Date
June 17, 2025, 3:40 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 24.746366] ================================================================== [ 24.746531] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc0 [ 24.747219] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.747750] kasan_report+0xdc/0x128 [ 24.749493] Allocated by task 263: [ 24.750284] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.751194] The buggy address belongs to the physical page: [ 24.753009] >fff00000c58ac280: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 24.755455] ==================================================================
[ 22.753681] ================================================================== [ 22.754657] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 22.755604] Write of size 8 at addr ffff8881026cd0c8 by task kunit_try_catch/281 [ 22.756896] [ 22.757609] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.3-rc1 #1 PREEMPT(voluntary) [ 22.757736] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.757776] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.757999] Call Trace: [ 22.758062] <TASK> [ 22.758116] dump_stack_lvl+0x73/0xb0 [ 22.758194] print_report+0xd1/0x650 [ 22.758235] ? __virt_addr_valid+0x1db/0x2d0 [ 22.758271] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 22.758331] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.758370] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 22.758405] kasan_report+0x141/0x180 [ 22.758441] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 22.758485] kasan_check_range+0x10c/0x1c0 [ 22.758516] __kasan_check_write+0x18/0x20 [ 22.758547] kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 22.758582] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 22.758617] ? __kmalloc_cache_noprof+0x189/0x420 [ 22.758654] ? trace_hardirqs_on+0x37/0xe0 [ 22.758691] ? kasan_bitops_generic+0x92/0x1c0 [ 22.758727] kasan_bitops_generic+0x116/0x1c0 [ 22.758757] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 22.758790] ? __pfx_read_tsc+0x10/0x10 [ 22.758822] ? ktime_get_ts64+0x86/0x230 [ 22.758864] kunit_try_run_case+0x1a5/0x480 [ 22.758906] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.758942] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.759017] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.759104] ? __kthread_parkme+0x82/0x180 [ 22.759157] ? preempt_count_sub+0x50/0x80 [ 22.759196] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.759235] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.759270] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.759329] kthread+0x337/0x6f0 [ 22.759359] ? trace_preempt_on+0x20/0xc0 [ 22.759394] ? __pfx_kthread+0x10/0x10 [ 22.759421] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.759453] ? calculate_sigpending+0x7b/0xa0 [ 22.759488] ? __pfx_kthread+0x10/0x10 [ 22.759516] ret_from_fork+0x41/0x80 [ 22.759550] ? __pfx_kthread+0x10/0x10 [ 22.759577] ret_from_fork_asm+0x1a/0x30 [ 22.759623] </TASK> [ 22.759640] [ 22.781822] Allocated by task 281: [ 22.782782] kasan_save_stack+0x45/0x70 [ 22.783546] kasan_save_track+0x18/0x40 [ 22.784206] kasan_save_alloc_info+0x3b/0x50 [ 22.785470] __kasan_kmalloc+0xb7/0xc0 [ 22.786594] __kmalloc_cache_noprof+0x189/0x420 [ 22.787184] kasan_bitops_generic+0x92/0x1c0 [ 22.787497] kunit_try_run_case+0x1a5/0x480 [ 22.787780] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.788135] kthread+0x337/0x6f0 [ 22.791556] ret_from_fork+0x41/0x80 [ 22.791954] ret_from_fork_asm+0x1a/0x30 [ 22.792527] [ 22.792750] The buggy address belongs to the object at ffff8881026cd0c0 [ 22.792750] which belongs to the cache kmalloc-16 of size 16 [ 22.796139] The buggy address is located 8 bytes inside of [ 22.796139] allocated 9-byte region [ffff8881026cd0c0, ffff8881026cd0c9) [ 22.796761] [ 22.796910] The buggy address belongs to the physical page: [ 22.797209] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026cd [ 22.797840] flags: 0x200000000000000(node=0|zone=2) [ 22.798209] page_type: f5(slab) [ 22.799358] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 22.800043] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 22.800725] page dumped because: kasan: bad access detected [ 22.801417] [ 22.801705] Memory state around the buggy address: [ 22.801979] ffff8881026ccf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.802377] ffff8881026cd000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.802750] >ffff8881026cd080: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 22.803114] ^ [ 22.803564] ffff8881026cd100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.804020] ffff8881026cd180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.804498] ================================================================== [ 22.643899] ================================================================== [ 22.645527] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 22.647020] Write of size 8 at addr ffff8881026cd0c8 by task kunit_try_catch/281 [ 22.647614] [ 22.647891] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.3-rc1 #1 PREEMPT(voluntary) [ 22.647988] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.648008] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.648049] Call Trace: [ 22.648359] <TASK> [ 22.648418] dump_stack_lvl+0x73/0xb0 [ 22.648503] print_report+0xd1/0x650 [ 22.648579] ? __virt_addr_valid+0x1db/0x2d0 [ 22.648625] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 22.648660] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.648697] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 22.648730] kasan_report+0x141/0x180 [ 22.648766] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 22.648807] kasan_check_range+0x10c/0x1c0 [ 22.648837] __kasan_check_write+0x18/0x20 [ 22.648866] kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 22.648898] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 22.648930] ? __kmalloc_cache_noprof+0x189/0x420 [ 22.649025] ? trace_hardirqs_on+0x37/0xe0 [ 22.649110] ? kasan_bitops_generic+0x92/0x1c0 [ 22.649179] kasan_bitops_generic+0x116/0x1c0 [ 22.649214] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 22.649250] ? __pfx_read_tsc+0x10/0x10 [ 22.649282] ? ktime_get_ts64+0x86/0x230 [ 22.649353] kunit_try_run_case+0x1a5/0x480 [ 22.649393] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.649427] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.649465] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.649501] ? __kthread_parkme+0x82/0x180 [ 22.649534] ? preempt_count_sub+0x50/0x80 [ 22.649569] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.649604] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.649637] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.649670] kthread+0x337/0x6f0 [ 22.649695] ? trace_preempt_on+0x20/0xc0 [ 22.649727] ? __pfx_kthread+0x10/0x10 [ 22.649753] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.649782] ? calculate_sigpending+0x7b/0xa0 [ 22.649814] ? __pfx_kthread+0x10/0x10 [ 22.649843] ret_from_fork+0x41/0x80 [ 22.649875] ? __pfx_kthread+0x10/0x10 [ 22.649901] ret_from_fork_asm+0x1a/0x30 [ 22.649945] </TASK> [ 22.649980] [ 22.675541] Allocated by task 281: [ 22.676090] kasan_save_stack+0x45/0x70 [ 22.676602] kasan_save_track+0x18/0x40 [ 22.677409] kasan_save_alloc_info+0x3b/0x50 [ 22.677753] __kasan_kmalloc+0xb7/0xc0 [ 22.678691] __kmalloc_cache_noprof+0x189/0x420 [ 22.679038] kasan_bitops_generic+0x92/0x1c0 [ 22.679734] kunit_try_run_case+0x1a5/0x480 [ 22.680703] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.681243] kthread+0x337/0x6f0 [ 22.681963] ret_from_fork+0x41/0x80 [ 22.682627] ret_from_fork_asm+0x1a/0x30 [ 22.683015] [ 22.683222] The buggy address belongs to the object at ffff8881026cd0c0 [ 22.683222] which belongs to the cache kmalloc-16 of size 16 [ 22.684135] The buggy address is located 8 bytes inside of [ 22.684135] allocated 9-byte region [ffff8881026cd0c0, ffff8881026cd0c9) [ 22.686064] [ 22.686286] The buggy address belongs to the physical page: [ 22.686758] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026cd [ 22.688253] flags: 0x200000000000000(node=0|zone=2) [ 22.688626] page_type: f5(slab) [ 22.689394] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 22.690235] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 22.690969] page dumped because: kasan: bad access detected [ 22.692185] [ 22.692369] Memory state around the buggy address: [ 22.692686] ffff8881026ccf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.693666] ffff8881026cd000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.694540] >ffff8881026cd080: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 22.695664] ^ [ 22.696038] ffff8881026cd100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.696703] ffff8881026cd180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.697732] ================================================================== [ 22.860507] ================================================================== [ 22.861276] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 22.862796] Write of size 8 at addr ffff8881026cd0c8 by task kunit_try_catch/281 [ 22.863939] [ 22.864593] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.3-rc1 #1 PREEMPT(voluntary) [ 22.864730] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.864810] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.864848] Call Trace: [ 22.864881] <TASK> [ 22.864929] dump_stack_lvl+0x73/0xb0 [ 22.865016] print_report+0xd1/0x650 [ 22.865097] ? __virt_addr_valid+0x1db/0x2d0 [ 22.865138] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 22.865172] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.865208] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 22.865241] kasan_report+0x141/0x180 [ 22.865275] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 22.865368] kasan_check_range+0x10c/0x1c0 [ 22.865441] __kasan_check_write+0x18/0x20 [ 22.865501] kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 22.865537] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 22.865573] ? __kmalloc_cache_noprof+0x189/0x420 [ 22.865607] ? trace_hardirqs_on+0x37/0xe0 [ 22.865644] ? kasan_bitops_generic+0x92/0x1c0 [ 22.865680] kasan_bitops_generic+0x116/0x1c0 [ 22.865711] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 22.865744] ? __pfx_read_tsc+0x10/0x10 [ 22.865776] ? ktime_get_ts64+0x86/0x230 [ 22.865816] kunit_try_run_case+0x1a5/0x480 [ 22.865854] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.865888] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.865926] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.866082] ? __kthread_parkme+0x82/0x180 [ 22.866131] ? preempt_count_sub+0x50/0x80 [ 22.866171] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.866208] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.866244] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.866283] kthread+0x337/0x6f0 [ 22.866336] ? trace_preempt_on+0x20/0xc0 [ 22.866375] ? __pfx_kthread+0x10/0x10 [ 22.866401] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.866436] ? calculate_sigpending+0x7b/0xa0 [ 22.866470] ? __pfx_kthread+0x10/0x10 [ 22.866497] ret_from_fork+0x41/0x80 [ 22.866531] ? __pfx_kthread+0x10/0x10 [ 22.866559] ret_from_fork_asm+0x1a/0x30 [ 22.866604] </TASK> [ 22.866619] [ 22.890869] Allocated by task 281: [ 22.891838] kasan_save_stack+0x45/0x70 [ 22.892821] kasan_save_track+0x18/0x40 [ 22.893476] kasan_save_alloc_info+0x3b/0x50 [ 22.894027] __kasan_kmalloc+0xb7/0xc0 [ 22.894721] __kmalloc_cache_noprof+0x189/0x420 [ 22.895440] kasan_bitops_generic+0x92/0x1c0 [ 22.895789] kunit_try_run_case+0x1a5/0x480 [ 22.896487] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.897420] kthread+0x337/0x6f0 [ 22.897857] ret_from_fork+0x41/0x80 [ 22.898481] ret_from_fork_asm+0x1a/0x30 [ 22.899077] [ 22.899281] The buggy address belongs to the object at ffff8881026cd0c0 [ 22.899281] which belongs to the cache kmalloc-16 of size 16 [ 22.900568] The buggy address is located 8 bytes inside of [ 22.900568] allocated 9-byte region [ffff8881026cd0c0, ffff8881026cd0c9) [ 22.901621] [ 22.901856] The buggy address belongs to the physical page: [ 22.903248] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026cd [ 22.903950] flags: 0x200000000000000(node=0|zone=2) [ 22.904509] page_type: f5(slab) [ 22.904833] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 22.905799] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 22.906762] page dumped because: kasan: bad access detected [ 22.907177] [ 22.907396] Memory state around the buggy address: [ 22.907841] ffff8881026ccf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.908544] ffff8881026cd000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.909198] >ffff8881026cd080: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 22.909755] ^ [ 22.910311] ffff8881026cd100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.910936] ffff8881026cd180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.911493] ================================================================== [ 22.590701] ================================================================== [ 22.591840] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50 [ 22.593801] Write of size 8 at addr ffff8881026cd0c8 by task kunit_try_catch/281 [ 22.595269] [ 22.595575] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.3-rc1 #1 PREEMPT(voluntary) [ 22.595764] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.595810] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.595872] Call Trace: [ 22.595931] <TASK> [ 22.595985] dump_stack_lvl+0x73/0xb0 [ 22.596082] print_report+0xd1/0x650 [ 22.596271] ? __virt_addr_valid+0x1db/0x2d0 [ 22.596346] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 22.596384] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.596418] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 22.596452] kasan_report+0x141/0x180 [ 22.596486] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 22.596524] kasan_check_range+0x10c/0x1c0 [ 22.596555] __kasan_check_write+0x18/0x20 [ 22.596585] kasan_bitops_modify.constprop.0+0x101/0xd50 [ 22.596619] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 22.596654] ? __kmalloc_cache_noprof+0x189/0x420 [ 22.596686] ? trace_hardirqs_on+0x37/0xe0 [ 22.596723] ? kasan_bitops_generic+0x92/0x1c0 [ 22.596759] kasan_bitops_generic+0x116/0x1c0 [ 22.596787] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 22.596820] ? __pfx_read_tsc+0x10/0x10 [ 22.596851] ? ktime_get_ts64+0x86/0x230 [ 22.596891] kunit_try_run_case+0x1a5/0x480 [ 22.596929] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.597074] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.597123] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.597161] ? __kthread_parkme+0x82/0x180 [ 22.597197] ? preempt_count_sub+0x50/0x80 [ 22.597235] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.597273] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.597335] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.597373] kthread+0x337/0x6f0 [ 22.597401] ? trace_preempt_on+0x20/0xc0 [ 22.597436] ? __pfx_kthread+0x10/0x10 [ 22.597462] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.597495] ? calculate_sigpending+0x7b/0xa0 [ 22.597528] ? __pfx_kthread+0x10/0x10 [ 22.597555] ret_from_fork+0x41/0x80 [ 22.597589] ? __pfx_kthread+0x10/0x10 [ 22.597616] ret_from_fork_asm+0x1a/0x30 [ 22.597662] </TASK> [ 22.597678] [ 22.619137] Allocated by task 281: [ 22.619613] kasan_save_stack+0x45/0x70 [ 22.619969] kasan_save_track+0x18/0x40 [ 22.620278] kasan_save_alloc_info+0x3b/0x50 [ 22.621931] __kasan_kmalloc+0xb7/0xc0 [ 22.623228] __kmalloc_cache_noprof+0x189/0x420 [ 22.623668] kasan_bitops_generic+0x92/0x1c0 [ 22.624020] kunit_try_run_case+0x1a5/0x480 [ 22.624839] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.625488] kthread+0x337/0x6f0 [ 22.625928] ret_from_fork+0x41/0x80 [ 22.626427] ret_from_fork_asm+0x1a/0x30 [ 22.626907] [ 22.627335] The buggy address belongs to the object at ffff8881026cd0c0 [ 22.627335] which belongs to the cache kmalloc-16 of size 16 [ 22.628388] The buggy address is located 8 bytes inside of [ 22.628388] allocated 9-byte region [ffff8881026cd0c0, ffff8881026cd0c9) [ 22.629430] [ 22.630175] The buggy address belongs to the physical page: [ 22.630614] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026cd [ 22.632092] flags: 0x200000000000000(node=0|zone=2) [ 22.632541] page_type: f5(slab) [ 22.633235] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 22.634509] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 22.635570] page dumped because: kasan: bad access detected [ 22.635998] [ 22.636237] Memory state around the buggy address: [ 22.636623] ffff8881026ccf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.638417] ffff8881026cd000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.639271] >ffff8881026cd080: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 22.639860] ^ [ 22.640765] ffff8881026cd100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.641517] ffff8881026cd180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.642757] ================================================================== [ 22.967233] ================================================================== [ 22.968475] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50 [ 22.969497] Write of size 8 at addr ffff8881026cd0c8 by task kunit_try_catch/281 [ 22.970326] [ 22.970594] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.3-rc1 #1 PREEMPT(voluntary) [ 22.970944] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.971087] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.971146] Call Trace: [ 22.971197] <TASK> [ 22.971285] dump_stack_lvl+0x73/0xb0 [ 22.971422] print_report+0xd1/0x650 [ 22.971500] ? __virt_addr_valid+0x1db/0x2d0 [ 22.971577] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 22.971676] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.971782] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 22.971852] kasan_report+0x141/0x180 [ 22.971914] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 22.971972] kasan_check_range+0x10c/0x1c0 [ 22.972097] __kasan_check_write+0x18/0x20 [ 22.972169] kasan_bitops_modify.constprop.0+0x547/0xd50 [ 22.972237] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 22.972329] ? __kmalloc_cache_noprof+0x189/0x420 [ 22.972403] ? trace_hardirqs_on+0x37/0xe0 [ 22.972450] ? kasan_bitops_generic+0x92/0x1c0 [ 22.972488] kasan_bitops_generic+0x116/0x1c0 [ 22.972519] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 22.972554] ? __pfx_read_tsc+0x10/0x10 [ 22.972587] ? ktime_get_ts64+0x86/0x230 [ 22.972627] kunit_try_run_case+0x1a5/0x480 [ 22.972666] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.972702] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.972739] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.972776] ? __kthread_parkme+0x82/0x180 [ 22.972812] ? preempt_count_sub+0x50/0x80 [ 22.972850] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.972886] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.972922] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.972957] kthread+0x337/0x6f0 [ 22.972982] ? trace_preempt_on+0x20/0xc0 [ 22.973017] ? __pfx_kthread+0x10/0x10 [ 22.973044] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.973077] ? calculate_sigpending+0x7b/0xa0 [ 22.973111] ? __pfx_kthread+0x10/0x10 [ 22.973138] ret_from_fork+0x41/0x80 [ 22.973172] ? __pfx_kthread+0x10/0x10 [ 22.973200] ret_from_fork_asm+0x1a/0x30 [ 22.973246] </TASK> [ 22.973263] [ 22.996603] Allocated by task 281: [ 22.996992] kasan_save_stack+0x45/0x70 [ 22.998433] kasan_save_track+0x18/0x40 [ 22.998814] kasan_save_alloc_info+0x3b/0x50 [ 22.999514] __kasan_kmalloc+0xb7/0xc0 [ 23.000362] __kmalloc_cache_noprof+0x189/0x420 [ 23.000743] kasan_bitops_generic+0x92/0x1c0 [ 23.001666] kunit_try_run_case+0x1a5/0x480 [ 23.002226] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.002591] kthread+0x337/0x6f0 [ 23.002972] ret_from_fork+0x41/0x80 [ 23.003423] ret_from_fork_asm+0x1a/0x30 [ 23.003829] [ 23.004167] The buggy address belongs to the object at ffff8881026cd0c0 [ 23.004167] which belongs to the cache kmalloc-16 of size 16 [ 23.005340] The buggy address is located 8 bytes inside of [ 23.005340] allocated 9-byte region [ffff8881026cd0c0, ffff8881026cd0c9) [ 23.007095] [ 23.007771] The buggy address belongs to the physical page: [ 23.008382] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026cd [ 23.009537] flags: 0x200000000000000(node=0|zone=2) [ 23.009911] page_type: f5(slab) [ 23.011023] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 23.012227] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 23.012954] page dumped because: kasan: bad access detected [ 23.013927] [ 23.014178] Memory state around the buggy address: [ 23.014610] ffff8881026ccf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.015699] ffff8881026cd000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 23.016461] >ffff8881026cd080: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 23.017544] ^ [ 23.017982] ffff8881026cd100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.019053] ffff8881026cd180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.020441] ================================================================== [ 22.913249] ================================================================== [ 22.913735] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 22.914727] Write of size 8 at addr ffff8881026cd0c8 by task kunit_try_catch/281 [ 22.915382] [ 22.916466] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.3-rc1 #1 PREEMPT(voluntary) [ 22.916600] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.916645] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.916701] Call Trace: [ 22.916752] <TASK> [ 22.916807] dump_stack_lvl+0x73/0xb0 [ 22.916894] print_report+0xd1/0x650 [ 22.917171] ? __virt_addr_valid+0x1db/0x2d0 [ 22.917254] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 22.917355] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.917440] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 22.917518] kasan_report+0x141/0x180 [ 22.917595] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 22.917686] kasan_check_range+0x10c/0x1c0 [ 22.917763] __kasan_check_write+0x18/0x20 [ 22.917833] kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 22.917907] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 22.918103] ? __kmalloc_cache_noprof+0x189/0x420 [ 22.918186] ? trace_hardirqs_on+0x37/0xe0 [ 22.918260] ? kasan_bitops_generic+0x92/0x1c0 [ 22.918365] kasan_bitops_generic+0x116/0x1c0 [ 22.918422] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 22.918459] ? __pfx_read_tsc+0x10/0x10 [ 22.918493] ? ktime_get_ts64+0x86/0x230 [ 22.918531] kunit_try_run_case+0x1a5/0x480 [ 22.918572] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.918606] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.918646] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.918680] ? __kthread_parkme+0x82/0x180 [ 22.918713] ? preempt_count_sub+0x50/0x80 [ 22.918751] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.918786] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.918820] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.918856] kthread+0x337/0x6f0 [ 22.918880] ? trace_preempt_on+0x20/0xc0 [ 22.918915] ? __pfx_kthread+0x10/0x10 [ 22.918941] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.919027] ? calculate_sigpending+0x7b/0xa0 [ 22.919110] ? __pfx_kthread+0x10/0x10 [ 22.919204] ret_from_fork+0x41/0x80 [ 22.919248] ? __pfx_kthread+0x10/0x10 [ 22.919279] ret_from_fork_asm+0x1a/0x30 [ 22.919354] </TASK> [ 22.919373] [ 22.944119] Allocated by task 281: [ 22.944500] kasan_save_stack+0x45/0x70 [ 22.944882] kasan_save_track+0x18/0x40 [ 22.945235] kasan_save_alloc_info+0x3b/0x50 [ 22.946142] __kasan_kmalloc+0xb7/0xc0 [ 22.946551] __kmalloc_cache_noprof+0x189/0x420 [ 22.947445] kasan_bitops_generic+0x92/0x1c0 [ 22.948202] kunit_try_run_case+0x1a5/0x480 [ 22.948641] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.949347] kthread+0x337/0x6f0 [ 22.949806] ret_from_fork+0x41/0x80 [ 22.950467] ret_from_fork_asm+0x1a/0x30 [ 22.950928] [ 22.951629] The buggy address belongs to the object at ffff8881026cd0c0 [ 22.951629] which belongs to the cache kmalloc-16 of size 16 [ 22.952832] The buggy address is located 8 bytes inside of [ 22.952832] allocated 9-byte region [ffff8881026cd0c0, ffff8881026cd0c9) [ 22.954258] [ 22.954474] The buggy address belongs to the physical page: [ 22.955366] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026cd [ 22.956498] flags: 0x200000000000000(node=0|zone=2) [ 22.957272] page_type: f5(slab) [ 22.957737] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 22.958598] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 22.959564] page dumped because: kasan: bad access detected [ 22.960278] [ 22.960667] Memory state around the buggy address: [ 22.961263] ffff8881026ccf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.961930] ffff8881026cd000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.962736] >ffff8881026cd080: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 22.963433] ^ [ 22.963933] ffff8881026cd100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.965218] ffff8881026cd180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.965874] ================================================================== [ 22.699602] ================================================================== [ 22.700560] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 22.701238] Write of size 8 at addr ffff8881026cd0c8 by task kunit_try_catch/281 [ 22.701829] [ 22.702112] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.3-rc1 #1 PREEMPT(voluntary) [ 22.702245] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.703064] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.703155] Call Trace: [ 22.703209] <TASK> [ 22.703257] dump_stack_lvl+0x73/0xb0 [ 22.703360] print_report+0xd1/0x650 [ 22.703435] ? __virt_addr_valid+0x1db/0x2d0 [ 22.703511] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 22.703556] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.703592] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 22.703629] kasan_report+0x141/0x180 [ 22.703665] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 22.703706] kasan_check_range+0x10c/0x1c0 [ 22.703736] __kasan_check_write+0x18/0x20 [ 22.703767] kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 22.703802] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 22.703840] ? __kmalloc_cache_noprof+0x189/0x420 [ 22.703894] ? trace_hardirqs_on+0x37/0xe0 [ 22.703935] ? kasan_bitops_generic+0x92/0x1c0 [ 22.704023] kasan_bitops_generic+0x116/0x1c0 [ 22.704104] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 22.704193] ? __pfx_read_tsc+0x10/0x10 [ 22.704230] ? ktime_get_ts64+0x86/0x230 [ 22.704269] kunit_try_run_case+0x1a5/0x480 [ 22.704340] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.704375] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.704413] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.704451] ? __kthread_parkme+0x82/0x180 [ 22.704485] ? preempt_count_sub+0x50/0x80 [ 22.704522] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.704559] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.704595] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.704630] kthread+0x337/0x6f0 [ 22.704656] ? trace_preempt_on+0x20/0xc0 [ 22.704691] ? __pfx_kthread+0x10/0x10 [ 22.704719] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.704751] ? calculate_sigpending+0x7b/0xa0 [ 22.704786] ? __pfx_kthread+0x10/0x10 [ 22.704812] ret_from_fork+0x41/0x80 [ 22.704846] ? __pfx_kthread+0x10/0x10 [ 22.704873] ret_from_fork_asm+0x1a/0x30 [ 22.704918] </TASK> [ 22.704934] [ 22.728128] Allocated by task 281: [ 22.728437] kasan_save_stack+0x45/0x70 [ 22.729038] kasan_save_track+0x18/0x40 [ 22.729691] kasan_save_alloc_info+0x3b/0x50 [ 22.730062] __kasan_kmalloc+0xb7/0xc0 [ 22.730496] __kmalloc_cache_noprof+0x189/0x420 [ 22.730882] kasan_bitops_generic+0x92/0x1c0 [ 22.731275] kunit_try_run_case+0x1a5/0x480 [ 22.732994] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.733460] kthread+0x337/0x6f0 [ 22.734279] ret_from_fork+0x41/0x80 [ 22.735039] ret_from_fork_asm+0x1a/0x30 [ 22.735812] [ 22.736209] The buggy address belongs to the object at ffff8881026cd0c0 [ 22.736209] which belongs to the cache kmalloc-16 of size 16 [ 22.738528] The buggy address is located 8 bytes inside of [ 22.738528] allocated 9-byte region [ffff8881026cd0c0, ffff8881026cd0c9) [ 22.740118] [ 22.740434] The buggy address belongs to the physical page: [ 22.740792] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026cd [ 22.741719] flags: 0x200000000000000(node=0|zone=2) [ 22.742667] page_type: f5(slab) [ 22.743460] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 22.744283] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 22.745410] page dumped because: kasan: bad access detected [ 22.745914] [ 22.746645] Memory state around the buggy address: [ 22.747016] ffff8881026ccf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.747714] ffff8881026cd000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.748563] >ffff8881026cd080: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 22.749658] ^ [ 22.750082] ffff8881026cd100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.750830] ffff8881026cd180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.751829] ================================================================== [ 22.805539] ================================================================== [ 22.806136] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50 [ 22.806954] Write of size 8 at addr ffff8881026cd0c8 by task kunit_try_catch/281 [ 22.809038] [ 22.809411] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.3-rc1 #1 PREEMPT(voluntary) [ 22.809543] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.809583] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.809642] Call Trace: [ 22.809696] <TASK> [ 22.809747] dump_stack_lvl+0x73/0xb0 [ 22.809833] print_report+0xd1/0x650 [ 22.809918] ? __virt_addr_valid+0x1db/0x2d0 [ 22.810050] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 22.810131] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.810211] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 22.810284] kasan_report+0x141/0x180 [ 22.810380] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 22.810474] kasan_check_range+0x10c/0x1c0 [ 22.810543] __kasan_check_write+0x18/0x20 [ 22.810612] kasan_bitops_modify.constprop.0+0x373/0xd50 [ 22.810686] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 22.810761] ? __kmalloc_cache_noprof+0x189/0x420 [ 22.810832] ? trace_hardirqs_on+0x37/0xe0 [ 22.810902] ? kasan_bitops_generic+0x92/0x1c0 [ 22.810979] kasan_bitops_generic+0x116/0x1c0 [ 22.811045] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 22.811120] ? __pfx_read_tsc+0x10/0x10 [ 22.811188] ? ktime_get_ts64+0x86/0x230 [ 22.811269] kunit_try_run_case+0x1a5/0x480 [ 22.811686] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.811763] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.811900] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.811987] ? __kthread_parkme+0x82/0x180 [ 22.812068] ? preempt_count_sub+0x50/0x80 [ 22.812150] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.812232] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.812320] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.812399] kthread+0x337/0x6f0 [ 22.812467] ? trace_preempt_on+0x20/0xc0 [ 22.812542] ? __pfx_kthread+0x10/0x10 [ 22.812608] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.812837] ? calculate_sigpending+0x7b/0xa0 [ 22.812913] ? __pfx_kthread+0x10/0x10 [ 22.813084] ret_from_fork+0x41/0x80 [ 22.813168] ? __pfx_kthread+0x10/0x10 [ 22.813233] ret_from_fork_asm+0x1a/0x30 [ 22.813363] </TASK> [ 22.813404] [ 22.838073] Allocated by task 281: [ 22.838372] kasan_save_stack+0x45/0x70 [ 22.838834] kasan_save_track+0x18/0x40 [ 22.839252] kasan_save_alloc_info+0x3b/0x50 [ 22.840325] __kasan_kmalloc+0xb7/0xc0 [ 22.840884] __kmalloc_cache_noprof+0x189/0x420 [ 22.841525] kasan_bitops_generic+0x92/0x1c0 [ 22.842107] kunit_try_run_case+0x1a5/0x480 [ 22.843004] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.843592] kthread+0x337/0x6f0 [ 22.843955] ret_from_fork+0x41/0x80 [ 22.844827] ret_from_fork_asm+0x1a/0x30 [ 22.845355] [ 22.845529] The buggy address belongs to the object at ffff8881026cd0c0 [ 22.845529] which belongs to the cache kmalloc-16 of size 16 [ 22.847586] The buggy address is located 8 bytes inside of [ 22.847586] allocated 9-byte region [ffff8881026cd0c0, ffff8881026cd0c9) [ 22.848947] [ 22.849474] The buggy address belongs to the physical page: [ 22.849900] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026cd [ 22.850838] flags: 0x200000000000000(node=0|zone=2) [ 22.851316] page_type: f5(slab) [ 22.851692] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 22.853196] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 22.853680] page dumped because: kasan: bad access detected [ 22.854173] [ 22.854417] Memory state around the buggy address: [ 22.854837] ffff8881026ccf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.855825] ffff8881026cd000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.856934] >ffff8881026cd080: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 22.857517] ^ [ 22.857730] ffff8881026cd100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.858281] ffff8881026cd180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.859236] ==================================================================