Date
June 2, 2025, 2:13 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 21.142591] ================================================================== [ 21.143043] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc8 [ 21.144334] Write of size 8 at addr fff00000c3e60688 by task kunit_try_catch/251 [ 21.144663] [ 21.144802] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 21.144907] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.144941] Hardware name: linux,dummy-virt (DT) [ 21.144983] Call trace: [ 21.145013] show_stack+0x20/0x38 (C) [ 21.145078] dump_stack_lvl+0x8c/0xd0 [ 21.145137] print_report+0x118/0x608 [ 21.145209] kasan_report+0xdc/0x128 [ 21.145265] kasan_check_range+0x100/0x1a8 [ 21.145318] __kasan_check_write+0x20/0x30 [ 21.145372] kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc8 [ 21.145437] kasan_bitops_generic+0x11c/0x1c8 [ 21.145492] kunit_try_run_case+0x170/0x3f0 [ 21.145564] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.145625] kthread+0x318/0x620 [ 21.145678] ret_from_fork+0x10/0x20 [ 21.145737] [ 21.149592] Allocated by task 251: [ 21.150899] kasan_save_stack+0x3c/0x68 [ 21.151128] kasan_save_track+0x20/0x40 [ 21.151640] kasan_save_alloc_info+0x40/0x58 [ 21.151825] __kasan_kmalloc+0xd4/0xd8 [ 21.151998] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.152194] kasan_bitops_generic+0xa0/0x1c8 [ 21.152414] kunit_try_run_case+0x170/0x3f0 [ 21.152593] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.152875] kthread+0x318/0x620 [ 21.153061] ret_from_fork+0x10/0x20 [ 21.154693] [ 21.154838] The buggy address belongs to the object at fff00000c3e60680 [ 21.154838] which belongs to the cache kmalloc-16 of size 16 [ 21.155472] The buggy address is located 8 bytes inside of [ 21.155472] allocated 9-byte region [fff00000c3e60680, fff00000c3e60689) [ 21.155977] [ 21.156143] The buggy address belongs to the physical page: [ 21.157175] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103e60 [ 21.157725] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.158417] page_type: f5(slab) [ 21.158684] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 21.159066] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.159460] page dumped because: kasan: bad access detected [ 21.159706] [ 21.159870] Memory state around the buggy address: [ 21.160146] fff00000c3e60580: 00 02 fc fc fa fb fc fc fa fb fc fc 00 05 fc fc [ 21.161556] fff00000c3e60600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.162057] >fff00000c3e60680: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.162577] ^ [ 21.162942] fff00000c3e60700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.163489] fff00000c3e60780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.163932] ================================================================== [ 21.259442] ================================================================== [ 21.259895] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x334/0xbc8 [ 21.260844] Write of size 8 at addr fff00000c3e60688 by task kunit_try_catch/251 [ 21.261364] [ 21.261627] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 21.261826] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.261865] Hardware name: linux,dummy-virt (DT) [ 21.261909] Call trace: [ 21.261942] show_stack+0x20/0x38 (C) [ 21.262009] dump_stack_lvl+0x8c/0xd0 [ 21.262113] print_report+0x118/0x608 [ 21.262196] kasan_report+0xdc/0x128 [ 21.262256] kasan_check_range+0x100/0x1a8 [ 21.262311] __kasan_check_write+0x20/0x30 [ 21.262368] kasan_bitops_test_and_modify.constprop.0+0x334/0xbc8 [ 21.262434] kasan_bitops_generic+0x11c/0x1c8 [ 21.262492] kunit_try_run_case+0x170/0x3f0 [ 21.262551] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.262613] kthread+0x318/0x620 [ 21.262669] ret_from_fork+0x10/0x20 [ 21.262730] [ 21.267248] Allocated by task 251: [ 21.267488] kasan_save_stack+0x3c/0x68 [ 21.267894] kasan_save_track+0x20/0x40 [ 21.268265] kasan_save_alloc_info+0x40/0x58 [ 21.268524] __kasan_kmalloc+0xd4/0xd8 [ 21.268905] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.269294] kasan_bitops_generic+0xa0/0x1c8 [ 21.269549] kunit_try_run_case+0x170/0x3f0 [ 21.269958] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.270401] kthread+0x318/0x620 [ 21.270707] ret_from_fork+0x10/0x20 [ 21.270934] [ 21.271204] The buggy address belongs to the object at fff00000c3e60680 [ 21.271204] which belongs to the cache kmalloc-16 of size 16 [ 21.271989] The buggy address is located 8 bytes inside of [ 21.271989] allocated 9-byte region [fff00000c3e60680, fff00000c3e60689) [ 21.272710] [ 21.272936] The buggy address belongs to the physical page: [ 21.273330] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103e60 [ 21.273788] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.274151] page_type: f5(slab) [ 21.274398] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 21.274772] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.275281] page dumped because: kasan: bad access detected [ 21.275874] [ 21.276089] Memory state around the buggy address: [ 21.276448] fff00000c3e60580: 00 02 fc fc fa fb fc fc fa fb fc fc 00 05 fc fc [ 21.276961] fff00000c3e60600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.277455] >fff00000c3e60680: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.277994] ^ [ 21.278277] fff00000c3e60700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.278854] fff00000c3e60780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.279194] ================================================================== [ 21.184619] ================================================================== [ 21.185066] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc8 [ 21.185972] Write of size 8 at addr fff00000c3e60688 by task kunit_try_catch/251 [ 21.186368] [ 21.187514] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 21.187633] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.187669] Hardware name: linux,dummy-virt (DT) [ 21.187710] Call trace: [ 21.187740] show_stack+0x20/0x38 (C) [ 21.187808] dump_stack_lvl+0x8c/0xd0 [ 21.187863] print_report+0x118/0x608 [ 21.187919] kasan_report+0xdc/0x128 [ 21.187970] kasan_check_range+0x100/0x1a8 [ 21.188023] __kasan_check_write+0x20/0x30 [ 21.188075] kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc8 [ 21.188134] kasan_bitops_generic+0x11c/0x1c8 [ 21.188206] kunit_try_run_case+0x170/0x3f0 [ 21.188262] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.188319] kthread+0x318/0x620 [ 21.188372] ret_from_fork+0x10/0x20 [ 21.188427] [ 21.192636] Allocated by task 251: [ 21.192925] kasan_save_stack+0x3c/0x68 [ 21.193171] kasan_save_track+0x20/0x40 [ 21.193465] kasan_save_alloc_info+0x40/0x58 [ 21.193728] __kasan_kmalloc+0xd4/0xd8 [ 21.193969] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.194386] kasan_bitops_generic+0xa0/0x1c8 [ 21.194728] kunit_try_run_case+0x170/0x3f0 [ 21.195019] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.195381] kthread+0x318/0x620 [ 21.195602] ret_from_fork+0x10/0x20 [ 21.195855] [ 21.195984] The buggy address belongs to the object at fff00000c3e60680 [ 21.195984] which belongs to the cache kmalloc-16 of size 16 [ 21.196619] The buggy address is located 8 bytes inside of [ 21.196619] allocated 9-byte region [fff00000c3e60680, fff00000c3e60689) [ 21.197214] [ 21.197405] The buggy address belongs to the physical page: [ 21.197657] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103e60 [ 21.198160] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.198538] page_type: f5(slab) [ 21.198807] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 21.199208] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.199616] page dumped because: kasan: bad access detected [ 21.199905] [ 21.200086] Memory state around the buggy address: [ 21.200379] fff00000c3e60580: 00 02 fc fc fa fb fc fc fa fb fc fc 00 05 fc fc [ 21.200710] fff00000c3e60600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.201091] >fff00000c3e60680: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.201575] ^ [ 21.201799] fff00000c3e60700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.202250] fff00000c3e60780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.202501] ================================================================== [ 21.299744] ================================================================== [ 21.300138] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa8c/0xbc8 [ 21.300579] Read of size 8 at addr fff00000c3e60688 by task kunit_try_catch/251 [ 21.300855] [ 21.301049] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 21.301145] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.301191] Hardware name: linux,dummy-virt (DT) [ 21.301232] Call trace: [ 21.301263] show_stack+0x20/0x38 (C) [ 21.301324] dump_stack_lvl+0x8c/0xd0 [ 21.301380] print_report+0x118/0x608 [ 21.301437] kasan_report+0xdc/0x128 [ 21.301492] __asan_report_load8_noabort+0x20/0x30 [ 21.301563] kasan_bitops_test_and_modify.constprop.0+0xa8c/0xbc8 [ 21.301628] kasan_bitops_generic+0x11c/0x1c8 [ 21.301684] kunit_try_run_case+0x170/0x3f0 [ 21.301740] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.301801] kthread+0x318/0x620 [ 21.301852] ret_from_fork+0x10/0x20 [ 21.301910] [ 21.306403] Allocated by task 251: [ 21.306832] kasan_save_stack+0x3c/0x68 [ 21.307169] kasan_save_track+0x20/0x40 [ 21.307410] kasan_save_alloc_info+0x40/0x58 [ 21.307822] __kasan_kmalloc+0xd4/0xd8 [ 21.308250] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.308646] kasan_bitops_generic+0xa0/0x1c8 [ 21.308979] kunit_try_run_case+0x170/0x3f0 [ 21.309334] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.309717] kthread+0x318/0x620 [ 21.310043] ret_from_fork+0x10/0x20 [ 21.310216] [ 21.310527] The buggy address belongs to the object at fff00000c3e60680 [ 21.310527] which belongs to the cache kmalloc-16 of size 16 [ 21.311051] The buggy address is located 8 bytes inside of [ 21.311051] allocated 9-byte region [fff00000c3e60680, fff00000c3e60689) [ 21.311788] [ 21.311971] The buggy address belongs to the physical page: [ 21.312295] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103e60 [ 21.312700] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.312995] page_type: f5(slab) [ 21.313539] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 21.314047] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.314632] page dumped because: kasan: bad access detected [ 21.315060] [ 21.315211] Memory state around the buggy address: [ 21.315412] fff00000c3e60580: 00 02 fc fc fa fb fc fc fa fb fc fc 00 05 fc fc [ 21.315936] fff00000c3e60600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.316351] >fff00000c3e60680: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.316701] ^ [ 21.316871] fff00000c3e60700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.317455] fff00000c3e60780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.317904] ================================================================== [ 21.280742] ================================================================== [ 21.281215] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa44/0xbc8 [ 21.281964] Read of size 8 at addr fff00000c3e60688 by task kunit_try_catch/251 [ 21.282337] [ 21.282480] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 21.282582] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.282615] Hardware name: linux,dummy-virt (DT) [ 21.282657] Call trace: [ 21.282686] show_stack+0x20/0x38 (C) [ 21.282748] dump_stack_lvl+0x8c/0xd0 [ 21.282809] print_report+0x118/0x608 [ 21.282866] kasan_report+0xdc/0x128 [ 21.282923] __asan_report_load8_noabort+0x20/0x30 [ 21.282979] kasan_bitops_test_and_modify.constprop.0+0xa44/0xbc8 [ 21.283042] kasan_bitops_generic+0x11c/0x1c8 [ 21.283098] kunit_try_run_case+0x170/0x3f0 [ 21.283168] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.283236] kthread+0x318/0x620 [ 21.283291] ret_from_fork+0x10/0x20 [ 21.283351] [ 21.287545] Allocated by task 251: [ 21.287905] kasan_save_stack+0x3c/0x68 [ 21.288236] kasan_save_track+0x20/0x40 [ 21.288562] kasan_save_alloc_info+0x40/0x58 [ 21.288891] __kasan_kmalloc+0xd4/0xd8 [ 21.289203] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.289556] kasan_bitops_generic+0xa0/0x1c8 [ 21.289898] kunit_try_run_case+0x170/0x3f0 [ 21.290274] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.290593] kthread+0x318/0x620 [ 21.290804] ret_from_fork+0x10/0x20 [ 21.291033] [ 21.291436] The buggy address belongs to the object at fff00000c3e60680 [ 21.291436] which belongs to the cache kmalloc-16 of size 16 [ 21.292084] The buggy address is located 8 bytes inside of [ 21.292084] allocated 9-byte region [fff00000c3e60680, fff00000c3e60689) [ 21.292435] [ 21.292545] The buggy address belongs to the physical page: [ 21.292892] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103e60 [ 21.293410] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.293873] page_type: f5(slab) [ 21.294206] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 21.294618] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.295013] page dumped because: kasan: bad access detected [ 21.295438] [ 21.295651] Memory state around the buggy address: [ 21.295968] fff00000c3e60580: 00 02 fc fc fa fb fc fc fa fb fc fc 00 05 fc fc [ 21.296488] fff00000c3e60600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.296948] >fff00000c3e60680: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.297425] ^ [ 21.297696] fff00000c3e60700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.298163] fff00000c3e60780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.298692] ================================================================== [ 21.203926] ================================================================== [ 21.204357] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa50/0xbc8 [ 21.204868] Read of size 8 at addr fff00000c3e60688 by task kunit_try_catch/251 [ 21.205255] [ 21.205431] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 21.205541] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.205579] Hardware name: linux,dummy-virt (DT) [ 21.205622] Call trace: [ 21.205652] show_stack+0x20/0x38 (C) [ 21.205716] dump_stack_lvl+0x8c/0xd0 [ 21.205777] print_report+0x118/0x608 [ 21.205835] kasan_report+0xdc/0x128 [ 21.205893] __asan_report_load8_noabort+0x20/0x30 [ 21.205952] kasan_bitops_test_and_modify.constprop.0+0xa50/0xbc8 [ 21.206018] kasan_bitops_generic+0x11c/0x1c8 [ 21.206119] kunit_try_run_case+0x170/0x3f0 [ 21.206203] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.206269] kthread+0x318/0x620 [ 21.206323] ret_from_fork+0x10/0x20 [ 21.206386] [ 21.210063] Allocated by task 251: [ 21.210431] kasan_save_stack+0x3c/0x68 [ 21.210859] kasan_save_track+0x20/0x40 [ 21.211202] kasan_save_alloc_info+0x40/0x58 [ 21.211584] __kasan_kmalloc+0xd4/0xd8 [ 21.211835] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.212097] kasan_bitops_generic+0xa0/0x1c8 [ 21.212361] kunit_try_run_case+0x170/0x3f0 [ 21.212603] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.212912] kthread+0x318/0x620 [ 21.213140] ret_from_fork+0x10/0x20 [ 21.213768] [ 21.213891] The buggy address belongs to the object at fff00000c3e60680 [ 21.213891] which belongs to the cache kmalloc-16 of size 16 [ 21.214875] The buggy address is located 8 bytes inside of [ 21.214875] allocated 9-byte region [fff00000c3e60680, fff00000c3e60689) [ 21.215574] [ 21.215696] The buggy address belongs to the physical page: [ 21.216148] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103e60 [ 21.216685] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.217140] page_type: f5(slab) [ 21.217435] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 21.217983] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.218514] page dumped because: kasan: bad access detected [ 21.218904] [ 21.219139] Memory state around the buggy address: [ 21.219558] fff00000c3e60580: 00 02 fc fc fa fb fc fc fa fb fc fc 00 05 fc fc [ 21.219959] fff00000c3e60600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.220353] >fff00000c3e60680: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.220734] ^ [ 21.220973] fff00000c3e60700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.221645] fff00000c3e60780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.222091] ================================================================== [ 21.164881] ================================================================== [ 21.165684] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa08/0xbc8 [ 21.166659] Read of size 8 at addr fff00000c3e60688 by task kunit_try_catch/251 [ 21.167234] [ 21.167401] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 21.167508] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.167541] Hardware name: linux,dummy-virt (DT) [ 21.167584] Call trace: [ 21.167616] show_stack+0x20/0x38 (C) [ 21.167683] dump_stack_lvl+0x8c/0xd0 [ 21.167743] print_report+0x118/0x608 [ 21.167800] kasan_report+0xdc/0x128 [ 21.167856] __asan_report_load8_noabort+0x20/0x30 [ 21.167913] kasan_bitops_test_and_modify.constprop.0+0xa08/0xbc8 [ 21.167979] kasan_bitops_generic+0x11c/0x1c8 [ 21.168037] kunit_try_run_case+0x170/0x3f0 [ 21.168095] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.168220] kthread+0x318/0x620 [ 21.168339] ret_from_fork+0x10/0x20 [ 21.168403] [ 21.170587] Allocated by task 251: [ 21.170917] kasan_save_stack+0x3c/0x68 [ 21.171293] kasan_save_track+0x20/0x40 [ 21.171632] kasan_save_alloc_info+0x40/0x58 [ 21.171993] __kasan_kmalloc+0xd4/0xd8 [ 21.173573] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.173889] kasan_bitops_generic+0xa0/0x1c8 [ 21.174439] kunit_try_run_case+0x170/0x3f0 [ 21.174643] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.174873] kthread+0x318/0x620 [ 21.175039] ret_from_fork+0x10/0x20 [ 21.175218] [ 21.175353] The buggy address belongs to the object at fff00000c3e60680 [ 21.175353] which belongs to the cache kmalloc-16 of size 16 [ 21.175778] The buggy address is located 8 bytes inside of [ 21.175778] allocated 9-byte region [fff00000c3e60680, fff00000c3e60689) [ 21.177282] [ 21.177426] The buggy address belongs to the physical page: [ 21.177722] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103e60 [ 21.178639] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.178930] page_type: f5(slab) [ 21.179090] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 21.179344] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.179566] page dumped because: kasan: bad access detected [ 21.179749] [ 21.179853] Memory state around the buggy address: [ 21.180023] fff00000c3e60580: 00 02 fc fc fa fb fc fc fa fb fc fc 00 05 fc fc [ 21.181046] fff00000c3e60600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.181583] >fff00000c3e60680: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.181972] ^ [ 21.182894] fff00000c3e60700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.183309] fff00000c3e60780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.183766] ================================================================== [ 21.239384] ================================================================== [ 21.240050] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xad4/0xbc8 [ 21.240462] Read of size 8 at addr fff00000c3e60688 by task kunit_try_catch/251 [ 21.240831] [ 21.241026] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 21.241124] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.241170] Hardware name: linux,dummy-virt (DT) [ 21.241216] Call trace: [ 21.241247] show_stack+0x20/0x38 (C) [ 21.241312] dump_stack_lvl+0x8c/0xd0 [ 21.241370] print_report+0x118/0x608 [ 21.241426] kasan_report+0xdc/0x128 [ 21.241482] __asan_report_load8_noabort+0x20/0x30 [ 21.241553] kasan_bitops_test_and_modify.constprop.0+0xad4/0xbc8 [ 21.241621] kasan_bitops_generic+0x11c/0x1c8 [ 21.241678] kunit_try_run_case+0x170/0x3f0 [ 21.241736] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.241798] kthread+0x318/0x620 [ 21.241850] ret_from_fork+0x10/0x20 [ 21.241907] [ 21.244685] Allocated by task 251: [ 21.244959] kasan_save_stack+0x3c/0x68 [ 21.245310] kasan_save_track+0x20/0x40 [ 21.245599] kasan_save_alloc_info+0x40/0x58 [ 21.245842] __kasan_kmalloc+0xd4/0xd8 [ 21.246091] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.246290] kasan_bitops_generic+0xa0/0x1c8 [ 21.247068] kunit_try_run_case+0x170/0x3f0 [ 21.247396] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.247837] kthread+0x318/0x620 [ 21.248015] ret_from_fork+0x10/0x20 [ 21.248671] [ 21.249179] The buggy address belongs to the object at fff00000c3e60680 [ 21.249179] which belongs to the cache kmalloc-16 of size 16 [ 21.249539] The buggy address is located 8 bytes inside of [ 21.249539] allocated 9-byte region [fff00000c3e60680, fff00000c3e60689) [ 21.249874] [ 21.249980] The buggy address belongs to the physical page: [ 21.250173] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103e60 [ 21.250431] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.250652] page_type: f5(slab) [ 21.250809] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 21.251059] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.253048] page dumped because: kasan: bad access detected [ 21.253881] [ 21.254403] Memory state around the buggy address: [ 21.255058] fff00000c3e60580: 00 02 fc fc fa fb fc fc fa fb fc fc 00 05 fc fc [ 21.255794] fff00000c3e60600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.256597] >fff00000c3e60680: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.256890] ^ [ 21.257051] fff00000c3e60700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.257654] fff00000c3e60780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.258167] ================================================================== [ 21.223299] ================================================================== [ 21.223579] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc8 [ 21.224880] Write of size 8 at addr fff00000c3e60688 by task kunit_try_catch/251 [ 21.225348] [ 21.225555] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 21.225661] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.225699] Hardware name: linux,dummy-virt (DT) [ 21.225742] Call trace: [ 21.225775] show_stack+0x20/0x38 (C) [ 21.225841] dump_stack_lvl+0x8c/0xd0 [ 21.225900] print_report+0x118/0x608 [ 21.225958] kasan_report+0xdc/0x128 [ 21.226015] kasan_check_range+0x100/0x1a8 [ 21.226068] __kasan_check_write+0x20/0x30 [ 21.226142] kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc8 [ 21.226226] kasan_bitops_generic+0x11c/0x1c8 [ 21.226282] kunit_try_run_case+0x170/0x3f0 [ 21.226340] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.226402] kthread+0x318/0x620 [ 21.226453] ret_from_fork+0x10/0x20 [ 21.226511] [ 21.229274] Allocated by task 251: [ 21.229556] kasan_save_stack+0x3c/0x68 [ 21.229832] kasan_save_track+0x20/0x40 [ 21.230116] kasan_save_alloc_info+0x40/0x58 [ 21.230426] __kasan_kmalloc+0xd4/0xd8 [ 21.230746] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.231019] kasan_bitops_generic+0xa0/0x1c8 [ 21.231241] kunit_try_run_case+0x170/0x3f0 [ 21.231522] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.231725] kthread+0x318/0x620 [ 21.231923] ret_from_fork+0x10/0x20 [ 21.232254] [ 21.232372] The buggy address belongs to the object at fff00000c3e60680 [ 21.232372] which belongs to the cache kmalloc-16 of size 16 [ 21.232821] The buggy address is located 8 bytes inside of [ 21.232821] allocated 9-byte region [fff00000c3e60680, fff00000c3e60689) [ 21.233468] [ 21.233660] The buggy address belongs to the physical page: [ 21.233948] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103e60 [ 21.234346] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.234697] page_type: f5(slab) [ 21.235020] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 21.235446] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.235811] page dumped because: kasan: bad access detected [ 21.236137] [ 21.236257] Memory state around the buggy address: [ 21.236514] fff00000c3e60580: 00 02 fc fc fa fb fc fc fa fb fc fc 00 05 fc fc [ 21.236856] fff00000c3e60600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.237242] >fff00000c3e60680: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.237539] ^ [ 21.237827] fff00000c3e60700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.238088] fff00000c3e60780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.238487] ==================================================================
[ 15.081584] ================================================================== [ 15.082180] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x558/0xd90 [ 15.082492] Read of size 8 at addr ffff888101b5abe8 by task kunit_try_catch/269 [ 15.082934] [ 15.083048] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 15.083087] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.083099] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.083119] Call Trace: [ 15.083132] <TASK> [ 15.083147] dump_stack_lvl+0x73/0xb0 [ 15.083171] print_report+0xd1/0x650 [ 15.083192] ? __virt_addr_valid+0x1db/0x2d0 [ 15.083214] ? kasan_bitops_test_and_modify.constprop.0+0x558/0xd90 [ 15.083240] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.083265] ? kasan_bitops_test_and_modify.constprop.0+0x558/0xd90 [ 15.083292] kasan_report+0x140/0x180 [ 15.083313] ? kasan_bitops_test_and_modify.constprop.0+0x558/0xd90 [ 15.083344] kasan_check_range+0x10c/0x1c0 [ 15.083366] __kasan_check_read+0x15/0x20 [ 15.083388] kasan_bitops_test_and_modify.constprop.0+0x558/0xd90 [ 15.083415] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 15.083442] ? __kmalloc_cache_noprof+0x18a/0x420 [ 15.083465] ? trace_hardirqs_on+0x37/0xe0 [ 15.083486] ? kasan_bitops_generic+0x93/0x1c0 [ 15.083514] kasan_bitops_generic+0x122/0x1c0 [ 15.083535] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 15.083556] ? trace_hardirqs_on+0x37/0xe0 [ 15.083657] ? __pfx_read_tsc+0x10/0x10 [ 15.083678] ? ktime_get_ts64+0x86/0x230 [ 15.083700] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 15.083726] kunit_try_run_case+0x1a6/0x480 [ 15.083749] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.083771] ? queued_spin_lock_slowpath+0x117/0xb40 [ 15.083796] ? __kthread_parkme+0x82/0x160 [ 15.083817] ? preempt_count_sub+0x50/0x80 [ 15.083842] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.083864] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.083889] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.083914] kthread+0x324/0x6e0 [ 15.083936] ? trace_preempt_on+0x20/0xc0 [ 15.083958] ? __pfx_kthread+0x10/0x10 [ 15.083979] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.084001] ? calculate_sigpending+0x7b/0xa0 [ 15.084034] ? __pfx_kthread+0x10/0x10 [ 15.084057] ret_from_fork+0x41/0x80 [ 15.084074] ? __pfx_kthread+0x10/0x10 [ 15.084096] ret_from_fork_asm+0x1a/0x30 [ 15.084126] </TASK> [ 15.084136] [ 15.094038] Allocated by task 269: [ 15.094220] kasan_save_stack+0x45/0x70 [ 15.094391] kasan_save_track+0x18/0x40 [ 15.094627] kasan_save_alloc_info+0x3b/0x50 [ 15.094818] __kasan_kmalloc+0xb7/0xc0 [ 15.094995] __kmalloc_cache_noprof+0x18a/0x420 [ 15.095212] kasan_bitops_generic+0x93/0x1c0 [ 15.095409] kunit_try_run_case+0x1a6/0x480 [ 15.095828] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.096068] kthread+0x324/0x6e0 [ 15.096223] ret_from_fork+0x41/0x80 [ 15.096351] ret_from_fork_asm+0x1a/0x30 [ 15.096488] [ 15.096558] The buggy address belongs to the object at ffff888101b5abe0 [ 15.096558] which belongs to the cache kmalloc-16 of size 16 [ 15.096923] The buggy address is located 8 bytes inside of [ 15.096923] allocated 9-byte region [ffff888101b5abe0, ffff888101b5abe9) [ 15.097501] [ 15.097618] The buggy address belongs to the physical page: [ 15.098116] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b5a [ 15.098438] flags: 0x200000000000000(node=0|zone=2) [ 15.098866] page_type: f5(slab) [ 15.098991] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 15.099227] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 15.099441] page dumped because: kasan: bad access detected [ 15.100050] [ 15.100180] Memory state around the buggy address: [ 15.100449] ffff888101b5aa80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 15.101000] ffff888101b5ab00: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 15.101353] >ffff888101b5ab80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 15.101840] ^ [ 15.102172] ffff888101b5ac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.102439] ffff888101b5ac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.102641] ================================================================== [ 15.053569] ================================================================== [ 15.053822] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90 [ 15.054235] Write of size 8 at addr ffff888101b5abe8 by task kunit_try_catch/269 [ 15.054561] [ 15.054663] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 15.054702] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.054714] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.054733] Call Trace: [ 15.054747] <TASK> [ 15.054761] dump_stack_lvl+0x73/0xb0 [ 15.054784] print_report+0xd1/0x650 [ 15.054803] ? __virt_addr_valid+0x1db/0x2d0 [ 15.054825] ? kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90 [ 15.054850] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.054876] ? kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90 [ 15.054901] kasan_report+0x140/0x180 [ 15.054923] ? kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90 [ 15.054953] kasan_check_range+0x10c/0x1c0 [ 15.054976] __kasan_check_write+0x18/0x20 [ 15.054998] kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90 [ 15.055034] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 15.055062] ? __kmalloc_cache_noprof+0x18a/0x420 [ 15.055085] ? trace_hardirqs_on+0x37/0xe0 [ 15.055106] ? kasan_bitops_generic+0x93/0x1c0 [ 15.055132] kasan_bitops_generic+0x122/0x1c0 [ 15.055154] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 15.055176] ? trace_hardirqs_on+0x37/0xe0 [ 15.055197] ? __pfx_read_tsc+0x10/0x10 [ 15.055218] ? ktime_get_ts64+0x86/0x230 [ 15.055239] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 15.055265] kunit_try_run_case+0x1a6/0x480 [ 15.055287] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.055311] ? queued_spin_lock_slowpath+0x117/0xb40 [ 15.055333] ? __kthread_parkme+0x82/0x160 [ 15.055354] ? preempt_count_sub+0x50/0x80 [ 15.055377] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.055399] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.055425] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.055451] kthread+0x324/0x6e0 [ 15.055471] ? trace_preempt_on+0x20/0xc0 [ 15.055492] ? __pfx_kthread+0x10/0x10 [ 15.055515] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.055536] ? calculate_sigpending+0x7b/0xa0 [ 15.055557] ? __pfx_kthread+0x10/0x10 [ 15.055578] ret_from_fork+0x41/0x80 [ 15.055596] ? __pfx_kthread+0x10/0x10 [ 15.055617] ret_from_fork_asm+0x1a/0x30 [ 15.055648] </TASK> [ 15.055657] [ 15.067288] Allocated by task 269: [ 15.067450] kasan_save_stack+0x45/0x70 [ 15.067596] kasan_save_track+0x18/0x40 [ 15.067785] kasan_save_alloc_info+0x3b/0x50 [ 15.068133] __kasan_kmalloc+0xb7/0xc0 [ 15.068329] __kmalloc_cache_noprof+0x18a/0x420 [ 15.068553] kasan_bitops_generic+0x93/0x1c0 [ 15.068772] kunit_try_run_case+0x1a6/0x480 [ 15.069813] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.070224] kthread+0x324/0x6e0 [ 15.070356] ret_from_fork+0x41/0x80 [ 15.070485] ret_from_fork_asm+0x1a/0x30 [ 15.071266] [ 15.071444] The buggy address belongs to the object at ffff888101b5abe0 [ 15.071444] which belongs to the cache kmalloc-16 of size 16 [ 15.073165] The buggy address is located 8 bytes inside of [ 15.073165] allocated 9-byte region [ffff888101b5abe0, ffff888101b5abe9) [ 15.073512] [ 15.074071] The buggy address belongs to the physical page: [ 15.074765] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b5a [ 15.075849] flags: 0x200000000000000(node=0|zone=2) [ 15.076255] page_type: f5(slab) [ 15.076997] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 15.077994] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 15.078248] page dumped because: kasan: bad access detected [ 15.078419] [ 15.078490] Memory state around the buggy address: [ 15.079123] ffff888101b5aa80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 15.079616] ffff888101b5ab00: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 15.080039] >ffff888101b5ab80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 15.080319] ^ [ 15.080577] ffff888101b5ac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.080835] ffff888101b5ac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.081145] ================================================================== [ 15.001957] ================================================================== [ 15.002387] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90 [ 15.003289] Write of size 8 at addr ffff888101b5abe8 by task kunit_try_catch/269 [ 15.003761] [ 15.004253] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 15.004313] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.004326] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.004347] Call Trace: [ 15.004391] <TASK> [ 15.004408] dump_stack_lvl+0x73/0xb0 [ 15.004436] print_report+0xd1/0x650 [ 15.004458] ? __virt_addr_valid+0x1db/0x2d0 [ 15.004479] ? kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90 [ 15.004505] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.004532] ? kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90 [ 15.004559] kasan_report+0x140/0x180 [ 15.004580] ? kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90 [ 15.004611] kasan_check_range+0x10c/0x1c0 [ 15.004633] __kasan_check_write+0x18/0x20 [ 15.004655] kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90 [ 15.004681] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 15.004708] ? __kmalloc_cache_noprof+0x18a/0x420 [ 15.004731] ? trace_hardirqs_on+0x37/0xe0 [ 15.004753] ? kasan_bitops_generic+0x93/0x1c0 [ 15.004779] kasan_bitops_generic+0x122/0x1c0 [ 15.004801] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 15.004824] ? trace_hardirqs_on+0x37/0xe0 [ 15.004846] ? __pfx_read_tsc+0x10/0x10 [ 15.004867] ? ktime_get_ts64+0x86/0x230 [ 15.004889] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 15.004915] kunit_try_run_case+0x1a6/0x480 [ 15.004937] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.004959] ? queued_spin_lock_slowpath+0x117/0xb40 [ 15.004984] ? __kthread_parkme+0x82/0x160 [ 15.005006] ? preempt_count_sub+0x50/0x80 [ 15.005040] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.005062] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.005088] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.005115] kthread+0x324/0x6e0 [ 15.005135] ? trace_preempt_on+0x20/0xc0 [ 15.005156] ? __pfx_kthread+0x10/0x10 [ 15.005178] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.005199] ? calculate_sigpending+0x7b/0xa0 [ 15.005219] ? __pfx_kthread+0x10/0x10 [ 15.005242] ret_from_fork+0x41/0x80 [ 15.005259] ? __pfx_kthread+0x10/0x10 [ 15.005281] ret_from_fork_asm+0x1a/0x30 [ 15.005311] </TASK> [ 15.005320] [ 15.019116] Allocated by task 269: [ 15.019296] kasan_save_stack+0x45/0x70 [ 15.019480] kasan_save_track+0x18/0x40 [ 15.020067] kasan_save_alloc_info+0x3b/0x50 [ 15.020334] __kasan_kmalloc+0xb7/0xc0 [ 15.020685] __kmalloc_cache_noprof+0x18a/0x420 [ 15.021147] kasan_bitops_generic+0x93/0x1c0 [ 15.021433] kunit_try_run_case+0x1a6/0x480 [ 15.021904] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.022363] kthread+0x324/0x6e0 [ 15.022563] ret_from_fork+0x41/0x80 [ 15.022884] ret_from_fork_asm+0x1a/0x30 [ 15.023078] [ 15.023168] The buggy address belongs to the object at ffff888101b5abe0 [ 15.023168] which belongs to the cache kmalloc-16 of size 16 [ 15.023953] The buggy address is located 8 bytes inside of [ 15.023953] allocated 9-byte region [ffff888101b5abe0, ffff888101b5abe9) [ 15.025071] [ 15.025315] The buggy address belongs to the physical page: [ 15.025723] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b5a [ 15.026281] flags: 0x200000000000000(node=0|zone=2) [ 15.026789] page_type: f5(slab) [ 15.027306] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 15.027772] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 15.028244] page dumped because: kasan: bad access detected [ 15.028483] [ 15.028799] Memory state around the buggy address: [ 15.029234] ffff888101b5aa80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 15.029754] ffff888101b5ab00: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 15.030342] >ffff888101b5ab80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 15.031087] ^ [ 15.031568] ffff888101b5ac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.032099] ffff888101b5ac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.032594] ================================================================== [ 15.103228] ================================================================== [ 15.103593] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90 [ 15.104036] Read of size 8 at addr ffff888101b5abe8 by task kunit_try_catch/269 [ 15.104434] [ 15.104577] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 15.104676] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.104690] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.104712] Call Trace: [ 15.104728] <TASK> [ 15.104743] dump_stack_lvl+0x73/0xb0 [ 15.104769] print_report+0xd1/0x650 [ 15.104790] ? __virt_addr_valid+0x1db/0x2d0 [ 15.104811] ? kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90 [ 15.104838] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.104864] ? kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90 [ 15.104890] kasan_report+0x140/0x180 [ 15.104912] ? kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90 [ 15.104944] __asan_report_load8_noabort+0x18/0x20 [ 15.104968] kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90 [ 15.104994] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 15.105035] ? __kmalloc_cache_noprof+0x18a/0x420 [ 15.105058] ? trace_hardirqs_on+0x37/0xe0 [ 15.105081] ? kasan_bitops_generic+0x93/0x1c0 [ 15.105106] kasan_bitops_generic+0x122/0x1c0 [ 15.105128] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 15.105150] ? trace_hardirqs_on+0x37/0xe0 [ 15.105171] ? __pfx_read_tsc+0x10/0x10 [ 15.105193] ? ktime_get_ts64+0x86/0x230 [ 15.105214] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 15.105240] kunit_try_run_case+0x1a6/0x480 [ 15.105262] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.105285] ? queued_spin_lock_slowpath+0x117/0xb40 [ 15.105310] ? __kthread_parkme+0x82/0x160 [ 15.105331] ? preempt_count_sub+0x50/0x80 [ 15.105355] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.105377] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.105403] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.105428] kthread+0x324/0x6e0 [ 15.105449] ? trace_preempt_on+0x20/0xc0 [ 15.105471] ? __pfx_kthread+0x10/0x10 [ 15.105493] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.105515] ? calculate_sigpending+0x7b/0xa0 [ 15.105536] ? __pfx_kthread+0x10/0x10 [ 15.105558] ret_from_fork+0x41/0x80 [ 15.105576] ? __pfx_kthread+0x10/0x10 [ 15.105598] ret_from_fork_asm+0x1a/0x30 [ 15.105629] </TASK> [ 15.105638] [ 15.117425] Allocated by task 269: [ 15.117899] kasan_save_stack+0x45/0x70 [ 15.118101] kasan_save_track+0x18/0x40 [ 15.118387] kasan_save_alloc_info+0x3b/0x50 [ 15.118660] __kasan_kmalloc+0xb7/0xc0 [ 15.118985] __kmalloc_cache_noprof+0x18a/0x420 [ 15.119312] kasan_bitops_generic+0x93/0x1c0 [ 15.119664] kunit_try_run_case+0x1a6/0x480 [ 15.119849] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.120095] kthread+0x324/0x6e0 [ 15.120357] ret_from_fork+0x41/0x80 [ 15.120812] ret_from_fork_asm+0x1a/0x30 [ 15.121062] [ 15.121147] The buggy address belongs to the object at ffff888101b5abe0 [ 15.121147] which belongs to the cache kmalloc-16 of size 16 [ 15.121641] The buggy address is located 8 bytes inside of [ 15.121641] allocated 9-byte region [ffff888101b5abe0, ffff888101b5abe9) [ 15.122195] [ 15.122325] The buggy address belongs to the physical page: [ 15.122621] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b5a [ 15.122959] flags: 0x200000000000000(node=0|zone=2) [ 15.123131] page_type: f5(slab) [ 15.123298] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 15.124080] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 15.124538] page dumped because: kasan: bad access detected [ 15.124867] [ 15.124958] Memory state around the buggy address: [ 15.125338] ffff888101b5aa80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 15.125798] ffff888101b5ab00: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 15.126243] >ffff888101b5ab80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 15.126685] ^ [ 15.127134] ffff888101b5ac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.127523] ffff888101b5ac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.128084] ================================================================== [ 14.926516] ================================================================== [ 14.926947] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90 [ 14.927372] Write of size 8 at addr ffff888101b5abe8 by task kunit_try_catch/269 [ 14.927786] [ 14.927892] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 14.927930] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.927942] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.927963] Call Trace: [ 14.927978] <TASK> [ 14.927994] dump_stack_lvl+0x73/0xb0 [ 14.928029] print_report+0xd1/0x650 [ 14.928049] ? __virt_addr_valid+0x1db/0x2d0 [ 14.928070] ? kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90 [ 14.928096] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.928121] ? kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90 [ 14.928147] kasan_report+0x140/0x180 [ 14.928169] ? kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90 [ 14.928200] kasan_check_range+0x10c/0x1c0 [ 14.928223] __kasan_check_write+0x18/0x20 [ 14.928245] kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90 [ 14.928272] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.928299] ? __kmalloc_cache_noprof+0x18a/0x420 [ 14.928322] ? trace_hardirqs_on+0x37/0xe0 [ 14.928342] ? kasan_bitops_generic+0x93/0x1c0 [ 14.928369] kasan_bitops_generic+0x122/0x1c0 [ 14.928391] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.928413] ? trace_hardirqs_on+0x37/0xe0 [ 14.928434] ? __pfx_read_tsc+0x10/0x10 [ 14.928455] ? ktime_get_ts64+0x86/0x230 [ 14.928476] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 14.928501] kunit_try_run_case+0x1a6/0x480 [ 14.928523] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.928546] ? queued_spin_lock_slowpath+0x117/0xb40 [ 14.928568] ? __kthread_parkme+0x82/0x160 [ 14.928590] ? preempt_count_sub+0x50/0x80 [ 14.928612] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.928635] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.928661] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.928687] kthread+0x324/0x6e0 [ 14.928707] ? trace_preempt_on+0x20/0xc0 [ 14.928729] ? __pfx_kthread+0x10/0x10 [ 14.928751] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.928772] ? calculate_sigpending+0x7b/0xa0 [ 14.928793] ? __pfx_kthread+0x10/0x10 [ 14.928815] ret_from_fork+0x41/0x80 [ 14.928833] ? __pfx_kthread+0x10/0x10 [ 14.928854] ret_from_fork_asm+0x1a/0x30 [ 14.928885] </TASK> [ 14.928894] [ 14.937455] Allocated by task 269: [ 14.937586] kasan_save_stack+0x45/0x70 [ 14.937811] kasan_save_track+0x18/0x40 [ 14.938004] kasan_save_alloc_info+0x3b/0x50 [ 14.938227] __kasan_kmalloc+0xb7/0xc0 [ 14.938412] __kmalloc_cache_noprof+0x18a/0x420 [ 14.938855] kasan_bitops_generic+0x93/0x1c0 [ 14.939097] kunit_try_run_case+0x1a6/0x480 [ 14.939305] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.939559] kthread+0x324/0x6e0 [ 14.939808] ret_from_fork+0x41/0x80 [ 14.939998] ret_from_fork_asm+0x1a/0x30 [ 14.940206] [ 14.940300] The buggy address belongs to the object at ffff888101b5abe0 [ 14.940300] which belongs to the cache kmalloc-16 of size 16 [ 14.940908] The buggy address is located 8 bytes inside of [ 14.940908] allocated 9-byte region [ffff888101b5abe0, ffff888101b5abe9) [ 14.941338] [ 14.941411] The buggy address belongs to the physical page: [ 14.941582] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b5a [ 14.941899] flags: 0x200000000000000(node=0|zone=2) [ 14.942146] page_type: f5(slab) [ 14.942316] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.942895] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.943244] page dumped because: kasan: bad access detected [ 14.943500] [ 14.943596] Memory state around the buggy address: [ 14.943911] ffff888101b5aa80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.944154] ffff888101b5ab00: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 14.944367] >ffff888101b5ab80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 14.944640] ^ [ 14.944929] ffff888101b5ac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.945247] ffff888101b5ac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.945553] ================================================================== [ 15.033060] ================================================================== [ 15.033329] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90 [ 15.033678] Write of size 8 at addr ffff888101b5abe8 by task kunit_try_catch/269 [ 15.034100] [ 15.034197] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 15.034235] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.034247] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.034269] Call Trace: [ 15.034284] <TASK> [ 15.034301] dump_stack_lvl+0x73/0xb0 [ 15.034324] print_report+0xd1/0x650 [ 15.034345] ? __virt_addr_valid+0x1db/0x2d0 [ 15.034367] ? kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90 [ 15.034393] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.034418] ? kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90 [ 15.034444] kasan_report+0x140/0x180 [ 15.034465] ? kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90 [ 15.034496] kasan_check_range+0x10c/0x1c0 [ 15.034518] __kasan_check_write+0x18/0x20 [ 15.034553] kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90 [ 15.034580] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 15.034618] ? __kmalloc_cache_noprof+0x18a/0x420 [ 15.034649] ? trace_hardirqs_on+0x37/0xe0 [ 15.034671] ? kasan_bitops_generic+0x93/0x1c0 [ 15.034697] kasan_bitops_generic+0x122/0x1c0 [ 15.034729] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 15.034752] ? trace_hardirqs_on+0x37/0xe0 [ 15.034774] ? __pfx_read_tsc+0x10/0x10 [ 15.034794] ? ktime_get_ts64+0x86/0x230 [ 15.034816] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 15.034843] kunit_try_run_case+0x1a6/0x480 [ 15.034866] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.034889] ? queued_spin_lock_slowpath+0x117/0xb40 [ 15.034913] ? __kthread_parkme+0x82/0x160 [ 15.034935] ? preempt_count_sub+0x50/0x80 [ 15.034958] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.034980] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.035006] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.035041] kthread+0x324/0x6e0 [ 15.035061] ? trace_preempt_on+0x20/0xc0 [ 15.035084] ? __pfx_kthread+0x10/0x10 [ 15.035105] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.035126] ? calculate_sigpending+0x7b/0xa0 [ 15.035148] ? __pfx_kthread+0x10/0x10 [ 15.035170] ret_from_fork+0x41/0x80 [ 15.035187] ? __pfx_kthread+0x10/0x10 [ 15.035209] ret_from_fork_asm+0x1a/0x30 [ 15.035239] </TASK> [ 15.035250] [ 15.044507] Allocated by task 269: [ 15.044641] kasan_save_stack+0x45/0x70 [ 15.044783] kasan_save_track+0x18/0x40 [ 15.044918] kasan_save_alloc_info+0x3b/0x50 [ 15.045075] __kasan_kmalloc+0xb7/0xc0 [ 15.045204] __kmalloc_cache_noprof+0x18a/0x420 [ 15.045528] kasan_bitops_generic+0x93/0x1c0 [ 15.045779] kunit_try_run_case+0x1a6/0x480 [ 15.046203] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.046461] kthread+0x324/0x6e0 [ 15.046717] ret_from_fork+0x41/0x80 [ 15.046918] ret_from_fork_asm+0x1a/0x30 [ 15.047149] [ 15.047259] The buggy address belongs to the object at ffff888101b5abe0 [ 15.047259] which belongs to the cache kmalloc-16 of size 16 [ 15.047851] The buggy address is located 8 bytes inside of [ 15.047851] allocated 9-byte region [ffff888101b5abe0, ffff888101b5abe9) [ 15.048412] [ 15.048531] The buggy address belongs to the physical page: [ 15.048931] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b5a [ 15.049248] flags: 0x200000000000000(node=0|zone=2) [ 15.049414] page_type: f5(slab) [ 15.049572] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 15.050267] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 15.050825] page dumped because: kasan: bad access detected [ 15.051148] [ 15.051226] Memory state around the buggy address: [ 15.051425] ffff888101b5aa80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 15.051742] ffff888101b5ab00: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 15.052110] >ffff888101b5ab80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 15.052360] ^ [ 15.052661] ffff888101b5ac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.052941] ffff888101b5ac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.053164] ================================================================== [ 14.906737] ================================================================== [ 14.907101] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x102/0xd90 [ 14.907505] Write of size 8 at addr ffff888101b5abe8 by task kunit_try_catch/269 [ 14.908186] [ 14.908298] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 14.908337] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.908349] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.908368] Call Trace: [ 14.908383] <TASK> [ 14.908396] dump_stack_lvl+0x73/0xb0 [ 14.908422] print_report+0xd1/0x650 [ 14.908443] ? __virt_addr_valid+0x1db/0x2d0 [ 14.908465] ? kasan_bitops_test_and_modify.constprop.0+0x102/0xd90 [ 14.908491] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.908516] ? kasan_bitops_test_and_modify.constprop.0+0x102/0xd90 [ 14.908543] kasan_report+0x140/0x180 [ 14.908647] ? kasan_bitops_test_and_modify.constprop.0+0x102/0xd90 [ 14.908678] kasan_check_range+0x10c/0x1c0 [ 14.908701] __kasan_check_write+0x18/0x20 [ 14.908723] kasan_bitops_test_and_modify.constprop.0+0x102/0xd90 [ 14.908750] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.908777] ? __kmalloc_cache_noprof+0x18a/0x420 [ 14.908799] ? trace_hardirqs_on+0x37/0xe0 [ 14.908821] ? kasan_bitops_generic+0x93/0x1c0 [ 14.908847] kasan_bitops_generic+0x122/0x1c0 [ 14.908869] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.908890] ? trace_hardirqs_on+0x37/0xe0 [ 14.908912] ? __pfx_read_tsc+0x10/0x10 [ 14.908934] ? ktime_get_ts64+0x86/0x230 [ 14.908956] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 14.908982] kunit_try_run_case+0x1a6/0x480 [ 14.909005] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.909040] ? queued_spin_lock_slowpath+0x117/0xb40 [ 14.909066] ? __kthread_parkme+0x82/0x160 [ 14.909087] ? preempt_count_sub+0x50/0x80 [ 14.909112] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.909134] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.909159] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.909185] kthread+0x324/0x6e0 [ 14.909206] ? trace_preempt_on+0x20/0xc0 [ 14.909227] ? __pfx_kthread+0x10/0x10 [ 14.909249] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.909271] ? calculate_sigpending+0x7b/0xa0 [ 14.909292] ? __pfx_kthread+0x10/0x10 [ 14.909314] ret_from_fork+0x41/0x80 [ 14.909332] ? __pfx_kthread+0x10/0x10 [ 14.909353] ret_from_fork_asm+0x1a/0x30 [ 14.909384] </TASK> [ 14.909393] [ 14.918222] Allocated by task 269: [ 14.918352] kasan_save_stack+0x45/0x70 [ 14.918550] kasan_save_track+0x18/0x40 [ 14.918822] kasan_save_alloc_info+0x3b/0x50 [ 14.919050] __kasan_kmalloc+0xb7/0xc0 [ 14.919221] __kmalloc_cache_noprof+0x18a/0x420 [ 14.919373] kasan_bitops_generic+0x93/0x1c0 [ 14.919531] kunit_try_run_case+0x1a6/0x480 [ 14.920002] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.920298] kthread+0x324/0x6e0 [ 14.920484] ret_from_fork+0x41/0x80 [ 14.920755] ret_from_fork_asm+0x1a/0x30 [ 14.920919] [ 14.920990] The buggy address belongs to the object at ffff888101b5abe0 [ 14.920990] which belongs to the cache kmalloc-16 of size 16 [ 14.921534] The buggy address is located 8 bytes inside of [ 14.921534] allocated 9-byte region [ffff888101b5abe0, ffff888101b5abe9) [ 14.922117] [ 14.922191] The buggy address belongs to the physical page: [ 14.922386] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b5a [ 14.922771] flags: 0x200000000000000(node=0|zone=2) [ 14.922984] page_type: f5(slab) [ 14.923133] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.923414] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.923761] page dumped because: kasan: bad access detected [ 14.924023] [ 14.924117] Memory state around the buggy address: [ 14.924271] ffff888101b5aa80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.924484] ffff888101b5ab00: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 14.924696] >ffff888101b5ab80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 14.924994] ^ [ 14.925517] ffff888101b5ac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.925920] ffff888101b5ac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.926169] ================================================================== [ 14.975206] ================================================================== [ 14.975545] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90 [ 14.976685] Write of size 8 at addr ffff888101b5abe8 by task kunit_try_catch/269 [ 14.977455] [ 14.977575] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 14.977863] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.977878] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.977898] Call Trace: [ 14.977913] <TASK> [ 14.977929] dump_stack_lvl+0x73/0xb0 [ 14.977955] print_report+0xd1/0x650 [ 14.977976] ? __virt_addr_valid+0x1db/0x2d0 [ 14.977997] ? kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90 [ 14.978035] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.978060] ? kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90 [ 14.978087] kasan_report+0x140/0x180 [ 14.978108] ? kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90 [ 14.978139] kasan_check_range+0x10c/0x1c0 [ 14.978162] __kasan_check_write+0x18/0x20 [ 14.978184] kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90 [ 14.978211] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.978238] ? __kmalloc_cache_noprof+0x18a/0x420 [ 14.978261] ? trace_hardirqs_on+0x37/0xe0 [ 14.978282] ? kasan_bitops_generic+0x93/0x1c0 [ 14.978308] kasan_bitops_generic+0x122/0x1c0 [ 14.978331] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.978353] ? trace_hardirqs_on+0x37/0xe0 [ 14.978376] ? __pfx_read_tsc+0x10/0x10 [ 14.978397] ? ktime_get_ts64+0x86/0x230 [ 14.978418] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 14.978444] kunit_try_run_case+0x1a6/0x480 [ 14.978467] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.978490] ? queued_spin_lock_slowpath+0x117/0xb40 [ 14.978516] ? __kthread_parkme+0x82/0x160 [ 14.978537] ? preempt_count_sub+0x50/0x80 [ 14.978561] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.978583] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.978609] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.978635] kthread+0x324/0x6e0 [ 14.978655] ? trace_preempt_on+0x20/0xc0 [ 14.978677] ? __pfx_kthread+0x10/0x10 [ 14.978698] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.978719] ? calculate_sigpending+0x7b/0xa0 [ 14.978741] ? __pfx_kthread+0x10/0x10 [ 14.978763] ret_from_fork+0x41/0x80 [ 14.978781] ? __pfx_kthread+0x10/0x10 [ 14.978802] ret_from_fork_asm+0x1a/0x30 [ 14.978833] </TASK> [ 14.978843] [ 14.989239] Allocated by task 269: [ 14.989374] kasan_save_stack+0x45/0x70 [ 14.989518] kasan_save_track+0x18/0x40 [ 14.989912] kasan_save_alloc_info+0x3b/0x50 [ 14.990136] __kasan_kmalloc+0xb7/0xc0 [ 14.990327] __kmalloc_cache_noprof+0x18a/0x420 [ 14.990550] kasan_bitops_generic+0x93/0x1c0 [ 14.990728] kunit_try_run_case+0x1a6/0x480 [ 14.990901] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.991170] kthread+0x324/0x6e0 [ 14.991305] ret_from_fork+0x41/0x80 [ 14.991489] ret_from_fork_asm+0x1a/0x30 [ 14.991677] [ 14.991750] The buggy address belongs to the object at ffff888101b5abe0 [ 14.991750] which belongs to the cache kmalloc-16 of size 16 [ 14.992113] The buggy address is located 8 bytes inside of [ 14.992113] allocated 9-byte region [ffff888101b5abe0, ffff888101b5abe9) [ 14.992629] [ 14.992721] The buggy address belongs to the physical page: [ 14.993951] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b5a [ 14.994308] flags: 0x200000000000000(node=0|zone=2) [ 14.994523] page_type: f5(slab) [ 14.995003] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.995717] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.996400] page dumped because: kasan: bad access detected [ 14.996891] [ 14.997159] Memory state around the buggy address: [ 14.997393] ffff888101b5aa80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.997932] ffff888101b5ab00: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 14.998500] >ffff888101b5ab80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 14.999204] ^ [ 14.999900] ffff888101b5ac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.000363] ffff888101b5ac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.000979] ================================================================== [ 14.946001] ================================================================== [ 14.946442] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90 [ 14.947005] Write of size 8 at addr ffff888101b5abe8 by task kunit_try_catch/269 [ 14.947327] [ 14.947406] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.14.10-rc1 #1 [ 14.947443] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.947455] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.947475] Call Trace: [ 14.947488] <TASK> [ 14.947500] dump_stack_lvl+0x73/0xb0 [ 14.947524] print_report+0xd1/0x650 [ 14.947646] ? __virt_addr_valid+0x1db/0x2d0 [ 14.947674] ? kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90 [ 14.947701] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.947726] ? kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90 [ 14.947752] kasan_report+0x140/0x180 [ 14.947773] ? kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90 [ 14.947804] kasan_check_range+0x10c/0x1c0 [ 14.947827] __kasan_check_write+0x18/0x20 [ 14.947851] kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90 [ 14.947877] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.947904] ? __kmalloc_cache_noprof+0x18a/0x420 [ 14.947927] ? trace_hardirqs_on+0x37/0xe0 [ 14.947949] ? kasan_bitops_generic+0x93/0x1c0 [ 14.947975] kasan_bitops_generic+0x122/0x1c0 [ 14.947998] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.948032] ? trace_hardirqs_on+0x37/0xe0 [ 14.948055] ? __pfx_read_tsc+0x10/0x10 [ 14.948078] ? ktime_get_ts64+0x86/0x230 [ 14.948099] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 14.948127] kunit_try_run_case+0x1a6/0x480 [ 14.948151] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.948174] ? queued_spin_lock_slowpath+0x117/0xb40 [ 14.948199] ? __kthread_parkme+0x82/0x160 [ 14.948220] ? preempt_count_sub+0x50/0x80 [ 14.948244] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.948268] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.948293] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.948319] kthread+0x324/0x6e0 [ 14.948341] ? trace_preempt_on+0x20/0xc0 [ 14.948362] ? __pfx_kthread+0x10/0x10 [ 14.948385] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.948406] ? calculate_sigpending+0x7b/0xa0 [ 14.948428] ? __pfx_kthread+0x10/0x10 [ 14.948450] ret_from_fork+0x41/0x80 [ 14.948468] ? __pfx_kthread+0x10/0x10 [ 14.948489] ret_from_fork_asm+0x1a/0x30 [ 14.948519] </TASK> [ 14.948529] [ 14.962304] Allocated by task 269: [ 14.962444] kasan_save_stack+0x45/0x70 [ 14.963212] kasan_save_track+0x18/0x40 [ 14.963933] kasan_save_alloc_info+0x3b/0x50 [ 14.964784] __kasan_kmalloc+0xb7/0xc0 [ 14.965306] __kmalloc_cache_noprof+0x18a/0x420 [ 14.965476] kasan_bitops_generic+0x93/0x1c0 [ 14.965654] kunit_try_run_case+0x1a6/0x480 [ 14.966218] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.966432] kthread+0x324/0x6e0 [ 14.966682] ret_from_fork+0x41/0x80 [ 14.966985] ret_from_fork_asm+0x1a/0x30 [ 14.967298] [ 14.967605] The buggy address belongs to the object at ffff888101b5abe0 [ 14.967605] which belongs to the cache kmalloc-16 of size 16 [ 14.968107] The buggy address is located 8 bytes inside of [ 14.968107] allocated 9-byte region [ffff888101b5abe0, ffff888101b5abe9) [ 14.968584] [ 14.969004] The buggy address belongs to the physical page: [ 14.969220] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b5a [ 14.969768] flags: 0x200000000000000(node=0|zone=2) [ 14.969990] page_type: f5(slab) [ 14.970316] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.970774] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.971343] page dumped because: kasan: bad access detected [ 14.971539] [ 14.971637] Memory state around the buggy address: [ 14.972240] ffff888101b5aa80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.972547] ffff888101b5ab00: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 14.973036] >ffff888101b5ab80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 14.973451] ^ [ 14.973863] ffff888101b5ac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.974288] ffff888101b5ac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.974738] ==================================================================