Date
July 15, 2025, 2:09 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 20.175159] ================================================================== [ 20.175353] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc0 [ 20.175430] Write of size 8 at addr fff00000c45d8b88 by task kunit_try_catch/263 [ 20.175492] [ 20.175617] CPU: 0 UID: 0 PID: 263 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 20.175706] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.175745] Hardware name: linux,dummy-virt (DT) [ 20.175842] Call trace: [ 20.175869] show_stack+0x20/0x38 (C) [ 20.175919] dump_stack_lvl+0x8c/0xd0 [ 20.176144] print_report+0x118/0x5d0 [ 20.176232] kasan_report+0xdc/0x128 [ 20.176437] kasan_check_range+0x100/0x1a8 [ 20.176505] __kasan_check_write+0x20/0x30 [ 20.176570] kasan_bitops_modify.constprop.0+0x1dc/0xbc0 [ 20.176741] kasan_bitops_generic+0x110/0x1c8 [ 20.176789] kunit_try_run_case+0x170/0x3f0 [ 20.176841] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.177147] kthread+0x328/0x630 [ 20.177605] ret_from_fork+0x10/0x20 [ 20.177920] [ 20.177991] Allocated by task 263: [ 20.178057] kasan_save_stack+0x3c/0x68 [ 20.178234] kasan_save_track+0x20/0x40 [ 20.178410] kasan_save_alloc_info+0x40/0x58 [ 20.178512] __kasan_kmalloc+0xd4/0xd8 [ 20.178580] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.178623] kasan_bitops_generic+0xa0/0x1c8 [ 20.178984] kunit_try_run_case+0x170/0x3f0 [ 20.179232] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.179610] kthread+0x328/0x630 [ 20.179738] ret_from_fork+0x10/0x20 [ 20.179845] [ 20.179969] The buggy address belongs to the object at fff00000c45d8b80 [ 20.179969] which belongs to the cache kmalloc-16 of size 16 [ 20.180161] The buggy address is located 8 bytes inside of [ 20.180161] allocated 9-byte region [fff00000c45d8b80, fff00000c45d8b89) [ 20.180328] [ 20.180370] The buggy address belongs to the physical page: [ 20.180447] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1045d8 [ 20.180579] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.180640] page_type: f5(slab) [ 20.180892] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 20.181339] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 20.181405] page dumped because: kasan: bad access detected [ 20.181526] [ 20.181574] Memory state around the buggy address: [ 20.181667] fff00000c45d8a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 20.181763] fff00000c45d8b00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 20.181829] >fff00000c45d8b80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.181948] ^ [ 20.182006] fff00000c45d8c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.182099] fff00000c45d8c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.182143] ================================================================== [ 20.202661] ================================================================== [ 20.202714] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaec/0xbc0 [ 20.202786] Read of size 8 at addr fff00000c45d8b88 by task kunit_try_catch/263 [ 20.203277] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.203610] print_report+0x118/0x5d0 [ 20.204095] kasan_bitops_generic+0x110/0x1c8 [ 20.204810] kasan_save_stack+0x3c/0x68 [ 20.205607] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.205990] The buggy address is located 8 bytes inside of [ 20.205990] allocated 9-byte region [fff00000c45d8b80, fff00000c45d8b89) [ 20.206925] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 20.207015] page dumped because: kasan: bad access detected [ 20.207530] fff00000c45d8b00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 20.207919] ^ [ 20.208072] fff00000c45d8c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.208246] fff00000c45d8c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.210111] ================================================================== [ 20.190003] ================================================================== [ 20.190058] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc0 [ 20.190111] Write of size 8 at addr fff00000c45d8b88 by task kunit_try_catch/263 [ 20.190166] [ 20.190196] CPU: 0 UID: 0 PID: 263 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 20.190296] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.190693] Hardware name: linux,dummy-virt (DT) [ 20.190746] Call trace: [ 20.190809] show_stack+0x20/0x38 (C) [ 20.190929] dump_stack_lvl+0x8c/0xd0 [ 20.190982] print_report+0x118/0x5d0 [ 20.191130] kasan_report+0xdc/0x128 [ 20.191189] kasan_check_range+0x100/0x1a8 [ 20.191250] __kasan_check_write+0x20/0x30 [ 20.191583] kasan_bitops_modify.constprop.0+0x2b4/0xbc0 [ 20.191651] kasan_bitops_generic+0x110/0x1c8 [ 20.191703] kunit_try_run_case+0x170/0x3f0 [ 20.191763] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.191847] kthread+0x328/0x630 [ 20.191912] ret_from_fork+0x10/0x20 [ 20.191979] [ 20.192054] Allocated by task 263: [ 20.192092] kasan_save_stack+0x3c/0x68 [ 20.192136] kasan_save_track+0x20/0x40 [ 20.192330] kasan_save_alloc_info+0x40/0x58 [ 20.192391] __kasan_kmalloc+0xd4/0xd8 [ 20.192428] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.192718] kasan_bitops_generic+0xa0/0x1c8 [ 20.192857] kunit_try_run_case+0x170/0x3f0 [ 20.192922] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.192989] kthread+0x328/0x630 [ 20.193035] ret_from_fork+0x10/0x20 [ 20.193291] [ 20.193329] The buggy address belongs to the object at fff00000c45d8b80 [ 20.193329] which belongs to the cache kmalloc-16 of size 16 [ 20.193593] The buggy address is located 8 bytes inside of [ 20.193593] allocated 9-byte region [fff00000c45d8b80, fff00000c45d8b89) [ 20.193721] [ 20.193779] The buggy address belongs to the physical page: [ 20.193878] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1045d8 [ 20.193962] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.194162] page_type: f5(slab) [ 20.194219] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 20.194482] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 20.194558] page dumped because: kasan: bad access detected [ 20.194736] [ 20.194895] Memory state around the buggy address: [ 20.194985] fff00000c45d8a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 20.195112] fff00000c45d8b00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 20.195183] >fff00000c45d8b80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.195304] ^ [ 20.196517] fff00000c45d8c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.196574] fff00000c45d8c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.197136] ================================================================== [ 20.160029] ================================================================== [ 20.160091] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 20.160146] Write of size 8 at addr fff00000c45d8b88 by task kunit_try_catch/263 [ 20.160200] [ 20.160252] CPU: 0 UID: 0 PID: 263 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 20.160430] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.160477] Hardware name: linux,dummy-virt (DT) [ 20.160511] Call trace: [ 20.160536] show_stack+0x20/0x38 (C) [ 20.160853] dump_stack_lvl+0x8c/0xd0 [ 20.161312] print_report+0x118/0x5d0 [ 20.161397] kasan_report+0xdc/0x128 [ 20.161778] kasan_check_range+0x100/0x1a8 [ 20.161879] __kasan_check_write+0x20/0x30 [ 20.161955] kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 20.162388] kasan_bitops_generic+0x110/0x1c8 [ 20.162570] kunit_try_run_case+0x170/0x3f0 [ 20.162648] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.162789] kthread+0x328/0x630 [ 20.162873] ret_from_fork+0x10/0x20 [ 20.163339] [ 20.163415] Allocated by task 263: [ 20.163539] kasan_save_stack+0x3c/0x68 [ 20.163612] kasan_save_track+0x20/0x40 [ 20.163654] kasan_save_alloc_info+0x40/0x58 [ 20.163986] __kasan_kmalloc+0xd4/0xd8 [ 20.164063] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.164222] kasan_bitops_generic+0xa0/0x1c8 [ 20.164283] kunit_try_run_case+0x170/0x3f0 [ 20.164415] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.164738] kthread+0x328/0x630 [ 20.164838] ret_from_fork+0x10/0x20 [ 20.164878] [ 20.164900] The buggy address belongs to the object at fff00000c45d8b80 [ 20.164900] which belongs to the cache kmalloc-16 of size 16 [ 20.164964] The buggy address is located 8 bytes inside of [ 20.164964] allocated 9-byte region [fff00000c45d8b80, fff00000c45d8b89) [ 20.165053] [ 20.165075] The buggy address belongs to the physical page: [ 20.165112] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1045d8 [ 20.165176] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.165241] page_type: f5(slab) [ 20.165295] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 20.165689] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 20.165747] page dumped because: kasan: bad access detected [ 20.165782] [ 20.165936] Memory state around the buggy address: [ 20.166134] fff00000c45d8a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 20.166305] fff00000c45d8b00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 20.166385] >fff00000c45d8b80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.166509] ^ [ 20.166556] fff00000c45d8c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.166611] fff00000c45d8c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.166756] ================================================================== [ 20.167960] ================================================================== [ 20.168183] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 20.168427] Read of size 8 at addr fff00000c45d8b88 by task kunit_try_catch/263 [ 20.168482] [ 20.168678] CPU: 0 UID: 0 PID: 263 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 20.168775] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.168824] Hardware name: linux,dummy-virt (DT) [ 20.168883] Call trace: [ 20.168909] show_stack+0x20/0x38 (C) [ 20.168964] dump_stack_lvl+0x8c/0xd0 [ 20.169378] print_report+0x118/0x5d0 [ 20.169496] kasan_report+0xdc/0x128 [ 20.169575] __asan_report_load8_noabort+0x20/0x30 [ 20.169718] kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 20.169795] kasan_bitops_generic+0x110/0x1c8 [ 20.169984] kunit_try_run_case+0x170/0x3f0 [ 20.170060] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.170119] kthread+0x328/0x630 [ 20.170486] ret_from_fork+0x10/0x20 [ 20.170576] [ 20.170685] Allocated by task 263: [ 20.170767] kasan_save_stack+0x3c/0x68 [ 20.170871] kasan_save_track+0x20/0x40 [ 20.170912] kasan_save_alloc_info+0x40/0x58 [ 20.170953] __kasan_kmalloc+0xd4/0xd8 [ 20.170990] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.171029] kasan_bitops_generic+0xa0/0x1c8 [ 20.171079] kunit_try_run_case+0x170/0x3f0 [ 20.171129] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.171188] kthread+0x328/0x630 [ 20.171238] ret_from_fork+0x10/0x20 [ 20.171287] [ 20.171332] The buggy address belongs to the object at fff00000c45d8b80 [ 20.171332] which belongs to the cache kmalloc-16 of size 16 [ 20.171431] The buggy address is located 8 bytes inside of [ 20.171431] allocated 9-byte region [fff00000c45d8b80, fff00000c45d8b89) [ 20.171499] [ 20.171529] The buggy address belongs to the physical page: [ 20.171569] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1045d8 [ 20.171624] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.171684] page_type: f5(slab) [ 20.171724] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 20.171780] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 20.171835] page dumped because: kasan: bad access detected [ 20.171869] [ 20.171890] Memory state around the buggy address: [ 20.171934] fff00000c45d8a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 20.171989] fff00000c45d8b00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 20.172045] >fff00000c45d8b80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.172097] ^ [ 20.172128] fff00000c45d8c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.172173] fff00000c45d8c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.172250] ================================================================== [ 20.183876] ================================================================== [ 20.183941] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbc0 [ 20.184304] Read of size 8 at addr fff00000c45d8b88 by task kunit_try_catch/263 [ 20.184375] [ 20.184425] CPU: 0 UID: 0 PID: 263 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 20.184517] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.184659] Hardware name: linux,dummy-virt (DT) [ 20.184787] Call trace: [ 20.184906] show_stack+0x20/0x38 (C) [ 20.184966] dump_stack_lvl+0x8c/0xd0 [ 20.185050] print_report+0x118/0x5d0 [ 20.185100] kasan_report+0xdc/0x128 [ 20.185148] __asan_report_load8_noabort+0x20/0x30 [ 20.185223] kasan_bitops_modify.constprop.0+0xa80/0xbc0 [ 20.185278] kasan_bitops_generic+0x110/0x1c8 [ 20.185325] kunit_try_run_case+0x170/0x3f0 [ 20.185386] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.185451] kthread+0x328/0x630 [ 20.185497] ret_from_fork+0x10/0x20 [ 20.185548] [ 20.185569] Allocated by task 263: [ 20.185598] kasan_save_stack+0x3c/0x68 [ 20.185648] kasan_save_track+0x20/0x40 [ 20.185686] kasan_save_alloc_info+0x40/0x58 [ 20.185727] __kasan_kmalloc+0xd4/0xd8 [ 20.185770] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.185809] kasan_bitops_generic+0xa0/0x1c8 [ 20.185854] kunit_try_run_case+0x170/0x3f0 [ 20.185905] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.185951] kthread+0x328/0x630 [ 20.185997] ret_from_fork+0x10/0x20 [ 20.186046] [ 20.186069] The buggy address belongs to the object at fff00000c45d8b80 [ 20.186069] which belongs to the cache kmalloc-16 of size 16 [ 20.186140] The buggy address is located 8 bytes inside of [ 20.186140] allocated 9-byte region [fff00000c45d8b80, fff00000c45d8b89) [ 20.186405] [ 20.186818] The buggy address belongs to the physical page: [ 20.186864] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1045d8 [ 20.186921] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.187201] page_type: f5(slab) [ 20.187609] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 20.187674] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 20.188016] page dumped because: kasan: bad access detected [ 20.188134] [ 20.188174] Memory state around the buggy address: [ 20.188288] fff00000c45d8a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 20.188601] fff00000c45d8b00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 20.188776] >fff00000c45d8b80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.188851] ^ [ 20.188966] fff00000c45d8c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.189036] fff00000c45d8c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.189314] ================================================================== [ 20.198253] ================================================================== [ 20.198337] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc0 [ 20.198472] Write of size 8 at addr fff00000c45d8b88 by task kunit_try_catch/263 [ 20.198531] [ 20.198564] CPU: 0 UID: 0 PID: 263 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 20.198690] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.198721] Hardware name: linux,dummy-virt (DT) [ 20.198752] Call trace: [ 20.198788] show_stack+0x20/0x38 (C) [ 20.198840] dump_stack_lvl+0x8c/0xd0 [ 20.198891] print_report+0x118/0x5d0 [ 20.198943] kasan_report+0xdc/0x128 [ 20.199001] kasan_check_range+0x100/0x1a8 [ 20.199061] __kasan_check_write+0x20/0x30 [ 20.199111] kasan_bitops_modify.constprop.0+0x320/0xbc0 [ 20.199172] kasan_bitops_generic+0x110/0x1c8 [ 20.199232] kunit_try_run_case+0x170/0x3f0 [ 20.199282] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.199353] kthread+0x328/0x630 [ 20.199430] ret_from_fork+0x10/0x20 [ 20.199482] [ 20.199502] Allocated by task 263: [ 20.199531] kasan_save_stack+0x3c/0x68 [ 20.199570] kasan_save_track+0x20/0x40 [ 20.199609] kasan_save_alloc_info+0x40/0x58 [ 20.199649] __kasan_kmalloc+0xd4/0xd8 [ 20.199685] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.199735] kasan_bitops_generic+0xa0/0x1c8 [ 20.199787] kunit_try_run_case+0x170/0x3f0 [ 20.199830] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.199877] kthread+0x328/0x630 [ 20.199918] ret_from_fork+0x10/0x20 [ 20.199957] [ 20.199978] The buggy address belongs to the object at fff00000c45d8b80 [ 20.199978] which belongs to the cache kmalloc-16 of size 16 [ 20.200038] The buggy address is located 8 bytes inside of [ 20.200038] allocated 9-byte region [fff00000c45d8b80, fff00000c45d8b89) [ 20.200102] [ 20.200138] The buggy address belongs to the physical page: [ 20.200173] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1045d8 [ 20.200240] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.200541] page_type: f5(slab) [ 20.200601] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 20.200657] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 20.200702] page dumped because: kasan: bad access detected [ 20.200737] [ 20.201373] Memory state around the buggy address: [ 20.201440] fff00000c45d8a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 20.201524] fff00000c45d8b00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 20.201756] >fff00000c45d8b80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.201805] ^ [ 20.201976] fff00000c45d8c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.202060] fff00000c45d8c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.202188] ==================================================================
[ 13.131897] ================================================================== [ 13.132282] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 13.132663] Write of size 8 at addr ffff8881027e74e8 by task kunit_try_catch/280 [ 13.133063] [ 13.133175] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT(voluntary) [ 13.133246] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.133256] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.133276] Call Trace: [ 13.133288] <TASK> [ 13.133315] dump_stack_lvl+0x73/0xb0 [ 13.133352] print_report+0xd1/0x610 [ 13.133386] ? __virt_addr_valid+0x1db/0x2d0 [ 13.133406] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 13.133426] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.133447] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 13.133468] kasan_report+0x141/0x180 [ 13.133490] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 13.133516] kasan_check_range+0x10c/0x1c0 [ 13.133535] __kasan_check_write+0x18/0x20 [ 13.133554] kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 13.133576] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 13.133598] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.133618] ? trace_hardirqs_on+0x37/0xe0 [ 13.133638] ? kasan_bitops_generic+0x92/0x1c0 [ 13.133662] kasan_bitops_generic+0x116/0x1c0 [ 13.133681] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.133702] ? __pfx_read_tsc+0x10/0x10 [ 13.133720] ? ktime_get_ts64+0x86/0x230 [ 13.133743] kunit_try_run_case+0x1a5/0x480 [ 13.133763] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.133781] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.133827] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.133850] ? __kthread_parkme+0x82/0x180 [ 13.133871] ? preempt_count_sub+0x50/0x80 [ 13.133903] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.133922] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.133944] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.133967] kthread+0x337/0x6f0 [ 13.133982] ? trace_preempt_on+0x20/0xc0 [ 13.134003] ? __pfx_kthread+0x10/0x10 [ 13.134021] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.134041] ? calculate_sigpending+0x7b/0xa0 [ 13.134060] ? __pfx_kthread+0x10/0x10 [ 13.134079] ret_from_fork+0x41/0x80 [ 13.134098] ? __pfx_kthread+0x10/0x10 [ 13.134115] ret_from_fork_asm+0x1a/0x30 [ 13.134145] </TASK> [ 13.134155] [ 13.142219] Allocated by task 280: [ 13.142412] kasan_save_stack+0x45/0x70 [ 13.142625] kasan_save_track+0x18/0x40 [ 13.142867] kasan_save_alloc_info+0x3b/0x50 [ 13.143084] __kasan_kmalloc+0xb7/0xc0 [ 13.143286] __kmalloc_cache_noprof+0x189/0x420 [ 13.143446] kasan_bitops_generic+0x92/0x1c0 [ 13.143636] kunit_try_run_case+0x1a5/0x480 [ 13.143897] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.144132] kthread+0x337/0x6f0 [ 13.144292] ret_from_fork+0x41/0x80 [ 13.144472] ret_from_fork_asm+0x1a/0x30 [ 13.144667] [ 13.144754] The buggy address belongs to the object at ffff8881027e74e0 [ 13.144754] which belongs to the cache kmalloc-16 of size 16 [ 13.145303] The buggy address is located 8 bytes inside of [ 13.145303] allocated 9-byte region [ffff8881027e74e0, ffff8881027e74e9) [ 13.145774] [ 13.145920] The buggy address belongs to the physical page: [ 13.146146] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027e7 [ 13.146491] flags: 0x200000000000000(node=0|zone=2) [ 13.146688] page_type: f5(slab) [ 13.146894] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.147212] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.147525] page dumped because: kasan: bad access detected [ 13.147769] [ 13.147889] Memory state around the buggy address: [ 13.148149] ffff8881027e7380: 00 04 fc fc 00 04 fc fc 00 01 fc fc 00 01 fc fc [ 13.148517] ffff8881027e7400: 00 04 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 13.148910] >ffff8881027e7480: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 13.149238] ^ [ 13.149527] ffff8881027e7500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.149856] ffff8881027e7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.150119] ================================================================== [ 13.094537] ================================================================== [ 13.094961] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50 [ 13.095280] Write of size 8 at addr ffff8881027e74e8 by task kunit_try_catch/280 [ 13.095567] [ 13.095691] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT(voluntary) [ 13.095734] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.095745] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.095782] Call Trace: [ 13.095814] <TASK> [ 13.095845] dump_stack_lvl+0x73/0xb0 [ 13.095869] print_report+0xd1/0x610 [ 13.095901] ? __virt_addr_valid+0x1db/0x2d0 [ 13.095921] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 13.095942] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.095964] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 13.095985] kasan_report+0x141/0x180 [ 13.096007] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 13.096033] kasan_check_range+0x10c/0x1c0 [ 13.096053] __kasan_check_write+0x18/0x20 [ 13.096090] kasan_bitops_modify.constprop.0+0x373/0xd50 [ 13.096112] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 13.096135] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.096155] ? trace_hardirqs_on+0x37/0xe0 [ 13.096193] ? kasan_bitops_generic+0x92/0x1c0 [ 13.096216] kasan_bitops_generic+0x116/0x1c0 [ 13.096235] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.096256] ? __pfx_read_tsc+0x10/0x10 [ 13.096274] ? ktime_get_ts64+0x86/0x230 [ 13.096298] kunit_try_run_case+0x1a5/0x480 [ 13.096318] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.096335] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.096359] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.096381] ? __kthread_parkme+0x82/0x180 [ 13.096420] ? preempt_count_sub+0x50/0x80 [ 13.096445] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.096464] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.096486] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.096509] kthread+0x337/0x6f0 [ 13.096524] ? trace_preempt_on+0x20/0xc0 [ 13.096546] ? __pfx_kthread+0x10/0x10 [ 13.096581] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.096602] ? calculate_sigpending+0x7b/0xa0 [ 13.096622] ? __pfx_kthread+0x10/0x10 [ 13.096639] ret_from_fork+0x41/0x80 [ 13.096675] ? __pfx_kthread+0x10/0x10 [ 13.096692] ret_from_fork_asm+0x1a/0x30 [ 13.096722] </TASK> [ 13.096731] [ 13.105047] Allocated by task 280: [ 13.105234] kasan_save_stack+0x45/0x70 [ 13.105389] kasan_save_track+0x18/0x40 [ 13.105567] kasan_save_alloc_info+0x3b/0x50 [ 13.105735] __kasan_kmalloc+0xb7/0xc0 [ 13.105961] __kmalloc_cache_noprof+0x189/0x420 [ 13.106160] kasan_bitops_generic+0x92/0x1c0 [ 13.106303] kunit_try_run_case+0x1a5/0x480 [ 13.106472] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.106749] kthread+0x337/0x6f0 [ 13.106948] ret_from_fork+0x41/0x80 [ 13.107158] ret_from_fork_asm+0x1a/0x30 [ 13.107370] [ 13.107454] The buggy address belongs to the object at ffff8881027e74e0 [ 13.107454] which belongs to the cache kmalloc-16 of size 16 [ 13.108066] The buggy address is located 8 bytes inside of [ 13.108066] allocated 9-byte region [ffff8881027e74e0, ffff8881027e74e9) [ 13.108575] [ 13.108664] The buggy address belongs to the physical page: [ 13.108873] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027e7 [ 13.109119] flags: 0x200000000000000(node=0|zone=2) [ 13.109395] page_type: f5(slab) [ 13.109559] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.109958] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.110292] page dumped because: kasan: bad access detected [ 13.110559] [ 13.110635] Memory state around the buggy address: [ 13.110871] ffff8881027e7380: 00 04 fc fc 00 04 fc fc 00 01 fc fc 00 01 fc fc [ 13.111179] ffff8881027e7400: 00 04 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 13.111472] >ffff8881027e7480: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 13.111763] ^ [ 13.112072] ffff8881027e7500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.112401] ffff8881027e7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.112708] ================================================================== [ 13.113367] ================================================================== [ 13.113739] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 13.114140] Write of size 8 at addr ffff8881027e74e8 by task kunit_try_catch/280 [ 13.114450] [ 13.114531] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT(voluntary) [ 13.114591] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.114603] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.114622] Call Trace: [ 13.114635] <TASK> [ 13.114648] dump_stack_lvl+0x73/0xb0 [ 13.114671] print_report+0xd1/0x610 [ 13.114692] ? __virt_addr_valid+0x1db/0x2d0 [ 13.114712] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 13.114733] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.114772] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 13.114811] kasan_report+0x141/0x180 [ 13.114833] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 13.114859] kasan_check_range+0x10c/0x1c0 [ 13.114887] __kasan_check_write+0x18/0x20 [ 13.114906] kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 13.114927] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 13.114966] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.114986] ? trace_hardirqs_on+0x37/0xe0 [ 13.115007] ? kasan_bitops_generic+0x92/0x1c0 [ 13.115030] kasan_bitops_generic+0x116/0x1c0 [ 13.115050] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.115070] ? __pfx_read_tsc+0x10/0x10 [ 13.115088] ? ktime_get_ts64+0x86/0x230 [ 13.115128] kunit_try_run_case+0x1a5/0x480 [ 13.115149] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.115169] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.115191] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.115214] ? __kthread_parkme+0x82/0x180 [ 13.115235] ? preempt_count_sub+0x50/0x80 [ 13.115258] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.115294] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.115317] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.115339] kthread+0x337/0x6f0 [ 13.115354] ? trace_preempt_on+0x20/0xc0 [ 13.115376] ? __pfx_kthread+0x10/0x10 [ 13.115408] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.115429] ? calculate_sigpending+0x7b/0xa0 [ 13.115449] ? __pfx_kthread+0x10/0x10 [ 13.115467] ret_from_fork+0x41/0x80 [ 13.115486] ? __pfx_kthread+0x10/0x10 [ 13.115503] ret_from_fork_asm+0x1a/0x30 [ 13.115629] </TASK> [ 13.115640] [ 13.123569] Allocated by task 280: [ 13.123750] kasan_save_stack+0x45/0x70 [ 13.124015] kasan_save_track+0x18/0x40 [ 13.124230] kasan_save_alloc_info+0x3b/0x50 [ 13.124434] __kasan_kmalloc+0xb7/0xc0 [ 13.124602] __kmalloc_cache_noprof+0x189/0x420 [ 13.124852] kasan_bitops_generic+0x92/0x1c0 [ 13.125012] kunit_try_run_case+0x1a5/0x480 [ 13.125159] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.125331] kthread+0x337/0x6f0 [ 13.125447] ret_from_fork+0x41/0x80 [ 13.125574] ret_from_fork_asm+0x1a/0x30 [ 13.125710] [ 13.125779] The buggy address belongs to the object at ffff8881027e74e0 [ 13.125779] which belongs to the cache kmalloc-16 of size 16 [ 13.126331] The buggy address is located 8 bytes inside of [ 13.126331] allocated 9-byte region [ffff8881027e74e0, ffff8881027e74e9) [ 13.126978] [ 13.127103] The buggy address belongs to the physical page: [ 13.127388] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027e7 [ 13.127761] flags: 0x200000000000000(node=0|zone=2) [ 13.128131] page_type: f5(slab) [ 13.128322] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.128705] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.129061] page dumped because: kasan: bad access detected [ 13.129307] [ 13.129393] Memory state around the buggy address: [ 13.129596] ffff8881027e7380: 00 04 fc fc 00 04 fc fc 00 01 fc fc 00 01 fc fc [ 13.129835] ffff8881027e7400: 00 04 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 13.130158] >ffff8881027e7480: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 13.130528] ^ [ 13.130876] ffff8881027e7500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.131189] ffff8881027e7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.131482] ================================================================== [ 13.056037] ================================================================== [ 13.056341] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 13.056627] Write of size 8 at addr ffff8881027e74e8 by task kunit_try_catch/280 [ 13.057227] [ 13.057435] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT(voluntary) [ 13.057479] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.057490] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.057509] Call Trace: [ 13.057520] <TASK> [ 13.057532] dump_stack_lvl+0x73/0xb0 [ 13.057579] print_report+0xd1/0x610 [ 13.057602] ? __virt_addr_valid+0x1db/0x2d0 [ 13.057622] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 13.057642] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.057665] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 13.057697] kasan_report+0x141/0x180 [ 13.057719] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 13.057745] kasan_check_range+0x10c/0x1c0 [ 13.057765] __kasan_check_write+0x18/0x20 [ 13.057802] kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 13.057823] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 13.057846] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.057867] ? trace_hardirqs_on+0x37/0xe0 [ 13.057902] ? kasan_bitops_generic+0x92/0x1c0 [ 13.057926] kasan_bitops_generic+0x116/0x1c0 [ 13.057946] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.057967] ? __pfx_read_tsc+0x10/0x10 [ 13.057986] ? ktime_get_ts64+0x86/0x230 [ 13.058010] kunit_try_run_case+0x1a5/0x480 [ 13.058032] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.058050] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.058074] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.058097] ? __kthread_parkme+0x82/0x180 [ 13.058120] ? preempt_count_sub+0x50/0x80 [ 13.058161] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.058180] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.058202] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.058225] kthread+0x337/0x6f0 [ 13.058242] ? trace_preempt_on+0x20/0xc0 [ 13.058262] ? __pfx_kthread+0x10/0x10 [ 13.058280] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.058300] ? calculate_sigpending+0x7b/0xa0 [ 13.058336] ? __pfx_kthread+0x10/0x10 [ 13.058354] ret_from_fork+0x41/0x80 [ 13.058373] ? __pfx_kthread+0x10/0x10 [ 13.058390] ret_from_fork_asm+0x1a/0x30 [ 13.058420] </TASK> [ 13.058429] [ 13.067030] Allocated by task 280: [ 13.067219] kasan_save_stack+0x45/0x70 [ 13.067423] kasan_save_track+0x18/0x40 [ 13.067629] kasan_save_alloc_info+0x3b/0x50 [ 13.067814] __kasan_kmalloc+0xb7/0xc0 [ 13.067989] __kmalloc_cache_noprof+0x189/0x420 [ 13.068168] kasan_bitops_generic+0x92/0x1c0 [ 13.068356] kunit_try_run_case+0x1a5/0x480 [ 13.068552] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.068771] kthread+0x337/0x6f0 [ 13.069009] ret_from_fork+0x41/0x80 [ 13.069146] ret_from_fork_asm+0x1a/0x30 [ 13.069317] [ 13.069432] The buggy address belongs to the object at ffff8881027e74e0 [ 13.069432] which belongs to the cache kmalloc-16 of size 16 [ 13.070025] The buggy address is located 8 bytes inside of [ 13.070025] allocated 9-byte region [ffff8881027e74e0, ffff8881027e74e9) [ 13.070493] [ 13.070579] The buggy address belongs to the physical page: [ 13.070830] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027e7 [ 13.071182] flags: 0x200000000000000(node=0|zone=2) [ 13.071404] page_type: f5(slab) [ 13.071541] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.071939] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.072222] page dumped because: kasan: bad access detected [ 13.072482] [ 13.072578] Memory state around the buggy address: [ 13.072750] ffff8881027e7380: 00 04 fc fc 00 04 fc fc 00 01 fc fc 00 01 fc fc [ 13.073173] ffff8881027e7400: 00 04 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 13.073387] >ffff8881027e7480: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 13.073598] ^ [ 13.073797] ffff8881027e7500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.074124] ffff8881027e7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.074455] ================================================================== [ 13.151046] ================================================================== [ 13.151396] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50 [ 13.151763] Write of size 8 at addr ffff8881027e74e8 by task kunit_try_catch/280 [ 13.152290] [ 13.152399] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT(voluntary) [ 13.152441] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.152451] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.152469] Call Trace: [ 13.152481] <TASK> [ 13.152493] dump_stack_lvl+0x73/0xb0 [ 13.152541] print_report+0xd1/0x610 [ 13.152562] ? __virt_addr_valid+0x1db/0x2d0 [ 13.152582] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 13.152603] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.152624] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 13.152645] kasan_report+0x141/0x180 [ 13.152667] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 13.152710] kasan_check_range+0x10c/0x1c0 [ 13.152730] __kasan_check_write+0x18/0x20 [ 13.152749] kasan_bitops_modify.constprop.0+0x547/0xd50 [ 13.152771] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 13.152792] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.152834] ? trace_hardirqs_on+0x37/0xe0 [ 13.152873] ? kasan_bitops_generic+0x92/0x1c0 [ 13.152905] kasan_bitops_generic+0x116/0x1c0 [ 13.152925] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.152946] ? __pfx_read_tsc+0x10/0x10 [ 13.152964] ? ktime_get_ts64+0x86/0x230 [ 13.152987] kunit_try_run_case+0x1a5/0x480 [ 13.153006] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.153025] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.153047] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.153089] ? __kthread_parkme+0x82/0x180 [ 13.153111] ? preempt_count_sub+0x50/0x80 [ 13.153139] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.153159] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.153181] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.153204] kthread+0x337/0x6f0 [ 13.153219] ? trace_preempt_on+0x20/0xc0 [ 13.153241] ? __pfx_kthread+0x10/0x10 [ 13.153276] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.153298] ? calculate_sigpending+0x7b/0xa0 [ 13.153319] ? __pfx_kthread+0x10/0x10 [ 13.153337] ret_from_fork+0x41/0x80 [ 13.153356] ? __pfx_kthread+0x10/0x10 [ 13.153373] ret_from_fork_asm+0x1a/0x30 [ 13.153403] </TASK> [ 13.153412] [ 13.161643] Allocated by task 280: [ 13.161871] kasan_save_stack+0x45/0x70 [ 13.162075] kasan_save_track+0x18/0x40 [ 13.162259] kasan_save_alloc_info+0x3b/0x50 [ 13.162480] __kasan_kmalloc+0xb7/0xc0 [ 13.162667] __kmalloc_cache_noprof+0x189/0x420 [ 13.162913] kasan_bitops_generic+0x92/0x1c0 [ 13.163144] kunit_try_run_case+0x1a5/0x480 [ 13.163348] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.163533] kthread+0x337/0x6f0 [ 13.163650] ret_from_fork+0x41/0x80 [ 13.163896] ret_from_fork_asm+0x1a/0x30 [ 13.164140] [ 13.164250] The buggy address belongs to the object at ffff8881027e74e0 [ 13.164250] which belongs to the cache kmalloc-16 of size 16 [ 13.164813] The buggy address is located 8 bytes inside of [ 13.164813] allocated 9-byte region [ffff8881027e74e0, ffff8881027e74e9) [ 13.165333] [ 13.165460] The buggy address belongs to the physical page: [ 13.165740] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027e7 [ 13.166125] flags: 0x200000000000000(node=0|zone=2) [ 13.166375] page_type: f5(slab) [ 13.166542] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.166825] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.167060] page dumped because: kasan: bad access detected [ 13.167228] [ 13.167295] Memory state around the buggy address: [ 13.167546] ffff8881027e7380: 00 04 fc fc 00 04 fc fc 00 01 fc fc 00 01 fc fc [ 13.167938] ffff8881027e7400: 00 04 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 13.168254] >ffff8881027e7480: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 13.168587] ^ [ 13.168925] ffff8881027e7500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.169241] ffff8881027e7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.169500] ================================================================== [ 13.074970] ================================================================== [ 13.075708] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 13.076050] Write of size 8 at addr ffff8881027e74e8 by task kunit_try_catch/280 [ 13.076278] [ 13.076361] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT(voluntary) [ 13.076401] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.076412] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.076456] Call Trace: [ 13.076469] <TASK> [ 13.076482] dump_stack_lvl+0x73/0xb0 [ 13.076505] print_report+0xd1/0x610 [ 13.076526] ? __virt_addr_valid+0x1db/0x2d0 [ 13.076546] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 13.076566] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.076589] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 13.076610] kasan_report+0x141/0x180 [ 13.076633] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 13.076659] kasan_check_range+0x10c/0x1c0 [ 13.076678] __kasan_check_write+0x18/0x20 [ 13.076719] kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 13.076743] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 13.076783] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.076804] ? trace_hardirqs_on+0x37/0xe0 [ 13.076825] ? kasan_bitops_generic+0x92/0x1c0 [ 13.076849] kasan_bitops_generic+0x116/0x1c0 [ 13.076896] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.076917] ? __pfx_read_tsc+0x10/0x10 [ 13.076936] ? ktime_get_ts64+0x86/0x230 [ 13.076959] kunit_try_run_case+0x1a5/0x480 [ 13.076979] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.076999] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.077041] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.077064] ? __kthread_parkme+0x82/0x180 [ 13.077084] ? preempt_count_sub+0x50/0x80 [ 13.077107] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.077132] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.077155] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.077176] kthread+0x337/0x6f0 [ 13.077210] ? trace_preempt_on+0x20/0xc0 [ 13.077231] ? __pfx_kthread+0x10/0x10 [ 13.077248] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.077270] ? calculate_sigpending+0x7b/0xa0 [ 13.077290] ? __pfx_kthread+0x10/0x10 [ 13.077307] ret_from_fork+0x41/0x80 [ 13.077327] ? __pfx_kthread+0x10/0x10 [ 13.077344] ret_from_fork_asm+0x1a/0x30 [ 13.077374] </TASK> [ 13.077383] [ 13.085928] Allocated by task 280: [ 13.086099] kasan_save_stack+0x45/0x70 [ 13.086271] kasan_save_track+0x18/0x40 [ 13.086402] kasan_save_alloc_info+0x3b/0x50 [ 13.086606] __kasan_kmalloc+0xb7/0xc0 [ 13.086806] __kmalloc_cache_noprof+0x189/0x420 [ 13.087009] kasan_bitops_generic+0x92/0x1c0 [ 13.087222] kunit_try_run_case+0x1a5/0x480 [ 13.087458] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.087778] kthread+0x337/0x6f0 [ 13.087965] ret_from_fork+0x41/0x80 [ 13.088142] ret_from_fork_asm+0x1a/0x30 [ 13.088347] [ 13.088438] The buggy address belongs to the object at ffff8881027e74e0 [ 13.088438] which belongs to the cache kmalloc-16 of size 16 [ 13.088977] The buggy address is located 8 bytes inside of [ 13.088977] allocated 9-byte region [ffff8881027e74e0, ffff8881027e74e9) [ 13.089470] [ 13.089540] The buggy address belongs to the physical page: [ 13.089708] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027e7 [ 13.090736] flags: 0x200000000000000(node=0|zone=2) [ 13.090959] page_type: f5(slab) [ 13.091080] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.091303] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.091532] page dumped because: kasan: bad access detected [ 13.091748] [ 13.091903] Memory state around the buggy address: [ 13.092160] ffff8881027e7380: 00 04 fc fc 00 04 fc fc 00 01 fc fc 00 01 fc fc [ 13.092464] ffff8881027e7400: 00 04 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 13.092769] >ffff8881027e7480: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 13.093037] ^ [ 13.093308] ffff8881027e7500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.093640] ffff8881027e7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.094020] ================================================================== [ 13.034089] ================================================================== [ 13.034458] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 13.035113] Write of size 8 at addr ffff8881027e74e8 by task kunit_try_catch/280 [ 13.035371] [ 13.035468] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT(voluntary) [ 13.035510] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.035521] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.035540] Call Trace: [ 13.035551] <TASK> [ 13.035564] dump_stack_lvl+0x73/0xb0 [ 13.035588] print_report+0xd1/0x610 [ 13.035610] ? __virt_addr_valid+0x1db/0x2d0 [ 13.035631] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 13.035652] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.035675] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 13.035720] kasan_report+0x141/0x180 [ 13.035744] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 13.035771] kasan_check_range+0x10c/0x1c0 [ 13.035793] __kasan_check_write+0x18/0x20 [ 13.035814] kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 13.035835] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 13.035857] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.035891] ? trace_hardirqs_on+0x37/0xe0 [ 13.035914] ? kasan_bitops_generic+0x92/0x1c0 [ 13.035938] kasan_bitops_generic+0x116/0x1c0 [ 13.035957] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.035978] ? __pfx_read_tsc+0x10/0x10 [ 13.035997] ? ktime_get_ts64+0x86/0x230 [ 13.036021] kunit_try_run_case+0x1a5/0x480 [ 13.036044] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.036061] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.036085] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.036125] ? __kthread_parkme+0x82/0x180 [ 13.036147] ? preempt_count_sub+0x50/0x80 [ 13.036185] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.036218] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.036255] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.036277] kthread+0x337/0x6f0 [ 13.036293] ? trace_preempt_on+0x20/0xc0 [ 13.036314] ? __pfx_kthread+0x10/0x10 [ 13.036332] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.036352] ? calculate_sigpending+0x7b/0xa0 [ 13.036382] ? __pfx_kthread+0x10/0x10 [ 13.036400] ret_from_fork+0x41/0x80 [ 13.036419] ? __pfx_kthread+0x10/0x10 [ 13.036436] ret_from_fork_asm+0x1a/0x30 [ 13.036466] </TASK> [ 13.036475] [ 13.046352] Allocated by task 280: [ 13.046536] kasan_save_stack+0x45/0x70 [ 13.046687] kasan_save_track+0x18/0x40 [ 13.046820] kasan_save_alloc_info+0x3b/0x50 [ 13.046975] __kasan_kmalloc+0xb7/0xc0 [ 13.047159] __kmalloc_cache_noprof+0x189/0x420 [ 13.047379] kasan_bitops_generic+0x92/0x1c0 [ 13.047767] kunit_try_run_case+0x1a5/0x480 [ 13.048017] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.048252] kthread+0x337/0x6f0 [ 13.048454] ret_from_fork+0x41/0x80 [ 13.048633] ret_from_fork_asm+0x1a/0x30 [ 13.049092] [ 13.049197] The buggy address belongs to the object at ffff8881027e74e0 [ 13.049197] which belongs to the cache kmalloc-16 of size 16 [ 13.049603] The buggy address is located 8 bytes inside of [ 13.049603] allocated 9-byte region [ffff8881027e74e0, ffff8881027e74e9) [ 13.050160] [ 13.050403] The buggy address belongs to the physical page: [ 13.050753] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027e7 [ 13.051080] flags: 0x200000000000000(node=0|zone=2) [ 13.051242] page_type: f5(slab) [ 13.051397] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.051766] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.052312] page dumped because: kasan: bad access detected [ 13.052586] [ 13.052688] Memory state around the buggy address: [ 13.053084] ffff8881027e7380: 00 04 fc fc 00 04 fc fc 00 01 fc fc 00 01 fc fc [ 13.053447] ffff8881027e7400: 00 04 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 13.053755] >ffff8881027e7480: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 13.054115] ^ [ 13.054316] ffff8881027e7500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.054611] ffff8881027e7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.055189] ================================================================== [ 13.002440] ================================================================== [ 13.003108] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50 [ 13.003373] Write of size 8 at addr ffff8881027e74e8 by task kunit_try_catch/280 [ 13.003598] [ 13.003691] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT(voluntary) [ 13.003737] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.003749] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.003769] Call Trace: [ 13.003781] <TASK> [ 13.003797] dump_stack_lvl+0x73/0xb0 [ 13.003819] print_report+0xd1/0x610 [ 13.003842] ? __virt_addr_valid+0x1db/0x2d0 [ 13.003863] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 13.003893] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.003915] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 13.003936] kasan_report+0x141/0x180 [ 13.003958] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 13.003984] kasan_check_range+0x10c/0x1c0 [ 13.004004] __kasan_check_write+0x18/0x20 [ 13.004023] kasan_bitops_modify.constprop.0+0x101/0xd50 [ 13.004044] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 13.004067] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.004087] ? trace_hardirqs_on+0x37/0xe0 [ 13.004108] ? kasan_bitops_generic+0x92/0x1c0 [ 13.004131] kasan_bitops_generic+0x116/0x1c0 [ 13.004411] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.004467] ? __pfx_read_tsc+0x10/0x10 [ 13.004500] ? ktime_get_ts64+0x86/0x230 [ 13.004525] kunit_try_run_case+0x1a5/0x480 [ 13.004547] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.004565] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.004589] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.004612] ? __kthread_parkme+0x82/0x180 [ 13.004633] ? preempt_count_sub+0x50/0x80 [ 13.004657] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.004678] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.004701] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.004724] kthread+0x337/0x6f0 [ 13.004740] ? trace_preempt_on+0x20/0xc0 [ 13.004761] ? __pfx_kthread+0x10/0x10 [ 13.004779] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.004800] ? calculate_sigpending+0x7b/0xa0 [ 13.004820] ? __pfx_kthread+0x10/0x10 [ 13.004837] ret_from_fork+0x41/0x80 [ 13.004857] ? __pfx_kthread+0x10/0x10 [ 13.004873] ret_from_fork_asm+0x1a/0x30 [ 13.004913] </TASK> [ 13.004924] [ 13.022245] Allocated by task 280: [ 13.022381] kasan_save_stack+0x45/0x70 [ 13.022530] kasan_save_track+0x18/0x40 [ 13.022664] kasan_save_alloc_info+0x3b/0x50 [ 13.022952] __kasan_kmalloc+0xb7/0xc0 [ 13.023231] __kmalloc_cache_noprof+0x189/0x420 [ 13.023439] kasan_bitops_generic+0x92/0x1c0 [ 13.023638] kunit_try_run_case+0x1a5/0x480 [ 13.024260] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.024552] kthread+0x337/0x6f0 [ 13.024787] ret_from_fork+0x41/0x80 [ 13.025143] ret_from_fork_asm+0x1a/0x30 [ 13.025430] [ 13.025526] The buggy address belongs to the object at ffff8881027e74e0 [ 13.025526] which belongs to the cache kmalloc-16 of size 16 [ 13.026309] The buggy address is located 8 bytes inside of [ 13.026309] allocated 9-byte region [ffff8881027e74e0, ffff8881027e74e9) [ 13.027140] [ 13.027265] The buggy address belongs to the physical page: [ 13.027619] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027e7 [ 13.028074] flags: 0x200000000000000(node=0|zone=2) [ 13.028416] page_type: f5(slab) [ 13.028615] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.029175] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.029519] page dumped because: kasan: bad access detected [ 13.030041] [ 13.030142] Memory state around the buggy address: [ 13.030340] ffff8881027e7380: 00 04 fc fc 00 04 fc fc 00 01 fc fc 00 01 fc fc [ 13.030948] ffff8881027e7400: 00 04 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 13.031261] >ffff8881027e7480: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 13.031588] ^ [ 13.032136] ffff8881027e7500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.032602] ffff8881027e7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.033124] ==================================================================