Date
June 2, 2025, 2:10 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 22.614037] ================================================================== [ 22.615018] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x104/0xc08 [ 22.616114] Write of size 8 at addr fff00000c5bb22a8 by task kunit_try_catch/248 [ 22.616663] [ 22.616885] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 22.617055] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.617111] Hardware name: linux,dummy-virt (DT) [ 22.617189] Call trace: [ 22.617258] dump_backtrace+0x9c/0x128 [ 22.617374] show_stack+0x20/0x38 [ 22.617503] dump_stack_lvl+0x8c/0xd0 [ 22.617639] print_report+0x118/0x5f0 [ 22.618053] kasan_report+0xdc/0x128 [ 22.618160] kasan_check_range+0x100/0x1a8 [ 22.618283] __kasan_check_write+0x20/0x30 [ 22.618341] kasan_bitops_test_and_modify.constprop.0+0x104/0xc08 [ 22.618405] kasan_bitops_generic+0x120/0x1d0 [ 22.618457] kunit_try_run_case+0x170/0x3f0 [ 22.618510] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.618564] kthread+0x24c/0x2d0 [ 22.618612] ret_from_fork+0x10/0x20 [ 22.618665] [ 22.622189] Allocated by task 248: [ 22.622631] kasan_save_stack+0x3c/0x68 [ 22.623269] kasan_save_track+0x20/0x40 [ 22.623844] kasan_save_alloc_info+0x40/0x58 [ 22.625740] __kasan_kmalloc+0xd4/0xd8 [ 22.626337] __kmalloc_cache_noprof+0x154/0x320 [ 22.626932] kasan_bitops_generic+0xa0/0x1d0 [ 22.627431] kunit_try_run_case+0x170/0x3f0 [ 22.627968] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.628381] kthread+0x24c/0x2d0 [ 22.628753] ret_from_fork+0x10/0x20 [ 22.629175] [ 22.629490] The buggy address belongs to the object at fff00000c5bb22a0 [ 22.629490] which belongs to the cache kmalloc-16 of size 16 [ 22.630346] The buggy address is located 8 bytes inside of [ 22.630346] allocated 9-byte region [fff00000c5bb22a0, fff00000c5bb22a9) [ 22.631232] [ 22.631535] The buggy address belongs to the physical page: [ 22.631987] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bb2 [ 22.632703] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.633226] page_type: f5(slab) [ 22.633684] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 22.634335] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 22.634985] page dumped because: kasan: bad access detected [ 22.635432] [ 22.635699] Memory state around the buggy address: [ 22.636102] fff00000c5bb2180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.636785] fff00000c5bb2200: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 22.637361] >fff00000c5bb2280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 22.637887] ^ [ 22.638338] fff00000c5bb2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.638972] fff00000c5bb2380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.639499] ================================================================== [ 22.667778] ================================================================== [ 22.668434] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1e4/0xc08 [ 22.669129] Write of size 8 at addr fff00000c5bb22a8 by task kunit_try_catch/248 [ 22.670947] [ 22.671224] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 22.671494] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.671562] Hardware name: linux,dummy-virt (DT) [ 22.671612] Call trace: [ 22.671644] dump_backtrace+0x9c/0x128 [ 22.671743] show_stack+0x20/0x38 [ 22.671793] dump_stack_lvl+0x8c/0xd0 [ 22.671842] print_report+0x118/0x5f0 [ 22.671890] kasan_report+0xdc/0x128 [ 22.671934] kasan_check_range+0x100/0x1a8 [ 22.671982] __kasan_check_write+0x20/0x30 [ 22.672030] kasan_bitops_test_and_modify.constprop.0+0x1e4/0xc08 [ 22.672087] kasan_bitops_generic+0x120/0x1d0 [ 22.672138] kunit_try_run_case+0x170/0x3f0 [ 22.672188] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.672267] kthread+0x24c/0x2d0 [ 22.672348] ret_from_fork+0x10/0x20 [ 22.672446] [ 22.677583] Allocated by task 248: [ 22.677995] kasan_save_stack+0x3c/0x68 [ 22.678493] kasan_save_track+0x20/0x40 [ 22.678870] kasan_save_alloc_info+0x40/0x58 [ 22.679273] __kasan_kmalloc+0xd4/0xd8 [ 22.679719] __kmalloc_cache_noprof+0x154/0x320 [ 22.680176] kasan_bitops_generic+0xa0/0x1d0 [ 22.680700] kunit_try_run_case+0x170/0x3f0 [ 22.681126] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.681717] kthread+0x24c/0x2d0 [ 22.682163] ret_from_fork+0x10/0x20 [ 22.682644] [ 22.682925] The buggy address belongs to the object at fff00000c5bb22a0 [ 22.682925] which belongs to the cache kmalloc-16 of size 16 [ 22.683730] The buggy address is located 8 bytes inside of [ 22.683730] allocated 9-byte region [fff00000c5bb22a0, fff00000c5bb22a9) [ 22.684702] [ 22.685007] The buggy address belongs to the physical page: [ 22.685437] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bb2 [ 22.686212] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.686906] page_type: f5(slab) [ 22.687340] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 22.687931] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 22.688486] page dumped because: kasan: bad access detected [ 22.688976] [ 22.689212] Memory state around the buggy address: [ 22.689661] fff00000c5bb2180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.690317] fff00000c5bb2200: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 22.690859] >fff00000c5bb2280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 22.691457] ^ [ 22.691876] fff00000c5bb2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.692521] fff00000c5bb2380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.693059] ================================================================== [ 22.721347] ================================================================== [ 22.722409] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x26c/0xc08 [ 22.722992] Write of size 8 at addr fff00000c5bb22a8 by task kunit_try_catch/248 [ 22.724086] [ 22.724421] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 22.724708] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.724756] Hardware name: linux,dummy-virt (DT) [ 22.724802] Call trace: [ 22.724835] dump_backtrace+0x9c/0x128 [ 22.724902] show_stack+0x20/0x38 [ 22.724947] dump_stack_lvl+0x8c/0xd0 [ 22.724997] print_report+0x118/0x5f0 [ 22.725045] kasan_report+0xdc/0x128 [ 22.725088] kasan_check_range+0x100/0x1a8 [ 22.725135] __kasan_check_write+0x20/0x30 [ 22.725183] kasan_bitops_test_and_modify.constprop.0+0x26c/0xc08 [ 22.725265] kasan_bitops_generic+0x120/0x1d0 [ 22.725322] kunit_try_run_case+0x170/0x3f0 [ 22.725373] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.725430] kthread+0x24c/0x2d0 [ 22.725483] ret_from_fork+0x10/0x20 [ 22.725547] [ 22.731280] Allocated by task 248: [ 22.731776] kasan_save_stack+0x3c/0x68 [ 22.732193] kasan_save_track+0x20/0x40 [ 22.732735] kasan_save_alloc_info+0x40/0x58 [ 22.733102] __kasan_kmalloc+0xd4/0xd8 [ 22.733608] __kmalloc_cache_noprof+0x154/0x320 [ 22.734033] kasan_bitops_generic+0xa0/0x1d0 [ 22.734456] kunit_try_run_case+0x170/0x3f0 [ 22.735010] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.735563] kthread+0x24c/0x2d0 [ 22.736062] ret_from_fork+0x10/0x20 [ 22.736586] [ 22.736908] The buggy address belongs to the object at fff00000c5bb22a0 [ 22.736908] which belongs to the cache kmalloc-16 of size 16 [ 22.737881] The buggy address is located 8 bytes inside of [ 22.737881] allocated 9-byte region [fff00000c5bb22a0, fff00000c5bb22a9) [ 22.738916] [ 22.739284] The buggy address belongs to the physical page: [ 22.740175] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bb2 [ 22.740869] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.741403] page_type: f5(slab) [ 22.741747] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 22.742508] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 22.743583] page dumped because: kasan: bad access detected [ 22.743958] [ 22.744432] Memory state around the buggy address: [ 22.744822] fff00000c5bb2180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.745258] fff00000c5bb2200: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 22.745665] >fff00000c5bb2280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 22.746038] ^ [ 22.747197] fff00000c5bb2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.747912] fff00000c5bb2380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.748415] ================================================================== [ 22.695495] ================================================================== [ 22.696263] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa90/0xc08 [ 22.696581] Read of size 8 at addr fff00000c5bb22a8 by task kunit_try_catch/248 [ 22.696814] [ 22.696944] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 22.697050] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.697086] Hardware name: linux,dummy-virt (DT) [ 22.697128] Call trace: [ 22.697157] dump_backtrace+0x9c/0x128 [ 22.697211] show_stack+0x20/0x38 [ 22.697284] dump_stack_lvl+0x8c/0xd0 [ 22.697375] print_report+0x118/0x5f0 [ 22.697457] kasan_report+0xdc/0x128 [ 22.697547] __asan_report_load8_noabort+0x20/0x30 [ 22.697643] kasan_bitops_test_and_modify.constprop.0+0xa90/0xc08 [ 22.697760] kasan_bitops_generic+0x120/0x1d0 [ 22.697866] kunit_try_run_case+0x170/0x3f0 [ 22.697976] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.698082] kthread+0x24c/0x2d0 [ 22.698180] ret_from_fork+0x10/0x20 [ 22.698304] [ 22.703602] Allocated by task 248: [ 22.703941] kasan_save_stack+0x3c/0x68 [ 22.704471] kasan_save_track+0x20/0x40 [ 22.704823] kasan_save_alloc_info+0x40/0x58 [ 22.705310] __kasan_kmalloc+0xd4/0xd8 [ 22.705779] __kmalloc_cache_noprof+0x154/0x320 [ 22.706332] kasan_bitops_generic+0xa0/0x1d0 [ 22.706779] kunit_try_run_case+0x170/0x3f0 [ 22.707170] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.707720] kthread+0x24c/0x2d0 [ 22.708133] ret_from_fork+0x10/0x20 [ 22.708534] [ 22.708815] The buggy address belongs to the object at fff00000c5bb22a0 [ 22.708815] which belongs to the cache kmalloc-16 of size 16 [ 22.709817] The buggy address is located 8 bytes inside of [ 22.709817] allocated 9-byte region [fff00000c5bb22a0, fff00000c5bb22a9) [ 22.710651] [ 22.710934] The buggy address belongs to the physical page: [ 22.711501] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bb2 [ 22.712213] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.712932] page_type: f5(slab) [ 22.713369] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 22.713994] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 22.714606] page dumped because: kasan: bad access detected [ 22.715007] [ 22.715284] Memory state around the buggy address: [ 22.715750] fff00000c5bb2180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.716341] fff00000c5bb2200: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 22.716933] >fff00000c5bb2280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 22.717577] ^ [ 22.718073] fff00000c5bb2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.718693] fff00000c5bb2380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.719235] ================================================================== [ 22.751895] ================================================================== [ 22.753088] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xb14/0xc08 [ 22.755161] Read of size 8 at addr fff00000c5bb22a8 by task kunit_try_catch/248 [ 22.757290] [ 22.757630] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 22.757877] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.757961] Hardware name: linux,dummy-virt (DT) [ 22.758019] Call trace: [ 22.758053] dump_backtrace+0x9c/0x128 [ 22.758145] show_stack+0x20/0x38 [ 22.758207] dump_stack_lvl+0x8c/0xd0 [ 22.758283] print_report+0x118/0x5f0 [ 22.758336] kasan_report+0xdc/0x128 [ 22.758380] __asan_report_load8_noabort+0x20/0x30 [ 22.758431] kasan_bitops_test_and_modify.constprop.0+0xb14/0xc08 [ 22.758489] kasan_bitops_generic+0x120/0x1d0 [ 22.758539] kunit_try_run_case+0x170/0x3f0 [ 22.758589] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.758643] kthread+0x24c/0x2d0 [ 22.758689] ret_from_fork+0x10/0x20 [ 22.758738] [ 22.763700] Allocated by task 248: [ 22.764079] kasan_save_stack+0x3c/0x68 [ 22.764486] kasan_save_track+0x20/0x40 [ 22.764933] kasan_save_alloc_info+0x40/0x58 [ 22.765449] __kasan_kmalloc+0xd4/0xd8 [ 22.765947] __kmalloc_cache_noprof+0x154/0x320 [ 22.766442] kasan_bitops_generic+0xa0/0x1d0 [ 22.766928] kunit_try_run_case+0x170/0x3f0 [ 22.767469] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.768087] kthread+0x24c/0x2d0 [ 22.768555] ret_from_fork+0x10/0x20 [ 22.768961] [ 22.769261] The buggy address belongs to the object at fff00000c5bb22a0 [ 22.769261] which belongs to the cache kmalloc-16 of size 16 [ 22.770135] The buggy address is located 8 bytes inside of [ 22.770135] allocated 9-byte region [fff00000c5bb22a0, fff00000c5bb22a9) [ 22.771018] [ 22.771340] The buggy address belongs to the physical page: [ 22.771826] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bb2 [ 22.772522] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.773048] page_type: f5(slab) [ 22.773516] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 22.774181] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 22.774813] page dumped because: kasan: bad access detected [ 22.775286] [ 22.775557] Memory state around the buggy address: [ 22.776015] fff00000c5bb2180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.776615] fff00000c5bb2200: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 22.777231] >fff00000c5bb2280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 22.777827] ^ [ 22.778285] fff00000c5bb2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.778902] fff00000c5bb2380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.779499] ================================================================== [ 22.832889] ================================================================== [ 22.833602] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xacc/0xc08 [ 22.834313] Read of size 8 at addr fff00000c5bb22a8 by task kunit_try_catch/248 [ 22.834926] [ 22.836415] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 22.836548] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.836586] Hardware name: linux,dummy-virt (DT) [ 22.836631] Call trace: [ 22.836661] dump_backtrace+0x9c/0x128 [ 22.836731] show_stack+0x20/0x38 [ 22.836776] dump_stack_lvl+0x8c/0xd0 [ 22.836825] print_report+0x118/0x5f0 [ 22.836870] kasan_report+0xdc/0x128 [ 22.836915] __asan_report_load8_noabort+0x20/0x30 [ 22.836965] kasan_bitops_test_and_modify.constprop.0+0xacc/0xc08 [ 22.837023] kasan_bitops_generic+0x120/0x1d0 [ 22.837075] kunit_try_run_case+0x170/0x3f0 [ 22.837125] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.837178] kthread+0x24c/0x2d0 [ 22.837224] ret_from_fork+0x10/0x20 [ 22.837291] [ 22.842085] Allocated by task 248: [ 22.842562] kasan_save_stack+0x3c/0x68 [ 22.843055] kasan_save_track+0x20/0x40 [ 22.843536] kasan_save_alloc_info+0x40/0x58 [ 22.843897] __kasan_kmalloc+0xd4/0xd8 [ 22.844396] __kmalloc_cache_noprof+0x154/0x320 [ 22.844937] kasan_bitops_generic+0xa0/0x1d0 [ 22.845348] kunit_try_run_case+0x170/0x3f0 [ 22.845777] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.846205] kthread+0x24c/0x2d0 [ 22.846674] ret_from_fork+0x10/0x20 [ 22.847052] [ 22.847350] The buggy address belongs to the object at fff00000c5bb22a0 [ 22.847350] which belongs to the cache kmalloc-16 of size 16 [ 22.848034] The buggy address is located 8 bytes inside of [ 22.848034] allocated 9-byte region [fff00000c5bb22a0, fff00000c5bb22a9) [ 22.849060] [ 22.849353] The buggy address belongs to the physical page: [ 22.849801] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bb2 [ 22.850499] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.851077] page_type: f5(slab) [ 22.851538] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 22.852266] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 22.853000] page dumped because: kasan: bad access detected [ 22.853407] [ 22.853697] Memory state around the buggy address: [ 22.854211] fff00000c5bb2180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.854798] fff00000c5bb2200: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 22.855485] >fff00000c5bb2280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 22.856043] ^ [ 22.856437] fff00000c5bb2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.857068] fff00000c5bb2380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.857538] ================================================================== [ 22.641810] ================================================================== [ 22.642337] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa48/0xc08 [ 22.643229] Read of size 8 at addr fff00000c5bb22a8 by task kunit_try_catch/248 [ 22.643962] [ 22.644300] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 22.644512] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.644595] Hardware name: linux,dummy-virt (DT) [ 22.644672] Call trace: [ 22.644725] dump_backtrace+0x9c/0x128 [ 22.644854] show_stack+0x20/0x38 [ 22.644957] dump_stack_lvl+0x8c/0xd0 [ 22.645071] print_report+0x118/0x5f0 [ 22.645167] kasan_report+0xdc/0x128 [ 22.645230] __asan_report_load8_noabort+0x20/0x30 [ 22.645314] kasan_bitops_test_and_modify.constprop.0+0xa48/0xc08 [ 22.645375] kasan_bitops_generic+0x120/0x1d0 [ 22.645426] kunit_try_run_case+0x170/0x3f0 [ 22.645485] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.645546] kthread+0x24c/0x2d0 [ 22.645592] ret_from_fork+0x10/0x20 [ 22.645646] [ 22.650361] Allocated by task 248: [ 22.650788] kasan_save_stack+0x3c/0x68 [ 22.651300] kasan_save_track+0x20/0x40 [ 22.651786] kasan_save_alloc_info+0x40/0x58 [ 22.652209] __kasan_kmalloc+0xd4/0xd8 [ 22.652671] __kmalloc_cache_noprof+0x154/0x320 [ 22.653197] kasan_bitops_generic+0xa0/0x1d0 [ 22.653729] kunit_try_run_case+0x170/0x3f0 [ 22.654086] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.654662] kthread+0x24c/0x2d0 [ 22.655024] ret_from_fork+0x10/0x20 [ 22.655485] [ 22.655771] The buggy address belongs to the object at fff00000c5bb22a0 [ 22.655771] which belongs to the cache kmalloc-16 of size 16 [ 22.656615] The buggy address is located 8 bytes inside of [ 22.656615] allocated 9-byte region [fff00000c5bb22a0, fff00000c5bb22a9) [ 22.657500] [ 22.657814] The buggy address belongs to the physical page: [ 22.658234] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bb2 [ 22.659053] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.659744] page_type: f5(slab) [ 22.660120] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 22.660710] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 22.661330] page dumped because: kasan: bad access detected [ 22.661880] [ 22.662167] Memory state around the buggy address: [ 22.662639] fff00000c5bb2180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.663202] fff00000c5bb2200: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 22.663777] >fff00000c5bb2280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 22.664253] ^ [ 22.664762] fff00000c5bb2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.665347] fff00000c5bb2380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.665911] ================================================================== [ 22.807527] ================================================================== [ 22.808254] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa84/0xc08 [ 22.808948] Read of size 8 at addr fff00000c5bb22a8 by task kunit_try_catch/248 [ 22.809491] [ 22.809802] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 22.810006] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.810083] Hardware name: linux,dummy-virt (DT) [ 22.810173] Call trace: [ 22.810248] dump_backtrace+0x9c/0x128 [ 22.810372] show_stack+0x20/0x38 [ 22.810463] dump_stack_lvl+0x8c/0xd0 [ 22.810570] print_report+0x118/0x5f0 [ 22.810665] kasan_report+0xdc/0x128 [ 22.810730] __asan_report_load8_noabort+0x20/0x30 [ 22.810786] kasan_bitops_test_and_modify.constprop.0+0xa84/0xc08 [ 22.810844] kasan_bitops_generic+0x120/0x1d0 [ 22.810894] kunit_try_run_case+0x170/0x3f0 [ 22.810945] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.810999] kthread+0x24c/0x2d0 [ 22.811046] ret_from_fork+0x10/0x20 [ 22.811163] [ 22.816082] Allocated by task 248: [ 22.816511] kasan_save_stack+0x3c/0x68 [ 22.816868] kasan_save_track+0x20/0x40 [ 22.817356] kasan_save_alloc_info+0x40/0x58 [ 22.817779] __kasan_kmalloc+0xd4/0xd8 [ 22.818196] __kmalloc_cache_noprof+0x154/0x320 [ 22.818590] kasan_bitops_generic+0xa0/0x1d0 [ 22.819100] kunit_try_run_case+0x170/0x3f0 [ 22.819480] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.819993] kthread+0x24c/0x2d0 [ 22.820366] ret_from_fork+0x10/0x20 [ 22.820713] [ 22.821007] The buggy address belongs to the object at fff00000c5bb22a0 [ 22.821007] which belongs to the cache kmalloc-16 of size 16 [ 22.821959] The buggy address is located 8 bytes inside of [ 22.821959] allocated 9-byte region [fff00000c5bb22a0, fff00000c5bb22a9) [ 22.822840] [ 22.823133] The buggy address belongs to the physical page: [ 22.823660] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bb2 [ 22.824363] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.825006] page_type: f5(slab) [ 22.825434] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 22.826156] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 22.826793] page dumped because: kasan: bad access detected [ 22.827083] [ 22.827226] Memory state around the buggy address: [ 22.827943] fff00000c5bb2180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.828544] fff00000c5bb2200: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 22.828908] >fff00000c5bb2280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 22.829594] ^ [ 22.829934] fff00000c5bb2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.830665] fff00000c5bb2380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.831180] ================================================================== [ 22.781042] ================================================================== [ 22.781524] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x34c/0xc08 [ 22.782098] Write of size 8 at addr fff00000c5bb22a8 by task kunit_try_catch/248 [ 22.782603] [ 22.782958] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 22.783194] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.783520] Hardware name: linux,dummy-virt (DT) [ 22.783597] Call trace: [ 22.783634] dump_backtrace+0x9c/0x128 [ 22.783703] show_stack+0x20/0x38 [ 22.783749] dump_stack_lvl+0x8c/0xd0 [ 22.783799] print_report+0x118/0x5f0 [ 22.783847] kasan_report+0xdc/0x128 [ 22.783892] kasan_check_range+0x100/0x1a8 [ 22.783940] __kasan_check_write+0x20/0x30 [ 22.783987] kasan_bitops_test_and_modify.constprop.0+0x34c/0xc08 [ 22.784047] kasan_bitops_generic+0x120/0x1d0 [ 22.784097] kunit_try_run_case+0x170/0x3f0 [ 22.784148] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.784203] kthread+0x24c/0x2d0 [ 22.784278] ret_from_fork+0x10/0x20 [ 22.784336] [ 22.790208] Allocated by task 248: [ 22.790632] kasan_save_stack+0x3c/0x68 [ 22.790995] kasan_save_track+0x20/0x40 [ 22.791480] kasan_save_alloc_info+0x40/0x58 [ 22.791836] __kasan_kmalloc+0xd4/0xd8 [ 22.792307] __kmalloc_cache_noprof+0x154/0x320 [ 22.792686] kasan_bitops_generic+0xa0/0x1d0 [ 22.793190] kunit_try_run_case+0x170/0x3f0 [ 22.793561] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.794161] kthread+0x24c/0x2d0 [ 22.794490] ret_from_fork+0x10/0x20 [ 22.794948] [ 22.795214] The buggy address belongs to the object at fff00000c5bb22a0 [ 22.795214] which belongs to the cache kmalloc-16 of size 16 [ 22.796432] The buggy address is located 8 bytes inside of [ 22.796432] allocated 9-byte region [fff00000c5bb22a0, fff00000c5bb22a9) [ 22.797424] [ 22.797727] The buggy address belongs to the physical page: [ 22.798278] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bb2 [ 22.798973] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.799489] page_type: f5(slab) [ 22.799928] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 22.800605] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 22.801138] page dumped because: kasan: bad access detected [ 22.801688] [ 22.801959] Memory state around the buggy address: [ 22.802456] fff00000c5bb2180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.802999] fff00000c5bb2200: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 22.803657] >fff00000c5bb2280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 22.804308] ^ [ 22.804844] fff00000c5bb2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.805431] fff00000c5bb2380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.806042] ==================================================================
[ 14.383441] ================================================================== [ 14.383831] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90 [ 14.384188] Read of size 8 at addr ffff8881024e41c8 by task kunit_try_catch/266 [ 14.384451] [ 14.384574] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 14.384615] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.384627] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.384667] Call Trace: [ 14.384685] <TASK> [ 14.384699] dump_stack_lvl+0x73/0xb0 [ 14.384723] print_report+0xd1/0x640 [ 14.384745] ? __virt_addr_valid+0x1db/0x2d0 [ 14.384767] ? kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90 [ 14.384805] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.384830] ? kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90 [ 14.384862] kasan_report+0x140/0x180 [ 14.384893] ? kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90 [ 14.384928] __asan_report_load8_noabort+0x18/0x20 [ 14.384948] kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90 [ 14.384980] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.385013] ? ret_from_fork_asm+0x1a/0x30 [ 14.385032] ? ret_from_fork+0x41/0x80 [ 14.385067] ? kthread+0x257/0x310 [ 14.385092] kasan_bitops_generic+0x122/0x1c0 [ 14.385113] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.385134] ? __pfx_read_tsc+0x10/0x10 [ 14.385151] ? ktime_get_ts64+0x84/0x230 [ 14.385176] kunit_try_run_case+0x1a6/0x480 [ 14.385197] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.385216] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 14.385235] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.385259] ? __kthread_parkme+0x82/0x160 [ 14.385277] ? preempt_count_sub+0x50/0x80 [ 14.385298] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.385318] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.385342] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.385368] kthread+0x257/0x310 [ 14.385385] ? __pfx_kthread+0x10/0x10 [ 14.385404] ret_from_fork+0x41/0x80 [ 14.385440] ? __pfx_kthread+0x10/0x10 [ 14.385461] ret_from_fork_asm+0x1a/0x30 [ 14.385489] </TASK> [ 14.385500] [ 14.391214] Allocated by task 266: [ 14.391357] kasan_save_stack+0x45/0x70 [ 14.391495] kasan_save_track+0x18/0x40 [ 14.391712] kasan_save_alloc_info+0x3b/0x50 [ 14.391860] __kasan_kmalloc+0xb7/0xc0 [ 14.391992] __kmalloc_cache_noprof+0x168/0x350 [ 14.392177] kasan_bitops_generic+0x93/0x1c0 [ 14.392270] kunit_try_run_case+0x1a6/0x480 [ 14.392490] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.392761] kthread+0x257/0x310 [ 14.392874] ret_from_fork+0x41/0x80 [ 14.393029] ret_from_fork_asm+0x1a/0x30 [ 14.393229] [ 14.393298] The buggy address belongs to the object at ffff8881024e41c0 [ 14.393298] which belongs to the cache kmalloc-16 of size 16 [ 14.393679] The buggy address is located 8 bytes inside of [ 14.393679] allocated 9-byte region [ffff8881024e41c0, ffff8881024e41c9) [ 14.393902] [ 14.393971] The buggy address belongs to the physical page: [ 14.394125] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024e4 [ 14.394309] flags: 0x200000000000000(node=0|zone=2) [ 14.394433] page_type: f5(slab) [ 14.394528] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.394704] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 14.394877] page dumped because: kasan: bad access detected [ 14.395001] [ 14.395086] Memory state around the buggy address: [ 14.395309] ffff8881024e4080: fa fb fc fc 00 03 fc fc 00 03 fc fc 00 05 fc fc [ 14.395680] ffff8881024e4100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.396026] >ffff8881024e4180: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 14.396409] ^ [ 14.396709] ffff8881024e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.397097] ffff8881024e4280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.397461] ================================================================== [ 14.338071] ================================================================== [ 14.338495] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90 [ 14.338881] Write of size 8 at addr ffff8881024e41c8 by task kunit_try_catch/266 [ 14.339275] [ 14.339393] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 14.339451] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.339464] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.339484] Call Trace: [ 14.339499] <TASK> [ 14.339515] dump_stack_lvl+0x73/0xb0 [ 14.339553] print_report+0xd1/0x640 [ 14.339580] ? __virt_addr_valid+0x1db/0x2d0 [ 14.339604] ? kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90 [ 14.339627] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.339649] ? kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90 [ 14.339682] kasan_report+0x140/0x180 [ 14.339707] ? kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90 [ 14.339750] kasan_check_range+0x10c/0x1c0 [ 14.339774] __kasan_check_write+0x18/0x20 [ 14.339795] kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90 [ 14.339819] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.339845] ? ret_from_fork_asm+0x1a/0x30 [ 14.339864] ? ret_from_fork+0x41/0x80 [ 14.339884] ? kthread+0x257/0x310 [ 14.339905] kasan_bitops_generic+0x122/0x1c0 [ 14.339925] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.339946] ? __pfx_read_tsc+0x10/0x10 [ 14.339965] ? ktime_get_ts64+0x84/0x230 [ 14.339989] kunit_try_run_case+0x1a6/0x480 [ 14.340010] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.340030] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 14.340070] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.340099] ? __kthread_parkme+0x82/0x160 [ 14.340119] ? preempt_count_sub+0x50/0x80 [ 14.340141] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.340162] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.340187] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.340213] kthread+0x257/0x310 [ 14.340232] ? __pfx_kthread+0x10/0x10 [ 14.340251] ret_from_fork+0x41/0x80 [ 14.340272] ? __pfx_kthread+0x10/0x10 [ 14.340290] ret_from_fork_asm+0x1a/0x30 [ 14.340320] </TASK> [ 14.340332] [ 14.345590] Allocated by task 266: [ 14.345681] kasan_save_stack+0x45/0x70 [ 14.345775] kasan_save_track+0x18/0x40 [ 14.345862] kasan_save_alloc_info+0x3b/0x50 [ 14.345957] __kasan_kmalloc+0xb7/0xc0 [ 14.346168] __kmalloc_cache_noprof+0x168/0x350 [ 14.346377] kasan_bitops_generic+0x93/0x1c0 [ 14.346619] kunit_try_run_case+0x1a6/0x480 [ 14.346855] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.347148] kthread+0x257/0x310 [ 14.347339] ret_from_fork+0x41/0x80 [ 14.347541] ret_from_fork_asm+0x1a/0x30 [ 14.347668] [ 14.347755] The buggy address belongs to the object at ffff8881024e41c0 [ 14.347755] which belongs to the cache kmalloc-16 of size 16 [ 14.348072] The buggy address is located 8 bytes inside of [ 14.348072] allocated 9-byte region [ffff8881024e41c0, ffff8881024e41c9) [ 14.348375] [ 14.348492] The buggy address belongs to the physical page: [ 14.348592] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024e4 [ 14.348734] flags: 0x200000000000000(node=0|zone=2) [ 14.348833] page_type: f5(slab) [ 14.348911] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.349039] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 14.349408] page dumped because: kasan: bad access detected [ 14.349693] [ 14.349794] Memory state around the buggy address: [ 14.350024] ffff8881024e4080: fa fb fc fc 00 03 fc fc 00 03 fc fc 00 05 fc fc [ 14.350318] ffff8881024e4100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.350641] >ffff8881024e4180: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 14.350876] ^ [ 14.351032] ffff8881024e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.351240] ffff8881024e4280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.351360] ================================================================== [ 14.272403] ================================================================== [ 14.272630] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90 [ 14.272846] Write of size 8 at addr ffff8881024e41c8 by task kunit_try_catch/266 [ 14.272985] [ 14.273119] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 14.273165] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.273178] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.273199] Call Trace: [ 14.273216] <TASK> [ 14.273232] dump_stack_lvl+0x73/0xb0 [ 14.273257] print_report+0xd1/0x640 [ 14.273279] ? __virt_addr_valid+0x1db/0x2d0 [ 14.273302] ? kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90 [ 14.273325] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.273347] ? kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90 [ 14.273371] kasan_report+0x140/0x180 [ 14.273394] ? kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90 [ 14.273423] kasan_check_range+0x10c/0x1c0 [ 14.273445] __kasan_check_write+0x18/0x20 [ 14.274231] kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90 [ 14.274263] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.274291] ? ret_from_fork_asm+0x1a/0x30 [ 14.274311] ? ret_from_fork+0x41/0x80 [ 14.274333] ? kthread+0x257/0x310 [ 14.274358] kasan_bitops_generic+0x122/0x1c0 [ 14.274379] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.274401] ? __pfx_read_tsc+0x10/0x10 [ 14.274420] ? ktime_get_ts64+0x84/0x230 [ 14.274445] kunit_try_run_case+0x1a6/0x480 [ 14.274578] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.274742] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 14.274788] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.275144] ? __kthread_parkme+0x82/0x160 [ 14.275166] ? preempt_count_sub+0x50/0x80 [ 14.275192] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.275213] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.275240] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.275266] kthread+0x257/0x310 [ 14.275284] ? __pfx_kthread+0x10/0x10 [ 14.275303] ret_from_fork+0x41/0x80 [ 14.275322] ? __pfx_kthread+0x10/0x10 [ 14.275341] ret_from_fork_asm+0x1a/0x30 [ 14.275370] </TASK> [ 14.275382] [ 14.282821] Allocated by task 266: [ 14.283013] kasan_save_stack+0x45/0x70 [ 14.283321] kasan_save_track+0x18/0x40 [ 14.283595] kasan_save_alloc_info+0x3b/0x50 [ 14.283779] __kasan_kmalloc+0xb7/0xc0 [ 14.283918] __kmalloc_cache_noprof+0x168/0x350 [ 14.284169] kasan_bitops_generic+0x93/0x1c0 [ 14.284338] kunit_try_run_case+0x1a6/0x480 [ 14.284434] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.284761] kthread+0x257/0x310 [ 14.284983] ret_from_fork+0x41/0x80 [ 14.285206] ret_from_fork_asm+0x1a/0x30 [ 14.285308] [ 14.285360] The buggy address belongs to the object at ffff8881024e41c0 [ 14.285360] which belongs to the cache kmalloc-16 of size 16 [ 14.285557] The buggy address is located 8 bytes inside of [ 14.285557] allocated 9-byte region [ffff8881024e41c0, ffff8881024e41c9) [ 14.286267] [ 14.286390] The buggy address belongs to the physical page: [ 14.286547] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024e4 [ 14.286862] flags: 0x200000000000000(node=0|zone=2) [ 14.286983] page_type: f5(slab) [ 14.287084] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.287215] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 14.287614] page dumped because: kasan: bad access detected [ 14.287942] [ 14.288070] Memory state around the buggy address: [ 14.288269] ffff8881024e4080: fa fb fc fc 00 03 fc fc 00 03 fc fc 00 05 fc fc [ 14.288486] ffff8881024e4100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.288612] >ffff8881024e4180: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 14.288911] ^ [ 14.289262] ffff8881024e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.289580] ffff8881024e4280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.289733] ================================================================== [ 14.322409] ================================================================== [ 14.322889] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90 [ 14.323300] Write of size 8 at addr ffff8881024e41c8 by task kunit_try_catch/266 [ 14.323438] [ 14.323506] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 14.323569] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.323583] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.323604] Call Trace: [ 14.323620] <TASK> [ 14.323638] dump_stack_lvl+0x73/0xb0 [ 14.323672] print_report+0xd1/0x640 [ 14.323717] ? __virt_addr_valid+0x1db/0x2d0 [ 14.323742] ? kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90 [ 14.323766] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.323790] ? kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90 [ 14.323815] kasan_report+0x140/0x180 [ 14.323860] ? kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90 [ 14.323890] kasan_check_range+0x10c/0x1c0 [ 14.323913] __kasan_check_write+0x18/0x20 [ 14.323934] kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90 [ 14.323960] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.324006] ? ret_from_fork_asm+0x1a/0x30 [ 14.324028] ? ret_from_fork+0x41/0x80 [ 14.324049] ? kthread+0x257/0x310 [ 14.324093] kasan_bitops_generic+0x122/0x1c0 [ 14.324115] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.324153] ? __pfx_read_tsc+0x10/0x10 [ 14.324177] ? ktime_get_ts64+0x84/0x230 [ 14.324205] kunit_try_run_case+0x1a6/0x480 [ 14.324228] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.324249] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 14.324272] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.324316] ? __kthread_parkme+0x82/0x160 [ 14.324339] ? preempt_count_sub+0x50/0x80 [ 14.324362] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.324382] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.324407] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.324449] kthread+0x257/0x310 [ 14.324470] ? __pfx_kthread+0x10/0x10 [ 14.324491] ret_from_fork+0x41/0x80 [ 14.324512] ? __pfx_kthread+0x10/0x10 [ 14.324530] ret_from_fork_asm+0x1a/0x30 [ 14.324559] </TASK> [ 14.324571] [ 14.330473] Allocated by task 266: [ 14.330641] kasan_save_stack+0x45/0x70 [ 14.330871] kasan_save_track+0x18/0x40 [ 14.331022] kasan_save_alloc_info+0x3b/0x50 [ 14.331175] __kasan_kmalloc+0xb7/0xc0 [ 14.331365] __kmalloc_cache_noprof+0x168/0x350 [ 14.331569] kasan_bitops_generic+0x93/0x1c0 [ 14.331756] kunit_try_run_case+0x1a6/0x480 [ 14.331938] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.332182] kthread+0x257/0x310 [ 14.332387] ret_from_fork+0x41/0x80 [ 14.332516] ret_from_fork_asm+0x1a/0x30 [ 14.332714] [ 14.332831] The buggy address belongs to the object at ffff8881024e41c0 [ 14.332831] which belongs to the cache kmalloc-16 of size 16 [ 14.333176] The buggy address is located 8 bytes inside of [ 14.333176] allocated 9-byte region [ffff8881024e41c0, ffff8881024e41c9) [ 14.333413] [ 14.333475] The buggy address belongs to the physical page: [ 14.333585] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024e4 [ 14.333764] flags: 0x200000000000000(node=0|zone=2) [ 14.333890] page_type: f5(slab) [ 14.334018] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.334218] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 14.334396] page dumped because: kasan: bad access detected [ 14.334523] [ 14.334581] Memory state around the buggy address: [ 14.334723] ffff8881024e4080: fa fb fc fc 00 03 fc fc 00 03 fc fc 00 05 fc fc [ 14.335038] ffff8881024e4100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.335413] >ffff8881024e4180: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 14.335768] ^ [ 14.336069] ffff8881024e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.336459] ffff8881024e4280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.336854] ================================================================== [ 14.253632] ================================================================== [ 14.254081] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x102/0xd90 [ 14.254488] Write of size 8 at addr ffff8881024e41c8 by task kunit_try_catch/266 [ 14.254894] [ 14.255019] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 14.255081] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.255095] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.255117] Call Trace: [ 14.255133] <TASK> [ 14.255150] dump_stack_lvl+0x73/0xb0 [ 14.255176] print_report+0xd1/0x640 [ 14.255198] ? __virt_addr_valid+0x1db/0x2d0 [ 14.255222] ? kasan_bitops_test_and_modify.constprop.0+0x102/0xd90 [ 14.255246] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.255268] ? kasan_bitops_test_and_modify.constprop.0+0x102/0xd90 [ 14.255293] kasan_report+0x140/0x180 [ 14.255316] ? kasan_bitops_test_and_modify.constprop.0+0x102/0xd90 [ 14.255345] kasan_check_range+0x10c/0x1c0 [ 14.255366] __kasan_check_write+0x18/0x20 [ 14.255387] kasan_bitops_test_and_modify.constprop.0+0x102/0xd90 [ 14.255413] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.255439] ? ret_from_fork_asm+0x1a/0x30 [ 14.255459] ? ret_from_fork+0x41/0x80 [ 14.255479] ? kthread+0x257/0x310 [ 14.255501] kasan_bitops_generic+0x122/0x1c0 [ 14.255522] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.255544] ? __pfx_read_tsc+0x10/0x10 [ 14.255562] ? ktime_get_ts64+0x84/0x230 [ 14.255588] kunit_try_run_case+0x1a6/0x480 [ 14.255609] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.255630] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 14.255651] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.255685] ? __kthread_parkme+0x82/0x160 [ 14.255706] ? preempt_count_sub+0x50/0x80 [ 14.255729] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.255749] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.255776] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.255801] kthread+0x257/0x310 [ 14.255820] ? __pfx_kthread+0x10/0x10 [ 14.255839] ret_from_fork+0x41/0x80 [ 14.255858] ? __pfx_kthread+0x10/0x10 [ 14.255877] ret_from_fork_asm+0x1a/0x30 [ 14.255907] </TASK> [ 14.255919] [ 14.261875] Allocated by task 266: [ 14.262064] kasan_save_stack+0x45/0x70 [ 14.262172] kasan_save_track+0x18/0x40 [ 14.262265] kasan_save_alloc_info+0x3b/0x50 [ 14.262358] __kasan_kmalloc+0xb7/0xc0 [ 14.262443] __kmalloc_cache_noprof+0x168/0x350 [ 14.262538] kasan_bitops_generic+0x93/0x1c0 [ 14.262630] kunit_try_run_case+0x1a6/0x480 [ 14.262728] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.262840] kthread+0x257/0x310 [ 14.263000] ret_from_fork+0x41/0x80 [ 14.263238] ret_from_fork_asm+0x1a/0x30 [ 14.263489] [ 14.263613] The buggy address belongs to the object at ffff8881024e41c0 [ 14.263613] which belongs to the cache kmalloc-16 of size 16 [ 14.264301] The buggy address is located 8 bytes inside of [ 14.264301] allocated 9-byte region [ffff8881024e41c0, ffff8881024e41c9) [ 14.264784] [ 14.264839] The buggy address belongs to the physical page: [ 14.264938] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024e4 [ 14.265091] flags: 0x200000000000000(node=0|zone=2) [ 14.265346] page_type: f5(slab) [ 14.265534] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.265851] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 14.266114] page dumped because: kasan: bad access detected [ 14.266214] [ 14.266262] Memory state around the buggy address: [ 14.266355] ffff8881024e4080: fa fb fc fc 00 03 fc fc 00 03 fc fc 00 05 fc fc [ 14.266606] ffff8881024e4100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.266823] >ffff8881024e4180: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 14.267040] ^ [ 14.269444] ffff8881024e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.269772] ffff8881024e4280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.269971] ================================================================== [ 14.290230] ================================================================== [ 14.290626] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90 [ 14.291092] Write of size 8 at addr ffff8881024e41c8 by task kunit_try_catch/266 [ 14.291332] [ 14.291402] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 14.291447] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.291459] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.291482] Call Trace: [ 14.291500] <TASK> [ 14.291520] dump_stack_lvl+0x73/0xb0 [ 14.291548] print_report+0xd1/0x640 [ 14.291571] ? __virt_addr_valid+0x1db/0x2d0 [ 14.291594] ? kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90 [ 14.291618] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.291641] ? kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90 [ 14.291674] kasan_report+0x140/0x180 [ 14.291966] ? kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90 [ 14.292025] kasan_check_range+0x10c/0x1c0 [ 14.292048] __kasan_check_write+0x18/0x20 [ 14.292068] kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90 [ 14.292105] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.292132] ? ret_from_fork_asm+0x1a/0x30 [ 14.292151] ? ret_from_fork+0x41/0x80 [ 14.292171] ? kthread+0x257/0x310 [ 14.292192] kasan_bitops_generic+0x122/0x1c0 [ 14.292212] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.292233] ? __pfx_read_tsc+0x10/0x10 [ 14.292251] ? ktime_get_ts64+0x84/0x230 [ 14.292275] kunit_try_run_case+0x1a6/0x480 [ 14.292297] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.292317] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 14.292339] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.292364] ? __kthread_parkme+0x82/0x160 [ 14.292382] ? preempt_count_sub+0x50/0x80 [ 14.292404] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.292424] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.292449] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.292474] kthread+0x257/0x310 [ 14.292491] ? __pfx_kthread+0x10/0x10 [ 14.292510] ret_from_fork+0x41/0x80 [ 14.292529] ? __pfx_kthread+0x10/0x10 [ 14.292547] ret_from_fork_asm+0x1a/0x30 [ 14.292576] </TASK> [ 14.292587] [ 14.298209] Allocated by task 266: [ 14.298350] kasan_save_stack+0x45/0x70 [ 14.298567] kasan_save_track+0x18/0x40 [ 14.298817] kasan_save_alloc_info+0x3b/0x50 [ 14.298913] __kasan_kmalloc+0xb7/0xc0 [ 14.298999] __kmalloc_cache_noprof+0x168/0x350 [ 14.299113] kasan_bitops_generic+0x93/0x1c0 [ 14.299204] kunit_try_run_case+0x1a6/0x480 [ 14.299291] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.299393] kthread+0x257/0x310 [ 14.299465] ret_from_fork+0x41/0x80 [ 14.299544] ret_from_fork_asm+0x1a/0x30 [ 14.299626] [ 14.299683] The buggy address belongs to the object at ffff8881024e41c0 [ 14.299683] which belongs to the cache kmalloc-16 of size 16 [ 14.299880] The buggy address is located 8 bytes inside of [ 14.299880] allocated 9-byte region [ffff8881024e41c0, ffff8881024e41c9) [ 14.300453] [ 14.300573] The buggy address belongs to the physical page: [ 14.300842] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024e4 [ 14.301236] flags: 0x200000000000000(node=0|zone=2) [ 14.301470] page_type: f5(slab) [ 14.301670] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.302031] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 14.302376] page dumped because: kasan: bad access detected [ 14.302546] [ 14.302657] Memory state around the buggy address: [ 14.302801] ffff8881024e4080: fa fb fc fc 00 03 fc fc 00 03 fc fc 00 05 fc fc [ 14.302963] ffff8881024e4100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.303138] >ffff8881024e4180: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 14.303518] ^ [ 14.303823] ffff8881024e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.304219] ffff8881024e4280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.304338] ================================================================== [ 14.367856] ================================================================== [ 14.368407] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x558/0xd90 [ 14.368794] Read of size 8 at addr ffff8881024e41c8 by task kunit_try_catch/266 [ 14.368959] [ 14.369113] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 14.369167] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.369180] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.369199] Call Trace: [ 14.369217] <TASK> [ 14.369232] dump_stack_lvl+0x73/0xb0 [ 14.369256] print_report+0xd1/0x640 [ 14.369279] ? __virt_addr_valid+0x1db/0x2d0 [ 14.369301] ? kasan_bitops_test_and_modify.constprop.0+0x558/0xd90 [ 14.369323] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.369346] ? kasan_bitops_test_and_modify.constprop.0+0x558/0xd90 [ 14.369370] kasan_report+0x140/0x180 [ 14.369411] ? kasan_bitops_test_and_modify.constprop.0+0x558/0xd90 [ 14.369441] kasan_check_range+0x10c/0x1c0 [ 14.369477] __kasan_check_read+0x15/0x20 [ 14.369499] kasan_bitops_test_and_modify.constprop.0+0x558/0xd90 [ 14.369524] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.369548] ? ret_from_fork_asm+0x1a/0x30 [ 14.369568] ? ret_from_fork+0x41/0x80 [ 14.369588] ? kthread+0x257/0x310 [ 14.369609] kasan_bitops_generic+0x122/0x1c0 [ 14.369629] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.369650] ? __pfx_read_tsc+0x10/0x10 [ 14.369678] ? ktime_get_ts64+0x84/0x230 [ 14.369705] kunit_try_run_case+0x1a6/0x480 [ 14.369727] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.369747] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 14.369767] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.369792] ? __kthread_parkme+0x82/0x160 [ 14.369811] ? preempt_count_sub+0x50/0x80 [ 14.369832] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.369852] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.369876] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.369910] kthread+0x257/0x310 [ 14.369932] ? __pfx_kthread+0x10/0x10 [ 14.369953] ret_from_fork+0x41/0x80 [ 14.369974] ? __pfx_kthread+0x10/0x10 [ 14.369993] ret_from_fork_asm+0x1a/0x30 [ 14.370024] </TASK> [ 14.370035] [ 14.375831] Allocated by task 266: [ 14.375937] kasan_save_stack+0x45/0x70 [ 14.376079] kasan_save_track+0x18/0x40 [ 14.376200] kasan_save_alloc_info+0x3b/0x50 [ 14.376320] __kasan_kmalloc+0xb7/0xc0 [ 14.376509] __kmalloc_cache_noprof+0x168/0x350 [ 14.376780] kasan_bitops_generic+0x93/0x1c0 [ 14.377022] kunit_try_run_case+0x1a6/0x480 [ 14.377283] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.377590] kthread+0x257/0x310 [ 14.377800] ret_from_fork+0x41/0x80 [ 14.378048] ret_from_fork_asm+0x1a/0x30 [ 14.378324] [ 14.378383] The buggy address belongs to the object at ffff8881024e41c0 [ 14.378383] which belongs to the cache kmalloc-16 of size 16 [ 14.378597] The buggy address is located 8 bytes inside of [ 14.378597] allocated 9-byte region [ffff8881024e41c0, ffff8881024e41c9) [ 14.379272] [ 14.379380] The buggy address belongs to the physical page: [ 14.379548] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024e4 [ 14.379796] flags: 0x200000000000000(node=0|zone=2) [ 14.379960] page_type: f5(slab) [ 14.380086] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.380260] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 14.380423] page dumped because: kasan: bad access detected [ 14.380549] [ 14.380615] Memory state around the buggy address: [ 14.380731] ffff8881024e4080: fa fb fc fc 00 03 fc fc 00 03 fc fc 00 05 fc fc [ 14.380908] ffff8881024e4100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.381275] >ffff8881024e4180: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 14.381651] ^ [ 14.382020] ffff8881024e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.382414] ffff8881024e4280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.382787] ================================================================== [ 14.305237] ================================================================== [ 14.305684] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90 [ 14.306407] Write of size 8 at addr ffff8881024e41c8 by task kunit_try_catch/266 [ 14.306697] [ 14.306835] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 14.306892] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.306905] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.306926] Call Trace: [ 14.306943] <TASK> [ 14.306960] dump_stack_lvl+0x73/0xb0 [ 14.306991] print_report+0xd1/0x640 [ 14.307014] ? __virt_addr_valid+0x1db/0x2d0 [ 14.307037] ? kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90 [ 14.307083] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.307109] ? kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90 [ 14.307133] kasan_report+0x140/0x180 [ 14.307156] ? kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90 [ 14.307185] kasan_check_range+0x10c/0x1c0 [ 14.307206] __kasan_check_write+0x18/0x20 [ 14.307226] kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90 [ 14.307251] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.307276] ? ret_from_fork_asm+0x1a/0x30 [ 14.307296] ? ret_from_fork+0x41/0x80 [ 14.307316] ? kthread+0x257/0x310 [ 14.307339] kasan_bitops_generic+0x122/0x1c0 [ 14.307359] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.307380] ? __pfx_read_tsc+0x10/0x10 [ 14.307399] ? ktime_get_ts64+0x84/0x230 [ 14.307423] kunit_try_run_case+0x1a6/0x480 [ 14.307445] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.307465] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 14.307486] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.307510] ? __kthread_parkme+0x82/0x160 [ 14.307529] ? preempt_count_sub+0x50/0x80 [ 14.307551] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.307571] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.307596] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.307633] kthread+0x257/0x310 [ 14.307659] ? __pfx_kthread+0x10/0x10 [ 14.307689] ret_from_fork+0x41/0x80 [ 14.307719] ? __pfx_kthread+0x10/0x10 [ 14.307738] ret_from_fork_asm+0x1a/0x30 [ 14.307767] </TASK> [ 14.307779] [ 14.313885] Allocated by task 266: [ 14.314133] kasan_save_stack+0x45/0x70 [ 14.314333] kasan_save_track+0x18/0x40 [ 14.314504] kasan_save_alloc_info+0x3b/0x50 [ 14.314761] __kasan_kmalloc+0xb7/0xc0 [ 14.314914] __kmalloc_cache_noprof+0x168/0x350 [ 14.315137] kasan_bitops_generic+0x93/0x1c0 [ 14.315385] kunit_try_run_case+0x1a6/0x480 [ 14.315605] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.315871] kthread+0x257/0x310 [ 14.316030] ret_from_fork+0x41/0x80 [ 14.316245] ret_from_fork_asm+0x1a/0x30 [ 14.316448] [ 14.316564] The buggy address belongs to the object at ffff8881024e41c0 [ 14.316564] which belongs to the cache kmalloc-16 of size 16 [ 14.316924] The buggy address is located 8 bytes inside of [ 14.316924] allocated 9-byte region [ffff8881024e41c0, ffff8881024e41c9) [ 14.317374] [ 14.317472] The buggy address belongs to the physical page: [ 14.317701] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024e4 [ 14.317987] flags: 0x200000000000000(node=0|zone=2) [ 14.318174] page_type: f5(slab) [ 14.318369] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.318612] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 14.319040] page dumped because: kasan: bad access detected [ 14.319218] [ 14.319285] Memory state around the buggy address: [ 14.319398] ffff8881024e4080: fa fb fc fc 00 03 fc fc 00 03 fc fc 00 05 fc fc [ 14.319534] ffff8881024e4100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.319673] >ffff8881024e4180: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 14.320106] ^ [ 14.320397] ffff8881024e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.320802] ffff8881024e4280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.321213] ================================================================== [ 14.351794] ================================================================== [ 14.352214] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90 [ 14.352630] Write of size 8 at addr ffff8881024e41c8 by task kunit_try_catch/266 [ 14.353000] [ 14.353128] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 14.353168] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.353180] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.353201] Call Trace: [ 14.353216] <TASK> [ 14.353231] dump_stack_lvl+0x73/0xb0 [ 14.353254] print_report+0xd1/0x640 [ 14.353276] ? __virt_addr_valid+0x1db/0x2d0 [ 14.353298] ? kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90 [ 14.353321] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.353343] ? kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90 [ 14.353366] kasan_report+0x140/0x180 [ 14.353388] ? kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90 [ 14.353415] kasan_check_range+0x10c/0x1c0 [ 14.353435] __kasan_check_write+0x18/0x20 [ 14.353454] kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90 [ 14.353477] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.353502] ? ret_from_fork_asm+0x1a/0x30 [ 14.353520] ? ret_from_fork+0x41/0x80 [ 14.353540] ? kthread+0x257/0x310 [ 14.353561] kasan_bitops_generic+0x122/0x1c0 [ 14.353580] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.353601] ? __pfx_read_tsc+0x10/0x10 [ 14.353619] ? ktime_get_ts64+0x84/0x230 [ 14.353643] kunit_try_run_case+0x1a6/0x480 [ 14.353672] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.353695] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 14.353716] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.353740] ? __kthread_parkme+0x82/0x160 [ 14.353758] ? preempt_count_sub+0x50/0x80 [ 14.353779] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.353799] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.353823] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.353848] kthread+0x257/0x310 [ 14.353865] ? __pfx_kthread+0x10/0x10 [ 14.353883] ret_from_fork+0x41/0x80 [ 14.353912] ? __pfx_kthread+0x10/0x10 [ 14.353934] ret_from_fork_asm+0x1a/0x30 [ 14.353964] </TASK> [ 14.353976] [ 14.358617] Allocated by task 266: [ 14.358708] kasan_save_stack+0x45/0x70 [ 14.358801] kasan_save_track+0x18/0x40 [ 14.358886] kasan_save_alloc_info+0x3b/0x50 [ 14.358976] __kasan_kmalloc+0xb7/0xc0 [ 14.359190] __kmalloc_cache_noprof+0x168/0x350 [ 14.359384] kasan_bitops_generic+0x93/0x1c0 [ 14.359618] kunit_try_run_case+0x1a6/0x480 [ 14.359866] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.360268] kthread+0x257/0x310 [ 14.360453] ret_from_fork+0x41/0x80 [ 14.360921] ret_from_fork_asm+0x1a/0x30 [ 14.361644] [ 14.361780] The buggy address belongs to the object at ffff8881024e41c0 [ 14.361780] which belongs to the cache kmalloc-16 of size 16 [ 14.362694] The buggy address is located 8 bytes inside of [ 14.362694] allocated 9-byte region [ffff8881024e41c0, ffff8881024e41c9) [ 14.364276] [ 14.364404] The buggy address belongs to the physical page: [ 14.364716] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024e4 [ 14.364852] flags: 0x200000000000000(node=0|zone=2) [ 14.364951] page_type: f5(slab) [ 14.365028] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.365153] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 14.365272] page dumped because: kasan: bad access detected [ 14.365568] [ 14.365704] Memory state around the buggy address: [ 14.365965] ffff8881024e4080: fa fb fc fc 00 03 fc fc 00 03 fc fc 00 05 fc fc [ 14.366323] ffff8881024e4100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.366552] >ffff8881024e4180: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 14.366744] ^ [ 14.366850] ffff8881024e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.366971] ffff8881024e4280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.367174] ==================================================================