Date
July 12, 2025, 11:09 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 22.355347] ================================================================== [ 22.355543] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 22.355711] Write of size 8 at addr fff00000c3f4d8a8 by task kunit_try_catch/262 [ 22.355859] [ 22.355939] CPU: 1 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 22.356210] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.356304] Hardware name: linux,dummy-virt (DT) [ 22.356408] Call trace: [ 22.356480] show_stack+0x20/0x38 (C) [ 22.356619] dump_stack_lvl+0x8c/0xd0 [ 22.356751] print_report+0x118/0x608 [ 22.356969] kasan_report+0xdc/0x128 [ 22.357316] kasan_check_range+0x100/0x1a8 [ 22.357450] __kasan_check_write+0x20/0x30 [ 22.357564] kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 22.358609] kasan_save_track+0x20/0x40 [ 22.359599] [ 22.359791] The buggy address is located 8 bytes inside of [ 22.359791] allocated 9-byte region [fff00000c3f4d8a0, fff00000c3f4d8a9) [ 22.360120] The buggy address belongs to the physical page: [ 22.360959] page dumped because: kasan: bad access detected [ 22.361043] [ 22.361115] Memory state around the buggy address: [ 22.361238] fff00000c3f4d780: 00 05 fc fc fa fb fc fc 00 02 fc fc fa fb fc fc [ 22.361361] fff00000c3f4d800: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.361479] >fff00000c3f4d880: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 22.361603] ^ [ 22.362918] ================================================================== [ 22.376711] ================================================================== [ 22.376834] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbc0 [ 22.377766] Read of size 8 at addr fff00000c3f4d8a8 by task kunit_try_catch/262 [ 22.377928] [ 22.378003] CPU: 1 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 22.378367] Call trace: [ 22.382618] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.387223] ==================================================================
[ 14.744060] ================================================================== [ 14.744356] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 14.744763] Write of size 8 at addr ffff888102894308 by task kunit_try_catch/279 [ 14.745046] [ 14.745152] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.745193] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.745205] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.745225] Call Trace: [ 14.745239] <TASK> [ 14.745254] dump_stack_lvl+0x73/0xb0 [ 14.745281] print_report+0xd1/0x650 [ 14.745302] ? __virt_addr_valid+0x1db/0x2d0 [ 14.745325] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 14.745351] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.745375] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 14.745402] kasan_report+0x141/0x180 [ 14.745424] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 14.745457] kasan_check_range+0x10c/0x1c0 [ 14.745482] __kasan_check_write+0x18/0x20 [ 14.745502] kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 14.745529] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.745558] ? kasan_save_alloc_info+0x3b/0x50 [ 14.745582] ? kasan_save_stack+0x45/0x70 [ 14.745606] kasan_bitops_generic+0x116/0x1c0 [ 14.745630] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.745671] ? __pfx_read_tsc+0x10/0x10 [ 14.745692] ? ktime_get_ts64+0x86/0x230 [ 14.745715] kunit_try_run_case+0x1a5/0x480 [ 14.745739] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.745774] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.745798] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.745822] ? __kthread_parkme+0x82/0x180 [ 14.745842] ? preempt_count_sub+0x50/0x80 [ 14.745866] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.745891] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.745916] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.745942] kthread+0x337/0x6f0 [ 14.745961] ? trace_preempt_on+0x20/0xc0 [ 14.745985] ? __pfx_kthread+0x10/0x10 [ 14.746008] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.746029] ? calculate_sigpending+0x7b/0xa0 [ 14.746053] ? __pfx_kthread+0x10/0x10 [ 14.746074] ret_from_fork+0x116/0x1d0 [ 14.746094] ? __pfx_kthread+0x10/0x10 [ 14.746115] ret_from_fork_asm+0x1a/0x30 [ 14.746145] </TASK> [ 14.746154] [ 14.754078] Allocated by task 279: [ 14.754247] kasan_save_stack+0x45/0x70 [ 14.754455] kasan_save_track+0x18/0x40 [ 14.754619] kasan_save_alloc_info+0x3b/0x50 [ 14.754877] __kasan_kmalloc+0xb7/0xc0 [ 14.755063] __kmalloc_cache_noprof+0x189/0x420 [ 14.755260] kasan_bitops_generic+0x92/0x1c0 [ 14.755446] kunit_try_run_case+0x1a5/0x480 [ 14.755591] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.755872] kthread+0x337/0x6f0 [ 14.756104] ret_from_fork+0x116/0x1d0 [ 14.756608] ret_from_fork_asm+0x1a/0x30 [ 14.756812] [ 14.756885] The buggy address belongs to the object at ffff888102894300 [ 14.756885] which belongs to the cache kmalloc-16 of size 16 [ 14.757235] The buggy address is located 8 bytes inside of [ 14.757235] allocated 9-byte region [ffff888102894300, ffff888102894309) [ 14.757581] [ 14.757650] The buggy address belongs to the physical page: [ 14.757905] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102894 [ 14.758645] flags: 0x200000000000000(node=0|zone=2) [ 14.759048] page_type: f5(slab) [ 14.759170] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.759398] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.759620] page dumped because: kasan: bad access detected [ 14.759800] [ 14.759868] Memory state around the buggy address: [ 14.760022] ffff888102894200: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 14.760594] ffff888102894280: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.761330] >ffff888102894300: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.761651] ^ [ 14.762167] ffff888102894380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.762518] ffff888102894400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.762859] ================================================================== [ 14.763341] ================================================================== [ 14.763836] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50 [ 14.764097] Write of size 8 at addr ffff888102894308 by task kunit_try_catch/279 [ 14.764428] [ 14.764536] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.764576] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.764587] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.764607] Call Trace: [ 14.764621] <TASK> [ 14.764634] dump_stack_lvl+0x73/0xb0 [ 14.764680] print_report+0xd1/0x650 [ 14.764703] ? __virt_addr_valid+0x1db/0x2d0 [ 14.764726] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 14.764764] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.764788] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 14.764814] kasan_report+0x141/0x180 [ 14.764836] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 14.764867] kasan_check_range+0x10c/0x1c0 [ 14.764891] __kasan_check_write+0x18/0x20 [ 14.764911] kasan_bitops_modify.constprop.0+0x373/0xd50 [ 14.764937] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.764966] ? kasan_save_alloc_info+0x3b/0x50 [ 14.764990] ? kasan_save_stack+0x45/0x70 [ 14.765014] kasan_bitops_generic+0x116/0x1c0 [ 14.765039] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.765064] ? __pfx_read_tsc+0x10/0x10 [ 14.765086] ? ktime_get_ts64+0x86/0x230 [ 14.765113] kunit_try_run_case+0x1a5/0x480 [ 14.765140] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.765163] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.765188] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.765213] ? __kthread_parkme+0x82/0x180 [ 14.765235] ? preempt_count_sub+0x50/0x80 [ 14.765259] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.765283] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.765308] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.765333] kthread+0x337/0x6f0 [ 14.765353] ? trace_preempt_on+0x20/0xc0 [ 14.765378] ? __pfx_kthread+0x10/0x10 [ 14.765398] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.765420] ? calculate_sigpending+0x7b/0xa0 [ 14.765444] ? __pfx_kthread+0x10/0x10 [ 14.765466] ret_from_fork+0x116/0x1d0 [ 14.765485] ? __pfx_kthread+0x10/0x10 [ 14.765506] ret_from_fork_asm+0x1a/0x30 [ 14.765536] </TASK> [ 14.765546] [ 14.773498] Allocated by task 279: [ 14.773710] kasan_save_stack+0x45/0x70 [ 14.773933] kasan_save_track+0x18/0x40 [ 14.774075] kasan_save_alloc_info+0x3b/0x50 [ 14.774288] __kasan_kmalloc+0xb7/0xc0 [ 14.774442] __kmalloc_cache_noprof+0x189/0x420 [ 14.774600] kasan_bitops_generic+0x92/0x1c0 [ 14.775073] kunit_try_run_case+0x1a5/0x480 [ 14.775298] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.775510] kthread+0x337/0x6f0 [ 14.775630] ret_from_fork+0x116/0x1d0 [ 14.775885] ret_from_fork_asm+0x1a/0x30 [ 14.776090] [ 14.776186] The buggy address belongs to the object at ffff888102894300 [ 14.776186] which belongs to the cache kmalloc-16 of size 16 [ 14.776941] The buggy address is located 8 bytes inside of [ 14.776941] allocated 9-byte region [ffff888102894300, ffff888102894309) [ 14.777317] [ 14.777389] The buggy address belongs to the physical page: [ 14.777589] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102894 [ 14.778351] flags: 0x200000000000000(node=0|zone=2) [ 14.778523] page_type: f5(slab) [ 14.778641] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.778968] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.779317] page dumped because: kasan: bad access detected [ 14.779574] [ 14.779718] Memory state around the buggy address: [ 14.779966] ffff888102894200: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 14.780302] ffff888102894280: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.780609] >ffff888102894300: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.780923] ^ [ 14.781048] ffff888102894380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.781261] ffff888102894400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.781469] ================================================================== [ 14.724656] ================================================================== [ 14.725477] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 14.725881] Write of size 8 at addr ffff888102894308 by task kunit_try_catch/279 [ 14.726177] [ 14.726327] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.726377] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.726388] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.726407] Call Trace: [ 14.726423] <TASK> [ 14.726436] dump_stack_lvl+0x73/0xb0 [ 14.726465] print_report+0xd1/0x650 [ 14.726487] ? __virt_addr_valid+0x1db/0x2d0 [ 14.726510] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 14.726537] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.726561] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 14.726588] kasan_report+0x141/0x180 [ 14.726610] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 14.726641] kasan_check_range+0x10c/0x1c0 [ 14.726717] __kasan_check_write+0x18/0x20 [ 14.726737] kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 14.726774] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.726805] ? kasan_save_alloc_info+0x3b/0x50 [ 14.726829] ? kasan_save_stack+0x45/0x70 [ 14.726853] kasan_bitops_generic+0x116/0x1c0 [ 14.726877] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.726902] ? __pfx_read_tsc+0x10/0x10 [ 14.726923] ? ktime_get_ts64+0x86/0x230 [ 14.726948] kunit_try_run_case+0x1a5/0x480 [ 14.726973] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.726997] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.727021] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.727046] ? __kthread_parkme+0x82/0x180 [ 14.727067] ? preempt_count_sub+0x50/0x80 [ 14.727091] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.727116] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.727141] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.727166] kthread+0x337/0x6f0 [ 14.727186] ? trace_preempt_on+0x20/0xc0 [ 14.727210] ? __pfx_kthread+0x10/0x10 [ 14.727230] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.727253] ? calculate_sigpending+0x7b/0xa0 [ 14.727276] ? __pfx_kthread+0x10/0x10 [ 14.727297] ret_from_fork+0x116/0x1d0 [ 14.727316] ? __pfx_kthread+0x10/0x10 [ 14.727336] ret_from_fork_asm+0x1a/0x30 [ 14.727366] </TASK> [ 14.727375] [ 14.735458] Allocated by task 279: [ 14.735756] kasan_save_stack+0x45/0x70 [ 14.735974] kasan_save_track+0x18/0x40 [ 14.736169] kasan_save_alloc_info+0x3b/0x50 [ 14.736391] __kasan_kmalloc+0xb7/0xc0 [ 14.736587] __kmalloc_cache_noprof+0x189/0x420 [ 14.737004] kasan_bitops_generic+0x92/0x1c0 [ 14.737212] kunit_try_run_case+0x1a5/0x480 [ 14.737389] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.737630] kthread+0x337/0x6f0 [ 14.737868] ret_from_fork+0x116/0x1d0 [ 14.738033] ret_from_fork_asm+0x1a/0x30 [ 14.738201] [ 14.738304] The buggy address belongs to the object at ffff888102894300 [ 14.738304] which belongs to the cache kmalloc-16 of size 16 [ 14.738685] The buggy address is located 8 bytes inside of [ 14.738685] allocated 9-byte region [ffff888102894300, ffff888102894309) [ 14.739041] [ 14.739131] The buggy address belongs to the physical page: [ 14.739789] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102894 [ 14.740156] flags: 0x200000000000000(node=0|zone=2) [ 14.740625] page_type: f5(slab) [ 14.740773] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.741004] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.741307] page dumped because: kasan: bad access detected [ 14.741560] [ 14.741651] Memory state around the buggy address: [ 14.741935] ffff888102894200: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 14.742246] ffff888102894280: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.742512] >ffff888102894300: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.742842] ^ [ 14.742981] ffff888102894380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.743304] ffff888102894400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.743595] ================================================================== [ 14.829043] ================================================================== [ 14.829613] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50 [ 14.830278] Write of size 8 at addr ffff888102894308 by task kunit_try_catch/279 [ 14.831151] [ 14.831441] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.831490] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.831501] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.831523] Call Trace: [ 14.831536] <TASK> [ 14.831552] dump_stack_lvl+0x73/0xb0 [ 14.831583] print_report+0xd1/0x650 [ 14.831606] ? __virt_addr_valid+0x1db/0x2d0 [ 14.831629] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 14.831689] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.831713] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 14.831741] kasan_report+0x141/0x180 [ 14.831776] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 14.831807] kasan_check_range+0x10c/0x1c0 [ 14.831831] __kasan_check_write+0x18/0x20 [ 14.831850] kasan_bitops_modify.constprop.0+0x547/0xd50 [ 14.831877] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.831906] ? kasan_save_alloc_info+0x3b/0x50 [ 14.831930] ? kasan_save_stack+0x45/0x70 [ 14.831954] kasan_bitops_generic+0x116/0x1c0 [ 14.831978] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.832004] ? __pfx_read_tsc+0x10/0x10 [ 14.832024] ? ktime_get_ts64+0x86/0x230 [ 14.832048] kunit_try_run_case+0x1a5/0x480 [ 14.832072] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.832096] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.832120] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.832144] ? __kthread_parkme+0x82/0x180 [ 14.832164] ? preempt_count_sub+0x50/0x80 [ 14.832188] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.832213] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.832238] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.832263] kthread+0x337/0x6f0 [ 14.832282] ? trace_preempt_on+0x20/0xc0 [ 14.832305] ? __pfx_kthread+0x10/0x10 [ 14.832326] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.832347] ? calculate_sigpending+0x7b/0xa0 [ 14.832371] ? __pfx_kthread+0x10/0x10 [ 14.832393] ret_from_fork+0x116/0x1d0 [ 14.832411] ? __pfx_kthread+0x10/0x10 [ 14.832431] ret_from_fork_asm+0x1a/0x30 [ 14.832461] </TASK> [ 14.832471] [ 14.844709] Allocated by task 279: [ 14.844899] kasan_save_stack+0x45/0x70 [ 14.845188] kasan_save_track+0x18/0x40 [ 14.845463] kasan_save_alloc_info+0x3b/0x50 [ 14.845940] __kasan_kmalloc+0xb7/0xc0 [ 14.846131] __kmalloc_cache_noprof+0x189/0x420 [ 14.846429] kasan_bitops_generic+0x92/0x1c0 [ 14.846841] kunit_try_run_case+0x1a5/0x480 [ 14.847180] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.847533] kthread+0x337/0x6f0 [ 14.848060] ret_from_fork+0x116/0x1d0 [ 14.848205] ret_from_fork_asm+0x1a/0x30 [ 14.848414] [ 14.848511] The buggy address belongs to the object at ffff888102894300 [ 14.848511] which belongs to the cache kmalloc-16 of size 16 [ 14.849475] The buggy address is located 8 bytes inside of [ 14.849475] allocated 9-byte region [ffff888102894300, ffff888102894309) [ 14.850443] [ 14.850656] The buggy address belongs to the physical page: [ 14.851124] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102894 [ 14.851579] flags: 0x200000000000000(node=0|zone=2) [ 14.851915] page_type: f5(slab) [ 14.852093] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.852377] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.852999] page dumped because: kasan: bad access detected [ 14.853223] [ 14.853494] Memory state around the buggy address: [ 14.853902] ffff888102894200: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 14.854390] ffff888102894280: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.855051] >ffff888102894300: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.855343] ^ [ 14.855764] ffff888102894380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.856063] ffff888102894400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.856489] ================================================================== [ 14.702176] ================================================================== [ 14.702910] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 14.703278] Write of size 8 at addr ffff888102894308 by task kunit_try_catch/279 [ 14.703507] [ 14.703593] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.703637] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.703692] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.703713] Call Trace: [ 14.703725] <TASK> [ 14.703741] dump_stack_lvl+0x73/0xb0 [ 14.703787] print_report+0xd1/0x650 [ 14.703810] ? __virt_addr_valid+0x1db/0x2d0 [ 14.703835] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 14.703862] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.703896] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 14.703924] kasan_report+0x141/0x180 [ 14.703946] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 14.703978] kasan_check_range+0x10c/0x1c0 [ 14.704002] __kasan_check_write+0x18/0x20 [ 14.704021] kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 14.704049] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.704079] ? kasan_save_alloc_info+0x3b/0x50 [ 14.704103] ? kasan_save_stack+0x45/0x70 [ 14.704127] kasan_bitops_generic+0x116/0x1c0 [ 14.704151] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.704176] ? __pfx_read_tsc+0x10/0x10 [ 14.704199] ? ktime_get_ts64+0x86/0x230 [ 14.704225] kunit_try_run_case+0x1a5/0x480 [ 14.704251] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.704274] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.704299] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.704324] ? __kthread_parkme+0x82/0x180 [ 14.704346] ? preempt_count_sub+0x50/0x80 [ 14.704372] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.704397] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.704421] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.704447] kthread+0x337/0x6f0 [ 14.704467] ? trace_preempt_on+0x20/0xc0 [ 14.704492] ? __pfx_kthread+0x10/0x10 [ 14.704512] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.704534] ? calculate_sigpending+0x7b/0xa0 [ 14.704559] ? __pfx_kthread+0x10/0x10 [ 14.704581] ret_from_fork+0x116/0x1d0 [ 14.704599] ? __pfx_kthread+0x10/0x10 [ 14.704620] ret_from_fork_asm+0x1a/0x30 [ 14.704671] </TASK> [ 14.704683] [ 14.716060] Allocated by task 279: [ 14.716242] kasan_save_stack+0x45/0x70 [ 14.716443] kasan_save_track+0x18/0x40 [ 14.716641] kasan_save_alloc_info+0x3b/0x50 [ 14.716905] __kasan_kmalloc+0xb7/0xc0 [ 14.717186] __kmalloc_cache_noprof+0x189/0x420 [ 14.717352] kasan_bitops_generic+0x92/0x1c0 [ 14.717502] kunit_try_run_case+0x1a5/0x480 [ 14.717831] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.718102] kthread+0x337/0x6f0 [ 14.718275] ret_from_fork+0x116/0x1d0 [ 14.718456] ret_from_fork_asm+0x1a/0x30 [ 14.718647] [ 14.718717] The buggy address belongs to the object at ffff888102894300 [ 14.718717] which belongs to the cache kmalloc-16 of size 16 [ 14.719338] The buggy address is located 8 bytes inside of [ 14.719338] allocated 9-byte region [ffff888102894300, ffff888102894309) [ 14.720201] [ 14.720306] The buggy address belongs to the physical page: [ 14.720567] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102894 [ 14.720991] flags: 0x200000000000000(node=0|zone=2) [ 14.721162] page_type: f5(slab) [ 14.721283] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.721611] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.721955] page dumped because: kasan: bad access detected [ 14.722304] [ 14.722381] Memory state around the buggy address: [ 14.722543] ffff888102894200: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 14.722946] ffff888102894280: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.723268] >ffff888102894300: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.723547] ^ [ 14.723705] ffff888102894380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.724017] ffff888102894400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.724228] ================================================================== [ 14.670871] ================================================================== [ 14.671906] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50 [ 14.672175] Write of size 8 at addr ffff888102894308 by task kunit_try_catch/279 [ 14.672399] [ 14.672491] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.672535] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.672546] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.672568] Call Trace: [ 14.672581] <TASK> [ 14.672598] dump_stack_lvl+0x73/0xb0 [ 14.672627] print_report+0xd1/0x650 [ 14.672936] ? __virt_addr_valid+0x1db/0x2d0 [ 14.672967] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 14.672995] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.673020] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 14.673048] kasan_report+0x141/0x180 [ 14.673246] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 14.673283] kasan_check_range+0x10c/0x1c0 [ 14.673308] __kasan_check_write+0x18/0x20 [ 14.673331] kasan_bitops_modify.constprop.0+0x101/0xd50 [ 14.673359] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.673390] ? kasan_save_alloc_info+0x3b/0x50 [ 14.673414] ? kasan_save_stack+0x45/0x70 [ 14.673439] kasan_bitops_generic+0x116/0x1c0 [ 14.673463] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.673489] ? __pfx_read_tsc+0x10/0x10 [ 14.673510] ? ktime_get_ts64+0x86/0x230 [ 14.673534] kunit_try_run_case+0x1a5/0x480 [ 14.673559] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.673582] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.673606] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.673631] ? __kthread_parkme+0x82/0x180 [ 14.673670] ? preempt_count_sub+0x50/0x80 [ 14.673704] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.673743] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.673779] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.673804] kthread+0x337/0x6f0 [ 14.673823] ? trace_preempt_on+0x20/0xc0 [ 14.673849] ? __pfx_kthread+0x10/0x10 [ 14.673870] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.673893] ? calculate_sigpending+0x7b/0xa0 [ 14.673918] ? __pfx_kthread+0x10/0x10 [ 14.673939] ret_from_fork+0x116/0x1d0 [ 14.673957] ? __pfx_kthread+0x10/0x10 [ 14.673978] ret_from_fork_asm+0x1a/0x30 [ 14.674008] </TASK> [ 14.674020] [ 14.688975] Allocated by task 279: [ 14.689310] kasan_save_stack+0x45/0x70 [ 14.689600] kasan_save_track+0x18/0x40 [ 14.689954] kasan_save_alloc_info+0x3b/0x50 [ 14.690410] __kasan_kmalloc+0xb7/0xc0 [ 14.690671] __kmalloc_cache_noprof+0x189/0x420 [ 14.691110] kasan_bitops_generic+0x92/0x1c0 [ 14.691261] kunit_try_run_case+0x1a5/0x480 [ 14.691455] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.691741] kthread+0x337/0x6f0 [ 14.692130] ret_from_fork+0x116/0x1d0 [ 14.692559] ret_from_fork_asm+0x1a/0x30 [ 14.692959] [ 14.693128] The buggy address belongs to the object at ffff888102894300 [ 14.693128] which belongs to the cache kmalloc-16 of size 16 [ 14.693493] The buggy address is located 8 bytes inside of [ 14.693493] allocated 9-byte region [ffff888102894300, ffff888102894309) [ 14.694135] [ 14.694209] The buggy address belongs to the physical page: [ 14.694389] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102894 [ 14.694630] flags: 0x200000000000000(node=0|zone=2) [ 14.695194] page_type: f5(slab) [ 14.695483] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.696364] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.697175] page dumped because: kasan: bad access detected [ 14.697805] [ 14.697999] Memory state around the buggy address: [ 14.698422] ffff888102894200: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 14.699084] ffff888102894280: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.699860] >ffff888102894300: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.700239] ^ [ 14.700363] ffff888102894380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.700577] ffff888102894400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.701238] ================================================================== [ 14.782213] ================================================================== [ 14.782572] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 14.783177] Write of size 8 at addr ffff888102894308 by task kunit_try_catch/279 [ 14.783514] [ 14.783596] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.783635] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.783684] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.783705] Call Trace: [ 14.783720] <TASK> [ 14.783735] dump_stack_lvl+0x73/0xb0 [ 14.783775] print_report+0xd1/0x650 [ 14.783797] ? __virt_addr_valid+0x1db/0x2d0 [ 14.783820] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 14.783847] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.783870] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 14.783897] kasan_report+0x141/0x180 [ 14.783919] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 14.783949] kasan_check_range+0x10c/0x1c0 [ 14.783973] __kasan_check_write+0x18/0x20 [ 14.783994] kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 14.784020] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.784049] ? kasan_save_alloc_info+0x3b/0x50 [ 14.784074] ? kasan_save_stack+0x45/0x70 [ 14.784097] kasan_bitops_generic+0x116/0x1c0 [ 14.784121] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.784147] ? __pfx_read_tsc+0x10/0x10 [ 14.784167] ? ktime_get_ts64+0x86/0x230 [ 14.784192] kunit_try_run_case+0x1a5/0x480 [ 14.784216] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.784239] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.784264] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.784288] ? __kthread_parkme+0x82/0x180 [ 14.784309] ? preempt_count_sub+0x50/0x80 [ 14.784333] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.784358] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.784383] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.784408] kthread+0x337/0x6f0 [ 14.784428] ? trace_preempt_on+0x20/0xc0 [ 14.784450] ? __pfx_kthread+0x10/0x10 [ 14.784471] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.784493] ? calculate_sigpending+0x7b/0xa0 [ 14.784517] ? __pfx_kthread+0x10/0x10 [ 14.784539] ret_from_fork+0x116/0x1d0 [ 14.784557] ? __pfx_kthread+0x10/0x10 [ 14.784578] ret_from_fork_asm+0x1a/0x30 [ 14.784608] </TASK> [ 14.784618] [ 14.795743] Allocated by task 279: [ 14.795932] kasan_save_stack+0x45/0x70 [ 14.796122] kasan_save_track+0x18/0x40 [ 14.796301] kasan_save_alloc_info+0x3b/0x50 [ 14.796500] __kasan_kmalloc+0xb7/0xc0 [ 14.797292] __kmalloc_cache_noprof+0x189/0x420 [ 14.797487] kasan_bitops_generic+0x92/0x1c0 [ 14.797755] kunit_try_run_case+0x1a5/0x480 [ 14.797959] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.798191] kthread+0x337/0x6f0 [ 14.798350] ret_from_fork+0x116/0x1d0 [ 14.798523] ret_from_fork_asm+0x1a/0x30 [ 14.798793] [ 14.798887] The buggy address belongs to the object at ffff888102894300 [ 14.798887] which belongs to the cache kmalloc-16 of size 16 [ 14.799353] The buggy address is located 8 bytes inside of [ 14.799353] allocated 9-byte region [ffff888102894300, ffff888102894309) [ 14.800586] [ 14.800675] The buggy address belongs to the physical page: [ 14.800990] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102894 [ 14.801267] flags: 0x200000000000000(node=0|zone=2) [ 14.801483] page_type: f5(slab) [ 14.801636] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.802099] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.802427] page dumped because: kasan: bad access detected [ 14.802652] [ 14.802805] Memory state around the buggy address: [ 14.802964] ffff888102894200: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 14.803301] ffff888102894280: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.803615] >ffff888102894300: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.803972] ^ [ 14.804123] ffff888102894380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.804364] ffff888102894400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.804737] ================================================================== [ 14.805227] ================================================================== [ 14.805555] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 14.805986] Write of size 8 at addr ffff888102894308 by task kunit_try_catch/279 [ 14.806293] [ 14.806408] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.806449] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.806461] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.806479] Call Trace: [ 14.806491] <TASK> [ 14.806507] dump_stack_lvl+0x73/0xb0 [ 14.806536] print_report+0xd1/0x650 [ 14.806559] ? __virt_addr_valid+0x1db/0x2d0 [ 14.806582] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 14.806609] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.806632] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 14.806715] kasan_report+0x141/0x180 [ 14.806737] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 14.806782] kasan_check_range+0x10c/0x1c0 [ 14.806806] __kasan_check_write+0x18/0x20 [ 14.806826] kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 14.806852] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.806882] ? kasan_save_alloc_info+0x3b/0x50 [ 14.806905] ? kasan_save_stack+0x45/0x70 [ 14.806930] kasan_bitops_generic+0x116/0x1c0 [ 14.806953] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.806979] ? __pfx_read_tsc+0x10/0x10 [ 14.806999] ? ktime_get_ts64+0x86/0x230 [ 14.807024] kunit_try_run_case+0x1a5/0x480 [ 14.807048] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.807071] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.807095] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.807119] ? __kthread_parkme+0x82/0x180 [ 14.807140] ? preempt_count_sub+0x50/0x80 [ 14.807163] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.807187] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.807211] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.807237] kthread+0x337/0x6f0 [ 14.807256] ? trace_preempt_on+0x20/0xc0 [ 14.807279] ? __pfx_kthread+0x10/0x10 [ 14.807300] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.807322] ? calculate_sigpending+0x7b/0xa0 [ 14.807346] ? __pfx_kthread+0x10/0x10 [ 14.807367] ret_from_fork+0x116/0x1d0 [ 14.807386] ? __pfx_kthread+0x10/0x10 [ 14.807406] ret_from_fork_asm+0x1a/0x30 [ 14.807437] </TASK> [ 14.807447] [ 14.815468] Allocated by task 279: [ 14.815653] kasan_save_stack+0x45/0x70 [ 14.815845] kasan_save_track+0x18/0x40 [ 14.815999] kasan_save_alloc_info+0x3b/0x50 [ 14.816215] __kasan_kmalloc+0xb7/0xc0 [ 14.816403] __kmalloc_cache_noprof+0x189/0x420 [ 14.816628] kasan_bitops_generic+0x92/0x1c0 [ 14.816867] kunit_try_run_case+0x1a5/0x480 [ 14.817016] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.817192] kthread+0x337/0x6f0 [ 14.817362] ret_from_fork+0x116/0x1d0 [ 14.817550] ret_from_fork_asm+0x1a/0x30 [ 14.817770] [ 14.817849] The buggy address belongs to the object at ffff888102894300 [ 14.817849] which belongs to the cache kmalloc-16 of size 16 [ 14.818199] The buggy address is located 8 bytes inside of [ 14.818199] allocated 9-byte region [ffff888102894300, ffff888102894309) [ 14.818688] [ 14.820040] The buggy address belongs to the physical page: [ 14.820228] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102894 [ 14.820475] flags: 0x200000000000000(node=0|zone=2) [ 14.820637] page_type: f5(slab) [ 14.821954] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.822210] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.822506] page dumped because: kasan: bad access detected [ 14.823365] [ 14.824455] Memory state around the buggy address: [ 14.824622] ffff888102894200: 00 05 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 14.825317] ffff888102894280: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.825537] >ffff888102894300: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.826066] ^ [ 14.826806] ffff888102894380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.827039] ffff888102894400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.827252] ==================================================================