Date
June 7, 2025, 10:40 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 27.007496] ================================================================== [ 27.008315] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc8 [ 27.009259] Write of size 8 at addr fff00000c596b748 by task kunit_try_catch/250 [ 27.011576] [ 27.012239] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 27.012446] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.012519] Hardware name: linux,dummy-virt (DT) [ 27.012605] Call trace: [ 27.012666] show_stack+0x20/0x38 (C) [ 27.012801] dump_stack_lvl+0x8c/0xd0 [ 27.013584] print_report+0x118/0x608 [ 27.013726] kasan_report+0xdc/0x128 [ 27.013853] kasan_check_range+0x100/0x1a8 [ 27.014003] __kasan_check_write+0x20/0x30 [ 27.014134] kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc8 [ 27.014292] kasan_bitops_generic+0x11c/0x1c8 [ 27.014417] kunit_try_run_case+0x170/0x3f0 [ 27.014554] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.014690] kthread+0x318/0x620 [ 27.014816] ret_from_fork+0x10/0x20 [ 27.014965] [ 27.028840] Allocated by task 250: [ 27.030320] kasan_save_stack+0x3c/0x68 [ 27.031804] kasan_save_track+0x20/0x40 [ 27.033286] kasan_save_alloc_info+0x40/0x58 [ 27.034470] __kasan_kmalloc+0xd4/0xd8 [ 27.036080] __kmalloc_cache_noprof+0x16c/0x3c0 [ 27.036520] kasan_bitops_generic+0xa0/0x1c8 [ 27.037832] kunit_try_run_case+0x170/0x3f0 [ 27.039368] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.041309] kthread+0x318/0x620 [ 27.042091] ret_from_fork+0x10/0x20 [ 27.043554] [ 27.044150] The buggy address belongs to the object at fff00000c596b740 [ 27.044150] which belongs to the cache kmalloc-16 of size 16 [ 27.045797] The buggy address is located 8 bytes inside of [ 27.045797] allocated 9-byte region [fff00000c596b740, fff00000c596b749) [ 27.049136] [ 27.050085] The buggy address belongs to the physical page: [ 27.051345] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10596b [ 27.051979] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.052521] page_type: f5(slab) [ 27.052870] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 27.056520] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 27.058729] page dumped because: kasan: bad access detected [ 27.059992] [ 27.060963] Memory state around the buggy address: [ 27.062639] fff00000c596b600: fa fb fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 27.064653] fff00000c596b680: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 27.066282] >fff00000c596b700: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 27.067874] ^ [ 27.068335] fff00000c596b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.069845] fff00000c596b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.072358] ================================================================== [ 27.158971] ================================================================== [ 27.159744] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc8 [ 27.160533] Write of size 8 at addr fff00000c596b748 by task kunit_try_catch/250 [ 27.163822] [ 27.164184] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 27.164384] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.164453] Hardware name: linux,dummy-virt (DT) [ 27.164537] Call trace: [ 27.164592] show_stack+0x20/0x38 (C) [ 27.164715] dump_stack_lvl+0x8c/0xd0 [ 27.164829] print_report+0x118/0x608 [ 27.165516] kasan_report+0xdc/0x128 [ 27.165645] kasan_check_range+0x100/0x1a8 [ 27.165762] __kasan_check_write+0x20/0x30 [ 27.165909] kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc8 [ 27.166059] kasan_bitops_generic+0x11c/0x1c8 [ 27.166197] kunit_try_run_case+0x170/0x3f0 [ 27.166331] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.166473] kthread+0x318/0x620 [ 27.166595] ret_from_fork+0x10/0x20 [ 27.166724] [ 27.178431] Allocated by task 250: [ 27.179861] kasan_save_stack+0x3c/0x68 [ 27.181063] kasan_save_track+0x20/0x40 [ 27.181782] kasan_save_alloc_info+0x40/0x58 [ 27.183073] __kasan_kmalloc+0xd4/0xd8 [ 27.184198] __kmalloc_cache_noprof+0x16c/0x3c0 [ 27.184644] kasan_bitops_generic+0xa0/0x1c8 [ 27.185866] kunit_try_run_case+0x170/0x3f0 [ 27.186502] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.188187] kthread+0x318/0x620 [ 27.189764] ret_from_fork+0x10/0x20 [ 27.190495] [ 27.190756] The buggy address belongs to the object at fff00000c596b740 [ 27.190756] which belongs to the cache kmalloc-16 of size 16 [ 27.192773] The buggy address is located 8 bytes inside of [ 27.192773] allocated 9-byte region [fff00000c596b740, fff00000c596b749) [ 27.195101] [ 27.195436] The buggy address belongs to the physical page: [ 27.196823] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10596b [ 27.197926] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.199318] page_type: f5(slab) [ 27.199706] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 27.201993] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 27.203258] page dumped because: kasan: bad access detected [ 27.204658] [ 27.205470] Memory state around the buggy address: [ 27.206075] fff00000c596b600: fa fb fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 27.206633] fff00000c596b680: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 27.207488] >fff00000c596b700: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 27.209820] ^ [ 27.211107] fff00000c596b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.212635] fff00000c596b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.213416] ================================================================== [ 27.344512] ================================================================== [ 27.347579] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xad4/0xbc8 [ 27.349675] Read of size 8 at addr fff00000c596b748 by task kunit_try_catch/250 [ 27.352036] [ 27.352307] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 27.352513] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.352601] Hardware name: linux,dummy-virt (DT) [ 27.352693] Call trace: [ 27.352755] show_stack+0x20/0x38 (C) [ 27.353525] dump_stack_lvl+0x8c/0xd0 [ 27.353661] print_report+0x118/0x608 [ 27.353782] kasan_report+0xdc/0x128 [ 27.353918] __asan_report_load8_noabort+0x20/0x30 [ 27.354047] kasan_bitops_test_and_modify.constprop.0+0xad4/0xbc8 [ 27.354192] kasan_bitops_generic+0x11c/0x1c8 [ 27.354336] kunit_try_run_case+0x170/0x3f0 [ 27.354448] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.354575] kthread+0x318/0x620 [ 27.354688] ret_from_fork+0x10/0x20 [ 27.354804] [ 27.368582] Allocated by task 250: [ 27.369372] kasan_save_stack+0x3c/0x68 [ 27.370023] kasan_save_track+0x20/0x40 [ 27.370538] kasan_save_alloc_info+0x40/0x58 [ 27.371617] __kasan_kmalloc+0xd4/0xd8 [ 27.373030] __kmalloc_cache_noprof+0x16c/0x3c0 [ 27.373804] kasan_bitops_generic+0xa0/0x1c8 [ 27.375148] kunit_try_run_case+0x170/0x3f0 [ 27.375584] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.376085] kthread+0x318/0x620 [ 27.376438] ret_from_fork+0x10/0x20 [ 27.376824] [ 27.378181] The buggy address belongs to the object at fff00000c596b740 [ 27.378181] which belongs to the cache kmalloc-16 of size 16 [ 27.383208] The buggy address is located 8 bytes inside of [ 27.383208] allocated 9-byte region [fff00000c596b740, fff00000c596b749) [ 27.384093] [ 27.384343] The buggy address belongs to the physical page: [ 27.384782] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10596b [ 27.387468] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.389176] page_type: f5(slab) [ 27.389687] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 27.397016] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 27.398145] page dumped because: kasan: bad access detected [ 27.398821] [ 27.400047] Memory state around the buggy address: [ 27.400471] fff00000c596b600: fa fb fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 27.404344] fff00000c596b680: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 27.405287] >fff00000c596b700: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 27.405821] ^ [ 27.408055] fff00000c596b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.410098] fff00000c596b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.412925] ================================================================== [ 27.216283] ================================================================== [ 27.218070] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa50/0xbc8 [ 27.220442] Read of size 8 at addr fff00000c596b748 by task kunit_try_catch/250 [ 27.222386] [ 27.222725] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 27.223874] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.223969] Hardware name: linux,dummy-virt (DT) [ 27.224055] Call trace: [ 27.224111] show_stack+0x20/0x38 (C) [ 27.224239] dump_stack_lvl+0x8c/0xd0 [ 27.224358] print_report+0x118/0x608 [ 27.224475] kasan_report+0xdc/0x128 [ 27.224593] __asan_report_load8_noabort+0x20/0x30 [ 27.224711] kasan_bitops_test_and_modify.constprop.0+0xa50/0xbc8 [ 27.224847] kasan_bitops_generic+0x11c/0x1c8 [ 27.225231] kunit_try_run_case+0x170/0x3f0 [ 27.225368] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.225507] kthread+0x318/0x620 [ 27.225635] ret_from_fork+0x10/0x20 [ 27.225767] [ 27.237055] Allocated by task 250: [ 27.237527] kasan_save_stack+0x3c/0x68 [ 27.239413] kasan_save_track+0x20/0x40 [ 27.239903] kasan_save_alloc_info+0x40/0x58 [ 27.242104] __kasan_kmalloc+0xd4/0xd8 [ 27.243381] __kmalloc_cache_noprof+0x16c/0x3c0 [ 27.244135] kasan_bitops_generic+0xa0/0x1c8 [ 27.244554] kunit_try_run_case+0x170/0x3f0 [ 27.245566] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.247298] kthread+0x318/0x620 [ 27.248515] ret_from_fork+0x10/0x20 [ 27.249475] [ 27.250294] The buggy address belongs to the object at fff00000c596b740 [ 27.250294] which belongs to the cache kmalloc-16 of size 16 [ 27.251374] The buggy address is located 8 bytes inside of [ 27.251374] allocated 9-byte region [fff00000c596b740, fff00000c596b749) [ 27.252588] [ 27.252845] The buggy address belongs to the physical page: [ 27.257189] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10596b [ 27.259080] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.260529] page_type: f5(slab) [ 27.261427] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 27.263753] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 27.265636] page dumped because: kasan: bad access detected [ 27.268114] [ 27.268415] Memory state around the buggy address: [ 27.268851] fff00000c596b600: fa fb fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 27.270797] fff00000c596b680: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 27.274289] >fff00000c596b700: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 27.275663] ^ [ 27.277044] fff00000c596b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.277707] fff00000c596b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.282329] ================================================================== [ 27.503299] ================================================================== [ 27.504236] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa44/0xbc8 [ 27.506448] Read of size 8 at addr fff00000c596b748 by task kunit_try_catch/250 [ 27.507551] [ 27.509691] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 27.509916] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.509989] Hardware name: linux,dummy-virt (DT) [ 27.510070] Call trace: [ 27.510126] show_stack+0x20/0x38 (C) [ 27.510266] dump_stack_lvl+0x8c/0xd0 [ 27.510383] print_report+0x118/0x608 [ 27.510505] kasan_report+0xdc/0x128 [ 27.510618] __asan_report_load8_noabort+0x20/0x30 [ 27.510736] kasan_bitops_test_and_modify.constprop.0+0xa44/0xbc8 [ 27.510874] kasan_bitops_generic+0x11c/0x1c8 [ 27.511021] kunit_try_run_case+0x170/0x3f0 [ 27.511143] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.511274] kthread+0x318/0x620 [ 27.511389] ret_from_fork+0x10/0x20 [ 27.511510] [ 27.529680] Allocated by task 250: [ 27.530210] kasan_save_stack+0x3c/0x68 [ 27.530760] kasan_save_track+0x20/0x40 [ 27.534281] kasan_save_alloc_info+0x40/0x58 [ 27.535574] __kasan_kmalloc+0xd4/0xd8 [ 27.537315] __kmalloc_cache_noprof+0x16c/0x3c0 [ 27.537748] kasan_bitops_generic+0xa0/0x1c8 [ 27.538207] kunit_try_run_case+0x170/0x3f0 [ 27.538581] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.539097] kthread+0x318/0x620 [ 27.539455] ret_from_fork+0x10/0x20 [ 27.539822] [ 27.543971] The buggy address belongs to the object at fff00000c596b740 [ 27.543971] which belongs to the cache kmalloc-16 of size 16 [ 27.548323] The buggy address is located 8 bytes inside of [ 27.548323] allocated 9-byte region [fff00000c596b740, fff00000c596b749) [ 27.549655] [ 27.550658] The buggy address belongs to the physical page: [ 27.552123] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10596b [ 27.553149] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.553681] page_type: f5(slab) [ 27.555088] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 27.555764] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 27.556345] page dumped because: kasan: bad access detected [ 27.556798] [ 27.557058] Memory state around the buggy address: [ 27.557472] fff00000c596b600: fa fb fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 27.559347] fff00000c596b680: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 27.561694] >fff00000c596b700: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 27.562534] ^ [ 27.564491] fff00000c596b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.565517] fff00000c596b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.567629] ================================================================== [ 27.416415] ================================================================== [ 27.417016] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x334/0xbc8 [ 27.417676] Write of size 8 at addr fff00000c596b748 by task kunit_try_catch/250 [ 27.422579] [ 27.422852] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 27.423078] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.423150] Hardware name: linux,dummy-virt (DT) [ 27.423228] Call trace: [ 27.423285] show_stack+0x20/0x38 (C) [ 27.423412] dump_stack_lvl+0x8c/0xd0 [ 27.423529] print_report+0x118/0x608 [ 27.423645] kasan_report+0xdc/0x128 [ 27.423760] kasan_check_range+0x100/0x1a8 [ 27.423875] __kasan_check_write+0x20/0x30 [ 27.425453] kasan_bitops_test_and_modify.constprop.0+0x334/0xbc8 [ 27.425601] kasan_bitops_generic+0x11c/0x1c8 [ 27.425733] kunit_try_run_case+0x170/0x3f0 [ 27.425852] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.426008] kthread+0x318/0x620 [ 27.426122] ret_from_fork+0x10/0x20 [ 27.426254] [ 27.445477] Allocated by task 250: [ 27.445866] kasan_save_stack+0x3c/0x68 [ 27.446368] kasan_save_track+0x20/0x40 [ 27.446755] kasan_save_alloc_info+0x40/0x58 [ 27.449401] __kasan_kmalloc+0xd4/0xd8 [ 27.452336] __kmalloc_cache_noprof+0x16c/0x3c0 [ 27.453642] kasan_bitops_generic+0xa0/0x1c8 [ 27.454961] kunit_try_run_case+0x170/0x3f0 [ 27.457440] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.458859] kthread+0x318/0x620 [ 27.462778] ret_from_fork+0x10/0x20 [ 27.463423] [ 27.463748] The buggy address belongs to the object at fff00000c596b740 [ 27.463748] which belongs to the cache kmalloc-16 of size 16 [ 27.466963] The buggy address is located 8 bytes inside of [ 27.466963] allocated 9-byte region [fff00000c596b740, fff00000c596b749) [ 27.469870] [ 27.471941] The buggy address belongs to the physical page: [ 27.472413] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10596b [ 27.473591] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.474807] page_type: f5(slab) [ 27.476558] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 27.481352] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 27.482194] page dumped because: kasan: bad access detected [ 27.483591] [ 27.484111] Memory state around the buggy address: [ 27.486521] fff00000c596b600: fa fb fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 27.488361] fff00000c596b680: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 27.490674] >fff00000c596b700: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 27.491409] ^ [ 27.492947] fff00000c596b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.493760] fff00000c596b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.497147] ================================================================== [ 27.575396] ================================================================== [ 27.576225] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa8c/0xbc8 [ 27.581010] Read of size 8 at addr fff00000c596b748 by task kunit_try_catch/250 [ 27.581754] [ 27.585222] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 27.585425] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.585491] Hardware name: linux,dummy-virt (DT) [ 27.585570] Call trace: [ 27.585624] show_stack+0x20/0x38 (C) [ 27.585753] dump_stack_lvl+0x8c/0xd0 [ 27.585874] print_report+0x118/0x608 [ 27.586020] kasan_report+0xdc/0x128 [ 27.586134] __asan_report_load8_noabort+0x20/0x30 [ 27.586266] kasan_bitops_test_and_modify.constprop.0+0xa8c/0xbc8 [ 27.586401] kasan_bitops_generic+0x11c/0x1c8 [ 27.586519] kunit_try_run_case+0x170/0x3f0 [ 27.586639] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.586768] kthread+0x318/0x620 [ 27.586904] ret_from_fork+0x10/0x20 [ 27.587030] [ 27.603530] Allocated by task 250: [ 27.606739] kasan_save_stack+0x3c/0x68 [ 27.607536] kasan_save_track+0x20/0x40 [ 27.608940] kasan_save_alloc_info+0x40/0x58 [ 27.609498] __kasan_kmalloc+0xd4/0xd8 [ 27.612712] __kmalloc_cache_noprof+0x16c/0x3c0 [ 27.615839] kasan_bitops_generic+0xa0/0x1c8 [ 27.616621] kunit_try_run_case+0x170/0x3f0 [ 27.619550] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.620769] kthread+0x318/0x620 [ 27.621318] ret_from_fork+0x10/0x20 [ 27.621734] [ 27.625397] The buggy address belongs to the object at fff00000c596b740 [ 27.625397] which belongs to the cache kmalloc-16 of size 16 [ 27.629746] The buggy address is located 8 bytes inside of [ 27.629746] allocated 9-byte region [fff00000c596b740, fff00000c596b749) [ 27.630712] [ 27.634014] The buggy address belongs to the physical page: [ 27.634699] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10596b [ 27.641605] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.642515] page_type: f5(slab) [ 27.644087] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 27.646778] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 27.650872] page dumped because: kasan: bad access detected [ 27.651474] [ 27.651713] Memory state around the buggy address: [ 27.652143] fff00000c596b600: fa fb fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 27.652738] fff00000c596b680: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 27.656375] >fff00000c596b700: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 27.656930] ^ [ 27.657400] fff00000c596b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.658979] fff00000c596b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.661277] ================================================================== [ 27.286379] ================================================================== [ 27.287570] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc8 [ 27.288709] Write of size 8 at addr fff00000c596b748 by task kunit_try_catch/250 [ 27.293159] [ 27.293496] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 27.293690] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.293753] Hardware name: linux,dummy-virt (DT) [ 27.293826] Call trace: [ 27.293877] show_stack+0x20/0x38 (C) [ 27.294649] dump_stack_lvl+0x8c/0xd0 [ 27.294770] print_report+0x118/0x608 [ 27.294930] kasan_report+0xdc/0x128 [ 27.295067] kasan_check_range+0x100/0x1a8 [ 27.295197] __kasan_check_write+0x20/0x30 [ 27.295321] kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc8 [ 27.295455] kasan_bitops_generic+0x11c/0x1c8 [ 27.295581] kunit_try_run_case+0x170/0x3f0 [ 27.295700] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.295840] kthread+0x318/0x620 [ 27.295978] ret_from_fork+0x10/0x20 [ 27.296102] [ 27.311944] Allocated by task 250: [ 27.312399] kasan_save_stack+0x3c/0x68 [ 27.312811] kasan_save_track+0x20/0x40 [ 27.313847] kasan_save_alloc_info+0x40/0x58 [ 27.315375] __kasan_kmalloc+0xd4/0xd8 [ 27.316186] __kmalloc_cache_noprof+0x16c/0x3c0 [ 27.316768] kasan_bitops_generic+0xa0/0x1c8 [ 27.317972] kunit_try_run_case+0x170/0x3f0 [ 27.318364] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.318799] kthread+0x318/0x620 [ 27.319208] ret_from_fork+0x10/0x20 [ 27.319564] [ 27.321138] The buggy address belongs to the object at fff00000c596b740 [ 27.321138] which belongs to the cache kmalloc-16 of size 16 [ 27.321966] The buggy address is located 8 bytes inside of [ 27.321966] allocated 9-byte region [fff00000c596b740, fff00000c596b749) [ 27.322755] [ 27.325359] The buggy address belongs to the physical page: [ 27.325775] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10596b [ 27.328226] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.329120] page_type: f5(slab) [ 27.329506] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 27.330133] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 27.330776] page dumped because: kasan: bad access detected [ 27.334562] [ 27.335068] Memory state around the buggy address: [ 27.336312] fff00000c596b600: fa fb fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 27.336843] fff00000c596b680: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 27.338176] >fff00000c596b700: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 27.339860] ^ [ 27.340344] fff00000c596b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.340862] fff00000c596b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.342669] ================================================================== [ 27.075528] ================================================================== [ 27.077975] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa08/0xbc8 [ 27.080664] Read of size 8 at addr fff00000c596b748 by task kunit_try_catch/250 [ 27.081255] [ 27.081517] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 27.081709] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.081775] Hardware name: linux,dummy-virt (DT) [ 27.081853] Call trace: [ 27.084959] show_stack+0x20/0x38 (C) [ 27.085102] dump_stack_lvl+0x8c/0xd0 [ 27.085228] print_report+0x118/0x608 [ 27.085367] kasan_report+0xdc/0x128 [ 27.085500] __asan_report_load8_noabort+0x20/0x30 [ 27.085631] kasan_bitops_test_and_modify.constprop.0+0xa08/0xbc8 [ 27.085781] kasan_bitops_generic+0x11c/0x1c8 [ 27.085938] kunit_try_run_case+0x170/0x3f0 [ 27.086066] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.086216] kthread+0x318/0x620 [ 27.086335] ret_from_fork+0x10/0x20 [ 27.086454] [ 27.102439] Allocated by task 250: [ 27.102824] kasan_save_stack+0x3c/0x68 [ 27.104555] kasan_save_track+0x20/0x40 [ 27.107135] kasan_save_alloc_info+0x40/0x58 [ 27.109009] __kasan_kmalloc+0xd4/0xd8 [ 27.110167] __kmalloc_cache_noprof+0x16c/0x3c0 [ 27.111733] kasan_bitops_generic+0xa0/0x1c8 [ 27.113006] kunit_try_run_case+0x170/0x3f0 [ 27.113443] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.114795] kthread+0x318/0x620 [ 27.116029] ret_from_fork+0x10/0x20 [ 27.117174] [ 27.118173] The buggy address belongs to the object at fff00000c596b740 [ 27.118173] which belongs to the cache kmalloc-16 of size 16 [ 27.121459] The buggy address is located 8 bytes inside of [ 27.121459] allocated 9-byte region [fff00000c596b740, fff00000c596b749) [ 27.124385] [ 27.125138] The buggy address belongs to the physical page: [ 27.126430] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10596b [ 27.127068] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.127617] page_type: f5(slab) [ 27.129451] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 27.131756] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 27.133488] page dumped because: kasan: bad access detected [ 27.135260] [ 27.136324] Memory state around the buggy address: [ 27.137917] fff00000c596b600: fa fb fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 27.139840] fff00000c596b680: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 27.141539] >fff00000c596b700: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 27.142116] ^ [ 27.142597] fff00000c596b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.145216] fff00000c596b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.147078] ==================================================================
[ 20.730660] ================================================================== [ 20.731709] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90 [ 20.732495] Write of size 8 at addr ffff8881024b01a8 by task kunit_try_catch/269 [ 20.733020] [ 20.733172] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 20.733227] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.733243] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.733268] Call Trace: [ 20.733293] <TASK> [ 20.733326] dump_stack_lvl+0x73/0xb0 [ 20.733367] print_report+0xd1/0x650 [ 20.733397] ? __virt_addr_valid+0x1db/0x2d0 [ 20.733427] ? kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90 [ 20.733461] ? kasan_complete_mode_report_info+0x2a/0x200 [ 20.733495] ? kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90 [ 20.733528] kasan_report+0x140/0x180 [ 20.733556] ? kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90 [ 20.733595] kasan_check_range+0x10c/0x1c0 [ 20.733625] __kasan_check_write+0x18/0x20 [ 20.733653] kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90 [ 20.733686] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 20.733720] ? __kmalloc_cache_noprof+0x18a/0x420 [ 20.733749] ? trace_hardirqs_on+0x37/0xe0 [ 20.733777] ? kasan_bitops_generic+0x93/0x1c0 [ 20.733810] kasan_bitops_generic+0x122/0x1c0 [ 20.733839] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 20.733899] ? __pfx_read_tsc+0x10/0x10 [ 20.733948] ? ktime_get_ts64+0x86/0x230 [ 20.734011] kunit_try_run_case+0x1a6/0x480 [ 20.734070] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.734126] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 20.734186] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.734248] ? __kthread_parkme+0x82/0x160 [ 20.734305] ? preempt_count_sub+0x50/0x80 [ 20.734368] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.734423] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.734484] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.734548] kthread+0x324/0x6e0 [ 20.734605] ? trace_preempt_on+0x20/0xc0 [ 20.734664] ? __pfx_kthread+0x10/0x10 [ 20.734724] ? _raw_spin_unlock_irq+0x47/0x80 [ 20.734783] ? calculate_sigpending+0x7b/0xa0 [ 20.734839] ? __pfx_kthread+0x10/0x10 [ 20.734913] ret_from_fork+0x41/0x80 [ 20.734959] ? __pfx_kthread+0x10/0x10 [ 20.735000] ret_from_fork_asm+0x1a/0x30 [ 20.735044] </TASK> [ 20.735057] [ 20.752002] Allocated by task 269: [ 20.752224] kasan_save_stack+0x45/0x70 [ 20.752835] kasan_save_track+0x18/0x40 [ 20.753177] kasan_save_alloc_info+0x3b/0x50 [ 20.753566] __kasan_kmalloc+0xb7/0xc0 [ 20.754254] __kmalloc_cache_noprof+0x18a/0x420 [ 20.754562] kasan_bitops_generic+0x93/0x1c0 [ 20.755173] kunit_try_run_case+0x1a6/0x480 [ 20.755719] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.756083] kthread+0x324/0x6e0 [ 20.756323] ret_from_fork+0x41/0x80 [ 20.756566] ret_from_fork_asm+0x1a/0x30 [ 20.756824] [ 20.756964] The buggy address belongs to the object at ffff8881024b01a0 [ 20.756964] which belongs to the cache kmalloc-16 of size 16 [ 20.757761] The buggy address is located 8 bytes inside of [ 20.757761] allocated 9-byte region [ffff8881024b01a0, ffff8881024b01a9) [ 20.759288] [ 20.759533] The buggy address belongs to the physical page: [ 20.760030] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024b0 [ 20.760667] flags: 0x200000000000000(node=0|zone=2) [ 20.761514] page_type: f5(slab) [ 20.761885] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 20.762495] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 20.763133] page dumped because: kasan: bad access detected [ 20.763638] [ 20.763784] Memory state around the buggy address: [ 20.764230] ffff8881024b0080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 20.764845] ffff8881024b0100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 20.765419] >ffff8881024b0180: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 20.766445] ^ [ 20.766979] ffff8881024b0200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.767334] ffff8881024b0280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.768020] ================================================================== [ 20.656902] ================================================================== [ 20.657752] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x102/0xd90 [ 20.658453] Write of size 8 at addr ffff8881024b01a8 by task kunit_try_catch/269 [ 20.658889] [ 20.659115] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 20.659219] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.659253] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.659332] Call Trace: [ 20.659379] <TASK> [ 20.659416] dump_stack_lvl+0x73/0xb0 [ 20.659487] print_report+0xd1/0x650 [ 20.659545] ? __virt_addr_valid+0x1db/0x2d0 [ 20.659605] ? kasan_bitops_test_and_modify.constprop.0+0x102/0xd90 [ 20.659673] ? kasan_complete_mode_report_info+0x2a/0x200 [ 20.659751] ? kasan_bitops_test_and_modify.constprop.0+0x102/0xd90 [ 20.659822] kasan_report+0x140/0x180 [ 20.659894] ? kasan_bitops_test_and_modify.constprop.0+0x102/0xd90 [ 20.659973] kasan_check_range+0x10c/0x1c0 [ 20.660024] __kasan_check_write+0x18/0x20 [ 20.660071] kasan_bitops_test_and_modify.constprop.0+0x102/0xd90 [ 20.660136] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 20.660199] ? __kmalloc_cache_noprof+0x18a/0x420 [ 20.660252] ? trace_hardirqs_on+0x37/0xe0 [ 20.660343] ? kasan_bitops_generic+0x93/0x1c0 [ 20.660412] kasan_bitops_generic+0x122/0x1c0 [ 20.660474] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 20.660540] ? __pfx_read_tsc+0x10/0x10 [ 20.660595] ? ktime_get_ts64+0x86/0x230 [ 20.660652] kunit_try_run_case+0x1a6/0x480 [ 20.660715] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.660771] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 20.660833] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.660909] ? __kthread_parkme+0x82/0x160 [ 20.660964] ? preempt_count_sub+0x50/0x80 [ 20.661022] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.661081] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.661152] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.661221] kthread+0x324/0x6e0 [ 20.661275] ? trace_preempt_on+0x20/0xc0 [ 20.661376] ? __pfx_kthread+0x10/0x10 [ 20.661434] ? _raw_spin_unlock_irq+0x47/0x80 [ 20.661495] ? calculate_sigpending+0x7b/0xa0 [ 20.661551] ? __pfx_kthread+0x10/0x10 [ 20.661614] ret_from_fork+0x41/0x80 [ 20.661666] ? __pfx_kthread+0x10/0x10 [ 20.661722] ret_from_fork_asm+0x1a/0x30 [ 20.661793] </TASK> [ 20.661811] [ 20.677994] Allocated by task 269: [ 20.678439] kasan_save_stack+0x45/0x70 [ 20.678790] kasan_save_track+0x18/0x40 [ 20.679145] kasan_save_alloc_info+0x3b/0x50 [ 20.679541] __kasan_kmalloc+0xb7/0xc0 [ 20.679793] __kmalloc_cache_noprof+0x18a/0x420 [ 20.680330] kasan_bitops_generic+0x93/0x1c0 [ 20.680768] kunit_try_run_case+0x1a6/0x480 [ 20.681218] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.681685] kthread+0x324/0x6e0 [ 20.682110] ret_from_fork+0x41/0x80 [ 20.682543] ret_from_fork_asm+0x1a/0x30 [ 20.682803] [ 20.682961] The buggy address belongs to the object at ffff8881024b01a0 [ 20.682961] which belongs to the cache kmalloc-16 of size 16 [ 20.684007] The buggy address is located 8 bytes inside of [ 20.684007] allocated 9-byte region [ffff8881024b01a0, ffff8881024b01a9) [ 20.684784] [ 20.685009] The buggy address belongs to the physical page: [ 20.685586] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024b0 [ 20.686238] flags: 0x200000000000000(node=0|zone=2) [ 20.686635] page_type: f5(slab) [ 20.687024] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 20.687759] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 20.688151] page dumped because: kasan: bad access detected [ 20.688719] [ 20.688970] Memory state around the buggy address: [ 20.689431] ffff8881024b0080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 20.689955] ffff8881024b0100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 20.690620] >ffff8881024b0180: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 20.691171] ^ [ 20.691662] ffff8881024b0200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.692198] ffff8881024b0280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.692721] ================================================================== [ 20.808025] ================================================================== [ 20.808645] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90 [ 20.809289] Write of size 8 at addr ffff8881024b01a8 by task kunit_try_catch/269 [ 20.809731] [ 20.809980] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 20.810082] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.810112] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.810165] Call Trace: [ 20.810207] <TASK> [ 20.810250] dump_stack_lvl+0x73/0xb0 [ 20.810318] print_report+0xd1/0x650 [ 20.810375] ? __virt_addr_valid+0x1db/0x2d0 [ 20.810428] ? kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90 [ 20.810493] ? kasan_complete_mode_report_info+0x2a/0x200 [ 20.810557] ? kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90 [ 20.810620] kasan_report+0x140/0x180 [ 20.810678] ? kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90 [ 20.810756] kasan_check_range+0x10c/0x1c0 [ 20.810821] __kasan_check_write+0x18/0x20 [ 20.810898] kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90 [ 20.810969] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 20.811041] ? __kmalloc_cache_noprof+0x18a/0x420 [ 20.811100] ? trace_hardirqs_on+0x37/0xe0 [ 20.811153] ? kasan_bitops_generic+0x93/0x1c0 [ 20.811225] kasan_bitops_generic+0x122/0x1c0 [ 20.811285] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 20.811343] ? __pfx_read_tsc+0x10/0x10 [ 20.811398] ? ktime_get_ts64+0x86/0x230 [ 20.811458] kunit_try_run_case+0x1a6/0x480 [ 20.811516] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.811564] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 20.811621] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.811692] ? __kthread_parkme+0x82/0x160 [ 20.811754] ? preempt_count_sub+0x50/0x80 [ 20.811812] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.811845] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.811901] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.811934] kthread+0x324/0x6e0 [ 20.811961] ? trace_preempt_on+0x20/0xc0 [ 20.812003] ? __pfx_kthread+0x10/0x10 [ 20.812031] ? _raw_spin_unlock_irq+0x47/0x80 [ 20.812064] ? calculate_sigpending+0x7b/0xa0 [ 20.812098] ? __pfx_kthread+0x10/0x10 [ 20.812126] ret_from_fork+0x41/0x80 [ 20.812159] ? __pfx_kthread+0x10/0x10 [ 20.812189] ret_from_fork_asm+0x1a/0x30 [ 20.812237] </TASK> [ 20.812254] [ 20.824997] Allocated by task 269: [ 20.825361] kasan_save_stack+0x45/0x70 [ 20.825623] kasan_save_track+0x18/0x40 [ 20.825883] kasan_save_alloc_info+0x3b/0x50 [ 20.826147] __kasan_kmalloc+0xb7/0xc0 [ 20.826533] __kmalloc_cache_noprof+0x18a/0x420 [ 20.827147] kasan_bitops_generic+0x93/0x1c0 [ 20.827784] kunit_try_run_case+0x1a6/0x480 [ 20.828234] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.828717] kthread+0x324/0x6e0 [ 20.829073] ret_from_fork+0x41/0x80 [ 20.829304] ret_from_fork_asm+0x1a/0x30 [ 20.829694] [ 20.829916] The buggy address belongs to the object at ffff8881024b01a0 [ 20.829916] which belongs to the cache kmalloc-16 of size 16 [ 20.831247] The buggy address is located 8 bytes inside of [ 20.831247] allocated 9-byte region [ffff8881024b01a0, ffff8881024b01a9) [ 20.831970] [ 20.832211] The buggy address belongs to the physical page: [ 20.832682] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024b0 [ 20.833095] flags: 0x200000000000000(node=0|zone=2) [ 20.833416] page_type: f5(slab) [ 20.833765] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 20.834448] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 20.835098] page dumped because: kasan: bad access detected [ 20.835383] [ 20.835526] Memory state around the buggy address: [ 20.835786] ffff8881024b0080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 20.836378] ffff8881024b0100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 20.836910] >ffff8881024b0180: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 20.837467] ^ [ 20.837727] ffff8881024b0200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.838215] ffff8881024b0280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.839027] ================================================================== [ 20.874328] ================================================================== [ 20.875131] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90 [ 20.876271] Write of size 8 at addr ffff8881024b01a8 by task kunit_try_catch/269 [ 20.877751] [ 20.877980] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 20.878088] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.878120] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.878173] Call Trace: [ 20.878215] <TASK> [ 20.878254] dump_stack_lvl+0x73/0xb0 [ 20.878325] print_report+0xd1/0x650 [ 20.878382] ? __virt_addr_valid+0x1db/0x2d0 [ 20.878443] ? kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90 [ 20.878511] ? kasan_complete_mode_report_info+0x2a/0x200 [ 20.878580] ? kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90 [ 20.878651] kasan_report+0x140/0x180 [ 20.878711] ? kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90 [ 20.878794] kasan_check_range+0x10c/0x1c0 [ 20.878876] __kasan_check_write+0x18/0x20 [ 20.878936] kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90 [ 20.879000] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 20.879072] ? __kmalloc_cache_noprof+0x18a/0x420 [ 20.879134] ? trace_hardirqs_on+0x37/0xe0 [ 20.879188] ? kasan_bitops_generic+0x93/0x1c0 [ 20.879257] kasan_bitops_generic+0x122/0x1c0 [ 20.879315] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 20.879381] ? __pfx_read_tsc+0x10/0x10 [ 20.879436] ? ktime_get_ts64+0x86/0x230 [ 20.879503] kunit_try_run_case+0x1a6/0x480 [ 20.879569] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.879626] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 20.879704] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.879769] ? __kthread_parkme+0x82/0x160 [ 20.879831] ? preempt_count_sub+0x50/0x80 [ 20.879912] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.879973] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.880042] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.880110] kthread+0x324/0x6e0 [ 20.880167] ? trace_preempt_on+0x20/0xc0 [ 20.880226] ? __pfx_kthread+0x10/0x10 [ 20.880284] ? _raw_spin_unlock_irq+0x47/0x80 [ 20.880335] ? calculate_sigpending+0x7b/0xa0 [ 20.880383] ? __pfx_kthread+0x10/0x10 [ 20.880438] ret_from_fork+0x41/0x80 [ 20.880489] ? __pfx_kthread+0x10/0x10 [ 20.880544] ret_from_fork_asm+0x1a/0x30 [ 20.880626] </TASK> [ 20.880654] [ 20.894175] Allocated by task 269: [ 20.894488] kasan_save_stack+0x45/0x70 [ 20.894937] kasan_save_track+0x18/0x40 [ 20.896879] kasan_save_alloc_info+0x3b/0x50 [ 20.897372] __kasan_kmalloc+0xb7/0xc0 [ 20.897774] __kmalloc_cache_noprof+0x18a/0x420 [ 20.898100] kasan_bitops_generic+0x93/0x1c0 [ 20.898355] kunit_try_run_case+0x1a6/0x480 [ 20.898786] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.900894] kthread+0x324/0x6e0 [ 20.901275] ret_from_fork+0x41/0x80 [ 20.901645] ret_from_fork_asm+0x1a/0x30 [ 20.901946] [ 20.902092] The buggy address belongs to the object at ffff8881024b01a0 [ 20.902092] which belongs to the cache kmalloc-16 of size 16 [ 20.904158] The buggy address is located 8 bytes inside of [ 20.904158] allocated 9-byte region [ffff8881024b01a0, ffff8881024b01a9) [ 20.904693] [ 20.904777] The buggy address belongs to the physical page: [ 20.904996] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024b0 [ 20.906009] flags: 0x200000000000000(node=0|zone=2) [ 20.906553] page_type: f5(slab) [ 20.906999] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 20.907786] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 20.908715] page dumped because: kasan: bad access detected [ 20.909002] [ 20.909166] Memory state around the buggy address: [ 20.909592] ffff8881024b0080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 20.910397] ffff8881024b0100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 20.911066] >ffff8881024b0180: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 20.911594] ^ [ 20.911951] ffff8881024b0200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.912455] ffff8881024b0280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.912880] ================================================================== [ 20.914148] ================================================================== [ 20.914821] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x558/0xd90 [ 20.915599] Read of size 8 at addr ffff8881024b01a8 by task kunit_try_catch/269 [ 20.916238] [ 20.916543] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 20.916648] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.916680] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.916756] Call Trace: [ 20.916799] <TASK> [ 20.916871] dump_stack_lvl+0x73/0xb0 [ 20.916945] print_report+0xd1/0x650 [ 20.917001] ? __virt_addr_valid+0x1db/0x2d0 [ 20.917060] ? kasan_bitops_test_and_modify.constprop.0+0x558/0xd90 [ 20.917159] ? kasan_complete_mode_report_info+0x2a/0x200 [ 20.917227] ? kasan_bitops_test_and_modify.constprop.0+0x558/0xd90 [ 20.917304] kasan_report+0x140/0x180 [ 20.917364] ? kasan_bitops_test_and_modify.constprop.0+0x558/0xd90 [ 20.917498] kasan_check_range+0x10c/0x1c0 [ 20.917584] __kasan_check_read+0x15/0x20 [ 20.917645] kasan_bitops_test_and_modify.constprop.0+0x558/0xd90 [ 20.917708] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 20.917777] ? __kmalloc_cache_noprof+0x18a/0x420 [ 20.917841] ? trace_hardirqs_on+0x37/0xe0 [ 20.917920] ? kasan_bitops_generic+0x93/0x1c0 [ 20.917964] kasan_bitops_generic+0x122/0x1c0 [ 20.917997] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 20.918029] ? __pfx_read_tsc+0x10/0x10 [ 20.918058] ? ktime_get_ts64+0x86/0x230 [ 20.918092] kunit_try_run_case+0x1a6/0x480 [ 20.918121] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.918149] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 20.918180] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.918212] ? __kthread_parkme+0x82/0x160 [ 20.918241] ? preempt_count_sub+0x50/0x80 [ 20.918272] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.918322] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.918359] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.918393] kthread+0x324/0x6e0 [ 20.918419] ? trace_preempt_on+0x20/0xc0 [ 20.918447] ? __pfx_kthread+0x10/0x10 [ 20.918475] ? _raw_spin_unlock_irq+0x47/0x80 [ 20.918503] ? calculate_sigpending+0x7b/0xa0 [ 20.918530] ? __pfx_kthread+0x10/0x10 [ 20.918559] ret_from_fork+0x41/0x80 [ 20.918582] ? __pfx_kthread+0x10/0x10 [ 20.918610] ret_from_fork_asm+0x1a/0x30 [ 20.918650] </TASK> [ 20.918663] [ 20.932390] Allocated by task 269: [ 20.932729] kasan_save_stack+0x45/0x70 [ 20.933018] kasan_save_track+0x18/0x40 [ 20.933480] kasan_save_alloc_info+0x3b/0x50 [ 20.933950] __kasan_kmalloc+0xb7/0xc0 [ 20.934424] __kmalloc_cache_noprof+0x18a/0x420 [ 20.934882] kasan_bitops_generic+0x93/0x1c0 [ 20.935220] kunit_try_run_case+0x1a6/0x480 [ 20.935516] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.936111] kthread+0x324/0x6e0 [ 20.936687] ret_from_fork+0x41/0x80 [ 20.937238] ret_from_fork_asm+0x1a/0x30 [ 20.937896] [ 20.938117] The buggy address belongs to the object at ffff8881024b01a0 [ 20.938117] which belongs to the cache kmalloc-16 of size 16 [ 20.938669] The buggy address is located 8 bytes inside of [ 20.938669] allocated 9-byte region [ffff8881024b01a0, ffff8881024b01a9) [ 20.939705] [ 20.939944] The buggy address belongs to the physical page: [ 20.940353] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024b0 [ 20.941033] flags: 0x200000000000000(node=0|zone=2) [ 20.941610] page_type: f5(slab) [ 20.941970] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 20.942585] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 20.942999] page dumped because: kasan: bad access detected [ 20.943643] [ 20.943869] Memory state around the buggy address: [ 20.944429] ffff8881024b0080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 20.945187] ffff8881024b0100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 20.945696] >ffff8881024b0180: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 20.946041] ^ [ 20.946328] ffff8881024b0200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.946897] ffff8881024b0280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.947809] ================================================================== [ 20.840226] ================================================================== [ 20.840770] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90 [ 20.841846] Write of size 8 at addr ffff8881024b01a8 by task kunit_try_catch/269 [ 20.842300] [ 20.842476] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 20.842579] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.842613] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.842664] Call Trace: [ 20.842709] <TASK> [ 20.842749] dump_stack_lvl+0x73/0xb0 [ 20.842818] print_report+0xd1/0x650 [ 20.842891] ? __virt_addr_valid+0x1db/0x2d0 [ 20.842948] ? kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90 [ 20.843016] ? kasan_complete_mode_report_info+0x2a/0x200 [ 20.843082] ? kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90 [ 20.843153] kasan_report+0x140/0x180 [ 20.843212] ? kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90 [ 20.843289] kasan_check_range+0x10c/0x1c0 [ 20.843347] __kasan_check_write+0x18/0x20 [ 20.843407] kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90 [ 20.843474] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 20.843548] ? __kmalloc_cache_noprof+0x18a/0x420 [ 20.843610] ? trace_hardirqs_on+0x37/0xe0 [ 20.843670] ? kasan_bitops_generic+0x93/0x1c0 [ 20.843751] kasan_bitops_generic+0x122/0x1c0 [ 20.843814] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 20.843894] ? __pfx_read_tsc+0x10/0x10 [ 20.843952] ? ktime_get_ts64+0x86/0x230 [ 20.844019] kunit_try_run_case+0x1a6/0x480 [ 20.844081] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.844137] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 20.844210] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.844259] ? __kthread_parkme+0x82/0x160 [ 20.844309] ? preempt_count_sub+0x50/0x80 [ 20.844366] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.844425] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.844488] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.844548] kthread+0x324/0x6e0 [ 20.844604] ? trace_preempt_on+0x20/0xc0 [ 20.844661] ? __pfx_kthread+0x10/0x10 [ 20.844717] ? _raw_spin_unlock_irq+0x47/0x80 [ 20.844778] ? calculate_sigpending+0x7b/0xa0 [ 20.844834] ? __pfx_kthread+0x10/0x10 [ 20.844911] ret_from_fork+0x41/0x80 [ 20.844960] ? __pfx_kthread+0x10/0x10 [ 20.845019] ret_from_fork_asm+0x1a/0x30 [ 20.845101] </TASK> [ 20.845131] [ 20.859063] Allocated by task 269: [ 20.859373] kasan_save_stack+0x45/0x70 [ 20.859691] kasan_save_track+0x18/0x40 [ 20.860030] kasan_save_alloc_info+0x3b/0x50 [ 20.860414] __kasan_kmalloc+0xb7/0xc0 [ 20.860807] __kmalloc_cache_noprof+0x18a/0x420 [ 20.861120] kasan_bitops_generic+0x93/0x1c0 [ 20.861666] kunit_try_run_case+0x1a6/0x480 [ 20.862028] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.862443] kthread+0x324/0x6e0 [ 20.862798] ret_from_fork+0x41/0x80 [ 20.863131] ret_from_fork_asm+0x1a/0x30 [ 20.863632] [ 20.863868] The buggy address belongs to the object at ffff8881024b01a0 [ 20.863868] which belongs to the cache kmalloc-16 of size 16 [ 20.864639] The buggy address is located 8 bytes inside of [ 20.864639] allocated 9-byte region [ffff8881024b01a0, ffff8881024b01a9) [ 20.865558] [ 20.865708] The buggy address belongs to the physical page: [ 20.866236] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024b0 [ 20.866778] flags: 0x200000000000000(node=0|zone=2) [ 20.867074] page_type: f5(slab) [ 20.867331] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 20.867693] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 20.868261] page dumped because: kasan: bad access detected [ 20.868817] [ 20.869045] Memory state around the buggy address: [ 20.869471] ffff8881024b0080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 20.870505] ffff8881024b0100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 20.871137] >ffff8881024b0180: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 20.871905] ^ [ 20.872177] ffff8881024b0200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.872991] ffff8881024b0280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.873320] ================================================================== [ 20.949460] ================================================================== [ 20.950159] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90 [ 20.951053] Read of size 8 at addr ffff8881024b01a8 by task kunit_try_catch/269 [ 20.951667] [ 20.951891] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 20.952001] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.952034] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.952082] Call Trace: [ 20.952125] <TASK> [ 20.952167] dump_stack_lvl+0x73/0xb0 [ 20.952237] print_report+0xd1/0x650 [ 20.952333] ? __virt_addr_valid+0x1db/0x2d0 [ 20.952398] ? kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90 [ 20.952465] ? kasan_complete_mode_report_info+0x2a/0x200 [ 20.952541] ? kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90 [ 20.952627] kasan_report+0x140/0x180 [ 20.952692] ? kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90 [ 20.952774] __asan_report_load8_noabort+0x18/0x20 [ 20.952838] kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90 [ 20.952919] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 20.952969] ? __kmalloc_cache_noprof+0x18a/0x420 [ 20.953002] ? trace_hardirqs_on+0x37/0xe0 [ 20.953034] ? kasan_bitops_generic+0x93/0x1c0 [ 20.953068] kasan_bitops_generic+0x122/0x1c0 [ 20.953098] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 20.953130] ? __pfx_read_tsc+0x10/0x10 [ 20.953159] ? ktime_get_ts64+0x86/0x230 [ 20.953190] kunit_try_run_case+0x1a6/0x480 [ 20.953220] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.953248] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 20.953278] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.953334] ? __kthread_parkme+0x82/0x160 [ 20.953365] ? preempt_count_sub+0x50/0x80 [ 20.953398] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.953426] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.953459] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.953492] kthread+0x324/0x6e0 [ 20.953519] ? trace_preempt_on+0x20/0xc0 [ 20.953546] ? __pfx_kthread+0x10/0x10 [ 20.953575] ? _raw_spin_unlock_irq+0x47/0x80 [ 20.953602] ? calculate_sigpending+0x7b/0xa0 [ 20.953631] ? __pfx_kthread+0x10/0x10 [ 20.953660] ret_from_fork+0x41/0x80 [ 20.953684] ? __pfx_kthread+0x10/0x10 [ 20.953712] ret_from_fork_asm+0x1a/0x30 [ 20.953752] </TASK> [ 20.953765] [ 20.970609] Allocated by task 269: [ 20.970969] kasan_save_stack+0x45/0x70 [ 20.971515] kasan_save_track+0x18/0x40 [ 20.971976] kasan_save_alloc_info+0x3b/0x50 [ 20.972499] __kasan_kmalloc+0xb7/0xc0 [ 20.972932] __kmalloc_cache_noprof+0x18a/0x420 [ 20.973377] kasan_bitops_generic+0x93/0x1c0 [ 20.973694] kunit_try_run_case+0x1a6/0x480 [ 20.974043] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.974388] kthread+0x324/0x6e0 [ 20.974707] ret_from_fork+0x41/0x80 [ 20.975052] ret_from_fork_asm+0x1a/0x30 [ 20.975343] [ 20.975487] The buggy address belongs to the object at ffff8881024b01a0 [ 20.975487] which belongs to the cache kmalloc-16 of size 16 [ 20.976596] The buggy address is located 8 bytes inside of [ 20.976596] allocated 9-byte region [ffff8881024b01a0, ffff8881024b01a9) [ 20.977437] [ 20.977710] The buggy address belongs to the physical page: [ 20.978093] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024b0 [ 20.978510] flags: 0x200000000000000(node=0|zone=2) [ 20.979040] page_type: f5(slab) [ 20.979506] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 20.980233] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 20.980913] page dumped because: kasan: bad access detected [ 20.981474] [ 20.981703] Memory state around the buggy address: [ 20.982152] ffff8881024b0080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 20.982798] ffff8881024b0100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 20.983354] >ffff8881024b0180: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 20.983795] ^ [ 20.984289] ffff8881024b0200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.984841] ffff8881024b0280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.985225] ================================================================== [ 20.770514] ================================================================== [ 20.770993] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90 [ 20.771780] Write of size 8 at addr ffff8881024b01a8 by task kunit_try_catch/269 [ 20.772412] [ 20.773021] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 20.773243] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.773266] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.773306] Call Trace: [ 20.773346] <TASK> [ 20.773376] dump_stack_lvl+0x73/0xb0 [ 20.773417] print_report+0xd1/0x650 [ 20.773446] ? __virt_addr_valid+0x1db/0x2d0 [ 20.773476] ? kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90 [ 20.773510] ? kasan_complete_mode_report_info+0x2a/0x200 [ 20.773543] ? kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90 [ 20.773577] kasan_report+0x140/0x180 [ 20.773605] ? kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90 [ 20.773644] kasan_check_range+0x10c/0x1c0 [ 20.773673] __kasan_check_write+0x18/0x20 [ 20.773702] kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90 [ 20.773736] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 20.773770] ? __kmalloc_cache_noprof+0x18a/0x420 [ 20.773801] ? trace_hardirqs_on+0x37/0xe0 [ 20.773829] ? kasan_bitops_generic+0x93/0x1c0 [ 20.773882] kasan_bitops_generic+0x122/0x1c0 [ 20.773913] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 20.773943] ? __pfx_read_tsc+0x10/0x10 [ 20.773970] ? ktime_get_ts64+0x86/0x230 [ 20.774003] kunit_try_run_case+0x1a6/0x480 [ 20.774032] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.774059] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 20.774089] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.774118] ? __kthread_parkme+0x82/0x160 [ 20.774147] ? preempt_count_sub+0x50/0x80 [ 20.774178] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.774206] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.774239] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.774270] kthread+0x324/0x6e0 [ 20.774301] ? trace_preempt_on+0x20/0xc0 [ 20.774340] ? __pfx_kthread+0x10/0x10 [ 20.774368] ? _raw_spin_unlock_irq+0x47/0x80 [ 20.774396] ? calculate_sigpending+0x7b/0xa0 [ 20.774423] ? __pfx_kthread+0x10/0x10 [ 20.774452] ret_from_fork+0x41/0x80 [ 20.774475] ? __pfx_kthread+0x10/0x10 [ 20.774502] ret_from_fork_asm+0x1a/0x30 [ 20.774542] </TASK> [ 20.774555] [ 20.791911] Allocated by task 269: [ 20.792185] kasan_save_stack+0x45/0x70 [ 20.792628] kasan_save_track+0x18/0x40 [ 20.793035] kasan_save_alloc_info+0x3b/0x50 [ 20.793839] __kasan_kmalloc+0xb7/0xc0 [ 20.794153] __kmalloc_cache_noprof+0x18a/0x420 [ 20.794761] kasan_bitops_generic+0x93/0x1c0 [ 20.795264] kunit_try_run_case+0x1a6/0x480 [ 20.795841] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.796223] kthread+0x324/0x6e0 [ 20.796837] ret_from_fork+0x41/0x80 [ 20.797145] ret_from_fork_asm+0x1a/0x30 [ 20.797450] [ 20.797971] The buggy address belongs to the object at ffff8881024b01a0 [ 20.797971] which belongs to the cache kmalloc-16 of size 16 [ 20.798690] The buggy address is located 8 bytes inside of [ 20.798690] allocated 9-byte region [ffff8881024b01a0, ffff8881024b01a9) [ 20.799912] [ 20.800447] The buggy address belongs to the physical page: [ 20.800976] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024b0 [ 20.801197] flags: 0x200000000000000(node=0|zone=2) [ 20.801409] page_type: f5(slab) [ 20.801728] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 20.802273] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 20.802718] page dumped because: kasan: bad access detected [ 20.803273] [ 20.803493] Memory state around the buggy address: [ 20.803914] ffff8881024b0080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 20.804411] ffff8881024b0100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 20.804783] >ffff8881024b0180: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 20.805434] ^ [ 20.805753] ffff8881024b0200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.806207] ffff8881024b0280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.806850] ================================================================== [ 20.694012] ================================================================== [ 20.694657] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90 [ 20.695267] Write of size 8 at addr ffff8881024b01a8 by task kunit_try_catch/269 [ 20.695823] [ 20.696071] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 20.696175] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.696210] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.696255] Call Trace: [ 20.696335] <TASK> [ 20.696399] dump_stack_lvl+0x73/0xb0 [ 20.696492] print_report+0xd1/0x650 [ 20.696545] ? __virt_addr_valid+0x1db/0x2d0 [ 20.696594] ? kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90 [ 20.696645] ? kasan_complete_mode_report_info+0x2a/0x200 [ 20.696693] ? kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90 [ 20.696743] kasan_report+0x140/0x180 [ 20.696785] ? kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90 [ 20.696848] kasan_check_range+0x10c/0x1c0 [ 20.696925] __kasan_check_write+0x18/0x20 [ 20.696984] kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90 [ 20.697055] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 20.697189] ? __kmalloc_cache_noprof+0x18a/0x420 [ 20.697240] ? trace_hardirqs_on+0x37/0xe0 [ 20.697334] ? kasan_bitops_generic+0x93/0x1c0 [ 20.697436] kasan_bitops_generic+0x122/0x1c0 [ 20.697500] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 20.697559] ? __pfx_read_tsc+0x10/0x10 [ 20.697615] ? ktime_get_ts64+0x86/0x230 [ 20.697673] kunit_try_run_case+0x1a6/0x480 [ 20.697760] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.697816] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 20.697917] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.697981] ? __kthread_parkme+0x82/0x160 [ 20.698041] ? preempt_count_sub+0x50/0x80 [ 20.698104] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.698168] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.698232] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.698350] kthread+0x324/0x6e0 [ 20.698413] ? trace_preempt_on+0x20/0xc0 [ 20.698469] ? __pfx_kthread+0x10/0x10 [ 20.698549] ? _raw_spin_unlock_irq+0x47/0x80 [ 20.698607] ? calculate_sigpending+0x7b/0xa0 [ 20.698665] ? __pfx_kthread+0x10/0x10 [ 20.698724] ret_from_fork+0x41/0x80 [ 20.698795] ? __pfx_kthread+0x10/0x10 [ 20.698849] ret_from_fork_asm+0x1a/0x30 [ 20.698946] </TASK> [ 20.698976] [ 20.712529] Allocated by task 269: [ 20.712975] kasan_save_stack+0x45/0x70 [ 20.713446] kasan_save_track+0x18/0x40 [ 20.713874] kasan_save_alloc_info+0x3b/0x50 [ 20.714326] __kasan_kmalloc+0xb7/0xc0 [ 20.714793] __kmalloc_cache_noprof+0x18a/0x420 [ 20.715456] kasan_bitops_generic+0x93/0x1c0 [ 20.716087] kunit_try_run_case+0x1a6/0x480 [ 20.716450] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.716746] kthread+0x324/0x6e0 [ 20.717462] ret_from_fork+0x41/0x80 [ 20.717929] ret_from_fork_asm+0x1a/0x30 [ 20.718187] [ 20.718361] The buggy address belongs to the object at ffff8881024b01a0 [ 20.718361] which belongs to the cache kmalloc-16 of size 16 [ 20.719456] The buggy address is located 8 bytes inside of [ 20.719456] allocated 9-byte region [ffff8881024b01a0, ffff8881024b01a9) [ 20.720598] [ 20.720904] The buggy address belongs to the physical page: [ 20.721430] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024b0 [ 20.722172] flags: 0x200000000000000(node=0|zone=2) [ 20.722723] page_type: f5(slab) [ 20.722971] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 20.723829] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 20.724570] page dumped because: kasan: bad access detected [ 20.724881] [ 20.725073] Memory state around the buggy address: [ 20.725703] ffff8881024b0080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 20.726240] ffff8881024b0100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 20.726894] >ffff8881024b0180: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 20.727413] ^ [ 20.728004] ffff8881024b0200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.728546] ffff8881024b0280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.729192] ==================================================================