Date
July 12, 2025, 11:09 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 18.948656] ================================================================== [ 18.949002] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0 [ 18.949134] Read of size 8 at addr fff00000c45d1b08 by task kunit_try_catch/261 [ 18.949199] [ 18.949588] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 18.949696] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.949853] Hardware name: linux,dummy-virt (DT) [ 18.949897] Call trace: [ 18.949940] show_stack+0x20/0x38 (C) [ 18.950140] dump_stack_lvl+0x8c/0xd0 [ 18.950376] print_report+0x118/0x5d0 [ 18.950466] kasan_report+0xdc/0x128 [ 18.950561] __asan_report_load8_noabort+0x20/0x30 [ 18.950619] kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0 [ 18.950683] kasan_bitops_generic+0x11c/0x1c8 [ 18.950754] kunit_try_run_case+0x170/0x3f0 [ 18.950805] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.950861] kthread+0x328/0x630 [ 18.950958] [ 18.950978] Allocated by task 261: [ 18.951054] kasan_save_track+0x20/0x40 [ 18.951104] kasan_save_alloc_info+0x40/0x58 [ 18.951148] __kasan_kmalloc+0xd4/0xd8 [ 18.951413] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.951689] kasan_bitops_generic+0xa0/0x1c8 [ 18.951992] kthread+0x328/0x630 [ 18.952157] [ 18.952416] The buggy address is located 8 bytes inside of [ 18.952416] allocated 9-byte region [fff00000c45d1b00, fff00000c45d1b09) [ 18.952997] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.953393] page_type: f5(slab) [ 18.953459] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 18.953590] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 18.953705] page dumped because: kasan: bad access detected [ 18.953808] [ 18.953908] Memory state around the buggy address: [ 18.953948] fff00000c45d1a00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 18.954146] fff00000c45d1a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 18.954393] >fff00000c45d1b00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.954457] ^ [ 18.954600] fff00000c45d1b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.960290] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.960543] page_type: f5(slab) [ 18.960709] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 18.961108] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 18.961227] page dumped because: kasan: bad access detected [ 18.985818] dump_stack_lvl+0x8c/0xd0 [ 18.986139] __asan_report_load4_noabort+0x20/0x30 [ 18.986209] kasan_atomics_helper+0x40a8/0x4858 [ 18.986283] kasan_atomics+0x198/0x2e0 [ 18.986331] kunit_try_run_case+0x170/0x3f0 [ 18.986609] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.986780] kthread+0x328/0x630 [ 18.986854] ret_from_fork+0x10/0x20 [ 18.986971] [ 18.988703] The buggy address is located 0 bytes to the right of [ 18.988703] allocated 48-byte region [fff00000c65b1c00, fff00000c65b1c30) [ 18.989455] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.990587] fff00000c65b1b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.991067] fff00000c65b1d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.992537] Write of size 4 at addr fff00000c65b1c30 by task kunit_try_catch/265 [ 18.993084] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.993961] kasan_atomics+0x198/0x2e0 [ 18.994623] kasan_save_alloc_info+0x40/0x58 [ 18.994918] ret_from_fork+0x10/0x20 [ 18.995052] The buggy address is located 0 bytes to the right of [ 18.995052] allocated 48-byte region [fff00000c65b1c00, fff00000c65b1c30) [ 18.995564] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b1 [ 18.996872] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.997879] fff00000c65b1b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.998426] fff00000c65b1c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.001615] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.004600] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.006187] The buggy address is located 0 bytes to the right of [ 19.006187] allocated 48-byte region [fff00000c65b1c00, fff00000c65b1c30) [ 19.006626] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b1 [ 19.007776] fff00000c65b1b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.008207] ^ [ 19.008664] fff00000c65b1d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.010059] ==================================================================
[ 15.197478] ================================================================== [ 15.197715] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 15.198043] Write of size 8 at addr ffff888101c9b4a8 by task kunit_try_catch/278 [ 15.198390] [ 15.198500] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.198539] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.198550] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.198569] Call Trace: [ 15.198580] <TASK> [ 15.198593] dump_stack_lvl+0x73/0xb0 [ 15.198619] print_report+0xd1/0x610 [ 15.198641] ? __virt_addr_valid+0x1db/0x2d0 [ 15.198664] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 15.198694] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.198724] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 15.198753] kasan_report+0x141/0x180 [ 15.198775] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 15.198808] kasan_check_range+0x10c/0x1c0 [ 15.198832] __kasan_check_write+0x18/0x20 [ 15.198852] kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 15.198881] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 15.198912] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.198937] ? trace_hardirqs_on+0x37/0xe0 [ 15.198959] ? kasan_bitops_generic+0x92/0x1c0 [ 15.198986] kasan_bitops_generic+0x121/0x1c0 [ 15.199011] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 15.199037] ? __pfx_read_tsc+0x10/0x10 [ 15.199058] ? ktime_get_ts64+0x86/0x230 [ 15.199082] kunit_try_run_case+0x1a5/0x480 [ 15.199106] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.199129] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.199153] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.199178] ? __kthread_parkme+0x82/0x180 [ 15.199198] ? preempt_count_sub+0x50/0x80 [ 15.199222] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.199247] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.199282] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.199308] kthread+0x337/0x6f0 [ 15.199327] ? trace_preempt_on+0x20/0xc0 [ 15.199350] ? __pfx_kthread+0x10/0x10 [ 15.199370] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.199392] ? calculate_sigpending+0x7b/0xa0 [ 15.199416] ? __pfx_kthread+0x10/0x10 [ 15.199437] ret_from_fork+0x116/0x1d0 [ 15.199456] ? __pfx_kthread+0x10/0x10 [ 15.199476] ret_from_fork_asm+0x1a/0x30 [ 15.199506] </TASK> [ 15.199516] [ 15.208559] Allocated by task 278: [ 15.208728] kasan_save_stack+0x45/0x70 [ 15.208903] kasan_save_track+0x18/0x40 [ 15.209163] kasan_save_alloc_info+0x3b/0x50 [ 15.209359] __kasan_kmalloc+0xb7/0xc0 [ 15.209525] __kmalloc_cache_noprof+0x189/0x420 [ 15.209749] kasan_bitops_generic+0x92/0x1c0 [ 15.209917] kunit_try_run_case+0x1a5/0x480 [ 15.210299] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.210542] kthread+0x337/0x6f0 [ 15.210695] ret_from_fork+0x116/0x1d0 [ 15.210884] ret_from_fork_asm+0x1a/0x30 [ 15.211025] [ 15.211098] The buggy address belongs to the object at ffff888101c9b4a0 [ 15.211098] which belongs to the cache kmalloc-16 of size 16 [ 15.213300] The buggy address is located 8 bytes inside of [ 15.213300] allocated 9-byte region [ffff888101c9b4a0, ffff888101c9b4a9) [ 15.213662] [ 15.213736] The buggy address belongs to the physical page: [ 15.213910] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101c9b [ 15.214287] flags: 0x200000000000000(node=0|zone=2) [ 15.214451] page_type: f5(slab) [ 15.214569] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 15.214806] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 15.215026] page dumped because: kasan: bad access detected [ 15.215190] [ 15.215258] Memory state around the buggy address: [ 15.217882] ffff888101c9b380: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 15.218216] ffff888101c9b400: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 15.218545] >ffff888101c9b480: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 15.218769] ^ [ 15.218920] ffff888101c9b500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.219688] ffff888101c9b580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.219926] ================================================================== [ 15.285497] ================================================================== [ 15.285733] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 15.286144] Write of size 8 at addr ffff888101c9b4a8 by task kunit_try_catch/278 [ 15.286961] [ 15.287195] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.287239] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.287252] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.287287] Call Trace: [ 15.287304] <TASK> [ 15.287319] dump_stack_lvl+0x73/0xb0 [ 15.287348] print_report+0xd1/0x610 [ 15.287369] ? __virt_addr_valid+0x1db/0x2d0 [ 15.287392] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 15.287421] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.287445] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 15.287475] kasan_report+0x141/0x180 [ 15.287507] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 15.287540] kasan_check_range+0x10c/0x1c0 [ 15.287564] __kasan_check_write+0x18/0x20 [ 15.287583] kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 15.287612] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 15.287643] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.287668] ? trace_hardirqs_on+0x37/0xe0 [ 15.287690] ? kasan_bitops_generic+0x92/0x1c0 [ 15.287717] kasan_bitops_generic+0x121/0x1c0 [ 15.287741] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 15.287767] ? __pfx_read_tsc+0x10/0x10 [ 15.287787] ? ktime_get_ts64+0x86/0x230 [ 15.287811] kunit_try_run_case+0x1a5/0x480 [ 15.287834] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.287858] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.287882] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.287905] ? __kthread_parkme+0x82/0x180 [ 15.287926] ? preempt_count_sub+0x50/0x80 [ 15.287949] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.287974] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.288010] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.288035] kthread+0x337/0x6f0 [ 15.288055] ? trace_preempt_on+0x20/0xc0 [ 15.288076] ? __pfx_kthread+0x10/0x10 [ 15.288098] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.288118] ? calculate_sigpending+0x7b/0xa0 [ 15.288142] ? __pfx_kthread+0x10/0x10 [ 15.288164] ret_from_fork+0x116/0x1d0 [ 15.288182] ? __pfx_kthread+0x10/0x10 [ 15.288202] ret_from_fork_asm+0x1a/0x30 [ 15.288232] </TASK> [ 15.288242] [ 15.303229] Allocated by task 278: [ 15.303554] kasan_save_stack+0x45/0x70 [ 15.303906] kasan_save_track+0x18/0x40 [ 15.304327] kasan_save_alloc_info+0x3b/0x50 [ 15.304720] __kasan_kmalloc+0xb7/0xc0 [ 15.305115] __kmalloc_cache_noprof+0x189/0x420 [ 15.305535] kasan_bitops_generic+0x92/0x1c0 [ 15.305916] kunit_try_run_case+0x1a5/0x480 [ 15.306353] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.306547] kthread+0x337/0x6f0 [ 15.306669] ret_from_fork+0x116/0x1d0 [ 15.306806] ret_from_fork_asm+0x1a/0x30 [ 15.306945] [ 15.307135] The buggy address belongs to the object at ffff888101c9b4a0 [ 15.307135] which belongs to the cache kmalloc-16 of size 16 [ 15.308339] The buggy address is located 8 bytes inside of [ 15.308339] allocated 9-byte region [ffff888101c9b4a0, ffff888101c9b4a9) [ 15.309572] [ 15.309730] The buggy address belongs to the physical page: [ 15.310369] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101c9b [ 15.311047] flags: 0x200000000000000(node=0|zone=2) [ 15.311529] page_type: f5(slab) [ 15.311818] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 15.312346] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 15.312581] page dumped because: kasan: bad access detected [ 15.312753] [ 15.312821] Memory state around the buggy address: [ 15.313024] ffff888101c9b380: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 15.313682] ffff888101c9b400: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 15.314462] >ffff888101c9b480: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 15.315083] ^ [ 15.315592] ffff888101c9b500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.316426] ffff888101c9b580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.317209] ================================================================== [ 15.241233] ================================================================== [ 15.241561] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 15.241858] Write of size 8 at addr ffff888101c9b4a8 by task kunit_try_catch/278 [ 15.242160] [ 15.242273] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.242313] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.242325] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.242344] Call Trace: [ 15.242359] <TASK> [ 15.242372] dump_stack_lvl+0x73/0xb0 [ 15.242458] print_report+0xd1/0x610 [ 15.242481] ? __virt_addr_valid+0x1db/0x2d0 [ 15.242503] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 15.242532] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.242556] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 15.242586] kasan_report+0x141/0x180 [ 15.242608] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 15.242645] kasan_check_range+0x10c/0x1c0 [ 15.242668] __kasan_check_write+0x18/0x20 [ 15.242689] kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 15.242726] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 15.242757] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.242782] ? trace_hardirqs_on+0x37/0xe0 [ 15.242804] ? kasan_bitops_generic+0x92/0x1c0 [ 15.242831] kasan_bitops_generic+0x121/0x1c0 [ 15.242855] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 15.242881] ? __pfx_read_tsc+0x10/0x10 [ 15.242903] ? ktime_get_ts64+0x86/0x230 [ 15.242927] kunit_try_run_case+0x1a5/0x480 [ 15.242950] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.242973] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.243044] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.243068] ? __kthread_parkme+0x82/0x180 [ 15.243088] ? preempt_count_sub+0x50/0x80 [ 15.243111] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.243136] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.243161] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.243186] kthread+0x337/0x6f0 [ 15.243205] ? trace_preempt_on+0x20/0xc0 [ 15.243227] ? __pfx_kthread+0x10/0x10 [ 15.243248] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.243281] ? calculate_sigpending+0x7b/0xa0 [ 15.243313] ? __pfx_kthread+0x10/0x10 [ 15.243334] ret_from_fork+0x116/0x1d0 [ 15.243352] ? __pfx_kthread+0x10/0x10 [ 15.243373] ret_from_fork_asm+0x1a/0x30 [ 15.243402] </TASK> [ 15.243411] [ 15.251807] Allocated by task 278: [ 15.251937] kasan_save_stack+0x45/0x70 [ 15.252104] kasan_save_track+0x18/0x40 [ 15.252302] kasan_save_alloc_info+0x3b/0x50 [ 15.252510] __kasan_kmalloc+0xb7/0xc0 [ 15.252823] __kmalloc_cache_noprof+0x189/0x420 [ 15.253050] kasan_bitops_generic+0x92/0x1c0 [ 15.253373] kunit_try_run_case+0x1a5/0x480 [ 15.253526] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.253702] kthread+0x337/0x6f0 [ 15.253871] ret_from_fork+0x116/0x1d0 [ 15.254316] ret_from_fork_asm+0x1a/0x30 [ 15.254539] [ 15.254634] The buggy address belongs to the object at ffff888101c9b4a0 [ 15.254634] which belongs to the cache kmalloc-16 of size 16 [ 15.255211] The buggy address is located 8 bytes inside of [ 15.255211] allocated 9-byte region [ffff888101c9b4a0, ffff888101c9b4a9) [ 15.255717] [ 15.255789] The buggy address belongs to the physical page: [ 15.255960] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101c9b [ 15.256197] flags: 0x200000000000000(node=0|zone=2) [ 15.256763] page_type: f5(slab) [ 15.256935] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 15.257478] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 15.257710] page dumped because: kasan: bad access detected [ 15.257881] [ 15.257950] Memory state around the buggy address: [ 15.258399] ffff888101c9b380: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 15.258738] ffff888101c9b400: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 15.259275] >ffff888101c9b480: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 15.259562] ^ [ 15.259760] ffff888101c9b500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.260027] ffff888101c9b580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.260391] ================================================================== [ 15.357547] ================================================================== [ 15.358086] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 15.358479] Read of size 8 at addr ffff888101c9b4a8 by task kunit_try_catch/278 [ 15.358747] [ 15.358829] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.358868] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.358881] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.358903] Call Trace: [ 15.358917] <TASK> [ 15.358932] dump_stack_lvl+0x73/0xb0 [ 15.358959] print_report+0xd1/0x610 [ 15.358980] ? __virt_addr_valid+0x1db/0x2d0 [ 15.359003] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 15.359033] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.359056] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 15.359086] kasan_report+0x141/0x180 [ 15.359108] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 15.359142] __asan_report_load8_noabort+0x18/0x20 [ 15.359168] kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 15.359198] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 15.359229] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.359253] ? trace_hardirqs_on+0x37/0xe0 [ 15.359285] ? kasan_bitops_generic+0x92/0x1c0 [ 15.359313] kasan_bitops_generic+0x121/0x1c0 [ 15.359338] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 15.359363] ? __pfx_read_tsc+0x10/0x10 [ 15.359384] ? ktime_get_ts64+0x86/0x230 [ 15.359408] kunit_try_run_case+0x1a5/0x480 [ 15.359432] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.359455] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.359480] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.359504] ? __kthread_parkme+0x82/0x180 [ 15.359525] ? preempt_count_sub+0x50/0x80 [ 15.359549] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.359573] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.359600] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.359626] kthread+0x337/0x6f0 [ 15.359645] ? trace_preempt_on+0x20/0xc0 [ 15.359667] ? __pfx_kthread+0x10/0x10 [ 15.359688] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.359710] ? calculate_sigpending+0x7b/0xa0 [ 15.359733] ? __pfx_kthread+0x10/0x10 [ 15.359755] ret_from_fork+0x116/0x1d0 [ 15.359774] ? __pfx_kthread+0x10/0x10 [ 15.359794] ret_from_fork_asm+0x1a/0x30 [ 15.359825] </TASK> [ 15.359834] [ 15.367976] Allocated by task 278: [ 15.368145] kasan_save_stack+0x45/0x70 [ 15.368341] kasan_save_track+0x18/0x40 [ 15.368481] kasan_save_alloc_info+0x3b/0x50 [ 15.368631] __kasan_kmalloc+0xb7/0xc0 [ 15.368763] __kmalloc_cache_noprof+0x189/0x420 [ 15.368943] kasan_bitops_generic+0x92/0x1c0 [ 15.369148] kunit_try_run_case+0x1a5/0x480 [ 15.369444] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.369705] kthread+0x337/0x6f0 [ 15.369872] ret_from_fork+0x116/0x1d0 [ 15.370088] ret_from_fork_asm+0x1a/0x30 [ 15.370283] [ 15.370377] The buggy address belongs to the object at ffff888101c9b4a0 [ 15.370377] which belongs to the cache kmalloc-16 of size 16 [ 15.370777] The buggy address is located 8 bytes inside of [ 15.370777] allocated 9-byte region [ffff888101c9b4a0, ffff888101c9b4a9) [ 15.371207] [ 15.371309] The buggy address belongs to the physical page: [ 15.371598] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101c9b [ 15.372044] flags: 0x200000000000000(node=0|zone=2) [ 15.372206] page_type: f5(slab) [ 15.372378] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 15.372725] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 15.373025] page dumped because: kasan: bad access detected [ 15.373196] [ 15.373272] Memory state around the buggy address: [ 15.373424] ffff888101c9b380: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 15.373706] ffff888101c9b400: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 15.374023] >ffff888101c9b480: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 15.374389] ^ [ 15.374799] ffff888101c9b500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.375017] ffff888101c9b580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.375229] ================================================================== [ 15.220387] ================================================================== [ 15.221180] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 15.221836] Write of size 8 at addr ffff888101c9b4a8 by task kunit_try_catch/278 [ 15.222507] [ 15.222622] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.222665] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.222677] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.222700] Call Trace: [ 15.222720] <TASK> [ 15.222734] dump_stack_lvl+0x73/0xb0 [ 15.222764] print_report+0xd1/0x610 [ 15.222786] ? __virt_addr_valid+0x1db/0x2d0 [ 15.222808] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 15.222837] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.222860] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 15.222890] kasan_report+0x141/0x180 [ 15.222912] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 15.222946] kasan_check_range+0x10c/0x1c0 [ 15.222969] __kasan_check_write+0x18/0x20 [ 15.222989] kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 15.223018] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 15.223061] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.223087] ? trace_hardirqs_on+0x37/0xe0 [ 15.223109] ? kasan_bitops_generic+0x92/0x1c0 [ 15.223136] kasan_bitops_generic+0x121/0x1c0 [ 15.223160] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 15.223185] ? __pfx_read_tsc+0x10/0x10 [ 15.223205] ? ktime_get_ts64+0x86/0x230 [ 15.223228] kunit_try_run_case+0x1a5/0x480 [ 15.223253] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.223349] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.223375] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.223399] ? __kthread_parkme+0x82/0x180 [ 15.223419] ? preempt_count_sub+0x50/0x80 [ 15.223443] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.223468] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.223492] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.223519] kthread+0x337/0x6f0 [ 15.223538] ? trace_preempt_on+0x20/0xc0 [ 15.223561] ? __pfx_kthread+0x10/0x10 [ 15.223581] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.223603] ? calculate_sigpending+0x7b/0xa0 [ 15.223627] ? __pfx_kthread+0x10/0x10 [ 15.223648] ret_from_fork+0x116/0x1d0 [ 15.223667] ? __pfx_kthread+0x10/0x10 [ 15.223687] ret_from_fork_asm+0x1a/0x30 [ 15.223718] </TASK> [ 15.223727] [ 15.232786] Allocated by task 278: [ 15.232973] kasan_save_stack+0x45/0x70 [ 15.233141] kasan_save_track+0x18/0x40 [ 15.233404] kasan_save_alloc_info+0x3b/0x50 [ 15.233596] __kasan_kmalloc+0xb7/0xc0 [ 15.233761] __kmalloc_cache_noprof+0x189/0x420 [ 15.233951] kasan_bitops_generic+0x92/0x1c0 [ 15.234376] kunit_try_run_case+0x1a5/0x480 [ 15.234535] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.234773] kthread+0x337/0x6f0 [ 15.234941] ret_from_fork+0x116/0x1d0 [ 15.235305] ret_from_fork_asm+0x1a/0x30 [ 15.235495] [ 15.235572] The buggy address belongs to the object at ffff888101c9b4a0 [ 15.235572] which belongs to the cache kmalloc-16 of size 16 [ 15.236044] The buggy address is located 8 bytes inside of [ 15.236044] allocated 9-byte region [ffff888101c9b4a0, ffff888101c9b4a9) [ 15.236514] [ 15.236586] The buggy address belongs to the physical page: [ 15.236758] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101c9b [ 15.237068] flags: 0x200000000000000(node=0|zone=2) [ 15.237391] page_type: f5(slab) [ 15.237553] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 15.237947] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 15.238227] page dumped because: kasan: bad access detected [ 15.238412] [ 15.238481] Memory state around the buggy address: [ 15.238639] ffff888101c9b380: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 15.238964] ffff888101c9b400: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 15.239651] >ffff888101c9b480: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 15.240043] ^ [ 15.240289] ffff888101c9b500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.240517] ffff888101c9b580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.240782] ================================================================== [ 15.337547] ================================================================== [ 15.337865] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 15.338457] Read of size 8 at addr ffff888101c9b4a8 by task kunit_try_catch/278 [ 15.338754] [ 15.338854] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.338895] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.338906] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.338926] Call Trace: [ 15.338937] <TASK> [ 15.338950] dump_stack_lvl+0x73/0xb0 [ 15.339034] print_report+0xd1/0x610 [ 15.339061] ? __virt_addr_valid+0x1db/0x2d0 [ 15.339084] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 15.339115] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.339138] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 15.339168] kasan_report+0x141/0x180 [ 15.339189] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 15.339223] kasan_check_range+0x10c/0x1c0 [ 15.339247] __kasan_check_read+0x15/0x20 [ 15.339277] kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 15.339306] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 15.339338] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.339362] ? trace_hardirqs_on+0x37/0xe0 [ 15.339384] ? kasan_bitops_generic+0x92/0x1c0 [ 15.339411] kasan_bitops_generic+0x121/0x1c0 [ 15.339435] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 15.339461] ? __pfx_read_tsc+0x10/0x10 [ 15.339481] ? ktime_get_ts64+0x86/0x230 [ 15.339504] kunit_try_run_case+0x1a5/0x480 [ 15.339529] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.339552] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.339576] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.339600] ? __kthread_parkme+0x82/0x180 [ 15.339620] ? preempt_count_sub+0x50/0x80 [ 15.339643] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.339668] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.339693] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.339719] kthread+0x337/0x6f0 [ 15.339738] ? trace_preempt_on+0x20/0xc0 [ 15.339760] ? __pfx_kthread+0x10/0x10 [ 15.339780] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.339803] ? calculate_sigpending+0x7b/0xa0 [ 15.339827] ? __pfx_kthread+0x10/0x10 [ 15.339848] ret_from_fork+0x116/0x1d0 [ 15.339866] ? __pfx_kthread+0x10/0x10 [ 15.339887] ret_from_fork_asm+0x1a/0x30 [ 15.339917] </TASK> [ 15.339928] [ 15.348849] Allocated by task 278: [ 15.349038] kasan_save_stack+0x45/0x70 [ 15.349191] kasan_save_track+0x18/0x40 [ 15.349339] kasan_save_alloc_info+0x3b/0x50 [ 15.349489] __kasan_kmalloc+0xb7/0xc0 [ 15.349682] __kmalloc_cache_noprof+0x189/0x420 [ 15.349902] kasan_bitops_generic+0x92/0x1c0 [ 15.350119] kunit_try_run_case+0x1a5/0x480 [ 15.350420] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.350669] kthread+0x337/0x6f0 [ 15.350819] ret_from_fork+0x116/0x1d0 [ 15.350989] ret_from_fork_asm+0x1a/0x30 [ 15.351335] [ 15.351408] The buggy address belongs to the object at ffff888101c9b4a0 [ 15.351408] which belongs to the cache kmalloc-16 of size 16 [ 15.351761] The buggy address is located 8 bytes inside of [ 15.351761] allocated 9-byte region [ffff888101c9b4a0, ffff888101c9b4a9) [ 15.352292] [ 15.352385] The buggy address belongs to the physical page: [ 15.352835] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101c9b [ 15.353258] flags: 0x200000000000000(node=0|zone=2) [ 15.353439] page_type: f5(slab) [ 15.353559] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 15.353885] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 15.354505] page dumped because: kasan: bad access detected [ 15.354780] [ 15.354872] Memory state around the buggy address: [ 15.355160] ffff888101c9b380: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 15.355412] ffff888101c9b400: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 15.355627] >ffff888101c9b480: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 15.355935] ^ [ 15.356145] ffff888101c9b500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.356734] ffff888101c9b580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.357162] ================================================================== [ 15.318102] ================================================================== [ 15.318944] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 15.319623] Write of size 8 at addr ffff888101c9b4a8 by task kunit_try_catch/278 [ 15.319854] [ 15.319940] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.319981] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.319992] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.320012] Call Trace: [ 15.320027] <TASK> [ 15.320041] dump_stack_lvl+0x73/0xb0 [ 15.320070] print_report+0xd1/0x610 [ 15.320092] ? __virt_addr_valid+0x1db/0x2d0 [ 15.320114] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 15.320144] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.320166] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 15.320196] kasan_report+0x141/0x180 [ 15.320218] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 15.320252] kasan_check_range+0x10c/0x1c0 [ 15.320291] __kasan_check_write+0x18/0x20 [ 15.320310] kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 15.320340] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 15.320370] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.320395] ? trace_hardirqs_on+0x37/0xe0 [ 15.320416] ? kasan_bitops_generic+0x92/0x1c0 [ 15.320444] kasan_bitops_generic+0x121/0x1c0 [ 15.320467] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 15.320493] ? __pfx_read_tsc+0x10/0x10 [ 15.320514] ? ktime_get_ts64+0x86/0x230 [ 15.320537] kunit_try_run_case+0x1a5/0x480 [ 15.320561] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.320584] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.320608] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.320632] ? __kthread_parkme+0x82/0x180 [ 15.320652] ? preempt_count_sub+0x50/0x80 [ 15.320675] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.320700] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.320724] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.320749] kthread+0x337/0x6f0 [ 15.320768] ? trace_preempt_on+0x20/0xc0 [ 15.320790] ? __pfx_kthread+0x10/0x10 [ 15.320810] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.320832] ? calculate_sigpending+0x7b/0xa0 [ 15.320856] ? __pfx_kthread+0x10/0x10 [ 15.320878] ret_from_fork+0x116/0x1d0 [ 15.320897] ? __pfx_kthread+0x10/0x10 [ 15.320917] ret_from_fork_asm+0x1a/0x30 [ 15.320947] </TASK> [ 15.320956] [ 15.329313] Allocated by task 278: [ 15.329454] kasan_save_stack+0x45/0x70 [ 15.329657] kasan_save_track+0x18/0x40 [ 15.329823] kasan_save_alloc_info+0x3b/0x50 [ 15.329972] __kasan_kmalloc+0xb7/0xc0 [ 15.330207] __kmalloc_cache_noprof+0x189/0x420 [ 15.330449] kasan_bitops_generic+0x92/0x1c0 [ 15.330614] kunit_try_run_case+0x1a5/0x480 [ 15.330801] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.331229] kthread+0x337/0x6f0 [ 15.331392] ret_from_fork+0x116/0x1d0 [ 15.331559] ret_from_fork_asm+0x1a/0x30 [ 15.331699] [ 15.331770] The buggy address belongs to the object at ffff888101c9b4a0 [ 15.331770] which belongs to the cache kmalloc-16 of size 16 [ 15.332121] The buggy address is located 8 bytes inside of [ 15.332121] allocated 9-byte region [ffff888101c9b4a0, ffff888101c9b4a9) [ 15.332646] [ 15.332739] The buggy address belongs to the physical page: [ 15.332987] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101c9b [ 15.333407] flags: 0x200000000000000(node=0|zone=2) [ 15.333659] page_type: f5(slab) [ 15.333779] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 15.334010] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 15.334359] page dumped because: kasan: bad access detected [ 15.334623] [ 15.334717] Memory state around the buggy address: [ 15.334953] ffff888101c9b380: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 15.335429] ffff888101c9b400: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 15.335725] >ffff888101c9b480: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 15.336081] ^ [ 15.336300] ffff888101c9b500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.336579] ffff888101c9b580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.336839] ================================================================== [ 15.178181] ================================================================== [ 15.178503] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 15.178867] Write of size 8 at addr ffff888101c9b4a8 by task kunit_try_catch/278 [ 15.179475] [ 15.179578] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.179621] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.179634] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.179653] Call Trace: [ 15.179665] <TASK> [ 15.179679] dump_stack_lvl+0x73/0xb0 [ 15.179707] print_report+0xd1/0x610 [ 15.179730] ? __virt_addr_valid+0x1db/0x2d0 [ 15.179752] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 15.179781] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.179805] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 15.179835] kasan_report+0x141/0x180 [ 15.179857] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 15.179890] kasan_check_range+0x10c/0x1c0 [ 15.179914] __kasan_check_write+0x18/0x20 [ 15.179934] kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 15.179963] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 15.180283] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.180308] ? trace_hardirqs_on+0x37/0xe0 [ 15.180331] ? kasan_bitops_generic+0x92/0x1c0 [ 15.180358] kasan_bitops_generic+0x121/0x1c0 [ 15.180382] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 15.180408] ? __pfx_read_tsc+0x10/0x10 [ 15.180429] ? ktime_get_ts64+0x86/0x230 [ 15.180453] kunit_try_run_case+0x1a5/0x480 [ 15.180476] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.180500] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.180524] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.180548] ? __kthread_parkme+0x82/0x180 [ 15.180568] ? preempt_count_sub+0x50/0x80 [ 15.180591] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.180616] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.180641] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.180667] kthread+0x337/0x6f0 [ 15.180686] ? trace_preempt_on+0x20/0xc0 [ 15.180708] ? __pfx_kthread+0x10/0x10 [ 15.180729] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.180751] ? calculate_sigpending+0x7b/0xa0 [ 15.180775] ? __pfx_kthread+0x10/0x10 [ 15.180797] ret_from_fork+0x116/0x1d0 [ 15.180815] ? __pfx_kthread+0x10/0x10 [ 15.180836] ret_from_fork_asm+0x1a/0x30 [ 15.180866] </TASK> [ 15.180876] [ 15.189403] Allocated by task 278: [ 15.189539] kasan_save_stack+0x45/0x70 [ 15.189685] kasan_save_track+0x18/0x40 [ 15.189820] kasan_save_alloc_info+0x3b/0x50 [ 15.189969] __kasan_kmalloc+0xb7/0xc0 [ 15.190137] __kmalloc_cache_noprof+0x189/0x420 [ 15.190416] kasan_bitops_generic+0x92/0x1c0 [ 15.190637] kunit_try_run_case+0x1a5/0x480 [ 15.190844] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.191096] kthread+0x337/0x6f0 [ 15.191260] ret_from_fork+0x116/0x1d0 [ 15.191455] ret_from_fork_asm+0x1a/0x30 [ 15.191733] [ 15.191829] The buggy address belongs to the object at ffff888101c9b4a0 [ 15.191829] which belongs to the cache kmalloc-16 of size 16 [ 15.192306] The buggy address is located 8 bytes inside of [ 15.192306] allocated 9-byte region [ffff888101c9b4a0, ffff888101c9b4a9) [ 15.192662] [ 15.192757] The buggy address belongs to the physical page: [ 15.193184] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101c9b [ 15.193566] flags: 0x200000000000000(node=0|zone=2) [ 15.193798] page_type: f5(slab) [ 15.193963] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 15.194330] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 15.194668] page dumped because: kasan: bad access detected [ 15.194895] [ 15.194979] Memory state around the buggy address: [ 15.195168] ffff888101c9b380: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 15.195474] ffff888101c9b400: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 15.195711] >ffff888101c9b480: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 15.196025] ^ [ 15.196207] ffff888101c9b500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.196532] ffff888101c9b580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.196838] ================================================================== [ 15.260818] ================================================================== [ 15.261254] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 15.261653] Write of size 8 at addr ffff888101c9b4a8 by task kunit_try_catch/278 [ 15.261953] [ 15.262190] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.262233] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.262245] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.262279] Call Trace: [ 15.262291] <TASK> [ 15.262302] dump_stack_lvl+0x73/0xb0 [ 15.262329] print_report+0xd1/0x610 [ 15.262352] ? __virt_addr_valid+0x1db/0x2d0 [ 15.262374] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 15.262403] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.262427] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 15.262457] kasan_report+0x141/0x180 [ 15.262478] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 15.262512] kasan_check_range+0x10c/0x1c0 [ 15.262536] __kasan_check_write+0x18/0x20 [ 15.262555] kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 15.262585] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 15.262616] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.262640] ? trace_hardirqs_on+0x37/0xe0 [ 15.262662] ? kasan_bitops_generic+0x92/0x1c0 [ 15.262689] kasan_bitops_generic+0x121/0x1c0 [ 15.262720] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 15.262746] ? __pfx_read_tsc+0x10/0x10 [ 15.262767] ? ktime_get_ts64+0x86/0x230 [ 15.262791] kunit_try_run_case+0x1a5/0x480 [ 15.262815] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.262838] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.262862] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.262886] ? __kthread_parkme+0x82/0x180 [ 15.262905] ? preempt_count_sub+0x50/0x80 [ 15.262929] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.262954] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.262978] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.263060] kthread+0x337/0x6f0 [ 15.263079] ? trace_preempt_on+0x20/0xc0 [ 15.263101] ? __pfx_kthread+0x10/0x10 [ 15.263122] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.263143] ? calculate_sigpending+0x7b/0xa0 [ 15.263167] ? __pfx_kthread+0x10/0x10 [ 15.263189] ret_from_fork+0x116/0x1d0 [ 15.263208] ? __pfx_kthread+0x10/0x10 [ 15.263229] ret_from_fork_asm+0x1a/0x30 [ 15.263259] </TASK> [ 15.263281] [ 15.271857] Allocated by task 278: [ 15.272018] kasan_save_stack+0x45/0x70 [ 15.272219] kasan_save_track+0x18/0x40 [ 15.273567] kasan_save_alloc_info+0x3b/0x50 [ 15.274250] __kasan_kmalloc+0xb7/0xc0 [ 15.274720] __kmalloc_cache_noprof+0x189/0x420 [ 15.275294] kasan_bitops_generic+0x92/0x1c0 [ 15.275549] kunit_try_run_case+0x1a5/0x480 [ 15.275748] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.275998] kthread+0x337/0x6f0 [ 15.276150] ret_from_fork+0x116/0x1d0 [ 15.276332] ret_from_fork_asm+0x1a/0x30 [ 15.276511] [ 15.276607] The buggy address belongs to the object at ffff888101c9b4a0 [ 15.276607] which belongs to the cache kmalloc-16 of size 16 [ 15.277067] The buggy address is located 8 bytes inside of [ 15.277067] allocated 9-byte region [ffff888101c9b4a0, ffff888101c9b4a9) [ 15.278061] [ 15.278394] The buggy address belongs to the physical page: [ 15.278612] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101c9b [ 15.279142] flags: 0x200000000000000(node=0|zone=2) [ 15.279486] page_type: f5(slab) [ 15.279627] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 15.280150] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 15.280496] page dumped because: kasan: bad access detected [ 15.280820] [ 15.280972] Memory state around the buggy address: [ 15.281314] ffff888101c9b380: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 15.282010] ffff888101c9b400: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 15.282518] >ffff888101c9b480: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 15.282821] ^ [ 15.283182] ffff888101c9b500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.283677] ffff888101c9b580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.284506] ==================================================================