Date
June 2, 2025, 2:13 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 20.951064] ================================================================== [ 20.951483] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa4c/0xbc8 [ 20.951787] Read of size 8 at addr fff00000c3e60688 by task kunit_try_catch/251 [ 20.952111] [ 20.952372] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 20.952486] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.952524] Hardware name: linux,dummy-virt (DT) [ 20.952593] Call trace: [ 20.952625] show_stack+0x20/0x38 (C) [ 20.952688] dump_stack_lvl+0x8c/0xd0 [ 20.952746] print_report+0x118/0x608 [ 20.952801] kasan_report+0xdc/0x128 [ 20.952856] __asan_report_load8_noabort+0x20/0x30 [ 20.952911] kasan_bitops_modify.constprop.0+0xa4c/0xbc8 [ 20.952997] kasan_bitops_generic+0x110/0x1c8 [ 20.953059] kunit_try_run_case+0x170/0x3f0 [ 20.953116] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.953186] kthread+0x318/0x620 [ 20.953258] ret_from_fork+0x10/0x20 [ 20.953331] [ 20.957566] Allocated by task 251: [ 20.957821] kasan_save_stack+0x3c/0x68 [ 20.958487] kasan_save_track+0x20/0x40 [ 20.958940] kasan_save_alloc_info+0x40/0x58 [ 20.959371] __kasan_kmalloc+0xd4/0xd8 [ 20.959855] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.960238] kasan_bitops_generic+0xa0/0x1c8 [ 20.960580] kunit_try_run_case+0x170/0x3f0 [ 20.960944] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.961389] kthread+0x318/0x620 [ 20.961724] ret_from_fork+0x10/0x20 [ 20.961958] [ 20.962591] The buggy address belongs to the object at fff00000c3e60680 [ 20.962591] which belongs to the cache kmalloc-16 of size 16 [ 20.963273] The buggy address is located 8 bytes inside of [ 20.963273] allocated 9-byte region [fff00000c3e60680, fff00000c3e60689) [ 20.963804] [ 20.963945] The buggy address belongs to the physical page: [ 20.964207] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103e60 [ 20.964619] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.964967] page_type: f5(slab) [ 20.966042] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 20.966480] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 20.967539] page dumped because: kasan: bad access detected [ 20.968038] [ 20.968268] Memory state around the buggy address: [ 20.968574] fff00000c3e60580: 00 02 fc fc fa fb fc fc fa fb fc fc 00 05 fc fc [ 20.969059] fff00000c3e60600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 20.969566] >fff00000c3e60680: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.970208] ^ [ 20.970442] fff00000c3e60700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.970740] fff00000c3e60780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.971125] ================================================================== [ 20.972689] ================================================================== [ 20.973050] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc8 [ 20.973635] Write of size 8 at addr fff00000c3e60688 by task kunit_try_catch/251 [ 20.974080] [ 20.974249] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 20.974353] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.974388] Hardware name: linux,dummy-virt (DT) [ 20.974433] Call trace: [ 20.974462] show_stack+0x20/0x38 (C) [ 20.974531] dump_stack_lvl+0x8c/0xd0 [ 20.974589] print_report+0x118/0x608 [ 20.974646] kasan_report+0xdc/0x128 [ 20.974699] kasan_check_range+0x100/0x1a8 [ 20.974749] __kasan_check_write+0x20/0x30 [ 20.974802] kasan_bitops_modify.constprop.0+0x1dc/0xbc8 [ 20.974861] kasan_bitops_generic+0x110/0x1c8 [ 20.974966] kunit_try_run_case+0x170/0x3f0 [ 20.975031] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.975091] kthread+0x318/0x620 [ 20.975143] ret_from_fork+0x10/0x20 [ 20.975219] [ 20.979361] Allocated by task 251: [ 20.979687] kasan_save_stack+0x3c/0x68 [ 20.980015] kasan_save_track+0x20/0x40 [ 20.980369] kasan_save_alloc_info+0x40/0x58 [ 20.980563] __kasan_kmalloc+0xd4/0xd8 [ 20.980825] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.981130] kasan_bitops_generic+0xa0/0x1c8 [ 20.981412] kunit_try_run_case+0x170/0x3f0 [ 20.981690] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.982030] kthread+0x318/0x620 [ 20.982544] ret_from_fork+0x10/0x20 [ 20.982791] [ 20.982971] The buggy address belongs to the object at fff00000c3e60680 [ 20.982971] which belongs to the cache kmalloc-16 of size 16 [ 20.983521] The buggy address is located 8 bytes inside of [ 20.983521] allocated 9-byte region [fff00000c3e60680, fff00000c3e60689) [ 20.984173] [ 20.984363] The buggy address belongs to the physical page: [ 20.984666] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103e60 [ 20.985062] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.985526] page_type: f5(slab) [ 20.985724] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 20.986145] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 20.986390] page dumped because: kasan: bad access detected [ 20.987196] [ 20.987443] Memory state around the buggy address: [ 20.988084] fff00000c3e60580: 00 02 fc fc fa fb fc fc fa fb fc fc 00 05 fc fc [ 20.988823] fff00000c3e60600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 20.989071] >fff00000c3e60680: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.989302] ^ [ 20.989461] fff00000c3e60700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.989695] fff00000c3e60780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.989913] ================================================================== [ 21.101943] ================================================================== [ 21.102528] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc8 [ 21.103128] Write of size 8 at addr fff00000c3e60688 by task kunit_try_catch/251 [ 21.103379] [ 21.103518] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 21.103621] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.103654] Hardware name: linux,dummy-virt (DT) [ 21.103695] Call trace: [ 21.103724] show_stack+0x20/0x38 (C) [ 21.103786] dump_stack_lvl+0x8c/0xd0 [ 21.103843] print_report+0x118/0x608 [ 21.103899] kasan_report+0xdc/0x128 [ 21.103950] kasan_check_range+0x100/0x1a8 [ 21.104003] __kasan_check_write+0x20/0x30 [ 21.104056] kasan_bitops_modify.constprop.0+0x3b0/0xbc8 [ 21.104112] kasan_bitops_generic+0x110/0x1c8 [ 21.104184] kunit_try_run_case+0x170/0x3f0 [ 21.104242] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.104301] kthread+0x318/0x620 [ 21.104354] ret_from_fork+0x10/0x20 [ 21.104409] [ 21.109637] Allocated by task 251: [ 21.109926] kasan_save_stack+0x3c/0x68 [ 21.110672] kasan_save_track+0x20/0x40 [ 21.110943] kasan_save_alloc_info+0x40/0x58 [ 21.111490] __kasan_kmalloc+0xd4/0xd8 [ 21.111698] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.112130] kasan_bitops_generic+0xa0/0x1c8 [ 21.112504] kunit_try_run_case+0x170/0x3f0 [ 21.112834] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.113230] kthread+0x318/0x620 [ 21.113460] ret_from_fork+0x10/0x20 [ 21.113708] [ 21.113850] The buggy address belongs to the object at fff00000c3e60680 [ 21.113850] which belongs to the cache kmalloc-16 of size 16 [ 21.114810] The buggy address is located 8 bytes inside of [ 21.114810] allocated 9-byte region [fff00000c3e60680, fff00000c3e60689) [ 21.115449] [ 21.115712] The buggy address belongs to the physical page: [ 21.116095] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103e60 [ 21.116556] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.116875] page_type: f5(slab) [ 21.117096] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 21.117518] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.118020] page dumped because: kasan: bad access detected [ 21.118324] [ 21.119480] Memory state around the buggy address: [ 21.119744] fff00000c3e60580: 00 02 fc fc fa fb fc fc fa fb fc fc 00 05 fc fc [ 21.120021] fff00000c3e60600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.120311] >fff00000c3e60680: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.120569] ^ [ 21.120752] fff00000c3e60700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.121026] fff00000c3e60780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.121926] ================================================================== [ 20.991578] ================================================================== [ 20.991853] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa88/0xbc8 [ 20.992110] Read of size 8 at addr fff00000c3e60688 by task kunit_try_catch/251 [ 20.994328] [ 20.994844] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 20.994969] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.995006] Hardware name: linux,dummy-virt (DT) [ 20.995048] Call trace: [ 20.995077] show_stack+0x20/0x38 (C) [ 20.995146] dump_stack_lvl+0x8c/0xd0 [ 20.995223] print_report+0x118/0x608 [ 20.995283] kasan_report+0xdc/0x128 [ 20.995644] __asan_report_load8_noabort+0x20/0x30 [ 20.995718] kasan_bitops_modify.constprop.0+0xa88/0xbc8 [ 20.995778] kasan_bitops_generic+0x110/0x1c8 [ 20.995831] kunit_try_run_case+0x170/0x3f0 [ 20.995884] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.995942] kthread+0x318/0x620 [ 20.995992] ret_from_fork+0x10/0x20 [ 20.996046] [ 21.000065] Allocated by task 251: [ 21.000445] kasan_save_stack+0x3c/0x68 [ 21.000688] kasan_save_track+0x20/0x40 [ 21.001013] kasan_save_alloc_info+0x40/0x58 [ 21.001318] __kasan_kmalloc+0xd4/0xd8 [ 21.001557] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.001824] kasan_bitops_generic+0xa0/0x1c8 [ 21.002082] kunit_try_run_case+0x170/0x3f0 [ 21.002327] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.002628] kthread+0x318/0x620 [ 21.002844] ret_from_fork+0x10/0x20 [ 21.003090] [ 21.004504] The buggy address belongs to the object at fff00000c3e60680 [ 21.004504] which belongs to the cache kmalloc-16 of size 16 [ 21.005383] The buggy address is located 8 bytes inside of [ 21.005383] allocated 9-byte region [fff00000c3e60680, fff00000c3e60689) [ 21.006330] [ 21.006548] The buggy address belongs to the physical page: [ 21.007092] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103e60 [ 21.007539] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.008010] page_type: f5(slab) [ 21.008312] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 21.008827] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.009355] page dumped because: kasan: bad access detected [ 21.009834] [ 21.009971] Memory state around the buggy address: [ 21.010988] fff00000c3e60580: 00 02 fc fc fa fb fc fc fa fb fc fc 00 05 fc fc [ 21.011651] fff00000c3e60600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.012254] >fff00000c3e60680: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.012721] ^ [ 21.012956] fff00000c3e60700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.013570] fff00000c3e60780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.014052] ================================================================== [ 21.123393] ================================================================== [ 21.123775] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa28/0xbc8 [ 21.124226] Read of size 8 at addr fff00000c3e60688 by task kunit_try_catch/251 [ 21.124637] [ 21.124838] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 21.124944] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.124978] Hardware name: linux,dummy-virt (DT) [ 21.125020] Call trace: [ 21.125049] show_stack+0x20/0x38 (C) [ 21.125113] dump_stack_lvl+0x8c/0xd0 [ 21.125185] print_report+0x118/0x608 [ 21.125245] kasan_report+0xdc/0x128 [ 21.125302] __asan_report_load8_noabort+0x20/0x30 [ 21.125359] kasan_bitops_modify.constprop.0+0xa28/0xbc8 [ 21.125421] kasan_bitops_generic+0x110/0x1c8 [ 21.125479] kunit_try_run_case+0x170/0x3f0 [ 21.125550] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.125615] kthread+0x318/0x620 [ 21.125670] ret_from_fork+0x10/0x20 [ 21.125730] [ 21.129216] Allocated by task 251: [ 21.129553] kasan_save_stack+0x3c/0x68 [ 21.129931] kasan_save_track+0x20/0x40 [ 21.130128] kasan_save_alloc_info+0x40/0x58 [ 21.130960] __kasan_kmalloc+0xd4/0xd8 [ 21.131135] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.131388] kasan_bitops_generic+0xa0/0x1c8 [ 21.131759] kunit_try_run_case+0x170/0x3f0 [ 21.132023] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.132303] kthread+0x318/0x620 [ 21.132540] ret_from_fork+0x10/0x20 [ 21.132772] [ 21.132927] The buggy address belongs to the object at fff00000c3e60680 [ 21.132927] which belongs to the cache kmalloc-16 of size 16 [ 21.134785] The buggy address is located 8 bytes inside of [ 21.134785] allocated 9-byte region [fff00000c3e60680, fff00000c3e60689) [ 21.135166] [ 21.135337] The buggy address belongs to the physical page: [ 21.135732] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103e60 [ 21.136075] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.136537] page_type: f5(slab) [ 21.136759] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 21.137130] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.137480] page dumped because: kasan: bad access detected [ 21.137787] [ 21.137960] Memory state around the buggy address: [ 21.138538] fff00000c3e60580: 00 02 fc fc fa fb fc fc fa fb fc fc 00 05 fc fc [ 21.138919] fff00000c3e60600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.139241] >fff00000c3e60680: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.139549] ^ [ 21.139763] fff00000c3e60700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.140070] fff00000c3e60780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.140933] ================================================================== [ 21.015553] ================================================================== [ 21.015896] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc8 [ 21.016331] Write of size 8 at addr fff00000c3e60688 by task kunit_try_catch/251 [ 21.016638] [ 21.016830] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 21.016928] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.016963] Hardware name: linux,dummy-virt (DT) [ 21.017003] Call trace: [ 21.017031] show_stack+0x20/0x38 (C) [ 21.017092] dump_stack_lvl+0x8c/0xd0 [ 21.017150] print_report+0x118/0x608 [ 21.017336] kasan_report+0xdc/0x128 [ 21.017399] kasan_check_range+0x100/0x1a8 [ 21.017455] __kasan_check_write+0x20/0x30 [ 21.017526] kasan_bitops_modify.constprop.0+0x2b4/0xbc8 [ 21.017594] kasan_bitops_generic+0x110/0x1c8 [ 21.017653] kunit_try_run_case+0x170/0x3f0 [ 21.017712] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.017774] kthread+0x318/0x620 [ 21.017835] ret_from_fork+0x10/0x20 [ 21.017894] [ 21.022404] Allocated by task 251: [ 21.023033] kasan_save_stack+0x3c/0x68 [ 21.023398] kasan_save_track+0x20/0x40 [ 21.023726] kasan_save_alloc_info+0x40/0x58 [ 21.024115] __kasan_kmalloc+0xd4/0xd8 [ 21.024474] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.024866] kasan_bitops_generic+0xa0/0x1c8 [ 21.025254] kunit_try_run_case+0x170/0x3f0 [ 21.025640] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.026089] kthread+0x318/0x620 [ 21.026329] ret_from_fork+0x10/0x20 [ 21.027210] [ 21.027354] The buggy address belongs to the object at fff00000c3e60680 [ 21.027354] which belongs to the cache kmalloc-16 of size 16 [ 21.028065] The buggy address is located 8 bytes inside of [ 21.028065] allocated 9-byte region [fff00000c3e60680, fff00000c3e60689) [ 21.028694] [ 21.028886] The buggy address belongs to the physical page: [ 21.029179] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103e60 [ 21.029776] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.030402] page_type: f5(slab) [ 21.030597] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 21.031246] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.031790] page dumped because: kasan: bad access detected [ 21.032052] [ 21.032407] Memory state around the buggy address: [ 21.032774] fff00000c3e60580: 00 02 fc fc fa fb fc fc fa fb fc fc 00 05 fc fc [ 21.033291] fff00000c3e60600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.033591] >fff00000c3e60680: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.034044] ^ [ 21.035125] fff00000c3e60700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.035643] fff00000c3e60780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.036117] ================================================================== [ 21.060814] ================================================================== [ 21.061416] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaf4/0xbc8 [ 21.061883] Read of size 8 at addr fff00000c3e60688 by task kunit_try_catch/251 [ 21.062946] [ 21.063289] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 21.063400] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.063436] Hardware name: linux,dummy-virt (DT) [ 21.063477] Call trace: [ 21.063508] show_stack+0x20/0x38 (C) [ 21.063576] dump_stack_lvl+0x8c/0xd0 [ 21.063635] print_report+0x118/0x608 [ 21.063712] kasan_report+0xdc/0x128 [ 21.063878] __asan_report_load8_noabort+0x20/0x30 [ 21.063938] kasan_bitops_modify.constprop.0+0xaf4/0xbc8 [ 21.063999] kasan_bitops_generic+0x110/0x1c8 [ 21.064056] kunit_try_run_case+0x170/0x3f0 [ 21.064113] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.064195] kthread+0x318/0x620 [ 21.064253] ret_from_fork+0x10/0x20 [ 21.064313] [ 21.068359] Allocated by task 251: [ 21.068643] kasan_save_stack+0x3c/0x68 [ 21.069074] kasan_save_track+0x20/0x40 [ 21.069452] kasan_save_alloc_info+0x40/0x58 [ 21.069655] __kasan_kmalloc+0xd4/0xd8 [ 21.069828] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.070017] kasan_bitops_generic+0xa0/0x1c8 [ 21.070667] kunit_try_run_case+0x170/0x3f0 [ 21.070876] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.071080] kthread+0x318/0x620 [ 21.071251] ret_from_fork+0x10/0x20 [ 21.071525] [ 21.071693] The buggy address belongs to the object at fff00000c3e60680 [ 21.071693] which belongs to the cache kmalloc-16 of size 16 [ 21.072271] The buggy address is located 8 bytes inside of [ 21.072271] allocated 9-byte region [fff00000c3e60680, fff00000c3e60689) [ 21.072978] [ 21.073102] The buggy address belongs to the physical page: [ 21.073417] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103e60 [ 21.073891] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.074538] page_type: f5(slab) [ 21.074918] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 21.075570] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.075834] page dumped because: kasan: bad access detected [ 21.076009] [ 21.076113] Memory state around the buggy address: [ 21.076311] fff00000c3e60580: 00 02 fc fc fa fb fc fc fa fb fc fc 00 05 fc fc [ 21.076544] fff00000c3e60600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.076761] >fff00000c3e60680: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.076968] ^ [ 21.077119] fff00000c3e60700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.077537] fff00000c3e60780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.078717] ================================================================== [ 20.931563] ================================================================== [ 20.932128] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc8 [ 20.932771] Write of size 8 at addr fff00000c3e60688 by task kunit_try_catch/251 [ 20.933309] [ 20.933456] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 20.933579] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.933887] Hardware name: linux,dummy-virt (DT) [ 20.933938] Call trace: [ 20.933973] show_stack+0x20/0x38 (C) [ 20.934040] dump_stack_lvl+0x8c/0xd0 [ 20.934232] print_report+0x118/0x608 [ 20.934335] kasan_report+0xdc/0x128 [ 20.934391] kasan_check_range+0x100/0x1a8 [ 20.934463] __kasan_check_write+0x20/0x30 [ 20.934567] kasan_bitops_modify.constprop.0+0x100/0xbc8 [ 20.934630] kasan_bitops_generic+0x110/0x1c8 [ 20.934686] kunit_try_run_case+0x170/0x3f0 [ 20.934743] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.934802] kthread+0x318/0x620 [ 20.934855] ret_from_fork+0x10/0x20 [ 20.934914] [ 20.939960] Allocated by task 251: [ 20.940189] kasan_save_stack+0x3c/0x68 [ 20.940475] kasan_save_track+0x20/0x40 [ 20.940918] kasan_save_alloc_info+0x40/0x58 [ 20.941344] __kasan_kmalloc+0xd4/0xd8 [ 20.941590] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.941905] kasan_bitops_generic+0xa0/0x1c8 [ 20.942502] kunit_try_run_case+0x170/0x3f0 [ 20.942731] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.942931] kthread+0x318/0x620 [ 20.943089] ret_from_fork+0x10/0x20 [ 20.943340] [ 20.943529] The buggy address belongs to the object at fff00000c3e60680 [ 20.943529] which belongs to the cache kmalloc-16 of size 16 [ 20.943881] The buggy address is located 8 bytes inside of [ 20.943881] allocated 9-byte region [fff00000c3e60680, fff00000c3e60689) [ 20.944594] [ 20.944793] The buggy address belongs to the physical page: [ 20.945122] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103e60 [ 20.945612] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.945979] page_type: f5(slab) [ 20.946269] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 20.946653] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 20.947193] page dumped because: kasan: bad access detected [ 20.947454] [ 20.947641] Memory state around the buggy address: [ 20.947867] fff00000c3e60580: 00 02 fc fc fa fb fc fc fa fb fc fc 00 05 fc fc [ 20.948295] fff00000c3e60600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 20.948640] >fff00000c3e60680: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.949075] ^ [ 20.949337] fff00000c3e60700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.949690] fff00000c3e60780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.950207] ================================================================== [ 21.037221] ================================================================== [ 21.037874] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc8 [ 21.038634] Write of size 8 at addr fff00000c3e60688 by task kunit_try_catch/251 [ 21.039197] [ 21.039643] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 21.039756] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.039790] Hardware name: linux,dummy-virt (DT) [ 21.039931] Call trace: [ 21.039964] show_stack+0x20/0x38 (C) [ 21.040034] dump_stack_lvl+0x8c/0xd0 [ 21.040092] print_report+0x118/0x608 [ 21.040149] kasan_report+0xdc/0x128 [ 21.040227] kasan_check_range+0x100/0x1a8 [ 21.040282] __kasan_check_write+0x20/0x30 [ 21.040335] kasan_bitops_modify.constprop.0+0x320/0xbc8 [ 21.040394] kasan_bitops_generic+0x110/0x1c8 [ 21.040451] kunit_try_run_case+0x170/0x3f0 [ 21.040507] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.040568] kthread+0x318/0x620 [ 21.040622] ret_from_fork+0x10/0x20 [ 21.040681] [ 21.045887] Allocated by task 251: [ 21.046449] kasan_save_stack+0x3c/0x68 [ 21.047081] kasan_save_track+0x20/0x40 [ 21.047372] kasan_save_alloc_info+0x40/0x58 [ 21.047774] __kasan_kmalloc+0xd4/0xd8 [ 21.048094] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.048349] kasan_bitops_generic+0xa0/0x1c8 [ 21.048723] kunit_try_run_case+0x170/0x3f0 [ 21.049039] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.049369] kthread+0x318/0x620 [ 21.049751] ret_from_fork+0x10/0x20 [ 21.050187] [ 21.050348] The buggy address belongs to the object at fff00000c3e60680 [ 21.050348] which belongs to the cache kmalloc-16 of size 16 [ 21.051654] The buggy address is located 8 bytes inside of [ 21.051654] allocated 9-byte region [fff00000c3e60680, fff00000c3e60689) [ 21.052336] [ 21.052573] The buggy address belongs to the physical page: [ 21.052866] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103e60 [ 21.053434] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.053980] page_type: f5(slab) [ 21.054500] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 21.055016] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.055587] page dumped because: kasan: bad access detected [ 21.056039] [ 21.056163] Memory state around the buggy address: [ 21.056565] fff00000c3e60580: 00 02 fc fc fa fb fc fc fa fb fc fc 00 05 fc fc [ 21.057068] fff00000c3e60600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.057448] >fff00000c3e60680: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.057980] ^ [ 21.058426] fff00000c3e60700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.059567] fff00000c3e60780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.059958] ================================================================== [ 21.079779] ================================================================== [ 21.080047] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc8 [ 21.080314] Write of size 8 at addr fff00000c3e60688 by task kunit_try_catch/251 [ 21.080540] [ 21.080660] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 21.080755] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.080789] Hardware name: linux,dummy-virt (DT) [ 21.080830] Call trace: [ 21.080858] show_stack+0x20/0x38 (C) [ 21.080917] dump_stack_lvl+0x8c/0xd0 [ 21.080974] print_report+0x118/0x608 [ 21.081028] kasan_report+0xdc/0x128 [ 21.081081] kasan_check_range+0x100/0x1a8 [ 21.081133] __kasan_check_write+0x20/0x30 [ 21.081216] kasan_bitops_modify.constprop.0+0x344/0xbc8 [ 21.081274] kasan_bitops_generic+0x110/0x1c8 [ 21.081329] kunit_try_run_case+0x170/0x3f0 [ 21.081385] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.081446] kthread+0x318/0x620 [ 21.081848] ret_from_fork+0x10/0x20 [ 21.081923] [ 21.088473] Allocated by task 251: [ 21.088696] kasan_save_stack+0x3c/0x68 [ 21.088924] kasan_save_track+0x20/0x40 [ 21.089128] kasan_save_alloc_info+0x40/0x58 [ 21.089394] __kasan_kmalloc+0xd4/0xd8 [ 21.089646] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.089905] kasan_bitops_generic+0xa0/0x1c8 [ 21.091281] kunit_try_run_case+0x170/0x3f0 [ 21.091501] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.091960] kthread+0x318/0x620 [ 21.092274] ret_from_fork+0x10/0x20 [ 21.092870] [ 21.093107] The buggy address belongs to the object at fff00000c3e60680 [ 21.093107] which belongs to the cache kmalloc-16 of size 16 [ 21.093815] The buggy address is located 8 bytes inside of [ 21.093815] allocated 9-byte region [fff00000c3e60680, fff00000c3e60689) [ 21.095001] [ 21.095186] The buggy address belongs to the physical page: [ 21.095373] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103e60 [ 21.095698] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.095966] page_type: f5(slab) [ 21.096197] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 21.096553] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.097041] page dumped because: kasan: bad access detected [ 21.097423] [ 21.097609] Memory state around the buggy address: [ 21.097944] fff00000c3e60580: 00 02 fc fc fa fb fc fc fa fb fc fc 00 05 fc fc [ 21.098819] fff00000c3e60600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.099282] >fff00000c3e60680: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.099526] ^ [ 21.099920] fff00000c3e60700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.100272] fff00000c3e60780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.100541] ==================================================================
[ 14.726043] ================================================================== [ 14.726312] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19d/0xd50 [ 14.726770] Write of size 8 at addr ffff888101b5abe8 by task kunit_try_catch/269 [ 14.727073] [ 14.727179] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 14.727217] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.727229] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.727250] Call Trace: [ 14.727263] <TASK> [ 14.727276] dump_stack_lvl+0x73/0xb0 [ 14.727301] print_report+0xd1/0x650 [ 14.727322] ? __virt_addr_valid+0x1db/0x2d0 [ 14.727342] ? kasan_bitops_modify.constprop.0+0x19d/0xd50 [ 14.727366] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.727391] ? kasan_bitops_modify.constprop.0+0x19d/0xd50 [ 14.727415] kasan_report+0x140/0x180 [ 14.727436] ? kasan_bitops_modify.constprop.0+0x19d/0xd50 [ 14.727465] kasan_check_range+0x10c/0x1c0 [ 14.727487] __kasan_check_write+0x18/0x20 [ 14.727509] kasan_bitops_modify.constprop.0+0x19d/0xd50 [ 14.727536] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.727561] ? __kmalloc_cache_noprof+0x18a/0x420 [ 14.727584] ? trace_hardirqs_on+0x37/0xe0 [ 14.727606] ? kasan_bitops_generic+0x93/0x1c0 [ 14.727631] kasan_bitops_generic+0x117/0x1c0 [ 14.727654] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.727675] ? trace_hardirqs_on+0x37/0xe0 [ 14.727697] ? __pfx_read_tsc+0x10/0x10 [ 14.727718] ? ktime_get_ts64+0x86/0x230 [ 14.727740] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 14.727765] kunit_try_run_case+0x1a6/0x480 [ 14.727788] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.727811] ? queued_spin_lock_slowpath+0x117/0xb40 [ 14.727835] ? __kthread_parkme+0x82/0x160 [ 14.727856] ? preempt_count_sub+0x50/0x80 [ 14.727880] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.727903] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.727928] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.727954] kthread+0x324/0x6e0 [ 14.727975] ? trace_preempt_on+0x20/0xc0 [ 14.727997] ? __pfx_kthread+0x10/0x10 [ 14.728029] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.728051] ? calculate_sigpending+0x7b/0xa0 [ 14.728071] ? __pfx_kthread+0x10/0x10 [ 14.728093] ret_from_fork+0x41/0x80 [ 14.728111] ? __pfx_kthread+0x10/0x10 [ 14.728133] ret_from_fork_asm+0x1a/0x30 [ 14.728163] </TASK> [ 14.728173] [ 14.736730] Allocated by task 269: [ 14.736861] kasan_save_stack+0x45/0x70 [ 14.737003] kasan_save_track+0x18/0x40 [ 14.737209] kasan_save_alloc_info+0x3b/0x50 [ 14.737426] __kasan_kmalloc+0xb7/0xc0 [ 14.737797] __kmalloc_cache_noprof+0x18a/0x420 [ 14.738009] kasan_bitops_generic+0x93/0x1c0 [ 14.738182] kunit_try_run_case+0x1a6/0x480 [ 14.738394] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.738718] kthread+0x324/0x6e0 [ 14.738880] ret_from_fork+0x41/0x80 [ 14.739044] ret_from_fork_asm+0x1a/0x30 [ 14.739219] [ 14.739311] The buggy address belongs to the object at ffff888101b5abe0 [ 14.739311] which belongs to the cache kmalloc-16 of size 16 [ 14.739848] The buggy address is located 8 bytes inside of [ 14.739848] allocated 9-byte region [ffff888101b5abe0, ffff888101b5abe9) [ 14.740209] [ 14.740281] The buggy address belongs to the physical page: [ 14.740460] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b5a [ 14.740804] flags: 0x200000000000000(node=0|zone=2) [ 14.741041] page_type: f5(slab) [ 14.741327] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.741945] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.742194] page dumped because: kasan: bad access detected [ 14.742365] [ 14.742434] Memory state around the buggy address: [ 14.742586] ffff888101b5aa80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.742887] ffff888101b5ab00: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 14.743214] >ffff888101b5ab80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 14.743534] ^ [ 14.743836] ffff888101b5ac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.744176] ffff888101b5ac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.744535] ================================================================== [ 14.745059] ================================================================== [ 14.745355] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23b/0xd50 [ 14.745868] Write of size 8 at addr ffff888101b5abe8 by task kunit_try_catch/269 [ 14.746112] [ 14.746192] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 14.746228] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.746240] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.746260] Call Trace: [ 14.746272] <TASK> [ 14.746286] dump_stack_lvl+0x73/0xb0 [ 14.746310] print_report+0xd1/0x650 [ 14.746332] ? __virt_addr_valid+0x1db/0x2d0 [ 14.746353] ? kasan_bitops_modify.constprop.0+0x23b/0xd50 [ 14.746377] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.746403] ? kasan_bitops_modify.constprop.0+0x23b/0xd50 [ 14.746430] kasan_report+0x140/0x180 [ 14.746450] ? kasan_bitops_modify.constprop.0+0x23b/0xd50 [ 14.746478] kasan_check_range+0x10c/0x1c0 [ 14.746501] __kasan_check_write+0x18/0x20 [ 14.746523] kasan_bitops_modify.constprop.0+0x23b/0xd50 [ 14.746548] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.746574] ? __kmalloc_cache_noprof+0x18a/0x420 [ 14.746596] ? trace_hardirqs_on+0x37/0xe0 [ 14.746618] ? kasan_bitops_generic+0x93/0x1c0 [ 14.746645] kasan_bitops_generic+0x117/0x1c0 [ 14.746667] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.746689] ? trace_hardirqs_on+0x37/0xe0 [ 14.746709] ? __pfx_read_tsc+0x10/0x10 [ 14.746730] ? ktime_get_ts64+0x86/0x230 [ 14.746751] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 14.746777] kunit_try_run_case+0x1a6/0x480 [ 14.746799] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.746822] ? queued_spin_lock_slowpath+0x117/0xb40 [ 14.746847] ? __kthread_parkme+0x82/0x160 [ 14.746867] ? preempt_count_sub+0x50/0x80 [ 14.746892] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.746914] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.746940] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.746965] kthread+0x324/0x6e0 [ 14.746986] ? trace_preempt_on+0x20/0xc0 [ 14.747007] ? __pfx_kthread+0x10/0x10 [ 14.747039] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.747061] ? calculate_sigpending+0x7b/0xa0 [ 14.747082] ? __pfx_kthread+0x10/0x10 [ 14.747104] ret_from_fork+0x41/0x80 [ 14.747121] ? __pfx_kthread+0x10/0x10 [ 14.747143] ret_from_fork_asm+0x1a/0x30 [ 14.747173] </TASK> [ 14.747183] [ 14.755923] Allocated by task 269: [ 14.756104] kasan_save_stack+0x45/0x70 [ 14.756257] kasan_save_track+0x18/0x40 [ 14.756390] kasan_save_alloc_info+0x3b/0x50 [ 14.756536] __kasan_kmalloc+0xb7/0xc0 [ 14.756665] __kmalloc_cache_noprof+0x18a/0x420 [ 14.756883] kasan_bitops_generic+0x93/0x1c0 [ 14.757270] kunit_try_run_case+0x1a6/0x480 [ 14.757488] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.757939] kthread+0x324/0x6e0 [ 14.758086] ret_from_fork+0x41/0x80 [ 14.758216] ret_from_fork_asm+0x1a/0x30 [ 14.758389] [ 14.758484] The buggy address belongs to the object at ffff888101b5abe0 [ 14.758484] which belongs to the cache kmalloc-16 of size 16 [ 14.759409] The buggy address is located 8 bytes inside of [ 14.759409] allocated 9-byte region [ffff888101b5abe0, ffff888101b5abe9) [ 14.759938] [ 14.760057] The buggy address belongs to the physical page: [ 14.760281] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b5a [ 14.760753] flags: 0x200000000000000(node=0|zone=2) [ 14.761000] page_type: f5(slab) [ 14.761143] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.761454] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.762058] page dumped because: kasan: bad access detected [ 14.762278] [ 14.762377] Memory state around the buggy address: [ 14.762560] ffff888101b5aa80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.762861] ffff888101b5ab00: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 14.763101] >ffff888101b5ab80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 14.763357] ^ [ 14.763659] ffff888101b5ac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.764068] ffff888101b5ac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.764282] ================================================================== [ 14.819405] ================================================================== [ 14.820113] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40f/0xd50 [ 14.820747] Write of size 8 at addr ffff888101b5abe8 by task kunit_try_catch/269 [ 14.821389] [ 14.821644] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 14.821683] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.821694] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.821714] Call Trace: [ 14.821728] <TASK> [ 14.821749] dump_stack_lvl+0x73/0xb0 [ 14.821774] print_report+0xd1/0x650 [ 14.821794] ? __virt_addr_valid+0x1db/0x2d0 [ 14.821816] ? kasan_bitops_modify.constprop.0+0x40f/0xd50 [ 14.821840] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.821865] ? kasan_bitops_modify.constprop.0+0x40f/0xd50 [ 14.821901] kasan_report+0x140/0x180 [ 14.821923] ? kasan_bitops_modify.constprop.0+0x40f/0xd50 [ 14.821952] kasan_check_range+0x10c/0x1c0 [ 14.821986] __kasan_check_write+0x18/0x20 [ 14.822008] kasan_bitops_modify.constprop.0+0x40f/0xd50 [ 14.822043] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.822068] ? __kmalloc_cache_noprof+0x18a/0x420 [ 14.822092] ? trace_hardirqs_on+0x37/0xe0 [ 14.822114] ? kasan_bitops_generic+0x93/0x1c0 [ 14.822139] kasan_bitops_generic+0x117/0x1c0 [ 14.822162] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.822183] ? trace_hardirqs_on+0x37/0xe0 [ 14.822204] ? __pfx_read_tsc+0x10/0x10 [ 14.822226] ? ktime_get_ts64+0x86/0x230 [ 14.822247] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 14.822273] kunit_try_run_case+0x1a6/0x480 [ 14.822296] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.822318] ? queued_spin_lock_slowpath+0x117/0xb40 [ 14.822342] ? __kthread_parkme+0x82/0x160 [ 14.822365] ? preempt_count_sub+0x50/0x80 [ 14.822388] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.822411] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.822436] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.822462] kthread+0x324/0x6e0 [ 14.822482] ? trace_preempt_on+0x20/0xc0 [ 14.822503] ? __pfx_kthread+0x10/0x10 [ 14.822526] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.822554] ? calculate_sigpending+0x7b/0xa0 [ 14.822576] ? __pfx_kthread+0x10/0x10 [ 14.822598] ret_from_fork+0x41/0x80 [ 14.822616] ? __pfx_kthread+0x10/0x10 [ 14.822638] ret_from_fork_asm+0x1a/0x30 [ 14.822669] </TASK> [ 14.822678] [ 14.836799] Allocated by task 269: [ 14.836934] kasan_save_stack+0x45/0x70 [ 14.837281] kasan_save_track+0x18/0x40 [ 14.837649] kasan_save_alloc_info+0x3b/0x50 [ 14.838207] __kasan_kmalloc+0xb7/0xc0 [ 14.838586] __kmalloc_cache_noprof+0x18a/0x420 [ 14.839117] kasan_bitops_generic+0x93/0x1c0 [ 14.839570] kunit_try_run_case+0x1a6/0x480 [ 14.840075] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.840663] kthread+0x324/0x6e0 [ 14.840995] ret_from_fork+0x41/0x80 [ 14.841361] ret_from_fork_asm+0x1a/0x30 [ 14.841818] [ 14.841999] The buggy address belongs to the object at ffff888101b5abe0 [ 14.841999] which belongs to the cache kmalloc-16 of size 16 [ 14.843184] The buggy address is located 8 bytes inside of [ 14.843184] allocated 9-byte region [ffff888101b5abe0, ffff888101b5abe9) [ 14.844376] [ 14.844574] The buggy address belongs to the physical page: [ 14.845040] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b5a [ 14.845279] flags: 0x200000000000000(node=0|zone=2) [ 14.845440] page_type: f5(slab) [ 14.845589] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.846345] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.847134] page dumped because: kasan: bad access detected [ 14.847686] [ 14.847847] Memory state around the buggy address: [ 14.848314] ffff888101b5aa80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.849037] ffff888101b5ab00: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 14.849761] >ffff888101b5ab80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 14.849972] ^ [ 14.850181] ffff888101b5ac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.850397] ffff888101b5ac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.850781] ================================================================== [ 14.764629] ================================================================== [ 14.764961] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d6/0xd50 [ 14.765979] Write of size 8 at addr ffff888101b5abe8 by task kunit_try_catch/269 [ 14.766325] [ 14.766414] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 14.766452] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.766464] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.766485] Call Trace: [ 14.766503] <TASK> [ 14.766517] dump_stack_lvl+0x73/0xb0 [ 14.766543] print_report+0xd1/0x650 [ 14.766563] ? __virt_addr_valid+0x1db/0x2d0 [ 14.766650] ? kasan_bitops_modify.constprop.0+0x2d6/0xd50 [ 14.766675] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.766700] ? kasan_bitops_modify.constprop.0+0x2d6/0xd50 [ 14.766726] kasan_report+0x140/0x180 [ 14.766747] ? kasan_bitops_modify.constprop.0+0x2d6/0xd50 [ 14.766777] kasan_check_range+0x10c/0x1c0 [ 14.766799] __kasan_check_write+0x18/0x20 [ 14.766820] kasan_bitops_modify.constprop.0+0x2d6/0xd50 [ 14.766845] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.766869] ? __kmalloc_cache_noprof+0x18a/0x420 [ 14.766893] ? trace_hardirqs_on+0x37/0xe0 [ 14.766914] ? kasan_bitops_generic+0x93/0x1c0 [ 14.766940] kasan_bitops_generic+0x117/0x1c0 [ 14.766962] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.766983] ? trace_hardirqs_on+0x37/0xe0 [ 14.767005] ? __pfx_read_tsc+0x10/0x10 [ 14.767036] ? ktime_get_ts64+0x86/0x230 [ 14.767058] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 14.767084] kunit_try_run_case+0x1a6/0x480 [ 14.767107] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.767129] ? queued_spin_lock_slowpath+0x117/0xb40 [ 14.767153] ? __kthread_parkme+0x82/0x160 [ 14.767174] ? preempt_count_sub+0x50/0x80 [ 14.767197] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.767220] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.767244] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.767270] kthread+0x324/0x6e0 [ 14.767291] ? trace_preempt_on+0x20/0xc0 [ 14.767312] ? __pfx_kthread+0x10/0x10 [ 14.767373] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.767395] ? calculate_sigpending+0x7b/0xa0 [ 14.767416] ? __pfx_kthread+0x10/0x10 [ 14.767439] ret_from_fork+0x41/0x80 [ 14.767457] ? __pfx_kthread+0x10/0x10 [ 14.767478] ret_from_fork_asm+0x1a/0x30 [ 14.767509] </TASK> [ 14.767519] [ 14.775576] Allocated by task 269: [ 14.775753] kasan_save_stack+0x45/0x70 [ 14.775952] kasan_save_track+0x18/0x40 [ 14.776149] kasan_save_alloc_info+0x3b/0x50 [ 14.776355] __kasan_kmalloc+0xb7/0xc0 [ 14.776537] __kmalloc_cache_noprof+0x18a/0x420 [ 14.776819] kasan_bitops_generic+0x93/0x1c0 [ 14.777029] kunit_try_run_case+0x1a6/0x480 [ 14.777208] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.777384] kthread+0x324/0x6e0 [ 14.777505] ret_from_fork+0x41/0x80 [ 14.777630] ret_from_fork_asm+0x1a/0x30 [ 14.778027] [ 14.778128] The buggy address belongs to the object at ffff888101b5abe0 [ 14.778128] which belongs to the cache kmalloc-16 of size 16 [ 14.778671] The buggy address is located 8 bytes inside of [ 14.778671] allocated 9-byte region [ffff888101b5abe0, ffff888101b5abe9) [ 14.779486] [ 14.779566] The buggy address belongs to the physical page: [ 14.779754] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b5a [ 14.780005] flags: 0x200000000000000(node=0|zone=2) [ 14.780252] page_type: f5(slab) [ 14.780428] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.780747] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.780969] page dumped because: kasan: bad access detected [ 14.782353] [ 14.782827] Memory state around the buggy address: [ 14.783655] ffff888101b5aa80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.784368] ffff888101b5ab00: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 14.784600] >ffff888101b5ab80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 14.784813] ^ [ 14.785021] ffff888101b5ac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.785240] ffff888101b5ac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.786052] ================================================================== [ 14.786909] ================================================================== [ 14.787474] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x374/0xd50 [ 14.788107] Write of size 8 at addr ffff888101b5abe8 by task kunit_try_catch/269 [ 14.788685] [ 14.788900] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 14.788942] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.788954] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.788983] Call Trace: [ 14.788996] <TASK> [ 14.789011] dump_stack_lvl+0x73/0xb0 [ 14.789054] print_report+0xd1/0x650 [ 14.789075] ? __virt_addr_valid+0x1db/0x2d0 [ 14.789096] ? kasan_bitops_modify.constprop.0+0x374/0xd50 [ 14.789120] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.789145] ? kasan_bitops_modify.constprop.0+0x374/0xd50 [ 14.789169] kasan_report+0x140/0x180 [ 14.789190] ? kasan_bitops_modify.constprop.0+0x374/0xd50 [ 14.789218] kasan_check_range+0x10c/0x1c0 [ 14.789240] __kasan_check_write+0x18/0x20 [ 14.789262] kasan_bitops_modify.constprop.0+0x374/0xd50 [ 14.789286] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.789311] ? __kmalloc_cache_noprof+0x18a/0x420 [ 14.789333] ? trace_hardirqs_on+0x37/0xe0 [ 14.789356] ? kasan_bitops_generic+0x93/0x1c0 [ 14.789381] kasan_bitops_generic+0x117/0x1c0 [ 14.789403] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.789425] ? trace_hardirqs_on+0x37/0xe0 [ 14.789446] ? __pfx_read_tsc+0x10/0x10 [ 14.789467] ? ktime_get_ts64+0x86/0x230 [ 14.789487] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 14.789513] kunit_try_run_case+0x1a6/0x480 [ 14.789535] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.789764] ? queued_spin_lock_slowpath+0x117/0xb40 [ 14.789791] ? __kthread_parkme+0x82/0x160 [ 14.789813] ? preempt_count_sub+0x50/0x80 [ 14.789837] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.789859] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.789886] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.789911] kthread+0x324/0x6e0 [ 14.789933] ? trace_preempt_on+0x20/0xc0 [ 14.789955] ? __pfx_kthread+0x10/0x10 [ 14.789976] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.789998] ? calculate_sigpending+0x7b/0xa0 [ 14.790034] ? __pfx_kthread+0x10/0x10 [ 14.790055] ret_from_fork+0x41/0x80 [ 14.790074] ? __pfx_kthread+0x10/0x10 [ 14.790095] ret_from_fork_asm+0x1a/0x30 [ 14.790125] </TASK> [ 14.790136] [ 14.804490] Allocated by task 269: [ 14.804910] kasan_save_stack+0x45/0x70 [ 14.805299] kasan_save_track+0x18/0x40 [ 14.805878] kasan_save_alloc_info+0x3b/0x50 [ 14.806316] __kasan_kmalloc+0xb7/0xc0 [ 14.806702] __kmalloc_cache_noprof+0x18a/0x420 [ 14.807058] kasan_bitops_generic+0x93/0x1c0 [ 14.807399] kunit_try_run_case+0x1a6/0x480 [ 14.807730] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.807913] kthread+0x324/0x6e0 [ 14.808046] ret_from_fork+0x41/0x80 [ 14.808174] ret_from_fork_asm+0x1a/0x30 [ 14.808313] [ 14.808390] The buggy address belongs to the object at ffff888101b5abe0 [ 14.808390] which belongs to the cache kmalloc-16 of size 16 [ 14.809250] The buggy address is located 8 bytes inside of [ 14.809250] allocated 9-byte region [ffff888101b5abe0, ffff888101b5abe9) [ 14.810497] [ 14.810744] The buggy address belongs to the physical page: [ 14.811295] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b5a [ 14.812114] flags: 0x200000000000000(node=0|zone=2) [ 14.812595] page_type: f5(slab) [ 14.812897] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.813613] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.814193] page dumped because: kasan: bad access detected [ 14.814365] [ 14.814435] Memory state around the buggy address: [ 14.814712] ffff888101b5aa80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.815450] ffff888101b5ab00: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 14.816276] >ffff888101b5ab80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 14.816968] ^ [ 14.817597] ffff888101b5ac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.817871] ffff888101b5ac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.818387] ================================================================== [ 14.705133] ================================================================== [ 14.705572] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x102/0xd50 [ 14.706049] Write of size 8 at addr ffff888101b5abe8 by task kunit_try_catch/269 [ 14.706360] [ 14.706468] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 14.706509] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.706520] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.706541] Call Trace: [ 14.706554] <TASK> [ 14.706570] dump_stack_lvl+0x73/0xb0 [ 14.706595] print_report+0xd1/0x650 [ 14.706617] ? __virt_addr_valid+0x1db/0x2d0 [ 14.706638] ? kasan_bitops_modify.constprop.0+0x102/0xd50 [ 14.706663] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.706688] ? kasan_bitops_modify.constprop.0+0x102/0xd50 [ 14.706713] kasan_report+0x140/0x180 [ 14.706734] ? kasan_bitops_modify.constprop.0+0x102/0xd50 [ 14.706763] kasan_check_range+0x10c/0x1c0 [ 14.706785] __kasan_check_write+0x18/0x20 [ 14.706808] kasan_bitops_modify.constprop.0+0x102/0xd50 [ 14.706832] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.706857] ? __kmalloc_cache_noprof+0x18a/0x420 [ 14.706880] ? trace_hardirqs_on+0x37/0xe0 [ 14.706901] ? kasan_bitops_generic+0x93/0x1c0 [ 14.706927] kasan_bitops_generic+0x117/0x1c0 [ 14.706949] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.706971] ? trace_hardirqs_on+0x37/0xe0 [ 14.706993] ? __pfx_read_tsc+0x10/0x10 [ 14.707027] ? ktime_get_ts64+0x86/0x230 [ 14.707050] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 14.707077] kunit_try_run_case+0x1a6/0x480 [ 14.707099] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.707122] ? queued_spin_lock_slowpath+0x117/0xb40 [ 14.707146] ? __kthread_parkme+0x82/0x160 [ 14.707166] ? preempt_count_sub+0x50/0x80 [ 14.707191] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.707213] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.707238] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.707265] kthread+0x324/0x6e0 [ 14.707286] ? trace_preempt_on+0x20/0xc0 [ 14.707307] ? __pfx_kthread+0x10/0x10 [ 14.707329] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.707351] ? calculate_sigpending+0x7b/0xa0 [ 14.707374] ? __pfx_kthread+0x10/0x10 [ 14.707396] ret_from_fork+0x41/0x80 [ 14.707415] ? __pfx_kthread+0x10/0x10 [ 14.707436] ret_from_fork_asm+0x1a/0x30 [ 14.707467] </TASK> [ 14.707478] [ 14.715525] Allocated by task 269: [ 14.715843] kasan_save_stack+0x45/0x70 [ 14.716061] kasan_save_track+0x18/0x40 [ 14.716308] kasan_save_alloc_info+0x3b/0x50 [ 14.716518] __kasan_kmalloc+0xb7/0xc0 [ 14.716808] __kmalloc_cache_noprof+0x18a/0x420 [ 14.717038] kasan_bitops_generic+0x93/0x1c0 [ 14.717187] kunit_try_run_case+0x1a6/0x480 [ 14.717331] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.717539] kthread+0x324/0x6e0 [ 14.717706] ret_from_fork+0x41/0x80 [ 14.717889] ret_from_fork_asm+0x1a/0x30 [ 14.718186] [ 14.718279] The buggy address belongs to the object at ffff888101b5abe0 [ 14.718279] which belongs to the cache kmalloc-16 of size 16 [ 14.718973] The buggy address is located 8 bytes inside of [ 14.718973] allocated 9-byte region [ffff888101b5abe0, ffff888101b5abe9) [ 14.720506] [ 14.720815] The buggy address belongs to the physical page: [ 14.721321] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b5a [ 14.721696] flags: 0x200000000000000(node=0|zone=2) [ 14.722162] page_type: f5(slab) [ 14.722458] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.722988] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.723231] page dumped because: kasan: bad access detected [ 14.723401] [ 14.723472] Memory state around the buggy address: [ 14.723662] ffff888101b5aa80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.723970] ffff888101b5ab00: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 14.724297] >ffff888101b5ab80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 14.724729] ^ [ 14.724945] ffff888101b5ac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.725280] ffff888101b5ac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.725562] ================================================================== [ 14.851712] ================================================================== [ 14.852439] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ad/0xd50 [ 14.853268] Write of size 8 at addr ffff888101b5abe8 by task kunit_try_catch/269 [ 14.854007] [ 14.854206] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 14.854257] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.854269] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.854302] Call Trace: [ 14.854318] <TASK> [ 14.854342] dump_stack_lvl+0x73/0xb0 [ 14.854366] print_report+0xd1/0x650 [ 14.854387] ? __virt_addr_valid+0x1db/0x2d0 [ 14.854420] ? kasan_bitops_modify.constprop.0+0x4ad/0xd50 [ 14.854444] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.854469] ? kasan_bitops_modify.constprop.0+0x4ad/0xd50 [ 14.854493] kasan_report+0x140/0x180 [ 14.854515] ? kasan_bitops_modify.constprop.0+0x4ad/0xd50 [ 14.854560] kasan_check_range+0x10c/0x1c0 [ 14.854583] __kasan_check_write+0x18/0x20 [ 14.854605] kasan_bitops_modify.constprop.0+0x4ad/0xd50 [ 14.854629] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.854654] ? __kmalloc_cache_noprof+0x18a/0x420 [ 14.854677] ? trace_hardirqs_on+0x37/0xe0 [ 14.854699] ? kasan_bitops_generic+0x93/0x1c0 [ 14.854739] kasan_bitops_generic+0x117/0x1c0 [ 14.854762] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.854783] ? trace_hardirqs_on+0x37/0xe0 [ 14.854804] ? __pfx_read_tsc+0x10/0x10 [ 14.854826] ? ktime_get_ts64+0x86/0x230 [ 14.854848] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 14.854875] kunit_try_run_case+0x1a6/0x480 [ 14.854897] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.854920] ? queued_spin_lock_slowpath+0x117/0xb40 [ 14.854945] ? __kthread_parkme+0x82/0x160 [ 14.854968] ? preempt_count_sub+0x50/0x80 [ 14.854992] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.855023] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.855049] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.855075] kthread+0x324/0x6e0 [ 14.855096] ? trace_preempt_on+0x20/0xc0 [ 14.855117] ? __pfx_kthread+0x10/0x10 [ 14.855139] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.855162] ? calculate_sigpending+0x7b/0xa0 [ 14.855183] ? __pfx_kthread+0x10/0x10 [ 14.855205] ret_from_fork+0x41/0x80 [ 14.855223] ? __pfx_kthread+0x10/0x10 [ 14.855245] ret_from_fork_asm+0x1a/0x30 [ 14.855276] </TASK> [ 14.855286] [ 14.871707] Allocated by task 269: [ 14.871892] kasan_save_stack+0x45/0x70 [ 14.872046] kasan_save_track+0x18/0x40 [ 14.872523] kasan_save_alloc_info+0x3b/0x50 [ 14.872994] __kasan_kmalloc+0xb7/0xc0 [ 14.873147] __kmalloc_cache_noprof+0x18a/0x420 [ 14.873460] kasan_bitops_generic+0x93/0x1c0 [ 14.873954] kunit_try_run_case+0x1a6/0x480 [ 14.874369] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.874844] kthread+0x324/0x6e0 [ 14.874995] ret_from_fork+0x41/0x80 [ 14.875169] ret_from_fork_asm+0x1a/0x30 [ 14.875599] [ 14.875759] The buggy address belongs to the object at ffff888101b5abe0 [ 14.875759] which belongs to the cache kmalloc-16 of size 16 [ 14.876901] The buggy address is located 8 bytes inside of [ 14.876901] allocated 9-byte region [ffff888101b5abe0, ffff888101b5abe9) [ 14.877755] [ 14.877957] The buggy address belongs to the physical page: [ 14.878136] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b5a [ 14.878923] flags: 0x200000000000000(node=0|zone=2) [ 14.879366] page_type: f5(slab) [ 14.879484] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.880252] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.881130] page dumped because: kasan: bad access detected [ 14.881672] [ 14.881786] Memory state around the buggy address: [ 14.881964] ffff888101b5aa80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.882651] ffff888101b5ab00: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 14.883165] >ffff888101b5ab80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 14.883371] ^ [ 14.883608] ffff888101b5ac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.884292] ffff888101b5ac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.885077] ================================================================== [ 14.885946] ================================================================== [ 14.886663] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x548/0xd50 [ 14.887265] Write of size 8 at addr ffff888101b5abe8 by task kunit_try_catch/269 [ 14.887490] [ 14.887614] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 14.887653] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.887664] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.887685] Call Trace: [ 14.887699] <TASK> [ 14.887714] dump_stack_lvl+0x73/0xb0 [ 14.887740] print_report+0xd1/0x650 [ 14.887772] ? __virt_addr_valid+0x1db/0x2d0 [ 14.887792] ? kasan_bitops_modify.constprop.0+0x548/0xd50 [ 14.887817] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.887852] ? kasan_bitops_modify.constprop.0+0x548/0xd50 [ 14.887877] kasan_report+0x140/0x180 [ 14.887898] ? kasan_bitops_modify.constprop.0+0x548/0xd50 [ 14.887928] kasan_check_range+0x10c/0x1c0 [ 14.887950] __kasan_check_write+0x18/0x20 [ 14.887971] kasan_bitops_modify.constprop.0+0x548/0xd50 [ 14.887996] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.888030] ? __kmalloc_cache_noprof+0x18a/0x420 [ 14.888053] ? trace_hardirqs_on+0x37/0xe0 [ 14.888075] ? kasan_bitops_generic+0x93/0x1c0 [ 14.888101] kasan_bitops_generic+0x117/0x1c0 [ 14.888123] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.888154] ? trace_hardirqs_on+0x37/0xe0 [ 14.888175] ? __pfx_read_tsc+0x10/0x10 [ 14.888196] ? ktime_get_ts64+0x86/0x230 [ 14.888227] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 14.888254] kunit_try_run_case+0x1a6/0x480 [ 14.888276] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.888299] ? queued_spin_lock_slowpath+0x117/0xb40 [ 14.888323] ? __kthread_parkme+0x82/0x160 [ 14.888353] ? preempt_count_sub+0x50/0x80 [ 14.888377] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.888399] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.888435] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.888461] kthread+0x324/0x6e0 [ 14.888481] ? trace_preempt_on+0x20/0xc0 [ 14.888503] ? __pfx_kthread+0x10/0x10 [ 14.888525] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.888579] ? calculate_sigpending+0x7b/0xa0 [ 14.888601] ? __pfx_kthread+0x10/0x10 [ 14.888623] ret_from_fork+0x41/0x80 [ 14.888641] ? __pfx_kthread+0x10/0x10 [ 14.888664] ret_from_fork_asm+0x1a/0x30 [ 14.888695] </TASK> [ 14.888705] [ 14.898163] Allocated by task 269: [ 14.898347] kasan_save_stack+0x45/0x70 [ 14.898568] kasan_save_track+0x18/0x40 [ 14.898822] kasan_save_alloc_info+0x3b/0x50 [ 14.898997] __kasan_kmalloc+0xb7/0xc0 [ 14.899200] __kmalloc_cache_noprof+0x18a/0x420 [ 14.899390] kasan_bitops_generic+0x93/0x1c0 [ 14.899562] kunit_try_run_case+0x1a6/0x480 [ 14.899773] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.900032] kthread+0x324/0x6e0 [ 14.900203] ret_from_fork+0x41/0x80 [ 14.900339] ret_from_fork_asm+0x1a/0x30 [ 14.900478] [ 14.900568] The buggy address belongs to the object at ffff888101b5abe0 [ 14.900568] which belongs to the cache kmalloc-16 of size 16 [ 14.901139] The buggy address is located 8 bytes inside of [ 14.901139] allocated 9-byte region [ffff888101b5abe0, ffff888101b5abe9) [ 14.902050] [ 14.902137] The buggy address belongs to the physical page: [ 14.902382] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b5a [ 14.902678] flags: 0x200000000000000(node=0|zone=2) [ 14.902841] page_type: f5(slab) [ 14.902962] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.903208] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.903797] page dumped because: kasan: bad access detected [ 14.904054] [ 14.904148] Memory state around the buggy address: [ 14.904366] ffff888101b5aa80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.904724] ffff888101b5ab00: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 14.905067] >ffff888101b5ab80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 14.905274] ^ [ 14.905472] ffff888101b5ac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.905709] ffff888101b5ac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.906187] ==================================================================