Date
July 3, 2025, 3:13 p.m.
Environment | |
---|---|
qemu-x86_64 |
[ 13.246094] ================================================================== [ 13.246783] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 13.247145] Write of size 8 at addr ffff888102307e08 by task kunit_try_catch/280 [ 13.247917] [ 13.248042] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT(voluntary) [ 13.248113] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.248126] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.248148] Call Trace: [ 13.248167] <TASK> [ 13.248185] dump_stack_lvl+0x73/0xb0 [ 13.248212] print_report+0xd1/0x650 [ 13.248249] ? __virt_addr_valid+0x1db/0x2d0 [ 13.248502] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 13.248539] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.248564] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 13.248587] kasan_report+0x141/0x180 [ 13.248611] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 13.248639] kasan_check_range+0x10c/0x1c0 [ 13.248660] __kasan_check_write+0x18/0x20 [ 13.248681] kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 13.248704] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 13.248727] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.248750] ? trace_hardirqs_on+0x37/0xe0 [ 13.248773] ? kasan_bitops_generic+0x92/0x1c0 [ 13.248797] kasan_bitops_generic+0x116/0x1c0 [ 13.248817] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.248840] ? __pfx_read_tsc+0x10/0x10 [ 13.248860] ? ktime_get_ts64+0x86/0x230 [ 13.248885] kunit_try_run_case+0x1a5/0x480 [ 13.248911] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.248932] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.248958] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.248982] ? __kthread_parkme+0x82/0x180 [ 13.249004] ? preempt_count_sub+0x50/0x80 [ 13.249030] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.249054] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.249077] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.249101] kthread+0x337/0x6f0 [ 13.249117] ? trace_preempt_on+0x20/0xc0 [ 13.249141] ? __pfx_kthread+0x10/0x10 [ 13.249159] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.249181] ? calculate_sigpending+0x7b/0xa0 [ 13.249203] ? __pfx_kthread+0x10/0x10 [ 13.249222] ret_from_fork+0x41/0x80 [ 13.249258] ? __pfx_kthread+0x10/0x10 [ 13.249332] ret_from_fork_asm+0x1a/0x30 [ 13.249365] </TASK> [ 13.249375] [ 13.261161] Allocated by task 280: [ 13.261729] kasan_save_stack+0x45/0x70 [ 13.261944] kasan_save_track+0x18/0x40 [ 13.262085] kasan_save_alloc_info+0x3b/0x50 [ 13.262309] __kasan_kmalloc+0xb7/0xc0 [ 13.262870] __kmalloc_cache_noprof+0x189/0x420 [ 13.263388] kasan_bitops_generic+0x92/0x1c0 [ 13.263683] kunit_try_run_case+0x1a5/0x480 [ 13.264131] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.264492] kthread+0x337/0x6f0 [ 13.264618] ret_from_fork+0x41/0x80 [ 13.265055] ret_from_fork_asm+0x1a/0x30 [ 13.265445] [ 13.265625] The buggy address belongs to the object at ffff888102307e00 [ 13.265625] which belongs to the cache kmalloc-16 of size 16 [ 13.266265] The buggy address is located 8 bytes inside of [ 13.266265] allocated 9-byte region [ffff888102307e00, ffff888102307e09) [ 13.266610] [ 13.266776] The buggy address belongs to the physical page: [ 13.266974] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102307 [ 13.267357] flags: 0x200000000000000(node=0|zone=2) [ 13.267571] page_type: f5(slab) [ 13.267726] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.267967] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.268358] page dumped because: kasan: bad access detected [ 13.268630] [ 13.268818] Memory state around the buggy address: [ 13.269015] ffff888102307d00: 00 04 fc fc 00 01 fc fc 00 01 fc fc 00 04 fc fc [ 13.269428] ffff888102307d80: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.269724] >ffff888102307e00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.270084] ^ [ 13.270206] ffff888102307e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.270547] ffff888102307f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.270863] ================================================================== [ 13.359318] ================================================================== [ 13.359640] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 13.360014] Write of size 8 at addr ffff888102307e08 by task kunit_try_catch/280 [ 13.360343] [ 13.360467] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT(voluntary) [ 13.360513] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.360525] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.360549] Call Trace: [ 13.360579] <TASK> [ 13.360599] dump_stack_lvl+0x73/0xb0 [ 13.360625] print_report+0xd1/0x650 [ 13.360649] ? __virt_addr_valid+0x1db/0x2d0 [ 13.360681] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 13.360703] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.360726] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 13.360749] kasan_report+0x141/0x180 [ 13.360771] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 13.360798] kasan_check_range+0x10c/0x1c0 [ 13.360819] __kasan_check_write+0x18/0x20 [ 13.360839] kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 13.360862] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 13.360886] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.360908] ? trace_hardirqs_on+0x37/0xe0 [ 13.360930] ? kasan_bitops_generic+0x92/0x1c0 [ 13.360955] kasan_bitops_generic+0x116/0x1c0 [ 13.360975] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.360997] ? __pfx_read_tsc+0x10/0x10 [ 13.361017] ? ktime_get_ts64+0x86/0x230 [ 13.361042] kunit_try_run_case+0x1a5/0x480 [ 13.361068] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.361090] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.361114] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.361138] ? __kthread_parkme+0x82/0x180 [ 13.361160] ? preempt_count_sub+0x50/0x80 [ 13.361187] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.361211] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.361243] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.361267] kthread+0x337/0x6f0 [ 13.361283] ? trace_preempt_on+0x20/0xc0 [ 13.361306] ? __pfx_kthread+0x10/0x10 [ 13.361325] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.361348] ? calculate_sigpending+0x7b/0xa0 [ 13.361370] ? __pfx_kthread+0x10/0x10 [ 13.361389] ret_from_fork+0x41/0x80 [ 13.361411] ? __pfx_kthread+0x10/0x10 [ 13.361429] ret_from_fork_asm+0x1a/0x30 [ 13.361461] </TASK> [ 13.361472] [ 13.375133] Allocated by task 280: [ 13.375365] kasan_save_stack+0x45/0x70 [ 13.375565] kasan_save_track+0x18/0x40 [ 13.376266] kasan_save_alloc_info+0x3b/0x50 [ 13.376780] __kasan_kmalloc+0xb7/0xc0 [ 13.377033] __kmalloc_cache_noprof+0x189/0x420 [ 13.377579] kasan_bitops_generic+0x92/0x1c0 [ 13.377932] kunit_try_run_case+0x1a5/0x480 [ 13.378086] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.378428] kthread+0x337/0x6f0 [ 13.378570] ret_from_fork+0x41/0x80 [ 13.378772] ret_from_fork_asm+0x1a/0x30 [ 13.378975] [ 13.379054] The buggy address belongs to the object at ffff888102307e00 [ 13.379054] which belongs to the cache kmalloc-16 of size 16 [ 13.379638] The buggy address is located 8 bytes inside of [ 13.379638] allocated 9-byte region [ffff888102307e00, ffff888102307e09) [ 13.380570] [ 13.380853] The buggy address belongs to the physical page: [ 13.381130] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102307 [ 13.381953] flags: 0x200000000000000(node=0|zone=2) [ 13.382196] page_type: f5(slab) [ 13.382469] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.383106] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.383857] page dumped because: kasan: bad access detected [ 13.384117] [ 13.384213] Memory state around the buggy address: [ 13.384579] ffff888102307d00: 00 04 fc fc 00 01 fc fc 00 01 fc fc 00 04 fc fc [ 13.385739] ffff888102307d80: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.386266] >ffff888102307e00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.387129] ^ [ 13.387618] ffff888102307e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.387960] ffff888102307f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.388257] ================================================================== [ 13.312672] ================================================================== [ 13.313013] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50 [ 13.313363] Write of size 8 at addr ffff888102307e08 by task kunit_try_catch/280 [ 13.314506] [ 13.314909] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT(voluntary) [ 13.314964] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.314977] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.315059] Call Trace: [ 13.315081] <TASK> [ 13.315191] dump_stack_lvl+0x73/0xb0 [ 13.315226] print_report+0xd1/0x650 [ 13.315260] ? __virt_addr_valid+0x1db/0x2d0 [ 13.315308] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 13.315331] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.315354] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 13.315376] kasan_report+0x141/0x180 [ 13.315399] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 13.315427] kasan_check_range+0x10c/0x1c0 [ 13.315447] __kasan_check_write+0x18/0x20 [ 13.315467] kasan_bitops_modify.constprop.0+0x373/0xd50 [ 13.315490] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 13.315513] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.315534] ? trace_hardirqs_on+0x37/0xe0 [ 13.315556] ? kasan_bitops_generic+0x92/0x1c0 [ 13.315581] kasan_bitops_generic+0x116/0x1c0 [ 13.315601] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.315623] ? __pfx_read_tsc+0x10/0x10 [ 13.315656] ? ktime_get_ts64+0x86/0x230 [ 13.315682] kunit_try_run_case+0x1a5/0x480 [ 13.315706] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.315728] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.315753] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.315778] ? __kthread_parkme+0x82/0x180 [ 13.315800] ? preempt_count_sub+0x50/0x80 [ 13.315825] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.315848] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.315871] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.315895] kthread+0x337/0x6f0 [ 13.315911] ? trace_preempt_on+0x20/0xc0 [ 13.315933] ? __pfx_kthread+0x10/0x10 [ 13.315951] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.315972] ? calculate_sigpending+0x7b/0xa0 [ 13.315995] ? __pfx_kthread+0x10/0x10 [ 13.316013] ret_from_fork+0x41/0x80 [ 13.316033] ? __pfx_kthread+0x10/0x10 [ 13.316051] ret_from_fork_asm+0x1a/0x30 [ 13.316081] </TASK> [ 13.316092] [ 13.325609] Allocated by task 280: [ 13.325808] kasan_save_stack+0x45/0x70 [ 13.325968] kasan_save_track+0x18/0x40 [ 13.326162] kasan_save_alloc_info+0x3b/0x50 [ 13.326563] __kasan_kmalloc+0xb7/0xc0 [ 13.326754] __kmalloc_cache_noprof+0x189/0x420 [ 13.326961] kasan_bitops_generic+0x92/0x1c0 [ 13.327164] kunit_try_run_case+0x1a5/0x480 [ 13.327424] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.327606] kthread+0x337/0x6f0 [ 13.327753] ret_from_fork+0x41/0x80 [ 13.327927] ret_from_fork_asm+0x1a/0x30 [ 13.328131] [ 13.328238] The buggy address belongs to the object at ffff888102307e00 [ 13.328238] which belongs to the cache kmalloc-16 of size 16 [ 13.328867] The buggy address is located 8 bytes inside of [ 13.328867] allocated 9-byte region [ffff888102307e00, ffff888102307e09) [ 13.329504] [ 13.329603] The buggy address belongs to the physical page: [ 13.329803] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102307 [ 13.330080] flags: 0x200000000000000(node=0|zone=2) [ 13.330497] page_type: f5(slab) [ 13.330679] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.331045] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.331487] page dumped because: kasan: bad access detected [ 13.331676] [ 13.331797] Memory state around the buggy address: [ 13.332030] ffff888102307d00: 00 04 fc fc 00 01 fc fc 00 01 fc fc 00 04 fc fc [ 13.332397] ffff888102307d80: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.332721] >ffff888102307e00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.332970] ^ [ 13.333149] ffff888102307e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.333553] ffff888102307f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.333876] ================================================================== [ 13.222077] ================================================================== [ 13.222660] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50 [ 13.223073] Write of size 8 at addr ffff888102307e08 by task kunit_try_catch/280 [ 13.223531] [ 13.223641] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT(voluntary) [ 13.223691] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.223705] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.223728] Call Trace: [ 13.223740] <TASK> [ 13.223760] dump_stack_lvl+0x73/0xb0 [ 13.223787] print_report+0xd1/0x650 [ 13.223811] ? __virt_addr_valid+0x1db/0x2d0 [ 13.223834] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 13.223856] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.223879] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 13.223902] kasan_report+0x141/0x180 [ 13.223925] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 13.223953] kasan_check_range+0x10c/0x1c0 [ 13.224032] __kasan_check_write+0x18/0x20 [ 13.224069] kasan_bitops_modify.constprop.0+0x101/0xd50 [ 13.224092] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 13.224115] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.224137] ? trace_hardirqs_on+0x37/0xe0 [ 13.224161] ? kasan_bitops_generic+0x92/0x1c0 [ 13.224186] kasan_bitops_generic+0x116/0x1c0 [ 13.224207] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.224251] ? __pfx_read_tsc+0x10/0x10 [ 13.224275] ? ktime_get_ts64+0x86/0x230 [ 13.224484] kunit_try_run_case+0x1a5/0x480 [ 13.224510] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.224533] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.224559] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.224583] ? __kthread_parkme+0x82/0x180 [ 13.224605] ? preempt_count_sub+0x50/0x80 [ 13.224631] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.224654] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.224679] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.224702] kthread+0x337/0x6f0 [ 13.224719] ? trace_preempt_on+0x20/0xc0 [ 13.224743] ? __pfx_kthread+0x10/0x10 [ 13.224761] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.224784] ? calculate_sigpending+0x7b/0xa0 [ 13.224807] ? __pfx_kthread+0x10/0x10 [ 13.224825] ret_from_fork+0x41/0x80 [ 13.224847] ? __pfx_kthread+0x10/0x10 [ 13.224864] ret_from_fork_asm+0x1a/0x30 [ 13.224895] </TASK> [ 13.224907] [ 13.234613] Allocated by task 280: [ 13.234842] kasan_save_stack+0x45/0x70 [ 13.235097] kasan_save_track+0x18/0x40 [ 13.235338] kasan_save_alloc_info+0x3b/0x50 [ 13.235526] __kasan_kmalloc+0xb7/0xc0 [ 13.235760] __kmalloc_cache_noprof+0x189/0x420 [ 13.235999] kasan_bitops_generic+0x92/0x1c0 [ 13.236253] kunit_try_run_case+0x1a5/0x480 [ 13.236659] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.236996] kthread+0x337/0x6f0 [ 13.237119] ret_from_fork+0x41/0x80 [ 13.237257] ret_from_fork_asm+0x1a/0x30 [ 13.237453] [ 13.237768] The buggy address belongs to the object at ffff888102307e00 [ 13.237768] which belongs to the cache kmalloc-16 of size 16 [ 13.238292] The buggy address is located 8 bytes inside of [ 13.238292] allocated 9-byte region [ffff888102307e00, ffff888102307e09) [ 13.238949] [ 13.239067] The buggy address belongs to the physical page: [ 13.239352] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102307 [ 13.239872] flags: 0x200000000000000(node=0|zone=2) [ 13.240139] page_type: f5(slab) [ 13.240588] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.241003] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.241255] page dumped because: kasan: bad access detected [ 13.241635] [ 13.241778] Memory state around the buggy address: [ 13.242103] ffff888102307d00: 00 04 fc fc 00 01 fc fc 00 01 fc fc 00 04 fc fc [ 13.242969] ffff888102307d80: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.243223] >ffff888102307e00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.243878] ^ [ 13.244051] ffff888102307e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.244388] ffff888102307f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.245168] ================================================================== [ 13.290497] ================================================================== [ 13.290933] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 13.291407] Write of size 8 at addr ffff888102307e08 by task kunit_try_catch/280 [ 13.291643] [ 13.291774] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT(voluntary) [ 13.291821] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.291833] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.291856] Call Trace: [ 13.291875] <TASK> [ 13.291895] dump_stack_lvl+0x73/0xb0 [ 13.291921] print_report+0xd1/0x650 [ 13.291944] ? __virt_addr_valid+0x1db/0x2d0 [ 13.291967] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 13.291990] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.292014] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 13.292038] kasan_report+0x141/0x180 [ 13.292062] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 13.292091] kasan_check_range+0x10c/0x1c0 [ 13.292114] __kasan_check_write+0x18/0x20 [ 13.292136] kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 13.292160] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 13.292184] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.292207] ? trace_hardirqs_on+0x37/0xe0 [ 13.292244] ? kasan_bitops_generic+0x92/0x1c0 [ 13.292270] kasan_bitops_generic+0x116/0x1c0 [ 13.292291] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.292315] ? __pfx_read_tsc+0x10/0x10 [ 13.292337] ? ktime_get_ts64+0x86/0x230 [ 13.292363] kunit_try_run_case+0x1a5/0x480 [ 13.292387] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.292410] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.292435] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.292459] ? __kthread_parkme+0x82/0x180 [ 13.292481] ? preempt_count_sub+0x50/0x80 [ 13.292510] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.292534] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.292557] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.292580] kthread+0x337/0x6f0 [ 13.292597] ? trace_preempt_on+0x20/0xc0 [ 13.292619] ? __pfx_kthread+0x10/0x10 [ 13.292638] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.292660] ? calculate_sigpending+0x7b/0xa0 [ 13.292682] ? __pfx_kthread+0x10/0x10 [ 13.292700] ret_from_fork+0x41/0x80 [ 13.292721] ? __pfx_kthread+0x10/0x10 [ 13.292739] ret_from_fork_asm+0x1a/0x30 [ 13.292770] </TASK> [ 13.292780] [ 13.301053] Allocated by task 280: [ 13.301245] kasan_save_stack+0x45/0x70 [ 13.301400] kasan_save_track+0x18/0x40 [ 13.301536] kasan_save_alloc_info+0x3b/0x50 [ 13.301687] __kasan_kmalloc+0xb7/0xc0 [ 13.301820] __kmalloc_cache_noprof+0x189/0x420 [ 13.301973] kasan_bitops_generic+0x92/0x1c0 [ 13.302516] kunit_try_run_case+0x1a5/0x480 [ 13.302825] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.303085] kthread+0x337/0x6f0 [ 13.303276] ret_from_fork+0x41/0x80 [ 13.303527] ret_from_fork_asm+0x1a/0x30 [ 13.303850] [ 13.303949] The buggy address belongs to the object at ffff888102307e00 [ 13.303949] which belongs to the cache kmalloc-16 of size 16 [ 13.304509] The buggy address is located 8 bytes inside of [ 13.304509] allocated 9-byte region [ffff888102307e00, ffff888102307e09) [ 13.305265] [ 13.305342] The buggy address belongs to the physical page: [ 13.305515] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102307 [ 13.305758] flags: 0x200000000000000(node=0|zone=2) [ 13.305960] page_type: f5(slab) [ 13.306293] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.306638] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.306975] page dumped because: kasan: bad access detected [ 13.307193] [ 13.307470] Memory state around the buggy address: [ 13.307636] ffff888102307d00: 00 04 fc fc 00 01 fc fc 00 01 fc fc 00 04 fc fc [ 13.307964] ffff888102307d80: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.308385] >ffff888102307e00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.308787] ^ [ 13.308970] ffff888102307e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.309378] ffff888102307f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.309667] ================================================================== [ 13.271322] ================================================================== [ 13.271869] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 13.272372] Write of size 8 at addr ffff888102307e08 by task kunit_try_catch/280 [ 13.272663] [ 13.272754] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT(voluntary) [ 13.272801] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.272817] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.272839] Call Trace: [ 13.272859] <TASK> [ 13.272878] dump_stack_lvl+0x73/0xb0 [ 13.272904] print_report+0xd1/0x650 [ 13.272926] ? __virt_addr_valid+0x1db/0x2d0 [ 13.272949] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 13.272971] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.272995] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 13.273018] kasan_report+0x141/0x180 [ 13.273041] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 13.273069] kasan_check_range+0x10c/0x1c0 [ 13.273090] __kasan_check_write+0x18/0x20 [ 13.273110] kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 13.273134] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 13.273157] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.273179] ? trace_hardirqs_on+0x37/0xe0 [ 13.273203] ? kasan_bitops_generic+0x92/0x1c0 [ 13.273241] kasan_bitops_generic+0x116/0x1c0 [ 13.273263] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.273285] ? __pfx_read_tsc+0x10/0x10 [ 13.273305] ? ktime_get_ts64+0x86/0x230 [ 13.273331] kunit_try_run_case+0x1a5/0x480 [ 13.273356] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.273392] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.273417] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.273441] ? __kthread_parkme+0x82/0x180 [ 13.273463] ? preempt_count_sub+0x50/0x80 [ 13.273488] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.273512] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.273536] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.273567] kthread+0x337/0x6f0 [ 13.273583] ? trace_preempt_on+0x20/0xc0 [ 13.273606] ? __pfx_kthread+0x10/0x10 [ 13.273625] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.273647] ? calculate_sigpending+0x7b/0xa0 [ 13.273669] ? __pfx_kthread+0x10/0x10 [ 13.273689] ret_from_fork+0x41/0x80 [ 13.273709] ? __pfx_kthread+0x10/0x10 [ 13.273728] ret_from_fork_asm+0x1a/0x30 [ 13.273759] </TASK> [ 13.273769] [ 13.281800] Allocated by task 280: [ 13.281925] kasan_save_stack+0x45/0x70 [ 13.282065] kasan_save_track+0x18/0x40 [ 13.282257] kasan_save_alloc_info+0x3b/0x50 [ 13.282555] __kasan_kmalloc+0xb7/0xc0 [ 13.282877] __kmalloc_cache_noprof+0x189/0x420 [ 13.283056] kasan_bitops_generic+0x92/0x1c0 [ 13.283219] kunit_try_run_case+0x1a5/0x480 [ 13.283546] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.283787] kthread+0x337/0x6f0 [ 13.283947] ret_from_fork+0x41/0x80 [ 13.284108] ret_from_fork_asm+0x1a/0x30 [ 13.284270] [ 13.284606] The buggy address belongs to the object at ffff888102307e00 [ 13.284606] which belongs to the cache kmalloc-16 of size 16 [ 13.285131] The buggy address is located 8 bytes inside of [ 13.285131] allocated 9-byte region [ffff888102307e00, ffff888102307e09) [ 13.285669] [ 13.285778] The buggy address belongs to the physical page: [ 13.286008] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102307 [ 13.286364] flags: 0x200000000000000(node=0|zone=2) [ 13.286600] page_type: f5(slab) [ 13.286777] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.287112] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.287439] page dumped because: kasan: bad access detected [ 13.287638] [ 13.287707] Memory state around the buggy address: [ 13.287867] ffff888102307d00: 00 04 fc fc 00 01 fc fc 00 01 fc fc 00 04 fc fc [ 13.288084] ffff888102307d80: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.288313] >ffff888102307e00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.289021] ^ [ 13.289246] ffff888102307e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.289638] ffff888102307f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.289964] ================================================================== [ 13.336352] ================================================================== [ 13.336728] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 13.337108] Write of size 8 at addr ffff888102307e08 by task kunit_try_catch/280 [ 13.337461] [ 13.337584] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT(voluntary) [ 13.337632] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.337645] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.337667] Call Trace: [ 13.337684] <TASK> [ 13.337702] dump_stack_lvl+0x73/0xb0 [ 13.337727] print_report+0xd1/0x650 [ 13.337751] ? __virt_addr_valid+0x1db/0x2d0 [ 13.337773] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 13.337795] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.337818] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 13.337840] kasan_report+0x141/0x180 [ 13.337863] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 13.337889] kasan_check_range+0x10c/0x1c0 [ 13.337910] __kasan_check_write+0x18/0x20 [ 13.337929] kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 13.337952] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 13.337975] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.337996] ? trace_hardirqs_on+0x37/0xe0 [ 13.338019] ? kasan_bitops_generic+0x92/0x1c0 [ 13.338043] kasan_bitops_generic+0x116/0x1c0 [ 13.338063] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.338085] ? __pfx_read_tsc+0x10/0x10 [ 13.338105] ? ktime_get_ts64+0x86/0x230 [ 13.338130] kunit_try_run_case+0x1a5/0x480 [ 13.338154] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.338177] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.338202] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.338225] ? __kthread_parkme+0x82/0x180 [ 13.338481] ? preempt_count_sub+0x50/0x80 [ 13.338510] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.338534] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.338558] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.338581] kthread+0x337/0x6f0 [ 13.338599] ? trace_preempt_on+0x20/0xc0 [ 13.338622] ? __pfx_kthread+0x10/0x10 [ 13.338665] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.338688] ? calculate_sigpending+0x7b/0xa0 [ 13.338711] ? __pfx_kthread+0x10/0x10 [ 13.338730] ret_from_fork+0x41/0x80 [ 13.338751] ? __pfx_kthread+0x10/0x10 [ 13.338769] ret_from_fork_asm+0x1a/0x30 [ 13.338801] </TASK> [ 13.338811] [ 13.348201] Allocated by task 280: [ 13.348468] kasan_save_stack+0x45/0x70 [ 13.348709] kasan_save_track+0x18/0x40 [ 13.348878] kasan_save_alloc_info+0x3b/0x50 [ 13.349050] __kasan_kmalloc+0xb7/0xc0 [ 13.349241] __kmalloc_cache_noprof+0x189/0x420 [ 13.349564] kasan_bitops_generic+0x92/0x1c0 [ 13.349786] kunit_try_run_case+0x1a5/0x480 [ 13.349975] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.350210] kthread+0x337/0x6f0 [ 13.350572] ret_from_fork+0x41/0x80 [ 13.350736] ret_from_fork_asm+0x1a/0x30 [ 13.350970] [ 13.351062] The buggy address belongs to the object at ffff888102307e00 [ 13.351062] which belongs to the cache kmalloc-16 of size 16 [ 13.351649] The buggy address is located 8 bytes inside of [ 13.351649] allocated 9-byte region [ffff888102307e00, ffff888102307e09) [ 13.352150] [ 13.352260] The buggy address belongs to the physical page: [ 13.352560] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102307 [ 13.352871] flags: 0x200000000000000(node=0|zone=2) [ 13.353042] page_type: f5(slab) [ 13.353166] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.353632] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.354008] page dumped because: kasan: bad access detected [ 13.354211] [ 13.354472] Memory state around the buggy address: [ 13.354706] ffff888102307d00: 00 04 fc fc 00 01 fc fc 00 01 fc fc 00 04 fc fc [ 13.355066] ffff888102307d80: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.355511] >ffff888102307e00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.355865] ^ [ 13.356011] ffff888102307e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.356399] ffff888102307f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.356729] ================================================================== [ 13.388749] ================================================================== [ 13.389131] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50 [ 13.389681] Write of size 8 at addr ffff888102307e08 by task kunit_try_catch/280 [ 13.390021] [ 13.390116] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc1 #1 PREEMPT(voluntary) [ 13.390163] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.390176] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.390198] Call Trace: [ 13.390217] <TASK> [ 13.390250] dump_stack_lvl+0x73/0xb0 [ 13.390277] print_report+0xd1/0x650 [ 13.390302] ? __virt_addr_valid+0x1db/0x2d0 [ 13.390325] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 13.390347] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.390370] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 13.390393] kasan_report+0x141/0x180 [ 13.390415] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 13.390443] kasan_check_range+0x10c/0x1c0 [ 13.390464] __kasan_check_write+0x18/0x20 [ 13.390484] kasan_bitops_modify.constprop.0+0x547/0xd50 [ 13.390506] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 13.390531] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.390553] ? trace_hardirqs_on+0x37/0xe0 [ 13.390576] ? kasan_bitops_generic+0x92/0x1c0 [ 13.390601] kasan_bitops_generic+0x116/0x1c0 [ 13.390623] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.390656] ? __pfx_read_tsc+0x10/0x10 [ 13.390676] ? ktime_get_ts64+0x86/0x230 [ 13.390703] kunit_try_run_case+0x1a5/0x480 [ 13.390727] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.390750] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.390775] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.390799] ? __kthread_parkme+0x82/0x180 [ 13.390821] ? preempt_count_sub+0x50/0x80 [ 13.390848] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.390873] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.390899] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.390923] kthread+0x337/0x6f0 [ 13.390940] ? trace_preempt_on+0x20/0xc0 [ 13.390964] ? __pfx_kthread+0x10/0x10 [ 13.390983] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.391005] ? calculate_sigpending+0x7b/0xa0 [ 13.391027] ? __pfx_kthread+0x10/0x10 [ 13.391046] ret_from_fork+0x41/0x80 [ 13.391068] ? __pfx_kthread+0x10/0x10 [ 13.391086] ret_from_fork_asm+0x1a/0x30 [ 13.391118] </TASK> [ 13.391130] [ 13.399987] Allocated by task 280: [ 13.400127] kasan_save_stack+0x45/0x70 [ 13.400395] kasan_save_track+0x18/0x40 [ 13.400595] kasan_save_alloc_info+0x3b/0x50 [ 13.400945] __kasan_kmalloc+0xb7/0xc0 [ 13.401145] __kmalloc_cache_noprof+0x189/0x420 [ 13.401322] kasan_bitops_generic+0x92/0x1c0 [ 13.401575] kunit_try_run_case+0x1a5/0x480 [ 13.402042] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.402242] kthread+0x337/0x6f0 [ 13.402363] ret_from_fork+0x41/0x80 [ 13.402515] ret_from_fork_asm+0x1a/0x30 [ 13.402712] [ 13.402807] The buggy address belongs to the object at ffff888102307e00 [ 13.402807] which belongs to the cache kmalloc-16 of size 16 [ 13.403518] The buggy address is located 8 bytes inside of [ 13.403518] allocated 9-byte region [ffff888102307e00, ffff888102307e09) [ 13.404197] [ 13.404316] The buggy address belongs to the physical page: [ 13.404623] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102307 [ 13.404924] flags: 0x200000000000000(node=0|zone=2) [ 13.405088] page_type: f5(slab) [ 13.405221] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.405941] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.406292] page dumped because: kasan: bad access detected [ 13.406537] [ 13.406609] Memory state around the buggy address: [ 13.407060] ffff888102307d00: 00 04 fc fc 00 01 fc fc 00 01 fc fc 00 04 fc fc [ 13.407382] ffff888102307d80: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.407600] >ffff888102307e00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.407978] ^ [ 13.408163] ffff888102307e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.408647] ffff888102307f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.408855] ==================================================================