Date
Dec. 9, 2024, 6:35 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 27.421625] ================================================================== [ 27.422614] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc8 [ 27.424227] Write of size 8 at addr fff00000c11118e8 by task kunit_try_catch/249 [ 27.425283] [ 27.425694] CPU: 0 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 27.427546] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.428036] Hardware name: linux,dummy-virt (DT) [ 27.428574] Call trace: [ 27.428996] show_stack+0x20/0x38 (C) [ 27.429643] dump_stack_lvl+0x8c/0xd0 [ 27.430255] print_report+0x118/0x5e0 [ 27.430987] kasan_report+0xc8/0x118 [ 27.431475] kasan_check_range+0x100/0x1a8 [ 27.432218] __kasan_check_write+0x20/0x30 [ 27.433082] kasan_bitops_modify.constprop.0+0x344/0xbc8 [ 27.433785] kasan_bitops_generic+0x110/0x1c8 [ 27.434414] kunit_try_run_case+0x14c/0x3d0 [ 27.435254] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.436351] kthread+0x24c/0x2d0 [ 27.437074] ret_from_fork+0x10/0x20 [ 27.437616] [ 27.437956] Allocated by task 249: [ 27.438533] kasan_save_stack+0x3c/0x68 [ 27.439156] kasan_save_track+0x20/0x40 [ 27.439952] kasan_save_alloc_info+0x40/0x58 [ 27.440676] __kasan_kmalloc+0xd4/0xd8 [ 27.441306] __kmalloc_cache_noprof+0x15c/0x3c0 [ 27.441978] kasan_bitops_generic+0xa0/0x1c8 [ 27.442717] kunit_try_run_case+0x14c/0x3d0 [ 27.443475] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.444314] kthread+0x24c/0x2d0 [ 27.445042] ret_from_fork+0x10/0x20 [ 27.445583] [ 27.445826] The buggy address belongs to the object at fff00000c11118e0 [ 27.445826] which belongs to the cache kmalloc-16 of size 16 [ 27.448147] The buggy address is located 8 bytes inside of [ 27.448147] allocated 9-byte region [fff00000c11118e0, fff00000c11118e9) [ 27.449212] [ 27.449430] The buggy address belongs to the physical page: [ 27.450479] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101111 [ 27.451564] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.452343] page_type: f5(slab) [ 27.453050] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 27.454066] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 27.455097] page dumped because: kasan: bad access detected [ 27.456012] [ 27.456294] Memory state around the buggy address: [ 27.456883] fff00000c1111780: 00 00 fc fc 00 00 fc fc 00 02 fc fc 00 02 fc fc [ 27.457669] fff00000c1111800: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 27.458362] >fff00000c1111880: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 27.459279] ^ [ 27.460815] fff00000c1111900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.461600] fff00000c1111980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.462326] ================================================================== [ 27.175431] ================================================================== [ 27.177090] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa4c/0xbc8 [ 27.177957] Read of size 8 at addr fff00000c11118e8 by task kunit_try_catch/249 [ 27.179223] [ 27.179892] CPU: 0 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 27.181076] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.181901] Hardware name: linux,dummy-virt (DT) [ 27.182446] Call trace: [ 27.182837] show_stack+0x20/0x38 (C) [ 27.183632] dump_stack_lvl+0x8c/0xd0 [ 27.184212] print_report+0x118/0x5e0 [ 27.185034] kasan_report+0xc8/0x118 [ 27.185742] __asan_report_load8_noabort+0x20/0x30 [ 27.186509] kasan_bitops_modify.constprop.0+0xa4c/0xbc8 [ 27.187883] kasan_bitops_generic+0x110/0x1c8 [ 27.188501] kunit_try_run_case+0x14c/0x3d0 [ 27.189160] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.189954] kthread+0x24c/0x2d0 [ 27.190584] ret_from_fork+0x10/0x20 [ 27.191415] [ 27.191917] Allocated by task 249: [ 27.192136] kasan_save_stack+0x3c/0x68 [ 27.192375] kasan_save_track+0x20/0x40 [ 27.192620] kasan_save_alloc_info+0x40/0x58 [ 27.193044] __kasan_kmalloc+0xd4/0xd8 [ 27.193833] __kmalloc_cache_noprof+0x15c/0x3c0 [ 27.194456] kasan_bitops_generic+0xa0/0x1c8 [ 27.195093] kunit_try_run_case+0x14c/0x3d0 [ 27.195753] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.196573] kthread+0x24c/0x2d0 [ 27.197631] ret_from_fork+0x10/0x20 [ 27.198366] [ 27.198736] The buggy address belongs to the object at fff00000c11118e0 [ 27.198736] which belongs to the cache kmalloc-16 of size 16 [ 27.200040] The buggy address is located 8 bytes inside of [ 27.200040] allocated 9-byte region [fff00000c11118e0, fff00000c11118e9) [ 27.201291] [ 27.201628] The buggy address belongs to the physical page: [ 27.202345] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101111 [ 27.203228] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.204096] page_type: f5(slab) [ 27.204596] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 27.205805] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 27.206800] page dumped because: kasan: bad access detected [ 27.207523] [ 27.207795] Memory state around the buggy address: [ 27.208564] fff00000c1111780: 00 00 fc fc 00 00 fc fc 00 02 fc fc 00 02 fc fc [ 27.209323] fff00000c1111800: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 27.210034] >fff00000c1111880: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 27.211041] ^ [ 27.212235] fff00000c1111900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.213294] fff00000c1111980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.214109] ================================================================== [ 27.463841] ================================================================== [ 27.464536] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc8 [ 27.465416] Write of size 8 at addr fff00000c11118e8 by task kunit_try_catch/249 [ 27.466270] [ 27.466766] CPU: 0 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 27.468017] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.468779] Hardware name: linux,dummy-virt (DT) [ 27.469460] Call trace: [ 27.469929] show_stack+0x20/0x38 (C) [ 27.470588] dump_stack_lvl+0x8c/0xd0 [ 27.471317] print_report+0x118/0x5e0 [ 27.472125] kasan_report+0xc8/0x118 [ 27.472874] kasan_check_range+0x100/0x1a8 [ 27.473818] __kasan_check_write+0x20/0x30 [ 27.474200] kasan_bitops_modify.constprop.0+0x3b0/0xbc8 [ 27.474495] kasan_bitops_generic+0x110/0x1c8 [ 27.474825] kunit_try_run_case+0x14c/0x3d0 [ 27.475631] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.476414] kthread+0x24c/0x2d0 [ 27.477100] ret_from_fork+0x10/0x20 [ 27.477810] [ 27.478265] Allocated by task 249: [ 27.479006] kasan_save_stack+0x3c/0x68 [ 27.479448] kasan_save_track+0x20/0x40 [ 27.480507] kasan_save_alloc_info+0x40/0x58 [ 27.481206] __kasan_kmalloc+0xd4/0xd8 [ 27.481894] __kmalloc_cache_noprof+0x15c/0x3c0 [ 27.482432] kasan_bitops_generic+0xa0/0x1c8 [ 27.483558] kunit_try_run_case+0x14c/0x3d0 [ 27.484056] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.484858] kthread+0x24c/0x2d0 [ 27.485421] ret_from_fork+0x10/0x20 [ 27.486126] [ 27.486408] The buggy address belongs to the object at fff00000c11118e0 [ 27.486408] which belongs to the cache kmalloc-16 of size 16 [ 27.488437] The buggy address is located 8 bytes inside of [ 27.488437] allocated 9-byte region [fff00000c11118e0, fff00000c11118e9) [ 27.489555] [ 27.489952] The buggy address belongs to the physical page: [ 27.490630] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101111 [ 27.491936] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.492720] page_type: f5(slab) [ 27.493191] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 27.494097] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 27.495183] page dumped because: kasan: bad access detected [ 27.495821] [ 27.496130] Memory state around the buggy address: [ 27.497323] fff00000c1111780: 00 00 fc fc 00 00 fc fc 00 02 fc fc 00 02 fc fc [ 27.498016] fff00000c1111800: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 27.498814] >fff00000c1111880: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 27.499904] ^ [ 27.500653] fff00000c1111900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.501509] fff00000c1111980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.502287] ================================================================== [ 27.296362] ================================================================== [ 27.297122] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc8 [ 27.298548] Write of size 8 at addr fff00000c11118e8 by task kunit_try_catch/249 [ 27.299731] [ 27.300007] CPU: 0 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 27.301607] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.302134] Hardware name: linux,dummy-virt (DT) [ 27.302713] Call trace: [ 27.303424] show_stack+0x20/0x38 (C) [ 27.303993] dump_stack_lvl+0x8c/0xd0 [ 27.304575] print_report+0x118/0x5e0 [ 27.305186] kasan_report+0xc8/0x118 [ 27.305745] kasan_check_range+0x100/0x1a8 [ 27.306302] __kasan_check_write+0x20/0x30 [ 27.307177] kasan_bitops_modify.constprop.0+0x2b4/0xbc8 [ 27.307816] kasan_bitops_generic+0x110/0x1c8 [ 27.308480] kunit_try_run_case+0x14c/0x3d0 [ 27.309605] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.310328] kthread+0x24c/0x2d0 [ 27.311236] ret_from_fork+0x10/0x20 [ 27.311731] [ 27.312019] Allocated by task 249: [ 27.312536] kasan_save_stack+0x3c/0x68 [ 27.313086] kasan_save_track+0x20/0x40 [ 27.313632] kasan_save_alloc_info+0x40/0x58 [ 27.314179] __kasan_kmalloc+0xd4/0xd8 [ 27.315542] __kmalloc_cache_noprof+0x15c/0x3c0 [ 27.316030] kasan_bitops_generic+0xa0/0x1c8 [ 27.316596] kunit_try_run_case+0x14c/0x3d0 [ 27.317239] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.317982] kthread+0x24c/0x2d0 [ 27.318489] ret_from_fork+0x10/0x20 [ 27.319029] [ 27.319369] The buggy address belongs to the object at fff00000c11118e0 [ 27.319369] which belongs to the cache kmalloc-16 of size 16 [ 27.320905] The buggy address is located 8 bytes inside of [ 27.320905] allocated 9-byte region [fff00000c11118e0, fff00000c11118e9) [ 27.322132] [ 27.322479] The buggy address belongs to the physical page: [ 27.323927] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101111 [ 27.324933] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.325761] page_type: f5(slab) [ 27.326265] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 27.327222] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 27.328106] page dumped because: kasan: bad access detected [ 27.328801] [ 27.329154] Memory state around the buggy address: [ 27.329745] fff00000c1111780: 00 00 fc fc 00 00 fc fc 00 02 fc fc 00 02 fc fc [ 27.330550] fff00000c1111800: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 27.331641] >fff00000c1111880: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 27.332555] ^ [ 27.333315] fff00000c1111900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.334069] fff00000c1111980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.334884] ================================================================== [ 27.504468] ================================================================== [ 27.505226] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa28/0xbc8 [ 27.505919] Read of size 8 at addr fff00000c11118e8 by task kunit_try_catch/249 [ 27.506842] [ 27.507170] CPU: 0 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 27.508407] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.509050] Hardware name: linux,dummy-virt (DT) [ 27.509635] Call trace: [ 27.510757] show_stack+0x20/0x38 (C) [ 27.511542] dump_stack_lvl+0x8c/0xd0 [ 27.512021] print_report+0x118/0x5e0 [ 27.512526] kasan_report+0xc8/0x118 [ 27.513318] __asan_report_load8_noabort+0x20/0x30 [ 27.514152] kasan_bitops_modify.constprop.0+0xa28/0xbc8 [ 27.514931] kasan_bitops_generic+0x110/0x1c8 [ 27.515496] kunit_try_run_case+0x14c/0x3d0 [ 27.515852] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.516769] kthread+0x24c/0x2d0 [ 27.517227] ret_from_fork+0x10/0x20 [ 27.517772] [ 27.518152] Allocated by task 249: [ 27.518814] kasan_save_stack+0x3c/0x68 [ 27.519457] kasan_save_track+0x20/0x40 [ 27.520128] kasan_save_alloc_info+0x40/0x58 [ 27.520825] __kasan_kmalloc+0xd4/0xd8 [ 27.521495] __kmalloc_cache_noprof+0x15c/0x3c0 [ 27.522218] kasan_bitops_generic+0xa0/0x1c8 [ 27.522898] kunit_try_run_case+0x14c/0x3d0 [ 27.523555] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.524303] kthread+0x24c/0x2d0 [ 27.524913] ret_from_fork+0x10/0x20 [ 27.525537] [ 27.525972] The buggy address belongs to the object at fff00000c11118e0 [ 27.525972] which belongs to the cache kmalloc-16 of size 16 [ 27.527376] The buggy address is located 8 bytes inside of [ 27.527376] allocated 9-byte region [fff00000c11118e0, fff00000c11118e9) [ 27.528802] [ 27.529230] The buggy address belongs to the physical page: [ 27.529939] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101111 [ 27.530896] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.531725] page_type: f5(slab) [ 27.532284] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 27.533239] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 27.534013] page dumped because: kasan: bad access detected [ 27.534788] [ 27.535075] Memory state around the buggy address: [ 27.535646] fff00000c1111780: 00 00 fc fc 00 00 fc fc 00 02 fc fc 00 02 fc fc [ 27.536426] fff00000c1111800: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 27.537176] >fff00000c1111880: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 27.538026] ^ [ 27.538855] fff00000c1111900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.539789] fff00000c1111980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.540666] ================================================================== [ 27.215994] ================================================================== [ 27.217114] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc8 [ 27.218058] Write of size 8 at addr fff00000c11118e8 by task kunit_try_catch/249 [ 27.219646] [ 27.220171] CPU: 0 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 27.221411] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.221996] Hardware name: linux,dummy-virt (DT) [ 27.222755] Call trace: [ 27.223132] show_stack+0x20/0x38 (C) [ 27.223650] dump_stack_lvl+0x8c/0xd0 [ 27.224570] print_report+0x118/0x5e0 [ 27.225200] kasan_report+0xc8/0x118 [ 27.225791] kasan_check_range+0x100/0x1a8 [ 27.226432] __kasan_check_write+0x20/0x30 [ 27.227162] kasan_bitops_modify.constprop.0+0x1dc/0xbc8 [ 27.227755] kasan_bitops_generic+0x110/0x1c8 [ 27.228432] kunit_try_run_case+0x14c/0x3d0 [ 27.229717] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.230474] kthread+0x24c/0x2d0 [ 27.231303] ret_from_fork+0x10/0x20 [ 27.231765] [ 27.232137] Allocated by task 249: [ 27.232682] kasan_save_stack+0x3c/0x68 [ 27.233328] kasan_save_track+0x20/0x40 [ 27.233942] kasan_save_alloc_info+0x40/0x58 [ 27.234627] __kasan_kmalloc+0xd4/0xd8 [ 27.235494] __kmalloc_cache_noprof+0x15c/0x3c0 [ 27.235963] kasan_bitops_generic+0xa0/0x1c8 [ 27.236854] kunit_try_run_case+0x14c/0x3d0 [ 27.237567] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.238439] kthread+0x24c/0x2d0 [ 27.239136] ret_from_fork+0x10/0x20 [ 27.240025] [ 27.240264] The buggy address belongs to the object at fff00000c11118e0 [ 27.240264] which belongs to the cache kmalloc-16 of size 16 [ 27.241811] The buggy address is located 8 bytes inside of [ 27.241811] allocated 9-byte region [fff00000c11118e0, fff00000c11118e9) [ 27.243140] [ 27.243521] The buggy address belongs to the physical page: [ 27.244683] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101111 [ 27.245442] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.246282] page_type: f5(slab) [ 27.246502] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 27.247239] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 27.247995] page dumped because: kasan: bad access detected [ 27.248644] [ 27.249305] Memory state around the buggy address: [ 27.250004] fff00000c1111780: 00 00 fc fc 00 00 fc fc 00 02 fc fc 00 02 fc fc [ 27.250775] fff00000c1111800: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 27.251526] >fff00000c1111880: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 27.252687] ^ [ 27.253421] fff00000c1111900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.254413] fff00000c1111980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.255406] ================================================================== [ 27.256783] ================================================================== [ 27.258052] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa88/0xbc8 [ 27.258892] Read of size 8 at addr fff00000c11118e8 by task kunit_try_catch/249 [ 27.259615] [ 27.260759] CPU: 0 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 27.261804] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.262297] Hardware name: linux,dummy-virt (DT) [ 27.263056] Call trace: [ 27.263842] show_stack+0x20/0x38 (C) [ 27.264373] dump_stack_lvl+0x8c/0xd0 [ 27.264918] print_report+0x118/0x5e0 [ 27.265397] kasan_report+0xc8/0x118 [ 27.266052] __asan_report_load8_noabort+0x20/0x30 [ 27.266687] kasan_bitops_modify.constprop.0+0xa88/0xbc8 [ 27.267505] kasan_bitops_generic+0x110/0x1c8 [ 27.268128] kunit_try_run_case+0x14c/0x3d0 [ 27.268689] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.269957] kthread+0x24c/0x2d0 [ 27.270516] ret_from_fork+0x10/0x20 [ 27.271001] [ 27.271585] Allocated by task 249: [ 27.272060] kasan_save_stack+0x3c/0x68 [ 27.272788] kasan_save_track+0x20/0x40 [ 27.273320] kasan_save_alloc_info+0x40/0x58 [ 27.273878] __kasan_kmalloc+0xd4/0xd8 [ 27.274544] __kmalloc_cache_noprof+0x15c/0x3c0 [ 27.275241] kasan_bitops_generic+0xa0/0x1c8 [ 27.276021] kunit_try_run_case+0x14c/0x3d0 [ 27.276622] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.277283] kthread+0x24c/0x2d0 [ 27.278056] ret_from_fork+0x10/0x20 [ 27.278531] [ 27.279331] The buggy address belongs to the object at fff00000c11118e0 [ 27.279331] which belongs to the cache kmalloc-16 of size 16 [ 27.280779] The buggy address is located 8 bytes inside of [ 27.280779] allocated 9-byte region [fff00000c11118e0, fff00000c11118e9) [ 27.282076] [ 27.282412] The buggy address belongs to the physical page: [ 27.283530] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101111 [ 27.284730] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.285472] page_type: f5(slab) [ 27.286043] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 27.287396] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 27.288224] page dumped because: kasan: bad access detected [ 27.288879] [ 27.289188] Memory state around the buggy address: [ 27.289764] fff00000c1111780: 00 00 fc fc 00 00 fc fc 00 02 fc fc 00 02 fc fc [ 27.290581] fff00000c1111800: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 27.291666] >fff00000c1111880: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 27.292471] ^ [ 27.293441] fff00000c1111900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.293822] fff00000c1111980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.294735] ================================================================== [ 27.379832] ================================================================== [ 27.380520] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaf4/0xbc8 [ 27.381778] Read of size 8 at addr fff00000c11118e8 by task kunit_try_catch/249 [ 27.383316] [ 27.383745] CPU: 0 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 27.384915] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.385540] Hardware name: linux,dummy-virt (DT) [ 27.386246] Call trace: [ 27.386747] show_stack+0x20/0x38 (C) [ 27.387440] dump_stack_lvl+0x8c/0xd0 [ 27.388041] print_report+0x118/0x5e0 [ 27.388724] kasan_report+0xc8/0x118 [ 27.389377] __asan_report_load8_noabort+0x20/0x30 [ 27.390267] kasan_bitops_modify.constprop.0+0xaf4/0xbc8 [ 27.391644] kasan_bitops_generic+0x110/0x1c8 [ 27.392257] kunit_try_run_case+0x14c/0x3d0 [ 27.392826] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.393885] kthread+0x24c/0x2d0 [ 27.394437] ret_from_fork+0x10/0x20 [ 27.394685] [ 27.395306] Allocated by task 249: [ 27.395673] kasan_save_stack+0x3c/0x68 [ 27.396516] kasan_save_track+0x20/0x40 [ 27.397179] kasan_save_alloc_info+0x40/0x58 [ 27.397797] __kasan_kmalloc+0xd4/0xd8 [ 27.398402] __kmalloc_cache_noprof+0x15c/0x3c0 [ 27.399154] kasan_bitops_generic+0xa0/0x1c8 [ 27.399961] kunit_try_run_case+0x14c/0x3d0 [ 27.400713] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.401529] kthread+0x24c/0x2d0 [ 27.402049] ret_from_fork+0x10/0x20 [ 27.402991] [ 27.403448] The buggy address belongs to the object at fff00000c11118e0 [ 27.403448] which belongs to the cache kmalloc-16 of size 16 [ 27.404938] The buggy address is located 8 bytes inside of [ 27.404938] allocated 9-byte region [fff00000c11118e0, fff00000c11118e9) [ 27.406399] [ 27.407340] The buggy address belongs to the physical page: [ 27.407899] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101111 [ 27.408897] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.409778] page_type: f5(slab) [ 27.410403] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 27.411533] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 27.412691] page dumped because: kasan: bad access detected [ 27.413329] [ 27.413852] Memory state around the buggy address: [ 27.414559] fff00000c1111780: 00 00 fc fc 00 00 fc fc 00 02 fc fc 00 02 fc fc [ 27.415470] fff00000c1111800: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 27.416540] >fff00000c1111880: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 27.417436] ^ [ 27.418258] fff00000c1111900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.419178] fff00000c1111980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.420453] ================================================================== [ 27.336231] ================================================================== [ 27.337385] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc8 [ 27.338228] Write of size 8 at addr fff00000c11118e8 by task kunit_try_catch/249 [ 27.339577] [ 27.339913] CPU: 0 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 27.341033] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.342005] Hardware name: linux,dummy-virt (DT) [ 27.342664] Call trace: [ 27.343220] show_stack+0x20/0x38 (C) [ 27.344249] dump_stack_lvl+0x8c/0xd0 [ 27.345007] print_report+0x118/0x5e0 [ 27.345608] kasan_report+0xc8/0x118 [ 27.346234] kasan_check_range+0x100/0x1a8 [ 27.346934] __kasan_check_write+0x20/0x30 [ 27.347588] kasan_bitops_modify.constprop.0+0x320/0xbc8 [ 27.348308] kasan_bitops_generic+0x110/0x1c8 [ 27.349407] kunit_try_run_case+0x14c/0x3d0 [ 27.350027] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.350774] kthread+0x24c/0x2d0 [ 27.351492] ret_from_fork+0x10/0x20 [ 27.352230] [ 27.352561] Allocated by task 249: [ 27.353178] kasan_save_stack+0x3c/0x68 [ 27.353831] kasan_save_track+0x20/0x40 [ 27.354408] kasan_save_alloc_info+0x40/0x58 [ 27.355627] __kasan_kmalloc+0xd4/0xd8 [ 27.356184] __kmalloc_cache_noprof+0x15c/0x3c0 [ 27.356798] kasan_bitops_generic+0xa0/0x1c8 [ 27.357517] kunit_try_run_case+0x14c/0x3d0 [ 27.358148] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.358868] kthread+0x24c/0x2d0 [ 27.359370] ret_from_fork+0x10/0x20 [ 27.359968] [ 27.360301] The buggy address belongs to the object at fff00000c11118e0 [ 27.360301] which belongs to the cache kmalloc-16 of size 16 [ 27.361940] The buggy address is located 8 bytes inside of [ 27.361940] allocated 9-byte region [fff00000c11118e0, fff00000c11118e9) [ 27.363311] [ 27.364223] The buggy address belongs to the physical page: [ 27.365112] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101111 [ 27.366121] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.367279] page_type: f5(slab) [ 27.367723] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 27.368598] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 27.369525] page dumped because: kasan: bad access detected [ 27.370133] [ 27.370416] Memory state around the buggy address: [ 27.371827] fff00000c1111780: 00 00 fc fc 00 00 fc fc 00 02 fc fc 00 02 fc fc [ 27.372692] fff00000c1111800: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 27.373517] >fff00000c1111880: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 27.374503] ^ [ 27.375574] fff00000c1111900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.376342] fff00000c1111980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.377077] ================================================================== [ 27.134544] ================================================================== [ 27.135784] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc8 [ 27.137489] Write of size 8 at addr fff00000c11118e8 by task kunit_try_catch/249 [ 27.138264] [ 27.138620] CPU: 0 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 27.140009] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.140500] Hardware name: linux,dummy-virt (DT) [ 27.141128] Call trace: [ 27.141850] show_stack+0x20/0x38 (C) [ 27.142562] dump_stack_lvl+0x8c/0xd0 [ 27.143363] print_report+0x118/0x5e0 [ 27.144120] kasan_report+0xc8/0x118 [ 27.144736] kasan_check_range+0x100/0x1a8 [ 27.145339] __kasan_check_write+0x20/0x30 [ 27.145912] kasan_bitops_modify.constprop.0+0x100/0xbc8 [ 27.146759] kasan_bitops_generic+0x110/0x1c8 [ 27.147571] kunit_try_run_case+0x14c/0x3d0 [ 27.148330] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.149068] kthread+0x24c/0x2d0 [ 27.149608] ret_from_fork+0x10/0x20 [ 27.150261] [ 27.150647] Allocated by task 249: [ 27.151648] kasan_save_stack+0x3c/0x68 [ 27.152250] kasan_save_track+0x20/0x40 [ 27.152791] kasan_save_alloc_info+0x40/0x58 [ 27.153387] __kasan_kmalloc+0xd4/0xd8 [ 27.153986] __kmalloc_cache_noprof+0x15c/0x3c0 [ 27.154557] kasan_bitops_generic+0xa0/0x1c8 [ 27.155260] kunit_try_run_case+0x14c/0x3d0 [ 27.155986] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.156717] kthread+0x24c/0x2d0 [ 27.157263] ret_from_fork+0x10/0x20 [ 27.157955] [ 27.158278] The buggy address belongs to the object at fff00000c11118e0 [ 27.158278] which belongs to the cache kmalloc-16 of size 16 [ 27.159738] The buggy address is located 8 bytes inside of [ 27.159738] allocated 9-byte region [fff00000c11118e0, fff00000c11118e9) [ 27.160913] [ 27.161218] The buggy address belongs to the physical page: [ 27.161872] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101111 [ 27.162763] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.163541] page_type: f5(slab) [ 27.164523] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 27.165523] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 27.166472] page dumped because: kasan: bad access detected [ 27.167561] [ 27.167743] Memory state around the buggy address: [ 27.168396] fff00000c1111780: 00 00 fc fc 00 00 fc fc 00 02 fc fc 00 02 fc fc [ 27.169341] fff00000c1111800: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 27.170256] >fff00000c1111880: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 27.171169] ^ [ 27.172221] fff00000c1111900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.173130] fff00000c1111980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.173987] ==================================================================
[ 27.634798] ================================================================== [ 27.636600] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19d/0xd50 [ 27.637395] Write of size 8 at addr ffff888101094768 by task kunit_try_catch/268 [ 27.637998] [ 27.638309] CPU: 1 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 27.639040] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.639486] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.641709] Call Trace: [ 27.642012] <TASK> [ 27.642655] dump_stack_lvl+0x73/0xb0 [ 27.643191] print_report+0xd1/0x640 [ 27.643917] ? __virt_addr_valid+0x1db/0x2d0 [ 27.645058] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.646543] kasan_report+0x102/0x140 [ 27.646811] ? kasan_bitops_modify.constprop.0+0x19d/0xd50 [ 27.647899] ? kasan_bitops_modify.constprop.0+0x19d/0xd50 [ 27.648559] kasan_check_range+0x10c/0x1c0 [ 27.649002] __kasan_check_write+0x18/0x20 [ 27.649379] kasan_bitops_modify.constprop.0+0x19d/0xd50 [ 27.649917] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 27.652020] ? __kmalloc_cache_noprof+0x184/0x410 [ 27.652609] ? trace_hardirqs_on+0x37/0xe0 [ 27.653371] ? kasan_bitops_generic+0x93/0x1c0 [ 27.654060] kasan_bitops_generic+0x117/0x1c0 [ 27.654747] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 27.655774] ? __pfx_read_tsc+0x10/0x10 [ 27.656664] ? ktime_get_ts64+0x86/0x230 [ 27.657429] kunit_try_run_case+0x1b3/0x490 [ 27.657855] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.658474] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 27.659705] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.660299] ? __kthread_parkme+0x82/0x160 [ 27.661048] ? preempt_count_sub+0x50/0x80 [ 27.662209] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.662600] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.663602] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.664096] kthread+0x257/0x310 [ 27.664783] ? __pfx_kthread+0x10/0x10 [ 27.665198] ret_from_fork+0x41/0x80 [ 27.665621] ? __pfx_kthread+0x10/0x10 [ 27.666644] ret_from_fork_asm+0x1a/0x30 [ 27.666972] </TASK> [ 27.668037] [ 27.669007] Allocated by task 268: [ 27.669289] kasan_save_stack+0x3d/0x60 [ 27.670026] kasan_save_track+0x18/0x40 [ 27.670432] kasan_save_alloc_info+0x3b/0x50 [ 27.671375] __kasan_kmalloc+0xb7/0xc0 [ 27.671856] __kmalloc_cache_noprof+0x184/0x410 [ 27.672879] kasan_bitops_generic+0x93/0x1c0 [ 27.673678] kunit_try_run_case+0x1b3/0x490 [ 27.674584] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.675243] kthread+0x257/0x310 [ 27.676075] ret_from_fork+0x41/0x80 [ 27.676861] ret_from_fork_asm+0x1a/0x30 [ 27.677558] [ 27.677806] The buggy address belongs to the object at ffff888101094760 [ 27.677806] which belongs to the cache kmalloc-16 of size 16 [ 27.678707] The buggy address is located 8 bytes inside of [ 27.678707] allocated 9-byte region [ffff888101094760, ffff888101094769) [ 27.679633] [ 27.679795] The buggy address belongs to the physical page: [ 27.681108] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101094 [ 27.682859] flags: 0x200000000000000(node=0|zone=2) [ 27.683303] page_type: f5(slab) [ 27.684056] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 27.685455] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 27.686966] page dumped because: kasan: bad access detected [ 27.687807] [ 27.688060] Memory state around the buggy address: [ 27.688753] ffff888101094600: fa fb fc fc fa fb fc fc fa fb fc fc 00 02 fc fc [ 27.689970] ffff888101094680: 00 02 fc fc fa fb fc fc 00 00 fc fc fa fb fc fc [ 27.691160] >ffff888101094700: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 27.692581] ^ [ 27.693481] ffff888101094780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.694918] ffff888101094800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.695840] ================================================================== [ 27.758969] ================================================================== [ 27.759561] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d6/0xd50 [ 27.761889] Write of size 8 at addr ffff888101094768 by task kunit_try_catch/268 [ 27.763054] [ 27.763525] CPU: 1 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 27.764644] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.765041] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.765817] Call Trace: [ 27.766106] <TASK> [ 27.766967] dump_stack_lvl+0x73/0xb0 [ 27.767480] print_report+0xd1/0x640 [ 27.767925] ? __virt_addr_valid+0x1db/0x2d0 [ 27.768593] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.769109] kasan_report+0x102/0x140 [ 27.769677] ? kasan_bitops_modify.constprop.0+0x2d6/0xd50 [ 27.770514] ? kasan_bitops_modify.constprop.0+0x2d6/0xd50 [ 27.770834] kasan_check_range+0x10c/0x1c0 [ 27.771034] __kasan_check_write+0x18/0x20 [ 27.771227] kasan_bitops_modify.constprop.0+0x2d6/0xd50 [ 27.771955] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 27.772622] ? __kmalloc_cache_noprof+0x184/0x410 [ 27.773201] ? trace_hardirqs_on+0x37/0xe0 [ 27.773724] ? kasan_bitops_generic+0x93/0x1c0 [ 27.774792] kasan_bitops_generic+0x117/0x1c0 [ 27.775516] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 27.776084] ? __pfx_read_tsc+0x10/0x10 [ 27.776633] ? ktime_get_ts64+0x86/0x230 [ 27.777105] kunit_try_run_case+0x1b3/0x490 [ 27.777648] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.778140] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 27.779133] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.779725] ? __kthread_parkme+0x82/0x160 [ 27.780324] ? preempt_count_sub+0x50/0x80 [ 27.780697] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.781202] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.781845] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.782975] kthread+0x257/0x310 [ 27.783583] ? __pfx_kthread+0x10/0x10 [ 27.784048] ret_from_fork+0x41/0x80 [ 27.784622] ? __pfx_kthread+0x10/0x10 [ 27.785148] ret_from_fork_asm+0x1a/0x30 [ 27.785673] </TASK> [ 27.786036] [ 27.786857] Allocated by task 268: [ 27.787150] kasan_save_stack+0x3d/0x60 [ 27.787747] kasan_save_track+0x18/0x40 [ 27.788449] kasan_save_alloc_info+0x3b/0x50 [ 27.788847] __kasan_kmalloc+0xb7/0xc0 [ 27.789312] __kmalloc_cache_noprof+0x184/0x410 [ 27.789757] kasan_bitops_generic+0x93/0x1c0 [ 27.790204] kunit_try_run_case+0x1b3/0x490 [ 27.790550] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.791824] kthread+0x257/0x310 [ 27.792141] ret_from_fork+0x41/0x80 [ 27.792634] ret_from_fork_asm+0x1a/0x30 [ 27.793151] [ 27.793510] The buggy address belongs to the object at ffff888101094760 [ 27.793510] which belongs to the cache kmalloc-16 of size 16 [ 27.795143] The buggy address is located 8 bytes inside of [ 27.795143] allocated 9-byte region [ffff888101094760, ffff888101094769) [ 27.796425] [ 27.796676] The buggy address belongs to the physical page: [ 27.797155] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101094 [ 27.798112] flags: 0x200000000000000(node=0|zone=2) [ 27.799134] page_type: f5(slab) [ 27.799582] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 27.800580] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 27.801433] page dumped because: kasan: bad access detected [ 27.802059] [ 27.802613] Memory state around the buggy address: [ 27.802954] ffff888101094600: fa fb fc fc fa fb fc fc fa fb fc fc 00 02 fc fc [ 27.804096] ffff888101094680: 00 02 fc fc fa fb fc fc 00 00 fc fc fa fb fc fc [ 27.804992] >ffff888101094700: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 27.805687] ^ [ 27.806338] ffff888101094780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.806975] ffff888101094800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.807590] ================================================================== [ 27.578154] ================================================================== [ 27.579565] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x102/0xd50 [ 27.581176] Write of size 8 at addr ffff888101094768 by task kunit_try_catch/268 [ 27.583061] [ 27.583480] CPU: 1 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 27.584809] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.585394] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.586191] Call Trace: [ 27.586572] <TASK> [ 27.586834] dump_stack_lvl+0x73/0xb0 [ 27.587232] print_report+0xd1/0x640 [ 27.587983] ? __virt_addr_valid+0x1db/0x2d0 [ 27.588581] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.589388] kasan_report+0x102/0x140 [ 27.589873] ? kasan_bitops_modify.constprop.0+0x102/0xd50 [ 27.591021] ? kasan_bitops_modify.constprop.0+0x102/0xd50 [ 27.592088] kasan_check_range+0x10c/0x1c0 [ 27.592665] __kasan_check_write+0x18/0x20 [ 27.593200] kasan_bitops_modify.constprop.0+0x102/0xd50 [ 27.593924] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 27.594519] ? __kmalloc_cache_noprof+0x184/0x410 [ 27.595387] ? trace_hardirqs_on+0x37/0xe0 [ 27.595733] ? kasan_bitops_generic+0x93/0x1c0 [ 27.596654] kasan_bitops_generic+0x117/0x1c0 [ 27.597317] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 27.598201] ? __pfx_read_tsc+0x10/0x10 [ 27.598771] ? ktime_get_ts64+0x86/0x230 [ 27.599584] kunit_try_run_case+0x1b3/0x490 [ 27.599940] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.601166] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 27.601775] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.602336] ? __kthread_parkme+0x82/0x160 [ 27.602912] ? preempt_count_sub+0x50/0x80 [ 27.603656] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.604241] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.604841] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.606159] kthread+0x257/0x310 [ 27.606670] ? __pfx_kthread+0x10/0x10 [ 27.607113] ret_from_fork+0x41/0x80 [ 27.607628] ? __pfx_kthread+0x10/0x10 [ 27.608107] ret_from_fork_asm+0x1a/0x30 [ 27.608969] </TASK> [ 27.609209] [ 27.609544] Allocated by task 268: [ 27.609923] kasan_save_stack+0x3d/0x60 [ 27.610798] kasan_save_track+0x18/0x40 [ 27.610994] kasan_save_alloc_info+0x3b/0x50 [ 27.611188] __kasan_kmalloc+0xb7/0xc0 [ 27.611845] __kmalloc_cache_noprof+0x184/0x410 [ 27.612672] kasan_bitops_generic+0x93/0x1c0 [ 27.613905] kunit_try_run_case+0x1b3/0x490 [ 27.614733] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.615506] kthread+0x257/0x310 [ 27.615735] ret_from_fork+0x41/0x80 [ 27.616004] ret_from_fork_asm+0x1a/0x30 [ 27.616196] [ 27.616335] The buggy address belongs to the object at ffff888101094760 [ 27.616335] which belongs to the cache kmalloc-16 of size 16 [ 27.618070] The buggy address is located 8 bytes inside of [ 27.618070] allocated 9-byte region [ffff888101094760, ffff888101094769) [ 27.619802] [ 27.620058] The buggy address belongs to the physical page: [ 27.621018] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101094 [ 27.622529] flags: 0x200000000000000(node=0|zone=2) [ 27.622756] page_type: f5(slab) [ 27.623562] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 27.624758] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 27.625717] page dumped because: kasan: bad access detected [ 27.626654] [ 27.626877] Memory state around the buggy address: [ 27.627647] ffff888101094600: fa fb fc fc fa fb fc fc fa fb fc fc 00 02 fc fc [ 27.628607] ffff888101094680: 00 02 fc fc fa fb fc fc 00 00 fc fc fa fb fc fc [ 27.629577] >ffff888101094700: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 27.630069] ^ [ 27.631401] ffff888101094780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.632065] ffff888101094800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.632682] ================================================================== [ 27.968782] ================================================================== [ 27.969510] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x548/0xd50 [ 27.970259] Write of size 8 at addr ffff888101094768 by task kunit_try_catch/268 [ 27.970924] [ 27.971171] CPU: 1 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 27.972047] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.973078] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.974192] Call Trace: [ 27.974596] <TASK> [ 27.974953] dump_stack_lvl+0x73/0xb0 [ 27.975437] print_report+0xd1/0x640 [ 27.975762] ? __virt_addr_valid+0x1db/0x2d0 [ 27.976399] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.976804] kasan_report+0x102/0x140 [ 27.977163] ? kasan_bitops_modify.constprop.0+0x548/0xd50 [ 27.977759] ? kasan_bitops_modify.constprop.0+0x548/0xd50 [ 27.978249] kasan_check_range+0x10c/0x1c0 [ 27.978707] __kasan_check_write+0x18/0x20 [ 27.979430] kasan_bitops_modify.constprop.0+0x548/0xd50 [ 27.980005] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 27.980583] ? __kmalloc_cache_noprof+0x184/0x410 [ 27.981048] ? trace_hardirqs_on+0x37/0xe0 [ 27.981584] ? kasan_bitops_generic+0x93/0x1c0 [ 27.982014] kasan_bitops_generic+0x117/0x1c0 [ 27.982621] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 27.982960] ? __pfx_read_tsc+0x10/0x10 [ 27.983608] ? ktime_get_ts64+0x86/0x230 [ 27.984076] kunit_try_run_case+0x1b3/0x490 [ 27.984446] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.984882] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 27.985409] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.985747] ? __kthread_parkme+0x82/0x160 [ 27.986331] ? preempt_count_sub+0x50/0x80 [ 27.986902] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.987373] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.988079] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.989426] kthread+0x257/0x310 [ 27.990179] ? __pfx_kthread+0x10/0x10 [ 27.990766] ret_from_fork+0x41/0x80 [ 27.991412] ? __pfx_kthread+0x10/0x10 [ 27.991858] ret_from_fork_asm+0x1a/0x30 [ 27.992586] </TASK> [ 27.992901] [ 27.993064] Allocated by task 268: [ 27.993549] kasan_save_stack+0x3d/0x60 [ 27.994064] kasan_save_track+0x18/0x40 [ 27.994557] kasan_save_alloc_info+0x3b/0x50 [ 27.995107] __kasan_kmalloc+0xb7/0xc0 [ 27.995699] __kmalloc_cache_noprof+0x184/0x410 [ 27.996223] kasan_bitops_generic+0x93/0x1c0 [ 27.996712] kunit_try_run_case+0x1b3/0x490 [ 27.997333] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.997837] kthread+0x257/0x310 [ 27.998091] ret_from_fork+0x41/0x80 [ 27.998617] ret_from_fork_asm+0x1a/0x30 [ 27.999144] [ 27.999435] The buggy address belongs to the object at ffff888101094760 [ 27.999435] which belongs to the cache kmalloc-16 of size 16 [ 28.000567] The buggy address is located 8 bytes inside of [ 28.000567] allocated 9-byte region [ffff888101094760, ffff888101094769) [ 28.001447] [ 28.001743] The buggy address belongs to the physical page: [ 28.002471] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101094 [ 28.003364] flags: 0x200000000000000(node=0|zone=2) [ 28.003697] page_type: f5(slab) [ 28.003950] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 28.004917] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 28.006076] page dumped because: kasan: bad access detected [ 28.006590] [ 28.006748] Memory state around the buggy address: [ 28.007078] ffff888101094600: fa fb fc fc fa fb fc fc fa fb fc fc 00 02 fc fc [ 28.008159] ffff888101094680: 00 02 fc fc fa fb fc fc 00 00 fc fc fa fb fc fc [ 28.009147] >ffff888101094700: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 28.009731] ^ [ 28.010563] ffff888101094780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.011150] ffff888101094800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.011933] ================================================================== [ 27.696669] ================================================================== [ 27.697089] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23b/0xd50 [ 27.699067] Write of size 8 at addr ffff888101094768 by task kunit_try_catch/268 [ 27.700455] [ 27.700635] CPU: 1 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 27.702729] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.704292] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.705432] Call Trace: [ 27.705942] <TASK> [ 27.706870] dump_stack_lvl+0x73/0xb0 [ 27.707357] print_report+0xd1/0x640 [ 27.708019] ? __virt_addr_valid+0x1db/0x2d0 [ 27.708833] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.709842] kasan_report+0x102/0x140 [ 27.710867] ? kasan_bitops_modify.constprop.0+0x23b/0xd50 [ 27.711513] ? kasan_bitops_modify.constprop.0+0x23b/0xd50 [ 27.712318] kasan_check_range+0x10c/0x1c0 [ 27.712708] __kasan_check_write+0x18/0x20 [ 27.713860] kasan_bitops_modify.constprop.0+0x23b/0xd50 [ 27.714727] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 27.715265] ? __kmalloc_cache_noprof+0x184/0x410 [ 27.716020] ? trace_hardirqs_on+0x37/0xe0 [ 27.717092] ? kasan_bitops_generic+0x93/0x1c0 [ 27.717572] kasan_bitops_generic+0x117/0x1c0 [ 27.718555] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 27.719053] ? __pfx_read_tsc+0x10/0x10 [ 27.719558] ? ktime_get_ts64+0x86/0x230 [ 27.719945] kunit_try_run_case+0x1b3/0x490 [ 27.720553] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.721635] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 27.723307] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.723778] ? __kthread_parkme+0x82/0x160 [ 27.724161] ? preempt_count_sub+0x50/0x80 [ 27.724553] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.724982] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.726463] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.727057] kthread+0x257/0x310 [ 27.727695] ? __pfx_kthread+0x10/0x10 [ 27.728672] ret_from_fork+0x41/0x80 [ 27.729065] ? __pfx_kthread+0x10/0x10 [ 27.729303] ret_from_fork_asm+0x1a/0x30 [ 27.729720] </TASK> [ 27.730051] [ 27.730966] Allocated by task 268: [ 27.731318] kasan_save_stack+0x3d/0x60 [ 27.732062] kasan_save_track+0x18/0x40 [ 27.732719] kasan_save_alloc_info+0x3b/0x50 [ 27.733909] __kasan_kmalloc+0xb7/0xc0 [ 27.735036] __kmalloc_cache_noprof+0x184/0x410 [ 27.735745] kasan_bitops_generic+0x93/0x1c0 [ 27.736217] kunit_try_run_case+0x1b3/0x490 [ 27.736693] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.738516] kthread+0x257/0x310 [ 27.739122] ret_from_fork+0x41/0x80 [ 27.739673] ret_from_fork_asm+0x1a/0x30 [ 27.740156] [ 27.740452] The buggy address belongs to the object at ffff888101094760 [ 27.740452] which belongs to the cache kmalloc-16 of size 16 [ 27.741640] The buggy address is located 8 bytes inside of [ 27.741640] allocated 9-byte region [ffff888101094760, ffff888101094769) [ 27.743159] [ 27.743675] The buggy address belongs to the physical page: [ 27.744309] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101094 [ 27.745759] flags: 0x200000000000000(node=0|zone=2) [ 27.746258] page_type: f5(slab) [ 27.746526] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 27.748146] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 27.749505] page dumped because: kasan: bad access detected [ 27.750513] [ 27.750698] Memory state around the buggy address: [ 27.751620] ffff888101094600: fa fb fc fc fa fb fc fc fa fb fc fc 00 02 fc fc [ 27.753072] ffff888101094680: 00 02 fc fc fa fb fc fc 00 00 fc fc fa fb fc fc [ 27.753937] >ffff888101094700: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 27.754735] ^ [ 27.755536] ffff888101094780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.756841] ffff888101094800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.757496] ================================================================== [ 27.864992] ================================================================== [ 27.866243] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40f/0xd50 [ 27.867416] Write of size 8 at addr ffff888101094768 by task kunit_try_catch/268 [ 27.868951] [ 27.869158] CPU: 1 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 27.870933] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.871557] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.872699] Call Trace: [ 27.872964] <TASK> [ 27.873760] dump_stack_lvl+0x73/0xb0 [ 27.874162] print_report+0xd1/0x640 [ 27.874560] ? __virt_addr_valid+0x1db/0x2d0 [ 27.874998] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.876760] kasan_report+0x102/0x140 [ 27.877145] ? kasan_bitops_modify.constprop.0+0x40f/0xd50 [ 27.878127] ? kasan_bitops_modify.constprop.0+0x40f/0xd50 [ 27.878967] kasan_check_range+0x10c/0x1c0 [ 27.879506] __kasan_check_write+0x18/0x20 [ 27.879708] kasan_bitops_modify.constprop.0+0x40f/0xd50 [ 27.880972] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 27.881696] ? __kmalloc_cache_noprof+0x184/0x410 [ 27.882721] ? trace_hardirqs_on+0x37/0xe0 [ 27.883350] ? kasan_bitops_generic+0x93/0x1c0 [ 27.884035] kasan_bitops_generic+0x117/0x1c0 [ 27.885031] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 27.885508] ? __pfx_read_tsc+0x10/0x10 [ 27.886896] ? ktime_get_ts64+0x86/0x230 [ 27.887582] kunit_try_run_case+0x1b3/0x490 [ 27.888050] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.888501] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 27.888873] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.889676] ? __kthread_parkme+0x82/0x160 [ 27.890020] ? preempt_count_sub+0x50/0x80 [ 27.890677] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.891457] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.892082] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.892647] kthread+0x257/0x310 [ 27.893351] ? __pfx_kthread+0x10/0x10 [ 27.893721] ret_from_fork+0x41/0x80 [ 27.893983] ? __pfx_kthread+0x10/0x10 [ 27.894496] ret_from_fork_asm+0x1a/0x30 [ 27.895338] </TASK> [ 27.895675] [ 27.895915] Allocated by task 268: [ 27.896704] kasan_save_stack+0x3d/0x60 [ 27.897063] kasan_save_track+0x18/0x40 [ 27.897526] kasan_save_alloc_info+0x3b/0x50 [ 27.898085] __kasan_kmalloc+0xb7/0xc0 [ 27.898404] __kmalloc_cache_noprof+0x184/0x410 [ 27.898930] kasan_bitops_generic+0x93/0x1c0 [ 27.899484] kunit_try_run_case+0x1b3/0x490 [ 27.900686] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.901069] kthread+0x257/0x310 [ 27.901502] ret_from_fork+0x41/0x80 [ 27.902074] ret_from_fork_asm+0x1a/0x30 [ 27.902613] [ 27.902816] The buggy address belongs to the object at ffff888101094760 [ 27.902816] which belongs to the cache kmalloc-16 of size 16 [ 27.904005] The buggy address is located 8 bytes inside of [ 27.904005] allocated 9-byte region [ffff888101094760, ffff888101094769) [ 27.904762] [ 27.904923] The buggy address belongs to the physical page: [ 27.906197] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101094 [ 27.906989] flags: 0x200000000000000(node=0|zone=2) [ 27.907363] page_type: f5(slab) [ 27.907621] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 27.908402] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 27.909335] page dumped because: kasan: bad access detected [ 27.910436] [ 27.910620] Memory state around the buggy address: [ 27.911058] ffff888101094600: fa fb fc fc fa fb fc fc fa fb fc fc 00 02 fc fc [ 27.911767] ffff888101094680: 00 02 fc fc fa fb fc fc 00 00 fc fc fa fb fc fc [ 27.912461] >ffff888101094700: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 27.913103] ^ [ 27.913775] ffff888101094780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.915089] ffff888101094800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.916031] ================================================================== [ 27.808935] ================================================================== [ 27.809702] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x374/0xd50 [ 27.810617] Write of size 8 at addr ffff888101094768 by task kunit_try_catch/268 [ 27.811140] [ 27.811546] CPU: 1 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 27.813186] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.813723] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.814639] Call Trace: [ 27.815059] <TASK> [ 27.815532] dump_stack_lvl+0x73/0xb0 [ 27.816000] print_report+0xd1/0x640 [ 27.816932] ? __virt_addr_valid+0x1db/0x2d0 [ 27.817434] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.818029] kasan_report+0x102/0x140 [ 27.818628] ? kasan_bitops_modify.constprop.0+0x374/0xd50 [ 27.819292] ? kasan_bitops_modify.constprop.0+0x374/0xd50 [ 27.819827] kasan_check_range+0x10c/0x1c0 [ 27.820659] __kasan_check_write+0x18/0x20 [ 27.821139] kasan_bitops_modify.constprop.0+0x374/0xd50 [ 27.821634] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 27.822112] ? __kmalloc_cache_noprof+0x184/0x410 [ 27.822652] ? trace_hardirqs_on+0x37/0xe0 [ 27.823291] ? kasan_bitops_generic+0x93/0x1c0 [ 27.823746] kasan_bitops_generic+0x117/0x1c0 [ 27.824630] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 27.825104] ? __pfx_read_tsc+0x10/0x10 [ 27.825688] ? ktime_get_ts64+0x86/0x230 [ 27.826114] kunit_try_run_case+0x1b3/0x490 [ 27.826849] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.827287] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 27.828008] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.828749] ? __kthread_parkme+0x82/0x160 [ 27.829455] ? preempt_count_sub+0x50/0x80 [ 27.830079] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.830919] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.831348] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.832457] kthread+0x257/0x310 [ 27.832700] ? __pfx_kthread+0x10/0x10 [ 27.834020] ret_from_fork+0x41/0x80 [ 27.834920] ? __pfx_kthread+0x10/0x10 [ 27.835511] ret_from_fork_asm+0x1a/0x30 [ 27.836657] </TASK> [ 27.836842] [ 27.836977] Allocated by task 268: [ 27.837226] kasan_save_stack+0x3d/0x60 [ 27.838007] kasan_save_track+0x18/0x40 [ 27.838810] kasan_save_alloc_info+0x3b/0x50 [ 27.839691] __kasan_kmalloc+0xb7/0xc0 [ 27.840855] __kmalloc_cache_noprof+0x184/0x410 [ 27.841232] kasan_bitops_generic+0x93/0x1c0 [ 27.841663] kunit_try_run_case+0x1b3/0x490 [ 27.842328] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.842977] kthread+0x257/0x310 [ 27.843812] ret_from_fork+0x41/0x80 [ 27.844479] ret_from_fork_asm+0x1a/0x30 [ 27.846371] [ 27.846645] The buggy address belongs to the object at ffff888101094760 [ 27.846645] which belongs to the cache kmalloc-16 of size 16 [ 27.847675] The buggy address is located 8 bytes inside of [ 27.847675] allocated 9-byte region [ffff888101094760, ffff888101094769) [ 27.849763] [ 27.850007] The buggy address belongs to the physical page: [ 27.850562] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101094 [ 27.851588] flags: 0x200000000000000(node=0|zone=2) [ 27.852090] page_type: f5(slab) [ 27.852793] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 27.854315] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 27.855070] page dumped because: kasan: bad access detected [ 27.855427] [ 27.855663] Memory state around the buggy address: [ 27.856200] ffff888101094600: fa fb fc fc fa fb fc fc fa fb fc fc 00 02 fc fc [ 27.857617] ffff888101094680: 00 02 fc fc fa fb fc fc 00 00 fc fc fa fb fc fc [ 27.859172] >ffff888101094700: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 27.859932] ^ [ 27.860964] ffff888101094780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.861406] ffff888101094800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.862904] ================================================================== [ 27.917075] ================================================================== [ 27.917847] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ad/0xd50 [ 27.919386] Write of size 8 at addr ffff888101094768 by task kunit_try_catch/268 [ 27.919909] [ 27.920094] CPU: 1 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 27.921728] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.922098] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.923496] Call Trace: [ 27.923968] <TASK> [ 27.924174] dump_stack_lvl+0x73/0xb0 [ 27.924702] print_report+0xd1/0x640 [ 27.925090] ? __virt_addr_valid+0x1db/0x2d0 [ 27.925730] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.926363] kasan_report+0x102/0x140 [ 27.926725] ? kasan_bitops_modify.constprop.0+0x4ad/0xd50 [ 27.927352] ? kasan_bitops_modify.constprop.0+0x4ad/0xd50 [ 27.928729] kasan_check_range+0x10c/0x1c0 [ 27.929401] __kasan_check_write+0x18/0x20 [ 27.929743] kasan_bitops_modify.constprop.0+0x4ad/0xd50 [ 27.930350] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 27.931012] ? __kmalloc_cache_noprof+0x184/0x410 [ 27.932072] ? trace_hardirqs_on+0x37/0xe0 [ 27.932623] ? kasan_bitops_generic+0x93/0x1c0 [ 27.933180] kasan_bitops_generic+0x117/0x1c0 [ 27.933851] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 27.934434] ? __pfx_read_tsc+0x10/0x10 [ 27.935121] ? ktime_get_ts64+0x86/0x230 [ 27.936134] kunit_try_run_case+0x1b3/0x490 [ 27.936722] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.937230] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 27.937942] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.938622] ? __kthread_parkme+0x82/0x160 [ 27.939193] ? preempt_count_sub+0x50/0x80 [ 27.939586] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.940050] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.940691] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.941308] kthread+0x257/0x310 [ 27.941712] ? __pfx_kthread+0x10/0x10 [ 27.942057] ret_from_fork+0x41/0x80 [ 27.942354] ? __pfx_kthread+0x10/0x10 [ 27.943934] ret_from_fork_asm+0x1a/0x30 [ 27.944655] </TASK> [ 27.945079] [ 27.945356] Allocated by task 268: [ 27.945633] kasan_save_stack+0x3d/0x60 [ 27.946376] kasan_save_track+0x18/0x40 [ 27.946699] kasan_save_alloc_info+0x3b/0x50 [ 27.947127] __kasan_kmalloc+0xb7/0xc0 [ 27.948065] __kmalloc_cache_noprof+0x184/0x410 [ 27.949017] kasan_bitops_generic+0x93/0x1c0 [ 27.949421] kunit_try_run_case+0x1b3/0x490 [ 27.950076] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.950733] kthread+0x257/0x310 [ 27.951155] ret_from_fork+0x41/0x80 [ 27.952060] ret_from_fork_asm+0x1a/0x30 [ 27.952535] [ 27.952969] The buggy address belongs to the object at ffff888101094760 [ 27.952969] which belongs to the cache kmalloc-16 of size 16 [ 27.954061] The buggy address is located 8 bytes inside of [ 27.954061] allocated 9-byte region [ffff888101094760, ffff888101094769) [ 27.955090] [ 27.955244] The buggy address belongs to the physical page: [ 27.956161] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101094 [ 27.957055] flags: 0x200000000000000(node=0|zone=2) [ 27.957582] page_type: f5(slab) [ 27.958777] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 27.959888] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 27.960574] page dumped because: kasan: bad access detected [ 27.961116] [ 27.961336] Memory state around the buggy address: [ 27.961840] ffff888101094600: fa fb fc fc fa fb fc fc fa fb fc fc 00 02 fc fc [ 27.962749] ffff888101094680: 00 02 fc fc fa fb fc fc 00 00 fc fc fa fb fc fc [ 27.963913] >ffff888101094700: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 27.964535] ^ [ 27.965363] ffff888101094780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.966063] ffff888101094800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.966892] ==================================================================