Date
July 6, 2025, 11:09 p.m.
Environment | |
---|---|
qemu-x86_64 | |
x86 |
[ 15.897317] ================================================================== [ 15.897833] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 15.898480] Write of size 8 at addr ffff8881024eb448 by task kunit_try_catch/279 [ 15.898887] [ 15.899022] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.899157] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.899181] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.899215] Call Trace: [ 15.899257] <TASK> [ 15.899286] dump_stack_lvl+0x73/0xb0 [ 15.899361] print_report+0xd1/0x650 [ 15.899420] ? __virt_addr_valid+0x1db/0x2d0 [ 15.899477] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 15.899540] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.899590] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 15.899664] kasan_report+0x141/0x180 [ 15.899714] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 15.899768] kasan_check_range+0x10c/0x1c0 [ 15.899834] __kasan_check_write+0x18/0x20 [ 15.899873] kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 15.899944] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 15.899999] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.900053] ? trace_hardirqs_on+0x37/0xe0 [ 15.900097] ? kasan_bitops_generic+0x92/0x1c0 [ 15.900168] kasan_bitops_generic+0x121/0x1c0 [ 15.900190] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 15.900212] ? __pfx_read_tsc+0x10/0x10 [ 15.900231] ? ktime_get_ts64+0x86/0x230 [ 15.900254] kunit_try_run_case+0x1a5/0x480 [ 15.900276] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.900295] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.900316] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.900335] ? __kthread_parkme+0x82/0x180 [ 15.900354] ? preempt_count_sub+0x50/0x80 [ 15.900376] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.900396] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.900417] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.900437] kthread+0x337/0x6f0 [ 15.900455] ? trace_preempt_on+0x20/0xc0 [ 15.900475] ? __pfx_kthread+0x10/0x10 [ 15.900493] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.900513] ? calculate_sigpending+0x7b/0xa0 [ 15.900534] ? __pfx_kthread+0x10/0x10 [ 15.900553] ret_from_fork+0x116/0x1d0 [ 15.900570] ? __pfx_kthread+0x10/0x10 [ 15.900588] ret_from_fork_asm+0x1a/0x30 [ 15.900632] </TASK> [ 15.900647] [ 15.911321] Allocated by task 279: [ 15.911573] kasan_save_stack+0x45/0x70 [ 15.911918] kasan_save_track+0x18/0x40 [ 15.912159] kasan_save_alloc_info+0x3b/0x50 [ 15.912353] __kasan_kmalloc+0xb7/0xc0 [ 15.912541] __kmalloc_cache_noprof+0x189/0x420 [ 15.912761] kasan_bitops_generic+0x92/0x1c0 [ 15.913039] kunit_try_run_case+0x1a5/0x480 [ 15.913408] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.913806] kthread+0x337/0x6f0 [ 15.914077] ret_from_fork+0x116/0x1d0 [ 15.914391] ret_from_fork_asm+0x1a/0x30 [ 15.914695] [ 15.914850] The buggy address belongs to the object at ffff8881024eb440 [ 15.914850] which belongs to the cache kmalloc-16 of size 16 [ 15.915737] The buggy address is located 8 bytes inside of [ 15.915737] allocated 9-byte region [ffff8881024eb440, ffff8881024eb449) [ 15.916399] [ 15.916587] The buggy address belongs to the physical page: [ 15.916867] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024eb [ 15.917137] flags: 0x200000000000000(node=0|zone=2) [ 15.917338] page_type: f5(slab) [ 15.917601] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 15.918208] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 15.918664] page dumped because: kasan: bad access detected [ 15.919087] [ 15.919286] Memory state around the buggy address: [ 15.919589] ffff8881024eb300: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 15.920155] ffff8881024eb380: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 15.920439] >ffff8881024eb400: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 15.920890] ^ [ 15.921087] ffff8881024eb480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.921343] ffff8881024eb500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.921862] ================================================================== [ 16.003982] ================================================================== [ 16.005052] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 16.005475] Write of size 8 at addr ffff8881024eb448 by task kunit_try_catch/279 [ 16.005956] [ 16.006094] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.006508] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.006533] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.006562] Call Trace: [ 16.006577] <TASK> [ 16.006592] dump_stack_lvl+0x73/0xb0 [ 16.006643] print_report+0xd1/0x650 [ 16.006665] ? __virt_addr_valid+0x1db/0x2d0 [ 16.006684] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 16.006708] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.006730] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 16.006754] kasan_report+0x141/0x180 [ 16.006774] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 16.006803] kasan_check_range+0x10c/0x1c0 [ 16.006824] __kasan_check_write+0x18/0x20 [ 16.006841] kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 16.006864] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 16.006888] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.006909] ? trace_hardirqs_on+0x37/0xe0 [ 16.006929] ? kasan_bitops_generic+0x92/0x1c0 [ 16.006953] kasan_bitops_generic+0x121/0x1c0 [ 16.006974] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 16.006996] ? __pfx_read_tsc+0x10/0x10 [ 16.007014] ? ktime_get_ts64+0x86/0x230 [ 16.007036] kunit_try_run_case+0x1a5/0x480 [ 16.007057] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.007076] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.007096] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.007133] ? __kthread_parkme+0x82/0x180 [ 16.007151] ? preempt_count_sub+0x50/0x80 [ 16.007173] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.007194] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.007214] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.007234] kthread+0x337/0x6f0 [ 16.007251] ? trace_preempt_on+0x20/0xc0 [ 16.007272] ? __pfx_kthread+0x10/0x10 [ 16.007289] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.007308] ? calculate_sigpending+0x7b/0xa0 [ 16.007329] ? __pfx_kthread+0x10/0x10 [ 16.007348] ret_from_fork+0x116/0x1d0 [ 16.007365] ? __pfx_kthread+0x10/0x10 [ 16.007383] ret_from_fork_asm+0x1a/0x30 [ 16.007411] </TASK> [ 16.007422] [ 16.019771] Allocated by task 279: [ 16.019954] kasan_save_stack+0x45/0x70 [ 16.020602] kasan_save_track+0x18/0x40 [ 16.020884] kasan_save_alloc_info+0x3b/0x50 [ 16.021072] __kasan_kmalloc+0xb7/0xc0 [ 16.021441] __kmalloc_cache_noprof+0x189/0x420 [ 16.021704] kasan_bitops_generic+0x92/0x1c0 [ 16.021918] kunit_try_run_case+0x1a5/0x480 [ 16.022281] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.023053] kthread+0x337/0x6f0 [ 16.023300] ret_from_fork+0x116/0x1d0 [ 16.023791] ret_from_fork_asm+0x1a/0x30 [ 16.024150] [ 16.024327] The buggy address belongs to the object at ffff8881024eb440 [ 16.024327] which belongs to the cache kmalloc-16 of size 16 [ 16.025082] The buggy address is located 8 bytes inside of [ 16.025082] allocated 9-byte region [ffff8881024eb440, ffff8881024eb449) [ 16.026046] [ 16.026269] The buggy address belongs to the physical page: [ 16.026561] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024eb [ 16.027016] flags: 0x200000000000000(node=0|zone=2) [ 16.027312] page_type: f5(slab) [ 16.027870] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 16.028329] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 16.028748] page dumped because: kasan: bad access detected [ 16.029084] [ 16.029261] Memory state around the buggy address: [ 16.029664] ffff8881024eb300: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 16.030079] ffff8881024eb380: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 16.030721] >ffff8881024eb400: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 16.031093] ^ [ 16.031578] ffff8881024eb480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.031963] ffff8881024eb500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.032516] ================================================================== [ 16.085666] ================================================================== [ 16.086003] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 16.086760] Read of size 8 at addr ffff8881024eb448 by task kunit_try_catch/279 [ 16.086986] [ 16.087206] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.087283] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.087304] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.087341] Call Trace: [ 16.087396] <TASK> [ 16.087423] dump_stack_lvl+0x73/0xb0 [ 16.087495] print_report+0xd1/0x650 [ 16.087534] ? __virt_addr_valid+0x1db/0x2d0 [ 16.087573] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 16.087654] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.087715] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 16.087749] kasan_report+0x141/0x180 [ 16.087770] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 16.087798] __asan_report_load8_noabort+0x18/0x20 [ 16.087819] kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 16.087843] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 16.087867] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.087900] ? trace_hardirqs_on+0x37/0xe0 [ 16.087935] ? kasan_bitops_generic+0x92/0x1c0 [ 16.087980] kasan_bitops_generic+0x121/0x1c0 [ 16.088048] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 16.088109] ? __pfx_read_tsc+0x10/0x10 [ 16.088141] ? ktime_get_ts64+0x86/0x230 [ 16.088198] kunit_try_run_case+0x1a5/0x480 [ 16.088262] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.088300] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.088358] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.088396] ? __kthread_parkme+0x82/0x180 [ 16.088422] ? preempt_count_sub+0x50/0x80 [ 16.088444] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.088465] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.088486] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.088507] kthread+0x337/0x6f0 [ 16.088525] ? trace_preempt_on+0x20/0xc0 [ 16.088546] ? __pfx_kthread+0x10/0x10 [ 16.088564] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.088582] ? calculate_sigpending+0x7b/0xa0 [ 16.088603] ? __pfx_kthread+0x10/0x10 [ 16.088640] ret_from_fork+0x116/0x1d0 [ 16.088659] ? __pfx_kthread+0x10/0x10 [ 16.088678] ret_from_fork_asm+0x1a/0x30 [ 16.088706] </TASK> [ 16.088718] [ 16.099227] Allocated by task 279: [ 16.099528] kasan_save_stack+0x45/0x70 [ 16.099889] kasan_save_track+0x18/0x40 [ 16.100264] kasan_save_alloc_info+0x3b/0x50 [ 16.100647] __kasan_kmalloc+0xb7/0xc0 [ 16.100981] __kmalloc_cache_noprof+0x189/0x420 [ 16.101351] kasan_bitops_generic+0x92/0x1c0 [ 16.101604] kunit_try_run_case+0x1a5/0x480 [ 16.101877] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.102165] kthread+0x337/0x6f0 [ 16.102393] ret_from_fork+0x116/0x1d0 [ 16.102718] ret_from_fork_asm+0x1a/0x30 [ 16.103033] [ 16.103220] The buggy address belongs to the object at ffff8881024eb440 [ 16.103220] which belongs to the cache kmalloc-16 of size 16 [ 16.103994] The buggy address is located 8 bytes inside of [ 16.103994] allocated 9-byte region [ffff8881024eb440, ffff8881024eb449) [ 16.104871] [ 16.105073] The buggy address belongs to the physical page: [ 16.105494] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024eb [ 16.106001] flags: 0x200000000000000(node=0|zone=2) [ 16.106389] page_type: f5(slab) [ 16.106722] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 16.106989] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 16.107482] page dumped because: kasan: bad access detected [ 16.107962] [ 16.108154] Memory state around the buggy address: [ 16.108500] ffff8881024eb300: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 16.108899] ffff8881024eb380: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 16.109406] >ffff8881024eb400: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 16.109671] ^ [ 16.109873] ffff8881024eb480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.110112] ffff8881024eb500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.110670] ================================================================== [ 15.871272] ================================================================== [ 15.871689] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 15.871981] Write of size 8 at addr ffff8881024eb448 by task kunit_try_catch/279 [ 15.872404] [ 15.872580] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.872811] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.872842] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.872907] Call Trace: [ 15.872961] <TASK> [ 15.872990] dump_stack_lvl+0x73/0xb0 [ 15.873046] print_report+0xd1/0x650 [ 15.873086] ? __virt_addr_valid+0x1db/0x2d0 [ 15.873154] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 15.873203] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.873250] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 15.873301] kasan_report+0x141/0x180 [ 15.873343] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 15.873404] kasan_check_range+0x10c/0x1c0 [ 15.873450] __kasan_check_write+0x18/0x20 [ 15.873486] kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 15.873537] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 15.873589] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.873648] ? trace_hardirqs_on+0x37/0xe0 [ 15.873693] ? kasan_bitops_generic+0x92/0x1c0 [ 15.873897] kasan_bitops_generic+0x121/0x1c0 [ 15.873941] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 15.873976] ? __pfx_read_tsc+0x10/0x10 [ 15.874006] ? ktime_get_ts64+0x86/0x230 [ 15.874041] kunit_try_run_case+0x1a5/0x480 [ 15.874074] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.874142] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.874257] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.874308] ? __kthread_parkme+0x82/0x180 [ 15.874343] ? preempt_count_sub+0x50/0x80 [ 15.874383] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.874426] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.874470] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.874512] kthread+0x337/0x6f0 [ 15.874541] ? trace_preempt_on+0x20/0xc0 [ 15.874563] ? __pfx_kthread+0x10/0x10 [ 15.874581] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.874600] ? calculate_sigpending+0x7b/0xa0 [ 15.874641] ? __pfx_kthread+0x10/0x10 [ 15.874662] ret_from_fork+0x116/0x1d0 [ 15.874680] ? __pfx_kthread+0x10/0x10 [ 15.874698] ret_from_fork_asm+0x1a/0x30 [ 15.874726] </TASK> [ 15.874739] [ 15.884949] Allocated by task 279: [ 15.885309] kasan_save_stack+0x45/0x70 [ 15.885648] kasan_save_track+0x18/0x40 [ 15.885955] kasan_save_alloc_info+0x3b/0x50 [ 15.886293] __kasan_kmalloc+0xb7/0xc0 [ 15.886645] __kmalloc_cache_noprof+0x189/0x420 [ 15.886970] kasan_bitops_generic+0x92/0x1c0 [ 15.887263] kunit_try_run_case+0x1a5/0x480 [ 15.887523] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.887920] kthread+0x337/0x6f0 [ 15.888246] ret_from_fork+0x116/0x1d0 [ 15.888498] ret_from_fork_asm+0x1a/0x30 [ 15.888682] [ 15.888790] The buggy address belongs to the object at ffff8881024eb440 [ 15.888790] which belongs to the cache kmalloc-16 of size 16 [ 15.889626] The buggy address is located 8 bytes inside of [ 15.889626] allocated 9-byte region [ffff8881024eb440, ffff8881024eb449) [ 15.890353] [ 15.890528] The buggy address belongs to the physical page: [ 15.890827] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024eb [ 15.891084] flags: 0x200000000000000(node=0|zone=2) [ 15.891516] page_type: f5(slab) [ 15.891799] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 15.892418] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 15.892912] page dumped because: kasan: bad access detected [ 15.893142] [ 15.893243] Memory state around the buggy address: [ 15.893426] ffff8881024eb300: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 15.894027] ffff8881024eb380: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 15.894590] >ffff8881024eb400: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 15.895012] ^ [ 15.895415] ffff8881024eb480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.895833] ffff8881024eb500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.896293] ================================================================== [ 16.059817] ================================================================== [ 16.060115] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 16.060407] Read of size 8 at addr ffff8881024eb448 by task kunit_try_catch/279 [ 16.060936] [ 16.061178] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.061260] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.061284] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.061323] Call Trace: [ 16.061352] <TASK> [ 16.061382] dump_stack_lvl+0x73/0xb0 [ 16.061435] print_report+0xd1/0x650 [ 16.061473] ? __virt_addr_valid+0x1db/0x2d0 [ 16.061504] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 16.061549] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.061590] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 16.061674] kasan_report+0x141/0x180 [ 16.061717] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 16.061781] kasan_check_range+0x10c/0x1c0 [ 16.061826] __kasan_check_read+0x15/0x20 [ 16.061859] kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 16.061901] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 16.061957] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.062002] ? trace_hardirqs_on+0x37/0xe0 [ 16.062045] ? kasan_bitops_generic+0x92/0x1c0 [ 16.062111] kasan_bitops_generic+0x121/0x1c0 [ 16.062163] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 16.062204] ? __pfx_read_tsc+0x10/0x10 [ 16.062238] ? ktime_get_ts64+0x86/0x230 [ 16.062295] kunit_try_run_case+0x1a5/0x480 [ 16.062372] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.062409] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.062446] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.062485] ? __kthread_parkme+0x82/0x180 [ 16.062521] ? preempt_count_sub+0x50/0x80 [ 16.062566] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.062607] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.062664] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.062705] kthread+0x337/0x6f0 [ 16.062742] ? trace_preempt_on+0x20/0xc0 [ 16.062807] ? __pfx_kthread+0x10/0x10 [ 16.062846] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.062886] ? calculate_sigpending+0x7b/0xa0 [ 16.062929] ? __pfx_kthread+0x10/0x10 [ 16.062963] ret_from_fork+0x116/0x1d0 [ 16.062982] ? __pfx_kthread+0x10/0x10 [ 16.063001] ret_from_fork_asm+0x1a/0x30 [ 16.063030] </TASK> [ 16.063042] [ 16.072002] Allocated by task 279: [ 16.072172] kasan_save_stack+0x45/0x70 [ 16.072572] kasan_save_track+0x18/0x40 [ 16.072885] kasan_save_alloc_info+0x3b/0x50 [ 16.073201] __kasan_kmalloc+0xb7/0xc0 [ 16.073477] __kmalloc_cache_noprof+0x189/0x420 [ 16.073813] kasan_bitops_generic+0x92/0x1c0 [ 16.074099] kunit_try_run_case+0x1a5/0x480 [ 16.074399] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.074678] kthread+0x337/0x6f0 [ 16.074944] ret_from_fork+0x116/0x1d0 [ 16.075203] ret_from_fork_asm+0x1a/0x30 [ 16.075482] [ 16.075665] The buggy address belongs to the object at ffff8881024eb440 [ 16.075665] which belongs to the cache kmalloc-16 of size 16 [ 16.076193] The buggy address is located 8 bytes inside of [ 16.076193] allocated 9-byte region [ffff8881024eb440, ffff8881024eb449) [ 16.076607] [ 16.076726] The buggy address belongs to the physical page: [ 16.076915] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024eb [ 16.077226] flags: 0x200000000000000(node=0|zone=2) [ 16.077574] page_type: f5(slab) [ 16.077850] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 16.078553] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 16.079077] page dumped because: kasan: bad access detected [ 16.079437] [ 16.079539] Memory state around the buggy address: [ 16.079737] ffff8881024eb300: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 16.080001] ffff8881024eb380: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 16.080480] >ffff8881024eb400: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 16.080977] ^ [ 16.081354] ffff8881024eb480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.081735] ffff8881024eb500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.082114] ================================================================== [ 15.922781] ================================================================== [ 15.923589] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 15.924192] Write of size 8 at addr ffff8881024eb448 by task kunit_try_catch/279 [ 15.924633] [ 15.924865] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.924945] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.924969] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.925032] Call Trace: [ 15.925061] <TASK> [ 15.925129] dump_stack_lvl+0x73/0xb0 [ 15.925214] print_report+0xd1/0x650 [ 15.925257] ? __virt_addr_valid+0x1db/0x2d0 [ 15.925323] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 15.925388] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.925669] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 15.925722] kasan_report+0x141/0x180 [ 15.925949] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 15.926002] kasan_check_range+0x10c/0x1c0 [ 15.926030] __kasan_check_write+0x18/0x20 [ 15.926048] kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 15.926073] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 15.926097] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.926137] ? trace_hardirqs_on+0x37/0xe0 [ 15.926160] ? kasan_bitops_generic+0x92/0x1c0 [ 15.926185] kasan_bitops_generic+0x121/0x1c0 [ 15.926206] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 15.926228] ? __pfx_read_tsc+0x10/0x10 [ 15.926247] ? ktime_get_ts64+0x86/0x230 [ 15.926269] kunit_try_run_case+0x1a5/0x480 [ 15.926290] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.926311] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.926333] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.926353] ? __kthread_parkme+0x82/0x180 [ 15.926371] ? preempt_count_sub+0x50/0x80 [ 15.926393] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.926414] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.926434] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.926454] kthread+0x337/0x6f0 [ 15.926472] ? trace_preempt_on+0x20/0xc0 [ 15.926492] ? __pfx_kthread+0x10/0x10 [ 15.926511] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.926530] ? calculate_sigpending+0x7b/0xa0 [ 15.926551] ? __pfx_kthread+0x10/0x10 [ 15.926571] ret_from_fork+0x116/0x1d0 [ 15.926587] ? __pfx_kthread+0x10/0x10 [ 15.926606] ret_from_fork_asm+0x1a/0x30 [ 15.926651] </TASK> [ 15.926664] [ 15.937563] Allocated by task 279: [ 15.937863] kasan_save_stack+0x45/0x70 [ 15.938048] kasan_save_track+0x18/0x40 [ 15.938352] kasan_save_alloc_info+0x3b/0x50 [ 15.938518] __kasan_kmalloc+0xb7/0xc0 [ 15.938812] __kmalloc_cache_noprof+0x189/0x420 [ 15.938980] kasan_bitops_generic+0x92/0x1c0 [ 15.939243] kunit_try_run_case+0x1a5/0x480 [ 15.939462] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.939794] kthread+0x337/0x6f0 [ 15.940074] ret_from_fork+0x116/0x1d0 [ 15.940321] ret_from_fork_asm+0x1a/0x30 [ 15.940942] [ 15.941814] The buggy address belongs to the object at ffff8881024eb440 [ 15.941814] which belongs to the cache kmalloc-16 of size 16 [ 15.944196] The buggy address is located 8 bytes inside of [ 15.944196] allocated 9-byte region [ffff8881024eb440, ffff8881024eb449) [ 15.944550] [ 15.944714] The buggy address belongs to the physical page: [ 15.945084] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024eb [ 15.945364] flags: 0x200000000000000(node=0|zone=2) [ 15.945542] page_type: f5(slab) [ 15.945731] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 15.945963] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 15.946329] page dumped because: kasan: bad access detected [ 15.946650] [ 15.946808] Memory state around the buggy address: [ 15.947157] ffff8881024eb300: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 15.947659] ffff8881024eb380: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 15.948149] >ffff8881024eb400: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 15.948375] ^ [ 15.948566] ffff8881024eb480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.948801] ffff8881024eb500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.949014] ================================================================== [ 15.949757] ================================================================== [ 15.950382] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 15.951079] Write of size 8 at addr ffff8881024eb448 by task kunit_try_catch/279 [ 15.951447] [ 15.951610] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.951693] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.951723] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.951758] Call Trace: [ 15.951796] <TASK> [ 15.951824] dump_stack_lvl+0x73/0xb0 [ 15.951874] print_report+0xd1/0x650 [ 15.951914] ? __virt_addr_valid+0x1db/0x2d0 [ 15.951959] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 15.952010] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.952069] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 15.952145] kasan_report+0x141/0x180 [ 15.952197] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 15.952266] kasan_check_range+0x10c/0x1c0 [ 15.952341] __kasan_check_write+0x18/0x20 [ 15.952380] kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 15.952432] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 15.952495] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.952540] ? trace_hardirqs_on+0x37/0xe0 [ 15.952582] ? kasan_bitops_generic+0x92/0x1c0 [ 15.952655] kasan_bitops_generic+0x121/0x1c0 [ 15.952701] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 15.952759] ? __pfx_read_tsc+0x10/0x10 [ 15.952793] ? ktime_get_ts64+0x86/0x230 [ 15.952837] kunit_try_run_case+0x1a5/0x480 [ 15.952879] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.952927] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.952984] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.953024] ? __kthread_parkme+0x82/0x180 [ 15.953060] ? preempt_count_sub+0x50/0x80 [ 15.953137] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.953199] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.953242] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.953284] kthread+0x337/0x6f0 [ 15.953327] ? trace_preempt_on+0x20/0xc0 [ 15.953383] ? __pfx_kthread+0x10/0x10 [ 15.953423] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.953462] ? calculate_sigpending+0x7b/0xa0 [ 15.953512] ? __pfx_kthread+0x10/0x10 [ 15.953554] ret_from_fork+0x116/0x1d0 [ 15.953604] ? __pfx_kthread+0x10/0x10 [ 15.953667] ret_from_fork_asm+0x1a/0x30 [ 15.953732] </TASK> [ 15.953755] [ 15.963580] Allocated by task 279: [ 15.963871] kasan_save_stack+0x45/0x70 [ 15.964225] kasan_save_track+0x18/0x40 [ 15.964452] kasan_save_alloc_info+0x3b/0x50 [ 15.964765] __kasan_kmalloc+0xb7/0xc0 [ 15.964933] __kmalloc_cache_noprof+0x189/0x420 [ 15.965146] kasan_bitops_generic+0x92/0x1c0 [ 15.965328] kunit_try_run_case+0x1a5/0x480 [ 15.965598] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.966014] kthread+0x337/0x6f0 [ 15.966312] ret_from_fork+0x116/0x1d0 [ 15.966595] ret_from_fork_asm+0x1a/0x30 [ 15.966885] [ 15.967041] The buggy address belongs to the object at ffff8881024eb440 [ 15.967041] which belongs to the cache kmalloc-16 of size 16 [ 15.967586] The buggy address is located 8 bytes inside of [ 15.967586] allocated 9-byte region [ffff8881024eb440, ffff8881024eb449) [ 15.967953] [ 15.968097] The buggy address belongs to the physical page: [ 15.968516] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024eb [ 15.969055] flags: 0x200000000000000(node=0|zone=2) [ 15.969456] page_type: f5(slab) [ 15.969736] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 15.970162] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 15.970562] page dumped because: kasan: bad access detected [ 15.970877] [ 15.971069] Memory state around the buggy address: [ 15.971385] ffff8881024eb300: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 15.971798] ffff8881024eb380: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 15.972198] >ffff8881024eb400: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 15.972531] ^ [ 15.972878] ffff8881024eb480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.973305] ffff8881024eb500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.973536] ================================================================== [ 15.975078] ================================================================== [ 15.976267] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 15.976769] Write of size 8 at addr ffff8881024eb448 by task kunit_try_catch/279 [ 15.977297] [ 15.977457] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.977550] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.977569] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.977592] Call Trace: [ 15.977611] <TASK> [ 15.977645] dump_stack_lvl+0x73/0xb0 [ 15.977685] print_report+0xd1/0x650 [ 15.977716] ? __virt_addr_valid+0x1db/0x2d0 [ 15.977752] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 15.977787] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.977825] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 15.977871] kasan_report+0x141/0x180 [ 15.977908] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 15.977974] kasan_check_range+0x10c/0x1c0 [ 15.978028] __kasan_check_write+0x18/0x20 [ 15.978067] kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 15.978142] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 15.978199] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.978258] ? trace_hardirqs_on+0x37/0xe0 [ 15.978300] ? kasan_bitops_generic+0x92/0x1c0 [ 15.978351] kasan_bitops_generic+0x121/0x1c0 [ 15.978394] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 15.978440] ? __pfx_read_tsc+0x10/0x10 [ 15.978477] ? ktime_get_ts64+0x86/0x230 [ 15.978524] kunit_try_run_case+0x1a5/0x480 [ 15.978569] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.978611] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.978668] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.978714] ? __kthread_parkme+0x82/0x180 [ 15.978752] ? preempt_count_sub+0x50/0x80 [ 15.978809] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.978854] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.978901] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.978943] kthread+0x337/0x6f0 [ 15.978982] ? trace_preempt_on+0x20/0xc0 [ 15.979025] ? __pfx_kthread+0x10/0x10 [ 15.979064] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.979133] ? calculate_sigpending+0x7b/0xa0 [ 15.979181] ? __pfx_kthread+0x10/0x10 [ 15.979224] ret_from_fork+0x116/0x1d0 [ 15.979255] ? __pfx_kthread+0x10/0x10 [ 15.979289] ret_from_fork_asm+0x1a/0x30 [ 15.979336] </TASK> [ 15.979356] [ 15.990151] Allocated by task 279: [ 15.990335] kasan_save_stack+0x45/0x70 [ 15.990524] kasan_save_track+0x18/0x40 [ 15.991712] kasan_save_alloc_info+0x3b/0x50 [ 15.991928] __kasan_kmalloc+0xb7/0xc0 [ 15.992401] __kmalloc_cache_noprof+0x189/0x420 [ 15.992678] kasan_bitops_generic+0x92/0x1c0 [ 15.992884] kunit_try_run_case+0x1a5/0x480 [ 15.993067] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.993753] kthread+0x337/0x6f0 [ 15.993954] ret_from_fork+0x116/0x1d0 [ 15.994238] ret_from_fork_asm+0x1a/0x30 [ 15.994419] [ 15.994577] The buggy address belongs to the object at ffff8881024eb440 [ 15.994577] which belongs to the cache kmalloc-16 of size 16 [ 15.995689] The buggy address is located 8 bytes inside of [ 15.995689] allocated 9-byte region [ffff8881024eb440, ffff8881024eb449) [ 15.996520] [ 15.996751] The buggy address belongs to the physical page: [ 15.996947] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024eb [ 15.997398] flags: 0x200000000000000(node=0|zone=2) [ 15.997651] page_type: f5(slab) [ 15.997838] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 15.998561] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 15.998864] page dumped because: kasan: bad access detected [ 15.999593] [ 15.999702] Memory state around the buggy address: [ 15.999896] ffff8881024eb300: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 16.000426] ffff8881024eb380: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 16.000710] >ffff8881024eb400: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 16.001111] ^ [ 16.001733] ffff8881024eb480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.002466] ffff8881024eb500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.002960] ================================================================== [ 16.033586] ================================================================== [ 16.034201] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 16.034667] Write of size 8 at addr ffff8881024eb448 by task kunit_try_catch/279 [ 16.034965] [ 16.035092] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.035628] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.035648] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.035668] Call Trace: [ 16.035685] <TASK> [ 16.035702] dump_stack_lvl+0x73/0xb0 [ 16.035733] print_report+0xd1/0x650 [ 16.035754] ? __virt_addr_valid+0x1db/0x2d0 [ 16.035773] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 16.035797] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.035819] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 16.035842] kasan_report+0x141/0x180 [ 16.035861] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 16.035889] kasan_check_range+0x10c/0x1c0 [ 16.035910] __kasan_check_write+0x18/0x20 [ 16.035928] kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 16.035952] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 16.035976] ? __kmalloc_cache_noprof+0x189/0x420 [ 16.035997] ? trace_hardirqs_on+0x37/0xe0 [ 16.036017] ? kasan_bitops_generic+0x92/0x1c0 [ 16.036042] kasan_bitops_generic+0x121/0x1c0 [ 16.036062] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 16.036084] ? __pfx_read_tsc+0x10/0x10 [ 16.036106] ? ktime_get_ts64+0x86/0x230 [ 16.036143] kunit_try_run_case+0x1a5/0x480 [ 16.036164] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.036184] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.036204] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.036224] ? __kthread_parkme+0x82/0x180 [ 16.036242] ? preempt_count_sub+0x50/0x80 [ 16.036263] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.036283] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.036303] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.036322] kthread+0x337/0x6f0 [ 16.036340] ? trace_preempt_on+0x20/0xc0 [ 16.036359] ? __pfx_kthread+0x10/0x10 [ 16.036377] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.036395] ? calculate_sigpending+0x7b/0xa0 [ 16.036416] ? __pfx_kthread+0x10/0x10 [ 16.036435] ret_from_fork+0x116/0x1d0 [ 16.036451] ? __pfx_kthread+0x10/0x10 [ 16.036469] ret_from_fork_asm+0x1a/0x30 [ 16.036497] </TASK> [ 16.036507] [ 16.047691] Allocated by task 279: [ 16.048079] kasan_save_stack+0x45/0x70 [ 16.048385] kasan_save_track+0x18/0x40 [ 16.048836] kasan_save_alloc_info+0x3b/0x50 [ 16.049140] __kasan_kmalloc+0xb7/0xc0 [ 16.049341] __kmalloc_cache_noprof+0x189/0x420 [ 16.049713] kasan_bitops_generic+0x92/0x1c0 [ 16.050249] kunit_try_run_case+0x1a5/0x480 [ 16.050603] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.051084] kthread+0x337/0x6f0 [ 16.051250] ret_from_fork+0x116/0x1d0 [ 16.051708] ret_from_fork_asm+0x1a/0x30 [ 16.051937] [ 16.052088] The buggy address belongs to the object at ffff8881024eb440 [ 16.052088] which belongs to the cache kmalloc-16 of size 16 [ 16.052826] The buggy address is located 8 bytes inside of [ 16.052826] allocated 9-byte region [ffff8881024eb440, ffff8881024eb449) [ 16.053350] [ 16.053548] The buggy address belongs to the physical page: [ 16.053963] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024eb [ 16.054296] flags: 0x200000000000000(node=0|zone=2) [ 16.054566] page_type: f5(slab) [ 16.054866] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 16.055435] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 16.055688] page dumped because: kasan: bad access detected [ 16.056074] [ 16.056199] Memory state around the buggy address: [ 16.056629] ffff8881024eb300: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 16.056890] ffff8881024eb380: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 16.057124] >ffff8881024eb400: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 16.057633] ^ [ 16.058018] ffff8881024eb480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.058413] ffff8881024eb500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.058774] ==================================================================
[ 15.866803] ================================================================== [ 15.867571] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 15.868391] Write of size 8 at addr ffff888102873128 by task kunit_try_catch/278 [ 15.869084] [ 15.869279] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.869326] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.869339] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.869360] Call Trace: [ 15.869375] <TASK> [ 15.869392] dump_stack_lvl+0x73/0xb0 [ 15.869419] print_report+0xd1/0x650 [ 15.869442] ? __virt_addr_valid+0x1db/0x2d0 [ 15.869464] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 15.869492] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.869520] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 15.869553] kasan_report+0x141/0x180 [ 15.869577] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 15.869611] kasan_check_range+0x10c/0x1c0 [ 15.869636] __kasan_check_write+0x18/0x20 [ 15.869656] kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 15.869684] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 15.869737] ? kasan_save_alloc_info+0x3b/0x50 [ 15.869761] ? kasan_save_stack+0x45/0x70 [ 15.869786] kasan_bitops_generic+0x121/0x1c0 [ 15.869810] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 15.869836] ? __pfx_read_tsc+0x10/0x10 [ 15.869858] ? ktime_get_ts64+0x86/0x230 [ 15.869883] kunit_try_run_case+0x1a5/0x480 [ 15.869907] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.869930] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.869953] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.869978] ? __kthread_parkme+0x82/0x180 [ 15.869998] ? preempt_count_sub+0x50/0x80 [ 15.870023] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.870057] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.870080] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.870105] kthread+0x337/0x6f0 [ 15.870126] ? trace_preempt_on+0x20/0xc0 [ 15.870150] ? __pfx_kthread+0x10/0x10 [ 15.870172] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.870194] ? calculate_sigpending+0x7b/0xa0 [ 15.870218] ? __pfx_kthread+0x10/0x10 [ 15.870241] ret_from_fork+0x116/0x1d0 [ 15.870260] ? __pfx_kthread+0x10/0x10 [ 15.870282] ret_from_fork_asm+0x1a/0x30 [ 15.870315] </TASK> [ 15.870327] [ 15.883482] Allocated by task 278: [ 15.883624] kasan_save_stack+0x45/0x70 [ 15.883918] kasan_save_track+0x18/0x40 [ 15.884287] kasan_save_alloc_info+0x3b/0x50 [ 15.884675] __kasan_kmalloc+0xb7/0xc0 [ 15.885069] __kmalloc_cache_noprof+0x189/0x420 [ 15.885498] kasan_bitops_generic+0x92/0x1c0 [ 15.885915] kunit_try_run_case+0x1a5/0x480 [ 15.886305] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.886807] kthread+0x337/0x6f0 [ 15.887122] ret_from_fork+0x116/0x1d0 [ 15.887475] ret_from_fork_asm+0x1a/0x30 [ 15.887870] [ 15.888032] The buggy address belongs to the object at ffff888102873120 [ 15.888032] which belongs to the cache kmalloc-16 of size 16 [ 15.888966] The buggy address is located 8 bytes inside of [ 15.888966] allocated 9-byte region [ffff888102873120, ffff888102873129) [ 15.889470] [ 15.889649] The buggy address belongs to the physical page: [ 15.890168] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102873 [ 15.890880] flags: 0x200000000000000(node=0|zone=2) [ 15.891333] page_type: f5(slab) [ 15.891625] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 15.891999] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 15.892246] page dumped because: kasan: bad access detected [ 15.892425] [ 15.892498] Memory state around the buggy address: [ 15.892658] ffff888102873000: 00 01 fc fc 00 04 fc fc 00 04 fc fc fa fb fc fc [ 15.893243] ffff888102873080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 15.893887] >ffff888102873100: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 15.894512] ^ [ 15.894927] ffff888102873180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.895557] ffff888102873200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.896195] ================================================================== [ 15.926575] ================================================================== [ 15.926845] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 15.927155] Write of size 8 at addr ffff888102873128 by task kunit_try_catch/278 [ 15.927398] [ 15.927490] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.927535] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.927547] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.927570] Call Trace: [ 15.927587] <TASK> [ 15.927604] dump_stack_lvl+0x73/0xb0 [ 15.927631] print_report+0xd1/0x650 [ 15.927654] ? __virt_addr_valid+0x1db/0x2d0 [ 15.927677] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 15.927705] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.927731] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 15.927760] kasan_report+0x141/0x180 [ 15.927783] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 15.927817] kasan_check_range+0x10c/0x1c0 [ 15.927842] __kasan_check_write+0x18/0x20 [ 15.927860] kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 15.927889] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 15.927918] ? kasan_save_alloc_info+0x3b/0x50 [ 15.927942] ? kasan_save_stack+0x45/0x70 [ 15.927966] kasan_bitops_generic+0x121/0x1c0 [ 15.927990] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 15.928016] ? __pfx_read_tsc+0x10/0x10 [ 15.928037] ? ktime_get_ts64+0x86/0x230 [ 15.928241] kunit_try_run_case+0x1a5/0x480 [ 15.928268] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.928292] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.928317] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.928341] ? __kthread_parkme+0x82/0x180 [ 15.928361] ? preempt_count_sub+0x50/0x80 [ 15.928386] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.928411] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.928434] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.928458] kthread+0x337/0x6f0 [ 15.928479] ? trace_preempt_on+0x20/0xc0 [ 15.928502] ? __pfx_kthread+0x10/0x10 [ 15.928524] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.928545] ? calculate_sigpending+0x7b/0xa0 [ 15.928571] ? __pfx_kthread+0x10/0x10 [ 15.928594] ret_from_fork+0x116/0x1d0 [ 15.928612] ? __pfx_kthread+0x10/0x10 [ 15.928635] ret_from_fork_asm+0x1a/0x30 [ 15.928667] </TASK> [ 15.928679] [ 15.943283] Allocated by task 278: [ 15.943422] kasan_save_stack+0x45/0x70 [ 15.943571] kasan_save_track+0x18/0x40 [ 15.943737] kasan_save_alloc_info+0x3b/0x50 [ 15.944128] __kasan_kmalloc+0xb7/0xc0 [ 15.944461] __kmalloc_cache_noprof+0x189/0x420 [ 15.944890] kasan_bitops_generic+0x92/0x1c0 [ 15.945293] kunit_try_run_case+0x1a5/0x480 [ 15.945669] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.946196] kthread+0x337/0x6f0 [ 15.946504] ret_from_fork+0x116/0x1d0 [ 15.946868] ret_from_fork_asm+0x1a/0x30 [ 15.947237] [ 15.947400] The buggy address belongs to the object at ffff888102873120 [ 15.947400] which belongs to the cache kmalloc-16 of size 16 [ 15.948192] The buggy address is located 8 bytes inside of [ 15.948192] allocated 9-byte region [ffff888102873120, ffff888102873129) [ 15.948558] [ 15.948634] The buggy address belongs to the physical page: [ 15.949020] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102873 [ 15.949736] flags: 0x200000000000000(node=0|zone=2) [ 15.950180] page_type: f5(slab) [ 15.950481] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 15.951158] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 15.951823] page dumped because: kasan: bad access detected [ 15.952324] [ 15.952463] Memory state around the buggy address: [ 15.952624] ffff888102873000: 00 01 fc fc 00 04 fc fc 00 04 fc fc fa fb fc fc [ 15.953137] ffff888102873080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 15.953781] >ffff888102873100: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 15.954241] ^ [ 15.954398] ffff888102873180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.954623] ffff888102873200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.955129] ================================================================== [ 16.066715] ================================================================== [ 16.067356] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 16.067647] Read of size 8 at addr ffff888102873128 by task kunit_try_catch/278 [ 16.068071] [ 16.068194] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.068238] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.068250] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.068271] Call Trace: [ 16.068285] <TASK> [ 16.068301] dump_stack_lvl+0x73/0xb0 [ 16.068329] print_report+0xd1/0x650 [ 16.068352] ? __virt_addr_valid+0x1db/0x2d0 [ 16.068375] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 16.068401] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.068427] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 16.068454] kasan_report+0x141/0x180 [ 16.068478] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 16.068511] __asan_report_load8_noabort+0x18/0x20 [ 16.068536] kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 16.068564] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 16.068594] ? kasan_save_alloc_info+0x3b/0x50 [ 16.068618] ? kasan_save_stack+0x45/0x70 [ 16.068642] kasan_bitops_generic+0x121/0x1c0 [ 16.068666] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 16.068691] ? __pfx_read_tsc+0x10/0x10 [ 16.068712] ? ktime_get_ts64+0x86/0x230 [ 16.068752] kunit_try_run_case+0x1a5/0x480 [ 16.068776] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.068799] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.068822] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.068844] ? __kthread_parkme+0x82/0x180 [ 16.068865] ? preempt_count_sub+0x50/0x80 [ 16.068889] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.068913] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.068936] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.068959] kthread+0x337/0x6f0 [ 16.068979] ? trace_preempt_on+0x20/0xc0 [ 16.069003] ? __pfx_kthread+0x10/0x10 [ 16.069024] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.069044] ? calculate_sigpending+0x7b/0xa0 [ 16.069079] ? __pfx_kthread+0x10/0x10 [ 16.069102] ret_from_fork+0x116/0x1d0 [ 16.069120] ? __pfx_kthread+0x10/0x10 [ 16.069141] ret_from_fork_asm+0x1a/0x30 [ 16.069173] </TASK> [ 16.069185] [ 16.077372] Allocated by task 278: [ 16.077572] kasan_save_stack+0x45/0x70 [ 16.077807] kasan_save_track+0x18/0x40 [ 16.077999] kasan_save_alloc_info+0x3b/0x50 [ 16.078195] __kasan_kmalloc+0xb7/0xc0 [ 16.078390] __kmalloc_cache_noprof+0x189/0x420 [ 16.078558] kasan_bitops_generic+0x92/0x1c0 [ 16.078838] kunit_try_run_case+0x1a5/0x480 [ 16.079071] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.079315] kthread+0x337/0x6f0 [ 16.079488] ret_from_fork+0x116/0x1d0 [ 16.079652] ret_from_fork_asm+0x1a/0x30 [ 16.079829] [ 16.079932] The buggy address belongs to the object at ffff888102873120 [ 16.079932] which belongs to the cache kmalloc-16 of size 16 [ 16.080501] The buggy address is located 8 bytes inside of [ 16.080501] allocated 9-byte region [ffff888102873120, ffff888102873129) [ 16.080989] [ 16.081099] The buggy address belongs to the physical page: [ 16.081369] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102873 [ 16.081659] flags: 0x200000000000000(node=0|zone=2) [ 16.081902] page_type: f5(slab) [ 16.082126] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 16.082432] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 16.082789] page dumped because: kasan: bad access detected [ 16.083129] [ 16.083204] Memory state around the buggy address: [ 16.083369] ffff888102873000: 00 01 fc fc 00 04 fc fc 00 04 fc fc fa fb fc fc [ 16.083600] ffff888102873080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 16.083830] >ffff888102873100: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 16.084190] ^ [ 16.084424] ffff888102873180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.084814] ffff888102873200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.085164] ================================================================== [ 15.956641] ================================================================== [ 15.957334] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 15.958128] Write of size 8 at addr ffff888102873128 by task kunit_try_catch/278 [ 15.958666] [ 15.958821] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.958866] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.958878] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.958899] Call Trace: [ 15.958915] <TASK> [ 15.958930] dump_stack_lvl+0x73/0xb0 [ 15.958958] print_report+0xd1/0x650 [ 15.958981] ? __virt_addr_valid+0x1db/0x2d0 [ 15.959003] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 15.959030] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.959068] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 15.959096] kasan_report+0x141/0x180 [ 15.959118] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 15.959151] kasan_check_range+0x10c/0x1c0 [ 15.959175] __kasan_check_write+0x18/0x20 [ 15.959194] kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 15.959222] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 15.959250] ? kasan_save_alloc_info+0x3b/0x50 [ 15.959274] ? kasan_save_stack+0x45/0x70 [ 15.959297] kasan_bitops_generic+0x121/0x1c0 [ 15.959320] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 15.959345] ? __pfx_read_tsc+0x10/0x10 [ 15.959366] ? ktime_get_ts64+0x86/0x230 [ 15.959390] kunit_try_run_case+0x1a5/0x480 [ 15.959414] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.959436] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.959459] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.959482] ? __kthread_parkme+0x82/0x180 [ 15.959501] ? preempt_count_sub+0x50/0x80 [ 15.959525] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.959549] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.959573] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.959595] kthread+0x337/0x6f0 [ 15.959616] ? trace_preempt_on+0x20/0xc0 [ 15.959638] ? __pfx_kthread+0x10/0x10 [ 15.959659] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.959680] ? calculate_sigpending+0x7b/0xa0 [ 15.959704] ? __pfx_kthread+0x10/0x10 [ 15.959746] ret_from_fork+0x116/0x1d0 [ 15.959765] ? __pfx_kthread+0x10/0x10 [ 15.959785] ret_from_fork_asm+0x1a/0x30 [ 15.959817] </TASK> [ 15.959828] [ 15.972792] Allocated by task 278: [ 15.973142] kasan_save_stack+0x45/0x70 [ 15.973532] kasan_save_track+0x18/0x40 [ 15.973932] kasan_save_alloc_info+0x3b/0x50 [ 15.974358] __kasan_kmalloc+0xb7/0xc0 [ 15.974754] __kmalloc_cache_noprof+0x189/0x420 [ 15.974976] kasan_bitops_generic+0x92/0x1c0 [ 15.975307] kunit_try_run_case+0x1a5/0x480 [ 15.975699] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.976167] kthread+0x337/0x6f0 [ 15.976299] ret_from_fork+0x116/0x1d0 [ 15.976443] ret_from_fork_asm+0x1a/0x30 [ 15.976595] [ 15.976672] The buggy address belongs to the object at ffff888102873120 [ 15.976672] which belongs to the cache kmalloc-16 of size 16 [ 15.977799] The buggy address is located 8 bytes inside of [ 15.977799] allocated 9-byte region [ffff888102873120, ffff888102873129) [ 15.978885] [ 15.979063] The buggy address belongs to the physical page: [ 15.979563] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102873 [ 15.980035] flags: 0x200000000000000(node=0|zone=2) [ 15.980224] page_type: f5(slab) [ 15.980357] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 15.980604] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 15.981179] page dumped because: kasan: bad access detected [ 15.981680] [ 15.981871] Memory state around the buggy address: [ 15.982317] ffff888102873000: 00 01 fc fc 00 04 fc fc 00 04 fc fc fa fb fc fc [ 15.982965] ffff888102873080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 15.983617] >ffff888102873100: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 15.984262] ^ [ 15.984677] ffff888102873180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.985222] ffff888102873200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.985449] ================================================================== [ 15.837376] ================================================================== [ 15.838464] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 15.839350] Write of size 8 at addr ffff888102873128 by task kunit_try_catch/278 [ 15.839867] [ 15.839960] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.840006] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.840019] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.840040] Call Trace: [ 15.840417] <TASK> [ 15.840440] dump_stack_lvl+0x73/0xb0 [ 15.840471] print_report+0xd1/0x650 [ 15.840493] ? __virt_addr_valid+0x1db/0x2d0 [ 15.840516] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 15.840544] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.840569] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 15.840596] kasan_report+0x141/0x180 [ 15.840618] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 15.840649] kasan_check_range+0x10c/0x1c0 [ 15.840673] __kasan_check_write+0x18/0x20 [ 15.840692] kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 15.840748] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 15.840778] ? kasan_save_alloc_info+0x3b/0x50 [ 15.840801] ? kasan_save_stack+0x45/0x70 [ 15.840825] kasan_bitops_generic+0x121/0x1c0 [ 15.840849] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 15.840873] ? __pfx_read_tsc+0x10/0x10 [ 15.840893] ? ktime_get_ts64+0x86/0x230 [ 15.840918] kunit_try_run_case+0x1a5/0x480 [ 15.840941] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.840962] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.840986] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.841008] ? __kthread_parkme+0x82/0x180 [ 15.841027] ? preempt_count_sub+0x50/0x80 [ 15.841062] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.841086] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.841107] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.841130] kthread+0x337/0x6f0 [ 15.841149] ? trace_preempt_on+0x20/0xc0 [ 15.841171] ? __pfx_kthread+0x10/0x10 [ 15.841192] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.841212] ? calculate_sigpending+0x7b/0xa0 [ 15.841236] ? __pfx_kthread+0x10/0x10 [ 15.841257] ret_from_fork+0x116/0x1d0 [ 15.841275] ? __pfx_kthread+0x10/0x10 [ 15.841295] ret_from_fork_asm+0x1a/0x30 [ 15.841327] </TASK> [ 15.841338] [ 15.854241] Allocated by task 278: [ 15.854380] kasan_save_stack+0x45/0x70 [ 15.854527] kasan_save_track+0x18/0x40 [ 15.854667] kasan_save_alloc_info+0x3b/0x50 [ 15.855055] __kasan_kmalloc+0xb7/0xc0 [ 15.855398] __kmalloc_cache_noprof+0x189/0x420 [ 15.855837] kasan_bitops_generic+0x92/0x1c0 [ 15.856269] kunit_try_run_case+0x1a5/0x480 [ 15.856646] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.857151] kthread+0x337/0x6f0 [ 15.857468] ret_from_fork+0x116/0x1d0 [ 15.857845] ret_from_fork_asm+0x1a/0x30 [ 15.858235] [ 15.858339] The buggy address belongs to the object at ffff888102873120 [ 15.858339] which belongs to the cache kmalloc-16 of size 16 [ 15.858732] The buggy address is located 8 bytes inside of [ 15.858732] allocated 9-byte region [ffff888102873120, ffff888102873129) [ 15.859794] [ 15.859959] The buggy address belongs to the physical page: [ 15.860465] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102873 [ 15.861038] flags: 0x200000000000000(node=0|zone=2) [ 15.861224] page_type: f5(slab) [ 15.861355] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 15.861609] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 15.862157] page dumped because: kasan: bad access detected [ 15.862653] [ 15.862839] Memory state around the buggy address: [ 15.863269] ffff888102873000: 00 01 fc fc 00 04 fc fc 00 04 fc fc fa fb fc fc [ 15.863926] ffff888102873080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 15.864564] >ffff888102873100: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 15.865236] ^ [ 15.865666] ffff888102873180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.865966] ffff888102873200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.866207] ================================================================== [ 16.045357] ================================================================== [ 16.046006] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 16.046865] Read of size 8 at addr ffff888102873128 by task kunit_try_catch/278 [ 16.047502] [ 16.047680] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.047727] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.047753] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.047775] Call Trace: [ 16.047791] <TASK> [ 16.047807] dump_stack_lvl+0x73/0xb0 [ 16.047835] print_report+0xd1/0x650 [ 16.047858] ? __virt_addr_valid+0x1db/0x2d0 [ 16.047880] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 16.047907] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.047933] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 16.047961] kasan_report+0x141/0x180 [ 16.047982] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 16.048014] kasan_check_range+0x10c/0x1c0 [ 16.048037] __kasan_check_read+0x15/0x20 [ 16.048078] kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 16.048105] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 16.048134] ? kasan_save_alloc_info+0x3b/0x50 [ 16.048157] ? kasan_save_stack+0x45/0x70 [ 16.048181] kasan_bitops_generic+0x121/0x1c0 [ 16.048204] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 16.048229] ? __pfx_read_tsc+0x10/0x10 [ 16.048250] ? ktime_get_ts64+0x86/0x230 [ 16.048277] kunit_try_run_case+0x1a5/0x480 [ 16.048302] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.048324] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.048346] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.048369] ? __kthread_parkme+0x82/0x180 [ 16.048389] ? preempt_count_sub+0x50/0x80 [ 16.048411] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.048434] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.048457] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.048479] kthread+0x337/0x6f0 [ 16.048498] ? trace_preempt_on+0x20/0xc0 [ 16.048522] ? __pfx_kthread+0x10/0x10 [ 16.048541] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.048562] ? calculate_sigpending+0x7b/0xa0 [ 16.048585] ? __pfx_kthread+0x10/0x10 [ 16.048608] ret_from_fork+0x116/0x1d0 [ 16.048627] ? __pfx_kthread+0x10/0x10 [ 16.048646] ret_from_fork_asm+0x1a/0x30 [ 16.048677] </TASK> [ 16.048688] [ 16.058164] Allocated by task 278: [ 16.058359] kasan_save_stack+0x45/0x70 [ 16.058615] kasan_save_track+0x18/0x40 [ 16.058921] kasan_save_alloc_info+0x3b/0x50 [ 16.059094] __kasan_kmalloc+0xb7/0xc0 [ 16.059232] __kmalloc_cache_noprof+0x189/0x420 [ 16.059396] kasan_bitops_generic+0x92/0x1c0 [ 16.059613] kunit_try_run_case+0x1a5/0x480 [ 16.059955] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.060228] kthread+0x337/0x6f0 [ 16.060626] ret_from_fork+0x116/0x1d0 [ 16.060842] ret_from_fork_asm+0x1a/0x30 [ 16.061032] [ 16.061140] The buggy address belongs to the object at ffff888102873120 [ 16.061140] which belongs to the cache kmalloc-16 of size 16 [ 16.061552] The buggy address is located 8 bytes inside of [ 16.061552] allocated 9-byte region [ffff888102873120, ffff888102873129) [ 16.062026] [ 16.062137] The buggy address belongs to the physical page: [ 16.062370] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102873 [ 16.062619] flags: 0x200000000000000(node=0|zone=2) [ 16.062976] page_type: f5(slab) [ 16.063161] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 16.063516] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 16.063836] page dumped because: kasan: bad access detected [ 16.064110] [ 16.064192] Memory state around the buggy address: [ 16.064415] ffff888102873000: 00 01 fc fc 00 04 fc fc 00 04 fc fc fa fb fc fc [ 16.064681] ffff888102873080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 16.065037] >ffff888102873100: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 16.065327] ^ [ 16.065534] ffff888102873180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.065842] ffff888102873200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.066141] ================================================================== [ 16.015013] ================================================================== [ 16.015690] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 16.016508] Write of size 8 at addr ffff888102873128 by task kunit_try_catch/278 [ 16.017191] [ 16.017311] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.017357] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.017369] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.017391] Call Trace: [ 16.017407] <TASK> [ 16.017424] dump_stack_lvl+0x73/0xb0 [ 16.017453] print_report+0xd1/0x650 [ 16.017475] ? __virt_addr_valid+0x1db/0x2d0 [ 16.017498] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 16.017531] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.017558] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 16.017587] kasan_report+0x141/0x180 [ 16.017609] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 16.017643] kasan_check_range+0x10c/0x1c0 [ 16.017667] __kasan_check_write+0x18/0x20 [ 16.017687] kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 16.017742] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 16.017773] ? kasan_save_alloc_info+0x3b/0x50 [ 16.017796] ? kasan_save_stack+0x45/0x70 [ 16.017821] kasan_bitops_generic+0x121/0x1c0 [ 16.017846] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 16.017872] ? __pfx_read_tsc+0x10/0x10 [ 16.017892] ? ktime_get_ts64+0x86/0x230 [ 16.017918] kunit_try_run_case+0x1a5/0x480 [ 16.017942] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.017964] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.017989] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.018012] ? __kthread_parkme+0x82/0x180 [ 16.018032] ? preempt_count_sub+0x50/0x80 [ 16.018066] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.018090] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.018114] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.018137] kthread+0x337/0x6f0 [ 16.018157] ? trace_preempt_on+0x20/0xc0 [ 16.018181] ? __pfx_kthread+0x10/0x10 [ 16.018203] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.018224] ? calculate_sigpending+0x7b/0xa0 [ 16.018248] ? __pfx_kthread+0x10/0x10 [ 16.018270] ret_from_fork+0x116/0x1d0 [ 16.018289] ? __pfx_kthread+0x10/0x10 [ 16.018310] ret_from_fork_asm+0x1a/0x30 [ 16.018343] </TASK> [ 16.018355] [ 16.031741] Allocated by task 278: [ 16.032091] kasan_save_stack+0x45/0x70 [ 16.032471] kasan_save_track+0x18/0x40 [ 16.033242] kasan_save_alloc_info+0x3b/0x50 [ 16.033747] __kasan_kmalloc+0xb7/0xc0 [ 16.034159] __kmalloc_cache_noprof+0x189/0x420 [ 16.034581] kasan_bitops_generic+0x92/0x1c0 [ 16.034997] kunit_try_run_case+0x1a5/0x480 [ 16.035395] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.035612] kthread+0x337/0x6f0 [ 16.035754] ret_from_fork+0x116/0x1d0 [ 16.035899] ret_from_fork_asm+0x1a/0x30 [ 16.036073] [ 16.036245] The buggy address belongs to the object at ffff888102873120 [ 16.036245] which belongs to the cache kmalloc-16 of size 16 [ 16.037300] The buggy address is located 8 bytes inside of [ 16.037300] allocated 9-byte region [ffff888102873120, ffff888102873129) [ 16.038139] [ 16.038221] The buggy address belongs to the physical page: [ 16.038405] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102873 [ 16.038660] flags: 0x200000000000000(node=0|zone=2) [ 16.038833] page_type: f5(slab) [ 16.040193] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 16.040489] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 16.040736] page dumped because: kasan: bad access detected [ 16.040917] [ 16.041013] Memory state around the buggy address: [ 16.041245] ffff888102873000: 00 01 fc fc 00 04 fc fc 00 04 fc fc fa fb fc fc [ 16.041568] ffff888102873080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 16.041877] >ffff888102873100: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 16.043190] ^ [ 16.043362] ffff888102873180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.043589] ffff888102873200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.043812] ================================================================== [ 15.986069] ================================================================== [ 15.986743] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 15.987516] Write of size 8 at addr ffff888102873128 by task kunit_try_catch/278 [ 15.988193] [ 15.988376] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.988420] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.988432] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.988454] Call Trace: [ 15.988469] <TASK> [ 15.988484] dump_stack_lvl+0x73/0xb0 [ 15.988510] print_report+0xd1/0x650 [ 15.988532] ? __virt_addr_valid+0x1db/0x2d0 [ 15.988555] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 15.988583] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.988609] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 15.988637] kasan_report+0x141/0x180 [ 15.988659] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 15.988692] kasan_check_range+0x10c/0x1c0 [ 15.988739] __kasan_check_write+0x18/0x20 [ 15.988759] kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 15.988786] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 15.988815] ? kasan_save_alloc_info+0x3b/0x50 [ 15.988839] ? kasan_save_stack+0x45/0x70 [ 15.988863] kasan_bitops_generic+0x121/0x1c0 [ 15.988886] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 15.988911] ? __pfx_read_tsc+0x10/0x10 [ 15.988932] ? ktime_get_ts64+0x86/0x230 [ 15.988957] kunit_try_run_case+0x1a5/0x480 [ 15.988981] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.989002] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.989025] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.989060] ? __kthread_parkme+0x82/0x180 [ 15.989080] ? preempt_count_sub+0x50/0x80 [ 15.989103] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.989126] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.989148] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.989171] kthread+0x337/0x6f0 [ 15.989191] ? trace_preempt_on+0x20/0xc0 [ 15.989214] ? __pfx_kthread+0x10/0x10 [ 15.989235] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.989255] ? calculate_sigpending+0x7b/0xa0 [ 15.989278] ? __pfx_kthread+0x10/0x10 [ 15.989299] ret_from_fork+0x116/0x1d0 [ 15.989317] ? __pfx_kthread+0x10/0x10 [ 15.989337] ret_from_fork_asm+0x1a/0x30 [ 15.989369] </TASK> [ 15.989380] [ 16.001534] Allocated by task 278: [ 16.001875] kasan_save_stack+0x45/0x70 [ 16.002242] kasan_save_track+0x18/0x40 [ 16.002623] kasan_save_alloc_info+0x3b/0x50 [ 16.003037] __kasan_kmalloc+0xb7/0xc0 [ 16.003400] __kmalloc_cache_noprof+0x189/0x420 [ 16.003842] kasan_bitops_generic+0x92/0x1c0 [ 16.004236] kunit_try_run_case+0x1a5/0x480 [ 16.004625] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.005140] kthread+0x337/0x6f0 [ 16.005456] ret_from_fork+0x116/0x1d0 [ 16.005835] ret_from_fork_asm+0x1a/0x30 [ 16.006213] [ 16.006292] The buggy address belongs to the object at ffff888102873120 [ 16.006292] which belongs to the cache kmalloc-16 of size 16 [ 16.006654] The buggy address is located 8 bytes inside of [ 16.006654] allocated 9-byte region [ffff888102873120, ffff888102873129) [ 16.007648] [ 16.007833] The buggy address belongs to the physical page: [ 16.008317] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102873 [ 16.009013] flags: 0x200000000000000(node=0|zone=2) [ 16.009362] page_type: f5(slab) [ 16.009489] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 16.009766] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 16.010448] page dumped because: kasan: bad access detected [ 16.010956] [ 16.011127] Memory state around the buggy address: [ 16.011559] ffff888102873000: 00 01 fc fc 00 04 fc fc 00 04 fc fc fa fb fc fc [ 16.012069] ffff888102873080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 16.012295] >ffff888102873100: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 16.012518] ^ [ 16.012672] ffff888102873180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.013284] ffff888102873200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.013959] ================================================================== [ 15.897161] ================================================================== [ 15.897817] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 15.898209] Write of size 8 at addr ffff888102873128 by task kunit_try_catch/278 [ 15.898873] [ 15.899060] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.899105] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.899118] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.899138] Call Trace: [ 15.899153] <TASK> [ 15.899168] dump_stack_lvl+0x73/0xb0 [ 15.899194] print_report+0xd1/0x650 [ 15.899216] ? __virt_addr_valid+0x1db/0x2d0 [ 15.899239] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 15.899268] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.899294] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 15.899321] kasan_report+0x141/0x180 [ 15.899343] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 15.899376] kasan_check_range+0x10c/0x1c0 [ 15.899399] __kasan_check_write+0x18/0x20 [ 15.899418] kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 15.899446] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 15.899475] ? kasan_save_alloc_info+0x3b/0x50 [ 15.899498] ? kasan_save_stack+0x45/0x70 [ 15.899522] kasan_bitops_generic+0x121/0x1c0 [ 15.899545] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 15.899570] ? __pfx_read_tsc+0x10/0x10 [ 15.899590] ? ktime_get_ts64+0x86/0x230 [ 15.899616] kunit_try_run_case+0x1a5/0x480 [ 15.899639] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.899662] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.899686] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.899708] ? __kthread_parkme+0x82/0x180 [ 15.899750] ? preempt_count_sub+0x50/0x80 [ 15.899774] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.899798] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.899820] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.899843] kthread+0x337/0x6f0 [ 15.899862] ? trace_preempt_on+0x20/0xc0 [ 15.899886] ? __pfx_kthread+0x10/0x10 [ 15.899906] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.899927] ? calculate_sigpending+0x7b/0xa0 [ 15.899950] ? __pfx_kthread+0x10/0x10 [ 15.899971] ret_from_fork+0x116/0x1d0 [ 15.899990] ? __pfx_kthread+0x10/0x10 [ 15.900010] ret_from_fork_asm+0x1a/0x30 [ 15.900041] </TASK> [ 15.900061] [ 15.913148] Allocated by task 278: [ 15.913489] kasan_save_stack+0x45/0x70 [ 15.913898] kasan_save_track+0x18/0x40 [ 15.914109] kasan_save_alloc_info+0x3b/0x50 [ 15.914269] __kasan_kmalloc+0xb7/0xc0 [ 15.914411] __kmalloc_cache_noprof+0x189/0x420 [ 15.914577] kasan_bitops_generic+0x92/0x1c0 [ 15.914790] kunit_try_run_case+0x1a5/0x480 [ 15.915231] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.915734] kthread+0x337/0x6f0 [ 15.916067] ret_from_fork+0x116/0x1d0 [ 15.916434] ret_from_fork_asm+0x1a/0x30 [ 15.916832] [ 15.917001] The buggy address belongs to the object at ffff888102873120 [ 15.917001] which belongs to the cache kmalloc-16 of size 16 [ 15.918128] The buggy address is located 8 bytes inside of [ 15.918128] allocated 9-byte region [ffff888102873120, ffff888102873129) [ 15.919035] [ 15.919218] The buggy address belongs to the physical page: [ 15.919436] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102873 [ 15.919693] flags: 0x200000000000000(node=0|zone=2) [ 15.920171] page_type: f5(slab) [ 15.920477] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 15.921201] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 15.921920] page dumped because: kasan: bad access detected [ 15.922190] [ 15.922267] Memory state around the buggy address: [ 15.922436] ffff888102873000: 00 01 fc fc 00 04 fc fc 00 04 fc fc fa fb fc fc [ 15.922671] ffff888102873080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 15.923326] >ffff888102873100: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 15.923996] ^ [ 15.924429] ffff888102873180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.925123] ffff888102873200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.925786] ==================================================================
[ 47.304860] ================================================================== [ 47.312100] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 47.321052] Write of size 8 at addr ffff8881067131a8 by task kunit_try_catch/302 [ 47.328445] [ 47.329946] CPU: 3 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 47.329953] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 47.329956] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 47.329959] Call Trace: [ 47.329960] <TASK> [ 47.329962] dump_stack_lvl+0x73/0xb0 [ 47.329966] print_report+0xd1/0x650 [ 47.329970] ? __virt_addr_valid+0x1db/0x2d0 [ 47.329974] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 47.329979] ? kasan_complete_mode_report_info+0x2a/0x200 [ 47.329984] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 47.329990] kasan_report+0x141/0x180 [ 47.329994] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 47.330000] kasan_check_range+0x10c/0x1c0 [ 47.330004] __kasan_check_write+0x18/0x20 [ 47.330008] kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 47.330013] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 47.330018] ? __kmalloc_cache_noprof+0x189/0x420 [ 47.330023] ? trace_hardirqs_on+0x37/0xe0 [ 47.330027] ? kasan_bitops_generic+0x92/0x1c0 [ 47.330032] kasan_bitops_generic+0x121/0x1c0 [ 47.330036] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 47.330041] ? ktime_get_ts64+0x83/0x230 [ 47.330045] kunit_try_run_case+0x1a2/0x480 [ 47.330050] ? __pfx_kunit_try_run_case+0x10/0x10 [ 47.330054] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 47.330058] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 47.330062] ? __kthread_parkme+0x82/0x180 [ 47.330066] ? preempt_count_sub+0x50/0x80 [ 47.330070] ? __pfx_kunit_try_run_case+0x10/0x10 [ 47.330074] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 47.330078] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 47.330083] kthread+0x334/0x6f0 [ 47.330086] ? trace_preempt_on+0x20/0xc0 [ 47.330090] ? __pfx_kthread+0x10/0x10 [ 47.330094] ? _raw_spin_unlock_irq+0x47/0x80 [ 47.330097] ? calculate_sigpending+0x7b/0xa0 [ 47.330102] ? __pfx_kthread+0x10/0x10 [ 47.330106] ret_from_fork+0x113/0x1d0 [ 47.330109] ? __pfx_kthread+0x10/0x10 [ 47.330113] ret_from_fork_asm+0x1a/0x30 [ 47.330119] </TASK> [ 47.330120] [ 47.526904] Allocated by task 302: [ 47.530308] kasan_save_stack+0x45/0x70 [ 47.534149] kasan_save_track+0x18/0x40 [ 47.537986] kasan_save_alloc_info+0x3b/0x50 [ 47.542259] __kasan_kmalloc+0xb7/0xc0 [ 47.546014] __kmalloc_cache_noprof+0x189/0x420 [ 47.550553] kasan_bitops_generic+0x92/0x1c0 [ 47.554827] kunit_try_run_case+0x1a2/0x480 [ 47.559013] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 47.564411] kthread+0x334/0x6f0 [ 47.567646] ret_from_fork+0x113/0x1d0 [ 47.571409] ret_from_fork_asm+0x1a/0x30 [ 47.575366] [ 47.576867] The buggy address belongs to the object at ffff8881067131a0 [ 47.576867] which belongs to the cache kmalloc-16 of size 16 [ 47.589208] The buggy address is located 8 bytes inside of [ 47.589208] allocated 9-byte region [ffff8881067131a0, ffff8881067131a9) [ 47.601462] [ 47.602963] The buggy address belongs to the physical page: [ 47.608534] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106713 [ 47.616534] flags: 0x200000000000000(node=0|zone=2) [ 47.621413] page_type: f5(slab) [ 47.624561] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000 [ 47.632309] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 47.640054] page dumped because: kasan: bad access detected [ 47.645626] [ 47.647117] Memory state around the buggy address: [ 47.651911] ffff888106713080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 47.659130] ffff888106713100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 47.666363] >ffff888106713180: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 47.673585] ^ [ 47.678120] ffff888106713200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.685366] ffff888106713280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.692608] ================================================================== [ 48.094842] ================================================================== [ 48.102080] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 48.111035] Write of size 8 at addr ffff8881067131a8 by task kunit_try_catch/302 [ 48.118426] [ 48.119928] CPU: 3 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 48.119936] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 48.119939] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 48.119942] Call Trace: [ 48.119943] <TASK> [ 48.119945] dump_stack_lvl+0x73/0xb0 [ 48.119949] print_report+0xd1/0x650 [ 48.119953] ? __virt_addr_valid+0x1db/0x2d0 [ 48.119957] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 48.119963] ? kasan_complete_mode_report_info+0x2a/0x200 [ 48.119968] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 48.119973] kasan_report+0x141/0x180 [ 48.119977] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 48.119983] kasan_check_range+0x10c/0x1c0 [ 48.119988] __kasan_check_write+0x18/0x20 [ 48.119992] kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 48.119997] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 48.120003] ? __kmalloc_cache_noprof+0x189/0x420 [ 48.120007] ? trace_hardirqs_on+0x37/0xe0 [ 48.120011] ? kasan_bitops_generic+0x92/0x1c0 [ 48.120016] kasan_bitops_generic+0x121/0x1c0 [ 48.120020] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 48.120025] ? ktime_get_ts64+0x83/0x230 [ 48.120030] kunit_try_run_case+0x1a2/0x480 [ 48.120034] ? __pfx_kunit_try_run_case+0x10/0x10 [ 48.120038] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 48.120042] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 48.120047] ? __kthread_parkme+0x82/0x180 [ 48.120050] ? preempt_count_sub+0x50/0x80 [ 48.120054] ? __pfx_kunit_try_run_case+0x10/0x10 [ 48.120059] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 48.120063] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 48.120067] kthread+0x334/0x6f0 [ 48.120070] ? trace_preempt_on+0x20/0xc0 [ 48.120074] ? __pfx_kthread+0x10/0x10 [ 48.120078] ? _raw_spin_unlock_irq+0x47/0x80 [ 48.120082] ? calculate_sigpending+0x7b/0xa0 [ 48.120086] ? __pfx_kthread+0x10/0x10 [ 48.120090] ret_from_fork+0x113/0x1d0 [ 48.120093] ? __pfx_kthread+0x10/0x10 [ 48.120097] ret_from_fork_asm+0x1a/0x30 [ 48.120103] </TASK> [ 48.120104] [ 48.316909] Allocated by task 302: [ 48.320314] kasan_save_stack+0x45/0x70 [ 48.324154] kasan_save_track+0x18/0x40 [ 48.327993] kasan_save_alloc_info+0x3b/0x50 [ 48.332268] __kasan_kmalloc+0xb7/0xc0 [ 48.336019] __kmalloc_cache_noprof+0x189/0x420 [ 48.340552] kasan_bitops_generic+0x92/0x1c0 [ 48.344825] kunit_try_run_case+0x1a2/0x480 [ 48.349009] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 48.354420] kthread+0x334/0x6f0 [ 48.357651] ret_from_fork+0x113/0x1d0 [ 48.361404] ret_from_fork_asm+0x1a/0x30 [ 48.365348] [ 48.366856] The buggy address belongs to the object at ffff8881067131a0 [ 48.366856] which belongs to the cache kmalloc-16 of size 16 [ 48.379198] The buggy address is located 8 bytes inside of [ 48.379198] allocated 9-byte region [ffff8881067131a0, ffff8881067131a9) [ 48.391452] [ 48.392950] The buggy address belongs to the physical page: [ 48.398524] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106713 [ 48.406530] flags: 0x200000000000000(node=0|zone=2) [ 48.411412] page_type: f5(slab) [ 48.414557] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000 [ 48.422305] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 48.430043] page dumped because: kasan: bad access detected [ 48.435616] [ 48.437116] Memory state around the buggy address: [ 48.441909] ffff888106713080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 48.449129] ffff888106713100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 48.456366] >ffff888106713180: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 48.463610] ^ [ 48.468143] ffff888106713200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.475365] ffff888106713280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.482588] ================================================================== [ 46.909854] ================================================================== [ 46.917092] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 46.926045] Write of size 8 at addr ffff8881067131a8 by task kunit_try_catch/302 [ 46.933440] [ 46.934937] CPU: 3 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 46.934945] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 46.934948] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 46.934951] Call Trace: [ 46.934953] <TASK> [ 46.934954] dump_stack_lvl+0x73/0xb0 [ 46.934959] print_report+0xd1/0x650 [ 46.934963] ? __virt_addr_valid+0x1db/0x2d0 [ 46.934966] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 46.934972] ? kasan_complete_mode_report_info+0x2a/0x200 [ 46.934977] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 46.934982] kasan_report+0x141/0x180 [ 46.934986] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 46.934993] kasan_check_range+0x10c/0x1c0 [ 46.934997] __kasan_check_write+0x18/0x20 [ 46.935000] kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 46.935006] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 46.935011] ? __kmalloc_cache_noprof+0x189/0x420 [ 46.935016] ? trace_hardirqs_on+0x37/0xe0 [ 46.935020] ? kasan_bitops_generic+0x92/0x1c0 [ 46.935025] kasan_bitops_generic+0x121/0x1c0 [ 46.935029] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 46.935034] ? ktime_get_ts64+0x83/0x230 [ 46.935038] kunit_try_run_case+0x1a2/0x480 [ 46.935042] ? __pfx_kunit_try_run_case+0x10/0x10 [ 46.935047] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 46.935051] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 46.935055] ? __kthread_parkme+0x82/0x180 [ 46.935059] ? preempt_count_sub+0x50/0x80 [ 46.935063] ? __pfx_kunit_try_run_case+0x10/0x10 [ 46.935067] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 46.935071] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 46.935075] kthread+0x334/0x6f0 [ 46.935079] ? trace_preempt_on+0x20/0xc0 [ 46.935083] ? __pfx_kthread+0x10/0x10 [ 46.935087] ? _raw_spin_unlock_irq+0x47/0x80 [ 46.935090] ? calculate_sigpending+0x7b/0xa0 [ 46.935095] ? __pfx_kthread+0x10/0x10 [ 46.935099] ret_from_fork+0x113/0x1d0 [ 46.935102] ? __pfx_kthread+0x10/0x10 [ 46.935106] ret_from_fork_asm+0x1a/0x30 [ 46.935111] </TASK> [ 46.935113] [ 47.131955] Allocated by task 302: [ 47.135364] kasan_save_stack+0x45/0x70 [ 47.139209] kasan_save_track+0x18/0x40 [ 47.143049] kasan_save_alloc_info+0x3b/0x50 [ 47.147322] __kasan_kmalloc+0xb7/0xc0 [ 47.151099] __kmalloc_cache_noprof+0x189/0x420 [ 47.155635] kasan_bitops_generic+0x92/0x1c0 [ 47.159915] kunit_try_run_case+0x1a2/0x480 [ 47.164100] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 47.169500] kthread+0x334/0x6f0 [ 47.172731] ret_from_fork+0x113/0x1d0 [ 47.176484] ret_from_fork_asm+0x1a/0x30 [ 47.180411] [ 47.181910] The buggy address belongs to the object at ffff8881067131a0 [ 47.181910] which belongs to the cache kmalloc-16 of size 16 [ 47.194243] The buggy address is located 8 bytes inside of [ 47.194243] allocated 9-byte region [ffff8881067131a0, ffff8881067131a9) [ 47.206488] [ 47.207989] The buggy address belongs to the physical page: [ 47.213560] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106713 [ 47.221559] flags: 0x200000000000000(node=0|zone=2) [ 47.226441] page_type: f5(slab) [ 47.229588] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000 [ 47.237351] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 47.245099] page dumped because: kasan: bad access detected [ 47.250673] [ 47.252170] Memory state around the buggy address: [ 47.256963] ffff888106713080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 47.264184] ffff888106713100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 47.271409] >ffff888106713180: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 47.278630] ^ [ 47.283164] ffff888106713200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.290404] ffff888106713280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.297635] ================================================================== [ 49.674882] ================================================================== [ 49.682128] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 49.691082] Read of size 8 at addr ffff8881067131a8 by task kunit_try_catch/302 [ 49.698419] [ 49.699915] CPU: 3 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 49.699923] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 49.699925] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 49.699929] Call Trace: [ 49.699930] <TASK> [ 49.699932] dump_stack_lvl+0x73/0xb0 [ 49.699936] print_report+0xd1/0x650 [ 49.699940] ? __virt_addr_valid+0x1db/0x2d0 [ 49.699944] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 49.699949] ? kasan_complete_mode_report_info+0x2a/0x200 [ 49.699955] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 49.699960] kasan_report+0x141/0x180 [ 49.699964] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 49.699970] kasan_check_range+0x10c/0x1c0 [ 49.699974] __kasan_check_read+0x15/0x20 [ 49.699978] kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 49.699983] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 49.699988] ? __kmalloc_cache_noprof+0x189/0x420 [ 49.699993] ? trace_hardirqs_on+0x37/0xe0 [ 49.699997] ? kasan_bitops_generic+0x92/0x1c0 [ 49.700002] kasan_bitops_generic+0x121/0x1c0 [ 49.700006] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 49.700011] ? ktime_get_ts64+0x83/0x230 [ 49.700015] kunit_try_run_case+0x1a2/0x480 [ 49.700020] ? __pfx_kunit_try_run_case+0x10/0x10 [ 49.700024] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 49.700028] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 49.700032] ? __kthread_parkme+0x82/0x180 [ 49.700036] ? preempt_count_sub+0x50/0x80 [ 49.700040] ? __pfx_kunit_try_run_case+0x10/0x10 [ 49.700045] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 49.700049] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 49.700053] kthread+0x334/0x6f0 [ 49.700056] ? trace_preempt_on+0x20/0xc0 [ 49.700060] ? __pfx_kthread+0x10/0x10 [ 49.700064] ? _raw_spin_unlock_irq+0x47/0x80 [ 49.700068] ? calculate_sigpending+0x7b/0xa0 [ 49.700072] ? __pfx_kthread+0x10/0x10 [ 49.700076] ret_from_fork+0x113/0x1d0 [ 49.700079] ? __pfx_kthread+0x10/0x10 [ 49.700083] ret_from_fork_asm+0x1a/0x30 [ 49.700089] </TASK> [ 49.700090] [ 49.896817] Allocated by task 302: [ 49.900226] kasan_save_stack+0x45/0x70 [ 49.904064] kasan_save_track+0x18/0x40 [ 49.907904] kasan_save_alloc_info+0x3b/0x50 [ 49.912184] __kasan_kmalloc+0xb7/0xc0 [ 49.915938] __kmalloc_cache_noprof+0x189/0x420 [ 49.920468] kasan_bitops_generic+0x92/0x1c0 [ 49.924742] kunit_try_run_case+0x1a2/0x480 [ 49.928927] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 49.934328] kthread+0x334/0x6f0 [ 49.937585] ret_from_fork+0x113/0x1d0 [ 49.941364] ret_from_fork_asm+0x1a/0x30 [ 49.945316] [ 49.946817] The buggy address belongs to the object at ffff8881067131a0 [ 49.946817] which belongs to the cache kmalloc-16 of size 16 [ 49.959159] The buggy address is located 8 bytes inside of [ 49.959159] allocated 9-byte region [ffff8881067131a0, ffff8881067131a9) [ 49.971412] [ 49.972911] The buggy address belongs to the physical page: [ 49.978483] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106713 [ 49.986484] flags: 0x200000000000000(node=0|zone=2) [ 49.991364] page_type: f5(slab) [ 49.994509] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000 [ 50.002248] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 50.009988] page dumped because: kasan: bad access detected [ 50.015559] [ 50.017059] Memory state around the buggy address: [ 50.021854] ffff888106713080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 50.029082] ffff888106713100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 50.036308] >ffff888106713180: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 50.043528] ^ [ 50.048059] ffff888106713200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.055279] ffff888106713280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.062499] ================================================================== [ 50.069723] ================================================================== [ 50.076962] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 50.085915] Read of size 8 at addr ffff8881067131a8 by task kunit_try_catch/302 [ 50.093221] [ 50.094721] CPU: 3 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 50.094729] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 50.094732] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 50.094735] Call Trace: [ 50.094736] <TASK> [ 50.094738] dump_stack_lvl+0x73/0xb0 [ 50.094742] print_report+0xd1/0x650 [ 50.094746] ? __virt_addr_valid+0x1db/0x2d0 [ 50.094750] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 50.094755] ? kasan_complete_mode_report_info+0x2a/0x200 [ 50.094760] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 50.094766] kasan_report+0x141/0x180 [ 50.094770] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 50.094776] __asan_report_load8_noabort+0x18/0x20 [ 50.094781] kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 50.094786] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 50.094791] ? __kmalloc_cache_noprof+0x189/0x420 [ 50.094796] ? trace_hardirqs_on+0x37/0xe0 [ 50.094800] ? kasan_bitops_generic+0x92/0x1c0 [ 50.094805] kasan_bitops_generic+0x121/0x1c0 [ 50.094809] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 50.094814] ? ktime_get_ts64+0x83/0x230 [ 50.094818] kunit_try_run_case+0x1a2/0x480 [ 50.094823] ? __pfx_kunit_try_run_case+0x10/0x10 [ 50.094827] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 50.094831] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 50.094835] ? __kthread_parkme+0x82/0x180 [ 50.094839] ? preempt_count_sub+0x50/0x80 [ 50.094843] ? __pfx_kunit_try_run_case+0x10/0x10 [ 50.094847] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 50.094852] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 50.094856] kthread+0x334/0x6f0 [ 50.094859] ? trace_preempt_on+0x20/0xc0 [ 50.094863] ? __pfx_kthread+0x10/0x10 [ 50.094867] ? _raw_spin_unlock_irq+0x47/0x80 [ 50.094870] ? calculate_sigpending+0x7b/0xa0 [ 50.094875] ? __pfx_kthread+0x10/0x10 [ 50.094879] ret_from_fork+0x113/0x1d0 [ 50.094882] ? __pfx_kthread+0x10/0x10 [ 50.094886] ret_from_fork_asm+0x1a/0x30 [ 50.094892] </TASK> [ 50.094893] [ 50.288255] Allocated by task 302: [ 50.291662] kasan_save_stack+0x45/0x70 [ 50.295508] kasan_save_track+0x18/0x40 [ 50.299366] kasan_save_alloc_info+0x3b/0x50 [ 50.303664] __kasan_kmalloc+0xb7/0xc0 [ 50.307416] __kmalloc_cache_noprof+0x189/0x420 [ 50.311948] kasan_bitops_generic+0x92/0x1c0 [ 50.316223] kunit_try_run_case+0x1a2/0x480 [ 50.320409] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 50.325807] kthread+0x334/0x6f0 [ 50.329039] ret_from_fork+0x113/0x1d0 [ 50.332791] ret_from_fork_asm+0x1a/0x30 [ 50.336720] [ 50.338220] The buggy address belongs to the object at ffff8881067131a0 [ 50.338220] which belongs to the cache kmalloc-16 of size 16 [ 50.350560] The buggy address is located 8 bytes inside of [ 50.350560] allocated 9-byte region [ffff8881067131a0, ffff8881067131a9) [ 50.362814] [ 50.364314] The buggy address belongs to the physical page: [ 50.369888] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106713 [ 50.377893] flags: 0x200000000000000(node=0|zone=2) [ 50.382774] page_type: f5(slab) [ 50.385922] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000 [ 50.393667] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 50.401406] page dumped because: kasan: bad access detected [ 50.406978] [ 50.408471] Memory state around the buggy address: [ 50.413264] ffff888106713080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 50.420483] ffff888106713100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 50.427700] >ffff888106713180: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 50.434922] ^ [ 50.439454] ffff888106713200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.446673] ffff888106713280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.453890] ================================================================== [ 48.884875] ================================================================== [ 48.892115] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 48.901074] Write of size 8 at addr ffff8881067131a8 by task kunit_try_catch/302 [ 48.908467] [ 48.909967] CPU: 3 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 48.909975] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 48.909978] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 48.909981] Call Trace: [ 48.909982] <TASK> [ 48.909984] dump_stack_lvl+0x73/0xb0 [ 48.909989] print_report+0xd1/0x650 [ 48.909992] ? __virt_addr_valid+0x1db/0x2d0 [ 48.909996] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 48.910002] ? kasan_complete_mode_report_info+0x2a/0x200 [ 48.910007] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 48.910012] kasan_report+0x141/0x180 [ 48.910016] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 48.910023] kasan_check_range+0x10c/0x1c0 [ 48.910027] __kasan_check_write+0x18/0x20 [ 48.910031] kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 48.910036] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 48.910042] ? __kmalloc_cache_noprof+0x189/0x420 [ 48.910046] ? trace_hardirqs_on+0x37/0xe0 [ 48.910050] ? kasan_bitops_generic+0x92/0x1c0 [ 48.910055] kasan_bitops_generic+0x121/0x1c0 [ 48.910060] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 48.910065] ? ktime_get_ts64+0x83/0x230 [ 48.910069] kunit_try_run_case+0x1a2/0x480 [ 48.910073] ? __pfx_kunit_try_run_case+0x10/0x10 [ 48.910077] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 48.910082] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 48.910086] ? __kthread_parkme+0x82/0x180 [ 48.910089] ? preempt_count_sub+0x50/0x80 [ 48.910093] ? __pfx_kunit_try_run_case+0x10/0x10 [ 48.910098] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 48.910102] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 48.910106] kthread+0x334/0x6f0 [ 48.910110] ? trace_preempt_on+0x20/0xc0 [ 48.910114] ? __pfx_kthread+0x10/0x10 [ 48.910117] ? _raw_spin_unlock_irq+0x47/0x80 [ 48.910121] ? calculate_sigpending+0x7b/0xa0 [ 48.910126] ? __pfx_kthread+0x10/0x10 [ 48.910130] ret_from_fork+0x113/0x1d0 [ 48.910133] ? __pfx_kthread+0x10/0x10 [ 48.910137] ret_from_fork_asm+0x1a/0x30 [ 48.910142] </TASK> [ 48.910144] [ 49.106968] Allocated by task 302: [ 49.110373] kasan_save_stack+0x45/0x70 [ 49.114214] kasan_save_track+0x18/0x40 [ 49.118052] kasan_save_alloc_info+0x3b/0x50 [ 49.122324] __kasan_kmalloc+0xb7/0xc0 [ 49.126103] __kmalloc_cache_noprof+0x189/0x420 [ 49.130636] kasan_bitops_generic+0x92/0x1c0 [ 49.134908] kunit_try_run_case+0x1a2/0x480 [ 49.139094] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 49.144495] kthread+0x334/0x6f0 [ 49.147726] ret_from_fork+0x113/0x1d0 [ 49.151478] ret_from_fork_asm+0x1a/0x30 [ 49.155408] [ 49.156904] The buggy address belongs to the object at ffff8881067131a0 [ 49.156904] which belongs to the cache kmalloc-16 of size 16 [ 49.169239] The buggy address is located 8 bytes inside of [ 49.169239] allocated 9-byte region [ffff8881067131a0, ffff8881067131a9) [ 49.181493] [ 49.182991] The buggy address belongs to the physical page: [ 49.188563] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106713 [ 49.196563] flags: 0x200000000000000(node=0|zone=2) [ 49.201444] page_type: f5(slab) [ 49.204591] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000 [ 49.212365] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 49.220128] page dumped because: kasan: bad access detected [ 49.225700] [ 49.227200] Memory state around the buggy address: [ 49.231992] ffff888106713080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 49.239211] ffff888106713100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 49.246431] >ffff888106713180: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 49.253650] ^ [ 49.258185] ffff888106713200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.265414] ffff888106713280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.272631] ================================================================== [ 48.489815] ================================================================== [ 48.497053] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 48.506008] Write of size 8 at addr ffff8881067131a8 by task kunit_try_catch/302 [ 48.513408] [ 48.514909] CPU: 3 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 48.514917] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 48.514920] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 48.514923] Call Trace: [ 48.514925] <TASK> [ 48.514926] dump_stack_lvl+0x73/0xb0 [ 48.514930] print_report+0xd1/0x650 [ 48.514934] ? __virt_addr_valid+0x1db/0x2d0 [ 48.514938] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 48.514944] ? kasan_complete_mode_report_info+0x2a/0x200 [ 48.514949] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 48.514954] kasan_report+0x141/0x180 [ 48.514958] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 48.514964] kasan_check_range+0x10c/0x1c0 [ 48.514969] __kasan_check_write+0x18/0x20 [ 48.514972] kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 48.514977] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 48.514983] ? __kmalloc_cache_noprof+0x189/0x420 [ 48.514988] ? trace_hardirqs_on+0x37/0xe0 [ 48.514992] ? kasan_bitops_generic+0x92/0x1c0 [ 48.514997] kasan_bitops_generic+0x121/0x1c0 [ 48.515001] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 48.515006] ? ktime_get_ts64+0x83/0x230 [ 48.515010] kunit_try_run_case+0x1a2/0x480 [ 48.515014] ? __pfx_kunit_try_run_case+0x10/0x10 [ 48.515019] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 48.515023] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 48.515027] ? __kthread_parkme+0x82/0x180 [ 48.515031] ? preempt_count_sub+0x50/0x80 [ 48.515035] ? __pfx_kunit_try_run_case+0x10/0x10 [ 48.515039] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 48.515043] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 48.515048] kthread+0x334/0x6f0 [ 48.515051] ? trace_preempt_on+0x20/0xc0 [ 48.515055] ? __pfx_kthread+0x10/0x10 [ 48.515059] ? _raw_spin_unlock_irq+0x47/0x80 [ 48.515063] ? calculate_sigpending+0x7b/0xa0 [ 48.515067] ? __pfx_kthread+0x10/0x10 [ 48.515071] ret_from_fork+0x113/0x1d0 [ 48.515074] ? __pfx_kthread+0x10/0x10 [ 48.515078] ret_from_fork_asm+0x1a/0x30 [ 48.515084] </TASK> [ 48.515085] [ 48.711969] Allocated by task 302: [ 48.715375] kasan_save_stack+0x45/0x70 [ 48.719241] kasan_save_track+0x18/0x40 [ 48.723081] kasan_save_alloc_info+0x3b/0x50 [ 48.727365] __kasan_kmalloc+0xb7/0xc0 [ 48.731138] __kmalloc_cache_noprof+0x189/0x420 [ 48.735673] kasan_bitops_generic+0x92/0x1c0 [ 48.739955] kunit_try_run_case+0x1a2/0x480 [ 48.744149] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 48.749546] kthread+0x334/0x6f0 [ 48.752781] ret_from_fork+0x113/0x1d0 [ 48.756532] ret_from_fork_asm+0x1a/0x30 [ 48.760458] [ 48.761958] The buggy address belongs to the object at ffff8881067131a0 [ 48.761958] which belongs to the cache kmalloc-16 of size 16 [ 48.774301] The buggy address is located 8 bytes inside of [ 48.774301] allocated 9-byte region [ffff8881067131a0, ffff8881067131a9) [ 48.786553] [ 48.788053] The buggy address belongs to the physical page: [ 48.793627] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106713 [ 48.801634] flags: 0x200000000000000(node=0|zone=2) [ 48.806513] page_type: f5(slab) [ 48.809659] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000 [ 48.817413] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 48.825155] page dumped because: kasan: bad access detected [ 48.830729] [ 48.832227] Memory state around the buggy address: [ 48.837019] ffff888106713080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 48.844238] ffff888106713100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 48.851459] >ffff888106713180: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 48.858679] ^ [ 48.863212] ffff888106713200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.870430] ffff888106713280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.877648] ================================================================== [ 49.279856] ================================================================== [ 49.287094] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 49.296049] Write of size 8 at addr ffff8881067131a8 by task kunit_try_catch/302 [ 49.303449] [ 49.304951] CPU: 3 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 49.304958] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 49.304961] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 49.304964] Call Trace: [ 49.304966] <TASK> [ 49.304968] dump_stack_lvl+0x73/0xb0 [ 49.304972] print_report+0xd1/0x650 [ 49.304976] ? __virt_addr_valid+0x1db/0x2d0 [ 49.304980] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 49.304985] ? kasan_complete_mode_report_info+0x2a/0x200 [ 49.304990] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 49.304996] kasan_report+0x141/0x180 [ 49.305000] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 49.305006] kasan_check_range+0x10c/0x1c0 [ 49.305010] __kasan_check_write+0x18/0x20 [ 49.305014] kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 49.305019] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 49.305024] ? __kmalloc_cache_noprof+0x189/0x420 [ 49.305029] ? trace_hardirqs_on+0x37/0xe0 [ 49.305033] ? kasan_bitops_generic+0x92/0x1c0 [ 49.305038] kasan_bitops_generic+0x121/0x1c0 [ 49.305042] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 49.305047] ? ktime_get_ts64+0x83/0x230 [ 49.305051] kunit_try_run_case+0x1a2/0x480 [ 49.305056] ? __pfx_kunit_try_run_case+0x10/0x10 [ 49.305060] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 49.305064] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 49.305068] ? __kthread_parkme+0x82/0x180 [ 49.305072] ? preempt_count_sub+0x50/0x80 [ 49.305076] ? __pfx_kunit_try_run_case+0x10/0x10 [ 49.305080] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 49.305085] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 49.305089] kthread+0x334/0x6f0 [ 49.305092] ? trace_preempt_on+0x20/0xc0 [ 49.305096] ? __pfx_kthread+0x10/0x10 [ 49.305100] ? _raw_spin_unlock_irq+0x47/0x80 [ 49.305104] ? calculate_sigpending+0x7b/0xa0 [ 49.305108] ? __pfx_kthread+0x10/0x10 [ 49.305112] ret_from_fork+0x113/0x1d0 [ 49.305115] ? __pfx_kthread+0x10/0x10 [ 49.305119] ret_from_fork_asm+0x1a/0x30 [ 49.305125] </TASK> [ 49.305126] [ 49.501966] Allocated by task 302: [ 49.505395] kasan_save_stack+0x45/0x70 [ 49.509239] kasan_save_track+0x18/0x40 [ 49.513079] kasan_save_alloc_info+0x3b/0x50 [ 49.517366] __kasan_kmalloc+0xb7/0xc0 [ 49.521146] __kmalloc_cache_noprof+0x189/0x420 [ 49.525687] kasan_bitops_generic+0x92/0x1c0 [ 49.529961] kunit_try_run_case+0x1a2/0x480 [ 49.534154] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 49.539555] kthread+0x334/0x6f0 [ 49.542787] ret_from_fork+0x113/0x1d0 [ 49.546540] ret_from_fork_asm+0x1a/0x30 [ 49.550466] [ 49.551964] The buggy address belongs to the object at ffff8881067131a0 [ 49.551964] which belongs to the cache kmalloc-16 of size 16 [ 49.564299] The buggy address is located 8 bytes inside of [ 49.564299] allocated 9-byte region [ffff8881067131a0, ffff8881067131a9) [ 49.576551] [ 49.578051] The buggy address belongs to the physical page: [ 49.583623] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106713 [ 49.591622] flags: 0x200000000000000(node=0|zone=2) [ 49.596502] page_type: f5(slab) [ 49.599650] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000 [ 49.607409] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 49.615154] page dumped because: kasan: bad access detected [ 49.620727] [ 49.622224] Memory state around the buggy address: [ 49.627018] ffff888106713080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 49.634236] ffff888106713100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 49.641457] >ffff888106713180: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 49.648674] ^ [ 49.653208] ffff888106713200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.660429] ffff888106713280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.667657] ================================================================== [ 47.699836] ================================================================== [ 47.707082] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 47.716043] Write of size 8 at addr ffff8881067131a8 by task kunit_try_catch/302 [ 47.723435] [ 47.724937] CPU: 3 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 47.724945] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 47.724948] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 47.724951] Call Trace: [ 47.724953] <TASK> [ 47.724954] dump_stack_lvl+0x73/0xb0 [ 47.724959] print_report+0xd1/0x650 [ 47.724963] ? __virt_addr_valid+0x1db/0x2d0 [ 47.724966] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 47.724972] ? kasan_complete_mode_report_info+0x2a/0x200 [ 47.724977] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 47.724982] kasan_report+0x141/0x180 [ 47.724986] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 47.724992] kasan_check_range+0x10c/0x1c0 [ 47.724997] __kasan_check_write+0x18/0x20 [ 47.725000] kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 47.725005] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 47.725011] ? __kmalloc_cache_noprof+0x189/0x420 [ 47.725015] ? trace_hardirqs_on+0x37/0xe0 [ 47.725019] ? kasan_bitops_generic+0x92/0x1c0 [ 47.725024] kasan_bitops_generic+0x121/0x1c0 [ 47.725028] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 47.725033] ? ktime_get_ts64+0x83/0x230 [ 47.725038] kunit_try_run_case+0x1a2/0x480 [ 47.725042] ? __pfx_kunit_try_run_case+0x10/0x10 [ 47.725046] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 47.725050] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 47.725054] ? __kthread_parkme+0x82/0x180 [ 47.725058] ? preempt_count_sub+0x50/0x80 [ 47.725062] ? __pfx_kunit_try_run_case+0x10/0x10 [ 47.725067] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 47.725071] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 47.725075] kthread+0x334/0x6f0 [ 47.725078] ? trace_preempt_on+0x20/0xc0 [ 47.725082] ? __pfx_kthread+0x10/0x10 [ 47.725086] ? _raw_spin_unlock_irq+0x47/0x80 [ 47.725090] ? calculate_sigpending+0x7b/0xa0 [ 47.725094] ? __pfx_kthread+0x10/0x10 [ 47.725098] ret_from_fork+0x113/0x1d0 [ 47.725101] ? __pfx_kthread+0x10/0x10 [ 47.725105] ret_from_fork_asm+0x1a/0x30 [ 47.725111] </TASK> [ 47.725112] [ 47.921901] Allocated by task 302: [ 47.925309] kasan_save_stack+0x45/0x70 [ 47.929147] kasan_save_track+0x18/0x40 [ 47.932985] kasan_save_alloc_info+0x3b/0x50 [ 47.937259] __kasan_kmalloc+0xb7/0xc0 [ 47.941012] __kmalloc_cache_noprof+0x189/0x420 [ 47.945545] kasan_bitops_generic+0x92/0x1c0 [ 47.949816] kunit_try_run_case+0x1a2/0x480 [ 47.954004] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 47.959413] kthread+0x334/0x6f0 [ 47.962644] ret_from_fork+0x113/0x1d0 [ 47.966417] ret_from_fork_asm+0x1a/0x30 [ 47.970363] [ 47.971863] The buggy address belongs to the object at ffff8881067131a0 [ 47.971863] which belongs to the cache kmalloc-16 of size 16 [ 47.984199] The buggy address is located 8 bytes inside of [ 47.984199] allocated 9-byte region [ffff8881067131a0, ffff8881067131a9) [ 47.996451] [ 47.997952] The buggy address belongs to the physical page: [ 48.003524] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106713 [ 48.011524] flags: 0x200000000000000(node=0|zone=2) [ 48.016404] page_type: f5(slab) [ 48.019550] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000 [ 48.027296] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 48.035037] page dumped because: kasan: bad access detected [ 48.040607] [ 48.042108] Memory state around the buggy address: [ 48.046902] ffff888106713080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 48.054129] ffff888106713100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 48.061363] >ffff888106713180: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 48.068612] ^ [ 48.073145] ffff888106713200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.080373] ffff888106713280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.087618] ==================================================================