Date
July 4, 2025, 11:11 p.m.
Environment | |
---|---|
qemu-x86_64 |
[ 14.186846] ================================================================== [ 14.188049] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 14.188627] Write of size 8 at addr ffff88810298e128 by task kunit_try_catch/278 [ 14.188996] [ 14.189087] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.189169] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.189183] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.189229] Call Trace: [ 14.189249] <TASK> [ 14.189284] dump_stack_lvl+0x73/0xb0 [ 14.189328] print_report+0xd1/0x650 [ 14.189364] ? __virt_addr_valid+0x1db/0x2d0 [ 14.189415] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 14.189439] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.189461] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 14.189486] kasan_report+0x141/0x180 [ 14.189507] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 14.189537] kasan_check_range+0x10c/0x1c0 [ 14.189560] __kasan_check_write+0x18/0x20 [ 14.189579] kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 14.189604] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.189629] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.189653] ? trace_hardirqs_on+0x37/0xe0 [ 14.189693] ? kasan_bitops_generic+0x92/0x1c0 [ 14.189722] kasan_bitops_generic+0x116/0x1c0 [ 14.189745] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.189769] ? __pfx_read_tsc+0x10/0x10 [ 14.189789] ? ktime_get_ts64+0x86/0x230 [ 14.189813] kunit_try_run_case+0x1a5/0x480 [ 14.189837] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.189859] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.189881] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.189903] ? __kthread_parkme+0x82/0x180 [ 14.189923] ? preempt_count_sub+0x50/0x80 [ 14.189946] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.189968] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.189989] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.190012] kthread+0x337/0x6f0 [ 14.190030] ? trace_preempt_on+0x20/0xc0 [ 14.190051] ? __pfx_kthread+0x10/0x10 [ 14.190071] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.190090] ? calculate_sigpending+0x7b/0xa0 [ 14.190113] ? __pfx_kthread+0x10/0x10 [ 14.190134] ret_from_fork+0x116/0x1d0 [ 14.190169] ? __pfx_kthread+0x10/0x10 [ 14.190189] ret_from_fork_asm+0x1a/0x30 [ 14.190231] </TASK> [ 14.190242] [ 14.198936] Allocated by task 278: [ 14.199164] kasan_save_stack+0x45/0x70 [ 14.199591] kasan_save_track+0x18/0x40 [ 14.199787] kasan_save_alloc_info+0x3b/0x50 [ 14.199974] __kasan_kmalloc+0xb7/0xc0 [ 14.200135] __kmalloc_cache_noprof+0x189/0x420 [ 14.200359] kasan_bitops_generic+0x92/0x1c0 [ 14.200699] kunit_try_run_case+0x1a5/0x480 [ 14.200898] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.201067] kthread+0x337/0x6f0 [ 14.201185] ret_from_fork+0x116/0x1d0 [ 14.201371] ret_from_fork_asm+0x1a/0x30 [ 14.201602] [ 14.201695] The buggy address belongs to the object at ffff88810298e120 [ 14.201695] which belongs to the cache kmalloc-16 of size 16 [ 14.202132] The buggy address is located 8 bytes inside of [ 14.202132] allocated 9-byte region [ffff88810298e120, ffff88810298e129) [ 14.202704] [ 14.202826] The buggy address belongs to the physical page: [ 14.203084] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10298e [ 14.203475] flags: 0x200000000000000(node=0|zone=2) [ 14.203738] page_type: f5(slab) [ 14.203861] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.204164] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.204660] page dumped because: kasan: bad access detected [ 14.204931] [ 14.205040] Memory state around the buggy address: [ 14.205299] ffff88810298e000: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc [ 14.205650] ffff88810298e080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.205960] >ffff88810298e100: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 14.206273] ^ [ 14.206418] ffff88810298e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.206625] ffff88810298e200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.206829] ================================================================== [ 14.039865] ================================================================== [ 14.040418] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50 [ 14.041524] Write of size 8 at addr ffff88810298e128 by task kunit_try_catch/278 [ 14.041883] [ 14.042002] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.042053] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.042067] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.042090] Call Trace: [ 14.042104] <TASK> [ 14.042125] dump_stack_lvl+0x73/0xb0 [ 14.042159] print_report+0xd1/0x650 [ 14.042183] ? __virt_addr_valid+0x1db/0x2d0 [ 14.042206] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 14.042269] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.042292] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 14.042316] kasan_report+0x141/0x180 [ 14.042338] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 14.042366] kasan_check_range+0x10c/0x1c0 [ 14.042389] __kasan_check_write+0x18/0x20 [ 14.042409] kasan_bitops_modify.constprop.0+0x101/0xd50 [ 14.042434] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.042460] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.042484] ? trace_hardirqs_on+0x37/0xe0 [ 14.042507] ? kasan_bitops_generic+0x92/0x1c0 [ 14.042533] kasan_bitops_generic+0x116/0x1c0 [ 14.042556] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.042580] ? __pfx_read_tsc+0x10/0x10 [ 14.042601] ? ktime_get_ts64+0x86/0x230 [ 14.042625] kunit_try_run_case+0x1a5/0x480 [ 14.042649] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.042671] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.042695] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.042717] ? __kthread_parkme+0x82/0x180 [ 14.042737] ? preempt_count_sub+0x50/0x80 [ 14.042760] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.042782] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.042805] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.042827] kthread+0x337/0x6f0 [ 14.042845] ? trace_preempt_on+0x20/0xc0 [ 14.042866] ? __pfx_kthread+0x10/0x10 [ 14.042886] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.042907] ? calculate_sigpending+0x7b/0xa0 [ 14.042930] ? __pfx_kthread+0x10/0x10 [ 14.042949] ret_from_fork+0x116/0x1d0 [ 14.042967] ? __pfx_kthread+0x10/0x10 [ 14.042986] ret_from_fork_asm+0x1a/0x30 [ 14.043016] </TASK> [ 14.043026] [ 14.052291] Allocated by task 278: [ 14.052767] kasan_save_stack+0x45/0x70 [ 14.053000] kasan_save_track+0x18/0x40 [ 14.053148] kasan_save_alloc_info+0x3b/0x50 [ 14.053684] __kasan_kmalloc+0xb7/0xc0 [ 14.053864] __kmalloc_cache_noprof+0x189/0x420 [ 14.054156] kasan_bitops_generic+0x92/0x1c0 [ 14.054461] kunit_try_run_case+0x1a5/0x480 [ 14.054661] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.055068] kthread+0x337/0x6f0 [ 14.055354] ret_from_fork+0x116/0x1d0 [ 14.055632] ret_from_fork_asm+0x1a/0x30 [ 14.055851] [ 14.055954] The buggy address belongs to the object at ffff88810298e120 [ 14.055954] which belongs to the cache kmalloc-16 of size 16 [ 14.056653] The buggy address is located 8 bytes inside of [ 14.056653] allocated 9-byte region [ffff88810298e120, ffff88810298e129) [ 14.057393] [ 14.057504] The buggy address belongs to the physical page: [ 14.057912] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10298e [ 14.058266] flags: 0x200000000000000(node=0|zone=2) [ 14.058658] page_type: f5(slab) [ 14.058928] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.059399] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.059699] page dumped because: kasan: bad access detected [ 14.060037] [ 14.060147] Memory state around the buggy address: [ 14.060419] ffff88810298e000: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc [ 14.060933] ffff88810298e080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.061378] >ffff88810298e100: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 14.061745] ^ [ 14.061995] ffff88810298e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.062453] ffff88810298e200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.062934] ================================================================== [ 14.141340] ================================================================== [ 14.142266] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50 [ 14.143338] Write of size 8 at addr ffff88810298e128 by task kunit_try_catch/278 [ 14.143685] [ 14.143788] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.143840] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.143853] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.143877] Call Trace: [ 14.143899] <TASK> [ 14.143921] dump_stack_lvl+0x73/0xb0 [ 14.143956] print_report+0xd1/0x650 [ 14.143981] ? __virt_addr_valid+0x1db/0x2d0 [ 14.144004] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 14.144029] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.144051] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 14.144075] kasan_report+0x141/0x180 [ 14.144096] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 14.144125] kasan_check_range+0x10c/0x1c0 [ 14.144148] __kasan_check_write+0x18/0x20 [ 14.144167] kasan_bitops_modify.constprop.0+0x373/0xd50 [ 14.144192] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.144233] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.144268] ? trace_hardirqs_on+0x37/0xe0 [ 14.144290] ? kasan_bitops_generic+0x92/0x1c0 [ 14.144316] kasan_bitops_generic+0x116/0x1c0 [ 14.144362] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.144402] ? __pfx_read_tsc+0x10/0x10 [ 14.144561] ? ktime_get_ts64+0x86/0x230 [ 14.144586] kunit_try_run_case+0x1a5/0x480 [ 14.144612] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.144633] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.144657] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.144680] ? __kthread_parkme+0x82/0x180 [ 14.144700] ? preempt_count_sub+0x50/0x80 [ 14.144724] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.144747] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.144769] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.144803] kthread+0x337/0x6f0 [ 14.144822] ? trace_preempt_on+0x20/0xc0 [ 14.144845] ? __pfx_kthread+0x10/0x10 [ 14.144865] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.144885] ? calculate_sigpending+0x7b/0xa0 [ 14.144907] ? __pfx_kthread+0x10/0x10 [ 14.144928] ret_from_fork+0x116/0x1d0 [ 14.144945] ? __pfx_kthread+0x10/0x10 [ 14.144965] ret_from_fork_asm+0x1a/0x30 [ 14.144994] </TASK> [ 14.145007] [ 14.157512] Allocated by task 278: [ 14.157751] kasan_save_stack+0x45/0x70 [ 14.157929] kasan_save_track+0x18/0x40 [ 14.158124] kasan_save_alloc_info+0x3b/0x50 [ 14.158384] __kasan_kmalloc+0xb7/0xc0 [ 14.158584] __kmalloc_cache_noprof+0x189/0x420 [ 14.158790] kasan_bitops_generic+0x92/0x1c0 [ 14.159019] kunit_try_run_case+0x1a5/0x480 [ 14.159274] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.159530] kthread+0x337/0x6f0 [ 14.159696] ret_from_fork+0x116/0x1d0 [ 14.159879] ret_from_fork_asm+0x1a/0x30 [ 14.160045] [ 14.160115] The buggy address belongs to the object at ffff88810298e120 [ 14.160115] which belongs to the cache kmalloc-16 of size 16 [ 14.160717] The buggy address is located 8 bytes inside of [ 14.160717] allocated 9-byte region [ffff88810298e120, ffff88810298e129) [ 14.161313] [ 14.161433] The buggy address belongs to the physical page: [ 14.161704] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10298e [ 14.161987] flags: 0x200000000000000(node=0|zone=2) [ 14.162193] page_type: f5(slab) [ 14.162504] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.162809] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.163129] page dumped because: kasan: bad access detected [ 14.163407] [ 14.163501] Memory state around the buggy address: [ 14.163711] ffff88810298e000: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc [ 14.164032] ffff88810298e080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.164378] >ffff88810298e100: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 14.164806] ^ [ 14.164996] ffff88810298e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.165332] ffff88810298e200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.165651] ================================================================== [ 14.208246] ================================================================== [ 14.208611] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50 [ 14.209759] Write of size 8 at addr ffff88810298e128 by task kunit_try_catch/278 [ 14.210094] [ 14.210247] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.211513] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.211559] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.211626] Call Trace: [ 14.211650] <TASK> [ 14.211676] dump_stack_lvl+0x73/0xb0 [ 14.211720] print_report+0xd1/0x650 [ 14.211745] ? __virt_addr_valid+0x1db/0x2d0 [ 14.211768] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 14.211794] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.211817] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 14.211843] kasan_report+0x141/0x180 [ 14.211865] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 14.211895] kasan_check_range+0x10c/0x1c0 [ 14.211918] __kasan_check_write+0x18/0x20 [ 14.211943] kasan_bitops_modify.constprop.0+0x547/0xd50 [ 14.211969] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.211997] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.212023] ? trace_hardirqs_on+0x37/0xe0 [ 14.212045] ? kasan_bitops_generic+0x92/0x1c0 [ 14.212073] kasan_bitops_generic+0x116/0x1c0 [ 14.212097] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.212123] ? __pfx_read_tsc+0x10/0x10 [ 14.212145] ? ktime_get_ts64+0x86/0x230 [ 14.212170] kunit_try_run_case+0x1a5/0x480 [ 14.212206] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.212237] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.212261] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.212284] ? __kthread_parkme+0x82/0x180 [ 14.212304] ? preempt_count_sub+0x50/0x80 [ 14.212328] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.212350] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.212372] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.212394] kthread+0x337/0x6f0 [ 14.212412] ? trace_preempt_on+0x20/0xc0 [ 14.212433] ? __pfx_kthread+0x10/0x10 [ 14.212452] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.212471] ? calculate_sigpending+0x7b/0xa0 [ 14.212494] ? __pfx_kthread+0x10/0x10 [ 14.212514] ret_from_fork+0x116/0x1d0 [ 14.212531] ? __pfx_kthread+0x10/0x10 [ 14.212551] ret_from_fork_asm+0x1a/0x30 [ 14.212581] </TASK> [ 14.212593] [ 14.225271] Allocated by task 278: [ 14.225664] kasan_save_stack+0x45/0x70 [ 14.225980] kasan_save_track+0x18/0x40 [ 14.226355] kasan_save_alloc_info+0x3b/0x50 [ 14.226691] __kasan_kmalloc+0xb7/0xc0 [ 14.226956] __kmalloc_cache_noprof+0x189/0x420 [ 14.227276] kasan_bitops_generic+0x92/0x1c0 [ 14.227503] kunit_try_run_case+0x1a5/0x480 [ 14.227703] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.227954] kthread+0x337/0x6f0 [ 14.228114] ret_from_fork+0x116/0x1d0 [ 14.228621] ret_from_fork_asm+0x1a/0x30 [ 14.228801] [ 14.229078] The buggy address belongs to the object at ffff88810298e120 [ 14.229078] which belongs to the cache kmalloc-16 of size 16 [ 14.229873] The buggy address is located 8 bytes inside of [ 14.229873] allocated 9-byte region [ffff88810298e120, ffff88810298e129) [ 14.230631] [ 14.230744] The buggy address belongs to the physical page: [ 14.230983] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10298e [ 14.231298] flags: 0x200000000000000(node=0|zone=2) [ 14.231848] page_type: f5(slab) [ 14.232130] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.232598] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.233029] page dumped because: kasan: bad access detected [ 14.233452] [ 14.233661] Memory state around the buggy address: [ 14.233988] ffff88810298e000: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc [ 14.234450] ffff88810298e080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.234772] >ffff88810298e100: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 14.235069] ^ [ 14.235518] ffff88810298e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.235950] ffff88810298e200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.236603] ================================================================== [ 14.108803] ================================================================== [ 14.109658] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 14.110170] Write of size 8 at addr ffff88810298e128 by task kunit_try_catch/278 [ 14.110536] [ 14.110632] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.110681] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.110694] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.110717] Call Trace: [ 14.110737] <TASK> [ 14.110772] dump_stack_lvl+0x73/0xb0 [ 14.110803] print_report+0xd1/0x650 [ 14.110838] ? __virt_addr_valid+0x1db/0x2d0 [ 14.110860] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 14.110886] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.110907] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 14.110933] kasan_report+0x141/0x180 [ 14.110954] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 14.110984] kasan_check_range+0x10c/0x1c0 [ 14.111007] __kasan_check_write+0x18/0x20 [ 14.111027] kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 14.111052] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.111091] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.111115] ? trace_hardirqs_on+0x37/0xe0 [ 14.111150] ? kasan_bitops_generic+0x92/0x1c0 [ 14.111177] kasan_bitops_generic+0x116/0x1c0 [ 14.111200] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.111241] ? __pfx_read_tsc+0x10/0x10 [ 14.111263] ? ktime_get_ts64+0x86/0x230 [ 14.111286] kunit_try_run_case+0x1a5/0x480 [ 14.111337] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.111362] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.111397] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.111420] ? __kthread_parkme+0x82/0x180 [ 14.111450] ? preempt_count_sub+0x50/0x80 [ 14.111475] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.111497] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.111529] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.111552] kthread+0x337/0x6f0 [ 14.111570] ? trace_preempt_on+0x20/0xc0 [ 14.111592] ? __pfx_kthread+0x10/0x10 [ 14.111613] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.111633] ? calculate_sigpending+0x7b/0xa0 [ 14.111657] ? __pfx_kthread+0x10/0x10 [ 14.111679] ret_from_fork+0x116/0x1d0 [ 14.111697] ? __pfx_kthread+0x10/0x10 [ 14.111716] ret_from_fork_asm+0x1a/0x30 [ 14.111747] </TASK> [ 14.111759] [ 14.123588] Allocated by task 278: [ 14.123767] kasan_save_stack+0x45/0x70 [ 14.123935] kasan_save_track+0x18/0x40 [ 14.124073] kasan_save_alloc_info+0x3b/0x50 [ 14.125505] __kasan_kmalloc+0xb7/0xc0 [ 14.126171] __kmalloc_cache_noprof+0x189/0x420 [ 14.127102] kasan_bitops_generic+0x92/0x1c0 [ 14.127785] kunit_try_run_case+0x1a5/0x480 [ 14.128472] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.129193] kthread+0x337/0x6f0 [ 14.129765] ret_from_fork+0x116/0x1d0 [ 14.130362] ret_from_fork_asm+0x1a/0x30 [ 14.130919] [ 14.131260] The buggy address belongs to the object at ffff88810298e120 [ 14.131260] which belongs to the cache kmalloc-16 of size 16 [ 14.132406] The buggy address is located 8 bytes inside of [ 14.132406] allocated 9-byte region [ffff88810298e120, ffff88810298e129) [ 14.133430] [ 14.133619] The buggy address belongs to the physical page: [ 14.133973] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10298e [ 14.134210] flags: 0x200000000000000(node=0|zone=2) [ 14.134763] page_type: f5(slab) [ 14.135081] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.135791] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.136257] page dumped because: kasan: bad access detected [ 14.136776] [ 14.136968] Memory state around the buggy address: [ 14.137184] ffff88810298e000: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc [ 14.137903] ffff88810298e080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.138281] >ffff88810298e100: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 14.138808] ^ [ 14.138957] ffff88810298e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.139167] ffff88810298e200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.139558] ================================================================== [ 14.167095] ================================================================== [ 14.167689] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 14.168064] Write of size 8 at addr ffff88810298e128 by task kunit_try_catch/278 [ 14.168430] [ 14.168532] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.168580] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.168592] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.168615] Call Trace: [ 14.168630] <TASK> [ 14.168648] dump_stack_lvl+0x73/0xb0 [ 14.168680] print_report+0xd1/0x650 [ 14.168703] ? __virt_addr_valid+0x1db/0x2d0 [ 14.168726] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 14.168773] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.168802] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 14.168826] kasan_report+0x141/0x180 [ 14.168848] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 14.168877] kasan_check_range+0x10c/0x1c0 [ 14.168899] __kasan_check_write+0x18/0x20 [ 14.168937] kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 14.168963] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.168989] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.169012] ? trace_hardirqs_on+0x37/0xe0 [ 14.169035] ? kasan_bitops_generic+0x92/0x1c0 [ 14.169062] kasan_bitops_generic+0x116/0x1c0 [ 14.169102] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.169127] ? __pfx_read_tsc+0x10/0x10 [ 14.169148] ? ktime_get_ts64+0x86/0x230 [ 14.169171] kunit_try_run_case+0x1a5/0x480 [ 14.169196] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.169229] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.169253] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.169275] ? __kthread_parkme+0x82/0x180 [ 14.169295] ? preempt_count_sub+0x50/0x80 [ 14.169318] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.169340] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.169362] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.169402] kthread+0x337/0x6f0 [ 14.169420] ? trace_preempt_on+0x20/0xc0 [ 14.169441] ? __pfx_kthread+0x10/0x10 [ 14.169461] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.169498] ? calculate_sigpending+0x7b/0xa0 [ 14.169522] ? __pfx_kthread+0x10/0x10 [ 14.169545] ret_from_fork+0x116/0x1d0 [ 14.169563] ? __pfx_kthread+0x10/0x10 [ 14.169584] ret_from_fork_asm+0x1a/0x30 [ 14.169615] </TASK> [ 14.169627] [ 14.177888] Allocated by task 278: [ 14.178115] kasan_save_stack+0x45/0x70 [ 14.178361] kasan_save_track+0x18/0x40 [ 14.178576] kasan_save_alloc_info+0x3b/0x50 [ 14.178789] __kasan_kmalloc+0xb7/0xc0 [ 14.178953] __kmalloc_cache_noprof+0x189/0x420 [ 14.179102] kasan_bitops_generic+0x92/0x1c0 [ 14.179264] kunit_try_run_case+0x1a5/0x480 [ 14.179602] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.180034] kthread+0x337/0x6f0 [ 14.180252] ret_from_fork+0x116/0x1d0 [ 14.180474] ret_from_fork_asm+0x1a/0x30 [ 14.180711] [ 14.180816] The buggy address belongs to the object at ffff88810298e120 [ 14.180816] which belongs to the cache kmalloc-16 of size 16 [ 14.181484] The buggy address is located 8 bytes inside of [ 14.181484] allocated 9-byte region [ffff88810298e120, ffff88810298e129) [ 14.181990] [ 14.182061] The buggy address belongs to the physical page: [ 14.182241] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10298e [ 14.182600] flags: 0x200000000000000(node=0|zone=2) [ 14.182861] page_type: f5(slab) [ 14.183046] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.183448] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.183666] page dumped because: kasan: bad access detected [ 14.183854] [ 14.183944] Memory state around the buggy address: [ 14.184166] ffff88810298e000: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc [ 14.184548] ffff88810298e080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.184756] >ffff88810298e100: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 14.185031] ^ [ 14.185269] ffff88810298e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.185605] ffff88810298e200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.185966] ================================================================== [ 14.064593] ================================================================== [ 14.065344] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 14.065904] Write of size 8 at addr ffff88810298e128 by task kunit_try_catch/278 [ 14.066200] [ 14.066342] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.066427] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.066439] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.066463] Call Trace: [ 14.066497] <TASK> [ 14.066518] dump_stack_lvl+0x73/0xb0 [ 14.066552] print_report+0xd1/0x650 [ 14.066574] ? __virt_addr_valid+0x1db/0x2d0 [ 14.066597] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 14.066622] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.066676] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 14.066712] kasan_report+0x141/0x180 [ 14.066745] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 14.066803] kasan_check_range+0x10c/0x1c0 [ 14.066826] __kasan_check_write+0x18/0x20 [ 14.066855] kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 14.066880] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.066905] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.066929] ? trace_hardirqs_on+0x37/0xe0 [ 14.066952] ? kasan_bitops_generic+0x92/0x1c0 [ 14.066978] kasan_bitops_generic+0x116/0x1c0 [ 14.067001] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.067026] ? __pfx_read_tsc+0x10/0x10 [ 14.067046] ? ktime_get_ts64+0x86/0x230 [ 14.067070] kunit_try_run_case+0x1a5/0x480 [ 14.067094] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.067116] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.067140] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.067162] ? __kthread_parkme+0x82/0x180 [ 14.067182] ? preempt_count_sub+0x50/0x80 [ 14.067206] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.067239] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.067270] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.067293] kthread+0x337/0x6f0 [ 14.067311] ? trace_preempt_on+0x20/0xc0 [ 14.067332] ? __pfx_kthread+0x10/0x10 [ 14.067352] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.067372] ? calculate_sigpending+0x7b/0xa0 [ 14.067395] ? __pfx_kthread+0x10/0x10 [ 14.067416] ret_from_fork+0x116/0x1d0 [ 14.067433] ? __pfx_kthread+0x10/0x10 [ 14.067453] ret_from_fork_asm+0x1a/0x30 [ 14.067483] </TASK> [ 14.067495] [ 14.078011] Allocated by task 278: [ 14.078430] kasan_save_stack+0x45/0x70 [ 14.078762] kasan_save_track+0x18/0x40 [ 14.079049] kasan_save_alloc_info+0x3b/0x50 [ 14.079417] __kasan_kmalloc+0xb7/0xc0 [ 14.079713] __kmalloc_cache_noprof+0x189/0x420 [ 14.080021] kasan_bitops_generic+0x92/0x1c0 [ 14.080363] kunit_try_run_case+0x1a5/0x480 [ 14.080691] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.081060] kthread+0x337/0x6f0 [ 14.081354] ret_from_fork+0x116/0x1d0 [ 14.081566] ret_from_fork_asm+0x1a/0x30 [ 14.081913] [ 14.082017] The buggy address belongs to the object at ffff88810298e120 [ 14.082017] which belongs to the cache kmalloc-16 of size 16 [ 14.082877] The buggy address is located 8 bytes inside of [ 14.082877] allocated 9-byte region [ffff88810298e120, ffff88810298e129) [ 14.083690] [ 14.083773] The buggy address belongs to the physical page: [ 14.084176] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10298e [ 14.084642] flags: 0x200000000000000(node=0|zone=2) [ 14.084889] page_type: f5(slab) [ 14.085050] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.085336] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.085701] page dumped because: kasan: bad access detected [ 14.085956] [ 14.086024] Memory state around the buggy address: [ 14.086290] ffff88810298e000: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc [ 14.086635] ffff88810298e080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.086893] >ffff88810298e100: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 14.087117] ^ [ 14.087425] ffff88810298e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.087720] ffff88810298e200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.088059] ================================================================== [ 14.088749] ================================================================== [ 14.089661] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 14.090094] Write of size 8 at addr ffff88810298e128 by task kunit_try_catch/278 [ 14.090456] [ 14.090577] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 14.090636] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.090649] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.090672] Call Trace: [ 14.090704] <TASK> [ 14.090726] dump_stack_lvl+0x73/0xb0 [ 14.090757] print_report+0xd1/0x650 [ 14.090780] ? __virt_addr_valid+0x1db/0x2d0 [ 14.090804] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 14.090828] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.090859] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 14.090883] kasan_report+0x141/0x180 [ 14.090904] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 14.090944] kasan_check_range+0x10c/0x1c0 [ 14.090967] __kasan_check_write+0x18/0x20 [ 14.090986] kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 14.091010] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.091035] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.091060] ? trace_hardirqs_on+0x37/0xe0 [ 14.091082] ? kasan_bitops_generic+0x92/0x1c0 [ 14.091118] kasan_bitops_generic+0x116/0x1c0 [ 14.091140] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.091164] ? __pfx_read_tsc+0x10/0x10 [ 14.091196] ? ktime_get_ts64+0x86/0x230 [ 14.091229] kunit_try_run_case+0x1a5/0x480 [ 14.091254] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.091285] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.091318] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.091339] ? __kthread_parkme+0x82/0x180 [ 14.091360] ? preempt_count_sub+0x50/0x80 [ 14.091394] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.091417] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.091439] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.091462] kthread+0x337/0x6f0 [ 14.091480] ? trace_preempt_on+0x20/0xc0 [ 14.091501] ? __pfx_kthread+0x10/0x10 [ 14.091521] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.091542] ? calculate_sigpending+0x7b/0xa0 [ 14.091566] ? __pfx_kthread+0x10/0x10 [ 14.091586] ret_from_fork+0x116/0x1d0 [ 14.091604] ? __pfx_kthread+0x10/0x10 [ 14.091624] ret_from_fork_asm+0x1a/0x30 [ 14.091658] </TASK> [ 14.091670] [ 14.099936] Allocated by task 278: [ 14.100138] kasan_save_stack+0x45/0x70 [ 14.100409] kasan_save_track+0x18/0x40 [ 14.100577] kasan_save_alloc_info+0x3b/0x50 [ 14.100762] __kasan_kmalloc+0xb7/0xc0 [ 14.100920] __kmalloc_cache_noprof+0x189/0x420 [ 14.101096] kasan_bitops_generic+0x92/0x1c0 [ 14.101317] kunit_try_run_case+0x1a5/0x480 [ 14.101523] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.101731] kthread+0x337/0x6f0 [ 14.101915] ret_from_fork+0x116/0x1d0 [ 14.102103] ret_from_fork_asm+0x1a/0x30 [ 14.102336] [ 14.102407] The buggy address belongs to the object at ffff88810298e120 [ 14.102407] which belongs to the cache kmalloc-16 of size 16 [ 14.102763] The buggy address is located 8 bytes inside of [ 14.102763] allocated 9-byte region [ffff88810298e120, ffff88810298e129) [ 14.103238] [ 14.103336] The buggy address belongs to the physical page: [ 14.103668] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10298e [ 14.103908] flags: 0x200000000000000(node=0|zone=2) [ 14.104073] page_type: f5(slab) [ 14.104197] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.104500] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.104853] page dumped because: kasan: bad access detected [ 14.105135] [ 14.105240] Memory state around the buggy address: [ 14.105583] ffff88810298e000: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc [ 14.105923] ffff88810298e080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.106277] >ffff88810298e100: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 14.106636] ^ [ 14.106835] ffff88810298e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.107057] ffff88810298e200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.107422] ==================================================================