Date
June 7, 2025, 10:40 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 26.500304] ================================================================== [ 26.502191] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa88/0xbc8 [ 26.502844] Read of size 8 at addr fff00000c596b748 by task kunit_try_catch/250 [ 26.503422] [ 26.503680] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 26.503873] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.504865] Hardware name: linux,dummy-virt (DT) [ 26.504972] Call trace: [ 26.505345] show_stack+0x20/0x38 (C) [ 26.505478] dump_stack_lvl+0x8c/0xd0 [ 26.507985] print_report+0x118/0x608 [ 26.508127] kasan_report+0xdc/0x128 [ 26.508256] __asan_report_load8_noabort+0x20/0x30 [ 26.508396] kasan_bitops_modify.constprop.0+0xa88/0xbc8 [ 26.508528] kasan_bitops_generic+0x110/0x1c8 [ 26.508647] kunit_try_run_case+0x170/0x3f0 [ 26.508767] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.508920] kthread+0x318/0x620 [ 26.509911] ret_from_fork+0x10/0x20 [ 26.510043] [ 26.527744] Allocated by task 250: [ 26.529231] kasan_save_stack+0x3c/0x68 [ 26.531393] kasan_save_track+0x20/0x40 [ 26.533152] kasan_save_alloc_info+0x40/0x58 [ 26.534414] __kasan_kmalloc+0xd4/0xd8 [ 26.535858] __kmalloc_cache_noprof+0x16c/0x3c0 [ 26.537194] kasan_bitops_generic+0xa0/0x1c8 [ 26.537615] kunit_try_run_case+0x170/0x3f0 [ 26.539281] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.540908] kthread+0x318/0x620 [ 26.541752] ret_from_fork+0x10/0x20 [ 26.543459] [ 26.544189] The buggy address belongs to the object at fff00000c596b740 [ 26.544189] which belongs to the cache kmalloc-16 of size 16 [ 26.545571] The buggy address is located 8 bytes inside of [ 26.545571] allocated 9-byte region [fff00000c596b740, fff00000c596b749) [ 26.547558] [ 26.547806] The buggy address belongs to the physical page: [ 26.549498] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10596b [ 26.551816] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.552860] page_type: f5(slab) [ 26.554051] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 26.555688] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 26.557420] page dumped because: kasan: bad access detected [ 26.559028] [ 26.559711] Memory state around the buggy address: [ 26.561248] fff00000c596b600: fa fb fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 26.561861] fff00000c596b680: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 26.563036] >fff00000c596b700: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 26.563572] ^ [ 26.564953] fff00000c596b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.566812] fff00000c596b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.570226] ================================================================== [ 26.308262] ================================================================== [ 26.309181] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc8 [ 26.310086] Write of size 8 at addr fff00000c596b748 by task kunit_try_catch/250 [ 26.310841] [ 26.311215] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 26.311437] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.311526] Hardware name: linux,dummy-virt (DT) [ 26.311623] Call trace: [ 26.311699] show_stack+0x20/0x38 (C) [ 26.311853] dump_stack_lvl+0x8c/0xd0 [ 26.312018] print_report+0x118/0x608 [ 26.312153] kasan_report+0xdc/0x128 [ 26.312266] kasan_check_range+0x100/0x1a8 [ 26.312382] __kasan_check_write+0x20/0x30 [ 26.312497] kasan_bitops_modify.constprop.0+0x100/0xbc8 [ 26.312645] kasan_bitops_generic+0x110/0x1c8 [ 26.312792] kunit_try_run_case+0x170/0x3f0 [ 26.312951] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.313153] kthread+0x318/0x620 [ 26.313284] ret_from_fork+0x10/0x20 [ 26.313453] [ 26.321953] Allocated by task 250: [ 26.323955] kasan_save_stack+0x3c/0x68 [ 26.325300] kasan_save_track+0x20/0x40 [ 26.325733] kasan_save_alloc_info+0x40/0x58 [ 26.326403] __kasan_kmalloc+0xd4/0xd8 [ 26.326806] __kmalloc_cache_noprof+0x16c/0x3c0 [ 26.327278] kasan_bitops_generic+0xa0/0x1c8 [ 26.327694] kunit_try_run_case+0x170/0x3f0 [ 26.329594] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.330562] kthread+0x318/0x620 [ 26.331766] ret_from_fork+0x10/0x20 [ 26.332448] [ 26.332838] The buggy address belongs to the object at fff00000c596b740 [ 26.332838] which belongs to the cache kmalloc-16 of size 16 [ 26.336678] The buggy address is located 8 bytes inside of [ 26.336678] allocated 9-byte region [fff00000c596b740, fff00000c596b749) [ 26.338206] [ 26.338430] The buggy address belongs to the physical page: [ 26.338823] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10596b [ 26.341835] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.343554] page_type: f5(slab) [ 26.344648] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 26.348248] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 26.348843] page dumped because: kasan: bad access detected [ 26.350125] [ 26.350539] Memory state around the buggy address: [ 26.351338] fff00000c596b600: fa fb fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 26.352470] fff00000c596b680: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 26.353980] >fff00000c596b700: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 26.354575] ^ [ 26.355065] fff00000c596b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.355584] fff00000c596b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.356435] ================================================================== [ 26.781949] ================================================================== [ 26.784680] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc8 [ 26.787518] Write of size 8 at addr fff00000c596b748 by task kunit_try_catch/250 [ 26.789616] [ 26.790609] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 26.790833] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.790923] Hardware name: linux,dummy-virt (DT) [ 26.791142] Call trace: [ 26.791203] show_stack+0x20/0x38 (C) [ 26.791330] dump_stack_lvl+0x8c/0xd0 [ 26.791443] print_report+0x118/0x608 [ 26.791562] kasan_report+0xdc/0x128 [ 26.791681] kasan_check_range+0x100/0x1a8 [ 26.791806] __kasan_check_write+0x20/0x30 [ 26.792113] kasan_bitops_modify.constprop.0+0x344/0xbc8 [ 26.792241] kasan_bitops_generic+0x110/0x1c8 [ 26.792365] kunit_try_run_case+0x170/0x3f0 [ 26.792484] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.792615] kthread+0x318/0x620 [ 26.792727] ret_from_fork+0x10/0x20 [ 26.792848] [ 26.811286] Allocated by task 250: [ 26.813620] kasan_save_stack+0x3c/0x68 [ 26.814069] kasan_save_track+0x20/0x40 [ 26.814466] kasan_save_alloc_info+0x40/0x58 [ 26.816065] __kasan_kmalloc+0xd4/0xd8 [ 26.817053] __kmalloc_cache_noprof+0x16c/0x3c0 [ 26.819192] kasan_bitops_generic+0xa0/0x1c8 [ 26.821006] kunit_try_run_case+0x170/0x3f0 [ 26.822529] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.824171] kthread+0x318/0x620 [ 26.825640] ret_from_fork+0x10/0x20 [ 26.826469] [ 26.827710] The buggy address belongs to the object at fff00000c596b740 [ 26.827710] which belongs to the cache kmalloc-16 of size 16 [ 26.829470] The buggy address is located 8 bytes inside of [ 26.829470] allocated 9-byte region [fff00000c596b740, fff00000c596b749) [ 26.832859] [ 26.833570] The buggy address belongs to the physical page: [ 26.835323] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10596b [ 26.836475] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.838295] page_type: f5(slab) [ 26.840059] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 26.841713] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 26.843142] page dumped because: kasan: bad access detected [ 26.843612] [ 26.843866] Memory state around the buggy address: [ 26.846252] fff00000c596b600: fa fb fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 26.848269] fff00000c596b680: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 26.850297] >fff00000c596b700: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 26.851724] ^ [ 26.853674] fff00000c596b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.855150] fff00000c596b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.855706] ================================================================== [ 26.934402] ================================================================== [ 26.935981] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa28/0xbc8 [ 26.939155] Read of size 8 at addr fff00000c596b748 by task kunit_try_catch/250 [ 26.941340] [ 26.941875] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 26.942365] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.942438] Hardware name: linux,dummy-virt (DT) [ 26.942513] Call trace: [ 26.942570] show_stack+0x20/0x38 (C) [ 26.942692] dump_stack_lvl+0x8c/0xd0 [ 26.942813] print_report+0x118/0x608 [ 26.943234] kasan_report+0xdc/0x128 [ 26.943374] __asan_report_load8_noabort+0x20/0x30 [ 26.943507] kasan_bitops_modify.constprop.0+0xa28/0xbc8 [ 26.943644] kasan_bitops_generic+0x110/0x1c8 [ 26.943777] kunit_try_run_case+0x170/0x3f0 [ 26.943924] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.944066] kthread+0x318/0x620 [ 26.944184] ret_from_fork+0x10/0x20 [ 26.944306] [ 26.956477] Allocated by task 250: [ 26.958240] kasan_save_stack+0x3c/0x68 [ 26.959253] kasan_save_track+0x20/0x40 [ 26.960317] kasan_save_alloc_info+0x40/0x58 [ 26.961761] __kasan_kmalloc+0xd4/0xd8 [ 26.963109] __kmalloc_cache_noprof+0x16c/0x3c0 [ 26.964663] kasan_bitops_generic+0xa0/0x1c8 [ 26.966276] kunit_try_run_case+0x170/0x3f0 [ 26.967683] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.968181] kthread+0x318/0x620 [ 26.968538] ret_from_fork+0x10/0x20 [ 26.970038] [ 26.970565] The buggy address belongs to the object at fff00000c596b740 [ 26.970565] which belongs to the cache kmalloc-16 of size 16 [ 26.974532] The buggy address is located 8 bytes inside of [ 26.974532] allocated 9-byte region [fff00000c596b740, fff00000c596b749) [ 26.977529] [ 26.977796] The buggy address belongs to the physical page: [ 26.979970] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10596b [ 26.981664] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.983651] page_type: f5(slab) [ 26.984907] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 26.985497] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 26.987264] page dumped because: kasan: bad access detected [ 26.989026] [ 26.990053] Memory state around the buggy address: [ 26.991536] fff00000c596b600: fa fb fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 26.993532] fff00000c596b680: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 26.994724] >fff00000c596b700: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 26.996948] ^ [ 26.998232] fff00000c596b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.998786] fff00000c596b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.001381] ================================================================== [ 26.359340] ================================================================== [ 26.362054] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa4c/0xbc8 [ 26.363369] Read of size 8 at addr fff00000c596b748 by task kunit_try_catch/250 [ 26.364598] [ 26.365092] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 26.365291] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.365360] Hardware name: linux,dummy-virt (DT) [ 26.365444] Call trace: [ 26.365504] show_stack+0x20/0x38 (C) [ 26.365629] dump_stack_lvl+0x8c/0xd0 [ 26.365749] print_report+0x118/0x608 [ 26.365867] kasan_report+0xdc/0x128 [ 26.366837] __asan_report_load8_noabort+0x20/0x30 [ 26.366996] kasan_bitops_modify.constprop.0+0xa4c/0xbc8 [ 26.367153] kasan_bitops_generic+0x110/0x1c8 [ 26.367299] kunit_try_run_case+0x170/0x3f0 [ 26.367445] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.367603] kthread+0x318/0x620 [ 26.367748] ret_from_fork+0x10/0x20 [ 26.367918] [ 26.378405] Allocated by task 250: [ 26.379266] kasan_save_stack+0x3c/0x68 [ 26.380079] kasan_save_track+0x20/0x40 [ 26.380525] kasan_save_alloc_info+0x40/0x58 [ 26.380946] __kasan_kmalloc+0xd4/0xd8 [ 26.382535] __kmalloc_cache_noprof+0x16c/0x3c0 [ 26.383401] kasan_bitops_generic+0xa0/0x1c8 [ 26.384186] kunit_try_run_case+0x170/0x3f0 [ 26.384956] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.386334] kthread+0x318/0x620 [ 26.386987] ret_from_fork+0x10/0x20 [ 26.387573] [ 26.387813] The buggy address belongs to the object at fff00000c596b740 [ 26.387813] which belongs to the cache kmalloc-16 of size 16 [ 26.391430] The buggy address is located 8 bytes inside of [ 26.391430] allocated 9-byte region [fff00000c596b740, fff00000c596b749) [ 26.395404] [ 26.396442] The buggy address belongs to the physical page: [ 26.398252] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10596b [ 26.398857] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.399407] page_type: f5(slab) [ 26.399764] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 26.404021] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 26.406488] page dumped because: kasan: bad access detected [ 26.408081] [ 26.408912] Memory state around the buggy address: [ 26.410471] fff00000c596b600: fa fb fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 26.412916] fff00000c596b680: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 26.415564] >fff00000c596b700: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 26.416858] ^ [ 26.419245] fff00000c596b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.420734] fff00000c596b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.423738] ================================================================== [ 26.707359] ================================================================== [ 26.711311] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaf4/0xbc8 [ 26.712659] Read of size 8 at addr fff00000c596b748 by task kunit_try_catch/250 [ 26.713261] [ 26.713529] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 26.713725] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.713795] Hardware name: linux,dummy-virt (DT) [ 26.713875] Call trace: [ 26.715437] show_stack+0x20/0x38 (C) [ 26.715577] dump_stack_lvl+0x8c/0xd0 [ 26.715710] print_report+0x118/0x608 [ 26.715839] kasan_report+0xdc/0x128 [ 26.715990] __asan_report_load8_noabort+0x20/0x30 [ 26.716110] kasan_bitops_modify.constprop.0+0xaf4/0xbc8 [ 26.716242] kasan_bitops_generic+0x110/0x1c8 [ 26.716365] kunit_try_run_case+0x170/0x3f0 [ 26.716484] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.716617] kthread+0x318/0x620 [ 26.716728] ret_from_fork+0x10/0x20 [ 26.716850] [ 26.734842] Allocated by task 250: [ 26.735929] kasan_save_stack+0x3c/0x68 [ 26.736363] kasan_save_track+0x20/0x40 [ 26.736746] kasan_save_alloc_info+0x40/0x58 [ 26.738467] __kasan_kmalloc+0xd4/0xd8 [ 26.740289] __kmalloc_cache_noprof+0x16c/0x3c0 [ 26.741962] kasan_bitops_generic+0xa0/0x1c8 [ 26.743461] kunit_try_run_case+0x170/0x3f0 [ 26.744748] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.745258] kthread+0x318/0x620 [ 26.745620] ret_from_fork+0x10/0x20 [ 26.747387] [ 26.748276] The buggy address belongs to the object at fff00000c596b740 [ 26.748276] which belongs to the cache kmalloc-16 of size 16 [ 26.751468] The buggy address is located 8 bytes inside of [ 26.751468] allocated 9-byte region [fff00000c596b740, fff00000c596b749) [ 26.754585] [ 26.754855] The buggy address belongs to the physical page: [ 26.756714] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10596b [ 26.758414] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.759931] page_type: f5(slab) [ 26.761422] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 26.763076] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 26.764639] page dumped because: kasan: bad access detected [ 26.765130] [ 26.765371] Memory state around the buggy address: [ 26.765776] fff00000c596b600: fa fb fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 26.768721] fff00000c596b680: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 26.770855] >fff00000c596b700: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 26.772821] ^ [ 26.774629] fff00000c596b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.775965] fff00000c596b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.777579] ================================================================== [ 26.571577] ================================================================== [ 26.574638] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc8 [ 26.575650] Write of size 8 at addr fff00000c596b748 by task kunit_try_catch/250 [ 26.579468] [ 26.581844] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 26.582323] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.582403] Hardware name: linux,dummy-virt (DT) [ 26.582496] Call trace: [ 26.582555] show_stack+0x20/0x38 (C) [ 26.582688] dump_stack_lvl+0x8c/0xd0 [ 26.582816] print_report+0x118/0x608 [ 26.582956] kasan_report+0xdc/0x128 [ 26.583081] kasan_check_range+0x100/0x1a8 [ 26.583203] __kasan_check_write+0x20/0x30 [ 26.583326] kasan_bitops_modify.constprop.0+0x2b4/0xbc8 [ 26.583463] kasan_bitops_generic+0x110/0x1c8 [ 26.583590] kunit_try_run_case+0x170/0x3f0 [ 26.583715] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.583855] kthread+0x318/0x620 [ 26.583986] ret_from_fork+0x10/0x20 [ 26.584115] [ 26.598696] Allocated by task 250: [ 26.601212] kasan_save_stack+0x3c/0x68 [ 26.601778] kasan_save_track+0x20/0x40 [ 26.603163] kasan_save_alloc_info+0x40/0x58 [ 26.603819] __kasan_kmalloc+0xd4/0xd8 [ 26.605059] __kmalloc_cache_noprof+0x16c/0x3c0 [ 26.605505] kasan_bitops_generic+0xa0/0x1c8 [ 26.605927] kunit_try_run_case+0x170/0x3f0 [ 26.606571] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.608815] kthread+0x318/0x620 [ 26.609580] ret_from_fork+0x10/0x20 [ 26.610740] [ 26.611037] The buggy address belongs to the object at fff00000c596b740 [ 26.611037] which belongs to the cache kmalloc-16 of size 16 [ 26.613177] The buggy address is located 8 bytes inside of [ 26.613177] allocated 9-byte region [fff00000c596b740, fff00000c596b749) [ 26.614705] [ 26.615068] The buggy address belongs to the physical page: [ 26.615493] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10596b [ 26.617389] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.618461] page_type: f5(slab) [ 26.619671] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 26.621300] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 26.622649] page dumped because: kasan: bad access detected [ 26.623721] [ 26.624031] Memory state around the buggy address: [ 26.624616] fff00000c596b600: fa fb fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 26.626535] fff00000c596b680: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 26.627780] >fff00000c596b700: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 26.629330] ^ [ 26.630034] fff00000c596b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.630585] fff00000c596b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.631343] ================================================================== [ 26.635457] ================================================================== [ 26.638025] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc8 [ 26.642024] Write of size 8 at addr fff00000c596b748 by task kunit_try_catch/250 [ 26.644512] [ 26.644777] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 26.644982] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.645053] Hardware name: linux,dummy-virt (DT) [ 26.645129] Call trace: [ 26.645178] show_stack+0x20/0x38 (C) [ 26.645290] dump_stack_lvl+0x8c/0xd0 [ 26.645400] print_report+0x118/0x608 [ 26.645506] kasan_report+0xdc/0x128 [ 26.645609] kasan_check_range+0x100/0x1a8 [ 26.645710] __kasan_check_write+0x20/0x30 [ 26.645810] kasan_bitops_modify.constprop.0+0x320/0xbc8 [ 26.646633] kasan_bitops_generic+0x110/0x1c8 [ 26.646764] kunit_try_run_case+0x170/0x3f0 [ 26.646908] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.647043] kthread+0x318/0x620 [ 26.647158] ret_from_fork+0x10/0x20 [ 26.647277] [ 26.660795] Allocated by task 250: [ 26.662233] kasan_save_stack+0x3c/0x68 [ 26.663623] kasan_save_track+0x20/0x40 [ 26.664994] kasan_save_alloc_info+0x40/0x58 [ 26.666475] __kasan_kmalloc+0xd4/0xd8 [ 26.666874] __kmalloc_cache_noprof+0x16c/0x3c0 [ 26.668809] kasan_bitops_generic+0xa0/0x1c8 [ 26.670341] kunit_try_run_case+0x170/0x3f0 [ 26.671392] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.672614] kthread+0x318/0x620 [ 26.673786] ret_from_fork+0x10/0x20 [ 26.674315] [ 26.674559] The buggy address belongs to the object at fff00000c596b740 [ 26.674559] which belongs to the cache kmalloc-16 of size 16 [ 26.675379] The buggy address is located 8 bytes inside of [ 26.675379] allocated 9-byte region [fff00000c596b740, fff00000c596b749) [ 26.678798] [ 26.680415] The buggy address belongs to the physical page: [ 26.681714] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10596b [ 26.684027] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.685963] page_type: f5(slab) [ 26.687437] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 26.689737] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 26.690539] page dumped because: kasan: bad access detected [ 26.692271] [ 26.692990] Memory state around the buggy address: [ 26.694651] fff00000c596b600: fa fb fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 26.696489] fff00000c596b680: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 26.697063] >fff00000c596b700: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 26.697600] ^ [ 26.699604] fff00000c596b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.701918] fff00000c596b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.703896] ================================================================== [ 26.860619] ================================================================== [ 26.863573] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc8 [ 26.866114] Write of size 8 at addr fff00000c596b748 by task kunit_try_catch/250 [ 26.869148] [ 26.870349] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 26.870546] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.870615] Hardware name: linux,dummy-virt (DT) [ 26.870695] Call trace: [ 26.870761] show_stack+0x20/0x38 (C) [ 26.870910] dump_stack_lvl+0x8c/0xd0 [ 26.871031] print_report+0x118/0x608 [ 26.871151] kasan_report+0xdc/0x128 [ 26.871262] kasan_check_range+0x100/0x1a8 [ 26.871377] __kasan_check_write+0x20/0x30 [ 26.871487] kasan_bitops_modify.constprop.0+0x3b0/0xbc8 [ 26.871615] kasan_bitops_generic+0x110/0x1c8 [ 26.871734] kunit_try_run_case+0x170/0x3f0 [ 26.871848] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.871997] kthread+0x318/0x620 [ 26.872112] ret_from_fork+0x10/0x20 [ 26.872229] [ 26.888066] Allocated by task 250: [ 26.889418] kasan_save_stack+0x3c/0x68 [ 26.890853] kasan_save_track+0x20/0x40 [ 26.892303] kasan_save_alloc_info+0x40/0x58 [ 26.893767] __kasan_kmalloc+0xd4/0xd8 [ 26.895022] __kmalloc_cache_noprof+0x16c/0x3c0 [ 26.895461] kasan_bitops_generic+0xa0/0x1c8 [ 26.895878] kunit_try_run_case+0x170/0x3f0 [ 26.898601] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.899808] kthread+0x318/0x620 [ 26.901189] ret_from_fork+0x10/0x20 [ 26.902623] [ 26.903543] The buggy address belongs to the object at fff00000c596b740 [ 26.903543] which belongs to the cache kmalloc-16 of size 16 [ 26.904855] The buggy address is located 8 bytes inside of [ 26.904855] allocated 9-byte region [fff00000c596b740, fff00000c596b749) [ 26.908792] [ 26.909555] The buggy address belongs to the physical page: [ 26.910272] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10596b [ 26.910878] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.913423] page_type: f5(slab) [ 26.914821] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 26.916870] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 26.917461] page dumped because: kasan: bad access detected [ 26.918931] [ 26.919479] Memory state around the buggy address: [ 26.921380] fff00000c596b600: fa fb fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 26.922869] fff00000c596b680: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 26.925126] >fff00000c596b700: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 26.926524] ^ [ 26.927016] fff00000c596b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.927579] fff00000c596b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.930507] ================================================================== [ 26.427625] ================================================================== [ 26.430036] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc8 [ 26.433525] Write of size 8 at addr fff00000c596b748 by task kunit_try_catch/250 [ 26.435550] [ 26.436016] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 26.436451] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.436524] Hardware name: linux,dummy-virt (DT) [ 26.436604] Call trace: [ 26.436658] show_stack+0x20/0x38 (C) [ 26.436788] dump_stack_lvl+0x8c/0xd0 [ 26.436927] print_report+0x118/0x608 [ 26.437156] kasan_report+0xdc/0x128 [ 26.438305] kasan_check_range+0x100/0x1a8 [ 26.438433] __kasan_check_write+0x20/0x30 [ 26.438545] kasan_bitops_modify.constprop.0+0x1dc/0xbc8 [ 26.438674] kasan_bitops_generic+0x110/0x1c8 [ 26.438791] kunit_try_run_case+0x170/0x3f0 [ 26.438932] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.439065] kthread+0x318/0x620 [ 26.439178] ret_from_fork+0x10/0x20 [ 26.439294] [ 26.454262] Allocated by task 250: [ 26.454632] kasan_save_stack+0x3c/0x68 [ 26.455054] kasan_save_track+0x20/0x40 [ 26.455446] kasan_save_alloc_info+0x40/0x58 [ 26.455843] __kasan_kmalloc+0xd4/0xd8 [ 26.458024] __kmalloc_cache_noprof+0x16c/0x3c0 [ 26.459343] kasan_bitops_generic+0xa0/0x1c8 [ 26.460959] kunit_try_run_case+0x170/0x3f0 [ 26.462914] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.464277] kthread+0x318/0x620 [ 26.465591] ret_from_fork+0x10/0x20 [ 26.466496] [ 26.467317] The buggy address belongs to the object at fff00000c596b740 [ 26.467317] which belongs to the cache kmalloc-16 of size 16 [ 26.471216] The buggy address is located 8 bytes inside of [ 26.471216] allocated 9-byte region [fff00000c596b740, fff00000c596b749) [ 26.472640] [ 26.473618] The buggy address belongs to the physical page: [ 26.474820] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10596b [ 26.477865] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.478962] page_type: f5(slab) [ 26.479329] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 26.480293] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 26.482866] page dumped because: kasan: bad access detected [ 26.484092] [ 26.484677] Memory state around the buggy address: [ 26.486835] fff00000c596b600: fa fb fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 26.488373] fff00000c596b680: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 26.488945] >fff00000c596b700: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 26.491493] ^ [ 26.494236] fff00000c596b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.495571] fff00000c596b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.496876] ==================================================================
[ 20.475584] ================================================================== [ 20.476208] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d6/0xd50 [ 20.476934] Write of size 8 at addr ffff8881024b01a8 by task kunit_try_catch/269 [ 20.477324] [ 20.477563] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 20.477662] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.477692] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.477742] Call Trace: [ 20.477786] <TASK> [ 20.477825] dump_stack_lvl+0x73/0xb0 [ 20.478409] print_report+0xd1/0x650 [ 20.478470] ? __virt_addr_valid+0x1db/0x2d0 [ 20.478522] ? kasan_bitops_modify.constprop.0+0x2d6/0xd50 [ 20.478583] ? kasan_complete_mode_report_info+0x2a/0x200 [ 20.478645] ? kasan_bitops_modify.constprop.0+0x2d6/0xd50 [ 20.478701] kasan_report+0x140/0x180 [ 20.478755] ? kasan_bitops_modify.constprop.0+0x2d6/0xd50 [ 20.478828] kasan_check_range+0x10c/0x1c0 [ 20.478900] __kasan_check_write+0x18/0x20 [ 20.478961] kasan_bitops_modify.constprop.0+0x2d6/0xd50 [ 20.479020] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 20.479078] ? __kmalloc_cache_noprof+0x18a/0x420 [ 20.479134] ? trace_hardirqs_on+0x37/0xe0 [ 20.479194] ? kasan_bitops_generic+0x93/0x1c0 [ 20.479258] kasan_bitops_generic+0x117/0x1c0 [ 20.479356] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 20.479420] ? __pfx_read_tsc+0x10/0x10 [ 20.479471] ? ktime_get_ts64+0x86/0x230 [ 20.479537] kunit_try_run_case+0x1a6/0x480 [ 20.479593] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.479643] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 20.479711] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.479767] ? __kthread_parkme+0x82/0x160 [ 20.479820] ? preempt_count_sub+0x50/0x80 [ 20.479893] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.479948] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.480011] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.480050] kthread+0x324/0x6e0 [ 20.480080] ? trace_preempt_on+0x20/0xc0 [ 20.480111] ? __pfx_kthread+0x10/0x10 [ 20.480139] ? _raw_spin_unlock_irq+0x47/0x80 [ 20.480185] ? calculate_sigpending+0x7b/0xa0 [ 20.480236] ? __pfx_kthread+0x10/0x10 [ 20.480327] ret_from_fork+0x41/0x80 [ 20.480381] ? __pfx_kthread+0x10/0x10 [ 20.480436] ret_from_fork_asm+0x1a/0x30 [ 20.480510] </TASK> [ 20.480541] [ 20.493011] Allocated by task 269: [ 20.493250] kasan_save_stack+0x45/0x70 [ 20.493674] kasan_save_track+0x18/0x40 [ 20.494098] kasan_save_alloc_info+0x3b/0x50 [ 20.494565] __kasan_kmalloc+0xb7/0xc0 [ 20.494966] __kmalloc_cache_noprof+0x18a/0x420 [ 20.495437] kasan_bitops_generic+0x93/0x1c0 [ 20.495890] kunit_try_run_case+0x1a6/0x480 [ 20.496250] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.496609] kthread+0x324/0x6e0 [ 20.496841] ret_from_fork+0x41/0x80 [ 20.497263] ret_from_fork_asm+0x1a/0x30 [ 20.497680] [ 20.497904] The buggy address belongs to the object at ffff8881024b01a0 [ 20.497904] which belongs to the cache kmalloc-16 of size 16 [ 20.498907] The buggy address is located 8 bytes inside of [ 20.498907] allocated 9-byte region [ffff8881024b01a0, ffff8881024b01a9) [ 20.499604] [ 20.499767] The buggy address belongs to the physical page: [ 20.500245] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024b0 [ 20.500941] flags: 0x200000000000000(node=0|zone=2) [ 20.501473] page_type: f5(slab) [ 20.501825] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 20.502246] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 20.502968] page dumped because: kasan: bad access detected [ 20.503521] [ 20.503752] Memory state around the buggy address: [ 20.504228] ffff8881024b0080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 20.504930] ffff8881024b0100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 20.505520] >ffff8881024b0180: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 20.506117] ^ [ 20.506462] ffff8881024b0200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.507184] ffff8881024b0280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.507958] ================================================================== [ 20.547167] ================================================================== [ 20.548342] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40f/0xd50 [ 20.548746] Write of size 8 at addr ffff8881024b01a8 by task kunit_try_catch/269 [ 20.549268] [ 20.549586] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 20.549695] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.549745] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.549809] Call Trace: [ 20.549870] <TASK> [ 20.549911] dump_stack_lvl+0x73/0xb0 [ 20.549982] print_report+0xd1/0x650 [ 20.550039] ? __virt_addr_valid+0x1db/0x2d0 [ 20.550094] ? kasan_bitops_modify.constprop.0+0x40f/0xd50 [ 20.550150] ? kasan_complete_mode_report_info+0x2a/0x200 [ 20.550212] ? kasan_bitops_modify.constprop.0+0x40f/0xd50 [ 20.550277] kasan_report+0x140/0x180 [ 20.550378] ? kasan_bitops_modify.constprop.0+0x40f/0xd50 [ 20.550458] kasan_check_range+0x10c/0x1c0 [ 20.550500] __kasan_check_write+0x18/0x20 [ 20.550531] kasan_bitops_modify.constprop.0+0x40f/0xd50 [ 20.550564] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 20.550597] ? __kmalloc_cache_noprof+0x18a/0x420 [ 20.550628] ? trace_hardirqs_on+0x37/0xe0 [ 20.550658] ? kasan_bitops_generic+0x93/0x1c0 [ 20.550692] kasan_bitops_generic+0x117/0x1c0 [ 20.550722] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 20.550752] ? __pfx_read_tsc+0x10/0x10 [ 20.550780] ? ktime_get_ts64+0x86/0x230 [ 20.550812] kunit_try_run_case+0x1a6/0x480 [ 20.550842] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.550891] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 20.550923] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.550954] ? __kthread_parkme+0x82/0x160 [ 20.550983] ? preempt_count_sub+0x50/0x80 [ 20.551013] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.551043] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.551074] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.551108] kthread+0x324/0x6e0 [ 20.551135] ? trace_preempt_on+0x20/0xc0 [ 20.551163] ? __pfx_kthread+0x10/0x10 [ 20.551192] ? _raw_spin_unlock_irq+0x47/0x80 [ 20.551219] ? calculate_sigpending+0x7b/0xa0 [ 20.551247] ? __pfx_kthread+0x10/0x10 [ 20.551276] ret_from_fork+0x41/0x80 [ 20.551318] ? __pfx_kthread+0x10/0x10 [ 20.551354] ret_from_fork_asm+0x1a/0x30 [ 20.551395] </TASK> [ 20.551410] [ 20.566608] Allocated by task 269: [ 20.567094] kasan_save_stack+0x45/0x70 [ 20.567540] kasan_save_track+0x18/0x40 [ 20.567884] kasan_save_alloc_info+0x3b/0x50 [ 20.568342] __kasan_kmalloc+0xb7/0xc0 [ 20.568757] __kmalloc_cache_noprof+0x18a/0x420 [ 20.569083] kasan_bitops_generic+0x93/0x1c0 [ 20.569572] kunit_try_run_case+0x1a6/0x480 [ 20.569987] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.570599] kthread+0x324/0x6e0 [ 20.570874] ret_from_fork+0x41/0x80 [ 20.571402] ret_from_fork_asm+0x1a/0x30 [ 20.571784] [ 20.571947] The buggy address belongs to the object at ffff8881024b01a0 [ 20.571947] which belongs to the cache kmalloc-16 of size 16 [ 20.572842] The buggy address is located 8 bytes inside of [ 20.572842] allocated 9-byte region [ffff8881024b01a0, ffff8881024b01a9) [ 20.573878] [ 20.574028] The buggy address belongs to the physical page: [ 20.574444] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024b0 [ 20.575286] flags: 0x200000000000000(node=0|zone=2) [ 20.575758] page_type: f5(slab) [ 20.576170] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 20.576646] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 20.577279] page dumped because: kasan: bad access detected [ 20.577865] [ 20.578083] Memory state around the buggy address: [ 20.578515] ffff8881024b0080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 20.579102] ffff8881024b0100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 20.579805] >ffff8881024b0180: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 20.580260] ^ [ 20.580689] ffff8881024b0200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.581205] ffff8881024b0280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.581641] ================================================================== [ 20.442436] ================================================================== [ 20.442739] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23b/0xd50 [ 20.443256] Write of size 8 at addr ffff8881024b01a8 by task kunit_try_catch/269 [ 20.444016] [ 20.444286] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 20.444426] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.444460] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.444506] Call Trace: [ 20.444536] <TASK> [ 20.444573] dump_stack_lvl+0x73/0xb0 [ 20.444673] print_report+0xd1/0x650 [ 20.444731] ? __virt_addr_valid+0x1db/0x2d0 [ 20.444789] ? kasan_bitops_modify.constprop.0+0x23b/0xd50 [ 20.444869] ? kasan_complete_mode_report_info+0x2a/0x200 [ 20.444923] ? kasan_bitops_modify.constprop.0+0x23b/0xd50 [ 20.444958] kasan_report+0x140/0x180 [ 20.444988] ? kasan_bitops_modify.constprop.0+0x23b/0xd50 [ 20.445026] kasan_check_range+0x10c/0x1c0 [ 20.445055] __kasan_check_write+0x18/0x20 [ 20.445084] kasan_bitops_modify.constprop.0+0x23b/0xd50 [ 20.445115] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 20.445147] ? __kmalloc_cache_noprof+0x18a/0x420 [ 20.445177] ? trace_hardirqs_on+0x37/0xe0 [ 20.445206] ? kasan_bitops_generic+0x93/0x1c0 [ 20.445240] kasan_bitops_generic+0x117/0x1c0 [ 20.445268] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 20.445317] ? __pfx_read_tsc+0x10/0x10 [ 20.445351] ? ktime_get_ts64+0x86/0x230 [ 20.445386] kunit_try_run_case+0x1a6/0x480 [ 20.445417] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.445445] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 20.445475] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.445505] ? __kthread_parkme+0x82/0x160 [ 20.445535] ? preempt_count_sub+0x50/0x80 [ 20.445566] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.445596] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.445629] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.445661] kthread+0x324/0x6e0 [ 20.445688] ? trace_preempt_on+0x20/0xc0 [ 20.445717] ? __pfx_kthread+0x10/0x10 [ 20.445744] ? _raw_spin_unlock_irq+0x47/0x80 [ 20.445772] ? calculate_sigpending+0x7b/0xa0 [ 20.445801] ? __pfx_kthread+0x10/0x10 [ 20.445830] ret_from_fork+0x41/0x80 [ 20.445873] ? __pfx_kthread+0x10/0x10 [ 20.445902] ret_from_fork_asm+0x1a/0x30 [ 20.445942] </TASK> [ 20.445957] [ 20.459961] Allocated by task 269: [ 20.460206] kasan_save_stack+0x45/0x70 [ 20.460503] kasan_save_track+0x18/0x40 [ 20.460803] kasan_save_alloc_info+0x3b/0x50 [ 20.461246] __kasan_kmalloc+0xb7/0xc0 [ 20.461679] __kmalloc_cache_noprof+0x18a/0x420 [ 20.462146] kasan_bitops_generic+0x93/0x1c0 [ 20.462576] kunit_try_run_case+0x1a6/0x480 [ 20.462881] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.463182] kthread+0x324/0x6e0 [ 20.463559] ret_from_fork+0x41/0x80 [ 20.463950] ret_from_fork_asm+0x1a/0x30 [ 20.464396] [ 20.464600] The buggy address belongs to the object at ffff8881024b01a0 [ 20.464600] which belongs to the cache kmalloc-16 of size 16 [ 20.465528] The buggy address is located 8 bytes inside of [ 20.465528] allocated 9-byte region [ffff8881024b01a0, ffff8881024b01a9) [ 20.466285] [ 20.466472] The buggy address belongs to the physical page: [ 20.466850] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024b0 [ 20.467364] flags: 0x200000000000000(node=0|zone=2) [ 20.467829] page_type: f5(slab) [ 20.468067] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 20.468590] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 20.469222] page dumped because: kasan: bad access detected [ 20.469642] [ 20.469849] Memory state around the buggy address: [ 20.470252] ffff8881024b0080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 20.470804] ffff8881024b0100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 20.471220] >ffff8881024b0180: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 20.471746] ^ [ 20.472192] ffff8881024b0200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.472694] ffff8881024b0280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.473146] ================================================================== [ 20.399034] ================================================================== [ 20.399534] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19d/0xd50 [ 20.400531] Write of size 8 at addr ffff8881024b01a8 by task kunit_try_catch/269 [ 20.401203] [ 20.401466] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 20.401566] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.401585] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.401613] Call Trace: [ 20.401636] <TASK> [ 20.401658] dump_stack_lvl+0x73/0xb0 [ 20.401700] print_report+0xd1/0x650 [ 20.401747] ? __virt_addr_valid+0x1db/0x2d0 [ 20.401801] ? kasan_bitops_modify.constprop.0+0x19d/0xd50 [ 20.401876] ? kasan_complete_mode_report_info+0x2a/0x200 [ 20.401943] ? kasan_bitops_modify.constprop.0+0x19d/0xd50 [ 20.402009] kasan_report+0x140/0x180 [ 20.402065] ? kasan_bitops_modify.constprop.0+0x19d/0xd50 [ 20.402141] kasan_check_range+0x10c/0x1c0 [ 20.402192] __kasan_check_write+0x18/0x20 [ 20.402242] kasan_bitops_modify.constprop.0+0x19d/0xd50 [ 20.402294] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 20.402345] ? __kmalloc_cache_noprof+0x18a/0x420 [ 20.402391] ? trace_hardirqs_on+0x37/0xe0 [ 20.402437] ? kasan_bitops_generic+0x93/0x1c0 [ 20.402492] kasan_bitops_generic+0x117/0x1c0 [ 20.402542] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 20.402593] ? __pfx_read_tsc+0x10/0x10 [ 20.402636] ? ktime_get_ts64+0x86/0x230 [ 20.402685] kunit_try_run_case+0x1a6/0x480 [ 20.402735] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.402781] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 20.402833] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.403050] ? __kthread_parkme+0x82/0x160 [ 20.403121] ? preempt_count_sub+0x50/0x80 [ 20.403187] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.403243] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.403343] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.403387] kthread+0x324/0x6e0 [ 20.403418] ? trace_preempt_on+0x20/0xc0 [ 20.403465] ? __pfx_kthread+0x10/0x10 [ 20.403513] ? _raw_spin_unlock_irq+0x47/0x80 [ 20.403561] ? calculate_sigpending+0x7b/0xa0 [ 20.403595] ? __pfx_kthread+0x10/0x10 [ 20.403627] ret_from_fork+0x41/0x80 [ 20.403653] ? __pfx_kthread+0x10/0x10 [ 20.403692] ret_from_fork_asm+0x1a/0x30 [ 20.403736] </TASK> [ 20.403750] [ 20.420786] Allocated by task 269: [ 20.421225] kasan_save_stack+0x45/0x70 [ 20.421876] kasan_save_track+0x18/0x40 [ 20.422284] kasan_save_alloc_info+0x3b/0x50 [ 20.422719] __kasan_kmalloc+0xb7/0xc0 [ 20.423127] __kmalloc_cache_noprof+0x18a/0x420 [ 20.424135] kasan_bitops_generic+0x93/0x1c0 [ 20.424832] kunit_try_run_case+0x1a6/0x480 [ 20.425570] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.426243] kthread+0x324/0x6e0 [ 20.426545] ret_from_fork+0x41/0x80 [ 20.426787] ret_from_fork_asm+0x1a/0x30 [ 20.427242] [ 20.427422] The buggy address belongs to the object at ffff8881024b01a0 [ 20.427422] which belongs to the cache kmalloc-16 of size 16 [ 20.428721] The buggy address is located 8 bytes inside of [ 20.428721] allocated 9-byte region [ffff8881024b01a0, ffff8881024b01a9) [ 20.429882] [ 20.430037] The buggy address belongs to the physical page: [ 20.430721] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024b0 [ 20.431370] flags: 0x200000000000000(node=0|zone=2) [ 20.432357] page_type: f5(slab) [ 20.432870] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 20.433582] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 20.434143] page dumped because: kasan: bad access detected [ 20.434810] [ 20.434988] Memory state around the buggy address: [ 20.435709] ffff8881024b0080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 20.436574] ffff8881024b0100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 20.437142] >ffff8881024b0180: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 20.437959] ^ [ 20.438346] ffff8881024b0200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.439002] ffff8881024b0280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.439615] ================================================================== [ 20.622672] ================================================================== [ 20.623162] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x548/0xd50 [ 20.623939] Write of size 8 at addr ffff8881024b01a8 by task kunit_try_catch/269 [ 20.624690] [ 20.624886] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 20.624986] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.625015] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.625065] Call Trace: [ 20.625108] <TASK> [ 20.625161] dump_stack_lvl+0x73/0xb0 [ 20.625240] print_report+0xd1/0x650 [ 20.625318] ? __virt_addr_valid+0x1db/0x2d0 [ 20.625381] ? kasan_bitops_modify.constprop.0+0x548/0xd50 [ 20.625442] ? kasan_complete_mode_report_info+0x2a/0x200 [ 20.625502] ? kasan_bitops_modify.constprop.0+0x548/0xd50 [ 20.625546] kasan_report+0x140/0x180 [ 20.625578] ? kasan_bitops_modify.constprop.0+0x548/0xd50 [ 20.625618] kasan_check_range+0x10c/0x1c0 [ 20.625649] __kasan_check_write+0x18/0x20 [ 20.625678] kasan_bitops_modify.constprop.0+0x548/0xd50 [ 20.625710] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 20.625742] ? __kmalloc_cache_noprof+0x18a/0x420 [ 20.625772] ? trace_hardirqs_on+0x37/0xe0 [ 20.625800] ? kasan_bitops_generic+0x93/0x1c0 [ 20.625834] kasan_bitops_generic+0x117/0x1c0 [ 20.625887] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 20.625919] ? __pfx_read_tsc+0x10/0x10 [ 20.625947] ? ktime_get_ts64+0x86/0x230 [ 20.625980] kunit_try_run_case+0x1a6/0x480 [ 20.626009] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.626037] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 20.626066] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.626096] ? __kthread_parkme+0x82/0x160 [ 20.626124] ? preempt_count_sub+0x50/0x80 [ 20.626155] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.626184] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.626216] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.626248] kthread+0x324/0x6e0 [ 20.626275] ? trace_preempt_on+0x20/0xc0 [ 20.626311] ? __pfx_kthread+0x10/0x10 [ 20.626346] ? _raw_spin_unlock_irq+0x47/0x80 [ 20.626374] ? calculate_sigpending+0x7b/0xa0 [ 20.626401] ? __pfx_kthread+0x10/0x10 [ 20.626431] ret_from_fork+0x41/0x80 [ 20.626455] ? __pfx_kthread+0x10/0x10 [ 20.626483] ret_from_fork_asm+0x1a/0x30 [ 20.626523] </TASK> [ 20.626538] [ 20.640759] Allocated by task 269: [ 20.641158] kasan_save_stack+0x45/0x70 [ 20.641616] kasan_save_track+0x18/0x40 [ 20.642031] kasan_save_alloc_info+0x3b/0x50 [ 20.642495] __kasan_kmalloc+0xb7/0xc0 [ 20.642892] __kmalloc_cache_noprof+0x18a/0x420 [ 20.643174] kasan_bitops_generic+0x93/0x1c0 [ 20.643632] kunit_try_run_case+0x1a6/0x480 [ 20.643918] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.644433] kthread+0x324/0x6e0 [ 20.644798] ret_from_fork+0x41/0x80 [ 20.645177] ret_from_fork_asm+0x1a/0x30 [ 20.645596] [ 20.645808] The buggy address belongs to the object at ffff8881024b01a0 [ 20.645808] which belongs to the cache kmalloc-16 of size 16 [ 20.646614] The buggy address is located 8 bytes inside of [ 20.646614] allocated 9-byte region [ffff8881024b01a0, ffff8881024b01a9) [ 20.647438] [ 20.647604] The buggy address belongs to the physical page: [ 20.648089] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024b0 [ 20.648668] flags: 0x200000000000000(node=0|zone=2) [ 20.649055] page_type: f5(slab) [ 20.649423] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 20.649998] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 20.650488] page dumped because: kasan: bad access detected [ 20.650764] [ 20.650921] Memory state around the buggy address: [ 20.651171] ffff8881024b0080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 20.651817] ffff8881024b0100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 20.652465] >ffff8881024b0180: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 20.653075] ^ [ 20.653539] ffff8881024b0200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.654058] ffff8881024b0280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.654561] ================================================================== [ 20.358759] ================================================================== [ 20.359326] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x102/0xd50 [ 20.359903] Write of size 8 at addr ffff8881024b01a8 by task kunit_try_catch/269 [ 20.360997] [ 20.361274] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 20.361660] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.361702] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.361760] Call Trace: [ 20.361790] <TASK> [ 20.361824] dump_stack_lvl+0x73/0xb0 [ 20.361915] print_report+0xd1/0x650 [ 20.361973] ? __virt_addr_valid+0x1db/0x2d0 [ 20.362034] ? kasan_bitops_modify.constprop.0+0x102/0xd50 [ 20.362084] ? kasan_complete_mode_report_info+0x2a/0x200 [ 20.362118] ? kasan_bitops_modify.constprop.0+0x102/0xd50 [ 20.362152] kasan_report+0x140/0x180 [ 20.362181] ? kasan_bitops_modify.constprop.0+0x102/0xd50 [ 20.362218] kasan_check_range+0x10c/0x1c0 [ 20.362250] __kasan_check_write+0x18/0x20 [ 20.362278] kasan_bitops_modify.constprop.0+0x102/0xd50 [ 20.362335] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 20.362370] ? __kmalloc_cache_noprof+0x18a/0x420 [ 20.362400] ? trace_hardirqs_on+0x37/0xe0 [ 20.362436] ? kasan_bitops_generic+0x93/0x1c0 [ 20.362496] kasan_bitops_generic+0x117/0x1c0 [ 20.362549] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 20.362603] ? __pfx_read_tsc+0x10/0x10 [ 20.362636] ? ktime_get_ts64+0x86/0x230 [ 20.362670] kunit_try_run_case+0x1a6/0x480 [ 20.362701] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.362728] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 20.362760] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.362790] ? __kthread_parkme+0x82/0x160 [ 20.362819] ? preempt_count_sub+0x50/0x80 [ 20.362850] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.362901] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.362934] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.362967] kthread+0x324/0x6e0 [ 20.362994] ? trace_preempt_on+0x20/0xc0 [ 20.363024] ? __pfx_kthread+0x10/0x10 [ 20.363052] ? _raw_spin_unlock_irq+0x47/0x80 [ 20.363079] ? calculate_sigpending+0x7b/0xa0 [ 20.363108] ? __pfx_kthread+0x10/0x10 [ 20.363136] ret_from_fork+0x41/0x80 [ 20.363161] ? __pfx_kthread+0x10/0x10 [ 20.363189] ret_from_fork_asm+0x1a/0x30 [ 20.363228] </TASK> [ 20.363242] [ 20.379126] Allocated by task 269: [ 20.379387] kasan_save_stack+0x45/0x70 [ 20.379644] kasan_save_track+0x18/0x40 [ 20.379902] kasan_save_alloc_info+0x3b/0x50 [ 20.380331] __kasan_kmalloc+0xb7/0xc0 [ 20.380729] __kmalloc_cache_noprof+0x18a/0x420 [ 20.381376] kasan_bitops_generic+0x93/0x1c0 [ 20.382089] kunit_try_run_case+0x1a6/0x480 [ 20.382734] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.383363] kthread+0x324/0x6e0 [ 20.384002] ret_from_fork+0x41/0x80 [ 20.384641] ret_from_fork_asm+0x1a/0x30 [ 20.385082] [ 20.385287] The buggy address belongs to the object at ffff8881024b01a0 [ 20.385287] which belongs to the cache kmalloc-16 of size 16 [ 20.386571] The buggy address is located 8 bytes inside of [ 20.386571] allocated 9-byte region [ffff8881024b01a0, ffff8881024b01a9) [ 20.387643] [ 20.388170] The buggy address belongs to the physical page: [ 20.388670] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024b0 [ 20.389613] flags: 0x200000000000000(node=0|zone=2) [ 20.390232] page_type: f5(slab) [ 20.390870] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 20.392091] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 20.392610] page dumped because: kasan: bad access detected [ 20.393161] [ 20.393347] Memory state around the buggy address: [ 20.394139] ffff8881024b0080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 20.394629] ffff8881024b0100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 20.395175] >ffff8881024b0180: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 20.395588] ^ [ 20.396386] ffff8881024b0200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.397010] ffff8881024b0280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.397676] ================================================================== [ 20.583080] ================================================================== [ 20.584055] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ad/0xd50 [ 20.584948] Write of size 8 at addr ffff8881024b01a8 by task kunit_try_catch/269 [ 20.585464] [ 20.585616] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 20.585671] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.585687] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.585711] Call Trace: [ 20.585733] <TASK> [ 20.585756] dump_stack_lvl+0x73/0xb0 [ 20.585793] print_report+0xd1/0x650 [ 20.585823] ? __virt_addr_valid+0x1db/0x2d0 [ 20.585850] ? kasan_bitops_modify.constprop.0+0x4ad/0xd50 [ 20.585903] ? kasan_complete_mode_report_info+0x2a/0x200 [ 20.585937] ? kasan_bitops_modify.constprop.0+0x4ad/0xd50 [ 20.585969] kasan_report+0x140/0x180 [ 20.585996] ? kasan_bitops_modify.constprop.0+0x4ad/0xd50 [ 20.586033] kasan_check_range+0x10c/0x1c0 [ 20.586062] __kasan_check_write+0x18/0x20 [ 20.586092] kasan_bitops_modify.constprop.0+0x4ad/0xd50 [ 20.586122] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 20.586154] ? __kmalloc_cache_noprof+0x18a/0x420 [ 20.586183] ? trace_hardirqs_on+0x37/0xe0 [ 20.586212] ? kasan_bitops_generic+0x93/0x1c0 [ 20.586245] kasan_bitops_generic+0x117/0x1c0 [ 20.586275] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 20.586318] ? __pfx_read_tsc+0x10/0x10 [ 20.586367] ? ktime_get_ts64+0x86/0x230 [ 20.586432] kunit_try_run_case+0x1a6/0x480 [ 20.586495] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.586553] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 20.586615] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.586674] ? __kthread_parkme+0x82/0x160 [ 20.586730] ? preempt_count_sub+0x50/0x80 [ 20.586787] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.586845] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.586929] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.586996] kthread+0x324/0x6e0 [ 20.587053] ? trace_preempt_on+0x20/0xc0 [ 20.587107] ? __pfx_kthread+0x10/0x10 [ 20.587162] ? _raw_spin_unlock_irq+0x47/0x80 [ 20.587211] ? calculate_sigpending+0x7b/0xa0 [ 20.587249] ? __pfx_kthread+0x10/0x10 [ 20.587280] ret_from_fork+0x41/0x80 [ 20.587316] ? __pfx_kthread+0x10/0x10 [ 20.587353] ret_from_fork_asm+0x1a/0x30 [ 20.587395] </TASK> [ 20.587409] [ 20.603155] Allocated by task 269: [ 20.603748] kasan_save_stack+0x45/0x70 [ 20.604053] kasan_save_track+0x18/0x40 [ 20.604321] kasan_save_alloc_info+0x3b/0x50 [ 20.604605] __kasan_kmalloc+0xb7/0xc0 [ 20.604850] __kmalloc_cache_noprof+0x18a/0x420 [ 20.605329] kasan_bitops_generic+0x93/0x1c0 [ 20.606315] kunit_try_run_case+0x1a6/0x480 [ 20.606776] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.607322] kthread+0x324/0x6e0 [ 20.607966] ret_from_fork+0x41/0x80 [ 20.608535] ret_from_fork_asm+0x1a/0x30 [ 20.608847] [ 20.608988] The buggy address belongs to the object at ffff8881024b01a0 [ 20.608988] which belongs to the cache kmalloc-16 of size 16 [ 20.610528] The buggy address is located 8 bytes inside of [ 20.610528] allocated 9-byte region [ffff8881024b01a0, ffff8881024b01a9) [ 20.611429] [ 20.611649] The buggy address belongs to the physical page: [ 20.612464] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024b0 [ 20.613160] flags: 0x200000000000000(node=0|zone=2) [ 20.613653] page_type: f5(slab) [ 20.614087] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 20.614758] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 20.615247] page dumped because: kasan: bad access detected [ 20.615755] [ 20.615920] Memory state around the buggy address: [ 20.616327] ffff8881024b0080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 20.617214] ffff8881024b0100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 20.617936] >ffff8881024b0180: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 20.618730] ^ [ 20.619310] ffff8881024b0200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.620014] ffff8881024b0280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.620788] ================================================================== [ 20.509740] ================================================================== [ 20.510536] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x374/0xd50 [ 20.511232] Write of size 8 at addr ffff8881024b01a8 by task kunit_try_catch/269 [ 20.511964] [ 20.512275] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 20.512417] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.512448] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.512502] Call Trace: [ 20.512577] <TASK> [ 20.512636] dump_stack_lvl+0x73/0xb0 [ 20.512713] print_report+0xd1/0x650 [ 20.512771] ? __virt_addr_valid+0x1db/0x2d0 [ 20.512831] ? kasan_bitops_modify.constprop.0+0x374/0xd50 [ 20.512911] ? kasan_complete_mode_report_info+0x2a/0x200 [ 20.512978] ? kasan_bitops_modify.constprop.0+0x374/0xd50 [ 20.513043] kasan_report+0x140/0x180 [ 20.513091] ? kasan_bitops_modify.constprop.0+0x374/0xd50 [ 20.513132] kasan_check_range+0x10c/0x1c0 [ 20.513163] __kasan_check_write+0x18/0x20 [ 20.513192] kasan_bitops_modify.constprop.0+0x374/0xd50 [ 20.513224] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 20.513256] ? __kmalloc_cache_noprof+0x18a/0x420 [ 20.513286] ? trace_hardirqs_on+0x37/0xe0 [ 20.513344] ? kasan_bitops_generic+0x93/0x1c0 [ 20.513381] kasan_bitops_generic+0x117/0x1c0 [ 20.513411] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 20.513442] ? __pfx_read_tsc+0x10/0x10 [ 20.513470] ? ktime_get_ts64+0x86/0x230 [ 20.513502] kunit_try_run_case+0x1a6/0x480 [ 20.513533] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.513559] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 20.513589] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.513619] ? __kthread_parkme+0x82/0x160 [ 20.513646] ? preempt_count_sub+0x50/0x80 [ 20.513678] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.513706] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.513737] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.513770] kthread+0x324/0x6e0 [ 20.513796] ? trace_preempt_on+0x20/0xc0 [ 20.513824] ? __pfx_kthread+0x10/0x10 [ 20.513869] ? _raw_spin_unlock_irq+0x47/0x80 [ 20.513900] ? calculate_sigpending+0x7b/0xa0 [ 20.513928] ? __pfx_kthread+0x10/0x10 [ 20.513958] ret_from_fork+0x41/0x80 [ 20.513982] ? __pfx_kthread+0x10/0x10 [ 20.514009] ret_from_fork_asm+0x1a/0x30 [ 20.514050] </TASK> [ 20.514064] [ 20.530808] Allocated by task 269: [ 20.531219] kasan_save_stack+0x45/0x70 [ 20.531538] kasan_save_track+0x18/0x40 [ 20.531931] kasan_save_alloc_info+0x3b/0x50 [ 20.532239] __kasan_kmalloc+0xb7/0xc0 [ 20.532597] __kmalloc_cache_noprof+0x18a/0x420 [ 20.533028] kasan_bitops_generic+0x93/0x1c0 [ 20.533466] kunit_try_run_case+0x1a6/0x480 [ 20.533878] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.534182] kthread+0x324/0x6e0 [ 20.534439] ret_from_fork+0x41/0x80 [ 20.534873] ret_from_fork_asm+0x1a/0x30 [ 20.535288] [ 20.535537] The buggy address belongs to the object at ffff8881024b01a0 [ 20.535537] which belongs to the cache kmalloc-16 of size 16 [ 20.536634] The buggy address is located 8 bytes inside of [ 20.536634] allocated 9-byte region [ffff8881024b01a0, ffff8881024b01a9) [ 20.537467] [ 20.537620] The buggy address belongs to the physical page: [ 20.537906] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024b0 [ 20.538622] flags: 0x200000000000000(node=0|zone=2) [ 20.539164] page_type: f5(slab) [ 20.539594] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 20.540242] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 20.540632] page dumped because: kasan: bad access detected [ 20.541042] [ 20.541343] Memory state around the buggy address: [ 20.541847] ffff8881024b0080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 20.542552] ffff8881024b0100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 20.543941] >ffff8881024b0180: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 20.544462] ^ [ 20.545362] ffff8881024b0200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.545766] ffff8881024b0280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.546298] ==================================================================