Date
Dec. 9, 2024, 6:35 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 27.581814] ================================================================== [ 27.582546] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa08/0xbc8 [ 27.583466] Read of size 8 at addr fff00000c11118e8 by task kunit_try_catch/249 [ 27.584202] [ 27.584560] CPU: 0 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 27.585751] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.586289] Hardware name: linux,dummy-virt (DT) [ 27.586891] Call trace: [ 27.587224] show_stack+0x20/0x38 (C) [ 27.587820] dump_stack_lvl+0x8c/0xd0 [ 27.588409] print_report+0x118/0x5e0 [ 27.589095] kasan_report+0xc8/0x118 [ 27.589633] __asan_report_load8_noabort+0x20/0x30 [ 27.590271] kasan_bitops_test_and_modify.constprop.0+0xa08/0xbc8 [ 27.591005] kasan_bitops_generic+0x11c/0x1c8 [ 27.591548] kunit_try_run_case+0x14c/0x3d0 [ 27.592243] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.592966] kthread+0x24c/0x2d0 [ 27.593508] ret_from_fork+0x10/0x20 [ 27.594079] [ 27.594389] Allocated by task 249: [ 27.594938] kasan_save_stack+0x3c/0x68 [ 27.595516] kasan_save_track+0x20/0x40 [ 27.596113] kasan_save_alloc_info+0x40/0x58 [ 27.596760] __kasan_kmalloc+0xd4/0xd8 [ 27.597289] __kmalloc_cache_noprof+0x15c/0x3c0 [ 27.597928] kasan_bitops_generic+0xa0/0x1c8 [ 27.598522] kunit_try_run_case+0x14c/0x3d0 [ 27.599096] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.599800] kthread+0x24c/0x2d0 [ 27.600252] ret_from_fork+0x10/0x20 [ 27.600853] [ 27.601219] The buggy address belongs to the object at fff00000c11118e0 [ 27.601219] which belongs to the cache kmalloc-16 of size 16 [ 27.602402] The buggy address is located 8 bytes inside of [ 27.602402] allocated 9-byte region [fff00000c11118e0, fff00000c11118e9) [ 27.603617] [ 27.603998] The buggy address belongs to the physical page: [ 27.604601] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101111 [ 27.605361] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.606156] page_type: f5(slab) [ 27.606625] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 27.607374] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 27.608341] page dumped because: kasan: bad access detected [ 27.609031] [ 27.609365] Memory state around the buggy address: [ 27.609978] fff00000c1111780: 00 00 fc fc 00 00 fc fc 00 02 fc fc 00 02 fc fc [ 27.610817] fff00000c1111800: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 27.611566] >fff00000c1111880: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 27.612292] ^ [ 27.613048] fff00000c1111900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.613937] fff00000c1111980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.614741] ================================================================== [ 27.765033] ================================================================== [ 27.765664] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x334/0xbc8 [ 27.766444] Write of size 8 at addr fff00000c11118e8 by task kunit_try_catch/249 [ 27.766890] [ 27.767303] CPU: 0 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 27.768432] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.769067] Hardware name: linux,dummy-virt (DT) [ 27.769758] Call trace: [ 27.770198] show_stack+0x20/0x38 (C) [ 27.770802] dump_stack_lvl+0x8c/0xd0 [ 27.771446] print_report+0x118/0x5e0 [ 27.772110] kasan_report+0xc8/0x118 [ 27.772785] kasan_check_range+0x100/0x1a8 [ 27.773397] __kasan_check_write+0x20/0x30 [ 27.774116] kasan_bitops_test_and_modify.constprop.0+0x334/0xbc8 [ 27.774901] kasan_bitops_generic+0x11c/0x1c8 [ 27.775554] kunit_try_run_case+0x14c/0x3d0 [ 27.776186] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.776952] kthread+0x24c/0x2d0 [ 27.777516] ret_from_fork+0x10/0x20 [ 27.778136] [ 27.778491] Allocated by task 249: [ 27.778982] kasan_save_stack+0x3c/0x68 [ 27.779659] kasan_save_track+0x20/0x40 [ 27.780294] kasan_save_alloc_info+0x40/0x58 [ 27.780945] __kasan_kmalloc+0xd4/0xd8 [ 27.781528] __kmalloc_cache_noprof+0x15c/0x3c0 [ 27.782124] kasan_bitops_generic+0xa0/0x1c8 [ 27.782674] kunit_try_run_case+0x14c/0x3d0 [ 27.783348] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.784089] kthread+0x24c/0x2d0 [ 27.784641] ret_from_fork+0x10/0x20 [ 27.785233] [ 27.785570] The buggy address belongs to the object at fff00000c11118e0 [ 27.785570] which belongs to the cache kmalloc-16 of size 16 [ 27.786900] The buggy address is located 8 bytes inside of [ 27.786900] allocated 9-byte region [fff00000c11118e0, fff00000c11118e9) [ 27.788233] [ 27.788627] The buggy address belongs to the physical page: [ 27.789333] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101111 [ 27.790265] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.791047] page_type: f5(slab) [ 27.791582] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 27.792501] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 27.793355] page dumped because: kasan: bad access detected [ 27.794047] [ 27.794410] Memory state around the buggy address: [ 27.795018] fff00000c1111780: 00 00 fc fc 00 00 fc fc 00 02 fc fc 00 02 fc fc [ 27.795953] fff00000c1111800: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 27.796805] >fff00000c1111880: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 27.797594] ^ [ 27.798368] fff00000c1111900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.799198] fff00000c1111980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.799987] ================================================================== [ 27.616115] ================================================================== [ 27.617063] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc8 [ 27.618638] Write of size 8 at addr fff00000c11118e8 by task kunit_try_catch/249 [ 27.619459] [ 27.619787] CPU: 0 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 27.620990] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.621866] Hardware name: linux,dummy-virt (DT) [ 27.622385] Call trace: [ 27.623166] show_stack+0x20/0x38 (C) [ 27.623571] dump_stack_lvl+0x8c/0xd0 [ 27.624282] print_report+0x118/0x5e0 [ 27.624981] kasan_report+0xc8/0x118 [ 27.625667] kasan_check_range+0x100/0x1a8 [ 27.626371] __kasan_check_write+0x20/0x30 [ 27.627088] kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc8 [ 27.627930] kasan_bitops_generic+0x11c/0x1c8 [ 27.628646] kunit_try_run_case+0x14c/0x3d0 [ 27.629387] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.630204] kthread+0x24c/0x2d0 [ 27.630844] ret_from_fork+0x10/0x20 [ 27.631529] [ 27.632037] Allocated by task 249: [ 27.632512] kasan_save_stack+0x3c/0x68 [ 27.633045] kasan_save_track+0x20/0x40 [ 27.633613] kasan_save_alloc_info+0x40/0x58 [ 27.634168] __kasan_kmalloc+0xd4/0xd8 [ 27.634819] __kmalloc_cache_noprof+0x15c/0x3c0 [ 27.635433] kasan_bitops_generic+0xa0/0x1c8 [ 27.636168] kunit_try_run_case+0x14c/0x3d0 [ 27.636835] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.637540] kthread+0x24c/0x2d0 [ 27.638097] ret_from_fork+0x10/0x20 [ 27.638680] [ 27.639066] The buggy address belongs to the object at fff00000c11118e0 [ 27.639066] which belongs to the cache kmalloc-16 of size 16 [ 27.640389] The buggy address is located 8 bytes inside of [ 27.640389] allocated 9-byte region [fff00000c11118e0, fff00000c11118e9) [ 27.641677] [ 27.642039] The buggy address belongs to the physical page: [ 27.642737] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101111 [ 27.643679] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.644465] page_type: f5(slab) [ 27.645018] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 27.645951] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 27.646789] page dumped because: kasan: bad access detected [ 27.647439] [ 27.647772] Memory state around the buggy address: [ 27.648424] fff00000c1111780: 00 00 fc fc 00 00 fc fc 00 02 fc fc 00 02 fc fc [ 27.649258] fff00000c1111800: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 27.650126] >fff00000c1111880: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 27.650956] ^ [ 27.651739] fff00000c1111900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.652560] fff00000c1111980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.653382] ================================================================== [ 27.801749] ================================================================== [ 27.803058] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa44/0xbc8 [ 27.804743] Read of size 8 at addr fff00000c11118e8 by task kunit_try_catch/249 [ 27.805597] [ 27.805967] CPU: 0 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 27.807213] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.807807] Hardware name: linux,dummy-virt (DT) [ 27.808427] Call trace: [ 27.808879] show_stack+0x20/0x38 (C) [ 27.809468] dump_stack_lvl+0x8c/0xd0 [ 27.810071] print_report+0x118/0x5e0 [ 27.810661] kasan_report+0xc8/0x118 [ 27.811261] __asan_report_load8_noabort+0x20/0x30 [ 27.811945] kasan_bitops_test_and_modify.constprop.0+0xa44/0xbc8 [ 27.812739] kasan_bitops_generic+0x11c/0x1c8 [ 27.813372] kunit_try_run_case+0x14c/0x3d0 [ 27.814013] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.814751] kthread+0x24c/0x2d0 [ 27.815298] ret_from_fork+0x10/0x20 [ 27.815907] [ 27.816273] Allocated by task 249: [ 27.816786] kasan_save_stack+0x3c/0x68 [ 27.817399] kasan_save_track+0x20/0x40 [ 27.818024] kasan_save_alloc_info+0x40/0x58 [ 27.818650] __kasan_kmalloc+0xd4/0xd8 [ 27.819240] __kmalloc_cache_noprof+0x15c/0x3c0 [ 27.819899] kasan_bitops_generic+0xa0/0x1c8 [ 27.820513] kunit_try_run_case+0x14c/0x3d0 [ 27.821139] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.821858] kthread+0x24c/0x2d0 [ 27.822399] ret_from_fork+0x10/0x20 [ 27.822996] [ 27.823345] The buggy address belongs to the object at fff00000c11118e0 [ 27.823345] which belongs to the cache kmalloc-16 of size 16 [ 27.824627] The buggy address is located 8 bytes inside of [ 27.824627] allocated 9-byte region [fff00000c11118e0, fff00000c11118e9) [ 27.825950] [ 27.826337] The buggy address belongs to the physical page: [ 27.827009] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101111 [ 27.827934] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.828756] page_type: f5(slab) [ 27.829195] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 27.830116] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 27.830971] page dumped because: kasan: bad access detected [ 27.831654] [ 27.831994] Memory state around the buggy address: [ 27.832630] fff00000c1111780: 00 00 fc fc 00 00 fc fc 00 02 fc fc 00 02 fc fc [ 27.833552] fff00000c1111800: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 27.834365] >fff00000c1111880: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 27.835200] ^ [ 27.835993] fff00000c1111900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.836819] fff00000c1111980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.837604] ================================================================== [ 27.654616] ================================================================== [ 27.655801] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa50/0xbc8 [ 27.657120] Read of size 8 at addr fff00000c11118e8 by task kunit_try_catch/249 [ 27.657887] [ 27.658309] CPU: 0 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 27.659447] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.660116] Hardware name: linux,dummy-virt (DT) [ 27.660920] Call trace: [ 27.661341] show_stack+0x20/0x38 (C) [ 27.662090] dump_stack_lvl+0x8c/0xd0 [ 27.662768] print_report+0x118/0x5e0 [ 27.663315] kasan_report+0xc8/0x118 [ 27.663769] __asan_report_load8_noabort+0x20/0x30 [ 27.664404] kasan_bitops_test_and_modify.constprop.0+0xa50/0xbc8 [ 27.665266] kasan_bitops_generic+0x11c/0x1c8 [ 27.665918] kunit_try_run_case+0x14c/0x3d0 [ 27.666568] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.667309] kthread+0x24c/0x2d0 [ 27.667878] ret_from_fork+0x10/0x20 [ 27.668473] [ 27.668868] Allocated by task 249: [ 27.669367] kasan_save_stack+0x3c/0x68 [ 27.669899] kasan_save_track+0x20/0x40 [ 27.670484] kasan_save_alloc_info+0x40/0x58 [ 27.671052] __kasan_kmalloc+0xd4/0xd8 [ 27.671616] __kmalloc_cache_noprof+0x15c/0x3c0 [ 27.672210] kasan_bitops_generic+0xa0/0x1c8 [ 27.672854] kunit_try_run_case+0x14c/0x3d0 [ 27.673482] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.674131] kthread+0x24c/0x2d0 [ 27.674728] ret_from_fork+0x10/0x20 [ 27.675209] [ 27.675584] The buggy address belongs to the object at fff00000c11118e0 [ 27.675584] which belongs to the cache kmalloc-16 of size 16 [ 27.676867] The buggy address is located 8 bytes inside of [ 27.676867] allocated 9-byte region [fff00000c11118e0, fff00000c11118e9) [ 27.678060] [ 27.678386] The buggy address belongs to the physical page: [ 27.679001] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101111 [ 27.680008] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.680768] page_type: f5(slab) [ 27.681198] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 27.682056] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 27.682817] page dumped because: kasan: bad access detected [ 27.683375] [ 27.683763] Memory state around the buggy address: [ 27.684410] fff00000c1111780: 00 00 fc fc 00 00 fc fc 00 02 fc fc 00 02 fc fc [ 27.685304] fff00000c1111800: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 27.686008] >fff00000c1111880: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 27.686905] ^ [ 27.687639] fff00000c1111900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.688434] fff00000c1111980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.689158] ================================================================== [ 27.543264] ================================================================== [ 27.543908] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc8 [ 27.544809] Write of size 8 at addr fff00000c11118e8 by task kunit_try_catch/249 [ 27.545854] [ 27.546210] CPU: 0 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 27.548458] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.549103] Hardware name: linux,dummy-virt (DT) [ 27.549793] Call trace: [ 27.550322] show_stack+0x20/0x38 (C) [ 27.551206] dump_stack_lvl+0x8c/0xd0 [ 27.551730] print_report+0x118/0x5e0 [ 27.552423] kasan_report+0xc8/0x118 [ 27.552969] kasan_check_range+0x100/0x1a8 [ 27.553510] __kasan_check_write+0x20/0x30 [ 27.554054] kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc8 [ 27.554982] kasan_bitops_generic+0x11c/0x1c8 [ 27.555841] kunit_try_run_case+0x14c/0x3d0 [ 27.556457] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.557351] kthread+0x24c/0x2d0 [ 27.557842] ret_from_fork+0x10/0x20 [ 27.558333] [ 27.558625] Allocated by task 249: [ 27.560084] kasan_save_stack+0x3c/0x68 [ 27.560541] kasan_save_track+0x20/0x40 [ 27.561100] kasan_save_alloc_info+0x40/0x58 [ 27.561646] __kasan_kmalloc+0xd4/0xd8 [ 27.562425] __kmalloc_cache_noprof+0x15c/0x3c0 [ 27.563433] kasan_bitops_generic+0xa0/0x1c8 [ 27.564131] kunit_try_run_case+0x14c/0x3d0 [ 27.564772] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.565442] kthread+0x24c/0x2d0 [ 27.565957] ret_from_fork+0x10/0x20 [ 27.566480] [ 27.566848] The buggy address belongs to the object at fff00000c11118e0 [ 27.566848] which belongs to the cache kmalloc-16 of size 16 [ 27.568129] The buggy address is located 8 bytes inside of [ 27.568129] allocated 9-byte region [fff00000c11118e0, fff00000c11118e9) [ 27.569332] [ 27.569673] The buggy address belongs to the physical page: [ 27.570334] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101111 [ 27.571247] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.571941] page_type: f5(slab) [ 27.572446] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 27.573300] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 27.574151] page dumped because: kasan: bad access detected [ 27.574783] [ 27.575101] Memory state around the buggy address: [ 27.575620] fff00000c1111780: 00 00 fc fc 00 00 fc fc 00 02 fc fc 00 02 fc fc [ 27.576530] fff00000c1111800: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 27.577316] >fff00000c1111880: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 27.578158] ^ [ 27.578894] fff00000c1111900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.579626] fff00000c1111980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.580456] ================================================================== [ 27.839407] ================================================================== [ 27.840064] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa8c/0xbc8 [ 27.841118] Read of size 8 at addr fff00000c11118e8 by task kunit_try_catch/249 [ 27.842037] [ 27.842361] CPU: 0 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 27.843792] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.844300] Hardware name: linux,dummy-virt (DT) [ 27.845068] Call trace: [ 27.845367] show_stack+0x20/0x38 (C) [ 27.846164] dump_stack_lvl+0x8c/0xd0 [ 27.846691] print_report+0x118/0x5e0 [ 27.847231] kasan_report+0xc8/0x118 [ 27.847981] __asan_report_load8_noabort+0x20/0x30 [ 27.848650] kasan_bitops_test_and_modify.constprop.0+0xa8c/0xbc8 [ 27.849418] kasan_bitops_generic+0x11c/0x1c8 [ 27.849946] kunit_try_run_case+0x14c/0x3d0 [ 27.850542] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.851323] kthread+0x24c/0x2d0 [ 27.851911] ret_from_fork+0x10/0x20 [ 27.852502] [ 27.852885] Allocated by task 249: [ 27.853435] kasan_save_stack+0x3c/0x68 [ 27.854057] kasan_save_track+0x20/0x40 [ 27.854692] kasan_save_alloc_info+0x40/0x58 [ 27.855373] __kasan_kmalloc+0xd4/0xd8 [ 27.855961] __kmalloc_cache_noprof+0x15c/0x3c0 [ 27.856627] kasan_bitops_generic+0xa0/0x1c8 [ 27.857280] kunit_try_run_case+0x14c/0x3d0 [ 27.857912] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.858643] kthread+0x24c/0x2d0 [ 27.859273] ret_from_fork+0x10/0x20 [ 27.859875] [ 27.860218] The buggy address belongs to the object at fff00000c11118e0 [ 27.860218] which belongs to the cache kmalloc-16 of size 16 [ 27.861539] The buggy address is located 8 bytes inside of [ 27.861539] allocated 9-byte region [fff00000c11118e0, fff00000c11118e9) [ 27.862899] [ 27.863294] The buggy address belongs to the physical page: [ 27.863928] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101111 [ 27.864934] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.865759] page_type: f5(slab) [ 27.866293] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 27.867199] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 27.868047] page dumped because: kasan: bad access detected [ 27.868741] [ 27.869085] Memory state around the buggy address: [ 27.869733] fff00000c1111780: 00 00 fc fc 00 00 fc fc 00 02 fc fc 00 02 fc fc [ 27.870618] fff00000c1111800: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 27.871462] >fff00000c1111880: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 27.872276] ^ [ 27.873102] fff00000c1111900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.873939] fff00000c1111980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.874786] ================================================================== [ 27.690946] ================================================================== [ 27.691550] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc8 [ 27.692629] Write of size 8 at addr fff00000c11118e8 by task kunit_try_catch/249 [ 27.693838] [ 27.694302] CPU: 0 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 27.695507] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.696166] Hardware name: linux,dummy-virt (DT) [ 27.696873] Call trace: [ 27.697339] show_stack+0x20/0x38 (C) [ 27.697833] dump_stack_lvl+0x8c/0xd0 [ 27.698589] print_report+0x118/0x5e0 [ 27.699345] kasan_report+0xc8/0x118 [ 27.700033] kasan_check_range+0x100/0x1a8 [ 27.700769] __kasan_check_write+0x20/0x30 [ 27.701267] kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc8 [ 27.701921] kasan_bitops_generic+0x11c/0x1c8 [ 27.702456] kunit_try_run_case+0x14c/0x3d0 [ 27.703283] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.704109] kthread+0x24c/0x2d0 [ 27.704782] ret_from_fork+0x10/0x20 [ 27.705294] [ 27.705577] Allocated by task 249: [ 27.706060] kasan_save_stack+0x3c/0x68 [ 27.706550] kasan_save_track+0x20/0x40 [ 27.707152] kasan_save_alloc_info+0x40/0x58 [ 27.707654] __kasan_kmalloc+0xd4/0xd8 [ 27.708282] __kmalloc_cache_noprof+0x15c/0x3c0 [ 27.708967] kasan_bitops_generic+0xa0/0x1c8 [ 27.709580] kunit_try_run_case+0x14c/0x3d0 [ 27.710220] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.710988] kthread+0x24c/0x2d0 [ 27.711588] ret_from_fork+0x10/0x20 [ 27.712113] [ 27.712460] The buggy address belongs to the object at fff00000c11118e0 [ 27.712460] which belongs to the cache kmalloc-16 of size 16 [ 27.713687] The buggy address is located 8 bytes inside of [ 27.713687] allocated 9-byte region [fff00000c11118e0, fff00000c11118e9) [ 27.715035] [ 27.715424] The buggy address belongs to the physical page: [ 27.716127] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101111 [ 27.717098] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.717897] page_type: f5(slab) [ 27.718435] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 27.719337] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 27.720192] page dumped because: kasan: bad access detected [ 27.720878] [ 27.721203] Memory state around the buggy address: [ 27.721852] fff00000c1111780: 00 00 fc fc 00 00 fc fc 00 02 fc fc 00 02 fc fc [ 27.722769] fff00000c1111800: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 27.723589] >fff00000c1111880: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 27.724371] ^ [ 27.725155] fff00000c1111900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.725993] fff00000c1111980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.726793] ================================================================== [ 27.728378] ================================================================== [ 27.729047] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xad4/0xbc8 [ 27.730586] Read of size 8 at addr fff00000c11118e8 by task kunit_try_catch/249 [ 27.732476] [ 27.732981] CPU: 0 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 27.734180] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.734732] Hardware name: linux,dummy-virt (DT) [ 27.735302] Call trace: [ 27.735808] show_stack+0x20/0x38 (C) [ 27.736431] dump_stack_lvl+0x8c/0xd0 [ 27.737076] print_report+0x118/0x5e0 [ 27.737653] kasan_report+0xc8/0x118 [ 27.738256] __asan_report_load8_noabort+0x20/0x30 [ 27.738956] kasan_bitops_test_and_modify.constprop.0+0xad4/0xbc8 [ 27.739723] kasan_bitops_generic+0x11c/0x1c8 [ 27.740363] kunit_try_run_case+0x14c/0x3d0 [ 27.741005] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.741770] kthread+0x24c/0x2d0 [ 27.742346] ret_from_fork+0x10/0x20 [ 27.742873] [ 27.743168] Allocated by task 249: [ 27.743730] kasan_save_stack+0x3c/0x68 [ 27.744282] kasan_save_track+0x20/0x40 [ 27.744833] kasan_save_alloc_info+0x40/0x58 [ 27.745388] __kasan_kmalloc+0xd4/0xd8 [ 27.745927] __kmalloc_cache_noprof+0x15c/0x3c0 [ 27.746511] kasan_bitops_generic+0xa0/0x1c8 [ 27.747147] kunit_try_run_case+0x14c/0x3d0 [ 27.747749] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.748510] kthread+0x24c/0x2d0 [ 27.749091] ret_from_fork+0x10/0x20 [ 27.749598] [ 27.749910] The buggy address belongs to the object at fff00000c11118e0 [ 27.749910] which belongs to the cache kmalloc-16 of size 16 [ 27.751050] The buggy address is located 8 bytes inside of [ 27.751050] allocated 9-byte region [fff00000c11118e0, fff00000c11118e9) [ 27.752049] [ 27.752416] The buggy address belongs to the physical page: [ 27.753216] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101111 [ 27.754091] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.754983] page_type: f5(slab) [ 27.755537] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 27.756332] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 27.757161] page dumped because: kasan: bad access detected [ 27.757859] [ 27.758165] Memory state around the buggy address: [ 27.758738] fff00000c1111780: 00 00 fc fc 00 00 fc fc 00 02 fc fc 00 02 fc fc [ 27.759513] fff00000c1111800: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 27.760223] >fff00000c1111880: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 27.761027] ^ [ 27.761815] fff00000c1111900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.762572] fff00000c1111980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.763315] ==================================================================
[ 28.013384] ================================================================== [ 28.014792] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x102/0xd90 [ 28.016112] Write of size 8 at addr ffff888101094768 by task kunit_try_catch/268 [ 28.016804] [ 28.017121] CPU: 1 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 28.018002] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.018537] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.019463] Call Trace: [ 28.019748] <TASK> [ 28.020420] dump_stack_lvl+0x73/0xb0 [ 28.021354] print_report+0xd1/0x640 [ 28.021713] ? __virt_addr_valid+0x1db/0x2d0 [ 28.022289] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.022773] kasan_report+0x102/0x140 [ 28.023191] ? kasan_bitops_test_and_modify.constprop.0+0x102/0xd90 [ 28.023736] ? kasan_bitops_test_and_modify.constprop.0+0x102/0xd90 [ 28.024341] kasan_check_range+0x10c/0x1c0 [ 28.024811] __kasan_check_write+0x18/0x20 [ 28.025307] kasan_bitops_test_and_modify.constprop.0+0x102/0xd90 [ 28.025729] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 28.026430] ? __kmalloc_cache_noprof+0x184/0x410 [ 28.026975] ? trace_hardirqs_on+0x37/0xe0 [ 28.027376] ? kasan_bitops_generic+0x93/0x1c0 [ 28.027946] kasan_bitops_generic+0x122/0x1c0 [ 28.028421] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 28.028796] ? __pfx_read_tsc+0x10/0x10 [ 28.029301] ? ktime_get_ts64+0x86/0x230 [ 28.029726] kunit_try_run_case+0x1b3/0x490 [ 28.030248] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.030620] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 28.031171] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.031705] ? __kthread_parkme+0x82/0x160 [ 28.032044] ? preempt_count_sub+0x50/0x80 [ 28.032573] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.033202] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.033706] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.034279] kthread+0x257/0x310 [ 28.034569] ? __pfx_kthread+0x10/0x10 [ 28.035056] ret_from_fork+0x41/0x80 [ 28.035544] ? __pfx_kthread+0x10/0x10 [ 28.036064] ret_from_fork_asm+0x1a/0x30 [ 28.036406] </TASK> [ 28.036740] [ 28.037022] Allocated by task 268: [ 28.037484] kasan_save_stack+0x3d/0x60 [ 28.038008] kasan_save_track+0x18/0x40 [ 28.038419] kasan_save_alloc_info+0x3b/0x50 [ 28.038825] __kasan_kmalloc+0xb7/0xc0 [ 28.039190] __kmalloc_cache_noprof+0x184/0x410 [ 28.039521] kasan_bitops_generic+0x93/0x1c0 [ 28.039820] kunit_try_run_case+0x1b3/0x490 [ 28.040388] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.041109] kthread+0x257/0x310 [ 28.041400] ret_from_fork+0x41/0x80 [ 28.041672] ret_from_fork_asm+0x1a/0x30 [ 28.042475] [ 28.042724] The buggy address belongs to the object at ffff888101094760 [ 28.042724] which belongs to the cache kmalloc-16 of size 16 [ 28.043709] The buggy address is located 8 bytes inside of [ 28.043709] allocated 9-byte region [ffff888101094760, ffff888101094769) [ 28.044648] [ 28.045010] The buggy address belongs to the physical page: [ 28.045444] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101094 [ 28.046148] flags: 0x200000000000000(node=0|zone=2) [ 28.046632] page_type: f5(slab) [ 28.047064] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 28.047758] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 28.048588] page dumped because: kasan: bad access detected [ 28.049110] [ 28.049289] Memory state around the buggy address: [ 28.049815] ffff888101094600: fa fb fc fc fa fb fc fc fa fb fc fc 00 02 fc fc [ 28.050565] ffff888101094680: 00 02 fc fc fa fb fc fc 00 00 fc fc fa fb fc fc [ 28.052083] >ffff888101094700: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 28.052730] ^ [ 28.053712] ffff888101094780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.054083] ffff888101094800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.054734] ================================================================== [ 28.247633] ================================================================== [ 28.248564] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90 [ 28.249332] Write of size 8 at addr ffff888101094768 by task kunit_try_catch/268 [ 28.250047] [ 28.250233] CPU: 1 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 28.251454] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.251809] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.252661] Call Trace: [ 28.252891] <TASK> [ 28.253279] dump_stack_lvl+0x73/0xb0 [ 28.253672] print_report+0xd1/0x640 [ 28.254133] ? __virt_addr_valid+0x1db/0x2d0 [ 28.254672] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.255321] kasan_report+0x102/0x140 [ 28.255802] ? kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90 [ 28.256359] ? kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90 [ 28.257215] kasan_check_range+0x10c/0x1c0 [ 28.257624] __kasan_check_write+0x18/0x20 [ 28.258124] kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90 [ 28.258916] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 28.259479] ? __kmalloc_cache_noprof+0x184/0x410 [ 28.260118] ? trace_hardirqs_on+0x37/0xe0 [ 28.260589] ? kasan_bitops_generic+0x93/0x1c0 [ 28.261105] kasan_bitops_generic+0x122/0x1c0 [ 28.261492] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 28.262105] ? __pfx_read_tsc+0x10/0x10 [ 28.262610] ? ktime_get_ts64+0x86/0x230 [ 28.263169] kunit_try_run_case+0x1b3/0x490 [ 28.263586] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.264165] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 28.264638] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.265433] ? __kthread_parkme+0x82/0x160 [ 28.266028] ? preempt_count_sub+0x50/0x80 [ 28.266503] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.267087] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.267700] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.268297] kthread+0x257/0x310 [ 28.268764] ? __pfx_kthread+0x10/0x10 [ 28.269237] ret_from_fork+0x41/0x80 [ 28.269720] ? __pfx_kthread+0x10/0x10 [ 28.270011] ret_from_fork_asm+0x1a/0x30 [ 28.270363] </TASK> [ 28.270830] [ 28.271133] Allocated by task 268: [ 28.271598] kasan_save_stack+0x3d/0x60 [ 28.271881] kasan_save_track+0x18/0x40 [ 28.272393] kasan_save_alloc_info+0x3b/0x50 [ 28.273003] __kasan_kmalloc+0xb7/0xc0 [ 28.273407] __kmalloc_cache_noprof+0x184/0x410 [ 28.273717] kasan_bitops_generic+0x93/0x1c0 [ 28.274427] kunit_try_run_case+0x1b3/0x490 [ 28.275105] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.275587] kthread+0x257/0x310 [ 28.275901] ret_from_fork+0x41/0x80 [ 28.276493] ret_from_fork_asm+0x1a/0x30 [ 28.277152] [ 28.277332] The buggy address belongs to the object at ffff888101094760 [ 28.277332] which belongs to the cache kmalloc-16 of size 16 [ 28.278425] The buggy address is located 8 bytes inside of [ 28.278425] allocated 9-byte region [ffff888101094760, ffff888101094769) [ 28.279560] [ 28.279722] The buggy address belongs to the physical page: [ 28.280199] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101094 [ 28.281330] flags: 0x200000000000000(node=0|zone=2) [ 28.282191] page_type: f5(slab) [ 28.282608] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 28.283051] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 28.284231] page dumped because: kasan: bad access detected [ 28.284858] [ 28.285123] Memory state around the buggy address: [ 28.285926] ffff888101094600: fa fb fc fc fa fb fc fc fa fb fc fc 00 02 fc fc [ 28.286672] ffff888101094680: 00 02 fc fc fa fb fc fc 00 00 fc fc fa fb fc fc [ 28.287529] >ffff888101094700: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 28.288182] ^ [ 28.288918] ffff888101094780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.289601] ffff888101094800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.290008] ================================================================== [ 28.106295] ================================================================== [ 28.106900] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90 [ 28.107818] Write of size 8 at addr ffff888101094768 by task kunit_try_catch/268 [ 28.108766] [ 28.108947] CPU: 1 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 28.110305] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.111355] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.112919] Call Trace: [ 28.113527] <TASK> [ 28.114004] dump_stack_lvl+0x73/0xb0 [ 28.114664] print_report+0xd1/0x640 [ 28.115349] ? __virt_addr_valid+0x1db/0x2d0 [ 28.116096] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.116752] kasan_report+0x102/0x140 [ 28.117189] ? kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90 [ 28.117811] ? kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90 [ 28.118645] kasan_check_range+0x10c/0x1c0 [ 28.119340] __kasan_check_write+0x18/0x20 [ 28.120078] kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90 [ 28.120655] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 28.121784] ? __kmalloc_cache_noprof+0x184/0x410 [ 28.122782] ? trace_hardirqs_on+0x37/0xe0 [ 28.123344] ? kasan_bitops_generic+0x93/0x1c0 [ 28.123776] kasan_bitops_generic+0x122/0x1c0 [ 28.124394] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 28.125116] ? __pfx_read_tsc+0x10/0x10 [ 28.125618] ? ktime_get_ts64+0x86/0x230 [ 28.126184] kunit_try_run_case+0x1b3/0x490 [ 28.126505] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.127511] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 28.128290] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.128747] ? __kthread_parkme+0x82/0x160 [ 28.129202] ? preempt_count_sub+0x50/0x80 [ 28.129693] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.130762] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.131543] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.132155] kthread+0x257/0x310 [ 28.132540] ? __pfx_kthread+0x10/0x10 [ 28.133316] ret_from_fork+0x41/0x80 [ 28.133601] ? __pfx_kthread+0x10/0x10 [ 28.134131] ret_from_fork_asm+0x1a/0x30 [ 28.134497] </TASK> [ 28.134895] [ 28.135121] Allocated by task 268: [ 28.135485] kasan_save_stack+0x3d/0x60 [ 28.135822] kasan_save_track+0x18/0x40 [ 28.136387] kasan_save_alloc_info+0x3b/0x50 [ 28.137082] __kasan_kmalloc+0xb7/0xc0 [ 28.137443] __kmalloc_cache_noprof+0x184/0x410 [ 28.138103] kasan_bitops_generic+0x93/0x1c0 [ 28.138511] kunit_try_run_case+0x1b3/0x490 [ 28.139062] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.139477] kthread+0x257/0x310 [ 28.140010] ret_from_fork+0x41/0x80 [ 28.140561] ret_from_fork_asm+0x1a/0x30 [ 28.140905] [ 28.141229] The buggy address belongs to the object at ffff888101094760 [ 28.141229] which belongs to the cache kmalloc-16 of size 16 [ 28.142290] The buggy address is located 8 bytes inside of [ 28.142290] allocated 9-byte region [ffff888101094760, ffff888101094769) [ 28.143511] [ 28.143812] The buggy address belongs to the physical page: [ 28.144237] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101094 [ 28.145076] flags: 0x200000000000000(node=0|zone=2) [ 28.145603] page_type: f5(slab) [ 28.146026] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 28.146867] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 28.147514] page dumped because: kasan: bad access detected [ 28.148118] [ 28.148393] Memory state around the buggy address: [ 28.148919] ffff888101094600: fa fb fc fc fa fb fc fc fa fb fc fc 00 02 fc fc [ 28.149634] ffff888101094680: 00 02 fc fc fa fb fc fc 00 00 fc fc fa fb fc fc [ 28.150283] >ffff888101094700: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 28.151011] ^ [ 28.151720] ffff888101094780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.152352] ffff888101094800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.153030] ================================================================== [ 28.056843] ================================================================== [ 28.058217] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90 [ 28.059026] Write of size 8 at addr ffff888101094768 by task kunit_try_catch/268 [ 28.059710] [ 28.059988] CPU: 1 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 28.061585] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.062506] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.063726] Call Trace: [ 28.064145] <TASK> [ 28.064388] dump_stack_lvl+0x73/0xb0 [ 28.065172] print_report+0xd1/0x640 [ 28.065896] ? __virt_addr_valid+0x1db/0x2d0 [ 28.066338] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.067205] kasan_report+0x102/0x140 [ 28.067904] ? kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90 [ 28.068676] ? kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90 [ 28.069251] kasan_check_range+0x10c/0x1c0 [ 28.069811] __kasan_check_write+0x18/0x20 [ 28.070334] kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90 [ 28.071021] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 28.071725] ? __kmalloc_cache_noprof+0x184/0x410 [ 28.072618] ? trace_hardirqs_on+0x37/0xe0 [ 28.072998] ? kasan_bitops_generic+0x93/0x1c0 [ 28.073620] kasan_bitops_generic+0x122/0x1c0 [ 28.074313] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 28.074853] ? __pfx_read_tsc+0x10/0x10 [ 28.075385] ? ktime_get_ts64+0x86/0x230 [ 28.076345] kunit_try_run_case+0x1b3/0x490 [ 28.077361] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.077802] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 28.078423] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.079280] ? __kthread_parkme+0x82/0x160 [ 28.080052] ? preempt_count_sub+0x50/0x80 [ 28.080366] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.080860] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.081667] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.082301] kthread+0x257/0x310 [ 28.082575] ? __pfx_kthread+0x10/0x10 [ 28.083076] ret_from_fork+0x41/0x80 [ 28.083538] ? __pfx_kthread+0x10/0x10 [ 28.084197] ret_from_fork_asm+0x1a/0x30 [ 28.084619] </TASK> [ 28.085372] [ 28.085964] Allocated by task 268: [ 28.086364] kasan_save_stack+0x3d/0x60 [ 28.087097] kasan_save_track+0x18/0x40 [ 28.087904] kasan_save_alloc_info+0x3b/0x50 [ 28.088367] __kasan_kmalloc+0xb7/0xc0 [ 28.088763] __kmalloc_cache_noprof+0x184/0x410 [ 28.089219] kasan_bitops_generic+0x93/0x1c0 [ 28.089527] kunit_try_run_case+0x1b3/0x490 [ 28.089847] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.090486] kthread+0x257/0x310 [ 28.091148] ret_from_fork+0x41/0x80 [ 28.091441] ret_from_fork_asm+0x1a/0x30 [ 28.091670] [ 28.092315] The buggy address belongs to the object at ffff888101094760 [ 28.092315] which belongs to the cache kmalloc-16 of size 16 [ 28.093613] The buggy address is located 8 bytes inside of [ 28.093613] allocated 9-byte region [ffff888101094760, ffff888101094769) [ 28.094739] [ 28.095071] The buggy address belongs to the physical page: [ 28.095661] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101094 [ 28.097162] flags: 0x200000000000000(node=0|zone=2) [ 28.097833] page_type: f5(slab) [ 28.098490] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 28.099346] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 28.099633] page dumped because: kasan: bad access detected [ 28.100050] [ 28.100333] Memory state around the buggy address: [ 28.100891] ffff888101094600: fa fb fc fc fa fb fc fc fa fb fc fc 00 02 fc fc [ 28.101342] ffff888101094680: 00 02 fc fc fa fb fc fc 00 00 fc fc fa fb fc fc [ 28.102107] >ffff888101094700: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 28.102558] ^ [ 28.103695] ffff888101094780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.104506] ffff888101094800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.105131] ================================================================== [ 28.343378] ================================================================== [ 28.344101] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x558/0xd90 [ 28.344779] Read of size 8 at addr ffff888101094768 by task kunit_try_catch/268 [ 28.345595] [ 28.345995] CPU: 1 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 28.347111] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.347684] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.348806] Call Trace: [ 28.349431] <TASK> [ 28.349857] dump_stack_lvl+0x73/0xb0 [ 28.350481] print_report+0xd1/0x640 [ 28.351042] ? __virt_addr_valid+0x1db/0x2d0 [ 28.351625] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.352404] kasan_report+0x102/0x140 [ 28.352797] ? kasan_bitops_test_and_modify.constprop.0+0x558/0xd90 [ 28.353589] ? kasan_bitops_test_and_modify.constprop.0+0x558/0xd90 [ 28.354493] kasan_check_range+0x10c/0x1c0 [ 28.355095] __kasan_check_read+0x15/0x20 [ 28.355643] kasan_bitops_test_and_modify.constprop.0+0x558/0xd90 [ 28.356280] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 28.357098] ? __kmalloc_cache_noprof+0x184/0x410 [ 28.357671] ? trace_hardirqs_on+0x37/0xe0 [ 28.358213] ? kasan_bitops_generic+0x93/0x1c0 [ 28.358798] kasan_bitops_generic+0x122/0x1c0 [ 28.359439] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 28.360082] ? __pfx_read_tsc+0x10/0x10 [ 28.360544] ? ktime_get_ts64+0x86/0x230 [ 28.361216] kunit_try_run_case+0x1b3/0x490 [ 28.361794] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.362505] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 28.363150] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.363866] ? __kthread_parkme+0x82/0x160 [ 28.364427] ? preempt_count_sub+0x50/0x80 [ 28.364979] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.365595] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.366338] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.367035] kthread+0x257/0x310 [ 28.367444] ? __pfx_kthread+0x10/0x10 [ 28.368054] ret_from_fork+0x41/0x80 [ 28.368546] ? __pfx_kthread+0x10/0x10 [ 28.369115] ret_from_fork_asm+0x1a/0x30 [ 28.369669] </TASK> [ 28.370155] [ 28.370348] Allocated by task 268: [ 28.370767] kasan_save_stack+0x3d/0x60 [ 28.371119] kasan_save_track+0x18/0x40 [ 28.371662] kasan_save_alloc_info+0x3b/0x50 [ 28.372008] __kasan_kmalloc+0xb7/0xc0 [ 28.372716] __kmalloc_cache_noprof+0x184/0x410 [ 28.373092] kasan_bitops_generic+0x93/0x1c0 [ 28.373731] kunit_try_run_case+0x1b3/0x490 [ 28.374359] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.375052] kthread+0x257/0x310 [ 28.375480] ret_from_fork+0x41/0x80 [ 28.375952] ret_from_fork_asm+0x1a/0x30 [ 28.376524] [ 28.376860] The buggy address belongs to the object at ffff888101094760 [ 28.376860] which belongs to the cache kmalloc-16 of size 16 [ 28.378123] The buggy address is located 8 bytes inside of [ 28.378123] allocated 9-byte region [ffff888101094760, ffff888101094769) [ 28.379339] [ 28.379633] The buggy address belongs to the physical page: [ 28.380446] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101094 [ 28.381217] flags: 0x200000000000000(node=0|zone=2) [ 28.381699] page_type: f5(slab) [ 28.382298] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 28.383121] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 28.383963] page dumped because: kasan: bad access detected [ 28.384498] [ 28.384865] Memory state around the buggy address: [ 28.385442] ffff888101094600: fa fb fc fc fa fb fc fc fa fb fc fc 00 02 fc fc [ 28.386122] ffff888101094680: 00 02 fc fc fa fb fc fc 00 00 fc fc fa fb fc fc [ 28.386934] >ffff888101094700: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 28.387548] ^ [ 28.388293] ffff888101094780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.389038] ffff888101094800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.389640] ================================================================== [ 28.291654] ================================================================== [ 28.292741] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90 [ 28.293815] Write of size 8 at addr ffff888101094768 by task kunit_try_catch/268 [ 28.294502] [ 28.294769] CPU: 1 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 28.295750] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.296090] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.296938] Call Trace: [ 28.297189] <TASK> [ 28.297489] dump_stack_lvl+0x73/0xb0 [ 28.297840] print_report+0xd1/0x640 [ 28.298364] ? __virt_addr_valid+0x1db/0x2d0 [ 28.299037] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.299468] kasan_report+0x102/0x140 [ 28.300136] ? kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90 [ 28.300664] ? kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90 [ 28.301325] kasan_check_range+0x10c/0x1c0 [ 28.301936] __kasan_check_write+0x18/0x20 [ 28.302633] kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90 [ 28.304074] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 28.304592] ? __kmalloc_cache_noprof+0x184/0x410 [ 28.305047] ? trace_hardirqs_on+0x37/0xe0 [ 28.305563] ? kasan_bitops_generic+0x93/0x1c0 [ 28.306830] kasan_bitops_generic+0x122/0x1c0 [ 28.307131] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 28.307721] ? __pfx_read_tsc+0x10/0x10 [ 28.308304] ? ktime_get_ts64+0x86/0x230 [ 28.309069] kunit_try_run_case+0x1b3/0x490 [ 28.309952] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.310478] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 28.310974] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.311504] ? __kthread_parkme+0x82/0x160 [ 28.311931] ? preempt_count_sub+0x50/0x80 [ 28.313500] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.314657] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.315440] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.316149] kthread+0x257/0x310 [ 28.316503] ? __pfx_kthread+0x10/0x10 [ 28.317190] ret_from_fork+0x41/0x80 [ 28.317744] ? __pfx_kthread+0x10/0x10 [ 28.318330] ret_from_fork_asm+0x1a/0x30 [ 28.318955] </TASK> [ 28.319291] [ 28.319767] Allocated by task 268: [ 28.320087] kasan_save_stack+0x3d/0x60 [ 28.320514] kasan_save_track+0x18/0x40 [ 28.321386] kasan_save_alloc_info+0x3b/0x50 [ 28.321782] __kasan_kmalloc+0xb7/0xc0 [ 28.322143] __kmalloc_cache_noprof+0x184/0x410 [ 28.322966] kasan_bitops_generic+0x93/0x1c0 [ 28.323449] kunit_try_run_case+0x1b3/0x490 [ 28.324350] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.325237] kthread+0x257/0x310 [ 28.325592] ret_from_fork+0x41/0x80 [ 28.325926] ret_from_fork_asm+0x1a/0x30 [ 28.326618] [ 28.326980] The buggy address belongs to the object at ffff888101094760 [ 28.326980] which belongs to the cache kmalloc-16 of size 16 [ 28.328378] The buggy address is located 8 bytes inside of [ 28.328378] allocated 9-byte region [ffff888101094760, ffff888101094769) [ 28.329823] [ 28.330276] The buggy address belongs to the physical page: [ 28.331423] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101094 [ 28.332159] flags: 0x200000000000000(node=0|zone=2) [ 28.332981] page_type: f5(slab) [ 28.333597] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 28.334437] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 28.335326] page dumped because: kasan: bad access detected [ 28.336125] [ 28.336357] Memory state around the buggy address: [ 28.337461] ffff888101094600: fa fb fc fc fa fb fc fc fa fb fc fc 00 02 fc fc [ 28.338080] ffff888101094680: 00 02 fc fc fa fb fc fc 00 00 fc fc fa fb fc fc [ 28.338703] >ffff888101094700: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 28.339392] ^ [ 28.340117] ffff888101094780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.340957] ffff888101094800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.341715] ================================================================== [ 28.390920] ================================================================== [ 28.391622] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90 [ 28.392683] Read of size 8 at addr ffff888101094768 by task kunit_try_catch/268 [ 28.393786] [ 28.393982] CPU: 1 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 28.395039] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.395332] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.396783] Call Trace: [ 28.397283] <TASK> [ 28.397689] dump_stack_lvl+0x73/0xb0 [ 28.398222] print_report+0xd1/0x640 [ 28.398844] ? __virt_addr_valid+0x1db/0x2d0 [ 28.399443] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.400238] kasan_report+0x102/0x140 [ 28.400678] ? kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90 [ 28.401414] ? kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90 [ 28.402149] __asan_report_load8_noabort+0x18/0x20 [ 28.402708] kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90 [ 28.403446] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 28.404243] ? __kmalloc_cache_noprof+0x184/0x410 [ 28.404803] ? trace_hardirqs_on+0x37/0xe0 [ 28.405346] ? kasan_bitops_generic+0x93/0x1c0 [ 28.405975] kasan_bitops_generic+0x122/0x1c0 [ 28.406438] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 28.407009] ? __pfx_read_tsc+0x10/0x10 [ 28.407534] ? ktime_get_ts64+0x86/0x230 [ 28.408036] kunit_try_run_case+0x1b3/0x490 [ 28.408642] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.409192] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 28.409979] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.410696] ? __kthread_parkme+0x82/0x160 [ 28.411181] ? preempt_count_sub+0x50/0x80 [ 28.411815] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.412436] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.413063] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.413684] kthread+0x257/0x310 [ 28.414201] ? __pfx_kthread+0x10/0x10 [ 28.414716] ret_from_fork+0x41/0x80 [ 28.415320] ? __pfx_kthread+0x10/0x10 [ 28.415873] ret_from_fork_asm+0x1a/0x30 [ 28.416400] </TASK> [ 28.416865] [ 28.417022] Allocated by task 268: [ 28.417656] kasan_save_stack+0x3d/0x60 [ 28.418188] kasan_save_track+0x18/0x40 [ 28.418794] kasan_save_alloc_info+0x3b/0x50 [ 28.419312] __kasan_kmalloc+0xb7/0xc0 [ 28.419875] __kmalloc_cache_noprof+0x184/0x410 [ 28.420427] kasan_bitops_generic+0x93/0x1c0 [ 28.420852] kunit_try_run_case+0x1b3/0x490 [ 28.421120] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.421887] kthread+0x257/0x310 [ 28.422141] ret_from_fork+0x41/0x80 [ 28.422585] ret_from_fork_asm+0x1a/0x30 [ 28.423424] [ 28.423613] The buggy address belongs to the object at ffff888101094760 [ 28.423613] which belongs to the cache kmalloc-16 of size 16 [ 28.425111] The buggy address is located 8 bytes inside of [ 28.425111] allocated 9-byte region [ffff888101094760, ffff888101094769) [ 28.426362] [ 28.426614] The buggy address belongs to the physical page: [ 28.427399] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101094 [ 28.428227] flags: 0x200000000000000(node=0|zone=2) [ 28.428885] page_type: f5(slab) [ 28.429416] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 28.430282] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 28.431041] page dumped because: kasan: bad access detected [ 28.431662] [ 28.431960] Memory state around the buggy address: [ 28.432488] ffff888101094600: fa fb fc fc fa fb fc fc fa fb fc fc 00 02 fc fc [ 28.433159] ffff888101094680: 00 02 fc fc fa fb fc fc 00 00 fc fc fa fb fc fc [ 28.433891] >ffff888101094700: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 28.434365] ^ [ 28.434983] ffff888101094780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.435590] ffff888101094800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.436347] ================================================================== [ 28.154335] ================================================================== [ 28.154834] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90 [ 28.155890] Write of size 8 at addr ffff888101094768 by task kunit_try_catch/268 [ 28.156440] [ 28.156716] CPU: 1 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 28.157836] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.158309] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.159142] Call Trace: [ 28.159541] <TASK> [ 28.159959] dump_stack_lvl+0x73/0xb0 [ 28.160296] print_report+0xd1/0x640 [ 28.160896] ? __virt_addr_valid+0x1db/0x2d0 [ 28.161441] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.161965] kasan_report+0x102/0x140 [ 28.162513] ? kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90 [ 28.163153] ? kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90 [ 28.163812] kasan_check_range+0x10c/0x1c0 [ 28.164443] __kasan_check_write+0x18/0x20 [ 28.165292] kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90 [ 28.165560] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 28.166013] ? __kmalloc_cache_noprof+0x184/0x410 [ 28.166696] ? trace_hardirqs_on+0x37/0xe0 [ 28.167156] ? kasan_bitops_generic+0x93/0x1c0 [ 28.167645] kasan_bitops_generic+0x122/0x1c0 [ 28.168303] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 28.168851] ? __pfx_read_tsc+0x10/0x10 [ 28.169412] ? ktime_get_ts64+0x86/0x230 [ 28.169993] kunit_try_run_case+0x1b3/0x490 [ 28.170490] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.171092] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 28.171687] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.172188] ? __kthread_parkme+0x82/0x160 [ 28.172730] ? preempt_count_sub+0x50/0x80 [ 28.173133] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.173700] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.174233] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.174928] kthread+0x257/0x310 [ 28.175254] ? __pfx_kthread+0x10/0x10 [ 28.175801] ret_from_fork+0x41/0x80 [ 28.176204] ? __pfx_kthread+0x10/0x10 [ 28.176608] ret_from_fork_asm+0x1a/0x30 [ 28.177202] </TASK> [ 28.177488] [ 28.177792] Allocated by task 268: [ 28.178242] kasan_save_stack+0x3d/0x60 [ 28.178703] kasan_save_track+0x18/0x40 [ 28.179190] kasan_save_alloc_info+0x3b/0x50 [ 28.179716] __kasan_kmalloc+0xb7/0xc0 [ 28.180236] __kmalloc_cache_noprof+0x184/0x410 [ 28.180726] kasan_bitops_generic+0x93/0x1c0 [ 28.181350] kunit_try_run_case+0x1b3/0x490 [ 28.181806] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.182436] kthread+0x257/0x310 [ 28.182811] ret_from_fork+0x41/0x80 [ 28.183189] ret_from_fork_asm+0x1a/0x30 [ 28.183810] [ 28.184097] The buggy address belongs to the object at ffff888101094760 [ 28.184097] which belongs to the cache kmalloc-16 of size 16 [ 28.185034] The buggy address is located 8 bytes inside of [ 28.185034] allocated 9-byte region [ffff888101094760, ffff888101094769) [ 28.186300] [ 28.186558] The buggy address belongs to the physical page: [ 28.187176] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101094 [ 28.187929] flags: 0x200000000000000(node=0|zone=2) [ 28.188454] page_type: f5(slab) [ 28.188862] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 28.189652] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 28.190470] page dumped because: kasan: bad access detected [ 28.191129] [ 28.191324] Memory state around the buggy address: [ 28.191908] ffff888101094600: fa fb fc fc fa fb fc fc fa fb fc fc 00 02 fc fc [ 28.192643] ffff888101094680: 00 02 fc fc fa fb fc fc 00 00 fc fc fa fb fc fc [ 28.193299] >ffff888101094700: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 28.194122] ^ [ 28.194799] ffff888101094780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.195495] ffff888101094800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.196214] ================================================================== [ 28.197533] ================================================================== [ 28.198014] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90 [ 28.199148] Write of size 8 at addr ffff888101094768 by task kunit_try_catch/268 [ 28.199887] [ 28.200187] CPU: 1 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 28.201497] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.201971] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.202794] Call Trace: [ 28.203055] <TASK> [ 28.203564] dump_stack_lvl+0x73/0xb0 [ 28.204217] print_report+0xd1/0x640 [ 28.205044] ? __virt_addr_valid+0x1db/0x2d0 [ 28.205625] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.206380] kasan_report+0x102/0x140 [ 28.206889] ? kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90 [ 28.207925] ? kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90 [ 28.208679] kasan_check_range+0x10c/0x1c0 [ 28.209283] __kasan_check_write+0x18/0x20 [ 28.210005] kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90 [ 28.210727] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 28.211488] ? __kmalloc_cache_noprof+0x184/0x410 [ 28.212078] ? trace_hardirqs_on+0x37/0xe0 [ 28.212642] ? kasan_bitops_generic+0x93/0x1c0 [ 28.213226] kasan_bitops_generic+0x122/0x1c0 [ 28.213712] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 28.214377] ? __pfx_read_tsc+0x10/0x10 [ 28.214965] ? ktime_get_ts64+0x86/0x230 [ 28.215429] kunit_try_run_case+0x1b3/0x490 [ 28.215940] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.216510] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 28.216972] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.217642] ? __kthread_parkme+0x82/0x160 [ 28.218120] ? preempt_count_sub+0x50/0x80 [ 28.218529] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.219108] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.219795] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.220302] kthread+0x257/0x310 [ 28.220789] ? __pfx_kthread+0x10/0x10 [ 28.221175] ret_from_fork+0x41/0x80 [ 28.221564] ? __pfx_kthread+0x10/0x10 [ 28.221964] ret_from_fork_asm+0x1a/0x30 [ 28.222531] </TASK> [ 28.222931] [ 28.223187] Allocated by task 268: [ 28.223613] kasan_save_stack+0x3d/0x60 [ 28.224092] kasan_save_track+0x18/0x40 [ 28.224551] kasan_save_alloc_info+0x3b/0x50 [ 28.225134] __kasan_kmalloc+0xb7/0xc0 [ 28.225497] __kmalloc_cache_noprof+0x184/0x410 [ 28.226066] kasan_bitops_generic+0x93/0x1c0 [ 28.226500] kunit_try_run_case+0x1b3/0x490 [ 28.227106] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.228009] kthread+0x257/0x310 [ 28.228247] ret_from_fork+0x41/0x80 [ 28.229331] ret_from_fork_asm+0x1a/0x30 [ 28.230005] [ 28.230169] The buggy address belongs to the object at ffff888101094760 [ 28.230169] which belongs to the cache kmalloc-16 of size 16 [ 28.231391] The buggy address is located 8 bytes inside of [ 28.231391] allocated 9-byte region [ffff888101094760, ffff888101094769) [ 28.233154] [ 28.233583] The buggy address belongs to the physical page: [ 28.234097] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101094 [ 28.235606] flags: 0x200000000000000(node=0|zone=2) [ 28.236328] page_type: f5(slab) [ 28.236805] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 28.237745] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 28.238380] page dumped because: kasan: bad access detected [ 28.239508] [ 28.239716] Memory state around the buggy address: [ 28.240068] ffff888101094600: fa fb fc fc fa fb fc fc fa fb fc fc 00 02 fc fc [ 28.241172] ffff888101094680: 00 02 fc fc fa fb fc fc 00 00 fc fc fa fb fc fc [ 28.242082] >ffff888101094700: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 28.243099] ^ [ 28.243641] ffff888101094780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.244634] ffff888101094800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.245563] ==================================================================