Date
July 5, 2025, 5:09 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 20.471746] ================================================================== [ 20.471934] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc0 [ 20.472029] Write of size 8 at addr fff00000c604ecc8 by task kunit_try_catch/261 [ 20.472119] [ 20.472169] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.472296] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.472323] Hardware name: linux,dummy-virt (DT) [ 20.472371] Call trace: [ 20.472566] show_stack+0x20/0x38 (C) [ 20.472673] dump_stack_lvl+0x8c/0xd0 [ 20.472726] print_report+0x118/0x608 [ 20.472773] kasan_report+0xdc/0x128 [ 20.472902] kasan_check_range+0x100/0x1a8 [ 20.472988] __kasan_check_write+0x20/0x30 [ 20.473038] kasan_bitops_modify.constprop.0+0x1dc/0xbc0 [ 20.473353] kasan_bitops_generic+0x110/0x1c8 [ 20.473429] kunit_try_run_case+0x170/0x3f0 [ 20.473481] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.473627] kthread+0x328/0x630 [ 20.473691] ret_from_fork+0x10/0x20 [ 20.473903] [ 20.474010] Allocated by task 261: [ 20.474060] kasan_save_stack+0x3c/0x68 [ 20.474206] kasan_save_track+0x20/0x40 [ 20.474272] kasan_save_alloc_info+0x40/0x58 [ 20.474376] __kasan_kmalloc+0xd4/0xd8 [ 20.474419] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.474479] kasan_bitops_generic+0xa0/0x1c8 [ 20.474525] kunit_try_run_case+0x170/0x3f0 [ 20.474711] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.474959] kthread+0x328/0x630 [ 20.475038] ret_from_fork+0x10/0x20 [ 20.475141] [ 20.475225] The buggy address belongs to the object at fff00000c604ecc0 [ 20.475225] which belongs to the cache kmalloc-16 of size 16 [ 20.475286] The buggy address is located 8 bytes inside of [ 20.475286] allocated 9-byte region [fff00000c604ecc0, fff00000c604ecc9) [ 20.475372] [ 20.475641] The buggy address belongs to the physical page: [ 20.475757] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10604e [ 20.475854] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.475959] page_type: f5(slab) [ 20.476023] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 20.476302] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 20.476454] page dumped because: kasan: bad access detected [ 20.476541] [ 20.476823] Memory state around the buggy address: [ 20.476944] fff00000c604eb80: 00 02 fc fc 00 05 fc fc fa fb fc fc 00 02 fc fc [ 20.476994] fff00000c604ec00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 20.477064] >fff00000c604ec80: fa fb fc fc 00 04 fc fc 00 01 fc fc fc fc fc fc [ 20.477218] ^ [ 20.477263] fff00000c604ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.477388] fff00000c604ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.477477] ================================================================== [ 20.478162] ================================================================== [ 20.478216] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbc0 [ 20.478269] Read of size 8 at addr fff00000c604ecc8 by task kunit_try_catch/261 [ 20.478329] [ 20.478364] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.478444] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.478471] Hardware name: linux,dummy-virt (DT) [ 20.478675] Call trace: [ 20.478718] show_stack+0x20/0x38 (C) [ 20.478900] dump_stack_lvl+0x8c/0xd0 [ 20.479027] print_report+0x118/0x608 [ 20.479098] kasan_report+0xdc/0x128 [ 20.479189] __asan_report_load8_noabort+0x20/0x30 [ 20.479247] kasan_bitops_modify.constprop.0+0xa80/0xbc0 [ 20.479584] [ 20.479802] __kasan_kmalloc+0xd4/0xd8 [ 20.481137] The buggy address is located 8 bytes inside of [ 20.481137] allocated 9-byte region [fff00000c604ecc0, fff00000c604ecc9) [ 20.482536] fff00000c604eb80: 00 02 fc fc 00 05 fc fc fa fb fc fc 00 02 fc fc [ 20.483198] ================================================================== [ 20.458025] ================================================================== [ 20.458088] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 20.458151] Write of size 8 at addr fff00000c604ecc8 by task kunit_try_catch/261 [ 20.458202] [ 20.458237] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.458321] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.458513] Hardware name: linux,dummy-virt (DT) [ 20.458565] Call trace: [ 20.458948] show_stack+0x20/0x38 (C) [ 20.459262] dump_stack_lvl+0x8c/0xd0 [ 20.459318] print_report+0x118/0x608 [ 20.459367] kasan_report+0xdc/0x128 [ 20.459413] kasan_check_range+0x100/0x1a8 [ 20.459469] __kasan_check_write+0x20/0x30 [ 20.459517] kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 20.459572] kasan_bitops_generic+0x110/0x1c8 [ 20.459621] kunit_try_run_case+0x170/0x3f0 [ 20.459672] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.459726] kthread+0x328/0x630 [ 20.460509] ret_from_fork+0x10/0x20 [ 20.460575] [ 20.460596] Allocated by task 261: [ 20.460641] kasan_save_stack+0x3c/0x68 [ 20.460686] kasan_save_track+0x20/0x40 [ 20.460725] kasan_save_alloc_info+0x40/0x58 [ 20.460768] __kasan_kmalloc+0xd4/0xd8 [ 20.460806] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.460856] kasan_bitops_generic+0xa0/0x1c8 [ 20.461153] kunit_try_run_case+0x170/0x3f0 [ 20.461290] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.461525] kthread+0x328/0x630 [ 20.461597] ret_from_fork+0x10/0x20 [ 20.461673] [ 20.462112] The buggy address belongs to the object at fff00000c604ecc0 [ 20.462112] which belongs to the cache kmalloc-16 of size 16 [ 20.462196] The buggy address is located 8 bytes inside of [ 20.462196] allocated 9-byte region [fff00000c604ecc0, fff00000c604ecc9) [ 20.462354] [ 20.462398] The buggy address belongs to the physical page: [ 20.462448] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10604e [ 20.462628] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.462707] page_type: f5(slab) [ 20.462753] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 20.462977] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 20.463075] page dumped because: kasan: bad access detected [ 20.463175] [ 20.463208] Memory state around the buggy address: [ 20.463407] fff00000c604eb80: 00 02 fc fc 00 05 fc fc fa fb fc fc 00 02 fc fc [ 20.463461] fff00000c604ec00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 20.463506] >fff00000c604ec80: fa fb fc fc 00 04 fc fc 00 01 fc fc fc fc fc fc [ 20.463964] ^ [ 20.464059] fff00000c604ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.464208] fff00000c604ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.464355] ================================================================== [ 20.465741] ================================================================== [ 20.465926] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 20.465991] Read of size 8 at addr fff00000c604ecc8 by task kunit_try_catch/261 [ 20.466245] [ 20.466291] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.466404] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.466434] Hardware name: linux,dummy-virt (DT) [ 20.466468] Call trace: [ 20.466539] show_stack+0x20/0x38 (C) [ 20.466593] dump_stack_lvl+0x8c/0xd0 [ 20.466665] print_report+0x118/0x608 [ 20.467099] kasan_report+0xdc/0x128 [ 20.467173] __asan_report_load8_noabort+0x20/0x30 [ 20.467530] kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 20.467618] kasan_bitops_generic+0x110/0x1c8 [ 20.467782] kunit_try_run_case+0x170/0x3f0 [ 20.467901] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.467986] kthread+0x328/0x630 [ 20.468113] ret_from_fork+0x10/0x20 [ 20.468221] [ 20.468306] Allocated by task 261: [ 20.468364] kasan_save_stack+0x3c/0x68 [ 20.468484] kasan_save_track+0x20/0x40 [ 20.468562] kasan_save_alloc_info+0x40/0x58 [ 20.468602] __kasan_kmalloc+0xd4/0xd8 [ 20.468810] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.468970] kasan_bitops_generic+0xa0/0x1c8 [ 20.469085] kunit_try_run_case+0x170/0x3f0 [ 20.469203] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.469261] kthread+0x328/0x630 [ 20.469471] ret_from_fork+0x10/0x20 [ 20.469612] [ 20.469685] The buggy address belongs to the object at fff00000c604ecc0 [ 20.469685] which belongs to the cache kmalloc-16 of size 16 [ 20.469889] The buggy address is located 8 bytes inside of [ 20.469889] allocated 9-byte region [fff00000c604ecc0, fff00000c604ecc9) [ 20.469967] [ 20.469995] The buggy address belongs to the physical page: [ 20.470047] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10604e [ 20.470103] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.470151] page_type: f5(slab) [ 20.470189] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 20.470241] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 20.470283] page dumped because: kasan: bad access detected [ 20.470317] [ 20.470344] Memory state around the buggy address: [ 20.470377] fff00000c604eb80: 00 02 fc fc 00 05 fc fc fa fb fc fc 00 02 fc fc [ 20.470422] fff00000c604ec00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 20.470478] >fff00000c604ec80: fa fb fc fc 00 04 fc fc 00 01 fc fc fc fc fc fc [ 20.470528] ^ [ 20.470571] fff00000c604ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.470645] fff00000c604ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.470686] ==================================================================
[ 13.614164] ================================================================== [ 13.615234] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50 [ 13.616171] Write of size 8 at addr ffff88810274c288 by task kunit_try_catch/279 [ 13.616848] [ 13.616947] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.616996] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.617009] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.617033] Call Trace: [ 13.617048] <TASK> [ 13.617066] dump_stack_lvl+0x73/0xb0 [ 13.617099] print_report+0xd1/0x650 [ 13.617120] ? __virt_addr_valid+0x1db/0x2d0 [ 13.617144] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 13.617169] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.617219] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 13.617245] kasan_report+0x141/0x180 [ 13.617266] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 13.617297] kasan_check_range+0x10c/0x1c0 [ 13.617321] __kasan_check_write+0x18/0x20 [ 13.617340] kasan_bitops_modify.constprop.0+0x101/0xd50 [ 13.617365] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 13.617396] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.617421] ? trace_hardirqs_on+0x37/0xe0 [ 13.617444] ? kasan_bitops_generic+0x92/0x1c0 [ 13.617481] kasan_bitops_generic+0x116/0x1c0 [ 13.617505] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.617529] ? __pfx_read_tsc+0x10/0x10 [ 13.617550] ? ktime_get_ts64+0x86/0x230 [ 13.617693] kunit_try_run_case+0x1a5/0x480 [ 13.617721] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.617743] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.617767] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.617790] ? __kthread_parkme+0x82/0x180 [ 13.617811] ? preempt_count_sub+0x50/0x80 [ 13.617835] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.617859] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.617882] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.617904] kthread+0x337/0x6f0 [ 13.617923] ? trace_preempt_on+0x20/0xc0 [ 13.617944] ? __pfx_kthread+0x10/0x10 [ 13.617964] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.617985] ? calculate_sigpending+0x7b/0xa0 [ 13.618009] ? __pfx_kthread+0x10/0x10 [ 13.618030] ret_from_fork+0x116/0x1d0 [ 13.618047] ? __pfx_kthread+0x10/0x10 [ 13.618068] ret_from_fork_asm+0x1a/0x30 [ 13.618098] </TASK> [ 13.618109] [ 13.630970] Allocated by task 279: [ 13.631169] kasan_save_stack+0x45/0x70 [ 13.631450] kasan_save_track+0x18/0x40 [ 13.631658] kasan_save_alloc_info+0x3b/0x50 [ 13.631861] __kasan_kmalloc+0xb7/0xc0 [ 13.632045] __kmalloc_cache_noprof+0x189/0x420 [ 13.632306] kasan_bitops_generic+0x92/0x1c0 [ 13.632525] kunit_try_run_case+0x1a5/0x480 [ 13.632677] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.632873] kthread+0x337/0x6f0 [ 13.633041] ret_from_fork+0x116/0x1d0 [ 13.633297] ret_from_fork_asm+0x1a/0x30 [ 13.633514] [ 13.633612] The buggy address belongs to the object at ffff88810274c280 [ 13.633612] which belongs to the cache kmalloc-16 of size 16 [ 13.634154] The buggy address is located 8 bytes inside of [ 13.634154] allocated 9-byte region [ffff88810274c280, ffff88810274c289) [ 13.634832] [ 13.634922] The buggy address belongs to the physical page: [ 13.635148] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10274c [ 13.635484] flags: 0x200000000000000(node=0|zone=2) [ 13.635656] page_type: f5(slab) [ 13.635829] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.636181] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.636540] page dumped because: kasan: bad access detected [ 13.636776] [ 13.636873] Memory state around the buggy address: [ 13.637100] ffff88810274c180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.637462] ffff88810274c200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.637747] >ffff88810274c280: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.638064] ^ [ 13.638416] ffff88810274c300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.638739] ffff88810274c380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.639058] ================================================================== [ 13.749039] ================================================================== [ 13.749548] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 13.750334] Write of size 8 at addr ffff88810274c288 by task kunit_try_catch/279 [ 13.751040] [ 13.751133] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.751176] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.751200] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.751221] Call Trace: [ 13.751238] <TASK> [ 13.751256] dump_stack_lvl+0x73/0xb0 [ 13.751284] print_report+0xd1/0x650 [ 13.751359] ? __virt_addr_valid+0x1db/0x2d0 [ 13.751395] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 13.751420] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.751442] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 13.751478] kasan_report+0x141/0x180 [ 13.751499] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 13.751529] kasan_check_range+0x10c/0x1c0 [ 13.751552] __kasan_check_write+0x18/0x20 [ 13.751571] kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 13.751597] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 13.751624] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.751649] ? trace_hardirqs_on+0x37/0xe0 [ 13.751670] ? kasan_bitops_generic+0x92/0x1c0 [ 13.751706] kasan_bitops_generic+0x116/0x1c0 [ 13.751730] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.751755] ? __pfx_read_tsc+0x10/0x10 [ 13.751777] ? ktime_get_ts64+0x86/0x230 [ 13.751800] kunit_try_run_case+0x1a5/0x480 [ 13.751823] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.751845] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.751867] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.751890] ? __kthread_parkme+0x82/0x180 [ 13.751910] ? preempt_count_sub+0x50/0x80 [ 13.751933] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.751956] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.751979] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.752001] kthread+0x337/0x6f0 [ 13.752020] ? trace_preempt_on+0x20/0xc0 [ 13.752041] ? __pfx_kthread+0x10/0x10 [ 13.752061] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.752082] ? calculate_sigpending+0x7b/0xa0 [ 13.752104] ? __pfx_kthread+0x10/0x10 [ 13.752126] ret_from_fork+0x116/0x1d0 [ 13.752143] ? __pfx_kthread+0x10/0x10 [ 13.752163] ret_from_fork_asm+0x1a/0x30 [ 13.752357] </TASK> [ 13.752376] [ 13.767194] Allocated by task 279: [ 13.767571] kasan_save_stack+0x45/0x70 [ 13.768003] kasan_save_track+0x18/0x40 [ 13.768218] kasan_save_alloc_info+0x3b/0x50 [ 13.768647] __kasan_kmalloc+0xb7/0xc0 [ 13.769123] __kmalloc_cache_noprof+0x189/0x420 [ 13.769616] kasan_bitops_generic+0x92/0x1c0 [ 13.769822] kunit_try_run_case+0x1a5/0x480 [ 13.770073] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.770637] kthread+0x337/0x6f0 [ 13.771013] ret_from_fork+0x116/0x1d0 [ 13.771248] ret_from_fork_asm+0x1a/0x30 [ 13.771669] [ 13.771933] The buggy address belongs to the object at ffff88810274c280 [ 13.771933] which belongs to the cache kmalloc-16 of size 16 [ 13.772768] The buggy address is located 8 bytes inside of [ 13.772768] allocated 9-byte region [ffff88810274c280, ffff88810274c289) [ 13.773686] [ 13.773898] The buggy address belongs to the physical page: [ 13.774535] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10274c [ 13.774876] flags: 0x200000000000000(node=0|zone=2) [ 13.775423] page_type: f5(slab) [ 13.775819] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.776186] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.776956] page dumped because: kasan: bad access detected [ 13.777126] [ 13.777382] Memory state around the buggy address: [ 13.777769] ffff88810274c180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.777982] ffff88810274c200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.778193] >ffff88810274c280: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.778398] ^ [ 13.778827] ffff88810274c300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.779261] ffff88810274c380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.779834] ================================================================== [ 13.810642] ================================================================== [ 13.811373] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50 [ 13.812088] Write of size 8 at addr ffff88810274c288 by task kunit_try_catch/279 [ 13.812370] [ 13.812733] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.812782] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.812794] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.812816] Call Trace: [ 13.812843] <TASK> [ 13.812861] dump_stack_lvl+0x73/0xb0 [ 13.812888] print_report+0xd1/0x650 [ 13.812911] ? __virt_addr_valid+0x1db/0x2d0 [ 13.812932] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 13.812958] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.812980] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 13.813006] kasan_report+0x141/0x180 [ 13.813027] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 13.813057] kasan_check_range+0x10c/0x1c0 [ 13.813080] __kasan_check_write+0x18/0x20 [ 13.813100] kasan_bitops_modify.constprop.0+0x547/0xd50 [ 13.813125] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 13.813152] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.813175] ? trace_hardirqs_on+0x37/0xe0 [ 13.813218] ? kasan_bitops_generic+0x92/0x1c0 [ 13.813247] kasan_bitops_generic+0x116/0x1c0 [ 13.813270] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.813295] ? __pfx_read_tsc+0x10/0x10 [ 13.813316] ? ktime_get_ts64+0x86/0x230 [ 13.813339] kunit_try_run_case+0x1a5/0x480 [ 13.813363] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.813399] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.813421] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.813444] ? __kthread_parkme+0x82/0x180 [ 13.813478] ? preempt_count_sub+0x50/0x80 [ 13.813501] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.813525] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.813547] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.813570] kthread+0x337/0x6f0 [ 13.813589] ? trace_preempt_on+0x20/0xc0 [ 13.813611] ? __pfx_kthread+0x10/0x10 [ 13.813631] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.813652] ? calculate_sigpending+0x7b/0xa0 [ 13.813675] ? __pfx_kthread+0x10/0x10 [ 13.813698] ret_from_fork+0x116/0x1d0 [ 13.813716] ? __pfx_kthread+0x10/0x10 [ 13.813737] ret_from_fork_asm+0x1a/0x30 [ 13.813767] </TASK> [ 13.813778] [ 13.830379] Allocated by task 279: [ 13.830941] kasan_save_stack+0x45/0x70 [ 13.831809] kasan_save_track+0x18/0x40 [ 13.832318] kasan_save_alloc_info+0x3b/0x50 [ 13.832887] __kasan_kmalloc+0xb7/0xc0 [ 13.833576] __kmalloc_cache_noprof+0x189/0x420 [ 13.834150] kasan_bitops_generic+0x92/0x1c0 [ 13.834818] kunit_try_run_case+0x1a5/0x480 [ 13.835599] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.836242] kthread+0x337/0x6f0 [ 13.836552] ret_from_fork+0x116/0x1d0 [ 13.837034] ret_from_fork_asm+0x1a/0x30 [ 13.837589] [ 13.837808] The buggy address belongs to the object at ffff88810274c280 [ 13.837808] which belongs to the cache kmalloc-16 of size 16 [ 13.838938] The buggy address is located 8 bytes inside of [ 13.838938] allocated 9-byte region [ffff88810274c280, ffff88810274c289) [ 13.839695] [ 13.839905] The buggy address belongs to the physical page: [ 13.840476] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10274c [ 13.841481] flags: 0x200000000000000(node=0|zone=2) [ 13.841659] page_type: f5(slab) [ 13.841969] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.842674] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.842907] page dumped because: kasan: bad access detected [ 13.843081] [ 13.843153] Memory state around the buggy address: [ 13.843338] ffff88810274c180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.843800] ffff88810274c200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.844104] >ffff88810274c280: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.845047] ^ [ 13.845368] ffff88810274c300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.845809] ffff88810274c380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.846028] ================================================================== [ 13.639564] ================================================================== [ 13.639935] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 13.640376] Write of size 8 at addr ffff88810274c288 by task kunit_try_catch/279 [ 13.640696] [ 13.640820] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.640863] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.640875] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.640896] Call Trace: [ 13.640910] <TASK> [ 13.640927] dump_stack_lvl+0x73/0xb0 [ 13.640953] print_report+0xd1/0x650 [ 13.640975] ? __virt_addr_valid+0x1db/0x2d0 [ 13.640998] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 13.641022] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.641044] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 13.641069] kasan_report+0x141/0x180 [ 13.641091] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 13.641122] kasan_check_range+0x10c/0x1c0 [ 13.641145] __kasan_check_write+0x18/0x20 [ 13.641164] kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 13.641256] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 13.641285] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.641308] ? trace_hardirqs_on+0x37/0xe0 [ 13.641331] ? kasan_bitops_generic+0x92/0x1c0 [ 13.641358] kasan_bitops_generic+0x116/0x1c0 [ 13.641386] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.641411] ? __pfx_read_tsc+0x10/0x10 [ 13.641431] ? ktime_get_ts64+0x86/0x230 [ 13.641465] kunit_try_run_case+0x1a5/0x480 [ 13.641489] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.641512] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.641535] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.641557] ? __kthread_parkme+0x82/0x180 [ 13.641577] ? preempt_count_sub+0x50/0x80 [ 13.641601] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.641624] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.641646] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.641669] kthread+0x337/0x6f0 [ 13.641690] ? trace_preempt_on+0x20/0xc0 [ 13.641730] ? __pfx_kthread+0x10/0x10 [ 13.641750] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.641771] ? calculate_sigpending+0x7b/0xa0 [ 13.641797] ? __pfx_kthread+0x10/0x10 [ 13.641818] ret_from_fork+0x116/0x1d0 [ 13.641835] ? __pfx_kthread+0x10/0x10 [ 13.641856] ret_from_fork_asm+0x1a/0x30 [ 13.641885] </TASK> [ 13.641896] [ 13.650274] Allocated by task 279: [ 13.650435] kasan_save_stack+0x45/0x70 [ 13.650866] kasan_save_track+0x18/0x40 [ 13.651070] kasan_save_alloc_info+0x3b/0x50 [ 13.651356] __kasan_kmalloc+0xb7/0xc0 [ 13.651511] __kmalloc_cache_noprof+0x189/0x420 [ 13.651693] kasan_bitops_generic+0x92/0x1c0 [ 13.651907] kunit_try_run_case+0x1a5/0x480 [ 13.652092] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.652330] kthread+0x337/0x6f0 [ 13.652468] ret_from_fork+0x116/0x1d0 [ 13.652627] ret_from_fork_asm+0x1a/0x30 [ 13.652846] [ 13.652943] The buggy address belongs to the object at ffff88810274c280 [ 13.652943] which belongs to the cache kmalloc-16 of size 16 [ 13.653553] The buggy address is located 8 bytes inside of [ 13.653553] allocated 9-byte region [ffff88810274c280, ffff88810274c289) [ 13.654054] [ 13.654129] The buggy address belongs to the physical page: [ 13.654557] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10274c [ 13.654924] flags: 0x200000000000000(node=0|zone=2) [ 13.655167] page_type: f5(slab) [ 13.655306] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.655628] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.655920] page dumped because: kasan: bad access detected [ 13.656147] [ 13.656245] Memory state around the buggy address: [ 13.656435] ffff88810274c180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.656737] ffff88810274c200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.657092] >ffff88810274c280: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.657393] ^ [ 13.657584] ffff88810274c300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.657923] ffff88810274c380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.658408] ================================================================== [ 13.680143] ================================================================== [ 13.680490] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 13.680786] Write of size 8 at addr ffff88810274c288 by task kunit_try_catch/279 [ 13.682097] [ 13.682549] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.682597] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.682609] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.682630] Call Trace: [ 13.682643] <TASK> [ 13.682657] dump_stack_lvl+0x73/0xb0 [ 13.682739] print_report+0xd1/0x650 [ 13.682762] ? __virt_addr_valid+0x1db/0x2d0 [ 13.682891] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 13.682917] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.682939] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 13.682965] kasan_report+0x141/0x180 [ 13.682987] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 13.683018] kasan_check_range+0x10c/0x1c0 [ 13.683041] __kasan_check_write+0x18/0x20 [ 13.683060] kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 13.683086] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 13.683114] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.683139] ? trace_hardirqs_on+0x37/0xe0 [ 13.683161] ? kasan_bitops_generic+0x92/0x1c0 [ 13.683365] kasan_bitops_generic+0x116/0x1c0 [ 13.683400] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.683426] ? __pfx_read_tsc+0x10/0x10 [ 13.683447] ? ktime_get_ts64+0x86/0x230 [ 13.683484] kunit_try_run_case+0x1a5/0x480 [ 13.683508] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.683529] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.683552] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.683576] ? __kthread_parkme+0x82/0x180 [ 13.683596] ? preempt_count_sub+0x50/0x80 [ 13.683620] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.683643] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.683665] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.683690] kthread+0x337/0x6f0 [ 13.683709] ? trace_preempt_on+0x20/0xc0 [ 13.683731] ? __pfx_kthread+0x10/0x10 [ 13.683752] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.683773] ? calculate_sigpending+0x7b/0xa0 [ 13.683796] ? __pfx_kthread+0x10/0x10 [ 13.683817] ret_from_fork+0x116/0x1d0 [ 13.683835] ? __pfx_kthread+0x10/0x10 [ 13.683856] ret_from_fork_asm+0x1a/0x30 [ 13.683886] </TASK> [ 13.683898] [ 13.699715] Allocated by task 279: [ 13.700128] kasan_save_stack+0x45/0x70 [ 13.700562] kasan_save_track+0x18/0x40 [ 13.700757] kasan_save_alloc_info+0x3b/0x50 [ 13.700909] __kasan_kmalloc+0xb7/0xc0 [ 13.701044] __kmalloc_cache_noprof+0x189/0x420 [ 13.701273] kasan_bitops_generic+0x92/0x1c0 [ 13.701676] kunit_try_run_case+0x1a5/0x480 [ 13.702103] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.702693] kthread+0x337/0x6f0 [ 13.703065] ret_from_fork+0x116/0x1d0 [ 13.703440] ret_from_fork_asm+0x1a/0x30 [ 13.704110] [ 13.704356] The buggy address belongs to the object at ffff88810274c280 [ 13.704356] which belongs to the cache kmalloc-16 of size 16 [ 13.705532] The buggy address is located 8 bytes inside of [ 13.705532] allocated 9-byte region [ffff88810274c280, ffff88810274c289) [ 13.706340] [ 13.706517] The buggy address belongs to the physical page: [ 13.707037] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10274c [ 13.707716] flags: 0x200000000000000(node=0|zone=2) [ 13.707890] page_type: f5(slab) [ 13.708016] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.708391] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.709088] page dumped because: kasan: bad access detected [ 13.709639] [ 13.709805] Memory state around the buggy address: [ 13.710402] ffff88810274c180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.711041] ffff88810274c200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.711906] >ffff88810274c280: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.712621] ^ [ 13.712812] ffff88810274c300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.713429] ffff88810274c380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.713662] ================================================================== [ 13.714610] ================================================================== [ 13.715587] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50 [ 13.716058] Write of size 8 at addr ffff88810274c288 by task kunit_try_catch/279 [ 13.716288] [ 13.716499] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.716547] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.716559] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.716581] Call Trace: [ 13.716598] <TASK> [ 13.716615] dump_stack_lvl+0x73/0xb0 [ 13.716641] print_report+0xd1/0x650 [ 13.716663] ? __virt_addr_valid+0x1db/0x2d0 [ 13.716688] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 13.716712] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.716735] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 13.716760] kasan_report+0x141/0x180 [ 13.716782] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 13.716812] kasan_check_range+0x10c/0x1c0 [ 13.716836] __kasan_check_write+0x18/0x20 [ 13.716854] kasan_bitops_modify.constprop.0+0x373/0xd50 [ 13.716880] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 13.716906] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.716930] ? trace_hardirqs_on+0x37/0xe0 [ 13.716952] ? kasan_bitops_generic+0x92/0x1c0 [ 13.716979] kasan_bitops_generic+0x116/0x1c0 [ 13.717002] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.717026] ? __pfx_read_tsc+0x10/0x10 [ 13.717047] ? ktime_get_ts64+0x86/0x230 [ 13.717071] kunit_try_run_case+0x1a5/0x480 [ 13.717095] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.717117] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.717140] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.717163] ? __kthread_parkme+0x82/0x180 [ 13.717183] ? preempt_count_sub+0x50/0x80 [ 13.717225] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.717249] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.717272] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.717294] kthread+0x337/0x6f0 [ 13.717313] ? trace_preempt_on+0x20/0xc0 [ 13.717334] ? __pfx_kthread+0x10/0x10 [ 13.717355] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.717375] ? calculate_sigpending+0x7b/0xa0 [ 13.717404] ? __pfx_kthread+0x10/0x10 [ 13.717424] ret_from_fork+0x116/0x1d0 [ 13.717443] ? __pfx_kthread+0x10/0x10 [ 13.717471] ret_from_fork_asm+0x1a/0x30 [ 13.717502] </TASK> [ 13.717513] [ 13.733560] Allocated by task 279: [ 13.733752] kasan_save_stack+0x45/0x70 [ 13.734163] kasan_save_track+0x18/0x40 [ 13.734645] kasan_save_alloc_info+0x3b/0x50 [ 13.735055] __kasan_kmalloc+0xb7/0xc0 [ 13.735598] __kmalloc_cache_noprof+0x189/0x420 [ 13.736106] kasan_bitops_generic+0x92/0x1c0 [ 13.736263] kunit_try_run_case+0x1a5/0x480 [ 13.736795] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.737323] kthread+0x337/0x6f0 [ 13.737469] ret_from_fork+0x116/0x1d0 [ 13.737605] ret_from_fork_asm+0x1a/0x30 [ 13.737889] [ 13.738068] The buggy address belongs to the object at ffff88810274c280 [ 13.738068] which belongs to the cache kmalloc-16 of size 16 [ 13.739486] The buggy address is located 8 bytes inside of [ 13.739486] allocated 9-byte region [ffff88810274c280, ffff88810274c289) [ 13.740519] [ 13.740597] The buggy address belongs to the physical page: [ 13.740948] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10274c [ 13.741798] flags: 0x200000000000000(node=0|zone=2) [ 13.742345] page_type: f5(slab) [ 13.742682] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.743379] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.743960] page dumped because: kasan: bad access detected [ 13.744177] [ 13.744342] Memory state around the buggy address: [ 13.745033] ffff88810274c180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.745487] ffff88810274c200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.746179] >ffff88810274c280: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.746752] ^ [ 13.747055] ffff88810274c300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.747470] ffff88810274c380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.748180] ================================================================== [ 13.780339] ================================================================== [ 13.780657] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 13.781058] Write of size 8 at addr ffff88810274c288 by task kunit_try_catch/279 [ 13.781321] [ 13.781433] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.781650] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.781663] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.781697] Call Trace: [ 13.781708] <TASK> [ 13.781723] dump_stack_lvl+0x73/0xb0 [ 13.781752] print_report+0xd1/0x650 [ 13.781774] ? __virt_addr_valid+0x1db/0x2d0 [ 13.781796] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 13.781821] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.781843] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 13.781869] kasan_report+0x141/0x180 [ 13.781891] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 13.781923] kasan_check_range+0x10c/0x1c0 [ 13.781947] __kasan_check_write+0x18/0x20 [ 13.781966] kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 13.781990] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 13.782016] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.782039] ? trace_hardirqs_on+0x37/0xe0 [ 13.782060] ? kasan_bitops_generic+0x92/0x1c0 [ 13.782088] kasan_bitops_generic+0x116/0x1c0 [ 13.782110] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.782135] ? __pfx_read_tsc+0x10/0x10 [ 13.782154] ? ktime_get_ts64+0x86/0x230 [ 13.782178] kunit_try_run_case+0x1a5/0x480 [ 13.782251] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.782276] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.782298] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.782320] ? __kthread_parkme+0x82/0x180 [ 13.782341] ? preempt_count_sub+0x50/0x80 [ 13.782363] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.782386] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.782410] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.782433] kthread+0x337/0x6f0 [ 13.782466] ? trace_preempt_on+0x20/0xc0 [ 13.782488] ? __pfx_kthread+0x10/0x10 [ 13.782508] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.782529] ? calculate_sigpending+0x7b/0xa0 [ 13.782551] ? __pfx_kthread+0x10/0x10 [ 13.782573] ret_from_fork+0x116/0x1d0 [ 13.782591] ? __pfx_kthread+0x10/0x10 [ 13.782611] ret_from_fork_asm+0x1a/0x30 [ 13.782641] </TASK> [ 13.782654] [ 13.795080] Allocated by task 279: [ 13.795519] kasan_save_stack+0x45/0x70 [ 13.795714] kasan_save_track+0x18/0x40 [ 13.795898] kasan_save_alloc_info+0x3b/0x50 [ 13.796475] __kasan_kmalloc+0xb7/0xc0 [ 13.796835] __kmalloc_cache_noprof+0x189/0x420 [ 13.797151] kasan_bitops_generic+0x92/0x1c0 [ 13.797774] kunit_try_run_case+0x1a5/0x480 [ 13.798329] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.799013] kthread+0x337/0x6f0 [ 13.799440] ret_from_fork+0x116/0x1d0 [ 13.799843] ret_from_fork_asm+0x1a/0x30 [ 13.800118] [ 13.800348] The buggy address belongs to the object at ffff88810274c280 [ 13.800348] which belongs to the cache kmalloc-16 of size 16 [ 13.801553] The buggy address is located 8 bytes inside of [ 13.801553] allocated 9-byte region [ffff88810274c280, ffff88810274c289) [ 13.802053] [ 13.802473] The buggy address belongs to the physical page: [ 13.803062] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10274c [ 13.803780] flags: 0x200000000000000(node=0|zone=2) [ 13.804418] page_type: f5(slab) [ 13.804631] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.805151] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.805826] page dumped because: kasan: bad access detected [ 13.806007] [ 13.806081] Memory state around the buggy address: [ 13.806348] ffff88810274c180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.807100] ffff88810274c200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.807863] >ffff88810274c280: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.808730] ^ [ 13.809067] ffff88810274c300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.809314] ffff88810274c380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.809758] ================================================================== [ 13.658831] ================================================================== [ 13.659171] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 13.659636] Write of size 8 at addr ffff88810274c288 by task kunit_try_catch/279 [ 13.660001] [ 13.660113] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.660156] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.660168] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.660249] Call Trace: [ 13.660265] <TASK> [ 13.660281] dump_stack_lvl+0x73/0xb0 [ 13.660308] print_report+0xd1/0x650 [ 13.660329] ? __virt_addr_valid+0x1db/0x2d0 [ 13.660350] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 13.660375] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.660397] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 13.660422] kasan_report+0x141/0x180 [ 13.660444] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 13.660483] kasan_check_range+0x10c/0x1c0 [ 13.660507] __kasan_check_write+0x18/0x20 [ 13.660526] kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 13.660551] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 13.660577] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.660601] ? trace_hardirqs_on+0x37/0xe0 [ 13.660622] ? kasan_bitops_generic+0x92/0x1c0 [ 13.660649] kasan_bitops_generic+0x116/0x1c0 [ 13.660672] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.660696] ? __pfx_read_tsc+0x10/0x10 [ 13.660716] ? ktime_get_ts64+0x86/0x230 [ 13.660739] kunit_try_run_case+0x1a5/0x480 [ 13.660762] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.660784] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.660806] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.660829] ? __kthread_parkme+0x82/0x180 [ 13.660849] ? preempt_count_sub+0x50/0x80 [ 13.660872] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.660895] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.660920] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.660946] kthread+0x337/0x6f0 [ 13.660964] ? trace_preempt_on+0x20/0xc0 [ 13.660986] ? __pfx_kthread+0x10/0x10 [ 13.661006] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.661027] ? calculate_sigpending+0x7b/0xa0 [ 13.661051] ? __pfx_kthread+0x10/0x10 [ 13.661072] ret_from_fork+0x116/0x1d0 [ 13.661089] ? __pfx_kthread+0x10/0x10 [ 13.661109] ret_from_fork_asm+0x1a/0x30 [ 13.661139] </TASK> [ 13.661150] [ 13.669738] Allocated by task 279: [ 13.669916] kasan_save_stack+0x45/0x70 [ 13.670088] kasan_save_track+0x18/0x40 [ 13.670399] kasan_save_alloc_info+0x3b/0x50 [ 13.670592] __kasan_kmalloc+0xb7/0xc0 [ 13.670780] __kmalloc_cache_noprof+0x189/0x420 [ 13.671024] kasan_bitops_generic+0x92/0x1c0 [ 13.671316] kunit_try_run_case+0x1a5/0x480 [ 13.671539] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.671824] kthread+0x337/0x6f0 [ 13.671977] ret_from_fork+0x116/0x1d0 [ 13.672154] ret_from_fork_asm+0x1a/0x30 [ 13.672354] [ 13.672428] The buggy address belongs to the object at ffff88810274c280 [ 13.672428] which belongs to the cache kmalloc-16 of size 16 [ 13.673001] The buggy address is located 8 bytes inside of [ 13.673001] allocated 9-byte region [ffff88810274c280, ffff88810274c289) [ 13.673534] [ 13.673626] The buggy address belongs to the physical page: [ 13.673882] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10274c [ 13.674174] flags: 0x200000000000000(node=0|zone=2) [ 13.674592] page_type: f5(slab) [ 13.674739] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.675089] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.675446] page dumped because: kasan: bad access detected [ 13.675705] [ 13.675801] Memory state around the buggy address: [ 13.675986] ffff88810274c180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.676362] ffff88810274c200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.676657] >ffff88810274c280: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.676915] ^ [ 13.677039] ffff88810274c300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.677356] ffff88810274c380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.677723] ==================================================================