Date
July 15, 2025, 2:09 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 20.279733] ================================================================== [ 20.279788] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc0 [ 20.279843] Write of size 8 at addr fff00000c45d8b88 by task kunit_try_catch/263 [ 20.279896] [ 20.279929] CPU: 0 UID: 0 PID: 263 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 20.280012] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.280040] Hardware name: linux,dummy-virt (DT) [ 20.280073] Call trace: [ 20.280098] show_stack+0x20/0x38 (C) [ 20.280145] dump_stack_lvl+0x8c/0xd0 [ 20.280196] print_report+0x118/0x5d0 [ 20.280259] kasan_report+0xdc/0x128 [ 20.280306] kasan_check_range+0x100/0x1a8 [ 20.280355] __kasan_check_write+0x20/0x30 [ 20.281818] kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc0 [ 20.281948] kasan_bitops_generic+0x11c/0x1c8 [ 20.282002] kunit_try_run_case+0x170/0x3f0 [ 20.282053] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.285947] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.295648] Read of size 8 at addr fff00000c45d8b88 by task kunit_try_catch/263 [ 20.303678] The buggy address is located 8 bytes inside of [ 20.303678] allocated 9-byte region [fff00000c45d8b80, fff00000c45d8b89) [ 20.316020] ret_from_fork+0x10/0x20 [ 20.322718] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0 [ 20.327042] kasan_save_stack+0x3c/0x68 [ 20.328924] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1045d8 [ 20.330427] ^ [ 20.332177] Read of size 8 at addr fff00000c45d8b88 by task kunit_try_catch/263 [ 20.333027] kunit_try_run_case+0x170/0x3f0 [ 20.333249] [ 20.333853] __kasan_kmalloc+0xd4/0xd8 [ 20.334157] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.335507] [ 20.335669] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1045d8 [ 20.336530] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 20.337531] fff00000c45d8c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.352809] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 20.358487] kasan_save_track+0x20/0x40 [ 20.361964] ret_from_fork+0x10/0x20 [ 20.363194] [ 20.363272] The buggy address belongs to the physical page: [ 20.363750] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9 [ 20.364514] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.364715] [ 20.365109] Memory state around the buggy address: [ 20.365158] fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.365453] fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.365509] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.365553] ^ [ 20.365835] fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.369482] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f7c/0x4858 [ 20.372340] __asan_report_store4_noabort+0x20/0x30 [ 20.373361] kthread+0x328/0x630 [ 20.374986] kthread+0x328/0x630 [ 20.375912] The buggy address belongs to the physical page: [ 20.376453] page_type: f5(slab) [ 20.376693] page dumped because: kasan: bad access detected [ 20.377532] fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.377762] fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.378854] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ec/0x4858 [ 20.379574] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.380958] print_report+0x118/0x5d0 [ 20.381888] kthread+0x328/0x630 [ 20.382449] kasan_save_alloc_info+0x40/0x58 [ 20.383482] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.384700] The buggy address belongs to the physical page: [ 20.384864] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9 [ 20.386544] page dumped because: kasan: bad access detected [ 20.386813] [ 20.387300] fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.388486] fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.389229] ================================================================== [ 20.270828] ================================================================== [ 20.270882] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0 [ 20.270934] Read of size 8 at addr fff00000c45d8b88 by task kunit_try_catch/263 [ 20.270987] [ 20.271019] CPU: 0 UID: 0 PID: 263 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 20.271101] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.271135] Hardware name: linux,dummy-virt (DT) [ 20.271167] Call trace: [ 20.271190] show_stack+0x20/0x38 (C) [ 20.272123] dump_stack_lvl+0x8c/0xd0 [ 20.272220] print_report+0x118/0x5d0 [ 20.272530] kasan_report+0xdc/0x128 [ 20.272751] __asan_report_load8_noabort+0x20/0x30 [ 20.272808] kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0 [ 20.272864] kasan_bitops_generic+0x11c/0x1c8 [ 20.272914] kunit_try_run_case+0x170/0x3f0 [ 20.272964] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.273540] kthread+0x328/0x630 [ 20.273844] ret_from_fork+0x10/0x20 [ 20.273899] [ 20.273920] Allocated by task 263: [ 20.273949] kasan_save_stack+0x3c/0x68 [ 20.273999] kasan_save_track+0x20/0x40 [ 20.274037] kasan_save_alloc_info+0x40/0x58 [ 20.274079] __kasan_kmalloc+0xd4/0xd8 [ 20.274386] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.274615] kasan_bitops_generic+0xa0/0x1c8 [ 20.274658] kunit_try_run_case+0x170/0x3f0 [ 20.274698] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.274746] kthread+0x328/0x630 [ 20.274784] ret_from_fork+0x10/0x20 [ 20.274821] [ 20.275676] The buggy address is located 8 bytes inside of [ 20.275676] allocated 9-byte region [fff00000c45d8b80, fff00000c45d8b89) [ 20.276306] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.276513] page_type: f5(slab) [ 20.276826] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 20.277121] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 20.277273] page dumped because: kasan: bad access detected [ 20.277310] [ 20.277583] Memory state around the buggy address: [ 20.277740] fff00000c45d8a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 20.277792] fff00000c45d8b00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 20.277980] >fff00000c45d8b80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.278636] fff00000c45d8c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.278772] fff00000c45d8c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.278815] ==================================================================
[ 13.317781] ================================================================== [ 13.318432] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 13.319248] Read of size 8 at addr ffff8881027e74e8 by task kunit_try_catch/280 [ 13.319478] [ 13.319564] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT(voluntary) [ 13.319608] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.319619] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.319639] Call Trace: [ 13.319652] <TASK> [ 13.319666] dump_stack_lvl+0x73/0xb0 [ 13.319689] print_report+0xd1/0x610 [ 13.319712] ? __virt_addr_valid+0x1db/0x2d0 [ 13.319731] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 13.319753] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.319776] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 13.319863] kasan_report+0x141/0x180 [ 13.319958] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 13.320036] kasan_check_range+0x10c/0x1c0 [ 13.320055] __kasan_check_read+0x15/0x20 [ 13.320085] kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 13.320109] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.320133] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.320153] ? trace_hardirqs_on+0x37/0xe0 [ 13.320174] ? kasan_bitops_generic+0x92/0x1c0 [ 13.320198] kasan_bitops_generic+0x121/0x1c0 [ 13.320218] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.320238] ? __pfx_read_tsc+0x10/0x10 [ 13.320257] ? ktime_get_ts64+0x86/0x230 [ 13.320280] kunit_try_run_case+0x1a5/0x480 [ 13.320301] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.320354] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.320378] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.320401] ? __kthread_parkme+0x82/0x180 [ 13.320432] ? preempt_count_sub+0x50/0x80 [ 13.320493] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.320512] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.320580] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.320604] kthread+0x337/0x6f0 [ 13.320620] ? trace_preempt_on+0x20/0xc0 [ 13.320651] ? __pfx_kthread+0x10/0x10 [ 13.320669] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.320690] ? calculate_sigpending+0x7b/0xa0 [ 13.320710] ? __pfx_kthread+0x10/0x10 [ 13.320728] ret_from_fork+0x41/0x80 [ 13.320748] ? __pfx_kthread+0x10/0x10 [ 13.320765] ret_from_fork_asm+0x1a/0x30 [ 13.320813] </TASK> [ 13.320824] [ 13.334911] Allocated by task 280: [ 13.335253] kasan_save_stack+0x45/0x70 [ 13.335556] kasan_save_track+0x18/0x40 [ 13.335921] kasan_save_alloc_info+0x3b/0x50 [ 13.336066] __kasan_kmalloc+0xb7/0xc0 [ 13.336198] __kmalloc_cache_noprof+0x189/0x420 [ 13.336348] kasan_bitops_generic+0x92/0x1c0 [ 13.336491] kunit_try_run_case+0x1a5/0x480 [ 13.336631] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.336825] kthread+0x337/0x6f0 [ 13.337144] ret_from_fork+0x41/0x80 [ 13.337471] ret_from_fork_asm+0x1a/0x30 [ 13.337860] [ 13.338027] The buggy address belongs to the object at ffff8881027e74e0 [ 13.338027] which belongs to the cache kmalloc-16 of size 16 [ 13.339104] The buggy address is located 8 bytes inside of [ 13.339104] allocated 9-byte region [ffff8881027e74e0, ffff8881027e74e9) [ 13.340155] [ 13.340320] The buggy address belongs to the physical page: [ 13.340819] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027e7 [ 13.341505] flags: 0x200000000000000(node=0|zone=2) [ 13.341981] page_type: f5(slab) [ 13.342255] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.342653] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.343092] page dumped because: kasan: bad access detected [ 13.343582] [ 13.343743] Memory state around the buggy address: [ 13.344200] ffff8881027e7380: 00 04 fc fc 00 04 fc fc 00 01 fc fc 00 01 fc fc [ 13.344667] ffff8881027e7400: 00 04 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 13.345183] >ffff8881027e7480: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 13.345395] ^ [ 13.345591] ffff8881027e7500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.345823] ffff8881027e7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.346436] ================================================================== [ 13.289283] ================================================================== [ 13.289566] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 13.290047] Write of size 8 at addr ffff8881027e74e8 by task kunit_try_catch/280 [ 13.290328] [ 13.290434] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT(voluntary) [ 13.290473] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.290484] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.290503] Call Trace: [ 13.290515] <TASK> [ 13.290528] dump_stack_lvl+0x73/0xb0 [ 13.290550] print_report+0xd1/0x610 [ 13.290571] ? __virt_addr_valid+0x1db/0x2d0 [ 13.290591] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 13.290613] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.290635] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 13.290658] kasan_report+0x141/0x180 [ 13.290679] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 13.290707] kasan_check_range+0x10c/0x1c0 [ 13.290727] __kasan_check_write+0x18/0x20 [ 13.290746] kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 13.290768] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.290792] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.290811] ? trace_hardirqs_on+0x37/0xe0 [ 13.290832] ? kasan_bitops_generic+0x92/0x1c0 [ 13.290857] kasan_bitops_generic+0x121/0x1c0 [ 13.290877] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.290910] ? __pfx_read_tsc+0x10/0x10 [ 13.290929] ? ktime_get_ts64+0x86/0x230 [ 13.290952] kunit_try_run_case+0x1a5/0x480 [ 13.290972] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.290990] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.291014] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.291037] ? __kthread_parkme+0x82/0x180 [ 13.291058] ? preempt_count_sub+0x50/0x80 [ 13.291082] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.291101] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.291123] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.291146] kthread+0x337/0x6f0 [ 13.291162] ? trace_preempt_on+0x20/0xc0 [ 13.291183] ? __pfx_kthread+0x10/0x10 [ 13.291200] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.291221] ? calculate_sigpending+0x7b/0xa0 [ 13.291241] ? __pfx_kthread+0x10/0x10 [ 13.291259] ret_from_fork+0x41/0x80 [ 13.291278] ? __pfx_kthread+0x10/0x10 [ 13.291295] ret_from_fork_asm+0x1a/0x30 [ 13.291324] </TASK> [ 13.291334] [ 13.299316] Allocated by task 280: [ 13.299447] kasan_save_stack+0x45/0x70 [ 13.299590] kasan_save_track+0x18/0x40 [ 13.299725] kasan_save_alloc_info+0x3b/0x50 [ 13.299868] __kasan_kmalloc+0xb7/0xc0 [ 13.300012] __kmalloc_cache_noprof+0x189/0x420 [ 13.300162] kasan_bitops_generic+0x92/0x1c0 [ 13.301393] kunit_try_run_case+0x1a5/0x480 [ 13.302168] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.303177] kthread+0x337/0x6f0 [ 13.303628] ret_from_fork+0x41/0x80 [ 13.304258] ret_from_fork_asm+0x1a/0x30 [ 13.304989] [ 13.305368] The buggy address belongs to the object at ffff8881027e74e0 [ 13.305368] which belongs to the cache kmalloc-16 of size 16 [ 13.306449] The buggy address is located 8 bytes inside of [ 13.306449] allocated 9-byte region [ffff8881027e74e0, ffff8881027e74e9) [ 13.307354] [ 13.307432] The buggy address belongs to the physical page: [ 13.307602] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027e7 [ 13.308322] flags: 0x200000000000000(node=0|zone=2) [ 13.309082] page_type: f5(slab) [ 13.309591] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.310548] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.311165] page dumped because: kasan: bad access detected [ 13.311342] [ 13.311411] Memory state around the buggy address: [ 13.311565] ffff8881027e7380: 00 04 fc fc 00 04 fc fc 00 01 fc fc 00 01 fc fc [ 13.311778] ffff8881027e7400: 00 04 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 13.312984] >ffff8881027e7480: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 13.314062] ^ [ 13.315016] ffff8881027e7500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.315768] ffff8881027e7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.316523] ================================================================== [ 13.193719] ================================================================== [ 13.194435] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 13.194810] Write of size 8 at addr ffff8881027e74e8 by task kunit_try_catch/280 [ 13.195130] [ 13.195226] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT(voluntary) [ 13.195267] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.195279] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.195297] Call Trace: [ 13.195310] <TASK> [ 13.195323] dump_stack_lvl+0x73/0xb0 [ 13.195345] print_report+0xd1/0x610 [ 13.195367] ? __virt_addr_valid+0x1db/0x2d0 [ 13.195387] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 13.195410] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.195432] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 13.195455] kasan_report+0x141/0x180 [ 13.195477] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 13.195505] kasan_check_range+0x10c/0x1c0 [ 13.195525] __kasan_check_write+0x18/0x20 [ 13.195544] kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 13.195567] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.195590] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.195610] ? trace_hardirqs_on+0x37/0xe0 [ 13.195631] ? kasan_bitops_generic+0x92/0x1c0 [ 13.195654] kasan_bitops_generic+0x121/0x1c0 [ 13.195674] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.195694] ? __pfx_read_tsc+0x10/0x10 [ 13.195713] ? ktime_get_ts64+0x86/0x230 [ 13.195737] kunit_try_run_case+0x1a5/0x480 [ 13.195757] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.195775] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.195797] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.195820] ? __kthread_parkme+0x82/0x180 [ 13.195841] ? preempt_count_sub+0x50/0x80 [ 13.195864] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.195894] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.195916] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.195938] kthread+0x337/0x6f0 [ 13.195954] ? trace_preempt_on+0x20/0xc0 [ 13.195975] ? __pfx_kthread+0x10/0x10 [ 13.195993] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.196014] ? calculate_sigpending+0x7b/0xa0 [ 13.196034] ? __pfx_kthread+0x10/0x10 [ 13.196052] ret_from_fork+0x41/0x80 [ 13.196071] ? __pfx_kthread+0x10/0x10 [ 13.196088] ret_from_fork_asm+0x1a/0x30 [ 13.196117] </TASK> [ 13.196128] [ 13.206320] Allocated by task 280: [ 13.206570] kasan_save_stack+0x45/0x70 [ 13.206960] kasan_save_track+0x18/0x40 [ 13.207134] kasan_save_alloc_info+0x3b/0x50 [ 13.207334] __kasan_kmalloc+0xb7/0xc0 [ 13.207506] __kmalloc_cache_noprof+0x189/0x420 [ 13.207698] kasan_bitops_generic+0x92/0x1c0 [ 13.207897] kunit_try_run_case+0x1a5/0x480 [ 13.208407] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.208617] kthread+0x337/0x6f0 [ 13.209056] ret_from_fork+0x41/0x80 [ 13.209316] ret_from_fork_asm+0x1a/0x30 [ 13.209546] [ 13.209645] The buggy address belongs to the object at ffff8881027e74e0 [ 13.209645] which belongs to the cache kmalloc-16 of size 16 [ 13.210343] The buggy address is located 8 bytes inside of [ 13.210343] allocated 9-byte region [ffff8881027e74e0, ffff8881027e74e9) [ 13.210960] [ 13.211144] The buggy address belongs to the physical page: [ 13.211488] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027e7 [ 13.211949] flags: 0x200000000000000(node=0|zone=2) [ 13.212265] page_type: f5(slab) [ 13.212419] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.212730] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.213214] page dumped because: kasan: bad access detected [ 13.213535] [ 13.213683] Memory state around the buggy address: [ 13.213909] ffff8881027e7380: 00 04 fc fc 00 04 fc fc 00 01 fc fc 00 01 fc fc [ 13.214352] ffff8881027e7400: 00 04 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 13.214623] >ffff8881027e7480: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 13.215160] ^ [ 13.215499] ffff8881027e7500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.215804] ffff8881027e7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.216247] ================================================================== [ 13.253266] ================================================================== [ 13.253519] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 13.254275] Write of size 8 at addr ffff8881027e74e8 by task kunit_try_catch/280 [ 13.254508] [ 13.254666] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT(voluntary) [ 13.254710] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.254722] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.254742] Call Trace: [ 13.254755] <TASK> [ 13.254769] dump_stack_lvl+0x73/0xb0 [ 13.254792] print_report+0xd1/0x610 [ 13.254814] ? __virt_addr_valid+0x1db/0x2d0 [ 13.254837] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 13.254860] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.254894] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 13.254917] kasan_report+0x141/0x180 [ 13.254939] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 13.254968] kasan_check_range+0x10c/0x1c0 [ 13.254988] __kasan_check_write+0x18/0x20 [ 13.255007] kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 13.255030] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.255054] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.255074] ? trace_hardirqs_on+0x37/0xe0 [ 13.255095] ? kasan_bitops_generic+0x92/0x1c0 [ 13.255118] kasan_bitops_generic+0x121/0x1c0 [ 13.255138] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.255159] ? __pfx_read_tsc+0x10/0x10 [ 13.255177] ? ktime_get_ts64+0x86/0x230 [ 13.255202] kunit_try_run_case+0x1a5/0x480 [ 13.255222] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.255240] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.255264] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.255287] ? __kthread_parkme+0x82/0x180 [ 13.255307] ? preempt_count_sub+0x50/0x80 [ 13.255331] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.255351] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.255373] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.255396] kthread+0x337/0x6f0 [ 13.255412] ? trace_preempt_on+0x20/0xc0 [ 13.255433] ? __pfx_kthread+0x10/0x10 [ 13.255451] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.255472] ? calculate_sigpending+0x7b/0xa0 [ 13.255492] ? __pfx_kthread+0x10/0x10 [ 13.255510] ret_from_fork+0x41/0x80 [ 13.255530] ? __pfx_kthread+0x10/0x10 [ 13.255547] ret_from_fork_asm+0x1a/0x30 [ 13.255576] </TASK> [ 13.255586] [ 13.263683] Allocated by task 280: [ 13.263805] kasan_save_stack+0x45/0x70 [ 13.264143] kasan_save_track+0x18/0x40 [ 13.264332] kasan_save_alloc_info+0x3b/0x50 [ 13.264475] __kasan_kmalloc+0xb7/0xc0 [ 13.264610] __kmalloc_cache_noprof+0x189/0x420 [ 13.264762] kasan_bitops_generic+0x92/0x1c0 [ 13.264954] kunit_try_run_case+0x1a5/0x480 [ 13.265172] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.265678] kthread+0x337/0x6f0 [ 13.265866] ret_from_fork+0x41/0x80 [ 13.266035] ret_from_fork_asm+0x1a/0x30 [ 13.266219] [ 13.266308] The buggy address belongs to the object at ffff8881027e74e0 [ 13.266308] which belongs to the cache kmalloc-16 of size 16 [ 13.266748] The buggy address is located 8 bytes inside of [ 13.266748] allocated 9-byte region [ffff8881027e74e0, ffff8881027e74e9) [ 13.267219] [ 13.267314] The buggy address belongs to the physical page: [ 13.267566] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027e7 [ 13.267801] flags: 0x200000000000000(node=0|zone=2) [ 13.267971] page_type: f5(slab) [ 13.268090] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.268328] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.268655] page dumped because: kasan: bad access detected [ 13.268907] [ 13.269001] Memory state around the buggy address: [ 13.269227] ffff8881027e7380: 00 04 fc fc 00 04 fc fc 00 01 fc fc 00 01 fc fc [ 13.269545] ffff8881027e7400: 00 04 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 13.269897] >ffff8881027e7480: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 13.270176] ^ [ 13.270420] ffff8881027e7500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.270696] ffff8881027e7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.270997] ================================================================== [ 13.216986] ================================================================== [ 13.217543] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 13.218190] Write of size 8 at addr ffff8881027e74e8 by task kunit_try_catch/280 [ 13.218507] [ 13.218607] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT(voluntary) [ 13.218650] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.218661] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.218679] Call Trace: [ 13.218693] <TASK> [ 13.218707] dump_stack_lvl+0x73/0xb0 [ 13.218731] print_report+0xd1/0x610 [ 13.218752] ? __virt_addr_valid+0x1db/0x2d0 [ 13.218772] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 13.218794] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.218817] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 13.218840] kasan_report+0x141/0x180 [ 13.218862] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 13.218901] kasan_check_range+0x10c/0x1c0 [ 13.218920] __kasan_check_write+0x18/0x20 [ 13.218940] kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 13.218962] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.218986] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.219006] ? trace_hardirqs_on+0x37/0xe0 [ 13.219027] ? kasan_bitops_generic+0x92/0x1c0 [ 13.219051] kasan_bitops_generic+0x121/0x1c0 [ 13.219071] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.219092] ? __pfx_read_tsc+0x10/0x10 [ 13.219110] ? ktime_get_ts64+0x86/0x230 [ 13.219134] kunit_try_run_case+0x1a5/0x480 [ 13.219153] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.219171] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.219195] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.219217] ? __kthread_parkme+0x82/0x180 [ 13.219238] ? preempt_count_sub+0x50/0x80 [ 13.219262] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.219282] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.219304] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.219326] kthread+0x337/0x6f0 [ 13.219342] ? trace_preempt_on+0x20/0xc0 [ 13.219364] ? __pfx_kthread+0x10/0x10 [ 13.219381] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.219402] ? calculate_sigpending+0x7b/0xa0 [ 13.219422] ? __pfx_kthread+0x10/0x10 [ 13.219440] ret_from_fork+0x41/0x80 [ 13.219460] ? __pfx_kthread+0x10/0x10 [ 13.219476] ret_from_fork_asm+0x1a/0x30 [ 13.219506] </TASK> [ 13.219516] [ 13.227147] Allocated by task 280: [ 13.227331] kasan_save_stack+0x45/0x70 [ 13.227523] kasan_save_track+0x18/0x40 [ 13.227713] kasan_save_alloc_info+0x3b/0x50 [ 13.228097] __kasan_kmalloc+0xb7/0xc0 [ 13.228241] __kmalloc_cache_noprof+0x189/0x420 [ 13.228390] kasan_bitops_generic+0x92/0x1c0 [ 13.228566] kunit_try_run_case+0x1a5/0x480 [ 13.228770] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.229197] kthread+0x337/0x6f0 [ 13.229339] ret_from_fork+0x41/0x80 [ 13.229485] ret_from_fork_asm+0x1a/0x30 [ 13.229621] [ 13.229689] The buggy address belongs to the object at ffff8881027e74e0 [ 13.229689] which belongs to the cache kmalloc-16 of size 16 [ 13.230079] The buggy address is located 8 bytes inside of [ 13.230079] allocated 9-byte region [ffff8881027e74e0, ffff8881027e74e9) [ 13.230595] [ 13.230689] The buggy address belongs to the physical page: [ 13.231085] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027e7 [ 13.231416] flags: 0x200000000000000(node=0|zone=2) [ 13.231577] page_type: f5(slab) [ 13.231695] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.232225] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.232560] page dumped because: kasan: bad access detected [ 13.232818] [ 13.232920] Memory state around the buggy address: [ 13.233155] ffff8881027e7380: 00 04 fc fc 00 04 fc fc 00 01 fc fc 00 01 fc fc [ 13.233440] ffff8881027e7400: 00 04 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 13.233650] >ffff8881027e7480: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 13.234154] ^ [ 13.234408] ffff8881027e7500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.234686] ffff8881027e7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.234923] ================================================================== [ 13.347389] ================================================================== [ 13.347714] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 13.348094] Read of size 8 at addr ffff8881027e74e8 by task kunit_try_catch/280 [ 13.348363] [ 13.348474] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT(voluntary) [ 13.348519] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.348530] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.348550] Call Trace: [ 13.348562] <TASK> [ 13.348577] dump_stack_lvl+0x73/0xb0 [ 13.348599] print_report+0xd1/0x610 [ 13.348622] ? __virt_addr_valid+0x1db/0x2d0 [ 13.348642] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 13.348663] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.348686] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 13.348710] kasan_report+0x141/0x180 [ 13.348732] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 13.348759] __asan_report_load8_noabort+0x18/0x20 [ 13.348780] kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 13.348802] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.348826] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.348846] ? trace_hardirqs_on+0x37/0xe0 [ 13.348867] ? kasan_bitops_generic+0x92/0x1c0 [ 13.348929] kasan_bitops_generic+0x121/0x1c0 [ 13.348950] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.348970] ? __pfx_read_tsc+0x10/0x10 [ 13.349001] ? ktime_get_ts64+0x86/0x230 [ 13.349025] kunit_try_run_case+0x1a5/0x480 [ 13.349045] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.349063] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.349097] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.349120] ? __kthread_parkme+0x82/0x180 [ 13.349148] ? preempt_count_sub+0x50/0x80 [ 13.349183] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.349203] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.349226] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.349250] kthread+0x337/0x6f0 [ 13.349265] ? trace_preempt_on+0x20/0xc0 [ 13.349288] ? __pfx_kthread+0x10/0x10 [ 13.349305] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.349326] ? calculate_sigpending+0x7b/0xa0 [ 13.349347] ? __pfx_kthread+0x10/0x10 [ 13.349365] ret_from_fork+0x41/0x80 [ 13.349384] ? __pfx_kthread+0x10/0x10 [ 13.349402] ret_from_fork_asm+0x1a/0x30 [ 13.349432] </TASK> [ 13.349443] [ 13.357257] Allocated by task 280: [ 13.357418] kasan_save_stack+0x45/0x70 [ 13.357638] kasan_save_track+0x18/0x40 [ 13.357874] kasan_save_alloc_info+0x3b/0x50 [ 13.358092] __kasan_kmalloc+0xb7/0xc0 [ 13.358278] __kmalloc_cache_noprof+0x189/0x420 [ 13.358429] kasan_bitops_generic+0x92/0x1c0 [ 13.358606] kunit_try_run_case+0x1a5/0x480 [ 13.358827] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.359100] kthread+0x337/0x6f0 [ 13.359260] ret_from_fork+0x41/0x80 [ 13.359433] ret_from_fork_asm+0x1a/0x30 [ 13.359640] [ 13.359727] The buggy address belongs to the object at ffff8881027e74e0 [ 13.359727] which belongs to the cache kmalloc-16 of size 16 [ 13.360265] The buggy address is located 8 bytes inside of [ 13.360265] allocated 9-byte region [ffff8881027e74e0, ffff8881027e74e9) [ 13.360635] [ 13.360705] The buggy address belongs to the physical page: [ 13.360905] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027e7 [ 13.361281] flags: 0x200000000000000(node=0|zone=2) [ 13.361510] page_type: f5(slab) [ 13.361673] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.362057] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.362391] page dumped because: kasan: bad access detected [ 13.362633] [ 13.362735] Memory state around the buggy address: [ 13.362940] ffff8881027e7380: 00 04 fc fc 00 04 fc fc 00 01 fc fc 00 01 fc fc [ 13.363153] ffff8881027e7400: 00 04 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 13.363385] >ffff8881027e7480: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 13.363724] ^ [ 13.364087] ffff8881027e7500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.364447] ffff8881027e7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.364745] ================================================================== [ 13.172089] ================================================================== [ 13.172415] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 13.172713] Write of size 8 at addr ffff8881027e74e8 by task kunit_try_catch/280 [ 13.173083] [ 13.173197] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT(voluntary) [ 13.173239] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.173250] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.173269] Call Trace: [ 13.173283] <TASK> [ 13.173297] dump_stack_lvl+0x73/0xb0 [ 13.173320] print_report+0xd1/0x610 [ 13.173342] ? __virt_addr_valid+0x1db/0x2d0 [ 13.173362] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 13.173385] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.173408] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 13.173431] kasan_report+0x141/0x180 [ 13.173453] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 13.173480] kasan_check_range+0x10c/0x1c0 [ 13.173499] __kasan_check_write+0x18/0x20 [ 13.173519] kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 13.173541] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.173566] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.173586] ? trace_hardirqs_on+0x37/0xe0 [ 13.173608] ? kasan_bitops_generic+0x92/0x1c0 [ 13.173632] kasan_bitops_generic+0x121/0x1c0 [ 13.173650] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.173672] ? __pfx_read_tsc+0x10/0x10 [ 13.173689] ? ktime_get_ts64+0x86/0x230 [ 13.173713] kunit_try_run_case+0x1a5/0x480 [ 13.173733] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.173751] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.173774] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.173797] ? __kthread_parkme+0x82/0x180 [ 13.173818] ? preempt_count_sub+0x50/0x80 [ 13.173842] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.173861] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.173894] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.173916] kthread+0x337/0x6f0 [ 13.173932] ? trace_preempt_on+0x20/0xc0 [ 13.173954] ? __pfx_kthread+0x10/0x10 [ 13.173983] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.174004] ? calculate_sigpending+0x7b/0xa0 [ 13.174025] ? __pfx_kthread+0x10/0x10 [ 13.174042] ret_from_fork+0x41/0x80 [ 13.174062] ? __pfx_kthread+0x10/0x10 [ 13.174079] ret_from_fork_asm+0x1a/0x30 [ 13.174110] </TASK> [ 13.174119] [ 13.183586] Allocated by task 280: [ 13.183903] kasan_save_stack+0x45/0x70 [ 13.184161] kasan_save_track+0x18/0x40 [ 13.184394] kasan_save_alloc_info+0x3b/0x50 [ 13.184591] __kasan_kmalloc+0xb7/0xc0 [ 13.184766] __kmalloc_cache_noprof+0x189/0x420 [ 13.185196] kasan_bitops_generic+0x92/0x1c0 [ 13.185410] kunit_try_run_case+0x1a5/0x480 [ 13.185697] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.186063] kthread+0x337/0x6f0 [ 13.186190] ret_from_fork+0x41/0x80 [ 13.186444] ret_from_fork_asm+0x1a/0x30 [ 13.186638] [ 13.186728] The buggy address belongs to the object at ffff8881027e74e0 [ 13.186728] which belongs to the cache kmalloc-16 of size 16 [ 13.187498] The buggy address is located 8 bytes inside of [ 13.187498] allocated 9-byte region [ffff8881027e74e0, ffff8881027e74e9) [ 13.188087] [ 13.188322] The buggy address belongs to the physical page: [ 13.188526] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027e7 [ 13.189009] flags: 0x200000000000000(node=0|zone=2) [ 13.189306] page_type: f5(slab) [ 13.189433] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.189753] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.190240] page dumped because: kasan: bad access detected [ 13.190493] [ 13.190568] Memory state around the buggy address: [ 13.190792] ffff8881027e7380: 00 04 fc fc 00 04 fc fc 00 01 fc fc 00 01 fc fc [ 13.191307] ffff8881027e7400: 00 04 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 13.191692] >ffff8881027e7480: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 13.192037] ^ [ 13.192465] ffff8881027e7500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.192825] ffff8881027e7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.193149] ================================================================== [ 13.235615] ================================================================== [ 13.235975] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 13.236242] Write of size 8 at addr ffff8881027e74e8 by task kunit_try_catch/280 [ 13.236527] [ 13.236632] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT(voluntary) [ 13.236672] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.236682] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.236701] Call Trace: [ 13.236713] <TASK> [ 13.236725] dump_stack_lvl+0x73/0xb0 [ 13.236746] print_report+0xd1/0x610 [ 13.236768] ? __virt_addr_valid+0x1db/0x2d0 [ 13.236786] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 13.236808] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.236830] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 13.236853] kasan_report+0x141/0x180 [ 13.236875] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 13.236915] kasan_check_range+0x10c/0x1c0 [ 13.236934] __kasan_check_write+0x18/0x20 [ 13.236953] kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 13.236976] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.237000] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.237019] ? trace_hardirqs_on+0x37/0xe0 [ 13.237040] ? kasan_bitops_generic+0x92/0x1c0 [ 13.237063] kasan_bitops_generic+0x121/0x1c0 [ 13.237083] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.237104] ? __pfx_read_tsc+0x10/0x10 [ 13.237121] ? ktime_get_ts64+0x86/0x230 [ 13.237151] kunit_try_run_case+0x1a5/0x480 [ 13.237182] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.237199] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.237222] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.237245] ? __kthread_parkme+0x82/0x180 [ 13.237265] ? preempt_count_sub+0x50/0x80 [ 13.237288] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.237307] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.237329] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.237352] kthread+0x337/0x6f0 [ 13.237369] ? trace_preempt_on+0x20/0xc0 [ 13.237390] ? __pfx_kthread+0x10/0x10 [ 13.237407] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.237428] ? calculate_sigpending+0x7b/0xa0 [ 13.237449] ? __pfx_kthread+0x10/0x10 [ 13.237466] ret_from_fork+0x41/0x80 [ 13.237485] ? __pfx_kthread+0x10/0x10 [ 13.237502] ret_from_fork_asm+0x1a/0x30 [ 13.237532] </TASK> [ 13.237541] [ 13.245319] Allocated by task 280: [ 13.245497] kasan_save_stack+0x45/0x70 [ 13.245696] kasan_save_track+0x18/0x40 [ 13.245962] kasan_save_alloc_info+0x3b/0x50 [ 13.246144] __kasan_kmalloc+0xb7/0xc0 [ 13.246291] __kmalloc_cache_noprof+0x189/0x420 [ 13.246488] kasan_bitops_generic+0x92/0x1c0 [ 13.246664] kunit_try_run_case+0x1a5/0x480 [ 13.246805] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.247068] kthread+0x337/0x6f0 [ 13.247220] ret_from_fork+0x41/0x80 [ 13.247348] ret_from_fork_asm+0x1a/0x30 [ 13.247485] [ 13.247555] The buggy address belongs to the object at ffff8881027e74e0 [ 13.247555] which belongs to the cache kmalloc-16 of size 16 [ 13.248163] The buggy address is located 8 bytes inside of [ 13.248163] allocated 9-byte region [ffff8881027e74e0, ffff8881027e74e9) [ 13.248599] [ 13.248682] The buggy address belongs to the physical page: [ 13.249093] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027e7 [ 13.249451] flags: 0x200000000000000(node=0|zone=2) [ 13.249664] page_type: f5(slab) [ 13.249805] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.250096] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.250322] page dumped because: kasan: bad access detected [ 13.250527] [ 13.250617] Memory state around the buggy address: [ 13.250837] ffff8881027e7380: 00 04 fc fc 00 04 fc fc 00 01 fc fc 00 01 fc fc [ 13.251162] ffff8881027e7400: 00 04 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 13.251374] >ffff8881027e7480: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 13.251583] ^ [ 13.251873] ffff8881027e7500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.252210] ffff8881027e7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.252646] ================================================================== [ 13.271565] ================================================================== [ 13.271943] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 13.272223] Write of size 8 at addr ffff8881027e74e8 by task kunit_try_catch/280 [ 13.272464] [ 13.272569] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT(voluntary) [ 13.272607] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.272618] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.272636] Call Trace: [ 13.272649] <TASK> [ 13.272662] dump_stack_lvl+0x73/0xb0 [ 13.272684] print_report+0xd1/0x610 [ 13.272705] ? __virt_addr_valid+0x1db/0x2d0 [ 13.272725] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 13.272747] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.272769] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 13.272792] kasan_report+0x141/0x180 [ 13.272823] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 13.272851] kasan_check_range+0x10c/0x1c0 [ 13.272870] __kasan_check_write+0x18/0x20 [ 13.272902] kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 13.272925] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 13.272948] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.272968] ? trace_hardirqs_on+0x37/0xe0 [ 13.272989] ? kasan_bitops_generic+0x92/0x1c0 [ 13.273013] kasan_bitops_generic+0x121/0x1c0 [ 13.273032] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.273052] ? __pfx_read_tsc+0x10/0x10 [ 13.273070] ? ktime_get_ts64+0x86/0x230 [ 13.273094] kunit_try_run_case+0x1a5/0x480 [ 13.273113] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.273136] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.273159] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.273182] ? __kthread_parkme+0x82/0x180 [ 13.273203] ? preempt_count_sub+0x50/0x80 [ 13.273226] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.273245] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.273268] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.273290] kthread+0x337/0x6f0 [ 13.273306] ? trace_preempt_on+0x20/0xc0 [ 13.273327] ? __pfx_kthread+0x10/0x10 [ 13.273344] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.273365] ? calculate_sigpending+0x7b/0xa0 [ 13.273385] ? __pfx_kthread+0x10/0x10 [ 13.273403] ret_from_fork+0x41/0x80 [ 13.273423] ? __pfx_kthread+0x10/0x10 [ 13.273440] ret_from_fork_asm+0x1a/0x30 [ 13.273470] </TASK> [ 13.273479] [ 13.281446] Allocated by task 280: [ 13.281581] kasan_save_stack+0x45/0x70 [ 13.281774] kasan_save_track+0x18/0x40 [ 13.281975] kasan_save_alloc_info+0x3b/0x50 [ 13.282167] __kasan_kmalloc+0xb7/0xc0 [ 13.282327] __kmalloc_cache_noprof+0x189/0x420 [ 13.282476] kasan_bitops_generic+0x92/0x1c0 [ 13.282618] kunit_try_run_case+0x1a5/0x480 [ 13.282757] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.283007] kthread+0x337/0x6f0 [ 13.283179] ret_from_fork+0x41/0x80 [ 13.283356] ret_from_fork_asm+0x1a/0x30 [ 13.283550] [ 13.283638] The buggy address belongs to the object at ffff8881027e74e0 [ 13.283638] which belongs to the cache kmalloc-16 of size 16 [ 13.284237] The buggy address is located 8 bytes inside of [ 13.284237] allocated 9-byte region [ffff8881027e74e0, ffff8881027e74e9) [ 13.284726] [ 13.284814] The buggy address belongs to the physical page: [ 13.285042] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027e7 [ 13.285380] flags: 0x200000000000000(node=0|zone=2) [ 13.285570] page_type: f5(slab) [ 13.285734] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.286112] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.286390] page dumped because: kasan: bad access detected [ 13.286559] [ 13.286626] Memory state around the buggy address: [ 13.286778] ffff8881027e7380: 00 04 fc fc 00 04 fc fc 00 01 fc fc 00 01 fc fc [ 13.287102] ffff8881027e7400: 00 04 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 13.287416] >ffff8881027e7480: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 13.287729] ^ [ 13.287986] ffff8881027e7500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.288197] ffff8881027e7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.288654] ==================================================================