Date
May 12, 2025, 6:12 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 21.112768] ================================================================== [ 21.113188] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc8 [ 21.113663] Write of size 8 at addr fff00000c1e7a0e8 by task kunit_try_catch/250 [ 21.113977] [ 21.114179] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 21.114285] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.114318] Hardware name: linux,dummy-virt (DT) [ 21.114378] Call trace: [ 21.114424] show_stack+0x20/0x38 (C) [ 21.114487] dump_stack_lvl+0x8c/0xd0 [ 21.114543] print_report+0x118/0x608 [ 21.114791] kasan_report+0xdc/0x128 [ 21.114917] kasan_check_range+0x100/0x1a8 [ 21.114981] __kasan_check_write+0x20/0x30 [ 21.115035] kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc8 [ 21.115096] kasan_bitops_generic+0x11c/0x1c8 [ 21.115151] kunit_try_run_case+0x170/0x3f0 [ 21.115212] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.115271] kthread+0x318/0x620 [ 21.115322] ret_from_fork+0x10/0x20 [ 21.115382] [ 21.119292] Allocated by task 250: [ 21.119775] kasan_save_stack+0x3c/0x68 [ 21.120049] kasan_save_track+0x20/0x40 [ 21.120280] kasan_save_alloc_info+0x40/0x58 [ 21.120531] __kasan_kmalloc+0xd4/0xd8 [ 21.120761] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.121508] kasan_bitops_generic+0xa0/0x1c8 [ 21.121859] kunit_try_run_case+0x170/0x3f0 [ 21.122113] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.122400] kthread+0x318/0x620 [ 21.122858] ret_from_fork+0x10/0x20 [ 21.123231] [ 21.123437] The buggy address belongs to the object at fff00000c1e7a0e0 [ 21.123437] which belongs to the cache kmalloc-16 of size 16 [ 21.124404] The buggy address is located 8 bytes inside of [ 21.124404] allocated 9-byte region [fff00000c1e7a0e0, fff00000c1e7a0e9) [ 21.125180] [ 21.125382] The buggy address belongs to the physical page: [ 21.125799] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e7a [ 21.126122] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.126708] page_type: f5(slab) [ 21.126892] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 21.127278] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.127649] page dumped because: kasan: bad access detected [ 21.127908] [ 21.128046] Memory state around the buggy address: [ 21.128269] fff00000c1e79f80: 00 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.128630] fff00000c1e7a000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.129339] >fff00000c1e7a080: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 21.129784] ^ [ 21.131634] fff00000c1e7a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.131986] fff00000c1e7a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.132465] ================================================================== [ 21.184530] ================================================================== [ 21.184806] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x334/0xbc8 [ 21.185416] Write of size 8 at addr fff00000c1e7a0e8 by task kunit_try_catch/250 [ 21.185664] [ 21.185861] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 21.185956] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.185992] Hardware name: linux,dummy-virt (DT) [ 21.186029] Call trace: [ 21.186058] show_stack+0x20/0x38 (C) [ 21.186127] dump_stack_lvl+0x8c/0xd0 [ 21.186186] print_report+0x118/0x608 [ 21.186243] kasan_report+0xdc/0x128 [ 21.186298] kasan_check_range+0x100/0x1a8 [ 21.186353] __kasan_check_write+0x20/0x30 [ 21.186404] kasan_bitops_test_and_modify.constprop.0+0x334/0xbc8 [ 21.186466] kasan_bitops_generic+0x11c/0x1c8 [ 21.186557] kunit_try_run_case+0x170/0x3f0 [ 21.186614] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.186673] kthread+0x318/0x620 [ 21.186726] ret_from_fork+0x10/0x20 [ 21.186800] [ 21.189648] Allocated by task 250: [ 21.189918] kasan_save_stack+0x3c/0x68 [ 21.190148] kasan_save_track+0x20/0x40 [ 21.190318] kasan_save_alloc_info+0x40/0x58 [ 21.190581] __kasan_kmalloc+0xd4/0xd8 [ 21.190911] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.191145] kasan_bitops_generic+0xa0/0x1c8 [ 21.191502] kunit_try_run_case+0x170/0x3f0 [ 21.191733] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.192091] kthread+0x318/0x620 [ 21.192236] ret_from_fork+0x10/0x20 [ 21.192445] [ 21.192601] The buggy address belongs to the object at fff00000c1e7a0e0 [ 21.192601] which belongs to the cache kmalloc-16 of size 16 [ 21.193274] The buggy address is located 8 bytes inside of [ 21.193274] allocated 9-byte region [fff00000c1e7a0e0, fff00000c1e7a0e9) [ 21.193869] [ 21.194034] The buggy address belongs to the physical page: [ 21.194319] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e7a [ 21.194695] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.195044] page_type: f5(slab) [ 21.195296] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 21.195566] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.195950] page dumped because: kasan: bad access detected [ 21.196134] [ 21.196306] Memory state around the buggy address: [ 21.196580] fff00000c1e79f80: 00 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.197027] fff00000c1e7a000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.197420] >fff00000c1e7a080: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 21.197734] ^ [ 21.198100] fff00000c1e7a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.198434] fff00000c1e7a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.198723] ================================================================== [ 21.092622] ================================================================== [ 21.093014] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa08/0xbc8 [ 21.093654] Read of size 8 at addr fff00000c1e7a0e8 by task kunit_try_catch/250 [ 21.094204] [ 21.094425] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 21.094554] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.094591] Hardware name: linux,dummy-virt (DT) [ 21.094631] Call trace: [ 21.094660] show_stack+0x20/0x38 (C) [ 21.094721] dump_stack_lvl+0x8c/0xd0 [ 21.094794] print_report+0x118/0x608 [ 21.095541] kasan_report+0xdc/0x128 [ 21.095602] __asan_report_load8_noabort+0x20/0x30 [ 21.095661] kasan_bitops_test_and_modify.constprop.0+0xa08/0xbc8 [ 21.095724] kasan_bitops_generic+0x11c/0x1c8 [ 21.095810] kunit_try_run_case+0x170/0x3f0 [ 21.095867] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.095927] kthread+0x318/0x620 [ 21.095981] ret_from_fork+0x10/0x20 [ 21.096041] [ 21.100347] Allocated by task 250: [ 21.100629] kasan_save_stack+0x3c/0x68 [ 21.100956] kasan_save_track+0x20/0x40 [ 21.101237] kasan_save_alloc_info+0x40/0x58 [ 21.101497] __kasan_kmalloc+0xd4/0xd8 [ 21.101771] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.102004] kasan_bitops_generic+0xa0/0x1c8 [ 21.102367] kunit_try_run_case+0x170/0x3f0 [ 21.102788] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.103327] kthread+0x318/0x620 [ 21.103563] ret_from_fork+0x10/0x20 [ 21.103837] [ 21.103989] The buggy address belongs to the object at fff00000c1e7a0e0 [ 21.103989] which belongs to the cache kmalloc-16 of size 16 [ 21.104609] The buggy address is located 8 bytes inside of [ 21.104609] allocated 9-byte region [fff00000c1e7a0e0, fff00000c1e7a0e9) [ 21.105138] [ 21.105242] The buggy address belongs to the physical page: [ 21.105682] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e7a [ 21.106241] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.106710] page_type: f5(slab) [ 21.106942] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 21.107813] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.108289] page dumped because: kasan: bad access detected [ 21.108603] [ 21.108756] Memory state around the buggy address: [ 21.109000] fff00000c1e79f80: 00 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.109402] fff00000c1e7a000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.109802] >fff00000c1e7a080: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 21.110176] ^ [ 21.110609] fff00000c1e7a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.111027] fff00000c1e7a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.111653] ================================================================== [ 21.072641] ================================================================== [ 21.073145] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc8 [ 21.073708] Write of size 8 at addr fff00000c1e7a0e8 by task kunit_try_catch/250 [ 21.074030] [ 21.074262] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 21.074367] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.074426] Hardware name: linux,dummy-virt (DT) [ 21.074484] Call trace: [ 21.074798] show_stack+0x20/0x38 (C) [ 21.074868] dump_stack_lvl+0x8c/0xd0 [ 21.074923] print_report+0x118/0x608 [ 21.074978] kasan_report+0xdc/0x128 [ 21.075029] kasan_check_range+0x100/0x1a8 [ 21.075085] __kasan_check_write+0x20/0x30 [ 21.075135] kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc8 [ 21.075195] kasan_bitops_generic+0x11c/0x1c8 [ 21.075249] kunit_try_run_case+0x170/0x3f0 [ 21.075302] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.075359] kthread+0x318/0x620 [ 21.075408] ret_from_fork+0x10/0x20 [ 21.075464] [ 21.079206] Allocated by task 250: [ 21.079488] kasan_save_stack+0x3c/0x68 [ 21.079771] kasan_save_track+0x20/0x40 [ 21.080097] kasan_save_alloc_info+0x40/0x58 [ 21.080515] __kasan_kmalloc+0xd4/0xd8 [ 21.080822] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.081204] kasan_bitops_generic+0xa0/0x1c8 [ 21.081484] kunit_try_run_case+0x170/0x3f0 [ 21.081850] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.082153] kthread+0x318/0x620 [ 21.082463] ret_from_fork+0x10/0x20 [ 21.082752] [ 21.082901] The buggy address belongs to the object at fff00000c1e7a0e0 [ 21.082901] which belongs to the cache kmalloc-16 of size 16 [ 21.083531] The buggy address is located 8 bytes inside of [ 21.083531] allocated 9-byte region [fff00000c1e7a0e0, fff00000c1e7a0e9) [ 21.084199] [ 21.084356] The buggy address belongs to the physical page: [ 21.084556] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e7a [ 21.085761] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.086323] page_type: f5(slab) [ 21.086568] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 21.087254] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.087928] page dumped because: kasan: bad access detected [ 21.088208] [ 21.088402] Memory state around the buggy address: [ 21.088689] fff00000c1e79f80: 00 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.089259] fff00000c1e7a000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.089620] >fff00000c1e7a080: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 21.090029] ^ [ 21.090372] fff00000c1e7a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.090970] fff00000c1e7a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.091359] ================================================================== [ 21.199523] ================================================================== [ 21.199840] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa44/0xbc8 [ 21.200263] Read of size 8 at addr fff00000c1e7a0e8 by task kunit_try_catch/250 [ 21.200478] [ 21.200666] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 21.200764] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.200798] Hardware name: linux,dummy-virt (DT) [ 21.200833] Call trace: [ 21.200858] show_stack+0x20/0x38 (C) [ 21.200914] dump_stack_lvl+0x8c/0xd0 [ 21.200965] print_report+0x118/0x608 [ 21.201017] kasan_report+0xdc/0x128 [ 21.201070] __asan_report_load8_noabort+0x20/0x30 [ 21.201121] kasan_bitops_test_and_modify.constprop.0+0xa44/0xbc8 [ 21.201183] kasan_bitops_generic+0x11c/0x1c8 [ 21.201238] kunit_try_run_case+0x170/0x3f0 [ 21.201291] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.201350] kthread+0x318/0x620 [ 21.201402] ret_from_fork+0x10/0x20 [ 21.201456] [ 21.205667] Allocated by task 250: [ 21.206063] kasan_save_stack+0x3c/0x68 [ 21.206389] kasan_save_track+0x20/0x40 [ 21.206559] kasan_save_alloc_info+0x40/0x58 [ 21.206728] __kasan_kmalloc+0xd4/0xd8 [ 21.207270] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.207812] kasan_bitops_generic+0xa0/0x1c8 [ 21.208008] kunit_try_run_case+0x170/0x3f0 [ 21.208360] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.208674] kthread+0x318/0x620 [ 21.208901] ret_from_fork+0x10/0x20 [ 21.209206] [ 21.209331] The buggy address belongs to the object at fff00000c1e7a0e0 [ 21.209331] which belongs to the cache kmalloc-16 of size 16 [ 21.209883] The buggy address is located 8 bytes inside of [ 21.209883] allocated 9-byte region [fff00000c1e7a0e0, fff00000c1e7a0e9) [ 21.210426] [ 21.210616] The buggy address belongs to the physical page: [ 21.210892] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e7a [ 21.211362] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.211798] page_type: f5(slab) [ 21.211993] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 21.212327] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.212692] page dumped because: kasan: bad access detected [ 21.212975] [ 21.213150] Memory state around the buggy address: [ 21.213436] fff00000c1e79f80: 00 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.213895] fff00000c1e7a000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.214260] >fff00000c1e7a080: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 21.214612] ^ [ 21.214882] fff00000c1e7a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.215310] fff00000c1e7a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.215635] ================================================================== [ 21.133756] ================================================================== [ 21.134134] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa50/0xbc8 [ 21.134818] Read of size 8 at addr fff00000c1e7a0e8 by task kunit_try_catch/250 [ 21.135871] [ 21.136127] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 21.136243] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.136277] Hardware name: linux,dummy-virt (DT) [ 21.136314] Call trace: [ 21.136343] show_stack+0x20/0x38 (C) [ 21.136405] dump_stack_lvl+0x8c/0xd0 [ 21.136458] print_report+0x118/0x608 [ 21.136511] kasan_report+0xdc/0x128 [ 21.136562] __asan_report_load8_noabort+0x20/0x30 [ 21.136614] kasan_bitops_test_and_modify.constprop.0+0xa50/0xbc8 [ 21.136674] kasan_bitops_generic+0x11c/0x1c8 [ 21.136727] kunit_try_run_case+0x170/0x3f0 [ 21.136803] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.136859] kthread+0x318/0x620 [ 21.136909] ret_from_fork+0x10/0x20 [ 21.136965] [ 21.140450] Allocated by task 250: [ 21.140732] kasan_save_stack+0x3c/0x68 [ 21.141036] kasan_save_track+0x20/0x40 [ 21.141333] kasan_save_alloc_info+0x40/0x58 [ 21.141712] __kasan_kmalloc+0xd4/0xd8 [ 21.141954] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.142313] kasan_bitops_generic+0xa0/0x1c8 [ 21.142591] kunit_try_run_case+0x170/0x3f0 [ 21.142934] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.143297] kthread+0x318/0x620 [ 21.143590] ret_from_fork+0x10/0x20 [ 21.143854] [ 21.143966] The buggy address belongs to the object at fff00000c1e7a0e0 [ 21.143966] which belongs to the cache kmalloc-16 of size 16 [ 21.144634] The buggy address is located 8 bytes inside of [ 21.144634] allocated 9-byte region [fff00000c1e7a0e0, fff00000c1e7a0e9) [ 21.145330] [ 21.145526] The buggy address belongs to the physical page: [ 21.145899] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e7a [ 21.146233] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.146479] page_type: f5(slab) [ 21.146643] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 21.147113] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.147583] page dumped because: kasan: bad access detected [ 21.148006] [ 21.148181] Memory state around the buggy address: [ 21.148510] fff00000c1e79f80: 00 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.149006] fff00000c1e7a000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.149427] >fff00000c1e7a080: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 21.149848] ^ [ 21.150222] fff00000c1e7a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.150684] fff00000c1e7a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.151083] ================================================================== [ 21.169406] ================================================================== [ 21.169816] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xad4/0xbc8 [ 21.170238] Read of size 8 at addr fff00000c1e7a0e8 by task kunit_try_catch/250 [ 21.170668] [ 21.170880] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 21.170983] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.171020] Hardware name: linux,dummy-virt (DT) [ 21.171058] Call trace: [ 21.171086] show_stack+0x20/0x38 (C) [ 21.171146] dump_stack_lvl+0x8c/0xd0 [ 21.171204] print_report+0x118/0x608 [ 21.171257] kasan_report+0xdc/0x128 [ 21.171309] __asan_report_load8_noabort+0x20/0x30 [ 21.171366] kasan_bitops_test_and_modify.constprop.0+0xad4/0xbc8 [ 21.171427] kasan_bitops_generic+0x11c/0x1c8 [ 21.171481] kunit_try_run_case+0x170/0x3f0 [ 21.171537] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.171597] kthread+0x318/0x620 [ 21.171649] ret_from_fork+0x10/0x20 [ 21.171706] [ 21.174313] Allocated by task 250: [ 21.174628] kasan_save_stack+0x3c/0x68 [ 21.174968] kasan_save_track+0x20/0x40 [ 21.175175] kasan_save_alloc_info+0x40/0x58 [ 21.175499] __kasan_kmalloc+0xd4/0xd8 [ 21.175708] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.175984] kasan_bitops_generic+0xa0/0x1c8 [ 21.176257] kunit_try_run_case+0x170/0x3f0 [ 21.176517] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.176842] kthread+0x318/0x620 [ 21.177097] ret_from_fork+0x10/0x20 [ 21.177286] [ 21.177391] The buggy address belongs to the object at fff00000c1e7a0e0 [ 21.177391] which belongs to the cache kmalloc-16 of size 16 [ 21.177720] The buggy address is located 8 bytes inside of [ 21.177720] allocated 9-byte region [fff00000c1e7a0e0, fff00000c1e7a0e9) [ 21.178427] [ 21.178595] The buggy address belongs to the physical page: [ 21.178884] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e7a [ 21.179334] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.179633] page_type: f5(slab) [ 21.179861] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 21.180295] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.180557] page dumped because: kasan: bad access detected [ 21.180877] [ 21.181004] Memory state around the buggy address: [ 21.181341] fff00000c1e79f80: 00 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.181773] fff00000c1e7a000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.182147] >fff00000c1e7a080: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 21.182531] ^ [ 21.182895] fff00000c1e7a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.183279] fff00000c1e7a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.183624] ================================================================== [ 21.152326] ================================================================== [ 21.152630] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc8 [ 21.153242] Write of size 8 at addr fff00000c1e7a0e8 by task kunit_try_catch/250 [ 21.153777] [ 21.153941] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 21.154041] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.154085] Hardware name: linux,dummy-virt (DT) [ 21.154127] Call trace: [ 21.154176] show_stack+0x20/0x38 (C) [ 21.154239] dump_stack_lvl+0x8c/0xd0 [ 21.154295] print_report+0x118/0x608 [ 21.154372] kasan_report+0xdc/0x128 [ 21.154435] kasan_check_range+0x100/0x1a8 [ 21.154493] __kasan_check_write+0x20/0x30 [ 21.154547] kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc8 [ 21.155063] kasan_bitops_generic+0x11c/0x1c8 [ 21.155173] kunit_try_run_case+0x170/0x3f0 [ 21.155237] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.155301] kthread+0x318/0x620 [ 21.155357] ret_from_fork+0x10/0x20 [ 21.155416] [ 21.158097] Allocated by task 250: [ 21.158281] kasan_save_stack+0x3c/0x68 [ 21.158467] kasan_save_track+0x20/0x40 [ 21.158629] kasan_save_alloc_info+0x40/0x58 [ 21.158870] __kasan_kmalloc+0xd4/0xd8 [ 21.159164] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.159487] kasan_bitops_generic+0xa0/0x1c8 [ 21.159871] kunit_try_run_case+0x170/0x3f0 [ 21.160216] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.160546] kthread+0x318/0x620 [ 21.160789] ret_from_fork+0x10/0x20 [ 21.161043] [ 21.161215] The buggy address belongs to the object at fff00000c1e7a0e0 [ 21.161215] which belongs to the cache kmalloc-16 of size 16 [ 21.162006] The buggy address is located 8 bytes inside of [ 21.162006] allocated 9-byte region [fff00000c1e7a0e0, fff00000c1e7a0e9) [ 21.162588] [ 21.162735] The buggy address belongs to the physical page: [ 21.163314] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e7a [ 21.163774] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.164126] page_type: f5(slab) [ 21.164451] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 21.164965] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.165379] page dumped because: kasan: bad access detected [ 21.165762] [ 21.165903] Memory state around the buggy address: [ 21.166207] fff00000c1e79f80: 00 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.166627] fff00000c1e7a000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.166870] >fff00000c1e7a080: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 21.167342] ^ [ 21.167922] fff00000c1e7a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.168264] fff00000c1e7a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.168634] ================================================================== [ 21.216459] ================================================================== [ 21.216843] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa8c/0xbc8 [ 21.217141] Read of size 8 at addr fff00000c1e7a0e8 by task kunit_try_catch/250 [ 21.217420] [ 21.217561] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 21.217661] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.217695] Hardware name: linux,dummy-virt (DT) [ 21.217732] Call trace: [ 21.217781] show_stack+0x20/0x38 (C) [ 21.217839] dump_stack_lvl+0x8c/0xd0 [ 21.217926] print_report+0x118/0x608 [ 21.217981] kasan_report+0xdc/0x128 [ 21.218035] __asan_report_load8_noabort+0x20/0x30 [ 21.218136] kasan_bitops_test_and_modify.constprop.0+0xa8c/0xbc8 [ 21.218212] kasan_bitops_generic+0x11c/0x1c8 [ 21.218267] kunit_try_run_case+0x170/0x3f0 [ 21.218324] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.218383] kthread+0x318/0x620 [ 21.218433] ret_from_fork+0x10/0x20 [ 21.218510] [ 21.220634] Allocated by task 250: [ 21.221528] kasan_save_stack+0x3c/0x68 [ 21.221898] kasan_save_track+0x20/0x40 [ 21.222080] kasan_save_alloc_info+0x40/0x58 [ 21.222408] __kasan_kmalloc+0xd4/0xd8 [ 21.222854] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.223175] kasan_bitops_generic+0xa0/0x1c8 [ 21.223359] kunit_try_run_case+0x170/0x3f0 [ 21.223697] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.223997] kthread+0x318/0x620 [ 21.224289] ret_from_fork+0x10/0x20 [ 21.224502] [ 21.224637] The buggy address belongs to the object at fff00000c1e7a0e0 [ 21.224637] which belongs to the cache kmalloc-16 of size 16 [ 21.225148] The buggy address is located 8 bytes inside of [ 21.225148] allocated 9-byte region [fff00000c1e7a0e0, fff00000c1e7a0e9) [ 21.225766] [ 21.225916] The buggy address belongs to the physical page: [ 21.226212] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e7a [ 21.226568] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.226974] page_type: f5(slab) [ 21.227291] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 21.227651] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.227963] page dumped because: kasan: bad access detected [ 21.228195] [ 21.228379] Memory state around the buggy address: [ 21.228671] fff00000c1e79f80: 00 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.228939] fff00000c1e7a000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.229319] >fff00000c1e7a080: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 21.229689] ^ [ 21.230014] fff00000c1e7a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.230324] fff00000c1e7a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.230657] ==================================================================
[ 14.663722] ================================================================== [ 14.664215] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90 [ 14.664499] Write of size 8 at addr ffff888101b28068 by task kunit_try_catch/269 [ 14.664811] [ 14.664938] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 14.664982] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.664995] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.665018] Call Trace: [ 14.665037] <TASK> [ 14.665064] dump_stack_lvl+0x73/0xb0 [ 14.665093] print_report+0xd1/0x650 [ 14.665114] ? __virt_addr_valid+0x1db/0x2d0 [ 14.665137] ? kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90 [ 14.665165] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.665191] ? kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90 [ 14.665218] kasan_report+0x140/0x180 [ 14.665240] ? kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90 [ 14.665272] kasan_check_range+0x10c/0x1c0 [ 14.665295] __kasan_check_write+0x18/0x20 [ 14.665319] kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90 [ 14.665345] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.665373] ? __kmalloc_cache_noprof+0x18a/0x420 [ 14.665397] ? trace_hardirqs_on+0x37/0xe0 [ 14.665420] ? kasan_bitops_generic+0x93/0x1c0 [ 14.665446] kasan_bitops_generic+0x122/0x1c0 [ 14.665469] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.665493] ? __pfx_read_tsc+0x10/0x10 [ 14.665515] ? ktime_get_ts64+0x86/0x230 [ 14.665540] kunit_try_run_case+0x1a6/0x480 [ 14.665564] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.665585] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 14.665606] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.665631] ? __kthread_parkme+0x82/0x160 [ 14.665654] ? preempt_count_sub+0x50/0x80 [ 14.665679] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.665701] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.665726] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.665758] kthread+0x324/0x6e0 [ 14.665779] ? trace_preempt_on+0x20/0xc0 [ 14.665801] ? __pfx_kthread+0x10/0x10 [ 14.665823] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.665856] ? calculate_sigpending+0x7b/0xa0 [ 14.665877] ? __pfx_kthread+0x10/0x10 [ 14.665900] ret_from_fork+0x41/0x80 [ 14.665920] ? __pfx_kthread+0x10/0x10 [ 14.665942] ret_from_fork_asm+0x1a/0x30 [ 14.665974] </TASK> [ 14.665985] [ 14.678062] Allocated by task 269: [ 14.678472] kasan_save_stack+0x45/0x70 [ 14.678807] kasan_save_track+0x18/0x40 [ 14.679127] kasan_save_alloc_info+0x3b/0x50 [ 14.679329] __kasan_kmalloc+0xb7/0xc0 [ 14.679498] __kmalloc_cache_noprof+0x18a/0x420 [ 14.679693] kasan_bitops_generic+0x93/0x1c0 [ 14.679897] kunit_try_run_case+0x1a6/0x480 [ 14.680341] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.680824] kthread+0x324/0x6e0 [ 14.681093] ret_from_fork+0x41/0x80 [ 14.681392] ret_from_fork_asm+0x1a/0x30 [ 14.681781] [ 14.682011] The buggy address belongs to the object at ffff888101b28060 [ 14.682011] which belongs to the cache kmalloc-16 of size 16 [ 14.682625] The buggy address is located 8 bytes inside of [ 14.682625] allocated 9-byte region [ffff888101b28060, ffff888101b28069) [ 14.683211] [ 14.683312] The buggy address belongs to the physical page: [ 14.683538] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b28 [ 14.684188] flags: 0x200000000000000(node=0|zone=2) [ 14.684517] page_type: f5(slab) [ 14.684803] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.685440] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.685948] page dumped because: kasan: bad access detected [ 14.686409] [ 14.686674] Memory state around the buggy address: [ 14.686969] ffff888101b27f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.687477] ffff888101b27f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.687779] >ffff888101b28000: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 14.688309] ^ [ 14.688637] ffff888101b28080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.689257] ffff888101b28100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.689695] ================================================================== [ 14.623318] ================================================================== [ 14.623821] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90 [ 14.624759] Write of size 8 at addr ffff888101b28068 by task kunit_try_catch/269 [ 14.625057] [ 14.625146] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 14.625211] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.625224] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.625246] Call Trace: [ 14.625267] <TASK> [ 14.625305] dump_stack_lvl+0x73/0xb0 [ 14.625334] print_report+0xd1/0x650 [ 14.625356] ? __virt_addr_valid+0x1db/0x2d0 [ 14.625397] ? kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90 [ 14.625423] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.625448] ? kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90 [ 14.625475] kasan_report+0x140/0x180 [ 14.625496] ? kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90 [ 14.625526] kasan_check_range+0x10c/0x1c0 [ 14.625567] __kasan_check_write+0x18/0x20 [ 14.625590] kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90 [ 14.625617] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.625657] ? __kmalloc_cache_noprof+0x18a/0x420 [ 14.625695] ? trace_hardirqs_on+0x37/0xe0 [ 14.625718] ? kasan_bitops_generic+0x93/0x1c0 [ 14.625749] kasan_bitops_generic+0x122/0x1c0 [ 14.625785] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.625823] ? __pfx_read_tsc+0x10/0x10 [ 14.625854] ? ktime_get_ts64+0x86/0x230 [ 14.625879] kunit_try_run_case+0x1a6/0x480 [ 14.625902] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.625924] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 14.625947] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.625972] ? __kthread_parkme+0x82/0x160 [ 14.625994] ? preempt_count_sub+0x50/0x80 [ 14.626019] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.626042] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.626068] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.626094] kthread+0x324/0x6e0 [ 14.626115] ? trace_preempt_on+0x20/0xc0 [ 14.626137] ? __pfx_kthread+0x10/0x10 [ 14.626160] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.626183] ? calculate_sigpending+0x7b/0xa0 [ 14.626219] ? __pfx_kthread+0x10/0x10 [ 14.626242] ret_from_fork+0x41/0x80 [ 14.626261] ? __pfx_kthread+0x10/0x10 [ 14.626283] ret_from_fork_asm+0x1a/0x30 [ 14.626314] </TASK> [ 14.626325] [ 14.634553] Allocated by task 269: [ 14.634775] kasan_save_stack+0x45/0x70 [ 14.635004] kasan_save_track+0x18/0x40 [ 14.635216] kasan_save_alloc_info+0x3b/0x50 [ 14.635449] __kasan_kmalloc+0xb7/0xc0 [ 14.635593] __kmalloc_cache_noprof+0x18a/0x420 [ 14.635804] kasan_bitops_generic+0x93/0x1c0 [ 14.636093] kunit_try_run_case+0x1a6/0x480 [ 14.636387] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.636572] kthread+0x324/0x6e0 [ 14.636695] ret_from_fork+0x41/0x80 [ 14.636821] ret_from_fork_asm+0x1a/0x30 [ 14.636976] [ 14.637050] The buggy address belongs to the object at ffff888101b28060 [ 14.637050] which belongs to the cache kmalloc-16 of size 16 [ 14.637643] The buggy address is located 8 bytes inside of [ 14.637643] allocated 9-byte region [ffff888101b28060, ffff888101b28069) [ 14.638191] [ 14.638386] The buggy address belongs to the physical page: [ 14.638751] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b28 [ 14.639152] flags: 0x200000000000000(node=0|zone=2) [ 14.639404] page_type: f5(slab) [ 14.639585] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.639925] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.640327] page dumped because: kasan: bad access detected [ 14.640718] [ 14.640816] Memory state around the buggy address: [ 14.640990] ffff888101b27f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.641383] ffff888101b27f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.641766] >ffff888101b28000: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 14.642122] ^ [ 14.642338] ffff888101b28080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.642553] ffff888101b28100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.642784] ================================================================== [ 14.690542] ================================================================== [ 14.690859] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90 [ 14.691143] Write of size 8 at addr ffff888101b28068 by task kunit_try_catch/269 [ 14.691488] [ 14.691600] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 14.691645] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.691658] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.691680] Call Trace: [ 14.691701] <TASK> [ 14.691724] dump_stack_lvl+0x73/0xb0 [ 14.691751] print_report+0xd1/0x650 [ 14.691772] ? __virt_addr_valid+0x1db/0x2d0 [ 14.691795] ? kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90 [ 14.691821] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.691858] ? kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90 [ 14.691884] kasan_report+0x140/0x180 [ 14.691905] ? kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90 [ 14.691936] kasan_check_range+0x10c/0x1c0 [ 14.691958] __kasan_check_write+0x18/0x20 [ 14.691980] kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90 [ 14.692007] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.692033] ? __kmalloc_cache_noprof+0x18a/0x420 [ 14.692067] ? trace_hardirqs_on+0x37/0xe0 [ 14.692092] ? kasan_bitops_generic+0x93/0x1c0 [ 14.692118] kasan_bitops_generic+0x122/0x1c0 [ 14.692141] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.692165] ? __pfx_read_tsc+0x10/0x10 [ 14.692188] ? ktime_get_ts64+0x86/0x230 [ 14.692213] kunit_try_run_case+0x1a6/0x480 [ 14.692236] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.692258] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 14.692280] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.692308] ? __kthread_parkme+0x82/0x160 [ 14.692330] ? preempt_count_sub+0x50/0x80 [ 14.692356] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.692378] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.692403] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.692431] kthread+0x324/0x6e0 [ 14.692453] ? trace_preempt_on+0x20/0xc0 [ 14.692475] ? __pfx_kthread+0x10/0x10 [ 14.692497] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.692520] ? calculate_sigpending+0x7b/0xa0 [ 14.692542] ? __pfx_kthread+0x10/0x10 [ 14.692564] ret_from_fork+0x41/0x80 [ 14.692583] ? __pfx_kthread+0x10/0x10 [ 14.692606] ret_from_fork_asm+0x1a/0x30 [ 14.692637] </TASK> [ 14.692648] [ 14.700620] Allocated by task 269: [ 14.700790] kasan_save_stack+0x45/0x70 [ 14.700980] kasan_save_track+0x18/0x40 [ 14.701278] kasan_save_alloc_info+0x3b/0x50 [ 14.701464] __kasan_kmalloc+0xb7/0xc0 [ 14.701627] __kmalloc_cache_noprof+0x18a/0x420 [ 14.701830] kasan_bitops_generic+0x93/0x1c0 [ 14.702050] kunit_try_run_case+0x1a6/0x480 [ 14.702224] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.702470] kthread+0x324/0x6e0 [ 14.702639] ret_from_fork+0x41/0x80 [ 14.702796] ret_from_fork_asm+0x1a/0x30 [ 14.702993] [ 14.703117] The buggy address belongs to the object at ffff888101b28060 [ 14.703117] which belongs to the cache kmalloc-16 of size 16 [ 14.703481] The buggy address is located 8 bytes inside of [ 14.703481] allocated 9-byte region [ffff888101b28060, ffff888101b28069) [ 14.703829] [ 14.703921] The buggy address belongs to the physical page: [ 14.704174] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b28 [ 14.704710] flags: 0x200000000000000(node=0|zone=2) [ 14.704937] page_type: f5(slab) [ 14.705062] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.705299] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.705525] page dumped because: kasan: bad access detected [ 14.705753] [ 14.705857] Memory state around the buggy address: [ 14.706121] ffff888101b27f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.706448] ffff888101b27f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.706768] >ffff888101b28000: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 14.707107] ^ [ 14.707411] ffff888101b28080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.707735] ffff888101b28100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.708072] ================================================================== [ 14.747209] ================================================================== [ 14.747471] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90 [ 14.747896] Read of size 8 at addr ffff888101b28068 by task kunit_try_catch/269 [ 14.748219] [ 14.748329] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 14.748375] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.748388] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.748411] Call Trace: [ 14.748436] <TASK> [ 14.748457] dump_stack_lvl+0x73/0xb0 [ 14.748487] print_report+0xd1/0x650 [ 14.748509] ? __virt_addr_valid+0x1db/0x2d0 [ 14.748536] ? kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90 [ 14.748565] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.748592] ? kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90 [ 14.748618] kasan_report+0x140/0x180 [ 14.748639] ? kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90 [ 14.748669] __asan_report_load8_noabort+0x18/0x20 [ 14.748693] kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90 [ 14.748719] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.748746] ? __kmalloc_cache_noprof+0x18a/0x420 [ 14.748769] ? trace_hardirqs_on+0x37/0xe0 [ 14.748792] ? kasan_bitops_generic+0x93/0x1c0 [ 14.748818] kasan_bitops_generic+0x122/0x1c0 [ 14.748852] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.748878] ? __pfx_read_tsc+0x10/0x10 [ 14.748899] ? ktime_get_ts64+0x86/0x230 [ 14.748926] kunit_try_run_case+0x1a6/0x480 [ 14.748951] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.748973] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 14.748995] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.749021] ? __kthread_parkme+0x82/0x160 [ 14.749046] ? preempt_count_sub+0x50/0x80 [ 14.749082] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.749105] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.749131] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.749157] kthread+0x324/0x6e0 [ 14.749179] ? trace_preempt_on+0x20/0xc0 [ 14.749202] ? __pfx_kthread+0x10/0x10 [ 14.749224] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.749247] ? calculate_sigpending+0x7b/0xa0 [ 14.749268] ? __pfx_kthread+0x10/0x10 [ 14.749291] ret_from_fork+0x41/0x80 [ 14.749309] ? __pfx_kthread+0x10/0x10 [ 14.749331] ret_from_fork_asm+0x1a/0x30 [ 14.749362] </TASK> [ 14.749373] [ 14.756914] Allocated by task 269: [ 14.757044] kasan_save_stack+0x45/0x70 [ 14.757187] kasan_save_track+0x18/0x40 [ 14.757321] kasan_save_alloc_info+0x3b/0x50 [ 14.757469] __kasan_kmalloc+0xb7/0xc0 [ 14.757783] __kmalloc_cache_noprof+0x18a/0x420 [ 14.758024] kasan_bitops_generic+0x93/0x1c0 [ 14.758243] kunit_try_run_case+0x1a6/0x480 [ 14.758458] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.758723] kthread+0x324/0x6e0 [ 14.758907] ret_from_fork+0x41/0x80 [ 14.759139] ret_from_fork_asm+0x1a/0x30 [ 14.759340] [ 14.759440] The buggy address belongs to the object at ffff888101b28060 [ 14.759440] which belongs to the cache kmalloc-16 of size 16 [ 14.759853] The buggy address is located 8 bytes inside of [ 14.759853] allocated 9-byte region [ffff888101b28060, ffff888101b28069) [ 14.760360] [ 14.760456] The buggy address belongs to the physical page: [ 14.760956] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b28 [ 14.761263] flags: 0x200000000000000(node=0|zone=2) [ 14.761429] page_type: f5(slab) [ 14.761576] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.761941] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.762331] page dumped because: kasan: bad access detected [ 14.762556] [ 14.762640] Memory state around the buggy address: [ 14.762860] ffff888101b27f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.763189] ffff888101b27f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.763407] >ffff888101b28000: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 14.763619] ^ [ 14.763818] ffff888101b28080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.764269] ffff888101b28100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.764581] ================================================================== [ 14.708970] ================================================================== [ 14.709693] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90 [ 14.710122] Write of size 8 at addr ffff888101b28068 by task kunit_try_catch/269 [ 14.710349] [ 14.710434] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 14.710477] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.710489] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.710510] Call Trace: [ 14.710531] <TASK> [ 14.710550] dump_stack_lvl+0x73/0xb0 [ 14.710578] print_report+0xd1/0x650 [ 14.710600] ? __virt_addr_valid+0x1db/0x2d0 [ 14.710623] ? kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90 [ 14.710649] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.710674] ? kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90 [ 14.710700] kasan_report+0x140/0x180 [ 14.710721] ? kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90 [ 14.710751] kasan_check_range+0x10c/0x1c0 [ 14.710774] __kasan_check_write+0x18/0x20 [ 14.710796] kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90 [ 14.710822] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.710859] ? __kmalloc_cache_noprof+0x18a/0x420 [ 14.710884] ? trace_hardirqs_on+0x37/0xe0 [ 14.710906] ? kasan_bitops_generic+0x93/0x1c0 [ 14.710931] kasan_bitops_generic+0x122/0x1c0 [ 14.710954] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.710977] ? __pfx_read_tsc+0x10/0x10 [ 14.710999] ? ktime_get_ts64+0x86/0x230 [ 14.711024] kunit_try_run_case+0x1a6/0x480 [ 14.711047] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.711080] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 14.711102] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.711127] ? __kthread_parkme+0x82/0x160 [ 14.711150] ? preempt_count_sub+0x50/0x80 [ 14.711176] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.711198] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.711226] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.711252] kthread+0x324/0x6e0 [ 14.711273] ? trace_preempt_on+0x20/0xc0 [ 14.711295] ? __pfx_kthread+0x10/0x10 [ 14.711317] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.711341] ? calculate_sigpending+0x7b/0xa0 [ 14.711363] ? __pfx_kthread+0x10/0x10 [ 14.711386] ret_from_fork+0x41/0x80 [ 14.711404] ? __pfx_kthread+0x10/0x10 [ 14.711425] ret_from_fork_asm+0x1a/0x30 [ 14.711457] </TASK> [ 14.711467] [ 14.719661] Allocated by task 269: [ 14.719806] kasan_save_stack+0x45/0x70 [ 14.719981] kasan_save_track+0x18/0x40 [ 14.720306] kasan_save_alloc_info+0x3b/0x50 [ 14.720516] __kasan_kmalloc+0xb7/0xc0 [ 14.720697] __kmalloc_cache_noprof+0x18a/0x420 [ 14.720866] kasan_bitops_generic+0x93/0x1c0 [ 14.721015] kunit_try_run_case+0x1a6/0x480 [ 14.721159] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.721412] kthread+0x324/0x6e0 [ 14.721655] ret_from_fork+0x41/0x80 [ 14.721848] ret_from_fork_asm+0x1a/0x30 [ 14.722062] [ 14.722157] The buggy address belongs to the object at ffff888101b28060 [ 14.722157] which belongs to the cache kmalloc-16 of size 16 [ 14.722574] The buggy address is located 8 bytes inside of [ 14.722574] allocated 9-byte region [ffff888101b28060, ffff888101b28069) [ 14.722932] [ 14.723005] The buggy address belongs to the physical page: [ 14.723189] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b28 [ 14.723765] flags: 0x200000000000000(node=0|zone=2) [ 14.724020] page_type: f5(slab) [ 14.724192] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.724535] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.724784] page dumped because: kasan: bad access detected [ 14.724963] [ 14.725032] Memory state around the buggy address: [ 14.725329] ffff888101b27f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.725643] ffff888101b27f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.725976] >ffff888101b28000: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 14.726254] ^ [ 14.726453] ffff888101b28080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.726668] ffff888101b28100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.726934] ================================================================== [ 14.645115] ================================================================== [ 14.645468] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90 [ 14.646085] Write of size 8 at addr ffff888101b28068 by task kunit_try_catch/269 [ 14.646486] [ 14.646609] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 14.646661] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.646676] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.646699] Call Trace: [ 14.646714] <TASK> [ 14.646735] dump_stack_lvl+0x73/0xb0 [ 14.646765] print_report+0xd1/0x650 [ 14.646788] ? __virt_addr_valid+0x1db/0x2d0 [ 14.646811] ? kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90 [ 14.646851] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.646877] ? kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90 [ 14.646903] kasan_report+0x140/0x180 [ 14.646924] ? kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90 [ 14.646955] kasan_check_range+0x10c/0x1c0 [ 14.646977] __kasan_check_write+0x18/0x20 [ 14.646999] kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90 [ 14.647026] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.647052] ? __kmalloc_cache_noprof+0x18a/0x420 [ 14.647076] ? trace_hardirqs_on+0x37/0xe0 [ 14.647099] ? kasan_bitops_generic+0x93/0x1c0 [ 14.647124] kasan_bitops_generic+0x122/0x1c0 [ 14.647147] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.647170] ? __pfx_read_tsc+0x10/0x10 [ 14.647192] ? ktime_get_ts64+0x86/0x230 [ 14.647217] kunit_try_run_case+0x1a6/0x480 [ 14.647242] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.647263] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 14.647285] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.647310] ? __kthread_parkme+0x82/0x160 [ 14.647333] ? preempt_count_sub+0x50/0x80 [ 14.647357] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.647381] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.647406] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.647432] kthread+0x324/0x6e0 [ 14.647454] ? trace_preempt_on+0x20/0xc0 [ 14.647476] ? __pfx_kthread+0x10/0x10 [ 14.647497] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.647520] ? calculate_sigpending+0x7b/0xa0 [ 14.647542] ? __pfx_kthread+0x10/0x10 [ 14.647565] ret_from_fork+0x41/0x80 [ 14.647583] ? __pfx_kthread+0x10/0x10 [ 14.647605] ret_from_fork_asm+0x1a/0x30 [ 14.647637] </TASK> [ 14.647648] [ 14.655610] Allocated by task 269: [ 14.655753] kasan_save_stack+0x45/0x70 [ 14.655903] kasan_save_track+0x18/0x40 [ 14.656106] kasan_save_alloc_info+0x3b/0x50 [ 14.656319] __kasan_kmalloc+0xb7/0xc0 [ 14.656498] __kmalloc_cache_noprof+0x18a/0x420 [ 14.656713] kasan_bitops_generic+0x93/0x1c0 [ 14.656902] kunit_try_run_case+0x1a6/0x480 [ 14.657103] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.657325] kthread+0x324/0x6e0 [ 14.657559] ret_from_fork+0x41/0x80 [ 14.657750] ret_from_fork_asm+0x1a/0x30 [ 14.657920] [ 14.658018] The buggy address belongs to the object at ffff888101b28060 [ 14.658018] which belongs to the cache kmalloc-16 of size 16 [ 14.658540] The buggy address is located 8 bytes inside of [ 14.658540] allocated 9-byte region [ffff888101b28060, ffff888101b28069) [ 14.658933] [ 14.659031] The buggy address belongs to the physical page: [ 14.659337] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b28 [ 14.659611] flags: 0x200000000000000(node=0|zone=2) [ 14.659864] page_type: f5(slab) [ 14.660009] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.660231] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.660447] page dumped because: kasan: bad access detected [ 14.660611] [ 14.660678] Memory state around the buggy address: [ 14.660906] ffff888101b27f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.661468] ffff888101b27f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.661780] >ffff888101b28000: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 14.662115] ^ [ 14.662316] ffff888101b28080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.662523] ffff888101b28100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.662887] ================================================================== [ 14.600279] ================================================================== [ 14.600688] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90 [ 14.601231] Write of size 8 at addr ffff888101b28068 by task kunit_try_catch/269 [ 14.601527] [ 14.601642] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 14.601688] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.601701] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.601723] Call Trace: [ 14.601736] <TASK> [ 14.601761] dump_stack_lvl+0x73/0xb0 [ 14.601791] print_report+0xd1/0x650 [ 14.601813] ? __virt_addr_valid+0x1db/0x2d0 [ 14.601846] ? kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90 [ 14.601874] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.601899] ? kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90 [ 14.601926] kasan_report+0x140/0x180 [ 14.601947] ? kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90 [ 14.601978] kasan_check_range+0x10c/0x1c0 [ 14.602001] __kasan_check_write+0x18/0x20 [ 14.602023] kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90 [ 14.602060] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.602087] ? __kmalloc_cache_noprof+0x18a/0x420 [ 14.602130] ? trace_hardirqs_on+0x37/0xe0 [ 14.602168] ? kasan_bitops_generic+0x93/0x1c0 [ 14.602194] kasan_bitops_generic+0x122/0x1c0 [ 14.602217] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.602240] ? __pfx_read_tsc+0x10/0x10 [ 14.602263] ? ktime_get_ts64+0x86/0x230 [ 14.602288] kunit_try_run_case+0x1a6/0x480 [ 14.602312] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.602333] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 14.602356] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.602381] ? __kthread_parkme+0x82/0x160 [ 14.602404] ? preempt_count_sub+0x50/0x80 [ 14.602429] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.602451] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.602478] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.602503] kthread+0x324/0x6e0 [ 14.602524] ? trace_preempt_on+0x20/0xc0 [ 14.602547] ? __pfx_kthread+0x10/0x10 [ 14.602568] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.602610] ? calculate_sigpending+0x7b/0xa0 [ 14.602632] ? __pfx_kthread+0x10/0x10 [ 14.602667] ret_from_fork+0x41/0x80 [ 14.602685] ? __pfx_kthread+0x10/0x10 [ 14.602707] ret_from_fork_asm+0x1a/0x30 [ 14.602738] </TASK> [ 14.602750] [ 14.614599] Allocated by task 269: [ 14.614788] kasan_save_stack+0x45/0x70 [ 14.614980] kasan_save_track+0x18/0x40 [ 14.615183] kasan_save_alloc_info+0x3b/0x50 [ 14.615403] __kasan_kmalloc+0xb7/0xc0 [ 14.615585] __kmalloc_cache_noprof+0x18a/0x420 [ 14.615810] kasan_bitops_generic+0x93/0x1c0 [ 14.616022] kunit_try_run_case+0x1a6/0x480 [ 14.616242] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.616445] kthread+0x324/0x6e0 [ 14.616637] ret_from_fork+0x41/0x80 [ 14.616833] ret_from_fork_asm+0x1a/0x30 [ 14.617056] [ 14.617151] The buggy address belongs to the object at ffff888101b28060 [ 14.617151] which belongs to the cache kmalloc-16 of size 16 [ 14.617641] The buggy address is located 8 bytes inside of [ 14.617641] allocated 9-byte region [ffff888101b28060, ffff888101b28069) [ 14.618123] [ 14.618222] The buggy address belongs to the physical page: [ 14.618470] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b28 [ 14.618711] flags: 0x200000000000000(node=0|zone=2) [ 14.618983] page_type: f5(slab) [ 14.619258] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.619607] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.619904] page dumped because: kasan: bad access detected [ 14.620156] [ 14.620243] Memory state around the buggy address: [ 14.620491] ffff888101b27f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.620781] ffff888101b27f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.621089] >ffff888101b28000: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 14.621370] ^ [ 14.621704] ffff888101b28080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.622042] ffff888101b28100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.622329] ================================================================== [ 14.727871] ================================================================== [ 14.728965] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x558/0xd90 [ 14.729489] Read of size 8 at addr ffff888101b28068 by task kunit_try_catch/269 [ 14.729847] [ 14.729942] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 14.729988] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.730000] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.730022] Call Trace: [ 14.730041] <TASK> [ 14.730063] dump_stack_lvl+0x73/0xb0 [ 14.730089] print_report+0xd1/0x650 [ 14.730111] ? __virt_addr_valid+0x1db/0x2d0 [ 14.730134] ? kasan_bitops_test_and_modify.constprop.0+0x558/0xd90 [ 14.730160] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.730185] ? kasan_bitops_test_and_modify.constprop.0+0x558/0xd90 [ 14.730211] kasan_report+0x140/0x180 [ 14.730232] ? kasan_bitops_test_and_modify.constprop.0+0x558/0xd90 [ 14.730263] kasan_check_range+0x10c/0x1c0 [ 14.730285] __kasan_check_read+0x15/0x20 [ 14.730306] kasan_bitops_test_and_modify.constprop.0+0x558/0xd90 [ 14.730333] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.730359] ? __kmalloc_cache_noprof+0x18a/0x420 [ 14.730382] ? trace_hardirqs_on+0x37/0xe0 [ 14.730417] ? kasan_bitops_generic+0x93/0x1c0 [ 14.730443] kasan_bitops_generic+0x122/0x1c0 [ 14.730465] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.730489] ? __pfx_read_tsc+0x10/0x10 [ 14.730511] ? ktime_get_ts64+0x86/0x230 [ 14.730536] kunit_try_run_case+0x1a6/0x480 [ 14.730561] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.730582] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 14.730604] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.730629] ? __kthread_parkme+0x82/0x160 [ 14.730652] ? preempt_count_sub+0x50/0x80 [ 14.730676] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.730699] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.730726] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.730751] kthread+0x324/0x6e0 [ 14.730772] ? trace_preempt_on+0x20/0xc0 [ 14.730794] ? __pfx_kthread+0x10/0x10 [ 14.730816] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.730848] ? calculate_sigpending+0x7b/0xa0 [ 14.730871] ? __pfx_kthread+0x10/0x10 [ 14.730893] ret_from_fork+0x41/0x80 [ 14.730912] ? __pfx_kthread+0x10/0x10 [ 14.730934] ret_from_fork_asm+0x1a/0x30 [ 14.730966] </TASK> [ 14.730976] [ 14.738619] Allocated by task 269: [ 14.738817] kasan_save_stack+0x45/0x70 [ 14.739054] kasan_save_track+0x18/0x40 [ 14.739248] kasan_save_alloc_info+0x3b/0x50 [ 14.739459] __kasan_kmalloc+0xb7/0xc0 [ 14.739645] __kmalloc_cache_noprof+0x18a/0x420 [ 14.739881] kasan_bitops_generic+0x93/0x1c0 [ 14.740097] kunit_try_run_case+0x1a6/0x480 [ 14.740275] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.740491] kthread+0x324/0x6e0 [ 14.740615] ret_from_fork+0x41/0x80 [ 14.740746] ret_from_fork_asm+0x1a/0x30 [ 14.740897] [ 14.740994] The buggy address belongs to the object at ffff888101b28060 [ 14.740994] which belongs to the cache kmalloc-16 of size 16 [ 14.741978] The buggy address is located 8 bytes inside of [ 14.741978] allocated 9-byte region [ffff888101b28060, ffff888101b28069) [ 14.742438] [ 14.742514] The buggy address belongs to the physical page: [ 14.742707] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b28 [ 14.743039] flags: 0x200000000000000(node=0|zone=2) [ 14.743264] page_type: f5(slab) [ 14.743425] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.743783] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.744143] page dumped because: kasan: bad access detected [ 14.744369] [ 14.744454] Memory state around the buggy address: [ 14.744634] ffff888101b27f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.744923] ffff888101b27f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.745246] >ffff888101b28000: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 14.745532] ^ [ 14.745785] ffff888101b28080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.746119] ffff888101b28100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.746398] ================================================================== [ 14.579355] ================================================================== [ 14.579726] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x102/0xd90 [ 14.580616] Write of size 8 at addr ffff888101b28068 by task kunit_try_catch/269 [ 14.580918] [ 14.581016] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 14.581061] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.581074] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.581096] Call Trace: [ 14.581117] <TASK> [ 14.581138] dump_stack_lvl+0x73/0xb0 [ 14.581168] print_report+0xd1/0x650 [ 14.581191] ? __virt_addr_valid+0x1db/0x2d0 [ 14.581214] ? kasan_bitops_test_and_modify.constprop.0+0x102/0xd90 [ 14.581240] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.581295] ? kasan_bitops_test_and_modify.constprop.0+0x102/0xd90 [ 14.581323] kasan_report+0x140/0x180 [ 14.581344] ? kasan_bitops_test_and_modify.constprop.0+0x102/0xd90 [ 14.581394] kasan_check_range+0x10c/0x1c0 [ 14.581417] __kasan_check_write+0x18/0x20 [ 14.581440] kasan_bitops_test_and_modify.constprop.0+0x102/0xd90 [ 14.581466] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.581510] ? __kmalloc_cache_noprof+0x18a/0x420 [ 14.581534] ? trace_hardirqs_on+0x37/0xe0 [ 14.581557] ? kasan_bitops_generic+0x93/0x1c0 [ 14.581583] kasan_bitops_generic+0x122/0x1c0 [ 14.581606] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.581629] ? __pfx_read_tsc+0x10/0x10 [ 14.581668] ? ktime_get_ts64+0x86/0x230 [ 14.581694] kunit_try_run_case+0x1a6/0x480 [ 14.581719] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.581746] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 14.581770] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.581796] ? __kthread_parkme+0x82/0x160 [ 14.581819] ? preempt_count_sub+0x50/0x80 [ 14.581853] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.581876] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.581902] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.581927] kthread+0x324/0x6e0 [ 14.581949] ? trace_preempt_on+0x20/0xc0 [ 14.581971] ? __pfx_kthread+0x10/0x10 [ 14.581993] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.582016] ? calculate_sigpending+0x7b/0xa0 [ 14.582039] ? __pfx_kthread+0x10/0x10 [ 14.582081] ret_from_fork+0x41/0x80 [ 14.582118] ? __pfx_kthread+0x10/0x10 [ 14.582140] ret_from_fork_asm+0x1a/0x30 [ 14.582173] </TASK> [ 14.582184] [ 14.590499] Allocated by task 269: [ 14.590708] kasan_save_stack+0x45/0x70 [ 14.590971] kasan_save_track+0x18/0x40 [ 14.591303] kasan_save_alloc_info+0x3b/0x50 [ 14.591542] __kasan_kmalloc+0xb7/0xc0 [ 14.591726] __kmalloc_cache_noprof+0x18a/0x420 [ 14.591956] kasan_bitops_generic+0x93/0x1c0 [ 14.592248] kunit_try_run_case+0x1a6/0x480 [ 14.592458] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.592719] kthread+0x324/0x6e0 [ 14.592855] ret_from_fork+0x41/0x80 [ 14.593063] ret_from_fork_asm+0x1a/0x30 [ 14.593273] [ 14.593363] The buggy address belongs to the object at ffff888101b28060 [ 14.593363] which belongs to the cache kmalloc-16 of size 16 [ 14.593893] The buggy address is located 8 bytes inside of [ 14.593893] allocated 9-byte region [ffff888101b28060, ffff888101b28069) [ 14.594410] [ 14.594527] The buggy address belongs to the physical page: [ 14.594730] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b28 [ 14.595056] flags: 0x200000000000000(node=0|zone=2) [ 14.595293] page_type: f5(slab) [ 14.595463] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.595832] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.596247] page dumped because: kasan: bad access detected [ 14.596419] [ 14.596488] Memory state around the buggy address: [ 14.596691] ffff888101b27f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.597058] ffff888101b27f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.597401] >ffff888101b28000: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 14.597673] ^ [ 14.597984] ffff888101b28080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.598432] ffff888101b28100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.598700] ==================================================================