0x24c/0x2d0 [ 34.998831] ret_from_fork+0x10/0x20 [ 34.999415] [ 34.999834] Allocated by task 250: [ 35.000412] kasan_save_stack+0x3c/0x68 [ 35.001139] kasan_save_track+0x20/0x40 [ 35.001675] kasan_save_alloc_info+0x40/0x58 [ 35.002444] __kasan_kmalloc+0xd4/0xd8 [ 35.003128] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.003803] kasan_bitops_generic+0xa0/0x1c8 [ 35.004506] kunit_try_run_case+0x14c/0x3d0 [ 35.005127] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.005913] kthread+0x24c/0x2d0 [ 35.006476] ret_from_fork+0x10/0x20 [ 35.007094] [ 35.007526] The buggy address belongs to the object at fff00000c5b518c0 [ 35.007526] which belongs to the cache kmalloc-16 of size 16 [ 35.008816] The buggy address is located 8 bytes inside of [ 35.008816] allocated 9-byte region [fff00000c5b518c0, fff00000c5b518c9) [ 35.010116] [ 35.010540] The buggy address belongs to the physical page: [ 35.011196] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b51 [ 35.012182] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.012871] page_type: f5(slab) [ 35.013439] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 35.014339] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 35.015364] page dumped because: kasan: bad access detected [ 35.016140] [ 35.016627] Memory state around the buggy address: [ 35.017209] fff00000c5b51780: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 35.018066] fff00000c5b51800: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 35.019046] >fff00000c5b51880: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 35.019983] ^ [ 35.020723] fff00000c5b51900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.021650] fff00000c5b51980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.022578] ================================================================== [ 34.830996] ================================================================== [ 34.831787] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc8 [ 34.833122] Write of size 8 at addr fff00000c5b518c8 by task kunit_try_catch/250 [ 34.834017] [ 34.834423] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 34.835807] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.836420] Hardware name: linux,dummy-virt (DT) [ 34.837006] Call trace: [ 34.837477] show_stack+0x20/0x38 (C) [ 34.838151] dump_stack_lvl+0x8c/0xd0 [ 34.838732] print_report+0x118/0x5e0 [ 34.839381] kasan_report+0xc8/0x118 [ 34.839990] kasan_check_range+0x100/0x1a8 [ 34.840641] __kasan_check_write+0x20/0x30 [ 34.841273] kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc8 [ 34.841985] kasan_bitops_generic+0x11c/0x1c8 [ 34.842715] kunit_try_run_case+0x14c/0x3d0 [ 34.843425] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.844211] kthread+0x24c/0x2d0 [ 34.844840] ret_from_fork+0x10/0x20 [ 34.845456] [ 34.845842] Allocated by task 250: [ 34.846410] kasan_save_stack+0x3c/0x68 [ 34.846967] kasan_save_track+0x20/0x40 [ 34.847580] kasan_save_alloc_info+0x40/0x58 [ 34.848203] __kasan_kmalloc+0xd4/0xd8 [ 34.848846] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.849450] kasan_bitops_generic+0xa0/0x1c8 [ 34.850061] kunit_try_run_case+0x14c/0x3d0 [ 34.850753] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.851428] kthread+0x24c/0x2d0 [ 34.852024] ret_from_fork+0x10/0x20 [ 34.852586] [ 34.852944] The buggy address belongs to the object at fff00000c5b518c0 [ 34.852944] which belongs to the cache kmalloc-16 of size 16 [ 34.854273] The buggy address is located 8 bytes inside of [ 34.854273] allocated 9-byte region [fff00000c5b518c0, fff00000c5b518c9) [ 34.855453] [ 34.855837] The buggy address belongs to the physical page: [ 34.856597] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b51 [ 34.857433] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.858181] page_type: f5(slab) [ 34.858774] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 34.859783] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 34.860713] page dumped because: kasan: bad access detected [ 34.861422] [ 34.861814] Memory state around the buggy address: [ 34.862468] fff00000c5b51780: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.863276] fff00000c5b51800: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.864119] >fff00000c5b51880: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 34.864955] ^ [ 34.865694] fff00000c5b51900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.866450] fff00000c5b51980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.867335] ================================================================== [ 35.023934] ================================================================== [ 35.025061] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa44/0xbc8 [ 35.026285] Read of size 8 at addr fff00000c5b518c8 by task kunit_try_catch/250 [ 35.027719] [ 35.027993] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 35.029457] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.030169] Hardware name: linux,dummy-virt (DT) [ 35.031002] Call trace: [ 35.031402] show_stack+0x20/0x38 (C) [ 35.031977] dump_stack_lvl+0x8c/0xd0 [ 35.032661] print_report+0x118/0x5e0 [ 35.033343] kasan_report+0xc8/0x118 [ 35.034069] __asan_report_load8_noabort+0x20/0x30 [ 35.034852] kasan_bitops_test_and_modify.constprop.0+0xa44/0xbc8 [ 35.035227] kasan_bitops_generic+0x11c/0x1c8 [ 35.035544] kunit_try_run_case+0x14c/0x3d0 [ 35.036111] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.036885] kthread+0x24c/0x2d0 [ 35.037537] ret_from_fork+0x10/0x20 [ 35.038204] [ 35.038460] Allocated by task 250: [ 35.038996] kasan_save_stack+0x3c/0x68 [ 35.039676] kasan_save_track+0x20/0x40 [ 35.040354] kasan_save_alloc_info+0x40/0x58 [ 35.041104] __kasan_kmalloc+0xd4/0xd8 [ 35.041845] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.042683] kasan_bitops_generic+0xa0/0x1c8 [ 35.043411] kunit_try_run_case+0x14c/0x3d0 [ 35.044030] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.044376] kthread+0x24c/0x2d0 [ 35.044749] ret_from_fork+0x10/0x20 [ 35.045500] [ 35.045960] The buggy address belongs to the object at fff00000c5b518c0 [ 35.045960] which belongs to the cache kmalloc-16 of size 16 [ 35.047563] The buggy address is located 8 bytes inside of [ 35.047563] allocated 9-byte region [fff00000c5b518c0, fff00000c5b518c9) [ 35.048835] [ 35.049147] The buggy address belongs to the physical page: [ 35.049867] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b51 [ 35.050806] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.051608] page_type: f5(slab) [ 35.052184] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 35.053092] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 35.053873] page dumped because: kasan: bad access detected [ 35.054634] [ 35.054961] Memory state around the buggy address: [ 35.055609] fff00000c5b51780: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 35.056481] fff00000c5b51800: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 35.057278] >fff00000c5b51880: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 35.058116] ^ [ 35.058819] fff00000c5b51900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.059727] fff00000c5b51980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.060479] ================================================================== [ 34.793661] ================================================================== [ 34.794677] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa08/0xbc8 [ 34.795566] Read of size 8 at addr fff00000c5b518c8 by task kunit_try_catch/250 [ 34.796270] [ 34.796700] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 34.797899] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.798543] Hardware name: linux,dummy-virt (DT) [ 34.799213] Call trace: [ 34.799698] show_stack+0x20/0x38 (C) [ 34.800253] dump_stack_lvl+0x8c/0xd0 [ 34.800927] print_report+0x118/0x5e0 [ 34.801547] kasan_report+0xc8/0x118 [ 34.802048] __asan_report_load8_noabort+0x20/0x30 [ 34.802822] kasan_bitops_test_and_modify.constprop.0+0xa08/0xbc8 [ 34.803561] kasan_bitops_generic+0x11c/0x1c8 [ 34.804274] kunit_try_run_case+0x14c/0x3d0 [ 34.804993] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.805812] kthread+0x24c/0x2d0 [ 34.806330] ret_from_fork+0x10/0x20 [ 34.807003] [ 34.807383] Allocated by task 250: [ 34.807847] kasan_save_stack+0x3c/0x68 [ 34.808483] kasan_save_track+0x20/0x40 [ 34.809068] kasan_save_alloc_info+0x40/0x58 [ 34.809779] __kasan_kmalloc+0xd4/0xd8 [ 34.810402] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.811094] kasan_bitops_generic+0xa0/0x1c8 [ 34.811686] kunit_try_run_case+0x14c/0x3d0 [ 34.812375] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.813186] kthread+0x24c/0x2d0 [ 34.813744] ret_from_fork+0x10/0x20 [ 34.814367] [ 34.814767] The buggy address belongs to the object at fff00000c5b518c0 [ 34.814767] which belongs to the cache kmalloc-16 of size 16 [ 34.815909] The buggy address is located 8 bytes inside of [ 34.815909] allocated 9-byte region [fff00000c5b518c0, fff00000c5b518c9) [ 34.817343] [ 34.817708] The buggy address belongs to the physical page: [ 34.818446] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b51 [ 34.819329] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.820127] page_type: f5(slab) [ 34.820700] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 34.821417] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 34.822393] page dumped because: kasan: bad access detected [ 34.823134] [ 34.823538] Memory state around the buggy address: [ 34.824157] fff00000c5b51780: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.825103] fff00000c5b51800: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.825851] >fff00000c5b51880: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 34.826717] ^ [ 34.827381] fff00000c5b51900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.828237] fff00000c5b51980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.829048] ================================================================== [ 34.870679] ================================================================== [ 34.871425] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa50/0xbc8 [ 34.872346] Read of size 8 at addr fff00000c5b518c8 by task kunit_try_catch/250 [ 34.873063] [ 34.873465] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 34.874724] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.875353] Hardware name: linux,dummy-virt (DT) [ 34.875939] Call trace: [ 34.876407] show_stack+0x20/0x38 (C) [ 34.877066] dump_stack_lvl+0x8c/0xd0 [ 34.877733] print_report+0x118/0x5e0 [ 34.878311] kasan_report+0xc8/0x118 [ 34.878858] __asan_report_load8_noabort+0x20/0x30 [ 34.879576] kasan_bitops_test_and_modify.constprop.0+0xa50/0xbc8 [ 34.880362] kasan_bitops_generic+0x11c/0x1c8 [ 34.881035] kunit_try_run_case+0x14c/0x3d0 [ 34.881692] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.882523] kthread+0x24c/0x2d0 [ 34.883127] ret_from_fork+0x10/0x20 [ 34.883699] [ 34.884083] Allocated by task 250: [ 34.884673] kasan_save_stack+0x3c/0x68 [ 34.885307] kasan_save_track+0x20/0x40 [ 34.885875] kasan_save_alloc_info+0x40/0x58 [ 34.886554] __kasan_kmalloc+0xd4/0xd8 [ 34.887190] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.887809] kasan_bitops_generic+0xa0/0x1c8 [ 34.888486] kunit_try_run_case+0x14c/0x3d0 [ 34.889106] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.889842] kthread+0x24c/0x2d0 [ 34.890429] ret_from_fork+0x10/0x20 [ 34.891009] [ 34.891398] The buggy address belongs to the object at fff00000c5b518c0 [ 34.891398] which belongs to the cache kmalloc-16 of size 16 [ 34.892659] The buggy address is located 8 bytes inside of [ 34.892659] allocated 9-byte region [fff00000c5b518c0, fff00000c5b518c9) [ 34.893814] [ 34.894190] The buggy address belongs to the physical page: [ 34.894957] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b51 [ 34.895978] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.896760] page_type: f5(slab) [ 34.897398] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 34.898651] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 34.899311] page dumped because: kasan: bad access detected [ 34.900013] [ 34.900433] Memory state around the buggy address: [ 34.901075] fff00000c5b51780: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.901990] fff00000c5b51800: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.902829] >fff00000c5b51880: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 34.903889] ^ [ 34.904213] fff00000c5b51900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.904667] fff00000c5b51980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.905698] ==================================================================
[ 28.259666] ================================================================== [ 28.260151] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90 [ 28.262286] Read of size 8 at addr ffff888101b3cce8 by task kunit_try_catch/269 [ 28.263048] [ 28.263553] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 28.263978] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.264249] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.265644] Call Trace: [ 28.265920] <TASK> [ 28.266139] dump_stack_lvl+0x73/0xb0 [ 28.266833] print_report+0xd1/0x640 [ 28.267287] ? __virt_addr_valid+0x1db/0x2d0 [ 28.268035] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.268804] kasan_report+0x102/0x140 [ 28.269293] ? kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90 [ 28.269924] ? kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90 [ 28.270526] __asan_report_load8_noabort+0x18/0x20 [ 28.271304] kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90 [ 28.271791] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 28.272570] ? __kmalloc_cache_noprof+0x184/0x410 [ 28.273022] ? trace_hardirqs_on+0x37/0xe0 [ 28.273462] ? kasan_bitops_generic+0x93/0x1c0 [ 28.274007] kasan_bitops_generic+0x122/0x1c0 [ 28.274425] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 28.274847] ? __pfx_read_tsc+0x10/0x10 [ 28.275402] ? ktime_get_ts64+0x86/0x230 [ 28.275722] kunit_try_run_case+0x1b3/0x490 [ 28.276056] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.276706] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 28.277387] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.277888] ? __kthread_parkme+0x82/0x160 [ 28.278274] ? preempt_count_sub+0x50/0x80 [ 28.278785] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.279476] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.280310] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.280986] kthread+0x257/0x310 [ 28.281425] ? __pfx_kthread+0x10/0x10 [ 28.281795] ret_from_fork+0x41/0x80 [ 28.282321] ? __pfx_kthread+0x10/0x10 [ 28.282784] ret_from_fork_asm+0x1a/0x30 [ 28.283417] </TASK> [ 28.283785] [ 28.283994] Allocated by task 269: [ 28.284514] kasan_save_stack+0x3d/0x60 [ 28.284983] kasan_save_track+0x18/0x40 [ 28.285411] kasan_save_alloc_info+0x3b/0x50 [ 28.285724] __kasan_kmalloc+0xb7/0xc0 [ 28.286337] __kmalloc_cache_noprof+0x184/0x410 [ 28.286728] kasan_bitops_generic+0x93/0x1c0 [ 28.287372] kunit_try_run_case+0x1b3/0x490 [ 28.287708] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.288502] kthread+0x257/0x310 [ 28.288815] ret_from_fork+0x41/0x80 [ 28.289319] ret_from_fork_asm+0x1a/0x30 [ 28.289868] [ 28.290196] The buggy address belongs to the object at ffff888101b3cce0 [ 28.290196] which belongs to the cache kmalloc-16 of size 16 [ 28.291172] The buggy address is located 8 bytes inside of [ 28.291172] allocated 9-byte region [ffff888101b3cce0, ffff888101b3cce9) [ 28.292369] [ 28.292540] The buggy address belongs to the physical page: [ 28.293189] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3c [ 28.293977] flags: 0x200000000000000(node=0|zone=2) [ 28.294363] page_type: f5(slab) [ 28.294848] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 28.295632] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 28.296509] page dumped because: kasan: bad access detected [ 28.297153] [ 28.297336] Memory state around the buggy address: [ 28.297889] ffff888101b3cb80: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc [ 28.298766] ffff888101b3cc00: 00 02 fc fc 00 02 fc fc 00 05 fc fc fa fb fc fc [ 28.299467] >ffff888101b3cc80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 28.300295] ^ [ 28.300978] ffff888101b3cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.301745] ffff888101b3cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.302560] ================================================================== [ 28.146673] ================================================================== [ 28.148748] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90 [ 28.149916] Write of size 8 at addr ffff888101b3cce8 by task kunit_try_catch/269 [ 28.150861] [ 28.151054] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 28.152557] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.153230] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.154194] Call Trace: [ 28.154808] <TASK> [ 28.155362] dump_stack_lvl+0x73/0xb0 [ 28.155994] print_report+0xd1/0x640 [ 28.156824] ? __virt_addr_valid+0x1db/0x2d0 [ 28.157227] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.157975] kasan_report+0x102/0x140 [ 28.158658] ? kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90 [ 28.159841] ? kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90 [ 28.160626] kasan_check_range+0x10c/0x1c0 [ 28.161069] __kasan_check_write+0x18/0x20 [ 28.161504] kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90 [ 28.162756] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 28.163574] ? __kmalloc_cache_noprof+0x184/0x410 [ 28.164300] ? trace_hardirqs_on+0x37/0xe0 [ 28.164979] ? kasan_bitops_generic+0x93/0x1c0 [ 28.165753] kasan_bitops_generic+0x122/0x1c0 [ 28.166544] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 28.167281] ? __pfx_read_tsc+0x10/0x10 [ 28.167863] ? ktime_get_ts64+0x86/0x230 [ 28.168281] kunit_try_run_case+0x1b3/0x490 [ 28.168684] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.169551] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 28.170218] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.170992] ? __kthread_parkme+0x82/0x160 [ 28.171656] ? preempt_count_sub+0x50/0x80 [ 28.172352] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.173005] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.174146] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.174676] kthread+0x257/0x310 [ 28.175343] ? __pfx_kthread+0x10/0x10 [ 28.175950] ret_from_fork+0x41/0x80 [ 28.176542] ? __pfx_kthread+0x10/0x10 [ 28.177191] ret_from_fork_asm+0x1a/0x30 [ 28.177831] </TASK> [ 28.178402] [ 28.178685] Allocated by task 269: [ 28.179066] kasan_save_stack+0x3d/0x60 [ 28.180129] kasan_save_track+0x18/0x40 [ 28.180493] kasan_save_alloc_info+0x3b/0x50 [ 28.181194] __kasan_kmalloc+0xb7/0xc0 [ 28.181835] __kmalloc_cache_noprof+0x184/0x410 [ 28.182578] kasan_bitops_generic+0x93/0x1c0 [ 28.183164] kunit_try_run_case+0x1b3/0x490 [ 28.183795] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.184661] kthread+0x257/0x310 [ 28.185072] ret_from_fork+0x41/0x80 [ 28.185446] ret_from_fork_asm+0x1a/0x30 [ 28.185849] [ 28.186705] The buggy address belongs to the object at ffff888101b3cce0 [ 28.186705] which belongs to the cache kmalloc-16 of size 16 [ 28.188580] The buggy address is located 8 bytes inside of [ 28.188580] allocated 9-byte region [ffff888101b3cce0, ffff888101b3cce9) [ 28.190003] [ 28.190522] The buggy address belongs to the physical page: [ 28.191126] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3c [ 28.192113] flags: 0x200000000000000(node=0|zone=2) [ 28.193022] page_type: f5(slab) [ 28.193744] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 28.194927] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 28.196149] page dumped because: kasan: bad access detected [ 28.196569] [ 28.197119] Memory state around the buggy address: [ 28.197989] ffff888101b3cb80: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc [ 28.198991] ffff888101b3cc00: 00 02 fc fc 00 02 fc fc 00 05 fc fc fa fb fc fc [ 28.199996] >ffff888101b3cc80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 28.200912] ^ [ 28.201911] ffff888101b3cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.202909] ffff888101b3cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.203775] ================================================================== [ 28.001519] ================================================================== [ 28.003178] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90 [ 28.004951] Write of size 8 at addr ffff888101b3cce8 by task kunit_try_catch/269 [ 28.005892] [ 28.006153] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 28.007097] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.007645] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.008310] Call Trace: [ 28.008750] <TASK> [ 28.009093] dump_stack_lvl+0x73/0xb0 [ 28.009455] print_report+0xd1/0x640 [ 28.009752] ? __virt_addr_valid+0x1db/0x2d0 [ 28.010575] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.011393] kasan_report+0x102/0x140 [ 28.011812] ? kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90 [ 28.013202] ? kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90 [ 28.013836] kasan_check_range+0x10c/0x1c0 [ 28.014588] __kasan_check_write+0x18/0x20 [ 28.015668] kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90 [ 28.016604] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 28.017533] ? __kmalloc_cache_noprof+0x184/0x410 [ 28.018152] ? trace_hardirqs_on+0x37/0xe0 [ 28.018366] ? kasan_bitops_generic+0x93/0x1c0 [ 28.018577] kasan_bitops_generic+0x122/0x1c0 [ 28.018780] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 28.019096] ? __pfx_read_tsc+0x10/0x10 [ 28.019738] ? ktime_get_ts64+0x86/0x230 [ 28.020213] kunit_try_run_case+0x1b3/0x490 [ 28.021023] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.021642] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 28.022832] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.023549] ? __kthread_parkme+0x82/0x160 [ 28.024364] ? preempt_count_sub+0x50/0x80 [ 28.025180] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.025805] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.026552] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.027912] kthread+0x257/0x310 [ 28.028617] ? __pfx_kthread+0x10/0x10 [ 28.029035] ret_from_fork+0x41/0x80 [ 28.029613] ? __pfx_kthread+0x10/0x10 [ 28.030112] ret_from_fork_asm+0x1a/0x30 [ 28.030848] </TASK> [ 28.031255] [ 28.031785] Allocated by task 269: [ 28.032075] kasan_save_stack+0x3d/0x60 [ 28.032610] kasan_save_track+0x18/0x40 [ 28.032986] kasan_save_alloc_info+0x3b/0x50 [ 28.033474] __kasan_kmalloc+0xb7/0xc0 [ 28.033840] __kmalloc_cache_noprof+0x184/0x410 [ 28.035425] kasan_bitops_generic+0x93/0x1c0 [ 28.035964] kunit_try_run_case+0x1b3/0x490 [ 28.036498] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.037037] kthread+0x257/0x310 [ 28.037497] ret_from_fork+0x41/0x80 [ 28.037924] ret_from_fork_asm+0x1a/0x30 [ 28.038374] [ 28.038633] The buggy address belongs to the object at ffff888101b3cce0 [ 28.038633] which belongs to the cache kmalloc-16 of size 16 [ 28.039806] The buggy address is located 8 bytes inside of [ 28.039806] allocated 9-byte region [ffff888101b3cce0, ffff888101b3cce9) [ 28.041004] [ 28.041353] The buggy address belongs to the physical page: [ 28.041697] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3c [ 28.042734] flags: 0x200000000000000(node=0|zone=2) [ 28.043222] page_type: f5(slab) [ 28.043732] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 28.044516] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 28.045331] page dumped because: kasan: bad access detected [ 28.045835] [ 28.046198] Memory state around the buggy address: [ 28.046752] ffff888101b3cb80: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc [ 28.047524] ffff888101b3cc00: 00 02 fc fc 00 02 fc fc 00 05 fc fc fa fb fc fc [ 28.048298] >ffff888101b3cc80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 28.049014] ^ [ 28.049682] ffff888101b3cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.050437] ffff888101b3cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.051562] ================================================================== [ 28.054822] ================================================================== [ 28.055634] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90 [ 28.056994] Write of size 8 at addr ffff888101b3cce8 by task kunit_try_catch/269 [ 28.057619] [ 28.057891] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 28.058529] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.059145] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.060045] Call Trace: [ 28.060778] <TASK> [ 28.061395] dump_stack_lvl+0x73/0xb0 [ 28.062016] print_report+0xd1/0x640 [ 28.062503] ? __virt_addr_valid+0x1db/0x2d0 [ 28.062725] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.062992] kasan_report+0x102/0x140 [ 28.063822] ? kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90 [ 28.065001] ? kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90 [ 28.066456] kasan_check_range+0x10c/0x1c0 [ 28.066904] __kasan_check_write+0x18/0x20 [ 28.067255] kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90 [ 28.068068] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 28.068834] ? __kmalloc_cache_noprof+0x184/0x410 [ 28.069965] ? trace_hardirqs_on+0x37/0xe0 [ 28.070669] ? kasan_bitops_generic+0x93/0x1c0 [ 28.071494] kasan_bitops_generic+0x122/0x1c0 [ 28.072467] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 28.073361] ? __pfx_read_tsc+0x10/0x10 [ 28.074093] ? ktime_get_ts64+0x86/0x230 [ 28.075009] kunit_try_run_case+0x1b3/0x490 [ 28.075630] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.076125] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 28.076607] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.077845] ? __kthread_parkme+0x82/0x160 [ 28.079004] ? preempt_count_sub+0x50/0x80 [ 28.079401] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.079832] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.080455] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.081002] kthread+0x257/0x310 [ 28.081463] ? __pfx_kthread+0x10/0x10 [ 28.081843] ret_from_fork+0x41/0x80 [ 28.082346] ? __pfx_kthread+0x10/0x10 [ 28.082691] ret_from_fork_asm+0x1a/0x30 [ 28.083238] </TASK> [ 28.083556] [ 28.083755] Allocated by task 269: [ 28.084133] kasan_save_stack+0x3d/0x60 [ 28.084621] kasan_save_track+0x18/0x40 [ 28.084962] kasan_save_alloc_info+0x3b/0x50 [ 28.085528] __kasan_kmalloc+0xb7/0xc0 [ 28.086000] __kmalloc_cache_noprof+0x184/0x410 [ 28.086572] kasan_bitops_generic+0x93/0x1c0 [ 28.087028] kunit_try_run_case+0x1b3/0x490 [ 28.087379] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.087987] kthread+0x257/0x310 [ 28.088342] ret_from_fork+0x41/0x80 [ 28.088702] ret_from_fork_asm+0x1a/0x30 [ 28.089252] [ 28.089416] The buggy address belongs to the object at ffff888101b3cce0 [ 28.089416] which belongs to the cache kmalloc-16 of size 16 [ 28.090642] The buggy address is located 8 bytes inside of [ 28.090642] allocated 9-byte region [ffff888101b3cce0, ffff888101b3cce9) [ 28.091486] [ 28.091734] The buggy address belongs to the physical page: [ 28.092436] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3c [ 28.093035] flags: 0x200000000000000(node=0|zone=2) [ 28.093586] page_type: f5(slab) [ 28.093868] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 28.094531] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 28.095400] page dumped because: kasan: bad access detected [ 28.095877] [ 28.096134] Memory state around the buggy address: [ 28.096645] ffff888101b3cb80: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc [ 28.097236] ffff888101b3cc00: 00 02 fc fc 00 02 fc fc 00 05 fc fc fa fb fc fc [ 28.097810] >ffff888101b3cc80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 28.098293] ^ [ 28.099008] ffff888101b3cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.099715] ffff888101b3cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.100255] ================================================================== [ 28.102405] ================================================================== [ 28.103569] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90 [ 28.104541] Write of size 8 at addr ffff888101b3cce8 by task kunit_try_catch/269 [ 28.105271] [ 28.105473] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 28.106339] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.106785] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.107810] Call Trace: [ 28.108171] <TASK> [ 28.108410] dump_stack_lvl+0x73/0xb0 [ 28.108812] print_report+0xd1/0x640 [ 28.109221] ? __virt_addr_valid+0x1db/0x2d0 [ 28.109750] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.110449] kasan_report+0x102/0x140 [ 28.110924] ? kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90 [ 28.111701] ? kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90 [ 28.112323] kasan_check_range+0x10c/0x1c0 [ 28.112993] __kasan_check_write+0x18/0x20 [ 28.113668] kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90 [ 28.114313] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 28.115055] ? __kmalloc_cache_noprof+0x184/0x410 [ 28.115614] ? trace_hardirqs_on+0x37/0xe0 [ 28.116216] ? kasan_bitops_generic+0x93/0x1c0 [ 28.116746] kasan_bitops_generic+0x122/0x1c0 [ 28.117264] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 28.117717] ? __pfx_read_tsc+0x10/0x10 [ 28.118295] ? ktime_get_ts64+0x86/0x230 [ 28.118696] kunit_try_run_case+0x1b3/0x490 [ 28.119302] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.119732] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 28.120360] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.120848] ? __kthread_parkme+0x82/0x160 [ 28.121410] ? preempt_count_sub+0x50/0x80 [ 28.121750] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.122456] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.122993] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.123574] kthread+0x257/0x310 [ 28.124019] ? __pfx_kthread+0x10/0x10 [ 28.124473] ret_from_fork+0x41/0x80 [ 28.124948] ? __pfx_kthread+0x10/0x10 [ 28.125463] ret_from_fork_asm+0x1a/0x30 [ 28.125972] </TASK> [ 28.126399] [ 28.126570] Allocated by task 269: [ 28.126987] kasan_save_stack+0x3d/0x60 [ 28.127575] kasan_save_track+0x18/0x40 [ 28.128001] kasan_save_alloc_info+0x3b/0x50 [ 28.128676] __kasan_kmalloc+0xb7/0xc0 [ 28.129006] __kmalloc_cache_noprof+0x184/0x410 [ 28.129629] kasan_bitops_generic+0x93/0x1c0 [ 28.130142] kunit_try_run_case+0x1b3/0x490 [ 28.130668] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.131420] kthread+0x257/0x310 [ 28.131707] ret_from_fork+0x41/0x80 [ 28.132327] ret_from_fork_asm+0x1a/0x30 [ 28.132720] [ 28.132915] The buggy address belongs to the object at ffff888101b3cce0 [ 28.132915] which belongs to the cache kmalloc-16 of size 16 [ 28.134324] The buggy address is located 8 bytes inside of [ 28.134324] allocated 9-byte region [ffff888101b3cce0, ffff888101b3cce9) [ 28.135416] [ 28.135701] The buggy address belongs to the physical page: [ 28.136140] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3c [ 28.137005] flags: 0x200000000000000(node=0|zone=2) [ 28.137548] page_type: f5(slab) [ 28.137999] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 28.138770] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 28.139477] page dumped because: kasan: bad access detected [ 28.140047] [ 28.140353] Memory state around the buggy address: [ 28.140754] ffff888101b3cb80: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc [ 28.141518] ffff888101b3cc00: 00 02 fc fc 00 02 fc fc 00 05 fc fc fa fb fc fc [ 28.142326] >ffff888101b3cc80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 28.143036] ^ [ 28.143692] ffff888101b3cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.144450] ffff888101b3cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.145070] ================================================================== [ 27.949508] ================================================================== [ 27.951015] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90 [ 27.951729] Write of size 8 at addr ffff888101b3cce8 by task kunit_try_catch/269 [ 27.954190] [ 27.954502] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 27.955725] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.956458] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.957496] Call Trace: [ 27.957797] <TASK> [ 27.958865] dump_stack_lvl+0x73/0xb0 [ 27.959220] print_report+0xd1/0x640 [ 27.960056] ? __virt_addr_valid+0x1db/0x2d0 [ 27.960745] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.961323] kasan_report+0x102/0x140 [ 27.961696] ? kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90 [ 27.962223] ? kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90 [ 27.962815] kasan_check_range+0x10c/0x1c0 [ 27.963178] __kasan_check_write+0x18/0x20 [ 27.963806] kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90 [ 27.964615] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 27.965906] ? __kmalloc_cache_noprof+0x184/0x410 [ 27.966536] ? trace_hardirqs_on+0x37/0xe0 [ 27.966892] ? kasan_bitops_generic+0x93/0x1c0 [ 27.967520] kasan_bitops_generic+0x122/0x1c0 [ 27.968022] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 27.968420] ? __pfx_read_tsc+0x10/0x10 [ 27.968789] ? ktime_get_ts64+0x86/0x230 [ 27.969308] kunit_try_run_case+0x1b3/0x490 [ 27.970034] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.970919] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 27.971276] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.972702] ? __kthread_parkme+0x82/0x160 [ 27.973707] ? preempt_count_sub+0x50/0x80 [ 27.974219] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.974669] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.975909] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.977003] kthread+0x257/0x310 [ 27.977864] ? __pfx_kthread+0x10/0x10 [ 27.978382] ret_from_fork+0x41/0x80 [ 27.978785] ? __pfx_kthread+0x10/0x10 [ 27.979661] ret_from_fork_asm+0x1a/0x30 [ 27.980530] </TASK> [ 27.980983] [ 27.981507] Allocated by task 269: [ 27.981860] kasan_save_stack+0x3d/0x60 [ 27.982176] kasan_save_track+0x18/0x40 [ 27.982701] kasan_save_alloc_info+0x3b/0x50 [ 27.983162] __kasan_kmalloc+0xb7/0xc0 [ 27.983616] __kmalloc_cache_noprof+0x184/0x410 [ 27.984226] kasan_bitops_generic+0x93/0x1c0 [ 27.984609] kunit_try_run_case+0x1b3/0x490 [ 27.985214] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.985797] kthread+0x257/0x310 [ 27.986118] ret_from_fork+0x41/0x80 [ 27.986390] ret_from_fork_asm+0x1a/0x30 [ 27.986951] [ 27.987296] The buggy address belongs to the object at ffff888101b3cce0 [ 27.987296] which belongs to the cache kmalloc-16 of size 16 [ 27.988534] The buggy address is located 8 bytes inside of [ 27.988534] allocated 9-byte region [ffff888101b3cce0, ffff888101b3cce9) [ 27.989642] [ 27.989838] The buggy address belongs to the physical page: [ 27.990730] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3c [ 27.991569] flags: 0x200000000000000(node=0|zone=2) [ 27.992062] page_type: f5(slab) [ 27.992492] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 27.993377] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 27.993828] page dumped because: kasan: bad access detected [ 27.994495] [ 27.994762] Memory state around the buggy address: [ 27.995453] ffff888101b3cb80: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc [ 27.996135] ffff888101b3cc00: 00 02 fc fc 00 02 fc fc 00 05 fc fc fa fb fc fc [ 27.997152] >ffff888101b3cc80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 27.997553] ^ [ 27.998074] ffff888101b3cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.998963] ffff888101b3cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.999855] ================================================================== [ 27.837347] ================================================================== [ 27.838959] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x102/0xd90 [ 27.839891] Write of size 8 at addr ffff888101b3cce8 by task kunit_try_catch/269 [ 27.840514] [ 27.840696] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 27.842280] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.842759] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.843469] Call Trace: [ 27.843798] <TASK> [ 27.844144] dump_stack_lvl+0x73/0xb0 [ 27.845291] print_report+0xd1/0x640 [ 27.845686] ? __virt_addr_valid+0x1db/0x2d0 [ 27.846091] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.846978] kasan_report+0x102/0x140 [ 27.847345] ? kasan_bitops_test_and_modify.constprop.0+0x102/0xd90 [ 27.847853] ? kasan_bitops_test_and_modify.constprop.0+0x102/0xd90 [ 27.848783] kasan_check_range+0x10c/0x1c0 [ 27.849403] __kasan_check_write+0x18/0x20 [ 27.850446] kasan_bitops_test_and_modify.constprop.0+0x102/0xd90 [ 27.850856] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 27.851594] ? __kmalloc_cache_noprof+0x184/0x410 [ 27.852073] ? trace_hardirqs_on+0x37/0xe0 [ 27.852904] ? kasan_bitops_generic+0x93/0x1c0 [ 27.853528] kasan_bitops_generic+0x122/0x1c0 [ 27.853855] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 27.854475] ? __pfx_read_tsc+0x10/0x10 [ 27.855054] ? ktime_get_ts64+0x86/0x230 [ 27.855649] kunit_try_run_case+0x1b3/0x490 [ 27.856054] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.856461] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 27.856862] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.857678] ? __kthread_parkme+0x82/0x160 [ 27.858088] ? preempt_count_sub+0x50/0x80 [ 27.859305] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.859767] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.860177] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.860807] kthread+0x257/0x310 [ 27.861348] ? __pfx_kthread+0x10/0x10 [ 27.861881] ret_from_fork+0x41/0x80 [ 27.862374] ? __pfx_kthread+0x10/0x10 [ 27.862657] ret_from_fork_asm+0x1a/0x30 [ 27.863020] </TASK> [ 27.863338] [ 27.863722] Allocated by task 269: [ 27.864174] kasan_save_stack+0x3d/0x60 [ 27.864696] kasan_save_track+0x18/0x40 [ 27.865233] kasan_save_alloc_info+0x3b/0x50 [ 27.866150] __kasan_kmalloc+0xb7/0xc0 [ 27.866555] __kmalloc_cache_noprof+0x184/0x410 [ 27.866990] kasan_bitops_generic+0x93/0x1c0 [ 27.867295] kunit_try_run_case+0x1b3/0x490 [ 27.867603] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.868691] kthread+0x257/0x310 [ 27.869014] ret_from_fork+0x41/0x80 [ 27.870562] ret_from_fork_asm+0x1a/0x30 [ 27.870915] [ 27.871111] The buggy address belongs to the object at ffff888101b3cce0 [ 27.871111] which belongs to the cache kmalloc-16 of size 16 [ 27.873956] The buggy address is located 8 bytes inside of [ 27.873956] allocated 9-byte region [ffff888101b3cce0, ffff888101b3cce9) [ 27.875783] [ 27.876046] The buggy address belongs to the physical page: [ 27.876950] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3c [ 27.878091] flags: 0x200000000000000(node=0|zone=2) [ 27.878995] page_type: f5(slab) [ 27.879468] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 27.879849] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 27.880578] page dumped because: kasan: bad access detected [ 27.881117] [ 27.881404] Memory state around the buggy address: [ 27.881761] ffff888101b3cb80: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc [ 27.882845] ffff888101b3cc00: 00 02 fc fc 00 02 fc fc 00 05 fc fc fa fb fc fc [ 27.883864] >ffff888101b3cc80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 27.885065] ^ [ 27.886598] ffff888101b3cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.888540] ffff888101b3cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.889569] ================================================================== [ 27.891702] ================================================================== [ 27.892309] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90 [ 27.892783] Write of size 8 at addr ffff888101b3cce8 by task kunit_try_catch/269 [ 27.895291] [ 27.896595] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 27.898115] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.898948] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.899950] Call Trace: [ 27.900491] <TASK> [ 27.900794] dump_stack_lvl+0x73/0xb0 [ 27.901456] print_report+0xd1/0x640 [ 27.901888] ? __virt_addr_valid+0x1db/0x2d0 [ 27.902413] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.902907] kasan_report+0x102/0x140 [ 27.903807] ? kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90 [ 27.904784] ? kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90 [ 27.905643] kasan_check_range+0x10c/0x1c0 [ 27.906818] __kasan_check_write+0x18/0x20 [ 27.907545] kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90 [ 27.908421] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 27.909078] ? __kmalloc_cache_noprof+0x184/0x410 [ 27.909566] ? trace_hardirqs_on+0x37/0xe0 [ 27.910896] ? kasan_bitops_generic+0x93/0x1c0 [ 27.911532] kasan_bitops_generic+0x122/0x1c0 [ 27.912052] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 27.912716] ? __pfx_read_tsc+0x10/0x10 [ 27.913391] ? ktime_get_ts64+0x86/0x230 [ 27.914136] kunit_try_run_case+0x1b3/0x490 [ 27.914447] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.915101] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 27.916140] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.916774] ? __kthread_parkme+0x82/0x160 [ 27.917668] ? preempt_count_sub+0x50/0x80 [ 27.918417] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.919069] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.919926] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.920696] kthread+0x257/0x310 [ 27.921094] ? __pfx_kthread+0x10/0x10 [ 27.922169] ret_from_fork+0x41/0x80 [ 27.922535] ? __pfx_kthread+0x10/0x10 [ 27.923156] ret_from_fork_asm+0x1a/0x30 [ 27.923859] </TASK> [ 27.924506] [ 27.924687] Allocated by task 269: [ 27.925102] kasan_save_stack+0x3d/0x60 [ 27.925522] kasan_save_track+0x18/0x40 [ 27.925993] kasan_save_alloc_info+0x3b/0x50 [ 27.927109] __kasan_kmalloc+0xb7/0xc0 [ 27.927387] __kmalloc_cache_noprof+0x184/0x410 [ 27.928263] kasan_bitops_generic+0x93/0x1c0 [ 27.928915] kunit_try_run_case+0x1b3/0x490 [ 27.929675] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.930244] kthread+0x257/0x310 [ 27.930739] ret_from_fork+0x41/0x80 [ 27.931421] ret_from_fork_asm+0x1a/0x30 [ 27.931690] [ 27.932037] The buggy address belongs to the object at ffff888101b3cce0 [ 27.932037] which belongs to the cache kmalloc-16 of size 16 [ 27.933953] The buggy address is located 8 bytes inside of [ 27.933953] allocated 9-byte region [ffff888101b3cce0, ffff888101b3cce9) [ 27.935260] [ 27.935567] The buggy address belongs to the physical page: [ 27.936464] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3c [ 27.937423] flags: 0x200000000000000(node=0|zone=2) [ 27.938054] page_type: f5(slab) [ 27.938873] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 27.939781] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 27.940763] page dumped because: kasan: bad access detected [ 27.941329] [ 27.941961] Memory state around the buggy address: [ 27.942627] ffff888101b3cb80: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc [ 27.943610] ffff888101b3cc00: 00 02 fc fc 00 02 fc fc 00 05 fc fc fa fb fc fc [ 27.944594] >ffff888101b3cc80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 27.945382] ^ [ 27.946380] ffff888101b3cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.947044] ffff888101b3cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.947979] ================================================================== [ 28.205441] ================================================================== [ 28.207030] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x558/0xd90 [ 28.208457] Read of size 8 at addr ffff888101b3cce8 by task kunit_try_catch/269 [ 28.209454] [ 28.209679] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 28.211491] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.211907] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.213017] Call Trace: [ 28.213635] <TASK> [ 28.214164] dump_stack_lvl+0x73/0xb0 [ 28.214888] print_report+0xd1/0x640 [ 28.215421] ? __virt_addr_valid+0x1db/0x2d0 [ 28.215825] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.216802] kasan_report+0x102/0x140 [ 28.217591] ? kasan_bitops_test_and_modify.constprop.0+0x558/0xd90 [ 28.218520] ? kasan_bitops_test_and_modify.constprop.0+0x558/0xd90 [ 28.219597] kasan_check_range+0x10c/0x1c0 [ 28.220046] __kasan_check_read+0x15/0x20 [ 28.221384] kasan_bitops_test_and_modify.constprop.0+0x558/0xd90 [ 28.222015] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 28.223132] ? __kmalloc_cache_noprof+0x184/0x410 [ 28.223817] ? trace_hardirqs_on+0x37/0xe0 [ 28.224239] ? kasan_bitops_generic+0x93/0x1c0 [ 28.224705] kasan_bitops_generic+0x122/0x1c0 [ 28.225203] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 28.225680] ? __pfx_read_tsc+0x10/0x10 [ 28.226631] ? ktime_get_ts64+0x86/0x230 [ 28.227113] kunit_try_run_case+0x1b3/0x490 [ 28.227995] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.228758] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 28.229438] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.230049] ? __kthread_parkme+0x82/0x160 [ 28.230967] ? preempt_count_sub+0x50/0x80 [ 28.231775] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.232380] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.232970] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.233500] kthread+0x257/0x310 [ 28.233890] ? __pfx_kthread+0x10/0x10 [ 28.234737] ret_from_fork+0x41/0x80 [ 28.235317] ? __pfx_kthread+0x10/0x10 [ 28.235847] ret_from_fork_asm+0x1a/0x30 [ 28.236475] </TASK> [ 28.236696] [ 28.236884] Allocated by task 269: [ 28.237984] kasan_save_stack+0x3d/0x60 [ 28.238276] kasan_save_track+0x18/0x40 [ 28.239024] kasan_save_alloc_info+0x3b/0x50 [ 28.239755] __kasan_kmalloc+0xb7/0xc0 [ 28.240387] __kmalloc_cache_noprof+0x184/0x410 [ 28.240817] kasan_bitops_generic+0x93/0x1c0 [ 28.241252] kunit_try_run_case+0x1b3/0x490 [ 28.241748] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.242196] kthread+0x257/0x310 [ 28.242757] ret_from_fork+0x41/0x80 [ 28.243173] ret_from_fork_asm+0x1a/0x30 [ 28.243590] [ 28.243790] The buggy address belongs to the object at ffff888101b3cce0 [ 28.243790] which belongs to the cache kmalloc-16 of size 16 [ 28.245276] The buggy address is located 8 bytes inside of [ 28.245276] allocated 9-byte region [ffff888101b3cce0, ffff888101b3cce9) [ 28.247560] [ 28.247788] The buggy address belongs to the physical page: [ 28.248650] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b3c [ 28.249423] flags: 0x200000000000000(node=0|zone=2) [ 28.249753] page_type: f5(slab) [ 28.250205] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 28.251168] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 28.251820] page dumped because: kasan: bad access detected [ 28.252580] [ 28.252835] Memory state around the buggy address: [ 28.253404] ffff888101b3cb80: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc [ 28.254389] ffff888101b3cc00: 00 02 fc fc 00 02 fc fc 00 05 fc fc fa fb fc fc [ 28.255185] >ffff888101b3cc80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 28.255799] ^ [ 28.256572] ffff888101b3cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.257311] ffff888101b3cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.258020] ==================================================================