Date
June 2, 2025, 2:10 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 22.502949] ================================================================== [ 22.503674] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xb28/0xbf8 [ 22.504120] Read of size 8 at addr fff00000c5bb22a8 by task kunit_try_catch/248 [ 22.504935] [ 22.505286] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 22.505534] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.505615] Hardware name: linux,dummy-virt (DT) [ 22.505697] Call trace: [ 22.505761] dump_backtrace+0x9c/0x128 [ 22.505886] show_stack+0x20/0x38 [ 22.505994] dump_stack_lvl+0x8c/0xd0 [ 22.506107] print_report+0x118/0x5f0 [ 22.506218] kasan_report+0xdc/0x128 [ 22.506320] __asan_report_load8_noabort+0x20/0x30 [ 22.506377] kasan_bitops_modify.constprop.0+0xb28/0xbf8 [ 22.506434] kasan_bitops_generic+0x114/0x1d0 [ 22.506486] kunit_try_run_case+0x170/0x3f0 [ 22.506537] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.506591] kthread+0x24c/0x2d0 [ 22.506639] ret_from_fork+0x10/0x20 [ 22.506690] [ 22.512098] Allocated by task 248: [ 22.513882] kasan_save_stack+0x3c/0x68 [ 22.514308] kasan_save_track+0x20/0x40 [ 22.514735] kasan_save_alloc_info+0x40/0x58 [ 22.515142] __kasan_kmalloc+0xd4/0xd8 [ 22.515570] __kmalloc_cache_noprof+0x154/0x320 [ 22.516105] kasan_bitops_generic+0xa0/0x1d0 [ 22.516669] kunit_try_run_case+0x170/0x3f0 [ 22.516963] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.517573] kthread+0x24c/0x2d0 [ 22.518026] ret_from_fork+0x10/0x20 [ 22.518447] [ 22.518729] The buggy address belongs to the object at fff00000c5bb22a0 [ 22.518729] which belongs to the cache kmalloc-16 of size 16 [ 22.519576] The buggy address is located 8 bytes inside of [ 22.519576] allocated 9-byte region [fff00000c5bb22a0, fff00000c5bb22a9) [ 22.520632] [ 22.520935] The buggy address belongs to the physical page: [ 22.521548] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bb2 [ 22.522170] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.522779] page_type: f5(slab) [ 22.523143] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 22.523869] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 22.524416] page dumped because: kasan: bad access detected [ 22.524946] [ 22.525230] Memory state around the buggy address: [ 22.525684] fff00000c5bb2180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.526224] fff00000c5bb2200: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 22.526867] >fff00000c5bb2280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 22.527443] ^ [ 22.527847] fff00000c5bb2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.528462] fff00000c5bb2380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.529103] ================================================================== [ 22.530991] ================================================================== [ 22.531739] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x358/0xbf8 [ 22.532930] Write of size 8 at addr fff00000c5bb22a8 by task kunit_try_catch/248 [ 22.533344] [ 22.533612] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 22.533830] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.533911] Hardware name: linux,dummy-virt (DT) [ 22.533997] Call trace: [ 22.534059] dump_backtrace+0x9c/0x128 [ 22.534190] show_stack+0x20/0x38 [ 22.534299] dump_stack_lvl+0x8c/0xd0 [ 22.534368] print_report+0x118/0x5f0 [ 22.534417] kasan_report+0xdc/0x128 [ 22.534463] kasan_check_range+0x100/0x1a8 [ 22.534512] __kasan_check_write+0x20/0x30 [ 22.534560] kasan_bitops_modify.constprop.0+0x358/0xbf8 [ 22.534615] kasan_bitops_generic+0x114/0x1d0 [ 22.534665] kunit_try_run_case+0x170/0x3f0 [ 22.534714] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.534765] kthread+0x24c/0x2d0 [ 22.534811] ret_from_fork+0x10/0x20 [ 22.534862] [ 22.539889] Allocated by task 248: [ 22.540375] kasan_save_stack+0x3c/0x68 [ 22.540894] kasan_save_track+0x20/0x40 [ 22.541336] kasan_save_alloc_info+0x40/0x58 [ 22.541859] __kasan_kmalloc+0xd4/0xd8 [ 22.542314] __kmalloc_cache_noprof+0x154/0x320 [ 22.542811] kasan_bitops_generic+0xa0/0x1d0 [ 22.543261] kunit_try_run_case+0x170/0x3f0 [ 22.543669] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.544258] kthread+0x24c/0x2d0 [ 22.544716] ret_from_fork+0x10/0x20 [ 22.545197] [ 22.545441] The buggy address belongs to the object at fff00000c5bb22a0 [ 22.545441] which belongs to the cache kmalloc-16 of size 16 [ 22.546343] The buggy address is located 8 bytes inside of [ 22.546343] allocated 9-byte region [fff00000c5bb22a0, fff00000c5bb22a9) [ 22.547282] [ 22.547583] The buggy address belongs to the physical page: [ 22.548106] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bb2 [ 22.549092] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.549735] page_type: f5(slab) [ 22.550057] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 22.550836] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 22.551532] page dumped because: kasan: bad access detected [ 22.552034] [ 22.552315] Memory state around the buggy address: [ 22.552847] fff00000c5bb2180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.553486] fff00000c5bb2200: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 22.554134] >fff00000c5bb2280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 22.554711] ^ [ 22.555175] fff00000c5bb2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.555775] fff00000c5bb2380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.556355] ================================================================== [ 22.359259] ================================================================== [ 22.359927] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbf8 [ 22.361176] Read of size 8 at addr fff00000c5bb22a8 by task kunit_try_catch/248 [ 22.361856] [ 22.362197] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 22.362444] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.362549] Hardware name: linux,dummy-virt (DT) [ 22.362644] Call trace: [ 22.362722] dump_backtrace+0x9c/0x128 [ 22.362837] show_stack+0x20/0x38 [ 22.362937] dump_stack_lvl+0x8c/0xd0 [ 22.363030] print_report+0x118/0x5f0 [ 22.363084] kasan_report+0xdc/0x128 [ 22.363129] __asan_report_load8_noabort+0x20/0x30 [ 22.363182] kasan_bitops_modify.constprop.0+0xa80/0xbf8 [ 22.363254] kasan_bitops_generic+0x114/0x1d0 [ 22.363318] kunit_try_run_case+0x170/0x3f0 [ 22.363370] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.363422] kthread+0x24c/0x2d0 [ 22.363470] ret_from_fork+0x10/0x20 [ 22.363521] [ 22.368586] Allocated by task 248: [ 22.368758] kasan_save_stack+0x3c/0x68 [ 22.368943] kasan_save_track+0x20/0x40 [ 22.369105] kasan_save_alloc_info+0x40/0x58 [ 22.369361] __kasan_kmalloc+0xd4/0xd8 [ 22.369932] __kmalloc_cache_noprof+0x154/0x320 [ 22.370528] kasan_bitops_generic+0xa0/0x1d0 [ 22.371115] kunit_try_run_case+0x170/0x3f0 [ 22.371669] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.372279] kthread+0x24c/0x2d0 [ 22.372732] ret_from_fork+0x10/0x20 [ 22.373162] [ 22.373464] The buggy address belongs to the object at fff00000c5bb22a0 [ 22.373464] which belongs to the cache kmalloc-16 of size 16 [ 22.374461] The buggy address is located 8 bytes inside of [ 22.374461] allocated 9-byte region [fff00000c5bb22a0, fff00000c5bb22a9) [ 22.375427] [ 22.375738] The buggy address belongs to the physical page: [ 22.376170] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bb2 [ 22.376933] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.377570] page_type: f5(slab) [ 22.377949] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 22.378628] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 22.379282] page dumped because: kasan: bad access detected [ 22.379795] [ 22.380065] Memory state around the buggy address: [ 22.380556] fff00000c5bb2180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.381181] fff00000c5bb2200: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 22.381830] >fff00000c5bb2280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 22.382409] ^ [ 22.382866] fff00000c5bb2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.383589] fff00000c5bb2380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.384095] ================================================================== [ 22.387053] ================================================================== [ 22.387656] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1e4/0xbf8 [ 22.388326] Write of size 8 at addr fff00000c5bb22a8 by task kunit_try_catch/248 [ 22.388899] [ 22.389215] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 22.389463] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.389546] Hardware name: linux,dummy-virt (DT) [ 22.389632] Call trace: [ 22.389691] dump_backtrace+0x9c/0x128 [ 22.389836] show_stack+0x20/0x38 [ 22.389934] dump_stack_lvl+0x8c/0xd0 [ 22.390019] print_report+0x118/0x5f0 [ 22.390070] kasan_report+0xdc/0x128 [ 22.390113] kasan_check_range+0x100/0x1a8 [ 22.390283] __kasan_check_write+0x20/0x30 [ 22.390378] kasan_bitops_modify.constprop.0+0x1e4/0xbf8 [ 22.390476] kasan_bitops_generic+0x114/0x1d0 [ 22.390584] kunit_try_run_case+0x170/0x3f0 [ 22.390644] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.390699] kthread+0x24c/0x2d0 [ 22.390745] ret_from_fork+0x10/0x20 [ 22.390798] [ 22.394550] Allocated by task 248: [ 22.395023] kasan_save_stack+0x3c/0x68 [ 22.395668] kasan_save_track+0x20/0x40 [ 22.396586] kasan_save_alloc_info+0x40/0x58 [ 22.397534] __kasan_kmalloc+0xd4/0xd8 [ 22.398062] __kmalloc_cache_noprof+0x154/0x320 [ 22.398655] kasan_bitops_generic+0xa0/0x1d0 [ 22.399066] kunit_try_run_case+0x170/0x3f0 [ 22.399485] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.400089] kthread+0x24c/0x2d0 [ 22.400542] ret_from_fork+0x10/0x20 [ 22.401003] [ 22.401308] The buggy address belongs to the object at fff00000c5bb22a0 [ 22.401308] which belongs to the cache kmalloc-16 of size 16 [ 22.402171] The buggy address is located 8 bytes inside of [ 22.402171] allocated 9-byte region [fff00000c5bb22a0, fff00000c5bb22a9) [ 22.403120] [ 22.403365] The buggy address belongs to the physical page: [ 22.403834] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bb2 [ 22.404494] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.405059] page_type: f5(slab) [ 22.405536] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 22.406176] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 22.406860] page dumped because: kasan: bad access detected [ 22.407356] [ 22.407618] Memory state around the buggy address: [ 22.408024] fff00000c5bb2180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.408643] fff00000c5bb2200: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 22.409185] >fff00000c5bb2280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 22.409852] ^ [ 22.410383] fff00000c5bb2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.410935] fff00000c5bb2380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.411540] ================================================================== [ 22.560001] ================================================================== [ 22.560826] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3c8/0xbf8 [ 22.561431] Write of size 8 at addr fff00000c5bb22a8 by task kunit_try_catch/248 [ 22.561975] [ 22.562320] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 22.562538] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.562612] Hardware name: linux,dummy-virt (DT) [ 22.562688] Call trace: [ 22.562753] dump_backtrace+0x9c/0x128 [ 22.562873] show_stack+0x20/0x38 [ 22.562976] dump_stack_lvl+0x8c/0xd0 [ 22.563064] print_report+0x118/0x5f0 [ 22.563163] kasan_report+0xdc/0x128 [ 22.563271] kasan_check_range+0x100/0x1a8 [ 22.563325] __kasan_check_write+0x20/0x30 [ 22.563375] kasan_bitops_modify.constprop.0+0x3c8/0xbf8 [ 22.563431] kasan_bitops_generic+0x114/0x1d0 [ 22.563485] kunit_try_run_case+0x170/0x3f0 [ 22.563532] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.563586] kthread+0x24c/0x2d0 [ 22.563633] ret_from_fork+0x10/0x20 [ 22.563683] [ 22.569132] Allocated by task 248: [ 22.569575] kasan_save_stack+0x3c/0x68 [ 22.570125] kasan_save_track+0x20/0x40 [ 22.570547] kasan_save_alloc_info+0x40/0x58 [ 22.571082] __kasan_kmalloc+0xd4/0xd8 [ 22.571552] __kmalloc_cache_noprof+0x154/0x320 [ 22.572062] kasan_bitops_generic+0xa0/0x1d0 [ 22.572611] kunit_try_run_case+0x170/0x3f0 [ 22.573129] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.573765] kthread+0x24c/0x2d0 [ 22.574246] ret_from_fork+0x10/0x20 [ 22.574635] [ 22.574941] The buggy address belongs to the object at fff00000c5bb22a0 [ 22.574941] which belongs to the cache kmalloc-16 of size 16 [ 22.575864] The buggy address is located 8 bytes inside of [ 22.575864] allocated 9-byte region [fff00000c5bb22a0, fff00000c5bb22a9) [ 22.576856] [ 22.577160] The buggy address belongs to the physical page: [ 22.577750] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bb2 [ 22.578436] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.578953] page_type: f5(slab) [ 22.579401] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 22.580029] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 22.580671] page dumped because: kasan: bad access detected [ 22.581120] [ 22.581396] Memory state around the buggy address: [ 22.581822] fff00000c5bb2180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.582551] fff00000c5bb2200: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 22.583077] >fff00000c5bb2280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 22.583687] ^ [ 22.584148] fff00000c5bb2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.584768] fff00000c5bb2380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.585322] ================================================================== [ 22.470391] ================================================================== [ 22.470852] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x334/0xbf8 [ 22.471739] Write of size 8 at addr fff00000c5bb22a8 by task kunit_try_catch/248 [ 22.472515] [ 22.472880] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 22.473125] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.473206] Hardware name: linux,dummy-virt (DT) [ 22.473341] Call trace: [ 22.473410] dump_backtrace+0x9c/0x128 [ 22.473547] show_stack+0x20/0x38 [ 22.473654] dump_stack_lvl+0x8c/0xd0 [ 22.473747] print_report+0x118/0x5f0 [ 22.473802] kasan_report+0xdc/0x128 [ 22.473847] kasan_check_range+0x100/0x1a8 [ 22.473897] __kasan_check_write+0x20/0x30 [ 22.473946] kasan_bitops_modify.constprop.0+0x334/0xbf8 [ 22.474002] kasan_bitops_generic+0x114/0x1d0 [ 22.474052] kunit_try_run_case+0x170/0x3f0 [ 22.474102] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.474156] kthread+0x24c/0x2d0 [ 22.474202] ret_from_fork+0x10/0x20 [ 22.474277] [ 22.480382] Allocated by task 248: [ 22.480688] kasan_save_stack+0x3c/0x68 [ 22.481065] kasan_save_track+0x20/0x40 [ 22.481596] kasan_save_alloc_info+0x40/0x58 [ 22.482151] __kasan_kmalloc+0xd4/0xd8 [ 22.484746] __kmalloc_cache_noprof+0x154/0x320 [ 22.485692] kasan_bitops_generic+0xa0/0x1d0 [ 22.486544] kunit_try_run_case+0x170/0x3f0 [ 22.487442] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.487849] kthread+0x24c/0x2d0 [ 22.488141] ret_from_fork+0x10/0x20 [ 22.488566] [ 22.488804] The buggy address belongs to the object at fff00000c5bb22a0 [ 22.488804] which belongs to the cache kmalloc-16 of size 16 [ 22.489526] The buggy address is located 8 bytes inside of [ 22.489526] allocated 9-byte region [fff00000c5bb22a0, fff00000c5bb22a9) [ 22.490670] [ 22.490962] The buggy address belongs to the physical page: [ 22.493033] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bb2 [ 22.493649] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.494346] page_type: f5(slab) [ 22.494668] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 22.495466] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 22.496135] page dumped because: kasan: bad access detected [ 22.496594] [ 22.496878] Memory state around the buggy address: [ 22.497449] fff00000c5bb2180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.498196] fff00000c5bb2200: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 22.498830] >fff00000c5bb2280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 22.499381] ^ [ 22.499809] fff00000c5bb2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.500415] fff00000c5bb2380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.501001] ================================================================== [ 22.440669] ================================================================== [ 22.441167] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2c4/0xbf8 [ 22.442184] Write of size 8 at addr fff00000c5bb22a8 by task kunit_try_catch/248 [ 22.442650] [ 22.442887] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 22.443456] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.443566] Hardware name: linux,dummy-virt (DT) [ 22.443664] Call trace: [ 22.443719] dump_backtrace+0x9c/0x128 [ 22.443835] show_stack+0x20/0x38 [ 22.443958] dump_stack_lvl+0x8c/0xd0 [ 22.444084] print_report+0x118/0x5f0 [ 22.444179] kasan_report+0xdc/0x128 [ 22.444293] kasan_check_range+0x100/0x1a8 [ 22.444398] __kasan_check_write+0x20/0x30 [ 22.444456] kasan_bitops_modify.constprop.0+0x2c4/0xbf8 [ 22.444511] kasan_bitops_generic+0x114/0x1d0 [ 22.444562] kunit_try_run_case+0x170/0x3f0 [ 22.444611] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.444664] kthread+0x24c/0x2d0 [ 22.444711] ret_from_fork+0x10/0x20 [ 22.444763] [ 22.450229] Allocated by task 248: [ 22.451466] kasan_save_stack+0x3c/0x68 [ 22.452558] kasan_save_track+0x20/0x40 [ 22.453285] kasan_save_alloc_info+0x40/0x58 [ 22.453733] __kasan_kmalloc+0xd4/0xd8 [ 22.454115] __kmalloc_cache_noprof+0x154/0x320 [ 22.454688] kasan_bitops_generic+0xa0/0x1d0 [ 22.455131] kunit_try_run_case+0x170/0x3f0 [ 22.455623] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.456183] kthread+0x24c/0x2d0 [ 22.456623] ret_from_fork+0x10/0x20 [ 22.457054] [ 22.457338] The buggy address belongs to the object at fff00000c5bb22a0 [ 22.457338] which belongs to the cache kmalloc-16 of size 16 [ 22.458224] The buggy address is located 8 bytes inside of [ 22.458224] allocated 9-byte region [fff00000c5bb22a0, fff00000c5bb22a9) [ 22.459167] [ 22.459501] The buggy address belongs to the physical page: [ 22.460042] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bb2 [ 22.460733] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.461356] page_type: f5(slab) [ 22.461752] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 22.462459] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 22.463107] page dumped because: kasan: bad access detected [ 22.463623] [ 22.463881] Memory state around the buggy address: [ 22.464381] fff00000c5bb2180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.465131] fff00000c5bb2200: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 22.465775] >fff00000c5bb2280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 22.466395] ^ [ 22.466877] fff00000c5bb2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.467498] fff00000c5bb2380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.468114] ================================================================== [ 22.587180] ================================================================== [ 22.587859] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa5c/0xbf8 [ 22.588554] Read of size 8 at addr fff00000c5bb22a8 by task kunit_try_catch/248 [ 22.589330] [ 22.589670] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 22.589869] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.589910] Hardware name: linux,dummy-virt (DT) [ 22.589967] Call trace: [ 22.590024] dump_backtrace+0x9c/0x128 [ 22.590130] show_stack+0x20/0x38 [ 22.590218] dump_stack_lvl+0x8c/0xd0 [ 22.590343] print_report+0x118/0x5f0 [ 22.590450] kasan_report+0xdc/0x128 [ 22.590554] __asan_report_load8_noabort+0x20/0x30 [ 22.590669] kasan_bitops_modify.constprop.0+0xa5c/0xbf8 [ 22.590755] kasan_bitops_generic+0x114/0x1d0 [ 22.590810] kunit_try_run_case+0x170/0x3f0 [ 22.590863] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.590918] kthread+0x24c/0x2d0 [ 22.590966] ret_from_fork+0x10/0x20 [ 22.591018] [ 22.595773] Allocated by task 248: [ 22.596226] kasan_save_stack+0x3c/0x68 [ 22.596612] kasan_save_track+0x20/0x40 [ 22.596946] kasan_save_alloc_info+0x40/0x58 [ 22.597473] __kasan_kmalloc+0xd4/0xd8 [ 22.597964] __kmalloc_cache_noprof+0x154/0x320 [ 22.598514] kasan_bitops_generic+0xa0/0x1d0 [ 22.598939] kunit_try_run_case+0x170/0x3f0 [ 22.599315] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.599913] kthread+0x24c/0x2d0 [ 22.600348] ret_from_fork+0x10/0x20 [ 22.600782] [ 22.601069] The buggy address belongs to the object at fff00000c5bb22a0 [ 22.601069] which belongs to the cache kmalloc-16 of size 16 [ 22.601830] The buggy address is located 8 bytes inside of [ 22.601830] allocated 9-byte region [fff00000c5bb22a0, fff00000c5bb22a9) [ 22.602809] [ 22.603110] The buggy address belongs to the physical page: [ 22.603582] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bb2 [ 22.604190] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.604878] page_type: f5(slab) [ 22.605339] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 22.606024] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 22.606601] page dumped because: kasan: bad access detected [ 22.607148] [ 22.607414] Memory state around the buggy address: [ 22.607921] fff00000c5bb2180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.608507] fff00000c5bb2200: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 22.609087] >fff00000c5bb2280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 22.610091] ^ [ 22.610684] fff00000c5bb2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.611396] fff00000c5bb2380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.612077] ================================================================== [ 22.413277] ================================================================== [ 22.413993] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xabc/0xbf8 [ 22.414519] Read of size 8 at addr fff00000c5bb22a8 by task kunit_try_catch/248 [ 22.415277] [ 22.415650] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 22.415883] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.415965] Hardware name: linux,dummy-virt (DT) [ 22.416070] Call trace: [ 22.416154] dump_backtrace+0x9c/0x128 [ 22.416296] show_stack+0x20/0x38 [ 22.416407] dump_stack_lvl+0x8c/0xd0 [ 22.416505] print_report+0x118/0x5f0 [ 22.416600] kasan_report+0xdc/0x128 [ 22.416653] __asan_report_load8_noabort+0x20/0x30 [ 22.416705] kasan_bitops_modify.constprop.0+0xabc/0xbf8 [ 22.416760] kasan_bitops_generic+0x114/0x1d0 [ 22.416811] kunit_try_run_case+0x170/0x3f0 [ 22.416859] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.416914] kthread+0x24c/0x2d0 [ 22.416960] ret_from_fork+0x10/0x20 [ 22.417010] [ 22.422203] Allocated by task 248: [ 22.422719] kasan_save_stack+0x3c/0x68 [ 22.423184] kasan_save_track+0x20/0x40 [ 22.423657] kasan_save_alloc_info+0x40/0x58 [ 22.424194] __kasan_kmalloc+0xd4/0xd8 [ 22.424601] __kmalloc_cache_noprof+0x154/0x320 [ 22.425161] kasan_bitops_generic+0xa0/0x1d0 [ 22.425624] kunit_try_run_case+0x170/0x3f0 [ 22.426161] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.426679] kthread+0x24c/0x2d0 [ 22.427074] ret_from_fork+0x10/0x20 [ 22.427500] [ 22.427791] The buggy address belongs to the object at fff00000c5bb22a0 [ 22.427791] which belongs to the cache kmalloc-16 of size 16 [ 22.428727] The buggy address is located 8 bytes inside of [ 22.428727] allocated 9-byte region [fff00000c5bb22a0, fff00000c5bb22a9) [ 22.429699] [ 22.430040] The buggy address belongs to the physical page: [ 22.430571] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bb2 [ 22.431273] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.431873] page_type: f5(slab) [ 22.432290] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 22.432952] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 22.433594] page dumped because: kasan: bad access detected [ 22.434097] [ 22.434373] Memory state around the buggy address: [ 22.434825] fff00000c5bb2180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.435430] fff00000c5bb2200: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 22.435951] >fff00000c5bb2280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 22.436692] ^ [ 22.437089] fff00000c5bb2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.437760] fff00000c5bb2380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.438332] ================================================================== [ 22.330925] ================================================================== [ 22.332074] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x104/0xbf8 [ 22.333202] Write of size 8 at addr fff00000c5bb22a8 by task kunit_try_catch/248 [ 22.333790] [ 22.334170] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 22.334434] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.334509] Hardware name: linux,dummy-virt (DT) [ 22.334592] Call trace: [ 22.334652] dump_backtrace+0x9c/0x128 [ 22.334781] show_stack+0x20/0x38 [ 22.334881] dump_stack_lvl+0x8c/0xd0 [ 22.334963] print_report+0x118/0x5f0 [ 22.335012] kasan_report+0xdc/0x128 [ 22.335056] kasan_check_range+0x100/0x1a8 [ 22.335104] __kasan_check_write+0x20/0x30 [ 22.335151] kasan_bitops_modify.constprop.0+0x104/0xbf8 [ 22.335207] kasan_bitops_generic+0x114/0x1d0 [ 22.335286] kunit_try_run_case+0x170/0x3f0 [ 22.335339] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.335394] kthread+0x24c/0x2d0 [ 22.335441] ret_from_fork+0x10/0x20 [ 22.335490] [ 22.340752] Allocated by task 248: [ 22.341254] kasan_save_stack+0x3c/0x68 [ 22.341737] kasan_save_track+0x20/0x40 [ 22.342265] kasan_save_alloc_info+0x40/0x58 [ 22.342758] __kasan_kmalloc+0xd4/0xd8 [ 22.343261] __kmalloc_cache_noprof+0x154/0x320 [ 22.343835] kasan_bitops_generic+0xa0/0x1d0 [ 22.344267] kunit_try_run_case+0x170/0x3f0 [ 22.344807] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.345382] kthread+0x24c/0x2d0 [ 22.345800] ret_from_fork+0x10/0x20 [ 22.346232] [ 22.346532] The buggy address belongs to the object at fff00000c5bb22a0 [ 22.346532] which belongs to the cache kmalloc-16 of size 16 [ 22.347330] The buggy address is located 8 bytes inside of [ 22.347330] allocated 9-byte region [fff00000c5bb22a0, fff00000c5bb22a9) [ 22.348219] [ 22.348525] The buggy address belongs to the physical page: [ 22.348981] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bb2 [ 22.349827] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.350436] page_type: f5(slab) [ 22.350915] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 22.351611] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 22.351986] page dumped because: kasan: bad access detected [ 22.352290] [ 22.352507] Memory state around the buggy address: [ 22.352995] fff00000c5bb2180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.353584] fff00000c5bb2200: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 22.354328] >fff00000c5bb2280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 22.354920] ^ [ 22.355465] fff00000c5bb2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.356053] fff00000c5bb2380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.356633] ==================================================================
[ 14.174919] ================================================================== [ 14.175116] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d6/0xd50 [ 14.175302] Write of size 8 at addr ffff8881024e41c8 by task kunit_try_catch/266 [ 14.175699] [ 14.175831] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 14.175876] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.175888] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.175908] Call Trace: [ 14.175922] <TASK> [ 14.175937] dump_stack_lvl+0x73/0xb0 [ 14.175961] print_report+0xd1/0x640 [ 14.175984] ? __virt_addr_valid+0x1db/0x2d0 [ 14.176007] ? kasan_bitops_modify.constprop.0+0x2d6/0xd50 [ 14.176028] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.176050] ? kasan_bitops_modify.constprop.0+0x2d6/0xd50 [ 14.176093] kasan_report+0x140/0x180 [ 14.176117] ? kasan_bitops_modify.constprop.0+0x2d6/0xd50 [ 14.176144] kasan_check_range+0x10c/0x1c0 [ 14.176164] __kasan_check_write+0x18/0x20 [ 14.176183] kasan_bitops_modify.constprop.0+0x2d6/0xd50 [ 14.176205] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.176229] ? ret_from_fork_asm+0x1a/0x30 [ 14.176248] ? ret_from_fork+0x41/0x80 [ 14.176267] ? kthread+0x257/0x310 [ 14.176289] kasan_bitops_generic+0x117/0x1c0 [ 14.176309] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.176331] ? __pfx_read_tsc+0x10/0x10 [ 14.176349] ? ktime_get_ts64+0x84/0x230 [ 14.176374] kunit_try_run_case+0x1a6/0x480 [ 14.176395] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.176414] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 14.176434] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.176457] ? __kthread_parkme+0x82/0x160 [ 14.176475] ? preempt_count_sub+0x50/0x80 [ 14.176496] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.176515] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.176539] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.176563] kthread+0x257/0x310 [ 14.176580] ? __pfx_kthread+0x10/0x10 [ 14.176597] ret_from_fork+0x41/0x80 [ 14.176616] ? __pfx_kthread+0x10/0x10 [ 14.176634] ret_from_fork_asm+0x1a/0x30 [ 14.176669] </TASK> [ 14.176683] [ 14.183828] Allocated by task 266: [ 14.184018] kasan_save_stack+0x45/0x70 [ 14.184145] kasan_save_track+0x18/0x40 [ 14.184339] kasan_save_alloc_info+0x3b/0x50 [ 14.184433] __kasan_kmalloc+0xb7/0xc0 [ 14.184516] __kmalloc_cache_noprof+0x168/0x350 [ 14.184609] kasan_bitops_generic+0x93/0x1c0 [ 14.184708] kunit_try_run_case+0x1a6/0x480 [ 14.184800] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.184905] kthread+0x257/0x310 [ 14.184980] ret_from_fork+0x41/0x80 [ 14.185078] ret_from_fork_asm+0x1a/0x30 [ 14.185168] [ 14.185286] The buggy address belongs to the object at ffff8881024e41c0 [ 14.185286] which belongs to the cache kmalloc-16 of size 16 [ 14.185948] The buggy address is located 8 bytes inside of [ 14.185948] allocated 9-byte region [ffff8881024e41c0, ffff8881024e41c9) [ 14.186631] [ 14.186757] The buggy address belongs to the physical page: [ 14.187089] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024e4 [ 14.187519] flags: 0x200000000000000(node=0|zone=2) [ 14.187614] page_type: f5(slab) [ 14.187700] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.187828] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 14.188031] page dumped because: kasan: bad access detected [ 14.188335] [ 14.188428] Memory state around the buggy address: [ 14.188717] ffff8881024e4080: fa fb fc fc 00 03 fc fc 00 03 fc fc 00 05 fc fc [ 14.188964] ffff8881024e4100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.189182] >ffff8881024e4180: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 14.189464] ^ [ 14.189682] ffff8881024e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.189890] ffff8881024e4280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.190137] ================================================================== [ 14.146797] ================================================================== [ 14.147041] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19d/0xd50 [ 14.147223] Write of size 8 at addr ffff8881024e41c8 by task kunit_try_catch/266 [ 14.147533] [ 14.147659] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 14.147710] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.147722] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.147744] Call Trace: [ 14.147757] <TASK> [ 14.147772] dump_stack_lvl+0x73/0xb0 [ 14.147797] print_report+0xd1/0x640 [ 14.147819] ? __virt_addr_valid+0x1db/0x2d0 [ 14.147842] ? kasan_bitops_modify.constprop.0+0x19d/0xd50 [ 14.147863] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.147886] ? kasan_bitops_modify.constprop.0+0x19d/0xd50 [ 14.147907] kasan_report+0x140/0x180 [ 14.147930] ? kasan_bitops_modify.constprop.0+0x19d/0xd50 [ 14.147956] kasan_check_range+0x10c/0x1c0 [ 14.147976] __kasan_check_write+0x18/0x20 [ 14.147996] kasan_bitops_modify.constprop.0+0x19d/0xd50 [ 14.148017] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.148040] ? ret_from_fork_asm+0x1a/0x30 [ 14.148077] ? ret_from_fork+0x41/0x80 [ 14.148097] ? kthread+0x257/0x310 [ 14.148120] kasan_bitops_generic+0x117/0x1c0 [ 14.148140] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.148160] ? __pfx_read_tsc+0x10/0x10 [ 14.148178] ? ktime_get_ts64+0x84/0x230 [ 14.148202] kunit_try_run_case+0x1a6/0x480 [ 14.148224] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.148243] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 14.148263] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.148286] ? __kthread_parkme+0x82/0x160 [ 14.148303] ? preempt_count_sub+0x50/0x80 [ 14.148324] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.148343] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.148367] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.148391] kthread+0x257/0x310 [ 14.148407] ? __pfx_kthread+0x10/0x10 [ 14.148425] ret_from_fork+0x41/0x80 [ 14.148444] ? __pfx_kthread+0x10/0x10 [ 14.148461] ret_from_fork_asm+0x1a/0x30 [ 14.148489] </TASK> [ 14.148500] [ 14.153623] Allocated by task 266: [ 14.153807] kasan_save_stack+0x45/0x70 [ 14.154090] kasan_save_track+0x18/0x40 [ 14.154209] kasan_save_alloc_info+0x3b/0x50 [ 14.154304] __kasan_kmalloc+0xb7/0xc0 [ 14.154388] __kmalloc_cache_noprof+0x168/0x350 [ 14.154606] kasan_bitops_generic+0x93/0x1c0 [ 14.154845] kunit_try_run_case+0x1a6/0x480 [ 14.155103] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.155366] kthread+0x257/0x310 [ 14.155466] ret_from_fork+0x41/0x80 [ 14.155644] ret_from_fork_asm+0x1a/0x30 [ 14.155753] [ 14.155858] The buggy address belongs to the object at ffff8881024e41c0 [ 14.155858] which belongs to the cache kmalloc-16 of size 16 [ 14.156160] The buggy address is located 8 bytes inside of [ 14.156160] allocated 9-byte region [ffff8881024e41c0, ffff8881024e41c9) [ 14.156500] [ 14.156600] The buggy address belongs to the physical page: [ 14.156731] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024e4 [ 14.156901] flags: 0x200000000000000(node=0|zone=2) [ 14.157179] page_type: f5(slab) [ 14.157347] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.157476] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 14.157601] page dumped because: kasan: bad access detected [ 14.157707] [ 14.157757] Memory state around the buggy address: [ 14.157848] ffff8881024e4080: fa fb fc fc 00 03 fc fc 00 03 fc fc 00 05 fc fc [ 14.157983] ffff8881024e4100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.158130] >ffff8881024e4180: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 14.158253] ^ [ 14.158570] ffff8881024e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.158989] ffff8881024e4280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.159425] ================================================================== [ 14.225402] ================================================================== [ 14.225971] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ad/0xd50 [ 14.226316] Write of size 8 at addr ffff8881024e41c8 by task kunit_try_catch/266 [ 14.226561] [ 14.226626] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 14.226679] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.226694] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.226715] Call Trace: [ 14.226739] <TASK> [ 14.226758] dump_stack_lvl+0x73/0xb0 [ 14.226783] print_report+0xd1/0x640 [ 14.226818] ? __virt_addr_valid+0x1db/0x2d0 [ 14.226843] ? kasan_bitops_modify.constprop.0+0x4ad/0xd50 [ 14.226865] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.226888] ? kasan_bitops_modify.constprop.0+0x4ad/0xd50 [ 14.226911] kasan_report+0x140/0x180 [ 14.226935] ? kasan_bitops_modify.constprop.0+0x4ad/0xd50 [ 14.226962] kasan_check_range+0x10c/0x1c0 [ 14.226996] __kasan_check_write+0x18/0x20 [ 14.227018] kasan_bitops_modify.constprop.0+0x4ad/0xd50 [ 14.227052] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.227079] ? ret_from_fork_asm+0x1a/0x30 [ 14.227101] ? ret_from_fork+0x41/0x80 [ 14.227157] ? kthread+0x257/0x310 [ 14.227181] kasan_bitops_generic+0x117/0x1c0 [ 14.227215] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.227237] ? __pfx_read_tsc+0x10/0x10 [ 14.227256] ? ktime_get_ts64+0x84/0x230 [ 14.227281] kunit_try_run_case+0x1a6/0x480 [ 14.227318] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.227340] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 14.227360] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.227384] ? __kthread_parkme+0x82/0x160 [ 14.227403] ? preempt_count_sub+0x50/0x80 [ 14.227424] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.227444] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.227469] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.227494] kthread+0x257/0x310 [ 14.227513] ? __pfx_kthread+0x10/0x10 [ 14.227532] ret_from_fork+0x41/0x80 [ 14.227551] ? __pfx_kthread+0x10/0x10 [ 14.227569] ret_from_fork_asm+0x1a/0x30 [ 14.227599] </TASK> [ 14.227610] [ 14.233013] Allocated by task 266: [ 14.233221] kasan_save_stack+0x45/0x70 [ 14.233451] kasan_save_track+0x18/0x40 [ 14.233571] kasan_save_alloc_info+0x3b/0x50 [ 14.233804] __kasan_kmalloc+0xb7/0xc0 [ 14.233892] __kmalloc_cache_noprof+0x168/0x350 [ 14.234003] kasan_bitops_generic+0x93/0x1c0 [ 14.234183] kunit_try_run_case+0x1a6/0x480 [ 14.234395] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.234712] kthread+0x257/0x310 [ 14.234914] ret_from_fork+0x41/0x80 [ 14.235094] ret_from_fork_asm+0x1a/0x30 [ 14.235219] [ 14.235308] The buggy address belongs to the object at ffff8881024e41c0 [ 14.235308] which belongs to the cache kmalloc-16 of size 16 [ 14.235656] The buggy address is located 8 bytes inside of [ 14.235656] allocated 9-byte region [ffff8881024e41c0, ffff8881024e41c9) [ 14.236013] [ 14.236113] The buggy address belongs to the physical page: [ 14.236215] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024e4 [ 14.236443] flags: 0x200000000000000(node=0|zone=2) [ 14.236702] page_type: f5(slab) [ 14.236848] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.237138] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 14.237415] page dumped because: kasan: bad access detected [ 14.237651] [ 14.237762] Memory state around the buggy address: [ 14.237873] ffff8881024e4080: fa fb fc fc 00 03 fc fc 00 03 fc fc 00 05 fc fc [ 14.238014] ffff8881024e4100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.238165] >ffff8881024e4180: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 14.238285] ^ [ 14.238386] ffff8881024e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.238505] ffff8881024e4280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.238622] ================================================================== [ 14.190642] ================================================================== [ 14.191167] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x374/0xd50 [ 14.191325] Write of size 8 at addr ffff8881024e41c8 by task kunit_try_catch/266 [ 14.191560] [ 14.191823] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 14.191926] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.191950] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.192010] Call Trace: [ 14.192027] <TASK> [ 14.192106] dump_stack_lvl+0x73/0xb0 [ 14.192188] print_report+0xd1/0x640 [ 14.192234] ? __virt_addr_valid+0x1db/0x2d0 [ 14.192258] ? kasan_bitops_modify.constprop.0+0x374/0xd50 [ 14.192281] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.192303] ? kasan_bitops_modify.constprop.0+0x374/0xd50 [ 14.192325] kasan_report+0x140/0x180 [ 14.192348] ? kasan_bitops_modify.constprop.0+0x374/0xd50 [ 14.192375] kasan_check_range+0x10c/0x1c0 [ 14.192395] __kasan_check_write+0x18/0x20 [ 14.192415] kasan_bitops_modify.constprop.0+0x374/0xd50 [ 14.192437] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.192460] ? ret_from_fork_asm+0x1a/0x30 [ 14.192480] ? ret_from_fork+0x41/0x80 [ 14.192500] ? kthread+0x257/0x310 [ 14.192523] kasan_bitops_generic+0x117/0x1c0 [ 14.192545] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.192568] ? __pfx_read_tsc+0x10/0x10 [ 14.192586] ? ktime_get_ts64+0x84/0x230 [ 14.192611] kunit_try_run_case+0x1a6/0x480 [ 14.192632] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.192652] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 14.192683] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.192709] ? __kthread_parkme+0x82/0x160 [ 14.192728] ? preempt_count_sub+0x50/0x80 [ 14.192750] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.192770] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.192795] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.192821] kthread+0x257/0x310 [ 14.192839] ? __pfx_kthread+0x10/0x10 [ 14.192857] ret_from_fork+0x41/0x80 [ 14.192877] ? __pfx_kthread+0x10/0x10 [ 14.192894] ret_from_fork_asm+0x1a/0x30 [ 14.192922] </TASK> [ 14.192932] [ 14.198867] Allocated by task 266: [ 14.199048] kasan_save_stack+0x45/0x70 [ 14.199161] kasan_save_track+0x18/0x40 [ 14.199250] kasan_save_alloc_info+0x3b/0x50 [ 14.199339] __kasan_kmalloc+0xb7/0xc0 [ 14.199423] __kmalloc_cache_noprof+0x168/0x350 [ 14.199515] kasan_bitops_generic+0x93/0x1c0 [ 14.199600] kunit_try_run_case+0x1a6/0x480 [ 14.199718] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.200034] kthread+0x257/0x310 [ 14.200256] ret_from_fork+0x41/0x80 [ 14.200484] ret_from_fork_asm+0x1a/0x30 [ 14.200724] [ 14.200846] The buggy address belongs to the object at ffff8881024e41c0 [ 14.200846] which belongs to the cache kmalloc-16 of size 16 [ 14.201433] The buggy address is located 8 bytes inside of [ 14.201433] allocated 9-byte region [ffff8881024e41c0, ffff8881024e41c9) [ 14.201926] [ 14.202037] The buggy address belongs to the physical page: [ 14.202306] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024e4 [ 14.202490] flags: 0x200000000000000(node=0|zone=2) [ 14.202590] page_type: f5(slab) [ 14.202677] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.202812] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 14.202937] page dumped because: kasan: bad access detected [ 14.203035] [ 14.203099] Memory state around the buggy address: [ 14.203192] ffff8881024e4080: fa fb fc fc 00 03 fc fc 00 03 fc fc 00 05 fc fc [ 14.203590] ffff8881024e4100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.203974] >ffff8881024e4180: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 14.204363] ^ [ 14.204688] ffff8881024e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.205103] ffff8881024e4280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.205502] ================================================================== [ 14.160213] ================================================================== [ 14.161202] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23b/0xd50 [ 14.161707] Write of size 8 at addr ffff8881024e41c8 by task kunit_try_catch/266 [ 14.161928] [ 14.162039] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 14.162102] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.162115] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.162135] Call Trace: [ 14.162151] <TASK> [ 14.162167] dump_stack_lvl+0x73/0xb0 [ 14.162192] print_report+0xd1/0x640 [ 14.162215] ? __virt_addr_valid+0x1db/0x2d0 [ 14.162237] ? kasan_bitops_modify.constprop.0+0x23b/0xd50 [ 14.162259] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.162282] ? kasan_bitops_modify.constprop.0+0x23b/0xd50 [ 14.162304] kasan_report+0x140/0x180 [ 14.162327] ? kasan_bitops_modify.constprop.0+0x23b/0xd50 [ 14.162353] kasan_check_range+0x10c/0x1c0 [ 14.162374] __kasan_check_write+0x18/0x20 [ 14.162394] kasan_bitops_modify.constprop.0+0x23b/0xd50 [ 14.162416] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.162440] ? ret_from_fork_asm+0x1a/0x30 [ 14.162460] ? ret_from_fork+0x41/0x80 [ 14.162479] ? kthread+0x257/0x310 [ 14.162502] kasan_bitops_generic+0x117/0x1c0 [ 14.162522] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.162544] ? __pfx_read_tsc+0x10/0x10 [ 14.162562] ? ktime_get_ts64+0x84/0x230 [ 14.162588] kunit_try_run_case+0x1a6/0x480 [ 14.162609] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.162628] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 14.162648] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.162682] ? __kthread_parkme+0x82/0x160 [ 14.162702] ? preempt_count_sub+0x50/0x80 [ 14.162725] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.162744] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.162769] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.162794] kthread+0x257/0x310 [ 14.162812] ? __pfx_kthread+0x10/0x10 [ 14.162831] ret_from_fork+0x41/0x80 [ 14.162850] ? __pfx_kthread+0x10/0x10 [ 14.162869] ret_from_fork_asm+0x1a/0x30 [ 14.162898] </TASK> [ 14.162910] [ 14.168269] Allocated by task 266: [ 14.168351] kasan_save_stack+0x45/0x70 [ 14.168444] kasan_save_track+0x18/0x40 [ 14.168529] kasan_save_alloc_info+0x3b/0x50 [ 14.168615] __kasan_kmalloc+0xb7/0xc0 [ 14.168705] __kmalloc_cache_noprof+0x168/0x350 [ 14.168800] kasan_bitops_generic+0x93/0x1c0 [ 14.168906] kunit_try_run_case+0x1a6/0x480 [ 14.169163] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.169456] kthread+0x257/0x310 [ 14.169627] ret_from_fork+0x41/0x80 [ 14.169856] ret_from_fork_asm+0x1a/0x30 [ 14.170075] [ 14.170200] The buggy address belongs to the object at ffff8881024e41c0 [ 14.170200] which belongs to the cache kmalloc-16 of size 16 [ 14.170657] The buggy address is located 8 bytes inside of [ 14.170657] allocated 9-byte region [ffff8881024e41c0, ffff8881024e41c9) [ 14.171076] [ 14.171185] The buggy address belongs to the physical page: [ 14.171315] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024e4 [ 14.171563] flags: 0x200000000000000(node=0|zone=2) [ 14.171756] page_type: f5(slab) [ 14.171846] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.171974] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 14.172380] page dumped because: kasan: bad access detected [ 14.172516] [ 14.172567] Memory state around the buggy address: [ 14.172797] ffff8881024e4080: fa fb fc fc 00 03 fc fc 00 03 fc fc 00 05 fc fc [ 14.173089] ffff8881024e4100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.173235] >ffff8881024e4180: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 14.173473] ^ [ 14.173689] ffff8881024e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.173886] ffff8881024e4280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.174245] ================================================================== [ 14.131309] ================================================================== [ 14.131849] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x102/0xd50 [ 14.132177] Write of size 8 at addr ffff8881024e41c8 by task kunit_try_catch/266 [ 14.132390] [ 14.132518] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 14.132561] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.132573] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.132594] Call Trace: [ 14.132608] <TASK> [ 14.132625] dump_stack_lvl+0x73/0xb0 [ 14.132649] print_report+0xd1/0x640 [ 14.132680] ? __virt_addr_valid+0x1db/0x2d0 [ 14.132704] ? kasan_bitops_modify.constprop.0+0x102/0xd50 [ 14.132724] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.132745] ? kasan_bitops_modify.constprop.0+0x102/0xd50 [ 14.132766] kasan_report+0x140/0x180 [ 14.132787] ? kasan_bitops_modify.constprop.0+0x102/0xd50 [ 14.132812] kasan_check_range+0x10c/0x1c0 [ 14.132832] __kasan_check_write+0x18/0x20 [ 14.132851] kasan_bitops_modify.constprop.0+0x102/0xd50 [ 14.132871] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.132893] ? ret_from_fork_asm+0x1a/0x30 [ 14.132911] ? ret_from_fork+0x41/0x80 [ 14.132929] ? kthread+0x257/0x310 [ 14.132949] kasan_bitops_generic+0x117/0x1c0 [ 14.132968] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.132988] ? __pfx_read_tsc+0x10/0x10 [ 14.133004] ? ktime_get_ts64+0x84/0x230 [ 14.133028] kunit_try_run_case+0x1a6/0x480 [ 14.133049] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.133068] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 14.133086] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.133109] ? __kthread_parkme+0x82/0x160 [ 14.133125] ? preempt_count_sub+0x50/0x80 [ 14.133146] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.133164] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.133188] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.133212] kthread+0x257/0x310 [ 14.133228] ? __pfx_kthread+0x10/0x10 [ 14.133277] ret_from_fork+0x41/0x80 [ 14.133300] ? __pfx_kthread+0x10/0x10 [ 14.133333] ret_from_fork_asm+0x1a/0x30 [ 14.133365] </TASK> [ 14.133376] [ 14.140025] Allocated by task 266: [ 14.140311] kasan_save_stack+0x45/0x70 [ 14.140500] kasan_save_track+0x18/0x40 [ 14.140780] kasan_save_alloc_info+0x3b/0x50 [ 14.140942] __kasan_kmalloc+0xb7/0xc0 [ 14.141107] __kmalloc_cache_noprof+0x168/0x350 [ 14.141387] kasan_bitops_generic+0x93/0x1c0 [ 14.141590] kunit_try_run_case+0x1a6/0x480 [ 14.141757] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.141908] kthread+0x257/0x310 [ 14.141988] ret_from_fork+0x41/0x80 [ 14.142141] ret_from_fork_asm+0x1a/0x30 [ 14.142262] [ 14.142325] The buggy address belongs to the object at ffff8881024e41c0 [ 14.142325] which belongs to the cache kmalloc-16 of size 16 [ 14.142620] The buggy address is located 8 bytes inside of [ 14.142620] allocated 9-byte region [ffff8881024e41c0, ffff8881024e41c9) [ 14.142926] [ 14.142989] The buggy address belongs to the physical page: [ 14.143100] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024e4 [ 14.143396] flags: 0x200000000000000(node=0|zone=2) [ 14.143623] page_type: f5(slab) [ 14.143794] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.144039] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 14.144191] page dumped because: kasan: bad access detected [ 14.144288] [ 14.144336] Memory state around the buggy address: [ 14.144590] ffff8881024e4080: fa fb fc fc 00 03 fc fc 00 03 fc fc 00 05 fc fc [ 14.144962] ffff8881024e4100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.145185] >ffff8881024e4180: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 14.145308] ^ [ 14.145512] ffff8881024e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.145826] ffff8881024e4280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.146030] ================================================================== [ 14.239421] ================================================================== [ 14.239798] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x548/0xd50 [ 14.240659] Write of size 8 at addr ffff8881024e41c8 by task kunit_try_catch/266 [ 14.241086] [ 14.241200] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 14.241245] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.241257] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.241277] Call Trace: [ 14.241293] <TASK> [ 14.241311] dump_stack_lvl+0x73/0xb0 [ 14.241340] print_report+0xd1/0x640 [ 14.241364] ? __virt_addr_valid+0x1db/0x2d0 [ 14.241387] ? kasan_bitops_modify.constprop.0+0x548/0xd50 [ 14.241409] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.241515] ? kasan_bitops_modify.constprop.0+0x548/0xd50 [ 14.241541] kasan_report+0x140/0x180 [ 14.241565] ? kasan_bitops_modify.constprop.0+0x548/0xd50 [ 14.241592] kasan_check_range+0x10c/0x1c0 [ 14.241613] __kasan_check_write+0x18/0x20 [ 14.241633] kasan_bitops_modify.constprop.0+0x548/0xd50 [ 14.241654] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.241692] ? ret_from_fork_asm+0x1a/0x30 [ 14.241713] ? ret_from_fork+0x41/0x80 [ 14.241732] ? kthread+0x257/0x310 [ 14.241754] kasan_bitops_generic+0x117/0x1c0 [ 14.241775] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.241796] ? __pfx_read_tsc+0x10/0x10 [ 14.241814] ? ktime_get_ts64+0x84/0x230 [ 14.241839] kunit_try_run_case+0x1a6/0x480 [ 14.241860] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.241880] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 14.241908] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.241934] ? __kthread_parkme+0x82/0x160 [ 14.241954] ? preempt_count_sub+0x50/0x80 [ 14.241978] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.241999] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.242027] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.242070] kthread+0x257/0x310 [ 14.242093] ? __pfx_kthread+0x10/0x10 [ 14.242112] ret_from_fork+0x41/0x80 [ 14.242132] ? __pfx_kthread+0x10/0x10 [ 14.242150] ret_from_fork_asm+0x1a/0x30 [ 14.242179] </TASK> [ 14.242191] [ 14.247162] Allocated by task 266: [ 14.247246] kasan_save_stack+0x45/0x70 [ 14.247338] kasan_save_track+0x18/0x40 [ 14.247424] kasan_save_alloc_info+0x3b/0x50 [ 14.247511] __kasan_kmalloc+0xb7/0xc0 [ 14.247594] __kmalloc_cache_noprof+0x168/0x350 [ 14.247797] kasan_bitops_generic+0x93/0x1c0 [ 14.248011] kunit_try_run_case+0x1a6/0x480 [ 14.248278] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.248512] kthread+0x257/0x310 [ 14.248680] ret_from_fork+0x41/0x80 [ 14.248885] ret_from_fork_asm+0x1a/0x30 [ 14.249146] [ 14.249253] The buggy address belongs to the object at ffff8881024e41c0 [ 14.249253] which belongs to the cache kmalloc-16 of size 16 [ 14.249582] The buggy address is located 8 bytes inside of [ 14.249582] allocated 9-byte region [ffff8881024e41c0, ffff8881024e41c9) [ 14.249789] [ 14.249844] The buggy address belongs to the physical page: [ 14.250031] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024e4 [ 14.250256] flags: 0x200000000000000(node=0|zone=2) [ 14.250523] page_type: f5(slab) [ 14.250658] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.250877] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 14.251065] page dumped because: kasan: bad access detected [ 14.251255] [ 14.251366] Memory state around the buggy address: [ 14.251526] ffff8881024e4080: fa fb fc fc 00 03 fc fc 00 03 fc fc 00 05 fc fc [ 14.251784] ffff8881024e4100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.252034] >ffff8881024e4180: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 14.252248] ^ [ 14.252459] ffff8881024e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.252674] ffff8881024e4280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.252803] ================================================================== [ 14.206453] ================================================================== [ 14.206939] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40f/0xd50 [ 14.207494] Write of size 8 at addr ffff8881024e41c8 by task kunit_try_catch/266 [ 14.208110] [ 14.208243] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 14.208288] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.208300] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.208320] Call Trace: [ 14.208336] <TASK> [ 14.208351] dump_stack_lvl+0x73/0xb0 [ 14.208380] print_report+0xd1/0x640 [ 14.208402] ? __virt_addr_valid+0x1db/0x2d0 [ 14.208522] ? kasan_bitops_modify.constprop.0+0x40f/0xd50 [ 14.208574] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.208601] ? kasan_bitops_modify.constprop.0+0x40f/0xd50 [ 14.208709] kasan_report+0x140/0x180 [ 14.208825] ? kasan_bitops_modify.constprop.0+0x40f/0xd50 [ 14.208859] kasan_check_range+0x10c/0x1c0 [ 14.208890] __kasan_check_write+0x18/0x20 [ 14.208913] kasan_bitops_modify.constprop.0+0x40f/0xd50 [ 14.208936] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.208960] ? ret_from_fork_asm+0x1a/0x30 [ 14.208981] ? ret_from_fork+0x41/0x80 [ 14.209000] ? kthread+0x257/0x310 [ 14.209024] kasan_bitops_generic+0x117/0x1c0 [ 14.209045] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.209067] ? __pfx_read_tsc+0x10/0x10 [ 14.209252] ? ktime_get_ts64+0x84/0x230 [ 14.209280] kunit_try_run_case+0x1a6/0x480 [ 14.209303] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.209323] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 14.209344] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.209368] ? __kthread_parkme+0x82/0x160 [ 14.209386] ? preempt_count_sub+0x50/0x80 [ 14.209409] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.209428] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.209453] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.209477] kthread+0x257/0x310 [ 14.209495] ? __pfx_kthread+0x10/0x10 [ 14.209513] ret_from_fork+0x41/0x80 [ 14.209533] ? __pfx_kthread+0x10/0x10 [ 14.209551] ret_from_fork_asm+0x1a/0x30 [ 14.209580] </TASK> [ 14.209592] [ 14.216462] Allocated by task 266: [ 14.216731] kasan_save_stack+0x45/0x70 [ 14.216975] kasan_save_track+0x18/0x40 [ 14.217338] kasan_save_alloc_info+0x3b/0x50 [ 14.217585] __kasan_kmalloc+0xb7/0xc0 [ 14.217695] __kmalloc_cache_noprof+0x168/0x350 [ 14.218128] kasan_bitops_generic+0x93/0x1c0 [ 14.218649] kunit_try_run_case+0x1a6/0x480 [ 14.218892] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.219052] kthread+0x257/0x310 [ 14.219232] ret_from_fork+0x41/0x80 [ 14.219514] ret_from_fork_asm+0x1a/0x30 [ 14.219680] [ 14.219736] The buggy address belongs to the object at ffff8881024e41c0 [ 14.219736] which belongs to the cache kmalloc-16 of size 16 [ 14.220382] The buggy address is located 8 bytes inside of [ 14.220382] allocated 9-byte region [ffff8881024e41c0, ffff8881024e41c9) [ 14.220753] [ 14.220806] The buggy address belongs to the physical page: [ 14.221107] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024e4 [ 14.221243] flags: 0x200000000000000(node=0|zone=2) [ 14.221552] page_type: f5(slab) [ 14.221751] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.221980] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 14.222217] page dumped because: kasan: bad access detected [ 14.222418] [ 14.222563] Memory state around the buggy address: [ 14.222762] ffff8881024e4080: fa fb fc fc 00 03 fc fc 00 03 fc fc 00 05 fc fc [ 14.223051] ffff8881024e4100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.223415] >ffff8881024e4180: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 14.223650] ^ [ 14.223877] ffff8881024e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.224075] ffff8881024e4280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.224226] ==================================================================