Date
July 1, 2025, 11:08 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 21.203000] ================================================================== [ 21.203075] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaec/0xbc0 [ 21.203409] Read of size 8 at addr fff00000c6013988 by task kunit_try_catch/262 [ 21.203471] [ 21.203961] CPU: 0 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.204641] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.204688] Hardware name: linux,dummy-virt (DT) [ 21.204946] Call trace: [ 21.205305] show_stack+0x20/0x38 (C) [ 21.205450] dump_stack_lvl+0x8c/0xd0 [ 21.205692] print_report+0x118/0x608 [ 21.205951] kasan_report+0xdc/0x128 [ 21.206464] __asan_report_load8_noabort+0x20/0x30 [ 21.206713] kasan_bitops_modify.constprop.0+0xaec/0xbc0 [ 21.206843] kasan_bitops_generic+0x110/0x1c8 [ 21.207269] kunit_try_run_case+0x170/0x3f0 [ 21.207346] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.207777] kthread+0x328/0x630 [ 21.207946] ret_from_fork+0x10/0x20 [ 21.208024] [ 21.208248] Allocated by task 262: [ 21.208348] kasan_save_stack+0x3c/0x68 [ 21.208547] kasan_save_track+0x20/0x40 [ 21.208599] kasan_save_alloc_info+0x40/0x58 [ 21.208914] __kasan_kmalloc+0xd4/0xd8 [ 21.209291] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.209408] kasan_bitops_generic+0xa0/0x1c8 [ 21.209617] kunit_try_run_case+0x170/0x3f0 [ 21.209689] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.209777] kthread+0x328/0x630 [ 21.209825] ret_from_fork+0x10/0x20 [ 21.209869] [ 21.209895] The buggy address belongs to the object at fff00000c6013980 [ 21.209895] which belongs to the cache kmalloc-16 of size 16 [ 21.209979] The buggy address is located 8 bytes inside of [ 21.209979] allocated 9-byte region [fff00000c6013980, fff00000c6013989) [ 21.210063] [ 21.210089] The buggy address belongs to the physical page: [ 21.210128] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106013 [ 21.210211] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.210272] page_type: f5(slab) [ 21.210330] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 21.210400] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.210451] page dumped because: kasan: bad access detected [ 21.210626] fff00000c6013900: 00 01 fc fc 00 01 fc fc fa fb fc fc fa fb fc fc [ 21.212585] ================================================================== [ 21.145197] ================================================================== [ 21.145705] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 21.145980] Read of size 8 at addr fff00000c6013988 by task kunit_try_catch/262 [ 21.146522] [ 21.146686] CPU: 0 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.146789] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.146954] Hardware name: linux,dummy-virt (DT) [ 21.147062] Call trace: [ 21.147092] show_stack+0x20/0x38 (C) [ 21.147489] dump_stack_lvl+0x8c/0xd0 [ 21.147594] print_report+0x118/0x608 [ 21.147829] kasan_report+0xdc/0x128 [ 21.148026] __asan_report_load8_noabort+0x20/0x30 [ 21.148282] kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 21.148428] kasan_bitops_generic+0x110/0x1c8 [ 21.148614] kunit_try_run_case+0x170/0x3f0 [ 21.148708] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.148850] kthread+0x328/0x630 [ 21.149270] ret_from_fork+0x10/0x20 [ 21.149511] [ 21.149596] Allocated by task 262: [ 21.149791] kasan_save_stack+0x3c/0x68 [ 21.149848] kasan_save_track+0x20/0x40 [ 21.150173] kasan_save_alloc_info+0x40/0x58 [ 21.150368] __kasan_kmalloc+0xd4/0xd8 [ 21.150633] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.150977] kasan_bitops_generic+0xa0/0x1c8 [ 21.151083] kunit_try_run_case+0x170/0x3f0 [ 21.151213] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.151344] kthread+0x328/0x630 [ 21.151401] ret_from_fork+0x10/0x20 [ 21.151443] [ 21.151472] The buggy address belongs to the object at fff00000c6013980 [ 21.151472] which belongs to the cache kmalloc-16 of size 16 [ 21.151544] The buggy address is located 8 bytes inside of [ 21.151544] allocated 9-byte region [fff00000c6013980, fff00000c6013989) [ 21.152192] [ 21.152296] The buggy address belongs to the physical page: [ 21.152382] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106013 [ 21.152557] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.152621] page_type: f5(slab) [ 21.153064] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 21.153154] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.153330] page dumped because: kasan: bad access detected [ 21.153426] [ 21.153504] Memory state around the buggy address: [ 21.153752] fff00000c6013880: 00 00 fc fc 00 00 fc fc fa fb fc fc 00 00 fc fc [ 21.153861] fff00000c6013900: 00 01 fc fc 00 01 fc fc fa fb fc fc fa fb fc fc [ 21.154482] >fff00000c6013980: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.154554] ^ [ 21.154617] fff00000c6013a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.154671] fff00000c6013a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.154718] ================================================================== [ 21.168784] ================================================================== [ 21.169228] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbc0 [ 21.169375] Read of size 8 at addr fff00000c6013988 by task kunit_try_catch/262 [ 21.169488] [ 21.169702] CPU: 0 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.169964] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.170094] Hardware name: linux,dummy-virt (DT) [ 21.170152] Call trace: [ 21.170215] show_stack+0x20/0x38 (C) [ 21.170569] dump_stack_lvl+0x8c/0xd0 [ 21.170807] print_report+0x118/0x608 [ 21.171025] kasan_report+0xdc/0x128 [ 21.171210] __asan_report_load8_noabort+0x20/0x30 [ 21.171316] kasan_bitops_modify.constprop.0+0xa80/0xbc0 [ 21.171565] kasan_bitops_generic+0x110/0x1c8 [ 21.171763] kunit_try_run_case+0x170/0x3f0 [ 21.172109] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.172572] kthread+0x328/0x630 [ 21.172761] ret_from_fork+0x10/0x20 [ 21.172975] [ 21.173018] Allocated by task 262: [ 21.173059] kasan_save_stack+0x3c/0x68 [ 21.173339] kasan_save_track+0x20/0x40 [ 21.173443] kasan_save_alloc_info+0x40/0x58 [ 21.173493] __kasan_kmalloc+0xd4/0xd8 [ 21.174432] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.174504] kasan_bitops_generic+0xa0/0x1c8 [ 21.174915] kunit_try_run_case+0x170/0x3f0 [ 21.175337] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.175486] kthread+0x328/0x630 [ 21.175614] ret_from_fork+0x10/0x20 [ 21.175744] [ 21.175785] The buggy address belongs to the object at fff00000c6013980 [ 21.175785] which belongs to the cache kmalloc-16 of size 16 [ 21.175864] The buggy address is located 8 bytes inside of [ 21.175864] allocated 9-byte region [fff00000c6013980, fff00000c6013989) [ 21.175935] [ 21.176345] The buggy address belongs to the physical page: [ 21.176436] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106013 [ 21.176631] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.176714] page_type: f5(slab) [ 21.176770] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 21.176995] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.177194] page dumped because: kasan: bad access detected [ 21.177572] [ 21.177706] Memory state around the buggy address: [ 21.178080] fff00000c6013880: 00 00 fc fc 00 00 fc fc fa fb fc fc 00 00 fc fc [ 21.178353] fff00000c6013900: 00 01 fc fc 00 01 fc fc fa fb fc fc fa fb fc fc [ 21.178482] >fff00000c6013980: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.178553] ^ [ 21.178619] fff00000c6013a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.178765] fff00000c6013a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.178994] ================================================================== [ 21.156762] ================================================================== [ 21.156842] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc0 [ 21.156914] Write of size 8 at addr fff00000c6013988 by task kunit_try_catch/262 [ 21.157505] [ 21.157576] CPU: 0 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.157678] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.157711] Hardware name: linux,dummy-virt (DT) [ 21.157750] Call trace: [ 21.157779] show_stack+0x20/0x38 (C) [ 21.157841] dump_stack_lvl+0x8c/0xd0 [ 21.157899] print_report+0x118/0x608 [ 21.157950] kasan_report+0xdc/0x128 [ 21.158025] kasan_check_range+0x100/0x1a8 [ 21.158081] __kasan_check_write+0x20/0x30 [ 21.158573] kasan_bitops_modify.constprop.0+0x1dc/0xbc0 [ 21.158887] kasan_bitops_generic+0x110/0x1c8 [ 21.158962] kunit_try_run_case+0x170/0x3f0 [ 21.159020] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.159366] kthread+0x328/0x630 [ 21.159863] ret_from_fork+0x10/0x20 [ 21.160019] [ 21.160165] Allocated by task 262: [ 21.160224] kasan_save_stack+0x3c/0x68 [ 21.160421] kasan_save_track+0x20/0x40 [ 21.160702] kasan_save_alloc_info+0x40/0x58 [ 21.161144] __kasan_kmalloc+0xd4/0xd8 [ 21.161296] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.161381] kasan_bitops_generic+0xa0/0x1c8 [ 21.161737] kunit_try_run_case+0x170/0x3f0 [ 21.161877] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.161937] kthread+0x328/0x630 [ 21.162380] ret_from_fork+0x10/0x20 [ 21.162542] [ 21.162572] The buggy address belongs to the object at fff00000c6013980 [ 21.162572] which belongs to the cache kmalloc-16 of size 16 [ 21.162863] The buggy address is located 8 bytes inside of [ 21.162863] allocated 9-byte region [fff00000c6013980, fff00000c6013989) [ 21.163202] [ 21.163267] The buggy address belongs to the physical page: [ 21.163428] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106013 [ 21.163503] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.163762] page_type: f5(slab) [ 21.163861] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 21.164216] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.164288] page dumped because: kasan: bad access detected [ 21.164464] [ 21.164533] Memory state around the buggy address: [ 21.164772] fff00000c6013880: 00 00 fc fc 00 00 fc fc fa fb fc fc 00 00 fc fc [ 21.164973] fff00000c6013900: 00 01 fc fc 00 01 fc fc fa fb fc fc fa fb fc fc [ 21.165268] >fff00000c6013980: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.165605] ^ [ 21.165815] fff00000c6013a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.166238] fff00000c6013a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.166357] ================================================================== [ 21.190815] ================================================================== [ 21.190906] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc0 [ 21.191413] Write of size 8 at addr fff00000c6013988 by task kunit_try_catch/262 [ 21.191585] [ 21.191682] CPU: 0 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.191874] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.191935] Hardware name: linux,dummy-virt (DT) [ 21.191972] Call trace: [ 21.192002] show_stack+0x20/0x38 (C) [ 21.192064] dump_stack_lvl+0x8c/0xd0 [ 21.192643] print_report+0x118/0x608 [ 21.192855] kasan_report+0xdc/0x128 [ 21.192952] kasan_check_range+0x100/0x1a8 [ 21.193040] __kasan_check_write+0x20/0x30 [ 21.193247] kasan_bitops_modify.constprop.0+0x320/0xbc0 [ 21.193389] kasan_bitops_generic+0x110/0x1c8 [ 21.193597] kunit_try_run_case+0x170/0x3f0 [ 21.193767] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.193991] kthread+0x328/0x630 [ 21.194051] ret_from_fork+0x10/0x20 [ 21.194114] [ 21.194184] Allocated by task 262: [ 21.194537] kasan_save_stack+0x3c/0x68 [ 21.194717] kasan_save_track+0x20/0x40 [ 21.195403] kasan_save_alloc_info+0x40/0x58 [ 21.195795] __kasan_kmalloc+0xd4/0xd8 [ 21.195846] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.195923] kasan_bitops_generic+0xa0/0x1c8 [ 21.195971] kunit_try_run_case+0x170/0x3f0 [ 21.196016] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.196066] kthread+0x328/0x630 [ 21.196365] ret_from_fork+0x10/0x20 [ 21.197041] [ 21.197124] The buggy address belongs to the object at fff00000c6013980 [ 21.197124] which belongs to the cache kmalloc-16 of size 16 [ 21.198105] The buggy address is located 8 bytes inside of [ 21.198105] allocated 9-byte region [fff00000c6013980, fff00000c6013989) [ 21.198228] [ 21.198270] The buggy address belongs to the physical page: [ 21.198338] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106013 [ 21.198467] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.199110] page_type: f5(slab) [ 21.199290] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 21.199360] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.199409] page dumped because: kasan: bad access detected [ 21.199793] [ 21.199853] Memory state around the buggy address: [ 21.200043] fff00000c6013880: 00 00 fc fc 00 00 fc fc fa fb fc fc 00 00 fc fc [ 21.200150] fff00000c6013900: 00 01 fc fc 00 01 fc fc fa fb fc fc fa fb fc fc [ 21.200207] >fff00000c6013980: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.200591] ^ [ 21.200780] fff00000c6013a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.201004] fff00000c6013a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.201441] ================================================================== [ 21.181147] ================================================================== [ 21.181232] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc0 [ 21.181471] Write of size 8 at addr fff00000c6013988 by task kunit_try_catch/262 [ 21.181813] [ 21.182053] CPU: 0 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.182180] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.182218] Hardware name: linux,dummy-virt (DT) [ 21.182608] Call trace: [ 21.182743] show_stack+0x20/0x38 (C) [ 21.182951] dump_stack_lvl+0x8c/0xd0 [ 21.183079] print_report+0x118/0x608 [ 21.183156] kasan_report+0xdc/0x128 [ 21.183641] kasan_check_range+0x100/0x1a8 [ 21.183887] __kasan_check_write+0x20/0x30 [ 21.183946] kasan_bitops_modify.constprop.0+0x2b4/0xbc0 [ 21.184005] kasan_bitops_generic+0x110/0x1c8 [ 21.184067] kunit_try_run_case+0x170/0x3f0 [ 21.184344] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.184796] kthread+0x328/0x630 [ 21.185008] ret_from_fork+0x10/0x20 [ 21.185150] [ 21.185179] Allocated by task 262: [ 21.185244] kasan_save_stack+0x3c/0x68 [ 21.185303] kasan_save_track+0x20/0x40 [ 21.185348] kasan_save_alloc_info+0x40/0x58 [ 21.185395] __kasan_kmalloc+0xd4/0xd8 [ 21.185451] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.185514] kasan_bitops_generic+0xa0/0x1c8 [ 21.185561] kunit_try_run_case+0x170/0x3f0 [ 21.185606] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.185658] kthread+0x328/0x630 [ 21.185694] ret_from_fork+0x10/0x20 [ 21.185734] [ 21.185778] The buggy address belongs to the object at fff00000c6013980 [ 21.185778] which belongs to the cache kmalloc-16 of size 16 [ 21.185866] The buggy address is located 8 bytes inside of [ 21.185866] allocated 9-byte region [fff00000c6013980, fff00000c6013989) [ 21.185939] [ 21.185965] The buggy address belongs to the physical page: [ 21.186013] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106013 [ 21.186091] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.186456] page_type: f5(slab) [ 21.186574] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 21.186869] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.187138] page dumped because: kasan: bad access detected [ 21.187217] [ 21.187243] Memory state around the buggy address: [ 21.187706] fff00000c6013880: 00 00 fc fc 00 00 fc fc fa fb fc fc 00 00 fc fc [ 21.187924] fff00000c6013900: 00 01 fc fc 00 01 fc fc fa fb fc fc fa fb fc fc [ 21.188110] >fff00000c6013980: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.188293] ^ [ 21.188374] fff00000c6013a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.188753] fff00000c6013a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.188935] ================================================================== [ 21.136116] ================================================================== [ 21.136469] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 21.136921] Write of size 8 at addr fff00000c6013988 by task kunit_try_catch/262 [ 21.137163] [ 21.137465] CPU: 0 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 21.137590] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.137799] Hardware name: linux,dummy-virt (DT) [ 21.137899] Call trace: [ 21.138120] show_stack+0x20/0x38 (C) [ 21.138216] dump_stack_lvl+0x8c/0xd0 [ 21.138283] print_report+0x118/0x608 [ 21.138544] kasan_report+0xdc/0x128 [ 21.138805] kasan_check_range+0x100/0x1a8 [ 21.138879] __kasan_check_write+0x20/0x30 [ 21.139027] kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 21.139277] kasan_bitops_generic+0x110/0x1c8 [ 21.139412] kunit_try_run_case+0x170/0x3f0 [ 21.139594] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.139733] kthread+0x328/0x630 [ 21.139840] ret_from_fork+0x10/0x20 [ 21.139946] [ 21.139971] Allocated by task 262: [ 21.140010] kasan_save_stack+0x3c/0x68 [ 21.140058] kasan_save_track+0x20/0x40 [ 21.140731] kasan_save_alloc_info+0x40/0x58 [ 21.140980] __kasan_kmalloc+0xd4/0xd8 [ 21.141144] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.141198] kasan_bitops_generic+0xa0/0x1c8 [ 21.141293] kunit_try_run_case+0x170/0x3f0 [ 21.141521] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.141799] kthread+0x328/0x630 [ 21.141905] ret_from_fork+0x10/0x20 [ 21.141990] [ 21.142123] The buggy address belongs to the object at fff00000c6013980 [ 21.142123] which belongs to the cache kmalloc-16 of size 16 [ 21.142262] The buggy address is located 8 bytes inside of [ 21.142262] allocated 9-byte region [fff00000c6013980, fff00000c6013989) [ 21.142336] [ 21.142385] The buggy address belongs to the physical page: [ 21.142438] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106013 [ 21.142514] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.142587] page_type: f5(slab) [ 21.142646] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 21.142707] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.142756] page dumped because: kasan: bad access detected [ 21.142804] [ 21.142827] Memory state around the buggy address: [ 21.142883] fff00000c6013880: 00 00 fc fc 00 00 fc fc fa fb fc fc 00 00 fc fc [ 21.142935] fff00000c6013900: 00 01 fc fc 00 01 fc fc fa fb fc fc fa fb fc fc [ 21.142986] >fff00000c6013980: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.143031] ^ [ 21.143066] fff00000c6013a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.143401] fff00000c6013a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.143574] ==================================================================
[ 13.577492] ================================================================== [ 13.578403] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 13.578772] Write of size 8 at addr ffff888102531788 by task kunit_try_catch/278 [ 13.579118] [ 13.579371] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.579432] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.579445] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.579466] Call Trace: [ 13.579487] <TASK> [ 13.579505] dump_stack_lvl+0x73/0xb0 [ 13.579536] print_report+0xd1/0x650 [ 13.579559] ? __virt_addr_valid+0x1db/0x2d0 [ 13.579590] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 13.579614] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.579635] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 13.579659] kasan_report+0x141/0x180 [ 13.579681] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 13.579709] kasan_check_range+0x10c/0x1c0 [ 13.579731] __kasan_check_write+0x18/0x20 [ 13.579751] kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 13.579775] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 13.579801] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.579826] ? trace_hardirqs_on+0x37/0xe0 [ 13.579848] ? kasan_bitops_generic+0x92/0x1c0 [ 13.579875] kasan_bitops_generic+0x116/0x1c0 [ 13.579900] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.579926] ? __pfx_read_tsc+0x10/0x10 [ 13.579948] ? ktime_get_ts64+0x86/0x230 [ 13.579972] kunit_try_run_case+0x1a5/0x480 [ 13.579997] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.580019] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.580043] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.580065] ? __kthread_parkme+0x82/0x180 [ 13.580086] ? preempt_count_sub+0x50/0x80 [ 13.580110] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.580134] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.580156] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.580224] kthread+0x337/0x6f0 [ 13.580245] ? trace_preempt_on+0x20/0xc0 [ 13.580268] ? __pfx_kthread+0x10/0x10 [ 13.580288] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.580309] ? calculate_sigpending+0x7b/0xa0 [ 13.580332] ? __pfx_kthread+0x10/0x10 [ 13.580353] ret_from_fork+0x116/0x1d0 [ 13.580371] ? __pfx_kthread+0x10/0x10 [ 13.580407] ret_from_fork_asm+0x1a/0x30 [ 13.580436] </TASK> [ 13.580449] [ 13.588741] Allocated by task 278: [ 13.588958] kasan_save_stack+0x45/0x70 [ 13.589139] kasan_save_track+0x18/0x40 [ 13.589306] kasan_save_alloc_info+0x3b/0x50 [ 13.589467] __kasan_kmalloc+0xb7/0xc0 [ 13.589600] __kmalloc_cache_noprof+0x189/0x420 [ 13.589786] kasan_bitops_generic+0x92/0x1c0 [ 13.590096] kunit_try_run_case+0x1a5/0x480 [ 13.590306] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.590908] kthread+0x337/0x6f0 [ 13.591047] ret_from_fork+0x116/0x1d0 [ 13.591182] ret_from_fork_asm+0x1a/0x30 [ 13.591386] [ 13.591482] The buggy address belongs to the object at ffff888102531780 [ 13.591482] which belongs to the cache kmalloc-16 of size 16 [ 13.592160] The buggy address is located 8 bytes inside of [ 13.592160] allocated 9-byte region [ffff888102531780, ffff888102531789) [ 13.592696] [ 13.592791] The buggy address belongs to the physical page: [ 13.593017] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102531 [ 13.593286] flags: 0x200000000000000(node=0|zone=2) [ 13.593498] page_type: f5(slab) [ 13.593665] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.593993] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.594619] page dumped because: kasan: bad access detected [ 13.594825] [ 13.594896] Memory state around the buggy address: [ 13.595335] ffff888102531680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.595588] ffff888102531700: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 13.595909] >ffff888102531780: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.596179] ^ [ 13.596323] ffff888102531800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.596647] ffff888102531880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.596861] ================================================================== [ 13.515280] ================================================================== [ 13.515788] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50 [ 13.516663] Write of size 8 at addr ffff888102531788 by task kunit_try_catch/278 [ 13.516927] [ 13.517100] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.517148] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.517161] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.517183] Call Trace: [ 13.517195] <TASK> [ 13.517214] dump_stack_lvl+0x73/0xb0 [ 13.517244] print_report+0xd1/0x650 [ 13.517268] ? __virt_addr_valid+0x1db/0x2d0 [ 13.517292] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 13.517318] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.517339] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 13.517364] kasan_report+0x141/0x180 [ 13.517398] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 13.517429] kasan_check_range+0x10c/0x1c0 [ 13.517452] __kasan_check_write+0x18/0x20 [ 13.517471] kasan_bitops_modify.constprop.0+0x101/0xd50 [ 13.517495] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 13.517521] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.517545] ? trace_hardirqs_on+0x37/0xe0 [ 13.517568] ? kasan_bitops_generic+0x92/0x1c0 [ 13.517609] kasan_bitops_generic+0x116/0x1c0 [ 13.517632] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.517656] ? __pfx_read_tsc+0x10/0x10 [ 13.517679] ? ktime_get_ts64+0x86/0x230 [ 13.517704] kunit_try_run_case+0x1a5/0x480 [ 13.517731] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.517754] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.517779] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.517801] ? __kthread_parkme+0x82/0x180 [ 13.517823] ? preempt_count_sub+0x50/0x80 [ 13.517847] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.517872] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.517894] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.517917] kthread+0x337/0x6f0 [ 13.517937] ? trace_preempt_on+0x20/0xc0 [ 13.517960] ? __pfx_kthread+0x10/0x10 [ 13.517981] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.518002] ? calculate_sigpending+0x7b/0xa0 [ 13.518025] ? __pfx_kthread+0x10/0x10 [ 13.518046] ret_from_fork+0x116/0x1d0 [ 13.518064] ? __pfx_kthread+0x10/0x10 [ 13.518083] ret_from_fork_asm+0x1a/0x30 [ 13.518114] </TASK> [ 13.518126] [ 13.526901] Allocated by task 278: [ 13.527256] kasan_save_stack+0x45/0x70 [ 13.527496] kasan_save_track+0x18/0x40 [ 13.527691] kasan_save_alloc_info+0x3b/0x50 [ 13.527856] __kasan_kmalloc+0xb7/0xc0 [ 13.528252] __kmalloc_cache_noprof+0x189/0x420 [ 13.528444] kasan_bitops_generic+0x92/0x1c0 [ 13.528595] kunit_try_run_case+0x1a5/0x480 [ 13.528745] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.528995] kthread+0x337/0x6f0 [ 13.529167] ret_from_fork+0x116/0x1d0 [ 13.529530] ret_from_fork_asm+0x1a/0x30 [ 13.529726] [ 13.529797] The buggy address belongs to the object at ffff888102531780 [ 13.529797] which belongs to the cache kmalloc-16 of size 16 [ 13.530146] The buggy address is located 8 bytes inside of [ 13.530146] allocated 9-byte region [ffff888102531780, ffff888102531789) [ 13.531181] [ 13.531280] The buggy address belongs to the physical page: [ 13.531514] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102531 [ 13.531758] flags: 0x200000000000000(node=0|zone=2) [ 13.531923] page_type: f5(slab) [ 13.532357] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.532962] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.533235] page dumped because: kasan: bad access detected [ 13.533419] [ 13.533488] Memory state around the buggy address: [ 13.533643] ffff888102531680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.533943] ffff888102531700: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 13.534263] >ffff888102531780: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.534804] ^ [ 13.535054] ffff888102531800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.535356] ffff888102531880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.535653] ================================================================== [ 13.536145] ================================================================== [ 13.536507] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 13.536892] Write of size 8 at addr ffff888102531788 by task kunit_try_catch/278 [ 13.537185] [ 13.537642] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.537691] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.537703] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.537724] Call Trace: [ 13.537739] <TASK> [ 13.537756] dump_stack_lvl+0x73/0xb0 [ 13.537784] print_report+0xd1/0x650 [ 13.537808] ? __virt_addr_valid+0x1db/0x2d0 [ 13.537832] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 13.537857] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.537878] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 13.537903] kasan_report+0x141/0x180 [ 13.537994] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 13.538028] kasan_check_range+0x10c/0x1c0 [ 13.538052] __kasan_check_write+0x18/0x20 [ 13.538071] kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 13.538095] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 13.538122] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.538147] ? trace_hardirqs_on+0x37/0xe0 [ 13.538170] ? kasan_bitops_generic+0x92/0x1c0 [ 13.538197] kasan_bitops_generic+0x116/0x1c0 [ 13.538220] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.538244] ? __pfx_read_tsc+0x10/0x10 [ 13.538265] ? ktime_get_ts64+0x86/0x230 [ 13.538289] kunit_try_run_case+0x1a5/0x480 [ 13.538313] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.538334] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.538359] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.538395] ? __kthread_parkme+0x82/0x180 [ 13.538417] ? preempt_count_sub+0x50/0x80 [ 13.538441] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.538464] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.538487] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.538510] kthread+0x337/0x6f0 [ 13.538530] ? trace_preempt_on+0x20/0xc0 [ 13.538553] ? __pfx_kthread+0x10/0x10 [ 13.538573] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.538594] ? calculate_sigpending+0x7b/0xa0 [ 13.538617] ? __pfx_kthread+0x10/0x10 [ 13.538638] ret_from_fork+0x116/0x1d0 [ 13.538656] ? __pfx_kthread+0x10/0x10 [ 13.538676] ret_from_fork_asm+0x1a/0x30 [ 13.538708] </TASK> [ 13.538719] [ 13.547151] Allocated by task 278: [ 13.547599] kasan_save_stack+0x45/0x70 [ 13.547779] kasan_save_track+0x18/0x40 [ 13.547917] kasan_save_alloc_info+0x3b/0x50 [ 13.548067] __kasan_kmalloc+0xb7/0xc0 [ 13.548255] __kmalloc_cache_noprof+0x189/0x420 [ 13.548496] kasan_bitops_generic+0x92/0x1c0 [ 13.548711] kunit_try_run_case+0x1a5/0x480 [ 13.549077] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.549255] kthread+0x337/0x6f0 [ 13.549387] ret_from_fork+0x116/0x1d0 [ 13.549548] ret_from_fork_asm+0x1a/0x30 [ 13.549746] [ 13.549845] The buggy address belongs to the object at ffff888102531780 [ 13.549845] which belongs to the cache kmalloc-16 of size 16 [ 13.550750] The buggy address is located 8 bytes inside of [ 13.550750] allocated 9-byte region [ffff888102531780, ffff888102531789) [ 13.551358] [ 13.551477] The buggy address belongs to the physical page: [ 13.551724] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102531 [ 13.551966] flags: 0x200000000000000(node=0|zone=2) [ 13.552144] page_type: f5(slab) [ 13.552316] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.552783] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.553283] page dumped because: kasan: bad access detected [ 13.554121] [ 13.554203] Memory state around the buggy address: [ 13.554364] ffff888102531680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.554991] ffff888102531700: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 13.555326] >ffff888102531780: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.555672] ^ [ 13.555849] ffff888102531800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.556099] ffff888102531880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.556463] ================================================================== [ 13.597228] ================================================================== [ 13.597574] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50 [ 13.598095] Write of size 8 at addr ffff888102531788 by task kunit_try_catch/278 [ 13.598451] [ 13.598562] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.598606] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.598617] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.598638] Call Trace: [ 13.598651] <TASK> [ 13.598665] dump_stack_lvl+0x73/0xb0 [ 13.598694] print_report+0xd1/0x650 [ 13.598717] ? __virt_addr_valid+0x1db/0x2d0 [ 13.598739] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 13.598764] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.598785] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 13.598810] kasan_report+0x141/0x180 [ 13.598831] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 13.598860] kasan_check_range+0x10c/0x1c0 [ 13.598883] __kasan_check_write+0x18/0x20 [ 13.598902] kasan_bitops_modify.constprop.0+0x373/0xd50 [ 13.598926] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 13.598951] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.598976] ? trace_hardirqs_on+0x37/0xe0 [ 13.598999] ? kasan_bitops_generic+0x92/0x1c0 [ 13.599025] kasan_bitops_generic+0x116/0x1c0 [ 13.599048] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.599072] ? __pfx_read_tsc+0x10/0x10 [ 13.599093] ? ktime_get_ts64+0x86/0x230 [ 13.599117] kunit_try_run_case+0x1a5/0x480 [ 13.599141] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.599163] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.599187] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.599209] ? __kthread_parkme+0x82/0x180 [ 13.599230] ? preempt_count_sub+0x50/0x80 [ 13.599253] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.599276] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.599298] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.599321] kthread+0x337/0x6f0 [ 13.599340] ? trace_preempt_on+0x20/0xc0 [ 13.599361] ? __pfx_kthread+0x10/0x10 [ 13.599390] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.599411] ? calculate_sigpending+0x7b/0xa0 [ 13.599434] ? __pfx_kthread+0x10/0x10 [ 13.599515] ret_from_fork+0x116/0x1d0 [ 13.599535] ? __pfx_kthread+0x10/0x10 [ 13.599555] ret_from_fork_asm+0x1a/0x30 [ 13.599586] </TASK> [ 13.599597] [ 13.608484] Allocated by task 278: [ 13.608755] kasan_save_stack+0x45/0x70 [ 13.609065] kasan_save_track+0x18/0x40 [ 13.609220] kasan_save_alloc_info+0x3b/0x50 [ 13.609385] __kasan_kmalloc+0xb7/0xc0 [ 13.609519] __kmalloc_cache_noprof+0x189/0x420 [ 13.609676] kasan_bitops_generic+0x92/0x1c0 [ 13.609823] kunit_try_run_case+0x1a5/0x480 [ 13.609970] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.610222] kthread+0x337/0x6f0 [ 13.610401] ret_from_fork+0x116/0x1d0 [ 13.610590] ret_from_fork_asm+0x1a/0x30 [ 13.610790] [ 13.610885] The buggy address belongs to the object at ffff888102531780 [ 13.610885] which belongs to the cache kmalloc-16 of size 16 [ 13.611811] The buggy address is located 8 bytes inside of [ 13.611811] allocated 9-byte region [ffff888102531780, ffff888102531789) [ 13.612357] [ 13.612477] The buggy address belongs to the physical page: [ 13.612732] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102531 [ 13.613091] flags: 0x200000000000000(node=0|zone=2) [ 13.613262] page_type: f5(slab) [ 13.613393] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.613740] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.614087] page dumped because: kasan: bad access detected [ 13.614443] [ 13.614538] Memory state around the buggy address: [ 13.614727] ffff888102531680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.614955] ffff888102531700: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 13.615268] >ffff888102531780: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.615806] ^ [ 13.615963] ffff888102531800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.616180] ffff888102531880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.616504] ================================================================== [ 13.557045] ================================================================== [ 13.557456] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 13.558197] Write of size 8 at addr ffff888102531788 by task kunit_try_catch/278 [ 13.558465] [ 13.558581] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.558624] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.558636] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.558657] Call Trace: [ 13.558676] <TASK> [ 13.558694] dump_stack_lvl+0x73/0xb0 [ 13.558723] print_report+0xd1/0x650 [ 13.558747] ? __virt_addr_valid+0x1db/0x2d0 [ 13.558770] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 13.558794] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.558816] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 13.558840] kasan_report+0x141/0x180 [ 13.558861] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 13.558890] kasan_check_range+0x10c/0x1c0 [ 13.558913] __kasan_check_write+0x18/0x20 [ 13.558931] kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 13.558956] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 13.558982] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.559007] ? trace_hardirqs_on+0x37/0xe0 [ 13.559029] ? kasan_bitops_generic+0x92/0x1c0 [ 13.559056] kasan_bitops_generic+0x116/0x1c0 [ 13.559078] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.559103] ? __pfx_read_tsc+0x10/0x10 [ 13.559124] ? ktime_get_ts64+0x86/0x230 [ 13.559147] kunit_try_run_case+0x1a5/0x480 [ 13.559171] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.559193] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.559217] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.559240] ? __kthread_parkme+0x82/0x180 [ 13.559260] ? preempt_count_sub+0x50/0x80 [ 13.559283] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.559306] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.559328] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.559444] kthread+0x337/0x6f0 [ 13.559466] ? trace_preempt_on+0x20/0xc0 [ 13.559487] ? __pfx_kthread+0x10/0x10 [ 13.559510] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.559531] ? calculate_sigpending+0x7b/0xa0 [ 13.559554] ? __pfx_kthread+0x10/0x10 [ 13.559575] ret_from_fork+0x116/0x1d0 [ 13.559593] ? __pfx_kthread+0x10/0x10 [ 13.559613] ret_from_fork_asm+0x1a/0x30 [ 13.559643] </TASK> [ 13.559654] [ 13.568468] Allocated by task 278: [ 13.568675] kasan_save_stack+0x45/0x70 [ 13.568835] kasan_save_track+0x18/0x40 [ 13.568972] kasan_save_alloc_info+0x3b/0x50 [ 13.569131] __kasan_kmalloc+0xb7/0xc0 [ 13.569341] __kmalloc_cache_noprof+0x189/0x420 [ 13.569593] kasan_bitops_generic+0x92/0x1c0 [ 13.569803] kunit_try_run_case+0x1a5/0x480 [ 13.570403] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.570803] kthread+0x337/0x6f0 [ 13.571127] ret_from_fork+0x116/0x1d0 [ 13.571331] ret_from_fork_asm+0x1a/0x30 [ 13.571494] [ 13.571598] The buggy address belongs to the object at ffff888102531780 [ 13.571598] which belongs to the cache kmalloc-16 of size 16 [ 13.572162] The buggy address is located 8 bytes inside of [ 13.572162] allocated 9-byte region [ffff888102531780, ffff888102531789) [ 13.572664] [ 13.572743] The buggy address belongs to the physical page: [ 13.572950] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102531 [ 13.573434] flags: 0x200000000000000(node=0|zone=2) [ 13.573658] page_type: f5(slab) [ 13.573797] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.574028] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.574254] page dumped because: kasan: bad access detected [ 13.574462] [ 13.574560] Memory state around the buggy address: [ 13.574789] ffff888102531680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.575694] ffff888102531700: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 13.575921] >ffff888102531780: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.576240] ^ [ 13.576441] ffff888102531800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.576762] ffff888102531880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.576978] ================================================================== [ 13.617069] ================================================================== [ 13.617425] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 13.617827] Write of size 8 at addr ffff888102531788 by task kunit_try_catch/278 [ 13.618194] [ 13.618310] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.618353] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.618365] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.618396] Call Trace: [ 13.618410] <TASK> [ 13.618424] dump_stack_lvl+0x73/0xb0 [ 13.618454] print_report+0xd1/0x650 [ 13.618476] ? __virt_addr_valid+0x1db/0x2d0 [ 13.618498] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 13.618522] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.618544] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 13.618569] kasan_report+0x141/0x180 [ 13.618590] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 13.618640] kasan_check_range+0x10c/0x1c0 [ 13.618663] __kasan_check_write+0x18/0x20 [ 13.618682] kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 13.618706] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 13.618731] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.618755] ? trace_hardirqs_on+0x37/0xe0 [ 13.618778] ? kasan_bitops_generic+0x92/0x1c0 [ 13.618805] kasan_bitops_generic+0x116/0x1c0 [ 13.618829] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.618853] ? __pfx_read_tsc+0x10/0x10 [ 13.618874] ? ktime_get_ts64+0x86/0x230 [ 13.618898] kunit_try_run_case+0x1a5/0x480 [ 13.619109] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.619133] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.619157] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.619180] ? __kthread_parkme+0x82/0x180 [ 13.619202] ? preempt_count_sub+0x50/0x80 [ 13.619225] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.619249] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.619272] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.619294] kthread+0x337/0x6f0 [ 13.619313] ? trace_preempt_on+0x20/0xc0 [ 13.619335] ? __pfx_kthread+0x10/0x10 [ 13.619354] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.619387] ? calculate_sigpending+0x7b/0xa0 [ 13.619411] ? __pfx_kthread+0x10/0x10 [ 13.619431] ret_from_fork+0x116/0x1d0 [ 13.619449] ? __pfx_kthread+0x10/0x10 [ 13.619468] ret_from_fork_asm+0x1a/0x30 [ 13.619498] </TASK> [ 13.619509] [ 13.627882] Allocated by task 278: [ 13.628124] kasan_save_stack+0x45/0x70 [ 13.628302] kasan_save_track+0x18/0x40 [ 13.628506] kasan_save_alloc_info+0x3b/0x50 [ 13.628715] __kasan_kmalloc+0xb7/0xc0 [ 13.628892] __kmalloc_cache_noprof+0x189/0x420 [ 13.629138] kasan_bitops_generic+0x92/0x1c0 [ 13.629344] kunit_try_run_case+0x1a5/0x480 [ 13.629531] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.629785] kthread+0x337/0x6f0 [ 13.630040] ret_from_fork+0x116/0x1d0 [ 13.630234] ret_from_fork_asm+0x1a/0x30 [ 13.630407] [ 13.630502] The buggy address belongs to the object at ffff888102531780 [ 13.630502] which belongs to the cache kmalloc-16 of size 16 [ 13.631191] The buggy address is located 8 bytes inside of [ 13.631191] allocated 9-byte region [ffff888102531780, ffff888102531789) [ 13.631673] [ 13.631788] The buggy address belongs to the physical page: [ 13.632041] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102531 [ 13.632289] flags: 0x200000000000000(node=0|zone=2) [ 13.632469] page_type: f5(slab) [ 13.632664] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.633081] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.633427] page dumped because: kasan: bad access detected [ 13.633703] [ 13.633798] Memory state around the buggy address: [ 13.634099] ffff888102531680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.634439] ffff888102531700: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 13.634691] >ffff888102531780: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.635107] ^ [ 13.635311] ffff888102531800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.635641] ffff888102531880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.636066] ================================================================== [ 13.658368] ================================================================== [ 13.658854] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50 [ 13.659297] Write of size 8 at addr ffff888102531788 by task kunit_try_catch/278 [ 13.659635] [ 13.659742] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.659785] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.659797] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.659818] Call Trace: [ 13.659834] <TASK> [ 13.659851] dump_stack_lvl+0x73/0xb0 [ 13.659879] print_report+0xd1/0x650 [ 13.659901] ? __virt_addr_valid+0x1db/0x2d0 [ 13.660161] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 13.660187] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.660210] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 13.660236] kasan_report+0x141/0x180 [ 13.660258] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 13.660287] kasan_check_range+0x10c/0x1c0 [ 13.660309] __kasan_check_write+0x18/0x20 [ 13.660328] kasan_bitops_modify.constprop.0+0x547/0xd50 [ 13.660353] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 13.660391] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.660422] ? trace_hardirqs_on+0x37/0xe0 [ 13.660444] ? kasan_bitops_generic+0x92/0x1c0 [ 13.660470] kasan_bitops_generic+0x116/0x1c0 [ 13.660492] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.660516] ? __pfx_read_tsc+0x10/0x10 [ 13.660536] ? ktime_get_ts64+0x86/0x230 [ 13.660559] kunit_try_run_case+0x1a5/0x480 [ 13.660583] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.660603] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.660627] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.660649] ? __kthread_parkme+0x82/0x180 [ 13.660668] ? preempt_count_sub+0x50/0x80 [ 13.660692] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.660715] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.660737] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.660780] kthread+0x337/0x6f0 [ 13.660801] ? trace_preempt_on+0x20/0xc0 [ 13.660822] ? __pfx_kthread+0x10/0x10 [ 13.660841] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.660861] ? calculate_sigpending+0x7b/0xa0 [ 13.660884] ? __pfx_kthread+0x10/0x10 [ 13.660973] ret_from_fork+0x116/0x1d0 [ 13.660995] ? __pfx_kthread+0x10/0x10 [ 13.661015] ret_from_fork_asm+0x1a/0x30 [ 13.661044] </TASK> [ 13.661056] [ 13.669591] Allocated by task 278: [ 13.669805] kasan_save_stack+0x45/0x70 [ 13.670034] kasan_save_track+0x18/0x40 [ 13.670227] kasan_save_alloc_info+0x3b/0x50 [ 13.670525] __kasan_kmalloc+0xb7/0xc0 [ 13.670697] __kmalloc_cache_noprof+0x189/0x420 [ 13.670882] kasan_bitops_generic+0x92/0x1c0 [ 13.671149] kunit_try_run_case+0x1a5/0x480 [ 13.671388] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.671621] kthread+0x337/0x6f0 [ 13.671800] ret_from_fork+0x116/0x1d0 [ 13.672184] ret_from_fork_asm+0x1a/0x30 [ 13.672348] [ 13.672441] The buggy address belongs to the object at ffff888102531780 [ 13.672441] which belongs to the cache kmalloc-16 of size 16 [ 13.672969] The buggy address is located 8 bytes inside of [ 13.672969] allocated 9-byte region [ffff888102531780, ffff888102531789) [ 13.673455] [ 13.673529] The buggy address belongs to the physical page: [ 13.673702] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102531 [ 13.674010] flags: 0x200000000000000(node=0|zone=2) [ 13.674249] page_type: f5(slab) [ 13.674533] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.674793] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.675080] page dumped because: kasan: bad access detected [ 13.675255] [ 13.675324] Memory state around the buggy address: [ 13.675490] ffff888102531680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.675732] ffff888102531700: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 13.676154] >ffff888102531780: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.676388] ^ [ 13.676519] ffff888102531800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.676862] ffff888102531880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.677258] ================================================================== [ 13.638538] ================================================================== [ 13.638820] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 13.639189] Write of size 8 at addr ffff888102531788 by task kunit_try_catch/278 [ 13.639529] [ 13.639626] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.639668] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.639680] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.639701] Call Trace: [ 13.639716] <TASK> [ 13.639731] dump_stack_lvl+0x73/0xb0 [ 13.639758] print_report+0xd1/0x650 [ 13.639780] ? __virt_addr_valid+0x1db/0x2d0 [ 13.639802] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 13.639825] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.639847] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 13.639871] kasan_report+0x141/0x180 [ 13.639892] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 13.639921] kasan_check_range+0x10c/0x1c0 [ 13.639943] __kasan_check_write+0x18/0x20 [ 13.639962] kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 13.639988] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 13.640014] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.640038] ? trace_hardirqs_on+0x37/0xe0 [ 13.640060] ? kasan_bitops_generic+0x92/0x1c0 [ 13.640087] kasan_bitops_generic+0x116/0x1c0 [ 13.640109] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.640133] ? __pfx_read_tsc+0x10/0x10 [ 13.640154] ? ktime_get_ts64+0x86/0x230 [ 13.640177] kunit_try_run_case+0x1a5/0x480 [ 13.640201] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.640222] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.640245] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.640266] ? __kthread_parkme+0x82/0x180 [ 13.640287] ? preempt_count_sub+0x50/0x80 [ 13.640309] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.640332] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.640354] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.640677] kthread+0x337/0x6f0 [ 13.640707] ? trace_preempt_on+0x20/0xc0 [ 13.640730] ? __pfx_kthread+0x10/0x10 [ 13.640750] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.640771] ? calculate_sigpending+0x7b/0xa0 [ 13.640794] ? __pfx_kthread+0x10/0x10 [ 13.640816] ret_from_fork+0x116/0x1d0 [ 13.640834] ? __pfx_kthread+0x10/0x10 [ 13.640854] ret_from_fork_asm+0x1a/0x30 [ 13.640883] </TASK> [ 13.640895] [ 13.649772] Allocated by task 278: [ 13.650035] kasan_save_stack+0x45/0x70 [ 13.650249] kasan_save_track+0x18/0x40 [ 13.650443] kasan_save_alloc_info+0x3b/0x50 [ 13.650663] __kasan_kmalloc+0xb7/0xc0 [ 13.650832] __kmalloc_cache_noprof+0x189/0x420 [ 13.651150] kasan_bitops_generic+0x92/0x1c0 [ 13.651307] kunit_try_run_case+0x1a5/0x480 [ 13.651473] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.651749] kthread+0x337/0x6f0 [ 13.652107] ret_from_fork+0x116/0x1d0 [ 13.652304] ret_from_fork_asm+0x1a/0x30 [ 13.652523] [ 13.652620] The buggy address belongs to the object at ffff888102531780 [ 13.652620] which belongs to the cache kmalloc-16 of size 16 [ 13.653189] The buggy address is located 8 bytes inside of [ 13.653189] allocated 9-byte region [ffff888102531780, ffff888102531789) [ 13.653730] [ 13.653826] The buggy address belongs to the physical page: [ 13.654138] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102531 [ 13.654442] flags: 0x200000000000000(node=0|zone=2) [ 13.654702] page_type: f5(slab) [ 13.654825] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.655226] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.655569] page dumped because: kasan: bad access detected [ 13.655805] [ 13.655900] Memory state around the buggy address: [ 13.656299] ffff888102531680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.656609] ffff888102531700: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 13.656945] >ffff888102531780: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.657216] ^ [ 13.657367] ffff888102531800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.657651] ffff888102531880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.657894] ==================================================================