Date
July 9, 2025, 11:07 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 18.887407] ================================================================== [ 18.887538] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 18.887655] Write of size 8 at addr fff00000c4352f48 by task kunit_try_catch/261 [ 18.887787] [ 18.887830] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 18.887919] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.888281] Hardware name: linux,dummy-virt (DT) [ 18.888352] Call trace: [ 18.888665] show_stack+0x20/0x38 (C) [ 18.888788] dump_stack_lvl+0x8c/0xd0 [ 18.888876] print_report+0x118/0x608 [ 18.889062] kasan_report+0xdc/0x128 [ 18.889132] kasan_check_range+0x100/0x1a8 [ 18.889186] __kasan_check_write+0x20/0x30 [ 18.889581] kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 18.889924] kasan_bitops_generic+0x110/0x1c8 [ 18.890086] kunit_try_run_case+0x170/0x3f0 [ 18.890436] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.890607] kthread+0x328/0x630 [ 18.890819] ret_from_fork+0x10/0x20 [ 18.891086] [ 18.891157] Allocated by task 261: [ 18.891222] kasan_save_stack+0x3c/0x68 [ 18.891309] kasan_save_track+0x20/0x40 [ 18.891512] kasan_save_alloc_info+0x40/0x58 [ 18.891753] __kasan_kmalloc+0xd4/0xd8 [ 18.891963] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.892032] kasan_bitops_generic+0xa0/0x1c8 [ 18.892073] kunit_try_run_case+0x170/0x3f0 [ 18.892126] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.892173] kthread+0x328/0x630 [ 18.892430] ret_from_fork+0x10/0x20 [ 18.892567] [ 18.892592] The buggy address belongs to the object at fff00000c4352f40 [ 18.892592] which belongs to the cache kmalloc-16 of size 16 [ 18.892919] The buggy address is located 8 bytes inside of [ 18.892919] allocated 9-byte region [fff00000c4352f40, fff00000c4352f49) [ 18.893154] [ 18.893348] The buggy address belongs to the physical page: [ 18.893442] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104352 [ 18.893767] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.894175] page_type: f5(slab) [ 18.894290] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 18.894480] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 18.894579] page dumped because: kasan: bad access detected [ 18.894615] [ 18.894702] Memory state around the buggy address: [ 18.895096] fff00000c4352e00: 00 03 fc fc fa fb fc fc 00 02 fc fc fa fb fc fc [ 18.895216] fff00000c4352e80: 00 01 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 18.895264] >fff00000c4352f00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 18.895305] ^ [ 18.895374] fff00000c4352f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.895421] fff00000c4353000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.895464] ================================================================== [ 18.905141] ================================================================== [ 18.905370] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc0 [ 18.905438] Write of size 8 at addr fff00000c4352f48 by task kunit_try_catch/261 [ 18.905491] [ 18.905532] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 18.906834] __kasan_check_write+0x20/0x30 [ 18.909682] The buggy address is located 8 bytes inside of [ 18.909682] allocated 9-byte region [fff00000c4352f40, fff00000c4352f49) [ 18.912334] fff00000c4353000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.914691] Call trace: [ 18.916060] kasan_bitops_generic+0x110/0x1c8 [ 18.918424] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.918913] ^ [ 18.920561] Write of size 8 at addr fff00000c4352f48 by task kunit_try_catch/261 [ 18.922556] kasan_check_range+0x100/0x1a8 [ 18.923504] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.926244] The buggy address is located 8 bytes inside of [ 18.926244] allocated 9-byte region [fff00000c4352f40, fff00000c4352f49) [ 18.928041] >fff00000c4352f00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 18.930491] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.931484] kasan_bitops_modify.constprop.0+0x320/0xbc0 [ 18.934336] The buggy address belongs to the object at fff00000c4352f40 [ 18.934336] which belongs to the cache kmalloc-16 of size 16 [ 18.936622] fff00000c4352f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.938430] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.942013] kasan_save_stack+0x3c/0x68 [ 18.943417] [ 18.943554] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.945133] fff00000c4352e80: 00 01 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 18.947392] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc0 [ 18.948556] print_report+0x118/0x608 [ 18.949503] kasan_bitops_generic+0x110/0x1c8 [ 18.953455] The buggy address is located 8 bytes inside of [ 18.953455] allocated 9-byte region [fff00000c4352f40, fff00000c4352f49) [ 18.955219] fff00000c4352e80: 00 01 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 18.955265] >fff00000c4352f00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 18.955304] ^ [ 18.955428] ================================================================== [ 18.897486] ================================================================== [ 18.897984] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 18.898086] Read of size 8 at addr fff00000c4352f48 by task kunit_try_catch/261 [ 18.898422] [ 18.898595] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 18.898692] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.898874] Hardware name: linux,dummy-virt (DT) [ 18.898969] Call trace: [ 18.898994] show_stack+0x20/0x38 (C) [ 18.899151] dump_stack_lvl+0x8c/0xd0 [ 18.899342] print_report+0x118/0x608 [ 18.899408] kasan_report+0xdc/0x128 [ 18.899574] __asan_report_load8_noabort+0x20/0x30 [ 18.899761] kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 18.900061] kasan_bitops_generic+0x110/0x1c8 [ 18.900238] kunit_try_run_case+0x170/0x3f0 [ 18.900392] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.900815] kthread+0x328/0x630 [ 18.900896] ret_from_fork+0x10/0x20 [ 18.901207] [ 18.901279] Allocated by task 261: [ 18.901319] kasan_save_stack+0x3c/0x68 [ 18.901544] kasan_save_track+0x20/0x40 [ 18.901787] kasan_save_alloc_info+0x40/0x58 [ 18.901916] __kasan_kmalloc+0xd4/0xd8 [ 18.902035] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.902077] kasan_bitops_generic+0xa0/0x1c8 [ 18.902127] kunit_try_run_case+0x170/0x3f0 [ 18.902169] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.902222] kthread+0x328/0x630 [ 18.902259] ret_from_fork+0x10/0x20 [ 18.902297] [ 18.902319] The buggy address belongs to the object at fff00000c4352f40 [ 18.902319] which belongs to the cache kmalloc-16 of size 16 [ 18.902391] The buggy address is located 8 bytes inside of [ 18.902391] allocated 9-byte region [fff00000c4352f40, fff00000c4352f49) [ 18.902454] [ 18.902484] The buggy address belongs to the physical page: [ 18.902535] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104352 [ 18.902610] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.902662] page_type: f5(slab) [ 18.902702] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 18.902754] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 18.902796] page dumped because: kasan: bad access detected [ 18.902839] [ 18.902869] Memory state around the buggy address: [ 18.902903] fff00000c4352e00: 00 03 fc fc fa fb fc fc 00 02 fc fc fa fb fc fc [ 18.902960] fff00000c4352e80: 00 01 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 18.903013] >fff00000c4352f00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 18.903064] ^ [ 18.903111] fff00000c4352f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.903165] fff00000c4353000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.903220] ==================================================================
[ 14.605854] ================================================================== [ 14.606351] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 14.606683] Write of size 8 at addr ffff88810226cfe8 by task kunit_try_catch/278 [ 14.606993] [ 14.607100] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.607142] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.607154] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.607173] Call Trace: [ 14.607186] <TASK> [ 14.607199] dump_stack_lvl+0x73/0xb0 [ 14.607228] print_report+0xd1/0x650 [ 14.607250] ? __virt_addr_valid+0x1db/0x2d0 [ 14.607273] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 14.607313] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.607337] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 14.607363] kasan_report+0x141/0x180 [ 14.607386] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 14.607427] kasan_check_range+0x10c/0x1c0 [ 14.607451] __kasan_check_write+0x18/0x20 [ 14.607556] kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 14.607599] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.607628] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.607652] ? trace_hardirqs_on+0x37/0xe0 [ 14.607687] ? kasan_bitops_generic+0x92/0x1c0 [ 14.607725] kasan_bitops_generic+0x116/0x1c0 [ 14.607749] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.607783] ? __pfx_read_tsc+0x10/0x10 [ 14.607804] ? ktime_get_ts64+0x86/0x230 [ 14.607827] kunit_try_run_case+0x1a5/0x480 [ 14.607861] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.607884] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.607909] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.607934] ? __kthread_parkme+0x82/0x180 [ 14.607954] ? preempt_count_sub+0x50/0x80 [ 14.607978] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.608002] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.608027] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.608069] kthread+0x337/0x6f0 [ 14.608087] ? trace_preempt_on+0x20/0xc0 [ 14.608110] ? __pfx_kthread+0x10/0x10 [ 14.608131] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.608152] ? calculate_sigpending+0x7b/0xa0 [ 14.608177] ? __pfx_kthread+0x10/0x10 [ 14.608246] ret_from_fork+0x116/0x1d0 [ 14.608268] ? __pfx_kthread+0x10/0x10 [ 14.608311] ret_from_fork_asm+0x1a/0x30 [ 14.608351] </TASK> [ 14.608362] [ 14.617218] Allocated by task 278: [ 14.617442] kasan_save_stack+0x45/0x70 [ 14.617605] kasan_save_track+0x18/0x40 [ 14.617828] kasan_save_alloc_info+0x3b/0x50 [ 14.618023] __kasan_kmalloc+0xb7/0xc0 [ 14.618290] __kmalloc_cache_noprof+0x189/0x420 [ 14.618527] kasan_bitops_generic+0x92/0x1c0 [ 14.618725] kunit_try_run_case+0x1a5/0x480 [ 14.618903] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.619350] kthread+0x337/0x6f0 [ 14.619532] ret_from_fork+0x116/0x1d0 [ 14.619663] ret_from_fork_asm+0x1a/0x30 [ 14.619812] [ 14.619881] The buggy address belongs to the object at ffff88810226cfe0 [ 14.619881] which belongs to the cache kmalloc-16 of size 16 [ 14.620629] The buggy address is located 8 bytes inside of [ 14.620629] allocated 9-byte region [ffff88810226cfe0, ffff88810226cfe9) [ 14.621301] [ 14.621376] The buggy address belongs to the physical page: [ 14.621546] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10226c [ 14.621838] flags: 0x200000000000000(node=0|zone=2) [ 14.622069] page_type: f5(slab) [ 14.622267] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.622738] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.623449] page dumped because: kasan: bad access detected [ 14.623680] [ 14.623798] Memory state around the buggy address: [ 14.623998] ffff88810226ce80: fa fb fc fc 00 04 fc fc 00 00 fc fc 00 04 fc fc [ 14.624435] ffff88810226cf00: 00 04 fc fc 00 00 fc fc fa fb fc fc fa fb fc fc [ 14.624655] >ffff88810226cf80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 14.624967] ^ [ 14.625261] ffff88810226d000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.625826] ffff88810226d080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb [ 14.626072] ================================================================== [ 14.626689] ================================================================== [ 14.627265] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 14.627727] Write of size 8 at addr ffff88810226cfe8 by task kunit_try_catch/278 [ 14.628188] [ 14.628305] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.628358] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.628369] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.628422] Call Trace: [ 14.628437] <TASK> [ 14.628450] dump_stack_lvl+0x73/0xb0 [ 14.628491] print_report+0xd1/0x650 [ 14.628513] ? __virt_addr_valid+0x1db/0x2d0 [ 14.628536] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 14.628563] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.628586] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 14.628613] kasan_report+0x141/0x180 [ 14.628635] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 14.628666] kasan_check_range+0x10c/0x1c0 [ 14.628690] __kasan_check_write+0x18/0x20 [ 14.628718] kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 14.628745] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.628773] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.628797] ? trace_hardirqs_on+0x37/0xe0 [ 14.628820] ? kasan_bitops_generic+0x92/0x1c0 [ 14.628848] kasan_bitops_generic+0x116/0x1c0 [ 14.628904] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.628942] ? __pfx_read_tsc+0x10/0x10 [ 14.628974] ? ktime_get_ts64+0x86/0x230 [ 14.629044] kunit_try_run_case+0x1a5/0x480 [ 14.629068] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.629143] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.629169] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.629231] ? __kthread_parkme+0x82/0x180 [ 14.629252] ? preempt_count_sub+0x50/0x80 [ 14.629286] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.629311] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.629335] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.629391] kthread+0x337/0x6f0 [ 14.629411] ? trace_preempt_on+0x20/0xc0 [ 14.629434] ? __pfx_kthread+0x10/0x10 [ 14.629466] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.629487] ? calculate_sigpending+0x7b/0xa0 [ 14.629512] ? __pfx_kthread+0x10/0x10 [ 14.629533] ret_from_fork+0x116/0x1d0 [ 14.629552] ? __pfx_kthread+0x10/0x10 [ 14.629573] ret_from_fork_asm+0x1a/0x30 [ 14.629604] </TASK> [ 14.629613] [ 14.638385] Allocated by task 278: [ 14.638569] kasan_save_stack+0x45/0x70 [ 14.638784] kasan_save_track+0x18/0x40 [ 14.639013] kasan_save_alloc_info+0x3b/0x50 [ 14.639301] __kasan_kmalloc+0xb7/0xc0 [ 14.639470] __kmalloc_cache_noprof+0x189/0x420 [ 14.639621] kasan_bitops_generic+0x92/0x1c0 [ 14.639777] kunit_try_run_case+0x1a5/0x480 [ 14.639928] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.640533] kthread+0x337/0x6f0 [ 14.640747] ret_from_fork+0x116/0x1d0 [ 14.640940] ret_from_fork_asm+0x1a/0x30 [ 14.641165] [ 14.641370] The buggy address belongs to the object at ffff88810226cfe0 [ 14.641370] which belongs to the cache kmalloc-16 of size 16 [ 14.641836] The buggy address is located 8 bytes inside of [ 14.641836] allocated 9-byte region [ffff88810226cfe0, ffff88810226cfe9) [ 14.642467] [ 14.642543] The buggy address belongs to the physical page: [ 14.642719] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10226c [ 14.642955] flags: 0x200000000000000(node=0|zone=2) [ 14.643424] page_type: f5(slab) [ 14.643653] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.644008] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.644350] page dumped because: kasan: bad access detected [ 14.644700] [ 14.645028] Memory state around the buggy address: [ 14.645208] ffff88810226ce80: fa fb fc fc 00 04 fc fc 00 00 fc fc 00 04 fc fc [ 14.645426] ffff88810226cf00: 00 04 fc fc 00 00 fc fc fa fb fc fc fa fb fc fc [ 14.645725] >ffff88810226cf80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 14.646250] ^ [ 14.646573] ffff88810226d000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.646901] ffff88810226d080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb [ 14.647210] ================================================================== [ 14.647816] ================================================================== [ 14.648295] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50 [ 14.648684] Write of size 8 at addr ffff88810226cfe8 by task kunit_try_catch/278 [ 14.649060] [ 14.649246] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.649318] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.649330] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.649350] Call Trace: [ 14.649363] <TASK> [ 14.649388] dump_stack_lvl+0x73/0xb0 [ 14.649416] print_report+0xd1/0x650 [ 14.649438] ? __virt_addr_valid+0x1db/0x2d0 [ 14.649461] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 14.649519] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.649542] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 14.649639] kasan_report+0x141/0x180 [ 14.649680] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 14.649722] kasan_check_range+0x10c/0x1c0 [ 14.649746] __kasan_check_write+0x18/0x20 [ 14.649766] kasan_bitops_modify.constprop.0+0x373/0xd50 [ 14.649824] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.649853] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.649888] ? trace_hardirqs_on+0x37/0xe0 [ 14.649911] ? kasan_bitops_generic+0x92/0x1c0 [ 14.649939] kasan_bitops_generic+0x116/0x1c0 [ 14.649963] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.649988] ? __pfx_read_tsc+0x10/0x10 [ 14.650011] ? ktime_get_ts64+0x86/0x230 [ 14.650215] kunit_try_run_case+0x1a5/0x480 [ 14.650261] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.650284] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.650311] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.650335] ? __kthread_parkme+0x82/0x180 [ 14.650356] ? preempt_count_sub+0x50/0x80 [ 14.650380] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.650405] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.650430] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.650455] kthread+0x337/0x6f0 [ 14.650474] ? trace_preempt_on+0x20/0xc0 [ 14.650496] ? __pfx_kthread+0x10/0x10 [ 14.650517] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.650538] ? calculate_sigpending+0x7b/0xa0 [ 14.650563] ? __pfx_kthread+0x10/0x10 [ 14.650584] ret_from_fork+0x116/0x1d0 [ 14.650603] ? __pfx_kthread+0x10/0x10 [ 14.650622] ret_from_fork_asm+0x1a/0x30 [ 14.650653] </TASK> [ 14.650663] [ 14.659690] Allocated by task 278: [ 14.659890] kasan_save_stack+0x45/0x70 [ 14.660096] kasan_save_track+0x18/0x40 [ 14.660329] kasan_save_alloc_info+0x3b/0x50 [ 14.660677] __kasan_kmalloc+0xb7/0xc0 [ 14.660832] __kmalloc_cache_noprof+0x189/0x420 [ 14.660986] kasan_bitops_generic+0x92/0x1c0 [ 14.661171] kunit_try_run_case+0x1a5/0x480 [ 14.661375] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.661656] kthread+0x337/0x6f0 [ 14.661834] ret_from_fork+0x116/0x1d0 [ 14.662082] ret_from_fork_asm+0x1a/0x30 [ 14.662252] [ 14.662322] The buggy address belongs to the object at ffff88810226cfe0 [ 14.662322] which belongs to the cache kmalloc-16 of size 16 [ 14.662832] The buggy address is located 8 bytes inside of [ 14.662832] allocated 9-byte region [ffff88810226cfe0, ffff88810226cfe9) [ 14.664013] [ 14.665065] The buggy address belongs to the physical page: [ 14.665966] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10226c [ 14.667372] flags: 0x200000000000000(node=0|zone=2) [ 14.668373] page_type: f5(slab) [ 14.668547] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.668797] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.669031] page dumped because: kasan: bad access detected [ 14.669202] [ 14.669273] Memory state around the buggy address: [ 14.669431] ffff88810226ce80: fa fb fc fc 00 04 fc fc 00 00 fc fc 00 04 fc fc [ 14.669646] ffff88810226cf00: 00 04 fc fc 00 00 fc fc fa fb fc fc fa fb fc fc [ 14.672150] >ffff88810226cf80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 14.672835] ^ [ 14.673339] ffff88810226d000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.673758] ffff88810226d080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb [ 14.674265] ================================================================== [ 14.695814] ================================================================== [ 14.696327] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 14.696651] Write of size 8 at addr ffff88810226cfe8 by task kunit_try_catch/278 [ 14.696950] [ 14.697110] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.697160] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.697172] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.697192] Call Trace: [ 14.697205] <TASK> [ 14.697221] dump_stack_lvl+0x73/0xb0 [ 14.697249] print_report+0xd1/0x650 [ 14.697271] ? __virt_addr_valid+0x1db/0x2d0 [ 14.697294] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 14.697321] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.697345] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 14.697372] kasan_report+0x141/0x180 [ 14.697393] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 14.697425] kasan_check_range+0x10c/0x1c0 [ 14.697448] __kasan_check_write+0x18/0x20 [ 14.697469] kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 14.697496] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.697524] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.697548] ? trace_hardirqs_on+0x37/0xe0 [ 14.697570] ? kasan_bitops_generic+0x92/0x1c0 [ 14.697598] kasan_bitops_generic+0x116/0x1c0 [ 14.697621] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.697647] ? __pfx_read_tsc+0x10/0x10 [ 14.697668] ? ktime_get_ts64+0x86/0x230 [ 14.697692] kunit_try_run_case+0x1a5/0x480 [ 14.697729] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.697753] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.697777] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.697801] ? __kthread_parkme+0x82/0x180 [ 14.697821] ? preempt_count_sub+0x50/0x80 [ 14.697845] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.697870] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.697894] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.697919] kthread+0x337/0x6f0 [ 14.697938] ? trace_preempt_on+0x20/0xc0 [ 14.697960] ? __pfx_kthread+0x10/0x10 [ 14.697980] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.698002] ? calculate_sigpending+0x7b/0xa0 [ 14.698082] ? __pfx_kthread+0x10/0x10 [ 14.698107] ret_from_fork+0x116/0x1d0 [ 14.698125] ? __pfx_kthread+0x10/0x10 [ 14.698146] ret_from_fork_asm+0x1a/0x30 [ 14.698177] </TASK> [ 14.698187] [ 14.706615] Allocated by task 278: [ 14.706789] kasan_save_stack+0x45/0x70 [ 14.706981] kasan_save_track+0x18/0x40 [ 14.707418] kasan_save_alloc_info+0x3b/0x50 [ 14.707586] __kasan_kmalloc+0xb7/0xc0 [ 14.707774] __kmalloc_cache_noprof+0x189/0x420 [ 14.707998] kasan_bitops_generic+0x92/0x1c0 [ 14.708221] kunit_try_run_case+0x1a5/0x480 [ 14.708430] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.708605] kthread+0x337/0x6f0 [ 14.708782] ret_from_fork+0x116/0x1d0 [ 14.708967] ret_from_fork_asm+0x1a/0x30 [ 14.709349] [ 14.709440] The buggy address belongs to the object at ffff88810226cfe0 [ 14.709440] which belongs to the cache kmalloc-16 of size 16 [ 14.709838] The buggy address is located 8 bytes inside of [ 14.709838] allocated 9-byte region [ffff88810226cfe0, ffff88810226cfe9) [ 14.710187] [ 14.710265] The buggy address belongs to the physical page: [ 14.710516] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10226c [ 14.710968] flags: 0x200000000000000(node=0|zone=2) [ 14.711321] page_type: f5(slab) [ 14.711447] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.711677] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.711917] page dumped because: kasan: bad access detected [ 14.712327] [ 14.712425] Memory state around the buggy address: [ 14.712654] ffff88810226ce80: fa fb fc fc 00 04 fc fc 00 00 fc fc 00 04 fc fc [ 14.712996] ffff88810226cf00: 00 04 fc fc 00 00 fc fc fa fb fc fc fa fb fc fc [ 14.713846] >ffff88810226cf80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 14.714221] ^ [ 14.714425] ffff88810226d000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.714738] ffff88810226d080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb [ 14.715049] ================================================================== [ 14.715637] ================================================================== [ 14.715908] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50 [ 14.716679] Write of size 8 at addr ffff88810226cfe8 by task kunit_try_catch/278 [ 14.717024] [ 14.717341] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.717384] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.717396] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.717415] Call Trace: [ 14.717429] <TASK> [ 14.717441] dump_stack_lvl+0x73/0xb0 [ 14.717471] print_report+0xd1/0x650 [ 14.717492] ? __virt_addr_valid+0x1db/0x2d0 [ 14.717515] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 14.717542] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.717566] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 14.717594] kasan_report+0x141/0x180 [ 14.717616] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 14.717648] kasan_check_range+0x10c/0x1c0 [ 14.717671] __kasan_check_write+0x18/0x20 [ 14.717690] kasan_bitops_modify.constprop.0+0x547/0xd50 [ 14.717732] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.717760] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.717786] ? trace_hardirqs_on+0x37/0xe0 [ 14.717807] ? kasan_bitops_generic+0x92/0x1c0 [ 14.717836] kasan_bitops_generic+0x116/0x1c0 [ 14.717860] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.717886] ? __pfx_read_tsc+0x10/0x10 [ 14.717906] ? ktime_get_ts64+0x86/0x230 [ 14.717930] kunit_try_run_case+0x1a5/0x480 [ 14.717955] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.717978] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.718002] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.718046] ? __kthread_parkme+0x82/0x180 [ 14.718067] ? preempt_count_sub+0x50/0x80 [ 14.718090] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.718115] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.718140] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.718164] kthread+0x337/0x6f0 [ 14.718184] ? trace_preempt_on+0x20/0xc0 [ 14.718206] ? __pfx_kthread+0x10/0x10 [ 14.718226] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.718248] ? calculate_sigpending+0x7b/0xa0 [ 14.718272] ? __pfx_kthread+0x10/0x10 [ 14.718293] ret_from_fork+0x116/0x1d0 [ 14.718311] ? __pfx_kthread+0x10/0x10 [ 14.718332] ret_from_fork_asm+0x1a/0x30 [ 14.718363] </TASK> [ 14.718374] [ 14.726299] Allocated by task 278: [ 14.726434] kasan_save_stack+0x45/0x70 [ 14.726770] kasan_save_track+0x18/0x40 [ 14.726982] kasan_save_alloc_info+0x3b/0x50 [ 14.727500] __kasan_kmalloc+0xb7/0xc0 [ 14.727652] __kmalloc_cache_noprof+0x189/0x420 [ 14.727865] kasan_bitops_generic+0x92/0x1c0 [ 14.728015] kunit_try_run_case+0x1a5/0x480 [ 14.728282] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.728538] kthread+0x337/0x6f0 [ 14.728713] ret_from_fork+0x116/0x1d0 [ 14.728881] ret_from_fork_asm+0x1a/0x30 [ 14.729133] [ 14.729210] The buggy address belongs to the object at ffff88810226cfe0 [ 14.729210] which belongs to the cache kmalloc-16 of size 16 [ 14.729561] The buggy address is located 8 bytes inside of [ 14.729561] allocated 9-byte region [ffff88810226cfe0, ffff88810226cfe9) [ 14.730033] [ 14.730131] The buggy address belongs to the physical page: [ 14.730382] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10226c [ 14.730766] flags: 0x200000000000000(node=0|zone=2) [ 14.730929] page_type: f5(slab) [ 14.731049] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.731387] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.731725] page dumped because: kasan: bad access detected [ 14.731985] [ 14.732124] Memory state around the buggy address: [ 14.732339] ffff88810226ce80: fa fb fc fc 00 04 fc fc 00 00 fc fc 00 04 fc fc [ 14.732593] ffff88810226cf00: 00 04 fc fc 00 00 fc fc fa fb fc fc fa fb fc fc [ 14.732871] >ffff88810226cf80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 14.733458] ^ [ 14.733742] ffff88810226d000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.733984] ffff88810226d080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb [ 14.734417] ================================================================== [ 14.674757] ================================================================== [ 14.675132] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 14.675648] Write of size 8 at addr ffff88810226cfe8 by task kunit_try_catch/278 [ 14.676080] [ 14.676173] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.676216] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.676228] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.676249] Call Trace: [ 14.676263] <TASK> [ 14.676277] dump_stack_lvl+0x73/0xb0 [ 14.676309] print_report+0xd1/0x650 [ 14.676337] ? __virt_addr_valid+0x1db/0x2d0 [ 14.676360] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 14.676386] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.676422] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 14.676460] kasan_report+0x141/0x180 [ 14.676482] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 14.676514] kasan_check_range+0x10c/0x1c0 [ 14.676611] __kasan_check_write+0x18/0x20 [ 14.676632] kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 14.676661] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.676697] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.676734] ? trace_hardirqs_on+0x37/0xe0 [ 14.676757] ? kasan_bitops_generic+0x92/0x1c0 [ 14.676800] kasan_bitops_generic+0x116/0x1c0 [ 14.676824] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.676850] ? __pfx_read_tsc+0x10/0x10 [ 14.676871] ? ktime_get_ts64+0x86/0x230 [ 14.676895] kunit_try_run_case+0x1a5/0x480 [ 14.676918] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.676941] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.676967] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.676991] ? __kthread_parkme+0x82/0x180 [ 14.677011] ? preempt_count_sub+0x50/0x80 [ 14.677035] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.677129] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.677155] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.677181] kthread+0x337/0x6f0 [ 14.677201] ? trace_preempt_on+0x20/0xc0 [ 14.677224] ? __pfx_kthread+0x10/0x10 [ 14.677245] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.677266] ? calculate_sigpending+0x7b/0xa0 [ 14.677291] ? __pfx_kthread+0x10/0x10 [ 14.677313] ret_from_fork+0x116/0x1d0 [ 14.677333] ? __pfx_kthread+0x10/0x10 [ 14.677353] ret_from_fork_asm+0x1a/0x30 [ 14.677384] </TASK> [ 14.677394] [ 14.686264] Allocated by task 278: [ 14.686438] kasan_save_stack+0x45/0x70 [ 14.686581] kasan_save_track+0x18/0x40 [ 14.686803] kasan_save_alloc_info+0x3b/0x50 [ 14.687020] __kasan_kmalloc+0xb7/0xc0 [ 14.687323] __kmalloc_cache_noprof+0x189/0x420 [ 14.687542] kasan_bitops_generic+0x92/0x1c0 [ 14.687784] kunit_try_run_case+0x1a5/0x480 [ 14.687980] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.688445] kthread+0x337/0x6f0 [ 14.688664] ret_from_fork+0x116/0x1d0 [ 14.688870] ret_from_fork_asm+0x1a/0x30 [ 14.689160] [ 14.689255] The buggy address belongs to the object at ffff88810226cfe0 [ 14.689255] which belongs to the cache kmalloc-16 of size 16 [ 14.689780] The buggy address is located 8 bytes inside of [ 14.689780] allocated 9-byte region [ffff88810226cfe0, ffff88810226cfe9) [ 14.690217] [ 14.690290] The buggy address belongs to the physical page: [ 14.690462] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10226c [ 14.690963] flags: 0x200000000000000(node=0|zone=2) [ 14.691443] page_type: f5(slab) [ 14.691653] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.692009] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.692550] page dumped because: kasan: bad access detected [ 14.692771] [ 14.692842] Memory state around the buggy address: [ 14.692996] ffff88810226ce80: fa fb fc fc 00 04 fc fc 00 00 fc fc 00 04 fc fc [ 14.693301] ffff88810226cf00: 00 04 fc fc 00 00 fc fc fa fb fc fc fa fb fc fc [ 14.693748] >ffff88810226cf80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 14.694199] ^ [ 14.694419] ffff88810226d000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.694739] ffff88810226d080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb [ 14.695147] ================================================================== [ 14.557089] ================================================================== [ 14.558042] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50 [ 14.558728] Write of size 8 at addr ffff88810226cfe8 by task kunit_try_catch/278 [ 14.558969] [ 14.559070] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.559116] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.559128] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.559151] Call Trace: [ 14.559164] <TASK> [ 14.559181] dump_stack_lvl+0x73/0xb0 [ 14.559212] print_report+0xd1/0x650 [ 14.559234] ? __virt_addr_valid+0x1db/0x2d0 [ 14.559258] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 14.559285] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.559308] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 14.559335] kasan_report+0x141/0x180 [ 14.559357] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 14.559388] kasan_check_range+0x10c/0x1c0 [ 14.559411] __kasan_check_write+0x18/0x20 [ 14.559431] kasan_bitops_modify.constprop.0+0x101/0xd50 [ 14.559457] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.559485] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.559509] ? trace_hardirqs_on+0x37/0xe0 [ 14.559534] ? kasan_bitops_generic+0x92/0x1c0 [ 14.559562] kasan_bitops_generic+0x116/0x1c0 [ 14.559586] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.559612] ? __pfx_read_tsc+0x10/0x10 [ 14.559634] ? ktime_get_ts64+0x86/0x230 [ 14.559659] kunit_try_run_case+0x1a5/0x480 [ 14.559685] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.559718] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.559743] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.559768] ? __kthread_parkme+0x82/0x180 [ 14.559788] ? preempt_count_sub+0x50/0x80 [ 14.559813] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.559837] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.559862] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.559888] kthread+0x337/0x6f0 [ 14.559906] ? trace_preempt_on+0x20/0xc0 [ 14.559928] ? __pfx_kthread+0x10/0x10 [ 14.559948] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.559969] ? calculate_sigpending+0x7b/0xa0 [ 14.559994] ? __pfx_kthread+0x10/0x10 [ 14.560014] ret_from_fork+0x116/0x1d0 [ 14.560034] ? __pfx_kthread+0x10/0x10 [ 14.560054] ret_from_fork_asm+0x1a/0x30 [ 14.560086] </TASK> [ 14.560097] [ 14.574508] Allocated by task 278: [ 14.574650] kasan_save_stack+0x45/0x70 [ 14.574814] kasan_save_track+0x18/0x40 [ 14.574953] kasan_save_alloc_info+0x3b/0x50 [ 14.575190] __kasan_kmalloc+0xb7/0xc0 [ 14.575323] __kmalloc_cache_noprof+0x189/0x420 [ 14.575592] kasan_bitops_generic+0x92/0x1c0 [ 14.575871] kunit_try_run_case+0x1a5/0x480 [ 14.576137] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.576365] kthread+0x337/0x6f0 [ 14.576486] ret_from_fork+0x116/0x1d0 [ 14.576673] ret_from_fork_asm+0x1a/0x30 [ 14.576901] [ 14.577014] The buggy address belongs to the object at ffff88810226cfe0 [ 14.577014] which belongs to the cache kmalloc-16 of size 16 [ 14.577566] The buggy address is located 8 bytes inside of [ 14.577566] allocated 9-byte region [ffff88810226cfe0, ffff88810226cfe9) [ 14.578376] [ 14.578543] The buggy address belongs to the physical page: [ 14.578813] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10226c [ 14.579068] flags: 0x200000000000000(node=0|zone=2) [ 14.579299] page_type: f5(slab) [ 14.579613] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.579917] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.580530] page dumped because: kasan: bad access detected [ 14.580787] [ 14.580896] Memory state around the buggy address: [ 14.581069] ffff88810226ce80: fa fb fc fc 00 04 fc fc 00 00 fc fc 00 04 fc fc [ 14.581468] ffff88810226cf00: 00 04 fc fc 00 00 fc fc fa fb fc fc fa fb fc fc [ 14.581805] >ffff88810226cf80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 14.582094] ^ [ 14.582404] ffff88810226d000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.582927] ffff88810226d080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb [ 14.583300] ================================================================== [ 14.584176] ================================================================== [ 14.584699] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 14.585118] Write of size 8 at addr ffff88810226cfe8 by task kunit_try_catch/278 [ 14.585518] [ 14.585926] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.585971] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.585983] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.586003] Call Trace: [ 14.586014] <TASK> [ 14.586029] dump_stack_lvl+0x73/0xb0 [ 14.586058] print_report+0xd1/0x650 [ 14.586080] ? __virt_addr_valid+0x1db/0x2d0 [ 14.586102] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 14.586129] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.586152] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 14.586179] kasan_report+0x141/0x180 [ 14.586201] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 14.586232] kasan_check_range+0x10c/0x1c0 [ 14.586256] __kasan_check_write+0x18/0x20 [ 14.586275] kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 14.586302] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.586330] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.586353] ? trace_hardirqs_on+0x37/0xe0 [ 14.586377] ? kasan_bitops_generic+0x92/0x1c0 [ 14.586406] kasan_bitops_generic+0x116/0x1c0 [ 14.586544] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.586575] ? __pfx_read_tsc+0x10/0x10 [ 14.586596] ? ktime_get_ts64+0x86/0x230 [ 14.586620] kunit_try_run_case+0x1a5/0x480 [ 14.586644] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.586667] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.586692] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.586726] ? __kthread_parkme+0x82/0x180 [ 14.586747] ? preempt_count_sub+0x50/0x80 [ 14.586772] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.586806] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.586831] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.586856] kthread+0x337/0x6f0 [ 14.586875] ? trace_preempt_on+0x20/0xc0 [ 14.586898] ? __pfx_kthread+0x10/0x10 [ 14.586919] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.586940] ? calculate_sigpending+0x7b/0xa0 [ 14.586964] ? __pfx_kthread+0x10/0x10 [ 14.586986] ret_from_fork+0x116/0x1d0 [ 14.587005] ? __pfx_kthread+0x10/0x10 [ 14.587073] ret_from_fork_asm+0x1a/0x30 [ 14.587107] </TASK> [ 14.587116] [ 14.596498] Allocated by task 278: [ 14.596679] kasan_save_stack+0x45/0x70 [ 14.596895] kasan_save_track+0x18/0x40 [ 14.597133] kasan_save_alloc_info+0x3b/0x50 [ 14.597299] __kasan_kmalloc+0xb7/0xc0 [ 14.597476] __kmalloc_cache_noprof+0x189/0x420 [ 14.597693] kasan_bitops_generic+0x92/0x1c0 [ 14.597853] kunit_try_run_case+0x1a5/0x480 [ 14.598057] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.598444] kthread+0x337/0x6f0 [ 14.598618] ret_from_fork+0x116/0x1d0 [ 14.598819] ret_from_fork_asm+0x1a/0x30 [ 14.599073] [ 14.599161] The buggy address belongs to the object at ffff88810226cfe0 [ 14.599161] which belongs to the cache kmalloc-16 of size 16 [ 14.599510] The buggy address is located 8 bytes inside of [ 14.599510] allocated 9-byte region [ffff88810226cfe0, ffff88810226cfe9) [ 14.600019] [ 14.600117] The buggy address belongs to the physical page: [ 14.600631] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10226c [ 14.601127] flags: 0x200000000000000(node=0|zone=2) [ 14.601286] page_type: f5(slab) [ 14.601404] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.602072] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.602408] page dumped because: kasan: bad access detected [ 14.602812] [ 14.602911] Memory state around the buggy address: [ 14.603348] ffff88810226ce80: fa fb fc fc 00 04 fc fc 00 00 fc fc 00 04 fc fc [ 14.603571] ffff88810226cf00: 00 04 fc fc 00 00 fc fc fa fb fc fc fa fb fc fc [ 14.603800] >ffff88810226cf80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 14.604266] ^ [ 14.604613] ffff88810226d000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 14.604956] ffff88810226d080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb [ 14.605384] ==================================================================