Date
July 15, 2025, 11:09 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 17.949345] ================================================================== [ 17.953051] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x334/0xbc0 [ 17.953595] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.954290] Hardware name: linux,dummy-virt (DT) [ 17.955554] __kasan_check_write+0x20/0x30 [ 17.956393] kasan_bitops_generic+0x11c/0x1c8 [ 17.956585] kthread+0x328/0x630 [ 17.958380] kunit_try_run_case+0x170/0x3f0 [ 17.958421] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.959922] [ 17.960074] [ 17.961107] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.961299] page_type: f5(slab) [ 17.961594] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 17.962512] fff00000c591d580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 17.963103] ^ [ 17.963585] fff00000c591d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.967935] ================================================================== [ 17.892522] ================================================================== [ 17.892579] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0 [ 17.892634] Read of size 8 at addr fff00000c591d628 by task kunit_try_catch/262 [ 17.892697] [ 17.892730] CPU: 1 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 17.892824] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.892861] Hardware name: linux,dummy-virt (DT) [ 17.892893] Call trace: [ 17.892922] show_stack+0x20/0x38 (C) [ 17.892977] dump_stack_lvl+0x8c/0xd0 [ 17.893307] print_report+0x118/0x5d0 [ 17.893865] kasan_report+0xdc/0x128 [ 17.894174] __asan_report_load8_noabort+0x20/0x30 [ 17.894248] kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0 [ 17.894544] kasan_bitops_generic+0x11c/0x1c8 [ 17.894750] kunit_try_run_case+0x170/0x3f0 [ 17.894824] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.901138] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 17.901573] page dumped because: kasan: bad access detected [ 17.901740] [ 17.901800] Memory state around the buggy address: [ 17.902358] fff00000c591d580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 17.903007] fff00000c591d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.907374] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.907433] Hardware name: linux,dummy-virt (DT) [ 17.907520] Call trace: [ 17.907545] show_stack+0x20/0x38 (C) [ 17.908369] kasan_report+0xdc/0x128 [ 17.909971] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.910075] kthread+0x328/0x630 [ 17.910496] Allocated by task 262: [ 17.911190] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.911381] kthread+0x328/0x630 [ 17.911617] The buggy address is located 8 bytes inside of [ 17.911617] allocated 9-byte region [fff00000c591d620, fff00000c591d629) [ 17.911875] page_type: f5(slab) [ 17.911923] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 17.912148] fff00000c591d500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 17.912816] >fff00000c591d600: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 17.914484] fff00000c591d680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.915552] ================================================================== [ 17.886137] ================================================================== [ 17.886211] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0 [ 17.886317] Write of size 8 at addr fff00000c591d628 by task kunit_try_catch/262 [ 17.888023] [ 17.888082] CPU: 1 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 17.888175] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.888434] Hardware name: linux,dummy-virt (DT) [ 17.888495] Call trace: [ 17.888677] show_stack+0x20/0x38 (C) [ 17.888741] dump_stack_lvl+0x8c/0xd0 [ 17.888791] print_report+0x118/0x5d0 [ 17.888900] kasan_report+0xdc/0x128 [ 17.888952] kasan_check_range+0x100/0x1a8 [ 17.889007] __kasan_check_write+0x20/0x30 [ 17.889101] kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0 [ 17.889171] kasan_bitops_generic+0x11c/0x1c8 [ 17.889232] kunit_try_run_case+0x170/0x3f0 [ 17.889297] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.889350] kthread+0x328/0x630 [ 17.889393] ret_from_fork+0x10/0x20 [ 17.889678] [ 17.889701] Allocated by task 262: [ 17.889741] kasan_save_stack+0x3c/0x68 [ 17.889785] kasan_save_track+0x20/0x40 [ 17.889824] kasan_save_alloc_info+0x40/0x58 [ 17.889872] __kasan_kmalloc+0xd4/0xd8 [ 17.889909] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.889951] kasan_bitops_generic+0xa0/0x1c8 [ 17.889990] kunit_try_run_case+0x170/0x3f0 [ 17.890028] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.890074] kthread+0x328/0x630 [ 17.890108] ret_from_fork+0x10/0x20 [ 17.890151] [ 17.890450] The buggy address belongs to the object at fff00000c591d620 [ 17.890450] which belongs to the cache kmalloc-16 of size 16 [ 17.890631] The buggy address is located 8 bytes inside of [ 17.890631] allocated 9-byte region [fff00000c591d620, fff00000c591d629) [ 17.890756] [ 17.890904] The buggy address belongs to the physical page: [ 17.890980] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591d [ 17.891135] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.891217] page_type: f5(slab) [ 17.891671] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 17.891731] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 17.891777] page dumped because: kasan: bad access detected [ 17.891822] [ 17.891848] Memory state around the buggy address: [ 17.891896] fff00000c591d500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 17.891958] fff00000c591d580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 17.892005] >fff00000c591d600: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 17.892052] ^ [ 17.892102] fff00000c591d680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.892148] fff00000c591d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.892210] ==================================================================
[ 14.708722] ================================================================== [ 14.708989] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 14.709266] Write of size 8 at addr ffff888102781708 by task kunit_try_catch/278 [ 14.710217] [ 14.710545] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.710604] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.710617] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.710637] Call Trace: [ 14.710649] <TASK> [ 14.710663] dump_stack_lvl+0x73/0xb0 [ 14.710694] print_report+0xd1/0x610 [ 14.710715] ? __virt_addr_valid+0x1db/0x2d0 [ 14.710738] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 14.710821] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.710848] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 14.710879] kasan_report+0x141/0x180 [ 14.710900] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 14.710935] kasan_check_range+0x10c/0x1c0 [ 14.710959] __kasan_check_write+0x18/0x20 [ 14.710979] kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 14.711010] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.711041] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.711066] ? trace_hardirqs_on+0x37/0xe0 [ 14.711089] ? kasan_bitops_generic+0x92/0x1c0 [ 14.711117] kasan_bitops_generic+0x121/0x1c0 [ 14.711142] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.711169] ? __pfx_read_tsc+0x10/0x10 [ 14.711190] ? ktime_get_ts64+0x86/0x230 [ 14.711213] kunit_try_run_case+0x1a5/0x480 [ 14.711239] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.711263] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.711287] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.711311] ? __kthread_parkme+0x82/0x180 [ 14.711417] ? preempt_count_sub+0x50/0x80 [ 14.711458] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.711484] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.711512] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.711538] kthread+0x337/0x6f0 [ 14.711562] ? trace_preempt_on+0x20/0xc0 [ 14.711588] ? __pfx_kthread+0x10/0x10 [ 14.711610] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.711633] ? calculate_sigpending+0x7b/0xa0 [ 14.711658] ? __pfx_kthread+0x10/0x10 [ 14.711680] ret_from_fork+0x116/0x1d0 [ 14.711698] ? __pfx_kthread+0x10/0x10 [ 14.711719] ret_from_fork_asm+0x1a/0x30 [ 14.711752] </TASK> [ 14.711774] [ 14.724282] Allocated by task 278: [ 14.724625] kasan_save_stack+0x45/0x70 [ 14.724831] kasan_save_track+0x18/0x40 [ 14.725013] kasan_save_alloc_info+0x3b/0x50 [ 14.725209] __kasan_kmalloc+0xb7/0xc0 [ 14.726014] __kmalloc_cache_noprof+0x189/0x420 [ 14.726210] kasan_bitops_generic+0x92/0x1c0 [ 14.726368] kunit_try_run_case+0x1a5/0x480 [ 14.726641] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.726898] kthread+0x337/0x6f0 [ 14.727063] ret_from_fork+0x116/0x1d0 [ 14.727231] ret_from_fork_asm+0x1a/0x30 [ 14.727884] [ 14.727994] The buggy address belongs to the object at ffff888102781700 [ 14.727994] which belongs to the cache kmalloc-16 of size 16 [ 14.728821] The buggy address is located 8 bytes inside of [ 14.728821] allocated 9-byte region [ffff888102781700, ffff888102781709) [ 14.729309] [ 14.729521] The buggy address belongs to the physical page: [ 14.729767] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102781 [ 14.730089] flags: 0x200000000000000(node=0|zone=2) [ 14.730303] page_type: f5(slab) [ 14.731086] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.731450] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.732209] page dumped because: kasan: bad access detected [ 14.732611] [ 14.732712] Memory state around the buggy address: [ 14.732936] ffff888102781600: 00 06 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.733232] ffff888102781680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.733836] >ffff888102781700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.734131] ^ [ 14.734286] ffff888102781780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.735245] ffff888102781800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.735598] ================================================================== [ 14.755474] ================================================================== [ 14.755945] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 14.756305] Write of size 8 at addr ffff888102781708 by task kunit_try_catch/278 [ 14.756819] [ 14.756914] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.756960] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.756971] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.756992] Call Trace: [ 14.757004] <TASK> [ 14.757018] dump_stack_lvl+0x73/0xb0 [ 14.757047] print_report+0xd1/0x610 [ 14.757070] ? __virt_addr_valid+0x1db/0x2d0 [ 14.757092] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 14.757124] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.757148] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 14.757179] kasan_report+0x141/0x180 [ 14.757201] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 14.757236] kasan_check_range+0x10c/0x1c0 [ 14.757260] __kasan_check_write+0x18/0x20 [ 14.757280] kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 14.757310] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.757403] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.757431] ? trace_hardirqs_on+0x37/0xe0 [ 14.757453] ? kasan_bitops_generic+0x92/0x1c0 [ 14.757482] kasan_bitops_generic+0x121/0x1c0 [ 14.757506] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.757532] ? __pfx_read_tsc+0x10/0x10 [ 14.757553] ? ktime_get_ts64+0x86/0x230 [ 14.757577] kunit_try_run_case+0x1a5/0x480 [ 14.757602] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.757626] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.757651] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.757676] ? __kthread_parkme+0x82/0x180 [ 14.757696] ? preempt_count_sub+0x50/0x80 [ 14.757719] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.757745] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.757784] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.757810] kthread+0x337/0x6f0 [ 14.757830] ? trace_preempt_on+0x20/0xc0 [ 14.757853] ? __pfx_kthread+0x10/0x10 [ 14.757875] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.757897] ? calculate_sigpending+0x7b/0xa0 [ 14.757922] ? __pfx_kthread+0x10/0x10 [ 14.757943] ret_from_fork+0x116/0x1d0 [ 14.757963] ? __pfx_kthread+0x10/0x10 [ 14.757984] ret_from_fork_asm+0x1a/0x30 [ 14.758015] </TASK> [ 14.758025] [ 14.766834] Allocated by task 278: [ 14.767024] kasan_save_stack+0x45/0x70 [ 14.767217] kasan_save_track+0x18/0x40 [ 14.767393] kasan_save_alloc_info+0x3b/0x50 [ 14.767543] __kasan_kmalloc+0xb7/0xc0 [ 14.767677] __kmalloc_cache_noprof+0x189/0x420 [ 14.767844] kasan_bitops_generic+0x92/0x1c0 [ 14.767994] kunit_try_run_case+0x1a5/0x480 [ 14.768143] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.768394] kthread+0x337/0x6f0 [ 14.768654] ret_from_fork+0x116/0x1d0 [ 14.768862] ret_from_fork_asm+0x1a/0x30 [ 14.769060] [ 14.769161] The buggy address belongs to the object at ffff888102781700 [ 14.769161] which belongs to the cache kmalloc-16 of size 16 [ 14.769894] The buggy address is located 8 bytes inside of [ 14.769894] allocated 9-byte region [ffff888102781700, ffff888102781709) [ 14.770256] [ 14.770456] The buggy address belongs to the physical page: [ 14.770718] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102781 [ 14.771097] flags: 0x200000000000000(node=0|zone=2) [ 14.771790] page_type: f5(slab) [ 14.772137] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.772810] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.773088] page dumped because: kasan: bad access detected [ 14.773513] [ 14.773620] Memory state around the buggy address: [ 14.773850] ffff888102781600: 00 06 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.774085] ffff888102781680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.775407] >ffff888102781700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.775706] ^ [ 14.775895] ffff888102781780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.776191] ffff888102781800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.776583] ================================================================== [ 14.885573] ================================================================== [ 14.885832] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 14.886113] Read of size 8 at addr ffff888102781708 by task kunit_try_catch/278 [ 14.886334] [ 14.886421] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.886464] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.886475] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.886495] Call Trace: [ 14.886508] <TASK> [ 14.886522] dump_stack_lvl+0x73/0xb0 [ 14.886549] print_report+0xd1/0x610 [ 14.886570] ? __virt_addr_valid+0x1db/0x2d0 [ 14.886591] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 14.886618] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.886641] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 14.886668] kasan_report+0x141/0x180 [ 14.886689] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 14.886721] __asan_report_load8_noabort+0x18/0x20 [ 14.886746] kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 14.888730] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.888780] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.888806] ? trace_hardirqs_on+0x37/0xe0 [ 14.888829] ? kasan_bitops_generic+0x92/0x1c0 [ 14.888858] kasan_bitops_generic+0x121/0x1c0 [ 14.888882] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.888908] ? __pfx_read_tsc+0x10/0x10 [ 14.888930] ? ktime_get_ts64+0x86/0x230 [ 14.888953] kunit_try_run_case+0x1a5/0x480 [ 14.888978] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.889002] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.889027] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.889051] ? __kthread_parkme+0x82/0x180 [ 14.889073] ? preempt_count_sub+0x50/0x80 [ 14.889097] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.889125] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.889152] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.889178] kthread+0x337/0x6f0 [ 14.889198] ? trace_preempt_on+0x20/0xc0 [ 14.889221] ? __pfx_kthread+0x10/0x10 [ 14.889242] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.889265] ? calculate_sigpending+0x7b/0xa0 [ 14.889289] ? __pfx_kthread+0x10/0x10 [ 14.889318] ret_from_fork+0x116/0x1d0 [ 14.889337] ? __pfx_kthread+0x10/0x10 [ 14.889357] ret_from_fork_asm+0x1a/0x30 [ 14.889389] </TASK> [ 14.889399] [ 14.902481] Allocated by task 278: [ 14.902812] kasan_save_stack+0x45/0x70 [ 14.903017] kasan_save_track+0x18/0x40 [ 14.903199] kasan_save_alloc_info+0x3b/0x50 [ 14.903496] __kasan_kmalloc+0xb7/0xc0 [ 14.903679] __kmalloc_cache_noprof+0x189/0x420 [ 14.903894] kasan_bitops_generic+0x92/0x1c0 [ 14.904090] kunit_try_run_case+0x1a5/0x480 [ 14.904283] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.904746] kthread+0x337/0x6f0 [ 14.904931] ret_from_fork+0x116/0x1d0 [ 14.905101] ret_from_fork_asm+0x1a/0x30 [ 14.905284] [ 14.905472] The buggy address belongs to the object at ffff888102781700 [ 14.905472] which belongs to the cache kmalloc-16 of size 16 [ 14.905970] The buggy address is located 8 bytes inside of [ 14.905970] allocated 9-byte region [ffff888102781700, ffff888102781709) [ 14.907427] [ 14.907527] The buggy address belongs to the physical page: [ 14.907704] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102781 [ 14.907958] flags: 0x200000000000000(node=0|zone=2) [ 14.908160] page_type: f5(slab) [ 14.908307] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.908781] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.909105] page dumped because: kasan: bad access detected [ 14.909308] [ 14.909496] Memory state around the buggy address: [ 14.909701] ffff888102781600: 00 06 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.909965] ffff888102781680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.910270] >ffff888102781700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.910608] ^ [ 14.910775] ffff888102781780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.911091] ffff888102781800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.911324] ================================================================== [ 14.842001] ================================================================== [ 14.842519] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 14.842962] Write of size 8 at addr ffff888102781708 by task kunit_try_catch/278 [ 14.843274] [ 14.843457] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.843500] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.843511] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.843531] Call Trace: [ 14.843544] <TASK> [ 14.843561] dump_stack_lvl+0x73/0xb0 [ 14.843591] print_report+0xd1/0x610 [ 14.843613] ? __virt_addr_valid+0x1db/0x2d0 [ 14.843636] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 14.843666] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.843691] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 14.843721] kasan_report+0x141/0x180 [ 14.843744] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 14.843793] kasan_check_range+0x10c/0x1c0 [ 14.843818] __kasan_check_write+0x18/0x20 [ 14.843837] kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 14.843868] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.843899] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.843925] ? trace_hardirqs_on+0x37/0xe0 [ 14.843947] ? kasan_bitops_generic+0x92/0x1c0 [ 14.843975] kasan_bitops_generic+0x121/0x1c0 [ 14.844001] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.844028] ? __pfx_read_tsc+0x10/0x10 [ 14.844049] ? ktime_get_ts64+0x86/0x230 [ 14.844074] kunit_try_run_case+0x1a5/0x480 [ 14.844099] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.844123] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.844148] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.844173] ? __kthread_parkme+0x82/0x180 [ 14.844193] ? preempt_count_sub+0x50/0x80 [ 14.844218] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.844243] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.844268] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.844295] kthread+0x337/0x6f0 [ 14.844314] ? trace_preempt_on+0x20/0xc0 [ 14.844416] ? __pfx_kthread+0x10/0x10 [ 14.844442] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.844467] ? calculate_sigpending+0x7b/0xa0 [ 14.844493] ? __pfx_kthread+0x10/0x10 [ 14.844516] ret_from_fork+0x116/0x1d0 [ 14.844535] ? __pfx_kthread+0x10/0x10 [ 14.844573] ret_from_fork_asm+0x1a/0x30 [ 14.844605] </TASK> [ 14.844616] [ 14.853671] Allocated by task 278: [ 14.853857] kasan_save_stack+0x45/0x70 [ 14.854007] kasan_save_track+0x18/0x40 [ 14.854144] kasan_save_alloc_info+0x3b/0x50 [ 14.854418] __kasan_kmalloc+0xb7/0xc0 [ 14.854615] __kmalloc_cache_noprof+0x189/0x420 [ 14.854886] kasan_bitops_generic+0x92/0x1c0 [ 14.855276] kunit_try_run_case+0x1a5/0x480 [ 14.855652] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.855855] kthread+0x337/0x6f0 [ 14.855979] ret_from_fork+0x116/0x1d0 [ 14.856149] ret_from_fork_asm+0x1a/0x30 [ 14.856342] [ 14.856439] The buggy address belongs to the object at ffff888102781700 [ 14.856439] which belongs to the cache kmalloc-16 of size 16 [ 14.856991] The buggy address is located 8 bytes inside of [ 14.856991] allocated 9-byte region [ffff888102781700, ffff888102781709) [ 14.857356] [ 14.857453] The buggy address belongs to the physical page: [ 14.857711] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102781 [ 14.858081] flags: 0x200000000000000(node=0|zone=2) [ 14.858373] page_type: f5(slab) [ 14.858713] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.859023] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.859308] page dumped because: kasan: bad access detected [ 14.859843] [ 14.859939] Memory state around the buggy address: [ 14.860151] ffff888102781600: 00 06 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.860490] ffff888102781680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.860816] >ffff888102781700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.861042] ^ [ 14.861221] ffff888102781780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.861634] ffff888102781800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.861915] ================================================================== [ 14.777038] ================================================================== [ 14.777294] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 14.777965] Write of size 8 at addr ffff888102781708 by task kunit_try_catch/278 [ 14.778395] [ 14.778530] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.778577] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.778587] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.778609] Call Trace: [ 14.778625] <TASK> [ 14.778640] dump_stack_lvl+0x73/0xb0 [ 14.778669] print_report+0xd1/0x610 [ 14.778692] ? __virt_addr_valid+0x1db/0x2d0 [ 14.778716] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 14.778747] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.778783] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 14.778813] kasan_report+0x141/0x180 [ 14.778836] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 14.778870] kasan_check_range+0x10c/0x1c0 [ 14.778895] __kasan_check_write+0x18/0x20 [ 14.778916] kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 14.778946] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.778979] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.779004] ? trace_hardirqs_on+0x37/0xe0 [ 14.779026] ? kasan_bitops_generic+0x92/0x1c0 [ 14.779055] kasan_bitops_generic+0x121/0x1c0 [ 14.779079] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.779105] ? __pfx_read_tsc+0x10/0x10 [ 14.779126] ? ktime_get_ts64+0x86/0x230 [ 14.779151] kunit_try_run_case+0x1a5/0x480 [ 14.779176] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.779199] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.779223] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.779248] ? __kthread_parkme+0x82/0x180 [ 14.779270] ? preempt_count_sub+0x50/0x80 [ 14.779296] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.779321] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.779403] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.779431] kthread+0x337/0x6f0 [ 14.779461] ? trace_preempt_on+0x20/0xc0 [ 14.779485] ? __pfx_kthread+0x10/0x10 [ 14.779506] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.779529] ? calculate_sigpending+0x7b/0xa0 [ 14.779553] ? __pfx_kthread+0x10/0x10 [ 14.779575] ret_from_fork+0x116/0x1d0 [ 14.779594] ? __pfx_kthread+0x10/0x10 [ 14.779615] ret_from_fork_asm+0x1a/0x30 [ 14.779647] </TASK> [ 14.779656] [ 14.788691] Allocated by task 278: [ 14.788888] kasan_save_stack+0x45/0x70 [ 14.789039] kasan_save_track+0x18/0x40 [ 14.789232] kasan_save_alloc_info+0x3b/0x50 [ 14.789441] __kasan_kmalloc+0xb7/0xc0 [ 14.789800] __kmalloc_cache_noprof+0x189/0x420 [ 14.790039] kasan_bitops_generic+0x92/0x1c0 [ 14.790241] kunit_try_run_case+0x1a5/0x480 [ 14.790513] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.790822] kthread+0x337/0x6f0 [ 14.790989] ret_from_fork+0x116/0x1d0 [ 14.791165] ret_from_fork_asm+0x1a/0x30 [ 14.791406] [ 14.791515] The buggy address belongs to the object at ffff888102781700 [ 14.791515] which belongs to the cache kmalloc-16 of size 16 [ 14.792011] The buggy address is located 8 bytes inside of [ 14.792011] allocated 9-byte region [ffff888102781700, ffff888102781709) [ 14.792628] [ 14.792720] The buggy address belongs to the physical page: [ 14.792958] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102781 [ 14.793295] flags: 0x200000000000000(node=0|zone=2) [ 14.793653] page_type: f5(slab) [ 14.793846] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.794171] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.795838] page dumped because: kasan: bad access detected [ 14.796322] [ 14.796403] Memory state around the buggy address: [ 14.796564] ffff888102781600: 00 06 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.796795] ffff888102781680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.797014] >ffff888102781700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.797234] ^ [ 14.797359] ffff888102781780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.797575] ffff888102781800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.798520] ================================================================== [ 14.799679] ================================================================== [ 14.801001] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 14.801426] Write of size 8 at addr ffff888102781708 by task kunit_try_catch/278 [ 14.802134] [ 14.802324] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.802622] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.802635] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.802654] Call Trace: [ 14.802668] <TASK> [ 14.802683] dump_stack_lvl+0x73/0xb0 [ 14.802713] print_report+0xd1/0x610 [ 14.802734] ? __virt_addr_valid+0x1db/0x2d0 [ 14.802771] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 14.802802] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.802825] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 14.802856] kasan_report+0x141/0x180 [ 14.802879] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 14.802913] kasan_check_range+0x10c/0x1c0 [ 14.802939] __kasan_check_write+0x18/0x20 [ 14.802959] kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 14.802990] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.803022] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.803047] ? trace_hardirqs_on+0x37/0xe0 [ 14.803069] ? kasan_bitops_generic+0x92/0x1c0 [ 14.803098] kasan_bitops_generic+0x121/0x1c0 [ 14.803121] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.803149] ? __pfx_read_tsc+0x10/0x10 [ 14.803171] ? ktime_get_ts64+0x86/0x230 [ 14.803194] kunit_try_run_case+0x1a5/0x480 [ 14.803220] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.803243] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.803267] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.803292] ? __kthread_parkme+0x82/0x180 [ 14.803313] ? preempt_count_sub+0x50/0x80 [ 14.803424] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.803450] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.803476] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.803503] kthread+0x337/0x6f0 [ 14.803523] ? trace_preempt_on+0x20/0xc0 [ 14.803545] ? __pfx_kthread+0x10/0x10 [ 14.803567] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.803590] ? calculate_sigpending+0x7b/0xa0 [ 14.803613] ? __pfx_kthread+0x10/0x10 [ 14.803635] ret_from_fork+0x116/0x1d0 [ 14.803655] ? __pfx_kthread+0x10/0x10 [ 14.803676] ret_from_fork_asm+0x1a/0x30 [ 14.803707] </TASK> [ 14.803717] [ 14.813922] Allocated by task 278: [ 14.814113] kasan_save_stack+0x45/0x70 [ 14.814299] kasan_save_track+0x18/0x40 [ 14.814649] kasan_save_alloc_info+0x3b/0x50 [ 14.814882] __kasan_kmalloc+0xb7/0xc0 [ 14.815053] __kmalloc_cache_noprof+0x189/0x420 [ 14.815216] kasan_bitops_generic+0x92/0x1c0 [ 14.815426] kunit_try_run_case+0x1a5/0x480 [ 14.815788] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.816012] kthread+0x337/0x6f0 [ 14.816134] ret_from_fork+0x116/0x1d0 [ 14.816285] ret_from_fork_asm+0x1a/0x30 [ 14.816487] [ 14.816588] The buggy address belongs to the object at ffff888102781700 [ 14.816588] which belongs to the cache kmalloc-16 of size 16 [ 14.817162] The buggy address is located 8 bytes inside of [ 14.817162] allocated 9-byte region [ffff888102781700, ffff888102781709) [ 14.817589] [ 14.817746] The buggy address belongs to the physical page: [ 14.818018] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102781 [ 14.818386] flags: 0x200000000000000(node=0|zone=2) [ 14.818593] page_type: f5(slab) [ 14.818729] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.819083] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.819384] page dumped because: kasan: bad access detected [ 14.819631] [ 14.819711] Memory state around the buggy address: [ 14.819939] ffff888102781600: 00 06 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.820207] ffff888102781680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.820488] >ffff888102781700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.820801] ^ [ 14.820924] ffff888102781780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.821219] ffff888102781800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.821431] ================================================================== [ 14.736123] ================================================================== [ 14.736367] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 14.736833] Write of size 8 at addr ffff888102781708 by task kunit_try_catch/278 [ 14.737314] [ 14.737445] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.737490] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.737502] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.737523] Call Trace: [ 14.737538] <TASK> [ 14.737552] dump_stack_lvl+0x73/0xb0 [ 14.737583] print_report+0xd1/0x610 [ 14.737606] ? __virt_addr_valid+0x1db/0x2d0 [ 14.737630] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 14.737660] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.737685] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 14.737716] kasan_report+0x141/0x180 [ 14.737739] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 14.737789] kasan_check_range+0x10c/0x1c0 [ 14.737815] __kasan_check_write+0x18/0x20 [ 14.737834] kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 14.737866] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.737897] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.737923] ? trace_hardirqs_on+0x37/0xe0 [ 14.737945] ? kasan_bitops_generic+0x92/0x1c0 [ 14.737974] kasan_bitops_generic+0x121/0x1c0 [ 14.737999] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.738026] ? __pfx_read_tsc+0x10/0x10 [ 14.738048] ? ktime_get_ts64+0x86/0x230 [ 14.738073] kunit_try_run_case+0x1a5/0x480 [ 14.738100] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.738125] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.738150] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.738175] ? __kthread_parkme+0x82/0x180 [ 14.738196] ? preempt_count_sub+0x50/0x80 [ 14.738221] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.738247] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.738274] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.738301] kthread+0x337/0x6f0 [ 14.738321] ? trace_preempt_on+0x20/0xc0 [ 14.738344] ? __pfx_kthread+0x10/0x10 [ 14.738366] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.738396] ? calculate_sigpending+0x7b/0xa0 [ 14.738421] ? __pfx_kthread+0x10/0x10 [ 14.738443] ret_from_fork+0x116/0x1d0 [ 14.738462] ? __pfx_kthread+0x10/0x10 [ 14.738484] ret_from_fork_asm+0x1a/0x30 [ 14.738517] </TASK> [ 14.738526] [ 14.746842] Allocated by task 278: [ 14.747027] kasan_save_stack+0x45/0x70 [ 14.747237] kasan_save_track+0x18/0x40 [ 14.747516] kasan_save_alloc_info+0x3b/0x50 [ 14.747697] __kasan_kmalloc+0xb7/0xc0 [ 14.747892] __kmalloc_cache_noprof+0x189/0x420 [ 14.748100] kasan_bitops_generic+0x92/0x1c0 [ 14.748284] kunit_try_run_case+0x1a5/0x480 [ 14.748432] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.748709] kthread+0x337/0x6f0 [ 14.748889] ret_from_fork+0x116/0x1d0 [ 14.749062] ret_from_fork_asm+0x1a/0x30 [ 14.749228] [ 14.749320] The buggy address belongs to the object at ffff888102781700 [ 14.749320] which belongs to the cache kmalloc-16 of size 16 [ 14.749738] The buggy address is located 8 bytes inside of [ 14.749738] allocated 9-byte region [ffff888102781700, ffff888102781709) [ 14.750279] [ 14.750359] The buggy address belongs to the physical page: [ 14.750612] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102781 [ 14.750982] flags: 0x200000000000000(node=0|zone=2) [ 14.751188] page_type: f5(slab) [ 14.751336] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.751569] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.751807] page dumped because: kasan: bad access detected [ 14.751979] [ 14.752072] Memory state around the buggy address: [ 14.752293] ffff888102781600: 00 06 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.753060] ffff888102781680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.753751] >ffff888102781700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.753986] ^ [ 14.754109] ffff888102781780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.754325] ffff888102781800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.755016] ================================================================== [ 14.821827] ================================================================== [ 14.822599] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 14.823053] Write of size 8 at addr ffff888102781708 by task kunit_try_catch/278 [ 14.823467] [ 14.823584] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.823627] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.823638] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.823660] Call Trace: [ 14.823673] <TASK> [ 14.823687] dump_stack_lvl+0x73/0xb0 [ 14.823716] print_report+0xd1/0x610 [ 14.823738] ? __virt_addr_valid+0x1db/0x2d0 [ 14.823774] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 14.823804] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.823829] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 14.823859] kasan_report+0x141/0x180 [ 14.823881] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 14.823917] kasan_check_range+0x10c/0x1c0 [ 14.823941] __kasan_check_write+0x18/0x20 [ 14.823961] kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 14.823992] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.824023] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.824049] ? trace_hardirqs_on+0x37/0xe0 [ 14.824071] ? kasan_bitops_generic+0x92/0x1c0 [ 14.824100] kasan_bitops_generic+0x121/0x1c0 [ 14.824123] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.824150] ? __pfx_read_tsc+0x10/0x10 [ 14.824172] ? ktime_get_ts64+0x86/0x230 [ 14.824195] kunit_try_run_case+0x1a5/0x480 [ 14.824220] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.824244] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.824268] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.824293] ? __kthread_parkme+0x82/0x180 [ 14.824313] ? preempt_count_sub+0x50/0x80 [ 14.824338] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.824363] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.824389] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.824415] kthread+0x337/0x6f0 [ 14.824434] ? trace_preempt_on+0x20/0xc0 [ 14.824456] ? __pfx_kthread+0x10/0x10 [ 14.824477] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.824500] ? calculate_sigpending+0x7b/0xa0 [ 14.824524] ? __pfx_kthread+0x10/0x10 [ 14.824545] ret_from_fork+0x116/0x1d0 [ 14.824564] ? __pfx_kthread+0x10/0x10 [ 14.824586] ret_from_fork_asm+0x1a/0x30 [ 14.824616] </TASK> [ 14.824626] [ 14.832930] Allocated by task 278: [ 14.833111] kasan_save_stack+0x45/0x70 [ 14.833313] kasan_save_track+0x18/0x40 [ 14.833585] kasan_save_alloc_info+0x3b/0x50 [ 14.833810] __kasan_kmalloc+0xb7/0xc0 [ 14.834005] __kmalloc_cache_noprof+0x189/0x420 [ 14.834227] kasan_bitops_generic+0x92/0x1c0 [ 14.834432] kunit_try_run_case+0x1a5/0x480 [ 14.834810] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.835029] kthread+0x337/0x6f0 [ 14.835152] ret_from_fork+0x116/0x1d0 [ 14.835285] ret_from_fork_asm+0x1a/0x30 [ 14.835424] [ 14.835496] The buggy address belongs to the object at ffff888102781700 [ 14.835496] which belongs to the cache kmalloc-16 of size 16 [ 14.836366] The buggy address is located 8 bytes inside of [ 14.836366] allocated 9-byte region [ffff888102781700, ffff888102781709) [ 14.836960] [ 14.837036] The buggy address belongs to the physical page: [ 14.837207] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102781 [ 14.837768] flags: 0x200000000000000(node=0|zone=2) [ 14.838012] page_type: f5(slab) [ 14.838185] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.838536] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.838892] page dumped because: kasan: bad access detected [ 14.839406] [ 14.839525] Memory state around the buggy address: [ 14.839681] ffff888102781600: 00 06 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.839941] ffff888102781680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.840258] >ffff888102781700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.840637] ^ [ 14.840920] ffff888102781780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.841145] ffff888102781800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.841514] ================================================================== [ 14.862279] ================================================================== [ 14.862722] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 14.863322] Read of size 8 at addr ffff888102781708 by task kunit_try_catch/278 [ 14.863689] [ 14.863788] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.863833] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.863855] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.863877] Call Trace: [ 14.863893] <TASK> [ 14.863907] dump_stack_lvl+0x73/0xb0 [ 14.863936] print_report+0xd1/0x610 [ 14.863958] ? __virt_addr_valid+0x1db/0x2d0 [ 14.863981] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 14.864012] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.864036] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 14.864067] kasan_report+0x141/0x180 [ 14.864089] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 14.864124] kasan_check_range+0x10c/0x1c0 [ 14.864148] __kasan_check_read+0x15/0x20 [ 14.864168] kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 14.864198] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.864230] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.864255] ? trace_hardirqs_on+0x37/0xe0 [ 14.864278] ? kasan_bitops_generic+0x92/0x1c0 [ 14.864306] kasan_bitops_generic+0x121/0x1c0 [ 14.864331] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.864359] ? __pfx_read_tsc+0x10/0x10 [ 14.864381] ? ktime_get_ts64+0x86/0x230 [ 14.864404] kunit_try_run_case+0x1a5/0x480 [ 14.864432] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.864626] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.864658] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.864683] ? __kthread_parkme+0x82/0x180 [ 14.864705] ? preempt_count_sub+0x50/0x80 [ 14.864730] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.864767] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.864794] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.864821] kthread+0x337/0x6f0 [ 14.864841] ? trace_preempt_on+0x20/0xc0 [ 14.864864] ? __pfx_kthread+0x10/0x10 [ 14.864885] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.864907] ? calculate_sigpending+0x7b/0xa0 [ 14.864932] ? __pfx_kthread+0x10/0x10 [ 14.864954] ret_from_fork+0x116/0x1d0 [ 14.864974] ? __pfx_kthread+0x10/0x10 [ 14.864995] ret_from_fork_asm+0x1a/0x30 [ 14.865027] </TASK> [ 14.865036] [ 14.874581] Allocated by task 278: [ 14.874836] kasan_save_stack+0x45/0x70 [ 14.875009] kasan_save_track+0x18/0x40 [ 14.875205] kasan_save_alloc_info+0x3b/0x50 [ 14.875454] __kasan_kmalloc+0xb7/0xc0 [ 14.875638] __kmalloc_cache_noprof+0x189/0x420 [ 14.875867] kasan_bitops_generic+0x92/0x1c0 [ 14.876043] kunit_try_run_case+0x1a5/0x480 [ 14.876246] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.876625] kthread+0x337/0x6f0 [ 14.876792] ret_from_fork+0x116/0x1d0 [ 14.876995] ret_from_fork_asm+0x1a/0x30 [ 14.877156] [ 14.877226] The buggy address belongs to the object at ffff888102781700 [ 14.877226] which belongs to the cache kmalloc-16 of size 16 [ 14.877577] The buggy address is located 8 bytes inside of [ 14.877577] allocated 9-byte region [ffff888102781700, ffff888102781709) [ 14.878131] [ 14.878225] The buggy address belongs to the physical page: [ 14.878480] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102781 [ 14.879201] flags: 0x200000000000000(node=0|zone=2) [ 14.879411] page_type: f5(slab) [ 14.879536] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.879786] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.880224] page dumped because: kasan: bad access detected [ 14.880830] [ 14.880939] Memory state around the buggy address: [ 14.881128] ffff888102781600: 00 06 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.881345] ffff888102781680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.881805] >ffff888102781700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.882400] ^ [ 14.882625] ffff888102781780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.883338] ffff888102781800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.883611] ==================================================================