Date
June 7, 2025, 10:40 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 24.719945] ================================================================== [ 24.721111] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1e4/0xc08 [ 24.721849] Write of size 8 at addr fff00000c662ada8 by task kunit_try_catch/249 [ 24.722787] [ 24.723193] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 24.723415] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.723495] Hardware name: linux,dummy-virt (DT) [ 24.724009] Call trace: [ 24.724087] dump_backtrace+0x9c/0x128 [ 24.724248] show_stack+0x20/0x38 [ 24.724366] dump_stack_lvl+0x8c/0xd0 [ 24.724475] print_report+0x118/0x5f0 [ 24.724529] kasan_report+0xdc/0x128 [ 24.724577] kasan_check_range+0x100/0x1a8 [ 24.724627] __kasan_check_write+0x20/0x30 [ 24.724677] kasan_bitops_test_and_modify.constprop.0+0x1e4/0xc08 [ 24.724742] kasan_bitops_generic+0x120/0x1d0 [ 24.724808] kunit_try_run_case+0x170/0x3f0 [ 24.724861] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.724920] kthread+0x24c/0x2d0 [ 24.724996] ret_from_fork+0x10/0x20 [ 24.725055] [ 24.732343] Allocated by task 249: [ 24.733197] kasan_save_stack+0x3c/0x68 [ 24.734510] kasan_save_track+0x20/0x40 [ 24.735115] kasan_save_alloc_info+0x40/0x58 [ 24.736452] __kasan_kmalloc+0xd4/0xd8 [ 24.737123] __kmalloc_cache_noprof+0x154/0x320 [ 24.737831] kasan_bitops_generic+0xa0/0x1d0 [ 24.738405] kunit_try_run_case+0x170/0x3f0 [ 24.739038] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.740160] kthread+0x24c/0x2d0 [ 24.740557] ret_from_fork+0x10/0x20 [ 24.740985] [ 24.741557] The buggy address belongs to the object at fff00000c662ada0 [ 24.741557] which belongs to the cache kmalloc-16 of size 16 [ 24.743156] The buggy address is located 8 bytes inside of [ 24.743156] allocated 9-byte region [fff00000c662ada0, fff00000c662ada9) [ 24.744861] [ 24.745323] The buggy address belongs to the physical page: [ 24.745850] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10662a [ 24.746873] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.748068] page_type: f5(slab) [ 24.748552] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 24.749286] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 24.749923] page dumped because: kasan: bad access detected [ 24.750598] [ 24.750881] Memory state around the buggy address: [ 24.751932] fff00000c662ac80: fa fb fc fc 00 04 fc fc 00 05 fc fc fa fb fc fc [ 24.752709] fff00000c662ad00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.753662] >fff00000c662ad80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 24.754508] ^ [ 24.755209] fff00000c662ae00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.756203] fff00000c662ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.756841] ================================================================== [ 24.643452] ================================================================== [ 24.644523] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x104/0xc08 [ 24.645372] Write of size 8 at addr fff00000c662ada8 by task kunit_try_catch/249 [ 24.646276] [ 24.646703] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 24.646979] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.647065] Hardware name: linux,dummy-virt (DT) [ 24.647164] Call trace: [ 24.647239] dump_backtrace+0x9c/0x128 [ 24.647460] show_stack+0x20/0x38 [ 24.647578] dump_stack_lvl+0x8c/0xd0 [ 24.647694] print_report+0x118/0x5f0 [ 24.647801] kasan_report+0xdc/0x128 [ 24.647906] kasan_check_range+0x100/0x1a8 [ 24.648038] __kasan_check_write+0x20/0x30 [ 24.648153] kasan_bitops_test_and_modify.constprop.0+0x104/0xc08 [ 24.648298] kasan_bitops_generic+0x120/0x1d0 [ 24.648421] kunit_try_run_case+0x170/0x3f0 [ 24.648549] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.648684] kthread+0x24c/0x2d0 [ 24.648811] ret_from_fork+0x10/0x20 [ 24.648914] [ 24.657162] Allocated by task 249: [ 24.657623] kasan_save_stack+0x3c/0x68 [ 24.658218] kasan_save_track+0x20/0x40 [ 24.658803] kasan_save_alloc_info+0x40/0x58 [ 24.659524] __kasan_kmalloc+0xd4/0xd8 [ 24.659974] __kmalloc_cache_noprof+0x154/0x320 [ 24.660710] kasan_bitops_generic+0xa0/0x1d0 [ 24.661989] kunit_try_run_case+0x170/0x3f0 [ 24.662866] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.664030] kthread+0x24c/0x2d0 [ 24.664504] ret_from_fork+0x10/0x20 [ 24.665064] [ 24.665401] The buggy address belongs to the object at fff00000c662ada0 [ 24.665401] which belongs to the cache kmalloc-16 of size 16 [ 24.666571] The buggy address is located 8 bytes inside of [ 24.666571] allocated 9-byte region [fff00000c662ada0, fff00000c662ada9) [ 24.667889] [ 24.668377] The buggy address belongs to the physical page: [ 24.668982] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10662a [ 24.669912] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.670533] page_type: f5(slab) [ 24.671059] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 24.671923] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 24.673065] page dumped because: kasan: bad access detected [ 24.673722] [ 24.674208] Memory state around the buggy address: [ 24.675153] fff00000c662ac80: fa fb fc fc 00 04 fc fc 00 05 fc fc fa fb fc fc [ 24.676060] fff00000c662ad00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.677293] >fff00000c662ad80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 24.678005] ^ [ 24.678559] fff00000c662ae00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.679398] fff00000c662ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.680633] ================================================================== [ 24.866075] ================================================================== [ 24.866770] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x34c/0xc08 [ 24.867795] Write of size 8 at addr fff00000c662ada8 by task kunit_try_catch/249 [ 24.868553] [ 24.868889] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 24.869128] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.869215] Hardware name: linux,dummy-virt (DT) [ 24.869313] Call trace: [ 24.869392] dump_backtrace+0x9c/0x128 [ 24.869521] show_stack+0x20/0x38 [ 24.869641] dump_stack_lvl+0x8c/0xd0 [ 24.869764] print_report+0x118/0x5f0 [ 24.869888] kasan_report+0xdc/0x128 [ 24.870027] kasan_check_range+0x100/0x1a8 [ 24.870151] __kasan_check_write+0x20/0x30 [ 24.870280] kasan_bitops_test_and_modify.constprop.0+0x34c/0xc08 [ 24.870426] kasan_bitops_generic+0x120/0x1d0 [ 24.870496] kunit_try_run_case+0x170/0x3f0 [ 24.870548] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.870605] kthread+0x24c/0x2d0 [ 24.870652] ret_from_fork+0x10/0x20 [ 24.870706] [ 24.877504] Allocated by task 249: [ 24.877902] kasan_save_stack+0x3c/0x68 [ 24.878569] kasan_save_track+0x20/0x40 [ 24.879222] kasan_save_alloc_info+0x40/0x58 [ 24.879684] __kasan_kmalloc+0xd4/0xd8 [ 24.880196] __kmalloc_cache_noprof+0x154/0x320 [ 24.880911] kasan_bitops_generic+0xa0/0x1d0 [ 24.881634] kunit_try_run_case+0x170/0x3f0 [ 24.882163] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.882832] kthread+0x24c/0x2d0 [ 24.883263] ret_from_fork+0x10/0x20 [ 24.883850] [ 24.884166] The buggy address belongs to the object at fff00000c662ada0 [ 24.884166] which belongs to the cache kmalloc-16 of size 16 [ 24.885326] The buggy address is located 8 bytes inside of [ 24.885326] allocated 9-byte region [fff00000c662ada0, fff00000c662ada9) [ 24.886411] [ 24.886742] The buggy address belongs to the physical page: [ 24.887301] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10662a [ 24.888232] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.888973] page_type: f5(slab) [ 24.889404] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 24.890772] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 24.892509] page dumped because: kasan: bad access detected [ 24.892987] [ 24.893224] Memory state around the buggy address: [ 24.893613] fff00000c662ac80: fa fb fc fc 00 04 fc fc 00 05 fc fc fa fb fc fc [ 24.896196] fff00000c662ad00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.898474] >fff00000c662ad80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 24.900356] ^ [ 24.901662] fff00000c662ae00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.902562] fff00000c662ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.903423] ================================================================== [ 24.832928] ================================================================== [ 24.833764] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xb14/0xc08 [ 24.835173] Read of size 8 at addr fff00000c662ada8 by task kunit_try_catch/249 [ 24.836045] [ 24.836390] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 24.836637] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.836728] Hardware name: linux,dummy-virt (DT) [ 24.836872] Call trace: [ 24.836946] dump_backtrace+0x9c/0x128 [ 24.837088] show_stack+0x20/0x38 [ 24.837256] dump_stack_lvl+0x8c/0xd0 [ 24.837426] print_report+0x118/0x5f0 [ 24.837545] kasan_report+0xdc/0x128 [ 24.837645] __asan_report_load8_noabort+0x20/0x30 [ 24.837703] kasan_bitops_test_and_modify.constprop.0+0xb14/0xc08 [ 24.837766] kasan_bitops_generic+0x120/0x1d0 [ 24.837820] kunit_try_run_case+0x170/0x3f0 [ 24.837869] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.837924] kthread+0x24c/0x2d0 [ 24.837997] ret_from_fork+0x10/0x20 [ 24.838055] [ 24.845000] Allocated by task 249: [ 24.845435] kasan_save_stack+0x3c/0x68 [ 24.846041] kasan_save_track+0x20/0x40 [ 24.846671] kasan_save_alloc_info+0x40/0x58 [ 24.847273] __kasan_kmalloc+0xd4/0xd8 [ 24.847850] __kmalloc_cache_noprof+0x154/0x320 [ 24.848562] kasan_bitops_generic+0xa0/0x1d0 [ 24.849140] kunit_try_run_case+0x170/0x3f0 [ 24.849727] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.850448] kthread+0x24c/0x2d0 [ 24.851021] ret_from_fork+0x10/0x20 [ 24.851540] [ 24.851862] The buggy address belongs to the object at fff00000c662ada0 [ 24.851862] which belongs to the cache kmalloc-16 of size 16 [ 24.853140] The buggy address is located 8 bytes inside of [ 24.853140] allocated 9-byte region [fff00000c662ada0, fff00000c662ada9) [ 24.854354] [ 24.854726] The buggy address belongs to the physical page: [ 24.855282] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10662a [ 24.856231] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.857088] page_type: f5(slab) [ 24.857549] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 24.858334] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 24.859163] page dumped because: kasan: bad access detected [ 24.859782] [ 24.860120] Memory state around the buggy address: [ 24.860652] fff00000c662ac80: fa fb fc fc 00 04 fc fc 00 05 fc fc fa fb fc fc [ 24.861415] fff00000c662ad00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.862133] >fff00000c662ad80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 24.862836] ^ [ 24.863443] fff00000c662ae00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.864129] fff00000c662ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.864912] ================================================================== [ 24.682181] ================================================================== [ 24.682908] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa48/0xc08 [ 24.685051] Read of size 8 at addr fff00000c662ada8 by task kunit_try_catch/249 [ 24.686325] [ 24.686697] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 24.686899] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.686941] Hardware name: linux,dummy-virt (DT) [ 24.687085] Call trace: [ 24.687159] dump_backtrace+0x9c/0x128 [ 24.687281] show_stack+0x20/0x38 [ 24.687414] dump_stack_lvl+0x8c/0xd0 [ 24.687543] print_report+0x118/0x5f0 [ 24.687656] kasan_report+0xdc/0x128 [ 24.687734] __asan_report_load8_noabort+0x20/0x30 [ 24.687790] kasan_bitops_test_and_modify.constprop.0+0xa48/0xc08 [ 24.687853] kasan_bitops_generic+0x120/0x1d0 [ 24.687906] kunit_try_run_case+0x170/0x3f0 [ 24.687956] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.688045] kthread+0x24c/0x2d0 [ 24.688093] ret_from_fork+0x10/0x20 [ 24.688143] [ 24.695501] Allocated by task 249: [ 24.696236] kasan_save_stack+0x3c/0x68 [ 24.696848] kasan_save_track+0x20/0x40 [ 24.697490] kasan_save_alloc_info+0x40/0x58 [ 24.698132] __kasan_kmalloc+0xd4/0xd8 [ 24.698692] __kmalloc_cache_noprof+0x154/0x320 [ 24.699342] kasan_bitops_generic+0xa0/0x1d0 [ 24.699923] kunit_try_run_case+0x170/0x3f0 [ 24.700809] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.701432] kthread+0x24c/0x2d0 [ 24.701779] ret_from_fork+0x10/0x20 [ 24.702451] [ 24.702780] The buggy address belongs to the object at fff00000c662ada0 [ 24.702780] which belongs to the cache kmalloc-16 of size 16 [ 24.705025] The buggy address is located 8 bytes inside of [ 24.705025] allocated 9-byte region [fff00000c662ada0, fff00000c662ada9) [ 24.706270] [ 24.706646] The buggy address belongs to the physical page: [ 24.707233] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10662a [ 24.708357] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.709491] page_type: f5(slab) [ 24.710007] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 24.710886] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 24.712025] page dumped because: kasan: bad access detected [ 24.713024] [ 24.713385] Memory state around the buggy address: [ 24.713979] fff00000c662ac80: fa fb fc fc 00 04 fc fc 00 05 fc fc fa fb fc fc [ 24.714693] fff00000c662ad00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.715415] >fff00000c662ad80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 24.716666] ^ [ 24.717337] fff00000c662ae00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.718091] fff00000c662ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.718795] ================================================================== [ 24.905932] ================================================================== [ 24.906985] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa84/0xc08 [ 24.908320] Read of size 8 at addr fff00000c662ada8 by task kunit_try_catch/249 [ 24.909039] [ 24.909266] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 24.909368] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.909404] Hardware name: linux,dummy-virt (DT) [ 24.909444] Call trace: [ 24.909474] dump_backtrace+0x9c/0x128 [ 24.909527] show_stack+0x20/0x38 [ 24.909573] dump_stack_lvl+0x8c/0xd0 [ 24.909625] print_report+0x118/0x5f0 [ 24.909672] kasan_report+0xdc/0x128 [ 24.909717] __asan_report_load8_noabort+0x20/0x30 [ 24.909770] kasan_bitops_test_and_modify.constprop.0+0xa84/0xc08 [ 24.909831] kasan_bitops_generic+0x120/0x1d0 [ 24.909886] kunit_try_run_case+0x170/0x3f0 [ 24.909935] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.910401] kthread+0x24c/0x2d0 [ 24.910595] ret_from_fork+0x10/0x20 [ 24.910715] [ 24.917919] Allocated by task 249: [ 24.918370] kasan_save_stack+0x3c/0x68 [ 24.918912] kasan_save_track+0x20/0x40 [ 24.919517] kasan_save_alloc_info+0x40/0x58 [ 24.920159] __kasan_kmalloc+0xd4/0xd8 [ 24.920780] __kmalloc_cache_noprof+0x154/0x320 [ 24.921392] kasan_bitops_generic+0xa0/0x1d0 [ 24.921928] kunit_try_run_case+0x170/0x3f0 [ 24.922481] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.923128] kthread+0x24c/0x2d0 [ 24.923589] ret_from_fork+0x10/0x20 [ 24.924126] [ 24.924451] The buggy address belongs to the object at fff00000c662ada0 [ 24.924451] which belongs to the cache kmalloc-16 of size 16 [ 24.925700] The buggy address is located 8 bytes inside of [ 24.925700] allocated 9-byte region [fff00000c662ada0, fff00000c662ada9) [ 24.926747] [ 24.927091] The buggy address belongs to the physical page: [ 24.927689] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10662a [ 24.928484] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.929274] page_type: f5(slab) [ 24.929758] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 24.930576] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 24.931031] page dumped because: kasan: bad access detected [ 24.931467] [ 24.932049] Memory state around the buggy address: [ 24.932827] fff00000c662ac80: fa fb fc fc 00 04 fc fc 00 05 fc fc fa fb fc fc [ 24.933545] fff00000c662ad00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.934292] >fff00000c662ad80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 24.935109] ^ [ 24.935694] fff00000c662ae00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.936467] fff00000c662ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.937240] ================================================================== [ 24.797572] ================================================================== [ 24.798296] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x26c/0xc08 [ 24.799053] Write of size 8 at addr fff00000c662ada8 by task kunit_try_catch/249 [ 24.800063] [ 24.800360] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 24.800583] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.800671] Hardware name: linux,dummy-virt (DT) [ 24.800777] Call trace: [ 24.800866] dump_backtrace+0x9c/0x128 [ 24.801021] show_stack+0x20/0x38 [ 24.801166] dump_stack_lvl+0x8c/0xd0 [ 24.801294] print_report+0x118/0x5f0 [ 24.801412] kasan_report+0xdc/0x128 [ 24.801526] kasan_check_range+0x100/0x1a8 [ 24.801635] __kasan_check_write+0x20/0x30 [ 24.801734] kasan_bitops_test_and_modify.constprop.0+0x26c/0xc08 [ 24.801861] kasan_bitops_generic+0x120/0x1d0 [ 24.802029] kunit_try_run_case+0x170/0x3f0 [ 24.802187] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.802340] kthread+0x24c/0x2d0 [ 24.802483] ret_from_fork+0x10/0x20 [ 24.802587] [ 24.810682] Allocated by task 249: [ 24.811250] kasan_save_stack+0x3c/0x68 [ 24.811709] kasan_save_track+0x20/0x40 [ 24.812223] kasan_save_alloc_info+0x40/0x58 [ 24.813003] __kasan_kmalloc+0xd4/0xd8 [ 24.813840] __kmalloc_cache_noprof+0x154/0x320 [ 24.814426] kasan_bitops_generic+0xa0/0x1d0 [ 24.814891] kunit_try_run_case+0x170/0x3f0 [ 24.815551] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.816355] kthread+0x24c/0x2d0 [ 24.816952] ret_from_fork+0x10/0x20 [ 24.817561] [ 24.817931] The buggy address belongs to the object at fff00000c662ada0 [ 24.817931] which belongs to the cache kmalloc-16 of size 16 [ 24.819173] The buggy address is located 8 bytes inside of [ 24.819173] allocated 9-byte region [fff00000c662ada0, fff00000c662ada9) [ 24.820474] [ 24.820851] The buggy address belongs to the physical page: [ 24.821528] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10662a [ 24.822388] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.823203] page_type: f5(slab) [ 24.823708] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 24.824560] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 24.825317] page dumped because: kasan: bad access detected [ 24.826024] [ 24.826401] Memory state around the buggy address: [ 24.827013] fff00000c662ac80: fa fb fc fc 00 04 fc fc 00 05 fc fc fa fb fc fc [ 24.827805] fff00000c662ad00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.828617] >fff00000c662ad80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 24.829420] ^ [ 24.830015] fff00000c662ae00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.830800] fff00000c662ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.831528] ================================================================== [ 24.938759] ================================================================== [ 24.939389] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xacc/0xc08 [ 24.940356] Read of size 8 at addr fff00000c662ada8 by task kunit_try_catch/249 [ 24.942042] [ 24.942599] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 24.942846] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.942931] Hardware name: linux,dummy-virt (DT) [ 24.943011] Call trace: [ 24.943043] dump_backtrace+0x9c/0x128 [ 24.943100] show_stack+0x20/0x38 [ 24.943146] dump_stack_lvl+0x8c/0xd0 [ 24.943198] print_report+0x118/0x5f0 [ 24.943246] kasan_report+0xdc/0x128 [ 24.943291] __asan_report_load8_noabort+0x20/0x30 [ 24.943344] kasan_bitops_test_and_modify.constprop.0+0xacc/0xc08 [ 24.943407] kasan_bitops_generic+0x120/0x1d0 [ 24.943461] kunit_try_run_case+0x170/0x3f0 [ 24.943510] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.943567] kthread+0x24c/0x2d0 [ 24.943613] ret_from_fork+0x10/0x20 [ 24.943664] [ 24.951219] Allocated by task 249: [ 24.951873] kasan_save_stack+0x3c/0x68 [ 24.952449] kasan_save_track+0x20/0x40 [ 24.953155] kasan_save_alloc_info+0x40/0x58 [ 24.953747] __kasan_kmalloc+0xd4/0xd8 [ 24.954518] __kmalloc_cache_noprof+0x154/0x320 [ 24.955153] kasan_bitops_generic+0xa0/0x1d0 [ 24.955890] kunit_try_run_case+0x170/0x3f0 [ 24.956482] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.957165] kthread+0x24c/0x2d0 [ 24.957657] ret_from_fork+0x10/0x20 [ 24.958208] [ 24.958538] The buggy address belongs to the object at fff00000c662ada0 [ 24.958538] which belongs to the cache kmalloc-16 of size 16 [ 24.959812] The buggy address is located 8 bytes inside of [ 24.959812] allocated 9-byte region [fff00000c662ada0, fff00000c662ada9) [ 24.961106] [ 24.961389] The buggy address belongs to the physical page: [ 24.962011] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10662a [ 24.962793] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.963491] page_type: f5(slab) [ 24.963907] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 24.964846] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 24.965717] page dumped because: kasan: bad access detected [ 24.966358] [ 24.966681] Memory state around the buggy address: [ 24.967301] fff00000c662ac80: fa fb fc fc 00 04 fc fc 00 05 fc fc fa fb fc fc [ 24.968065] fff00000c662ad00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.968826] >fff00000c662ad80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 24.969627] ^ [ 24.970188] fff00000c662ae00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.970942] fff00000c662ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.971690] ================================================================== [ 24.758223] ================================================================== [ 24.758820] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa90/0xc08 [ 24.759922] Read of size 8 at addr fff00000c662ada8 by task kunit_try_catch/249 [ 24.760749] [ 24.761358] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 24.761570] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.761649] Hardware name: linux,dummy-virt (DT) [ 24.761740] Call trace: [ 24.761845] dump_backtrace+0x9c/0x128 [ 24.761982] show_stack+0x20/0x38 [ 24.762098] dump_stack_lvl+0x8c/0xd0 [ 24.762292] print_report+0x118/0x5f0 [ 24.762411] kasan_report+0xdc/0x128 [ 24.762526] __asan_report_load8_noabort+0x20/0x30 [ 24.762653] kasan_bitops_test_and_modify.constprop.0+0xa90/0xc08 [ 24.762750] kasan_bitops_generic+0x120/0x1d0 [ 24.762805] kunit_try_run_case+0x170/0x3f0 [ 24.762854] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.762910] kthread+0x24c/0x2d0 [ 24.762955] ret_from_fork+0x10/0x20 [ 24.763038] [ 24.772788] Allocated by task 249: [ 24.773548] kasan_save_stack+0x3c/0x68 [ 24.774026] kasan_save_track+0x20/0x40 [ 24.774435] kasan_save_alloc_info+0x40/0x58 [ 24.775158] __kasan_kmalloc+0xd4/0xd8 [ 24.776221] __kmalloc_cache_noprof+0x154/0x320 [ 24.776779] kasan_bitops_generic+0xa0/0x1d0 [ 24.777429] kunit_try_run_case+0x170/0x3f0 [ 24.778063] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.778770] kthread+0x24c/0x2d0 [ 24.779319] ret_from_fork+0x10/0x20 [ 24.780010] [ 24.780524] The buggy address belongs to the object at fff00000c662ada0 [ 24.780524] which belongs to the cache kmalloc-16 of size 16 [ 24.782067] The buggy address is located 8 bytes inside of [ 24.782067] allocated 9-byte region [fff00000c662ada0, fff00000c662ada9) [ 24.783950] [ 24.784472] The buggy address belongs to the physical page: [ 24.785663] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10662a [ 24.786624] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.787433] page_type: f5(slab) [ 24.787941] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 24.788839] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 24.789592] page dumped because: kasan: bad access detected [ 24.790183] [ 24.790521] Memory state around the buggy address: [ 24.791091] fff00000c662ac80: fa fb fc fc 00 04 fc fc 00 05 fc fc fa fb fc fc [ 24.791954] fff00000c662ad00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.792859] >fff00000c662ad80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 24.793667] ^ [ 24.794315] fff00000c662ae00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.795110] fff00000c662ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.795979] ==================================================================
[ 21.416502] ================================================================== [ 21.417106] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x102/0xd90 [ 21.418263] Write of size 8 at addr ffff888101f80208 by task kunit_try_catch/266 [ 21.419065] [ 21.419349] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 21.419472] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.419509] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.419567] Call Trace: [ 21.419619] <TASK> [ 21.419671] dump_stack_lvl+0x73/0xb0 [ 21.419753] print_report+0xd1/0x640 [ 21.419831] ? __virt_addr_valid+0x1db/0x2d0 [ 21.419974] ? kasan_bitops_test_and_modify.constprop.0+0x102/0xd90 [ 21.420054] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.420129] ? kasan_bitops_test_and_modify.constprop.0+0x102/0xd90 [ 21.420204] kasan_report+0x140/0x180 [ 21.420302] ? kasan_bitops_test_and_modify.constprop.0+0x102/0xd90 [ 21.420391] kasan_check_range+0x10c/0x1c0 [ 21.420449] __kasan_check_write+0x18/0x20 [ 21.420481] kasan_bitops_test_and_modify.constprop.0+0x102/0xd90 [ 21.420537] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 21.420580] ? __kmalloc_cache_noprof+0x168/0x350 [ 21.420638] kasan_bitops_generic+0x122/0x1c0 [ 21.420670] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 21.420721] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 21.420759] kunit_try_run_case+0x1a6/0x480 [ 21.420814] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.421194] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 21.421259] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.421300] ? __kthread_parkme+0x82/0x160 [ 21.421329] ? preempt_count_sub+0x50/0x80 [ 21.421360] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.421389] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.421426] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.421539] kthread+0x257/0x310 [ 21.421592] ? __pfx_kthread+0x10/0x10 [ 21.421618] ret_from_fork+0x41/0x80 [ 21.421647] ? __pfx_kthread+0x10/0x10 [ 21.421672] ret_from_fork_asm+0x1a/0x30 [ 21.421712] </TASK> [ 21.421726] [ 21.440723] Allocated by task 266: [ 21.441584] kasan_save_stack+0x45/0x70 [ 21.442428] kasan_save_track+0x18/0x40 [ 21.443327] kasan_save_alloc_info+0x3b/0x50 [ 21.443907] __kasan_kmalloc+0xb7/0xc0 [ 21.444313] __kmalloc_cache_noprof+0x168/0x350 [ 21.445261] kasan_bitops_generic+0x93/0x1c0 [ 21.445841] kunit_try_run_case+0x1a6/0x480 [ 21.446313] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.447036] kthread+0x257/0x310 [ 21.447861] ret_from_fork+0x41/0x80 [ 21.448207] ret_from_fork_asm+0x1a/0x30 [ 21.449245] [ 21.449482] The buggy address belongs to the object at ffff888101f80200 [ 21.449482] which belongs to the cache kmalloc-16 of size 16 [ 21.450695] The buggy address is located 8 bytes inside of [ 21.450695] allocated 9-byte region [ffff888101f80200, ffff888101f80209) [ 21.451656] [ 21.452047] The buggy address belongs to the physical page: [ 21.452957] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101f80 [ 21.453612] flags: 0x200000000000000(node=0|zone=2) [ 21.454152] page_type: f5(slab) [ 21.454818] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 21.455466] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 21.456310] page dumped because: kasan: bad access detected [ 21.457307] [ 21.457694] Memory state around the buggy address: [ 21.458064] ffff888101f80100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.459049] ffff888101f80180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.459606] >ffff888101f80200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.460334] ^ [ 21.461276] ffff888101f80280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.461884] ffff888101f80300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.462750] ================================================================== [ 21.820754] ================================================================== [ 21.822361] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90 [ 21.823351] Read of size 8 at addr ffff888101f80208 by task kunit_try_catch/266 [ 21.824137] [ 21.824420] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 21.824548] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.824584] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.824644] Call Trace: [ 21.824698] <TASK> [ 21.824747] dump_stack_lvl+0x73/0xb0 [ 21.825304] print_report+0xd1/0x640 [ 21.825381] ? __virt_addr_valid+0x1db/0x2d0 [ 21.825422] ? kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90 [ 21.825482] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.825527] ? kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90 [ 21.825563] kasan_report+0x140/0x180 [ 21.825597] ? kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90 [ 21.825639] __asan_report_load8_noabort+0x18/0x20 [ 21.825669] kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90 [ 21.825706] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 21.825743] ? __kmalloc_cache_noprof+0x168/0x350 [ 21.825782] kasan_bitops_generic+0x122/0x1c0 [ 21.825817] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 21.825932] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 21.825978] kunit_try_run_case+0x1a6/0x480 [ 21.826013] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.826041] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 21.826071] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.826106] ? __kthread_parkme+0x82/0x160 [ 21.826133] ? preempt_count_sub+0x50/0x80 [ 21.826164] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.826192] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.826257] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.826329] kthread+0x257/0x310 [ 21.826356] ? __pfx_kthread+0x10/0x10 [ 21.826382] ret_from_fork+0x41/0x80 [ 21.826411] ? __pfx_kthread+0x10/0x10 [ 21.826436] ret_from_fork_asm+0x1a/0x30 [ 21.826611] </TASK> [ 21.826628] [ 21.847409] Allocated by task 266: [ 21.848047] kasan_save_stack+0x45/0x70 [ 21.849038] kasan_save_track+0x18/0x40 [ 21.849556] kasan_save_alloc_info+0x3b/0x50 [ 21.850073] __kasan_kmalloc+0xb7/0xc0 [ 21.850654] __kmalloc_cache_noprof+0x168/0x350 [ 21.851194] kasan_bitops_generic+0x93/0x1c0 [ 21.851888] kunit_try_run_case+0x1a6/0x480 [ 21.852338] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.853980] kthread+0x257/0x310 [ 21.854294] ret_from_fork+0x41/0x80 [ 21.854821] ret_from_fork_asm+0x1a/0x30 [ 21.855250] [ 21.855480] The buggy address belongs to the object at ffff888101f80200 [ 21.855480] which belongs to the cache kmalloc-16 of size 16 [ 21.857292] The buggy address is located 8 bytes inside of [ 21.857292] allocated 9-byte region [ffff888101f80200, ffff888101f80209) [ 21.859319] [ 21.859908] The buggy address belongs to the physical page: [ 21.860907] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101f80 [ 21.861716] flags: 0x200000000000000(node=0|zone=2) [ 21.862210] page_type: f5(slab) [ 21.863014] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 21.863543] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 21.864330] page dumped because: kasan: bad access detected [ 21.864822] [ 21.865849] Memory state around the buggy address: [ 21.866306] ffff888101f80100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.866990] ffff888101f80180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.867578] >ffff888101f80200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.868354] ^ [ 21.868790] ffff888101f80280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.870829] ffff888101f80300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.871664] ================================================================== [ 21.562398] ================================================================== [ 21.563417] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90 [ 21.564481] Write of size 8 at addr ffff888101f80208 by task kunit_try_catch/266 [ 21.565791] [ 21.566120] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 21.566291] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.566317] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.566361] Call Trace: [ 21.566402] <TASK> [ 21.566434] dump_stack_lvl+0x73/0xb0 [ 21.566745] print_report+0xd1/0x640 [ 21.566786] ? __virt_addr_valid+0x1db/0x2d0 [ 21.566829] ? kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90 [ 21.566901] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.566940] ? kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90 [ 21.566975] kasan_report+0x140/0x180 [ 21.567011] ? kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90 [ 21.567052] kasan_check_range+0x10c/0x1c0 [ 21.567081] __kasan_check_write+0x18/0x20 [ 21.567110] kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90 [ 21.567146] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 21.567182] ? __kmalloc_cache_noprof+0x168/0x350 [ 21.567242] kasan_bitops_generic+0x122/0x1c0 [ 21.567293] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 21.567326] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 21.567361] kunit_try_run_case+0x1a6/0x480 [ 21.567394] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.567422] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 21.567469] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.567565] ? __kthread_parkme+0x82/0x160 [ 21.567641] ? preempt_count_sub+0x50/0x80 [ 21.567677] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.567706] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.567743] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.567780] kthread+0x257/0x310 [ 21.567806] ? __pfx_kthread+0x10/0x10 [ 21.567858] ret_from_fork+0x41/0x80 [ 21.567895] ? __pfx_kthread+0x10/0x10 [ 21.567922] ret_from_fork_asm+0x1a/0x30 [ 21.567963] </TASK> [ 21.567977] [ 21.589963] Allocated by task 266: [ 21.590454] kasan_save_stack+0x45/0x70 [ 21.591295] kasan_save_track+0x18/0x40 [ 21.591980] kasan_save_alloc_info+0x3b/0x50 [ 21.592440] __kasan_kmalloc+0xb7/0xc0 [ 21.593108] __kmalloc_cache_noprof+0x168/0x350 [ 21.594212] kasan_bitops_generic+0x93/0x1c0 [ 21.594561] kunit_try_run_case+0x1a6/0x480 [ 21.595133] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.596081] kthread+0x257/0x310 [ 21.596723] ret_from_fork+0x41/0x80 [ 21.597257] ret_from_fork_asm+0x1a/0x30 [ 21.597931] [ 21.598941] The buggy address belongs to the object at ffff888101f80200 [ 21.598941] which belongs to the cache kmalloc-16 of size 16 [ 21.600455] The buggy address is located 8 bytes inside of [ 21.600455] allocated 9-byte region [ffff888101f80200, ffff888101f80209) [ 21.602154] [ 21.602336] The buggy address belongs to the physical page: [ 21.603498] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101f80 [ 21.604299] flags: 0x200000000000000(node=0|zone=2) [ 21.605345] page_type: f5(slab) [ 21.606368] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 21.607656] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 21.608093] page dumped because: kasan: bad access detected [ 21.608420] [ 21.608565] Memory state around the buggy address: [ 21.608858] ffff888101f80100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.609992] ffff888101f80180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.611483] >ffff888101f80200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.612789] ^ [ 21.615074] ffff888101f80280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.615953] ffff888101f80300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.616576] ================================================================== [ 21.765815] ================================================================== [ 21.766403] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x558/0xd90 [ 21.768257] Read of size 8 at addr ffff888101f80208 by task kunit_try_catch/266 [ 21.768885] [ 21.769336] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 21.769461] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.769502] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.769562] Call Trace: [ 21.769613] <TASK> [ 21.769661] dump_stack_lvl+0x73/0xb0 [ 21.769743] print_report+0xd1/0x640 [ 21.769818] ? __virt_addr_valid+0x1db/0x2d0 [ 21.769897] ? kasan_bitops_test_and_modify.constprop.0+0x558/0xd90 [ 21.769973] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.770048] ? kasan_bitops_test_and_modify.constprop.0+0x558/0xd90 [ 21.770128] kasan_report+0x140/0x180 [ 21.770215] ? kasan_bitops_test_and_modify.constprop.0+0x558/0xd90 [ 21.770429] kasan_check_range+0x10c/0x1c0 [ 21.770803] __kasan_check_read+0x15/0x20 [ 21.770875] kasan_bitops_test_and_modify.constprop.0+0x558/0xd90 [ 21.770917] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 21.770954] ? __kmalloc_cache_noprof+0x168/0x350 [ 21.770991] kasan_bitops_generic+0x122/0x1c0 [ 21.771020] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 21.771049] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 21.771085] kunit_try_run_case+0x1a6/0x480 [ 21.771119] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.771148] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 21.771178] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.771213] ? __kthread_parkme+0x82/0x160 [ 21.771282] ? preempt_count_sub+0x50/0x80 [ 21.771315] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.771342] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.771379] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.771416] kthread+0x257/0x310 [ 21.771449] ? __pfx_kthread+0x10/0x10 [ 21.771564] ret_from_fork+0x41/0x80 [ 21.771606] ? __pfx_kthread+0x10/0x10 [ 21.771632] ret_from_fork_asm+0x1a/0x30 [ 21.771673] </TASK> [ 21.771686] [ 21.795239] Allocated by task 266: [ 21.796092] kasan_save_stack+0x45/0x70 [ 21.796466] kasan_save_track+0x18/0x40 [ 21.797174] kasan_save_alloc_info+0x3b/0x50 [ 21.798116] __kasan_kmalloc+0xb7/0xc0 [ 21.798664] __kmalloc_cache_noprof+0x168/0x350 [ 21.799448] kasan_bitops_generic+0x93/0x1c0 [ 21.799835] kunit_try_run_case+0x1a6/0x480 [ 21.800996] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.801681] kthread+0x257/0x310 [ 21.802028] ret_from_fork+0x41/0x80 [ 21.802648] ret_from_fork_asm+0x1a/0x30 [ 21.803415] [ 21.803743] The buggy address belongs to the object at ffff888101f80200 [ 21.803743] which belongs to the cache kmalloc-16 of size 16 [ 21.805371] The buggy address is located 8 bytes inside of [ 21.805371] allocated 9-byte region [ffff888101f80200, ffff888101f80209) [ 21.807023] [ 21.807193] The buggy address belongs to the physical page: [ 21.808038] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101f80 [ 21.809263] flags: 0x200000000000000(node=0|zone=2) [ 21.809644] page_type: f5(slab) [ 21.810132] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 21.811315] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 21.812243] page dumped because: kasan: bad access detected [ 21.813253] [ 21.813604] Memory state around the buggy address: [ 21.814370] ffff888101f80100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.815282] ffff888101f80180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.816075] >ffff888101f80200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.816580] ^ [ 21.817642] ffff888101f80280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.818366] ffff888101f80300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.819266] ================================================================== [ 21.510776] ================================================================== [ 21.511606] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90 [ 21.512326] Write of size 8 at addr ffff888101f80208 by task kunit_try_catch/266 [ 21.512901] [ 21.513162] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 21.513849] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.513960] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.514037] Call Trace: [ 21.514088] <TASK> [ 21.514135] dump_stack_lvl+0x73/0xb0 [ 21.514275] print_report+0xd1/0x640 [ 21.514366] ? __virt_addr_valid+0x1db/0x2d0 [ 21.514452] ? kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90 [ 21.514555] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.514640] ? kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90 [ 21.514684] kasan_report+0x140/0x180 [ 21.514719] ? kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90 [ 21.514760] kasan_check_range+0x10c/0x1c0 [ 21.514789] __kasan_check_write+0x18/0x20 [ 21.514830] kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90 [ 21.514898] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 21.514936] ? __kmalloc_cache_noprof+0x168/0x350 [ 21.514974] kasan_bitops_generic+0x122/0x1c0 [ 21.515002] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 21.515031] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 21.515066] kunit_try_run_case+0x1a6/0x480 [ 21.515099] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.515127] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 21.515157] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.515192] ? __kthread_parkme+0x82/0x160 [ 21.515239] ? preempt_count_sub+0x50/0x80 [ 21.515300] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.515329] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.515367] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.515404] kthread+0x257/0x310 [ 21.515430] ? __pfx_kthread+0x10/0x10 [ 21.515486] ret_from_fork+0x41/0x80 [ 21.515562] ? __pfx_kthread+0x10/0x10 [ 21.515599] ret_from_fork_asm+0x1a/0x30 [ 21.515642] </TASK> [ 21.515656] [ 21.537322] Allocated by task 266: [ 21.538675] kasan_save_stack+0x45/0x70 [ 21.539083] kasan_save_track+0x18/0x40 [ 21.540000] kasan_save_alloc_info+0x3b/0x50 [ 21.540350] __kasan_kmalloc+0xb7/0xc0 [ 21.541214] __kmalloc_cache_noprof+0x168/0x350 [ 21.541647] kasan_bitops_generic+0x93/0x1c0 [ 21.542331] kunit_try_run_case+0x1a6/0x480 [ 21.543303] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.543815] kthread+0x257/0x310 [ 21.544301] ret_from_fork+0x41/0x80 [ 21.545300] ret_from_fork_asm+0x1a/0x30 [ 21.545677] [ 21.546243] The buggy address belongs to the object at ffff888101f80200 [ 21.546243] which belongs to the cache kmalloc-16 of size 16 [ 21.547838] The buggy address is located 8 bytes inside of [ 21.547838] allocated 9-byte region [ffff888101f80200, ffff888101f80209) [ 21.549123] [ 21.549309] The buggy address belongs to the physical page: [ 21.550182] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101f80 [ 21.550853] flags: 0x200000000000000(node=0|zone=2) [ 21.551347] page_type: f5(slab) [ 21.551706] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 21.552689] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 21.554289] page dumped because: kasan: bad access detected [ 21.554679] [ 21.554907] Memory state around the buggy address: [ 21.555338] ffff888101f80100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.555848] ffff888101f80180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.557195] >ffff888101f80200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.557976] ^ [ 21.558960] ffff888101f80280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.559465] ffff888101f80300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.560278] ================================================================== [ 21.463904] ================================================================== [ 21.464441] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90 [ 21.465308] Write of size 8 at addr ffff888101f80208 by task kunit_try_catch/266 [ 21.466016] [ 21.466317] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 21.466722] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.466793] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.466884] Call Trace: [ 21.466934] <TASK> [ 21.466980] dump_stack_lvl+0x73/0xb0 [ 21.467065] print_report+0xd1/0x640 [ 21.467145] ? __virt_addr_valid+0x1db/0x2d0 [ 21.467237] ? kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90 [ 21.467330] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.467404] ? kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90 [ 21.467483] kasan_report+0x140/0x180 [ 21.467559] ? kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90 [ 21.467653] kasan_check_range+0x10c/0x1c0 [ 21.467726] __kasan_check_write+0x18/0x20 [ 21.467801] kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90 [ 21.467900] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 21.468031] ? __kmalloc_cache_noprof+0x168/0x350 [ 21.468134] kasan_bitops_generic+0x122/0x1c0 [ 21.468258] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 21.468340] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 21.468425] kunit_try_run_case+0x1a6/0x480 [ 21.468532] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.468601] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 21.468678] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.468759] ? __kthread_parkme+0x82/0x160 [ 21.468790] ? preempt_count_sub+0x50/0x80 [ 21.468831] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.468894] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.468934] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.468976] kthread+0x257/0x310 [ 21.469002] ? __pfx_kthread+0x10/0x10 [ 21.469029] ret_from_fork+0x41/0x80 [ 21.469057] ? __pfx_kthread+0x10/0x10 [ 21.469082] ret_from_fork_asm+0x1a/0x30 [ 21.469122] </TASK> [ 21.469136] [ 21.488180] Allocated by task 266: [ 21.488749] kasan_save_stack+0x45/0x70 [ 21.489398] kasan_save_track+0x18/0x40 [ 21.489815] kasan_save_alloc_info+0x3b/0x50 [ 21.490830] __kasan_kmalloc+0xb7/0xc0 [ 21.491150] __kmalloc_cache_noprof+0x168/0x350 [ 21.491758] kasan_bitops_generic+0x93/0x1c0 [ 21.492420] kunit_try_run_case+0x1a6/0x480 [ 21.492942] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.493642] kthread+0x257/0x310 [ 21.494020] ret_from_fork+0x41/0x80 [ 21.494332] ret_from_fork_asm+0x1a/0x30 [ 21.494724] [ 21.495740] The buggy address belongs to the object at ffff888101f80200 [ 21.495740] which belongs to the cache kmalloc-16 of size 16 [ 21.497012] The buggy address is located 8 bytes inside of [ 21.497012] allocated 9-byte region [ffff888101f80200, ffff888101f80209) [ 21.498272] [ 21.498528] The buggy address belongs to the physical page: [ 21.499035] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101f80 [ 21.500126] flags: 0x200000000000000(node=0|zone=2) [ 21.500664] page_type: f5(slab) [ 21.501215] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 21.502087] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 21.503169] page dumped because: kasan: bad access detected [ 21.503751] [ 21.504093] Memory state around the buggy address: [ 21.504635] ffff888101f80100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.505440] ffff888101f80180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.506094] >ffff888101f80200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.506986] ^ [ 21.507657] ffff888101f80280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.508205] ffff888101f80300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.508716] ================================================================== [ 21.718006] ================================================================== [ 21.718839] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90 [ 21.720085] Write of size 8 at addr ffff888101f80208 by task kunit_try_catch/266 [ 21.721019] [ 21.721304] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 21.721461] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.721499] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.721961] Call Trace: [ 21.722016] <TASK> [ 21.722099] dump_stack_lvl+0x73/0xb0 [ 21.722178] print_report+0xd1/0x640 [ 21.722275] ? __virt_addr_valid+0x1db/0x2d0 [ 21.722351] ? kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90 [ 21.722427] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.722510] ? kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90 [ 21.722591] kasan_report+0x140/0x180 [ 21.722713] ? kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90 [ 21.722832] kasan_check_range+0x10c/0x1c0 [ 21.722909] __kasan_check_write+0x18/0x20 [ 21.722981] kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90 [ 21.723062] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 21.723145] ? __kmalloc_cache_noprof+0x168/0x350 [ 21.723198] kasan_bitops_generic+0x122/0x1c0 [ 21.723269] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 21.723344] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 21.723420] kunit_try_run_case+0x1a6/0x480 [ 21.723477] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.723549] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 21.723621] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.723663] ? __kthread_parkme+0x82/0x160 [ 21.723692] ? preempt_count_sub+0x50/0x80 [ 21.723723] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.723752] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.723789] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.723844] kthread+0x257/0x310 [ 21.723882] ? __pfx_kthread+0x10/0x10 [ 21.723910] ret_from_fork+0x41/0x80 [ 21.723940] ? __pfx_kthread+0x10/0x10 [ 21.723965] ret_from_fork_asm+0x1a/0x30 [ 21.724006] </TASK> [ 21.724019] [ 21.742663] Allocated by task 266: [ 21.743945] kasan_save_stack+0x45/0x70 [ 21.744261] kasan_save_track+0x18/0x40 [ 21.744728] kasan_save_alloc_info+0x3b/0x50 [ 21.745539] __kasan_kmalloc+0xb7/0xc0 [ 21.745860] __kmalloc_cache_noprof+0x168/0x350 [ 21.746124] kasan_bitops_generic+0x93/0x1c0 [ 21.746388] kunit_try_run_case+0x1a6/0x480 [ 21.746744] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.747367] kthread+0x257/0x310 [ 21.748093] ret_from_fork+0x41/0x80 [ 21.748988] ret_from_fork_asm+0x1a/0x30 [ 21.749924] [ 21.750354] The buggy address belongs to the object at ffff888101f80200 [ 21.750354] which belongs to the cache kmalloc-16 of size 16 [ 21.751747] The buggy address is located 8 bytes inside of [ 21.751747] allocated 9-byte region [ffff888101f80200, ffff888101f80209) [ 21.752573] [ 21.752732] The buggy address belongs to the physical page: [ 21.753131] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101f80 [ 21.755088] flags: 0x200000000000000(node=0|zone=2) [ 21.755808] page_type: f5(slab) [ 21.756539] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 21.757159] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 21.758255] page dumped because: kasan: bad access detected [ 21.759092] [ 21.759295] Memory state around the buggy address: [ 21.760108] ffff888101f80100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.761211] ffff888101f80180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.761930] >ffff888101f80200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.762517] ^ [ 21.763382] ffff888101f80280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.764042] ffff888101f80300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.764679] ================================================================== [ 21.618741] ================================================================== [ 21.619131] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90 [ 21.619617] Write of size 8 at addr ffff888101f80208 by task kunit_try_catch/266 [ 21.619999] [ 21.620183] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 21.620378] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.620408] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.620460] Call Trace: [ 21.620505] <TASK> [ 21.620543] dump_stack_lvl+0x73/0xb0 [ 21.620601] print_report+0xd1/0x640 [ 21.620655] ? __virt_addr_valid+0x1db/0x2d0 [ 21.620708] ? kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90 [ 21.620780] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.620887] ? kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90 [ 21.620952] kasan_report+0x140/0x180 [ 21.621011] ? kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90 [ 21.621080] kasan_check_range+0x10c/0x1c0 [ 21.621130] __kasan_check_write+0x18/0x20 [ 21.621178] kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90 [ 21.621259] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 21.621325] ? __kmalloc_cache_noprof+0x168/0x350 [ 21.621393] kasan_bitops_generic+0x122/0x1c0 [ 21.621473] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 21.621544] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 21.621622] kunit_try_run_case+0x1a6/0x480 [ 21.621697] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.621756] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 21.621861] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.622012] ? __kthread_parkme+0x82/0x160 [ 21.622073] ? preempt_count_sub+0x50/0x80 [ 21.622126] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.622170] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.622258] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.622324] kthread+0x257/0x310 [ 21.622371] ? __pfx_kthread+0x10/0x10 [ 21.622420] ret_from_fork+0x41/0x80 [ 21.622520] ? __pfx_kthread+0x10/0x10 [ 21.622569] ret_from_fork_asm+0x1a/0x30 [ 21.622640] </TASK> [ 21.622664] [ 21.643130] Allocated by task 266: [ 21.643751] kasan_save_stack+0x45/0x70 [ 21.644841] kasan_save_track+0x18/0x40 [ 21.645284] kasan_save_alloc_info+0x3b/0x50 [ 21.646076] __kasan_kmalloc+0xb7/0xc0 [ 21.646576] __kmalloc_cache_noprof+0x168/0x350 [ 21.647209] kasan_bitops_generic+0x93/0x1c0 [ 21.648089] kunit_try_run_case+0x1a6/0x480 [ 21.650122] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.650704] kthread+0x257/0x310 [ 21.651034] ret_from_fork+0x41/0x80 [ 21.651760] ret_from_fork_asm+0x1a/0x30 [ 21.652145] [ 21.652448] The buggy address belongs to the object at ffff888101f80200 [ 21.652448] which belongs to the cache kmalloc-16 of size 16 [ 21.653781] The buggy address is located 8 bytes inside of [ 21.653781] allocated 9-byte region [ffff888101f80200, ffff888101f80209) [ 21.655368] [ 21.655531] The buggy address belongs to the physical page: [ 21.655942] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101f80 [ 21.656741] flags: 0x200000000000000(node=0|zone=2) [ 21.658216] page_type: f5(slab) [ 21.658543] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 21.659128] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 21.659714] page dumped because: kasan: bad access detected [ 21.660170] [ 21.660452] Memory state around the buggy address: [ 21.661218] ffff888101f80100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.662194] ffff888101f80180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.663765] >ffff888101f80200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.664932] ^ [ 21.665286] ffff888101f80280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.666385] ffff888101f80300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.667180] ================================================================== [ 21.668322] ================================================================== [ 21.669156] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90 [ 21.670510] Write of size 8 at addr ffff888101f80208 by task kunit_try_catch/266 [ 21.671414] [ 21.671908] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 21.672054] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.672090] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.672194] Call Trace: [ 21.672280] <TASK> [ 21.672332] dump_stack_lvl+0x73/0xb0 [ 21.672411] print_report+0xd1/0x640 [ 21.672483] ? __virt_addr_valid+0x1db/0x2d0 [ 21.672564] ? kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90 [ 21.672641] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.672721] ? kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90 [ 21.672799] kasan_report+0x140/0x180 [ 21.672881] ? kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90 [ 21.672936] kasan_check_range+0x10c/0x1c0 [ 21.672967] __kasan_check_write+0x18/0x20 [ 21.672997] kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90 [ 21.673033] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 21.673071] ? __kmalloc_cache_noprof+0x168/0x350 [ 21.673109] kasan_bitops_generic+0x122/0x1c0 [ 21.673140] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 21.673169] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 21.673204] kunit_try_run_case+0x1a6/0x480 [ 21.673263] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.673294] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 21.673324] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.673363] ? __kthread_parkme+0x82/0x160 [ 21.673391] ? preempt_count_sub+0x50/0x80 [ 21.673421] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.673467] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.673553] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.673604] kthread+0x257/0x310 [ 21.673630] ? __pfx_kthread+0x10/0x10 [ 21.673655] ret_from_fork+0x41/0x80 [ 21.673684] ? __pfx_kthread+0x10/0x10 [ 21.673709] ret_from_fork_asm+0x1a/0x30 [ 21.673750] </TASK> [ 21.673764] [ 21.695317] Allocated by task 266: [ 21.695794] kasan_save_stack+0x45/0x70 [ 21.696191] kasan_save_track+0x18/0x40 [ 21.696589] kasan_save_alloc_info+0x3b/0x50 [ 21.697235] __kasan_kmalloc+0xb7/0xc0 [ 21.697716] __kmalloc_cache_noprof+0x168/0x350 [ 21.698451] kasan_bitops_generic+0x93/0x1c0 [ 21.698813] kunit_try_run_case+0x1a6/0x480 [ 21.699660] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.700139] kthread+0x257/0x310 [ 21.700602] ret_from_fork+0x41/0x80 [ 21.701008] ret_from_fork_asm+0x1a/0x30 [ 21.701507] [ 21.701713] The buggy address belongs to the object at ffff888101f80200 [ 21.701713] which belongs to the cache kmalloc-16 of size 16 [ 21.703394] The buggy address is located 8 bytes inside of [ 21.703394] allocated 9-byte region [ffff888101f80200, ffff888101f80209) [ 21.705433] [ 21.706045] The buggy address belongs to the physical page: [ 21.706665] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101f80 [ 21.707794] flags: 0x200000000000000(node=0|zone=2) [ 21.708158] page_type: f5(slab) [ 21.708746] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 21.709621] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 21.710718] page dumped because: kasan: bad access detected [ 21.711295] [ 21.711506] Memory state around the buggy address: [ 21.712156] ffff888101f80100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.712860] ffff888101f80180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.713661] >ffff888101f80200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.714778] ^ [ 21.715247] ffff888101f80280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.716059] ffff888101f80300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.716565] ==================================================================