Date
May 12, 2025, 6:12 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 21.010715] ================================================================== [ 21.011253] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc8 [ 21.011719] Write of size 8 at addr fff00000c1e7a0e8 by task kunit_try_catch/250 [ 21.012052] [ 21.012227] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 21.012320] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.012352] Hardware name: linux,dummy-virt (DT) [ 21.012390] Call trace: [ 21.012418] show_stack+0x20/0x38 (C) [ 21.012474] dump_stack_lvl+0x8c/0xd0 [ 21.012528] print_report+0x118/0x608 [ 21.012580] kasan_report+0xdc/0x128 [ 21.012629] kasan_check_range+0x100/0x1a8 [ 21.012683] __kasan_check_write+0x20/0x30 [ 21.013050] kasan_bitops_modify.constprop.0+0x344/0xbc8 [ 21.013120] kasan_bitops_generic+0x110/0x1c8 [ 21.013175] kunit_try_run_case+0x170/0x3f0 [ 21.013230] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.013285] kthread+0x318/0x620 [ 21.013333] ret_from_fork+0x10/0x20 [ 21.013387] [ 21.017535] Allocated by task 250: [ 21.017973] kasan_save_stack+0x3c/0x68 [ 21.018375] kasan_save_track+0x20/0x40 [ 21.018885] kasan_save_alloc_info+0x40/0x58 [ 21.019207] __kasan_kmalloc+0xd4/0xd8 [ 21.019919] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.020235] kasan_bitops_generic+0xa0/0x1c8 [ 21.020445] kunit_try_run_case+0x170/0x3f0 [ 21.020653] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.020881] kthread+0x318/0x620 [ 21.021066] ret_from_fork+0x10/0x20 [ 21.021241] [ 21.021365] The buggy address belongs to the object at fff00000c1e7a0e0 [ 21.021365] which belongs to the cache kmalloc-16 of size 16 [ 21.021817] The buggy address is located 8 bytes inside of [ 21.021817] allocated 9-byte region [fff00000c1e7a0e0, fff00000c1e7a0e9) [ 21.023151] [ 21.023326] The buggy address belongs to the physical page: [ 21.023624] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e7a [ 21.024125] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.024545] page_type: f5(slab) [ 21.024826] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 21.025127] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.025471] page dumped because: kasan: bad access detected [ 21.026018] [ 21.026271] Memory state around the buggy address: [ 21.027375] fff00000c1e79f80: 00 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.027808] fff00000c1e7a000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.028320] >fff00000c1e7a080: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 21.028707] ^ [ 21.029010] fff00000c1e7a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.029474] fff00000c1e7a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.029889] ================================================================== [ 20.883267] ================================================================== [ 20.883679] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa4c/0xbc8 [ 20.884216] Read of size 8 at addr fff00000c1e7a0e8 by task kunit_try_catch/250 [ 20.884565] [ 20.884692] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 20.884836] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.884875] Hardware name: linux,dummy-virt (DT) [ 20.885045] Call trace: [ 20.885219] show_stack+0x20/0x38 (C) [ 20.885283] dump_stack_lvl+0x8c/0xd0 [ 20.885340] print_report+0x118/0x608 [ 20.885398] kasan_report+0xdc/0x128 [ 20.885452] __asan_report_load8_noabort+0x20/0x30 [ 20.885506] kasan_bitops_modify.constprop.0+0xa4c/0xbc8 [ 20.885567] kasan_bitops_generic+0x110/0x1c8 [ 20.885622] kunit_try_run_case+0x170/0x3f0 [ 20.885676] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.885753] kthread+0x318/0x620 [ 20.885813] ret_from_fork+0x10/0x20 [ 20.885875] [ 20.889791] Allocated by task 250: [ 20.889978] kasan_save_stack+0x3c/0x68 [ 20.890222] kasan_save_track+0x20/0x40 [ 20.890397] kasan_save_alloc_info+0x40/0x58 [ 20.890594] __kasan_kmalloc+0xd4/0xd8 [ 20.891958] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.892269] kasan_bitops_generic+0xa0/0x1c8 [ 20.892810] kunit_try_run_case+0x170/0x3f0 [ 20.893196] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.894079] kthread+0x318/0x620 [ 20.894366] ret_from_fork+0x10/0x20 [ 20.894540] [ 20.894716] The buggy address belongs to the object at fff00000c1e7a0e0 [ 20.894716] which belongs to the cache kmalloc-16 of size 16 [ 20.895239] The buggy address is located 8 bytes inside of [ 20.895239] allocated 9-byte region [fff00000c1e7a0e0, fff00000c1e7a0e9) [ 20.895726] [ 20.896356] The buggy address belongs to the physical page: [ 20.896548] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e7a [ 20.897334] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.897821] page_type: f5(slab) [ 20.898106] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 20.898704] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 20.899339] page dumped because: kasan: bad access detected [ 20.899802] [ 20.899946] Memory state around the buggy address: [ 20.900416] fff00000c1e79f80: 00 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.900846] fff00000c1e7a000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 20.901199] >fff00000c1e7a080: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 20.901510] ^ [ 20.901808] fff00000c1e7a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.902146] fff00000c1e7a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.902488] ================================================================== [ 20.926036] ================================================================== [ 20.927063] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa88/0xbc8 [ 20.927577] Read of size 8 at addr fff00000c1e7a0e8 by task kunit_try_catch/250 [ 20.928034] [ 20.928219] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 20.928328] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.928364] Hardware name: linux,dummy-virt (DT) [ 20.928408] Call trace: [ 20.928438] show_stack+0x20/0x38 (C) [ 20.928502] dump_stack_lvl+0x8c/0xd0 [ 20.928566] print_report+0x118/0x608 [ 20.928625] kasan_report+0xdc/0x128 [ 20.928679] __asan_report_load8_noabort+0x20/0x30 [ 20.929649] kasan_bitops_modify.constprop.0+0xa88/0xbc8 [ 20.929764] kasan_bitops_generic+0x110/0x1c8 [ 20.929828] kunit_try_run_case+0x170/0x3f0 [ 20.929887] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.929948] kthread+0x318/0x620 [ 20.930003] ret_from_fork+0x10/0x20 [ 20.930071] [ 20.933270] Allocated by task 250: [ 20.933444] kasan_save_stack+0x3c/0x68 [ 20.933639] kasan_save_track+0x20/0x40 [ 20.934131] kasan_save_alloc_info+0x40/0x58 [ 20.935077] __kasan_kmalloc+0xd4/0xd8 [ 20.935667] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.936132] kasan_bitops_generic+0xa0/0x1c8 [ 20.936517] kunit_try_run_case+0x170/0x3f0 [ 20.936761] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.936959] kthread+0x318/0x620 [ 20.937302] ret_from_fork+0x10/0x20 [ 20.937542] [ 20.937735] The buggy address belongs to the object at fff00000c1e7a0e0 [ 20.937735] which belongs to the cache kmalloc-16 of size 16 [ 20.938297] The buggy address is located 8 bytes inside of [ 20.938297] allocated 9-byte region [fff00000c1e7a0e0, fff00000c1e7a0e9) [ 20.939094] [ 20.939237] The buggy address belongs to the physical page: [ 20.939442] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e7a [ 20.939720] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.939991] page_type: f5(slab) [ 20.940178] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 20.940454] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 20.940721] page dumped because: kasan: bad access detected [ 20.941661] [ 20.941791] Memory state around the buggy address: [ 20.941966] fff00000c1e79f80: 00 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.942865] fff00000c1e7a000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 20.943912] >fff00000c1e7a080: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 20.944339] ^ [ 20.944818] fff00000c1e7a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.945311] fff00000c1e7a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.945815] ================================================================== [ 20.969153] ================================================================== [ 20.969801] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc8 [ 20.970243] Write of size 8 at addr fff00000c1e7a0e8 by task kunit_try_catch/250 [ 20.970548] [ 20.971733] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 20.971872] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.971907] Hardware name: linux,dummy-virt (DT) [ 20.971945] Call trace: [ 20.971976] show_stack+0x20/0x38 (C) [ 20.972038] dump_stack_lvl+0x8c/0xd0 [ 20.972090] print_report+0x118/0x608 [ 20.972142] kasan_report+0xdc/0x128 [ 20.972191] kasan_check_range+0x100/0x1a8 [ 20.972242] __kasan_check_write+0x20/0x30 [ 20.972292] kasan_bitops_modify.constprop.0+0x320/0xbc8 [ 20.972347] kasan_bitops_generic+0x110/0x1c8 [ 20.972397] kunit_try_run_case+0x170/0x3f0 [ 20.972448] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.972505] kthread+0x318/0x620 [ 20.972555] ret_from_fork+0x10/0x20 [ 20.972612] [ 20.976422] Allocated by task 250: [ 20.976608] kasan_save_stack+0x3c/0x68 [ 20.976826] kasan_save_track+0x20/0x40 [ 20.977019] kasan_save_alloc_info+0x40/0x58 [ 20.977220] __kasan_kmalloc+0xd4/0xd8 [ 20.977406] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.977600] kasan_bitops_generic+0xa0/0x1c8 [ 20.978938] kunit_try_run_case+0x170/0x3f0 [ 20.979459] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.980024] kthread+0x318/0x620 [ 20.980255] ret_from_fork+0x10/0x20 [ 20.980568] [ 20.980713] The buggy address belongs to the object at fff00000c1e7a0e0 [ 20.980713] which belongs to the cache kmalloc-16 of size 16 [ 20.981265] The buggy address is located 8 bytes inside of [ 20.981265] allocated 9-byte region [fff00000c1e7a0e0, fff00000c1e7a0e9) [ 20.982346] [ 20.982884] The buggy address belongs to the physical page: [ 20.983191] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e7a [ 20.983724] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.984182] page_type: f5(slab) [ 20.984449] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 20.984952] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 20.985369] page dumped because: kasan: bad access detected [ 20.985702] [ 20.985820] Memory state around the buggy address: [ 20.986283] fff00000c1e79f80: 00 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.987449] fff00000c1e7a000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 20.987909] >fff00000c1e7a080: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 20.988323] ^ [ 20.988670] fff00000c1e7a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.989091] fff00000c1e7a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.989522] ================================================================== [ 21.030809] ================================================================== [ 21.031128] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc8 [ 21.032147] Write of size 8 at addr fff00000c1e7a0e8 by task kunit_try_catch/250 [ 21.032655] [ 21.032905] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 21.033031] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.033070] Hardware name: linux,dummy-virt (DT) [ 21.033126] Call trace: [ 21.033167] show_stack+0x20/0x38 (C) [ 21.033234] dump_stack_lvl+0x8c/0xd0 [ 21.033291] print_report+0x118/0x608 [ 21.033344] kasan_report+0xdc/0x128 [ 21.033400] kasan_check_range+0x100/0x1a8 [ 21.033456] __kasan_check_write+0x20/0x30 [ 21.033508] kasan_bitops_modify.constprop.0+0x3b0/0xbc8 [ 21.033571] kasan_bitops_generic+0x110/0x1c8 [ 21.033629] kunit_try_run_case+0x170/0x3f0 [ 21.033683] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.033762] kthread+0x318/0x620 [ 21.033820] ret_from_fork+0x10/0x20 [ 21.033879] [ 21.038158] Allocated by task 250: [ 21.038484] kasan_save_stack+0x3c/0x68 [ 21.038883] kasan_save_track+0x20/0x40 [ 21.039472] kasan_save_alloc_info+0x40/0x58 [ 21.039886] __kasan_kmalloc+0xd4/0xd8 [ 21.040162] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.040426] kasan_bitops_generic+0xa0/0x1c8 [ 21.040731] kunit_try_run_case+0x170/0x3f0 [ 21.041113] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.041427] kthread+0x318/0x620 [ 21.041679] ret_from_fork+0x10/0x20 [ 21.041922] [ 21.042107] The buggy address belongs to the object at fff00000c1e7a0e0 [ 21.042107] which belongs to the cache kmalloc-16 of size 16 [ 21.043050] The buggy address is located 8 bytes inside of [ 21.043050] allocated 9-byte region [fff00000c1e7a0e0, fff00000c1e7a0e9) [ 21.043908] [ 21.044093] The buggy address belongs to the physical page: [ 21.044439] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e7a [ 21.044961] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.045331] page_type: f5(slab) [ 21.045529] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 21.045944] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.046317] page dumped because: kasan: bad access detected [ 21.046755] [ 21.046900] Memory state around the buggy address: [ 21.047502] fff00000c1e79f80: 00 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.047893] fff00000c1e7a000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.048144] >fff00000c1e7a080: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 21.048715] ^ [ 21.049050] fff00000c1e7a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.049386] fff00000c1e7a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.049710] ================================================================== [ 20.990428] ================================================================== [ 20.991094] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaf4/0xbc8 [ 20.991511] Read of size 8 at addr fff00000c1e7a0e8 by task kunit_try_catch/250 [ 20.991806] [ 20.991976] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 20.992078] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.992112] Hardware name: linux,dummy-virt (DT) [ 20.992149] Call trace: [ 20.992176] show_stack+0x20/0x38 (C) [ 20.992232] dump_stack_lvl+0x8c/0xd0 [ 20.992285] print_report+0x118/0x608 [ 20.992336] kasan_report+0xdc/0x128 [ 20.992386] __asan_report_load8_noabort+0x20/0x30 [ 20.992439] kasan_bitops_modify.constprop.0+0xaf4/0xbc8 [ 20.992494] kasan_bitops_generic+0x110/0x1c8 [ 20.992546] kunit_try_run_case+0x170/0x3f0 [ 20.992600] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.992656] kthread+0x318/0x620 [ 20.992707] ret_from_fork+0x10/0x20 [ 20.993107] [ 20.996683] Allocated by task 250: [ 20.996893] kasan_save_stack+0x3c/0x68 [ 20.997100] kasan_save_track+0x20/0x40 [ 20.997283] kasan_save_alloc_info+0x40/0x58 [ 20.997475] __kasan_kmalloc+0xd4/0xd8 [ 20.997666] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.997941] kasan_bitops_generic+0xa0/0x1c8 [ 20.998195] kunit_try_run_case+0x170/0x3f0 [ 20.998626] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.999102] kthread+0x318/0x620 [ 20.999451] ret_from_fork+0x10/0x20 [ 20.999876] [ 21.000065] The buggy address belongs to the object at fff00000c1e7a0e0 [ 21.000065] which belongs to the cache kmalloc-16 of size 16 [ 21.000949] The buggy address is located 8 bytes inside of [ 21.000949] allocated 9-byte region [fff00000c1e7a0e0, fff00000c1e7a0e9) [ 21.001695] [ 21.001937] The buggy address belongs to the physical page: [ 21.002240] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e7a [ 21.003712] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.004060] page_type: f5(slab) [ 21.004224] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 21.004833] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.005209] page dumped because: kasan: bad access detected [ 21.005467] [ 21.005615] Memory state around the buggy address: [ 21.006102] fff00000c1e79f80: 00 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.006632] fff00000c1e7a000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.007070] >fff00000c1e7a080: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 21.007764] ^ [ 21.008284] fff00000c1e7a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.008721] fff00000c1e7a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.009153] ================================================================== [ 20.904375] ================================================================== [ 20.904688] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc8 [ 20.905155] Write of size 8 at addr fff00000c1e7a0e8 by task kunit_try_catch/250 [ 20.905892] [ 20.906139] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 20.906320] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.906360] Hardware name: linux,dummy-virt (DT) [ 20.906402] Call trace: [ 20.906435] show_stack+0x20/0x38 (C) [ 20.906547] dump_stack_lvl+0x8c/0xd0 [ 20.906612] print_report+0x118/0x608 [ 20.906670] kasan_report+0xdc/0x128 [ 20.906722] kasan_check_range+0x100/0x1a8 [ 20.906803] __kasan_check_write+0x20/0x30 [ 20.906855] kasan_bitops_modify.constprop.0+0x1dc/0xbc8 [ 20.906915] kasan_bitops_generic+0x110/0x1c8 [ 20.906969] kunit_try_run_case+0x170/0x3f0 [ 20.907730] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.907815] kthread+0x318/0x620 [ 20.907870] ret_from_fork+0x10/0x20 [ 20.907930] [ 20.912107] Allocated by task 250: [ 20.912549] kasan_save_stack+0x3c/0x68 [ 20.912903] kasan_save_track+0x20/0x40 [ 20.913236] kasan_save_alloc_info+0x40/0x58 [ 20.913576] __kasan_kmalloc+0xd4/0xd8 [ 20.913926] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.914311] kasan_bitops_generic+0xa0/0x1c8 [ 20.914750] kunit_try_run_case+0x170/0x3f0 [ 20.915812] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.916279] kthread+0x318/0x620 [ 20.916573] ret_from_fork+0x10/0x20 [ 20.916791] [ 20.916932] The buggy address belongs to the object at fff00000c1e7a0e0 [ 20.916932] which belongs to the cache kmalloc-16 of size 16 [ 20.917433] The buggy address is located 8 bytes inside of [ 20.917433] allocated 9-byte region [fff00000c1e7a0e0, fff00000c1e7a0e9) [ 20.918271] [ 20.918488] The buggy address belongs to the physical page: [ 20.919162] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e7a [ 20.919749] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.920114] page_type: f5(slab) [ 20.920406] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 20.920969] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 20.921423] page dumped because: kasan: bad access detected [ 20.921830] [ 20.922045] Memory state around the buggy address: [ 20.922415] fff00000c1e79f80: 00 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.922781] fff00000c1e7a000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 20.923145] >fff00000c1e7a080: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 20.923469] ^ [ 20.923735] fff00000c1e7a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.925123] fff00000c1e7a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.925366] ================================================================== [ 21.051278] ================================================================== [ 21.051567] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa28/0xbc8 [ 21.051973] Read of size 8 at addr fff00000c1e7a0e8 by task kunit_try_catch/250 [ 21.052533] [ 21.052690] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 21.053425] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.053472] Hardware name: linux,dummy-virt (DT) [ 21.053511] Call trace: [ 21.053542] show_stack+0x20/0x38 (C) [ 21.053611] dump_stack_lvl+0x8c/0xd0 [ 21.053668] print_report+0x118/0x608 [ 21.053721] kasan_report+0xdc/0x128 [ 21.053803] __asan_report_load8_noabort+0x20/0x30 [ 21.053859] kasan_bitops_modify.constprop.0+0xa28/0xbc8 [ 21.053921] kasan_bitops_generic+0x110/0x1c8 [ 21.053978] kunit_try_run_case+0x170/0x3f0 [ 21.054034] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.054107] kthread+0x318/0x620 [ 21.054165] ret_from_fork+0x10/0x20 [ 21.054225] [ 21.058452] Allocated by task 250: [ 21.059453] kasan_save_stack+0x3c/0x68 [ 21.059967] kasan_save_track+0x20/0x40 [ 21.060248] kasan_save_alloc_info+0x40/0x58 [ 21.060509] __kasan_kmalloc+0xd4/0xd8 [ 21.060768] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.061055] kasan_bitops_generic+0xa0/0x1c8 [ 21.061325] kunit_try_run_case+0x170/0x3f0 [ 21.061575] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.061882] kthread+0x318/0x620 [ 21.062049] ret_from_fork+0x10/0x20 [ 21.062382] [ 21.062704] The buggy address belongs to the object at fff00000c1e7a0e0 [ 21.062704] which belongs to the cache kmalloc-16 of size 16 [ 21.063857] The buggy address is located 8 bytes inside of [ 21.063857] allocated 9-byte region [fff00000c1e7a0e0, fff00000c1e7a0e9) [ 21.064626] [ 21.064851] The buggy address belongs to the physical page: [ 21.065155] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e7a [ 21.065625] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.065985] page_type: f5(slab) [ 21.066334] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 21.066959] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.067392] page dumped because: kasan: bad access detected [ 21.068243] [ 21.068563] Memory state around the buggy address: [ 21.068829] fff00000c1e79f80: 00 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.069328] fff00000c1e7a000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.069734] >fff00000c1e7a080: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 21.070164] ^ [ 21.070664] fff00000c1e7a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.071041] fff00000c1e7a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.071641] ================================================================== [ 20.947059] ================================================================== [ 20.947357] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc8 [ 20.947616] Write of size 8 at addr fff00000c1e7a0e8 by task kunit_try_catch/250 [ 20.948173] [ 20.948341] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 20.948435] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.948468] Hardware name: linux,dummy-virt (DT) [ 20.948505] Call trace: [ 20.948531] show_stack+0x20/0x38 (C) [ 20.948586] dump_stack_lvl+0x8c/0xd0 [ 20.948638] print_report+0x118/0x608 [ 20.948687] kasan_report+0xdc/0x128 [ 20.948735] kasan_check_range+0x100/0x1a8 [ 20.949433] __kasan_check_write+0x20/0x30 [ 20.949489] kasan_bitops_modify.constprop.0+0x2b4/0xbc8 [ 20.949547] kasan_bitops_generic+0x110/0x1c8 [ 20.949598] kunit_try_run_case+0x170/0x3f0 [ 20.949651] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.949704] kthread+0x318/0x620 [ 20.949765] ret_from_fork+0x10/0x20 [ 20.949821] [ 20.954421] Allocated by task 250: [ 20.955078] kasan_save_stack+0x3c/0x68 [ 20.955381] kasan_save_track+0x20/0x40 [ 20.955607] kasan_save_alloc_info+0x40/0x58 [ 20.955842] __kasan_kmalloc+0xd4/0xd8 [ 20.956069] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.956323] kasan_bitops_generic+0xa0/0x1c8 [ 20.956570] kunit_try_run_case+0x170/0x3f0 [ 20.957780] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.958014] kthread+0x318/0x620 [ 20.958373] ret_from_fork+0x10/0x20 [ 20.959015] [ 20.959136] The buggy address belongs to the object at fff00000c1e7a0e0 [ 20.959136] which belongs to the cache kmalloc-16 of size 16 [ 20.959729] The buggy address is located 8 bytes inside of [ 20.959729] allocated 9-byte region [fff00000c1e7a0e0, fff00000c1e7a0e9) [ 20.960704] [ 20.961030] The buggy address belongs to the physical page: [ 20.961340] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e7a [ 20.961798] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.962316] page_type: f5(slab) [ 20.963811] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 20.964111] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 20.964517] page dumped because: kasan: bad access detected [ 20.964946] [ 20.965191] Memory state around the buggy address: [ 20.965494] fff00000c1e79f80: 00 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.965933] fff00000c1e7a000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 20.966405] >fff00000c1e7a080: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 20.966843] ^ [ 20.967270] fff00000c1e7a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.967786] fff00000c1e7a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.968329] ================================================================== [ 20.862278] ================================================================== [ 20.863279] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc8 [ 20.863823] Write of size 8 at addr fff00000c1e7a0e8 by task kunit_try_catch/250 [ 20.864047] [ 20.864238] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 20.864341] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.864377] Hardware name: linux,dummy-virt (DT) [ 20.864418] Call trace: [ 20.864450] show_stack+0x20/0x38 (C) [ 20.864511] dump_stack_lvl+0x8c/0xd0 [ 20.864568] print_report+0x118/0x608 [ 20.864640] kasan_report+0xdc/0x128 [ 20.864688] kasan_check_range+0x100/0x1a8 [ 20.864753] __kasan_check_write+0x20/0x30 [ 20.864833] kasan_bitops_modify.constprop.0+0x100/0xbc8 [ 20.864895] kasan_bitops_generic+0x110/0x1c8 [ 20.864950] kunit_try_run_case+0x170/0x3f0 [ 20.865027] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.865091] kthread+0x318/0x620 [ 20.865144] ret_from_fork+0x10/0x20 [ 20.865225] [ 20.868822] Allocated by task 250: [ 20.869023] kasan_save_stack+0x3c/0x68 [ 20.869249] kasan_save_track+0x20/0x40 [ 20.869439] kasan_save_alloc_info+0x40/0x58 [ 20.869646] __kasan_kmalloc+0xd4/0xd8 [ 20.870755] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.870965] kasan_bitops_generic+0xa0/0x1c8 [ 20.871140] kunit_try_run_case+0x170/0x3f0 [ 20.871307] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.871498] kthread+0x318/0x620 [ 20.872210] ret_from_fork+0x10/0x20 [ 20.872417] [ 20.872556] The buggy address belongs to the object at fff00000c1e7a0e0 [ 20.872556] which belongs to the cache kmalloc-16 of size 16 [ 20.873689] The buggy address is located 8 bytes inside of [ 20.873689] allocated 9-byte region [fff00000c1e7a0e0, fff00000c1e7a0e9) [ 20.874369] [ 20.874820] The buggy address belongs to the physical page: [ 20.875236] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e7a [ 20.875724] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.876223] page_type: f5(slab) [ 20.876461] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 20.876872] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 20.877271] page dumped because: kasan: bad access detected [ 20.877537] [ 20.877692] Memory state around the buggy address: [ 20.878044] fff00000c1e79f80: 00 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.878509] fff00000c1e7a000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 20.878765] >fff00000c1e7a080: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 20.879255] ^ [ 20.880424] fff00000c1e7a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.880980] fff00000c1e7a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.881435] ==================================================================
[ 14.432114] ================================================================== [ 14.432412] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19d/0xd50 [ 14.432801] Write of size 8 at addr ffff888101b28068 by task kunit_try_catch/269 [ 14.433276] [ 14.433396] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 14.433442] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.433455] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.433478] Call Trace: [ 14.433499] <TASK> [ 14.433519] dump_stack_lvl+0x73/0xb0 [ 14.433547] print_report+0xd1/0x650 [ 14.433569] ? __virt_addr_valid+0x1db/0x2d0 [ 14.433592] ? kasan_bitops_modify.constprop.0+0x19d/0xd50 [ 14.433616] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.433643] ? kasan_bitops_modify.constprop.0+0x19d/0xd50 [ 14.433668] kasan_report+0x140/0x180 [ 14.433690] ? kasan_bitops_modify.constprop.0+0x19d/0xd50 [ 14.433719] kasan_check_range+0x10c/0x1c0 [ 14.433746] __kasan_check_write+0x18/0x20 [ 14.433767] kasan_bitops_modify.constprop.0+0x19d/0xd50 [ 14.433792] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.433856] ? __kmalloc_cache_noprof+0x18a/0x420 [ 14.433879] ? trace_hardirqs_on+0x37/0xe0 [ 14.433902] ? kasan_bitops_generic+0x93/0x1c0 [ 14.433945] kasan_bitops_generic+0x117/0x1c0 [ 14.433968] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.433992] ? __pfx_read_tsc+0x10/0x10 [ 14.434029] ? ktime_get_ts64+0x86/0x230 [ 14.434054] kunit_try_run_case+0x1a6/0x480 [ 14.434093] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.434114] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 14.434135] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.434174] ? __kthread_parkme+0x82/0x160 [ 14.434209] ? preempt_count_sub+0x50/0x80 [ 14.434234] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.434269] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.434307] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.434343] kthread+0x324/0x6e0 [ 14.434368] ? trace_preempt_on+0x20/0xc0 [ 14.434389] ? __pfx_kthread+0x10/0x10 [ 14.434411] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.434435] ? calculate_sigpending+0x7b/0xa0 [ 14.434456] ? __pfx_kthread+0x10/0x10 [ 14.434479] ret_from_fork+0x41/0x80 [ 14.434496] ? __pfx_kthread+0x10/0x10 [ 14.434519] ret_from_fork_asm+0x1a/0x30 [ 14.434550] </TASK> [ 14.434561] [ 14.442823] Allocated by task 269: [ 14.443068] kasan_save_stack+0x45/0x70 [ 14.443292] kasan_save_track+0x18/0x40 [ 14.443447] kasan_save_alloc_info+0x3b/0x50 [ 14.443596] __kasan_kmalloc+0xb7/0xc0 [ 14.443738] __kmalloc_cache_noprof+0x18a/0x420 [ 14.443994] kasan_bitops_generic+0x93/0x1c0 [ 14.444225] kunit_try_run_case+0x1a6/0x480 [ 14.444563] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.444921] kthread+0x324/0x6e0 [ 14.445120] ret_from_fork+0x41/0x80 [ 14.445347] ret_from_fork_asm+0x1a/0x30 [ 14.445549] [ 14.445722] The buggy address belongs to the object at ffff888101b28060 [ 14.445722] which belongs to the cache kmalloc-16 of size 16 [ 14.446274] The buggy address is located 8 bytes inside of [ 14.446274] allocated 9-byte region [ffff888101b28060, ffff888101b28069) [ 14.446639] [ 14.446714] The buggy address belongs to the physical page: [ 14.446897] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b28 [ 14.447484] flags: 0x200000000000000(node=0|zone=2) [ 14.447721] page_type: f5(slab) [ 14.447926] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.448293] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.448542] page dumped because: kasan: bad access detected [ 14.448710] [ 14.449606] Memory state around the buggy address: [ 14.449850] ffff888101b27f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.450210] ffff888101b27f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.450533] >ffff888101b28000: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 14.451167] ^ [ 14.451526] ffff888101b28080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.451916] ffff888101b28100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.452293] ================================================================== [ 14.453965] ================================================================== [ 14.454368] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23b/0xd50 [ 14.454848] Write of size 8 at addr ffff888101b28068 by task kunit_try_catch/269 [ 14.455540] [ 14.455674] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 14.455866] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.455882] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.455905] Call Trace: [ 14.455927] <TASK> [ 14.455949] dump_stack_lvl+0x73/0xb0 [ 14.455981] print_report+0xd1/0x650 [ 14.456003] ? __virt_addr_valid+0x1db/0x2d0 [ 14.456027] ? kasan_bitops_modify.constprop.0+0x23b/0xd50 [ 14.456051] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.456077] ? kasan_bitops_modify.constprop.0+0x23b/0xd50 [ 14.456101] kasan_report+0x140/0x180 [ 14.456123] ? kasan_bitops_modify.constprop.0+0x23b/0xd50 [ 14.456151] kasan_check_range+0x10c/0x1c0 [ 14.456174] __kasan_check_write+0x18/0x20 [ 14.456196] kasan_bitops_modify.constprop.0+0x23b/0xd50 [ 14.456221] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.456246] ? __kmalloc_cache_noprof+0x18a/0x420 [ 14.456269] ? trace_hardirqs_on+0x37/0xe0 [ 14.456292] ? kasan_bitops_generic+0x93/0x1c0 [ 14.456317] kasan_bitops_generic+0x117/0x1c0 [ 14.456339] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.456363] ? __pfx_read_tsc+0x10/0x10 [ 14.456385] ? ktime_get_ts64+0x86/0x230 [ 14.456411] kunit_try_run_case+0x1a6/0x480 [ 14.456529] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.456553] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 14.456578] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.456605] ? __kthread_parkme+0x82/0x160 [ 14.456628] ? preempt_count_sub+0x50/0x80 [ 14.456653] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.456674] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.456701] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.456727] kthread+0x324/0x6e0 [ 14.456748] ? trace_preempt_on+0x20/0xc0 [ 14.456771] ? __pfx_kthread+0x10/0x10 [ 14.456794] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.456817] ? calculate_sigpending+0x7b/0xa0 [ 14.456849] ? __pfx_kthread+0x10/0x10 [ 14.456871] ret_from_fork+0x41/0x80 [ 14.456890] ? __pfx_kthread+0x10/0x10 [ 14.456913] ret_from_fork_asm+0x1a/0x30 [ 14.456944] </TASK> [ 14.456955] [ 14.465510] Allocated by task 269: [ 14.465662] kasan_save_stack+0x45/0x70 [ 14.465920] kasan_save_track+0x18/0x40 [ 14.466192] kasan_save_alloc_info+0x3b/0x50 [ 14.466429] __kasan_kmalloc+0xb7/0xc0 [ 14.466622] __kmalloc_cache_noprof+0x18a/0x420 [ 14.466857] kasan_bitops_generic+0x93/0x1c0 [ 14.467079] kunit_try_run_case+0x1a6/0x480 [ 14.467294] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.467607] kthread+0x324/0x6e0 [ 14.467820] ret_from_fork+0x41/0x80 [ 14.468030] ret_from_fork_asm+0x1a/0x30 [ 14.468223] [ 14.468385] The buggy address belongs to the object at ffff888101b28060 [ 14.468385] which belongs to the cache kmalloc-16 of size 16 [ 14.469002] The buggy address is located 8 bytes inside of [ 14.469002] allocated 9-byte region [ffff888101b28060, ffff888101b28069) [ 14.469915] [ 14.470019] The buggy address belongs to the physical page: [ 14.470324] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b28 [ 14.470562] flags: 0x200000000000000(node=0|zone=2) [ 14.470784] page_type: f5(slab) [ 14.470990] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.471369] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.471723] page dumped because: kasan: bad access detected [ 14.471918] [ 14.471986] Memory state around the buggy address: [ 14.472387] ffff888101b27f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.472717] ffff888101b27f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.473023] >ffff888101b28000: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 14.473337] ^ [ 14.473568] ffff888101b28080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.473955] ffff888101b28100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.474287] ================================================================== [ 14.538232] ================================================================== [ 14.538885] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ad/0xd50 [ 14.539248] Write of size 8 at addr ffff888101b28068 by task kunit_try_catch/269 [ 14.539599] [ 14.539706] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 14.539751] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.539764] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.539786] Call Trace: [ 14.539807] <TASK> [ 14.539827] dump_stack_lvl+0x73/0xb0 [ 14.539888] print_report+0xd1/0x650 [ 14.539909] ? __virt_addr_valid+0x1db/0x2d0 [ 14.539932] ? kasan_bitops_modify.constprop.0+0x4ad/0xd50 [ 14.539972] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.539997] ? kasan_bitops_modify.constprop.0+0x4ad/0xd50 [ 14.540036] kasan_report+0x140/0x180 [ 14.540067] ? kasan_bitops_modify.constprop.0+0x4ad/0xd50 [ 14.540096] kasan_check_range+0x10c/0x1c0 [ 14.540119] __kasan_check_write+0x18/0x20 [ 14.540141] kasan_bitops_modify.constprop.0+0x4ad/0xd50 [ 14.540165] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.540206] ? __kmalloc_cache_noprof+0x18a/0x420 [ 14.540242] ? trace_hardirqs_on+0x37/0xe0 [ 14.540265] ? kasan_bitops_generic+0x93/0x1c0 [ 14.540305] kasan_bitops_generic+0x117/0x1c0 [ 14.540341] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.540380] ? __pfx_read_tsc+0x10/0x10 [ 14.540415] ? ktime_get_ts64+0x86/0x230 [ 14.540442] kunit_try_run_case+0x1a6/0x480 [ 14.540466] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.540489] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 14.540511] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.540536] ? __kthread_parkme+0x82/0x160 [ 14.540558] ? preempt_count_sub+0x50/0x80 [ 14.540585] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.540608] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.540634] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.540660] kthread+0x324/0x6e0 [ 14.540682] ? trace_preempt_on+0x20/0xc0 [ 14.540704] ? __pfx_kthread+0x10/0x10 [ 14.540727] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.540751] ? calculate_sigpending+0x7b/0xa0 [ 14.540775] ? __pfx_kthread+0x10/0x10 [ 14.540797] ret_from_fork+0x41/0x80 [ 14.540816] ? __pfx_kthread+0x10/0x10 [ 14.540848] ret_from_fork_asm+0x1a/0x30 [ 14.540879] </TASK> [ 14.540891] [ 14.549142] Allocated by task 269: [ 14.549329] kasan_save_stack+0x45/0x70 [ 14.549530] kasan_save_track+0x18/0x40 [ 14.549716] kasan_save_alloc_info+0x3b/0x50 [ 14.549936] __kasan_kmalloc+0xb7/0xc0 [ 14.550134] __kmalloc_cache_noprof+0x18a/0x420 [ 14.550295] kasan_bitops_generic+0x93/0x1c0 [ 14.550442] kunit_try_run_case+0x1a6/0x480 [ 14.550584] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.550754] kthread+0x324/0x6e0 [ 14.550935] ret_from_fork+0x41/0x80 [ 14.551207] ret_from_fork_asm+0x1a/0x30 [ 14.551436] [ 14.551533] The buggy address belongs to the object at ffff888101b28060 [ 14.551533] which belongs to the cache kmalloc-16 of size 16 [ 14.552103] The buggy address is located 8 bytes inside of [ 14.552103] allocated 9-byte region [ffff888101b28060, ffff888101b28069) [ 14.552644] [ 14.552738] The buggy address belongs to the physical page: [ 14.553002] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b28 [ 14.553330] flags: 0x200000000000000(node=0|zone=2) [ 14.553542] page_type: f5(slab) [ 14.553731] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.554065] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.554376] page dumped because: kasan: bad access detected [ 14.554589] [ 14.554705] Memory state around the buggy address: [ 14.554900] ffff888101b27f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.555261] ffff888101b27f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.555529] >ffff888101b28000: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 14.555868] ^ [ 14.556267] ffff888101b28080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.556539] ffff888101b28100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.556817] ================================================================== [ 14.411936] ================================================================== [ 14.412718] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x102/0xd50 [ 14.413190] Write of size 8 at addr ffff888101b28068 by task kunit_try_catch/269 [ 14.413564] [ 14.413682] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 14.413757] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.413770] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.413793] Call Trace: [ 14.413807] <TASK> [ 14.413828] dump_stack_lvl+0x73/0xb0 [ 14.413868] print_report+0xd1/0x650 [ 14.413909] ? __virt_addr_valid+0x1db/0x2d0 [ 14.413932] ? kasan_bitops_modify.constprop.0+0x102/0xd50 [ 14.413956] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.413980] ? kasan_bitops_modify.constprop.0+0x102/0xd50 [ 14.414005] kasan_report+0x140/0x180 [ 14.414027] ? kasan_bitops_modify.constprop.0+0x102/0xd50 [ 14.414054] kasan_check_range+0x10c/0x1c0 [ 14.414077] __kasan_check_write+0x18/0x20 [ 14.414098] kasan_bitops_modify.constprop.0+0x102/0xd50 [ 14.414122] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.414148] ? __kmalloc_cache_noprof+0x18a/0x420 [ 14.414172] ? trace_hardirqs_on+0x37/0xe0 [ 14.414205] ? kasan_bitops_generic+0x93/0x1c0 [ 14.414231] kasan_bitops_generic+0x117/0x1c0 [ 14.414253] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.414277] ? __pfx_read_tsc+0x10/0x10 [ 14.414318] ? ktime_get_ts64+0x86/0x230 [ 14.414344] kunit_try_run_case+0x1a6/0x480 [ 14.414381] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.414402] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 14.414424] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.414449] ? __kthread_parkme+0x82/0x160 [ 14.414472] ? preempt_count_sub+0x50/0x80 [ 14.414497] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.414519] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.414544] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.414570] kthread+0x324/0x6e0 [ 14.414591] ? trace_preempt_on+0x20/0xc0 [ 14.414613] ? __pfx_kthread+0x10/0x10 [ 14.414635] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.414658] ? calculate_sigpending+0x7b/0xa0 [ 14.414680] ? __pfx_kthread+0x10/0x10 [ 14.414702] ret_from_fork+0x41/0x80 [ 14.414720] ? __pfx_kthread+0x10/0x10 [ 14.414742] ret_from_fork_asm+0x1a/0x30 [ 14.414774] </TASK> [ 14.414786] [ 14.422513] Allocated by task 269: [ 14.422715] kasan_save_stack+0x45/0x70 [ 14.422953] kasan_save_track+0x18/0x40 [ 14.423295] kasan_save_alloc_info+0x3b/0x50 [ 14.423527] __kasan_kmalloc+0xb7/0xc0 [ 14.423686] __kmalloc_cache_noprof+0x18a/0x420 [ 14.423847] kasan_bitops_generic+0x93/0x1c0 [ 14.424085] kunit_try_run_case+0x1a6/0x480 [ 14.424287] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.424543] kthread+0x324/0x6e0 [ 14.424749] ret_from_fork+0x41/0x80 [ 14.424984] ret_from_fork_asm+0x1a/0x30 [ 14.425229] [ 14.425325] The buggy address belongs to the object at ffff888101b28060 [ 14.425325] which belongs to the cache kmalloc-16 of size 16 [ 14.425933] The buggy address is located 8 bytes inside of [ 14.425933] allocated 9-byte region [ffff888101b28060, ffff888101b28069) [ 14.426438] [ 14.426573] The buggy address belongs to the physical page: [ 14.426750] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b28 [ 14.427117] flags: 0x200000000000000(node=0|zone=2) [ 14.427353] page_type: f5(slab) [ 14.427529] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.427791] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.428108] page dumped because: kasan: bad access detected [ 14.428376] [ 14.428473] Memory state around the buggy address: [ 14.428666] ffff888101b27f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.428992] ffff888101b27f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.429360] >ffff888101b28000: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 14.429667] ^ [ 14.429950] ffff888101b28080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.430268] ffff888101b28100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.430593] ================================================================== [ 14.497533] ================================================================== [ 14.497912] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x374/0xd50 [ 14.499002] Write of size 8 at addr ffff888101b28068 by task kunit_try_catch/269 [ 14.499255] [ 14.499343] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 14.499387] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.499400] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.499422] Call Trace: [ 14.499444] <TASK> [ 14.499464] dump_stack_lvl+0x73/0xb0 [ 14.499493] print_report+0xd1/0x650 [ 14.499515] ? __virt_addr_valid+0x1db/0x2d0 [ 14.499539] ? kasan_bitops_modify.constprop.0+0x374/0xd50 [ 14.499563] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.499589] ? kasan_bitops_modify.constprop.0+0x374/0xd50 [ 14.499614] kasan_report+0x140/0x180 [ 14.499636] ? kasan_bitops_modify.constprop.0+0x374/0xd50 [ 14.499689] kasan_check_range+0x10c/0x1c0 [ 14.499712] __kasan_check_write+0x18/0x20 [ 14.499735] kasan_bitops_modify.constprop.0+0x374/0xd50 [ 14.499776] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.499801] ? __kmalloc_cache_noprof+0x18a/0x420 [ 14.499825] ? trace_hardirqs_on+0x37/0xe0 [ 14.499873] ? kasan_bitops_generic+0x93/0x1c0 [ 14.499913] kasan_bitops_generic+0x117/0x1c0 [ 14.499935] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.499959] ? __pfx_read_tsc+0x10/0x10 [ 14.499981] ? ktime_get_ts64+0x86/0x230 [ 14.500006] kunit_try_run_case+0x1a6/0x480 [ 14.500029] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.500052] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 14.500075] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.500099] ? __kthread_parkme+0x82/0x160 [ 14.500122] ? preempt_count_sub+0x50/0x80 [ 14.500146] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.500168] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.500194] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.500218] kthread+0x324/0x6e0 [ 14.500240] ? trace_preempt_on+0x20/0xc0 [ 14.500262] ? __pfx_kthread+0x10/0x10 [ 14.500284] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.500307] ? calculate_sigpending+0x7b/0xa0 [ 14.500329] ? __pfx_kthread+0x10/0x10 [ 14.500355] ret_from_fork+0x41/0x80 [ 14.500373] ? __pfx_kthread+0x10/0x10 [ 14.500395] ret_from_fork_asm+0x1a/0x30 [ 14.500427] </TASK> [ 14.500439] [ 14.508603] Allocated by task 269: [ 14.508785] kasan_save_stack+0x45/0x70 [ 14.508995] kasan_save_track+0x18/0x40 [ 14.509132] kasan_save_alloc_info+0x3b/0x50 [ 14.509276] __kasan_kmalloc+0xb7/0xc0 [ 14.509404] __kmalloc_cache_noprof+0x18a/0x420 [ 14.509743] kasan_bitops_generic+0x93/0x1c0 [ 14.509965] kunit_try_run_case+0x1a6/0x480 [ 14.510360] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.510640] kthread+0x324/0x6e0 [ 14.510856] ret_from_fork+0x41/0x80 [ 14.511058] ret_from_fork_asm+0x1a/0x30 [ 14.511273] [ 14.511365] The buggy address belongs to the object at ffff888101b28060 [ 14.511365] which belongs to the cache kmalloc-16 of size 16 [ 14.511705] The buggy address is located 8 bytes inside of [ 14.511705] allocated 9-byte region [ffff888101b28060, ffff888101b28069) [ 14.512261] [ 14.512395] The buggy address belongs to the physical page: [ 14.512675] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b28 [ 14.513071] flags: 0x200000000000000(node=0|zone=2) [ 14.513304] page_type: f5(slab) [ 14.513473] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.513792] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.514021] page dumped because: kasan: bad access detected [ 14.514322] [ 14.514417] Memory state around the buggy address: [ 14.514665] ffff888101b27f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.515033] ffff888101b27f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.515388] >ffff888101b28000: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 14.515619] ^ [ 14.515942] ffff888101b28080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.516319] ffff888101b28100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.516657] ================================================================== [ 14.557874] ================================================================== [ 14.558240] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x548/0xd50 [ 14.559205] Write of size 8 at addr ffff888101b28068 by task kunit_try_catch/269 [ 14.559476] [ 14.559611] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 14.559676] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.559690] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.559712] Call Trace: [ 14.559727] <TASK> [ 14.559748] dump_stack_lvl+0x73/0xb0 [ 14.559779] print_report+0xd1/0x650 [ 14.559820] ? __virt_addr_valid+0x1db/0x2d0 [ 14.559853] ? kasan_bitops_modify.constprop.0+0x548/0xd50 [ 14.559877] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.559903] ? kasan_bitops_modify.constprop.0+0x548/0xd50 [ 14.559928] kasan_report+0x140/0x180 [ 14.559949] ? kasan_bitops_modify.constprop.0+0x548/0xd50 [ 14.559994] kasan_check_range+0x10c/0x1c0 [ 14.560017] __kasan_check_write+0x18/0x20 [ 14.560038] kasan_bitops_modify.constprop.0+0x548/0xd50 [ 14.560072] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.560097] ? __kmalloc_cache_noprof+0x18a/0x420 [ 14.560137] ? trace_hardirqs_on+0x37/0xe0 [ 14.560174] ? kasan_bitops_generic+0x93/0x1c0 [ 14.560212] kasan_bitops_generic+0x117/0x1c0 [ 14.560248] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.560285] ? __pfx_read_tsc+0x10/0x10 [ 14.560308] ? ktime_get_ts64+0x86/0x230 [ 14.560346] kunit_try_run_case+0x1a6/0x480 [ 14.560384] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.560405] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 14.560427] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.560452] ? __kthread_parkme+0x82/0x160 [ 14.560475] ? preempt_count_sub+0x50/0x80 [ 14.560501] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.560523] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.560551] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.560576] kthread+0x324/0x6e0 [ 14.560597] ? trace_preempt_on+0x20/0xc0 [ 14.560620] ? __pfx_kthread+0x10/0x10 [ 14.560642] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.560666] ? calculate_sigpending+0x7b/0xa0 [ 14.560688] ? __pfx_kthread+0x10/0x10 [ 14.560710] ret_from_fork+0x41/0x80 [ 14.560729] ? __pfx_kthread+0x10/0x10 [ 14.560751] ret_from_fork_asm+0x1a/0x30 [ 14.560783] </TASK> [ 14.560795] [ 14.568872] Allocated by task 269: [ 14.569064] kasan_save_stack+0x45/0x70 [ 14.569256] kasan_save_track+0x18/0x40 [ 14.569446] kasan_save_alloc_info+0x3b/0x50 [ 14.569609] __kasan_kmalloc+0xb7/0xc0 [ 14.569818] __kmalloc_cache_noprof+0x18a/0x420 [ 14.570066] kasan_bitops_generic+0x93/0x1c0 [ 14.570262] kunit_try_run_case+0x1a6/0x480 [ 14.570420] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.570642] kthread+0x324/0x6e0 [ 14.570812] ret_from_fork+0x41/0x80 [ 14.571002] ret_from_fork_asm+0x1a/0x30 [ 14.571390] [ 14.571464] The buggy address belongs to the object at ffff888101b28060 [ 14.571464] which belongs to the cache kmalloc-16 of size 16 [ 14.571843] The buggy address is located 8 bytes inside of [ 14.571843] allocated 9-byte region [ffff888101b28060, ffff888101b28069) [ 14.572267] [ 14.572367] The buggy address belongs to the physical page: [ 14.572674] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b28 [ 14.573067] flags: 0x200000000000000(node=0|zone=2) [ 14.573329] page_type: f5(slab) [ 14.573501] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.573770] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.574002] page dumped because: kasan: bad access detected [ 14.574512] [ 14.574627] Memory state around the buggy address: [ 14.574881] ffff888101b27f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.575216] ffff888101b27f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.575440] >ffff888101b28000: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 14.575734] ^ [ 14.576064] ffff888101b28080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.576542] ffff888101b28100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.576868] ================================================================== [ 14.517822] ================================================================== [ 14.518755] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40f/0xd50 [ 14.519195] Write of size 8 at addr ffff888101b28068 by task kunit_try_catch/269 [ 14.519539] [ 14.519647] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 14.519692] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.519704] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.519727] Call Trace: [ 14.519748] <TASK> [ 14.519768] dump_stack_lvl+0x73/0xb0 [ 14.519819] print_report+0xd1/0x650 [ 14.519851] ? __virt_addr_valid+0x1db/0x2d0 [ 14.519874] ? kasan_bitops_modify.constprop.0+0x40f/0xd50 [ 14.519916] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.519942] ? kasan_bitops_modify.constprop.0+0x40f/0xd50 [ 14.519966] kasan_report+0x140/0x180 [ 14.519987] ? kasan_bitops_modify.constprop.0+0x40f/0xd50 [ 14.520016] kasan_check_range+0x10c/0x1c0 [ 14.520038] __kasan_check_write+0x18/0x20 [ 14.520070] kasan_bitops_modify.constprop.0+0x40f/0xd50 [ 14.520095] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.520120] ? __kmalloc_cache_noprof+0x18a/0x420 [ 14.520144] ? trace_hardirqs_on+0x37/0xe0 [ 14.520167] ? kasan_bitops_generic+0x93/0x1c0 [ 14.520211] kasan_bitops_generic+0x117/0x1c0 [ 14.520234] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.520266] ? __pfx_read_tsc+0x10/0x10 [ 14.520288] ? ktime_get_ts64+0x86/0x230 [ 14.520312] kunit_try_run_case+0x1a6/0x480 [ 14.520337] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.520455] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 14.520480] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.520506] ? __kthread_parkme+0x82/0x160 [ 14.520528] ? preempt_count_sub+0x50/0x80 [ 14.520553] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.520576] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.520601] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.520627] kthread+0x324/0x6e0 [ 14.520647] ? trace_preempt_on+0x20/0xc0 [ 14.520670] ? __pfx_kthread+0x10/0x10 [ 14.520692] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.520715] ? calculate_sigpending+0x7b/0xa0 [ 14.520736] ? __pfx_kthread+0x10/0x10 [ 14.520801] ret_from_fork+0x41/0x80 [ 14.520821] ? __pfx_kthread+0x10/0x10 [ 14.520866] ret_from_fork_asm+0x1a/0x30 [ 14.520911] </TASK> [ 14.520921] [ 14.529207] Allocated by task 269: [ 14.529406] kasan_save_stack+0x45/0x70 [ 14.529606] kasan_save_track+0x18/0x40 [ 14.529857] kasan_save_alloc_info+0x3b/0x50 [ 14.530145] __kasan_kmalloc+0xb7/0xc0 [ 14.530331] __kmalloc_cache_noprof+0x18a/0x420 [ 14.530555] kasan_bitops_generic+0x93/0x1c0 [ 14.530743] kunit_try_run_case+0x1a6/0x480 [ 14.530918] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.531164] kthread+0x324/0x6e0 [ 14.531324] ret_from_fork+0x41/0x80 [ 14.531449] ret_from_fork_asm+0x1a/0x30 [ 14.531637] [ 14.531733] The buggy address belongs to the object at ffff888101b28060 [ 14.531733] which belongs to the cache kmalloc-16 of size 16 [ 14.532362] The buggy address is located 8 bytes inside of [ 14.532362] allocated 9-byte region [ffff888101b28060, ffff888101b28069) [ 14.532713] [ 14.532785] The buggy address belongs to the physical page: [ 14.532963] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b28 [ 14.533223] flags: 0x200000000000000(node=0|zone=2) [ 14.533454] page_type: f5(slab) [ 14.533646] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.533989] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.534313] page dumped because: kasan: bad access detected [ 14.534607] [ 14.534758] Memory state around the buggy address: [ 14.534989] ffff888101b27f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.535267] ffff888101b27f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.535475] >ffff888101b28000: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 14.535679] ^ [ 14.535975] ffff888101b28080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.536609] ffff888101b28100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.536961] ================================================================== [ 14.477611] ================================================================== [ 14.477997] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d6/0xd50 [ 14.478385] Write of size 8 at addr ffff888101b28068 by task kunit_try_catch/269 [ 14.478690] [ 14.478810] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 14.478869] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.478882] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.478905] Call Trace: [ 14.478921] <TASK> [ 14.478964] dump_stack_lvl+0x73/0xb0 [ 14.478997] print_report+0xd1/0x650 [ 14.479039] ? __virt_addr_valid+0x1db/0x2d0 [ 14.479064] ? kasan_bitops_modify.constprop.0+0x2d6/0xd50 [ 14.479089] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.479115] ? kasan_bitops_modify.constprop.0+0x2d6/0xd50 [ 14.479140] kasan_report+0x140/0x180 [ 14.479162] ? kasan_bitops_modify.constprop.0+0x2d6/0xd50 [ 14.479191] kasan_check_range+0x10c/0x1c0 [ 14.479214] __kasan_check_write+0x18/0x20 [ 14.479236] kasan_bitops_modify.constprop.0+0x2d6/0xd50 [ 14.479276] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.479315] ? __kmalloc_cache_noprof+0x18a/0x420 [ 14.479340] ? trace_hardirqs_on+0x37/0xe0 [ 14.479365] ? kasan_bitops_generic+0x93/0x1c0 [ 14.479391] kasan_bitops_generic+0x117/0x1c0 [ 14.479413] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.479438] ? __pfx_read_tsc+0x10/0x10 [ 14.479459] ? ktime_get_ts64+0x86/0x230 [ 14.479486] kunit_try_run_case+0x1a6/0x480 [ 14.479511] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.479531] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 14.479554] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.479580] ? __kthread_parkme+0x82/0x160 [ 14.479603] ? preempt_count_sub+0x50/0x80 [ 14.479629] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.479651] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.479676] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.479702] kthread+0x324/0x6e0 [ 14.479723] ? trace_preempt_on+0x20/0xc0 [ 14.479744] ? __pfx_kthread+0x10/0x10 [ 14.479766] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.479789] ? calculate_sigpending+0x7b/0xa0 [ 14.479811] ? __pfx_kthread+0x10/0x10 [ 14.479833] ret_from_fork+0x41/0x80 [ 14.479864] ? __pfx_kthread+0x10/0x10 [ 14.479886] ret_from_fork_asm+0x1a/0x30 [ 14.479919] </TASK> [ 14.479929] [ 14.488404] Allocated by task 269: [ 14.488570] kasan_save_stack+0x45/0x70 [ 14.488725] kasan_save_track+0x18/0x40 [ 14.488882] kasan_save_alloc_info+0x3b/0x50 [ 14.489132] __kasan_kmalloc+0xb7/0xc0 [ 14.489343] __kmalloc_cache_noprof+0x18a/0x420 [ 14.489583] kasan_bitops_generic+0x93/0x1c0 [ 14.489801] kunit_try_run_case+0x1a6/0x480 [ 14.490034] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.490301] kthread+0x324/0x6e0 [ 14.490452] ret_from_fork+0x41/0x80 [ 14.490583] ret_from_fork_asm+0x1a/0x30 [ 14.490726] [ 14.490799] The buggy address belongs to the object at ffff888101b28060 [ 14.490799] which belongs to the cache kmalloc-16 of size 16 [ 14.491313] The buggy address is located 8 bytes inside of [ 14.491313] allocated 9-byte region [ffff888101b28060, ffff888101b28069) [ 14.491854] [ 14.491953] The buggy address belongs to the physical page: [ 14.492198] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b28 [ 14.492443] flags: 0x200000000000000(node=0|zone=2) [ 14.492613] page_type: f5(slab) [ 14.492789] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.493162] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.493768] page dumped because: kasan: bad access detected [ 14.494145] [ 14.494293] Memory state around the buggy address: [ 14.494534] ffff888101b27f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.494866] ffff888101b27f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.495203] >ffff888101b28000: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 14.495514] ^ [ 14.495887] ffff888101b28080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.496249] ffff888101b28100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.496528] ==================================================================