Date
July 5, 2025, 11:09 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 22.079970] ================================================================== [ 22.080328] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa20/0xbc0 [ 22.080475] Read of size 8 at addr fff00000c5672908 by task kunit_try_catch/262 [ 22.080579] [ 22.080653] CPU: 0 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 22.081338] kasan_report+0xdc/0x128 [ 22.083337] kasan_save_alloc_info+0x40/0x58 [ 22.085405] [ 22.086545] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 22.088010] ==================================================================
[ 15.908676] ================================================================== [ 15.909281] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50 [ 15.909633] Write of size 8 at addr ffff88810267b748 by task kunit_try_catch/279 [ 15.909932] [ 15.910806] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.910876] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.910894] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.910927] Call Trace: [ 15.910946] <TASK> [ 15.910977] dump_stack_lvl+0x73/0xb0 [ 15.911021] print_report+0xd1/0x650 [ 15.911049] ? __virt_addr_valid+0x1db/0x2d0 [ 15.911080] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 15.911111] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.911137] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 15.911168] kasan_report+0x141/0x180 [ 15.911230] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 15.911267] kasan_check_range+0x10c/0x1c0 [ 15.911310] __kasan_check_write+0x18/0x20 [ 15.911333] kasan_bitops_modify.constprop.0+0x101/0xd50 [ 15.911364] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 15.911396] ? ret_from_fork_asm+0x1a/0x30 [ 15.911424] ? kthread+0x337/0x6f0 [ 15.911457] kasan_bitops_generic+0x116/0x1c0 [ 15.911486] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 15.911516] ? __pfx_read_tsc+0x10/0x10 [ 15.911543] ? ktime_get_ts64+0x86/0x230 [ 15.911575] kunit_try_run_case+0x1a5/0x480 [ 15.911611] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.911637] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.911680] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.911708] ? __kthread_parkme+0x82/0x180 [ 15.911732] ? preempt_count_sub+0x50/0x80 [ 15.911761] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.911813] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.911841] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.911869] kthread+0x337/0x6f0 [ 15.911892] ? trace_preempt_on+0x20/0xc0 [ 15.911921] ? __pfx_kthread+0x10/0x10 [ 15.911945] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.911969] ? calculate_sigpending+0x7b/0xa0 [ 15.911999] ? __pfx_kthread+0x10/0x10 [ 15.912024] ret_from_fork+0x116/0x1d0 [ 15.912046] ? __pfx_kthread+0x10/0x10 [ 15.912071] ret_from_fork_asm+0x1a/0x30 [ 15.912106] </TASK> [ 15.912120] [ 15.927583] Allocated by task 279: [ 15.927881] kasan_save_stack+0x45/0x70 [ 15.928229] kasan_save_track+0x18/0x40 [ 15.928418] kasan_save_alloc_info+0x3b/0x50 [ 15.928695] __kasan_kmalloc+0xb7/0xc0 [ 15.929302] __kmalloc_cache_noprof+0x189/0x420 [ 15.929594] kasan_bitops_generic+0x92/0x1c0 [ 15.929855] kunit_try_run_case+0x1a5/0x480 [ 15.930168] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.930477] kthread+0x337/0x6f0 [ 15.930629] ret_from_fork+0x116/0x1d0 [ 15.930943] ret_from_fork_asm+0x1a/0x30 [ 15.931200] [ 15.931322] The buggy address belongs to the object at ffff88810267b740 [ 15.931322] which belongs to the cache kmalloc-16 of size 16 [ 15.932135] The buggy address is located 8 bytes inside of [ 15.932135] allocated 9-byte region [ffff88810267b740, ffff88810267b749) [ 15.932668] [ 15.932810] The buggy address belongs to the physical page: [ 15.933404] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10267b [ 15.933772] flags: 0x200000000000000(node=0|zone=2) [ 15.934174] page_type: f5(slab) [ 15.934386] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 15.934796] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 15.935318] page dumped because: kasan: bad access detected [ 15.935614] [ 15.935747] Memory state around the buggy address: [ 15.936166] ffff88810267b600: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 15.936546] ffff88810267b680: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 15.937214] >ffff88810267b700: 00 05 fc fc 00 04 fc fc 00 01 fc fc fc fc fc fc [ 15.937719] ^ [ 15.937996] ffff88810267b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.938394] ffff88810267b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.938785] ================================================================== [ 15.965788] ================================================================== [ 15.966277] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 15.966750] Write of size 8 at addr ffff88810267b748 by task kunit_try_catch/279 [ 15.967428] [ 15.967544] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.967612] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.967627] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.967681] Call Trace: [ 15.967703] <TASK> [ 15.967725] dump_stack_lvl+0x73/0xb0 [ 15.967759] print_report+0xd1/0x650 [ 15.967786] ? __virt_addr_valid+0x1db/0x2d0 [ 15.967813] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 15.967844] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.967871] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 15.967901] kasan_report+0x141/0x180 [ 15.967929] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 15.967964] kasan_check_range+0x10c/0x1c0 [ 15.968003] __kasan_check_write+0x18/0x20 [ 15.968026] kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 15.968056] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 15.968144] ? ret_from_fork_asm+0x1a/0x30 [ 15.968171] ? kthread+0x337/0x6f0 [ 15.968249] kasan_bitops_generic+0x116/0x1c0 [ 15.968279] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 15.968309] ? __pfx_read_tsc+0x10/0x10 [ 15.968334] ? ktime_get_ts64+0x86/0x230 [ 15.968363] kunit_try_run_case+0x1a5/0x480 [ 15.968392] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.968418] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.968447] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.968485] ? __kthread_parkme+0x82/0x180 [ 15.968510] ? preempt_count_sub+0x50/0x80 [ 15.968552] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.968580] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.968606] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.968634] kthread+0x337/0x6f0 [ 15.968668] ? trace_preempt_on+0x20/0xc0 [ 15.968708] ? __pfx_kthread+0x10/0x10 [ 15.968734] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.968770] ? calculate_sigpending+0x7b/0xa0 [ 15.968802] ? __pfx_kthread+0x10/0x10 [ 15.968828] ret_from_fork+0x116/0x1d0 [ 15.968850] ? __pfx_kthread+0x10/0x10 [ 15.968875] ret_from_fork_asm+0x1a/0x30 [ 15.968912] </TASK> [ 15.968925] [ 15.979991] Allocated by task 279: [ 15.980266] kasan_save_stack+0x45/0x70 [ 15.980478] kasan_save_track+0x18/0x40 [ 15.980732] kasan_save_alloc_info+0x3b/0x50 [ 15.981028] __kasan_kmalloc+0xb7/0xc0 [ 15.981193] __kmalloc_cache_noprof+0x189/0x420 [ 15.981384] kasan_bitops_generic+0x92/0x1c0 [ 15.981632] kunit_try_run_case+0x1a5/0x480 [ 15.982166] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.982491] kthread+0x337/0x6f0 [ 15.982711] ret_from_fork+0x116/0x1d0 [ 15.983098] ret_from_fork_asm+0x1a/0x30 [ 15.983297] [ 15.983394] The buggy address belongs to the object at ffff88810267b740 [ 15.983394] which belongs to the cache kmalloc-16 of size 16 [ 15.984171] The buggy address is located 8 bytes inside of [ 15.984171] allocated 9-byte region [ffff88810267b740, ffff88810267b749) [ 15.984803] [ 15.985008] The buggy address belongs to the physical page: [ 15.985301] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10267b [ 15.985741] flags: 0x200000000000000(node=0|zone=2) [ 15.986312] page_type: f5(slab) [ 15.986510] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 15.987118] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 15.987537] page dumped because: kasan: bad access detected [ 15.988004] [ 15.988127] Memory state around the buggy address: [ 15.988364] ffff88810267b600: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 15.988628] ffff88810267b680: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 15.989156] >ffff88810267b700: 00 05 fc fc 00 04 fc fc 00 01 fc fc fc fc fc fc [ 15.989607] ^ [ 15.989928] ffff88810267b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.990188] ffff88810267b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.990494] ================================================================== [ 16.023965] ================================================================== [ 16.024712] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50 [ 16.025544] Write of size 8 at addr ffff88810267b748 by task kunit_try_catch/279 [ 16.026245] [ 16.026392] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 16.026465] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.026481] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.026509] Call Trace: [ 16.026532] <TASK> [ 16.026556] dump_stack_lvl+0x73/0xb0 [ 16.026591] print_report+0xd1/0x650 [ 16.026617] ? __virt_addr_valid+0x1db/0x2d0 [ 16.026659] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 16.027071] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.027101] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 16.027132] kasan_report+0x141/0x180 [ 16.027159] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 16.027204] kasan_check_range+0x10c/0x1c0 [ 16.027232] __kasan_check_write+0x18/0x20 [ 16.027255] kasan_bitops_modify.constprop.0+0x373/0xd50 [ 16.027285] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 16.027316] ? ret_from_fork_asm+0x1a/0x30 [ 16.027342] ? kthread+0x337/0x6f0 [ 16.027372] kasan_bitops_generic+0x116/0x1c0 [ 16.027400] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 16.027429] ? __pfx_read_tsc+0x10/0x10 [ 16.027454] ? ktime_get_ts64+0x86/0x230 [ 16.027482] kunit_try_run_case+0x1a5/0x480 [ 16.027513] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.027541] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.027570] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.027597] ? __kthread_parkme+0x82/0x180 [ 16.027621] ? preempt_count_sub+0x50/0x80 [ 16.027659] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.027687] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.027867] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.027945] kthread+0x337/0x6f0 [ 16.027969] ? trace_preempt_on+0x20/0xc0 [ 16.027998] ? __pfx_kthread+0x10/0x10 [ 16.028023] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.028047] ? calculate_sigpending+0x7b/0xa0 [ 16.028077] ? __pfx_kthread+0x10/0x10 [ 16.028102] ret_from_fork+0x116/0x1d0 [ 16.028124] ? __pfx_kthread+0x10/0x10 [ 16.028147] ret_from_fork_asm+0x1a/0x30 [ 16.028184] </TASK> [ 16.028197] [ 16.043841] Allocated by task 279: [ 16.044061] kasan_save_stack+0x45/0x70 [ 16.044384] kasan_save_track+0x18/0x40 [ 16.044581] kasan_save_alloc_info+0x3b/0x50 [ 16.044938] __kasan_kmalloc+0xb7/0xc0 [ 16.045107] __kmalloc_cache_noprof+0x189/0x420 [ 16.045386] kasan_bitops_generic+0x92/0x1c0 [ 16.045627] kunit_try_run_case+0x1a5/0x480 [ 16.045949] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.046263] kthread+0x337/0x6f0 [ 16.046463] ret_from_fork+0x116/0x1d0 [ 16.046709] ret_from_fork_asm+0x1a/0x30 [ 16.046960] [ 16.047047] The buggy address belongs to the object at ffff88810267b740 [ 16.047047] which belongs to the cache kmalloc-16 of size 16 [ 16.047524] The buggy address is located 8 bytes inside of [ 16.047524] allocated 9-byte region [ffff88810267b740, ffff88810267b749) [ 16.048494] [ 16.048597] The buggy address belongs to the physical page: [ 16.049192] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10267b [ 16.049659] flags: 0x200000000000000(node=0|zone=2) [ 16.050182] page_type: f5(slab) [ 16.050371] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 16.050751] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 16.051199] page dumped because: kasan: bad access detected [ 16.051511] [ 16.051598] Memory state around the buggy address: [ 16.051853] ffff88810267b600: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 16.052161] ffff88810267b680: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 16.052558] >ffff88810267b700: 00 05 fc fc 00 04 fc fc 00 01 fc fc fc fc fc fc [ 16.052952] ^ [ 16.053201] ffff88810267b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.053614] ffff88810267b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.053921] ================================================================== [ 15.991191] ================================================================== [ 15.991562] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 15.992364] Write of size 8 at addr ffff88810267b748 by task kunit_try_catch/279 [ 15.992843] [ 15.993099] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.993155] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.993170] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.993197] Call Trace: [ 15.993220] <TASK> [ 15.993247] dump_stack_lvl+0x73/0xb0 [ 15.993282] print_report+0xd1/0x650 [ 15.993310] ? __virt_addr_valid+0x1db/0x2d0 [ 15.993340] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 15.993369] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.993397] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 15.993427] kasan_report+0x141/0x180 [ 15.993453] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 15.993488] kasan_check_range+0x10c/0x1c0 [ 15.993516] __kasan_check_write+0x18/0x20 [ 15.993555] kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 15.993586] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 15.993631] ? ret_from_fork_asm+0x1a/0x30 [ 15.993669] ? kthread+0x337/0x6f0 [ 15.993698] kasan_bitops_generic+0x116/0x1c0 [ 15.993725] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 15.993754] ? __pfx_read_tsc+0x10/0x10 [ 15.993780] ? ktime_get_ts64+0x86/0x230 [ 15.993811] kunit_try_run_case+0x1a5/0x480 [ 15.993839] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.993866] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.993895] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.993921] ? __kthread_parkme+0x82/0x180 [ 15.993945] ? preempt_count_sub+0x50/0x80 [ 15.993974] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.994002] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.994028] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.994055] kthread+0x337/0x6f0 [ 15.994078] ? trace_preempt_on+0x20/0xc0 [ 15.994107] ? __pfx_kthread+0x10/0x10 [ 15.994131] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.994247] ? calculate_sigpending+0x7b/0xa0 [ 15.994277] ? __pfx_kthread+0x10/0x10 [ 15.994303] ret_from_fork+0x116/0x1d0 [ 15.994327] ? __pfx_kthread+0x10/0x10 [ 15.994351] ret_from_fork_asm+0x1a/0x30 [ 15.994388] </TASK> [ 15.994401] [ 16.008043] Allocated by task 279: [ 16.008347] kasan_save_stack+0x45/0x70 [ 16.008580] kasan_save_track+0x18/0x40 [ 16.009046] kasan_save_alloc_info+0x3b/0x50 [ 16.009506] __kasan_kmalloc+0xb7/0xc0 [ 16.010113] __kmalloc_cache_noprof+0x189/0x420 [ 16.010386] kasan_bitops_generic+0x92/0x1c0 [ 16.010628] kunit_try_run_case+0x1a5/0x480 [ 16.011283] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.011753] kthread+0x337/0x6f0 [ 16.012375] ret_from_fork+0x116/0x1d0 [ 16.012605] ret_from_fork_asm+0x1a/0x30 [ 16.013543] [ 16.013766] The buggy address belongs to the object at ffff88810267b740 [ 16.013766] which belongs to the cache kmalloc-16 of size 16 [ 16.014611] The buggy address is located 8 bytes inside of [ 16.014611] allocated 9-byte region [ffff88810267b740, ffff88810267b749) [ 16.015221] [ 16.015312] The buggy address belongs to the physical page: [ 16.015517] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10267b [ 16.016075] flags: 0x200000000000000(node=0|zone=2) [ 16.016283] page_type: f5(slab) [ 16.016433] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 16.017386] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 16.019614] page dumped because: kasan: bad access detected [ 16.020262] [ 16.020395] Memory state around the buggy address: [ 16.020670] ffff88810267b600: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 16.021049] ffff88810267b680: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 16.021412] >ffff88810267b700: 00 05 fc fc 00 04 fc fc 00 01 fc fc fc fc fc fc [ 16.022735] ^ [ 16.022956] ffff88810267b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.023213] ffff88810267b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.023464] ================================================================== [ 16.054597] ================================================================== [ 16.055103] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 16.055519] Write of size 8 at addr ffff88810267b748 by task kunit_try_catch/279 [ 16.056289] [ 16.056415] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 16.056474] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.056490] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.056516] Call Trace: [ 16.056540] <TASK> [ 16.056565] dump_stack_lvl+0x73/0xb0 [ 16.056601] print_report+0xd1/0x650 [ 16.056626] ? __virt_addr_valid+0x1db/0x2d0 [ 16.056672] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 16.056702] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.056728] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 16.056759] kasan_report+0x141/0x180 [ 16.056784] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 16.056835] kasan_check_range+0x10c/0x1c0 [ 16.056863] __kasan_check_write+0x18/0x20 [ 16.056886] kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 16.056917] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 16.056948] ? ret_from_fork_asm+0x1a/0x30 [ 16.056973] ? kthread+0x337/0x6f0 [ 16.057003] kasan_bitops_generic+0x116/0x1c0 [ 16.057031] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 16.057061] ? __pfx_read_tsc+0x10/0x10 [ 16.057085] ? ktime_get_ts64+0x86/0x230 [ 16.057115] kunit_try_run_case+0x1a5/0x480 [ 16.057144] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.057171] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.057200] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.057228] ? __kthread_parkme+0x82/0x180 [ 16.057251] ? preempt_count_sub+0x50/0x80 [ 16.057279] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.057306] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.057333] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.057360] kthread+0x337/0x6f0 [ 16.057382] ? trace_preempt_on+0x20/0xc0 [ 16.057410] ? __pfx_kthread+0x10/0x10 [ 16.057433] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.057458] ? calculate_sigpending+0x7b/0xa0 [ 16.057485] ? __pfx_kthread+0x10/0x10 [ 16.057511] ret_from_fork+0x116/0x1d0 [ 16.057532] ? __pfx_kthread+0x10/0x10 [ 16.057556] ret_from_fork_asm+0x1a/0x30 [ 16.057592] </TASK> [ 16.057605] [ 16.066986] Allocated by task 279: [ 16.067154] kasan_save_stack+0x45/0x70 [ 16.067361] kasan_save_track+0x18/0x40 [ 16.067584] kasan_save_alloc_info+0x3b/0x50 [ 16.067844] __kasan_kmalloc+0xb7/0xc0 [ 16.068064] __kmalloc_cache_noprof+0x189/0x420 [ 16.068253] kasan_bitops_generic+0x92/0x1c0 [ 16.068430] kunit_try_run_case+0x1a5/0x480 [ 16.069165] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.069494] kthread+0x337/0x6f0 [ 16.069719] ret_from_fork+0x116/0x1d0 [ 16.070249] ret_from_fork_asm+0x1a/0x30 [ 16.070497] [ 16.070596] The buggy address belongs to the object at ffff88810267b740 [ 16.070596] which belongs to the cache kmalloc-16 of size 16 [ 16.071402] The buggy address is located 8 bytes inside of [ 16.071402] allocated 9-byte region [ffff88810267b740, ffff88810267b749) [ 16.072021] [ 16.072150] The buggy address belongs to the physical page: [ 16.072460] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10267b [ 16.072768] flags: 0x200000000000000(node=0|zone=2) [ 16.072969] page_type: f5(slab) [ 16.073117] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 16.073531] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 16.074734] page dumped because: kasan: bad access detected [ 16.075167] [ 16.075286] Memory state around the buggy address: [ 16.075538] ffff88810267b600: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 16.075816] ffff88810267b680: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 16.076075] >ffff88810267b700: 00 05 fc fc 00 04 fc fc 00 01 fc fc fc fc fc fc [ 16.077017] ^ [ 16.077363] ffff88810267b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.077784] ffff88810267b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.078177] ================================================================== [ 15.939508] ================================================================== [ 15.940083] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 15.940679] Write of size 8 at addr ffff88810267b748 by task kunit_try_catch/279 [ 15.941132] [ 15.941267] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 15.941364] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.941584] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.941616] Call Trace: [ 15.941667] <TASK> [ 15.941691] dump_stack_lvl+0x73/0xb0 [ 15.941728] print_report+0xd1/0x650 [ 15.941755] ? __virt_addr_valid+0x1db/0x2d0 [ 15.941784] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 15.941814] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.941840] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 15.941871] kasan_report+0x141/0x180 [ 15.941897] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 15.941933] kasan_check_range+0x10c/0x1c0 [ 15.941961] __kasan_check_write+0x18/0x20 [ 15.941983] kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 15.942015] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 15.942113] ? ret_from_fork_asm+0x1a/0x30 [ 15.942160] ? kthread+0x337/0x6f0 [ 15.942190] kasan_bitops_generic+0x116/0x1c0 [ 15.942218] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 15.942248] ? __pfx_read_tsc+0x10/0x10 [ 15.942274] ? ktime_get_ts64+0x86/0x230 [ 15.942303] kunit_try_run_case+0x1a5/0x480 [ 15.942333] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.942359] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.942388] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.942431] ? __kthread_parkme+0x82/0x180 [ 15.942455] ? preempt_count_sub+0x50/0x80 [ 15.942485] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.942526] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.942554] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.942581] kthread+0x337/0x6f0 [ 15.942604] ? trace_preempt_on+0x20/0xc0 [ 15.942632] ? __pfx_kthread+0x10/0x10 [ 15.942666] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.942691] ? calculate_sigpending+0x7b/0xa0 [ 15.942720] ? __pfx_kthread+0x10/0x10 [ 15.942745] ret_from_fork+0x116/0x1d0 [ 15.942767] ? __pfx_kthread+0x10/0x10 [ 15.942873] ret_from_fork_asm+0x1a/0x30 [ 15.942921] </TASK> [ 15.942934] [ 15.953977] Allocated by task 279: [ 15.954211] kasan_save_stack+0x45/0x70 [ 15.954490] kasan_save_track+0x18/0x40 [ 15.954726] kasan_save_alloc_info+0x3b/0x50 [ 15.954983] __kasan_kmalloc+0xb7/0xc0 [ 15.955179] __kmalloc_cache_noprof+0x189/0x420 [ 15.955372] kasan_bitops_generic+0x92/0x1c0 [ 15.955549] kunit_try_run_case+0x1a5/0x480 [ 15.955920] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.956257] kthread+0x337/0x6f0 [ 15.956459] ret_from_fork+0x116/0x1d0 [ 15.956699] ret_from_fork_asm+0x1a/0x30 [ 15.957273] [ 15.957374] The buggy address belongs to the object at ffff88810267b740 [ 15.957374] which belongs to the cache kmalloc-16 of size 16 [ 15.958156] The buggy address is located 8 bytes inside of [ 15.958156] allocated 9-byte region [ffff88810267b740, ffff88810267b749) [ 15.958861] [ 15.959150] The buggy address belongs to the physical page: [ 15.959419] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10267b [ 15.959988] flags: 0x200000000000000(node=0|zone=2) [ 15.960285] page_type: f5(slab) [ 15.960486] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 15.960896] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 15.961535] page dumped because: kasan: bad access detected [ 15.961888] [ 15.962064] Memory state around the buggy address: [ 15.962322] ffff88810267b600: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 15.962700] ffff88810267b680: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 15.963206] >ffff88810267b700: 00 05 fc fc 00 04 fc fc 00 01 fc fc fc fc fc fc [ 15.963590] ^ [ 15.964066] ffff88810267b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.964537] ffff88810267b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.965160] ================================================================== [ 16.106320] ================================================================== [ 16.106914] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50 [ 16.107392] Write of size 8 at addr ffff88810267b748 by task kunit_try_catch/279 [ 16.107885] [ 16.108024] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 16.108080] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.108096] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.108123] Call Trace: [ 16.108145] <TASK> [ 16.108169] dump_stack_lvl+0x73/0xb0 [ 16.108202] print_report+0xd1/0x650 [ 16.108229] ? __virt_addr_valid+0x1db/0x2d0 [ 16.108256] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 16.108286] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.108313] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 16.108342] kasan_report+0x141/0x180 [ 16.108368] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 16.108402] kasan_check_range+0x10c/0x1c0 [ 16.108429] __kasan_check_write+0x18/0x20 [ 16.108452] kasan_bitops_modify.constprop.0+0x547/0xd50 [ 16.108481] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 16.108512] ? ret_from_fork_asm+0x1a/0x30 [ 16.108537] ? kthread+0x337/0x6f0 [ 16.108567] kasan_bitops_generic+0x116/0x1c0 [ 16.108593] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 16.108622] ? __pfx_read_tsc+0x10/0x10 [ 16.108664] ? ktime_get_ts64+0x86/0x230 [ 16.108693] kunit_try_run_case+0x1a5/0x480 [ 16.108722] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.108747] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.108775] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.108801] ? __kthread_parkme+0x82/0x180 [ 16.108824] ? preempt_count_sub+0x50/0x80 [ 16.108853] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.108879] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.108971] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.109002] kthread+0x337/0x6f0 [ 16.109027] ? trace_preempt_on+0x20/0xc0 [ 16.109054] ? __pfx_kthread+0x10/0x10 [ 16.109078] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.109102] ? calculate_sigpending+0x7b/0xa0 [ 16.109131] ? __pfx_kthread+0x10/0x10 [ 16.109156] ret_from_fork+0x116/0x1d0 [ 16.109179] ? __pfx_kthread+0x10/0x10 [ 16.109202] ret_from_fork_asm+0x1a/0x30 [ 16.109238] </TASK> [ 16.109251] [ 16.119625] Allocated by task 279: [ 16.119860] kasan_save_stack+0x45/0x70 [ 16.120038] kasan_save_track+0x18/0x40 [ 16.120285] kasan_save_alloc_info+0x3b/0x50 [ 16.120791] __kasan_kmalloc+0xb7/0xc0 [ 16.120974] __kmalloc_cache_noprof+0x189/0x420 [ 16.121260] kasan_bitops_generic+0x92/0x1c0 [ 16.121527] kunit_try_run_case+0x1a5/0x480 [ 16.121793] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.122114] kthread+0x337/0x6f0 [ 16.122320] ret_from_fork+0x116/0x1d0 [ 16.122513] ret_from_fork_asm+0x1a/0x30 [ 16.122697] [ 16.122831] The buggy address belongs to the object at ffff88810267b740 [ 16.122831] which belongs to the cache kmalloc-16 of size 16 [ 16.123486] The buggy address is located 8 bytes inside of [ 16.123486] allocated 9-byte region [ffff88810267b740, ffff88810267b749) [ 16.124277] [ 16.124376] The buggy address belongs to the physical page: [ 16.124585] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10267b [ 16.124959] flags: 0x200000000000000(node=0|zone=2) [ 16.125363] page_type: f5(slab) [ 16.125573] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 16.125941] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 16.126216] page dumped because: kasan: bad access detected [ 16.126728] [ 16.126812] Memory state around the buggy address: [ 16.127290] ffff88810267b600: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 16.127660] ffff88810267b680: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 16.127940] >ffff88810267b700: 00 05 fc fc 00 04 fc fc 00 01 fc fc fc fc fc fc [ 16.128616] ^ [ 16.129071] ffff88810267b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.129385] ffff88810267b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.129805] ================================================================== [ 16.078811] ================================================================== [ 16.079231] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 16.079682] Write of size 8 at addr ffff88810267b748 by task kunit_try_catch/279 [ 16.079973] [ 16.080081] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 16.080136] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.080150] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.080177] Call Trace: [ 16.080201] <TASK> [ 16.080224] dump_stack_lvl+0x73/0xb0 [ 16.080258] print_report+0xd1/0x650 [ 16.080285] ? __virt_addr_valid+0x1db/0x2d0 [ 16.080313] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 16.080343] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.080369] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 16.080399] kasan_report+0x141/0x180 [ 16.080425] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 16.080461] kasan_check_range+0x10c/0x1c0 [ 16.080489] __kasan_check_write+0x18/0x20 [ 16.080513] kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 16.080544] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 16.080576] ? ret_from_fork_asm+0x1a/0x30 [ 16.080603] ? kthread+0x337/0x6f0 [ 16.080758] kasan_bitops_generic+0x116/0x1c0 [ 16.080789] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 16.081017] ? __pfx_read_tsc+0x10/0x10 [ 16.081045] ? ktime_get_ts64+0x86/0x230 [ 16.081076] kunit_try_run_case+0x1a5/0x480 [ 16.081106] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.081133] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.081160] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.081187] ? __kthread_parkme+0x82/0x180 [ 16.081210] ? preempt_count_sub+0x50/0x80 [ 16.081239] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.081267] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.081293] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.081320] kthread+0x337/0x6f0 [ 16.081343] ? trace_preempt_on+0x20/0xc0 [ 16.081370] ? __pfx_kthread+0x10/0x10 [ 16.081395] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.081419] ? calculate_sigpending+0x7b/0xa0 [ 16.081449] ? __pfx_kthread+0x10/0x10 [ 16.081475] ret_from_fork+0x116/0x1d0 [ 16.081496] ? __pfx_kthread+0x10/0x10 [ 16.081520] ret_from_fork_asm+0x1a/0x30 [ 16.081556] </TASK> [ 16.081568] [ 16.092106] Allocated by task 279: [ 16.092335] kasan_save_stack+0x45/0x70 [ 16.092675] kasan_save_track+0x18/0x40 [ 16.093113] kasan_save_alloc_info+0x3b/0x50 [ 16.093314] __kasan_kmalloc+0xb7/0xc0 [ 16.093544] __kmalloc_cache_noprof+0x189/0x420 [ 16.093877] kasan_bitops_generic+0x92/0x1c0 [ 16.094085] kunit_try_run_case+0x1a5/0x480 [ 16.094262] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.094481] kthread+0x337/0x6f0 [ 16.094701] ret_from_fork+0x116/0x1d0 [ 16.094923] ret_from_fork_asm+0x1a/0x30 [ 16.095156] [ 16.095414] The buggy address belongs to the object at ffff88810267b740 [ 16.095414] which belongs to the cache kmalloc-16 of size 16 [ 16.097337] The buggy address is located 8 bytes inside of [ 16.097337] allocated 9-byte region [ffff88810267b740, ffff88810267b749) [ 16.098354] [ 16.098571] The buggy address belongs to the physical page: [ 16.099297] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10267b [ 16.100177] flags: 0x200000000000000(node=0|zone=2) [ 16.100773] page_type: f5(slab) [ 16.100944] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 16.101731] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 16.102642] page dumped because: kasan: bad access detected [ 16.103340] [ 16.103544] Memory state around the buggy address: [ 16.103948] ffff88810267b600: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 16.104224] ffff88810267b680: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 16.104486] >ffff88810267b700: 00 05 fc fc 00 04 fc fc 00 01 fc fc fc fc fc fc [ 16.104764] ^ [ 16.105073] ffff88810267b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.105420] ffff88810267b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.105747] ==================================================================