Date
June 7, 2025, 10:40 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 24.407630] ================================================================== [ 24.408793] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2c4/0xbf8 [ 24.409497] Write of size 8 at addr fff00000c662ada8 by task kunit_try_catch/249 [ 24.410233] [ 24.411487] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 24.411699] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.411782] Hardware name: linux,dummy-virt (DT) [ 24.411866] Call trace: [ 24.411936] dump_backtrace+0x9c/0x128 [ 24.412066] show_stack+0x20/0x38 [ 24.412146] dump_stack_lvl+0x8c/0xd0 [ 24.412199] print_report+0x118/0x5f0 [ 24.412245] kasan_report+0xdc/0x128 [ 24.412289] kasan_check_range+0x100/0x1a8 [ 24.412339] __kasan_check_write+0x20/0x30 [ 24.412386] kasan_bitops_modify.constprop.0+0x2c4/0xbf8 [ 24.412445] kasan_bitops_generic+0x114/0x1d0 [ 24.412498] kunit_try_run_case+0x170/0x3f0 [ 24.412544] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.412601] kthread+0x24c/0x2d0 [ 24.412645] ret_from_fork+0x10/0x20 [ 24.412693] [ 24.421275] Allocated by task 249: [ 24.421933] kasan_save_stack+0x3c/0x68 [ 24.422664] kasan_save_track+0x20/0x40 [ 24.423219] kasan_save_alloc_info+0x40/0x58 [ 24.424140] __kasan_kmalloc+0xd4/0xd8 [ 24.424781] __kmalloc_cache_noprof+0x154/0x320 [ 24.425404] kasan_bitops_generic+0xa0/0x1d0 [ 24.426076] kunit_try_run_case+0x170/0x3f0 [ 24.426683] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.427230] kthread+0x24c/0x2d0 [ 24.428088] ret_from_fork+0x10/0x20 [ 24.428616] [ 24.429133] The buggy address belongs to the object at fff00000c662ada0 [ 24.429133] which belongs to the cache kmalloc-16 of size 16 [ 24.430444] The buggy address is located 8 bytes inside of [ 24.430444] allocated 9-byte region [fff00000c662ada0, fff00000c662ada9) [ 24.431570] [ 24.431867] The buggy address belongs to the physical page: [ 24.432582] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10662a [ 24.433537] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.434239] page_type: f5(slab) [ 24.434813] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 24.435664] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 24.436644] page dumped because: kasan: bad access detected [ 24.437461] [ 24.437852] Memory state around the buggy address: [ 24.438364] fff00000c662ac80: fa fb fc fc 00 04 fc fc 00 05 fc fc fa fb fc fc [ 24.439262] fff00000c662ad00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.440148] >fff00000c662ad80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 24.440945] ^ [ 24.441607] fff00000c662ae00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.443007] fff00000c662ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.443989] ================================================================== [ 24.290286] ================================================================== [ 24.291061] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbf8 [ 24.292009] Read of size 8 at addr fff00000c662ada8 by task kunit_try_catch/249 [ 24.292920] [ 24.293345] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 24.293554] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.293701] Hardware name: linux,dummy-virt (DT) [ 24.293786] Call trace: [ 24.293863] dump_backtrace+0x9c/0x128 [ 24.294002] show_stack+0x20/0x38 [ 24.294156] dump_stack_lvl+0x8c/0xd0 [ 24.294279] print_report+0x118/0x5f0 [ 24.294397] kasan_report+0xdc/0x128 [ 24.294513] __asan_report_load8_noabort+0x20/0x30 [ 24.294674] kasan_bitops_modify.constprop.0+0xa80/0xbf8 [ 24.294819] kasan_bitops_generic+0x114/0x1d0 [ 24.294926] kunit_try_run_case+0x170/0x3f0 [ 24.295004] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.295068] kthread+0x24c/0x2d0 [ 24.295116] ret_from_fork+0x10/0x20 [ 24.295168] [ 24.302099] Allocated by task 249: [ 24.302496] kasan_save_stack+0x3c/0x68 [ 24.303071] kasan_save_track+0x20/0x40 [ 24.304050] kasan_save_alloc_info+0x40/0x58 [ 24.304642] __kasan_kmalloc+0xd4/0xd8 [ 24.305204] __kmalloc_cache_noprof+0x154/0x320 [ 24.305822] kasan_bitops_generic+0xa0/0x1d0 [ 24.307208] kunit_try_run_case+0x170/0x3f0 [ 24.308353] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.309141] kthread+0x24c/0x2d0 [ 24.309681] ret_from_fork+0x10/0x20 [ 24.310165] [ 24.310453] The buggy address belongs to the object at fff00000c662ada0 [ 24.310453] which belongs to the cache kmalloc-16 of size 16 [ 24.311757] The buggy address is located 8 bytes inside of [ 24.311757] allocated 9-byte region [fff00000c662ada0, fff00000c662ada9) [ 24.313479] [ 24.313881] The buggy address belongs to the physical page: [ 24.314544] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10662a [ 24.315544] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.316398] page_type: f5(slab) [ 24.316609] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 24.316994] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 24.318222] page dumped because: kasan: bad access detected [ 24.318945] [ 24.319253] Memory state around the buggy address: [ 24.319810] fff00000c662ac80: fa fb fc fc 00 04 fc fc 00 05 fc fc fa fb fc fc [ 24.320497] fff00000c662ad00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.321885] >fff00000c662ad80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 24.322611] ^ [ 24.323153] fff00000c662ae00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.324314] fff00000c662ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.325012] ================================================================== [ 24.251155] ================================================================== [ 24.252916] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x104/0xbf8 [ 24.254147] Write of size 8 at addr fff00000c662ada8 by task kunit_try_catch/249 [ 24.255270] [ 24.255600] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 24.255851] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.255931] Hardware name: linux,dummy-virt (DT) [ 24.256036] Call trace: [ 24.256097] dump_backtrace+0x9c/0x128 [ 24.256205] show_stack+0x20/0x38 [ 24.256307] dump_stack_lvl+0x8c/0xd0 [ 24.256405] print_report+0x118/0x5f0 [ 24.256510] kasan_report+0xdc/0x128 [ 24.256625] kasan_check_range+0x100/0x1a8 [ 24.256743] __kasan_check_write+0x20/0x30 [ 24.256855] kasan_bitops_modify.constprop.0+0x104/0xbf8 [ 24.256918] kasan_bitops_generic+0x114/0x1d0 [ 24.257019] kunit_try_run_case+0x170/0x3f0 [ 24.257082] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.257137] kthread+0x24c/0x2d0 [ 24.257183] ret_from_fork+0x10/0x20 [ 24.257234] [ 24.266936] Allocated by task 249: [ 24.267316] kasan_save_stack+0x3c/0x68 [ 24.268419] kasan_save_track+0x20/0x40 [ 24.268909] kasan_save_alloc_info+0x40/0x58 [ 24.269403] __kasan_kmalloc+0xd4/0xd8 [ 24.269854] __kmalloc_cache_noprof+0x154/0x320 [ 24.270375] kasan_bitops_generic+0xa0/0x1d0 [ 24.270938] kunit_try_run_case+0x170/0x3f0 [ 24.271482] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.272372] kthread+0x24c/0x2d0 [ 24.272812] ret_from_fork+0x10/0x20 [ 24.273221] [ 24.273437] The buggy address belongs to the object at fff00000c662ada0 [ 24.273437] which belongs to the cache kmalloc-16 of size 16 [ 24.274351] The buggy address is located 8 bytes inside of [ 24.274351] allocated 9-byte region [fff00000c662ada0, fff00000c662ada9) [ 24.276700] [ 24.277181] The buggy address belongs to the physical page: [ 24.277980] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10662a [ 24.278894] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.279650] page_type: f5(slab) [ 24.280101] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 24.280811] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 24.281694] page dumped because: kasan: bad access detected [ 24.282320] [ 24.282653] Memory state around the buggy address: [ 24.283797] fff00000c662ac80: fa fb fc fc 00 04 fc fc 00 05 fc fc fa fb fc fc [ 24.284592] fff00000c662ad00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.285353] >fff00000c662ad80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 24.286334] ^ [ 24.286894] fff00000c662ae00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.287670] fff00000c662ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.288630] ================================================================== [ 24.365688] ================================================================== [ 24.367157] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xabc/0xbf8 [ 24.369372] Read of size 8 at addr fff00000c662ada8 by task kunit_try_catch/249 [ 24.370516] [ 24.370955] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 24.371289] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.371372] Hardware name: linux,dummy-virt (DT) [ 24.371461] Call trace: [ 24.371524] dump_backtrace+0x9c/0x128 [ 24.371633] show_stack+0x20/0x38 [ 24.371729] dump_stack_lvl+0x8c/0xd0 [ 24.373289] print_report+0x118/0x5f0 [ 24.373386] kasan_report+0xdc/0x128 [ 24.373480] __asan_report_load8_noabort+0x20/0x30 [ 24.373582] kasan_bitops_modify.constprop.0+0xabc/0xbf8 [ 24.373708] kasan_bitops_generic+0x114/0x1d0 [ 24.373835] kunit_try_run_case+0x170/0x3f0 [ 24.373994] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.374092] kthread+0x24c/0x2d0 [ 24.374143] ret_from_fork+0x10/0x20 [ 24.374193] [ 24.383342] Allocated by task 249: [ 24.384026] kasan_save_stack+0x3c/0x68 [ 24.384588] kasan_save_track+0x20/0x40 [ 24.385260] kasan_save_alloc_info+0x40/0x58 [ 24.386052] __kasan_kmalloc+0xd4/0xd8 [ 24.386616] __kmalloc_cache_noprof+0x154/0x320 [ 24.387292] kasan_bitops_generic+0xa0/0x1d0 [ 24.388020] kunit_try_run_case+0x170/0x3f0 [ 24.388665] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.389528] kthread+0x24c/0x2d0 [ 24.390059] ret_from_fork+0x10/0x20 [ 24.390706] [ 24.391192] The buggy address belongs to the object at fff00000c662ada0 [ 24.391192] which belongs to the cache kmalloc-16 of size 16 [ 24.392650] The buggy address is located 8 bytes inside of [ 24.392650] allocated 9-byte region [fff00000c662ada0, fff00000c662ada9) [ 24.393824] [ 24.394165] The buggy address belongs to the physical page: [ 24.394828] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10662a [ 24.395860] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.396565] page_type: f5(slab) [ 24.397064] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 24.397806] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 24.398780] page dumped because: kasan: bad access detected [ 24.399587] [ 24.400012] Memory state around the buggy address: [ 24.400613] fff00000c662ac80: fa fb fc fc 00 04 fc fc 00 05 fc fc fa fb fc fc [ 24.401486] fff00000c662ad00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.402298] >fff00000c662ad80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 24.403078] ^ [ 24.403771] fff00000c662ae00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.404735] fff00000c662ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.405783] ================================================================== [ 24.559742] ================================================================== [ 24.560507] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3c8/0xbf8 [ 24.562205] Write of size 8 at addr fff00000c662ada8 by task kunit_try_catch/249 [ 24.563026] [ 24.563369] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 24.563878] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.563984] Hardware name: linux,dummy-virt (DT) [ 24.564085] Call trace: [ 24.564156] dump_backtrace+0x9c/0x128 [ 24.564281] show_stack+0x20/0x38 [ 24.564402] dump_stack_lvl+0x8c/0xd0 [ 24.564522] print_report+0x118/0x5f0 [ 24.564600] kasan_report+0xdc/0x128 [ 24.564649] kasan_check_range+0x100/0x1a8 [ 24.564699] __kasan_check_write+0x20/0x30 [ 24.564746] kasan_bitops_modify.constprop.0+0x3c8/0xbf8 [ 24.564816] kasan_bitops_generic+0x114/0x1d0 [ 24.564869] kunit_try_run_case+0x170/0x3f0 [ 24.564916] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.565000] kthread+0x24c/0x2d0 [ 24.565052] ret_from_fork+0x10/0x20 [ 24.565102] [ 24.572729] Allocated by task 249: [ 24.573586] kasan_save_stack+0x3c/0x68 [ 24.574184] kasan_save_track+0x20/0x40 [ 24.574641] kasan_save_alloc_info+0x40/0x58 [ 24.575237] __kasan_kmalloc+0xd4/0xd8 [ 24.576653] __kmalloc_cache_noprof+0x154/0x320 [ 24.577270] kasan_bitops_generic+0xa0/0x1d0 [ 24.577798] kunit_try_run_case+0x170/0x3f0 [ 24.578354] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.578976] kthread+0x24c/0x2d0 [ 24.579781] ret_from_fork+0x10/0x20 [ 24.580329] [ 24.580659] The buggy address belongs to the object at fff00000c662ada0 [ 24.580659] which belongs to the cache kmalloc-16 of size 16 [ 24.581787] The buggy address is located 8 bytes inside of [ 24.581787] allocated 9-byte region [fff00000c662ada0, fff00000c662ada9) [ 24.583009] [ 24.583312] The buggy address belongs to the physical page: [ 24.584014] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10662a [ 24.584878] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.586545] page_type: f5(slab) [ 24.586998] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 24.587952] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 24.588761] page dumped because: kasan: bad access detected [ 24.589400] [ 24.589724] Memory state around the buggy address: [ 24.590933] fff00000c662ac80: fa fb fc fc 00 04 fc fc 00 05 fc fc fa fb fc fc [ 24.591874] fff00000c662ad00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.592731] >fff00000c662ad80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 24.593609] ^ [ 24.594176] fff00000c662ae00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.595113] fff00000c662ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.596135] ================================================================== [ 24.326397] ================================================================== [ 24.327354] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1e4/0xbf8 [ 24.328496] Write of size 8 at addr fff00000c662ada8 by task kunit_try_catch/249 [ 24.329384] [ 24.329731] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 24.329937] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.330031] Hardware name: linux,dummy-virt (DT) [ 24.330119] Call trace: [ 24.330179] dump_backtrace+0x9c/0x128 [ 24.330283] show_stack+0x20/0x38 [ 24.330378] dump_stack_lvl+0x8c/0xd0 [ 24.330492] print_report+0x118/0x5f0 [ 24.330607] kasan_report+0xdc/0x128 [ 24.330719] kasan_check_range+0x100/0x1a8 [ 24.330777] __kasan_check_write+0x20/0x30 [ 24.330829] kasan_bitops_modify.constprop.0+0x1e4/0xbf8 [ 24.330889] kasan_bitops_generic+0x114/0x1d0 [ 24.330946] kunit_try_run_case+0x170/0x3f0 [ 24.331150] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.331283] kthread+0x24c/0x2d0 [ 24.331415] ret_from_fork+0x10/0x20 [ 24.331539] [ 24.340187] Allocated by task 249: [ 24.340802] kasan_save_stack+0x3c/0x68 [ 24.341256] kasan_save_track+0x20/0x40 [ 24.341800] kasan_save_alloc_info+0x40/0x58 [ 24.342516] __kasan_kmalloc+0xd4/0xd8 [ 24.343282] __kmalloc_cache_noprof+0x154/0x320 [ 24.344103] kasan_bitops_generic+0xa0/0x1d0 [ 24.344709] kunit_try_run_case+0x170/0x3f0 [ 24.345475] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.346323] kthread+0x24c/0x2d0 [ 24.346877] ret_from_fork+0x10/0x20 [ 24.347557] [ 24.347922] The buggy address belongs to the object at fff00000c662ada0 [ 24.347922] which belongs to the cache kmalloc-16 of size 16 [ 24.349998] The buggy address is located 8 bytes inside of [ 24.349998] allocated 9-byte region [fff00000c662ada0, fff00000c662ada9) [ 24.351544] [ 24.351896] The buggy address belongs to the physical page: [ 24.352747] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10662a [ 24.354163] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.355296] page_type: f5(slab) [ 24.355813] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 24.356431] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 24.357014] page dumped because: kasan: bad access detected [ 24.357629] [ 24.358000] Memory state around the buggy address: [ 24.358680] fff00000c662ac80: fa fb fc fc 00 04 fc fc 00 05 fc fc fa fb fc fc [ 24.359532] fff00000c662ad00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.360717] >fff00000c662ad80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 24.361914] ^ [ 24.362242] fff00000c662ae00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.362563] fff00000c662ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.362871] ================================================================== [ 24.483082] ================================================================== [ 24.483716] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xb28/0xbf8 [ 24.484955] Read of size 8 at addr fff00000c662ada8 by task kunit_try_catch/249 [ 24.485540] [ 24.485799] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 24.486038] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.486196] Hardware name: linux,dummy-virt (DT) [ 24.486451] Call trace: [ 24.486693] dump_backtrace+0x9c/0x128 [ 24.486820] show_stack+0x20/0x38 [ 24.486935] dump_stack_lvl+0x8c/0xd0 [ 24.487075] print_report+0x118/0x5f0 [ 24.487189] kasan_report+0xdc/0x128 [ 24.487286] __asan_report_load8_noabort+0x20/0x30 [ 24.487345] kasan_bitops_modify.constprop.0+0xb28/0xbf8 [ 24.487467] kasan_bitops_generic+0x114/0x1d0 [ 24.487587] kunit_try_run_case+0x170/0x3f0 [ 24.487701] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.487823] kthread+0x24c/0x2d0 [ 24.487926] ret_from_fork+0x10/0x20 [ 24.488048] [ 24.496697] Allocated by task 249: [ 24.497738] kasan_save_stack+0x3c/0x68 [ 24.498273] kasan_save_track+0x20/0x40 [ 24.498851] kasan_save_alloc_info+0x40/0x58 [ 24.499493] __kasan_kmalloc+0xd4/0xd8 [ 24.500404] __kmalloc_cache_noprof+0x154/0x320 [ 24.501024] kasan_bitops_generic+0xa0/0x1d0 [ 24.501649] kunit_try_run_case+0x170/0x3f0 [ 24.502221] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.502887] kthread+0x24c/0x2d0 [ 24.503555] ret_from_fork+0x10/0x20 [ 24.504051] [ 24.505146] The buggy address belongs to the object at fff00000c662ada0 [ 24.505146] which belongs to the cache kmalloc-16 of size 16 [ 24.506141] The buggy address is located 8 bytes inside of [ 24.506141] allocated 9-byte region [fff00000c662ada0, fff00000c662ada9) [ 24.507638] [ 24.508008] The buggy address belongs to the physical page: [ 24.508887] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10662a [ 24.509693] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.510448] page_type: f5(slab) [ 24.510973] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 24.512358] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 24.513210] page dumped because: kasan: bad access detected [ 24.513828] [ 24.514162] Memory state around the buggy address: [ 24.514804] fff00000c662ac80: fa fb fc fc 00 04 fc fc 00 05 fc fc fa fb fc fc [ 24.515942] fff00000c662ad00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.516694] >fff00000c662ad80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 24.517431] ^ [ 24.518052] fff00000c662ae00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.518888] fff00000c662ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.520578] ================================================================== [ 24.446653] ================================================================== [ 24.447238] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x334/0xbf8 [ 24.448360] Write of size 8 at addr fff00000c662ada8 by task kunit_try_catch/249 [ 24.449496] [ 24.449764] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 24.449978] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.450064] Hardware name: linux,dummy-virt (DT) [ 24.450157] Call trace: [ 24.450229] dump_backtrace+0x9c/0x128 [ 24.450353] show_stack+0x20/0x38 [ 24.450467] dump_stack_lvl+0x8c/0xd0 [ 24.450589] print_report+0x118/0x5f0 [ 24.450652] kasan_report+0xdc/0x128 [ 24.450699] kasan_check_range+0x100/0x1a8 [ 24.450747] __kasan_check_write+0x20/0x30 [ 24.450798] kasan_bitops_modify.constprop.0+0x334/0xbf8 [ 24.450858] kasan_bitops_generic+0x114/0x1d0 [ 24.450911] kunit_try_run_case+0x170/0x3f0 [ 24.450986] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.451050] kthread+0x24c/0x2d0 [ 24.451101] ret_from_fork+0x10/0x20 [ 24.451153] [ 24.459234] Allocated by task 249: [ 24.459894] kasan_save_stack+0x3c/0x68 [ 24.460561] kasan_save_track+0x20/0x40 [ 24.461207] kasan_save_alloc_info+0x40/0x58 [ 24.461756] __kasan_kmalloc+0xd4/0xd8 [ 24.462336] __kmalloc_cache_noprof+0x154/0x320 [ 24.462918] kasan_bitops_generic+0xa0/0x1d0 [ 24.464383] kunit_try_run_case+0x170/0x3f0 [ 24.464809] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.465498] kthread+0x24c/0x2d0 [ 24.466025] ret_from_fork+0x10/0x20 [ 24.466589] [ 24.466972] The buggy address belongs to the object at fff00000c662ada0 [ 24.466972] which belongs to the cache kmalloc-16 of size 16 [ 24.467917] The buggy address is located 8 bytes inside of [ 24.467917] allocated 9-byte region [fff00000c662ada0, fff00000c662ada9) [ 24.469539] [ 24.469872] The buggy address belongs to the physical page: [ 24.470545] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10662a [ 24.471520] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.472298] page_type: f5(slab) [ 24.472865] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 24.473802] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 24.474578] page dumped because: kasan: bad access detected [ 24.475171] [ 24.475820] Memory state around the buggy address: [ 24.476455] fff00000c662ac80: fa fb fc fc 00 04 fc fc 00 05 fc fc fa fb fc fc [ 24.477198] fff00000c662ad00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.477900] >fff00000c662ad80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 24.478724] ^ [ 24.479300] fff00000c662ae00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.480281] fff00000c662ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.481023] ================================================================== [ 24.521781] ================================================================== [ 24.522495] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x358/0xbf8 [ 24.523359] Write of size 8 at addr fff00000c662ada8 by task kunit_try_catch/249 [ 24.524519] [ 24.524851] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 24.525079] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.525163] Hardware name: linux,dummy-virt (DT) [ 24.525256] Call trace: [ 24.525329] dump_backtrace+0x9c/0x128 [ 24.525453] show_stack+0x20/0x38 [ 24.525565] dump_stack_lvl+0x8c/0xd0 [ 24.525692] print_report+0x118/0x5f0 [ 24.525806] kasan_report+0xdc/0x128 [ 24.525925] kasan_check_range+0x100/0x1a8 [ 24.526066] __kasan_check_write+0x20/0x30 [ 24.526194] kasan_bitops_modify.constprop.0+0x358/0xbf8 [ 24.526330] kasan_bitops_generic+0x114/0x1d0 [ 24.526424] kunit_try_run_case+0x170/0x3f0 [ 24.526476] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.526530] kthread+0x24c/0x2d0 [ 24.526576] ret_from_fork+0x10/0x20 [ 24.526626] [ 24.535049] Allocated by task 249: [ 24.535784] kasan_save_stack+0x3c/0x68 [ 24.536668] kasan_save_track+0x20/0x40 [ 24.537710] kasan_save_alloc_info+0x40/0x58 [ 24.538441] __kasan_kmalloc+0xd4/0xd8 [ 24.539029] __kmalloc_cache_noprof+0x154/0x320 [ 24.539956] kasan_bitops_generic+0xa0/0x1d0 [ 24.540458] kunit_try_run_case+0x170/0x3f0 [ 24.541089] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.541904] kthread+0x24c/0x2d0 [ 24.542403] ret_from_fork+0x10/0x20 [ 24.542912] [ 24.543225] The buggy address belongs to the object at fff00000c662ada0 [ 24.543225] which belongs to the cache kmalloc-16 of size 16 [ 24.544704] The buggy address is located 8 bytes inside of [ 24.544704] allocated 9-byte region [fff00000c662ada0, fff00000c662ada9) [ 24.546296] [ 24.546612] The buggy address belongs to the physical page: [ 24.547558] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10662a [ 24.548751] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.549586] page_type: f5(slab) [ 24.550006] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 24.550742] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 24.551466] page dumped because: kasan: bad access detected [ 24.551984] [ 24.552915] Memory state around the buggy address: [ 24.553628] fff00000c662ac80: fa fb fc fc 00 04 fc fc 00 05 fc fc fa fb fc fc [ 24.554371] fff00000c662ad00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.555051] >fff00000c662ad80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 24.556424] ^ [ 24.556824] fff00000c662ae00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.557900] fff00000c662ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.558618] ================================================================== [ 24.598144] ================================================================== [ 24.598767] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa5c/0xbf8 [ 24.600165] Read of size 8 at addr fff00000c662ada8 by task kunit_try_catch/249 [ 24.601000] [ 24.601522] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 24.601745] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.601884] Hardware name: linux,dummy-virt (DT) [ 24.602022] Call trace: [ 24.602095] dump_backtrace+0x9c/0x128 [ 24.602155] show_stack+0x20/0x38 [ 24.602199] dump_stack_lvl+0x8c/0xd0 [ 24.602253] print_report+0x118/0x5f0 [ 24.602302] kasan_report+0xdc/0x128 [ 24.602350] __asan_report_load8_noabort+0x20/0x30 [ 24.602404] kasan_bitops_modify.constprop.0+0xa5c/0xbf8 [ 24.602462] kasan_bitops_generic+0x114/0x1d0 [ 24.602515] kunit_try_run_case+0x170/0x3f0 [ 24.602565] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.602622] kthread+0x24c/0x2d0 [ 24.602669] ret_from_fork+0x10/0x20 [ 24.602719] [ 24.610865] Allocated by task 249: [ 24.611294] kasan_save_stack+0x3c/0x68 [ 24.611995] kasan_save_track+0x20/0x40 [ 24.613325] kasan_save_alloc_info+0x40/0x58 [ 24.613931] __kasan_kmalloc+0xd4/0xd8 [ 24.614572] __kmalloc_cache_noprof+0x154/0x320 [ 24.615288] kasan_bitops_generic+0xa0/0x1d0 [ 24.616259] kunit_try_run_case+0x170/0x3f0 [ 24.616969] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.617672] kthread+0x24c/0x2d0 [ 24.618219] ret_from_fork+0x10/0x20 [ 24.618852] [ 24.619085] The buggy address belongs to the object at fff00000c662ada0 [ 24.619085] which belongs to the cache kmalloc-16 of size 16 [ 24.621123] The buggy address is located 8 bytes inside of [ 24.621123] allocated 9-byte region [fff00000c662ada0, fff00000c662ada9) [ 24.622464] [ 24.622858] The buggy address belongs to the physical page: [ 24.623887] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10662a [ 24.624556] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.625189] page_type: f5(slab) [ 24.625588] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 24.627067] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 24.627646] page dumped because: kasan: bad access detected [ 24.629168] [ 24.630056] Memory state around the buggy address: [ 24.631366] fff00000c662ac80: fa fb fc fc 00 04 fc fc 00 05 fc fc fa fb fc fc [ 24.633668] fff00000c662ad00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.636459] >fff00000c662ad80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 24.637896] ^ [ 24.639784] fff00000c662ae00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.640929] fff00000c662ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.642180] ==================================================================
[ 21.219423] ================================================================== [ 21.220960] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x374/0xd50 [ 21.221806] Write of size 8 at addr ffff888101f80208 by task kunit_try_catch/266 [ 21.222481] [ 21.222855] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 21.222974] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.223013] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.223075] Call Trace: [ 21.223127] <TASK> [ 21.223177] dump_stack_lvl+0x73/0xb0 [ 21.223286] print_report+0xd1/0x640 [ 21.223329] ? __virt_addr_valid+0x1db/0x2d0 [ 21.223367] ? kasan_bitops_modify.constprop.0+0x374/0xd50 [ 21.223399] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.223469] ? kasan_bitops_modify.constprop.0+0x374/0xd50 [ 21.223510] kasan_report+0x140/0x180 [ 21.223546] ? kasan_bitops_modify.constprop.0+0x374/0xd50 [ 21.223584] kasan_check_range+0x10c/0x1c0 [ 21.223613] __kasan_check_write+0x18/0x20 [ 21.223643] kasan_bitops_modify.constprop.0+0x374/0xd50 [ 21.223675] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 21.223708] ? __kmalloc_cache_noprof+0x168/0x350 [ 21.223745] kasan_bitops_generic+0x117/0x1c0 [ 21.223774] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 21.223803] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 21.224298] kunit_try_run_case+0x1a6/0x480 [ 21.224427] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.224558] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 21.224596] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.224632] ? __kthread_parkme+0x82/0x160 [ 21.224662] ? preempt_count_sub+0x50/0x80 [ 21.224692] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.224720] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.224756] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.224793] kthread+0x257/0x310 [ 21.224824] ? __pfx_kthread+0x10/0x10 [ 21.224882] ret_from_fork+0x41/0x80 [ 21.224914] ? __pfx_kthread+0x10/0x10 [ 21.224941] ret_from_fork_asm+0x1a/0x30 [ 21.224981] </TASK> [ 21.224995] [ 21.244333] Allocated by task 266: [ 21.245245] kasan_save_stack+0x45/0x70 [ 21.245927] kasan_save_track+0x18/0x40 [ 21.246343] kasan_save_alloc_info+0x3b/0x50 [ 21.246672] __kasan_kmalloc+0xb7/0xc0 [ 21.247154] __kmalloc_cache_noprof+0x168/0x350 [ 21.247969] kasan_bitops_generic+0x93/0x1c0 [ 21.248403] kunit_try_run_case+0x1a6/0x480 [ 21.248769] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.249285] kthread+0x257/0x310 [ 21.249629] ret_from_fork+0x41/0x80 [ 21.250693] ret_from_fork_asm+0x1a/0x30 [ 21.251334] [ 21.251714] The buggy address belongs to the object at ffff888101f80200 [ 21.251714] which belongs to the cache kmalloc-16 of size 16 [ 21.252647] The buggy address is located 8 bytes inside of [ 21.252647] allocated 9-byte region [ffff888101f80200, ffff888101f80209) [ 21.254204] [ 21.254457] The buggy address belongs to the physical page: [ 21.255152] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101f80 [ 21.256163] flags: 0x200000000000000(node=0|zone=2) [ 21.256631] page_type: f5(slab) [ 21.257240] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 21.258422] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 21.259239] page dumped because: kasan: bad access detected [ 21.259856] [ 21.260237] Memory state around the buggy address: [ 21.261020] ffff888101f80100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.262115] ffff888101f80180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.262608] >ffff888101f80200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.263758] ^ [ 21.264148] ffff888101f80280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.264985] ffff888101f80300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.266087] ================================================================== [ 21.313205] ================================================================== [ 21.314193] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ad/0xd50 [ 21.315315] Write of size 8 at addr ffff888101f80208 by task kunit_try_catch/266 [ 21.316329] [ 21.316581] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 21.316696] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.316822] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.316889] Call Trace: [ 21.317000] <TASK> [ 21.317104] dump_stack_lvl+0x73/0xb0 [ 21.317182] print_report+0xd1/0x640 [ 21.317311] ? __virt_addr_valid+0x1db/0x2d0 [ 21.317469] ? kasan_bitops_modify.constprop.0+0x4ad/0xd50 [ 21.317544] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.317619] ? kasan_bitops_modify.constprop.0+0x4ad/0xd50 [ 21.317691] kasan_report+0x140/0x180 [ 21.317770] ? kasan_bitops_modify.constprop.0+0x4ad/0xd50 [ 21.317856] kasan_check_range+0x10c/0x1c0 [ 21.318151] __kasan_check_write+0x18/0x20 [ 21.318185] kasan_bitops_modify.constprop.0+0x4ad/0xd50 [ 21.318238] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 21.318284] ? __kmalloc_cache_noprof+0x168/0x350 [ 21.318325] kasan_bitops_generic+0x117/0x1c0 [ 21.318356] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 21.318384] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 21.318419] kunit_try_run_case+0x1a6/0x480 [ 21.318470] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.318541] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 21.318601] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.318638] ? __kthread_parkme+0x82/0x160 [ 21.318665] ? preempt_count_sub+0x50/0x80 [ 21.318696] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.318723] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.318759] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.318797] kthread+0x257/0x310 [ 21.318840] ? __pfx_kthread+0x10/0x10 [ 21.318878] ret_from_fork+0x41/0x80 [ 21.318909] ? __pfx_kthread+0x10/0x10 [ 21.318935] ret_from_fork_asm+0x1a/0x30 [ 21.318977] </TASK> [ 21.318990] [ 21.337745] Allocated by task 266: [ 21.338198] kasan_save_stack+0x45/0x70 [ 21.338615] kasan_save_track+0x18/0x40 [ 21.339770] kasan_save_alloc_info+0x3b/0x50 [ 21.340216] __kasan_kmalloc+0xb7/0xc0 [ 21.340548] __kmalloc_cache_noprof+0x168/0x350 [ 21.341533] kasan_bitops_generic+0x93/0x1c0 [ 21.342168] kunit_try_run_case+0x1a6/0x480 [ 21.342627] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.345196] kthread+0x257/0x310 [ 21.345477] ret_from_fork+0x41/0x80 [ 21.345722] ret_from_fork_asm+0x1a/0x30 [ 21.345972] [ 21.346115] The buggy address belongs to the object at ffff888101f80200 [ 21.346115] which belongs to the cache kmalloc-16 of size 16 [ 21.352282] The buggy address is located 8 bytes inside of [ 21.352282] allocated 9-byte region [ffff888101f80200, ffff888101f80209) [ 21.355750] [ 21.356005] The buggy address belongs to the physical page: [ 21.356402] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101f80 [ 21.357346] flags: 0x200000000000000(node=0|zone=2) [ 21.357950] page_type: f5(slab) [ 21.358317] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 21.359147] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 21.359794] page dumped because: kasan: bad access detected [ 21.360685] [ 21.361143] Memory state around the buggy address: [ 21.361718] ffff888101f80100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.362354] ffff888101f80180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.363112] >ffff888101f80200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.363660] ^ [ 21.364020] ffff888101f80280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.365203] ffff888101f80300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.365978] ================================================================== [ 21.004044] ================================================================== [ 21.004950] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x102/0xd50 [ 21.006823] Write of size 8 at addr ffff888101f80208 by task kunit_try_catch/266 [ 21.007415] [ 21.008148] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 21.008381] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.008424] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.008488] Call Trace: [ 21.008540] <TASK> [ 21.008592] dump_stack_lvl+0x73/0xb0 [ 21.008688] print_report+0xd1/0x640 [ 21.008758] ? __virt_addr_valid+0x1db/0x2d0 [ 21.008797] ? kasan_bitops_modify.constprop.0+0x102/0xd50 [ 21.008855] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.008894] ? kasan_bitops_modify.constprop.0+0x102/0xd50 [ 21.008926] kasan_report+0x140/0x180 [ 21.008960] ? kasan_bitops_modify.constprop.0+0x102/0xd50 [ 21.008997] kasan_check_range+0x10c/0x1c0 [ 21.009027] __kasan_check_write+0x18/0x20 [ 21.009054] kasan_bitops_modify.constprop.0+0x102/0xd50 [ 21.009087] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 21.009122] ? __kmalloc_cache_noprof+0x168/0x350 [ 21.009161] kasan_bitops_generic+0x117/0x1c0 [ 21.009189] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 21.009245] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 21.009287] kunit_try_run_case+0x1a6/0x480 [ 21.009325] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.009353] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 21.009384] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.009420] ? __kthread_parkme+0x82/0x160 [ 21.009463] ? preempt_count_sub+0x50/0x80 [ 21.009595] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.009626] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.009663] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.009701] kthread+0x257/0x310 [ 21.009728] ? __pfx_kthread+0x10/0x10 [ 21.009754] ret_from_fork+0x41/0x80 [ 21.009785] ? __pfx_kthread+0x10/0x10 [ 21.009811] ret_from_fork_asm+0x1a/0x30 [ 21.009891] </TASK> [ 21.009907] [ 21.033452] Allocated by task 266: [ 21.034345] kasan_save_stack+0x45/0x70 [ 21.034780] kasan_save_track+0x18/0x40 [ 21.035322] kasan_save_alloc_info+0x3b/0x50 [ 21.036448] __kasan_kmalloc+0xb7/0xc0 [ 21.037103] __kmalloc_cache_noprof+0x168/0x350 [ 21.037660] kasan_bitops_generic+0x93/0x1c0 [ 21.038277] kunit_try_run_case+0x1a6/0x480 [ 21.038774] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.039745] kthread+0x257/0x310 [ 21.040157] ret_from_fork+0x41/0x80 [ 21.040541] ret_from_fork_asm+0x1a/0x30 [ 21.041370] [ 21.041685] The buggy address belongs to the object at ffff888101f80200 [ 21.041685] which belongs to the cache kmalloc-16 of size 16 [ 21.043195] The buggy address is located 8 bytes inside of [ 21.043195] allocated 9-byte region [ffff888101f80200, ffff888101f80209) [ 21.044792] [ 21.045397] The buggy address belongs to the physical page: [ 21.045969] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101f80 [ 21.046584] flags: 0x200000000000000(node=0|zone=2) [ 21.047778] page_type: f5(slab) [ 21.048373] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 21.049171] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 21.050074] page dumped because: kasan: bad access detected [ 21.050567] [ 21.050880] Memory state around the buggy address: [ 21.051311] ffff888101f80100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.052120] ffff888101f80180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.053059] >ffff888101f80200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.054278] ^ [ 21.055018] ffff888101f80280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.056023] ffff888101f80300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.056802] ================================================================== [ 21.118108] ================================================================== [ 21.119296] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23b/0xd50 [ 21.120888] Write of size 8 at addr ffff888101f80208 by task kunit_try_catch/266 [ 21.121817] [ 21.122279] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 21.122363] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.122398] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.122436] Call Trace: [ 21.122454] <TASK> [ 21.122474] dump_stack_lvl+0x73/0xb0 [ 21.122541] print_report+0xd1/0x640 [ 21.122623] ? __virt_addr_valid+0x1db/0x2d0 [ 21.122691] ? kasan_bitops_modify.constprop.0+0x23b/0xd50 [ 21.122725] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.122757] ? kasan_bitops_modify.constprop.0+0x23b/0xd50 [ 21.122789] kasan_report+0x140/0x180 [ 21.122837] ? kasan_bitops_modify.constprop.0+0x23b/0xd50 [ 21.123081] kasan_check_range+0x10c/0x1c0 [ 21.123115] __kasan_check_write+0x18/0x20 [ 21.123146] kasan_bitops_modify.constprop.0+0x23b/0xd50 [ 21.123181] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 21.123216] ? __kmalloc_cache_noprof+0x168/0x350 [ 21.123292] kasan_bitops_generic+0x117/0x1c0 [ 21.123325] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 21.123355] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 21.123390] kunit_try_run_case+0x1a6/0x480 [ 21.123424] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.123467] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 21.123580] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.123623] ? __kthread_parkme+0x82/0x160 [ 21.123653] ? preempt_count_sub+0x50/0x80 [ 21.123683] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.123713] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.123753] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.123792] kthread+0x257/0x310 [ 21.123826] ? __pfx_kthread+0x10/0x10 [ 21.123887] ret_from_fork+0x41/0x80 [ 21.123920] ? __pfx_kthread+0x10/0x10 [ 21.123946] ret_from_fork_asm+0x1a/0x30 [ 21.123986] </TASK> [ 21.124000] [ 21.144650] Allocated by task 266: [ 21.145296] kasan_save_stack+0x45/0x70 [ 21.146167] kasan_save_track+0x18/0x40 [ 21.146819] kasan_save_alloc_info+0x3b/0x50 [ 21.147173] __kasan_kmalloc+0xb7/0xc0 [ 21.147651] __kmalloc_cache_noprof+0x168/0x350 [ 21.149010] kasan_bitops_generic+0x93/0x1c0 [ 21.149428] kunit_try_run_case+0x1a6/0x480 [ 21.149796] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.150252] kthread+0x257/0x310 [ 21.150573] ret_from_fork+0x41/0x80 [ 21.150982] ret_from_fork_asm+0x1a/0x30 [ 21.152444] [ 21.152622] The buggy address belongs to the object at ffff888101f80200 [ 21.152622] which belongs to the cache kmalloc-16 of size 16 [ 21.154135] The buggy address is located 8 bytes inside of [ 21.154135] allocated 9-byte region [ffff888101f80200, ffff888101f80209) [ 21.156074] [ 21.156292] The buggy address belongs to the physical page: [ 21.157429] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101f80 [ 21.158417] flags: 0x200000000000000(node=0|zone=2) [ 21.159387] page_type: f5(slab) [ 21.160148] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 21.160768] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 21.161976] page dumped because: kasan: bad access detected [ 21.162382] [ 21.162639] Memory state around the buggy address: [ 21.163116] ffff888101f80100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.163702] ffff888101f80180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.164856] >ffff888101f80200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.165923] ^ [ 21.166271] ffff888101f80280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.167267] ffff888101f80300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.168685] ================================================================== [ 21.170331] ================================================================== [ 21.171394] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d6/0xd50 [ 21.172455] Write of size 8 at addr ffff888101f80208 by task kunit_try_catch/266 [ 21.173517] [ 21.174425] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 21.174753] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.174774] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.174819] Call Trace: [ 21.174974] <TASK> [ 21.174999] dump_stack_lvl+0x73/0xb0 [ 21.175042] print_report+0xd1/0x640 [ 21.175076] ? __virt_addr_valid+0x1db/0x2d0 [ 21.175111] ? kasan_bitops_modify.constprop.0+0x2d6/0xd50 [ 21.175141] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.175174] ? kasan_bitops_modify.constprop.0+0x2d6/0xd50 [ 21.175204] kasan_report+0x140/0x180 [ 21.175275] ? kasan_bitops_modify.constprop.0+0x2d6/0xd50 [ 21.175318] kasan_check_range+0x10c/0x1c0 [ 21.175348] __kasan_check_write+0x18/0x20 [ 21.175377] kasan_bitops_modify.constprop.0+0x2d6/0xd50 [ 21.175410] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 21.175451] ? __kmalloc_cache_noprof+0x168/0x350 [ 21.175595] kasan_bitops_generic+0x117/0x1c0 [ 21.175657] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 21.175689] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 21.175725] kunit_try_run_case+0x1a6/0x480 [ 21.175759] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.175786] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 21.175821] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.175893] ? __kthread_parkme+0x82/0x160 [ 21.175923] ? preempt_count_sub+0x50/0x80 [ 21.175954] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.175981] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.176017] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.176055] kthread+0x257/0x310 [ 21.176081] ? __pfx_kthread+0x10/0x10 [ 21.176107] ret_from_fork+0x41/0x80 [ 21.176137] ? __pfx_kthread+0x10/0x10 [ 21.176162] ret_from_fork_asm+0x1a/0x30 [ 21.176202] </TASK> [ 21.176216] [ 21.196334] Allocated by task 266: [ 21.196988] kasan_save_stack+0x45/0x70 [ 21.197656] kasan_save_track+0x18/0x40 [ 21.198118] kasan_save_alloc_info+0x3b/0x50 [ 21.198965] __kasan_kmalloc+0xb7/0xc0 [ 21.199787] __kmalloc_cache_noprof+0x168/0x350 [ 21.200237] kasan_bitops_generic+0x93/0x1c0 [ 21.200671] kunit_try_run_case+0x1a6/0x480 [ 21.201290] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.202272] kthread+0x257/0x310 [ 21.202889] ret_from_fork+0x41/0x80 [ 21.203392] ret_from_fork_asm+0x1a/0x30 [ 21.203701] [ 21.204327] The buggy address belongs to the object at ffff888101f80200 [ 21.204327] which belongs to the cache kmalloc-16 of size 16 [ 21.205425] The buggy address is located 8 bytes inside of [ 21.205425] allocated 9-byte region [ffff888101f80200, ffff888101f80209) [ 21.206781] [ 21.207133] The buggy address belongs to the physical page: [ 21.207557] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101f80 [ 21.208659] flags: 0x200000000000000(node=0|zone=2) [ 21.209203] page_type: f5(slab) [ 21.209728] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 21.211270] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 21.212114] page dumped because: kasan: bad access detected [ 21.212545] [ 21.212862] Memory state around the buggy address: [ 21.213306] ffff888101f80100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.214234] ffff888101f80180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.215343] >ffff888101f80200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.216239] ^ [ 21.216564] ffff888101f80280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.217351] ffff888101f80300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.218082] ================================================================== [ 21.267055] ================================================================== [ 21.267564] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40f/0xd50 [ 21.268656] Write of size 8 at addr ffff888101f80208 by task kunit_try_catch/266 [ 21.269382] [ 21.270175] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 21.270394] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.270429] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.270487] Call Trace: [ 21.270535] <TASK> [ 21.270581] dump_stack_lvl+0x73/0xb0 [ 21.270663] print_report+0xd1/0x640 [ 21.270737] ? __virt_addr_valid+0x1db/0x2d0 [ 21.270813] ? kasan_bitops_modify.constprop.0+0x40f/0xd50 [ 21.270884] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.270955] ? kasan_bitops_modify.constprop.0+0x40f/0xd50 [ 21.271031] kasan_report+0x140/0x180 [ 21.271105] ? kasan_bitops_modify.constprop.0+0x40f/0xd50 [ 21.271193] kasan_check_range+0x10c/0x1c0 [ 21.271297] __kasan_check_write+0x18/0x20 [ 21.271386] kasan_bitops_modify.constprop.0+0x40f/0xd50 [ 21.271466] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 21.271547] ? __kmalloc_cache_noprof+0x168/0x350 [ 21.271594] kasan_bitops_generic+0x117/0x1c0 [ 21.271623] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 21.271652] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 21.271687] kunit_try_run_case+0x1a6/0x480 [ 21.271719] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.271747] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 21.271775] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.271808] ? __kthread_parkme+0x82/0x160 [ 21.271865] ? preempt_count_sub+0x50/0x80 [ 21.271900] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.271928] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.271964] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.271999] kthread+0x257/0x310 [ 21.272024] ? __pfx_kthread+0x10/0x10 [ 21.272049] ret_from_fork+0x41/0x80 [ 21.272079] ? __pfx_kthread+0x10/0x10 [ 21.272103] ret_from_fork_asm+0x1a/0x30 [ 21.272144] </TASK> [ 21.272159] [ 21.290738] Allocated by task 266: [ 21.291286] kasan_save_stack+0x45/0x70 [ 21.291922] kasan_save_track+0x18/0x40 [ 21.292428] kasan_save_alloc_info+0x3b/0x50 [ 21.293252] __kasan_kmalloc+0xb7/0xc0 [ 21.293799] __kmalloc_cache_noprof+0x168/0x350 [ 21.294312] kasan_bitops_generic+0x93/0x1c0 [ 21.295132] kunit_try_run_case+0x1a6/0x480 [ 21.295758] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.296408] kthread+0x257/0x310 [ 21.296736] ret_from_fork+0x41/0x80 [ 21.297041] ret_from_fork_asm+0x1a/0x30 [ 21.297880] [ 21.298209] The buggy address belongs to the object at ffff888101f80200 [ 21.298209] which belongs to the cache kmalloc-16 of size 16 [ 21.299147] The buggy address is located 8 bytes inside of [ 21.299147] allocated 9-byte region [ffff888101f80200, ffff888101f80209) [ 21.300582] [ 21.302015] The buggy address belongs to the physical page: [ 21.302522] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101f80 [ 21.303189] flags: 0x200000000000000(node=0|zone=2) [ 21.303610] page_type: f5(slab) [ 21.303978] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 21.305102] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 21.305848] page dumped because: kasan: bad access detected [ 21.306714] [ 21.306983] Memory state around the buggy address: [ 21.307650] ffff888101f80100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.308300] ffff888101f80180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.309386] >ffff888101f80200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.309994] ^ [ 21.310387] ffff888101f80280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.311205] ffff888101f80300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.312121] ================================================================== [ 21.367014] ================================================================== [ 21.367706] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x548/0xd50 [ 21.368823] Write of size 8 at addr ffff888101f80208 by task kunit_try_catch/266 [ 21.369634] [ 21.369895] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 21.370049] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.370086] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.370145] Call Trace: [ 21.370197] <TASK> [ 21.370267] dump_stack_lvl+0x73/0xb0 [ 21.370354] print_report+0xd1/0x640 [ 21.370434] ? __virt_addr_valid+0x1db/0x2d0 [ 21.370670] ? kasan_bitops_modify.constprop.0+0x548/0xd50 [ 21.370747] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.370830] ? kasan_bitops_modify.constprop.0+0x548/0xd50 [ 21.370941] kasan_report+0x140/0x180 [ 21.371030] ? kasan_bitops_modify.constprop.0+0x548/0xd50 [ 21.371124] kasan_check_range+0x10c/0x1c0 [ 21.371209] __kasan_check_write+0x18/0x20 [ 21.371313] kasan_bitops_modify.constprop.0+0x548/0xd50 [ 21.371396] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 21.371671] ? __kmalloc_cache_noprof+0x168/0x350 [ 21.371729] kasan_bitops_generic+0x117/0x1c0 [ 21.371761] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 21.371790] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 21.371826] kunit_try_run_case+0x1a6/0x480 [ 21.371861] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.371891] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 21.371920] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.371955] ? __kthread_parkme+0x82/0x160 [ 21.371982] ? preempt_count_sub+0x50/0x80 [ 21.372012] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.372040] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.372076] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.372112] kthread+0x257/0x310 [ 21.372136] ? __pfx_kthread+0x10/0x10 [ 21.372162] ret_from_fork+0x41/0x80 [ 21.372193] ? __pfx_kthread+0x10/0x10 [ 21.372239] ret_from_fork_asm+0x1a/0x30 [ 21.372314] </TASK> [ 21.372328] [ 21.392317] Allocated by task 266: [ 21.392975] kasan_save_stack+0x45/0x70 [ 21.393632] kasan_save_track+0x18/0x40 [ 21.394152] kasan_save_alloc_info+0x3b/0x50 [ 21.394795] __kasan_kmalloc+0xb7/0xc0 [ 21.395500] __kmalloc_cache_noprof+0x168/0x350 [ 21.396155] kasan_bitops_generic+0x93/0x1c0 [ 21.396882] kunit_try_run_case+0x1a6/0x480 [ 21.397300] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.398045] kthread+0x257/0x310 [ 21.398419] ret_from_fork+0x41/0x80 [ 21.399132] ret_from_fork_asm+0x1a/0x30 [ 21.399606] [ 21.399828] The buggy address belongs to the object at ffff888101f80200 [ 21.399828] which belongs to the cache kmalloc-16 of size 16 [ 21.401203] The buggy address is located 8 bytes inside of [ 21.401203] allocated 9-byte region [ffff888101f80200, ffff888101f80209) [ 21.402954] [ 21.403175] The buggy address belongs to the physical page: [ 21.403928] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101f80 [ 21.404701] flags: 0x200000000000000(node=0|zone=2) [ 21.405327] page_type: f5(slab) [ 21.405948] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 21.406589] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 21.407599] page dumped because: kasan: bad access detected [ 21.408069] [ 21.408316] Memory state around the buggy address: [ 21.409093] ffff888101f80100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.410375] ffff888101f80180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.411076] >ffff888101f80200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.412523] ^ [ 21.412814] ffff888101f80280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.413345] ffff888101f80300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.414584] ================================================================== [ 21.058324] ================================================================== [ 21.059473] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19d/0xd50 [ 21.060779] Write of size 8 at addr ffff888101f80208 by task kunit_try_catch/266 [ 21.061903] [ 21.062276] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 21.062674] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.062705] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.062738] Call Trace: [ 21.062762] <TASK> [ 21.062784] dump_stack_lvl+0x73/0xb0 [ 21.062842] print_report+0xd1/0x640 [ 21.062885] ? __virt_addr_valid+0x1db/0x2d0 [ 21.062921] ? kasan_bitops_modify.constprop.0+0x19d/0xd50 [ 21.062951] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.062982] ? kasan_bitops_modify.constprop.0+0x19d/0xd50 [ 21.063013] kasan_report+0x140/0x180 [ 21.063046] ? kasan_bitops_modify.constprop.0+0x19d/0xd50 [ 21.063084] kasan_check_range+0x10c/0x1c0 [ 21.063114] __kasan_check_write+0x18/0x20 [ 21.063144] kasan_bitops_modify.constprop.0+0x19d/0xd50 [ 21.063174] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 21.063209] ? __kmalloc_cache_noprof+0x168/0x350 [ 21.063288] kasan_bitops_generic+0x117/0x1c0 [ 21.063320] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 21.063349] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 21.063384] kunit_try_run_case+0x1a6/0x480 [ 21.063416] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.063452] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 21.063529] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.063615] ? __kthread_parkme+0x82/0x160 [ 21.063686] ? preempt_count_sub+0x50/0x80 [ 21.063756] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.063786] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.063841] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.063892] kthread+0x257/0x310 [ 21.063918] ? __pfx_kthread+0x10/0x10 [ 21.063944] ret_from_fork+0x41/0x80 [ 21.063973] ? __pfx_kthread+0x10/0x10 [ 21.063998] ret_from_fork_asm+0x1a/0x30 [ 21.064038] </TASK> [ 21.064051] [ 21.092402] Allocated by task 266: [ 21.093210] kasan_save_stack+0x45/0x70 [ 21.093841] kasan_save_track+0x18/0x40 [ 21.094123] kasan_save_alloc_info+0x3b/0x50 [ 21.094908] __kasan_kmalloc+0xb7/0xc0 [ 21.095406] __kmalloc_cache_noprof+0x168/0x350 [ 21.095854] kasan_bitops_generic+0x93/0x1c0 [ 21.096779] kunit_try_run_case+0x1a6/0x480 [ 21.097335] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.098137] kthread+0x257/0x310 [ 21.099107] ret_from_fork+0x41/0x80 [ 21.099458] ret_from_fork_asm+0x1a/0x30 [ 21.099796] [ 21.100642] The buggy address belongs to the object at ffff888101f80200 [ 21.100642] which belongs to the cache kmalloc-16 of size 16 [ 21.101684] The buggy address is located 8 bytes inside of [ 21.101684] allocated 9-byte region [ffff888101f80200, ffff888101f80209) [ 21.103673] [ 21.104191] The buggy address belongs to the physical page: [ 21.105164] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101f80 [ 21.105934] flags: 0x200000000000000(node=0|zone=2) [ 21.106385] page_type: f5(slab) [ 21.107612] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 21.108268] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 21.109112] page dumped because: kasan: bad access detected [ 21.109832] [ 21.110245] Memory state around the buggy address: [ 21.111110] ffff888101f80100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.111997] ffff888101f80180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.112734] >ffff888101f80200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.113529] ^ [ 21.114115] ffff888101f80280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.115147] ffff888101f80300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.116008] ==================================================================