Date
July 15, 2025, 11:09 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 17.863920] ================================================================== [ 17.864036] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaec/0xbc0 [ 17.864095] Read of size 8 at addr fff00000c591d628 by task kunit_try_catch/262 [ 17.864159] [ 17.864227] CPU: 1 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 17.864318] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.864356] Hardware name: linux,dummy-virt (DT) [ 17.864402] Call trace: [ 17.864431] show_stack+0x20/0x38 (C) [ 17.864509] dump_stack_lvl+0x8c/0xd0 [ 17.864559] print_report+0x118/0x5d0 [ 17.864615] kasan_report+0xdc/0x128 [ 17.864668] __asan_report_load8_noabort+0x20/0x30 [ 17.864726] kasan_bitops_modify.constprop.0+0xaec/0xbc0 [ 17.865072] kasan_bitops_generic+0x110/0x1c8 [ 17.865200] kunit_try_run_case+0x170/0x3f0 [ 17.865284] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.865342] kthread+0x328/0x630 [ 17.865409] ret_from_fork+0x10/0x20 [ 17.865672] [ 17.865730] Allocated by task 262: [ 17.865813] kasan_save_stack+0x3c/0x68 [ 17.865941] kasan_save_track+0x20/0x40 [ 17.866005] kasan_save_alloc_info+0x40/0x58 [ 17.866076] __kasan_kmalloc+0xd4/0xd8 [ 17.866127] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.866177] kasan_bitops_generic+0xa0/0x1c8 [ 17.866470] kunit_try_run_case+0x170/0x3f0 [ 17.866549] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.866619] kthread+0x328/0x630 [ 17.866690] ret_from_fork+0x10/0x20 [ 17.866778] [ 17.866819] The buggy address belongs to the object at fff00000c591d620 [ 17.866819] which belongs to the cache kmalloc-16 of size 16 [ 17.867336] The buggy address is located 8 bytes inside of [ 17.867336] allocated 9-byte region [fff00000c591d620, fff00000c591d629) [ 17.867457] [ 17.867499] The buggy address belongs to the physical page: [ 17.867533] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591d [ 17.867611] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.867931] page_type: f5(slab) [ 17.867993] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 17.868049] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 17.868093] page dumped because: kasan: bad access detected [ 17.868130] [ 17.868166] Memory state around the buggy address: [ 17.868228] fff00000c591d500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 17.868274] fff00000c591d580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 17.868319] >fff00000c591d600: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 17.868368] ^ [ 17.868406] fff00000c591d680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.868470] fff00000c591d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.868511] ================================================================== [ 17.858377] ================================================================== [ 17.858501] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc0 [ 17.858557] Write of size 8 at addr fff00000c591d628 by task kunit_try_catch/262 [ 17.858610] [ 17.858808] CPU: 1 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 17.858903] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.858932] Hardware name: linux,dummy-virt (DT) [ 17.858964] Call trace: [ 17.858987] show_stack+0x20/0x38 (C) [ 17.859043] dump_stack_lvl+0x8c/0xd0 [ 17.859360] print_report+0x118/0x5d0 [ 17.859447] kasan_report+0xdc/0x128 [ 17.859513] kasan_check_range+0x100/0x1a8 [ 17.859572] __kasan_check_write+0x20/0x30 [ 17.859628] kasan_bitops_modify.constprop.0+0x320/0xbc0 [ 17.861322] kasan_bitops_generic+0x110/0x1c8 [ 17.861427] kunit_try_run_case+0x170/0x3f0 [ 17.861489] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.861562] kthread+0x328/0x630 [ 17.861634] ret_from_fork+0x10/0x20 [ 17.861747] [ 17.861796] Allocated by task 262: [ 17.861889] kasan_save_stack+0x3c/0x68 [ 17.861935] kasan_save_track+0x20/0x40 [ 17.861975] kasan_save_alloc_info+0x40/0x58 [ 17.862022] __kasan_kmalloc+0xd4/0xd8 [ 17.862059] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.862099] kasan_bitops_generic+0xa0/0x1c8 [ 17.862139] kunit_try_run_case+0x170/0x3f0 [ 17.862190] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.862262] kthread+0x328/0x630 [ 17.862434] ret_from_fork+0x10/0x20 [ 17.862545] [ 17.862586] The buggy address belongs to the object at fff00000c591d620 [ 17.862586] which belongs to the cache kmalloc-16 of size 16 [ 17.862663] The buggy address is located 8 bytes inside of [ 17.862663] allocated 9-byte region [fff00000c591d620, fff00000c591d629) [ 17.862752] [ 17.862789] The buggy address belongs to the physical page: [ 17.862865] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591d [ 17.862927] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.862977] page_type: f5(slab) [ 17.863016] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 17.863069] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 17.863115] page dumped because: kasan: bad access detected [ 17.863149] [ 17.863170] Memory state around the buggy address: [ 17.863214] fff00000c591d500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 17.863259] fff00000c591d580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 17.863310] >fff00000c591d600: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 17.863351] ^ [ 17.863383] fff00000c591d680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.863428] fff00000c591d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.863468] ================================================================== [ 17.806144] ================================================================== [ 17.809725] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 17.810474] Write of size 8 at addr fff00000c591d628 by task kunit_try_catch/262 [ 17.811102] [ 17.811150] CPU: 1 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 17.811250] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.811277] Hardware name: linux,dummy-virt (DT) [ 17.811310] Call trace: [ 17.812801] show_stack+0x20/0x38 (C) [ 17.812913] dump_stack_lvl+0x8c/0xd0 [ 17.812963] print_report+0x118/0x5d0 [ 17.813014] kasan_report+0xdc/0x128 [ 17.813061] kasan_check_range+0x100/0x1a8 [ 17.814692] __kasan_check_write+0x20/0x30 [ 17.814829] kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 17.815588] kasan_bitops_generic+0x110/0x1c8 [ 17.816667] kunit_try_run_case+0x170/0x3f0 [ 17.816945] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.817002] kthread+0x328/0x630 [ 17.817046] ret_from_fork+0x10/0x20 [ 17.817097] [ 17.817118] Allocated by task 262: [ 17.817149] kasan_save_stack+0x3c/0x68 [ 17.817202] kasan_save_track+0x20/0x40 [ 17.817243] kasan_save_alloc_info+0x40/0x58 [ 17.817285] __kasan_kmalloc+0xd4/0xd8 [ 17.817324] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.817364] kasan_bitops_generic+0xa0/0x1c8 [ 17.817405] kunit_try_run_case+0x170/0x3f0 [ 17.819876] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.820261] kthread+0x328/0x630 [ 17.820300] ret_from_fork+0x10/0x20 [ 17.820337] [ 17.822045] The buggy address belongs to the object at fff00000c591d620 [ 17.822045] which belongs to the cache kmalloc-16 of size 16 [ 17.822592] The buggy address is located 8 bytes inside of [ 17.822592] allocated 9-byte region [fff00000c591d620, fff00000c591d629) [ 17.822752] [ 17.823670] The buggy address belongs to the physical page: [ 17.823894] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591d [ 17.824746] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.824808] page_type: f5(slab) [ 17.824851] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 17.825979] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 17.826379] page dumped because: kasan: bad access detected [ 17.826843] [ 17.826871] Memory state around the buggy address: [ 17.827220] fff00000c591d500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 17.827280] fff00000c591d580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 17.827327] >fff00000c591d600: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 17.827368] ^ [ 17.827405] fff00000c591d680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.827451] fff00000c591d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.827494] ================================================================== [ 17.878843] ================================================================== [ 17.878891] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa20/0xbc0 [ 17.878938] Read of size 8 at addr fff00000c591d628 by task kunit_try_catch/262 [ 17.878991] [ 17.879021] CPU: 1 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 17.879423] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.879491] Hardware name: linux,dummy-virt (DT) [ 17.879526] Call trace: [ 17.879550] show_stack+0x20/0x38 (C) [ 17.879852] dump_stack_lvl+0x8c/0xd0 [ 17.879930] print_report+0x118/0x5d0 [ 17.880002] kasan_report+0xdc/0x128 [ 17.880053] __asan_report_load8_noabort+0x20/0x30 [ 17.880106] kasan_bitops_modify.constprop.0+0xa20/0xbc0 [ 17.880165] kasan_bitops_generic+0x110/0x1c8 [ 17.880231] kunit_try_run_case+0x170/0x3f0 [ 17.880293] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.880349] kthread+0x328/0x630 [ 17.880445] ret_from_fork+0x10/0x20 [ 17.880505] [ 17.880535] Allocated by task 262: [ 17.880572] kasan_save_stack+0x3c/0x68 [ 17.880623] kasan_save_track+0x20/0x40 [ 17.880664] kasan_save_alloc_info+0x40/0x58 [ 17.880706] __kasan_kmalloc+0xd4/0xd8 [ 17.880743] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.880783] kasan_bitops_generic+0xa0/0x1c8 [ 17.880821] kunit_try_run_case+0x170/0x3f0 [ 17.880861] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.880909] kthread+0x328/0x630 [ 17.880941] ret_from_fork+0x10/0x20 [ 17.881028] [ 17.881554] The buggy address belongs to the object at fff00000c591d620 [ 17.881554] which belongs to the cache kmalloc-16 of size 16 [ 17.882238] The buggy address is located 8 bytes inside of [ 17.882238] allocated 9-byte region [fff00000c591d620, fff00000c591d629) [ 17.882337] [ 17.882477] The buggy address belongs to the physical page: [ 17.882526] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591d [ 17.882653] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.882721] page_type: f5(slab) [ 17.882776] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 17.883105] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 17.883260] page dumped because: kasan: bad access detected [ 17.883319] [ 17.883408] Memory state around the buggy address: [ 17.883478] fff00000c591d500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 17.883551] fff00000c591d580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 17.883747] >fff00000c591d600: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 17.883981] ^ [ 17.884106] fff00000c591d680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.884203] fff00000c591d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.884311] ================================================================== [ 17.855349] ================================================================== [ 17.855413] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc0 [ 17.855469] Write of size 8 at addr fff00000c591d628 by task kunit_try_catch/262 [ 17.855522] [ 17.855553] CPU: 1 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 17.855646] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.855675] Hardware name: linux,dummy-virt (DT) [ 17.855708] Call trace: [ 17.855731] show_stack+0x20/0x38 (C) [ 17.855787] dump_stack_lvl+0x8c/0xd0 [ 17.855837] print_report+0x118/0x5d0 [ 17.855905] kasan_report+0xdc/0x128 [ 17.855954] kasan_check_range+0x100/0x1a8 [ 17.856019] __kasan_check_write+0x20/0x30 [ 17.856080] kasan_bitops_modify.constprop.0+0x2b4/0xbc0 [ 17.856133] kasan_bitops_generic+0x110/0x1c8 [ 17.856192] kunit_try_run_case+0x170/0x3f0 [ 17.856250] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.856310] kthread+0x328/0x630 [ 17.856352] ret_from_fork+0x10/0x20 [ 17.856403] [ 17.856422] Allocated by task 262: [ 17.856457] kasan_save_stack+0x3c/0x68 [ 17.856512] kasan_save_track+0x20/0x40 [ 17.856560] kasan_save_alloc_info+0x40/0x58 [ 17.856603] __kasan_kmalloc+0xd4/0xd8 [ 17.856663] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.856707] kasan_bitops_generic+0xa0/0x1c8 [ 17.856756] kunit_try_run_case+0x170/0x3f0 [ 17.856797] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.856844] kthread+0x328/0x630 [ 17.856877] ret_from_fork+0x10/0x20 [ 17.856929] [ 17.856951] The buggy address belongs to the object at fff00000c591d620 [ 17.856951] which belongs to the cache kmalloc-16 of size 16 [ 17.857021] The buggy address is located 8 bytes inside of [ 17.857021] allocated 9-byte region [fff00000c591d620, fff00000c591d629) [ 17.857086] [ 17.857128] The buggy address belongs to the physical page: [ 17.857166] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591d [ 17.857230] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.857279] page_type: f5(slab) [ 17.857323] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 17.857376] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 17.857425] page dumped because: kasan: bad access detected [ 17.857458] [ 17.857478] Memory state around the buggy address: [ 17.857511] fff00000c591d500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 17.857557] fff00000c591d580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 17.857600] >fff00000c591d600: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 17.857645] ^ [ 17.857679] fff00000c591d680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.857724] fff00000c591d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.857766] ================================================================== [ 17.868736] ================================================================== [ 17.868802] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc0 [ 17.868854] Write of size 8 at addr fff00000c591d628 by task kunit_try_catch/262 [ 17.868914] [ 17.869609] CPU: 1 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 17.869765] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.869859] Hardware name: linux,dummy-virt (DT) [ 17.869897] Call trace: [ 17.869921] show_stack+0x20/0x38 (C) [ 17.869992] dump_stack_lvl+0x8c/0xd0 [ 17.870049] print_report+0x118/0x5d0 [ 17.870097] kasan_report+0xdc/0x128 [ 17.870145] kasan_check_range+0x100/0x1a8 [ 17.870206] __kasan_check_write+0x20/0x30 [ 17.871399] kasan_bitops_modify.constprop.0+0x344/0xbc0 [ 17.871516] kasan_bitops_generic+0x110/0x1c8 [ 17.871567] kunit_try_run_case+0x170/0x3f0 [ 17.871647] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.871724] kthread+0x328/0x630 [ 17.871811] ret_from_fork+0x10/0x20 [ 17.871869] [ 17.871889] Allocated by task 262: [ 17.871924] kasan_save_stack+0x3c/0x68 [ 17.871972] kasan_save_track+0x20/0x40 [ 17.872011] kasan_save_alloc_info+0x40/0x58 [ 17.872053] __kasan_kmalloc+0xd4/0xd8 [ 17.872612] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.872735] kasan_bitops_generic+0xa0/0x1c8 [ 17.872811] kunit_try_run_case+0x170/0x3f0 [ 17.872857] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.873153] kthread+0x328/0x630 [ 17.873242] ret_from_fork+0x10/0x20 [ 17.873331] [ 17.873380] The buggy address belongs to the object at fff00000c591d620 [ 17.873380] which belongs to the cache kmalloc-16 of size 16 [ 17.873456] The buggy address is located 8 bytes inside of [ 17.873456] allocated 9-byte region [fff00000c591d620, fff00000c591d629) [ 17.873561] [ 17.873585] The buggy address belongs to the physical page: [ 17.873619] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591d [ 17.873677] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.873727] page_type: f5(slab) [ 17.873767] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 17.873938] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 17.874051] page dumped because: kasan: bad access detected [ 17.874092] [ 17.874112] Memory state around the buggy address: [ 17.874145] fff00000c591d500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 17.874205] fff00000c591d580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 17.874252] >fff00000c591d600: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 17.874309] ^ [ 17.874345] fff00000c591d680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.874391] fff00000c591d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.874913] ================================================================== [ 17.849156] ================================================================== [ 17.849247] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbc0 [ 17.849306] Read of size 8 at addr fff00000c591d628 by task kunit_try_catch/262 [ 17.849360] [ 17.849391] CPU: 1 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 17.849475] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.849503] Hardware name: linux,dummy-virt (DT) [ 17.849538] Call trace: [ 17.849562] show_stack+0x20/0x38 (C) [ 17.849612] dump_stack_lvl+0x8c/0xd0 [ 17.849659] print_report+0x118/0x5d0 [ 17.849710] kasan_report+0xdc/0x128 [ 17.849756] __asan_report_load8_noabort+0x20/0x30 [ 17.849809] kasan_bitops_modify.constprop.0+0xa80/0xbc0 [ 17.849862] kasan_bitops_generic+0x110/0x1c8 [ 17.849909] kunit_try_run_case+0x170/0x3f0 [ 17.849959] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.850012] kthread+0x328/0x630 [ 17.850056] ret_from_fork+0x10/0x20 [ 17.850371] [ 17.850502] Allocated by task 262: [ 17.850611] kasan_save_stack+0x3c/0x68 [ 17.850703] kasan_save_track+0x20/0x40 [ 17.850763] kasan_save_alloc_info+0x40/0x58 [ 17.850806] __kasan_kmalloc+0xd4/0xd8 [ 17.850874] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.850919] kasan_bitops_generic+0xa0/0x1c8 [ 17.851330] kunit_try_run_case+0x170/0x3f0 [ 17.851421] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.851551] kthread+0x328/0x630 [ 17.851656] ret_from_fork+0x10/0x20 [ 17.851740] [ 17.851828] The buggy address belongs to the object at fff00000c591d620 [ 17.851828] which belongs to the cache kmalloc-16 of size 16 [ 17.851921] The buggy address is located 8 bytes inside of [ 17.851921] allocated 9-byte region [fff00000c591d620, fff00000c591d629) [ 17.852049] [ 17.852086] The buggy address belongs to the physical page: [ 17.852120] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591d [ 17.852177] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.852239] page_type: f5(slab) [ 17.852280] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 17.852333] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 17.852376] page dumped because: kasan: bad access detected [ 17.852412] [ 17.852433] Memory state around the buggy address: [ 17.852469] fff00000c591d500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 17.852515] fff00000c591d580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 17.852561] >fff00000c591d600: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 17.852601] ^ [ 17.852634] fff00000c591d680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.852681] fff00000c591d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.852722] ================================================================== [ 17.833319] ================================================================== [ 17.833376] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 17.833431] Read of size 8 at addr fff00000c591d628 by task kunit_try_catch/262 [ 17.833486] [ 17.833519] CPU: 1 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 17.833602] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.833631] Hardware name: linux,dummy-virt (DT) [ 17.833662] Call trace: [ 17.833685] show_stack+0x20/0x38 (C) [ 17.833736] dump_stack_lvl+0x8c/0xd0 [ 17.833784] print_report+0x118/0x5d0 [ 17.833833] kasan_report+0xdc/0x128 [ 17.833878] __asan_report_load8_noabort+0x20/0x30 [ 17.833931] kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 17.833988] kasan_bitops_generic+0x110/0x1c8 [ 17.834039] kunit_try_run_case+0x170/0x3f0 [ 17.834088] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.834142] kthread+0x328/0x630 [ 17.838731] ret_from_fork+0x10/0x20 [ 17.838795] [ 17.838816] Allocated by task 262: [ 17.838850] kasan_save_stack+0x3c/0x68 [ 17.838897] kasan_save_track+0x20/0x40 [ 17.838937] kasan_save_alloc_info+0x40/0x58 [ 17.838984] __kasan_kmalloc+0xd4/0xd8 [ 17.839021] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.839063] kasan_bitops_generic+0xa0/0x1c8 [ 17.839101] kunit_try_run_case+0x170/0x3f0 [ 17.839141] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.839196] kthread+0x328/0x630 [ 17.839229] ret_from_fork+0x10/0x20 [ 17.839265] [ 17.839289] The buggy address belongs to the object at fff00000c591d620 [ 17.839289] which belongs to the cache kmalloc-16 of size 16 [ 17.839368] The buggy address is located 8 bytes inside of [ 17.839368] allocated 9-byte region [fff00000c591d620, fff00000c591d629) [ 17.839446] [ 17.839513] The buggy address belongs to the physical page: [ 17.839613] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591d [ 17.839736] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.839802] page_type: f5(slab) [ 17.839893] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 17.839985] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 17.840029] page dumped because: kasan: bad access detected [ 17.840064] [ 17.840087] Memory state around the buggy address: [ 17.840122] fff00000c591d500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 17.840168] fff00000c591d580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 17.840224] >fff00000c591d600: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 17.840265] ^ [ 17.840297] fff00000c591d680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.840346] fff00000c591d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.840458] ================================================================== [ 17.842054] ================================================================== [ 17.842195] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc0 [ 17.842315] Write of size 8 at addr fff00000c591d628 by task kunit_try_catch/262 [ 17.842387] [ 17.842432] CPU: 1 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 17.842519] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.842556] Hardware name: linux,dummy-virt (DT) [ 17.842604] Call trace: [ 17.842630] show_stack+0x20/0x38 (C) [ 17.843025] dump_stack_lvl+0x8c/0xd0 [ 17.843123] print_report+0x118/0x5d0 [ 17.843236] kasan_report+0xdc/0x128 [ 17.843315] kasan_check_range+0x100/0x1a8 [ 17.843393] __kasan_check_write+0x20/0x30 [ 17.843445] kasan_bitops_modify.constprop.0+0x1dc/0xbc0 [ 17.843498] kasan_bitops_generic+0x110/0x1c8 [ 17.843586] kunit_try_run_case+0x170/0x3f0 [ 17.843671] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.843731] kthread+0x328/0x630 [ 17.843772] ret_from_fork+0x10/0x20 [ 17.843821] [ 17.843841] Allocated by task 262: [ 17.843878] kasan_save_stack+0x3c/0x68 [ 17.843933] kasan_save_track+0x20/0x40 [ 17.844041] kasan_save_alloc_info+0x40/0x58 [ 17.844083] __kasan_kmalloc+0xd4/0xd8 [ 17.844122] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.844343] kasan_bitops_generic+0xa0/0x1c8 [ 17.844543] kunit_try_run_case+0x170/0x3f0 [ 17.844597] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.844663] kthread+0x328/0x630 [ 17.844698] ret_from_fork+0x10/0x20 [ 17.845963] [ 17.846001] The buggy address belongs to the object at fff00000c591d620 [ 17.846001] which belongs to the cache kmalloc-16 of size 16 [ 17.846065] The buggy address is located 8 bytes inside of [ 17.846065] allocated 9-byte region [fff00000c591d620, fff00000c591d629) [ 17.846130] [ 17.846152] The buggy address belongs to the physical page: [ 17.846204] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591d [ 17.846261] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.846311] page_type: f5(slab) [ 17.846350] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 17.848240] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 17.848305] page dumped because: kasan: bad access detected [ 17.848341] [ 17.848363] Memory state around the buggy address: [ 17.848398] fff00000c591d500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 17.848445] fff00000c591d580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 17.848497] >fff00000c591d600: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 17.848537] ^ [ 17.848572] fff00000c591d680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.848618] fff00000c591d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.848660] ================================================================== [ 17.875559] ================================================================== [ 17.875628] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc0 [ 17.875702] Write of size 8 at addr fff00000c591d628 by task kunit_try_catch/262 [ 17.875868] [ 17.875906] CPU: 1 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 17.875991] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.876028] Hardware name: linux,dummy-virt (DT) [ 17.876065] Call trace: [ 17.876121] show_stack+0x20/0x38 (C) [ 17.876208] dump_stack_lvl+0x8c/0xd0 [ 17.876257] print_report+0x118/0x5d0 [ 17.876377] kasan_report+0xdc/0x128 [ 17.876554] kasan_check_range+0x100/0x1a8 [ 17.876729] __kasan_check_write+0x20/0x30 [ 17.876792] kasan_bitops_modify.constprop.0+0x3b0/0xbc0 [ 17.876892] kasan_bitops_generic+0x110/0x1c8 [ 17.876942] kunit_try_run_case+0x170/0x3f0 [ 17.877024] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.877079] kthread+0x328/0x630 [ 17.877127] ret_from_fork+0x10/0x20 [ 17.877177] [ 17.877214] Allocated by task 262: [ 17.877424] kasan_save_stack+0x3c/0x68 [ 17.877474] kasan_save_track+0x20/0x40 [ 17.877515] kasan_save_alloc_info+0x40/0x58 [ 17.877557] __kasan_kmalloc+0xd4/0xd8 [ 17.877602] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.877643] kasan_bitops_generic+0xa0/0x1c8 [ 17.877683] kunit_try_run_case+0x170/0x3f0 [ 17.877723] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.877769] kthread+0x328/0x630 [ 17.877804] ret_from_fork+0x10/0x20 [ 17.877840] [ 17.877863] The buggy address belongs to the object at fff00000c591d620 [ 17.877863] which belongs to the cache kmalloc-16 of size 16 [ 17.877926] The buggy address is located 8 bytes inside of [ 17.877926] allocated 9-byte region [fff00000c591d620, fff00000c591d629) [ 17.877995] [ 17.878015] The buggy address belongs to the physical page: [ 17.878048] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591d [ 17.878104] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.878153] page_type: f5(slab) [ 17.878203] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 17.878257] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 17.878300] page dumped because: kasan: bad access detected [ 17.878334] [ 17.878355] Memory state around the buggy address: [ 17.878392] fff00000c591d500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 17.878439] fff00000c591d580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 17.878485] >fff00000c591d600: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 17.878527] ^ [ 17.878561] fff00000c591d680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.878603] fff00000c591d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.878644] ==================================================================
[ 14.556882] ================================================================== [ 14.557244] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 14.557791] Write of size 8 at addr ffff888102781708 by task kunit_try_catch/278 [ 14.558056] [ 14.558138] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.558179] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.558191] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.558213] Call Trace: [ 14.558223] <TASK> [ 14.558236] dump_stack_lvl+0x73/0xb0 [ 14.558265] print_report+0xd1/0x610 [ 14.558286] ? __virt_addr_valid+0x1db/0x2d0 [ 14.558309] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 14.558337] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.558361] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 14.558396] kasan_report+0x141/0x180 [ 14.558419] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 14.558451] kasan_check_range+0x10c/0x1c0 [ 14.558475] __kasan_check_write+0x18/0x20 [ 14.558496] kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 14.558523] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.558570] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.558595] ? trace_hardirqs_on+0x37/0xe0 [ 14.558617] ? kasan_bitops_generic+0x92/0x1c0 [ 14.558646] kasan_bitops_generic+0x116/0x1c0 [ 14.558671] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.558697] ? __pfx_read_tsc+0x10/0x10 [ 14.558719] ? ktime_get_ts64+0x86/0x230 [ 14.558743] kunit_try_run_case+0x1a5/0x480 [ 14.558853] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.558879] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.558905] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.558930] ? __kthread_parkme+0x82/0x180 [ 14.558951] ? preempt_count_sub+0x50/0x80 [ 14.558977] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.559007] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.559035] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.559062] kthread+0x337/0x6f0 [ 14.559082] ? trace_preempt_on+0x20/0xc0 [ 14.559121] ? __pfx_kthread+0x10/0x10 [ 14.559142] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.559166] ? calculate_sigpending+0x7b/0xa0 [ 14.559203] ? __pfx_kthread+0x10/0x10 [ 14.559227] ret_from_fork+0x116/0x1d0 [ 14.559247] ? __pfx_kthread+0x10/0x10 [ 14.559268] ret_from_fork_asm+0x1a/0x30 [ 14.559298] </TASK> [ 14.559308] [ 14.568714] Allocated by task 278: [ 14.568939] kasan_save_stack+0x45/0x70 [ 14.569144] kasan_save_track+0x18/0x40 [ 14.569334] kasan_save_alloc_info+0x3b/0x50 [ 14.569610] __kasan_kmalloc+0xb7/0xc0 [ 14.569781] __kmalloc_cache_noprof+0x189/0x420 [ 14.570026] kasan_bitops_generic+0x92/0x1c0 [ 14.570254] kunit_try_run_case+0x1a5/0x480 [ 14.570572] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.570853] kthread+0x337/0x6f0 [ 14.571025] ret_from_fork+0x116/0x1d0 [ 14.571229] ret_from_fork_asm+0x1a/0x30 [ 14.571523] [ 14.571639] The buggy address belongs to the object at ffff888102781700 [ 14.571639] which belongs to the cache kmalloc-16 of size 16 [ 14.572159] The buggy address is located 8 bytes inside of [ 14.572159] allocated 9-byte region [ffff888102781700, ffff888102781709) [ 14.572842] [ 14.572961] The buggy address belongs to the physical page: [ 14.573160] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102781 [ 14.573525] flags: 0x200000000000000(node=0|zone=2) [ 14.573886] page_type: f5(slab) [ 14.574015] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.574319] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.574842] page dumped because: kasan: bad access detected [ 14.575024] [ 14.575093] Memory state around the buggy address: [ 14.575246] ffff888102781600: 00 06 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.575566] ffff888102781680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.576072] >ffff888102781700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.576438] ^ [ 14.576561] ffff888102781780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.576998] ffff888102781800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.577401] ================================================================== [ 14.577984] ================================================================== [ 14.578282] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 14.578723] Write of size 8 at addr ffff888102781708 by task kunit_try_catch/278 [ 14.579063] [ 14.579172] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.579215] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.579236] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.579257] Call Trace: [ 14.579271] <TASK> [ 14.579285] dump_stack_lvl+0x73/0xb0 [ 14.579378] print_report+0xd1/0x610 [ 14.579403] ? __virt_addr_valid+0x1db/0x2d0 [ 14.579437] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 14.579474] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.579510] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 14.579538] kasan_report+0x141/0x180 [ 14.579561] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 14.579593] kasan_check_range+0x10c/0x1c0 [ 14.579617] __kasan_check_write+0x18/0x20 [ 14.579637] kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 14.579666] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.579695] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.579720] ? trace_hardirqs_on+0x37/0xe0 [ 14.579743] ? kasan_bitops_generic+0x92/0x1c0 [ 14.579782] kasan_bitops_generic+0x116/0x1c0 [ 14.579806] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.579833] ? __pfx_read_tsc+0x10/0x10 [ 14.579855] ? ktime_get_ts64+0x86/0x230 [ 14.579887] kunit_try_run_case+0x1a5/0x480 [ 14.579914] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.579948] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.579973] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.579998] ? __kthread_parkme+0x82/0x180 [ 14.580020] ? preempt_count_sub+0x50/0x80 [ 14.580044] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.580070] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.580096] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.580123] kthread+0x337/0x6f0 [ 14.580144] ? trace_preempt_on+0x20/0xc0 [ 14.580167] ? __pfx_kthread+0x10/0x10 [ 14.580188] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.580211] ? calculate_sigpending+0x7b/0xa0 [ 14.580236] ? __pfx_kthread+0x10/0x10 [ 14.580258] ret_from_fork+0x116/0x1d0 [ 14.580277] ? __pfx_kthread+0x10/0x10 [ 14.580298] ret_from_fork_asm+0x1a/0x30 [ 14.580329] </TASK> [ 14.580340] [ 14.589891] Allocated by task 278: [ 14.590064] kasan_save_stack+0x45/0x70 [ 14.590275] kasan_save_track+0x18/0x40 [ 14.590500] kasan_save_alloc_info+0x3b/0x50 [ 14.590651] __kasan_kmalloc+0xb7/0xc0 [ 14.590940] __kmalloc_cache_noprof+0x189/0x420 [ 14.591167] kasan_bitops_generic+0x92/0x1c0 [ 14.591346] kunit_try_run_case+0x1a5/0x480 [ 14.591689] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.591952] kthread+0x337/0x6f0 [ 14.592129] ret_from_fork+0x116/0x1d0 [ 14.592306] ret_from_fork_asm+0x1a/0x30 [ 14.592671] [ 14.592794] The buggy address belongs to the object at ffff888102781700 [ 14.592794] which belongs to the cache kmalloc-16 of size 16 [ 14.593309] The buggy address is located 8 bytes inside of [ 14.593309] allocated 9-byte region [ffff888102781700, ffff888102781709) [ 14.593900] [ 14.594000] The buggy address belongs to the physical page: [ 14.594212] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102781 [ 14.594626] flags: 0x200000000000000(node=0|zone=2) [ 14.594800] page_type: f5(slab) [ 14.594921] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.595151] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.595678] page dumped because: kasan: bad access detected [ 14.595948] [ 14.596042] Memory state around the buggy address: [ 14.596266] ffff888102781600: 00 06 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.596736] ffff888102781680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.597088] >ffff888102781700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.597303] ^ [ 14.597425] ffff888102781780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.597640] ffff888102781800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.598322] ================================================================== [ 14.619817] ================================================================== [ 14.620308] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50 [ 14.620842] Write of size 8 at addr ffff888102781708 by task kunit_try_catch/278 [ 14.621069] [ 14.621165] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.621208] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.621220] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.621240] Call Trace: [ 14.621253] <TASK> [ 14.621268] dump_stack_lvl+0x73/0xb0 [ 14.621296] print_report+0xd1/0x610 [ 14.621318] ? __virt_addr_valid+0x1db/0x2d0 [ 14.621488] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 14.621521] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.621546] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 14.621574] kasan_report+0x141/0x180 [ 14.621597] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 14.621629] kasan_check_range+0x10c/0x1c0 [ 14.621654] __kasan_check_write+0x18/0x20 [ 14.621675] kasan_bitops_modify.constprop.0+0x373/0xd50 [ 14.621713] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.621742] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.621778] ? trace_hardirqs_on+0x37/0xe0 [ 14.621802] ? kasan_bitops_generic+0x92/0x1c0 [ 14.621841] kasan_bitops_generic+0x116/0x1c0 [ 14.621866] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.621903] ? __pfx_read_tsc+0x10/0x10 [ 14.621924] ? ktime_get_ts64+0x86/0x230 [ 14.621958] kunit_try_run_case+0x1a5/0x480 [ 14.621983] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.622007] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.622042] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.622067] ? __kthread_parkme+0x82/0x180 [ 14.622089] ? preempt_count_sub+0x50/0x80 [ 14.622114] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.622139] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.622166] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.622192] kthread+0x337/0x6f0 [ 14.622212] ? trace_preempt_on+0x20/0xc0 [ 14.622235] ? __pfx_kthread+0x10/0x10 [ 14.622255] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.622287] ? calculate_sigpending+0x7b/0xa0 [ 14.622312] ? __pfx_kthread+0x10/0x10 [ 14.622334] ret_from_fork+0x116/0x1d0 [ 14.622363] ? __pfx_kthread+0x10/0x10 [ 14.622397] ret_from_fork_asm+0x1a/0x30 [ 14.622429] </TASK> [ 14.622439] [ 14.636983] Allocated by task 278: [ 14.637149] kasan_save_stack+0x45/0x70 [ 14.637301] kasan_save_track+0x18/0x40 [ 14.637618] kasan_save_alloc_info+0x3b/0x50 [ 14.637851] __kasan_kmalloc+0xb7/0xc0 [ 14.638042] __kmalloc_cache_noprof+0x189/0x420 [ 14.638265] kasan_bitops_generic+0x92/0x1c0 [ 14.638571] kunit_try_run_case+0x1a5/0x480 [ 14.638773] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.639027] kthread+0x337/0x6f0 [ 14.639228] ret_from_fork+0x116/0x1d0 [ 14.639542] ret_from_fork_asm+0x1a/0x30 [ 14.639904] [ 14.640009] The buggy address belongs to the object at ffff888102781700 [ 14.640009] which belongs to the cache kmalloc-16 of size 16 [ 14.640461] The buggy address is located 8 bytes inside of [ 14.640461] allocated 9-byte region [ffff888102781700, ffff888102781709) [ 14.641008] [ 14.641107] The buggy address belongs to the physical page: [ 14.641439] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102781 [ 14.641825] flags: 0x200000000000000(node=0|zone=2) [ 14.641989] page_type: f5(slab) [ 14.642154] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.642629] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.642994] page dumped because: kasan: bad access detected [ 14.643229] [ 14.643516] Memory state around the buggy address: [ 14.643783] ffff888102781600: 00 06 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.644045] ffff888102781680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.644454] >ffff888102781700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.644795] ^ [ 14.644968] ffff888102781780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.645283] ffff888102781800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.645689] ================================================================== [ 14.598866] ================================================================== [ 14.599218] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 14.599920] Write of size 8 at addr ffff888102781708 by task kunit_try_catch/278 [ 14.600220] [ 14.600329] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.600530] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.600555] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.600575] Call Trace: [ 14.600589] <TASK> [ 14.600605] dump_stack_lvl+0x73/0xb0 [ 14.600646] print_report+0xd1/0x610 [ 14.600668] ? __virt_addr_valid+0x1db/0x2d0 [ 14.600691] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 14.600727] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.600751] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 14.600794] kasan_report+0x141/0x180 [ 14.600817] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 14.600849] kasan_check_range+0x10c/0x1c0 [ 14.600873] __kasan_check_write+0x18/0x20 [ 14.600903] kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 14.600931] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.600970] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.600996] ? trace_hardirqs_on+0x37/0xe0 [ 14.601018] ? kasan_bitops_generic+0x92/0x1c0 [ 14.601055] kasan_bitops_generic+0x116/0x1c0 [ 14.601081] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.601108] ? __pfx_read_tsc+0x10/0x10 [ 14.601139] ? ktime_get_ts64+0x86/0x230 [ 14.601164] kunit_try_run_case+0x1a5/0x480 [ 14.601189] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.601222] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.601246] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.601271] ? __kthread_parkme+0x82/0x180 [ 14.601303] ? preempt_count_sub+0x50/0x80 [ 14.601406] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.601441] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.601489] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.601518] kthread+0x337/0x6f0 [ 14.601540] ? trace_preempt_on+0x20/0xc0 [ 14.601575] ? __pfx_kthread+0x10/0x10 [ 14.601598] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.601622] ? calculate_sigpending+0x7b/0xa0 [ 14.601648] ? __pfx_kthread+0x10/0x10 [ 14.601671] ret_from_fork+0x116/0x1d0 [ 14.601690] ? __pfx_kthread+0x10/0x10 [ 14.601719] ret_from_fork_asm+0x1a/0x30 [ 14.601752] </TASK> [ 14.601780] [ 14.610932] Allocated by task 278: [ 14.611106] kasan_save_stack+0x45/0x70 [ 14.611303] kasan_save_track+0x18/0x40 [ 14.611610] kasan_save_alloc_info+0x3b/0x50 [ 14.611823] __kasan_kmalloc+0xb7/0xc0 [ 14.612010] __kmalloc_cache_noprof+0x189/0x420 [ 14.612230] kasan_bitops_generic+0x92/0x1c0 [ 14.612514] kunit_try_run_case+0x1a5/0x480 [ 14.612739] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.612992] kthread+0x337/0x6f0 [ 14.613174] ret_from_fork+0x116/0x1d0 [ 14.613323] ret_from_fork_asm+0x1a/0x30 [ 14.613661] [ 14.613781] The buggy address belongs to the object at ffff888102781700 [ 14.613781] which belongs to the cache kmalloc-16 of size 16 [ 14.614135] The buggy address is located 8 bytes inside of [ 14.614135] allocated 9-byte region [ffff888102781700, ffff888102781709) [ 14.614584] [ 14.614681] The buggy address belongs to the physical page: [ 14.615055] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102781 [ 14.615551] flags: 0x200000000000000(node=0|zone=2) [ 14.615782] page_type: f5(slab) [ 14.615976] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.616300] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.616698] page dumped because: kasan: bad access detected [ 14.616897] [ 14.616967] Memory state around the buggy address: [ 14.617123] ffff888102781600: 00 06 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.617651] ffff888102781680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.618153] >ffff888102781700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.618638] ^ [ 14.618797] ffff888102781780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.619018] ffff888102781800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.619362] ================================================================== [ 14.536723] ================================================================== [ 14.537199] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50 [ 14.537544] Write of size 8 at addr ffff888102781708 by task kunit_try_catch/278 [ 14.538097] [ 14.538235] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.538282] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.538295] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.538317] Call Trace: [ 14.538395] <TASK> [ 14.538412] dump_stack_lvl+0x73/0xb0 [ 14.538446] print_report+0xd1/0x610 [ 14.538468] ? __virt_addr_valid+0x1db/0x2d0 [ 14.538492] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 14.538521] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.538545] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 14.538573] kasan_report+0x141/0x180 [ 14.538596] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 14.538628] kasan_check_range+0x10c/0x1c0 [ 14.538653] __kasan_check_write+0x18/0x20 [ 14.538674] kasan_bitops_modify.constprop.0+0x101/0xd50 [ 14.538701] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.538730] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.538768] ? trace_hardirqs_on+0x37/0xe0 [ 14.538792] ? kasan_bitops_generic+0x92/0x1c0 [ 14.538820] kasan_bitops_generic+0x116/0x1c0 [ 14.538845] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.538872] ? __pfx_read_tsc+0x10/0x10 [ 14.538894] ? ktime_get_ts64+0x86/0x230 [ 14.538918] kunit_try_run_case+0x1a5/0x480 [ 14.538944] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.538968] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.538994] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.539019] ? __kthread_parkme+0x82/0x180 [ 14.539041] ? preempt_count_sub+0x50/0x80 [ 14.539065] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.539091] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.539117] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.539143] kthread+0x337/0x6f0 [ 14.539163] ? trace_preempt_on+0x20/0xc0 [ 14.539186] ? __pfx_kthread+0x10/0x10 [ 14.539206] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.539228] ? calculate_sigpending+0x7b/0xa0 [ 14.539253] ? __pfx_kthread+0x10/0x10 [ 14.539275] ret_from_fork+0x116/0x1d0 [ 14.539294] ? __pfx_kthread+0x10/0x10 [ 14.539315] ret_from_fork_asm+0x1a/0x30 [ 14.539400] </TASK> [ 14.539411] [ 14.547354] Allocated by task 278: [ 14.547538] kasan_save_stack+0x45/0x70 [ 14.547831] kasan_save_track+0x18/0x40 [ 14.548031] kasan_save_alloc_info+0x3b/0x50 [ 14.548247] __kasan_kmalloc+0xb7/0xc0 [ 14.548482] __kmalloc_cache_noprof+0x189/0x420 [ 14.548679] kasan_bitops_generic+0x92/0x1c0 [ 14.548842] kunit_try_run_case+0x1a5/0x480 [ 14.549034] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.549287] kthread+0x337/0x6f0 [ 14.549508] ret_from_fork+0x116/0x1d0 [ 14.549652] ret_from_fork_asm+0x1a/0x30 [ 14.549807] [ 14.549876] The buggy address belongs to the object at ffff888102781700 [ 14.549876] which belongs to the cache kmalloc-16 of size 16 [ 14.550254] The buggy address is located 8 bytes inside of [ 14.550254] allocated 9-byte region [ffff888102781700, ffff888102781709) [ 14.551335] [ 14.551628] The buggy address belongs to the physical page: [ 14.551842] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102781 [ 14.552389] flags: 0x200000000000000(node=0|zone=2) [ 14.552619] page_type: f5(slab) [ 14.552786] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.553017] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.553242] page dumped because: kasan: bad access detected [ 14.553720] [ 14.553830] Memory state around the buggy address: [ 14.554059] ffff888102781600: 00 06 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.554387] ffff888102781680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.554791] >ffff888102781700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.555042] ^ [ 14.555166] ffff888102781780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.555645] ffff888102781800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.555928] ================================================================== [ 14.646166] ================================================================== [ 14.646627] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 14.647028] Write of size 8 at addr ffff888102781708 by task kunit_try_catch/278 [ 14.647555] [ 14.647664] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.647708] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.647721] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.647741] Call Trace: [ 14.647768] <TASK> [ 14.647782] dump_stack_lvl+0x73/0xb0 [ 14.647813] print_report+0xd1/0x610 [ 14.647836] ? __virt_addr_valid+0x1db/0x2d0 [ 14.647858] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 14.647886] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.647911] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 14.647939] kasan_report+0x141/0x180 [ 14.647961] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 14.647993] kasan_check_range+0x10c/0x1c0 [ 14.648018] __kasan_check_write+0x18/0x20 [ 14.648038] kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 14.648066] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.648095] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.648121] ? trace_hardirqs_on+0x37/0xe0 [ 14.648156] ? kasan_bitops_generic+0x92/0x1c0 [ 14.648184] kasan_bitops_generic+0x116/0x1c0 [ 14.648222] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.648249] ? __pfx_read_tsc+0x10/0x10 [ 14.648271] ? ktime_get_ts64+0x86/0x230 [ 14.648294] kunit_try_run_case+0x1a5/0x480 [ 14.648388] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.648415] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.648458] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.648484] ? __kthread_parkme+0x82/0x180 [ 14.648506] ? preempt_count_sub+0x50/0x80 [ 14.648532] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.648560] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.648586] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.648612] kthread+0x337/0x6f0 [ 14.648631] ? trace_preempt_on+0x20/0xc0 [ 14.648656] ? __pfx_kthread+0x10/0x10 [ 14.648677] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.648701] ? calculate_sigpending+0x7b/0xa0 [ 14.648726] ? __pfx_kthread+0x10/0x10 [ 14.648748] ret_from_fork+0x116/0x1d0 [ 14.648775] ? __pfx_kthread+0x10/0x10 [ 14.648797] ret_from_fork_asm+0x1a/0x30 [ 14.648829] </TASK> [ 14.648839] [ 14.657558] Allocated by task 278: [ 14.657744] kasan_save_stack+0x45/0x70 [ 14.657984] kasan_save_track+0x18/0x40 [ 14.658214] kasan_save_alloc_info+0x3b/0x50 [ 14.658519] __kasan_kmalloc+0xb7/0xc0 [ 14.658723] __kmalloc_cache_noprof+0x189/0x420 [ 14.658972] kasan_bitops_generic+0x92/0x1c0 [ 14.659178] kunit_try_run_case+0x1a5/0x480 [ 14.659709] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.660016] kthread+0x337/0x6f0 [ 14.660185] ret_from_fork+0x116/0x1d0 [ 14.660465] ret_from_fork_asm+0x1a/0x30 [ 14.660682] [ 14.660775] The buggy address belongs to the object at ffff888102781700 [ 14.660775] which belongs to the cache kmalloc-16 of size 16 [ 14.661281] The buggy address is located 8 bytes inside of [ 14.661281] allocated 9-byte region [ffff888102781700, ffff888102781709) [ 14.661877] [ 14.661993] The buggy address belongs to the physical page: [ 14.662202] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102781 [ 14.662565] flags: 0x200000000000000(node=0|zone=2) [ 14.662839] page_type: f5(slab) [ 14.663009] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.663528] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.663933] page dumped because: kasan: bad access detected [ 14.664200] [ 14.664272] Memory state around the buggy address: [ 14.664445] ffff888102781600: 00 06 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.664885] ffff888102781680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.665241] >ffff888102781700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.665633] ^ [ 14.665805] ffff888102781780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.666126] ffff888102781800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.666522] ================================================================== [ 14.666972] ================================================================== [ 14.667493] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 14.667887] Write of size 8 at addr ffff888102781708 by task kunit_try_catch/278 [ 14.668217] [ 14.668389] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.668452] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.668464] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.668493] Call Trace: [ 14.668507] <TASK> [ 14.668521] dump_stack_lvl+0x73/0xb0 [ 14.668551] print_report+0xd1/0x610 [ 14.668586] ? __virt_addr_valid+0x1db/0x2d0 [ 14.668609] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 14.668637] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.668662] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 14.668690] kasan_report+0x141/0x180 [ 14.668712] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 14.668745] kasan_check_range+0x10c/0x1c0 [ 14.668777] __kasan_check_write+0x18/0x20 [ 14.668797] kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 14.668824] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.668862] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.668887] ? trace_hardirqs_on+0x37/0xe0 [ 14.668910] ? kasan_bitops_generic+0x92/0x1c0 [ 14.668948] kasan_bitops_generic+0x116/0x1c0 [ 14.668973] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.668999] ? __pfx_read_tsc+0x10/0x10 [ 14.669020] ? ktime_get_ts64+0x86/0x230 [ 14.669044] kunit_try_run_case+0x1a5/0x480 [ 14.669070] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.669093] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.669118] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.669143] ? __kthread_parkme+0x82/0x180 [ 14.669163] ? preempt_count_sub+0x50/0x80 [ 14.669186] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.669213] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.669238] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.669264] kthread+0x337/0x6f0 [ 14.669291] ? trace_preempt_on+0x20/0xc0 [ 14.669337] ? __pfx_kthread+0x10/0x10 [ 14.669358] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.669380] ? calculate_sigpending+0x7b/0xa0 [ 14.669405] ? __pfx_kthread+0x10/0x10 [ 14.669432] ret_from_fork+0x116/0x1d0 [ 14.669451] ? __pfx_kthread+0x10/0x10 [ 14.669472] ret_from_fork_asm+0x1a/0x30 [ 14.669503] </TASK> [ 14.669512] [ 14.678372] Allocated by task 278: [ 14.678599] kasan_save_stack+0x45/0x70 [ 14.678776] kasan_save_track+0x18/0x40 [ 14.678913] kasan_save_alloc_info+0x3b/0x50 [ 14.679065] __kasan_kmalloc+0xb7/0xc0 [ 14.679278] __kmalloc_cache_noprof+0x189/0x420 [ 14.679694] kasan_bitops_generic+0x92/0x1c0 [ 14.679961] kunit_try_run_case+0x1a5/0x480 [ 14.680160] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.680420] kthread+0x337/0x6f0 [ 14.680643] ret_from_fork+0x116/0x1d0 [ 14.680844] ret_from_fork_asm+0x1a/0x30 [ 14.681043] [ 14.681120] The buggy address belongs to the object at ffff888102781700 [ 14.681120] which belongs to the cache kmalloc-16 of size 16 [ 14.681701] The buggy address is located 8 bytes inside of [ 14.681701] allocated 9-byte region [ffff888102781700, ffff888102781709) [ 14.682229] [ 14.682394] The buggy address belongs to the physical page: [ 14.682677] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102781 [ 14.683032] flags: 0x200000000000000(node=0|zone=2) [ 14.683263] page_type: f5(slab) [ 14.683429] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.683666] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.684253] page dumped because: kasan: bad access detected [ 14.684635] [ 14.684767] Memory state around the buggy address: [ 14.684947] ffff888102781600: 00 06 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.685262] ffff888102781680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.685677] >ffff888102781700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.685986] ^ [ 14.686111] ffff888102781780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.686542] ffff888102781800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.686879] ================================================================== [ 14.687316] ================================================================== [ 14.687650] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50 [ 14.688364] Write of size 8 at addr ffff888102781708 by task kunit_try_catch/278 [ 14.688719] [ 14.688817] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.688862] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.688875] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.688896] Call Trace: [ 14.688910] <TASK> [ 14.688927] dump_stack_lvl+0x73/0xb0 [ 14.688957] print_report+0xd1/0x610 [ 14.688978] ? __virt_addr_valid+0x1db/0x2d0 [ 14.689003] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 14.689031] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.689055] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 14.689083] kasan_report+0x141/0x180 [ 14.689118] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 14.689150] kasan_check_range+0x10c/0x1c0 [ 14.689186] __kasan_check_write+0x18/0x20 [ 14.689206] kasan_bitops_modify.constprop.0+0x547/0xd50 [ 14.689234] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.689263] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.689287] ? trace_hardirqs_on+0x37/0xe0 [ 14.689369] ? kasan_bitops_generic+0x92/0x1c0 [ 14.689404] kasan_bitops_generic+0x116/0x1c0 [ 14.689446] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.689482] ? __pfx_read_tsc+0x10/0x10 [ 14.689504] ? ktime_get_ts64+0x86/0x230 [ 14.689528] kunit_try_run_case+0x1a5/0x480 [ 14.689564] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.689591] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.689618] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.689643] ? __kthread_parkme+0x82/0x180 [ 14.689673] ? preempt_count_sub+0x50/0x80 [ 14.689697] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.689723] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.689767] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.689793] kthread+0x337/0x6f0 [ 14.689814] ? trace_preempt_on+0x20/0xc0 [ 14.689836] ? __pfx_kthread+0x10/0x10 [ 14.689858] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.689879] ? calculate_sigpending+0x7b/0xa0 [ 14.689905] ? __pfx_kthread+0x10/0x10 [ 14.689926] ret_from_fork+0x116/0x1d0 [ 14.689945] ? __pfx_kthread+0x10/0x10 [ 14.689966] ret_from_fork_asm+0x1a/0x30 [ 14.689998] </TASK> [ 14.690007] [ 14.698571] Allocated by task 278: [ 14.698792] kasan_save_stack+0x45/0x70 [ 14.698997] kasan_save_track+0x18/0x40 [ 14.699209] kasan_save_alloc_info+0x3b/0x50 [ 14.699442] __kasan_kmalloc+0xb7/0xc0 [ 14.699629] __kmalloc_cache_noprof+0x189/0x420 [ 14.699835] kasan_bitops_generic+0x92/0x1c0 [ 14.699986] kunit_try_run_case+0x1a5/0x480 [ 14.700133] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.700502] kthread+0x337/0x6f0 [ 14.700697] ret_from_fork+0x116/0x1d0 [ 14.700902] ret_from_fork_asm+0x1a/0x30 [ 14.701098] [ 14.701197] The buggy address belongs to the object at ffff888102781700 [ 14.701197] which belongs to the cache kmalloc-16 of size 16 [ 14.701745] The buggy address is located 8 bytes inside of [ 14.701745] allocated 9-byte region [ffff888102781700, ffff888102781709) [ 14.702233] [ 14.702452] The buggy address belongs to the physical page: [ 14.702751] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102781 [ 14.703117] flags: 0x200000000000000(node=0|zone=2) [ 14.703404] page_type: f5(slab) [ 14.703609] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.703994] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.704306] page dumped because: kasan: bad access detected [ 14.704744] [ 14.704851] Memory state around the buggy address: [ 14.705077] ffff888102781600: 00 06 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.705438] ffff888102781680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.705703] >ffff888102781700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.706042] ^ [ 14.706219] ffff888102781780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.706592] ffff888102781800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.706874] ==================================================================