Date
July 2, 2025, 11:09 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 20.471315] ================================================================== [ 20.471385] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 20.472100] Write of size 8 at addr fff00000c3f3eca8 by task kunit_try_catch/261 [ 20.472270] [ 20.472390] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.472510] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.472618] Hardware name: linux,dummy-virt (DT) [ 20.472853] Call trace: [ 20.472949] show_stack+0x20/0x38 (C) [ 20.473056] dump_stack_lvl+0x8c/0xd0 [ 20.473229] print_report+0x118/0x608 [ 20.473333] kasan_report+0xdc/0x128 [ 20.473476] kasan_check_range+0x100/0x1a8 [ 20.473560] __kasan_check_write+0x20/0x30 [ 20.473623] kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 20.473676] kasan_bitops_generic+0x110/0x1c8 [ 20.473724] kunit_try_run_case+0x170/0x3f0 [ 20.474142] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.474303] kthread+0x328/0x630 [ 20.474422] ret_from_fork+0x10/0x20 [ 20.474703] [ 20.474857] Allocated by task 261: [ 20.474988] kasan_save_stack+0x3c/0x68 [ 20.475056] kasan_save_track+0x20/0x40 [ 20.475198] kasan_save_alloc_info+0x40/0x58 [ 20.475284] __kasan_kmalloc+0xd4/0xd8 [ 20.475513] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.475688] kasan_bitops_generic+0xa0/0x1c8 [ 20.475833] kunit_try_run_case+0x170/0x3f0 [ 20.475984] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.476113] kthread+0x328/0x630 [ 20.476199] ret_from_fork+0x10/0x20 [ 20.476433] [ 20.476703] The buggy address belongs to the object at fff00000c3f3eca0 [ 20.476703] which belongs to the cache kmalloc-16 of size 16 [ 20.476874] The buggy address is located 8 bytes inside of [ 20.476874] allocated 9-byte region [fff00000c3f3eca0, fff00000c3f3eca9) [ 20.476979] [ 20.477047] The buggy address belongs to the physical page: [ 20.477146] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f3e [ 20.477207] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.477439] page_type: f5(slab) [ 20.477676] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 20.477791] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 20.477936] page dumped because: kasan: bad access detected [ 20.477984] [ 20.478051] Memory state around the buggy address: [ 20.478522] fff00000c3f3eb80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 20.479302] fff00000c3f3ec00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 20.479382] >fff00000c3f3ec80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 20.479454] ^ [ 20.479556] fff00000c3f3ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.479630] fff00000c3f3ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.480010] ================================================================== [ 20.501875] ================================================================== [ 20.501995] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbc0 [ 20.502079] Read of size 8 at addr fff00000c3f3eca8 by task kunit_try_catch/261 [ 20.502214] [ 20.502250] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.502663] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.502723] Hardware name: linux,dummy-virt (DT) [ 20.502759] Call trace: [ 20.502867] show_stack+0x20/0x38 (C) [ 20.502928] dump_stack_lvl+0x8c/0xd0 [ 20.502994] print_report+0x118/0x608 [ 20.503099] kasan_report+0xdc/0x128 [ 20.503164] __asan_report_load8_noabort+0x20/0x30 [ 20.503231] kasan_bitops_modify.constprop.0+0xa80/0xbc0 [ 20.503436] kasan_bitops_generic+0x110/0x1c8 [ 20.503630] kunit_try_run_case+0x170/0x3f0 [ 20.503751] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.503871] kthread+0x328/0x630 [ 20.503947] ret_from_fork+0x10/0x20 [ 20.503999] [ 20.504026] Allocated by task 261: [ 20.504057] kasan_save_stack+0x3c/0x68 [ 20.504225] kasan_save_track+0x20/0x40 [ 20.504278] kasan_save_alloc_info+0x40/0x58 [ 20.504448] __kasan_kmalloc+0xd4/0xd8 [ 20.504501] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.504541] kasan_bitops_generic+0xa0/0x1c8 [ 20.505294] kunit_try_run_case+0x170/0x3f0 [ 20.505373] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.505443] kthread+0x328/0x630 [ 20.505501] ret_from_fork+0x10/0x20 [ 20.505550] [ 20.505598] The buggy address belongs to the object at fff00000c3f3eca0 [ 20.505598] which belongs to the cache kmalloc-16 of size 16 [ 20.505674] The buggy address is located 8 bytes inside of [ 20.505674] allocated 9-byte region [fff00000c3f3eca0, fff00000c3f3eca9) [ 20.505739] [ 20.505769] The buggy address belongs to the physical page: [ 20.505819] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f3e [ 20.505888] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.505940] page_type: f5(slab) [ 20.505989] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 20.506042] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 20.506244] page dumped because: kasan: bad access detected [ 20.506330] [ 20.506634] Memory state around the buggy address: [ 20.506686] fff00000c3f3eb80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 20.507081] fff00000c3f3ec00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 20.507149] >fff00000c3f3ec80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 20.507280] ^ [ 20.507346] fff00000c3f3ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.507475] fff00000c3f3ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.507541] ================================================================== [ 20.508466] ================================================================== [ 20.508549] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc0 [ 20.508830] Write of size 8 at addr fff00000c3f3eca8 by task kunit_try_catch/261 [ 20.508956] [ 20.509036] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.509286] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.509469] Hardware name: linux,dummy-virt (DT) [ 20.509684] Call trace: [ 20.509774] show_stack+0x20/0x38 (C) [ 20.509994] dump_stack_lvl+0x8c/0xd0 [ 20.510105] print_report+0x118/0x608 [ 20.510242] kasan_report+0xdc/0x128 [ 20.510377] kasan_check_range+0x100/0x1a8 [ 20.510512] __kasan_check_write+0x20/0x30 [ 20.510621] kasan_bitops_modify.constprop.0+0x2b4/0xbc0 [ 20.510703] kasan_bitops_generic+0x110/0x1c8 [ 20.510933] kunit_try_run_case+0x170/0x3f0 [ 20.511160] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.511559] kthread+0x328/0x630 [ 20.511704] ret_from_fork+0x10/0x20 [ 20.511804] [ 20.511852] Allocated by task 261: [ 20.511883] kasan_save_stack+0x3c/0x68 [ 20.512161] kasan_save_track+0x20/0x40 [ 20.512218] kasan_save_alloc_info+0x40/0x58 [ 20.512747] __kasan_kmalloc+0xd4/0xd8 [ 20.512802] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.512846] kasan_bitops_generic+0xa0/0x1c8 [ 20.513210] kunit_try_run_case+0x170/0x3f0 [ 20.513612] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.513677] kthread+0x328/0x630 [ 20.513715] ret_from_fork+0x10/0x20 [ 20.513753] [ 20.513801] The buggy address belongs to the object at fff00000c3f3eca0 [ 20.513801] which belongs to the cache kmalloc-16 of size 16 [ 20.513867] The buggy address is located 8 bytes inside of [ 20.513867] allocated 9-byte region [fff00000c3f3eca0, fff00000c3f3eca9) [ 20.513931] [ 20.513978] The buggy address belongs to the physical page: [ 20.514014] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f3e [ 20.514079] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.514148] page_type: f5(slab) [ 20.514195] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 20.514247] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 20.514295] page dumped because: kasan: bad access detected [ 20.514340] [ 20.514369] Memory state around the buggy address: [ 20.514409] fff00000c3f3eb80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 20.514465] fff00000c3f3ec00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 20.514510] >fff00000c3f3ec80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 20.514560] ^ [ 20.514607] fff00000c3f3ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.514663] fff00000c3f3ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.514705] ================================================================== [ 20.493966] ================================================================== [ 20.494101] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc0 [ 20.494203] Write of size 8 at addr fff00000c3f3eca8 by task kunit_try_catch/261 [ 20.494276] [ 20.494310] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.494529] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.494725] Hardware name: linux,dummy-virt (DT) [ 20.494774] Call trace: [ 20.494852] show_stack+0x20/0x38 (C) [ 20.494929] dump_stack_lvl+0x8c/0xd0 [ 20.494985] print_report+0x118/0x608 [ 20.495110] kasan_report+0xdc/0x128 [ 20.495162] kasan_check_range+0x100/0x1a8 [ 20.495214] __kasan_check_write+0x20/0x30 [ 20.495445] kasan_bitops_modify.constprop.0+0x1dc/0xbc0 [ 20.495703] kasan_bitops_generic+0x110/0x1c8 [ 20.495776] kunit_try_run_case+0x170/0x3f0 [ 20.495875] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.495961] kthread+0x328/0x630 [ 20.496068] ret_from_fork+0x10/0x20 [ 20.496124] [ 20.496145] Allocated by task 261: [ 20.496176] kasan_save_stack+0x3c/0x68 [ 20.496236] kasan_save_track+0x20/0x40 [ 20.496423] kasan_save_alloc_info+0x40/0x58 [ 20.496707] __kasan_kmalloc+0xd4/0xd8 [ 20.496879] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.496936] kasan_bitops_generic+0xa0/0x1c8 [ 20.496996] kunit_try_run_case+0x170/0x3f0 [ 20.497185] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.497239] kthread+0x328/0x630 [ 20.497408] ret_from_fork+0x10/0x20 [ 20.497635] [ 20.497810] The buggy address belongs to the object at fff00000c3f3eca0 [ 20.497810] which belongs to the cache kmalloc-16 of size 16 [ 20.498202] The buggy address is located 8 bytes inside of [ 20.498202] allocated 9-byte region [fff00000c3f3eca0, fff00000c3f3eca9) [ 20.498346] [ 20.498425] The buggy address belongs to the physical page: [ 20.498503] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f3e [ 20.498672] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.498726] page_type: f5(slab) [ 20.498812] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 20.499069] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 20.499146] page dumped because: kasan: bad access detected [ 20.499447] [ 20.499494] Memory state around the buggy address: [ 20.499569] fff00000c3f3eb80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 20.499973] fff00000c3f3ec00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 20.500099] >fff00000c3f3ec80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 20.500226] ^ [ 20.500323] fff00000c3f3ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.500475] fff00000c3f3ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.500530] ================================================================== [ 20.515527] ================================================================== [ 20.515597] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc0 [ 20.516523] Write of size 8 at addr fff00000c3f3eca8 by task kunit_try_catch/261 [ 20.516766] [ 20.516862] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.516956] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.516987] Hardware name: linux,dummy-virt (DT) [ 20.517391] Call trace: [ 20.517446] show_stack+0x20/0x38 (C) [ 20.517532] dump_stack_lvl+0x8c/0xd0 [ 20.517870] print_report+0x118/0x608 [ 20.518196] kasan_report+0xdc/0x128 [ 20.518357] kasan_check_range+0x100/0x1a8 [ 20.518598] __kasan_check_write+0x20/0x30 [ 20.518827] kasan_bitops_modify.constprop.0+0x320/0xbc0 [ 20.518932] kasan_bitops_generic+0x110/0x1c8 [ 20.518995] kunit_try_run_case+0x170/0x3f0 [ 20.519264] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.519455] kthread+0x328/0x630 [ 20.519509] ret_from_fork+0x10/0x20 [ 20.519931] [ 20.520036] Allocated by task 261: [ 20.520081] kasan_save_stack+0x3c/0x68 [ 20.520313] kasan_save_track+0x20/0x40 [ 20.520704] kasan_save_alloc_info+0x40/0x58 [ 20.521057] __kasan_kmalloc+0xd4/0xd8 [ 20.521143] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.521214] kasan_bitops_generic+0xa0/0x1c8 [ 20.521254] kunit_try_run_case+0x170/0x3f0 [ 20.521295] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.521743] kthread+0x328/0x630 [ 20.521914] ret_from_fork+0x10/0x20 [ 20.521987] [ 20.522012] The buggy address belongs to the object at fff00000c3f3eca0 [ 20.522012] which belongs to the cache kmalloc-16 of size 16 [ 20.522311] The buggy address is located 8 bytes inside of [ 20.522311] allocated 9-byte region [fff00000c3f3eca0, fff00000c3f3eca9) [ 20.522601] [ 20.523024] The buggy address belongs to the physical page: [ 20.523104] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f3e [ 20.523430] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.523755] page_type: f5(slab) [ 20.523845] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 20.523959] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 20.524027] page dumped because: kasan: bad access detected [ 20.524210] [ 20.524311] Memory state around the buggy address: [ 20.524473] fff00000c3f3eb80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 20.524593] fff00000c3f3ec00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 20.524842] >fff00000c3f3ec80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 20.525040] ^ [ 20.525142] fff00000c3f3ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.525258] fff00000c3f3ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.525338] ================================================================== [ 20.542502] ================================================================== [ 20.542554] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc0 [ 20.542624] Write of size 8 at addr fff00000c3f3eca8 by task kunit_try_catch/261 [ 20.542676] [ 20.542709] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.542794] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.542822] Hardware name: linux,dummy-virt (DT) [ 20.543169] Call trace: [ 20.543212] show_stack+0x20/0x38 (C) [ 20.543268] dump_stack_lvl+0x8c/0xd0 [ 20.543318] print_report+0x118/0x608 [ 20.543368] kasan_report+0xdc/0x128 [ 20.543415] kasan_check_range+0x100/0x1a8 [ 20.543467] __kasan_check_write+0x20/0x30 [ 20.543514] kasan_bitops_modify.constprop.0+0x3b0/0xbc0 [ 20.543567] kasan_bitops_generic+0x110/0x1c8 [ 20.543630] kunit_try_run_case+0x170/0x3f0 [ 20.543680] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.543749] kthread+0x328/0x630 [ 20.543795] ret_from_fork+0x10/0x20 [ 20.543847] [ 20.543878] Allocated by task 261: [ 20.543909] kasan_save_stack+0x3c/0x68 [ 20.543961] kasan_save_track+0x20/0x40 [ 20.544003] kasan_save_alloc_info+0x40/0x58 [ 20.544047] __kasan_kmalloc+0xd4/0xd8 [ 20.544092] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.544134] kasan_bitops_generic+0xa0/0x1c8 [ 20.544174] kunit_try_run_case+0x170/0x3f0 [ 20.544213] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.544259] kthread+0x328/0x630 [ 20.544301] ret_from_fork+0x10/0x20 [ 20.544340] [ 20.544366] The buggy address belongs to the object at fff00000c3f3eca0 [ 20.544366] which belongs to the cache kmalloc-16 of size 16 [ 20.544426] The buggy address is located 8 bytes inside of [ 20.544426] allocated 9-byte region [fff00000c3f3eca0, fff00000c3f3eca9) [ 20.544490] [ 20.544520] The buggy address belongs to the physical page: [ 20.544554] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f3e [ 20.545352] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.545920] page_type: f5(slab) [ 20.546215] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 20.546540] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 20.546640] page dumped because: kasan: bad access detected [ 20.546773] [ 20.546826] Memory state around the buggy address: [ 20.546961] fff00000c3f3eb80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 20.547046] fff00000c3f3ec00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 20.547129] >fff00000c3f3ec80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 20.547205] ^ [ 20.547270] fff00000c3f3ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.547688] fff00000c3f3ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.547878] ================================================================== [ 20.534196] ================================================================== [ 20.534322] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc0 [ 20.534398] Write of size 8 at addr fff00000c3f3eca8 by task kunit_try_catch/261 [ 20.534451] [ 20.534490] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.534717] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.534800] Hardware name: linux,dummy-virt (DT) [ 20.534966] Call trace: [ 20.535000] show_stack+0x20/0x38 (C) [ 20.535055] dump_stack_lvl+0x8c/0xd0 [ 20.535156] print_report+0x118/0x608 [ 20.535208] kasan_report+0xdc/0x128 [ 20.535285] kasan_check_range+0x100/0x1a8 [ 20.535480] __kasan_check_write+0x20/0x30 [ 20.535736] kasan_bitops_modify.constprop.0+0x344/0xbc0 [ 20.535866] kasan_bitops_generic+0x110/0x1c8 [ 20.535944] kunit_try_run_case+0x170/0x3f0 [ 20.536259] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.536338] kthread+0x328/0x630 [ 20.536385] ret_from_fork+0x10/0x20 [ 20.536436] [ 20.536456] Allocated by task 261: [ 20.536604] kasan_save_stack+0x3c/0x68 [ 20.536677] kasan_save_track+0x20/0x40 [ 20.536731] kasan_save_alloc_info+0x40/0x58 [ 20.537164] __kasan_kmalloc+0xd4/0xd8 [ 20.537313] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.537420] kasan_bitops_generic+0xa0/0x1c8 [ 20.537583] kunit_try_run_case+0x170/0x3f0 [ 20.537670] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.537879] kthread+0x328/0x630 [ 20.538160] ret_from_fork+0x10/0x20 [ 20.538280] [ 20.538361] The buggy address belongs to the object at fff00000c3f3eca0 [ 20.538361] which belongs to the cache kmalloc-16 of size 16 [ 20.538543] The buggy address is located 8 bytes inside of [ 20.538543] allocated 9-byte region [fff00000c3f3eca0, fff00000c3f3eca9) [ 20.538942] [ 20.539104] The buggy address belongs to the physical page: [ 20.539281] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f3e [ 20.539863] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.540206] page_type: f5(slab) [ 20.540263] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 20.540347] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 20.540626] page dumped because: kasan: bad access detected [ 20.540670] [ 20.540707] Memory state around the buggy address: [ 20.540814] fff00000c3f3eb80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 20.541012] fff00000c3f3ec00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 20.541066] >fff00000c3f3ec80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 20.541154] ^ [ 20.541466] fff00000c3f3ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.541658] fff00000c3f3ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.541733] ================================================================== [ 20.483546] ================================================================== [ 20.484114] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 20.484455] Read of size 8 at addr fff00000c3f3eca8 by task kunit_try_catch/261 [ 20.484626] [ 20.484681] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.484800] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.484831] Hardware name: linux,dummy-virt (DT) [ 20.485027] Call trace: [ 20.485236] show_stack+0x20/0x38 (C) [ 20.485299] dump_stack_lvl+0x8c/0xd0 [ 20.485523] print_report+0x118/0x608 [ 20.485888] kasan_report+0xdc/0x128 [ 20.486094] __asan_report_load8_noabort+0x20/0x30 [ 20.486288] kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 20.486606] kasan_bitops_generic+0x110/0x1c8 [ 20.486859] kunit_try_run_case+0x170/0x3f0 [ 20.487222] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.487362] kthread+0x328/0x630 [ 20.487458] ret_from_fork+0x10/0x20 [ 20.487529] [ 20.487681] Allocated by task 261: [ 20.487879] kasan_save_stack+0x3c/0x68 [ 20.488071] kasan_save_track+0x20/0x40 [ 20.488180] kasan_save_alloc_info+0x40/0x58 [ 20.488550] __kasan_kmalloc+0xd4/0xd8 [ 20.488654] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.488699] kasan_bitops_generic+0xa0/0x1c8 [ 20.489139] kunit_try_run_case+0x170/0x3f0 [ 20.489198] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.489252] kthread+0x328/0x630 [ 20.489512] ret_from_fork+0x10/0x20 [ 20.489681] [ 20.489931] The buggy address belongs to the object at fff00000c3f3eca0 [ 20.489931] which belongs to the cache kmalloc-16 of size 16 [ 20.490121] The buggy address is located 8 bytes inside of [ 20.490121] allocated 9-byte region [fff00000c3f3eca0, fff00000c3f3eca9) [ 20.490226] [ 20.490350] The buggy address belongs to the physical page: [ 20.490403] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f3e [ 20.490601] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.490835] page_type: f5(slab) [ 20.490894] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 20.490992] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 20.491037] page dumped because: kasan: bad access detected [ 20.491094] [ 20.491124] Memory state around the buggy address: [ 20.491173] fff00000c3f3eb80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 20.491222] fff00000c3f3ec00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 20.491268] >fff00000c3f3ec80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 20.491311] ^ [ 20.491346] fff00000c3f3ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.491399] fff00000c3f3ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.491441] ================================================================== [ 20.526420] ================================================================== [ 20.526473] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaec/0xbc0 [ 20.526781] Read of size 8 at addr fff00000c3f3eca8 by task kunit_try_catch/261 [ 20.527054] [ 20.527101] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 20.527197] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.527497] Hardware name: linux,dummy-virt (DT) [ 20.527586] Call trace: [ 20.527615] show_stack+0x20/0x38 (C) [ 20.527718] dump_stack_lvl+0x8c/0xd0 [ 20.527837] print_report+0x118/0x608 [ 20.527903] kasan_report+0xdc/0x128 [ 20.528040] __asan_report_load8_noabort+0x20/0x30 [ 20.528114] kasan_bitops_modify.constprop.0+0xaec/0xbc0 [ 20.528305] kasan_bitops_generic+0x110/0x1c8 [ 20.528565] kunit_try_run_case+0x170/0x3f0 [ 20.528645] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.528752] kthread+0x328/0x630 [ 20.528839] ret_from_fork+0x10/0x20 [ 20.528993] [ 20.529122] Allocated by task 261: [ 20.529372] kasan_save_stack+0x3c/0x68 [ 20.529545] kasan_save_track+0x20/0x40 [ 20.529647] kasan_save_alloc_info+0x40/0x58 [ 20.529870] __kasan_kmalloc+0xd4/0xd8 [ 20.530176] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.530313] kasan_bitops_generic+0xa0/0x1c8 [ 20.530410] kunit_try_run_case+0x170/0x3f0 [ 20.530543] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.530934] kthread+0x328/0x630 [ 20.531066] ret_from_fork+0x10/0x20 [ 20.531238] [ 20.531318] The buggy address belongs to the object at fff00000c3f3eca0 [ 20.531318] which belongs to the cache kmalloc-16 of size 16 [ 20.531415] The buggy address is located 8 bytes inside of [ 20.531415] allocated 9-byte region [fff00000c3f3eca0, fff00000c3f3eca9) [ 20.531492] [ 20.531513] The buggy address belongs to the physical page: [ 20.531892] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f3e [ 20.532063] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.532161] page_type: f5(slab) [ 20.532254] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 20.532329] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 20.532380] page dumped because: kasan: bad access detected [ 20.532423] [ 20.532453] Memory state around the buggy address: [ 20.532487] fff00000c3f3eb80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 20.532533] fff00000c3f3ec00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 20.532607] >fff00000c3f3ec80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 20.532656] ^ [ 20.532692] fff00000c3f3ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.532745] fff00000c3f3ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.532785] ==================================================================
[ 13.515062] ================================================================== [ 13.515400] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 13.516005] Write of size 8 at addr ffff8881027960e8 by task kunit_try_catch/280 [ 13.516347] [ 13.516501] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.516546] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.516557] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.516589] Call Trace: [ 13.516607] <TASK> [ 13.516625] dump_stack_lvl+0x73/0xb0 [ 13.516655] print_report+0xd1/0x650 [ 13.516677] ? __virt_addr_valid+0x1db/0x2d0 [ 13.516700] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 13.516725] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.516746] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 13.516770] kasan_report+0x141/0x180 [ 13.516791] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 13.516888] kasan_check_range+0x10c/0x1c0 [ 13.516912] __kasan_check_write+0x18/0x20 [ 13.516942] kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 13.516968] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 13.516993] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.517018] ? trace_hardirqs_on+0x37/0xe0 [ 13.517040] ? kasan_bitops_generic+0x92/0x1c0 [ 13.517065] kasan_bitops_generic+0x116/0x1c0 [ 13.517088] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.517112] ? __pfx_read_tsc+0x10/0x10 [ 13.517162] ? ktime_get_ts64+0x86/0x230 [ 13.517186] kunit_try_run_case+0x1a5/0x480 [ 13.517237] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.517259] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.517282] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.517303] ? __kthread_parkme+0x82/0x180 [ 13.517323] ? preempt_count_sub+0x50/0x80 [ 13.517346] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.517378] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.517400] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.517427] kthread+0x337/0x6f0 [ 13.517446] ? trace_preempt_on+0x20/0xc0 [ 13.517467] ? __pfx_kthread+0x10/0x10 [ 13.517487] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.517507] ? calculate_sigpending+0x7b/0xa0 [ 13.517530] ? __pfx_kthread+0x10/0x10 [ 13.517551] ret_from_fork+0x116/0x1d0 [ 13.517609] ? __pfx_kthread+0x10/0x10 [ 13.517631] ret_from_fork_asm+0x1a/0x30 [ 13.517661] </TASK> [ 13.517672] [ 13.528231] Allocated by task 280: [ 13.528469] kasan_save_stack+0x45/0x70 [ 13.528934] kasan_save_track+0x18/0x40 [ 13.529199] kasan_save_alloc_info+0x3b/0x50 [ 13.529442] __kasan_kmalloc+0xb7/0xc0 [ 13.529574] __kmalloc_cache_noprof+0x189/0x420 [ 13.529728] kasan_bitops_generic+0x92/0x1c0 [ 13.530156] kunit_try_run_case+0x1a5/0x480 [ 13.530626] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.530939] kthread+0x337/0x6f0 [ 13.531087] ret_from_fork+0x116/0x1d0 [ 13.531244] ret_from_fork_asm+0x1a/0x30 [ 13.531396] [ 13.531490] The buggy address belongs to the object at ffff8881027960e0 [ 13.531490] which belongs to the cache kmalloc-16 of size 16 [ 13.532374] The buggy address is located 8 bytes inside of [ 13.532374] allocated 9-byte region [ffff8881027960e0, ffff8881027960e9) [ 13.533001] [ 13.533352] The buggy address belongs to the physical page: [ 13.533762] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102796 [ 13.534216] flags: 0x200000000000000(node=0|zone=2) [ 13.534420] page_type: f5(slab) [ 13.534651] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.535054] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.535427] page dumped because: kasan: bad access detected [ 13.535816] [ 13.535965] Memory state around the buggy address: [ 13.536258] ffff888102795f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.536591] ffff888102796000: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.537272] >ffff888102796080: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 13.537714] ^ [ 13.538012] ffff888102796100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.538347] ffff888102796180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.538751] ================================================================== [ 13.492177] ================================================================== [ 13.492556] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 13.493082] Write of size 8 at addr ffff8881027960e8 by task kunit_try_catch/280 [ 13.493458] [ 13.493612] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.493765] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.493777] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.493809] Call Trace: [ 13.493821] <TASK> [ 13.493839] dump_stack_lvl+0x73/0xb0 [ 13.493869] print_report+0xd1/0x650 [ 13.493892] ? __virt_addr_valid+0x1db/0x2d0 [ 13.493916] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 13.493940] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.493962] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 13.493986] kasan_report+0x141/0x180 [ 13.494009] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 13.494069] kasan_check_range+0x10c/0x1c0 [ 13.494094] __kasan_check_write+0x18/0x20 [ 13.494129] kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 13.494166] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 13.494191] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.494215] ? trace_hardirqs_on+0x37/0xe0 [ 13.494238] ? kasan_bitops_generic+0x92/0x1c0 [ 13.494265] kasan_bitops_generic+0x116/0x1c0 [ 13.494289] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.494313] ? __pfx_read_tsc+0x10/0x10 [ 13.494334] ? ktime_get_ts64+0x86/0x230 [ 13.494369] kunit_try_run_case+0x1a5/0x480 [ 13.494394] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.494416] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.494439] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.494461] ? __kthread_parkme+0x82/0x180 [ 13.494481] ? preempt_count_sub+0x50/0x80 [ 13.494506] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.494528] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.494550] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.494618] kthread+0x337/0x6f0 [ 13.494640] ? trace_preempt_on+0x20/0xc0 [ 13.494661] ? __pfx_kthread+0x10/0x10 [ 13.494681] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.494701] ? calculate_sigpending+0x7b/0xa0 [ 13.494725] ? __pfx_kthread+0x10/0x10 [ 13.494746] ret_from_fork+0x116/0x1d0 [ 13.494764] ? __pfx_kthread+0x10/0x10 [ 13.494783] ret_from_fork_asm+0x1a/0x30 [ 13.494814] </TASK> [ 13.494824] [ 13.504797] Allocated by task 280: [ 13.505054] kasan_save_stack+0x45/0x70 [ 13.505257] kasan_save_track+0x18/0x40 [ 13.505472] kasan_save_alloc_info+0x3b/0x50 [ 13.505779] __kasan_kmalloc+0xb7/0xc0 [ 13.505988] __kmalloc_cache_noprof+0x189/0x420 [ 13.506417] kasan_bitops_generic+0x92/0x1c0 [ 13.506707] kunit_try_run_case+0x1a5/0x480 [ 13.506948] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.507227] kthread+0x337/0x6f0 [ 13.507454] ret_from_fork+0x116/0x1d0 [ 13.507643] ret_from_fork_asm+0x1a/0x30 [ 13.507844] [ 13.508211] The buggy address belongs to the object at ffff8881027960e0 [ 13.508211] which belongs to the cache kmalloc-16 of size 16 [ 13.508759] The buggy address is located 8 bytes inside of [ 13.508759] allocated 9-byte region [ffff8881027960e0, ffff8881027960e9) [ 13.509334] [ 13.509476] The buggy address belongs to the physical page: [ 13.509788] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102796 [ 13.510197] flags: 0x200000000000000(node=0|zone=2) [ 13.510457] page_type: f5(slab) [ 13.510715] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.511131] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.511412] page dumped because: kasan: bad access detected [ 13.511613] [ 13.511784] Memory state around the buggy address: [ 13.512013] ffff888102795f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.512327] ffff888102796000: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.512843] >ffff888102796080: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 13.513384] ^ [ 13.513688] ffff888102796100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.514045] ffff888102796180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.514406] ================================================================== [ 13.467271] ================================================================== [ 13.467976] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50 [ 13.468341] Write of size 8 at addr ffff8881027960e8 by task kunit_try_catch/280 [ 13.468613] [ 13.468841] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.468890] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.468902] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.468924] Call Trace: [ 13.468936] <TASK> [ 13.468954] dump_stack_lvl+0x73/0xb0 [ 13.468984] print_report+0xd1/0x650 [ 13.469036] ? __virt_addr_valid+0x1db/0x2d0 [ 13.469058] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 13.469083] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.469121] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 13.469145] kasan_report+0x141/0x180 [ 13.469166] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 13.469195] kasan_check_range+0x10c/0x1c0 [ 13.469218] __kasan_check_write+0x18/0x20 [ 13.469236] kasan_bitops_modify.constprop.0+0x101/0xd50 [ 13.469261] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 13.469286] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.469310] ? trace_hardirqs_on+0x37/0xe0 [ 13.469334] ? kasan_bitops_generic+0x92/0x1c0 [ 13.469372] kasan_bitops_generic+0x116/0x1c0 [ 13.469395] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.469418] ? __pfx_read_tsc+0x10/0x10 [ 13.469440] ? ktime_get_ts64+0x86/0x230 [ 13.469482] kunit_try_run_case+0x1a5/0x480 [ 13.469508] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.469529] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.469552] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.469573] ? __kthread_parkme+0x82/0x180 [ 13.469594] ? preempt_count_sub+0x50/0x80 [ 13.469617] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.469656] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.469677] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.469740] kthread+0x337/0x6f0 [ 13.469760] ? trace_preempt_on+0x20/0xc0 [ 13.469781] ? __pfx_kthread+0x10/0x10 [ 13.469801] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.469821] ? calculate_sigpending+0x7b/0xa0 [ 13.469843] ? __pfx_kthread+0x10/0x10 [ 13.469863] ret_from_fork+0x116/0x1d0 [ 13.469880] ? __pfx_kthread+0x10/0x10 [ 13.469901] ret_from_fork_asm+0x1a/0x30 [ 13.469930] </TASK> [ 13.469942] [ 13.480895] Allocated by task 280: [ 13.481189] kasan_save_stack+0x45/0x70 [ 13.481468] kasan_save_track+0x18/0x40 [ 13.481684] kasan_save_alloc_info+0x3b/0x50 [ 13.481975] __kasan_kmalloc+0xb7/0xc0 [ 13.482205] __kmalloc_cache_noprof+0x189/0x420 [ 13.482418] kasan_bitops_generic+0x92/0x1c0 [ 13.482885] kunit_try_run_case+0x1a5/0x480 [ 13.483161] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.483479] kthread+0x337/0x6f0 [ 13.483689] ret_from_fork+0x116/0x1d0 [ 13.483923] ret_from_fork_asm+0x1a/0x30 [ 13.484131] [ 13.484256] The buggy address belongs to the object at ffff8881027960e0 [ 13.484256] which belongs to the cache kmalloc-16 of size 16 [ 13.484909] The buggy address is located 8 bytes inside of [ 13.484909] allocated 9-byte region [ffff8881027960e0, ffff8881027960e9) [ 13.485464] [ 13.485574] The buggy address belongs to the physical page: [ 13.485963] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102796 [ 13.486339] flags: 0x200000000000000(node=0|zone=2) [ 13.486591] page_type: f5(slab) [ 13.486877] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.487432] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.487694] page dumped because: kasan: bad access detected [ 13.488084] [ 13.488267] Memory state around the buggy address: [ 13.488750] ffff888102795f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.489117] ffff888102796000: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.489446] >ffff888102796080: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 13.489888] ^ [ 13.490190] ffff888102796100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.490522] ffff888102796180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.491025] ================================================================== [ 13.604791] ================================================================== [ 13.605725] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 13.606059] Write of size 8 at addr ffff8881027960e8 by task kunit_try_catch/280 [ 13.606381] [ 13.606491] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.606545] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.606556] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.606576] Call Trace: [ 13.606637] <TASK> [ 13.606654] dump_stack_lvl+0x73/0xb0 [ 13.606683] print_report+0xd1/0x650 [ 13.606716] ? __virt_addr_valid+0x1db/0x2d0 [ 13.606738] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 13.606763] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.606795] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 13.606823] kasan_report+0x141/0x180 [ 13.606845] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 13.606874] kasan_check_range+0x10c/0x1c0 [ 13.606905] __kasan_check_write+0x18/0x20 [ 13.606925] kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 13.606949] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 13.606985] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.607010] ? trace_hardirqs_on+0x37/0xe0 [ 13.607030] ? kasan_bitops_generic+0x92/0x1c0 [ 13.607057] kasan_bitops_generic+0x116/0x1c0 [ 13.607079] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.607112] ? __pfx_read_tsc+0x10/0x10 [ 13.607132] ? ktime_get_ts64+0x86/0x230 [ 13.607155] kunit_try_run_case+0x1a5/0x480 [ 13.607188] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.607210] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.607232] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.607253] ? __kthread_parkme+0x82/0x180 [ 13.607274] ? preempt_count_sub+0x50/0x80 [ 13.607296] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.607319] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.607341] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.607380] kthread+0x337/0x6f0 [ 13.607398] ? trace_preempt_on+0x20/0xc0 [ 13.607419] ? __pfx_kthread+0x10/0x10 [ 13.607449] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.607469] ? calculate_sigpending+0x7b/0xa0 [ 13.607491] ? __pfx_kthread+0x10/0x10 [ 13.607512] ret_from_fork+0x116/0x1d0 [ 13.607530] ? __pfx_kthread+0x10/0x10 [ 13.607549] ret_from_fork_asm+0x1a/0x30 [ 13.607613] </TASK> [ 13.607624] [ 13.616562] Allocated by task 280: [ 13.616777] kasan_save_stack+0x45/0x70 [ 13.616979] kasan_save_track+0x18/0x40 [ 13.617341] kasan_save_alloc_info+0x3b/0x50 [ 13.617518] __kasan_kmalloc+0xb7/0xc0 [ 13.617654] __kmalloc_cache_noprof+0x189/0x420 [ 13.617809] kasan_bitops_generic+0x92/0x1c0 [ 13.617982] kunit_try_run_case+0x1a5/0x480 [ 13.618184] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.618517] kthread+0x337/0x6f0 [ 13.618715] ret_from_fork+0x116/0x1d0 [ 13.618955] ret_from_fork_asm+0x1a/0x30 [ 13.619099] [ 13.619170] The buggy address belongs to the object at ffff8881027960e0 [ 13.619170] which belongs to the cache kmalloc-16 of size 16 [ 13.619793] The buggy address is located 8 bytes inside of [ 13.619793] allocated 9-byte region [ffff8881027960e0, ffff8881027960e9) [ 13.620348] [ 13.620437] The buggy address belongs to the physical page: [ 13.620807] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102796 [ 13.621155] flags: 0x200000000000000(node=0|zone=2) [ 13.621386] page_type: f5(slab) [ 13.621549] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.622103] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.622403] page dumped because: kasan: bad access detected [ 13.622575] [ 13.622646] Memory state around the buggy address: [ 13.622833] ffff888102795f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.623232] ffff888102796000: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.623721] >ffff888102796080: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 13.624198] ^ [ 13.624411] ffff888102796100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.624964] ffff888102796180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.625284] ================================================================== [ 13.562506] ================================================================== [ 13.562744] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50 [ 13.563286] Write of size 8 at addr ffff8881027960e8 by task kunit_try_catch/280 [ 13.563786] [ 13.563927] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.564009] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.564021] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.564064] Call Trace: [ 13.564083] <TASK> [ 13.564101] dump_stack_lvl+0x73/0xb0 [ 13.564131] print_report+0xd1/0x650 [ 13.564155] ? __virt_addr_valid+0x1db/0x2d0 [ 13.564178] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 13.564204] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.564226] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 13.564250] kasan_report+0x141/0x180 [ 13.564272] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 13.564301] kasan_check_range+0x10c/0x1c0 [ 13.564324] __kasan_check_write+0x18/0x20 [ 13.564342] kasan_bitops_modify.constprop.0+0x373/0xd50 [ 13.564409] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 13.564435] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.564471] ? trace_hardirqs_on+0x37/0xe0 [ 13.564494] ? kasan_bitops_generic+0x92/0x1c0 [ 13.564519] kasan_bitops_generic+0x116/0x1c0 [ 13.564542] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.564615] ? __pfx_read_tsc+0x10/0x10 [ 13.564639] ? ktime_get_ts64+0x86/0x230 [ 13.564663] kunit_try_run_case+0x1a5/0x480 [ 13.564687] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.564709] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.564732] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.564755] ? __kthread_parkme+0x82/0x180 [ 13.564775] ? preempt_count_sub+0x50/0x80 [ 13.564799] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.564822] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.564844] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.564866] kthread+0x337/0x6f0 [ 13.564884] ? trace_preempt_on+0x20/0xc0 [ 13.564905] ? __pfx_kthread+0x10/0x10 [ 13.564925] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.564946] ? calculate_sigpending+0x7b/0xa0 [ 13.564969] ? __pfx_kthread+0x10/0x10 [ 13.564990] ret_from_fork+0x116/0x1d0 [ 13.565007] ? __pfx_kthread+0x10/0x10 [ 13.565028] ret_from_fork_asm+0x1a/0x30 [ 13.565058] </TASK> [ 13.565069] [ 13.574425] Allocated by task 280: [ 13.574571] kasan_save_stack+0x45/0x70 [ 13.574815] kasan_save_track+0x18/0x40 [ 13.575047] kasan_save_alloc_info+0x3b/0x50 [ 13.575286] __kasan_kmalloc+0xb7/0xc0 [ 13.575495] __kmalloc_cache_noprof+0x189/0x420 [ 13.575746] kasan_bitops_generic+0x92/0x1c0 [ 13.575900] kunit_try_run_case+0x1a5/0x480 [ 13.576188] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.576474] kthread+0x337/0x6f0 [ 13.576665] ret_from_fork+0x116/0x1d0 [ 13.576973] ret_from_fork_asm+0x1a/0x30 [ 13.577124] [ 13.577234] The buggy address belongs to the object at ffff8881027960e0 [ 13.577234] which belongs to the cache kmalloc-16 of size 16 [ 13.577759] The buggy address is located 8 bytes inside of [ 13.577759] allocated 9-byte region [ffff8881027960e0, ffff8881027960e9) [ 13.578625] [ 13.578748] The buggy address belongs to the physical page: [ 13.578998] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102796 [ 13.579343] flags: 0x200000000000000(node=0|zone=2) [ 13.579653] page_type: f5(slab) [ 13.579849] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.580133] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.580484] page dumped because: kasan: bad access detected [ 13.580833] [ 13.580930] Memory state around the buggy address: [ 13.581115] ffff888102795f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.581332] ffff888102796000: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.581575] >ffff888102796080: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 13.582123] ^ [ 13.582555] ffff888102796100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.583090] ffff888102796180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.583439] ================================================================== [ 13.583821] ================================================================== [ 13.584087] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 13.584502] Write of size 8 at addr ffff8881027960e8 by task kunit_try_catch/280 [ 13.584885] [ 13.585060] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.585126] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.585138] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.585159] Call Trace: [ 13.585185] <TASK> [ 13.585202] dump_stack_lvl+0x73/0xb0 [ 13.585229] print_report+0xd1/0x650 [ 13.585251] ? __virt_addr_valid+0x1db/0x2d0 [ 13.585283] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 13.585307] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.585329] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 13.585373] kasan_report+0x141/0x180 [ 13.585393] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 13.585422] kasan_check_range+0x10c/0x1c0 [ 13.585446] __kasan_check_write+0x18/0x20 [ 13.585465] kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 13.585491] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 13.585516] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.585541] ? trace_hardirqs_on+0x37/0xe0 [ 13.585564] ? kasan_bitops_generic+0x92/0x1c0 [ 13.585625] kasan_bitops_generic+0x116/0x1c0 [ 13.585650] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.585674] ? __pfx_read_tsc+0x10/0x10 [ 13.585695] ? ktime_get_ts64+0x86/0x230 [ 13.585718] kunit_try_run_case+0x1a5/0x480 [ 13.585742] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.585763] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.585786] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.585808] ? __kthread_parkme+0x82/0x180 [ 13.585828] ? preempt_count_sub+0x50/0x80 [ 13.585851] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.585873] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.585895] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.585917] kthread+0x337/0x6f0 [ 13.585936] ? trace_preempt_on+0x20/0xc0 [ 13.585957] ? __pfx_kthread+0x10/0x10 [ 13.585987] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.586007] ? calculate_sigpending+0x7b/0xa0 [ 13.586030] ? __pfx_kthread+0x10/0x10 [ 13.586061] ret_from_fork+0x116/0x1d0 [ 13.586079] ? __pfx_kthread+0x10/0x10 [ 13.586099] ret_from_fork_asm+0x1a/0x30 [ 13.586136] </TASK> [ 13.586147] [ 13.595226] Allocated by task 280: [ 13.595370] kasan_save_stack+0x45/0x70 [ 13.595576] kasan_save_track+0x18/0x40 [ 13.596032] kasan_save_alloc_info+0x3b/0x50 [ 13.596283] __kasan_kmalloc+0xb7/0xc0 [ 13.596503] __kmalloc_cache_noprof+0x189/0x420 [ 13.596947] kasan_bitops_generic+0x92/0x1c0 [ 13.597102] kunit_try_run_case+0x1a5/0x480 [ 13.597262] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.597522] kthread+0x337/0x6f0 [ 13.597895] ret_from_fork+0x116/0x1d0 [ 13.598101] ret_from_fork_asm+0x1a/0x30 [ 13.598257] [ 13.598327] The buggy address belongs to the object at ffff8881027960e0 [ 13.598327] which belongs to the cache kmalloc-16 of size 16 [ 13.598990] The buggy address is located 8 bytes inside of [ 13.598990] allocated 9-byte region [ffff8881027960e0, ffff8881027960e9) [ 13.599628] [ 13.599710] The buggy address belongs to the physical page: [ 13.599883] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102796 [ 13.600317] flags: 0x200000000000000(node=0|zone=2) [ 13.600733] page_type: f5(slab) [ 13.600915] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.601213] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.601538] page dumped because: kasan: bad access detected [ 13.601901] [ 13.601974] Memory state around the buggy address: [ 13.602130] ffff888102795f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.602386] ffff888102796000: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.602901] >ffff888102796080: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 13.603250] ^ [ 13.603625] ffff888102796100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.603964] ffff888102796180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.604220] ================================================================== [ 13.625827] ================================================================== [ 13.626251] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50 [ 13.626652] Write of size 8 at addr ffff8881027960e8 by task kunit_try_catch/280 [ 13.626877] [ 13.626982] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.627087] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.627101] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.627133] Call Trace: [ 13.627148] <TASK> [ 13.627164] dump_stack_lvl+0x73/0xb0 [ 13.627190] print_report+0xd1/0x650 [ 13.627212] ? __virt_addr_valid+0x1db/0x2d0 [ 13.627234] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 13.627259] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.627279] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 13.627316] kasan_report+0x141/0x180 [ 13.627338] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 13.627383] kasan_check_range+0x10c/0x1c0 [ 13.627406] __kasan_check_write+0x18/0x20 [ 13.627424] kasan_bitops_modify.constprop.0+0x547/0xd50 [ 13.627460] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 13.627485] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.627508] ? trace_hardirqs_on+0x37/0xe0 [ 13.627540] ? kasan_bitops_generic+0x92/0x1c0 [ 13.627567] kasan_bitops_generic+0x116/0x1c0 [ 13.627589] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.627612] ? __pfx_read_tsc+0x10/0x10 [ 13.627632] ? ktime_get_ts64+0x86/0x230 [ 13.627655] kunit_try_run_case+0x1a5/0x480 [ 13.627682] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.627703] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.627726] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.627748] ? __kthread_parkme+0x82/0x180 [ 13.627767] ? preempt_count_sub+0x50/0x80 [ 13.627799] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.627822] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.627844] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.627911] kthread+0x337/0x6f0 [ 13.627941] ? trace_preempt_on+0x20/0xc0 [ 13.627962] ? __pfx_kthread+0x10/0x10 [ 13.627982] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.628003] ? calculate_sigpending+0x7b/0xa0 [ 13.628027] ? __pfx_kthread+0x10/0x10 [ 13.628047] ret_from_fork+0x116/0x1d0 [ 13.628064] ? __pfx_kthread+0x10/0x10 [ 13.628097] ret_from_fork_asm+0x1a/0x30 [ 13.628127] </TASK> [ 13.628140] [ 13.637046] Allocated by task 280: [ 13.637230] kasan_save_stack+0x45/0x70 [ 13.637646] kasan_save_track+0x18/0x40 [ 13.637877] kasan_save_alloc_info+0x3b/0x50 [ 13.638032] __kasan_kmalloc+0xb7/0xc0 [ 13.638192] __kmalloc_cache_noprof+0x189/0x420 [ 13.638442] kasan_bitops_generic+0x92/0x1c0 [ 13.638716] kunit_try_run_case+0x1a5/0x480 [ 13.639075] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.639248] kthread+0x337/0x6f0 [ 13.639377] ret_from_fork+0x116/0x1d0 [ 13.639506] ret_from_fork_asm+0x1a/0x30 [ 13.639775] [ 13.639905] The buggy address belongs to the object at ffff8881027960e0 [ 13.639905] which belongs to the cache kmalloc-16 of size 16 [ 13.640441] The buggy address is located 8 bytes inside of [ 13.640441] allocated 9-byte region [ffff8881027960e0, ffff8881027960e9) [ 13.640973] [ 13.641049] The buggy address belongs to the physical page: [ 13.641220] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102796 [ 13.641549] flags: 0x200000000000000(node=0|zone=2) [ 13.642035] page_type: f5(slab) [ 13.642233] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.642680] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.643057] page dumped because: kasan: bad access detected [ 13.643236] [ 13.643316] Memory state around the buggy address: [ 13.643549] ffff888102795f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.644161] ffff888102796000: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.644412] >ffff888102796080: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 13.644821] ^ [ 13.645212] ffff888102796100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.645555] ffff888102796180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.645899] ================================================================== [ 13.539387] ================================================================== [ 13.539723] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 13.540391] Write of size 8 at addr ffff8881027960e8 by task kunit_try_catch/280 [ 13.540870] [ 13.541079] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.541125] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.541136] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.541177] Call Trace: [ 13.541195] <TASK> [ 13.541214] dump_stack_lvl+0x73/0xb0 [ 13.541255] print_report+0xd1/0x650 [ 13.541278] ? __virt_addr_valid+0x1db/0x2d0 [ 13.541301] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 13.541325] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.541346] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 13.541382] kasan_report+0x141/0x180 [ 13.541402] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 13.541432] kasan_check_range+0x10c/0x1c0 [ 13.541454] __kasan_check_write+0x18/0x20 [ 13.541472] kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 13.541496] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 13.541522] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.541546] ? trace_hardirqs_on+0x37/0xe0 [ 13.541569] ? kasan_bitops_generic+0x92/0x1c0 [ 13.541595] kasan_bitops_generic+0x116/0x1c0 [ 13.541618] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.541666] ? __pfx_read_tsc+0x10/0x10 [ 13.541688] ? ktime_get_ts64+0x86/0x230 [ 13.541712] kunit_try_run_case+0x1a5/0x480 [ 13.541746] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.541768] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.541791] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.541814] ? __kthread_parkme+0x82/0x180 [ 13.541835] ? preempt_count_sub+0x50/0x80 [ 13.541858] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.541880] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.541903] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.541925] kthread+0x337/0x6f0 [ 13.541944] ? trace_preempt_on+0x20/0xc0 [ 13.541965] ? __pfx_kthread+0x10/0x10 [ 13.541984] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.542004] ? calculate_sigpending+0x7b/0xa0 [ 13.542028] ? __pfx_kthread+0x10/0x10 [ 13.542048] ret_from_fork+0x116/0x1d0 [ 13.542066] ? __pfx_kthread+0x10/0x10 [ 13.542086] ret_from_fork_asm+0x1a/0x30 [ 13.542116] </TASK> [ 13.542126] [ 13.551986] Allocated by task 280: [ 13.552254] kasan_save_stack+0x45/0x70 [ 13.552584] kasan_save_track+0x18/0x40 [ 13.552916] kasan_save_alloc_info+0x3b/0x50 [ 13.553159] __kasan_kmalloc+0xb7/0xc0 [ 13.553322] __kmalloc_cache_noprof+0x189/0x420 [ 13.553486] kasan_bitops_generic+0x92/0x1c0 [ 13.553673] kunit_try_run_case+0x1a5/0x480 [ 13.553888] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.554149] kthread+0x337/0x6f0 [ 13.554391] ret_from_fork+0x116/0x1d0 [ 13.554599] ret_from_fork_asm+0x1a/0x30 [ 13.554961] [ 13.555094] The buggy address belongs to the object at ffff8881027960e0 [ 13.555094] which belongs to the cache kmalloc-16 of size 16 [ 13.555526] The buggy address is located 8 bytes inside of [ 13.555526] allocated 9-byte region [ffff8881027960e0, ffff8881027960e9) [ 13.556315] [ 13.556729] The buggy address belongs to the physical page: [ 13.557001] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102796 [ 13.557382] flags: 0x200000000000000(node=0|zone=2) [ 13.557722] page_type: f5(slab) [ 13.557950] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.558305] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.558674] page dumped because: kasan: bad access detected [ 13.559055] [ 13.559132] Memory state around the buggy address: [ 13.559412] ffff888102795f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.559844] ffff888102796000: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.560054] >ffff888102796080: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 13.560431] ^ [ 13.561154] ffff888102796100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.561494] ffff888102796180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.562015] ==================================================================