Date
June 24, 2025, 12:47 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 27.507442] ================================================================== [ 27.509212] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbc0 [ 27.510302] [ 27.510760] Call trace: [ 27.511765] __asan_report_load8_noabort+0x20/0x30 [ 27.512553] kunit_try_run_case+0x170/0x3f0 [ 27.513660] Allocated by task 263: [ 27.514310] __kasan_kmalloc+0xd4/0xd8 [ 27.516117] [ 27.516184] The buggy address belongs to the physical page: [ 27.516549] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.517997] ^ [ 27.519686] ==================================================================
[ 14.109781] ================================================================== [ 14.110159] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 14.111028] Write of size 8 at addr ffff888102662fc8 by task kunit_try_catch/281 [ 14.111830] [ 14.111988] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc2 #1 PREEMPT(voluntary) [ 14.112065] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.112079] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.112104] Call Trace: [ 14.112126] <TASK> [ 14.112151] dump_stack_lvl+0x73/0xb0 [ 14.112203] print_report+0xd1/0x650 [ 14.112227] ? __virt_addr_valid+0x1db/0x2d0 [ 14.112249] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 14.112271] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.112293] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 14.112314] kasan_report+0x141/0x180 [ 14.112335] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 14.112361] kasan_check_range+0x10c/0x1c0 [ 14.112380] __kasan_check_write+0x18/0x20 [ 14.112399] kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 14.112420] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.112441] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.112461] ? trace_hardirqs_on+0x37/0xe0 [ 14.112482] ? kasan_bitops_generic+0x92/0x1c0 [ 14.112506] kasan_bitops_generic+0x116/0x1c0 [ 14.112525] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.112545] ? __pfx_read_tsc+0x10/0x10 [ 14.112564] ? ktime_get_ts64+0x86/0x230 [ 14.112588] kunit_try_run_case+0x1a5/0x480 [ 14.112613] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.112706] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.112748] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.112784] ? __kthread_parkme+0x82/0x180 [ 14.112816] ? preempt_count_sub+0x50/0x80 [ 14.112857] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.112899] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.112945] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.112991] kthread+0x337/0x6f0 [ 14.113029] ? trace_preempt_on+0x20/0xc0 [ 14.113066] ? __pfx_kthread+0x10/0x10 [ 14.113087] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.113108] ? calculate_sigpending+0x7b/0xa0 [ 14.113129] ? __pfx_kthread+0x10/0x10 [ 14.113154] ret_from_fork+0x41/0x80 [ 14.113174] ? __pfx_kthread+0x10/0x10 [ 14.113191] ret_from_fork_asm+0x1a/0x30 [ 14.113220] </TASK> [ 14.113233] [ 14.125809] Allocated by task 281: [ 14.126096] kasan_save_stack+0x45/0x70 [ 14.126376] kasan_save_track+0x18/0x40 [ 14.126585] kasan_save_alloc_info+0x3b/0x50 [ 14.126832] __kasan_kmalloc+0xb7/0xc0 [ 14.127059] __kmalloc_cache_noprof+0x189/0x420 [ 14.127295] kasan_bitops_generic+0x92/0x1c0 [ 14.127526] kunit_try_run_case+0x1a5/0x480 [ 14.128312] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.128558] kthread+0x337/0x6f0 [ 14.128708] ret_from_fork+0x41/0x80 [ 14.128873] ret_from_fork_asm+0x1a/0x30 [ 14.129164] [ 14.129449] The buggy address belongs to the object at ffff888102662fc0 [ 14.129449] which belongs to the cache kmalloc-16 of size 16 [ 14.130260] The buggy address is located 8 bytes inside of [ 14.130260] allocated 9-byte region [ffff888102662fc0, ffff888102662fc9) [ 14.130998] [ 14.131487] The buggy address belongs to the physical page: [ 14.132692] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102662 [ 14.133321] flags: 0x200000000000000(node=0|zone=2) [ 14.133823] page_type: f5(slab) [ 14.134096] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.134634] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.135270] page dumped because: kasan: bad access detected [ 14.135941] [ 14.136064] Memory state around the buggy address: [ 14.136226] ffff888102662e80: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 14.137343] ffff888102662f00: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 14.137767] >ffff888102662f80: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 14.138435] ^ [ 14.138970] ffff888102663000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.139274] ffff888102663080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb [ 14.139844] ================================================================== [ 14.269519] ================================================================== [ 14.270748] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 14.271697] Write of size 8 at addr ffff888102662fc8 by task kunit_try_catch/281 [ 14.272045] [ 14.272190] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc2 #1 PREEMPT(voluntary) [ 14.272263] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.272278] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.272310] Call Trace: [ 14.272345] <TASK> [ 14.272375] dump_stack_lvl+0x73/0xb0 [ 14.272414] print_report+0xd1/0x650 [ 14.272437] ? __virt_addr_valid+0x1db/0x2d0 [ 14.272460] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 14.272481] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.272502] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 14.272523] kasan_report+0x141/0x180 [ 14.272553] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 14.272580] kasan_check_range+0x10c/0x1c0 [ 14.272600] __kasan_check_write+0x18/0x20 [ 14.272619] kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 14.272667] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.272703] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.272739] ? trace_hardirqs_on+0x37/0xe0 [ 14.272777] ? kasan_bitops_generic+0x92/0x1c0 [ 14.272819] kasan_bitops_generic+0x116/0x1c0 [ 14.272859] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.272901] ? __pfx_read_tsc+0x10/0x10 [ 14.272941] ? ktime_get_ts64+0x86/0x230 [ 14.272970] kunit_try_run_case+0x1a5/0x480 [ 14.272998] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.273017] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.273041] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.273062] ? __kthread_parkme+0x82/0x180 [ 14.273083] ? preempt_count_sub+0x50/0x80 [ 14.273119] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.273147] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.273168] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.273190] kthread+0x337/0x6f0 [ 14.273206] ? trace_preempt_on+0x20/0xc0 [ 14.273228] ? __pfx_kthread+0x10/0x10 [ 14.273245] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.273265] ? calculate_sigpending+0x7b/0xa0 [ 14.273284] ? __pfx_kthread+0x10/0x10 [ 14.273302] ret_from_fork+0x41/0x80 [ 14.273320] ? __pfx_kthread+0x10/0x10 [ 14.273337] ret_from_fork_asm+0x1a/0x30 [ 14.273367] </TASK> [ 14.273379] [ 14.287116] Allocated by task 281: [ 14.287651] kasan_save_stack+0x45/0x70 [ 14.288007] kasan_save_track+0x18/0x40 [ 14.288227] kasan_save_alloc_info+0x3b/0x50 [ 14.288600] __kasan_kmalloc+0xb7/0xc0 [ 14.289124] __kmalloc_cache_noprof+0x189/0x420 [ 14.289290] kasan_bitops_generic+0x92/0x1c0 [ 14.289989] kunit_try_run_case+0x1a5/0x480 [ 14.290215] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.291337] kthread+0x337/0x6f0 [ 14.291564] ret_from_fork+0x41/0x80 [ 14.291716] ret_from_fork_asm+0x1a/0x30 [ 14.291922] [ 14.292231] The buggy address belongs to the object at ffff888102662fc0 [ 14.292231] which belongs to the cache kmalloc-16 of size 16 [ 14.293084] The buggy address is located 8 bytes inside of [ 14.293084] allocated 9-byte region [ffff888102662fc0, ffff888102662fc9) [ 14.293936] [ 14.294088] The buggy address belongs to the physical page: [ 14.294692] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102662 [ 14.295195] flags: 0x200000000000000(node=0|zone=2) [ 14.295354] page_type: f5(slab) [ 14.295486] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.296683] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.297155] page dumped because: kasan: bad access detected [ 14.297537] [ 14.297858] Memory state around the buggy address: [ 14.298227] ffff888102662e80: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 14.298816] ffff888102662f00: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 14.299112] >ffff888102662f80: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 14.299417] ^ [ 14.300126] ffff888102663000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.300834] ffff888102663080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb [ 14.301294] ================================================================== [ 14.172716] ================================================================== [ 14.173155] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 14.173620] Write of size 8 at addr ffff888102662fc8 by task kunit_try_catch/281 [ 14.175005] [ 14.175425] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc2 #1 PREEMPT(voluntary) [ 14.175526] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.175542] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.175565] Call Trace: [ 14.175593] <TASK> [ 14.175615] dump_stack_lvl+0x73/0xb0 [ 14.175686] print_report+0xd1/0x650 [ 14.175776] ? __virt_addr_valid+0x1db/0x2d0 [ 14.176125] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 14.176152] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.176176] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 14.176197] kasan_report+0x141/0x180 [ 14.176220] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 14.176248] kasan_check_range+0x10c/0x1c0 [ 14.176267] __kasan_check_write+0x18/0x20 [ 14.176293] kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 14.176327] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.176362] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.176393] ? trace_hardirqs_on+0x37/0xe0 [ 14.176421] ? kasan_bitops_generic+0x92/0x1c0 [ 14.176445] kasan_bitops_generic+0x116/0x1c0 [ 14.176464] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.176485] ? __pfx_read_tsc+0x10/0x10 [ 14.176504] ? ktime_get_ts64+0x86/0x230 [ 14.176529] kunit_try_run_case+0x1a5/0x480 [ 14.176560] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.176581] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.176604] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.176644] ? __kthread_parkme+0x82/0x180 [ 14.176669] ? preempt_count_sub+0x50/0x80 [ 14.176693] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.176715] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.176737] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.176758] kthread+0x337/0x6f0 [ 14.176774] ? trace_preempt_on+0x20/0xc0 [ 14.176795] ? __pfx_kthread+0x10/0x10 [ 14.176813] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.176833] ? calculate_sigpending+0x7b/0xa0 [ 14.176854] ? __pfx_kthread+0x10/0x10 [ 14.176872] ret_from_fork+0x41/0x80 [ 14.176891] ? __pfx_kthread+0x10/0x10 [ 14.176908] ret_from_fork_asm+0x1a/0x30 [ 14.176938] </TASK> [ 14.176951] [ 14.190317] Allocated by task 281: [ 14.191167] kasan_save_stack+0x45/0x70 [ 14.191540] kasan_save_track+0x18/0x40 [ 14.191732] kasan_save_alloc_info+0x3b/0x50 [ 14.191969] __kasan_kmalloc+0xb7/0xc0 [ 14.192611] __kmalloc_cache_noprof+0x189/0x420 [ 14.193036] kasan_bitops_generic+0x92/0x1c0 [ 14.193363] kunit_try_run_case+0x1a5/0x480 [ 14.194012] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.194286] kthread+0x337/0x6f0 [ 14.194900] ret_from_fork+0x41/0x80 [ 14.195215] ret_from_fork_asm+0x1a/0x30 [ 14.195571] [ 14.195776] The buggy address belongs to the object at ffff888102662fc0 [ 14.195776] which belongs to the cache kmalloc-16 of size 16 [ 14.196441] The buggy address is located 8 bytes inside of [ 14.196441] allocated 9-byte region [ffff888102662fc0, ffff888102662fc9) [ 14.196887] [ 14.196993] The buggy address belongs to the physical page: [ 14.197187] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102662 [ 14.197636] flags: 0x200000000000000(node=0|zone=2) [ 14.197888] page_type: f5(slab) [ 14.198174] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.198441] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.198946] page dumped because: kasan: bad access detected [ 14.199261] [ 14.199426] Memory state around the buggy address: [ 14.199815] ffff888102662e80: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 14.200066] ffff888102662f00: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 14.200480] >ffff888102662f80: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 14.201977] ^ [ 14.202352] ffff888102663000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.202492] ffff888102663080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb [ 14.202893] ================================================================== [ 14.302579] ================================================================== [ 14.303199] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50 [ 14.304678] Write of size 8 at addr ffff888102662fc8 by task kunit_try_catch/281 [ 14.305325] [ 14.305713] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc2 #1 PREEMPT(voluntary) [ 14.305826] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.305848] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.305884] Call Trace: [ 14.305912] <TASK> [ 14.305936] dump_stack_lvl+0x73/0xb0 [ 14.305988] print_report+0xd1/0x650 [ 14.306013] ? __virt_addr_valid+0x1db/0x2d0 [ 14.306035] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 14.306057] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.306079] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 14.306100] kasan_report+0x141/0x180 [ 14.306121] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 14.306148] kasan_check_range+0x10c/0x1c0 [ 14.306166] __kasan_check_write+0x18/0x20 [ 14.306185] kasan_bitops_modify.constprop.0+0x547/0xd50 [ 14.306205] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.306227] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.306247] ? trace_hardirqs_on+0x37/0xe0 [ 14.306269] ? kasan_bitops_generic+0x92/0x1c0 [ 14.306291] kasan_bitops_generic+0x116/0x1c0 [ 14.306311] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.306331] ? __pfx_read_tsc+0x10/0x10 [ 14.306350] ? ktime_get_ts64+0x86/0x230 [ 14.306374] kunit_try_run_case+0x1a5/0x480 [ 14.306398] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.306419] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.306442] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.306463] ? __kthread_parkme+0x82/0x180 [ 14.306485] ? preempt_count_sub+0x50/0x80 [ 14.306509] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.306531] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.306573] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.306595] kthread+0x337/0x6f0 [ 14.306611] ? trace_preempt_on+0x20/0xc0 [ 14.306649] ? __pfx_kthread+0x10/0x10 [ 14.306668] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.306688] ? calculate_sigpending+0x7b/0xa0 [ 14.306709] ? __pfx_kthread+0x10/0x10 [ 14.306727] ret_from_fork+0x41/0x80 [ 14.306747] ? __pfx_kthread+0x10/0x10 [ 14.306764] ret_from_fork_asm+0x1a/0x30 [ 14.306793] </TASK> [ 14.306806] [ 14.316341] Allocated by task 281: [ 14.316737] kasan_save_stack+0x45/0x70 [ 14.317010] kasan_save_track+0x18/0x40 [ 14.317256] kasan_save_alloc_info+0x3b/0x50 [ 14.317595] __kasan_kmalloc+0xb7/0xc0 [ 14.317871] __kmalloc_cache_noprof+0x189/0x420 [ 14.318185] kasan_bitops_generic+0x92/0x1c0 [ 14.318513] kunit_try_run_case+0x1a5/0x480 [ 14.318716] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.319172] kthread+0x337/0x6f0 [ 14.319454] ret_from_fork+0x41/0x80 [ 14.319725] ret_from_fork_asm+0x1a/0x30 [ 14.319903] [ 14.320007] The buggy address belongs to the object at ffff888102662fc0 [ 14.320007] which belongs to the cache kmalloc-16 of size 16 [ 14.320832] The buggy address is located 8 bytes inside of [ 14.320832] allocated 9-byte region [ffff888102662fc0, ffff888102662fc9) [ 14.321407] [ 14.321521] The buggy address belongs to the physical page: [ 14.321755] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102662 [ 14.322270] flags: 0x200000000000000(node=0|zone=2) [ 14.322719] page_type: f5(slab) [ 14.322939] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.323238] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.323518] page dumped because: kasan: bad access detected [ 14.323960] [ 14.324112] Memory state around the buggy address: [ 14.324435] ffff888102662e80: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 14.325104] ffff888102662f00: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 14.325575] >ffff888102662f80: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 14.325871] ^ [ 14.326090] ffff888102663000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.326335] ffff888102663080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb [ 14.326920] ================================================================== [ 14.203723] ================================================================== [ 14.204064] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50 [ 14.204353] Write of size 8 at addr ffff888102662fc8 by task kunit_try_catch/281 [ 14.204607] [ 14.204809] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc2 #1 PREEMPT(voluntary) [ 14.204909] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.204934] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.204979] Call Trace: [ 14.205024] <TASK> [ 14.205067] dump_stack_lvl+0x73/0xb0 [ 14.205117] print_report+0xd1/0x650 [ 14.205151] ? __virt_addr_valid+0x1db/0x2d0 [ 14.205182] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 14.205214] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.205245] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 14.205275] kasan_report+0x141/0x180 [ 14.205306] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 14.205341] kasan_check_range+0x10c/0x1c0 [ 14.205370] __kasan_check_write+0x18/0x20 [ 14.205398] kasan_bitops_modify.constprop.0+0x373/0xd50 [ 14.205427] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.205457] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.205487] ? trace_hardirqs_on+0x37/0xe0 [ 14.205516] ? kasan_bitops_generic+0x92/0x1c0 [ 14.205551] kasan_bitops_generic+0x116/0x1c0 [ 14.205581] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.205613] ? __pfx_read_tsc+0x10/0x10 [ 14.205667] ? ktime_get_ts64+0x86/0x230 [ 14.205710] kunit_try_run_case+0x1a5/0x480 [ 14.205751] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.205785] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.205831] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.205876] ? __kthread_parkme+0x82/0x180 [ 14.205918] ? preempt_count_sub+0x50/0x80 [ 14.205977] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.206021] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.206057] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.206091] kthread+0x337/0x6f0 [ 14.206117] ? trace_preempt_on+0x20/0xc0 [ 14.206196] ? __pfx_kthread+0x10/0x10 [ 14.206231] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.206271] ? calculate_sigpending+0x7b/0xa0 [ 14.206678] ? __pfx_kthread+0x10/0x10 [ 14.206749] ret_from_fork+0x41/0x80 [ 14.206797] ? __pfx_kthread+0x10/0x10 [ 14.206835] ret_from_fork_asm+0x1a/0x30 [ 14.206903] </TASK> [ 14.206928] [ 14.220876] Allocated by task 281: [ 14.221530] kasan_save_stack+0x45/0x70 [ 14.221842] kasan_save_track+0x18/0x40 [ 14.222052] kasan_save_alloc_info+0x3b/0x50 [ 14.222255] __kasan_kmalloc+0xb7/0xc0 [ 14.222900] __kmalloc_cache_noprof+0x189/0x420 [ 14.223699] kasan_bitops_generic+0x92/0x1c0 [ 14.224135] kunit_try_run_case+0x1a5/0x480 [ 14.224686] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.225085] kthread+0x337/0x6f0 [ 14.225298] ret_from_fork+0x41/0x80 [ 14.225969] ret_from_fork_asm+0x1a/0x30 [ 14.226292] [ 14.226431] The buggy address belongs to the object at ffff888102662fc0 [ 14.226431] which belongs to the cache kmalloc-16 of size 16 [ 14.227419] The buggy address is located 8 bytes inside of [ 14.227419] allocated 9-byte region [ffff888102662fc0, ffff888102662fc9) [ 14.228011] [ 14.228446] The buggy address belongs to the physical page: [ 14.229207] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102662 [ 14.229855] flags: 0x200000000000000(node=0|zone=2) [ 14.230111] page_type: f5(slab) [ 14.230298] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.231221] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.231888] page dumped because: kasan: bad access detected [ 14.232244] [ 14.233052] Memory state around the buggy address: [ 14.233526] ffff888102662e80: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 14.234001] ffff888102662f00: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 14.234609] >ffff888102662f80: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 14.234868] ^ [ 14.235265] ffff888102663000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.235985] ffff888102663080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb [ 14.236920] ================================================================== [ 14.077983] ================================================================== [ 14.078493] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50 [ 14.080181] Write of size 8 at addr ffff888102662fc8 by task kunit_try_catch/281 [ 14.080715] [ 14.080926] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc2 #1 PREEMPT(voluntary) [ 14.081182] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.081210] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.081257] Call Trace: [ 14.081373] <TASK> [ 14.081411] dump_stack_lvl+0x73/0xb0 [ 14.081459] print_report+0xd1/0x650 [ 14.081484] ? __virt_addr_valid+0x1db/0x2d0 [ 14.081507] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 14.081528] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.081564] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 14.081585] kasan_report+0x141/0x180 [ 14.081606] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 14.081650] kasan_check_range+0x10c/0x1c0 [ 14.081672] __kasan_check_write+0x18/0x20 [ 14.081691] kasan_bitops_modify.constprop.0+0x101/0xd50 [ 14.081712] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.081733] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.081755] ? trace_hardirqs_on+0x37/0xe0 [ 14.081778] ? kasan_bitops_generic+0x92/0x1c0 [ 14.081802] kasan_bitops_generic+0x116/0x1c0 [ 14.081820] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.081840] ? __pfx_read_tsc+0x10/0x10 [ 14.081860] ? ktime_get_ts64+0x86/0x230 [ 14.081884] kunit_try_run_case+0x1a5/0x480 [ 14.081908] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.081929] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.081964] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.081988] ? __kthread_parkme+0x82/0x180 [ 14.082010] ? preempt_count_sub+0x50/0x80 [ 14.082035] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.082058] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.082080] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.082103] kthread+0x337/0x6f0 [ 14.082119] ? trace_preempt_on+0x20/0xc0 [ 14.082140] ? __pfx_kthread+0x10/0x10 [ 14.082157] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.082177] ? calculate_sigpending+0x7b/0xa0 [ 14.082197] ? __pfx_kthread+0x10/0x10 [ 14.082215] ret_from_fork+0x41/0x80 [ 14.082234] ? __pfx_kthread+0x10/0x10 [ 14.082250] ret_from_fork_asm+0x1a/0x30 [ 14.082283] </TASK> [ 14.082304] [ 14.093673] Allocated by task 281: [ 14.094086] kasan_save_stack+0x45/0x70 [ 14.094759] kasan_save_track+0x18/0x40 [ 14.095509] kasan_save_alloc_info+0x3b/0x50 [ 14.095876] __kasan_kmalloc+0xb7/0xc0 [ 14.096181] __kmalloc_cache_noprof+0x189/0x420 [ 14.096458] kasan_bitops_generic+0x92/0x1c0 [ 14.096945] kunit_try_run_case+0x1a5/0x480 [ 14.097152] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.097476] kthread+0x337/0x6f0 [ 14.097766] ret_from_fork+0x41/0x80 [ 14.098099] ret_from_fork_asm+0x1a/0x30 [ 14.098939] [ 14.099119] The buggy address belongs to the object at ffff888102662fc0 [ 14.099119] which belongs to the cache kmalloc-16 of size 16 [ 14.099968] The buggy address is located 8 bytes inside of [ 14.099968] allocated 9-byte region [ffff888102662fc0, ffff888102662fc9) [ 14.100726] [ 14.100909] The buggy address belongs to the physical page: [ 14.101174] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102662 [ 14.101918] flags: 0x200000000000000(node=0|zone=2) [ 14.102273] page_type: f5(slab) [ 14.102973] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.103376] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.104130] page dumped because: kasan: bad access detected [ 14.104493] [ 14.104642] Memory state around the buggy address: [ 14.104984] ffff888102662e80: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 14.105427] ffff888102662f00: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 14.105899] >ffff888102662f80: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 14.106838] ^ [ 14.107194] ffff888102663000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.107778] ffff888102663080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb [ 14.108109] ================================================================== [ 14.141039] ================================================================== [ 14.141698] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 14.141996] Write of size 8 at addr ffff888102662fc8 by task kunit_try_catch/281 [ 14.142244] [ 14.142380] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc2 #1 PREEMPT(voluntary) [ 14.143237] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.143263] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.143303] Call Trace: [ 14.143440] <TASK> [ 14.143480] dump_stack_lvl+0x73/0xb0 [ 14.143540] print_report+0xd1/0x650 [ 14.143580] ? __virt_addr_valid+0x1db/0x2d0 [ 14.143638] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 14.143679] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.143716] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 14.143755] kasan_report+0x141/0x180 [ 14.143790] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 14.143818] kasan_check_range+0x10c/0x1c0 [ 14.143838] __kasan_check_write+0x18/0x20 [ 14.143857] kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 14.143878] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.143904] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.143936] ? trace_hardirqs_on+0x37/0xe0 [ 14.143958] ? kasan_bitops_generic+0x92/0x1c0 [ 14.143981] kasan_bitops_generic+0x116/0x1c0 [ 14.144000] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.144020] ? __pfx_read_tsc+0x10/0x10 [ 14.144039] ? ktime_get_ts64+0x86/0x230 [ 14.144064] kunit_try_run_case+0x1a5/0x480 [ 14.144088] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.144108] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.144132] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.144153] ? __kthread_parkme+0x82/0x180 [ 14.144175] ? preempt_count_sub+0x50/0x80 [ 14.144198] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.144220] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.144241] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.144263] kthread+0x337/0x6f0 [ 14.144279] ? trace_preempt_on+0x20/0xc0 [ 14.144444] ? __pfx_kthread+0x10/0x10 [ 14.144485] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.144517] ? calculate_sigpending+0x7b/0xa0 [ 14.144550] ? __pfx_kthread+0x10/0x10 [ 14.144575] ret_from_fork+0x41/0x80 [ 14.144606] ? __pfx_kthread+0x10/0x10 [ 14.144649] ret_from_fork_asm+0x1a/0x30 [ 14.144698] </TASK> [ 14.144719] [ 14.156744] Allocated by task 281: [ 14.157127] kasan_save_stack+0x45/0x70 [ 14.158164] kasan_save_track+0x18/0x40 [ 14.158605] kasan_save_alloc_info+0x3b/0x50 [ 14.158797] __kasan_kmalloc+0xb7/0xc0 [ 14.159072] __kmalloc_cache_noprof+0x189/0x420 [ 14.159669] kasan_bitops_generic+0x92/0x1c0 [ 14.159960] kunit_try_run_case+0x1a5/0x480 [ 14.160505] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.160922] kthread+0x337/0x6f0 [ 14.161170] ret_from_fork+0x41/0x80 [ 14.161863] ret_from_fork_asm+0x1a/0x30 [ 14.162119] [ 14.162233] The buggy address belongs to the object at ffff888102662fc0 [ 14.162233] which belongs to the cache kmalloc-16 of size 16 [ 14.162856] The buggy address is located 8 bytes inside of [ 14.162856] allocated 9-byte region [ffff888102662fc0, ffff888102662fc9) [ 14.163460] [ 14.163609] The buggy address belongs to the physical page: [ 14.164384] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102662 [ 14.164936] flags: 0x200000000000000(node=0|zone=2) [ 14.165252] page_type: f5(slab) [ 14.166104] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.166525] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.167114] page dumped because: kasan: bad access detected [ 14.167431] [ 14.167608] Memory state around the buggy address: [ 14.168103] ffff888102662e80: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 14.168755] ffff888102662f00: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 14.169016] >ffff888102662f80: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 14.170060] ^ [ 14.170422] ffff888102663000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.171172] ffff888102663080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb [ 14.171577] ================================================================== [ 14.237565] ================================================================== [ 14.237896] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 14.239789] Write of size 8 at addr ffff888102662fc8 by task kunit_try_catch/281 [ 14.240214] [ 14.240735] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.4-rc2 #1 PREEMPT(voluntary) [ 14.240839] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.240858] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.240893] Call Trace: [ 14.240933] <TASK> [ 14.240968] dump_stack_lvl+0x73/0xb0 [ 14.241031] print_report+0xd1/0x650 [ 14.241082] ? __virt_addr_valid+0x1db/0x2d0 [ 14.241126] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 14.241165] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.241218] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 14.241263] kasan_report+0x141/0x180 [ 14.241301] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 14.241375] kasan_check_range+0x10c/0x1c0 [ 14.241414] __kasan_check_write+0x18/0x20 [ 14.241447] kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 14.241476] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.241499] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.241520] ? trace_hardirqs_on+0x37/0xe0 [ 14.241561] ? kasan_bitops_generic+0x92/0x1c0 [ 14.241586] kasan_bitops_generic+0x116/0x1c0 [ 14.241606] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.241642] ? __pfx_read_tsc+0x10/0x10 [ 14.241663] ? ktime_get_ts64+0x86/0x230 [ 14.241689] kunit_try_run_case+0x1a5/0x480 [ 14.241715] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.241735] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.241758] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.241781] ? __kthread_parkme+0x82/0x180 [ 14.241802] ? preempt_count_sub+0x50/0x80 [ 14.241826] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.241848] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.241868] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.241889] kthread+0x337/0x6f0 [ 14.241906] ? trace_preempt_on+0x20/0xc0 [ 14.241928] ? __pfx_kthread+0x10/0x10 [ 14.241956] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.241979] ? calculate_sigpending+0x7b/0xa0 [ 14.242000] ? __pfx_kthread+0x10/0x10 [ 14.242019] ret_from_fork+0x41/0x80 [ 14.242038] ? __pfx_kthread+0x10/0x10 [ 14.242058] ret_from_fork_asm+0x1a/0x30 [ 14.242090] </TASK> [ 14.242103] [ 14.255201] Allocated by task 281: [ 14.255471] kasan_save_stack+0x45/0x70 [ 14.255740] kasan_save_track+0x18/0x40 [ 14.255946] kasan_save_alloc_info+0x3b/0x50 [ 14.256179] __kasan_kmalloc+0xb7/0xc0 [ 14.256420] __kmalloc_cache_noprof+0x189/0x420 [ 14.256718] kasan_bitops_generic+0x92/0x1c0 [ 14.256954] kunit_try_run_case+0x1a5/0x480 [ 14.257142] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.257349] kthread+0x337/0x6f0 [ 14.257502] ret_from_fork+0x41/0x80 [ 14.258558] ret_from_fork_asm+0x1a/0x30 [ 14.258976] [ 14.259150] The buggy address belongs to the object at ffff888102662fc0 [ 14.259150] which belongs to the cache kmalloc-16 of size 16 [ 14.260210] The buggy address is located 8 bytes inside of [ 14.260210] allocated 9-byte region [ffff888102662fc0, ffff888102662fc9) [ 14.261131] [ 14.261833] The buggy address belongs to the physical page: [ 14.262096] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102662 [ 14.262974] flags: 0x200000000000000(node=0|zone=2) [ 14.263281] page_type: f5(slab) [ 14.263534] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.264555] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.264901] page dumped because: kasan: bad access detected [ 14.265811] [ 14.265920] Memory state around the buggy address: [ 14.266156] ffff888102662e80: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 14.266669] ffff888102662f00: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 14.266994] >ffff888102662f80: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 14.267262] ^ [ 14.267671] ffff888102663000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.268215] ffff888102663080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb [ 14.268687] ==================================================================