Date
July 8, 2025, 4:38 p.m.
Environment | |
---|---|
qemu-x86_64 |
[ 13.498697] ================================================================== [ 13.499259] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 13.499729] Write of size 8 at addr ffff888102171608 by task kunit_try_catch/281 [ 13.500165] [ 13.500288] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT(voluntary) [ 13.500345] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.500358] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.500381] Call Trace: [ 13.500406] <TASK> [ 13.500422] dump_stack_lvl+0x73/0xb0 [ 13.500448] print_report+0xd1/0x650 [ 13.500472] ? __virt_addr_valid+0x1db/0x2d0 [ 13.500504] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 13.500534] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.500558] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 13.500592] kasan_report+0x141/0x180 [ 13.500615] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 13.500643] kasan_check_range+0x10c/0x1c0 [ 13.500665] __kasan_check_write+0x18/0x20 [ 13.500686] kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 13.500709] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 13.500733] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.500765] ? trace_hardirqs_on+0x37/0xe0 [ 13.500788] ? kasan_bitops_generic+0x92/0x1c0 [ 13.500815] kasan_bitops_generic+0x116/0x1c0 [ 13.500930] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.500958] ? trace_hardirqs_on+0x37/0xe0 [ 13.500983] ? __pfx_read_tsc+0x10/0x10 [ 13.501005] ? ktime_get_ts64+0x86/0x230 [ 13.501029] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 13.501056] kunit_try_run_case+0x1a5/0x480 [ 13.501078] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.501111] ? queued_spin_lock_slowpath+0x116/0xb40 [ 13.501138] ? __kthread_parkme+0x82/0x180 [ 13.501161] ? preempt_count_sub+0x50/0x80 [ 13.501199] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.501220] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.501244] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.501268] kthread+0x337/0x6f0 [ 13.501286] ? trace_preempt_on+0x20/0xc0 [ 13.501309] ? __pfx_kthread+0x10/0x10 [ 13.501327] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.501350] ? calculate_sigpending+0x7b/0xa0 [ 13.501372] ? __pfx_kthread+0x10/0x10 [ 13.501391] ret_from_fork+0x41/0x80 [ 13.501412] ? __pfx_kthread+0x10/0x10 [ 13.501431] ret_from_fork_asm+0x1a/0x30 [ 13.501461] </TASK> [ 13.501473] [ 13.510542] Allocated by task 281: [ 13.510730] kasan_save_stack+0x45/0x70 [ 13.511163] kasan_save_track+0x18/0x40 [ 13.511385] kasan_save_alloc_info+0x3b/0x50 [ 13.511665] __kasan_kmalloc+0xb7/0xc0 [ 13.511904] __kmalloc_cache_noprof+0x189/0x420 [ 13.512142] kasan_bitops_generic+0x92/0x1c0 [ 13.512339] kunit_try_run_case+0x1a5/0x480 [ 13.512596] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.512832] kthread+0x337/0x6f0 [ 13.513183] ret_from_fork+0x41/0x80 [ 13.513374] ret_from_fork_asm+0x1a/0x30 [ 13.513601] [ 13.513695] The buggy address belongs to the object at ffff888102171600 [ 13.513695] which belongs to the cache kmalloc-16 of size 16 [ 13.514219] The buggy address is located 8 bytes inside of [ 13.514219] allocated 9-byte region [ffff888102171600, ffff888102171609) [ 13.514686] [ 13.514805] The buggy address belongs to the physical page: [ 13.515072] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102171 [ 13.515620] flags: 0x200000000000000(node=0|zone=2) [ 13.515787] page_type: f5(slab) [ 13.515970] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.516360] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.516803] page dumped because: kasan: bad access detected [ 13.517181] [ 13.517279] Memory state around the buggy address: [ 13.517502] ffff888102171500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.517776] ffff888102171580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.518231] >ffff888102171600: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.518513] ^ [ 13.518645] ffff888102171680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.519034] ffff888102171700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.519427] ================================================================== [ 13.366031] ================================================================== [ 13.366392] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 13.366730] Write of size 8 at addr ffff888102171608 by task kunit_try_catch/281 [ 13.367060] [ 13.367171] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT(voluntary) [ 13.367213] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.367225] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.367246] Call Trace: [ 13.367260] <TASK> [ 13.367274] dump_stack_lvl+0x73/0xb0 [ 13.367298] print_report+0xd1/0x650 [ 13.367321] ? __virt_addr_valid+0x1db/0x2d0 [ 13.367343] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 13.367364] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.367387] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 13.367411] kasan_report+0x141/0x180 [ 13.367433] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 13.367459] kasan_check_range+0x10c/0x1c0 [ 13.367480] __kasan_check_write+0x18/0x20 [ 13.367500] kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 13.367522] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 13.367547] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.367568] ? trace_hardirqs_on+0x37/0xe0 [ 13.367599] ? kasan_bitops_generic+0x92/0x1c0 [ 13.367623] kasan_bitops_generic+0x116/0x1c0 [ 13.367646] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.367666] ? trace_hardirqs_on+0x37/0xe0 [ 13.367688] ? __pfx_read_tsc+0x10/0x10 [ 13.367708] ? ktime_get_ts64+0x86/0x230 [ 13.367730] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 13.367753] kunit_try_run_case+0x1a5/0x480 [ 13.367774] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.367795] ? queued_spin_lock_slowpath+0x116/0xb40 [ 13.367821] ? __kthread_parkme+0x82/0x180 [ 13.367843] ? preempt_count_sub+0x50/0x80 [ 13.367868] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.368186] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.368213] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.368239] kthread+0x337/0x6f0 [ 13.368258] ? trace_preempt_on+0x20/0xc0 [ 13.368281] ? __pfx_kthread+0x10/0x10 [ 13.368300] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.368324] ? calculate_sigpending+0x7b/0xa0 [ 13.368346] ? __pfx_kthread+0x10/0x10 [ 13.368366] ret_from_fork+0x41/0x80 [ 13.368387] ? __pfx_kthread+0x10/0x10 [ 13.368405] ret_from_fork_asm+0x1a/0x30 [ 13.368436] </TASK> [ 13.368447] [ 13.389420] Allocated by task 281: [ 13.389844] kasan_save_stack+0x45/0x70 [ 13.390474] kasan_save_track+0x18/0x40 [ 13.391151] kasan_save_alloc_info+0x3b/0x50 [ 13.391799] __kasan_kmalloc+0xb7/0xc0 [ 13.392176] __kmalloc_cache_noprof+0x189/0x420 [ 13.392344] kasan_bitops_generic+0x92/0x1c0 [ 13.392493] kunit_try_run_case+0x1a5/0x480 [ 13.393425] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.394079] kthread+0x337/0x6f0 [ 13.394561] ret_from_fork+0x41/0x80 [ 13.395161] ret_from_fork_asm+0x1a/0x30 [ 13.395869] [ 13.396121] The buggy address belongs to the object at ffff888102171600 [ 13.396121] which belongs to the cache kmalloc-16 of size 16 [ 13.397429] The buggy address is located 8 bytes inside of [ 13.397429] allocated 9-byte region [ffff888102171600, ffff888102171609) [ 13.398779] [ 13.399144] The buggy address belongs to the physical page: [ 13.399741] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102171 [ 13.400671] flags: 0x200000000000000(node=0|zone=2) [ 13.401118] page_type: f5(slab) [ 13.401250] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.401490] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.403017] page dumped because: kasan: bad access detected [ 13.403730] [ 13.404068] Memory state around the buggy address: [ 13.404677] ffff888102171500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.405479] ffff888102171580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.406404] >ffff888102171600: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.407271] ^ [ 13.407917] ffff888102171680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.408753] ffff888102171700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.409296] ================================================================== [ 13.476695] ================================================================== [ 13.477036] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 13.477666] Write of size 8 at addr ffff888102171608 by task kunit_try_catch/281 [ 13.478051] [ 13.478171] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT(voluntary) [ 13.478216] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.478229] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.478250] Call Trace: [ 13.478265] <TASK> [ 13.478282] dump_stack_lvl+0x73/0xb0 [ 13.478308] print_report+0xd1/0x650 [ 13.478332] ? __virt_addr_valid+0x1db/0x2d0 [ 13.478355] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 13.478377] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.478401] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 13.478424] kasan_report+0x141/0x180 [ 13.478447] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 13.478474] kasan_check_range+0x10c/0x1c0 [ 13.478495] __kasan_check_write+0x18/0x20 [ 13.478516] kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 13.478539] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 13.478562] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.478598] ? trace_hardirqs_on+0x37/0xe0 [ 13.478621] ? kasan_bitops_generic+0x92/0x1c0 [ 13.478646] kasan_bitops_generic+0x116/0x1c0 [ 13.478679] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.478699] ? trace_hardirqs_on+0x37/0xe0 [ 13.478722] ? __pfx_read_tsc+0x10/0x10 [ 13.478742] ? ktime_get_ts64+0x86/0x230 [ 13.478766] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 13.478791] kunit_try_run_case+0x1a5/0x480 [ 13.478816] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.478838] ? queued_spin_lock_slowpath+0x116/0xb40 [ 13.478865] ? __kthread_parkme+0x82/0x180 [ 13.478897] ? preempt_count_sub+0x50/0x80 [ 13.478923] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.478945] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.478970] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.479043] kthread+0x337/0x6f0 [ 13.479063] ? trace_preempt_on+0x20/0xc0 [ 13.479086] ? __pfx_kthread+0x10/0x10 [ 13.479105] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.479128] ? calculate_sigpending+0x7b/0xa0 [ 13.479151] ? __pfx_kthread+0x10/0x10 [ 13.479170] ret_from_fork+0x41/0x80 [ 13.479191] ? __pfx_kthread+0x10/0x10 [ 13.479210] ret_from_fork_asm+0x1a/0x30 [ 13.479240] </TASK> [ 13.479250] [ 13.489418] Allocated by task 281: [ 13.489641] kasan_save_stack+0x45/0x70 [ 13.489914] kasan_save_track+0x18/0x40 [ 13.490111] kasan_save_alloc_info+0x3b/0x50 [ 13.490265] __kasan_kmalloc+0xb7/0xc0 [ 13.490459] __kmalloc_cache_noprof+0x189/0x420 [ 13.490703] kasan_bitops_generic+0x92/0x1c0 [ 13.490926] kunit_try_run_case+0x1a5/0x480 [ 13.491341] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.491657] kthread+0x337/0x6f0 [ 13.491799] ret_from_fork+0x41/0x80 [ 13.492245] ret_from_fork_asm+0x1a/0x30 [ 13.492435] [ 13.492564] The buggy address belongs to the object at ffff888102171600 [ 13.492564] which belongs to the cache kmalloc-16 of size 16 [ 13.493106] The buggy address is located 8 bytes inside of [ 13.493106] allocated 9-byte region [ffff888102171600, ffff888102171609) [ 13.493634] [ 13.493737] The buggy address belongs to the physical page: [ 13.494079] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102171 [ 13.494386] flags: 0x200000000000000(node=0|zone=2) [ 13.494811] page_type: f5(slab) [ 13.495125] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.495466] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.495809] page dumped because: kasan: bad access detected [ 13.496149] [ 13.496250] Memory state around the buggy address: [ 13.496473] ffff888102171500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.496772] ffff888102171580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.497114] >ffff888102171600: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.497480] ^ [ 13.497680] ffff888102171680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.497901] ffff888102171700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.498227] ================================================================== [ 13.410439] ================================================================== [ 13.411705] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 13.412805] Write of size 8 at addr ffff888102171608 by task kunit_try_catch/281 [ 13.413541] [ 13.413931] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT(voluntary) [ 13.414090] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.414104] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.414140] Call Trace: [ 13.414161] <TASK> [ 13.414213] dump_stack_lvl+0x73/0xb0 [ 13.414246] print_report+0xd1/0x650 [ 13.414270] ? __virt_addr_valid+0x1db/0x2d0 [ 13.414294] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 13.414317] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.414340] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 13.414364] kasan_report+0x141/0x180 [ 13.414388] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 13.414415] kasan_check_range+0x10c/0x1c0 [ 13.414436] __kasan_check_write+0x18/0x20 [ 13.414457] kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 13.414481] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 13.414504] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.414527] ? trace_hardirqs_on+0x37/0xe0 [ 13.414550] ? kasan_bitops_generic+0x92/0x1c0 [ 13.414575] kasan_bitops_generic+0x116/0x1c0 [ 13.414596] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.414616] ? trace_hardirqs_on+0x37/0xe0 [ 13.414639] ? __pfx_read_tsc+0x10/0x10 [ 13.414660] ? ktime_get_ts64+0x86/0x230 [ 13.414684] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 13.414708] kunit_try_run_case+0x1a5/0x480 [ 13.414730] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.414751] ? queued_spin_lock_slowpath+0x116/0xb40 [ 13.414777] ? __kthread_parkme+0x82/0x180 [ 13.414800] ? preempt_count_sub+0x50/0x80 [ 13.414826] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.414847] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.414885] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.414911] kthread+0x337/0x6f0 [ 13.414928] ? trace_preempt_on+0x20/0xc0 [ 13.414951] ? __pfx_kthread+0x10/0x10 [ 13.414970] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.414993] ? calculate_sigpending+0x7b/0xa0 [ 13.415016] ? __pfx_kthread+0x10/0x10 [ 13.415035] ret_from_fork+0x41/0x80 [ 13.415056] ? __pfx_kthread+0x10/0x10 [ 13.415076] ret_from_fork_asm+0x1a/0x30 [ 13.415107] </TASK> [ 13.415119] [ 13.430321] Allocated by task 281: [ 13.430744] kasan_save_stack+0x45/0x70 [ 13.431254] kasan_save_track+0x18/0x40 [ 13.431667] kasan_save_alloc_info+0x3b/0x50 [ 13.432236] __kasan_kmalloc+0xb7/0xc0 [ 13.432638] __kmalloc_cache_noprof+0x189/0x420 [ 13.433200] kasan_bitops_generic+0x92/0x1c0 [ 13.433362] kunit_try_run_case+0x1a5/0x480 [ 13.433521] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.434049] kthread+0x337/0x6f0 [ 13.434428] ret_from_fork+0x41/0x80 [ 13.434849] ret_from_fork_asm+0x1a/0x30 [ 13.435291] [ 13.435454] The buggy address belongs to the object at ffff888102171600 [ 13.435454] which belongs to the cache kmalloc-16 of size 16 [ 13.436177] The buggy address is located 8 bytes inside of [ 13.436177] allocated 9-byte region [ffff888102171600, ffff888102171609) [ 13.436571] [ 13.436732] The buggy address belongs to the physical page: [ 13.437455] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102171 [ 13.438287] flags: 0x200000000000000(node=0|zone=2) [ 13.438832] page_type: f5(slab) [ 13.439236] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.440266] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.440611] page dumped because: kasan: bad access detected [ 13.441280] [ 13.441444] Memory state around the buggy address: [ 13.441940] ffff888102171500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.442267] ffff888102171580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.442486] >ffff888102171600: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.442829] ^ [ 13.443242] ffff888102171680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.443767] ffff888102171700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.444376] ================================================================== [ 13.520285] ================================================================== [ 13.520650] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50 [ 13.521019] Write of size 8 at addr ffff888102171608 by task kunit_try_catch/281 [ 13.521535] [ 13.521672] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT(voluntary) [ 13.521716] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.521729] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.521752] Call Trace: [ 13.521960] <TASK> [ 13.521987] dump_stack_lvl+0x73/0xb0 [ 13.522014] print_report+0xd1/0x650 [ 13.522038] ? __virt_addr_valid+0x1db/0x2d0 [ 13.522086] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 13.522109] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.522133] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 13.522166] kasan_report+0x141/0x180 [ 13.522190] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 13.522217] kasan_check_range+0x10c/0x1c0 [ 13.522249] __kasan_check_write+0x18/0x20 [ 13.522270] kasan_bitops_modify.constprop.0+0x547/0xd50 [ 13.522294] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 13.522318] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.522340] ? trace_hardirqs_on+0x37/0xe0 [ 13.522362] ? kasan_bitops_generic+0x92/0x1c0 [ 13.522387] kasan_bitops_generic+0x116/0x1c0 [ 13.522407] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.522428] ? trace_hardirqs_on+0x37/0xe0 [ 13.522451] ? __pfx_read_tsc+0x10/0x10 [ 13.522471] ? ktime_get_ts64+0x86/0x230 [ 13.522494] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 13.522531] kunit_try_run_case+0x1a5/0x480 [ 13.522555] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.522575] ? queued_spin_lock_slowpath+0x116/0xb40 [ 13.522601] ? __kthread_parkme+0x82/0x180 [ 13.522623] ? preempt_count_sub+0x50/0x80 [ 13.522649] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.522670] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.522693] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.522718] kthread+0x337/0x6f0 [ 13.522735] ? trace_preempt_on+0x20/0xc0 [ 13.522758] ? __pfx_kthread+0x10/0x10 [ 13.522777] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.522800] ? calculate_sigpending+0x7b/0xa0 [ 13.522822] ? __pfx_kthread+0x10/0x10 [ 13.522849] ret_from_fork+0x41/0x80 [ 13.522871] ? __pfx_kthread+0x10/0x10 [ 13.522907] ret_from_fork_asm+0x1a/0x30 [ 13.522937] </TASK> [ 13.522948] [ 13.531595] Allocated by task 281: [ 13.531787] kasan_save_stack+0x45/0x70 [ 13.532001] kasan_save_track+0x18/0x40 [ 13.532185] kasan_save_alloc_info+0x3b/0x50 [ 13.532383] __kasan_kmalloc+0xb7/0xc0 [ 13.532562] __kmalloc_cache_noprof+0x189/0x420 [ 13.532766] kasan_bitops_generic+0x92/0x1c0 [ 13.533162] kunit_try_run_case+0x1a5/0x480 [ 13.533399] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.533617] kthread+0x337/0x6f0 [ 13.533743] ret_from_fork+0x41/0x80 [ 13.533888] ret_from_fork_asm+0x1a/0x30 [ 13.534040] [ 13.534166] The buggy address belongs to the object at ffff888102171600 [ 13.534166] which belongs to the cache kmalloc-16 of size 16 [ 13.534734] The buggy address is located 8 bytes inside of [ 13.534734] allocated 9-byte region [ffff888102171600, ffff888102171609) [ 13.535264] [ 13.535343] The buggy address belongs to the physical page: [ 13.535541] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102171 [ 13.535907] flags: 0x200000000000000(node=0|zone=2) [ 13.536178] page_type: f5(slab) [ 13.536358] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.536755] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.537099] page dumped because: kasan: bad access detected [ 13.537343] [ 13.537462] Memory state around the buggy address: [ 13.537719] ffff888102171500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.538044] ffff888102171580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.538366] >ffff888102171600: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.538705] ^ [ 13.538894] ffff888102171680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.539167] ffff888102171700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.539464] ================================================================== [ 13.344030] ================================================================== [ 13.344403] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 13.344901] Write of size 8 at addr ffff888102171608 by task kunit_try_catch/281 [ 13.345161] [ 13.345250] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT(voluntary) [ 13.345293] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.345305] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.345327] Call Trace: [ 13.345339] <TASK> [ 13.345355] dump_stack_lvl+0x73/0xb0 [ 13.345380] print_report+0xd1/0x650 [ 13.345402] ? __virt_addr_valid+0x1db/0x2d0 [ 13.345425] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 13.345447] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.345470] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 13.345494] kasan_report+0x141/0x180 [ 13.345518] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 13.345545] kasan_check_range+0x10c/0x1c0 [ 13.345589] __kasan_check_write+0x18/0x20 [ 13.345610] kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 13.345634] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 13.345661] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.345684] ? trace_hardirqs_on+0x37/0xe0 [ 13.345707] ? kasan_bitops_generic+0x92/0x1c0 [ 13.345732] kasan_bitops_generic+0x116/0x1c0 [ 13.345753] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.345774] ? trace_hardirqs_on+0x37/0xe0 [ 13.345796] ? __pfx_read_tsc+0x10/0x10 [ 13.345817] ? ktime_get_ts64+0x86/0x230 [ 13.346008] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 13.346035] kunit_try_run_case+0x1a5/0x480 [ 13.346058] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.346080] ? queued_spin_lock_slowpath+0x116/0xb40 [ 13.346105] ? __kthread_parkme+0x82/0x180 [ 13.346127] ? preempt_count_sub+0x50/0x80 [ 13.346154] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.346175] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.346200] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.346224] kthread+0x337/0x6f0 [ 13.346241] ? trace_preempt_on+0x20/0xc0 [ 13.346264] ? __pfx_kthread+0x10/0x10 [ 13.346283] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.346306] ? calculate_sigpending+0x7b/0xa0 [ 13.346328] ? __pfx_kthread+0x10/0x10 [ 13.346347] ret_from_fork+0x41/0x80 [ 13.346368] ? __pfx_kthread+0x10/0x10 [ 13.346387] ret_from_fork_asm+0x1a/0x30 [ 13.346418] </TASK> [ 13.346428] [ 13.355114] Allocated by task 281: [ 13.355315] kasan_save_stack+0x45/0x70 [ 13.355512] kasan_save_track+0x18/0x40 [ 13.355702] kasan_save_alloc_info+0x3b/0x50 [ 13.356006] __kasan_kmalloc+0xb7/0xc0 [ 13.356175] __kmalloc_cache_noprof+0x189/0x420 [ 13.356357] kasan_bitops_generic+0x92/0x1c0 [ 13.356592] kunit_try_run_case+0x1a5/0x480 [ 13.356784] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.357128] kthread+0x337/0x6f0 [ 13.357276] ret_from_fork+0x41/0x80 [ 13.357441] ret_from_fork_asm+0x1a/0x30 [ 13.357668] [ 13.357747] The buggy address belongs to the object at ffff888102171600 [ 13.357747] which belongs to the cache kmalloc-16 of size 16 [ 13.358271] The buggy address is located 8 bytes inside of [ 13.358271] allocated 9-byte region [ffff888102171600, ffff888102171609) [ 13.358928] [ 13.359038] The buggy address belongs to the physical page: [ 13.359292] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102171 [ 13.359629] flags: 0x200000000000000(node=0|zone=2) [ 13.359800] page_type: f5(slab) [ 13.360064] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.360417] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.360792] page dumped because: kasan: bad access detected [ 13.361125] [ 13.361231] Memory state around the buggy address: [ 13.361416] ffff888102171500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.361740] ffff888102171580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.362126] >ffff888102171600: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.362458] ^ [ 13.362669] ffff888102171680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.363109] ffff888102171700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.363425] ================================================================== [ 13.445279] ================================================================== [ 13.445777] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50 [ 13.446497] Write of size 8 at addr ffff888102171608 by task kunit_try_catch/281 [ 13.447232] [ 13.447415] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT(voluntary) [ 13.447472] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.447493] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.447515] Call Trace: [ 13.447531] <TASK> [ 13.447548] dump_stack_lvl+0x73/0xb0 [ 13.447593] print_report+0xd1/0x650 [ 13.447617] ? __virt_addr_valid+0x1db/0x2d0 [ 13.447648] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 13.447671] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.447694] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 13.447717] kasan_report+0x141/0x180 [ 13.447740] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 13.447767] kasan_check_range+0x10c/0x1c0 [ 13.447789] __kasan_check_write+0x18/0x20 [ 13.447809] kasan_bitops_modify.constprop.0+0x373/0xd50 [ 13.447833] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 13.447883] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.447905] ? trace_hardirqs_on+0x37/0xe0 [ 13.447928] ? kasan_bitops_generic+0x92/0x1c0 [ 13.447953] kasan_bitops_generic+0x116/0x1c0 [ 13.447976] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.447996] ? trace_hardirqs_on+0x37/0xe0 [ 13.448020] ? __pfx_read_tsc+0x10/0x10 [ 13.448041] ? ktime_get_ts64+0x86/0x230 [ 13.448064] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 13.448088] kunit_try_run_case+0x1a5/0x480 [ 13.448110] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.448132] ? queued_spin_lock_slowpath+0x116/0xb40 [ 13.448158] ? __kthread_parkme+0x82/0x180 [ 13.448181] ? preempt_count_sub+0x50/0x80 [ 13.448207] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.448228] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.448252] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.448276] kthread+0x337/0x6f0 [ 13.448293] ? trace_preempt_on+0x20/0xc0 [ 13.448316] ? __pfx_kthread+0x10/0x10 [ 13.448334] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.448357] ? calculate_sigpending+0x7b/0xa0 [ 13.448379] ? __pfx_kthread+0x10/0x10 [ 13.448398] ret_from_fork+0x41/0x80 [ 13.448419] ? __pfx_kthread+0x10/0x10 [ 13.448437] ret_from_fork_asm+0x1a/0x30 [ 13.448468] </TASK> [ 13.448479] [ 13.463373] Allocated by task 281: [ 13.463531] kasan_save_stack+0x45/0x70 [ 13.463928] kasan_save_track+0x18/0x40 [ 13.464306] kasan_save_alloc_info+0x3b/0x50 [ 13.464817] __kasan_kmalloc+0xb7/0xc0 [ 13.465398] __kmalloc_cache_noprof+0x189/0x420 [ 13.465906] kasan_bitops_generic+0x92/0x1c0 [ 13.466368] kunit_try_run_case+0x1a5/0x480 [ 13.466807] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.467296] kthread+0x337/0x6f0 [ 13.467425] ret_from_fork+0x41/0x80 [ 13.467658] ret_from_fork_asm+0x1a/0x30 [ 13.468112] [ 13.468287] The buggy address belongs to the object at ffff888102171600 [ 13.468287] which belongs to the cache kmalloc-16 of size 16 [ 13.469491] The buggy address is located 8 bytes inside of [ 13.469491] allocated 9-byte region [ffff888102171600, ffff888102171609) [ 13.470157] [ 13.470237] The buggy address belongs to the physical page: [ 13.470412] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102171 [ 13.470673] flags: 0x200000000000000(node=0|zone=2) [ 13.471183] page_type: f5(slab) [ 13.471565] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.472094] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.472507] page dumped because: kasan: bad access detected [ 13.473180] [ 13.473360] Memory state around the buggy address: [ 13.473812] ffff888102171500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.474195] ffff888102171580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.474939] >ffff888102171600: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.475335] ^ [ 13.475743] ffff888102171680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.476068] ffff888102171700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.476285] ================================================================== [ 13.323714] ================================================================== [ 13.324294] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50 [ 13.324627] Write of size 8 at addr ffff888102171608 by task kunit_try_catch/281 [ 13.325001] [ 13.325106] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.6-rc1 #1 PREEMPT(voluntary) [ 13.325153] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.325166] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.325191] Call Trace: [ 13.325203] <TASK> [ 13.325219] dump_stack_lvl+0x73/0xb0 [ 13.325246] print_report+0xd1/0x650 [ 13.325270] ? __virt_addr_valid+0x1db/0x2d0 [ 13.325293] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 13.325317] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.325340] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 13.325363] kasan_report+0x141/0x180 [ 13.325387] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 13.325415] kasan_check_range+0x10c/0x1c0 [ 13.325436] __kasan_check_write+0x18/0x20 [ 13.325457] kasan_bitops_modify.constprop.0+0x101/0xd50 [ 13.325480] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 13.325504] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.325528] ? trace_hardirqs_on+0x37/0xe0 [ 13.325553] ? kasan_bitops_generic+0x92/0x1c0 [ 13.325578] kasan_bitops_generic+0x116/0x1c0 [ 13.325600] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.325620] ? trace_hardirqs_on+0x37/0xe0 [ 13.325643] ? __pfx_read_tsc+0x10/0x10 [ 13.325663] ? ktime_get_ts64+0x86/0x230 [ 13.325686] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 13.325730] kunit_try_run_case+0x1a5/0x480 [ 13.325752] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.325773] ? queued_spin_lock_slowpath+0x116/0xb40 [ 13.325810] ? __kthread_parkme+0x82/0x180 [ 13.325833] ? preempt_count_sub+0x50/0x80 [ 13.325860] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.325958] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.325988] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.326014] kthread+0x337/0x6f0 [ 13.326034] ? trace_preempt_on+0x20/0xc0 [ 13.326060] ? __pfx_kthread+0x10/0x10 [ 13.326080] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.326104] ? calculate_sigpending+0x7b/0xa0 [ 13.326127] ? __pfx_kthread+0x10/0x10 [ 13.326147] ret_from_fork+0x41/0x80 [ 13.326168] ? __pfx_kthread+0x10/0x10 [ 13.326188] ret_from_fork_asm+0x1a/0x30 [ 13.326219] </TASK> [ 13.326230] [ 13.334854] Allocated by task 281: [ 13.335204] kasan_save_stack+0x45/0x70 [ 13.335429] kasan_save_track+0x18/0x40 [ 13.335633] kasan_save_alloc_info+0x3b/0x50 [ 13.335937] __kasan_kmalloc+0xb7/0xc0 [ 13.336294] __kmalloc_cache_noprof+0x189/0x420 [ 13.336456] kasan_bitops_generic+0x92/0x1c0 [ 13.336603] kunit_try_run_case+0x1a5/0x480 [ 13.336996] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.337275] kthread+0x337/0x6f0 [ 13.337447] ret_from_fork+0x41/0x80 [ 13.337770] ret_from_fork_asm+0x1a/0x30 [ 13.338017] [ 13.338125] The buggy address belongs to the object at ffff888102171600 [ 13.338125] which belongs to the cache kmalloc-16 of size 16 [ 13.338615] The buggy address is located 8 bytes inside of [ 13.338615] allocated 9-byte region [ffff888102171600, ffff888102171609) [ 13.339151] [ 13.339231] The buggy address belongs to the physical page: [ 13.339432] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102171 [ 13.339795] flags: 0x200000000000000(node=0|zone=2) [ 13.340069] page_type: f5(slab) [ 13.340244] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.340478] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.340706] page dumped because: kasan: bad access detected [ 13.340917] [ 13.341015] Memory state around the buggy address: [ 13.341246] ffff888102171500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.341576] ffff888102171580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.342089] >ffff888102171600: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.342423] ^ [ 13.342626] ffff888102171680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.343020] ffff888102171700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.343326] ==================================================================