Date
March 19, 2025, 10:35 a.m.
Environment | |
---|---|
qemu-x86_64 |
[ 25.097077] ================================================================== [ 25.097522] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 25.098558] Write of size 8 at addr ffff888100a7a9a8 by task kunit_try_catch/282 [ 25.099385] [ 25.100164] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) [ 25.100303] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.100342] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.100398] Call Trace: [ 25.100433] <TASK> [ 25.100486] dump_stack_lvl+0x73/0xb0 [ 25.100594] print_report+0xd1/0x660 [ 25.100667] ? __virt_addr_valid+0x1db/0x2d0 [ 25.101031] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.101135] kasan_report+0x104/0x140 [ 25.101201] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 25.101245] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 25.101293] kasan_check_range+0x10c/0x1c0 [ 25.101329] __kasan_check_write+0x18/0x20 [ 25.101358] kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 25.101397] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 25.101436] ? kasan_save_alloc_info+0x3b/0x50 [ 25.101470] ? kasan_save_stack+0x3d/0x60 [ 25.101508] kasan_bitops_generic+0x116/0x1c0 [ 25.101542] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 25.101579] ? __pfx_read_tsc+0x10/0x10 [ 25.101612] ? ktime_get_ts64+0x86/0x240 [ 25.101648] kunit_try_run_case+0x1b2/0x490 [ 25.101753] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.101815] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.101897] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.101932] ? __kthread_parkme+0x82/0x160 [ 25.101964] ? preempt_count_sub+0x50/0x80 [ 25.102001] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.102037] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.102072] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.102106] kthread+0x323/0x710 [ 25.102160] ? trace_preempt_on+0x20/0xc0 [ 25.102196] ? __pfx_kthread+0x10/0x10 [ 25.102227] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.102257] ? calculate_sigpending+0x7b/0xa0 [ 25.102289] ? __pfx_kthread+0x10/0x10 [ 25.102321] ret_from_fork+0x41/0x80 [ 25.102353] ? __pfx_kthread+0x10/0x10 [ 25.102384] ret_from_fork_asm+0x1a/0x30 [ 25.102432] </TASK> [ 25.102448] [ 25.121954] Allocated by task 282: [ 25.122305] kasan_save_stack+0x3d/0x60 [ 25.122659] kasan_save_track+0x18/0x40 [ 25.123371] kasan_save_alloc_info+0x3b/0x50 [ 25.124103] __kasan_kmalloc+0xb7/0xc0 [ 25.124584] __kmalloc_cache_noprof+0x183/0x410 [ 25.125185] kasan_bitops_generic+0x92/0x1c0 [ 25.125932] kunit_try_run_case+0x1b2/0x490 [ 25.126574] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.127350] kthread+0x323/0x710 [ 25.127879] ret_from_fork+0x41/0x80 [ 25.128430] ret_from_fork_asm+0x1a/0x30 [ 25.128916] [ 25.129250] The buggy address belongs to the object at ffff888100a7a9a0 [ 25.129250] which belongs to the cache kmalloc-16 of size 16 [ 25.130574] The buggy address is located 8 bytes inside of [ 25.130574] allocated 9-byte region [ffff888100a7a9a0, ffff888100a7a9a9) [ 25.132106] [ 25.132393] The buggy address belongs to the physical page: [ 25.132885] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a7a [ 25.133845] flags: 0x200000000000000(node=0|zone=2) [ 25.134496] page_type: f5(slab) [ 25.135035] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 25.135924] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 25.136973] page dumped because: kasan: bad access detected [ 25.137537] [ 25.138198] Memory state around the buggy address: [ 25.139037] ffff888100a7a880: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc [ 25.139695] ffff888100a7a900: 00 02 fc fc 00 02 fc fc 00 04 fc fc fa fb fc fc [ 25.140392] >ffff888100a7a980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 25.141570] ^ [ 25.142293] ffff888100a7aa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.143254] ffff888100a7aa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.144284] ================================================================== [ 25.353584] ================================================================== [ 25.354747] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50 [ 25.355340] Write of size 8 at addr ffff888100a7a9a8 by task kunit_try_catch/282 [ 25.356652] [ 25.357175] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) [ 25.357379] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.357422] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.357481] Call Trace: [ 25.357516] <TASK> [ 25.357552] dump_stack_lvl+0x73/0xb0 [ 25.357626] print_report+0xd1/0x660 [ 25.357695] ? __virt_addr_valid+0x1db/0x2d0 [ 25.357814] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.358054] kasan_report+0x104/0x140 [ 25.358211] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 25.358294] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 25.358381] kasan_check_range+0x10c/0x1c0 [ 25.358452] __kasan_check_write+0x18/0x20 [ 25.358508] kasan_bitops_modify.constprop.0+0x547/0xd50 [ 25.358583] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 25.358656] ? kasan_save_alloc_info+0x3b/0x50 [ 25.358992] ? kasan_save_stack+0x3d/0x60 [ 25.359077] kasan_bitops_generic+0x116/0x1c0 [ 25.359145] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 25.359187] ? __pfx_read_tsc+0x10/0x10 [ 25.359219] ? ktime_get_ts64+0x86/0x240 [ 25.359256] kunit_try_run_case+0x1b2/0x490 [ 25.359292] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.359323] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.359354] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.359386] ? __kthread_parkme+0x82/0x160 [ 25.359415] ? preempt_count_sub+0x50/0x80 [ 25.359452] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.359486] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.359519] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.359552] kthread+0x323/0x710 [ 25.359582] ? trace_preempt_on+0x20/0xc0 [ 25.359642] ? __pfx_kthread+0x10/0x10 [ 25.359677] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.359778] ? calculate_sigpending+0x7b/0xa0 [ 25.359858] ? __pfx_kthread+0x10/0x10 [ 25.359917] ret_from_fork+0x41/0x80 [ 25.359983] ? __pfx_kthread+0x10/0x10 [ 25.360039] ret_from_fork_asm+0x1a/0x30 [ 25.360142] </TASK> [ 25.360168] [ 25.384925] Allocated by task 282: [ 25.385626] kasan_save_stack+0x3d/0x60 [ 25.386420] kasan_save_track+0x18/0x40 [ 25.386997] kasan_save_alloc_info+0x3b/0x50 [ 25.387682] __kasan_kmalloc+0xb7/0xc0 [ 25.388448] __kmalloc_cache_noprof+0x183/0x410 [ 25.388807] kasan_bitops_generic+0x92/0x1c0 [ 25.389414] kunit_try_run_case+0x1b2/0x490 [ 25.390359] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.391074] kthread+0x323/0x710 [ 25.391483] ret_from_fork+0x41/0x80 [ 25.392208] ret_from_fork_asm+0x1a/0x30 [ 25.392637] [ 25.393368] The buggy address belongs to the object at ffff888100a7a9a0 [ 25.393368] which belongs to the cache kmalloc-16 of size 16 [ 25.394444] The buggy address is located 8 bytes inside of [ 25.394444] allocated 9-byte region [ffff888100a7a9a0, ffff888100a7a9a9) [ 25.396232] [ 25.396586] The buggy address belongs to the physical page: [ 25.397165] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a7a [ 25.398023] flags: 0x200000000000000(node=0|zone=2) [ 25.398570] page_type: f5(slab) [ 25.399142] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 25.400359] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 25.401145] page dumped because: kasan: bad access detected [ 25.401975] [ 25.402289] Memory state around the buggy address: [ 25.402948] ffff888100a7a880: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc [ 25.404288] ffff888100a7a900: 00 02 fc fc 00 02 fc fc 00 04 fc fc fa fb fc fc [ 25.404824] >ffff888100a7a980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 25.405917] ^ [ 25.406405] ffff888100a7aa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.407273] ffff888100a7aa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.408381] ================================================================== [ 25.240465] ================================================================== [ 25.241507] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 25.243045] Write of size 8 at addr ffff888100a7a9a8 by task kunit_try_catch/282 [ 25.244179] [ 25.244385] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) [ 25.244510] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.244541] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.244592] Call Trace: [ 25.244623] <TASK> [ 25.244656] dump_stack_lvl+0x73/0xb0 [ 25.244743] print_report+0xd1/0x660 [ 25.244803] ? __virt_addr_valid+0x1db/0x2d0 [ 25.244910] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.244969] kasan_report+0x104/0x140 [ 25.245019] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 25.245093] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 25.246636] kasan_check_range+0x10c/0x1c0 [ 25.246973] __kasan_check_write+0x18/0x20 [ 25.247036] kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 25.247129] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 25.247215] ? kasan_save_alloc_info+0x3b/0x50 [ 25.247280] ? kasan_save_stack+0x3d/0x60 [ 25.247355] kasan_bitops_generic+0x116/0x1c0 [ 25.247421] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 25.247492] ? __pfx_read_tsc+0x10/0x10 [ 25.247548] ? ktime_get_ts64+0x86/0x240 [ 25.247636] kunit_try_run_case+0x1b2/0x490 [ 25.248181] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.248263] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.248319] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.248379] ? __kthread_parkme+0x82/0x160 [ 25.248430] ? preempt_count_sub+0x50/0x80 [ 25.248489] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.248546] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.248608] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.248672] kthread+0x323/0x710 [ 25.249039] ? trace_preempt_on+0x20/0xc0 [ 25.249101] ? __pfx_kthread+0x10/0x10 [ 25.249182] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.249232] ? calculate_sigpending+0x7b/0xa0 [ 25.249285] ? __pfx_kthread+0x10/0x10 [ 25.249339] ret_from_fork+0x41/0x80 [ 25.249392] ? __pfx_kthread+0x10/0x10 [ 25.249446] ret_from_fork_asm+0x1a/0x30 [ 25.249530] </TASK> [ 25.249560] [ 25.274931] Allocated by task 282: [ 25.275393] kasan_save_stack+0x3d/0x60 [ 25.275891] kasan_save_track+0x18/0x40 [ 25.276510] kasan_save_alloc_info+0x3b/0x50 [ 25.277059] __kasan_kmalloc+0xb7/0xc0 [ 25.279198] __kmalloc_cache_noprof+0x183/0x410 [ 25.279685] kasan_bitops_generic+0x92/0x1c0 [ 25.280199] kunit_try_run_case+0x1b2/0x490 [ 25.281215] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.281891] kthread+0x323/0x710 [ 25.282252] ret_from_fork+0x41/0x80 [ 25.283504] ret_from_fork_asm+0x1a/0x30 [ 25.284055] [ 25.284344] The buggy address belongs to the object at ffff888100a7a9a0 [ 25.284344] which belongs to the cache kmalloc-16 of size 16 [ 25.286018] The buggy address is located 8 bytes inside of [ 25.286018] allocated 9-byte region [ffff888100a7a9a0, ffff888100a7a9a9) [ 25.286843] [ 25.287103] The buggy address belongs to the physical page: [ 25.288072] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a7a [ 25.288991] flags: 0x200000000000000(node=0|zone=2) [ 25.289534] page_type: f5(slab) [ 25.290182] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 25.290922] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 25.291370] page dumped because: kasan: bad access detected [ 25.292745] [ 25.292971] Memory state around the buggy address: [ 25.293314] ffff888100a7a880: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc [ 25.293993] ffff888100a7a900: 00 02 fc fc 00 02 fc fc 00 04 fc fc fa fb fc fc [ 25.295022] >ffff888100a7a980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 25.295803] ^ [ 25.296274] ffff888100a7aa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.297582] ffff888100a7aa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.298270] ================================================================== [ 25.045448] ================================================================== [ 25.046339] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 25.047172] Write of size 8 at addr ffff888100a7a9a8 by task kunit_try_catch/282 [ 25.047819] [ 25.048202] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) [ 25.048349] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.048385] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.048437] Call Trace: [ 25.048475] <TASK> [ 25.048531] dump_stack_lvl+0x73/0xb0 [ 25.048639] print_report+0xd1/0x660 [ 25.048789] ? __virt_addr_valid+0x1db/0x2d0 [ 25.049312] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.049427] kasan_report+0x104/0x140 [ 25.049492] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 25.049574] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 25.049668] kasan_check_range+0x10c/0x1c0 [ 25.049743] __kasan_check_write+0x18/0x20 [ 25.049806] kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 25.049879] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 25.049958] ? kasan_save_alloc_info+0x3b/0x50 [ 25.050148] ? kasan_save_stack+0x3d/0x60 [ 25.050241] kasan_bitops_generic+0x116/0x1c0 [ 25.050316] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 25.050390] ? __pfx_read_tsc+0x10/0x10 [ 25.050455] ? ktime_get_ts64+0x86/0x240 [ 25.050522] kunit_try_run_case+0x1b2/0x490 [ 25.050591] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.050651] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.050881] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.050973] ? __kthread_parkme+0x82/0x160 [ 25.051034] ? preempt_count_sub+0x50/0x80 [ 25.051107] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.051220] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.051319] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.051392] kthread+0x323/0x710 [ 25.051451] ? trace_preempt_on+0x20/0xc0 [ 25.051501] ? __pfx_kthread+0x10/0x10 [ 25.051534] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.051566] ? calculate_sigpending+0x7b/0xa0 [ 25.051628] ? __pfx_kthread+0x10/0x10 [ 25.051664] ret_from_fork+0x41/0x80 [ 25.051752] ? __pfx_kthread+0x10/0x10 [ 25.051859] ret_from_fork_asm+0x1a/0x30 [ 25.051922] </TASK> [ 25.051953] [ 25.074230] Allocated by task 282: [ 25.074465] kasan_save_stack+0x3d/0x60 [ 25.074919] kasan_save_track+0x18/0x40 [ 25.075773] kasan_save_alloc_info+0x3b/0x50 [ 25.076439] __kasan_kmalloc+0xb7/0xc0 [ 25.077149] __kmalloc_cache_noprof+0x183/0x410 [ 25.077888] kasan_bitops_generic+0x92/0x1c0 [ 25.078426] kunit_try_run_case+0x1b2/0x490 [ 25.079086] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.080035] kthread+0x323/0x710 [ 25.080571] ret_from_fork+0x41/0x80 [ 25.081165] ret_from_fork_asm+0x1a/0x30 [ 25.081987] [ 25.082348] The buggy address belongs to the object at ffff888100a7a9a0 [ 25.082348] which belongs to the cache kmalloc-16 of size 16 [ 25.083837] The buggy address is located 8 bytes inside of [ 25.083837] allocated 9-byte region [ffff888100a7a9a0, ffff888100a7a9a9) [ 25.085388] [ 25.085636] The buggy address belongs to the physical page: [ 25.086155] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a7a [ 25.086420] flags: 0x200000000000000(node=0|zone=2) [ 25.086593] page_type: f5(slab) [ 25.086722] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 25.086950] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 25.088963] page dumped because: kasan: bad access detected [ 25.089518] [ 25.089747] Memory state around the buggy address: [ 25.090231] ffff888100a7a880: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc [ 25.090907] ffff888100a7a900: 00 02 fc fc 00 02 fc fc 00 04 fc fc fa fb fc fc [ 25.092231] >ffff888100a7a980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 25.092749] ^ [ 25.093854] ffff888100a7aa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.094419] ffff888100a7aa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.094973] ================================================================== [ 24.991995] ================================================================== [ 24.992910] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50 [ 24.994034] Write of size 8 at addr ffff888100a7a9a8 by task kunit_try_catch/282 [ 24.994559] [ 24.994822] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) [ 24.994977] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.995017] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.995075] Call Trace: [ 24.995482] <TASK> [ 24.995547] dump_stack_lvl+0x73/0xb0 [ 24.995662] print_report+0xd1/0x660 [ 24.995776] ? __virt_addr_valid+0x1db/0x2d0 [ 24.996214] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.996305] kasan_report+0x104/0x140 [ 24.996356] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 24.996401] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 24.996449] kasan_check_range+0x10c/0x1c0 [ 24.996485] __kasan_check_write+0x18/0x20 [ 24.996516] kasan_bitops_modify.constprop.0+0x101/0xd50 [ 24.996554] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 24.996594] ? kasan_save_alloc_info+0x3b/0x50 [ 24.996629] ? kasan_save_stack+0x3d/0x60 [ 24.996667] kasan_bitops_generic+0x116/0x1c0 [ 24.997016] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 24.997142] ? __pfx_read_tsc+0x10/0x10 [ 24.997185] ? ktime_get_ts64+0x86/0x240 [ 24.997226] kunit_try_run_case+0x1b2/0x490 [ 24.997265] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.997299] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.997331] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.997364] ? __kthread_parkme+0x82/0x160 [ 24.997396] ? preempt_count_sub+0x50/0x80 [ 24.997435] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.997471] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.997505] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.997539] kthread+0x323/0x710 [ 24.997570] ? trace_preempt_on+0x20/0xc0 [ 24.997604] ? __pfx_kthread+0x10/0x10 [ 24.997636] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.997666] ? calculate_sigpending+0x7b/0xa0 [ 24.997751] ? __pfx_kthread+0x10/0x10 [ 24.997828] ret_from_fork+0x41/0x80 [ 24.997887] ? __pfx_kthread+0x10/0x10 [ 24.997922] ret_from_fork_asm+0x1a/0x30 [ 24.997972] </TASK> [ 24.997990] [ 25.019961] Allocated by task 282: [ 25.020239] kasan_save_stack+0x3d/0x60 [ 25.020651] kasan_save_track+0x18/0x40 [ 25.022798] kasan_save_alloc_info+0x3b/0x50 [ 25.023510] __kasan_kmalloc+0xb7/0xc0 [ 25.023971] __kmalloc_cache_noprof+0x183/0x410 [ 25.024915] kasan_bitops_generic+0x92/0x1c0 [ 25.025593] kunit_try_run_case+0x1b2/0x490 [ 25.026277] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.026703] kthread+0x323/0x710 [ 25.027574] ret_from_fork+0x41/0x80 [ 25.028056] ret_from_fork_asm+0x1a/0x30 [ 25.028918] [ 25.029222] The buggy address belongs to the object at ffff888100a7a9a0 [ 25.029222] which belongs to the cache kmalloc-16 of size 16 [ 25.031139] The buggy address is located 8 bytes inside of [ 25.031139] allocated 9-byte region [ffff888100a7a9a0, ffff888100a7a9a9) [ 25.032420] [ 25.033149] The buggy address belongs to the physical page: [ 25.033763] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a7a [ 25.034528] flags: 0x200000000000000(node=0|zone=2) [ 25.035403] page_type: f5(slab) [ 25.036257] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 25.037152] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 25.038066] page dumped because: kasan: bad access detected [ 25.039130] [ 25.039291] Memory state around the buggy address: [ 25.039772] ffff888100a7a880: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc [ 25.040345] ffff888100a7a900: 00 02 fc fc 00 02 fc fc 00 04 fc fc fa fb fc fc [ 25.041133] >ffff888100a7a980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 25.041530] ^ [ 25.042574] ffff888100a7aa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.043475] ffff888100a7aa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.044016] ================================================================== [ 25.299865] ================================================================== [ 25.301508] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 25.302365] Write of size 8 at addr ffff888100a7a9a8 by task kunit_try_catch/282 [ 25.302943] [ 25.303475] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) [ 25.303624] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.303663] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.303760] Call Trace: [ 25.303803] <TASK> [ 25.303842] dump_stack_lvl+0x73/0xb0 [ 25.303946] print_report+0xd1/0x660 [ 25.304055] ? __virt_addr_valid+0x1db/0x2d0 [ 25.304206] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.304727] kasan_report+0x104/0x140 [ 25.304862] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 25.304951] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 25.305039] kasan_check_range+0x10c/0x1c0 [ 25.305131] __kasan_check_write+0x18/0x20 [ 25.305193] kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 25.305640] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 25.305770] ? kasan_save_alloc_info+0x3b/0x50 [ 25.305850] ? kasan_save_stack+0x3d/0x60 [ 25.305928] kasan_bitops_generic+0x116/0x1c0 [ 25.305998] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 25.306065] ? __pfx_read_tsc+0x10/0x10 [ 25.306100] ? ktime_get_ts64+0x86/0x240 [ 25.306180] kunit_try_run_case+0x1b2/0x490 [ 25.306292] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.306332] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.306365] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.306397] ? __kthread_parkme+0x82/0x160 [ 25.306428] ? preempt_count_sub+0x50/0x80 [ 25.306466] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.306501] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.306536] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.306569] kthread+0x323/0x710 [ 25.306599] ? trace_preempt_on+0x20/0xc0 [ 25.306633] ? __pfx_kthread+0x10/0x10 [ 25.306665] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.306735] ? calculate_sigpending+0x7b/0xa0 [ 25.306803] ? __pfx_kthread+0x10/0x10 [ 25.306862] ret_from_fork+0x41/0x80 [ 25.306927] ? __pfx_kthread+0x10/0x10 [ 25.306961] ret_from_fork_asm+0x1a/0x30 [ 25.307009] </TASK> [ 25.307027] [ 25.330784] Allocated by task 282: [ 25.331042] kasan_save_stack+0x3d/0x60 [ 25.331340] kasan_save_track+0x18/0x40 [ 25.331542] kasan_save_alloc_info+0x3b/0x50 [ 25.331740] __kasan_kmalloc+0xb7/0xc0 [ 25.331886] __kmalloc_cache_noprof+0x183/0x410 [ 25.332059] kasan_bitops_generic+0x92/0x1c0 [ 25.332577] kunit_try_run_case+0x1b2/0x490 [ 25.333039] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.333868] kthread+0x323/0x710 [ 25.334580] ret_from_fork+0x41/0x80 [ 25.335070] ret_from_fork_asm+0x1a/0x30 [ 25.335525] [ 25.336382] The buggy address belongs to the object at ffff888100a7a9a0 [ 25.336382] which belongs to the cache kmalloc-16 of size 16 [ 25.337749] The buggy address is located 8 bytes inside of [ 25.337749] allocated 9-byte region [ffff888100a7a9a0, ffff888100a7a9a9) [ 25.338955] [ 25.339242] The buggy address belongs to the physical page: [ 25.339776] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a7a [ 25.340328] flags: 0x200000000000000(node=0|zone=2) [ 25.340732] page_type: f5(slab) [ 25.341184] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 25.342559] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 25.343544] page dumped because: kasan: bad access detected [ 25.344564] [ 25.344955] Memory state around the buggy address: [ 25.345423] ffff888100a7a880: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc [ 25.346336] ffff888100a7a900: 00 02 fc fc 00 02 fc fc 00 04 fc fc fa fb fc fc [ 25.346986] >ffff888100a7a980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 25.348767] ^ [ 25.349422] ffff888100a7aa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.350784] ffff888100a7aa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.351695] ================================================================== [ 25.145612] ================================================================== [ 25.146048] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 25.146528] Write of size 8 at addr ffff888100a7a9a8 by task kunit_try_catch/282 [ 25.147241] [ 25.147491] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) [ 25.148039] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.148084] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.148167] Call Trace: [ 25.148225] <TASK> [ 25.148264] dump_stack_lvl+0x73/0xb0 [ 25.148339] print_report+0xd1/0x660 [ 25.148406] ? __virt_addr_valid+0x1db/0x2d0 [ 25.148526] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.148602] kasan_report+0x104/0x140 [ 25.148660] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 25.148739] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 25.148833] kasan_check_range+0x10c/0x1c0 [ 25.148906] __kasan_check_write+0x18/0x20 [ 25.148965] kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 25.149041] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 25.149144] ? kasan_save_alloc_info+0x3b/0x50 [ 25.149389] ? kasan_save_stack+0x3d/0x60 [ 25.149475] kasan_bitops_generic+0x116/0x1c0 [ 25.149550] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 25.149619] ? __pfx_read_tsc+0x10/0x10 [ 25.149678] ? ktime_get_ts64+0x86/0x240 [ 25.149903] kunit_try_run_case+0x1b2/0x490 [ 25.149986] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.150047] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.150083] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.150150] ? __kthread_parkme+0x82/0x160 [ 25.150186] ? preempt_count_sub+0x50/0x80 [ 25.150225] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.150260] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.150295] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.150328] kthread+0x323/0x710 [ 25.150359] ? trace_preempt_on+0x20/0xc0 [ 25.150392] ? __pfx_kthread+0x10/0x10 [ 25.150424] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.150453] ? calculate_sigpending+0x7b/0xa0 [ 25.150483] ? __pfx_kthread+0x10/0x10 [ 25.150515] ret_from_fork+0x41/0x80 [ 25.150547] ? __pfx_kthread+0x10/0x10 [ 25.150578] ret_from_fork_asm+0x1a/0x30 [ 25.150626] </TASK> [ 25.150641] [ 25.170617] Allocated by task 282: [ 25.171033] kasan_save_stack+0x3d/0x60 [ 25.171453] kasan_save_track+0x18/0x40 [ 25.171903] kasan_save_alloc_info+0x3b/0x50 [ 25.172738] __kasan_kmalloc+0xb7/0xc0 [ 25.173925] __kmalloc_cache_noprof+0x183/0x410 [ 25.174388] kasan_bitops_generic+0x92/0x1c0 [ 25.175037] kunit_try_run_case+0x1b2/0x490 [ 25.175396] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.176166] kthread+0x323/0x710 [ 25.176497] ret_from_fork+0x41/0x80 [ 25.177353] ret_from_fork_asm+0x1a/0x30 [ 25.177890] [ 25.178141] The buggy address belongs to the object at ffff888100a7a9a0 [ 25.178141] which belongs to the cache kmalloc-16 of size 16 [ 25.178888] The buggy address is located 8 bytes inside of [ 25.178888] allocated 9-byte region [ffff888100a7a9a0, ffff888100a7a9a9) [ 25.179718] [ 25.179883] The buggy address belongs to the physical page: [ 25.180596] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a7a [ 25.181925] flags: 0x200000000000000(node=0|zone=2) [ 25.182433] page_type: f5(slab) [ 25.182990] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 25.183501] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 25.184415] page dumped because: kasan: bad access detected [ 25.185165] [ 25.185397] Memory state around the buggy address: [ 25.186040] ffff888100a7a880: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc [ 25.186529] ffff888100a7a900: 00 02 fc fc 00 02 fc fc 00 04 fc fc fa fb fc fc [ 25.187361] >ffff888100a7a980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 25.187966] ^ [ 25.188439] ffff888100a7aa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.189528] ffff888100a7aa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.190319] ================================================================== [ 25.191342] ================================================================== [ 25.192260] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50 [ 25.193391] Write of size 8 at addr ffff888100a7a9a8 by task kunit_try_catch/282 [ 25.194144] [ 25.194335] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) [ 25.194462] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.194499] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.194554] Call Trace: [ 25.194588] <TASK> [ 25.194621] dump_stack_lvl+0x73/0xb0 [ 25.194888] print_report+0xd1/0x660 [ 25.194979] ? __virt_addr_valid+0x1db/0x2d0 [ 25.195101] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.195205] kasan_report+0x104/0x140 [ 25.195267] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 25.195345] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 25.195438] kasan_check_range+0x10c/0x1c0 [ 25.195510] __kasan_check_write+0x18/0x20 [ 25.195570] kasan_bitops_modify.constprop.0+0x373/0xd50 [ 25.195853] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 25.195975] ? kasan_save_alloc_info+0x3b/0x50 [ 25.196046] ? kasan_save_stack+0x3d/0x60 [ 25.196142] kasan_bitops_generic+0x116/0x1c0 [ 25.196219] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 25.196291] ? __pfx_read_tsc+0x10/0x10 [ 25.196348] ? ktime_get_ts64+0x86/0x240 [ 25.196416] kunit_try_run_case+0x1b2/0x490 [ 25.196485] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.196549] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.196609] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.196666] ? __kthread_parkme+0x82/0x160 [ 25.196835] ? preempt_count_sub+0x50/0x80 [ 25.196913] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.196975] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.197041] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.197105] kthread+0x323/0x710 [ 25.197180] ? trace_preempt_on+0x20/0xc0 [ 25.197219] ? __pfx_kthread+0x10/0x10 [ 25.197251] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.197281] ? calculate_sigpending+0x7b/0xa0 [ 25.197314] ? __pfx_kthread+0x10/0x10 [ 25.197345] ret_from_fork+0x41/0x80 [ 25.197376] ? __pfx_kthread+0x10/0x10 [ 25.197408] ret_from_fork_asm+0x1a/0x30 [ 25.197454] </TASK> [ 25.197471] [ 25.216316] Allocated by task 282: [ 25.216961] kasan_save_stack+0x3d/0x60 [ 25.217474] kasan_save_track+0x18/0x40 [ 25.218244] kasan_save_alloc_info+0x3b/0x50 [ 25.218626] __kasan_kmalloc+0xb7/0xc0 [ 25.219101] __kmalloc_cache_noprof+0x183/0x410 [ 25.220264] kasan_bitops_generic+0x92/0x1c0 [ 25.220749] kunit_try_run_case+0x1b2/0x490 [ 25.221574] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.222141] kthread+0x323/0x710 [ 25.222523] ret_from_fork+0x41/0x80 [ 25.222803] ret_from_fork_asm+0x1a/0x30 [ 25.223597] [ 25.224306] The buggy address belongs to the object at ffff888100a7a9a0 [ 25.224306] which belongs to the cache kmalloc-16 of size 16 [ 25.225304] The buggy address is located 8 bytes inside of [ 25.225304] allocated 9-byte region [ffff888100a7a9a0, ffff888100a7a9a9) [ 25.226576] [ 25.227046] The buggy address belongs to the physical page: [ 25.228107] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a7a [ 25.229101] flags: 0x200000000000000(node=0|zone=2) [ 25.229481] page_type: f5(slab) [ 25.229901] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 25.231004] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 25.232284] page dumped because: kasan: bad access detected [ 25.232844] [ 25.233066] Memory state around the buggy address: [ 25.233499] ffff888100a7a880: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc [ 25.234552] ffff888100a7a900: 00 02 fc fc 00 02 fc fc 00 04 fc fc fa fb fc fc [ 25.235507] >ffff888100a7a980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 25.236205] ^ [ 25.237277] ffff888100a7aa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.237902] ffff888100a7aa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.238392] ==================================================================