Date
July 16, 2025, 3:10 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 18.884026] ================================================================== [ 18.884082] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc0 [ 18.884136] Write of size 8 at addr fff00000c3eef5c8 by task kunit_try_catch/261 [ 18.884190] [ 18.884630] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.884842] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.884878] Hardware name: linux,dummy-virt (DT) [ 18.884966] Call trace: [ 18.884993] show_stack+0x20/0x38 (C) [ 18.885048] dump_stack_lvl+0x8c/0xd0 [ 18.885272] print_report+0x118/0x5d0 [ 18.885489] kasan_report+0xdc/0x128 [ 18.885580] kasan_check_range+0x100/0x1a8 [ 18.885640] __kasan_check_write+0x20/0x30 [ 18.885687] kasan_bitops_modify.constprop.0+0x1dc/0xbc0 [ 18.885760] kasan_bitops_generic+0x110/0x1c8 [ 18.885809] kunit_try_run_case+0x170/0x3f0 [ 18.885857] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.885910] kthread+0x328/0x630 [ 18.885954] ret_from_fork+0x10/0x20 [ 18.886002] [ 18.886023] Allocated by task 261: [ 18.886064] kasan_save_stack+0x3c/0x68 [ 18.886109] kasan_save_track+0x20/0x40 [ 18.886152] kasan_save_alloc_info+0x40/0x58 [ 18.886195] __kasan_kmalloc+0xd4/0xd8 [ 18.886232] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.886274] kasan_bitops_generic+0xa0/0x1c8 [ 18.886314] kunit_try_run_case+0x170/0x3f0 [ 18.886362] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.886415] kthread+0x328/0x630 [ 18.886569] The buggy address is located 8 bytes inside of [ 18.886569] allocated 9-byte region [fff00000c3eef5c0, fff00000c3eef5c9) [ 18.888145] [ 18.888733] ^ [ 18.888793] fff00000c3eef600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.890117] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbc0 [ 18.892005] __asan_report_load8_noabort+0x20/0x30 [ 18.893581] kasan_save_stack+0x3c/0x68 [ 18.894942] ret_from_fork+0x10/0x20 [ 18.895871] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.896875] [ 18.897585] ^ [ 18.897629] fff00000c3eef600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.899633] Write of size 8 at addr fff00000c3eef5c8 by task kunit_try_catch/261 [ 18.900194] Call trace: [ 18.901267] kasan_report+0xdc/0x128 [ 18.902037] kasan_bitops_modify.constprop.0+0x2b4/0xbc0 [ 18.902895] kasan_save_stack+0x3c/0x68 [ 18.903241] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.903480] The buggy address is located 8 bytes inside of [ 18.903480] allocated 9-byte region [fff00000c3eef5c0, fff00000c3eef5c9) [ 18.905333] >fff00000c3eef580: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 18.905527] ^ [ 18.906868] ================================================================== [ 18.875343] ================================================================== [ 18.875775] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 18.875976] Read of size 8 at addr fff00000c3eef5c8 by task kunit_try_catch/261 [ 18.876043] [ 18.876079] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.876491] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.876537] Hardware name: linux,dummy-virt (DT) [ 18.876589] Call trace: [ 18.876616] show_stack+0x20/0x38 (C) [ 18.876804] dump_stack_lvl+0x8c/0xd0 [ 18.876981] print_report+0x118/0x5d0 [ 18.877379] kasan_report+0xdc/0x128 [ 18.877476] __asan_report_load8_noabort+0x20/0x30 [ 18.877623] kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 18.877772] kasan_bitops_generic+0x110/0x1c8 [ 18.877877] kunit_try_run_case+0x170/0x3f0 [ 18.877933] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.878114] kthread+0x328/0x630 [ 18.878401] ret_from_fork+0x10/0x20 [ 18.878518] [ 18.878556] Allocated by task 261: [ 18.878624] kasan_save_stack+0x3c/0x68 [ 18.878670] kasan_save_track+0x20/0x40 [ 18.878884] kasan_save_alloc_info+0x40/0x58 [ 18.878936] __kasan_kmalloc+0xd4/0xd8 [ 18.879098] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.879151] kasan_bitops_generic+0xa0/0x1c8 [ 18.879291] kunit_try_run_case+0x170/0x3f0 [ 18.879448] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.879635] kthread+0x328/0x630 [ 18.879675] ret_from_fork+0x10/0x20 [ 18.880038] [ 18.880134] The buggy address belongs to the object at fff00000c3eef5c0 [ 18.880134] which belongs to the cache kmalloc-16 of size 16 [ 18.880269] The buggy address is located 8 bytes inside of [ 18.880269] allocated 9-byte region [fff00000c3eef5c0, fff00000c3eef5c9) [ 18.880446] [ 18.880525] The buggy address belongs to the physical page: [ 18.880738] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eef [ 18.881057] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.881137] page_type: f5(slab) [ 18.881281] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 18.881481] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 18.881576] page dumped because: kasan: bad access detected [ 18.881637] [ 18.881797] Memory state around the buggy address: [ 18.881989] fff00000c3eef480: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc [ 18.882067] fff00000c3eef500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 18.882148] >fff00000c3eef580: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 18.882191] ^ [ 18.882231] fff00000c3eef600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.882278] fff00000c3eef680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.882320] ================================================================== [ 18.862238] ================================================================== [ 18.862303] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 18.862361] Write of size 8 at addr fff00000c3eef5c8 by task kunit_try_catch/261 [ 18.862414] [ 18.862448] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.862534] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.862562] Hardware name: linux,dummy-virt (DT) [ 18.862595] Call trace: [ 18.862622] show_stack+0x20/0x38 (C) [ 18.862682] dump_stack_lvl+0x8c/0xd0 [ 18.863957] print_report+0x118/0x5d0 [ 18.864067] kasan_report+0xdc/0x128 [ 18.864178] kasan_check_range+0x100/0x1a8 [ 18.864388] __kasan_check_write+0x20/0x30 [ 18.864733] kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 18.864850] kasan_bitops_generic+0x110/0x1c8 [ 18.864969] kunit_try_run_case+0x170/0x3f0 [ 18.865364] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.865456] kthread+0x328/0x630 [ 18.865596] ret_from_fork+0x10/0x20 [ 18.865940] [ 18.865981] Allocated by task 261: [ 18.866244] kasan_save_stack+0x3c/0x68 [ 18.866354] kasan_save_track+0x20/0x40 [ 18.866474] kasan_save_alloc_info+0x40/0x58 [ 18.866539] __kasan_kmalloc+0xd4/0xd8 [ 18.866928] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.866988] kasan_bitops_generic+0xa0/0x1c8 [ 18.867271] kunit_try_run_case+0x170/0x3f0 [ 18.867765] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.867946] kthread+0x328/0x630 [ 18.868053] ret_from_fork+0x10/0x20 [ 18.868151] [ 18.868174] The buggy address belongs to the object at fff00000c3eef5c0 [ 18.868174] which belongs to the cache kmalloc-16 of size 16 [ 18.868357] The buggy address is located 8 bytes inside of [ 18.868357] allocated 9-byte region [fff00000c3eef5c0, fff00000c3eef5c9) [ 18.868555] [ 18.868607] The buggy address belongs to the physical page: [ 18.868775] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103eef [ 18.868975] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.869086] page_type: f5(slab) [ 18.869254] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 18.869470] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 18.869692] page dumped because: kasan: bad access detected [ 18.869779] [ 18.869874] Memory state around the buggy address: [ 18.869916] fff00000c3eef480: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc [ 18.870140] fff00000c3eef500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 18.870282] >fff00000c3eef580: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 18.870425] ^ [ 18.870508] fff00000c3eef600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.870572] fff00000c3eef680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.870770] ==================================================================
[ 14.741116] ================================================================== [ 14.741392] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 14.742139] Write of size 8 at addr ffff888103a60008 by task kunit_try_catch/278 [ 14.742367] [ 14.742502] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.742583] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.742596] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.742617] Call Trace: [ 14.742634] <TASK> [ 14.742648] dump_stack_lvl+0x73/0xb0 [ 14.742680] print_report+0xd1/0x610 [ 14.742735] ? __virt_addr_valid+0x1db/0x2d0 [ 14.742770] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 14.742798] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.742823] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 14.742883] kasan_report+0x141/0x180 [ 14.742906] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 14.742939] kasan_check_range+0x10c/0x1c0 [ 14.742964] __kasan_check_write+0x18/0x20 [ 14.742985] kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 14.743045] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.743074] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.743099] ? trace_hardirqs_on+0x37/0xe0 [ 14.743128] kasan_bitops_generic+0x116/0x1c0 [ 14.743154] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.743187] ? __pfx_read_tsc+0x10/0x10 [ 14.743209] ? ktime_get_ts64+0x86/0x230 [ 14.743234] kunit_try_run_case+0x1a5/0x480 [ 14.743259] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.743283] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.743362] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.743411] ? __kthread_parkme+0x82/0x180 [ 14.743457] ? preempt_count_sub+0x50/0x80 [ 14.743482] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.743508] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.743535] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.743562] kthread+0x337/0x6f0 [ 14.743581] ? trace_preempt_on+0x20/0xc0 [ 14.743604] ? __pfx_kthread+0x10/0x10 [ 14.743625] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.743649] ? calculate_sigpending+0x7b/0xa0 [ 14.743674] ? __pfx_kthread+0x10/0x10 [ 14.743696] ret_from_fork+0x116/0x1d0 [ 14.743715] ? __pfx_kthread+0x10/0x10 [ 14.743737] ret_from_fork_asm+0x1a/0x30 [ 14.743777] </TASK> [ 14.743818] [ 14.752249] Allocated by task 278: [ 14.752444] kasan_save_stack+0x45/0x70 [ 14.752687] kasan_save_track+0x18/0x40 [ 14.752985] kasan_save_alloc_info+0x3b/0x50 [ 14.753204] __kasan_kmalloc+0xb7/0xc0 [ 14.753390] __kmalloc_cache_noprof+0x189/0x420 [ 14.753607] kasan_bitops_generic+0x92/0x1c0 [ 14.753981] kunit_try_run_case+0x1a5/0x480 [ 14.754165] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.754454] kthread+0x337/0x6f0 [ 14.754634] ret_from_fork+0x116/0x1d0 [ 14.754829] ret_from_fork_asm+0x1a/0x30 [ 14.755035] [ 14.755164] The buggy address belongs to the object at ffff888103a60000 [ 14.755164] which belongs to the cache kmalloc-16 of size 16 [ 14.755715] The buggy address is located 8 bytes inside of [ 14.755715] allocated 9-byte region [ffff888103a60000, ffff888103a60009) [ 14.756247] [ 14.756359] The buggy address belongs to the physical page: [ 14.756788] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a60 [ 14.757133] flags: 0x200000000000000(node=0|zone=2) [ 14.757414] page_type: f5(slab) [ 14.757635] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.757962] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.758313] page dumped because: kasan: bad access detected [ 14.758647] [ 14.758739] Memory state around the buggy address: [ 14.758992] ffff888103a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.759347] ffff888103a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.759722] >ffff888103a60000: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.760055] ^ [ 14.760248] ffff888103a60080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.760497] ffff888103a60100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.760719] ================================================================== [ 14.660332] ================================================================== [ 14.661175] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 14.661656] Write of size 8 at addr ffff888103a60008 by task kunit_try_catch/278 [ 14.661967] [ 14.662080] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.662127] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.662140] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.662181] Call Trace: [ 14.662210] <TASK> [ 14.662226] dump_stack_lvl+0x73/0xb0 [ 14.662258] print_report+0xd1/0x610 [ 14.662282] ? __virt_addr_valid+0x1db/0x2d0 [ 14.662308] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 14.662337] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.662363] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 14.662391] kasan_report+0x141/0x180 [ 14.662415] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 14.662448] kasan_check_range+0x10c/0x1c0 [ 14.662473] __kasan_check_write+0x18/0x20 [ 14.662494] kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 14.662544] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.662574] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.662621] ? trace_hardirqs_on+0x37/0xe0 [ 14.662652] kasan_bitops_generic+0x116/0x1c0 [ 14.662679] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.662707] ? __pfx_read_tsc+0x10/0x10 [ 14.662730] ? ktime_get_ts64+0x86/0x230 [ 14.662755] kunit_try_run_case+0x1a5/0x480 [ 14.662791] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.662834] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.662862] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.662888] ? __kthread_parkme+0x82/0x180 [ 14.662910] ? preempt_count_sub+0x50/0x80 [ 14.662936] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.662963] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.662991] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.663018] kthread+0x337/0x6f0 [ 14.663038] ? trace_preempt_on+0x20/0xc0 [ 14.663061] ? __pfx_kthread+0x10/0x10 [ 14.663082] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.663105] ? calculate_sigpending+0x7b/0xa0 [ 14.663130] ? __pfx_kthread+0x10/0x10 [ 14.663152] ret_from_fork+0x116/0x1d0 [ 14.663170] ? __pfx_kthread+0x10/0x10 [ 14.663198] ret_from_fork_asm+0x1a/0x30 [ 14.663229] </TASK> [ 14.663240] [ 14.671322] Allocated by task 278: [ 14.671616] kasan_save_stack+0x45/0x70 [ 14.671835] kasan_save_track+0x18/0x40 [ 14.672086] kasan_save_alloc_info+0x3b/0x50 [ 14.672328] __kasan_kmalloc+0xb7/0xc0 [ 14.672609] __kmalloc_cache_noprof+0x189/0x420 [ 14.672877] kasan_bitops_generic+0x92/0x1c0 [ 14.673127] kunit_try_run_case+0x1a5/0x480 [ 14.673340] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.673699] kthread+0x337/0x6f0 [ 14.673848] ret_from_fork+0x116/0x1d0 [ 14.674067] ret_from_fork_asm+0x1a/0x30 [ 14.674269] [ 14.674376] The buggy address belongs to the object at ffff888103a60000 [ 14.674376] which belongs to the cache kmalloc-16 of size 16 [ 14.674990] The buggy address is located 8 bytes inside of [ 14.674990] allocated 9-byte region [ffff888103a60000, ffff888103a60009) [ 14.675510] [ 14.675644] The buggy address belongs to the physical page: [ 14.675906] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a60 [ 14.676259] flags: 0x200000000000000(node=0|zone=2) [ 14.676544] page_type: f5(slab) [ 14.676716] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.677077] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.677420] page dumped because: kasan: bad access detected [ 14.677666] [ 14.677802] Memory state around the buggy address: [ 14.678000] ffff888103a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.678238] ffff888103a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.678488] >ffff888103a60000: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.678847] ^ [ 14.679017] ffff888103a60080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.679375] ffff888103a60100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.679730] ================================================================== [ 14.701477] ================================================================== [ 14.701801] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 14.702271] Write of size 8 at addr ffff888103a60008 by task kunit_try_catch/278 [ 14.702614] [ 14.702752] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.702808] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.702848] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.702893] Call Trace: [ 14.702927] <TASK> [ 14.702985] dump_stack_lvl+0x73/0xb0 [ 14.703060] print_report+0xd1/0x610 [ 14.703131] ? __virt_addr_valid+0x1db/0x2d0 [ 14.703159] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 14.703192] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.703217] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 14.703246] kasan_report+0x141/0x180 [ 14.703270] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 14.703303] kasan_check_range+0x10c/0x1c0 [ 14.703328] __kasan_check_write+0x18/0x20 [ 14.703349] kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 14.703378] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.703407] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.703433] ? trace_hardirqs_on+0x37/0xe0 [ 14.703463] kasan_bitops_generic+0x116/0x1c0 [ 14.703489] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.703516] ? __pfx_read_tsc+0x10/0x10 [ 14.703537] ? ktime_get_ts64+0x86/0x230 [ 14.703561] kunit_try_run_case+0x1a5/0x480 [ 14.703595] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.703620] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.703646] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.703671] ? __kthread_parkme+0x82/0x180 [ 14.703693] ? preempt_count_sub+0x50/0x80 [ 14.703753] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.703790] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.703816] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.703843] kthread+0x337/0x6f0 [ 14.703864] ? trace_preempt_on+0x20/0xc0 [ 14.703914] ? __pfx_kthread+0x10/0x10 [ 14.703959] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.704005] ? calculate_sigpending+0x7b/0xa0 [ 14.704031] ? __pfx_kthread+0x10/0x10 [ 14.704076] ret_from_fork+0x116/0x1d0 [ 14.704120] ? __pfx_kthread+0x10/0x10 [ 14.704141] ret_from_fork_asm+0x1a/0x30 [ 14.704173] </TASK> [ 14.704183] [ 14.712687] Allocated by task 278: [ 14.712912] kasan_save_stack+0x45/0x70 [ 14.713138] kasan_save_track+0x18/0x40 [ 14.713344] kasan_save_alloc_info+0x3b/0x50 [ 14.713608] __kasan_kmalloc+0xb7/0xc0 [ 14.713803] __kmalloc_cache_noprof+0x189/0x420 [ 14.713987] kasan_bitops_generic+0x92/0x1c0 [ 14.714228] kunit_try_run_case+0x1a5/0x480 [ 14.714403] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.714708] kthread+0x337/0x6f0 [ 14.714892] ret_from_fork+0x116/0x1d0 [ 14.715112] ret_from_fork_asm+0x1a/0x30 [ 14.715317] [ 14.715412] The buggy address belongs to the object at ffff888103a60000 [ 14.715412] which belongs to the cache kmalloc-16 of size 16 [ 14.715892] The buggy address is located 8 bytes inside of [ 14.715892] allocated 9-byte region [ffff888103a60000, ffff888103a60009) [ 14.716231] [ 14.716302] The buggy address belongs to the physical page: [ 14.716680] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a60 [ 14.717325] flags: 0x200000000000000(node=0|zone=2) [ 14.717567] page_type: f5(slab) [ 14.717687] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.717922] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.718143] page dumped because: kasan: bad access detected [ 14.718311] [ 14.718447] Memory state around the buggy address: [ 14.718711] ffff888103a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.719147] ffff888103a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.719592] >ffff888103a60000: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.719951] ^ [ 14.720125] ffff888103a60080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.720445] ffff888103a60100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.720755] ================================================================== [ 14.630598] ================================================================== [ 14.632016] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50 [ 14.632408] Write of size 8 at addr ffff888103a60008 by task kunit_try_catch/278 [ 14.633011] [ 14.633140] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.633192] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.633204] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.633228] Call Trace: [ 14.633242] <TASK> [ 14.633261] dump_stack_lvl+0x73/0xb0 [ 14.633297] print_report+0xd1/0x610 [ 14.633323] ? __virt_addr_valid+0x1db/0x2d0 [ 14.633350] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 14.633380] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.633405] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 14.633584] kasan_report+0x141/0x180 [ 14.633720] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 14.633770] kasan_check_range+0x10c/0x1c0 [ 14.633795] __kasan_check_write+0x18/0x20 [ 14.633817] kasan_bitops_modify.constprop.0+0x101/0xd50 [ 14.633845] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.633874] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.633902] ? trace_hardirqs_on+0x37/0xe0 [ 14.633934] kasan_bitops_generic+0x116/0x1c0 [ 14.633960] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.633987] ? __pfx_read_tsc+0x10/0x10 [ 14.634010] ? ktime_get_ts64+0x86/0x230 [ 14.634037] kunit_try_run_case+0x1a5/0x480 [ 14.634066] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.634091] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.634119] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.634144] ? __kthread_parkme+0x82/0x180 [ 14.634167] ? preempt_count_sub+0x50/0x80 [ 14.634192] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.634218] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.634243] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.634271] kthread+0x337/0x6f0 [ 14.634291] ? trace_preempt_on+0x20/0xc0 [ 14.634314] ? __pfx_kthread+0x10/0x10 [ 14.634335] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.634357] ? calculate_sigpending+0x7b/0xa0 [ 14.634383] ? __pfx_kthread+0x10/0x10 [ 14.634405] ret_from_fork+0x116/0x1d0 [ 14.634425] ? __pfx_kthread+0x10/0x10 [ 14.634459] ret_from_fork_asm+0x1a/0x30 [ 14.634492] </TASK> [ 14.634503] [ 14.646789] Allocated by task 278: [ 14.647156] kasan_save_stack+0x45/0x70 [ 14.647560] kasan_save_track+0x18/0x40 [ 14.648062] kasan_save_alloc_info+0x3b/0x50 [ 14.648462] __kasan_kmalloc+0xb7/0xc0 [ 14.648853] __kmalloc_cache_noprof+0x189/0x420 [ 14.649269] kasan_bitops_generic+0x92/0x1c0 [ 14.649554] kunit_try_run_case+0x1a5/0x480 [ 14.649844] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.650021] kthread+0x337/0x6f0 [ 14.650141] ret_from_fork+0x116/0x1d0 [ 14.650273] ret_from_fork_asm+0x1a/0x30 [ 14.650412] [ 14.650517] The buggy address belongs to the object at ffff888103a60000 [ 14.650517] which belongs to the cache kmalloc-16 of size 16 [ 14.651932] The buggy address is located 8 bytes inside of [ 14.651932] allocated 9-byte region [ffff888103a60000, ffff888103a60009) [ 14.653292] [ 14.653556] The buggy address belongs to the physical page: [ 14.654119] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a60 [ 14.654878] flags: 0x200000000000000(node=0|zone=2) [ 14.655049] page_type: f5(slab) [ 14.655174] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.655407] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.656250] page dumped because: kasan: bad access detected [ 14.656920] [ 14.657141] Memory state around the buggy address: [ 14.657674] ffff888103a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.658378] ffff888103a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.658822] >ffff888103a60000: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.659036] ^ [ 14.659159] ffff888103a60080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.659376] ffff888103a60100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.659601] ================================================================== [ 14.721272] ================================================================== [ 14.721693] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50 [ 14.722217] Write of size 8 at addr ffff888103a60008 by task kunit_try_catch/278 [ 14.722572] [ 14.722713] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.722756] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.722779] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.722800] Call Trace: [ 14.722814] <TASK> [ 14.722826] dump_stack_lvl+0x73/0xb0 [ 14.722894] print_report+0xd1/0x610 [ 14.722919] ? __virt_addr_valid+0x1db/0x2d0 [ 14.722942] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 14.722970] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.723025] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 14.723055] kasan_report+0x141/0x180 [ 14.723078] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 14.723111] kasan_check_range+0x10c/0x1c0 [ 14.723136] __kasan_check_write+0x18/0x20 [ 14.723190] kasan_bitops_modify.constprop.0+0x373/0xd50 [ 14.723220] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.723249] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.723275] ? trace_hardirqs_on+0x37/0xe0 [ 14.723336] kasan_bitops_generic+0x116/0x1c0 [ 14.723363] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.723390] ? __pfx_read_tsc+0x10/0x10 [ 14.723412] ? ktime_get_ts64+0x86/0x230 [ 14.723437] kunit_try_run_case+0x1a5/0x480 [ 14.723490] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.723514] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.723540] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.723565] ? __kthread_parkme+0x82/0x180 [ 14.723587] ? preempt_count_sub+0x50/0x80 [ 14.723612] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.723639] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.723665] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.723691] kthread+0x337/0x6f0 [ 14.723710] ? trace_preempt_on+0x20/0xc0 [ 14.723773] ? __pfx_kthread+0x10/0x10 [ 14.723801] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.723825] ? calculate_sigpending+0x7b/0xa0 [ 14.723851] ? __pfx_kthread+0x10/0x10 [ 14.723873] ret_from_fork+0x116/0x1d0 [ 14.723893] ? __pfx_kthread+0x10/0x10 [ 14.723943] ret_from_fork_asm+0x1a/0x30 [ 14.723974] </TASK> [ 14.723984] [ 14.732216] Allocated by task 278: [ 14.732456] kasan_save_stack+0x45/0x70 [ 14.732716] kasan_save_track+0x18/0x40 [ 14.732948] kasan_save_alloc_info+0x3b/0x50 [ 14.733164] __kasan_kmalloc+0xb7/0xc0 [ 14.733384] __kmalloc_cache_noprof+0x189/0x420 [ 14.733695] kasan_bitops_generic+0x92/0x1c0 [ 14.733903] kunit_try_run_case+0x1a5/0x480 [ 14.734050] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.734331] kthread+0x337/0x6f0 [ 14.734569] ret_from_fork+0x116/0x1d0 [ 14.734801] ret_from_fork_asm+0x1a/0x30 [ 14.735023] [ 14.735108] The buggy address belongs to the object at ffff888103a60000 [ 14.735108] which belongs to the cache kmalloc-16 of size 16 [ 14.735698] The buggy address is located 8 bytes inside of [ 14.735698] allocated 9-byte region [ffff888103a60000, ffff888103a60009) [ 14.736216] [ 14.736347] The buggy address belongs to the physical page: [ 14.736623] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a60 [ 14.736999] flags: 0x200000000000000(node=0|zone=2) [ 14.737249] page_type: f5(slab) [ 14.737408] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.737775] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.738117] page dumped because: kasan: bad access detected [ 14.738368] [ 14.738453] Memory state around the buggy address: [ 14.738691] ffff888103a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.739011] ffff888103a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.739229] >ffff888103a60000: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.739535] ^ [ 14.739706] ffff888103a60080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.740023] ffff888103a60100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.740584] ================================================================== [ 14.761702] ================================================================== [ 14.762131] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 14.762447] Write of size 8 at addr ffff888103a60008 by task kunit_try_catch/278 [ 14.762674] [ 14.762770] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.762814] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.762826] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.762847] Call Trace: [ 14.762863] <TASK> [ 14.762879] dump_stack_lvl+0x73/0xb0 [ 14.762907] print_report+0xd1/0x610 [ 14.762929] ? __virt_addr_valid+0x1db/0x2d0 [ 14.762951] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 14.762977] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.763013] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 14.763041] kasan_report+0x141/0x180 [ 14.763064] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 14.763097] kasan_check_range+0x10c/0x1c0 [ 14.763121] __kasan_check_write+0x18/0x20 [ 14.763142] kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 14.763243] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.763295] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.763341] ? trace_hardirqs_on+0x37/0xe0 [ 14.763371] kasan_bitops_generic+0x116/0x1c0 [ 14.763397] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.763423] ? __pfx_read_tsc+0x10/0x10 [ 14.763485] ? ktime_get_ts64+0x86/0x230 [ 14.763557] kunit_try_run_case+0x1a5/0x480 [ 14.763582] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.763606] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.763631] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.763657] ? __kthread_parkme+0x82/0x180 [ 14.763678] ? preempt_count_sub+0x50/0x80 [ 14.763703] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.763729] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.763755] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.763793] kthread+0x337/0x6f0 [ 14.763813] ? trace_preempt_on+0x20/0xc0 [ 14.763836] ? __pfx_kthread+0x10/0x10 [ 14.763857] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.763880] ? calculate_sigpending+0x7b/0xa0 [ 14.763905] ? __pfx_kthread+0x10/0x10 [ 14.763927] ret_from_fork+0x116/0x1d0 [ 14.763946] ? __pfx_kthread+0x10/0x10 [ 14.763967] ret_from_fork_asm+0x1a/0x30 [ 14.764030] </TASK> [ 14.764041] [ 14.772414] Allocated by task 278: [ 14.772606] kasan_save_stack+0x45/0x70 [ 14.772821] kasan_save_track+0x18/0x40 [ 14.773023] kasan_save_alloc_info+0x3b/0x50 [ 14.773208] __kasan_kmalloc+0xb7/0xc0 [ 14.773430] __kmalloc_cache_noprof+0x189/0x420 [ 14.773644] kasan_bitops_generic+0x92/0x1c0 [ 14.773818] kunit_try_run_case+0x1a5/0x480 [ 14.774244] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.774564] kthread+0x337/0x6f0 [ 14.774730] ret_from_fork+0x116/0x1d0 [ 14.774922] ret_from_fork_asm+0x1a/0x30 [ 14.775118] [ 14.775293] The buggy address belongs to the object at ffff888103a60000 [ 14.775293] which belongs to the cache kmalloc-16 of size 16 [ 14.775706] The buggy address is located 8 bytes inside of [ 14.775706] allocated 9-byte region [ffff888103a60000, ffff888103a60009) [ 14.776218] [ 14.776351] The buggy address belongs to the physical page: [ 14.776703] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a60 [ 14.777081] flags: 0x200000000000000(node=0|zone=2) [ 14.777327] page_type: f5(slab) [ 14.777505] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.777849] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.778210] page dumped because: kasan: bad access detected [ 14.778474] [ 14.778555] Memory state around the buggy address: [ 14.778798] ffff888103a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.779128] ffff888103a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.779454] >ffff888103a60000: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.779783] ^ [ 14.779925] ffff888103a60080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.780136] ffff888103a60100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.780475] ================================================================== [ 14.680607] ================================================================== [ 14.680980] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 14.681823] Write of size 8 at addr ffff888103a60008 by task kunit_try_catch/278 [ 14.682159] [ 14.682311] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.682357] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.682369] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.682391] Call Trace: [ 14.682407] <TASK> [ 14.682422] dump_stack_lvl+0x73/0xb0 [ 14.682453] print_report+0xd1/0x610 [ 14.682476] ? __virt_addr_valid+0x1db/0x2d0 [ 14.682500] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 14.682528] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.682553] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 14.682582] kasan_report+0x141/0x180 [ 14.682605] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 14.682637] kasan_check_range+0x10c/0x1c0 [ 14.682662] __kasan_check_write+0x18/0x20 [ 14.682683] kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 14.682719] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.682748] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.682816] ? trace_hardirqs_on+0x37/0xe0 [ 14.682847] kasan_bitops_generic+0x116/0x1c0 [ 14.682872] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.682899] ? __pfx_read_tsc+0x10/0x10 [ 14.682921] ? ktime_get_ts64+0x86/0x230 [ 14.682946] kunit_try_run_case+0x1a5/0x480 [ 14.682971] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.682995] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.683021] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.683046] ? __kthread_parkme+0x82/0x180 [ 14.683069] ? preempt_count_sub+0x50/0x80 [ 14.683094] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.683120] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.683147] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.683174] kthread+0x337/0x6f0 [ 14.683199] ? trace_preempt_on+0x20/0xc0 [ 14.683222] ? __pfx_kthread+0x10/0x10 [ 14.683244] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.683266] ? calculate_sigpending+0x7b/0xa0 [ 14.683292] ? __pfx_kthread+0x10/0x10 [ 14.683314] ret_from_fork+0x116/0x1d0 [ 14.683333] ? __pfx_kthread+0x10/0x10 [ 14.683355] ret_from_fork_asm+0x1a/0x30 [ 14.683387] </TASK> [ 14.683397] [ 14.691530] Allocated by task 278: [ 14.691707] kasan_save_stack+0x45/0x70 [ 14.691920] kasan_save_track+0x18/0x40 [ 14.692120] kasan_save_alloc_info+0x3b/0x50 [ 14.692411] __kasan_kmalloc+0xb7/0xc0 [ 14.692633] __kmalloc_cache_noprof+0x189/0x420 [ 14.692797] kasan_bitops_generic+0x92/0x1c0 [ 14.692947] kunit_try_run_case+0x1a5/0x480 [ 14.693093] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.693321] kthread+0x337/0x6f0 [ 14.693488] ret_from_fork+0x116/0x1d0 [ 14.693774] ret_from_fork_asm+0x1a/0x30 [ 14.694108] [ 14.694236] The buggy address belongs to the object at ffff888103a60000 [ 14.694236] which belongs to the cache kmalloc-16 of size 16 [ 14.695309] The buggy address is located 8 bytes inside of [ 14.695309] allocated 9-byte region [ffff888103a60000, ffff888103a60009) [ 14.695785] [ 14.695856] The buggy address belongs to the physical page: [ 14.696024] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a60 [ 14.696391] flags: 0x200000000000000(node=0|zone=2) [ 14.696751] page_type: f5(slab) [ 14.697001] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.697379] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.697988] page dumped because: kasan: bad access detected [ 14.698172] [ 14.698303] Memory state around the buggy address: [ 14.698525] ffff888103a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.698882] ffff888103a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.699210] >ffff888103a60000: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.699521] ^ [ 14.699738] ffff888103a60080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.700068] ffff888103a60100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.700377] ================================================================== [ 14.781084] ================================================================== [ 14.781638] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50 [ 14.782083] Write of size 8 at addr ffff888103a60008 by task kunit_try_catch/278 [ 14.782399] [ 14.782595] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.782642] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.782654] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.782675] Call Trace: [ 14.782690] <TASK> [ 14.782737] dump_stack_lvl+0x73/0xb0 [ 14.782780] print_report+0xd1/0x610 [ 14.782804] ? __virt_addr_valid+0x1db/0x2d0 [ 14.782828] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 14.782855] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.782912] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 14.782940] kasan_report+0x141/0x180 [ 14.782962] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 14.783024] kasan_check_range+0x10c/0x1c0 [ 14.783049] __kasan_check_write+0x18/0x20 [ 14.783069] kasan_bitops_modify.constprop.0+0x547/0xd50 [ 14.783097] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.783125] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.783186] ? trace_hardirqs_on+0x37/0xe0 [ 14.783216] kasan_bitops_generic+0x116/0x1c0 [ 14.783241] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.783267] ? __pfx_read_tsc+0x10/0x10 [ 14.783316] ? ktime_get_ts64+0x86/0x230 [ 14.783342] kunit_try_run_case+0x1a5/0x480 [ 14.783368] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.783392] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.783418] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.783453] ? __kthread_parkme+0x82/0x180 [ 14.783474] ? preempt_count_sub+0x50/0x80 [ 14.783499] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.783525] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.783551] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.783605] kthread+0x337/0x6f0 [ 14.783649] ? trace_preempt_on+0x20/0xc0 [ 14.783695] ? __pfx_kthread+0x10/0x10 [ 14.783740] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.783773] ? calculate_sigpending+0x7b/0xa0 [ 14.783823] ? __pfx_kthread+0x10/0x10 [ 14.783868] ret_from_fork+0x116/0x1d0 [ 14.783888] ? __pfx_kthread+0x10/0x10 [ 14.783909] ret_from_fork_asm+0x1a/0x30 [ 14.783941] </TASK> [ 14.783950] [ 14.792082] Allocated by task 278: [ 14.792278] kasan_save_stack+0x45/0x70 [ 14.792543] kasan_save_track+0x18/0x40 [ 14.792741] kasan_save_alloc_info+0x3b/0x50 [ 14.792982] __kasan_kmalloc+0xb7/0xc0 [ 14.793188] __kmalloc_cache_noprof+0x189/0x420 [ 14.793436] kasan_bitops_generic+0x92/0x1c0 [ 14.793673] kunit_try_run_case+0x1a5/0x480 [ 14.793882] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.794149] kthread+0x337/0x6f0 [ 14.794335] ret_from_fork+0x116/0x1d0 [ 14.794536] ret_from_fork_asm+0x1a/0x30 [ 14.794754] [ 14.794891] The buggy address belongs to the object at ffff888103a60000 [ 14.794891] which belongs to the cache kmalloc-16 of size 16 [ 14.795426] The buggy address is located 8 bytes inside of [ 14.795426] allocated 9-byte region [ffff888103a60000, ffff888103a60009) [ 14.795897] [ 14.795970] The buggy address belongs to the physical page: [ 14.796138] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a60 [ 14.796477] flags: 0x200000000000000(node=0|zone=2) [ 14.796707] page_type: f5(slab) [ 14.796880] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.797218] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.797544] page dumped because: kasan: bad access detected [ 14.797799] [ 14.797889] Memory state around the buggy address: [ 14.798041] ffff888103a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.798251] ffff888103a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.798459] >ffff888103a60000: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.798702] ^ [ 14.799051] ffff888103a60080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.799442] ffff888103a60100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.799861] ==================================================================