Date
May 23, 2025, 11:07 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 31.097765] ================================================================== [ 31.098024] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 31.098247] Write of size 8 at addr fff00000c5a2a728 by task kunit_try_catch/263 [ 31.098395] [ 31.098555] CPU: 0 UID: 0 PID: 263 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT [ 31.099143] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.099262] Hardware name: linux,dummy-virt (DT) [ 31.099426] Call trace: [ 31.099512] show_stack+0x20/0x38 (C) [ 31.099710] dump_stack_lvl+0x8c/0xd0 [ 31.099913] print_report+0x118/0x608 [ 31.100043] kasan_report+0xdc/0x128 [ 31.100437] kasan_check_range+0x100/0x1a8 [ 31.100649] __kasan_check_write+0x20/0x30 [ 31.100846] kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 31.101078] kasan_bitops_generic+0x110/0x1c8 [ 31.101279] kunit_try_run_case+0x170/0x3f0 [ 31.101494] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.101928] kthread+0x328/0x630 [ 31.102133] ret_from_fork+0x10/0x20 [ 31.102280] [ 31.102341] Allocated by task 263: [ 31.102586] kasan_save_stack+0x3c/0x68 [ 31.102962] kasan_save_track+0x20/0x40 [ 31.103173] kasan_save_alloc_info+0x40/0x58 [ 31.103299] __kasan_kmalloc+0xd4/0xd8 [ 31.103430] __kmalloc_cache_noprof+0x15c/0x3c0 [ 31.103586] kasan_bitops_generic+0xa0/0x1c8 [ 31.103703] kunit_try_run_case+0x170/0x3f0 [ 31.103831] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.103969] kthread+0x328/0x630 [ 31.104089] ret_from_fork+0x10/0x20 [ 31.104503] [ 31.104570] The buggy address belongs to the object at fff00000c5a2a720 [ 31.104570] which belongs to the cache kmalloc-16 of size 16 [ 31.104879] The buggy address is located 8 bytes inside of [ 31.104879] allocated 9-byte region [fff00000c5a2a720, fff00000c5a2a729) [ 31.105068] [ 31.105394] The buggy address belongs to the physical page: [ 31.105568] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a2a [ 31.105798] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.106008] page_type: f5(slab) [ 31.106126] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 31.106282] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 31.106472] page dumped because: kasan: bad access detected [ 31.106570] [ 31.106632] Memory state around the buggy address: [ 31.106736] fff00000c5a2a600: 00 01 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 31.106874] fff00000c5a2a680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 31.107013] >fff00000c5a2a700: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 31.107139] ^ [ 31.107242] fff00000c5a2a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.107391] fff00000c5a2a800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.107547] ================================================================== [ 31.109835] ================================================================== [ 31.110041] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 31.110205] Read of size 8 at addr fff00000c5a2a728 by task kunit_try_catch/263 [ 31.110424] [ 31.110640] CPU: 0 UID: 0 PID: 263 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT [ 31.111192] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.111300] Hardware name: linux,dummy-virt (DT) [ 31.111427] Call trace: [ 31.111530] show_stack+0x20/0x38 (C) [ 31.111681] dump_stack_lvl+0x8c/0xd0 [ 31.112123] print_report+0x118/0x608 [ 31.112302] kasan_report+0xdc/0x128 [ 31.112493] __asan_report_load8_noabort+0x20/0x30 [ 31.112686] kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 31.112903] kasan_bitops_generic+0x110/0x1c8 [ 31.113056] kunit_try_run_case+0x170/0x3f0 [ 31.113248] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.113397] kthread+0x328/0x630 [ 31.113540] ret_from_fork+0x10/0x20 [ 31.113688] [ 31.113755] Allocated by task 263: [ 31.113846] kasan_save_stack+0x3c/0x68 [ 31.113967] kasan_save_track+0x20/0x40 [ 31.114080] kasan_save_alloc_info+0x40/0x58 [ 31.114207] __kasan_kmalloc+0xd4/0xd8 [ 31.114314] __kmalloc_cache_noprof+0x15c/0x3c0 [ 31.114833] kasan_bitops_generic+0xa0/0x1c8 [ 31.115186] kunit_try_run_case+0x170/0x3f0 [ 31.115432] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.115682] kthread+0x328/0x630 [ 31.115819] ret_from_fork+0x10/0x20 [ 31.116021] [ 31.116116] The buggy address belongs to the object at fff00000c5a2a720 [ 31.116116] which belongs to the cache kmalloc-16 of size 16 [ 31.116281] The buggy address is located 8 bytes inside of [ 31.116281] allocated 9-byte region [fff00000c5a2a720, fff00000c5a2a729) [ 31.116813] [ 31.116907] The buggy address belongs to the physical page: [ 31.117013] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a2a [ 31.117179] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.117379] page_type: f5(slab) [ 31.117539] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 31.117685] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 31.118066] page dumped because: kasan: bad access detected [ 31.118192] [ 31.118275] Memory state around the buggy address: [ 31.118393] fff00000c5a2a600: 00 01 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 31.118580] fff00000c5a2a680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 31.118797] >fff00000c5a2a700: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 31.118942] ^ [ 31.119039] fff00000c5a2a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.119435] fff00000c5a2a800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.119586] ================================================================== [ 31.121602] ================================================================== [ 31.121784] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc0 [ 31.122717] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.124114] __kasan_check_write+0x20/0x30 [ 31.124655] kthread+0x328/0x630 [ 31.128939] The buggy address is located 8 bytes inside of [ 31.128939] allocated 9-byte region [fff00000c5a2a720, fff00000c5a2a729) [ 31.131035] fff00000c5a2a680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 31.132011] ==================================================================
[ 14.668085] ================================================================== [ 14.668423] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 14.668716] Write of size 8 at addr ffff8881029e3088 by task kunit_try_catch/280 [ 14.669407] [ 14.669603] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT(voluntary) [ 14.669649] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.669662] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.669682] Call Trace: [ 14.669699] <TASK> [ 14.669715] dump_stack_lvl+0x73/0xb0 [ 14.669743] print_report+0xd1/0x650 [ 14.669765] ? __virt_addr_valid+0x1db/0x2d0 [ 14.669786] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 14.669807] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.669830] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 14.669852] kasan_report+0x141/0x180 [ 14.669874] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 14.669981] kasan_check_range+0x10c/0x1c0 [ 14.670003] __kasan_check_write+0x18/0x20 [ 14.670041] kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 14.670063] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.670087] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.670124] ? trace_hardirqs_on+0x37/0xe0 [ 14.670147] ? kasan_bitops_generic+0x92/0x1c0 [ 14.670188] kasan_bitops_generic+0x116/0x1c0 [ 14.670209] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.670230] ? __pfx_read_tsc+0x10/0x10 [ 14.670250] ? ktime_get_ts64+0x86/0x230 [ 14.670274] kunit_try_run_case+0x1a5/0x480 [ 14.670310] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.670332] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.670372] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.670408] ? __kthread_parkme+0x82/0x180 [ 14.670431] ? preempt_count_sub+0x50/0x80 [ 14.670467] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.670491] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.670514] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.670536] kthread+0x337/0x6f0 [ 14.670554] ? trace_preempt_on+0x20/0xc0 [ 14.670577] ? __pfx_kthread+0x10/0x10 [ 14.670594] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.670615] ? calculate_sigpending+0x7b/0xa0 [ 14.670635] ? __pfx_kthread+0x10/0x10 [ 14.670654] ret_from_fork+0x41/0x80 [ 14.670680] ? __pfx_kthread+0x10/0x10 [ 14.670716] ret_from_fork_asm+0x1a/0x30 [ 14.670761] </TASK> [ 14.670771] [ 14.680424] Allocated by task 280: [ 14.680616] kasan_save_stack+0x45/0x70 [ 14.680805] kasan_save_track+0x18/0x40 [ 14.680943] kasan_save_alloc_info+0x3b/0x50 [ 14.681144] __kasan_kmalloc+0xb7/0xc0 [ 14.681352] __kmalloc_cache_noprof+0x189/0x420 [ 14.681578] kasan_bitops_generic+0x92/0x1c0 [ 14.681787] kunit_try_run_case+0x1a5/0x480 [ 14.682217] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.682536] kthread+0x337/0x6f0 [ 14.682691] ret_from_fork+0x41/0x80 [ 14.682851] ret_from_fork_asm+0x1a/0x30 [ 14.682986] [ 14.683056] The buggy address belongs to the object at ffff8881029e3080 [ 14.683056] which belongs to the cache kmalloc-16 of size 16 [ 14.683834] The buggy address is located 8 bytes inside of [ 14.683834] allocated 9-byte region [ffff8881029e3080, ffff8881029e3089) [ 14.684473] [ 14.684581] The buggy address belongs to the physical page: [ 14.684872] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e3 [ 14.685266] flags: 0x200000000000000(node=0|zone=2) [ 14.685493] page_type: f5(slab) [ 14.685675] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.685990] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.686210] page dumped because: kasan: bad access detected [ 14.686385] [ 14.686456] Memory state around the buggy address: [ 14.686990] ffff8881029e2f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.687510] ffff8881029e3000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.687844] >ffff8881029e3080: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.688504] ^ [ 14.688672] ffff8881029e3100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.689078] ffff8881029e3180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.689430] ================================================================== [ 14.689847] ================================================================== [ 14.690184] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50 [ 14.690699] Write of size 8 at addr ffff8881029e3088 by task kunit_try_catch/280 [ 14.691281] [ 14.691412] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT(voluntary) [ 14.691458] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.691470] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.691491] Call Trace: [ 14.691508] <TASK> [ 14.691524] dump_stack_lvl+0x73/0xb0 [ 14.691552] print_report+0xd1/0x650 [ 14.691584] ? __virt_addr_valid+0x1db/0x2d0 [ 14.691606] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 14.691628] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.691673] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 14.691695] kasan_report+0x141/0x180 [ 14.691718] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 14.691762] kasan_check_range+0x10c/0x1c0 [ 14.691782] __kasan_check_write+0x18/0x20 [ 14.691802] kasan_bitops_modify.constprop.0+0x373/0xd50 [ 14.691824] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.691846] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.691867] ? trace_hardirqs_on+0x37/0xe0 [ 14.691889] ? kasan_bitops_generic+0x92/0x1c0 [ 14.691913] kasan_bitops_generic+0x116/0x1c0 [ 14.692131] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.692152] ? __pfx_read_tsc+0x10/0x10 [ 14.692173] ? ktime_get_ts64+0x86/0x230 [ 14.692198] kunit_try_run_case+0x1a5/0x480 [ 14.692222] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.692244] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.692267] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.692289] ? __kthread_parkme+0x82/0x180 [ 14.692320] ? preempt_count_sub+0x50/0x80 [ 14.692345] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.692367] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.692390] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.692412] kthread+0x337/0x6f0 [ 14.692429] ? trace_preempt_on+0x20/0xc0 [ 14.692451] ? __pfx_kthread+0x10/0x10 [ 14.692469] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.692489] ? calculate_sigpending+0x7b/0xa0 [ 14.692510] ? __pfx_kthread+0x10/0x10 [ 14.692549] ret_from_fork+0x41/0x80 [ 14.692569] ? __pfx_kthread+0x10/0x10 [ 14.692587] ret_from_fork_asm+0x1a/0x30 [ 14.692617] </TASK> [ 14.692627] [ 14.702683] Allocated by task 280: [ 14.702975] kasan_save_stack+0x45/0x70 [ 14.703154] kasan_save_track+0x18/0x40 [ 14.703293] kasan_save_alloc_info+0x3b/0x50 [ 14.703743] __kasan_kmalloc+0xb7/0xc0 [ 14.704036] __kmalloc_cache_noprof+0x189/0x420 [ 14.704320] kasan_bitops_generic+0x92/0x1c0 [ 14.704568] kunit_try_run_case+0x1a5/0x480 [ 14.704731] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.704942] kthread+0x337/0x6f0 [ 14.705220] ret_from_fork+0x41/0x80 [ 14.705421] ret_from_fork_asm+0x1a/0x30 [ 14.705664] [ 14.705738] The buggy address belongs to the object at ffff8881029e3080 [ 14.705738] which belongs to the cache kmalloc-16 of size 16 [ 14.706153] The buggy address is located 8 bytes inside of [ 14.706153] allocated 9-byte region [ffff8881029e3080, ffff8881029e3089) [ 14.707007] [ 14.707126] The buggy address belongs to the physical page: [ 14.707732] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e3 [ 14.708232] flags: 0x200000000000000(node=0|zone=2) [ 14.708414] page_type: f5(slab) [ 14.708665] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.709017] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.709473] page dumped because: kasan: bad access detected [ 14.709764] [ 14.709858] Memory state around the buggy address: [ 14.710153] ffff8881029e2f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.710451] ffff8881029e3000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.710830] >ffff8881029e3080: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.711331] ^ [ 14.711559] ffff8881029e3100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.711911] ffff8881029e3180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.712352] ================================================================== [ 14.646590] ================================================================== [ 14.647335] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 14.648049] Write of size 8 at addr ffff8881029e3088 by task kunit_try_catch/280 [ 14.648828] [ 14.649122] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT(voluntary) [ 14.649183] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.649197] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.649220] Call Trace: [ 14.649237] <TASK> [ 14.649253] dump_stack_lvl+0x73/0xb0 [ 14.649283] print_report+0xd1/0x650 [ 14.649318] ? __virt_addr_valid+0x1db/0x2d0 [ 14.649340] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 14.649361] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.649383] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 14.649405] kasan_report+0x141/0x180 [ 14.649429] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 14.649457] kasan_check_range+0x10c/0x1c0 [ 14.649477] __kasan_check_write+0x18/0x20 [ 14.649497] kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 14.649519] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.649541] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.649563] ? trace_hardirqs_on+0x37/0xe0 [ 14.649585] ? kasan_bitops_generic+0x92/0x1c0 [ 14.649609] kasan_bitops_generic+0x116/0x1c0 [ 14.649629] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.649650] ? __pfx_read_tsc+0x10/0x10 [ 14.649669] ? ktime_get_ts64+0x86/0x230 [ 14.649694] kunit_try_run_case+0x1a5/0x480 [ 14.649718] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.649740] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.649763] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.649786] ? __kthread_parkme+0x82/0x180 [ 14.649808] ? preempt_count_sub+0x50/0x80 [ 14.649832] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.649856] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.649878] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.649903] kthread+0x337/0x6f0 [ 14.649920] ? trace_preempt_on+0x20/0xc0 [ 14.649943] ? __pfx_kthread+0x10/0x10 [ 14.649962] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.649983] ? calculate_sigpending+0x7b/0xa0 [ 14.650007] ? __pfx_kthread+0x10/0x10 [ 14.650025] ret_from_fork+0x41/0x80 [ 14.650046] ? __pfx_kthread+0x10/0x10 [ 14.650065] ret_from_fork_asm+0x1a/0x30 [ 14.650097] </TASK> [ 14.650108] [ 14.658647] Allocated by task 280: [ 14.658785] kasan_save_stack+0x45/0x70 [ 14.659125] kasan_save_track+0x18/0x40 [ 14.659346] kasan_save_alloc_info+0x3b/0x50 [ 14.659562] __kasan_kmalloc+0xb7/0xc0 [ 14.659726] __kmalloc_cache_noprof+0x189/0x420 [ 14.660000] kasan_bitops_generic+0x92/0x1c0 [ 14.660155] kunit_try_run_case+0x1a5/0x480 [ 14.660350] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.660627] kthread+0x337/0x6f0 [ 14.660792] ret_from_fork+0x41/0x80 [ 14.660971] ret_from_fork_asm+0x1a/0x30 [ 14.661401] [ 14.661534] The buggy address belongs to the object at ffff8881029e3080 [ 14.661534] which belongs to the cache kmalloc-16 of size 16 [ 14.661969] The buggy address is located 8 bytes inside of [ 14.661969] allocated 9-byte region [ffff8881029e3080, ffff8881029e3089) [ 14.662376] [ 14.662571] The buggy address belongs to the physical page: [ 14.662855] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e3 [ 14.663310] flags: 0x200000000000000(node=0|zone=2) [ 14.663558] page_type: f5(slab) [ 14.663678] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.664206] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.664616] page dumped because: kasan: bad access detected [ 14.665083] [ 14.665203] Memory state around the buggy address: [ 14.665372] ffff8881029e2f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.665971] ffff8881029e3000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.666279] >ffff8881029e3080: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.666636] ^ [ 14.666829] ffff8881029e3100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.667154] ffff8881029e3180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.667593] ================================================================== [ 14.712954] ================================================================== [ 14.713360] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 14.713796] Write of size 8 at addr ffff8881029e3088 by task kunit_try_catch/280 [ 14.714160] [ 14.714248] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT(voluntary) [ 14.714293] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.714316] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.714402] Call Trace: [ 14.714420] <TASK> [ 14.714436] dump_stack_lvl+0x73/0xb0 [ 14.714464] print_report+0xd1/0x650 [ 14.714486] ? __virt_addr_valid+0x1db/0x2d0 [ 14.714507] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 14.714528] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.714550] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 14.714572] kasan_report+0x141/0x180 [ 14.714595] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 14.714622] kasan_check_range+0x10c/0x1c0 [ 14.714642] __kasan_check_write+0x18/0x20 [ 14.714662] kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 14.714689] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.714737] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.714759] ? trace_hardirqs_on+0x37/0xe0 [ 14.714782] ? kasan_bitops_generic+0x92/0x1c0 [ 14.714820] kasan_bitops_generic+0x116/0x1c0 [ 14.714841] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.714862] ? __pfx_read_tsc+0x10/0x10 [ 14.714882] ? ktime_get_ts64+0x86/0x230 [ 14.715091] kunit_try_run_case+0x1a5/0x480 [ 14.715116] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.715137] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.715161] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.715183] ? __kthread_parkme+0x82/0x180 [ 14.715205] ? preempt_count_sub+0x50/0x80 [ 14.715229] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.715252] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.715381] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.715405] kthread+0x337/0x6f0 [ 14.715422] ? trace_preempt_on+0x20/0xc0 [ 14.715445] ? __pfx_kthread+0x10/0x10 [ 14.715463] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.715485] ? calculate_sigpending+0x7b/0xa0 [ 14.715506] ? __pfx_kthread+0x10/0x10 [ 14.715524] ret_from_fork+0x41/0x80 [ 14.715545] ? __pfx_kthread+0x10/0x10 [ 14.715562] ret_from_fork_asm+0x1a/0x30 [ 14.715593] </TASK> [ 14.715604] [ 14.725804] Allocated by task 280: [ 14.726101] kasan_save_stack+0x45/0x70 [ 14.726293] kasan_save_track+0x18/0x40 [ 14.726791] kasan_save_alloc_info+0x3b/0x50 [ 14.727026] __kasan_kmalloc+0xb7/0xc0 [ 14.727414] __kmalloc_cache_noprof+0x189/0x420 [ 14.727643] kasan_bitops_generic+0x92/0x1c0 [ 14.727852] kunit_try_run_case+0x1a5/0x480 [ 14.728109] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.728391] kthread+0x337/0x6f0 [ 14.728642] ret_from_fork+0x41/0x80 [ 14.728788] ret_from_fork_asm+0x1a/0x30 [ 14.729083] [ 14.729199] The buggy address belongs to the object at ffff8881029e3080 [ 14.729199] which belongs to the cache kmalloc-16 of size 16 [ 14.729713] The buggy address is located 8 bytes inside of [ 14.729713] allocated 9-byte region [ffff8881029e3080, ffff8881029e3089) [ 14.730328] [ 14.730436] The buggy address belongs to the physical page: [ 14.730693] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e3 [ 14.731285] flags: 0x200000000000000(node=0|zone=2) [ 14.731644] page_type: f5(slab) [ 14.731834] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.732281] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.732713] page dumped because: kasan: bad access detected [ 14.732914] [ 14.733010] Memory state around the buggy address: [ 14.733238] ffff8881029e2f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.733573] ffff8881029e3000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.733959] >ffff8881029e3080: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.734245] ^ [ 14.734433] ffff8881029e3100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.734701] ffff8881029e3180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.734992] ================================================================== [ 14.619646] ================================================================== [ 14.620186] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 14.620500] Write of size 8 at addr ffff8881029e3088 by task kunit_try_catch/280 [ 14.620861] [ 14.621045] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT(voluntary) [ 14.621092] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.621105] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.621126] Call Trace: [ 14.621144] <TASK> [ 14.621160] dump_stack_lvl+0x73/0xb0 [ 14.621186] print_report+0xd1/0x650 [ 14.621208] ? __virt_addr_valid+0x1db/0x2d0 [ 14.621230] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 14.621251] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.621273] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 14.621295] kasan_report+0x141/0x180 [ 14.621330] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 14.621357] kasan_check_range+0x10c/0x1c0 [ 14.621377] __kasan_check_write+0x18/0x20 [ 14.621396] kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 14.621438] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.621462] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.621483] ? trace_hardirqs_on+0x37/0xe0 [ 14.621506] ? kasan_bitops_generic+0x92/0x1c0 [ 14.621530] kasan_bitops_generic+0x116/0x1c0 [ 14.621550] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.621571] ? __pfx_read_tsc+0x10/0x10 [ 14.621591] ? ktime_get_ts64+0x86/0x230 [ 14.621615] kunit_try_run_case+0x1a5/0x480 [ 14.621640] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.621662] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.621685] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.621707] ? __kthread_parkme+0x82/0x180 [ 14.621730] ? preempt_count_sub+0x50/0x80 [ 14.621755] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.621779] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.621801] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.621823] kthread+0x337/0x6f0 [ 14.621840] ? trace_preempt_on+0x20/0xc0 [ 14.621862] ? __pfx_kthread+0x10/0x10 [ 14.621887] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.621907] ? calculate_sigpending+0x7b/0xa0 [ 14.621928] ? __pfx_kthread+0x10/0x10 [ 14.621947] ret_from_fork+0x41/0x80 [ 14.621967] ? __pfx_kthread+0x10/0x10 [ 14.621985] ret_from_fork_asm+0x1a/0x30 [ 14.622016] </TASK> [ 14.622026] [ 14.631051] Allocated by task 280: [ 14.631236] kasan_save_stack+0x45/0x70 [ 14.631448] kasan_save_track+0x18/0x40 [ 14.631629] kasan_save_alloc_info+0x3b/0x50 [ 14.631809] __kasan_kmalloc+0xb7/0xc0 [ 14.631986] __kmalloc_cache_noprof+0x189/0x420 [ 14.632171] kasan_bitops_generic+0x92/0x1c0 [ 14.633213] kunit_try_run_case+0x1a5/0x480 [ 14.633584] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.634121] kthread+0x337/0x6f0 [ 14.634288] ret_from_fork+0x41/0x80 [ 14.634669] ret_from_fork_asm+0x1a/0x30 [ 14.635141] [ 14.635386] The buggy address belongs to the object at ffff8881029e3080 [ 14.635386] which belongs to the cache kmalloc-16 of size 16 [ 14.636394] The buggy address is located 8 bytes inside of [ 14.636394] allocated 9-byte region [ffff8881029e3080, ffff8881029e3089) [ 14.637335] [ 14.637627] The buggy address belongs to the physical page: [ 14.637875] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e3 [ 14.638194] flags: 0x200000000000000(node=0|zone=2) [ 14.639059] page_type: f5(slab) [ 14.639392] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.640220] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.640760] page dumped because: kasan: bad access detected [ 14.641220] [ 14.641330] Memory state around the buggy address: [ 14.641742] ffff8881029e2f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.642270] ffff8881029e3000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.642733] >ffff8881029e3080: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.643400] ^ [ 14.643719] ffff8881029e3100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.644503] ffff8881029e3180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.645111] ================================================================== [ 14.735378] ================================================================== [ 14.735839] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 14.736278] Write of size 8 at addr ffff8881029e3088 by task kunit_try_catch/280 [ 14.736633] [ 14.736748] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT(voluntary) [ 14.736793] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.736805] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.736827] Call Trace: [ 14.736842] <TASK> [ 14.736859] dump_stack_lvl+0x73/0xb0 [ 14.736938] print_report+0xd1/0x650 [ 14.736964] ? __virt_addr_valid+0x1db/0x2d0 [ 14.736985] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 14.737007] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.737030] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 14.737051] kasan_report+0x141/0x180 [ 14.737074] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 14.737102] kasan_check_range+0x10c/0x1c0 [ 14.737122] __kasan_check_write+0x18/0x20 [ 14.737141] kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 14.737164] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.737187] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.737207] ? trace_hardirqs_on+0x37/0xe0 [ 14.737229] ? kasan_bitops_generic+0x92/0x1c0 [ 14.737253] kasan_bitops_generic+0x116/0x1c0 [ 14.737272] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.737294] ? __pfx_read_tsc+0x10/0x10 [ 14.737324] ? ktime_get_ts64+0x86/0x230 [ 14.737349] kunit_try_run_case+0x1a5/0x480 [ 14.737372] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.737394] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.737416] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.737439] ? __kthread_parkme+0x82/0x180 [ 14.737460] ? preempt_count_sub+0x50/0x80 [ 14.737485] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.737508] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.737530] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.737552] kthread+0x337/0x6f0 [ 14.737569] ? trace_preempt_on+0x20/0xc0 [ 14.737591] ? __pfx_kthread+0x10/0x10 [ 14.737609] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.737629] ? calculate_sigpending+0x7b/0xa0 [ 14.737651] ? __pfx_kthread+0x10/0x10 [ 14.737669] ret_from_fork+0x41/0x80 [ 14.737689] ? __pfx_kthread+0x10/0x10 [ 14.737707] ret_from_fork_asm+0x1a/0x30 [ 14.737738] </TASK> [ 14.737748] [ 14.746683] Allocated by task 280: [ 14.746879] kasan_save_stack+0x45/0x70 [ 14.747140] kasan_save_track+0x18/0x40 [ 14.747294] kasan_save_alloc_info+0x3b/0x50 [ 14.747554] __kasan_kmalloc+0xb7/0xc0 [ 14.747707] __kmalloc_cache_noprof+0x189/0x420 [ 14.747894] kasan_bitops_generic+0x92/0x1c0 [ 14.748041] kunit_try_run_case+0x1a5/0x480 [ 14.748186] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.748492] kthread+0x337/0x6f0 [ 14.748845] ret_from_fork+0x41/0x80 [ 14.749131] ret_from_fork_asm+0x1a/0x30 [ 14.749409] [ 14.749607] The buggy address belongs to the object at ffff8881029e3080 [ 14.749607] which belongs to the cache kmalloc-16 of size 16 [ 14.750146] The buggy address is located 8 bytes inside of [ 14.750146] allocated 9-byte region [ffff8881029e3080, ffff8881029e3089) [ 14.750532] [ 14.750630] The buggy address belongs to the physical page: [ 14.750917] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e3 [ 14.751340] flags: 0x200000000000000(node=0|zone=2) [ 14.751524] page_type: f5(slab) [ 14.751646] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.752257] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.752722] page dumped because: kasan: bad access detected [ 14.752899] [ 14.752971] Memory state around the buggy address: [ 14.753152] ffff8881029e2f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.753654] ffff8881029e3000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.753977] >ffff8881029e3080: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.754266] ^ [ 14.754544] ffff8881029e3100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.754810] ffff8881029e3180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.755166] ================================================================== [ 14.755539] ================================================================== [ 14.755881] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50 [ 14.756241] Write of size 8 at addr ffff8881029e3088 by task kunit_try_catch/280 [ 14.756665] [ 14.756777] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT(voluntary) [ 14.756822] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.756834] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.756854] Call Trace: [ 14.756868] <TASK> [ 14.756882] dump_stack_lvl+0x73/0xb0 [ 14.756907] print_report+0xd1/0x650 [ 14.756929] ? __virt_addr_valid+0x1db/0x2d0 [ 14.756949] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 14.756971] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.756994] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 14.757016] kasan_report+0x141/0x180 [ 14.757038] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 14.757064] kasan_check_range+0x10c/0x1c0 [ 14.757084] __kasan_check_write+0x18/0x20 [ 14.757103] kasan_bitops_modify.constprop.0+0x547/0xd50 [ 14.757125] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.757148] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.757168] ? trace_hardirqs_on+0x37/0xe0 [ 14.757189] ? kasan_bitops_generic+0x92/0x1c0 [ 14.757213] kasan_bitops_generic+0x116/0x1c0 [ 14.757232] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.757253] ? __pfx_read_tsc+0x10/0x10 [ 14.757272] ? ktime_get_ts64+0x86/0x230 [ 14.757297] kunit_try_run_case+0x1a5/0x480 [ 14.757330] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.757351] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.757374] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.757396] ? __kthread_parkme+0x82/0x180 [ 14.757417] ? preempt_count_sub+0x50/0x80 [ 14.757617] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.757654] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.757677] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.757700] kthread+0x337/0x6f0 [ 14.757718] ? trace_preempt_on+0x20/0xc0 [ 14.757741] ? __pfx_kthread+0x10/0x10 [ 14.757758] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.757780] ? calculate_sigpending+0x7b/0xa0 [ 14.757801] ? __pfx_kthread+0x10/0x10 [ 14.757819] ret_from_fork+0x41/0x80 [ 14.757839] ? __pfx_kthread+0x10/0x10 [ 14.757857] ret_from_fork_asm+0x1a/0x30 [ 14.757942] </TASK> [ 14.757955] [ 14.766786] Allocated by task 280: [ 14.766968] kasan_save_stack+0x45/0x70 [ 14.767162] kasan_save_track+0x18/0x40 [ 14.767357] kasan_save_alloc_info+0x3b/0x50 [ 14.767592] __kasan_kmalloc+0xb7/0xc0 [ 14.767782] __kmalloc_cache_noprof+0x189/0x420 [ 14.767941] kasan_bitops_generic+0x92/0x1c0 [ 14.768155] kunit_try_run_case+0x1a5/0x480 [ 14.768343] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.768571] kthread+0x337/0x6f0 [ 14.768816] ret_from_fork+0x41/0x80 [ 14.769011] ret_from_fork_asm+0x1a/0x30 [ 14.769173] [ 14.769270] The buggy address belongs to the object at ffff8881029e3080 [ 14.769270] which belongs to the cache kmalloc-16 of size 16 [ 14.769650] The buggy address is located 8 bytes inside of [ 14.769650] allocated 9-byte region [ffff8881029e3080, ffff8881029e3089) [ 14.770003] [ 14.770090] The buggy address belongs to the physical page: [ 14.770347] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e3 [ 14.770957] flags: 0x200000000000000(node=0|zone=2) [ 14.771189] page_type: f5(slab) [ 14.771370] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.771753] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.771981] page dumped because: kasan: bad access detected [ 14.772154] [ 14.772223] Memory state around the buggy address: [ 14.772421] ffff8881029e2f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.772748] ffff8881029e3000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.773083] >ffff8881029e3080: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.773683] ^ [ 14.773866] ffff8881029e3100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.774188] ffff8881029e3180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.774537] ================================================================== [ 14.599141] ================================================================== [ 14.599811] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50 [ 14.600458] Write of size 8 at addr ffff8881029e3088 by task kunit_try_catch/280 [ 14.600761] [ 14.600859] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc7 #1 PREEMPT(voluntary) [ 14.600975] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.600988] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.601011] Call Trace: [ 14.601023] <TASK> [ 14.601041] dump_stack_lvl+0x73/0xb0 [ 14.601072] print_report+0xd1/0x650 [ 14.601095] ? __virt_addr_valid+0x1db/0x2d0 [ 14.601119] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 14.601141] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.601163] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 14.601185] kasan_report+0x141/0x180 [ 14.601208] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 14.601235] kasan_check_range+0x10c/0x1c0 [ 14.601255] __kasan_check_write+0x18/0x20 [ 14.601275] kasan_bitops_modify.constprop.0+0x101/0xd50 [ 14.601309] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.601332] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.601353] ? trace_hardirqs_on+0x37/0xe0 [ 14.601378] ? kasan_bitops_generic+0x92/0x1c0 [ 14.601402] kasan_bitops_generic+0x116/0x1c0 [ 14.601441] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.601463] ? __pfx_read_tsc+0x10/0x10 [ 14.601484] ? ktime_get_ts64+0x86/0x230 [ 14.601510] kunit_try_run_case+0x1a5/0x480 [ 14.601534] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.601556] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.601579] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.601602] ? __kthread_parkme+0x82/0x180 [ 14.601625] ? preempt_count_sub+0x50/0x80 [ 14.601652] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.601674] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.601697] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.601720] kthread+0x337/0x6f0 [ 14.601736] ? trace_preempt_on+0x20/0xc0 [ 14.601759] ? __pfx_kthread+0x10/0x10 [ 14.601777] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.601797] ? calculate_sigpending+0x7b/0xa0 [ 14.601819] ? __pfx_kthread+0x10/0x10 [ 14.601838] ret_from_fork+0x41/0x80 [ 14.601858] ? __pfx_kthread+0x10/0x10 [ 14.602071] ret_from_fork_asm+0x1a/0x30 [ 14.602105] </TASK> [ 14.602116] [ 14.610702] Allocated by task 280: [ 14.610961] kasan_save_stack+0x45/0x70 [ 14.611180] kasan_save_track+0x18/0x40 [ 14.611369] kasan_save_alloc_info+0x3b/0x50 [ 14.611598] __kasan_kmalloc+0xb7/0xc0 [ 14.611777] __kmalloc_cache_noprof+0x189/0x420 [ 14.612256] kasan_bitops_generic+0x92/0x1c0 [ 14.612502] kunit_try_run_case+0x1a5/0x480 [ 14.612676] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.613024] kthread+0x337/0x6f0 [ 14.613173] ret_from_fork+0x41/0x80 [ 14.613357] ret_from_fork_asm+0x1a/0x30 [ 14.613545] [ 14.613648] The buggy address belongs to the object at ffff8881029e3080 [ 14.613648] which belongs to the cache kmalloc-16 of size 16 [ 14.614131] The buggy address is located 8 bytes inside of [ 14.614131] allocated 9-byte region [ffff8881029e3080, ffff8881029e3089) [ 14.614616] [ 14.614724] The buggy address belongs to the physical page: [ 14.615058] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e3 [ 14.615426] flags: 0x200000000000000(node=0|zone=2) [ 14.615692] page_type: f5(slab) [ 14.616035] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.616375] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.616711] page dumped because: kasan: bad access detected [ 14.617023] [ 14.617116] Memory state around the buggy address: [ 14.617311] ffff8881029e2f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.617556] ffff8881029e3000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.617958] >ffff8881029e3080: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.618285] ^ [ 14.618496] ffff8881029e3100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.618809] ffff8881029e3180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.619118] ==================================================================