Date
July 11, 2025, 11:09 p.m.
Environment | |
---|---|
qemu-x86_64 |
[ 14.579127] ================================================================== [ 14.579569] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50 [ 14.579903] Write of size 8 at addr ffff888102321e88 by task kunit_try_catch/278 [ 14.580348] [ 14.580482] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.580522] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.580534] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.580553] Call Trace: [ 14.580567] <TASK> [ 14.580582] dump_stack_lvl+0x73/0xb0 [ 14.580610] print_report+0xd1/0x650 [ 14.580632] ? __virt_addr_valid+0x1db/0x2d0 [ 14.580656] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 14.580681] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.580705] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 14.580756] kasan_report+0x141/0x180 [ 14.580779] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 14.580813] kasan_check_range+0x10c/0x1c0 [ 14.580838] __kasan_check_write+0x18/0x20 [ 14.580859] kasan_bitops_modify.constprop.0+0x547/0xd50 [ 14.580888] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.580917] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.580974] ? trace_hardirqs_on+0x37/0xe0 [ 14.580997] ? kasan_bitops_generic+0x92/0x1c0 [ 14.581026] kasan_bitops_generic+0x116/0x1c0 [ 14.581050] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.581076] ? __pfx_read_tsc+0x10/0x10 [ 14.581114] ? ktime_get_ts64+0x86/0x230 [ 14.581139] kunit_try_run_case+0x1a5/0x480 [ 14.581164] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.581187] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.581211] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.581235] ? __kthread_parkme+0x82/0x180 [ 14.581255] ? preempt_count_sub+0x50/0x80 [ 14.581280] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.581304] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.581330] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.581357] kthread+0x337/0x6f0 [ 14.581377] ? trace_preempt_on+0x20/0xc0 [ 14.581399] ? __pfx_kthread+0x10/0x10 [ 14.581419] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.581440] ? calculate_sigpending+0x7b/0xa0 [ 14.581465] ? __pfx_kthread+0x10/0x10 [ 14.581487] ret_from_fork+0x116/0x1d0 [ 14.581505] ? __pfx_kthread+0x10/0x10 [ 14.581526] ret_from_fork_asm+0x1a/0x30 [ 14.581557] </TASK> [ 14.581567] [ 14.589210] Allocated by task 278: [ 14.589391] kasan_save_stack+0x45/0x70 [ 14.589593] kasan_save_track+0x18/0x40 [ 14.589812] kasan_save_alloc_info+0x3b/0x50 [ 14.590035] __kasan_kmalloc+0xb7/0xc0 [ 14.590213] __kmalloc_cache_noprof+0x189/0x420 [ 14.590370] kasan_bitops_generic+0x92/0x1c0 [ 14.590587] kunit_try_run_case+0x1a5/0x480 [ 14.590828] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.591042] kthread+0x337/0x6f0 [ 14.591162] ret_from_fork+0x116/0x1d0 [ 14.591295] ret_from_fork_asm+0x1a/0x30 [ 14.591492] [ 14.591579] The buggy address belongs to the object at ffff888102321e80 [ 14.591579] which belongs to the cache kmalloc-16 of size 16 [ 14.594426] The buggy address is located 8 bytes inside of [ 14.594426] allocated 9-byte region [ffff888102321e80, ffff888102321e89) [ 14.594829] [ 14.594957] The buggy address belongs to the physical page: [ 14.595190] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102321 [ 14.595502] flags: 0x200000000000000(node=0|zone=2) [ 14.595721] page_type: f5(slab) [ 14.596339] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.596571] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.596831] page dumped because: kasan: bad access detected [ 14.598082] [ 14.598213] Memory state around the buggy address: [ 14.598375] ffff888102321d80: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc [ 14.599856] ffff888102321e00: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 14.600266] >ffff888102321e80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.600483] ^ [ 14.600607] ffff888102321f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.600833] ffff888102321f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.601057] ================================================================== [ 14.499501] ================================================================== [ 14.500252] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 14.500629] Write of size 8 at addr ffff888102321e88 by task kunit_try_catch/278 [ 14.500962] [ 14.501109] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.501152] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.501164] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.501185] Call Trace: [ 14.501234] <TASK> [ 14.501249] dump_stack_lvl+0x73/0xb0 [ 14.501277] print_report+0xd1/0x650 [ 14.501298] ? __virt_addr_valid+0x1db/0x2d0 [ 14.501320] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 14.501346] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.501401] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 14.501428] kasan_report+0x141/0x180 [ 14.501450] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 14.501481] kasan_check_range+0x10c/0x1c0 [ 14.501533] __kasan_check_write+0x18/0x20 [ 14.501552] kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 14.501580] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.501608] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.501633] ? trace_hardirqs_on+0x37/0xe0 [ 14.501656] ? kasan_bitops_generic+0x92/0x1c0 [ 14.501684] kasan_bitops_generic+0x116/0x1c0 [ 14.501709] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.501805] ? __pfx_read_tsc+0x10/0x10 [ 14.501828] ? ktime_get_ts64+0x86/0x230 [ 14.501852] kunit_try_run_case+0x1a5/0x480 [ 14.501877] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.501899] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.501932] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.501957] ? __kthread_parkme+0x82/0x180 [ 14.501977] ? preempt_count_sub+0x50/0x80 [ 14.502001] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.502026] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.502050] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.502075] kthread+0x337/0x6f0 [ 14.502094] ? trace_preempt_on+0x20/0xc0 [ 14.502116] ? __pfx_kthread+0x10/0x10 [ 14.502136] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.502158] ? calculate_sigpending+0x7b/0xa0 [ 14.502182] ? __pfx_kthread+0x10/0x10 [ 14.502203] ret_from_fork+0x116/0x1d0 [ 14.502221] ? __pfx_kthread+0x10/0x10 [ 14.502241] ret_from_fork_asm+0x1a/0x30 [ 14.502274] </TASK> [ 14.502283] [ 14.510709] Allocated by task 278: [ 14.510945] kasan_save_stack+0x45/0x70 [ 14.511161] kasan_save_track+0x18/0x40 [ 14.511366] kasan_save_alloc_info+0x3b/0x50 [ 14.511517] __kasan_kmalloc+0xb7/0xc0 [ 14.511649] __kmalloc_cache_noprof+0x189/0x420 [ 14.511897] kasan_bitops_generic+0x92/0x1c0 [ 14.512119] kunit_try_run_case+0x1a5/0x480 [ 14.512327] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.512613] kthread+0x337/0x6f0 [ 14.512834] ret_from_fork+0x116/0x1d0 [ 14.512991] ret_from_fork_asm+0x1a/0x30 [ 14.513134] [ 14.513204] The buggy address belongs to the object at ffff888102321e80 [ 14.513204] which belongs to the cache kmalloc-16 of size 16 [ 14.513800] The buggy address is located 8 bytes inside of [ 14.513800] allocated 9-byte region [ffff888102321e80, ffff888102321e89) [ 14.514338] [ 14.514433] The buggy address belongs to the physical page: [ 14.514622] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102321 [ 14.515000] flags: 0x200000000000000(node=0|zone=2) [ 14.515163] page_type: f5(slab) [ 14.515324] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.515699] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.516104] page dumped because: kasan: bad access detected [ 14.516349] [ 14.516467] Memory state around the buggy address: [ 14.516645] ffff888102321d80: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc [ 14.517032] ffff888102321e00: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 14.517357] >ffff888102321e80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.517677] ^ [ 14.517904] ffff888102321f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.518243] ffff888102321f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.518590] ================================================================== [ 14.479661] ================================================================== [ 14.480101] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 14.480480] Write of size 8 at addr ffff888102321e88 by task kunit_try_catch/278 [ 14.480839] [ 14.480996] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.481082] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.481093] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.481112] Call Trace: [ 14.481124] <TASK> [ 14.481137] dump_stack_lvl+0x73/0xb0 [ 14.481165] print_report+0xd1/0x650 [ 14.481187] ? __virt_addr_valid+0x1db/0x2d0 [ 14.481210] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 14.481236] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.481260] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 14.481286] kasan_report+0x141/0x180 [ 14.481308] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 14.481340] kasan_check_range+0x10c/0x1c0 [ 14.481393] __kasan_check_write+0x18/0x20 [ 14.481413] kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 14.481439] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.481467] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.481491] ? trace_hardirqs_on+0x37/0xe0 [ 14.481513] ? kasan_bitops_generic+0x92/0x1c0 [ 14.481542] kasan_bitops_generic+0x116/0x1c0 [ 14.481566] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.481591] ? __pfx_read_tsc+0x10/0x10 [ 14.481613] ? ktime_get_ts64+0x86/0x230 [ 14.481636] kunit_try_run_case+0x1a5/0x480 [ 14.481685] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.481709] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.481790] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.481816] ? __kthread_parkme+0x82/0x180 [ 14.481883] ? preempt_count_sub+0x50/0x80 [ 14.481907] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.481941] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.481966] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.481992] kthread+0x337/0x6f0 [ 14.482010] ? trace_preempt_on+0x20/0xc0 [ 14.482032] ? __pfx_kthread+0x10/0x10 [ 14.482052] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.482074] ? calculate_sigpending+0x7b/0xa0 [ 14.482097] ? __pfx_kthread+0x10/0x10 [ 14.482120] ret_from_fork+0x116/0x1d0 [ 14.482138] ? __pfx_kthread+0x10/0x10 [ 14.482157] ret_from_fork_asm+0x1a/0x30 [ 14.482190] </TASK> [ 14.482199] [ 14.490521] Allocated by task 278: [ 14.490724] kasan_save_stack+0x45/0x70 [ 14.490995] kasan_save_track+0x18/0x40 [ 14.491195] kasan_save_alloc_info+0x3b/0x50 [ 14.491384] __kasan_kmalloc+0xb7/0xc0 [ 14.491604] __kmalloc_cache_noprof+0x189/0x420 [ 14.491867] kasan_bitops_generic+0x92/0x1c0 [ 14.492097] kunit_try_run_case+0x1a5/0x480 [ 14.492322] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.492578] kthread+0x337/0x6f0 [ 14.492859] ret_from_fork+0x116/0x1d0 [ 14.493070] ret_from_fork_asm+0x1a/0x30 [ 14.493264] [ 14.493334] The buggy address belongs to the object at ffff888102321e80 [ 14.493334] which belongs to the cache kmalloc-16 of size 16 [ 14.493714] The buggy address is located 8 bytes inside of [ 14.493714] allocated 9-byte region [ffff888102321e80, ffff888102321e89) [ 14.494195] [ 14.494280] The buggy address belongs to the physical page: [ 14.494538] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102321 [ 14.494934] flags: 0x200000000000000(node=0|zone=2) [ 14.495098] page_type: f5(slab) [ 14.495218] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.495496] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.495956] page dumped because: kasan: bad access detected [ 14.496260] [ 14.496352] Memory state around the buggy address: [ 14.496603] ffff888102321d80: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc [ 14.496999] ffff888102321e00: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 14.497236] >ffff888102321e80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.497558] ^ [ 14.497751] ffff888102321f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.498114] ffff888102321f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.498456] ================================================================== [ 14.439494] ================================================================== [ 14.440077] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50 [ 14.440473] Write of size 8 at addr ffff888102321e88 by task kunit_try_catch/278 [ 14.440873] [ 14.441007] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.441083] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.441119] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.441163] Call Trace: [ 14.441175] <TASK> [ 14.441191] dump_stack_lvl+0x73/0xb0 [ 14.441224] print_report+0xd1/0x650 [ 14.441246] ? __virt_addr_valid+0x1db/0x2d0 [ 14.441270] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 14.441297] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.441321] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 14.441347] kasan_report+0x141/0x180 [ 14.441369] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 14.441400] kasan_check_range+0x10c/0x1c0 [ 14.441424] __kasan_check_write+0x18/0x20 [ 14.441443] kasan_bitops_modify.constprop.0+0x101/0xd50 [ 14.441470] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.441498] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.441522] ? trace_hardirqs_on+0x37/0xe0 [ 14.441544] ? kasan_bitops_generic+0x92/0x1c0 [ 14.441572] kasan_bitops_generic+0x116/0x1c0 [ 14.441596] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.441620] ? __pfx_read_tsc+0x10/0x10 [ 14.441642] ? ktime_get_ts64+0x86/0x230 [ 14.441666] kunit_try_run_case+0x1a5/0x480 [ 14.441691] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.441714] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.441761] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.441785] ? __kthread_parkme+0x82/0x180 [ 14.441806] ? preempt_count_sub+0x50/0x80 [ 14.441831] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.441855] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.441880] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.441906] kthread+0x337/0x6f0 [ 14.441936] ? trace_preempt_on+0x20/0xc0 [ 14.441960] ? __pfx_kthread+0x10/0x10 [ 14.441982] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.442002] ? calculate_sigpending+0x7b/0xa0 [ 14.442026] ? __pfx_kthread+0x10/0x10 [ 14.442048] ret_from_fork+0x116/0x1d0 [ 14.442066] ? __pfx_kthread+0x10/0x10 [ 14.442086] ret_from_fork_asm+0x1a/0x30 [ 14.442118] </TASK> [ 14.442128] [ 14.450372] Allocated by task 278: [ 14.450543] kasan_save_stack+0x45/0x70 [ 14.450692] kasan_save_track+0x18/0x40 [ 14.450857] kasan_save_alloc_info+0x3b/0x50 [ 14.451148] __kasan_kmalloc+0xb7/0xc0 [ 14.451344] __kmalloc_cache_noprof+0x189/0x420 [ 14.451558] kasan_bitops_generic+0x92/0x1c0 [ 14.451818] kunit_try_run_case+0x1a5/0x480 [ 14.452041] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.452299] kthread+0x337/0x6f0 [ 14.452453] ret_from_fork+0x116/0x1d0 [ 14.452687] ret_from_fork_asm+0x1a/0x30 [ 14.452886] [ 14.452965] The buggy address belongs to the object at ffff888102321e80 [ 14.452965] which belongs to the cache kmalloc-16 of size 16 [ 14.453304] The buggy address is located 8 bytes inside of [ 14.453304] allocated 9-byte region [ffff888102321e80, ffff888102321e89) [ 14.453644] [ 14.453762] The buggy address belongs to the physical page: [ 14.454097] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102321 [ 14.454587] flags: 0x200000000000000(node=0|zone=2) [ 14.454964] page_type: f5(slab) [ 14.455161] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.455493] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.455845] page dumped because: kasan: bad access detected [ 14.456062] [ 14.456130] Memory state around the buggy address: [ 14.456277] ffff888102321d80: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc [ 14.456593] ffff888102321e00: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 14.456980] >ffff888102321e80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.457295] ^ [ 14.457501] ffff888102321f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.457829] ffff888102321f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.458148] ================================================================== [ 14.538874] ================================================================== [ 14.539406] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 14.539854] Write of size 8 at addr ffff888102321e88 by task kunit_try_catch/278 [ 14.540194] [ 14.540321] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.540363] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.540374] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.540393] Call Trace: [ 14.540407] <TASK> [ 14.540422] dump_stack_lvl+0x73/0xb0 [ 14.540449] print_report+0xd1/0x650 [ 14.540471] ? __virt_addr_valid+0x1db/0x2d0 [ 14.540528] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 14.540554] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.540578] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 14.540605] kasan_report+0x141/0x180 [ 14.540626] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 14.540688] kasan_check_range+0x10c/0x1c0 [ 14.540712] __kasan_check_write+0x18/0x20 [ 14.540730] kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 14.540809] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.540837] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.540862] ? trace_hardirqs_on+0x37/0xe0 [ 14.540883] ? kasan_bitops_generic+0x92/0x1c0 [ 14.541002] kasan_bitops_generic+0x116/0x1c0 [ 14.541030] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.541056] ? __pfx_read_tsc+0x10/0x10 [ 14.541077] ? ktime_get_ts64+0x86/0x230 [ 14.541100] kunit_try_run_case+0x1a5/0x480 [ 14.541125] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.541177] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.541225] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.541250] ? __kthread_parkme+0x82/0x180 [ 14.541270] ? preempt_count_sub+0x50/0x80 [ 14.541293] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.541318] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.541342] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.541368] kthread+0x337/0x6f0 [ 14.541387] ? trace_preempt_on+0x20/0xc0 [ 14.541409] ? __pfx_kthread+0x10/0x10 [ 14.541429] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.541451] ? calculate_sigpending+0x7b/0xa0 [ 14.541475] ? __pfx_kthread+0x10/0x10 [ 14.541497] ret_from_fork+0x116/0x1d0 [ 14.541514] ? __pfx_kthread+0x10/0x10 [ 14.541535] ret_from_fork_asm+0x1a/0x30 [ 14.541567] </TASK> [ 14.541576] [ 14.549810] Allocated by task 278: [ 14.549946] kasan_save_stack+0x45/0x70 [ 14.550130] kasan_save_track+0x18/0x40 [ 14.550397] kasan_save_alloc_info+0x3b/0x50 [ 14.550643] __kasan_kmalloc+0xb7/0xc0 [ 14.550860] __kmalloc_cache_noprof+0x189/0x420 [ 14.551090] kasan_bitops_generic+0x92/0x1c0 [ 14.551335] kunit_try_run_case+0x1a5/0x480 [ 14.551548] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.551863] kthread+0x337/0x6f0 [ 14.552020] ret_from_fork+0x116/0x1d0 [ 14.552231] ret_from_fork_asm+0x1a/0x30 [ 14.552429] [ 14.552555] The buggy address belongs to the object at ffff888102321e80 [ 14.552555] which belongs to the cache kmalloc-16 of size 16 [ 14.553103] The buggy address is located 8 bytes inside of [ 14.553103] allocated 9-byte region [ffff888102321e80, ffff888102321e89) [ 14.553644] [ 14.553772] The buggy address belongs to the physical page: [ 14.554037] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102321 [ 14.554405] flags: 0x200000000000000(node=0|zone=2) [ 14.554661] page_type: f5(slab) [ 14.554874] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.555233] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.555600] page dumped because: kasan: bad access detected [ 14.555897] [ 14.556025] Memory state around the buggy address: [ 14.556324] ffff888102321d80: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc [ 14.556676] ffff888102321e00: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 14.557053] >ffff888102321e80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.557362] ^ [ 14.557533] ffff888102321f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.557797] ffff888102321f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.558070] ================================================================== [ 14.459519] ================================================================== [ 14.459930] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 14.460353] Write of size 8 at addr ffff888102321e88 by task kunit_try_catch/278 [ 14.460675] [ 14.460810] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.460852] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.460898] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.460929] Call Trace: [ 14.460940] <TASK> [ 14.460953] dump_stack_lvl+0x73/0xb0 [ 14.460981] print_report+0xd1/0x650 [ 14.461002] ? __virt_addr_valid+0x1db/0x2d0 [ 14.461024] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 14.461050] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.461107] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 14.461134] kasan_report+0x141/0x180 [ 14.461156] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 14.461187] kasan_check_range+0x10c/0x1c0 [ 14.461239] __kasan_check_write+0x18/0x20 [ 14.461258] kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 14.461285] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.461313] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.461338] ? trace_hardirqs_on+0x37/0xe0 [ 14.461359] ? kasan_bitops_generic+0x92/0x1c0 [ 14.461388] kasan_bitops_generic+0x116/0x1c0 [ 14.461411] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.461436] ? __pfx_read_tsc+0x10/0x10 [ 14.461485] ? ktime_get_ts64+0x86/0x230 [ 14.461532] kunit_try_run_case+0x1a5/0x480 [ 14.461556] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.461579] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.461602] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.461626] ? __kthread_parkme+0x82/0x180 [ 14.461647] ? preempt_count_sub+0x50/0x80 [ 14.461670] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.461694] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.461719] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.461765] kthread+0x337/0x6f0 [ 14.461783] ? trace_preempt_on+0x20/0xc0 [ 14.461805] ? __pfx_kthread+0x10/0x10 [ 14.461826] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.461848] ? calculate_sigpending+0x7b/0xa0 [ 14.461872] ? __pfx_kthread+0x10/0x10 [ 14.461894] ret_from_fork+0x116/0x1d0 [ 14.461913] ? __pfx_kthread+0x10/0x10 [ 14.461943] ret_from_fork_asm+0x1a/0x30 [ 14.461974] </TASK> [ 14.461984] [ 14.470896] Allocated by task 278: [ 14.471028] kasan_save_stack+0x45/0x70 [ 14.471211] kasan_save_track+0x18/0x40 [ 14.471442] kasan_save_alloc_info+0x3b/0x50 [ 14.471656] __kasan_kmalloc+0xb7/0xc0 [ 14.471896] __kmalloc_cache_noprof+0x189/0x420 [ 14.472148] kasan_bitops_generic+0x92/0x1c0 [ 14.472367] kunit_try_run_case+0x1a5/0x480 [ 14.472568] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.472878] kthread+0x337/0x6f0 [ 14.473058] ret_from_fork+0x116/0x1d0 [ 14.473242] ret_from_fork_asm+0x1a/0x30 [ 14.473442] [ 14.473558] The buggy address belongs to the object at ffff888102321e80 [ 14.473558] which belongs to the cache kmalloc-16 of size 16 [ 14.474127] The buggy address is located 8 bytes inside of [ 14.474127] allocated 9-byte region [ffff888102321e80, ffff888102321e89) [ 14.474680] [ 14.474777] The buggy address belongs to the physical page: [ 14.475071] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102321 [ 14.475412] flags: 0x200000000000000(node=0|zone=2) [ 14.475567] page_type: f5(slab) [ 14.475687] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.476087] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.476410] page dumped because: kasan: bad access detected [ 14.476658] [ 14.476767] Memory state around the buggy address: [ 14.477066] ffff888102321d80: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc [ 14.477393] ffff888102321e00: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 14.477672] >ffff888102321e80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.477937] ^ [ 14.478150] ffff888102321f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.478564] ffff888102321f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.478943] ================================================================== [ 14.519651] ================================================================== [ 14.520107] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50 [ 14.520483] Write of size 8 at addr ffff888102321e88 by task kunit_try_catch/278 [ 14.520815] [ 14.520970] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.521013] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.521025] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.521043] Call Trace: [ 14.521056] <TASK> [ 14.521070] dump_stack_lvl+0x73/0xb0 [ 14.521131] print_report+0xd1/0x650 [ 14.521154] ? __virt_addr_valid+0x1db/0x2d0 [ 14.521177] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 14.521203] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.521226] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 14.521284] kasan_report+0x141/0x180 [ 14.521305] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 14.521337] kasan_check_range+0x10c/0x1c0 [ 14.521361] __kasan_check_write+0x18/0x20 [ 14.521407] kasan_bitops_modify.constprop.0+0x373/0xd50 [ 14.521434] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.521462] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.521486] ? trace_hardirqs_on+0x37/0xe0 [ 14.521509] ? kasan_bitops_generic+0x92/0x1c0 [ 14.521537] kasan_bitops_generic+0x116/0x1c0 [ 14.521560] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.521587] ? __pfx_read_tsc+0x10/0x10 [ 14.521607] ? ktime_get_ts64+0x86/0x230 [ 14.521631] kunit_try_run_case+0x1a5/0x480 [ 14.521655] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.521677] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.521701] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.521727] ? __kthread_parkme+0x82/0x180 [ 14.521803] ? preempt_count_sub+0x50/0x80 [ 14.521830] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.521856] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.521881] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.521906] kthread+0x337/0x6f0 [ 14.521937] ? trace_preempt_on+0x20/0xc0 [ 14.521958] ? __pfx_kthread+0x10/0x10 [ 14.521979] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.522001] ? calculate_sigpending+0x7b/0xa0 [ 14.522024] ? __pfx_kthread+0x10/0x10 [ 14.522045] ret_from_fork+0x116/0x1d0 [ 14.522064] ? __pfx_kthread+0x10/0x10 [ 14.522083] ret_from_fork_asm+0x1a/0x30 [ 14.522115] </TASK> [ 14.522125] [ 14.530424] Allocated by task 278: [ 14.530607] kasan_save_stack+0x45/0x70 [ 14.530823] kasan_save_track+0x18/0x40 [ 14.531025] kasan_save_alloc_info+0x3b/0x50 [ 14.531187] __kasan_kmalloc+0xb7/0xc0 [ 14.531359] __kmalloc_cache_noprof+0x189/0x420 [ 14.531589] kasan_bitops_generic+0x92/0x1c0 [ 14.531792] kunit_try_run_case+0x1a5/0x480 [ 14.532083] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.532317] kthread+0x337/0x6f0 [ 14.532483] ret_from_fork+0x116/0x1d0 [ 14.532651] ret_from_fork_asm+0x1a/0x30 [ 14.532814] [ 14.532884] The buggy address belongs to the object at ffff888102321e80 [ 14.532884] which belongs to the cache kmalloc-16 of size 16 [ 14.533228] The buggy address is located 8 bytes inside of [ 14.533228] allocated 9-byte region [ffff888102321e80, ffff888102321e89) [ 14.533581] [ 14.533717] The buggy address belongs to the physical page: [ 14.534078] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102321 [ 14.534541] flags: 0x200000000000000(node=0|zone=2) [ 14.534898] page_type: f5(slab) [ 14.535074] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.535408] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.535755] page dumped because: kasan: bad access detected [ 14.535931] [ 14.536000] Memory state around the buggy address: [ 14.536150] ffff888102321d80: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc [ 14.536500] ffff888102321e00: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 14.536879] >ffff888102321e80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.537206] ^ [ 14.537409] ffff888102321f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.537755] ffff888102321f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.538085] ================================================================== [ 14.558954] ================================================================== [ 14.559386] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 14.559681] Write of size 8 at addr ffff888102321e88 by task kunit_try_catch/278 [ 14.559984] [ 14.560072] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.560112] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.560123] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.560142] Call Trace: [ 14.560153] <TASK> [ 14.560166] dump_stack_lvl+0x73/0xb0 [ 14.560228] print_report+0xd1/0x650 [ 14.560250] ? __virt_addr_valid+0x1db/0x2d0 [ 14.560273] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 14.560299] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.560322] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 14.560349] kasan_report+0x141/0x180 [ 14.560370] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 14.560402] kasan_check_range+0x10c/0x1c0 [ 14.560426] __kasan_check_write+0x18/0x20 [ 14.560445] kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 14.560472] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.560500] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.560524] ? trace_hardirqs_on+0x37/0xe0 [ 14.560545] ? kasan_bitops_generic+0x92/0x1c0 [ 14.560573] kasan_bitops_generic+0x116/0x1c0 [ 14.560597] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.560622] ? __pfx_read_tsc+0x10/0x10 [ 14.560644] ? ktime_get_ts64+0x86/0x230 [ 14.560667] kunit_try_run_case+0x1a5/0x480 [ 14.560691] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.560715] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.560787] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.560813] ? __kthread_parkme+0x82/0x180 [ 14.560832] ? preempt_count_sub+0x50/0x80 [ 14.560857] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.560882] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.560907] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.560942] kthread+0x337/0x6f0 [ 14.560961] ? trace_preempt_on+0x20/0xc0 [ 14.560982] ? __pfx_kthread+0x10/0x10 [ 14.561003] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.561025] ? calculate_sigpending+0x7b/0xa0 [ 14.561049] ? __pfx_kthread+0x10/0x10 [ 14.561071] ret_from_fork+0x116/0x1d0 [ 14.561088] ? __pfx_kthread+0x10/0x10 [ 14.561109] ret_from_fork_asm+0x1a/0x30 [ 14.561141] </TASK> [ 14.561151] [ 14.569561] Allocated by task 278: [ 14.569786] kasan_save_stack+0x45/0x70 [ 14.570025] kasan_save_track+0x18/0x40 [ 14.570215] kasan_save_alloc_info+0x3b/0x50 [ 14.570385] __kasan_kmalloc+0xb7/0xc0 [ 14.570540] __kmalloc_cache_noprof+0x189/0x420 [ 14.570817] kasan_bitops_generic+0x92/0x1c0 [ 14.571045] kunit_try_run_case+0x1a5/0x480 [ 14.571273] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.571538] kthread+0x337/0x6f0 [ 14.571664] ret_from_fork+0x116/0x1d0 [ 14.571853] ret_from_fork_asm+0x1a/0x30 [ 14.572156] [ 14.572270] The buggy address belongs to the object at ffff888102321e80 [ 14.572270] which belongs to the cache kmalloc-16 of size 16 [ 14.572646] The buggy address is located 8 bytes inside of [ 14.572646] allocated 9-byte region [ffff888102321e80, ffff888102321e89) [ 14.573201] [ 14.573297] The buggy address belongs to the physical page: [ 14.573522] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102321 [ 14.573787] flags: 0x200000000000000(node=0|zone=2) [ 14.573982] page_type: f5(slab) [ 14.574155] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.574625] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.575028] page dumped because: kasan: bad access detected [ 14.575311] [ 14.575425] Memory state around the buggy address: [ 14.575613] ffff888102321d80: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc [ 14.575905] ffff888102321e00: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 14.576267] >ffff888102321e80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.576581] ^ [ 14.576794] ffff888102321f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.577119] ffff888102321f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.577441] ==================================================================