Date
June 7, 2025, 10:40 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 25.790505] ================================================================== [ 25.790981] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc0 [ 25.791148] Write of size 8 at addr fff00000c57223e8 by task kunit_try_catch/265 [ 25.791552] [ 25.791699] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT [ 25.791933] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.792014] Hardware name: linux,dummy-virt (DT) [ 25.792868] Call trace: [ 25.793005] show_stack+0x20/0x38 (C) [ 25.793143] dump_stack_lvl+0x8c/0xd0 [ 25.793269] print_report+0x118/0x608 [ 25.794086] kasan_report+0xdc/0x128 [ 25.794237] kasan_check_range+0x100/0x1a8 [ 25.794457] __kasan_check_write+0x20/0x30 [ 25.795003] kasan_bitops_modify.constprop.0+0x3b0/0xbc0 [ 25.795287] kasan_bitops_generic+0x110/0x1c8 [ 25.795470] kunit_try_run_case+0x170/0x3f0 [ 25.796028] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.796173] kthread+0x328/0x630 [ 25.796690] ret_from_fork+0x10/0x20 [ 25.797044] [ 25.797262] Allocated by task 265: [ 25.797371] kasan_save_stack+0x3c/0x68 [ 25.797552] kasan_save_track+0x20/0x40 [ 25.797654] kasan_save_alloc_info+0x40/0x58 [ 25.798179] __kasan_kmalloc+0xd4/0xd8 [ 25.798297] __kmalloc_cache_noprof+0x16c/0x3c0 [ 25.798655] kasan_bitops_generic+0xa0/0x1c8 [ 25.798773] kunit_try_run_case+0x170/0x3f0 [ 25.798883] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.798990] kthread+0x328/0x630 [ 25.799066] ret_from_fork+0x10/0x20 [ 25.799155] [ 25.799208] The buggy address belongs to the object at fff00000c57223e0 [ 25.799208] which belongs to the cache kmalloc-16 of size 16 [ 25.800542] The buggy address is located 8 bytes inside of [ 25.800542] allocated 9-byte region [fff00000c57223e0, fff00000c57223e9) [ 25.800800] [ 25.800859] The buggy address belongs to the physical page: [ 25.801338] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105722 [ 25.801888] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.802055] page_type: f5(slab) [ 25.802159] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 25.802286] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 25.802841] page dumped because: kasan: bad access detected [ 25.803175] [ 25.803412] Memory state around the buggy address: [ 25.803549] fff00000c5722280: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 25.803670] fff00000c5722300: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.803861] >fff00000c5722380: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 25.804325] ^ [ 25.804662] fff00000c5722400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.805027] fff00000c5722480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.805142] ================================================================== [ 25.724077] ================================================================== [ 25.724215] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc0 [ 25.725308] Write of size 8 at addr fff00000c57223e8 by task kunit_try_catch/265 [ 25.725579] [ 25.725761] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT [ 25.726056] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.726140] Hardware name: linux,dummy-virt (DT) [ 25.726226] Call trace: [ 25.726706] show_stack+0x20/0x38 (C) [ 25.726888] dump_stack_lvl+0x8c/0xd0 [ 25.727194] print_report+0x118/0x608 [ 25.727337] kasan_report+0xdc/0x128 [ 25.727472] kasan_check_range+0x100/0x1a8 [ 25.727612] __kasan_check_write+0x20/0x30 [ 25.728706] kasan_bitops_modify.constprop.0+0x2b4/0xbc0 [ 25.729156] kasan_bitops_generic+0x110/0x1c8 [ 25.729298] kunit_try_run_case+0x170/0x3f0 [ 25.729448] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.730555] kthread+0x328/0x630 [ 25.730705] ret_from_fork+0x10/0x20 [ 25.731158] [ 25.731213] Allocated by task 265: [ 25.731542] kasan_save_stack+0x3c/0x68 [ 25.732015] kasan_save_track+0x20/0x40 [ 25.732183] kasan_save_alloc_info+0x40/0x58 [ 25.732632] __kasan_kmalloc+0xd4/0xd8 [ 25.732776] __kmalloc_cache_noprof+0x16c/0x3c0 [ 25.732898] kasan_bitops_generic+0xa0/0x1c8 [ 25.733053] kunit_try_run_case+0x170/0x3f0 [ 25.733212] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.733333] kthread+0x328/0x630 [ 25.733665] ret_from_fork+0x10/0x20 [ 25.733947] [ 25.734054] The buggy address belongs to the object at fff00000c57223e0 [ 25.734054] which belongs to the cache kmalloc-16 of size 16 [ 25.734207] The buggy address is located 8 bytes inside of [ 25.734207] allocated 9-byte region [fff00000c57223e0, fff00000c57223e9) [ 25.734758] [ 25.734836] The buggy address belongs to the physical page: [ 25.735302] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105722 [ 25.735585] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.736191] page_type: f5(slab) [ 25.736330] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 25.736603] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 25.737111] page dumped because: kasan: bad access detected [ 25.737207] [ 25.737263] Memory state around the buggy address: [ 25.737357] fff00000c5722280: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 25.737484] fff00000c5722300: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.737608] >fff00000c5722380: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 25.737718] ^ [ 25.738086] fff00000c5722400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.738632] fff00000c5722480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.739161] ================================================================== [ 25.808480] ================================================================== [ 25.808617] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa20/0xbc0 [ 25.809585] Read of size 8 at addr fff00000c57223e8 by task kunit_try_catch/265 [ 25.809964] [ 25.810078] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT [ 25.810314] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.810390] Hardware name: linux,dummy-virt (DT) [ 25.810483] Call trace: [ 25.811267] show_stack+0x20/0x38 (C) [ 25.811438] dump_stack_lvl+0x8c/0xd0 [ 25.811570] print_report+0x118/0x608 [ 25.811689] kasan_report+0xdc/0x128 [ 25.812356] __asan_report_load8_noabort+0x20/0x30 [ 25.812884] kasan_bitops_modify.constprop.0+0xa20/0xbc0 [ 25.813373] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.818731] [ 25.820720] page dumped because: kasan: bad access detected [ 25.825163] ================================================================== [ 25.741500] ================================================================== [ 25.741632] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc0 [ 25.741763] Write of size 8 at addr fff00000c57223e8 by task kunit_try_catch/265 [ 25.741888] [ 25.741978] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT [ 25.742186] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.742880] Hardware name: linux,dummy-virt (DT) [ 25.743223] Call trace: [ 25.743305] show_stack+0x20/0x38 (C) [ 25.743871] dump_stack_lvl+0x8c/0xd0 [ 25.744002] print_report+0x118/0x608 [ 25.744913] kasan_report+0xdc/0x128 [ 25.745191] kasan_check_range+0x100/0x1a8 [ 25.745311] __kasan_check_write+0x20/0x30 [ 25.745874] kasan_bitops_modify.constprop.0+0x320/0xbc0 [ 25.746412] kasan_bitops_generic+0x110/0x1c8 [ 25.746695] kunit_try_run_case+0x170/0x3f0 [ 25.747045] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.747212] kthread+0x328/0x630 [ 25.747332] ret_from_fork+0x10/0x20 [ 25.747477] [ 25.747531] Allocated by task 265: [ 25.747612] kasan_save_stack+0x3c/0x68 [ 25.747728] kasan_save_track+0x20/0x40 [ 25.747830] kasan_save_alloc_info+0x40/0x58 [ 25.747932] __kasan_kmalloc+0xd4/0xd8 [ 25.748358] __kmalloc_cache_noprof+0x16c/0x3c0 [ 25.749605] kasan_bitops_generic+0xa0/0x1c8 [ 25.749718] kunit_try_run_case+0x170/0x3f0 [ 25.749836] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.749959] kthread+0x328/0x630 [ 25.750053] ret_from_fork+0x10/0x20 [ 25.750718] [ 25.750786] The buggy address belongs to the object at fff00000c57223e0 [ 25.750786] which belongs to the cache kmalloc-16 of size 16 [ 25.751137] The buggy address is located 8 bytes inside of [ 25.751137] allocated 9-byte region [fff00000c57223e0, fff00000c57223e9) [ 25.751315] [ 25.751763] The buggy address belongs to the physical page: [ 25.751895] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105722 [ 25.752256] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.752851] page_type: f5(slab) [ 25.752976] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 25.753109] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 25.753224] page dumped because: kasan: bad access detected [ 25.753315] [ 25.753366] Memory state around the buggy address: [ 25.754050] fff00000c5722280: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 25.754637] fff00000c5722300: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.754793] >fff00000c5722380: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 25.754973] ^ [ 25.755467] fff00000c5722400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.755619] fff00000c5722480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.755728] ================================================================== [ 25.670733] ================================================================== [ 25.671272] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 25.671963] Read of size 8 at addr fff00000c57223e8 by task kunit_try_catch/265 [ 25.672124] [ 25.672225] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT [ 25.672458] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.673995] Hardware name: linux,dummy-virt (DT) [ 25.674742] Call trace: [ 25.675263] show_stack+0x20/0x38 (C) [ 25.675970] dump_stack_lvl+0x8c/0xd0 [ 25.676555] print_report+0x118/0x608 [ 25.677256] kasan_report+0xdc/0x128 [ 25.677639] __asan_report_load8_noabort+0x20/0x30 [ 25.678164] kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 25.678327] kasan_bitops_generic+0x110/0x1c8 [ 25.679601] kunit_try_run_case+0x170/0x3f0 [ 25.680046] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.680515] kthread+0x328/0x630 [ 25.680976] ret_from_fork+0x10/0x20 [ 25.681620] [ 25.681946] Allocated by task 265: [ 25.682071] kasan_save_stack+0x3c/0x68 [ 25.683046] kasan_save_track+0x20/0x40 [ 25.683515] kasan_save_alloc_info+0x40/0x58 [ 25.684495] __kasan_kmalloc+0xd4/0xd8 [ 25.684616] __kmalloc_cache_noprof+0x16c/0x3c0 [ 25.684734] kasan_bitops_generic+0xa0/0x1c8 [ 25.684835] kunit_try_run_case+0x170/0x3f0 [ 25.684942] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.685067] kthread+0x328/0x630 [ 25.685166] ret_from_fork+0x10/0x20 [ 25.685263] [ 25.685318] The buggy address belongs to the object at fff00000c57223e0 [ 25.685318] which belongs to the cache kmalloc-16 of size 16 [ 25.687095] The buggy address is located 8 bytes inside of [ 25.687095] allocated 9-byte region [fff00000c57223e0, fff00000c57223e9) [ 25.687281] [ 25.687336] The buggy address belongs to the physical page: [ 25.687819] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105722 [ 25.687978] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.688104] page_type: f5(slab) [ 25.688195] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 25.688300] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 25.688394] page dumped because: kasan: bad access detected [ 25.688798] [ 25.688943] Memory state around the buggy address: [ 25.689067] fff00000c5722280: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 25.689198] fff00000c5722300: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.689318] >fff00000c5722380: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 25.689668] ^ [ 25.689765] fff00000c5722400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.689943] fff00000c5722480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.690038] ================================================================== [ 25.641729] ================================================================== [ 25.642040] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 25.642228] Write of size 8 at addr fff00000c57223e8 by task kunit_try_catch/265 [ 25.642414] [ 25.642505] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT [ 25.642736] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.643231] Hardware name: linux,dummy-virt (DT) [ 25.643309] Call trace: [ 25.643368] show_stack+0x20/0x38 (C) [ 25.643502] dump_stack_lvl+0x8c/0xd0 [ 25.643621] print_report+0x118/0x608 [ 25.643734] kasan_report+0xdc/0x128 [ 25.643860] kasan_check_range+0x100/0x1a8 [ 25.643975] __kasan_check_write+0x20/0x30 [ 25.644394] kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 25.644585] kasan_bitops_generic+0x110/0x1c8 [ 25.644728] kunit_try_run_case+0x170/0x3f0 [ 25.644856] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.645000] kthread+0x328/0x630 [ 25.645110] ret_from_fork+0x10/0x20 [ 25.645240] [ 25.645288] Allocated by task 265: [ 25.645365] kasan_save_stack+0x3c/0x68 [ 25.645882] kasan_save_track+0x20/0x40 [ 25.646065] kasan_save_alloc_info+0x40/0x58 [ 25.646328] __kasan_kmalloc+0xd4/0xd8 [ 25.646535] __kmalloc_cache_noprof+0x16c/0x3c0 [ 25.646652] kasan_bitops_generic+0xa0/0x1c8 [ 25.647244] kunit_try_run_case+0x170/0x3f0 [ 25.647614] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.647800] kthread+0x328/0x630 [ 25.648342] ret_from_fork+0x10/0x20 [ 25.648499] [ 25.649076] The buggy address belongs to the object at fff00000c57223e0 [ 25.649076] which belongs to the cache kmalloc-16 of size 16 [ 25.649811] The buggy address is located 8 bytes inside of [ 25.649811] allocated 9-byte region [fff00000c57223e0, fff00000c57223e9) [ 25.650218] [ 25.650531] The buggy address belongs to the physical page: [ 25.651095] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105722 [ 25.651298] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.651432] page_type: f5(slab) [ 25.652199] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 25.652534] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 25.652676] page dumped because: kasan: bad access detected [ 25.652865] [ 25.653024] Memory state around the buggy address: [ 25.653398] fff00000c5722280: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 25.653541] fff00000c5722300: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.653664] >fff00000c5722380: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 25.653776] ^ [ 25.655470] fff00000c5722400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.656018] fff00000c5722480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.656256] ================================================================== [ 25.696270] ================================================================== [ 25.697489] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc0 [ 25.697663] Write of size 8 at addr fff00000c57223e8 by task kunit_try_catch/265 [ 25.697772] [ 25.697858] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT [ 25.698058] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.698113] Hardware name: linux,dummy-virt (DT) [ 25.698177] Call trace: [ 25.699548] show_stack+0x20/0x38 (C) [ 25.699721] dump_stack_lvl+0x8c/0xd0 [ 25.699855] print_report+0x118/0x608 [ 25.699975] kasan_report+0xdc/0x128 [ 25.700100] kasan_check_range+0x100/0x1a8 [ 25.700228] __kasan_check_write+0x20/0x30 [ 25.701129] kasan_bitops_modify.constprop.0+0x1dc/0xbc0 [ 25.702575] kasan_bitops_generic+0x110/0x1c8 [ 25.702747] kunit_try_run_case+0x170/0x3f0 [ 25.702883] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.703034] kthread+0x328/0x630 [ 25.703821] ret_from_fork+0x10/0x20 [ 25.703985] [ 25.704034] Allocated by task 265: [ 25.704108] kasan_save_stack+0x3c/0x68 [ 25.704194] kasan_save_track+0x20/0x40 [ 25.704282] kasan_save_alloc_info+0x40/0x58 [ 25.704386] __kasan_kmalloc+0xd4/0xd8 [ 25.704508] __kmalloc_cache_noprof+0x16c/0x3c0 [ 25.704663] kasan_bitops_generic+0xa0/0x1c8 [ 25.704801] kunit_try_run_case+0x170/0x3f0 [ 25.704917] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.705078] kthread+0x328/0x630 [ 25.705202] ret_from_fork+0x10/0x20 [ 25.705296] [ 25.705372] The buggy address belongs to the object at fff00000c57223e0 [ 25.705372] which belongs to the cache kmalloc-16 of size 16 [ 25.705525] The buggy address is located 8 bytes inside of [ 25.705525] allocated 9-byte region [fff00000c57223e0, fff00000c57223e9) [ 25.705675] [ 25.705737] The buggy address belongs to the physical page: [ 25.705890] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105722 [ 25.706083] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.706538] page_type: f5(slab) [ 25.706754] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 25.707169] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 25.707335] page dumped because: kasan: bad access detected [ 25.707456] [ 25.707501] Memory state around the buggy address: [ 25.707586] fff00000c5722280: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 25.707931] fff00000c5722300: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.708082] >fff00000c5722380: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 25.708188] ^ [ 25.708301] fff00000c5722400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.708454] fff00000c5722480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.708710] ================================================================== [ 25.759419] ================================================================== [ 25.759634] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaec/0xbc0 [ 25.760200] Read of size 8 at addr fff00000c57223e8 by task kunit_try_catch/265 [ 25.760365] [ 25.760475] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT [ 25.760696] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.760771] Hardware name: linux,dummy-virt (DT) [ 25.760856] Call trace: [ 25.761425] show_stack+0x20/0x38 (C) [ 25.761966] dump_stack_lvl+0x8c/0xd0 [ 25.762124] print_report+0x118/0x608 [ 25.762255] kasan_report+0xdc/0x128 [ 25.762384] __asan_report_load8_noabort+0x20/0x30 [ 25.762712] kasan_bitops_modify.constprop.0+0xaec/0xbc0 [ 25.763295] kasan_bitops_generic+0x110/0x1c8 [ 25.763422] kunit_try_run_case+0x170/0x3f0 [ 25.763588] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.763813] kthread+0x328/0x630 [ 25.763965] ret_from_fork+0x10/0x20 [ 25.764168] [ 25.764231] Allocated by task 265: [ 25.764734] kasan_save_stack+0x3c/0x68 [ 25.764878] kasan_save_track+0x20/0x40 [ 25.764977] kasan_save_alloc_info+0x40/0x58 [ 25.765200] __kasan_kmalloc+0xd4/0xd8 [ 25.765535] __kmalloc_cache_noprof+0x16c/0x3c0 [ 25.765656] kasan_bitops_generic+0xa0/0x1c8 [ 25.765764] kunit_try_run_case+0x170/0x3f0 [ 25.766373] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.766715] kthread+0x328/0x630 [ 25.766827] ret_from_fork+0x10/0x20 [ 25.766922] [ 25.767219] The buggy address belongs to the object at fff00000c57223e0 [ 25.767219] which belongs to the cache kmalloc-16 of size 16 [ 25.767390] The buggy address is located 8 bytes inside of [ 25.767390] allocated 9-byte region [fff00000c57223e0, fff00000c57223e9) [ 25.767576] [ 25.767632] The buggy address belongs to the physical page: [ 25.767726] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105722 [ 25.767864] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.768031] page_type: f5(slab) [ 25.768147] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 25.768286] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 25.768396] page dumped because: kasan: bad access detected [ 25.768497] [ 25.768552] Memory state around the buggy address: [ 25.768633] fff00000c5722280: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 25.768755] fff00000c5722300: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.768877] >fff00000c5722380: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 25.768985] ^ [ 25.769097] fff00000c5722400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.769223] fff00000c5722480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.769349] ================================================================== [ 25.710543] ================================================================== [ 25.710679] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbc0 [ 25.710809] Read of size 8 at addr fff00000c57223e8 by task kunit_try_catch/265 [ 25.710947] [ 25.711037] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT [ 25.711252] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.711327] Hardware name: linux,dummy-virt (DT) [ 25.713443] Call trace: [ 25.713589] show_stack+0x20/0x38 (C) [ 25.713792] dump_stack_lvl+0x8c/0xd0 [ 25.713935] print_report+0x118/0x608 [ 25.714082] kasan_report+0xdc/0x128 [ 25.714191] __asan_report_load8_noabort+0x20/0x30 [ 25.714451] kasan_bitops_modify.constprop.0+0xa80/0xbc0 [ 25.714576] kasan_bitops_generic+0x110/0x1c8 [ 25.714752] kunit_try_run_case+0x170/0x3f0 [ 25.714999] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.715362] kthread+0x328/0x630 [ 25.715576] ret_from_fork+0x10/0x20 [ 25.715856] [ 25.715929] Allocated by task 265: [ 25.716014] kasan_save_stack+0x3c/0x68 [ 25.716195] kasan_save_track+0x20/0x40 [ 25.716298] kasan_save_alloc_info+0x40/0x58 [ 25.716411] __kasan_kmalloc+0xd4/0xd8 [ 25.716512] __kmalloc_cache_noprof+0x16c/0x3c0 [ 25.716615] kasan_bitops_generic+0xa0/0x1c8 [ 25.716728] kunit_try_run_case+0x170/0x3f0 [ 25.716838] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.716954] kthread+0x328/0x630 [ 25.717810] ret_from_fork+0x10/0x20 [ 25.717959] [ 25.718021] The buggy address belongs to the object at fff00000c57223e0 [ 25.718021] which belongs to the cache kmalloc-16 of size 16 [ 25.718176] The buggy address is located 8 bytes inside of [ 25.718176] allocated 9-byte region [fff00000c57223e0, fff00000c57223e9) [ 25.718350] [ 25.718500] The buggy address belongs to the physical page: [ 25.718578] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105722 [ 25.719147] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.719294] page_type: f5(slab) [ 25.719491] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 25.719627] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 25.719733] page dumped because: kasan: bad access detected [ 25.719829] [ 25.719881] Memory state around the buggy address: [ 25.719966] fff00000c5722280: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 25.720084] fff00000c5722300: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.720227] >fff00000c5722380: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 25.720335] ^ [ 25.721202] fff00000c5722400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.721333] fff00000c5722480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.721499] ================================================================== [ 25.773205] ================================================================== [ 25.773341] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc0 [ 25.773479] Write of size 8 at addr fff00000c57223e8 by task kunit_try_catch/265 [ 25.773601] [ 25.773695] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT [ 25.773902] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.773970] Hardware name: linux,dummy-virt (DT) [ 25.774050] Call trace: [ 25.774114] show_stack+0x20/0x38 (C) [ 25.774243] dump_stack_lvl+0x8c/0xd0 [ 25.774379] print_report+0x118/0x608 [ 25.775667] kasan_report+0xdc/0x128 [ 25.775883] kasan_check_range+0x100/0x1a8 [ 25.776085] __kasan_check_write+0x20/0x30 [ 25.776487] kasan_bitops_modify.constprop.0+0x344/0xbc0 [ 25.777014] kasan_bitops_generic+0x110/0x1c8 [ 25.777669] kunit_try_run_case+0x170/0x3f0 [ 25.778352] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.778569] kthread+0x328/0x630 [ 25.778799] ret_from_fork+0x10/0x20 [ 25.779022] [ 25.779116] Allocated by task 265: [ 25.779199] kasan_save_stack+0x3c/0x68 [ 25.779764] kasan_save_track+0x20/0x40 [ 25.779976] kasan_save_alloc_info+0x40/0x58 [ 25.780086] __kasan_kmalloc+0xd4/0xd8 [ 25.780223] __kmalloc_cache_noprof+0x16c/0x3c0 [ 25.780435] kasan_bitops_generic+0xa0/0x1c8 [ 25.780558] kunit_try_run_case+0x170/0x3f0 [ 25.781097] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.781421] kthread+0x328/0x630 [ 25.781621] ret_from_fork+0x10/0x20 [ 25.782002] [ 25.782086] The buggy address belongs to the object at fff00000c57223e0 [ 25.782086] which belongs to the cache kmalloc-16 of size 16 [ 25.782459] The buggy address is located 8 bytes inside of [ 25.782459] allocated 9-byte region [fff00000c57223e0, fff00000c57223e9) [ 25.782957] [ 25.783022] The buggy address belongs to the physical page: [ 25.783109] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105722 [ 25.783227] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.783349] page_type: f5(slab) [ 25.784494] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 25.784894] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 25.785435] page dumped because: kasan: bad access detected [ 25.785770] [ 25.786113] Memory state around the buggy address: [ 25.786216] fff00000c5722280: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 25.786749] fff00000c5722300: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.786886] >fff00000c5722380: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 25.787046] ^ [ 25.787207] fff00000c5722400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.787393] fff00000c5722480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.787582] ==================================================================
[ 16.086590] ================================================================== [ 16.086933] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 16.087419] Write of size 8 at addr ffff888102497648 by task kunit_try_catch/281 [ 16.087890] [ 16.088081] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT(voluntary) [ 16.088153] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.088169] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.088204] Call Trace: [ 16.088231] <TASK> [ 16.088253] dump_stack_lvl+0x73/0xb0 [ 16.088301] print_report+0xd1/0x650 [ 16.088338] ? __virt_addr_valid+0x1db/0x2d0 [ 16.088365] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 16.088389] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.088426] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 16.088449] kasan_report+0x141/0x180 [ 16.088474] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 16.088500] kasan_check_range+0x10c/0x1c0 [ 16.088521] __kasan_check_write+0x18/0x20 [ 16.088541] kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 16.088580] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 16.088617] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.088764] ? trace_hardirqs_on+0x37/0xe0 [ 16.088799] ? kasan_bitops_generic+0x92/0x1c0 [ 16.088826] kasan_bitops_generic+0x116/0x1c0 [ 16.088850] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 16.088872] ? __pfx_read_tsc+0x10/0x10 [ 16.088895] ? ktime_get_ts64+0x86/0x230 [ 16.088922] kunit_try_run_case+0x1a5/0x480 [ 16.088948] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.088970] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.088996] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.089020] ? __kthread_parkme+0x82/0x180 [ 16.089041] ? preempt_count_sub+0x50/0x80 [ 16.089067] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.089092] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.089114] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.089137] kthread+0x337/0x6f0 [ 16.089155] ? trace_preempt_on+0x20/0xc0 [ 16.089177] ? __pfx_kthread+0x10/0x10 [ 16.089199] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.089228] ? calculate_sigpending+0x7b/0xa0 [ 16.089250] ? __pfx_kthread+0x10/0x10 [ 16.089269] ret_from_fork+0x41/0x80 [ 16.089289] ? __pfx_kthread+0x10/0x10 [ 16.089308] ret_from_fork_asm+0x1a/0x30 [ 16.089339] </TASK> [ 16.089352] [ 16.096445] Allocated by task 281: [ 16.096567] kasan_save_stack+0x45/0x70 [ 16.096858] kasan_save_track+0x18/0x40 [ 16.097064] kasan_save_alloc_info+0x3b/0x50 [ 16.097319] __kasan_kmalloc+0xb7/0xc0 [ 16.097540] __kmalloc_cache_noprof+0x189/0x420 [ 16.098160] kasan_bitops_generic+0x92/0x1c0 [ 16.098415] kunit_try_run_case+0x1a5/0x480 [ 16.098575] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.098844] kthread+0x337/0x6f0 [ 16.099024] ret_from_fork+0x41/0x80 [ 16.099213] ret_from_fork_asm+0x1a/0x30 [ 16.099396] [ 16.099518] The buggy address belongs to the object at ffff888102497640 [ 16.099518] which belongs to the cache kmalloc-16 of size 16 [ 16.100111] The buggy address is located 8 bytes inside of [ 16.100111] allocated 9-byte region [ffff888102497640, ffff888102497649) [ 16.100533] [ 16.100626] The buggy address belongs to the physical page: [ 16.100796] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102497 [ 16.100949] flags: 0x200000000000000(node=0|zone=2) [ 16.101064] page_type: f5(slab) [ 16.101157] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 16.101300] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 16.101436] page dumped because: kasan: bad access detected [ 16.102163] [ 16.102306] Memory state around the buggy address: [ 16.103260] ffff888102497500: 00 01 fc fc 00 01 fc fc fa fb fc fc fa fb fc fc [ 16.103648] ffff888102497580: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 16.103956] >ffff888102497600: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 16.104087] ^ [ 16.104199] ffff888102497680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.104330] ffff888102497700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.104950] ================================================================== [ 16.061789] ================================================================== [ 16.062789] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50 [ 16.063275] Write of size 8 at addr ffff888102497648 by task kunit_try_catch/281 [ 16.063786] [ 16.063917] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT(voluntary) [ 16.063984] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.064000] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.064268] Call Trace: [ 16.064303] <TASK> [ 16.064327] dump_stack_lvl+0x73/0xb0 [ 16.064370] print_report+0xd1/0x650 [ 16.064399] ? __virt_addr_valid+0x1db/0x2d0 [ 16.064424] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 16.064449] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.064474] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 16.064496] kasan_report+0x141/0x180 [ 16.064520] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 16.064547] kasan_check_range+0x10c/0x1c0 [ 16.064592] __kasan_check_write+0x18/0x20 [ 16.064615] kasan_bitops_modify.constprop.0+0x373/0xd50 [ 16.064918] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 16.064947] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.064971] ? trace_hardirqs_on+0x37/0xe0 [ 16.064997] ? kasan_bitops_generic+0x92/0x1c0 [ 16.065022] kasan_bitops_generic+0x116/0x1c0 [ 16.065043] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 16.065065] ? __pfx_read_tsc+0x10/0x10 [ 16.065087] ? ktime_get_ts64+0x86/0x230 [ 16.065115] kunit_try_run_case+0x1a5/0x480 [ 16.065141] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.065165] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.065190] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.065213] ? __kthread_parkme+0x82/0x180 [ 16.065236] ? preempt_count_sub+0x50/0x80 [ 16.065263] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.065288] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.065312] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.065335] kthread+0x337/0x6f0 [ 16.065353] ? trace_preempt_on+0x20/0xc0 [ 16.065377] ? __pfx_kthread+0x10/0x10 [ 16.065396] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.065417] ? calculate_sigpending+0x7b/0xa0 [ 16.065439] ? __pfx_kthread+0x10/0x10 [ 16.065458] ret_from_fork+0x41/0x80 [ 16.065479] ? __pfx_kthread+0x10/0x10 [ 16.065499] ret_from_fork_asm+0x1a/0x30 [ 16.065530] </TASK> [ 16.065544] [ 16.076245] Allocated by task 281: [ 16.076525] kasan_save_stack+0x45/0x70 [ 16.076894] kasan_save_track+0x18/0x40 [ 16.077083] kasan_save_alloc_info+0x3b/0x50 [ 16.077408] __kasan_kmalloc+0xb7/0xc0 [ 16.077578] __kmalloc_cache_noprof+0x189/0x420 [ 16.078064] kasan_bitops_generic+0x92/0x1c0 [ 16.078280] kunit_try_run_case+0x1a5/0x480 [ 16.078409] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.078851] kthread+0x337/0x6f0 [ 16.079052] ret_from_fork+0x41/0x80 [ 16.079295] ret_from_fork_asm+0x1a/0x30 [ 16.079534] [ 16.079773] The buggy address belongs to the object at ffff888102497640 [ 16.079773] which belongs to the cache kmalloc-16 of size 16 [ 16.080248] The buggy address is located 8 bytes inside of [ 16.080248] allocated 9-byte region [ffff888102497640, ffff888102497649) [ 16.080930] [ 16.081004] The buggy address belongs to the physical page: [ 16.081123] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102497 [ 16.081592] flags: 0x200000000000000(node=0|zone=2) [ 16.082101] page_type: f5(slab) [ 16.082209] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 16.082719] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 16.083089] page dumped because: kasan: bad access detected [ 16.083333] [ 16.083479] Memory state around the buggy address: [ 16.083854] ffff888102497500: 00 01 fc fc 00 01 fc fc fa fb fc fc fa fb fc fc [ 16.084157] ffff888102497580: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 16.084491] >ffff888102497600: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 16.084898] ^ [ 16.085036] ffff888102497680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.085344] ffff888102497700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.085957] ================================================================== [ 16.105919] ================================================================== [ 16.106611] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 16.107138] Write of size 8 at addr ffff888102497648 by task kunit_try_catch/281 [ 16.107347] [ 16.107455] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT(voluntary) [ 16.107513] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.107527] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.107551] Call Trace: [ 16.107591] <TASK> [ 16.107613] dump_stack_lvl+0x73/0xb0 [ 16.107647] print_report+0xd1/0x650 [ 16.107672] ? __virt_addr_valid+0x1db/0x2d0 [ 16.107836] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 16.107864] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.107889] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 16.107912] kasan_report+0x141/0x180 [ 16.107937] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 16.107963] kasan_check_range+0x10c/0x1c0 [ 16.107985] __kasan_check_write+0x18/0x20 [ 16.108005] kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 16.108028] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 16.108053] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.108076] ? trace_hardirqs_on+0x37/0xe0 [ 16.108101] ? kasan_bitops_generic+0x92/0x1c0 [ 16.108125] kasan_bitops_generic+0x116/0x1c0 [ 16.108146] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 16.108169] ? __pfx_read_tsc+0x10/0x10 [ 16.108191] ? ktime_get_ts64+0x86/0x230 [ 16.108217] kunit_try_run_case+0x1a5/0x480 [ 16.108242] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.108265] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.108289] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.108312] ? __kthread_parkme+0x82/0x180 [ 16.108334] ? preempt_count_sub+0x50/0x80 [ 16.108359] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.108384] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.108407] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.108431] kthread+0x337/0x6f0 [ 16.108448] ? trace_preempt_on+0x20/0xc0 [ 16.108471] ? __pfx_kthread+0x10/0x10 [ 16.108489] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.108510] ? calculate_sigpending+0x7b/0xa0 [ 16.108532] ? __pfx_kthread+0x10/0x10 [ 16.108550] ret_from_fork+0x41/0x80 [ 16.108587] ? __pfx_kthread+0x10/0x10 [ 16.108607] ret_from_fork_asm+0x1a/0x30 [ 16.108782] </TASK> [ 16.108924] [ 16.119043] Allocated by task 281: [ 16.119322] kasan_save_stack+0x45/0x70 [ 16.119511] kasan_save_track+0x18/0x40 [ 16.119623] kasan_save_alloc_info+0x3b/0x50 [ 16.119722] __kasan_kmalloc+0xb7/0xc0 [ 16.119814] __kmalloc_cache_noprof+0x189/0x420 [ 16.122430] kasan_bitops_generic+0x92/0x1c0 [ 16.122589] kunit_try_run_case+0x1a5/0x480 [ 16.122852] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.122981] kthread+0x337/0x6f0 [ 16.123064] ret_from_fork+0x41/0x80 [ 16.123169] ret_from_fork_asm+0x1a/0x30 [ 16.123928] [ 16.124002] The buggy address belongs to the object at ffff888102497640 [ 16.124002] which belongs to the cache kmalloc-16 of size 16 [ 16.125855] The buggy address is located 8 bytes inside of [ 16.125855] allocated 9-byte region [ffff888102497640, ffff888102497649) [ 16.126367] [ 16.126466] The buggy address belongs to the physical page: [ 16.126625] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102497 [ 16.126775] flags: 0x200000000000000(node=0|zone=2) [ 16.126884] page_type: f5(slab) [ 16.127652] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 16.127830] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 16.127970] page dumped because: kasan: bad access detected [ 16.128079] [ 16.128131] Memory state around the buggy address: [ 16.128233] ffff888102497500: 00 01 fc fc 00 01 fc fc fa fb fc fc fa fb fc fc [ 16.128364] ffff888102497580: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 16.128493] >ffff888102497600: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 16.130275] ^ [ 16.130509] ffff888102497680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.130951] ffff888102497700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.131146] ================================================================== [ 16.033239] ================================================================== [ 16.033835] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 16.034280] Write of size 8 at addr ffff888102497648 by task kunit_try_catch/281 [ 16.034762] [ 16.035424] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT(voluntary) [ 16.035495] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.035511] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.035535] Call Trace: [ 16.035570] <TASK> [ 16.035595] dump_stack_lvl+0x73/0xb0 [ 16.035936] print_report+0xd1/0x650 [ 16.035967] ? __virt_addr_valid+0x1db/0x2d0 [ 16.035994] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 16.036017] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.036041] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 16.036064] kasan_report+0x141/0x180 [ 16.036088] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 16.036115] kasan_check_range+0x10c/0x1c0 [ 16.036136] __kasan_check_write+0x18/0x20 [ 16.036157] kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 16.036179] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 16.036203] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.036225] ? trace_hardirqs_on+0x37/0xe0 [ 16.036250] ? kasan_bitops_generic+0x92/0x1c0 [ 16.036275] kasan_bitops_generic+0x116/0x1c0 [ 16.036296] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 16.036317] ? __pfx_read_tsc+0x10/0x10 [ 16.036353] ? ktime_get_ts64+0x86/0x230 [ 16.036382] kunit_try_run_case+0x1a5/0x480 [ 16.036409] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.036431] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.036456] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.036479] ? __kthread_parkme+0x82/0x180 [ 16.036501] ? preempt_count_sub+0x50/0x80 [ 16.036528] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.036551] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.036594] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.036617] kthread+0x337/0x6f0 [ 16.036644] ? trace_preempt_on+0x20/0xc0 [ 16.036667] ? __pfx_kthread+0x10/0x10 [ 16.036684] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.036705] ? calculate_sigpending+0x7b/0xa0 [ 16.036728] ? __pfx_kthread+0x10/0x10 [ 16.036746] ret_from_fork+0x41/0x80 [ 16.036766] ? __pfx_kthread+0x10/0x10 [ 16.036784] ret_from_fork_asm+0x1a/0x30 [ 16.036815] </TASK> [ 16.036829] [ 16.048360] Allocated by task 281: [ 16.048628] kasan_save_stack+0x45/0x70 [ 16.049550] kasan_save_track+0x18/0x40 [ 16.049713] kasan_save_alloc_info+0x3b/0x50 [ 16.050023] __kasan_kmalloc+0xb7/0xc0 [ 16.050123] __kmalloc_cache_noprof+0x189/0x420 [ 16.050399] kasan_bitops_generic+0x92/0x1c0 [ 16.050607] kunit_try_run_case+0x1a5/0x480 [ 16.051317] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.051523] kthread+0x337/0x6f0 [ 16.051966] ret_from_fork+0x41/0x80 [ 16.052491] ret_from_fork_asm+0x1a/0x30 [ 16.052981] [ 16.053281] The buggy address belongs to the object at ffff888102497640 [ 16.053281] which belongs to the cache kmalloc-16 of size 16 [ 16.053729] The buggy address is located 8 bytes inside of [ 16.053729] allocated 9-byte region [ffff888102497640, ffff888102497649) [ 16.054447] [ 16.054549] The buggy address belongs to the physical page: [ 16.054758] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102497 [ 16.055544] flags: 0x200000000000000(node=0|zone=2) [ 16.055860] page_type: f5(slab) [ 16.056255] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 16.056749] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 16.057014] page dumped because: kasan: bad access detected [ 16.057773] [ 16.058085] Memory state around the buggy address: [ 16.058311] ffff888102497500: 00 01 fc fc 00 01 fc fc fa fb fc fc fa fb fc fc [ 16.058884] ffff888102497580: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 16.059385] >ffff888102497600: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 16.059822] ^ [ 16.060167] ffff888102497680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.060476] ffff888102497700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.061001] ================================================================== [ 16.006918] ================================================================== [ 16.007090] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 16.007353] Write of size 8 at addr ffff888102497648 by task kunit_try_catch/281 [ 16.008615] [ 16.009074] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT(voluntary) [ 16.009137] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.009151] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.009175] Call Trace: [ 16.009191] <TASK> [ 16.009220] dump_stack_lvl+0x73/0xb0 [ 16.009260] print_report+0xd1/0x650 [ 16.009285] ? __virt_addr_valid+0x1db/0x2d0 [ 16.009308] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 16.009330] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.009353] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 16.009375] kasan_report+0x141/0x180 [ 16.009398] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 16.009424] kasan_check_range+0x10c/0x1c0 [ 16.009444] __kasan_check_write+0x18/0x20 [ 16.009465] kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 16.009487] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 16.009510] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.009532] ? trace_hardirqs_on+0x37/0xe0 [ 16.009556] ? kasan_bitops_generic+0x92/0x1c0 [ 16.009602] kasan_bitops_generic+0x116/0x1c0 [ 16.009803] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 16.009832] ? __pfx_read_tsc+0x10/0x10 [ 16.009855] ? ktime_get_ts64+0x86/0x230 [ 16.009881] kunit_try_run_case+0x1a5/0x480 [ 16.009909] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.009931] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.009956] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.009980] ? __kthread_parkme+0x82/0x180 [ 16.010003] ? preempt_count_sub+0x50/0x80 [ 16.010029] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.010053] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.010076] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.010098] kthread+0x337/0x6f0 [ 16.010116] ? trace_preempt_on+0x20/0xc0 [ 16.010139] ? __pfx_kthread+0x10/0x10 [ 16.010157] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.010177] ? calculate_sigpending+0x7b/0xa0 [ 16.010199] ? __pfx_kthread+0x10/0x10 [ 16.010217] ret_from_fork+0x41/0x80 [ 16.010238] ? __pfx_kthread+0x10/0x10 [ 16.010256] ret_from_fork_asm+0x1a/0x30 [ 16.010288] </TASK> [ 16.010301] [ 16.020810] Allocated by task 281: [ 16.021029] kasan_save_stack+0x45/0x70 [ 16.021185] kasan_save_track+0x18/0x40 [ 16.021410] kasan_save_alloc_info+0x3b/0x50 [ 16.022401] __kasan_kmalloc+0xb7/0xc0 [ 16.022545] __kmalloc_cache_noprof+0x189/0x420 [ 16.022719] kasan_bitops_generic+0x92/0x1c0 [ 16.023296] kunit_try_run_case+0x1a5/0x480 [ 16.023452] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.023926] kthread+0x337/0x6f0 [ 16.024057] ret_from_fork+0x41/0x80 [ 16.024172] ret_from_fork_asm+0x1a/0x30 [ 16.024299] [ 16.024374] The buggy address belongs to the object at ffff888102497640 [ 16.024374] which belongs to the cache kmalloc-16 of size 16 [ 16.025407] The buggy address is located 8 bytes inside of [ 16.025407] allocated 9-byte region [ffff888102497640, ffff888102497649) [ 16.026425] [ 16.026541] The buggy address belongs to the physical page: [ 16.026764] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102497 [ 16.027121] flags: 0x200000000000000(node=0|zone=2) [ 16.027609] page_type: f5(slab) [ 16.028190] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 16.028375] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 16.028817] page dumped because: kasan: bad access detected [ 16.029161] [ 16.029233] Memory state around the buggy address: [ 16.029724] ffff888102497500: 00 01 fc fc 00 01 fc fc fa fb fc fc fa fb fc fc [ 16.029907] ffff888102497580: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 16.030176] >ffff888102497600: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 16.030418] ^ [ 16.031038] ffff888102497680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.031223] ffff888102497700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.032287] ================================================================== [ 15.960214] ================================================================== [ 15.960529] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50 [ 15.960741] Write of size 8 at addr ffff888102497648 by task kunit_try_catch/281 [ 15.960886] [ 15.961746] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT(voluntary) [ 15.961826] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.961842] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.961869] Call Trace: [ 15.961884] <TASK> [ 15.961907] dump_stack_lvl+0x73/0xb0 [ 15.961953] print_report+0xd1/0x650 [ 15.962012] ? __virt_addr_valid+0x1db/0x2d0 [ 15.962040] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 15.962155] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.962203] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 15.962231] kasan_report+0x141/0x180 [ 15.962256] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 15.962297] kasan_check_range+0x10c/0x1c0 [ 15.962320] __kasan_check_write+0x18/0x20 [ 15.962341] kasan_bitops_modify.constprop.0+0x101/0xd50 [ 15.962365] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 15.962389] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.962413] ? trace_hardirqs_on+0x37/0xe0 [ 15.962440] ? kasan_bitops_generic+0x92/0x1c0 [ 15.962465] kasan_bitops_generic+0x116/0x1c0 [ 15.962488] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 15.962512] ? __pfx_read_tsc+0x10/0x10 [ 15.962536] ? ktime_get_ts64+0x86/0x230 [ 15.962585] kunit_try_run_case+0x1a5/0x480 [ 15.962619] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.962645] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.962674] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.962699] ? __kthread_parkme+0x82/0x180 [ 15.962726] ? preempt_count_sub+0x50/0x80 [ 15.962758] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.962786] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.962811] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.962837] kthread+0x337/0x6f0 [ 15.962856] ? trace_preempt_on+0x20/0xc0 [ 15.962881] ? __pfx_kthread+0x10/0x10 [ 15.962901] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.962923] ? calculate_sigpending+0x7b/0xa0 [ 15.962949] ? __pfx_kthread+0x10/0x10 [ 15.962968] ret_from_fork+0x41/0x80 [ 15.962993] ? __pfx_kthread+0x10/0x10 [ 15.963012] ret_from_fork_asm+0x1a/0x30 [ 15.963047] </TASK> [ 15.963062] [ 15.970400] Allocated by task 281: [ 15.970673] kasan_save_stack+0x45/0x70 [ 15.971162] kasan_save_track+0x18/0x40 [ 15.971572] kasan_save_alloc_info+0x3b/0x50 [ 15.971899] __kasan_kmalloc+0xb7/0xc0 [ 15.972006] __kmalloc_cache_noprof+0x189/0x420 [ 15.972109] kasan_bitops_generic+0x92/0x1c0 [ 15.972204] kunit_try_run_case+0x1a5/0x480 [ 15.972477] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.973051] kthread+0x337/0x6f0 [ 15.973306] ret_from_fork+0x41/0x80 [ 15.973468] ret_from_fork_asm+0x1a/0x30 [ 15.973649] [ 15.973807] The buggy address belongs to the object at ffff888102497640 [ 15.973807] which belongs to the cache kmalloc-16 of size 16 [ 15.974269] The buggy address is located 8 bytes inside of [ 15.974269] allocated 9-byte region [ffff888102497640, ffff888102497649) [ 15.974485] [ 15.974546] The buggy address belongs to the physical page: [ 15.974910] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102497 [ 15.975434] flags: 0x200000000000000(node=0|zone=2) [ 15.975706] page_type: f5(slab) [ 15.975804] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 15.976289] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 15.976859] page dumped because: kasan: bad access detected [ 15.977021] [ 15.977078] Memory state around the buggy address: [ 15.977185] ffff888102497500: 00 01 fc fc 00 01 fc fc fa fb fc fc fa fb fc fc [ 15.977328] ffff888102497580: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 15.977547] >ffff888102497600: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 15.978062] ^ [ 15.978455] ffff888102497680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.979041] ffff888102497700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.979222] ================================================================== [ 16.131944] ================================================================== [ 16.132280] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50 [ 16.132898] Write of size 8 at addr ffff888102497648 by task kunit_try_catch/281 [ 16.133140] [ 16.133299] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT(voluntary) [ 16.133373] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.133387] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.133411] Call Trace: [ 16.133435] <TASK> [ 16.133457] dump_stack_lvl+0x73/0xb0 [ 16.133491] print_report+0xd1/0x650 [ 16.133537] ? __virt_addr_valid+0x1db/0x2d0 [ 16.133576] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 16.133951] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.134002] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 16.134026] kasan_report+0x141/0x180 [ 16.134051] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 16.134077] kasan_check_range+0x10c/0x1c0 [ 16.134098] __kasan_check_write+0x18/0x20 [ 16.134117] kasan_bitops_modify.constprop.0+0x547/0xd50 [ 16.134138] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 16.134161] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.134182] ? trace_hardirqs_on+0x37/0xe0 [ 16.134207] ? kasan_bitops_generic+0x92/0x1c0 [ 16.134230] kasan_bitops_generic+0x116/0x1c0 [ 16.134250] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 16.134290] ? __pfx_read_tsc+0x10/0x10 [ 16.134312] ? ktime_get_ts64+0x86/0x230 [ 16.134342] kunit_try_run_case+0x1a5/0x480 [ 16.134369] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.134391] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.134427] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.134450] ? __kthread_parkme+0x82/0x180 [ 16.134472] ? preempt_count_sub+0x50/0x80 [ 16.134497] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.134522] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.134545] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.134580] kthread+0x337/0x6f0 [ 16.134616] ? trace_preempt_on+0x20/0xc0 [ 16.134750] ? __pfx_kthread+0x10/0x10 [ 16.134781] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.134808] ? calculate_sigpending+0x7b/0xa0 [ 16.134830] ? __pfx_kthread+0x10/0x10 [ 16.134848] ret_from_fork+0x41/0x80 [ 16.134877] ? __pfx_kthread+0x10/0x10 [ 16.134900] ret_from_fork_asm+0x1a/0x30 [ 16.134931] </TASK> [ 16.134944] [ 16.145090] Allocated by task 281: [ 16.145331] kasan_save_stack+0x45/0x70 [ 16.145592] kasan_save_track+0x18/0x40 [ 16.146326] kasan_save_alloc_info+0x3b/0x50 [ 16.146490] __kasan_kmalloc+0xb7/0xc0 [ 16.146918] __kmalloc_cache_noprof+0x189/0x420 [ 16.147041] kasan_bitops_generic+0x92/0x1c0 [ 16.148031] kunit_try_run_case+0x1a5/0x480 [ 16.148257] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.148426] kthread+0x337/0x6f0 [ 16.148777] ret_from_fork+0x41/0x80 [ 16.148939] ret_from_fork_asm+0x1a/0x30 [ 16.149448] [ 16.149535] The buggy address belongs to the object at ffff888102497640 [ 16.149535] which belongs to the cache kmalloc-16 of size 16 [ 16.150493] The buggy address is located 8 bytes inside of [ 16.150493] allocated 9-byte region [ffff888102497640, ffff888102497649) [ 16.151038] [ 16.151180] The buggy address belongs to the physical page: [ 16.151569] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102497 [ 16.152141] flags: 0x200000000000000(node=0|zone=2) [ 16.152592] page_type: f5(slab) [ 16.152923] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 16.153221] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 16.153693] page dumped because: kasan: bad access detected [ 16.153928] [ 16.154046] Memory state around the buggy address: [ 16.154438] ffff888102497500: 00 01 fc fc 00 01 fc fc fa fb fc fc fa fb fc fc [ 16.155161] ffff888102497580: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 16.155459] >ffff888102497600: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 16.155873] ^ [ 16.156058] ffff888102497680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.156517] ffff888102497700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.157381] ================================================================== [ 15.980089] ================================================================== [ 15.980802] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 15.981323] Write of size 8 at addr ffff888102497648 by task kunit_try_catch/281 [ 15.981952] [ 15.982050] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.2-rc1 #1 PREEMPT(voluntary) [ 15.982109] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.982124] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.982150] Call Trace: [ 15.982166] <TASK> [ 15.982187] dump_stack_lvl+0x73/0xb0 [ 15.982222] print_report+0xd1/0x650 [ 15.982247] ? __virt_addr_valid+0x1db/0x2d0 [ 15.982271] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 15.982294] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.982319] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 15.982342] kasan_report+0x141/0x180 [ 15.982365] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 15.982392] kasan_check_range+0x10c/0x1c0 [ 15.982413] __kasan_check_write+0x18/0x20 [ 15.982434] kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 15.982457] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 15.982481] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.982503] ? trace_hardirqs_on+0x37/0xe0 [ 15.982527] ? kasan_bitops_generic+0x92/0x1c0 [ 15.982551] kasan_bitops_generic+0x116/0x1c0 [ 15.982586] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 15.982610] ? __pfx_read_tsc+0x10/0x10 [ 15.982654] ? ktime_get_ts64+0x86/0x230 [ 15.982682] kunit_try_run_case+0x1a5/0x480 [ 15.982722] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.982747] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.982774] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.982800] ? __kthread_parkme+0x82/0x180 [ 15.982824] ? preempt_count_sub+0x50/0x80 [ 15.982853] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.982880] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.982904] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.982931] kthread+0x337/0x6f0 [ 15.982950] ? trace_preempt_on+0x20/0xc0 [ 15.982975] ? __pfx_kthread+0x10/0x10 [ 15.982995] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.983017] ? calculate_sigpending+0x7b/0xa0 [ 15.983042] ? __pfx_kthread+0x10/0x10 [ 15.983112] ret_from_fork+0x41/0x80 [ 15.983151] ? __pfx_kthread+0x10/0x10 [ 15.983174] ret_from_fork_asm+0x1a/0x30 [ 15.983209] </TASK> [ 15.983225] [ 15.995552] Allocated by task 281: [ 15.995963] kasan_save_stack+0x45/0x70 [ 15.996177] kasan_save_track+0x18/0x40 [ 15.996279] kasan_save_alloc_info+0x3b/0x50 [ 15.996555] __kasan_kmalloc+0xb7/0xc0 [ 15.997190] __kmalloc_cache_noprof+0x189/0x420 [ 15.997386] kasan_bitops_generic+0x92/0x1c0 [ 15.997842] kunit_try_run_case+0x1a5/0x480 [ 15.998097] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.998341] kthread+0x337/0x6f0 [ 15.998586] ret_from_fork+0x41/0x80 [ 15.999237] ret_from_fork_asm+0x1a/0x30 [ 15.999458] [ 15.999544] The buggy address belongs to the object at ffff888102497640 [ 15.999544] which belongs to the cache kmalloc-16 of size 16 [ 16.000162] The buggy address is located 8 bytes inside of [ 16.000162] allocated 9-byte region [ffff888102497640, ffff888102497649) [ 16.000468] [ 16.000555] The buggy address belongs to the physical page: [ 16.001188] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102497 [ 16.001728] flags: 0x200000000000000(node=0|zone=2) [ 16.002034] page_type: f5(slab) [ 16.002240] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 16.002449] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 16.003216] page dumped because: kasan: bad access detected [ 16.003413] [ 16.003468] Memory state around the buggy address: [ 16.003628] ffff888102497500: 00 01 fc fc 00 01 fc fc fa fb fc fc fa fb fc fc [ 16.003961] ffff888102497580: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 16.004308] >ffff888102497600: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 16.004518] ^ [ 16.004762] ffff888102497680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.006101] ffff888102497700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.006282] ==================================================================