Date
July 6, 2025, 11:09 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 | |
x86 |
[ 19.023316] ================================================================== [ 19.023474] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc0 [ 19.023551] Write of size 8 at addr fff00000c1376c68 by task kunit_try_catch/262 [ 19.023604] [ 19.023887] CPU: 1 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.024186] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.024226] Hardware name: linux,dummy-virt (DT) [ 19.024413] Call trace: [ 19.024455] show_stack+0x20/0x38 (C) [ 19.024509] dump_stack_lvl+0x8c/0xd0 [ 19.024594] print_report+0x118/0x608 [ 19.024643] kasan_report+0xdc/0x128 [ 19.024690] kasan_check_range+0x100/0x1a8 [ 19.025035] __kasan_check_write+0x20/0x30 [ 19.025135] kasan_bitops_modify.constprop.0+0x1dc/0xbc0 [ 19.025198] kasan_bitops_generic+0x110/0x1c8 [ 19.025247] kunit_try_run_case+0x170/0x3f0 [ 19.025431] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.025625] kthread+0x328/0x630 [ 19.025762] ret_from_fork+0x10/0x20 [ 19.025817] [ 19.025838] Allocated by task 262: [ 19.025868] kasan_save_stack+0x3c/0x68 [ 19.026033] kasan_save_track+0x20/0x40 [ 19.026087] kasan_save_alloc_info+0x40/0x58 [ 19.026151] __kasan_kmalloc+0xd4/0xd8 [ 19.026307] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.026359] kasan_bitops_generic+0xa0/0x1c8 [ 19.026514] kunit_try_run_case+0x170/0x3f0 [ 19.026569] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.026615] kthread+0x328/0x630 [ 19.026648] ret_from_fork+0x10/0x20 [ 19.026873] [ 19.027038] The buggy address belongs to the object at fff00000c1376c60 [ 19.027038] which belongs to the cache kmalloc-16 of size 16 [ 19.027156] The buggy address is located 8 bytes inside of [ 19.027156] allocated 9-byte region [fff00000c1376c60, fff00000c1376c69) [ 19.027512] [ 19.027593] The buggy address belongs to the physical page: [ 19.027727] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101376 [ 19.027786] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.027887] page_type: f5(slab) [ 19.028388] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 19.028458] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 19.028502] page dumped because: kasan: bad access detected [ 19.029722] [ 19.029764] Memory state around the buggy address: [ 19.029803] fff00000c1376b00: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 19.029862] fff00000c1376b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 19.030325] >fff00000c1376c00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 19.030389] ^ [ 19.030432] fff00000c1376c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.030512] fff00000c1376d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.031004] ================================================================== [ 19.007440] ================================================================== [ 19.007503] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 19.007564] Write of size 8 at addr fff00000c1376c68 by task kunit_try_catch/262 [ 19.007617] [ 19.007693] CPU: 1 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.007780] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.007807] Hardware name: linux,dummy-virt (DT) [ 19.008244] Call trace: [ 19.008287] show_stack+0x20/0x38 (C) [ 19.008343] dump_stack_lvl+0x8c/0xd0 [ 19.008437] print_report+0x118/0x608 [ 19.008514] kasan_report+0xdc/0x128 [ 19.008632] kasan_check_range+0x100/0x1a8 [ 19.008690] __kasan_check_write+0x20/0x30 [ 19.008765] kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 19.008827] kasan_bitops_generic+0x110/0x1c8 [ 19.008876] kunit_try_run_case+0x170/0x3f0 [ 19.009240] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.009344] kthread+0x328/0x630 [ 19.009508] ret_from_fork+0x10/0x20 [ 19.009580] [ 19.009602] Allocated by task 262: [ 19.009794] kasan_save_stack+0x3c/0x68 [ 19.009851] kasan_save_track+0x20/0x40 [ 19.010237] kasan_save_alloc_info+0x40/0x58 [ 19.010490] __kasan_kmalloc+0xd4/0xd8 [ 19.010565] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.010616] kasan_bitops_generic+0xa0/0x1c8 [ 19.010658] kunit_try_run_case+0x170/0x3f0 [ 19.010698] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.011057] kthread+0x328/0x630 [ 19.011195] ret_from_fork+0x10/0x20 [ 19.011339] [ 19.011399] The buggy address belongs to the object at fff00000c1376c60 [ 19.011399] which belongs to the cache kmalloc-16 of size 16 [ 19.011574] The buggy address is located 8 bytes inside of [ 19.011574] allocated 9-byte region [fff00000c1376c60, fff00000c1376c69) [ 19.011892] [ 19.012035] The buggy address belongs to the physical page: [ 19.012154] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101376 [ 19.012335] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.012541] page_type: f5(slab) [ 19.012634] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 19.012850] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 19.013055] page dumped because: kasan: bad access detected [ 19.013240] [ 19.013306] Memory state around the buggy address: [ 19.013402] fff00000c1376b00: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 19.013522] fff00000c1376b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 19.013583] >fff00000c1376c00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 19.013656] ^ [ 19.014032] fff00000c1376c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.014194] fff00000c1376d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.014260] ================================================================== [ 19.037978] ================================================================== [ 19.038779] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbc0 [ 19.038861] Read of size 8 at addr fff00000c1376c68 by task kunit_try_catch/262 [ 19.040995] [ 19.042333] CPU: 1 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.043012] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.043087] Hardware name: linux,dummy-virt (DT) [ 19.043297] Call trace: [ 19.043354] show_stack+0x20/0x38 (C) [ 19.043570] dump_stack_lvl+0x8c/0xd0 [ 19.043827] print_report+0x118/0x608 [ 19.043949] kasan_report+0xdc/0x128 [ 19.044121] __asan_report_load8_noabort+0x20/0x30 [ 19.044294] kasan_bitops_modify.constprop.0+0xa80/0xbc0 [ 19.044354] kasan_bitops_generic+0x110/0x1c8 [ 19.044647] kunit_try_run_case+0x170/0x3f0 [ 19.044855] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.045099] kthread+0x328/0x630 [ 19.045258] ret_from_fork+0x10/0x20 [ 19.045347] [ 19.045512] Allocated by task 262: [ 19.045723] kasan_save_stack+0x3c/0x68 [ 19.045804] kasan_save_track+0x20/0x40 [ 19.045959] kasan_save_alloc_info+0x40/0x58 [ 19.046111] __kasan_kmalloc+0xd4/0xd8 [ 19.046241] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.046289] kasan_bitops_generic+0xa0/0x1c8 [ 19.046750] kunit_try_run_case+0x170/0x3f0 [ 19.047003] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.047170] kthread+0x328/0x630 [ 19.047288] ret_from_fork+0x10/0x20 [ 19.048896] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101376 [ 19.049468] fff00000c1376d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.050529] ================================================================== [ 19.016868] ================================================================== [ 19.017091] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 19.017164] Read of size 8 at addr fff00000c1376c68 by task kunit_try_catch/262 [ 19.017385] [ 19.017447] CPU: 1 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.017542] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.017569] Hardware name: linux,dummy-virt (DT) [ 19.017927] Call trace: [ 19.017983] show_stack+0x20/0x38 (C) [ 19.018141] dump_stack_lvl+0x8c/0xd0 [ 19.018475] print_report+0x118/0x608 [ 19.018534] kasan_report+0xdc/0x128 [ 19.018583] __asan_report_load8_noabort+0x20/0x30 [ 19.018639] kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 19.018710] kasan_bitops_generic+0x110/0x1c8 [ 19.018759] kunit_try_run_case+0x170/0x3f0 [ 19.018809] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.018871] kthread+0x328/0x630 [ 19.018928] ret_from_fork+0x10/0x20 [ 19.018978] [ 19.019008] Allocated by task 262: [ 19.019042] kasan_save_stack+0x3c/0x68 [ 19.019100] kasan_save_track+0x20/0x40 [ 19.019141] kasan_save_alloc_info+0x40/0x58 [ 19.019183] __kasan_kmalloc+0xd4/0xd8 [ 19.019220] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.019261] kasan_bitops_generic+0xa0/0x1c8 [ 19.019309] kunit_try_run_case+0x170/0x3f0 [ 19.019349] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.019403] kthread+0x328/0x630 [ 19.019442] ret_from_fork+0x10/0x20 [ 19.019500] [ 19.019520] The buggy address belongs to the object at fff00000c1376c60 [ 19.019520] which belongs to the cache kmalloc-16 of size 16 [ 19.019588] The buggy address is located 8 bytes inside of [ 19.019588] allocated 9-byte region [fff00000c1376c60, fff00000c1376c69) [ 19.019652] [ 19.019691] The buggy address belongs to the physical page: [ 19.019725] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101376 [ 19.019779] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.019829] page_type: f5(slab) [ 19.019881] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 19.019945] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 19.020131] page dumped because: kasan: bad access detected [ 19.020446] [ 19.020814] Memory state around the buggy address: [ 19.020887] fff00000c1376b00: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 19.020981] fff00000c1376b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 19.021055] >fff00000c1376c00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 19.021117] ^ [ 19.021186] fff00000c1376c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.021979] fff00000c1376d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.022033] ==================================================================
[ 15.816181] ================================================================== [ 15.816954] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 15.817557] Write of size 8 at addr ffff8881024eb448 by task kunit_try_catch/279 [ 15.818012] [ 15.818201] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.818283] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.818305] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.818342] Call Trace: [ 15.818370] <TASK> [ 15.818397] dump_stack_lvl+0x73/0xb0 [ 15.818448] print_report+0xd1/0x650 [ 15.818471] ? __virt_addr_valid+0x1db/0x2d0 [ 15.818495] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 15.818519] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.818542] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 15.818563] kasan_report+0x141/0x180 [ 15.818583] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 15.818662] kasan_check_range+0x10c/0x1c0 [ 15.818711] __kasan_check_write+0x18/0x20 [ 15.818749] kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 15.818796] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 15.818845] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.818887] ? trace_hardirqs_on+0x37/0xe0 [ 15.818932] ? kasan_bitops_generic+0x92/0x1c0 [ 15.818984] kasan_bitops_generic+0x116/0x1c0 [ 15.819009] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 15.819031] ? __pfx_read_tsc+0x10/0x10 [ 15.819050] ? ktime_get_ts64+0x86/0x230 [ 15.819072] kunit_try_run_case+0x1a5/0x480 [ 15.819093] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.819132] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.819155] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.819175] ? __kthread_parkme+0x82/0x180 [ 15.819193] ? preempt_count_sub+0x50/0x80 [ 15.819215] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.819235] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.819255] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.819276] kthread+0x337/0x6f0 [ 15.819294] ? trace_preempt_on+0x20/0xc0 [ 15.819313] ? __pfx_kthread+0x10/0x10 [ 15.819332] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.819350] ? calculate_sigpending+0x7b/0xa0 [ 15.819371] ? __pfx_kthread+0x10/0x10 [ 15.819392] ret_from_fork+0x116/0x1d0 [ 15.819409] ? __pfx_kthread+0x10/0x10 [ 15.819427] ret_from_fork_asm+0x1a/0x30 [ 15.819456] </TASK> [ 15.819468] [ 15.831142] Allocated by task 279: [ 15.831437] kasan_save_stack+0x45/0x70 [ 15.831735] kasan_save_track+0x18/0x40 [ 15.831984] kasan_save_alloc_info+0x3b/0x50 [ 15.832339] __kasan_kmalloc+0xb7/0xc0 [ 15.832595] __kmalloc_cache_noprof+0x189/0x420 [ 15.832969] kasan_bitops_generic+0x92/0x1c0 [ 15.833316] kunit_try_run_case+0x1a5/0x480 [ 15.833687] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.833993] kthread+0x337/0x6f0 [ 15.834273] ret_from_fork+0x116/0x1d0 [ 15.834549] ret_from_fork_asm+0x1a/0x30 [ 15.834739] [ 15.834897] The buggy address belongs to the object at ffff8881024eb440 [ 15.834897] which belongs to the cache kmalloc-16 of size 16 [ 15.835750] The buggy address is located 8 bytes inside of [ 15.835750] allocated 9-byte region [ffff8881024eb440, ffff8881024eb449) [ 15.836301] [ 15.836489] The buggy address belongs to the physical page: [ 15.836815] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024eb [ 15.837290] flags: 0x200000000000000(node=0|zone=2) [ 15.837612] page_type: f5(slab) [ 15.837783] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 15.838337] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 15.838840] page dumped because: kasan: bad access detected [ 15.839331] [ 15.839531] Memory state around the buggy address: [ 15.839961] ffff8881024eb300: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 15.840312] ffff8881024eb380: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 15.840456] >ffff8881024eb400: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 15.840572] ^ [ 15.840737] ffff8881024eb480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.841204] ffff8881024eb500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.841697] ================================================================== [ 15.751114] ================================================================== [ 15.751597] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50 [ 15.751909] Write of size 8 at addr ffff8881024eb448 by task kunit_try_catch/279 [ 15.752517] [ 15.753342] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.753435] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.753459] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.753499] Call Trace: [ 15.753526] <TASK> [ 15.753562] dump_stack_lvl+0x73/0xb0 [ 15.753640] print_report+0xd1/0x650 [ 15.753676] ? __virt_addr_valid+0x1db/0x2d0 [ 15.753709] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 15.753743] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.753777] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 15.753806] kasan_report+0x141/0x180 [ 15.753827] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 15.753853] kasan_check_range+0x10c/0x1c0 [ 15.753873] __kasan_check_write+0x18/0x20 [ 15.753891] kasan_bitops_modify.constprop.0+0x373/0xd50 [ 15.753923] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 15.753949] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.753971] ? trace_hardirqs_on+0x37/0xe0 [ 15.753992] ? kasan_bitops_generic+0x92/0x1c0 [ 15.754017] kasan_bitops_generic+0x116/0x1c0 [ 15.754038] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 15.754060] ? __pfx_read_tsc+0x10/0x10 [ 15.754078] ? ktime_get_ts64+0x86/0x230 [ 15.754102] kunit_try_run_case+0x1a5/0x480 [ 15.754132] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.754152] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.754172] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.754192] ? __kthread_parkme+0x82/0x180 [ 15.754210] ? preempt_count_sub+0x50/0x80 [ 15.754232] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.754253] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.754272] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.754292] kthread+0x337/0x6f0 [ 15.754310] ? trace_preempt_on+0x20/0xc0 [ 15.754330] ? __pfx_kthread+0x10/0x10 [ 15.754349] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.754367] ? calculate_sigpending+0x7b/0xa0 [ 15.754388] ? __pfx_kthread+0x10/0x10 [ 15.754408] ret_from_fork+0x116/0x1d0 [ 15.754424] ? __pfx_kthread+0x10/0x10 [ 15.754442] ret_from_fork_asm+0x1a/0x30 [ 15.754470] </TASK> [ 15.754481] [ 15.766708] Allocated by task 279: [ 15.767094] kasan_save_stack+0x45/0x70 [ 15.767495] kasan_save_track+0x18/0x40 [ 15.767987] kasan_save_alloc_info+0x3b/0x50 [ 15.768341] __kasan_kmalloc+0xb7/0xc0 [ 15.768509] __kmalloc_cache_noprof+0x189/0x420 [ 15.769450] kasan_bitops_generic+0x92/0x1c0 [ 15.770019] kunit_try_run_case+0x1a5/0x480 [ 15.770349] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.770782] kthread+0x337/0x6f0 [ 15.771121] ret_from_fork+0x116/0x1d0 [ 15.771457] ret_from_fork_asm+0x1a/0x30 [ 15.771934] [ 15.772050] The buggy address belongs to the object at ffff8881024eb440 [ 15.772050] which belongs to the cache kmalloc-16 of size 16 [ 15.773019] The buggy address is located 8 bytes inside of [ 15.773019] allocated 9-byte region [ffff8881024eb440, ffff8881024eb449) [ 15.773800] [ 15.774455] The buggy address belongs to the physical page: [ 15.774878] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024eb [ 15.775341] flags: 0x200000000000000(node=0|zone=2) [ 15.775697] page_type: f5(slab) [ 15.775981] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 15.776397] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 15.777181] page dumped because: kasan: bad access detected [ 15.777640] [ 15.777944] Memory state around the buggy address: [ 15.778220] ffff8881024eb300: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 15.779120] ffff8881024eb380: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 15.779802] >ffff8881024eb400: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 15.780235] ^ [ 15.780696] ffff8881024eb480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.781452] ffff8881024eb500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.782185] ================================================================== [ 15.625124] ================================================================== [ 15.625535] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50 [ 15.626059] Write of size 8 at addr ffff8881024eb448 by task kunit_try_catch/279 [ 15.626673] [ 15.626829] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.626893] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.626909] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.626936] Call Trace: [ 15.626956] <TASK> [ 15.626979] dump_stack_lvl+0x73/0xb0 [ 15.627022] print_report+0xd1/0x650 [ 15.627049] ? __virt_addr_valid+0x1db/0x2d0 [ 15.627078] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 15.627108] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.627645] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 15.627711] kasan_report+0x141/0x180 [ 15.627757] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 15.627806] kasan_check_range+0x10c/0x1c0 [ 15.627842] __kasan_check_write+0x18/0x20 [ 15.627876] kasan_bitops_modify.constprop.0+0x101/0xd50 [ 15.627919] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 15.627984] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.628029] ? trace_hardirqs_on+0x37/0xe0 [ 15.628064] ? kasan_bitops_generic+0x92/0x1c0 [ 15.628126] kasan_bitops_generic+0x116/0x1c0 [ 15.628168] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 15.628209] ? __pfx_read_tsc+0x10/0x10 [ 15.628286] ? ktime_get_ts64+0x86/0x230 [ 15.628335] kunit_try_run_case+0x1a5/0x480 [ 15.628375] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.628396] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.628419] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.628440] ? __kthread_parkme+0x82/0x180 [ 15.628458] ? preempt_count_sub+0x50/0x80 [ 15.628480] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.628512] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.628572] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.628604] kthread+0x337/0x6f0 [ 15.628649] ? trace_preempt_on+0x20/0xc0 [ 15.628672] ? __pfx_kthread+0x10/0x10 [ 15.628691] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.628710] ? calculate_sigpending+0x7b/0xa0 [ 15.628732] ? __pfx_kthread+0x10/0x10 [ 15.628752] ret_from_fork+0x116/0x1d0 [ 15.628768] ? __pfx_kthread+0x10/0x10 [ 15.628787] ret_from_fork_asm+0x1a/0x30 [ 15.628815] </TASK> [ 15.628828] [ 15.641492] Allocated by task 279: [ 15.641929] kasan_save_stack+0x45/0x70 [ 15.642198] kasan_save_track+0x18/0x40 [ 15.642564] kasan_save_alloc_info+0x3b/0x50 [ 15.642807] __kasan_kmalloc+0xb7/0xc0 [ 15.643556] __kmalloc_cache_noprof+0x189/0x420 [ 15.643925] kasan_bitops_generic+0x92/0x1c0 [ 15.644246] kunit_try_run_case+0x1a5/0x480 [ 15.644696] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.645096] kthread+0x337/0x6f0 [ 15.645411] ret_from_fork+0x116/0x1d0 [ 15.645769] ret_from_fork_asm+0x1a/0x30 [ 15.646074] [ 15.646228] The buggy address belongs to the object at ffff8881024eb440 [ 15.646228] which belongs to the cache kmalloc-16 of size 16 [ 15.647010] The buggy address is located 8 bytes inside of [ 15.647010] allocated 9-byte region [ffff8881024eb440, ffff8881024eb449) [ 15.648123] [ 15.648409] The buggy address belongs to the physical page: [ 15.648757] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024eb [ 15.649367] flags: 0x200000000000000(node=0|zone=2) [ 15.649760] page_type: f5(slab) [ 15.650041] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 15.650340] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 15.650725] page dumped because: kasan: bad access detected [ 15.650972] [ 15.651373] Memory state around the buggy address: [ 15.652046] ffff8881024eb300: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 15.652461] ffff8881024eb380: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 15.652846] >ffff8881024eb400: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 15.653056] ^ [ 15.653841] ffff8881024eb480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.654430] ffff8881024eb500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.654765] ================================================================== [ 15.655246] ================================================================== [ 15.655833] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 15.656354] Write of size 8 at addr ffff8881024eb448 by task kunit_try_catch/279 [ 15.656958] [ 15.657121] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.657203] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.657227] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.657264] Call Trace: [ 15.657286] <TASK> [ 15.657312] dump_stack_lvl+0x73/0xb0 [ 15.657368] print_report+0xd1/0x650 [ 15.657408] ? __virt_addr_valid+0x1db/0x2d0 [ 15.657449] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 15.657625] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.657684] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 15.657730] kasan_report+0x141/0x180 [ 15.657774] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 15.657831] kasan_check_range+0x10c/0x1c0 [ 15.657874] __kasan_check_write+0x18/0x20 [ 15.657917] kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 15.657962] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 15.657998] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.658025] ? trace_hardirqs_on+0x37/0xe0 [ 15.658045] ? kasan_bitops_generic+0x92/0x1c0 [ 15.658070] kasan_bitops_generic+0x116/0x1c0 [ 15.658091] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 15.658120] ? __pfx_read_tsc+0x10/0x10 [ 15.658142] ? ktime_get_ts64+0x86/0x230 [ 15.658164] kunit_try_run_case+0x1a5/0x480 [ 15.658184] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.658203] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.658224] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.658243] ? __kthread_parkme+0x82/0x180 [ 15.658261] ? preempt_count_sub+0x50/0x80 [ 15.658282] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.658302] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.658322] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.658342] kthread+0x337/0x6f0 [ 15.658359] ? trace_preempt_on+0x20/0xc0 [ 15.658379] ? __pfx_kthread+0x10/0x10 [ 15.658396] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.658414] ? calculate_sigpending+0x7b/0xa0 [ 15.658435] ? __pfx_kthread+0x10/0x10 [ 15.658453] ret_from_fork+0x116/0x1d0 [ 15.658470] ? __pfx_kthread+0x10/0x10 [ 15.658488] ret_from_fork_asm+0x1a/0x30 [ 15.658528] </TASK> [ 15.658544] [ 15.671045] Allocated by task 279: [ 15.671466] kasan_save_stack+0x45/0x70 [ 15.671664] kasan_save_track+0x18/0x40 [ 15.671878] kasan_save_alloc_info+0x3b/0x50 [ 15.672596] __kasan_kmalloc+0xb7/0xc0 [ 15.673063] __kmalloc_cache_noprof+0x189/0x420 [ 15.673574] kasan_bitops_generic+0x92/0x1c0 [ 15.673774] kunit_try_run_case+0x1a5/0x480 [ 15.673920] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.674098] kthread+0x337/0x6f0 [ 15.674215] ret_from_fork+0x116/0x1d0 [ 15.674770] ret_from_fork_asm+0x1a/0x30 [ 15.675075] [ 15.675954] The buggy address belongs to the object at ffff8881024eb440 [ 15.675954] which belongs to the cache kmalloc-16 of size 16 [ 15.676498] The buggy address is located 8 bytes inside of [ 15.676498] allocated 9-byte region [ffff8881024eb440, ffff8881024eb449) [ 15.678980] [ 15.679441] The buggy address belongs to the physical page: [ 15.679976] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024eb [ 15.681243] flags: 0x200000000000000(node=0|zone=2) [ 15.682161] page_type: f5(slab) [ 15.682437] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 15.682694] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 15.682902] page dumped because: kasan: bad access detected [ 15.683075] [ 15.683164] Memory state around the buggy address: [ 15.683897] ffff8881024eb300: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 15.684697] ffff8881024eb380: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 15.685340] >ffff8881024eb400: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 15.685997] ^ [ 15.686463] ffff8881024eb480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.687166] ffff8881024eb500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.687532] ================================================================== [ 15.718182] ================================================================== [ 15.718647] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 15.719161] Write of size 8 at addr ffff8881024eb448 by task kunit_try_catch/279 [ 15.719682] [ 15.719811] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.719867] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.719880] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.719905] Call Trace: [ 15.719923] <TASK> [ 15.719943] dump_stack_lvl+0x73/0xb0 [ 15.719977] print_report+0xd1/0x650 [ 15.719997] ? __virt_addr_valid+0x1db/0x2d0 [ 15.720018] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 15.720040] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.720063] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 15.720086] kasan_report+0x141/0x180 [ 15.720111] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 15.720153] kasan_check_range+0x10c/0x1c0 [ 15.720191] __kasan_check_write+0x18/0x20 [ 15.720223] kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 15.720261] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 15.720298] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.720337] ? trace_hardirqs_on+0x37/0xe0 [ 15.720375] ? kasan_bitops_generic+0x92/0x1c0 [ 15.720425] kasan_bitops_generic+0x116/0x1c0 [ 15.720463] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 15.720503] ? __pfx_read_tsc+0x10/0x10 [ 15.720538] ? ktime_get_ts64+0x86/0x230 [ 15.720585] kunit_try_run_case+0x1a5/0x480 [ 15.720734] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.720778] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.720822] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.720859] ? __kthread_parkme+0x82/0x180 [ 15.720896] ? preempt_count_sub+0x50/0x80 [ 15.720941] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.720978] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.721015] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.721055] kthread+0x337/0x6f0 [ 15.721091] ? trace_preempt_on+0x20/0xc0 [ 15.721130] ? __pfx_kthread+0x10/0x10 [ 15.721168] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.721205] ? calculate_sigpending+0x7b/0xa0 [ 15.721245] ? __pfx_kthread+0x10/0x10 [ 15.721286] ret_from_fork+0x116/0x1d0 [ 15.721320] ? __pfx_kthread+0x10/0x10 [ 15.721361] ret_from_fork_asm+0x1a/0x30 [ 15.721415] </TASK> [ 15.721436] [ 15.735934] Allocated by task 279: [ 15.736283] kasan_save_stack+0x45/0x70 [ 15.736491] kasan_save_track+0x18/0x40 [ 15.736673] kasan_save_alloc_info+0x3b/0x50 [ 15.737019] __kasan_kmalloc+0xb7/0xc0 [ 15.737336] __kmalloc_cache_noprof+0x189/0x420 [ 15.737672] kasan_bitops_generic+0x92/0x1c0 [ 15.737849] kunit_try_run_case+0x1a5/0x480 [ 15.738157] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.738386] kthread+0x337/0x6f0 [ 15.738535] ret_from_fork+0x116/0x1d0 [ 15.738997] ret_from_fork_asm+0x1a/0x30 [ 15.739393] [ 15.739541] The buggy address belongs to the object at ffff8881024eb440 [ 15.739541] which belongs to the cache kmalloc-16 of size 16 [ 15.740106] The buggy address is located 8 bytes inside of [ 15.740106] allocated 9-byte region [ffff8881024eb440, ffff8881024eb449) [ 15.741091] [ 15.741205] The buggy address belongs to the physical page: [ 15.741845] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024eb [ 15.742799] flags: 0x200000000000000(node=0|zone=2) [ 15.743581] page_type: f5(slab) [ 15.744015] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 15.744371] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 15.744873] page dumped because: kasan: bad access detected [ 15.745105] [ 15.745253] Memory state around the buggy address: [ 15.746032] ffff8881024eb300: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 15.746635] ffff8881024eb380: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 15.747071] >ffff8881024eb400: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 15.747553] ^ [ 15.748132] ffff8881024eb480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.748355] ffff8881024eb500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.749404] ================================================================== [ 15.842738] ================================================================== [ 15.843228] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50 [ 15.843783] Write of size 8 at addr ffff8881024eb448 by task kunit_try_catch/279 [ 15.844057] [ 15.844261] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.844353] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.844372] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.844402] Call Trace: [ 15.844423] <TASK> [ 15.844460] dump_stack_lvl+0x73/0xb0 [ 15.844529] print_report+0xd1/0x650 [ 15.844567] ? __virt_addr_valid+0x1db/0x2d0 [ 15.844604] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 15.844659] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.844704] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 15.844748] kasan_report+0x141/0x180 [ 15.844832] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 15.844885] kasan_check_range+0x10c/0x1c0 [ 15.844925] __kasan_check_write+0x18/0x20 [ 15.844958] kasan_bitops_modify.constprop.0+0x547/0xd50 [ 15.845005] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 15.845054] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.845099] ? trace_hardirqs_on+0x37/0xe0 [ 15.845181] ? kasan_bitops_generic+0x92/0x1c0 [ 15.845237] kasan_bitops_generic+0x116/0x1c0 [ 15.845281] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 15.845330] ? __pfx_read_tsc+0x10/0x10 [ 15.845368] ? ktime_get_ts64+0x86/0x230 [ 15.845415] kunit_try_run_case+0x1a5/0x480 [ 15.845461] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.845504] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.845549] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.845591] ? __kthread_parkme+0x82/0x180 [ 15.845635] ? preempt_count_sub+0x50/0x80 [ 15.845673] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.845707] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.845738] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.845770] kthread+0x337/0x6f0 [ 15.845799] ? trace_preempt_on+0x20/0xc0 [ 15.845821] ? __pfx_kthread+0x10/0x10 [ 15.845839] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.845858] ? calculate_sigpending+0x7b/0xa0 [ 15.845880] ? __pfx_kthread+0x10/0x10 [ 15.845899] ret_from_fork+0x116/0x1d0 [ 15.845926] ? __pfx_kthread+0x10/0x10 [ 15.845946] ret_from_fork_asm+0x1a/0x30 [ 15.845974] </TASK> [ 15.845986] [ 15.858297] Allocated by task 279: [ 15.858574] kasan_save_stack+0x45/0x70 [ 15.858804] kasan_save_track+0x18/0x40 [ 15.859063] kasan_save_alloc_info+0x3b/0x50 [ 15.859665] __kasan_kmalloc+0xb7/0xc0 [ 15.859911] __kmalloc_cache_noprof+0x189/0x420 [ 15.860150] kasan_bitops_generic+0x92/0x1c0 [ 15.860489] kunit_try_run_case+0x1a5/0x480 [ 15.860743] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.860949] kthread+0x337/0x6f0 [ 15.861218] ret_from_fork+0x116/0x1d0 [ 15.861510] ret_from_fork_asm+0x1a/0x30 [ 15.861754] [ 15.861888] The buggy address belongs to the object at ffff8881024eb440 [ 15.861888] which belongs to the cache kmalloc-16 of size 16 [ 15.862783] The buggy address is located 8 bytes inside of [ 15.862783] allocated 9-byte region [ffff8881024eb440, ffff8881024eb449) [ 15.863817] [ 15.863930] The buggy address belongs to the physical page: [ 15.864126] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024eb [ 15.865010] flags: 0x200000000000000(node=0|zone=2) [ 15.865193] page_type: f5(slab) [ 15.865717] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 15.866264] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 15.866574] page dumped because: kasan: bad access detected [ 15.866886] [ 15.867016] Memory state around the buggy address: [ 15.867628] ffff8881024eb300: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 15.868067] ffff8881024eb380: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 15.868505] >ffff8881024eb400: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 15.869035] ^ [ 15.869577] ffff8881024eb480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.869995] ffff8881024eb500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.870403] ================================================================== [ 15.783055] ================================================================== [ 15.783330] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 15.783962] Write of size 8 at addr ffff8881024eb448 by task kunit_try_catch/279 [ 15.784296] [ 15.784429] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.784512] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.784537] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.784579] Call Trace: [ 15.784607] <TASK> [ 15.784650] dump_stack_lvl+0x73/0xb0 [ 15.784707] print_report+0xd1/0x650 [ 15.784750] ? __virt_addr_valid+0x1db/0x2d0 [ 15.784790] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 15.784836] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.784904] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 15.784940] kasan_report+0x141/0x180 [ 15.784972] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 15.785014] kasan_check_range+0x10c/0x1c0 [ 15.785048] __kasan_check_write+0x18/0x20 [ 15.785077] kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 15.785148] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 15.785212] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.785255] ? trace_hardirqs_on+0x37/0xe0 [ 15.785293] ? kasan_bitops_generic+0x92/0x1c0 [ 15.785343] kasan_bitops_generic+0x116/0x1c0 [ 15.785388] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 15.785433] ? __pfx_read_tsc+0x10/0x10 [ 15.785473] ? ktime_get_ts64+0x86/0x230 [ 15.785528] kunit_try_run_case+0x1a5/0x480 [ 15.785576] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.785631] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.785678] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.785722] ? __kthread_parkme+0x82/0x180 [ 15.785762] ? preempt_count_sub+0x50/0x80 [ 15.785805] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.785849] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.785891] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.785937] kthread+0x337/0x6f0 [ 15.785971] ? trace_preempt_on+0x20/0xc0 [ 15.786063] ? __pfx_kthread+0x10/0x10 [ 15.786094] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.786145] ? calculate_sigpending+0x7b/0xa0 [ 15.786181] ? __pfx_kthread+0x10/0x10 [ 15.786231] ret_from_fork+0x116/0x1d0 [ 15.786268] ? __pfx_kthread+0x10/0x10 [ 15.786300] ret_from_fork_asm+0x1a/0x30 [ 15.786332] </TASK> [ 15.786345] [ 15.800554] Allocated by task 279: [ 15.800737] kasan_save_stack+0x45/0x70 [ 15.800978] kasan_save_track+0x18/0x40 [ 15.801254] kasan_save_alloc_info+0x3b/0x50 [ 15.802287] __kasan_kmalloc+0xb7/0xc0 [ 15.803038] __kmalloc_cache_noprof+0x189/0x420 [ 15.803480] kasan_bitops_generic+0x92/0x1c0 [ 15.803892] kunit_try_run_case+0x1a5/0x480 [ 15.804067] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.804453] kthread+0x337/0x6f0 [ 15.805002] ret_from_fork+0x116/0x1d0 [ 15.805565] ret_from_fork_asm+0x1a/0x30 [ 15.805757] [ 15.805848] The buggy address belongs to the object at ffff8881024eb440 [ 15.805848] which belongs to the cache kmalloc-16 of size 16 [ 15.806458] The buggy address is located 8 bytes inside of [ 15.806458] allocated 9-byte region [ffff8881024eb440, ffff8881024eb449) [ 15.807777] [ 15.807886] The buggy address belongs to the physical page: [ 15.808092] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024eb [ 15.808511] flags: 0x200000000000000(node=0|zone=2) [ 15.809217] page_type: f5(slab) [ 15.809416] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 15.809936] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 15.810336] page dumped because: kasan: bad access detected [ 15.810736] [ 15.811207] Memory state around the buggy address: [ 15.811397] ffff8881024eb300: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 15.812248] ffff8881024eb380: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 15.812566] >ffff8881024eb400: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 15.813177] ^ [ 15.813433] ffff8881024eb480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.814042] ffff8881024eb500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.814847] ================================================================== [ 15.688270] ================================================================== [ 15.688687] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 15.689216] Write of size 8 at addr ffff8881024eb448 by task kunit_try_catch/279 [ 15.689703] [ 15.689964] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.690042] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.690067] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.690129] Call Trace: [ 15.690160] <TASK> [ 15.690190] dump_stack_lvl+0x73/0xb0 [ 15.690241] print_report+0xd1/0x650 [ 15.690277] ? __virt_addr_valid+0x1db/0x2d0 [ 15.690312] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 15.690353] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.690431] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 15.690492] kasan_report+0x141/0x180 [ 15.690541] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 15.690599] kasan_check_range+0x10c/0x1c0 [ 15.690661] __kasan_check_write+0x18/0x20 [ 15.690699] kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 15.690746] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 15.690783] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.690824] ? trace_hardirqs_on+0x37/0xe0 [ 15.690860] ? kasan_bitops_generic+0x92/0x1c0 [ 15.690905] kasan_bitops_generic+0x116/0x1c0 [ 15.690943] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 15.690984] ? __pfx_read_tsc+0x10/0x10 [ 15.691017] ? ktime_get_ts64+0x86/0x230 [ 15.691059] kunit_try_run_case+0x1a5/0x480 [ 15.691101] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.691138] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.691167] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.691187] ? __kthread_parkme+0x82/0x180 [ 15.691205] ? preempt_count_sub+0x50/0x80 [ 15.691227] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.691248] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.691267] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.691287] kthread+0x337/0x6f0 [ 15.691304] ? trace_preempt_on+0x20/0xc0 [ 15.691324] ? __pfx_kthread+0x10/0x10 [ 15.691342] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.691360] ? calculate_sigpending+0x7b/0xa0 [ 15.691381] ? __pfx_kthread+0x10/0x10 [ 15.691399] ret_from_fork+0x116/0x1d0 [ 15.691417] ? __pfx_kthread+0x10/0x10 [ 15.691435] ret_from_fork_asm+0x1a/0x30 [ 15.691462] </TASK> [ 15.691474] [ 15.704664] Allocated by task 279: [ 15.704934] kasan_save_stack+0x45/0x70 [ 15.705221] kasan_save_track+0x18/0x40 [ 15.705402] kasan_save_alloc_info+0x3b/0x50 [ 15.706234] __kasan_kmalloc+0xb7/0xc0 [ 15.706614] __kmalloc_cache_noprof+0x189/0x420 [ 15.707061] kasan_bitops_generic+0x92/0x1c0 [ 15.707365] kunit_try_run_case+0x1a5/0x480 [ 15.707641] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.708085] kthread+0x337/0x6f0 [ 15.708403] ret_from_fork+0x116/0x1d0 [ 15.708734] ret_from_fork_asm+0x1a/0x30 [ 15.709051] [ 15.709236] The buggy address belongs to the object at ffff8881024eb440 [ 15.709236] which belongs to the cache kmalloc-16 of size 16 [ 15.709962] The buggy address is located 8 bytes inside of [ 15.709962] allocated 9-byte region [ffff8881024eb440, ffff8881024eb449) [ 15.711056] [ 15.711272] The buggy address belongs to the physical page: [ 15.711596] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024eb [ 15.712003] flags: 0x200000000000000(node=0|zone=2) [ 15.712636] page_type: f5(slab) [ 15.712813] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 15.713437] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 15.714006] page dumped because: kasan: bad access detected [ 15.714262] [ 15.714421] Memory state around the buggy address: [ 15.714871] ffff8881024eb300: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 15.715279] ffff8881024eb380: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 15.715653] >ffff8881024eb400: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 15.716148] ^ [ 15.716391] ffff8881024eb480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.716814] ffff8881024eb500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.717186] ==================================================================
[ 15.629956] ================================================================== [ 15.630463] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50 [ 15.630978] Write of size 8 at addr ffff888102873128 by task kunit_try_catch/278 [ 15.631507] [ 15.631628] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.631677] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.631777] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.631814] Call Trace: [ 15.631827] <TASK> [ 15.631843] dump_stack_lvl+0x73/0xb0 [ 15.631888] print_report+0xd1/0x650 [ 15.631910] ? __virt_addr_valid+0x1db/0x2d0 [ 15.631934] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 15.631960] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.631986] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 15.632012] kasan_report+0x141/0x180 [ 15.632043] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 15.632084] kasan_check_range+0x10c/0x1c0 [ 15.632118] __kasan_check_write+0x18/0x20 [ 15.632138] kasan_bitops_modify.constprop.0+0x101/0xd50 [ 15.632164] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 15.632192] ? kasan_save_alloc_info+0x3b/0x50 [ 15.632215] ? kasan_save_stack+0x45/0x70 [ 15.632240] kasan_bitops_generic+0x116/0x1c0 [ 15.632264] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 15.632289] ? __pfx_read_tsc+0x10/0x10 [ 15.632311] ? ktime_get_ts64+0x86/0x230 [ 15.632338] kunit_try_run_case+0x1a5/0x480 [ 15.632365] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.632391] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.632416] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.632441] ? __kthread_parkme+0x82/0x180 [ 15.632462] ? preempt_count_sub+0x50/0x80 [ 15.632488] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.632513] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.632535] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.632559] kthread+0x337/0x6f0 [ 15.632580] ? trace_preempt_on+0x20/0xc0 [ 15.632605] ? __pfx_kthread+0x10/0x10 [ 15.632626] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.632647] ? calculate_sigpending+0x7b/0xa0 [ 15.632671] ? __pfx_kthread+0x10/0x10 [ 15.632763] ret_from_fork+0x116/0x1d0 [ 15.632788] ? __pfx_kthread+0x10/0x10 [ 15.632810] ret_from_fork_asm+0x1a/0x30 [ 15.632843] </TASK> [ 15.632855] [ 15.641821] Allocated by task 278: [ 15.642028] kasan_save_stack+0x45/0x70 [ 15.642278] kasan_save_track+0x18/0x40 [ 15.642478] kasan_save_alloc_info+0x3b/0x50 [ 15.642798] __kasan_kmalloc+0xb7/0xc0 [ 15.643004] __kmalloc_cache_noprof+0x189/0x420 [ 15.643180] kasan_bitops_generic+0x92/0x1c0 [ 15.643372] kunit_try_run_case+0x1a5/0x480 [ 15.643599] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.643944] kthread+0x337/0x6f0 [ 15.644103] ret_from_fork+0x116/0x1d0 [ 15.644329] ret_from_fork_asm+0x1a/0x30 [ 15.644499] [ 15.644622] The buggy address belongs to the object at ffff888102873120 [ 15.644622] which belongs to the cache kmalloc-16 of size 16 [ 15.645146] The buggy address is located 8 bytes inside of [ 15.645146] allocated 9-byte region [ffff888102873120, ffff888102873129) [ 15.645887] [ 15.645982] The buggy address belongs to the physical page: [ 15.646178] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102873 [ 15.646544] flags: 0x200000000000000(node=0|zone=2) [ 15.646801] page_type: f5(slab) [ 15.646944] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 15.647232] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 15.647587] page dumped because: kasan: bad access detected [ 15.647847] [ 15.647945] Memory state around the buggy address: [ 15.648387] ffff888102873000: 00 01 fc fc 00 04 fc fc 00 04 fc fc fa fb fc fc [ 15.648767] ffff888102873080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 15.649133] >ffff888102873100: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 15.649447] ^ [ 15.649635] ffff888102873180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.650066] ffff888102873200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.650361] ================================================================== [ 15.694900] ================================================================== [ 15.695242] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 15.695608] Write of size 8 at addr ffff888102873128 by task kunit_try_catch/278 [ 15.695907] [ 15.695996] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.696039] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.696060] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.696082] Call Trace: [ 15.696095] <TASK> [ 15.696110] dump_stack_lvl+0x73/0xb0 [ 15.696136] print_report+0xd1/0x650 [ 15.696157] ? __virt_addr_valid+0x1db/0x2d0 [ 15.696179] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 15.696204] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.696229] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 15.696255] kasan_report+0x141/0x180 [ 15.696277] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 15.696307] kasan_check_range+0x10c/0x1c0 [ 15.696331] __kasan_check_write+0x18/0x20 [ 15.696350] kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 15.696376] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 15.696403] ? kasan_save_alloc_info+0x3b/0x50 [ 15.696427] ? kasan_save_stack+0x45/0x70 [ 15.696451] kasan_bitops_generic+0x116/0x1c0 [ 15.696473] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 15.696499] ? __pfx_read_tsc+0x10/0x10 [ 15.696519] ? ktime_get_ts64+0x86/0x230 [ 15.696544] kunit_try_run_case+0x1a5/0x480 [ 15.696567] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.696588] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.696612] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.696634] ? __kthread_parkme+0x82/0x180 [ 15.696655] ? preempt_count_sub+0x50/0x80 [ 15.696678] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.696702] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.696725] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.696748] kthread+0x337/0x6f0 [ 15.696768] ? trace_preempt_on+0x20/0xc0 [ 15.696791] ? __pfx_kthread+0x10/0x10 [ 15.696811] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.696832] ? calculate_sigpending+0x7b/0xa0 [ 15.696855] ? __pfx_kthread+0x10/0x10 [ 15.696878] ret_from_fork+0x116/0x1d0 [ 15.696896] ? __pfx_kthread+0x10/0x10 [ 15.696917] ret_from_fork_asm+0x1a/0x30 [ 15.696949] </TASK> [ 15.696959] [ 15.707091] Allocated by task 278: [ 15.707295] kasan_save_stack+0x45/0x70 [ 15.707498] kasan_save_track+0x18/0x40 [ 15.707682] kasan_save_alloc_info+0x3b/0x50 [ 15.707889] __kasan_kmalloc+0xb7/0xc0 [ 15.708500] __kmalloc_cache_noprof+0x189/0x420 [ 15.708886] kasan_bitops_generic+0x92/0x1c0 [ 15.709155] kunit_try_run_case+0x1a5/0x480 [ 15.709398] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.709596] kthread+0x337/0x6f0 [ 15.710003] ret_from_fork+0x116/0x1d0 [ 15.710234] ret_from_fork_asm+0x1a/0x30 [ 15.710539] [ 15.710659] The buggy address belongs to the object at ffff888102873120 [ 15.710659] which belongs to the cache kmalloc-16 of size 16 [ 15.711402] The buggy address is located 8 bytes inside of [ 15.711402] allocated 9-byte region [ffff888102873120, ffff888102873129) [ 15.712090] [ 15.712206] The buggy address belongs to the physical page: [ 15.712489] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102873 [ 15.713169] flags: 0x200000000000000(node=0|zone=2) [ 15.713436] page_type: f5(slab) [ 15.713610] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 15.714129] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 15.714484] page dumped because: kasan: bad access detected [ 15.714736] [ 15.714837] Memory state around the buggy address: [ 15.715076] ffff888102873000: 00 01 fc fc 00 04 fc fc 00 04 fc fc fa fb fc fc [ 15.715408] ffff888102873080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 15.715729] >ffff888102873100: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 15.716127] ^ [ 15.716345] ffff888102873180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.716594] ffff888102873200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.717105] ================================================================== [ 15.719469] ================================================================== [ 15.719924] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50 [ 15.720225] Write of size 8 at addr ffff888102873128 by task kunit_try_catch/278 [ 15.720471] [ 15.720568] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.720616] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.720629] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.720652] Call Trace: [ 15.720665] <TASK> [ 15.720681] dump_stack_lvl+0x73/0xb0 [ 15.720709] print_report+0xd1/0x650 [ 15.720733] ? __virt_addr_valid+0x1db/0x2d0 [ 15.720756] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 15.720783] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.720810] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 15.720837] kasan_report+0x141/0x180 [ 15.720860] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 15.721290] kasan_check_range+0x10c/0x1c0 [ 15.721353] __kasan_check_write+0x18/0x20 [ 15.721454] kasan_bitops_modify.constprop.0+0x373/0xd50 [ 15.721559] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 15.721591] ? kasan_save_alloc_info+0x3b/0x50 [ 15.721616] ? kasan_save_stack+0x45/0x70 [ 15.721641] kasan_bitops_generic+0x116/0x1c0 [ 15.721667] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 15.721693] ? __pfx_read_tsc+0x10/0x10 [ 15.721715] ? ktime_get_ts64+0x86/0x230 [ 15.721741] kunit_try_run_case+0x1a5/0x480 [ 15.721766] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.721789] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.721813] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.721837] ? __kthread_parkme+0x82/0x180 [ 15.721857] ? preempt_count_sub+0x50/0x80 [ 15.721882] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.721906] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.721930] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.721953] kthread+0x337/0x6f0 [ 15.721974] ? trace_preempt_on+0x20/0xc0 [ 15.721998] ? __pfx_kthread+0x10/0x10 [ 15.722021] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.722044] ? calculate_sigpending+0x7b/0xa0 [ 15.722080] ? __pfx_kthread+0x10/0x10 [ 15.722103] ret_from_fork+0x116/0x1d0 [ 15.722123] ? __pfx_kthread+0x10/0x10 [ 15.722145] ret_from_fork_asm+0x1a/0x30 [ 15.722180] </TASK> [ 15.722192] [ 15.737173] Allocated by task 278: [ 15.737335] kasan_save_stack+0x45/0x70 [ 15.737549] kasan_save_track+0x18/0x40 [ 15.737695] kasan_save_alloc_info+0x3b/0x50 [ 15.738312] __kasan_kmalloc+0xb7/0xc0 [ 15.738555] __kmalloc_cache_noprof+0x189/0x420 [ 15.738801] kasan_bitops_generic+0x92/0x1c0 [ 15.739132] kunit_try_run_case+0x1a5/0x480 [ 15.739404] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.739632] kthread+0x337/0x6f0 [ 15.739804] ret_from_fork+0x116/0x1d0 [ 15.740220] ret_from_fork_asm+0x1a/0x30 [ 15.740406] [ 15.740497] The buggy address belongs to the object at ffff888102873120 [ 15.740497] which belongs to the cache kmalloc-16 of size 16 [ 15.741123] The buggy address is located 8 bytes inside of [ 15.741123] allocated 9-byte region [ffff888102873120, ffff888102873129) [ 15.741627] [ 15.741729] The buggy address belongs to the physical page: [ 15.741945] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102873 [ 15.742305] flags: 0x200000000000000(node=0|zone=2) [ 15.742529] page_type: f5(slab) [ 15.742677] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 15.743433] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 15.743740] page dumped because: kasan: bad access detected [ 15.744099] [ 15.744202] Memory state around the buggy address: [ 15.744549] ffff888102873000: 00 01 fc fc 00 04 fc fc 00 04 fc fc fa fb fc fc [ 15.745013] ffff888102873080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 15.745410] >ffff888102873100: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 15.745725] ^ [ 15.746081] ffff888102873180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.746459] ffff888102873200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.746890] ================================================================== [ 15.779647] ================================================================== [ 15.779992] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 15.781345] Write of size 8 at addr ffff888102873128 by task kunit_try_catch/278 [ 15.781604] [ 15.781700] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.782679] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.782695] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.782737] Call Trace: [ 15.782755] <TASK> [ 15.782772] dump_stack_lvl+0x73/0xb0 [ 15.782803] print_report+0xd1/0x650 [ 15.782826] ? __virt_addr_valid+0x1db/0x2d0 [ 15.782849] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 15.782875] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.782901] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 15.782926] kasan_report+0x141/0x180 [ 15.782949] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 15.782979] kasan_check_range+0x10c/0x1c0 [ 15.783003] __kasan_check_write+0x18/0x20 [ 15.783022] kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 15.783058] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 15.783095] ? kasan_save_alloc_info+0x3b/0x50 [ 15.783119] ? kasan_save_stack+0x45/0x70 [ 15.783143] kasan_bitops_generic+0x116/0x1c0 [ 15.783166] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 15.783192] ? __pfx_read_tsc+0x10/0x10 [ 15.783213] ? ktime_get_ts64+0x86/0x230 [ 15.783237] kunit_try_run_case+0x1a5/0x480 [ 15.783260] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.783281] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.783304] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.783328] ? __kthread_parkme+0x82/0x180 [ 15.783348] ? preempt_count_sub+0x50/0x80 [ 15.783372] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.783394] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.783416] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.783439] kthread+0x337/0x6f0 [ 15.783458] ? trace_preempt_on+0x20/0xc0 [ 15.783481] ? __pfx_kthread+0x10/0x10 [ 15.783501] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.783521] ? calculate_sigpending+0x7b/0xa0 [ 15.783544] ? __pfx_kthread+0x10/0x10 [ 15.783566] ret_from_fork+0x116/0x1d0 [ 15.783584] ? __pfx_kthread+0x10/0x10 [ 15.783604] ret_from_fork_asm+0x1a/0x30 [ 15.783635] </TASK> [ 15.783646] [ 15.795002] Allocated by task 278: [ 15.795339] kasan_save_stack+0x45/0x70 [ 15.795731] kasan_save_track+0x18/0x40 [ 15.796096] kasan_save_alloc_info+0x3b/0x50 [ 15.796498] __kasan_kmalloc+0xb7/0xc0 [ 15.796879] __kmalloc_cache_noprof+0x189/0x420 [ 15.797307] kasan_bitops_generic+0x92/0x1c0 [ 15.797516] kunit_try_run_case+0x1a5/0x480 [ 15.797673] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.798173] kthread+0x337/0x6f0 [ 15.798492] ret_from_fork+0x116/0x1d0 [ 15.798878] ret_from_fork_asm+0x1a/0x30 [ 15.799246] [ 15.799320] The buggy address belongs to the object at ffff888102873120 [ 15.799320] which belongs to the cache kmalloc-16 of size 16 [ 15.799681] The buggy address is located 8 bytes inside of [ 15.799681] allocated 9-byte region [ffff888102873120, ffff888102873129) [ 15.800768] [ 15.800935] The buggy address belongs to the physical page: [ 15.801422] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102873 [ 15.802145] flags: 0x200000000000000(node=0|zone=2) [ 15.802415] page_type: f5(slab) [ 15.802545] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 15.802931] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 15.803603] page dumped because: kasan: bad access detected [ 15.804110] [ 15.804271] Memory state around the buggy address: [ 15.804706] ffff888102873000: 00 01 fc fc 00 04 fc fc 00 04 fc fc fa fb fc fc [ 15.805001] ffff888102873080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 15.805234] >ffff888102873100: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 15.805457] ^ [ 15.805617] ffff888102873180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.806116] ffff888102873200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.806743] ================================================================== [ 15.672246] ================================================================== [ 15.672623] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 15.673141] Write of size 8 at addr ffff888102873128 by task kunit_try_catch/278 [ 15.673497] [ 15.673637] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.673683] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.673810] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.673833] Call Trace: [ 15.673850] <TASK> [ 15.673879] dump_stack_lvl+0x73/0xb0 [ 15.673910] print_report+0xd1/0x650 [ 15.673933] ? __virt_addr_valid+0x1db/0x2d0 [ 15.673957] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 15.673984] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.674011] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 15.674037] kasan_report+0x141/0x180 [ 15.674070] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 15.674103] kasan_check_range+0x10c/0x1c0 [ 15.674163] __kasan_check_write+0x18/0x20 [ 15.674183] kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 15.674221] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 15.674249] ? kasan_save_alloc_info+0x3b/0x50 [ 15.674274] ? kasan_save_stack+0x45/0x70 [ 15.674299] kasan_bitops_generic+0x116/0x1c0 [ 15.674323] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 15.674350] ? __pfx_read_tsc+0x10/0x10 [ 15.674373] ? ktime_get_ts64+0x86/0x230 [ 15.674397] kunit_try_run_case+0x1a5/0x480 [ 15.674422] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.674445] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.674469] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.674524] ? __kthread_parkme+0x82/0x180 [ 15.674546] ? preempt_count_sub+0x50/0x80 [ 15.674571] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.674607] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.674631] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.674655] kthread+0x337/0x6f0 [ 15.674677] ? trace_preempt_on+0x20/0xc0 [ 15.674781] ? __pfx_kthread+0x10/0x10 [ 15.674804] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.674827] ? calculate_sigpending+0x7b/0xa0 [ 15.674853] ? __pfx_kthread+0x10/0x10 [ 15.674876] ret_from_fork+0x116/0x1d0 [ 15.674896] ? __pfx_kthread+0x10/0x10 [ 15.674918] ret_from_fork_asm+0x1a/0x30 [ 15.674952] </TASK> [ 15.674964] [ 15.684295] Allocated by task 278: [ 15.684490] kasan_save_stack+0x45/0x70 [ 15.684794] kasan_save_track+0x18/0x40 [ 15.684959] kasan_save_alloc_info+0x3b/0x50 [ 15.685231] __kasan_kmalloc+0xb7/0xc0 [ 15.685448] __kmalloc_cache_noprof+0x189/0x420 [ 15.685862] kasan_bitops_generic+0x92/0x1c0 [ 15.686060] kunit_try_run_case+0x1a5/0x480 [ 15.686323] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.686534] kthread+0x337/0x6f0 [ 15.686666] ret_from_fork+0x116/0x1d0 [ 15.687084] ret_from_fork_asm+0x1a/0x30 [ 15.687326] [ 15.687431] The buggy address belongs to the object at ffff888102873120 [ 15.687431] which belongs to the cache kmalloc-16 of size 16 [ 15.688257] The buggy address is located 8 bytes inside of [ 15.688257] allocated 9-byte region [ffff888102873120, ffff888102873129) [ 15.688901] [ 15.689007] The buggy address belongs to the physical page: [ 15.689274] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102873 [ 15.689642] flags: 0x200000000000000(node=0|zone=2) [ 15.690015] page_type: f5(slab) [ 15.690209] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 15.690584] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 15.691068] page dumped because: kasan: bad access detected [ 15.691304] [ 15.691402] Memory state around the buggy address: [ 15.691653] ffff888102873000: 00 01 fc fc 00 04 fc fc 00 04 fc fc fa fb fc fc [ 15.692140] ffff888102873080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 15.692445] >ffff888102873100: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 15.693012] ^ [ 15.693261] ffff888102873180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.693621] ffff888102873200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.694076] ================================================================== [ 15.807888] ================================================================== [ 15.808561] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50 [ 15.809345] Write of size 8 at addr ffff888102873128 by task kunit_try_catch/278 [ 15.810004] [ 15.810204] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.810249] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.810262] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.810283] Call Trace: [ 15.810298] <TASK> [ 15.810313] dump_stack_lvl+0x73/0xb0 [ 15.810341] print_report+0xd1/0x650 [ 15.810364] ? __virt_addr_valid+0x1db/0x2d0 [ 15.810386] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 15.810411] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.810438] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 15.810463] kasan_report+0x141/0x180 [ 15.810486] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 15.810518] kasan_check_range+0x10c/0x1c0 [ 15.810542] __kasan_check_write+0x18/0x20 [ 15.810562] kasan_bitops_modify.constprop.0+0x547/0xd50 [ 15.810587] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 15.810615] ? kasan_save_alloc_info+0x3b/0x50 [ 15.810638] ? kasan_save_stack+0x45/0x70 [ 15.810663] kasan_bitops_generic+0x116/0x1c0 [ 15.810686] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 15.810734] ? __pfx_read_tsc+0x10/0x10 [ 15.810756] ? ktime_get_ts64+0x86/0x230 [ 15.810782] kunit_try_run_case+0x1a5/0x480 [ 15.810806] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.810827] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.810851] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.810873] ? __kthread_parkme+0x82/0x180 [ 15.810893] ? preempt_count_sub+0x50/0x80 [ 15.810916] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.810940] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.810963] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.810986] kthread+0x337/0x6f0 [ 15.811006] ? trace_preempt_on+0x20/0xc0 [ 15.811030] ? __pfx_kthread+0x10/0x10 [ 15.811062] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.811085] ? calculate_sigpending+0x7b/0xa0 [ 15.811108] ? __pfx_kthread+0x10/0x10 [ 15.811130] ret_from_fork+0x116/0x1d0 [ 15.811148] ? __pfx_kthread+0x10/0x10 [ 15.811168] ret_from_fork_asm+0x1a/0x30 [ 15.811201] </TASK> [ 15.811212] [ 15.823664] Allocated by task 278: [ 15.824035] kasan_save_stack+0x45/0x70 [ 15.824423] kasan_save_track+0x18/0x40 [ 15.824820] kasan_save_alloc_info+0x3b/0x50 [ 15.825229] __kasan_kmalloc+0xb7/0xc0 [ 15.825605] __kmalloc_cache_noprof+0x189/0x420 [ 15.826068] kasan_bitops_generic+0x92/0x1c0 [ 15.826480] kunit_try_run_case+0x1a5/0x480 [ 15.826919] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.827432] kthread+0x337/0x6f0 [ 15.827785] ret_from_fork+0x116/0x1d0 [ 15.828153] ret_from_fork_asm+0x1a/0x30 [ 15.828539] [ 15.828704] The buggy address belongs to the object at ffff888102873120 [ 15.828704] which belongs to the cache kmalloc-16 of size 16 [ 15.829226] The buggy address is located 8 bytes inside of [ 15.829226] allocated 9-byte region [ffff888102873120, ffff888102873129) [ 15.829605] [ 15.829683] The buggy address belongs to the physical page: [ 15.830194] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102873 [ 15.830911] flags: 0x200000000000000(node=0|zone=2) [ 15.831366] page_type: f5(slab) [ 15.831661] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 15.832363] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 15.833063] page dumped because: kasan: bad access detected [ 15.833558] [ 15.833736] Memory state around the buggy address: [ 15.833975] ffff888102873000: 00 01 fc fc 00 04 fc fc 00 04 fc fc fa fb fc fc [ 15.834219] ffff888102873080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 15.834448] >ffff888102873100: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 15.834673] ^ [ 15.835084] ffff888102873180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.835694] ffff888102873200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.836344] ================================================================== [ 15.650928] ================================================================== [ 15.651268] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 15.651589] Write of size 8 at addr ffff888102873128 by task kunit_try_catch/278 [ 15.652130] [ 15.652240] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.652286] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.652299] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.652321] Call Trace: [ 15.652334] <TASK> [ 15.652351] dump_stack_lvl+0x73/0xb0 [ 15.652378] print_report+0xd1/0x650 [ 15.652401] ? __virt_addr_valid+0x1db/0x2d0 [ 15.652482] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 15.652507] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.652532] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 15.652570] kasan_report+0x141/0x180 [ 15.652592] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 15.652623] kasan_check_range+0x10c/0x1c0 [ 15.652646] __kasan_check_write+0x18/0x20 [ 15.652665] kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 15.652691] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 15.652805] ? kasan_save_alloc_info+0x3b/0x50 [ 15.652829] ? kasan_save_stack+0x45/0x70 [ 15.652865] kasan_bitops_generic+0x116/0x1c0 [ 15.652888] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 15.652914] ? __pfx_read_tsc+0x10/0x10 [ 15.652943] ? ktime_get_ts64+0x86/0x230 [ 15.652969] kunit_try_run_case+0x1a5/0x480 [ 15.653003] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.653026] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.653057] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.653081] ? __kthread_parkme+0x82/0x180 [ 15.653101] ? preempt_count_sub+0x50/0x80 [ 15.653124] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.653148] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.653171] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.653194] kthread+0x337/0x6f0 [ 15.653213] ? trace_preempt_on+0x20/0xc0 [ 15.653237] ? __pfx_kthread+0x10/0x10 [ 15.653268] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.653288] ? calculate_sigpending+0x7b/0xa0 [ 15.653312] ? __pfx_kthread+0x10/0x10 [ 15.653344] ret_from_fork+0x116/0x1d0 [ 15.653363] ? __pfx_kthread+0x10/0x10 [ 15.653384] ret_from_fork_asm+0x1a/0x30 [ 15.653416] </TASK> [ 15.653427] [ 15.662438] Allocated by task 278: [ 15.662649] kasan_save_stack+0x45/0x70 [ 15.662949] kasan_save_track+0x18/0x40 [ 15.663130] kasan_save_alloc_info+0x3b/0x50 [ 15.663381] __kasan_kmalloc+0xb7/0xc0 [ 15.663553] __kmalloc_cache_noprof+0x189/0x420 [ 15.663874] kasan_bitops_generic+0x92/0x1c0 [ 15.664039] kunit_try_run_case+0x1a5/0x480 [ 15.664227] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.664520] kthread+0x337/0x6f0 [ 15.664767] ret_from_fork+0x116/0x1d0 [ 15.664986] ret_from_fork_asm+0x1a/0x30 [ 15.665238] [ 15.665340] The buggy address belongs to the object at ffff888102873120 [ 15.665340] which belongs to the cache kmalloc-16 of size 16 [ 15.665900] The buggy address is located 8 bytes inside of [ 15.665900] allocated 9-byte region [ffff888102873120, ffff888102873129) [ 15.666537] [ 15.666640] The buggy address belongs to the physical page: [ 15.667151] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102873 [ 15.667541] flags: 0x200000000000000(node=0|zone=2) [ 15.667883] page_type: f5(slab) [ 15.668089] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 15.668441] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 15.668688] page dumped because: kasan: bad access detected [ 15.669068] [ 15.669175] Memory state around the buggy address: [ 15.669417] ffff888102873000: 00 01 fc fc 00 04 fc fc 00 04 fc fc fa fb fc fc [ 15.669840] ffff888102873080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 15.670158] >ffff888102873100: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 15.670538] ^ [ 15.670860] ffff888102873180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.671195] ffff888102873200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.671526] ================================================================== [ 15.747505] ================================================================== [ 15.748361] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 15.749271] Write of size 8 at addr ffff888102873128 by task kunit_try_catch/278 [ 15.749513] [ 15.749607] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.749650] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.749663] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.749685] Call Trace: [ 15.749698] <TASK> [ 15.749712] dump_stack_lvl+0x73/0xb0 [ 15.749741] print_report+0xd1/0x650 [ 15.749763] ? __virt_addr_valid+0x1db/0x2d0 [ 15.749785] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 15.749810] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.749835] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 15.749861] kasan_report+0x141/0x180 [ 15.749882] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 15.749912] kasan_check_range+0x10c/0x1c0 [ 15.749936] __kasan_check_write+0x18/0x20 [ 15.749955] kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 15.749980] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 15.750009] ? kasan_save_alloc_info+0x3b/0x50 [ 15.750032] ? kasan_save_stack+0x45/0x70 [ 15.750070] kasan_bitops_generic+0x116/0x1c0 [ 15.750093] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 15.750118] ? __pfx_read_tsc+0x10/0x10 [ 15.750137] ? ktime_get_ts64+0x86/0x230 [ 15.750164] kunit_try_run_case+0x1a5/0x480 [ 15.750188] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.750210] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.750233] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.750255] ? __kthread_parkme+0x82/0x180 [ 15.750275] ? preempt_count_sub+0x50/0x80 [ 15.750297] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.750321] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.750345] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.750370] kthread+0x337/0x6f0 [ 15.750389] ? trace_preempt_on+0x20/0xc0 [ 15.750412] ? __pfx_kthread+0x10/0x10 [ 15.750432] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.750452] ? calculate_sigpending+0x7b/0xa0 [ 15.750475] ? __pfx_kthread+0x10/0x10 [ 15.750496] ret_from_fork+0x116/0x1d0 [ 15.750515] ? __pfx_kthread+0x10/0x10 [ 15.750535] ret_from_fork_asm+0x1a/0x30 [ 15.750566] </TASK> [ 15.750577] [ 15.765439] Allocated by task 278: [ 15.765594] kasan_save_stack+0x45/0x70 [ 15.765777] kasan_save_track+0x18/0x40 [ 15.766148] kasan_save_alloc_info+0x3b/0x50 [ 15.766542] __kasan_kmalloc+0xb7/0xc0 [ 15.766919] __kmalloc_cache_noprof+0x189/0x420 [ 15.767357] kasan_bitops_generic+0x92/0x1c0 [ 15.767802] kunit_try_run_case+0x1a5/0x480 [ 15.768210] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.768709] kthread+0x337/0x6f0 [ 15.769085] ret_from_fork+0x116/0x1d0 [ 15.769444] ret_from_fork_asm+0x1a/0x30 [ 15.769859] [ 15.770044] The buggy address belongs to the object at ffff888102873120 [ 15.770044] which belongs to the cache kmalloc-16 of size 16 [ 15.771372] The buggy address is located 8 bytes inside of [ 15.771372] allocated 9-byte region [ffff888102873120, ffff888102873129) [ 15.772443] [ 15.772616] The buggy address belongs to the physical page: [ 15.772872] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102873 [ 15.773302] flags: 0x200000000000000(node=0|zone=2) [ 15.773760] page_type: f5(slab) [ 15.774101] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 15.774614] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 15.775150] page dumped because: kasan: bad access detected [ 15.775727] [ 15.775813] Memory state around the buggy address: [ 15.775981] ffff888102873000: 00 01 fc fc 00 04 fc fc 00 04 fc fc fa fb fc fc [ 15.776230] ffff888102873080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 15.776458] >ffff888102873100: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 15.776679] ^ [ 15.778248] ffff888102873180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.778612] ffff888102873200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.778946] ==================================================================
[ 45.739150] ================================================================== [ 45.746418] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 45.754596] Write of size 8 at addr ffff8881067131a8 by task kunit_try_catch/302 [ 45.761995] [ 45.763497] CPU: 3 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 45.763504] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 45.763507] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 45.763510] Call Trace: [ 45.763512] <TASK> [ 45.763513] dump_stack_lvl+0x73/0xb0 [ 45.763518] print_report+0xd1/0x650 [ 45.763521] ? __virt_addr_valid+0x1db/0x2d0 [ 45.763525] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 45.763530] ? kasan_complete_mode_report_info+0x2a/0x200 [ 45.763535] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 45.763540] kasan_report+0x141/0x180 [ 45.763544] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 45.763550] kasan_check_range+0x10c/0x1c0 [ 45.763555] __kasan_check_write+0x18/0x20 [ 45.763558] kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 45.763563] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 45.763568] ? __kmalloc_cache_noprof+0x189/0x420 [ 45.763572] ? trace_hardirqs_on+0x37/0xe0 [ 45.763576] ? kasan_bitops_generic+0x92/0x1c0 [ 45.763581] kasan_bitops_generic+0x116/0x1c0 [ 45.763586] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 45.763591] ? ktime_get_ts64+0x83/0x230 [ 45.763595] kunit_try_run_case+0x1a2/0x480 [ 45.763599] ? __pfx_kunit_try_run_case+0x10/0x10 [ 45.763604] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 45.763608] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 45.763612] ? __kthread_parkme+0x82/0x180 [ 45.763616] ? preempt_count_sub+0x50/0x80 [ 45.763620] ? __pfx_kunit_try_run_case+0x10/0x10 [ 45.763624] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 45.763628] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 45.763632] kthread+0x334/0x6f0 [ 45.763636] ? trace_preempt_on+0x20/0xc0 [ 45.763640] ? __pfx_kthread+0x10/0x10 [ 45.763644] ? _raw_spin_unlock_irq+0x47/0x80 [ 45.763647] ? calculate_sigpending+0x7b/0xa0 [ 45.763652] ? __pfx_kthread+0x10/0x10 [ 45.763656] ret_from_fork+0x113/0x1d0 [ 45.763659] ? __pfx_kthread+0x10/0x10 [ 45.763663] ret_from_fork_asm+0x1a/0x30 [ 45.763669] </TASK> [ 45.763670] [ 45.956552] Allocated by task 302: [ 45.959960] kasan_save_stack+0x45/0x70 [ 45.963800] kasan_save_track+0x18/0x40 [ 45.967639] kasan_save_alloc_info+0x3b/0x50 [ 45.971921] __kasan_kmalloc+0xb7/0xc0 [ 45.975673] __kmalloc_cache_noprof+0x189/0x420 [ 45.980214] kasan_bitops_generic+0x92/0x1c0 [ 45.984495] kunit_try_run_case+0x1a2/0x480 [ 45.988680] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 45.994080] kthread+0x334/0x6f0 [ 45.997312] ret_from_fork+0x113/0x1d0 [ 46.001064] ret_from_fork_asm+0x1a/0x30 [ 46.004992] [ 46.006489] The buggy address belongs to the object at ffff8881067131a0 [ 46.006489] which belongs to the cache kmalloc-16 of size 16 [ 46.018824] The buggy address is located 8 bytes inside of [ 46.018824] allocated 9-byte region [ffff8881067131a0, ffff8881067131a9) [ 46.031079] [ 46.032578] The buggy address belongs to the physical page: [ 46.038151] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106713 [ 46.046157] flags: 0x200000000000000(node=0|zone=2) [ 46.051037] page_type: f5(slab) [ 46.054183] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000 [ 46.061922] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 46.069662] page dumped because: kasan: bad access detected [ 46.075236] [ 46.076733] Memory state around the buggy address: [ 46.081526] ffff888106713080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 46.088747] ffff888106713100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 46.095965] >ffff888106713180: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 46.103184] ^ [ 46.107716] ffff888106713200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.114936] ffff888106713280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.122157] ================================================================== [ 43.783794] ================================================================== [ 43.794890] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50 [ 43.803069] Write of size 8 at addr ffff8881067131a8 by task kunit_try_catch/302 [ 43.810464] [ 43.811963] CPU: 3 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 43.811971] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 43.811974] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 43.811977] Call Trace: [ 43.811979] <TASK> [ 43.811980] dump_stack_lvl+0x73/0xb0 [ 43.811985] print_report+0xd1/0x650 [ 43.811989] ? __virt_addr_valid+0x1db/0x2d0 [ 43.811993] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 43.811998] ? kasan_complete_mode_report_info+0x2a/0x200 [ 43.812003] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 43.812008] kasan_report+0x141/0x180 [ 43.812012] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 43.812018] kasan_check_range+0x10c/0x1c0 [ 43.812022] __kasan_check_write+0x18/0x20 [ 43.812026] kasan_bitops_modify.constprop.0+0x101/0xd50 [ 43.812030] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 43.812036] ? __kmalloc_cache_noprof+0x189/0x420 [ 43.812040] ? trace_hardirqs_on+0x37/0xe0 [ 43.812044] ? kasan_bitops_generic+0x92/0x1c0 [ 43.812049] kasan_bitops_generic+0x116/0x1c0 [ 43.812054] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 43.812059] ? ktime_get_ts64+0x83/0x230 [ 43.812063] kunit_try_run_case+0x1a2/0x480 [ 43.812067] ? __pfx_kunit_try_run_case+0x10/0x10 [ 43.812072] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 43.812076] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 43.812080] ? __kthread_parkme+0x82/0x180 [ 43.812084] ? preempt_count_sub+0x50/0x80 [ 43.812088] ? __pfx_kunit_try_run_case+0x10/0x10 [ 43.812092] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 43.812096] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 43.812101] kthread+0x334/0x6f0 [ 43.812104] ? trace_preempt_on+0x20/0xc0 [ 43.812108] ? __pfx_kthread+0x10/0x10 [ 43.812112] ? _raw_spin_unlock_irq+0x47/0x80 [ 43.812116] ? calculate_sigpending+0x7b/0xa0 [ 43.812120] ? __pfx_kthread+0x10/0x10 [ 43.812124] ret_from_fork+0x113/0x1d0 [ 43.812128] ? __pfx_kthread+0x10/0x10 [ 43.812131] ret_from_fork_asm+0x1a/0x30 [ 43.812137] </TASK> [ 43.812139] [ 44.005047] Allocated by task 302: [ 44.008451] kasan_save_stack+0x45/0x70 [ 44.012291] kasan_save_track+0x18/0x40 [ 44.016130] kasan_save_alloc_info+0x3b/0x50 [ 44.020402] __kasan_kmalloc+0xb7/0xc0 [ 44.024156] __kmalloc_cache_noprof+0x189/0x420 [ 44.028687] kasan_bitops_generic+0x92/0x1c0 [ 44.032960] kunit_try_run_case+0x1a2/0x480 [ 44.037147] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 44.042546] kthread+0x334/0x6f0 [ 44.045780] ret_from_fork+0x113/0x1d0 [ 44.049530] ret_from_fork_asm+0x1a/0x30 [ 44.053456] [ 44.054956] The buggy address belongs to the object at ffff8881067131a0 [ 44.054956] which belongs to the cache kmalloc-16 of size 16 [ 44.067298] The buggy address is located 8 bytes inside of [ 44.067298] allocated 9-byte region [ffff8881067131a0, ffff8881067131a9) [ 44.079553] [ 44.081050] The buggy address belongs to the physical page: [ 44.086625] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106713 [ 44.094632] flags: 0x200000000000000(node=0|zone=2) [ 44.099512] page_type: f5(slab) [ 44.102658] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000 [ 44.110411] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 44.118155] page dumped because: kasan: bad access detected [ 44.123726] [ 44.125226] Memory state around the buggy address: [ 44.130019] ffff888106713080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 44.137237] ffff888106713100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 44.144457] >ffff888106713180: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 44.151678] ^ [ 44.156210] ffff888106713200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.163427] ffff888106713280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.170648] ================================================================== [ 44.177897] ================================================================== [ 44.185146] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 44.193318] Write of size 8 at addr ffff8881067131a8 by task kunit_try_catch/302 [ 44.200739] [ 44.202238] CPU: 3 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 44.202246] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 44.202249] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 44.202252] Call Trace: [ 44.202254] <TASK> [ 44.202255] dump_stack_lvl+0x73/0xb0 [ 44.202260] print_report+0xd1/0x650 [ 44.202264] ? __virt_addr_valid+0x1db/0x2d0 [ 44.202267] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 44.202272] ? kasan_complete_mode_report_info+0x2a/0x200 [ 44.202277] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 44.202282] kasan_report+0x141/0x180 [ 44.202286] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 44.202292] kasan_check_range+0x10c/0x1c0 [ 44.202296] __kasan_check_write+0x18/0x20 [ 44.202300] kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 44.202305] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 44.202310] ? __kmalloc_cache_noprof+0x189/0x420 [ 44.202315] ? trace_hardirqs_on+0x37/0xe0 [ 44.202318] ? kasan_bitops_generic+0x92/0x1c0 [ 44.202324] kasan_bitops_generic+0x116/0x1c0 [ 44.202328] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 44.202350] ? ktime_get_ts64+0x83/0x230 [ 44.202354] kunit_try_run_case+0x1a2/0x480 [ 44.202359] ? __pfx_kunit_try_run_case+0x10/0x10 [ 44.202363] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 44.202368] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 44.202372] ? __kthread_parkme+0x82/0x180 [ 44.202376] ? preempt_count_sub+0x50/0x80 [ 44.202380] ? __pfx_kunit_try_run_case+0x10/0x10 [ 44.202385] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 44.202402] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 44.202406] kthread+0x334/0x6f0 [ 44.202409] ? trace_preempt_on+0x20/0xc0 [ 44.202413] ? __pfx_kthread+0x10/0x10 [ 44.202417] ? _raw_spin_unlock_irq+0x47/0x80 [ 44.202421] ? calculate_sigpending+0x7b/0xa0 [ 44.202426] ? __pfx_kthread+0x10/0x10 [ 44.202430] ret_from_fork+0x113/0x1d0 [ 44.202433] ? __pfx_kthread+0x10/0x10 [ 44.202437] ret_from_fork_asm+0x1a/0x30 [ 44.202443] </TASK> [ 44.202444] [ 44.395366] Allocated by task 302: [ 44.398798] kasan_save_stack+0x45/0x70 [ 44.402646] kasan_save_track+0x18/0x40 [ 44.406494] kasan_save_alloc_info+0x3b/0x50 [ 44.410774] __kasan_kmalloc+0xb7/0xc0 [ 44.414527] __kmalloc_cache_noprof+0x189/0x420 [ 44.419069] kasan_bitops_generic+0x92/0x1c0 [ 44.423365] kunit_try_run_case+0x1a2/0x480 [ 44.427580] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 44.432986] kthread+0x334/0x6f0 [ 44.436218] ret_from_fork+0x113/0x1d0 [ 44.439973] ret_from_fork_asm+0x1a/0x30 [ 44.443906] [ 44.445406] The buggy address belongs to the object at ffff8881067131a0 [ 44.445406] which belongs to the cache kmalloc-16 of size 16 [ 44.457747] The buggy address is located 8 bytes inside of [ 44.457747] allocated 9-byte region [ffff8881067131a0, ffff8881067131a9) [ 44.470002] [ 44.471502] The buggy address belongs to the physical page: [ 44.477073] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106713 [ 44.485074] flags: 0x200000000000000(node=0|zone=2) [ 44.489951] page_type: f5(slab) [ 44.493099] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000 [ 44.500837] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 44.508576] page dumped because: kasan: bad access detected [ 44.514150] [ 44.515649] Memory state around the buggy address: [ 44.520443] ffff888106713080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 44.527661] ffff888106713100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 44.534880] >ffff888106713180: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 44.542100] ^ [ 44.546633] ffff888106713200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.553861] ffff888106713280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.561079] ================================================================== [ 46.129394] ================================================================== [ 46.136636] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 46.144810] Write of size 8 at addr ffff8881067131a8 by task kunit_try_catch/302 [ 46.152204] [ 46.153704] CPU: 3 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 46.153712] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 46.153714] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 46.153717] Call Trace: [ 46.153719] <TASK> [ 46.153721] dump_stack_lvl+0x73/0xb0 [ 46.153725] print_report+0xd1/0x650 [ 46.153729] ? __virt_addr_valid+0x1db/0x2d0 [ 46.153733] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 46.153738] ? kasan_complete_mode_report_info+0x2a/0x200 [ 46.153743] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 46.153748] kasan_report+0x141/0x180 [ 46.153752] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 46.153758] kasan_check_range+0x10c/0x1c0 [ 46.153762] __kasan_check_write+0x18/0x20 [ 46.153765] kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 46.153770] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 46.153775] ? __kmalloc_cache_noprof+0x189/0x420 [ 46.153780] ? trace_hardirqs_on+0x37/0xe0 [ 46.153784] ? kasan_bitops_generic+0x92/0x1c0 [ 46.153789] kasan_bitops_generic+0x116/0x1c0 [ 46.153793] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 46.153798] ? ktime_get_ts64+0x83/0x230 [ 46.153803] kunit_try_run_case+0x1a2/0x480 [ 46.153807] ? __pfx_kunit_try_run_case+0x10/0x10 [ 46.153811] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 46.153816] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 46.153820] ? __kthread_parkme+0x82/0x180 [ 46.153823] ? preempt_count_sub+0x50/0x80 [ 46.153828] ? __pfx_kunit_try_run_case+0x10/0x10 [ 46.153832] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 46.153836] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 46.153841] kthread+0x334/0x6f0 [ 46.153844] ? trace_preempt_on+0x20/0xc0 [ 46.153848] ? __pfx_kthread+0x10/0x10 [ 46.153852] ? _raw_spin_unlock_irq+0x47/0x80 [ 46.153855] ? calculate_sigpending+0x7b/0xa0 [ 46.153860] ? __pfx_kthread+0x10/0x10 [ 46.153864] ret_from_fork+0x113/0x1d0 [ 46.153867] ? __pfx_kthread+0x10/0x10 [ 46.153871] ret_from_fork_asm+0x1a/0x30 [ 46.153876] </TASK> [ 46.153878] [ 46.346759] Allocated by task 302: [ 46.350165] kasan_save_stack+0x45/0x70 [ 46.354004] kasan_save_track+0x18/0x40 [ 46.357843] kasan_save_alloc_info+0x3b/0x50 [ 46.362116] __kasan_kmalloc+0xb7/0xc0 [ 46.365870] __kmalloc_cache_noprof+0x189/0x420 [ 46.370421] kasan_bitops_generic+0x92/0x1c0 [ 46.374701] kunit_try_run_case+0x1a2/0x480 [ 46.378886] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 46.384287] kthread+0x334/0x6f0 [ 46.387518] ret_from_fork+0x113/0x1d0 [ 46.391272] ret_from_fork_asm+0x1a/0x30 [ 46.395206] [ 46.396705] The buggy address belongs to the object at ffff8881067131a0 [ 46.396705] which belongs to the cache kmalloc-16 of size 16 [ 46.409048] The buggy address is located 8 bytes inside of [ 46.409048] allocated 9-byte region [ffff8881067131a0, ffff8881067131a9) [ 46.421302] [ 46.422801] The buggy address belongs to the physical page: [ 46.428374] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106713 [ 46.436411] flags: 0x200000000000000(node=0|zone=2) [ 46.441295] page_type: f5(slab) [ 46.444441] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000 [ 46.452183] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 46.459927] page dumped because: kasan: bad access detected [ 46.465501] [ 46.467000] Memory state around the buggy address: [ 46.471795] ffff888106713080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 46.479013] ffff888106713100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 46.486232] >ffff888106713180: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 46.493451] ^ [ 46.497984] ffff888106713200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.505205] ffff888106713280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.512432] ================================================================== [ 44.568305] ================================================================== [ 44.575578] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 44.583752] Write of size 8 at addr ffff8881067131a8 by task kunit_try_catch/302 [ 44.591142] [ 44.592634] CPU: 3 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 44.592643] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 44.592645] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 44.592648] Call Trace: [ 44.592650] <TASK> [ 44.592651] dump_stack_lvl+0x73/0xb0 [ 44.592656] print_report+0xd1/0x650 [ 44.592659] ? __virt_addr_valid+0x1db/0x2d0 [ 44.592663] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 44.592668] ? kasan_complete_mode_report_info+0x2a/0x200 [ 44.592673] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 44.592678] kasan_report+0x141/0x180 [ 44.592682] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 44.592688] kasan_check_range+0x10c/0x1c0 [ 44.592692] __kasan_check_write+0x18/0x20 [ 44.592695] kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 44.592700] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 44.592705] ? __kmalloc_cache_noprof+0x189/0x420 [ 44.592710] ? trace_hardirqs_on+0x37/0xe0 [ 44.592714] ? kasan_bitops_generic+0x92/0x1c0 [ 44.592719] kasan_bitops_generic+0x116/0x1c0 [ 44.592723] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 44.592728] ? ktime_get_ts64+0x83/0x230 [ 44.592733] kunit_try_run_case+0x1a2/0x480 [ 44.592737] ? __pfx_kunit_try_run_case+0x10/0x10 [ 44.592741] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 44.592745] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 44.592750] ? __kthread_parkme+0x82/0x180 [ 44.592753] ? preempt_count_sub+0x50/0x80 [ 44.592757] ? __pfx_kunit_try_run_case+0x10/0x10 [ 44.592762] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 44.592766] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 44.592770] kthread+0x334/0x6f0 [ 44.592774] ? trace_preempt_on+0x20/0xc0 [ 44.592778] ? __pfx_kthread+0x10/0x10 [ 44.592781] ? _raw_spin_unlock_irq+0x47/0x80 [ 44.592785] ? calculate_sigpending+0x7b/0xa0 [ 44.592790] ? __pfx_kthread+0x10/0x10 [ 44.592793] ret_from_fork+0x113/0x1d0 [ 44.592797] ? __pfx_kthread+0x10/0x10 [ 44.592800] ret_from_fork_asm+0x1a/0x30 [ 44.592806] </TASK> [ 44.592808] [ 44.785657] Allocated by task 302: [ 44.789062] kasan_save_stack+0x45/0x70 [ 44.792902] kasan_save_track+0x18/0x40 [ 44.796742] kasan_save_alloc_info+0x3b/0x50 [ 44.801013] __kasan_kmalloc+0xb7/0xc0 [ 44.804767] __kmalloc_cache_noprof+0x189/0x420 [ 44.809300] kasan_bitops_generic+0x92/0x1c0 [ 44.813571] kunit_try_run_case+0x1a2/0x480 [ 44.817757] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 44.823159] kthread+0x334/0x6f0 [ 44.826411] ret_from_fork+0x113/0x1d0 [ 44.830168] ret_from_fork_asm+0x1a/0x30 [ 44.834096] [ 44.835596] The buggy address belongs to the object at ffff8881067131a0 [ 44.835596] which belongs to the cache kmalloc-16 of size 16 [ 44.847936] The buggy address is located 8 bytes inside of [ 44.847936] allocated 9-byte region [ffff8881067131a0, ffff8881067131a9) [ 44.860191] [ 44.861688] The buggy address belongs to the physical page: [ 44.867262] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106713 [ 44.875261] flags: 0x200000000000000(node=0|zone=2) [ 44.880140] page_type: f5(slab) [ 44.883287] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000 [ 44.891028] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 44.898774] page dumped because: kasan: bad access detected [ 44.904362] [ 44.905864] Memory state around the buggy address: [ 44.910656] ffff888106713080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 44.917876] ffff888106713100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 44.925096] >ffff888106713180: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 44.932314] ^ [ 44.936847] ffff888106713200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.944066] ffff888106713280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.951284] ================================================================== [ 44.958529] ================================================================== [ 44.965758] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 44.973931] Write of size 8 at addr ffff8881067131a8 by task kunit_try_catch/302 [ 44.981323] [ 44.982851] CPU: 3 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 44.982859] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 44.982862] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 44.982865] Call Trace: [ 44.982866] <TASK> [ 44.982868] dump_stack_lvl+0x73/0xb0 [ 44.982872] print_report+0xd1/0x650 [ 44.982876] ? __virt_addr_valid+0x1db/0x2d0 [ 44.982880] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 44.982885] ? kasan_complete_mode_report_info+0x2a/0x200 [ 44.982890] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 44.982895] kasan_report+0x141/0x180 [ 44.982899] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 44.982905] kasan_check_range+0x10c/0x1c0 [ 44.982909] __kasan_check_write+0x18/0x20 [ 44.982912] kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 44.982917] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 44.982922] ? __kmalloc_cache_noprof+0x189/0x420 [ 44.982927] ? trace_hardirqs_on+0x37/0xe0 [ 44.982931] ? kasan_bitops_generic+0x92/0x1c0 [ 44.982936] kasan_bitops_generic+0x116/0x1c0 [ 44.982940] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 44.982945] ? ktime_get_ts64+0x83/0x230 [ 44.982949] kunit_try_run_case+0x1a2/0x480 [ 44.982954] ? __pfx_kunit_try_run_case+0x10/0x10 [ 44.982958] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 44.982962] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 44.982966] ? __kthread_parkme+0x82/0x180 [ 44.982970] ? preempt_count_sub+0x50/0x80 [ 44.982974] ? __pfx_kunit_try_run_case+0x10/0x10 [ 44.982979] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 44.982983] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 44.982987] kthread+0x334/0x6f0 [ 44.982991] ? trace_preempt_on+0x20/0xc0 [ 44.982995] ? __pfx_kthread+0x10/0x10 [ 44.982998] ? _raw_spin_unlock_irq+0x47/0x80 [ 44.983002] ? calculate_sigpending+0x7b/0xa0 [ 44.983007] ? __pfx_kthread+0x10/0x10 [ 44.983010] ret_from_fork+0x113/0x1d0 [ 44.983014] ? __pfx_kthread+0x10/0x10 [ 44.983017] ret_from_fork_asm+0x1a/0x30 [ 44.983023] </TASK> [ 44.983025] [ 45.175959] Allocated by task 302: [ 45.179364] kasan_save_stack+0x45/0x70 [ 45.183206] kasan_save_track+0x18/0x40 [ 45.187043] kasan_save_alloc_info+0x3b/0x50 [ 45.191315] __kasan_kmalloc+0xb7/0xc0 [ 45.195096] __kmalloc_cache_noprof+0x189/0x420 [ 45.199635] kasan_bitops_generic+0x92/0x1c0 [ 45.203910] kunit_try_run_case+0x1a2/0x480 [ 45.208103] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 45.213502] kthread+0x334/0x6f0 [ 45.216736] ret_from_fork+0x113/0x1d0 [ 45.220487] ret_from_fork_asm+0x1a/0x30 [ 45.224415] [ 45.225914] The buggy address belongs to the object at ffff8881067131a0 [ 45.225914] which belongs to the cache kmalloc-16 of size 16 [ 45.238256] The buggy address is located 8 bytes inside of [ 45.238256] allocated 9-byte region [ffff8881067131a0, ffff8881067131a9) [ 45.250509] [ 45.252008] The buggy address belongs to the physical page: [ 45.257583] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106713 [ 45.265588] flags: 0x200000000000000(node=0|zone=2) [ 45.270468] page_type: f5(slab) [ 45.273616] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000 [ 45.281364] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 45.289129] page dumped because: kasan: bad access detected [ 45.294700] [ 45.296200] Memory state around the buggy address: [ 45.300992] ffff888106713080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 45.308211] ffff888106713100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 45.315433] >ffff888106713180: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 45.322660] ^ [ 45.327193] ffff888106713200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.334422] ffff888106713280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.341639] ================================================================== [ 45.348864] ================================================================== [ 45.356105] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50 [ 45.364286] Write of size 8 at addr ffff8881067131a8 by task kunit_try_catch/302 [ 45.371686] [ 45.373186] CPU: 3 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 45.373194] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 45.373197] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 45.373200] Call Trace: [ 45.373201] <TASK> [ 45.373203] dump_stack_lvl+0x73/0xb0 [ 45.373207] print_report+0xd1/0x650 [ 45.373211] ? __virt_addr_valid+0x1db/0x2d0 [ 45.373215] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 45.373220] ? kasan_complete_mode_report_info+0x2a/0x200 [ 45.373225] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 45.373230] kasan_report+0x141/0x180 [ 45.373234] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 45.373240] kasan_check_range+0x10c/0x1c0 [ 45.373244] __kasan_check_write+0x18/0x20 [ 45.373247] kasan_bitops_modify.constprop.0+0x373/0xd50 [ 45.373252] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 45.373257] ? __kmalloc_cache_noprof+0x189/0x420 [ 45.373262] ? trace_hardirqs_on+0x37/0xe0 [ 45.373266] ? kasan_bitops_generic+0x92/0x1c0 [ 45.373271] kasan_bitops_generic+0x116/0x1c0 [ 45.373275] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 45.373280] ? ktime_get_ts64+0x83/0x230 [ 45.373284] kunit_try_run_case+0x1a2/0x480 [ 45.373289] ? __pfx_kunit_try_run_case+0x10/0x10 [ 45.373293] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 45.373297] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 45.373302] ? __kthread_parkme+0x82/0x180 [ 45.373305] ? preempt_count_sub+0x50/0x80 [ 45.373309] ? __pfx_kunit_try_run_case+0x10/0x10 [ 45.373314] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 45.373318] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 45.373322] kthread+0x334/0x6f0 [ 45.373326] ? trace_preempt_on+0x20/0xc0 [ 45.373347] ? __pfx_kthread+0x10/0x10 [ 45.373351] ? _raw_spin_unlock_irq+0x47/0x80 [ 45.373354] ? calculate_sigpending+0x7b/0xa0 [ 45.373359] ? __pfx_kthread+0x10/0x10 [ 45.373363] ret_from_fork+0x113/0x1d0 [ 45.373367] ? __pfx_kthread+0x10/0x10 [ 45.373370] ret_from_fork_asm+0x1a/0x30 [ 45.373389] </TASK> [ 45.373390] [ 45.566271] Allocated by task 302: [ 45.569675] kasan_save_stack+0x45/0x70 [ 45.573515] kasan_save_track+0x18/0x40 [ 45.577366] kasan_save_alloc_info+0x3b/0x50 [ 45.581661] __kasan_kmalloc+0xb7/0xc0 [ 45.585414] __kmalloc_cache_noprof+0x189/0x420 [ 45.589945] kasan_bitops_generic+0x92/0x1c0 [ 45.594220] kunit_try_run_case+0x1a2/0x480 [ 45.598420] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 45.603823] kthread+0x334/0x6f0 [ 45.607054] ret_from_fork+0x113/0x1d0 [ 45.610807] ret_from_fork_asm+0x1a/0x30 [ 45.614735] [ 45.616233] The buggy address belongs to the object at ffff8881067131a0 [ 45.616233] which belongs to the cache kmalloc-16 of size 16 [ 45.628574] The buggy address is located 8 bytes inside of [ 45.628574] allocated 9-byte region [ffff8881067131a0, ffff8881067131a9) [ 45.640829] [ 45.642328] The buggy address belongs to the physical page: [ 45.647926] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106713 [ 45.655925] flags: 0x200000000000000(node=0|zone=2) [ 45.660804] page_type: f5(slab) [ 45.663951] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000 [ 45.671691] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 45.679429] page dumped because: kasan: bad access detected [ 45.685003] [ 45.686502] Memory state around the buggy address: [ 45.691294] ffff888106713080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 45.698514] ffff888106713100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 45.705732] >ffff888106713180: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 45.712951] ^ [ 45.717486] ffff888106713200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.724704] ffff888106713280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.731923] ================================================================== [ 46.519656] ================================================================== [ 46.526895] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50 [ 46.535068] Write of size 8 at addr ffff8881067131a8 by task kunit_try_catch/302 [ 46.542460] [ 46.543962] CPU: 3 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 46.543969] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 46.543972] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 46.543975] Call Trace: [ 46.543977] <TASK> [ 46.543979] dump_stack_lvl+0x73/0xb0 [ 46.543983] print_report+0xd1/0x650 [ 46.543987] ? __virt_addr_valid+0x1db/0x2d0 [ 46.543991] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 46.543996] ? kasan_complete_mode_report_info+0x2a/0x200 [ 46.544001] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 46.544005] kasan_report+0x141/0x180 [ 46.544010] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 46.544015] kasan_check_range+0x10c/0x1c0 [ 46.544020] __kasan_check_write+0x18/0x20 [ 46.544023] kasan_bitops_modify.constprop.0+0x547/0xd50 [ 46.544028] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 46.544033] ? __kmalloc_cache_noprof+0x189/0x420 [ 46.544038] ? trace_hardirqs_on+0x37/0xe0 [ 46.544042] ? kasan_bitops_generic+0x92/0x1c0 [ 46.544047] kasan_bitops_generic+0x116/0x1c0 [ 46.544051] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 46.544056] ? ktime_get_ts64+0x83/0x230 [ 46.544060] kunit_try_run_case+0x1a2/0x480 [ 46.544065] ? __pfx_kunit_try_run_case+0x10/0x10 [ 46.544069] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 46.544073] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 46.544077] ? __kthread_parkme+0x82/0x180 [ 46.544081] ? preempt_count_sub+0x50/0x80 [ 46.544085] ? __pfx_kunit_try_run_case+0x10/0x10 [ 46.544089] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 46.544094] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 46.544098] kthread+0x334/0x6f0 [ 46.544101] ? trace_preempt_on+0x20/0xc0 [ 46.544105] ? __pfx_kthread+0x10/0x10 [ 46.544109] ? _raw_spin_unlock_irq+0x47/0x80 [ 46.544113] ? calculate_sigpending+0x7b/0xa0 [ 46.544117] ? __pfx_kthread+0x10/0x10 [ 46.544121] ret_from_fork+0x113/0x1d0 [ 46.544124] ? __pfx_kthread+0x10/0x10 [ 46.544128] ret_from_fork_asm+0x1a/0x30 [ 46.544134] </TASK> [ 46.544135] [ 46.737036] Allocated by task 302: [ 46.740440] kasan_save_stack+0x45/0x70 [ 46.744280] kasan_save_track+0x18/0x40 [ 46.748119] kasan_save_alloc_info+0x3b/0x50 [ 46.752407] __kasan_kmalloc+0xb7/0xc0 [ 46.756162] __kmalloc_cache_noprof+0x189/0x420 [ 46.760694] kasan_bitops_generic+0x92/0x1c0 [ 46.764966] kunit_try_run_case+0x1a2/0x480 [ 46.769154] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 46.774554] kthread+0x334/0x6f0 [ 46.777786] ret_from_fork+0x113/0x1d0 [ 46.781539] ret_from_fork_asm+0x1a/0x30 [ 46.785466] [ 46.786962] The buggy address belongs to the object at ffff8881067131a0 [ 46.786962] which belongs to the cache kmalloc-16 of size 16 [ 46.799295] The buggy address is located 8 bytes inside of [ 46.799295] allocated 9-byte region [ffff8881067131a0, ffff8881067131a9) [ 46.811552] [ 46.813049] The buggy address belongs to the physical page: [ 46.818623] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106713 [ 46.826622] flags: 0x200000000000000(node=0|zone=2) [ 46.831502] page_type: f5(slab) [ 46.834649] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000 [ 46.842396] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 46.850136] page dumped because: kasan: bad access detected [ 46.855709] [ 46.857205] Memory state around the buggy address: [ 46.862000] ffff888106713080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 46.869218] ffff888106713100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 46.876438] >ffff888106713180: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 46.883658] ^ [ 46.888191] ffff888106713200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.895409] ffff888106713280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.902627] ==================================================================