Date
July 6, 2025, 11:09 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 20.540722] ================================================================== [ 20.540818] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 20.540873] Read of size 8 at addr fff00000c1cea988 by task kunit_try_catch/261 [ 20.540970] [ 20.541005] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.541087] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.541114] Hardware name: linux,dummy-virt (DT) [ 20.541259] Call trace: [ 20.541284] show_stack+0x20/0x38 (C) [ 20.541400] dump_stack_lvl+0x8c/0xd0 [ 20.541453] print_report+0x118/0x608 [ 20.541855] kasan_report+0xdc/0x128 [ 20.541994] __asan_report_load8_noabort+0x20/0x30 [ 20.542181] kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 20.542549] kasan_bitops_generic+0x110/0x1c8 [ 20.542637] kunit_try_run_case+0x170/0x3f0 [ 20.542789] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.543025] kthread+0x328/0x630 [ 20.543361] ret_from_fork+0x10/0x20 [ 20.543790] [ 20.543822] Allocated by task 261: [ 20.543883] kasan_save_stack+0x3c/0x68 [ 20.544233] kasan_save_track+0x20/0x40 [ 20.544333] kasan_save_alloc_info+0x40/0x58 [ 20.544685] __kasan_kmalloc+0xd4/0xd8 [ 20.544875] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.545047] kasan_bitops_generic+0xa0/0x1c8 [ 20.545239] kunit_try_run_case+0x170/0x3f0 [ 20.545368] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.545762] kthread+0x328/0x630 [ 20.545995] ret_from_fork+0x10/0x20 [ 20.546085] [ 20.546178] The buggy address belongs to the object at fff00000c1cea980 [ 20.546178] which belongs to the cache kmalloc-16 of size 16 [ 20.546535] The buggy address is located 8 bytes inside of [ 20.546535] allocated 9-byte region [fff00000c1cea980, fff00000c1cea989) [ 20.546630] [ 20.546674] The buggy address belongs to the physical page: [ 20.546708] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101cea [ 20.546766] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.546826] page_type: f5(slab) [ 20.546867] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 20.546936] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 20.546979] page dumped because: kasan: bad access detected [ 20.547016] [ 20.547046] Memory state around the buggy address: [ 20.547092] fff00000c1cea880: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 20.547139] fff00000c1cea900: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 20.547220] >fff00000c1cea980: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.547263] ^ [ 20.547293] fff00000c1ceaa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.547338] fff00000c1ceaa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.547380] ================================================================== [ 20.548651] ================================================================== [ 20.548704] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc0 [ 20.549080] Write of size 8 at addr fff00000c1cea988 by task kunit_try_catch/261 [ 20.549228] [ 20.549263] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.549544] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.549578] Hardware name: linux,dummy-virt (DT) [ 20.549760] Call trace: [ 20.549797] show_stack+0x20/0x38 (C) [ 20.550245] dump_stack_lvl+0x8c/0xd0 [ 20.550468] print_report+0x118/0x608 [ 20.550909] kasan_report+0xdc/0x128 [ 20.551061] kasan_check_range+0x100/0x1a8 [ 20.551251] __kasan_check_write+0x20/0x30 [ 20.551364] kasan_bitops_modify.constprop.0+0x1dc/0xbc0 [ 20.551709] kasan_bitops_generic+0x110/0x1c8 [ 20.552344] kunit_try_run_case+0x170/0x3f0 [ 20.552449] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.552566] kthread+0x328/0x630 [ 20.552784] ret_from_fork+0x10/0x20 [ 20.553089] [ 20.553289] Allocated by task 261: [ 20.553354] kasan_save_stack+0x3c/0x68 [ 20.553592] kasan_save_track+0x20/0x40 [ 20.553735] kasan_save_alloc_info+0x40/0x58 [ 20.554039] __kasan_kmalloc+0xd4/0xd8 [ 20.554143] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.554365] kasan_bitops_generic+0xa0/0x1c8 [ 20.554560] kunit_try_run_case+0x170/0x3f0 [ 20.554750] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.554919] kthread+0x328/0x630 [ 20.554958] ret_from_fork+0x10/0x20 [ 20.555149] [ 20.555204] The buggy address belongs to the object at fff00000c1cea980 [ 20.555204] which belongs to the cache kmalloc-16 of size 16 [ 20.555386] The buggy address is located 8 bytes inside of [ 20.555386] allocated 9-byte region [fff00000c1cea980, fff00000c1cea989) [ 20.555538] [ 20.555692] The buggy address belongs to the physical page: [ 20.555772] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101cea [ 20.555876] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.556171] page_type: f5(slab) [ 20.556247] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 20.556366] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 20.556465] page dumped because: kasan: bad access detected [ 20.556619] [ 20.556720] Memory state around the buggy address: [ 20.556793] fff00000c1cea880: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 20.557005] fff00000c1cea900: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 20.557156] >fff00000c1cea980: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.557334] ^ [ 20.557382] fff00000c1ceaa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.557435] fff00000c1ceaa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.557681] ================================================================== [ 20.528758] ================================================================== [ 20.528830] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 20.528905] Write of size 8 at addr fff00000c1cea988 by task kunit_try_catch/261 [ 20.528957] [ 20.528990] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.529082] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.529111] Hardware name: linux,dummy-virt (DT) [ 20.529143] Call trace: [ 20.529167] show_stack+0x20/0x38 (C) [ 20.529573] dump_stack_lvl+0x8c/0xd0 [ 20.530317] print_report+0x118/0x608 [ 20.530395] kasan_report+0xdc/0x128 [ 20.530568] kasan_check_range+0x100/0x1a8 [ 20.530770] __kasan_check_write+0x20/0x30 [ 20.530833] kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 20.531217] kasan_bitops_generic+0x110/0x1c8 [ 20.531416] kunit_try_run_case+0x170/0x3f0 [ 20.531610] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.531759] kthread+0x328/0x630 [ 20.532087] ret_from_fork+0x10/0x20 [ 20.532579] [ 20.532679] Allocated by task 261: [ 20.532718] kasan_save_stack+0x3c/0x68 [ 20.533092] kasan_save_track+0x20/0x40 [ 20.533313] kasan_save_alloc_info+0x40/0x58 [ 20.533505] __kasan_kmalloc+0xd4/0xd8 [ 20.533769] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.533903] kasan_bitops_generic+0xa0/0x1c8 [ 20.534057] kunit_try_run_case+0x170/0x3f0 [ 20.534203] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.534469] kthread+0x328/0x630 [ 20.534679] ret_from_fork+0x10/0x20 [ 20.534813] [ 20.534944] The buggy address belongs to the object at fff00000c1cea980 [ 20.534944] which belongs to the cache kmalloc-16 of size 16 [ 20.535163] The buggy address is located 8 bytes inside of [ 20.535163] allocated 9-byte region [fff00000c1cea980, fff00000c1cea989) [ 20.535367] [ 20.535393] The buggy address belongs to the physical page: [ 20.535448] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101cea [ 20.535839] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.536080] page_type: f5(slab) [ 20.536239] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 20.536332] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 20.536394] page dumped because: kasan: bad access detected [ 20.536719] [ 20.537531] Memory state around the buggy address: [ 20.537640] fff00000c1cea880: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 20.537698] fff00000c1cea900: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 20.537773] >fff00000c1cea980: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.537875] ^ [ 20.537908] fff00000c1ceaa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.538422] fff00000c1ceaa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.538615] ================================================================== [ 20.558989] ================================================================== [ 20.559043] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbc0 [ 20.559184] Read of size 8 at addr fff00000c1cea988 by task kunit_try_catch/261 [ 20.559314] [ 20.559687] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.559795] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.559827] Hardware name: linux,dummy-virt (DT) [ 20.559859] Call trace: [ 20.559892] show_stack+0x20/0x38 (C) [ 20.559947] dump_stack_lvl+0x8c/0xd0 [ 20.559996] print_report+0x118/0x608 [ 20.560055] kasan_report+0xdc/0x128 [ 20.560104] __asan_report_load8_noabort+0x20/0x30 [ 20.560162] kasan_bitops_modify.constprop.0+0xa80/0xbc0 [ 20.560402] kasan_bitops_generic+0x110/0x1c8 [ 20.560636] kunit_try_run_case+0x170/0x3f0 [ 20.560700] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.560756] kthread+0x328/0x630 [ 20.560800] ret_from_fork+0x10/0x20 [ 20.560879] [ 20.560919] Allocated by task 261: [ 20.560976] kasan_save_stack+0x3c/0x68 [ 20.561359] kasan_save_track+0x20/0x40 [ 20.561418] kasan_save_alloc_info+0x40/0x58 [ 20.561461] __kasan_kmalloc+0xd4/0xd8 [ 20.561854] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.561960] kasan_bitops_generic+0xa0/0x1c8 [ 20.562079] kunit_try_run_case+0x170/0x3f0 [ 20.562255] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.562376] kthread+0x328/0x630 [ 20.562434] ret_from_fork+0x10/0x20 [ 20.562475] [ 20.562791] The buggy address belongs to the object at fff00000c1cea980 [ 20.562791] which belongs to the cache kmalloc-16 of size 16 [ 20.562891] The buggy address is located 8 bytes inside of [ 20.562891] allocated 9-byte region [fff00000c1cea980, fff00000c1cea989) [ 20.564329] page dumped because: kasan: bad access detected [ 20.566022] fff00000c1ceaa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.567726] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc0 [ 20.567996] Hardware name: linux,dummy-virt (DT) [ 20.568416] kasan_bitops_generic+0x110/0x1c8 [ 20.568760] kasan_save_track+0x20/0x40 [ 20.569004] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.570239] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101cea [ 20.571155] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 20.571315] page dumped because: kasan: bad access detected [ 20.572357] >fff00000c1cea980: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.573701] Write of size 8 at addr fff00000c1cea988 by task kunit_try_catch/261 [ 20.575673] __kasan_check_write+0x20/0x30 [ 20.576544] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.578869] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.580265] [ 20.580358] The buggy address belongs to the physical page: [ 20.581403] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 20.581759] [ 20.582429] >fff00000c1cea980: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.584128] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaec/0xbc0 [ 20.584728] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.585964] __asan_report_load8_noabort+0x20/0x30 [ 20.587134] kasan_save_stack+0x3c/0x68 [ 20.587370] kasan_bitops_generic+0xa0/0x1c8 [ 20.587702] The buggy address is located 8 bytes inside of [ 20.587702] allocated 9-byte region [fff00000c1cea980, fff00000c1cea989) [ 20.588042] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 20.588086] page dumped because: kasan: bad access detected [ 20.588119] [ 20.588172] fff00000c1cea880: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 20.589577] fff00000c1ceaa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.591355] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.592183] kasan_check_range+0x100/0x1a8 [ 20.593312] ret_from_fork+0x10/0x20 [ 20.593779] kasan_save_alloc_info+0x40/0x58 [ 20.594992] [ 20.595463] [ 20.595959] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.596519] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 20.597291] fff00000c1cea880: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 20.599839] ==================================================================
[ 13.685868] ================================================================== [ 13.686642] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 13.687047] Write of size 8 at addr ffff888100fbfb08 by task kunit_try_catch/278 [ 13.687397] [ 13.687505] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.687546] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.687557] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.687578] Call Trace: [ 13.687592] <TASK> [ 13.687608] dump_stack_lvl+0x73/0xb0 [ 13.687634] print_report+0xd1/0x650 [ 13.687657] ? __virt_addr_valid+0x1db/0x2d0 [ 13.687680] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 13.687708] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.687732] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 13.687760] kasan_report+0x141/0x180 [ 13.687784] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 13.687816] kasan_check_range+0x10c/0x1c0 [ 13.687841] __kasan_check_write+0x18/0x20 [ 13.687862] kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 13.687889] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 13.687919] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.687956] ? trace_hardirqs_on+0x37/0xe0 [ 13.687980] ? kasan_bitops_generic+0x92/0x1c0 [ 13.688009] kasan_bitops_generic+0x116/0x1c0 [ 13.688034] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.688061] ? __pfx_read_tsc+0x10/0x10 [ 13.688096] ? ktime_get_ts64+0x86/0x230 [ 13.688121] kunit_try_run_case+0x1a5/0x480 [ 13.688147] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.688171] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.688195] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.688220] ? __kthread_parkme+0x82/0x180 [ 13.688241] ? preempt_count_sub+0x50/0x80 [ 13.688265] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.688291] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.688316] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.688342] kthread+0x337/0x6f0 [ 13.688363] ? trace_preempt_on+0x20/0xc0 [ 13.688385] ? __pfx_kthread+0x10/0x10 [ 13.688407] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.688430] ? calculate_sigpending+0x7b/0xa0 [ 13.688455] ? __pfx_kthread+0x10/0x10 [ 13.688477] ret_from_fork+0x116/0x1d0 [ 13.688497] ? __pfx_kthread+0x10/0x10 [ 13.688520] ret_from_fork_asm+0x1a/0x30 [ 13.688552] </TASK> [ 13.688564] [ 13.696336] Allocated by task 278: [ 13.696507] kasan_save_stack+0x45/0x70 [ 13.696677] kasan_save_track+0x18/0x40 [ 13.696867] kasan_save_alloc_info+0x3b/0x50 [ 13.697053] __kasan_kmalloc+0xb7/0xc0 [ 13.697231] __kmalloc_cache_noprof+0x189/0x420 [ 13.697440] kasan_bitops_generic+0x92/0x1c0 [ 13.697591] kunit_try_run_case+0x1a5/0x480 [ 13.697739] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.697914] kthread+0x337/0x6f0 [ 13.698046] ret_from_fork+0x116/0x1d0 [ 13.698178] ret_from_fork_asm+0x1a/0x30 [ 13.698319] [ 13.698390] The buggy address belongs to the object at ffff888100fbfb00 [ 13.698390] which belongs to the cache kmalloc-16 of size 16 [ 13.699046] The buggy address is located 8 bytes inside of [ 13.699046] allocated 9-byte region [ffff888100fbfb00, ffff888100fbfb09) [ 13.699576] [ 13.699672] The buggy address belongs to the physical page: [ 13.699951] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100fbf [ 13.700357] flags: 0x200000000000000(node=0|zone=2) [ 13.700520] page_type: f5(slab) [ 13.700641] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.700870] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.701195] page dumped because: kasan: bad access detected [ 13.701454] [ 13.701552] Memory state around the buggy address: [ 13.701779] ffff888100fbfa00: 00 04 fc fc 00 00 fc fc fa fb fc fc fa fb fc fc [ 13.702178] ffff888100fbfa80: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 13.702506] >ffff888100fbfb00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.702833] ^ [ 13.703025] ffff888100fbfb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.703379] ffff888100fbfc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.703675] ================================================================== [ 13.795910] ================================================================== [ 13.796803] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50 [ 13.797227] Write of size 8 at addr ffff888100fbfb08 by task kunit_try_catch/278 [ 13.797524] [ 13.797639] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.797686] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.797699] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.797721] Call Trace: [ 13.797738] <TASK> [ 13.797753] dump_stack_lvl+0x73/0xb0 [ 13.797783] print_report+0xd1/0x650 [ 13.797807] ? __virt_addr_valid+0x1db/0x2d0 [ 13.797830] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 13.797858] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.797883] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 13.797911] kasan_report+0x141/0x180 [ 13.797946] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 13.797978] kasan_check_range+0x10c/0x1c0 [ 13.798003] __kasan_check_write+0x18/0x20 [ 13.798024] kasan_bitops_modify.constprop.0+0x547/0xd50 [ 13.798052] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 13.798092] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.798119] ? trace_hardirqs_on+0x37/0xe0 [ 13.798154] ? kasan_bitops_generic+0x92/0x1c0 [ 13.798184] kasan_bitops_generic+0x116/0x1c0 [ 13.798209] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.798236] ? __pfx_read_tsc+0x10/0x10 [ 13.798258] ? ktime_get_ts64+0x86/0x230 [ 13.798283] kunit_try_run_case+0x1a5/0x480 [ 13.798308] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.798332] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.798357] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.798381] ? __kthread_parkme+0x82/0x180 [ 13.798402] ? preempt_count_sub+0x50/0x80 [ 13.798427] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.798452] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.798477] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.798503] kthread+0x337/0x6f0 [ 13.798523] ? trace_preempt_on+0x20/0xc0 [ 13.798547] ? __pfx_kthread+0x10/0x10 [ 13.798569] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.798591] ? calculate_sigpending+0x7b/0xa0 [ 13.798616] ? __pfx_kthread+0x10/0x10 [ 13.798638] ret_from_fork+0x116/0x1d0 [ 13.798657] ? __pfx_kthread+0x10/0x10 [ 13.798679] ret_from_fork_asm+0x1a/0x30 [ 13.798710] </TASK> [ 13.798721] [ 13.807101] Allocated by task 278: [ 13.807249] kasan_save_stack+0x45/0x70 [ 13.807443] kasan_save_track+0x18/0x40 [ 13.807581] kasan_save_alloc_info+0x3b/0x50 [ 13.807802] __kasan_kmalloc+0xb7/0xc0 [ 13.808002] __kmalloc_cache_noprof+0x189/0x420 [ 13.808180] kasan_bitops_generic+0x92/0x1c0 [ 13.808333] kunit_try_run_case+0x1a5/0x480 [ 13.808642] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.808912] kthread+0x337/0x6f0 [ 13.809098] ret_from_fork+0x116/0x1d0 [ 13.809235] ret_from_fork_asm+0x1a/0x30 [ 13.809377] [ 13.809448] The buggy address belongs to the object at ffff888100fbfb00 [ 13.809448] which belongs to the cache kmalloc-16 of size 16 [ 13.810205] The buggy address is located 8 bytes inside of [ 13.810205] allocated 9-byte region [ffff888100fbfb00, ffff888100fbfb09) [ 13.810697] [ 13.810770] The buggy address belongs to the physical page: [ 13.810954] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100fbf [ 13.811544] flags: 0x200000000000000(node=0|zone=2) [ 13.811798] page_type: f5(slab) [ 13.812008] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.812347] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.812582] page dumped because: kasan: bad access detected [ 13.812863] [ 13.812978] Memory state around the buggy address: [ 13.813403] ffff888100fbfa00: 00 04 fc fc 00 00 fc fc fa fb fc fc fa fb fc fc [ 13.813717] ffff888100fbfa80: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 13.814018] >ffff888100fbfb00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.814390] ^ [ 13.814560] ffff888100fbfb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.814866] ffff888100fbfc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.815193] ================================================================== [ 13.732137] ================================================================== [ 13.732472] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50 [ 13.732999] Write of size 8 at addr ffff888100fbfb08 by task kunit_try_catch/278 [ 13.733664] [ 13.733861] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.733904] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.733917] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.733947] Call Trace: [ 13.733965] <TASK> [ 13.733981] dump_stack_lvl+0x73/0xb0 [ 13.734010] print_report+0xd1/0x650 [ 13.734033] ? __virt_addr_valid+0x1db/0x2d0 [ 13.734077] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 13.734105] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.734130] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 13.734158] kasan_report+0x141/0x180 [ 13.734181] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 13.734213] kasan_check_range+0x10c/0x1c0 [ 13.734248] __kasan_check_write+0x18/0x20 [ 13.734269] kasan_bitops_modify.constprop.0+0x373/0xd50 [ 13.734296] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 13.734336] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.734362] ? trace_hardirqs_on+0x37/0xe0 [ 13.734385] ? kasan_bitops_generic+0x92/0x1c0 [ 13.734413] kasan_bitops_generic+0x116/0x1c0 [ 13.734438] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.734466] ? __pfx_read_tsc+0x10/0x10 [ 13.734488] ? ktime_get_ts64+0x86/0x230 [ 13.734512] kunit_try_run_case+0x1a5/0x480 [ 13.734538] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.734562] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.734588] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.734613] ? __kthread_parkme+0x82/0x180 [ 13.734634] ? preempt_count_sub+0x50/0x80 [ 13.734659] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.734685] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.734710] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.734735] kthread+0x337/0x6f0 [ 13.734756] ? trace_preempt_on+0x20/0xc0 [ 13.734778] ? __pfx_kthread+0x10/0x10 [ 13.734800] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.734822] ? calculate_sigpending+0x7b/0xa0 [ 13.734848] ? __pfx_kthread+0x10/0x10 [ 13.734871] ret_from_fork+0x116/0x1d0 [ 13.734890] ? __pfx_kthread+0x10/0x10 [ 13.734912] ret_from_fork_asm+0x1a/0x30 [ 13.734954] </TASK> [ 13.734966] [ 13.748087] Allocated by task 278: [ 13.748433] kasan_save_stack+0x45/0x70 [ 13.748820] kasan_save_track+0x18/0x40 [ 13.749213] kasan_save_alloc_info+0x3b/0x50 [ 13.749620] __kasan_kmalloc+0xb7/0xc0 [ 13.749991] __kmalloc_cache_noprof+0x189/0x420 [ 13.750429] kasan_bitops_generic+0x92/0x1c0 [ 13.750828] kunit_try_run_case+0x1a5/0x480 [ 13.751095] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.751418] kthread+0x337/0x6f0 [ 13.751543] ret_from_fork+0x116/0x1d0 [ 13.751675] ret_from_fork_asm+0x1a/0x30 [ 13.751815] [ 13.751886] The buggy address belongs to the object at ffff888100fbfb00 [ 13.751886] which belongs to the cache kmalloc-16 of size 16 [ 13.752396] The buggy address is located 8 bytes inside of [ 13.752396] allocated 9-byte region [ffff888100fbfb00, ffff888100fbfb09) [ 13.753316] [ 13.753394] The buggy address belongs to the physical page: [ 13.753575] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100fbf [ 13.753817] flags: 0x200000000000000(node=0|zone=2) [ 13.754003] page_type: f5(slab) [ 13.754203] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.754540] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.754770] page dumped because: kasan: bad access detected [ 13.755054] [ 13.755176] Memory state around the buggy address: [ 13.755401] ffff888100fbfa00: 00 04 fc fc 00 00 fc fc fa fb fc fc fa fb fc fc [ 13.755697] ffff888100fbfa80: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 13.755984] >ffff888100fbfb00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.756376] ^ [ 13.756549] ffff888100fbfb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.756814] ffff888100fbfc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.757179] ================================================================== [ 13.705230] ================================================================== [ 13.705998] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 13.706492] Write of size 8 at addr ffff888100fbfb08 by task kunit_try_catch/278 [ 13.706756] [ 13.706879] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.706924] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.706948] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.706970] Call Trace: [ 13.706985] <TASK> [ 13.707000] dump_stack_lvl+0x73/0xb0 [ 13.707029] print_report+0xd1/0x650 [ 13.707054] ? __virt_addr_valid+0x1db/0x2d0 [ 13.707077] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 13.707105] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.707137] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 13.707165] kasan_report+0x141/0x180 [ 13.707188] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 13.707220] kasan_check_range+0x10c/0x1c0 [ 13.707246] __kasan_check_write+0x18/0x20 [ 13.707267] kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 13.707295] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 13.707324] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.707351] ? trace_hardirqs_on+0x37/0xe0 [ 13.707374] ? kasan_bitops_generic+0x92/0x1c0 [ 13.707404] kasan_bitops_generic+0x116/0x1c0 [ 13.707429] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.707457] ? __pfx_read_tsc+0x10/0x10 [ 13.707478] ? ktime_get_ts64+0x86/0x230 [ 13.707504] kunit_try_run_case+0x1a5/0x480 [ 13.707531] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.707556] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.707581] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.707606] ? __kthread_parkme+0x82/0x180 [ 13.707628] ? preempt_count_sub+0x50/0x80 [ 13.707652] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.707678] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.707706] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.707733] kthread+0x337/0x6f0 [ 13.707753] ? trace_preempt_on+0x20/0xc0 [ 13.707776] ? __pfx_kthread+0x10/0x10 [ 13.707799] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.707822] ? calculate_sigpending+0x7b/0xa0 [ 13.707848] ? __pfx_kthread+0x10/0x10 [ 13.707871] ret_from_fork+0x116/0x1d0 [ 13.707890] ? __pfx_kthread+0x10/0x10 [ 13.707912] ret_from_fork_asm+0x1a/0x30 [ 13.707954] </TASK> [ 13.707965] [ 13.718879] Allocated by task 278: [ 13.719036] kasan_save_stack+0x45/0x70 [ 13.719843] kasan_save_track+0x18/0x40 [ 13.720469] kasan_save_alloc_info+0x3b/0x50 [ 13.721084] __kasan_kmalloc+0xb7/0xc0 [ 13.721585] __kmalloc_cache_noprof+0x189/0x420 [ 13.722212] kasan_bitops_generic+0x92/0x1c0 [ 13.722432] kunit_try_run_case+0x1a5/0x480 [ 13.722582] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.722760] kthread+0x337/0x6f0 [ 13.722880] ret_from_fork+0x116/0x1d0 [ 13.723220] ret_from_fork_asm+0x1a/0x30 [ 13.723593] [ 13.723751] The buggy address belongs to the object at ffff888100fbfb00 [ 13.723751] which belongs to the cache kmalloc-16 of size 16 [ 13.724840] The buggy address is located 8 bytes inside of [ 13.724840] allocated 9-byte region [ffff888100fbfb00, ffff888100fbfb09) [ 13.725891] [ 13.726083] The buggy address belongs to the physical page: [ 13.726386] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100fbf [ 13.726893] flags: 0x200000000000000(node=0|zone=2) [ 13.727116] page_type: f5(slab) [ 13.727444] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.728184] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.728817] page dumped because: kasan: bad access detected [ 13.729002] [ 13.729122] Memory state around the buggy address: [ 13.729564] ffff888100fbfa00: 00 04 fc fc 00 00 fc fc fa fb fc fc fa fb fc fc [ 13.730211] ffff888100fbfa80: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 13.730792] >ffff888100fbfb00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.731018] ^ [ 13.731151] ffff888100fbfb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.731369] ffff888100fbfc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.731582] ================================================================== [ 13.776702] ================================================================== [ 13.777365] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 13.777777] Write of size 8 at addr ffff888100fbfb08 by task kunit_try_catch/278 [ 13.778054] [ 13.778164] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.778204] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.778218] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.778239] Call Trace: [ 13.778255] <TASK> [ 13.778270] dump_stack_lvl+0x73/0xb0 [ 13.778301] print_report+0xd1/0x650 [ 13.778325] ? __virt_addr_valid+0x1db/0x2d0 [ 13.778349] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 13.778376] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.778401] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 13.778428] kasan_report+0x141/0x180 [ 13.778466] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 13.778509] kasan_check_range+0x10c/0x1c0 [ 13.778534] __kasan_check_write+0x18/0x20 [ 13.778567] kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 13.778595] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 13.778625] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.778651] ? trace_hardirqs_on+0x37/0xe0 [ 13.778674] ? kasan_bitops_generic+0x92/0x1c0 [ 13.778704] kasan_bitops_generic+0x116/0x1c0 [ 13.778729] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.778757] ? __pfx_read_tsc+0x10/0x10 [ 13.778779] ? ktime_get_ts64+0x86/0x230 [ 13.778803] kunit_try_run_case+0x1a5/0x480 [ 13.778827] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.778851] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.778876] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.778901] ? __kthread_parkme+0x82/0x180 [ 13.778922] ? preempt_count_sub+0x50/0x80 [ 13.778956] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.778981] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.779006] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.779031] kthread+0x337/0x6f0 [ 13.779052] ? trace_preempt_on+0x20/0xc0 [ 13.779074] ? __pfx_kthread+0x10/0x10 [ 13.779096] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.779124] ? calculate_sigpending+0x7b/0xa0 [ 13.779149] ? __pfx_kthread+0x10/0x10 [ 13.779170] ret_from_fork+0x116/0x1d0 [ 13.779190] ? __pfx_kthread+0x10/0x10 [ 13.779211] ret_from_fork_asm+0x1a/0x30 [ 13.779253] </TASK> [ 13.779264] [ 13.787668] Allocated by task 278: [ 13.787826] kasan_save_stack+0x45/0x70 [ 13.788080] kasan_save_track+0x18/0x40 [ 13.788273] kasan_save_alloc_info+0x3b/0x50 [ 13.788484] __kasan_kmalloc+0xb7/0xc0 [ 13.788688] __kmalloc_cache_noprof+0x189/0x420 [ 13.788907] kasan_bitops_generic+0x92/0x1c0 [ 13.789069] kunit_try_run_case+0x1a5/0x480 [ 13.789282] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.789571] kthread+0x337/0x6f0 [ 13.789716] ret_from_fork+0x116/0x1d0 [ 13.789902] ret_from_fork_asm+0x1a/0x30 [ 13.790096] [ 13.790204] The buggy address belongs to the object at ffff888100fbfb00 [ 13.790204] which belongs to the cache kmalloc-16 of size 16 [ 13.790627] The buggy address is located 8 bytes inside of [ 13.790627] allocated 9-byte region [ffff888100fbfb00, ffff888100fbfb09) [ 13.791209] [ 13.791316] The buggy address belongs to the physical page: [ 13.791530] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100fbf [ 13.791775] flags: 0x200000000000000(node=0|zone=2) [ 13.791950] page_type: f5(slab) [ 13.792073] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.792348] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.792689] page dumped because: kasan: bad access detected [ 13.792983] [ 13.793080] Memory state around the buggy address: [ 13.793304] ffff888100fbfa00: 00 04 fc fc 00 00 fc fc fa fb fc fc fa fb fc fc [ 13.793623] ffff888100fbfa80: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 13.793949] >ffff888100fbfb00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.794406] ^ [ 13.794533] ffff888100fbfb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.794748] ffff888100fbfc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.794985] ================================================================== [ 13.667322] ================================================================== [ 13.667952] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 13.668366] Write of size 8 at addr ffff888100fbfb08 by task kunit_try_catch/278 [ 13.668687] [ 13.668773] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.668814] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.668826] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.668847] Call Trace: [ 13.668862] <TASK> [ 13.668875] dump_stack_lvl+0x73/0xb0 [ 13.668903] print_report+0xd1/0x650 [ 13.668927] ? __virt_addr_valid+0x1db/0x2d0 [ 13.668962] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 13.668990] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.669015] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 13.669043] kasan_report+0x141/0x180 [ 13.669065] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 13.669098] kasan_check_range+0x10c/0x1c0 [ 13.669123] __kasan_check_write+0x18/0x20 [ 13.669144] kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 13.669172] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 13.669203] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.669229] ? trace_hardirqs_on+0x37/0xe0 [ 13.669254] ? kasan_bitops_generic+0x92/0x1c0 [ 13.669283] kasan_bitops_generic+0x116/0x1c0 [ 13.669308] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.669335] ? __pfx_read_tsc+0x10/0x10 [ 13.669357] ? ktime_get_ts64+0x86/0x230 [ 13.669382] kunit_try_run_case+0x1a5/0x480 [ 13.669408] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.669431] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.669456] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.669481] ? __kthread_parkme+0x82/0x180 [ 13.669506] ? preempt_count_sub+0x50/0x80 [ 13.669534] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.669561] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.669586] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.669613] kthread+0x337/0x6f0 [ 13.669633] ? trace_preempt_on+0x20/0xc0 [ 13.669656] ? __pfx_kthread+0x10/0x10 [ 13.669678] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.669701] ? calculate_sigpending+0x7b/0xa0 [ 13.669726] ? __pfx_kthread+0x10/0x10 [ 13.669749] ret_from_fork+0x116/0x1d0 [ 13.669769] ? __pfx_kthread+0x10/0x10 [ 13.669791] ret_from_fork_asm+0x1a/0x30 [ 13.669822] </TASK> [ 13.669833] [ 13.677796] Allocated by task 278: [ 13.677996] kasan_save_stack+0x45/0x70 [ 13.678221] kasan_save_track+0x18/0x40 [ 13.678396] kasan_save_alloc_info+0x3b/0x50 [ 13.678552] __kasan_kmalloc+0xb7/0xc0 [ 13.678729] __kmalloc_cache_noprof+0x189/0x420 [ 13.678966] kasan_bitops_generic+0x92/0x1c0 [ 13.679266] kunit_try_run_case+0x1a5/0x480 [ 13.679458] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.679689] kthread+0x337/0x6f0 [ 13.679835] ret_from_fork+0x116/0x1d0 [ 13.680014] ret_from_fork_asm+0x1a/0x30 [ 13.680219] [ 13.680317] The buggy address belongs to the object at ffff888100fbfb00 [ 13.680317] which belongs to the cache kmalloc-16 of size 16 [ 13.680779] The buggy address is located 8 bytes inside of [ 13.680779] allocated 9-byte region [ffff888100fbfb00, ffff888100fbfb09) [ 13.681297] [ 13.681399] The buggy address belongs to the physical page: [ 13.681586] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100fbf [ 13.681877] flags: 0x200000000000000(node=0|zone=2) [ 13.682052] page_type: f5(slab) [ 13.682172] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.682404] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.682630] page dumped because: kasan: bad access detected [ 13.682883] [ 13.682996] Memory state around the buggy address: [ 13.683327] ffff888100fbfa00: 00 04 fc fc 00 00 fc fc fa fb fc fc fa fb fc fc [ 13.683640] ffff888100fbfa80: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 13.683920] >ffff888100fbfb00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.684142] ^ [ 13.684266] ffff888100fbfb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.684479] ffff888100fbfc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.684689] ================================================================== [ 13.649065] ================================================================== [ 13.649530] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50 [ 13.649884] Write of size 8 at addr ffff888100fbfb08 by task kunit_try_catch/278 [ 13.650237] [ 13.650356] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.650401] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.650413] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.650435] Call Trace: [ 13.650448] <TASK> [ 13.650466] dump_stack_lvl+0x73/0xb0 [ 13.650494] print_report+0xd1/0x650 [ 13.650519] ? __virt_addr_valid+0x1db/0x2d0 [ 13.650545] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 13.650573] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.650597] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 13.650626] kasan_report+0x141/0x180 [ 13.650649] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 13.650682] kasan_check_range+0x10c/0x1c0 [ 13.650709] __kasan_check_write+0x18/0x20 [ 13.650730] kasan_bitops_modify.constprop.0+0x101/0xd50 [ 13.650758] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 13.650788] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.650814] ? trace_hardirqs_on+0x37/0xe0 [ 13.650838] ? kasan_bitops_generic+0x92/0x1c0 [ 13.650867] kasan_bitops_generic+0x116/0x1c0 [ 13.650892] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.650919] ? __pfx_read_tsc+0x10/0x10 [ 13.650951] ? ktime_get_ts64+0x86/0x230 [ 13.650978] kunit_try_run_case+0x1a5/0x480 [ 13.651003] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.651027] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.651052] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.651077] ? __kthread_parkme+0x82/0x180 [ 13.651100] ? preempt_count_sub+0x50/0x80 [ 13.651130] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.651156] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.651182] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.651208] kthread+0x337/0x6f0 [ 13.651228] ? trace_preempt_on+0x20/0xc0 [ 13.651253] ? __pfx_kthread+0x10/0x10 [ 13.651275] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.651297] ? calculate_sigpending+0x7b/0xa0 [ 13.651323] ? __pfx_kthread+0x10/0x10 [ 13.651345] ret_from_fork+0x116/0x1d0 [ 13.651366] ? __pfx_kthread+0x10/0x10 [ 13.651388] ret_from_fork_asm+0x1a/0x30 [ 13.651421] </TASK> [ 13.651434] [ 13.659168] Allocated by task 278: [ 13.659355] kasan_save_stack+0x45/0x70 [ 13.659518] kasan_save_track+0x18/0x40 [ 13.659655] kasan_save_alloc_info+0x3b/0x50 [ 13.659807] __kasan_kmalloc+0xb7/0xc0 [ 13.660011] __kmalloc_cache_noprof+0x189/0x420 [ 13.660458] kasan_bitops_generic+0x92/0x1c0 [ 13.660657] kunit_try_run_case+0x1a5/0x480 [ 13.660830] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.661016] kthread+0x337/0x6f0 [ 13.661139] ret_from_fork+0x116/0x1d0 [ 13.661298] ret_from_fork_asm+0x1a/0x30 [ 13.661493] [ 13.661588] The buggy address belongs to the object at ffff888100fbfb00 [ 13.661588] which belongs to the cache kmalloc-16 of size 16 [ 13.662178] The buggy address is located 8 bytes inside of [ 13.662178] allocated 9-byte region [ffff888100fbfb00, ffff888100fbfb09) [ 13.662618] [ 13.662715] The buggy address belongs to the physical page: [ 13.662928] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100fbf [ 13.663294] flags: 0x200000000000000(node=0|zone=2) [ 13.663461] page_type: f5(slab) [ 13.663585] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.663875] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.664224] page dumped because: kasan: bad access detected [ 13.664648] [ 13.664744] Memory state around the buggy address: [ 13.664983] ffff888100fbfa00: 00 04 fc fc 00 00 fc fc fa fb fc fc fa fb fc fc [ 13.665228] ffff888100fbfa80: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 13.665443] >ffff888100fbfb00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.665931] ^ [ 13.666120] ffff888100fbfb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.666435] ffff888100fbfc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.666707] ================================================================== [ 13.757840] ================================================================== [ 13.758519] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 13.758885] Write of size 8 at addr ffff888100fbfb08 by task kunit_try_catch/278 [ 13.759238] [ 13.759353] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.759408] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.759420] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.759441] Call Trace: [ 13.759469] <TASK> [ 13.759484] dump_stack_lvl+0x73/0xb0 [ 13.759514] print_report+0xd1/0x650 [ 13.759539] ? __virt_addr_valid+0x1db/0x2d0 [ 13.759563] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 13.759592] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.759616] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 13.759644] kasan_report+0x141/0x180 [ 13.759668] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 13.759712] kasan_check_range+0x10c/0x1c0 [ 13.759737] __kasan_check_write+0x18/0x20 [ 13.759758] kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 13.759796] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 13.759825] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.759852] ? trace_hardirqs_on+0x37/0xe0 [ 13.759875] ? kasan_bitops_generic+0x92/0x1c0 [ 13.759904] kasan_bitops_generic+0x116/0x1c0 [ 13.759929] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.759966] ? __pfx_read_tsc+0x10/0x10 [ 13.759987] ? ktime_get_ts64+0x86/0x230 [ 13.760012] kunit_try_run_case+0x1a5/0x480 [ 13.760038] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.760074] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.760100] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.760125] ? __kthread_parkme+0x82/0x180 [ 13.760156] ? preempt_count_sub+0x50/0x80 [ 13.760181] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.760206] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.760232] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.760266] kthread+0x337/0x6f0 [ 13.760288] ? trace_preempt_on+0x20/0xc0 [ 13.760310] ? __pfx_kthread+0x10/0x10 [ 13.760342] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.760364] ? calculate_sigpending+0x7b/0xa0 [ 13.760390] ? __pfx_kthread+0x10/0x10 [ 13.760412] ret_from_fork+0x116/0x1d0 [ 13.760432] ? __pfx_kthread+0x10/0x10 [ 13.760453] ret_from_fork_asm+0x1a/0x30 [ 13.760485] </TASK> [ 13.760496] [ 13.768317] Allocated by task 278: [ 13.768474] kasan_save_stack+0x45/0x70 [ 13.768702] kasan_save_track+0x18/0x40 [ 13.768907] kasan_save_alloc_info+0x3b/0x50 [ 13.769188] __kasan_kmalloc+0xb7/0xc0 [ 13.769382] __kmalloc_cache_noprof+0x189/0x420 [ 13.769623] kasan_bitops_generic+0x92/0x1c0 [ 13.769778] kunit_try_run_case+0x1a5/0x480 [ 13.769931] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.770306] kthread+0x337/0x6f0 [ 13.770453] ret_from_fork+0x116/0x1d0 [ 13.770649] ret_from_fork_asm+0x1a/0x30 [ 13.770841] [ 13.770946] The buggy address belongs to the object at ffff888100fbfb00 [ 13.770946] which belongs to the cache kmalloc-16 of size 16 [ 13.771492] The buggy address is located 8 bytes inside of [ 13.771492] allocated 9-byte region [ffff888100fbfb00, ffff888100fbfb09) [ 13.772001] [ 13.772096] The buggy address belongs to the physical page: [ 13.772346] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100fbf [ 13.772681] flags: 0x200000000000000(node=0|zone=2) [ 13.772917] page_type: f5(slab) [ 13.773081] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.773333] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.773722] page dumped because: kasan: bad access detected [ 13.773963] [ 13.774055] Memory state around the buggy address: [ 13.774240] ffff888100fbfa00: 00 04 fc fc 00 00 fc fc fa fb fc fc fa fb fc fc [ 13.774455] ffff888100fbfa80: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 13.774671] >ffff888100fbfb00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.774881] ^ [ 13.775015] ffff888100fbfb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.775617] ffff888100fbfc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.775933] ==================================================================