Date
July 22, 2025, 2:40 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 19.543261] ================================================================== [ 19.543535] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc0 [ 19.543723] Write of size 8 at addr fff00000c5a0ed88 by task kunit_try_catch/263 [ 19.543808] [ 19.543843] CPU: 1 UID: 0 PID: 263 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT [ 19.543931] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.544110] Hardware name: linux,dummy-virt (DT) [ 19.544256] Call trace: [ 19.544296] show_stack+0x20/0x38 (C) [ 19.544349] dump_stack_lvl+0x8c/0xd0 [ 19.544480] print_report+0x118/0x5d0 [ 19.544554] kasan_report+0xdc/0x128 [ 19.544610] kasan_check_range+0x100/0x1a8 [ 19.544810] __kasan_check_write+0x20/0x30 [ 19.544948] kasan_bitops_modify.constprop.0+0x320/0xbc0 [ 19.545027] kasan_bitops_generic+0x110/0x1c8 [ 19.545093] kunit_try_run_case+0x170/0x3f0 [ 19.545193] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.545245] kthread+0x328/0x630 [ 19.545470] ret_from_fork+0x10/0x20 [ 19.545597] [ 19.545649] Allocated by task 263: [ 19.545683] kasan_save_stack+0x3c/0x68 [ 19.545802] kasan_save_track+0x20/0x40 [ 19.545844] kasan_save_alloc_info+0x40/0x58 [ 19.545885] __kasan_kmalloc+0xd4/0xd8 [ 19.545921] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.545960] kasan_bitops_generic+0xa0/0x1c8 [ 19.546134] kunit_try_run_case+0x170/0x3f0 [ 19.546237] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.546413] kthread+0x328/0x630 [ 19.546451] ret_from_fork+0x10/0x20 [ 19.546503] [ 19.546527] The buggy address belongs to the object at fff00000c5a0ed80 [ 19.546527] which belongs to the cache kmalloc-16 of size 16 [ 19.546597] The buggy address is located 8 bytes inside of [ 19.546597] allocated 9-byte region [fff00000c5a0ed80, fff00000c5a0ed89) [ 19.547158] page_type: f5(slab) [ 19.547685] page dumped because: kasan: bad access detected [ 19.547767] [ 19.547904] Memory state around the buggy address: [ 19.547958] fff00000c5a0ec80: fa fb fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 19.548447] fff00000c5a0ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.549641] Read of size 8 at addr fff00000c5a0ed88 by task kunit_try_catch/263 [ 19.550306] dump_stack_lvl+0x8c/0xd0 [ 19.551011] kasan_bitops_generic+0x110/0x1c8 [ 19.552507] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.553950] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 19.554112] page dumped because: kasan: bad access detected [ 19.554859] ^ [ 19.554899] fff00000c5a0ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.555654] ================================================================== [ 19.538045] ================================================================== [ 19.538109] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc0 [ 19.538224] Write of size 8 at addr fff00000c5a0ed88 by task kunit_try_catch/263 [ 19.538302] [ 19.538362] CPU: 1 UID: 0 PID: 263 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT [ 19.538690] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.538865] Hardware name: linux,dummy-virt (DT) [ 19.538911] Call trace: [ 19.539015] show_stack+0x20/0x38 (C) [ 19.539123] dump_stack_lvl+0x8c/0xd0 [ 19.539260] print_report+0x118/0x5d0 [ 19.539482] kasan_report+0xdc/0x128 [ 19.539564] kasan_check_range+0x100/0x1a8 [ 19.539763] __kasan_check_write+0x20/0x30 [ 19.539888] kasan_bitops_modify.constprop.0+0x2b4/0xbc0 [ 19.539952] kasan_bitops_generic+0x110/0x1c8 [ 19.539999] kunit_try_run_case+0x170/0x3f0 [ 19.540051] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.540111] kthread+0x328/0x630 [ 19.540159] ret_from_fork+0x10/0x20 [ 19.540206] [ 19.540226] Allocated by task 263: [ 19.540257] kasan_save_stack+0x3c/0x68 [ 19.540310] kasan_save_track+0x20/0x40 [ 19.540349] kasan_save_alloc_info+0x40/0x58 [ 19.540389] __kasan_kmalloc+0xd4/0xd8 [ 19.540427] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.540476] kasan_bitops_generic+0xa0/0x1c8 [ 19.540524] kunit_try_run_case+0x170/0x3f0 [ 19.540565] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.540617] kthread+0x328/0x630 [ 19.540663] ret_from_fork+0x10/0x20 [ 19.540708] [ 19.540739] The buggy address belongs to the object at fff00000c5a0ed80 [ 19.540739] which belongs to the cache kmalloc-16 of size 16 [ 19.540859] [ 19.540889] The buggy address belongs to the physical page: [ 19.540940] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a0e [ 19.541008] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.541056] page_type: f5(slab) [ 19.541104] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 19.541205] page dumped because: kasan: bad access detected [ 19.541248] [ 19.541292] Memory state around the buggy address: [ 19.541715] fff00000c5a0ec80: fa fb fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 19.541766] fff00000c5a0ed00: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 19.541835] >fff00000c5a0ed80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.541900] ^ [ 19.542411] fff00000c5a0ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.542496] fff00000c5a0ee80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.542822] ================================================================== [ 19.530239] ================================================================== [ 19.530319] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbc0 [ 19.530951] Read of size 8 at addr fff00000c5a0ed88 by task kunit_try_catch/263 [ 19.531125] [ 19.531175] CPU: 1 UID: 0 PID: 263 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT [ 19.531311] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.531730] Hardware name: linux,dummy-virt (DT) [ 19.531785] Call trace: [ 19.531990] show_stack+0x20/0x38 (C) [ 19.532145] dump_stack_lvl+0x8c/0xd0 [ 19.532341] print_report+0x118/0x5d0 [ 19.532479] kasan_report+0xdc/0x128 [ 19.532525] __asan_report_load8_noabort+0x20/0x30 [ 19.532982] kasan_bitops_modify.constprop.0+0xa80/0xbc0 [ 19.533496] kasan_bitops_generic+0x110/0x1c8 [ 19.534323] kunit_try_run_case+0x170/0x3f0 [ 19.534384] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.534845] kthread+0x328/0x630 [ 19.534904] ret_from_fork+0x10/0x20 [ 19.534955] [ 19.534975] Allocated by task 263: [ 19.535014] kasan_save_stack+0x3c/0x68 [ 19.535056] kasan_save_track+0x20/0x40 [ 19.535093] kasan_save_alloc_info+0x40/0x58 [ 19.535133] __kasan_kmalloc+0xd4/0xd8 [ 19.535168] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.535208] kasan_bitops_generic+0xa0/0x1c8 [ 19.535246] kunit_try_run_case+0x170/0x3f0 [ 19.535296] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.535339] kthread+0x328/0x630 [ 19.535375] ret_from_fork+0x10/0x20 [ 19.535411] [ 19.535431] The buggy address belongs to the object at fff00000c5a0ed80 [ 19.535431] which belongs to the cache kmalloc-16 of size 16 [ 19.535489] The buggy address is located 8 bytes inside of [ 19.535489] allocated 9-byte region [fff00000c5a0ed80, fff00000c5a0ed89) [ 19.535551] [ 19.535573] The buggy address belongs to the physical page: [ 19.535605] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a0e [ 19.535657] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.535707] page_type: f5(slab) [ 19.535745] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 19.535798] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 19.535842] page dumped because: kasan: bad access detected [ 19.535876] [ 19.535895] Memory state around the buggy address: [ 19.535928] fff00000c5a0ec80: fa fb fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 19.535973] fff00000c5a0ed00: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 19.536017] >fff00000c5a0ed80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.536088] fff00000c5a0ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.536226] fff00000c5a0ee80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.536426] ==================================================================
[ 13.204368] ================================================================== [ 13.204716] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 13.204969] Write of size 8 at addr ffff888102219668 by task kunit_try_catch/281 [ 13.205287] [ 13.205494] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT(voluntary) [ 13.205540] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.205573] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.205594] Call Trace: [ 13.205605] <TASK> [ 13.205620] dump_stack_lvl+0x73/0xb0 [ 13.205645] print_report+0xd1/0x610 [ 13.205700] ? __virt_addr_valid+0x1db/0x2d0 [ 13.205724] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 13.205767] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.205789] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 13.205811] kasan_report+0x141/0x180 [ 13.205834] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 13.205860] kasan_check_range+0x10c/0x1c0 [ 13.205880] __kasan_check_write+0x18/0x20 [ 13.205900] kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 13.205939] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 13.205961] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.205980] ? trace_hardirqs_on+0x37/0xe0 [ 13.206003] ? kasan_bitops_generic+0x92/0x1c0 [ 13.206026] kasan_bitops_generic+0x116/0x1c0 [ 13.206046] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.206067] ? __pfx_read_tsc+0x10/0x10 [ 13.206087] ? ktime_get_ts64+0x86/0x230 [ 13.206112] kunit_try_run_case+0x1a5/0x480 [ 13.206132] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.206152] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 13.206172] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.206197] ? __kthread_parkme+0x82/0x180 [ 13.206218] ? preempt_count_sub+0x50/0x80 [ 13.206276] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.206299] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.206324] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.206347] kthread+0x337/0x6f0 [ 13.206373] ? trace_preempt_on+0x20/0xc0 [ 13.206395] ? __pfx_kthread+0x10/0x10 [ 13.206412] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.206434] ? calculate_sigpending+0x7b/0xa0 [ 13.206454] ? __pfx_kthread+0x10/0x10 [ 13.206491] ret_from_fork+0x41/0x80 [ 13.206511] ? __pfx_kthread+0x10/0x10 [ 13.206529] ret_from_fork_asm+0x1a/0x30 [ 13.206559] </TASK> [ 13.206570] [ 13.215493] Allocated by task 281: [ 13.215695] kasan_save_stack+0x45/0x70 [ 13.215871] kasan_save_track+0x18/0x40 [ 13.216023] kasan_save_alloc_info+0x3b/0x50 [ 13.216163] __kasan_kmalloc+0xb7/0xc0 [ 13.216301] __kmalloc_cache_noprof+0x189/0x420 [ 13.216868] kasan_bitops_generic+0x92/0x1c0 [ 13.217124] kunit_try_run_case+0x1a5/0x480 [ 13.217337] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.217610] kthread+0x337/0x6f0 [ 13.217820] ret_from_fork+0x41/0x80 [ 13.218031] ret_from_fork_asm+0x1a/0x30 [ 13.218246] [ 13.218339] The buggy address belongs to the object at ffff888102219660 [ 13.218339] which belongs to the cache kmalloc-16 of size 16 [ 13.218847] The buggy address is located 8 bytes inside of [ 13.218847] allocated 9-byte region [ffff888102219660, ffff888102219669) [ 13.219352] [ 13.219424] The buggy address belongs to the physical page: [ 13.219587] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102219 [ 13.219814] flags: 0x200000000000000(node=0|zone=2) [ 13.220230] page_type: f5(slab) [ 13.220484] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.221145] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.221609] page dumped because: kasan: bad access detected [ 13.221894] [ 13.221990] Memory state around the buggy address: [ 13.222221] ffff888102219500: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc [ 13.222604] ffff888102219580: 00 05 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 13.223082] >ffff888102219600: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 13.223394] ^ [ 13.223677] ffff888102219680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.223930] ffff888102219700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.224136] ================================================================== [ 13.266465] ================================================================== [ 13.267172] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50 [ 13.267610] Write of size 8 at addr ffff888102219668 by task kunit_try_catch/281 [ 13.268036] [ 13.268143] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT(voluntary) [ 13.268186] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.268197] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.268218] Call Trace: [ 13.268247] <TASK> [ 13.268263] dump_stack_lvl+0x73/0xb0 [ 13.268309] print_report+0xd1/0x610 [ 13.268331] ? __virt_addr_valid+0x1db/0x2d0 [ 13.268375] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 13.268396] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.268419] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 13.268456] kasan_report+0x141/0x180 [ 13.268479] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 13.268520] kasan_check_range+0x10c/0x1c0 [ 13.268540] __kasan_check_write+0x18/0x20 [ 13.268572] kasan_bitops_modify.constprop.0+0x373/0xd50 [ 13.268607] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 13.268643] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.268678] ? trace_hardirqs_on+0x37/0xe0 [ 13.268700] ? kasan_bitops_generic+0x92/0x1c0 [ 13.268723] kasan_bitops_generic+0x116/0x1c0 [ 13.268744] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.268765] ? __pfx_read_tsc+0x10/0x10 [ 13.268783] ? ktime_get_ts64+0x86/0x230 [ 13.268807] kunit_try_run_case+0x1a5/0x480 [ 13.268884] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.268904] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 13.268930] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.268955] ? __kthread_parkme+0x82/0x180 [ 13.268976] ? preempt_count_sub+0x50/0x80 [ 13.269022] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.269044] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.269067] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.269090] kthread+0x337/0x6f0 [ 13.269107] ? trace_preempt_on+0x20/0xc0 [ 13.269129] ? __pfx_kthread+0x10/0x10 [ 13.269146] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.269168] ? calculate_sigpending+0x7b/0xa0 [ 13.269206] ? __pfx_kthread+0x10/0x10 [ 13.269238] ret_from_fork+0x41/0x80 [ 13.269259] ? __pfx_kthread+0x10/0x10 [ 13.269277] ret_from_fork_asm+0x1a/0x30 [ 13.269308] </TASK> [ 13.269318] [ 13.278125] Allocated by task 281: [ 13.278268] kasan_save_stack+0x45/0x70 [ 13.278411] kasan_save_track+0x18/0x40 [ 13.278548] kasan_save_alloc_info+0x3b/0x50 [ 13.278693] __kasan_kmalloc+0xb7/0xc0 [ 13.278825] __kmalloc_cache_noprof+0x189/0x420 [ 13.278975] kasan_bitops_generic+0x92/0x1c0 [ 13.279522] kunit_try_run_case+0x1a5/0x480 [ 13.279762] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.280032] kthread+0x337/0x6f0 [ 13.280218] ret_from_fork+0x41/0x80 [ 13.280501] ret_from_fork_asm+0x1a/0x30 [ 13.280733] [ 13.280858] The buggy address belongs to the object at ffff888102219660 [ 13.280858] which belongs to the cache kmalloc-16 of size 16 [ 13.281451] The buggy address is located 8 bytes inside of [ 13.281451] allocated 9-byte region [ffff888102219660, ffff888102219669) [ 13.282217] [ 13.282349] The buggy address belongs to the physical page: [ 13.282597] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102219 [ 13.283061] flags: 0x200000000000000(node=0|zone=2) [ 13.283220] page_type: f5(slab) [ 13.283350] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.283685] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.284044] page dumped because: kasan: bad access detected [ 13.284469] [ 13.284593] Memory state around the buggy address: [ 13.284931] ffff888102219500: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc [ 13.285578] ffff888102219580: 00 05 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 13.285988] >ffff888102219600: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 13.286243] ^ [ 13.286447] ffff888102219680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.286817] ffff888102219700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.287163] ================================================================== [ 13.287806] ================================================================== [ 13.288181] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 13.288638] Write of size 8 at addr ffff888102219668 by task kunit_try_catch/281 [ 13.288928] [ 13.289013] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT(voluntary) [ 13.289056] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.289067] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.289087] Call Trace: [ 13.289100] <TASK> [ 13.289114] dump_stack_lvl+0x73/0xb0 [ 13.289138] print_report+0xd1/0x610 [ 13.289160] ? __virt_addr_valid+0x1db/0x2d0 [ 13.289205] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 13.289237] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.289259] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 13.289282] kasan_report+0x141/0x180 [ 13.289305] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 13.289331] kasan_check_range+0x10c/0x1c0 [ 13.289351] __kasan_check_write+0x18/0x20 [ 13.289370] kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 13.289392] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 13.289414] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.289434] ? trace_hardirqs_on+0x37/0xe0 [ 13.289456] ? kasan_bitops_generic+0x92/0x1c0 [ 13.289480] kasan_bitops_generic+0x116/0x1c0 [ 13.289500] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.289520] ? __pfx_read_tsc+0x10/0x10 [ 13.289540] ? ktime_get_ts64+0x86/0x230 [ 13.289564] kunit_try_run_case+0x1a5/0x480 [ 13.289585] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.289603] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 13.289623] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.289647] ? __kthread_parkme+0x82/0x180 [ 13.289668] ? preempt_count_sub+0x50/0x80 [ 13.289693] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.289714] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.289738] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.289761] kthread+0x337/0x6f0 [ 13.289777] ? trace_preempt_on+0x20/0xc0 [ 13.289800] ? __pfx_kthread+0x10/0x10 [ 13.289818] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.289840] ? calculate_sigpending+0x7b/0xa0 [ 13.289861] ? __pfx_kthread+0x10/0x10 [ 13.289879] ret_from_fork+0x41/0x80 [ 13.289899] ? __pfx_kthread+0x10/0x10 [ 13.289982] ret_from_fork_asm+0x1a/0x30 [ 13.290014] </TASK> [ 13.290025] [ 13.299250] Allocated by task 281: [ 13.299408] kasan_save_stack+0x45/0x70 [ 13.299618] kasan_save_track+0x18/0x40 [ 13.299751] kasan_save_alloc_info+0x3b/0x50 [ 13.299890] __kasan_kmalloc+0xb7/0xc0 [ 13.300017] __kmalloc_cache_noprof+0x189/0x420 [ 13.300162] kasan_bitops_generic+0x92/0x1c0 [ 13.301498] kunit_try_run_case+0x1a5/0x480 [ 13.301941] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.302130] kthread+0x337/0x6f0 [ 13.302262] ret_from_fork+0x41/0x80 [ 13.302815] ret_from_fork_asm+0x1a/0x30 [ 13.303529] [ 13.303838] The buggy address belongs to the object at ffff888102219660 [ 13.303838] which belongs to the cache kmalloc-16 of size 16 [ 13.305878] The buggy address is located 8 bytes inside of [ 13.305878] allocated 9-byte region [ffff888102219660, ffff888102219669) [ 13.306267] [ 13.306351] The buggy address belongs to the physical page: [ 13.306525] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102219 [ 13.307122] flags: 0x200000000000000(node=0|zone=2) [ 13.307395] page_type: f5(slab) [ 13.307664] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.308122] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.308437] page dumped because: kasan: bad access detected [ 13.308989] [ 13.309095] Memory state around the buggy address: [ 13.309333] ffff888102219500: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc [ 13.309706] ffff888102219580: 00 05 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 13.310036] >ffff888102219600: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 13.310377] ^ [ 13.310682] ffff888102219680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.311250] ffff888102219700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.311592] ================================================================== [ 13.245111] ================================================================== [ 13.245551] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 13.245909] Write of size 8 at addr ffff888102219668 by task kunit_try_catch/281 [ 13.246235] [ 13.246337] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT(voluntary) [ 13.246378] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.246389] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.246409] Call Trace: [ 13.246422] <TASK> [ 13.246435] dump_stack_lvl+0x73/0xb0 [ 13.246459] print_report+0xd1/0x610 [ 13.246480] ? __virt_addr_valid+0x1db/0x2d0 [ 13.246501] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 13.246522] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.246544] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 13.246565] kasan_report+0x141/0x180 [ 13.246587] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 13.246613] kasan_check_range+0x10c/0x1c0 [ 13.246633] __kasan_check_write+0x18/0x20 [ 13.246652] kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 13.246674] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 13.246696] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.246716] ? trace_hardirqs_on+0x37/0xe0 [ 13.246738] ? kasan_bitops_generic+0x92/0x1c0 [ 13.246761] kasan_bitops_generic+0x116/0x1c0 [ 13.246781] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.246801] ? __pfx_read_tsc+0x10/0x10 [ 13.246820] ? ktime_get_ts64+0x86/0x230 [ 13.246844] kunit_try_run_case+0x1a5/0x480 [ 13.246864] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.246882] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 13.246902] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.246925] ? __kthread_parkme+0x82/0x180 [ 13.246945] ? preempt_count_sub+0x50/0x80 [ 13.246971] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.246991] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.247014] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.247036] kthread+0x337/0x6f0 [ 13.247052] ? trace_preempt_on+0x20/0xc0 [ 13.247074] ? __pfx_kthread+0x10/0x10 [ 13.247091] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.247112] ? calculate_sigpending+0x7b/0xa0 [ 13.247132] ? __pfx_kthread+0x10/0x10 [ 13.247151] ret_from_fork+0x41/0x80 [ 13.247170] ? __pfx_kthread+0x10/0x10 [ 13.247187] ret_from_fork_asm+0x1a/0x30 [ 13.247217] </TASK> [ 13.247235] [ 13.256568] Allocated by task 281: [ 13.256811] kasan_save_stack+0x45/0x70 [ 13.256963] kasan_save_track+0x18/0x40 [ 13.257148] kasan_save_alloc_info+0x3b/0x50 [ 13.257399] __kasan_kmalloc+0xb7/0xc0 [ 13.257589] __kmalloc_cache_noprof+0x189/0x420 [ 13.257977] kasan_bitops_generic+0x92/0x1c0 [ 13.258215] kunit_try_run_case+0x1a5/0x480 [ 13.258382] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.258647] kthread+0x337/0x6f0 [ 13.258804] ret_from_fork+0x41/0x80 [ 13.258981] ret_from_fork_asm+0x1a/0x30 [ 13.259208] [ 13.259306] The buggy address belongs to the object at ffff888102219660 [ 13.259306] which belongs to the cache kmalloc-16 of size 16 [ 13.260250] The buggy address is located 8 bytes inside of [ 13.260250] allocated 9-byte region [ffff888102219660, ffff888102219669) [ 13.260887] [ 13.260964] The buggy address belongs to the physical page: [ 13.261134] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102219 [ 13.261642] flags: 0x200000000000000(node=0|zone=2) [ 13.261927] page_type: f5(slab) [ 13.262105] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.262460] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.262832] page dumped because: kasan: bad access detected [ 13.263044] [ 13.263110] Memory state around the buggy address: [ 13.263281] ffff888102219500: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc [ 13.263964] ffff888102219580: 00 05 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 13.264313] >ffff888102219600: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 13.264624] ^ [ 13.264911] ffff888102219680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.265493] ffff888102219700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.265966] ================================================================== [ 13.345399] ================================================================== [ 13.345970] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50 [ 13.346742] Write of size 8 at addr ffff888102219668 by task kunit_try_catch/281 [ 13.347288] [ 13.347410] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT(voluntary) [ 13.347470] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.347481] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.347502] Call Trace: [ 13.347521] <TASK> [ 13.347538] dump_stack_lvl+0x73/0xb0 [ 13.347564] print_report+0xd1/0x610 [ 13.347586] ? __virt_addr_valid+0x1db/0x2d0 [ 13.347617] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 13.347638] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.347659] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 13.347681] kasan_report+0x141/0x180 [ 13.347714] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 13.347740] kasan_check_range+0x10c/0x1c0 [ 13.347760] __kasan_check_write+0x18/0x20 [ 13.347780] kasan_bitops_modify.constprop.0+0x547/0xd50 [ 13.347801] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 13.347824] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.347844] ? trace_hardirqs_on+0x37/0xe0 [ 13.347866] ? kasan_bitops_generic+0x92/0x1c0 [ 13.347890] kasan_bitops_generic+0x116/0x1c0 [ 13.347909] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.347930] ? __pfx_read_tsc+0x10/0x10 [ 13.347950] ? ktime_get_ts64+0x86/0x230 [ 13.347975] kunit_try_run_case+0x1a5/0x480 [ 13.347996] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.348014] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 13.348035] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.348058] ? __kthread_parkme+0x82/0x180 [ 13.348080] ? preempt_count_sub+0x50/0x80 [ 13.348107] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.348128] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.348150] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.348173] kthread+0x337/0x6f0 [ 13.348190] ? trace_preempt_on+0x20/0xc0 [ 13.348211] ? __pfx_kthread+0x10/0x10 [ 13.348240] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.348262] ? calculate_sigpending+0x7b/0xa0 [ 13.348284] ? __pfx_kthread+0x10/0x10 [ 13.348302] ret_from_fork+0x41/0x80 [ 13.348322] ? __pfx_kthread+0x10/0x10 [ 13.348340] ret_from_fork_asm+0x1a/0x30 [ 13.348375] </TASK> [ 13.348386] [ 13.362940] Allocated by task 281: [ 13.363086] kasan_save_stack+0x45/0x70 [ 13.363252] kasan_save_track+0x18/0x40 [ 13.363418] kasan_save_alloc_info+0x3b/0x50 [ 13.363573] __kasan_kmalloc+0xb7/0xc0 [ 13.363705] __kmalloc_cache_noprof+0x189/0x420 [ 13.364055] kasan_bitops_generic+0x92/0x1c0 [ 13.364273] kunit_try_run_case+0x1a5/0x480 [ 13.364430] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.364674] kthread+0x337/0x6f0 [ 13.364843] ret_from_fork+0x41/0x80 [ 13.365029] ret_from_fork_asm+0x1a/0x30 [ 13.365168] [ 13.365249] The buggy address belongs to the object at ffff888102219660 [ 13.365249] which belongs to the cache kmalloc-16 of size 16 [ 13.365768] The buggy address is located 8 bytes inside of [ 13.365768] allocated 9-byte region [ffff888102219660, ffff888102219669) [ 13.366333] [ 13.366446] The buggy address belongs to the physical page: [ 13.366905] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102219 [ 13.367258] flags: 0x200000000000000(node=0|zone=2) [ 13.367516] page_type: f5(slab) [ 13.367737] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.368028] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.368331] page dumped because: kasan: bad access detected [ 13.368500] [ 13.368568] Memory state around the buggy address: [ 13.368759] ffff888102219500: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc [ 13.369205] ffff888102219580: 00 05 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 13.369502] >ffff888102219600: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 13.369713] ^ [ 13.370402] ffff888102219680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.370691] ffff888102219700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.371018] ================================================================== [ 13.224803] ================================================================== [ 13.225424] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 13.225948] Write of size 8 at addr ffff888102219668 by task kunit_try_catch/281 [ 13.226213] [ 13.226304] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT(voluntary) [ 13.226344] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.226355] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.226375] Call Trace: [ 13.226391] <TASK> [ 13.226404] dump_stack_lvl+0x73/0xb0 [ 13.226428] print_report+0xd1/0x610 [ 13.226451] ? __virt_addr_valid+0x1db/0x2d0 [ 13.226471] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 13.226492] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.226515] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 13.226538] kasan_report+0x141/0x180 [ 13.226564] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 13.226593] kasan_check_range+0x10c/0x1c0 [ 13.226613] __kasan_check_write+0x18/0x20 [ 13.226633] kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 13.226655] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 13.226678] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.226698] ? trace_hardirqs_on+0x37/0xe0 [ 13.226720] ? kasan_bitops_generic+0x92/0x1c0 [ 13.226743] kasan_bitops_generic+0x116/0x1c0 [ 13.226763] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.226785] ? __pfx_read_tsc+0x10/0x10 [ 13.226806] ? ktime_get_ts64+0x86/0x230 [ 13.226829] kunit_try_run_case+0x1a5/0x480 [ 13.226850] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.226868] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 13.226888] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.226913] ? __kthread_parkme+0x82/0x180 [ 13.226935] ? preempt_count_sub+0x50/0x80 [ 13.226961] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.226982] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.227006] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.227028] kthread+0x337/0x6f0 [ 13.227045] ? trace_preempt_on+0x20/0xc0 [ 13.227067] ? __pfx_kthread+0x10/0x10 [ 13.227084] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.227106] ? calculate_sigpending+0x7b/0xa0 [ 13.227127] ? __pfx_kthread+0x10/0x10 [ 13.227145] ret_from_fork+0x41/0x80 [ 13.227165] ? __pfx_kthread+0x10/0x10 [ 13.227183] ret_from_fork_asm+0x1a/0x30 [ 13.227213] </TASK> [ 13.227233] [ 13.235859] Allocated by task 281: [ 13.236119] kasan_save_stack+0x45/0x70 [ 13.236360] kasan_save_track+0x18/0x40 [ 13.236558] kasan_save_alloc_info+0x3b/0x50 [ 13.236759] __kasan_kmalloc+0xb7/0xc0 [ 13.236956] __kmalloc_cache_noprof+0x189/0x420 [ 13.237127] kasan_bitops_generic+0x92/0x1c0 [ 13.237368] kunit_try_run_case+0x1a5/0x480 [ 13.237701] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.238165] kthread+0x337/0x6f0 [ 13.238431] ret_from_fork+0x41/0x80 [ 13.238627] ret_from_fork_asm+0x1a/0x30 [ 13.238859] [ 13.238978] The buggy address belongs to the object at ffff888102219660 [ 13.238978] which belongs to the cache kmalloc-16 of size 16 [ 13.239474] The buggy address is located 8 bytes inside of [ 13.239474] allocated 9-byte region [ffff888102219660, ffff888102219669) [ 13.240025] [ 13.240132] The buggy address belongs to the physical page: [ 13.240376] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102219 [ 13.240809] flags: 0x200000000000000(node=0|zone=2) [ 13.240990] page_type: f5(slab) [ 13.241157] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.241531] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.241895] page dumped because: kasan: bad access detected [ 13.242100] [ 13.242192] Memory state around the buggy address: [ 13.242454] ffff888102219500: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc [ 13.242906] ffff888102219580: 00 05 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 13.243183] >ffff888102219600: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 13.243596] ^ [ 13.243873] ffff888102219680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.244215] ffff888102219700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.244584] ================================================================== [ 13.182604] ================================================================== [ 13.183195] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50 [ 13.183618] Write of size 8 at addr ffff888102219668 by task kunit_try_catch/281 [ 13.183999] [ 13.184120] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT(voluntary) [ 13.184193] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.184205] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.184254] Call Trace: [ 13.184266] <TASK> [ 13.184281] dump_stack_lvl+0x73/0xb0 [ 13.184306] print_report+0xd1/0x610 [ 13.184328] ? __virt_addr_valid+0x1db/0x2d0 [ 13.184349] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 13.184383] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.184406] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 13.184429] kasan_report+0x141/0x180 [ 13.184451] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 13.184477] kasan_check_range+0x10c/0x1c0 [ 13.184497] __kasan_check_write+0x18/0x20 [ 13.184516] kasan_bitops_modify.constprop.0+0x101/0xd50 [ 13.184539] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 13.184561] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.184582] ? trace_hardirqs_on+0x37/0xe0 [ 13.184603] ? kasan_bitops_generic+0x92/0x1c0 [ 13.184628] kasan_bitops_generic+0x116/0x1c0 [ 13.184648] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.184669] ? __pfx_read_tsc+0x10/0x10 [ 13.184689] ? ktime_get_ts64+0x86/0x230 [ 13.184714] kunit_try_run_case+0x1a5/0x480 [ 13.184734] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.184753] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 13.184773] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.184797] ? __kthread_parkme+0x82/0x180 [ 13.184818] ? preempt_count_sub+0x50/0x80 [ 13.184842] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.184862] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.184885] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.184908] kthread+0x337/0x6f0 [ 13.184988] ? trace_preempt_on+0x20/0xc0 [ 13.185016] ? __pfx_kthread+0x10/0x10 [ 13.185034] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.185056] ? calculate_sigpending+0x7b/0xa0 [ 13.185078] ? __pfx_kthread+0x10/0x10 [ 13.185096] ret_from_fork+0x41/0x80 [ 13.185117] ? __pfx_kthread+0x10/0x10 [ 13.185154] ret_from_fork_asm+0x1a/0x30 [ 13.185186] </TASK> [ 13.185196] [ 13.194932] Allocated by task 281: [ 13.195137] kasan_save_stack+0x45/0x70 [ 13.195372] kasan_save_track+0x18/0x40 [ 13.195614] kasan_save_alloc_info+0x3b/0x50 [ 13.195887] __kasan_kmalloc+0xb7/0xc0 [ 13.196098] __kmalloc_cache_noprof+0x189/0x420 [ 13.196268] kasan_bitops_generic+0x92/0x1c0 [ 13.196565] kunit_try_run_case+0x1a5/0x480 [ 13.196830] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.197095] kthread+0x337/0x6f0 [ 13.197273] ret_from_fork+0x41/0x80 [ 13.197502] ret_from_fork_asm+0x1a/0x30 [ 13.197641] [ 13.197742] The buggy address belongs to the object at ffff888102219660 [ 13.197742] which belongs to the cache kmalloc-16 of size 16 [ 13.198257] The buggy address is located 8 bytes inside of [ 13.198257] allocated 9-byte region [ffff888102219660, ffff888102219669) [ 13.198802] [ 13.198894] The buggy address belongs to the physical page: [ 13.199140] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102219 [ 13.199600] flags: 0x200000000000000(node=0|zone=2) [ 13.200120] page_type: f5(slab) [ 13.200293] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.200601] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.200819] page dumped because: kasan: bad access detected [ 13.200987] [ 13.201053] Memory state around the buggy address: [ 13.201202] ffff888102219500: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc [ 13.201739] ffff888102219580: 00 05 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 13.202090] >ffff888102219600: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 13.202476] ^ [ 13.202932] ffff888102219680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.203406] ffff888102219700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.203651] ================================================================== [ 13.312197] ================================================================== [ 13.312599] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 13.313143] Write of size 8 at addr ffff888102219668 by task kunit_try_catch/281 [ 13.313436] [ 13.313553] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT(voluntary) [ 13.313595] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.313607] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.313626] Call Trace: [ 13.313643] <TASK> [ 13.313657] dump_stack_lvl+0x73/0xb0 [ 13.313682] print_report+0xd1/0x610 [ 13.313704] ? __virt_addr_valid+0x1db/0x2d0 [ 13.313724] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 13.313745] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.313767] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 13.313789] kasan_report+0x141/0x180 [ 13.313810] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 13.313839] kasan_check_range+0x10c/0x1c0 [ 13.313900] __kasan_check_write+0x18/0x20 [ 13.313920] kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 13.313953] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 13.313977] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.313996] ? trace_hardirqs_on+0x37/0xe0 [ 13.314018] ? kasan_bitops_generic+0x92/0x1c0 [ 13.314041] kasan_bitops_generic+0x116/0x1c0 [ 13.314061] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.314082] ? __pfx_read_tsc+0x10/0x10 [ 13.314102] ? ktime_get_ts64+0x86/0x230 [ 13.314127] kunit_try_run_case+0x1a5/0x480 [ 13.314147] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.314166] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 13.314188] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.314211] ? __kthread_parkme+0x82/0x180 [ 13.314241] ? preempt_count_sub+0x50/0x80 [ 13.314267] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.314289] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.314312] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.314335] kthread+0x337/0x6f0 [ 13.314352] ? trace_preempt_on+0x20/0xc0 [ 13.314374] ? __pfx_kthread+0x10/0x10 [ 13.314395] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.314447] ? calculate_sigpending+0x7b/0xa0 [ 13.314468] ? __pfx_kthread+0x10/0x10 [ 13.314497] ret_from_fork+0x41/0x80 [ 13.314518] ? __pfx_kthread+0x10/0x10 [ 13.314536] ret_from_fork_asm+0x1a/0x30 [ 13.314567] </TASK> [ 13.314577] [ 13.330610] Allocated by task 281: [ 13.331017] kasan_save_stack+0x45/0x70 [ 13.331354] kasan_save_track+0x18/0x40 [ 13.331504] kasan_save_alloc_info+0x3b/0x50 [ 13.331816] __kasan_kmalloc+0xb7/0xc0 [ 13.332274] __kmalloc_cache_noprof+0x189/0x420 [ 13.332800] kasan_bitops_generic+0x92/0x1c0 [ 13.333354] kunit_try_run_case+0x1a5/0x480 [ 13.333512] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.333791] kthread+0x337/0x6f0 [ 13.334114] ret_from_fork+0x41/0x80 [ 13.334538] ret_from_fork_asm+0x1a/0x30 [ 13.334965] [ 13.335136] The buggy address belongs to the object at ffff888102219660 [ 13.335136] which belongs to the cache kmalloc-16 of size 16 [ 13.336298] The buggy address is located 8 bytes inside of [ 13.336298] allocated 9-byte region [ffff888102219660, ffff888102219669) [ 13.337015] [ 13.337182] The buggy address belongs to the physical page: [ 13.337891] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102219 [ 13.338215] flags: 0x200000000000000(node=0|zone=2) [ 13.338449] page_type: f5(slab) [ 13.338836] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.339530] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.340234] page dumped because: kasan: bad access detected [ 13.340808] [ 13.340898] Memory state around the buggy address: [ 13.341097] ffff888102219500: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc [ 13.341821] ffff888102219580: 00 05 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 13.342332] >ffff888102219600: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 13.342672] ^ [ 13.343360] ffff888102219680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.344117] ffff888102219700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.344653] ==================================================================