Date
July 18, 2025, 11:11 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 17.729773] ================================================================== [ 17.729826] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbc0 [ 17.729881] Read of size 8 at addr fff00000c58925e8 by task kunit_try_catch/261 [ 17.729934] [ 17.730291] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 17.730691] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.730748] Hardware name: linux,dummy-virt (DT) [ 17.730782] Call trace: [ 17.730826] show_stack+0x20/0x38 (C) [ 17.730966] dump_stack_lvl+0x8c/0xd0 [ 17.731044] print_report+0x118/0x5d0 [ 17.731097] kasan_report+0xdc/0x128 [ 17.731479] __asan_report_load8_noabort+0x20/0x30 [ 17.731559] kasan_bitops_modify.constprop.0+0xa80/0xbc0 [ 17.731624] kasan_bitops_generic+0x110/0x1c8 [ 17.731952] kunit_try_run_case+0x170/0x3f0 [ 17.732039] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.732115] kthread+0x328/0x630 [ 17.732178] ret_from_fork+0x10/0x20 [ 17.732375] [ 17.732503] Allocated by task 261: [ 17.732547] kasan_save_stack+0x3c/0x68 [ 17.732739] kasan_save_track+0x20/0x40 [ 17.732844] kasan_save_alloc_info+0x40/0x58 [ 17.732959] __kasan_kmalloc+0xd4/0xd8 [ 17.733015] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.733058] kasan_bitops_generic+0xa0/0x1c8 [ 17.733098] kunit_try_run_case+0x170/0x3f0 [ 17.733140] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.733441] kthread+0x328/0x630 [ 17.733689] ret_from_fork+0x10/0x20 [ 17.733776] [ 17.733885] The buggy address belongs to the object at fff00000c58925e0 [ 17.733885] which belongs to the cache kmalloc-16 of size 16 [ 17.734040] The buggy address is located 8 bytes inside of [ 17.734040] allocated 9-byte region [fff00000c58925e0, fff00000c58925e9) [ 17.734107] [ 17.734428] The buggy address belongs to the physical page: [ 17.734506] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105892 [ 17.734731] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.734871] page_type: f5(slab) [ 17.734951] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 17.735940] >fff00000c5892580: fa fb fc fc fa fb fc fc 00 04 fc fc 00 01 fc fc [ 17.736554] fff00000c5892680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.738858] Call trace: [ 17.739650] kasan_check_range+0x100/0x1a8 [ 17.740419] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.741192] kasan_save_stack+0x3c/0x68 [ 17.741916] kasan_bitops_generic+0xa0/0x1c8 [ 17.743098] [ 17.743506] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105892 [ 17.745372] fff00000c5892500: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 17.745607] fff00000c5892600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.747921] Write of size 8 at addr fff00000c58925e8 by task kunit_try_catch/261 [ 17.748787] dump_stack_lvl+0x8c/0xd0 [ 17.748981] kasan_check_range+0x100/0x1a8 [ 17.750047] ret_from_fork+0x10/0x20 [ 17.752387] [ 17.753061] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.754683] fff00000c5892600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.756501] ================================================================== [ 17.715234] ================================================================== [ 17.715322] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 17.715787] Read of size 8 at addr fff00000c58925e8 by task kunit_try_catch/261 [ 17.715871] [ 17.715914] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 17.716085] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.716119] Hardware name: linux,dummy-virt (DT) [ 17.716178] Call trace: [ 17.716203] show_stack+0x20/0x38 (C) [ 17.716546] dump_stack_lvl+0x8c/0xd0 [ 17.716705] print_report+0x118/0x5d0 [ 17.716757] kasan_report+0xdc/0x128 [ 17.716851] __asan_report_load8_noabort+0x20/0x30 [ 17.716906] kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 17.717058] kasan_bitops_generic+0x110/0x1c8 [ 17.717133] kunit_try_run_case+0x170/0x3f0 [ 17.717184] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.717253] kthread+0x328/0x630 [ 17.717478] ret_from_fork+0x10/0x20 [ 17.717930] [ 17.717962] Allocated by task 261: [ 17.718008] kasan_save_stack+0x3c/0x68 [ 17.718154] kasan_save_track+0x20/0x40 [ 17.718788] kasan_save_alloc_info+0x40/0x58 [ 17.718970] __kasan_kmalloc+0xd4/0xd8 [ 17.719112] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.719788] kasan_bitops_generic+0xa0/0x1c8 [ 17.720076] kunit_try_run_case+0x170/0x3f0 [ 17.720154] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.720231] kthread+0x328/0x630 [ 17.720414] ret_from_fork+0x10/0x20 [ 17.720509] [ 17.720566] The buggy address belongs to the object at fff00000c58925e0 [ 17.720566] which belongs to the cache kmalloc-16 of size 16 [ 17.720907] The buggy address is located 8 bytes inside of [ 17.720907] allocated 9-byte region [fff00000c58925e0, fff00000c58925e9) [ 17.721168] [ 17.721196] The buggy address belongs to the physical page: [ 17.721407] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105892 [ 17.721723] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.721893] page_type: f5(slab) [ 17.721958] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 17.722032] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 17.722085] page dumped because: kasan: bad access detected [ 17.722120] [ 17.722140] Memory state around the buggy address: [ 17.722175] fff00000c5892480: 00 02 fc fc 00 02 fc fc 00 05 fc fc fa fb fc fc [ 17.722558] fff00000c5892500: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 17.722681] >fff00000c5892580: fa fb fc fc fa fb fc fc 00 04 fc fc 00 01 fc fc [ 17.722754] ^ [ 17.722812] fff00000c5892600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.723199] fff00000c5892680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.723376] ================================================================== [ 17.725343] ================================================================== [ 17.725404] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc0 [ 17.725456] Write of size 8 at addr fff00000c58925e8 by task kunit_try_catch/261 [ 17.725516] [ 17.725549] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 17.726031] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.726070] Hardware name: linux,dummy-virt (DT) [ 17.726112] Call trace: [ 17.726140] show_stack+0x20/0x38 (C) [ 17.726240] dump_stack_lvl+0x8c/0xd0 [ 17.726291] print_report+0x118/0x5d0 [ 17.726361] kasan_report+0xdc/0x128 [ 17.726409] kasan_check_range+0x100/0x1a8 [ 17.726460] __kasan_check_write+0x20/0x30 [ 17.726507] kasan_bitops_modify.constprop.0+0x1dc/0xbc0 [ 17.726571] kasan_bitops_generic+0x110/0x1c8 [ 17.726638] kunit_try_run_case+0x170/0x3f0 [ 17.726688] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.726744] kthread+0x328/0x630 [ 17.726786] ret_from_fork+0x10/0x20 [ 17.726843] [ 17.726874] Allocated by task 261: [ 17.726914] kasan_save_stack+0x3c/0x68 [ 17.726960] kasan_save_track+0x20/0x40 [ 17.727001] kasan_save_alloc_info+0x40/0x58 [ 17.727054] __kasan_kmalloc+0xd4/0xd8 [ 17.727102] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.727145] kasan_bitops_generic+0xa0/0x1c8 [ 17.727186] kunit_try_run_case+0x170/0x3f0 [ 17.727225] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.727278] kthread+0x328/0x630 [ 17.727313] ret_from_fork+0x10/0x20 [ 17.727359] [ 17.727396] The buggy address belongs to the object at fff00000c58925e0 [ 17.727396] which belongs to the cache kmalloc-16 of size 16 [ 17.727486] The buggy address is located 8 bytes inside of [ 17.727486] allocated 9-byte region [fff00000c58925e0, fff00000c58925e9) [ 17.727549] [ 17.727570] The buggy address belongs to the physical page: [ 17.727622] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105892 [ 17.727685] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.727742] page_type: f5(slab) [ 17.727786] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 17.727840] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 17.727899] page dumped because: kasan: bad access detected [ 17.727933] [ 17.727954] Memory state around the buggy address: [ 17.728009] fff00000c5892480: 00 02 fc fc 00 02 fc fc 00 05 fc fc fa fb fc fc [ 17.728055] fff00000c5892500: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 17.728107] >fff00000c5892580: fa fb fc fc fa fb fc fc 00 04 fc fc 00 01 fc fc [ 17.728149] ^ [ 17.728190] fff00000c5892600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.728247] fff00000c5892680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.728288] ================================================================== [ 17.706780] ================================================================== [ 17.706947] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 17.707043] Write of size 8 at addr fff00000c58925e8 by task kunit_try_catch/261 [ 17.707146] [ 17.707213] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 17.707301] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.707413] Hardware name: linux,dummy-virt (DT) [ 17.707450] Call trace: [ 17.707477] show_stack+0x20/0x38 (C) [ 17.707779] dump_stack_lvl+0x8c/0xd0 [ 17.707863] print_report+0x118/0x5d0 [ 17.707921] kasan_report+0xdc/0x128 [ 17.707979] kasan_check_range+0x100/0x1a8 [ 17.708036] __kasan_check_write+0x20/0x30 [ 17.708085] kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 17.708140] kasan_bitops_generic+0x110/0x1c8 [ 17.708191] kunit_try_run_case+0x170/0x3f0 [ 17.708241] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.708297] kthread+0x328/0x630 [ 17.708352] ret_from_fork+0x10/0x20 [ 17.708441] [ 17.708475] Allocated by task 261: [ 17.708520] kasan_save_stack+0x3c/0x68 [ 17.708573] kasan_save_track+0x20/0x40 [ 17.708627] kasan_save_alloc_info+0x40/0x58 [ 17.708678] __kasan_kmalloc+0xd4/0xd8 [ 17.708717] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.708759] kasan_bitops_generic+0xa0/0x1c8 [ 17.708798] kunit_try_run_case+0x170/0x3f0 [ 17.708839] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.708892] kthread+0x328/0x630 [ 17.708932] ret_from_fork+0x10/0x20 [ 17.708969] [ 17.708992] The buggy address belongs to the object at fff00000c58925e0 [ 17.708992] which belongs to the cache kmalloc-16 of size 16 [ 17.709052] The buggy address is located 8 bytes inside of [ 17.709052] allocated 9-byte region [fff00000c58925e0, fff00000c58925e9) [ 17.709116] [ 17.709149] The buggy address belongs to the physical page: [ 17.709193] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105892 [ 17.709249] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.709554] page_type: f5(slab) [ 17.709681] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 17.710147] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 17.710230] page dumped because: kasan: bad access detected [ 17.710449] [ 17.710488] Memory state around the buggy address: [ 17.710671] fff00000c5892480: 00 02 fc fc 00 02 fc fc 00 05 fc fc fa fb fc fc [ 17.710988] fff00000c5892500: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 17.711234] >fff00000c5892580: fa fb fc fc fa fb fc fc 00 04 fc fc 00 01 fc fc [ 17.711517] ^ [ 17.711596] fff00000c5892600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.711700] fff00000c5892680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.711817] ==================================================================
[ 14.385153] ================================================================== [ 14.385541] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50 [ 14.385915] Write of size 8 at addr ffff8881025c7508 by task kunit_try_catch/280 [ 14.386665] [ 14.386782] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.386825] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.386836] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.386857] Call Trace: [ 14.386870] <TASK> [ 14.386883] dump_stack_lvl+0x73/0xb0 [ 14.386911] print_report+0xd1/0x610 [ 14.386932] ? __virt_addr_valid+0x1db/0x2d0 [ 14.386991] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 14.387018] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.387041] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 14.387327] kasan_report+0x141/0x180 [ 14.387356] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 14.387388] kasan_check_range+0x10c/0x1c0 [ 14.387411] __kasan_check_write+0x18/0x20 [ 14.387430] kasan_bitops_modify.constprop.0+0x547/0xd50 [ 14.387457] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.387484] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.387508] ? trace_hardirqs_on+0x37/0xe0 [ 14.387529] ? kasan_bitops_generic+0x92/0x1c0 [ 14.387557] kasan_bitops_generic+0x116/0x1c0 [ 14.387580] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.387606] ? __pfx_read_tsc+0x10/0x10 [ 14.387626] ? ktime_get_ts64+0x86/0x230 [ 14.387648] kunit_try_run_case+0x1a5/0x480 [ 14.387672] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.387695] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.387717] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.387741] ? __kthread_parkme+0x82/0x180 [ 14.387760] ? preempt_count_sub+0x50/0x80 [ 14.387783] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.387807] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.387830] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.387854] kthread+0x337/0x6f0 [ 14.387873] ? trace_preempt_on+0x20/0xc0 [ 14.387894] ? __pfx_kthread+0x10/0x10 [ 14.387913] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.387935] ? calculate_sigpending+0x7b/0xa0 [ 14.387958] ? __pfx_kthread+0x10/0x10 [ 14.387979] ret_from_fork+0x116/0x1d0 [ 14.387997] ? __pfx_kthread+0x10/0x10 [ 14.388100] ret_from_fork_asm+0x1a/0x30 [ 14.388133] </TASK> [ 14.388143] [ 14.397814] Allocated by task 280: [ 14.397999] kasan_save_stack+0x45/0x70 [ 14.398284] kasan_save_track+0x18/0x40 [ 14.398570] kasan_save_alloc_info+0x3b/0x50 [ 14.398804] __kasan_kmalloc+0xb7/0xc0 [ 14.399007] __kmalloc_cache_noprof+0x189/0x420 [ 14.399215] kasan_bitops_generic+0x92/0x1c0 [ 14.399646] kunit_try_run_case+0x1a5/0x480 [ 14.399854] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.400221] kthread+0x337/0x6f0 [ 14.400435] ret_from_fork+0x116/0x1d0 [ 14.400674] ret_from_fork_asm+0x1a/0x30 [ 14.400869] [ 14.400947] The buggy address belongs to the object at ffff8881025c7500 [ 14.400947] which belongs to the cache kmalloc-16 of size 16 [ 14.401816] The buggy address is located 8 bytes inside of [ 14.401816] allocated 9-byte region [ffff8881025c7500, ffff8881025c7509) [ 14.402202] [ 14.402274] The buggy address belongs to the physical page: [ 14.402676] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025c7 [ 14.403068] flags: 0x200000000000000(node=0|zone=2) [ 14.403354] page_type: f5(slab) [ 14.403523] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.403882] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.404209] page dumped because: kasan: bad access detected [ 14.404469] [ 14.404576] Memory state around the buggy address: [ 14.404860] ffff8881025c7400: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc [ 14.405282] ffff8881025c7480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.405690] >ffff8881025c7500: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.406570] ^ [ 14.406784] ffff8881025c7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.407217] ffff8881025c7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.407675] ================================================================== [ 14.317922] ================================================================== [ 14.318657] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50 [ 14.319164] Write of size 8 at addr ffff8881025c7508 by task kunit_try_catch/280 [ 14.319557] [ 14.319684] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.319727] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.319739] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.319760] Call Trace: [ 14.319774] <TASK> [ 14.319786] dump_stack_lvl+0x73/0xb0 [ 14.319814] print_report+0xd1/0x610 [ 14.319835] ? __virt_addr_valid+0x1db/0x2d0 [ 14.319858] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 14.319883] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.319906] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 14.319932] kasan_report+0x141/0x180 [ 14.319954] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 14.319985] kasan_check_range+0x10c/0x1c0 [ 14.320008] __kasan_check_write+0x18/0x20 [ 14.320100] kasan_bitops_modify.constprop.0+0x373/0xd50 [ 14.320127] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.320154] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.320177] ? trace_hardirqs_on+0x37/0xe0 [ 14.320199] ? kasan_bitops_generic+0x92/0x1c0 [ 14.320226] kasan_bitops_generic+0x116/0x1c0 [ 14.320250] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.320346] ? __pfx_read_tsc+0x10/0x10 [ 14.320367] ? ktime_get_ts64+0x86/0x230 [ 14.320414] kunit_try_run_case+0x1a5/0x480 [ 14.320461] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.320484] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.320531] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.320577] ? __kthread_parkme+0x82/0x180 [ 14.320598] ? preempt_count_sub+0x50/0x80 [ 14.320622] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.320645] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.320669] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.320695] kthread+0x337/0x6f0 [ 14.320713] ? trace_preempt_on+0x20/0xc0 [ 14.320735] ? __pfx_kthread+0x10/0x10 [ 14.320754] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.320775] ? calculate_sigpending+0x7b/0xa0 [ 14.320798] ? __pfx_kthread+0x10/0x10 [ 14.320819] ret_from_fork+0x116/0x1d0 [ 14.320837] ? __pfx_kthread+0x10/0x10 [ 14.320857] ret_from_fork_asm+0x1a/0x30 [ 14.320886] </TASK> [ 14.320896] [ 14.330467] Allocated by task 280: [ 14.330673] kasan_save_stack+0x45/0x70 [ 14.330875] kasan_save_track+0x18/0x40 [ 14.331099] kasan_save_alloc_info+0x3b/0x50 [ 14.331387] __kasan_kmalloc+0xb7/0xc0 [ 14.331603] __kmalloc_cache_noprof+0x189/0x420 [ 14.331841] kasan_bitops_generic+0x92/0x1c0 [ 14.332124] kunit_try_run_case+0x1a5/0x480 [ 14.332356] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.332613] kthread+0x337/0x6f0 [ 14.332814] ret_from_fork+0x116/0x1d0 [ 14.333037] ret_from_fork_asm+0x1a/0x30 [ 14.333489] [ 14.333568] The buggy address belongs to the object at ffff8881025c7500 [ 14.333568] which belongs to the cache kmalloc-16 of size 16 [ 14.334392] The buggy address is located 8 bytes inside of [ 14.334392] allocated 9-byte region [ffff8881025c7500, ffff8881025c7509) [ 14.334740] [ 14.334809] The buggy address belongs to the physical page: [ 14.334998] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025c7 [ 14.335427] flags: 0x200000000000000(node=0|zone=2) [ 14.335920] page_type: f5(slab) [ 14.336192] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.336546] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.336765] page dumped because: kasan: bad access detected [ 14.336930] [ 14.337012] Memory state around the buggy address: [ 14.337329] ffff8881025c7400: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc [ 14.338001] ffff8881025c7480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.338602] >ffff8881025c7500: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.338816] ^ [ 14.338992] ffff8881025c7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.339385] ffff8881025c7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.339598] ================================================================== [ 14.208378] ================================================================== [ 14.208966] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50 [ 14.209981] Write of size 8 at addr ffff8881025c7508 by task kunit_try_catch/280 [ 14.210841] [ 14.211089] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.211148] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.211160] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.211181] Call Trace: [ 14.211194] <TASK> [ 14.211210] dump_stack_lvl+0x73/0xb0 [ 14.211240] print_report+0xd1/0x610 [ 14.211262] ? __virt_addr_valid+0x1db/0x2d0 [ 14.211284] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 14.211321] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.211343] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 14.211369] kasan_report+0x141/0x180 [ 14.211390] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 14.211420] kasan_check_range+0x10c/0x1c0 [ 14.211444] __kasan_check_write+0x18/0x20 [ 14.211515] kasan_bitops_modify.constprop.0+0x101/0xd50 [ 14.211544] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.211571] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.211607] ? trace_hardirqs_on+0x37/0xe0 [ 14.211630] ? kasan_bitops_generic+0x92/0x1c0 [ 14.211657] kasan_bitops_generic+0x116/0x1c0 [ 14.211680] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.211705] ? __pfx_read_tsc+0x10/0x10 [ 14.211726] ? ktime_get_ts64+0x86/0x230 [ 14.211750] kunit_try_run_case+0x1a5/0x480 [ 14.211776] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.211798] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.211822] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.211846] ? __kthread_parkme+0x82/0x180 [ 14.211867] ? preempt_count_sub+0x50/0x80 [ 14.211890] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.211914] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.211937] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.211961] kthread+0x337/0x6f0 [ 14.211980] ? trace_preempt_on+0x20/0xc0 [ 14.212018] ? __pfx_kthread+0x10/0x10 [ 14.212038] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.212059] ? calculate_sigpending+0x7b/0xa0 [ 14.212082] ? __pfx_kthread+0x10/0x10 [ 14.212102] ret_from_fork+0x116/0x1d0 [ 14.212121] ? __pfx_kthread+0x10/0x10 [ 14.212140] ret_from_fork_asm+0x1a/0x30 [ 14.212170] </TASK> [ 14.212180] [ 14.227693] Allocated by task 280: [ 14.228164] kasan_save_stack+0x45/0x70 [ 14.228528] kasan_save_track+0x18/0x40 [ 14.228766] kasan_save_alloc_info+0x3b/0x50 [ 14.229174] __kasan_kmalloc+0xb7/0xc0 [ 14.229332] __kmalloc_cache_noprof+0x189/0x420 [ 14.229500] kasan_bitops_generic+0x92/0x1c0 [ 14.229938] kunit_try_run_case+0x1a5/0x480 [ 14.230440] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.231074] kthread+0x337/0x6f0 [ 14.231607] ret_from_fork+0x116/0x1d0 [ 14.231810] ret_from_fork_asm+0x1a/0x30 [ 14.231953] [ 14.232091] The buggy address belongs to the object at ffff8881025c7500 [ 14.232091] which belongs to the cache kmalloc-16 of size 16 [ 14.233306] The buggy address is located 8 bytes inside of [ 14.233306] allocated 9-byte region [ffff8881025c7500, ffff8881025c7509) [ 14.233975] [ 14.234104] The buggy address belongs to the physical page: [ 14.234700] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025c7 [ 14.235493] flags: 0x200000000000000(node=0|zone=2) [ 14.235860] page_type: f5(slab) [ 14.235988] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.236937] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.237602] page dumped because: kasan: bad access detected [ 14.237781] [ 14.237851] Memory state around the buggy address: [ 14.238009] ffff8881025c7400: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc [ 14.238227] ffff8881025c7480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.238507] >ffff8881025c7500: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.238847] ^ [ 14.239130] ffff8881025c7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.239488] ffff8881025c7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.239751] ================================================================== [ 14.340155] ================================================================== [ 14.340683] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 14.341190] Write of size 8 at addr ffff8881025c7508 by task kunit_try_catch/280 [ 14.341615] [ 14.341752] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.341795] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.341806] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.341826] Call Trace: [ 14.341841] <TASK> [ 14.341855] dump_stack_lvl+0x73/0xb0 [ 14.341920] print_report+0xd1/0x610 [ 14.341942] ? __virt_addr_valid+0x1db/0x2d0 [ 14.341964] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 14.341990] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.342013] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 14.342040] kasan_report+0x141/0x180 [ 14.342135] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 14.342169] kasan_check_range+0x10c/0x1c0 [ 14.342193] __kasan_check_write+0x18/0x20 [ 14.342248] kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 14.342275] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.342315] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.342340] ? trace_hardirqs_on+0x37/0xe0 [ 14.342361] ? kasan_bitops_generic+0x92/0x1c0 [ 14.342423] kasan_bitops_generic+0x116/0x1c0 [ 14.342447] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.342472] ? __pfx_read_tsc+0x10/0x10 [ 14.342492] ? ktime_get_ts64+0x86/0x230 [ 14.342515] kunit_try_run_case+0x1a5/0x480 [ 14.342539] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.342584] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.342608] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.342631] ? __kthread_parkme+0x82/0x180 [ 14.342662] ? preempt_count_sub+0x50/0x80 [ 14.342684] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.342740] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.342764] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.342789] kthread+0x337/0x6f0 [ 14.342808] ? trace_preempt_on+0x20/0xc0 [ 14.342830] ? __pfx_kthread+0x10/0x10 [ 14.342850] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.342896] ? calculate_sigpending+0x7b/0xa0 [ 14.342920] ? __pfx_kthread+0x10/0x10 [ 14.342940] ret_from_fork+0x116/0x1d0 [ 14.342959] ? __pfx_kthread+0x10/0x10 [ 14.342978] ret_from_fork_asm+0x1a/0x30 [ 14.343007] </TASK> [ 14.343017] [ 14.353005] Allocated by task 280: [ 14.353167] kasan_save_stack+0x45/0x70 [ 14.353324] kasan_save_track+0x18/0x40 [ 14.353570] kasan_save_alloc_info+0x3b/0x50 [ 14.353735] __kasan_kmalloc+0xb7/0xc0 [ 14.353891] __kmalloc_cache_noprof+0x189/0x420 [ 14.354182] kasan_bitops_generic+0x92/0x1c0 [ 14.354498] kunit_try_run_case+0x1a5/0x480 [ 14.354680] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.354856] kthread+0x337/0x6f0 [ 14.354977] ret_from_fork+0x116/0x1d0 [ 14.355262] ret_from_fork_asm+0x1a/0x30 [ 14.355479] [ 14.355573] The buggy address belongs to the object at ffff8881025c7500 [ 14.355573] which belongs to the cache kmalloc-16 of size 16 [ 14.356408] The buggy address is located 8 bytes inside of [ 14.356408] allocated 9-byte region [ffff8881025c7500, ffff8881025c7509) [ 14.356821] [ 14.356893] The buggy address belongs to the physical page: [ 14.357066] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025c7 [ 14.357716] flags: 0x200000000000000(node=0|zone=2) [ 14.358016] page_type: f5(slab) [ 14.358349] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.358770] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.359008] page dumped because: kasan: bad access detected [ 14.359294] [ 14.359398] Memory state around the buggy address: [ 14.359853] ffff8881025c7400: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc [ 14.360350] ffff8881025c7480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.360718] >ffff8881025c7500: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.361182] ^ [ 14.361534] ffff8881025c7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.361865] ffff8881025c7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.362343] ================================================================== [ 14.240885] ================================================================== [ 14.241234] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 14.241894] Write of size 8 at addr ffff8881025c7508 by task kunit_try_catch/280 [ 14.242424] [ 14.242587] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.242665] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.242678] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.242698] Call Trace: [ 14.242710] <TASK> [ 14.242724] dump_stack_lvl+0x73/0xb0 [ 14.242753] print_report+0xd1/0x610 [ 14.242774] ? __virt_addr_valid+0x1db/0x2d0 [ 14.242826] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 14.242853] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.242876] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 14.242903] kasan_report+0x141/0x180 [ 14.242924] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 14.242955] kasan_check_range+0x10c/0x1c0 [ 14.242978] __kasan_check_write+0x18/0x20 [ 14.242997] kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 14.243076] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.243105] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.243130] ? trace_hardirqs_on+0x37/0xe0 [ 14.243151] ? kasan_bitops_generic+0x92/0x1c0 [ 14.243178] kasan_bitops_generic+0x116/0x1c0 [ 14.243201] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.243226] ? __pfx_read_tsc+0x10/0x10 [ 14.243247] ? ktime_get_ts64+0x86/0x230 [ 14.243270] kunit_try_run_case+0x1a5/0x480 [ 14.243294] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.243330] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.243354] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.243378] ? __kthread_parkme+0x82/0x180 [ 14.243398] ? preempt_count_sub+0x50/0x80 [ 14.243423] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.243447] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.243470] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.243509] kthread+0x337/0x6f0 [ 14.243528] ? trace_preempt_on+0x20/0xc0 [ 14.243550] ? __pfx_kthread+0x10/0x10 [ 14.243570] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.243592] ? calculate_sigpending+0x7b/0xa0 [ 14.243618] ? __pfx_kthread+0x10/0x10 [ 14.243639] ret_from_fork+0x116/0x1d0 [ 14.243658] ? __pfx_kthread+0x10/0x10 [ 14.243678] ret_from_fork_asm+0x1a/0x30 [ 14.243707] </TASK> [ 14.243717] [ 14.258750] Allocated by task 280: [ 14.259027] kasan_save_stack+0x45/0x70 [ 14.259289] kasan_save_track+0x18/0x40 [ 14.259780] kasan_save_alloc_info+0x3b/0x50 [ 14.260038] __kasan_kmalloc+0xb7/0xc0 [ 14.260648] __kmalloc_cache_noprof+0x189/0x420 [ 14.261003] kasan_bitops_generic+0x92/0x1c0 [ 14.261379] kunit_try_run_case+0x1a5/0x480 [ 14.261680] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.262278] kthread+0x337/0x6f0 [ 14.262497] ret_from_fork+0x116/0x1d0 [ 14.262718] ret_from_fork_asm+0x1a/0x30 [ 14.263010] [ 14.263170] The buggy address belongs to the object at ffff8881025c7500 [ 14.263170] which belongs to the cache kmalloc-16 of size 16 [ 14.263897] The buggy address is located 8 bytes inside of [ 14.263897] allocated 9-byte region [ffff8881025c7500, ffff8881025c7509) [ 14.264922] [ 14.265119] The buggy address belongs to the physical page: [ 14.265858] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025c7 [ 14.266328] flags: 0x200000000000000(node=0|zone=2) [ 14.266533] page_type: f5(slab) [ 14.266881] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.267691] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.268209] page dumped because: kasan: bad access detected [ 14.268405] [ 14.268498] Memory state around the buggy address: [ 14.268811] ffff8881025c7400: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc [ 14.269143] ffff8881025c7480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.269486] >ffff8881025c7500: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.269805] ^ [ 14.269952] ffff8881025c7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.270257] ffff8881025c7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.270683] ================================================================== [ 14.362857] ================================================================== [ 14.363287] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 14.363707] Write of size 8 at addr ffff8881025c7508 by task kunit_try_catch/280 [ 14.363968] [ 14.364078] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.364121] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.364133] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.364153] Call Trace: [ 14.364168] <TASK> [ 14.364183] dump_stack_lvl+0x73/0xb0 [ 14.364210] print_report+0xd1/0x610 [ 14.364231] ? __virt_addr_valid+0x1db/0x2d0 [ 14.364253] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 14.364279] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.364317] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 14.364344] kasan_report+0x141/0x180 [ 14.364366] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 14.364398] kasan_check_range+0x10c/0x1c0 [ 14.364422] __kasan_check_write+0x18/0x20 [ 14.364441] kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 14.364466] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.364588] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.364612] ? trace_hardirqs_on+0x37/0xe0 [ 14.364635] ? kasan_bitops_generic+0x92/0x1c0 [ 14.364663] kasan_bitops_generic+0x116/0x1c0 [ 14.364686] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.364711] ? __pfx_read_tsc+0x10/0x10 [ 14.364731] ? ktime_get_ts64+0x86/0x230 [ 14.364754] kunit_try_run_case+0x1a5/0x480 [ 14.364778] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.364800] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.364823] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.364847] ? __kthread_parkme+0x82/0x180 [ 14.364867] ? preempt_count_sub+0x50/0x80 [ 14.364891] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.364914] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.364960] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.364984] kthread+0x337/0x6f0 [ 14.365003] ? trace_preempt_on+0x20/0xc0 [ 14.365055] ? __pfx_kthread+0x10/0x10 [ 14.365113] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.365160] ? calculate_sigpending+0x7b/0xa0 [ 14.365207] ? __pfx_kthread+0x10/0x10 [ 14.365251] ret_from_fork+0x116/0x1d0 [ 14.365271] ? __pfx_kthread+0x10/0x10 [ 14.365290] ret_from_fork_asm+0x1a/0x30 [ 14.365358] </TASK> [ 14.365391] [ 14.375371] Allocated by task 280: [ 14.375499] kasan_save_stack+0x45/0x70 [ 14.375642] kasan_save_track+0x18/0x40 [ 14.375837] kasan_save_alloc_info+0x3b/0x50 [ 14.376119] __kasan_kmalloc+0xb7/0xc0 [ 14.376399] __kmalloc_cache_noprof+0x189/0x420 [ 14.376708] kasan_bitops_generic+0x92/0x1c0 [ 14.376919] kunit_try_run_case+0x1a5/0x480 [ 14.377248] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.377535] kthread+0x337/0x6f0 [ 14.377716] ret_from_fork+0x116/0x1d0 [ 14.377928] ret_from_fork_asm+0x1a/0x30 [ 14.378230] [ 14.378345] The buggy address belongs to the object at ffff8881025c7500 [ 14.378345] which belongs to the cache kmalloc-16 of size 16 [ 14.379016] The buggy address is located 8 bytes inside of [ 14.379016] allocated 9-byte region [ffff8881025c7500, ffff8881025c7509) [ 14.379786] [ 14.379923] The buggy address belongs to the physical page: [ 14.380236] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025c7 [ 14.380602] flags: 0x200000000000000(node=0|zone=2) [ 14.380881] page_type: f5(slab) [ 14.381099] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.381489] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.381814] page dumped because: kasan: bad access detected [ 14.382157] [ 14.382240] Memory state around the buggy address: [ 14.382490] ffff8881025c7400: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc [ 14.382737] ffff8881025c7480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.382952] >ffff8881025c7500: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.383813] ^ [ 14.384022] ffff8881025c7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.384291] ffff8881025c7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.384513] ================================================================== [ 14.271705] ================================================================== [ 14.272056] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 14.272567] Write of size 8 at addr ffff8881025c7508 by task kunit_try_catch/280 [ 14.272905] [ 14.273109] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.273156] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.273193] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.273236] Call Trace: [ 14.273274] <TASK> [ 14.273289] dump_stack_lvl+0x73/0xb0 [ 14.273333] print_report+0xd1/0x610 [ 14.273355] ? __virt_addr_valid+0x1db/0x2d0 [ 14.273377] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 14.273403] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.273426] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 14.273453] kasan_report+0x141/0x180 [ 14.273474] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 14.273505] kasan_check_range+0x10c/0x1c0 [ 14.273528] __kasan_check_write+0x18/0x20 [ 14.273547] kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 14.273585] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.273612] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.273637] ? trace_hardirqs_on+0x37/0xe0 [ 14.273658] ? kasan_bitops_generic+0x92/0x1c0 [ 14.273685] kasan_bitops_generic+0x116/0x1c0 [ 14.273708] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.273733] ? __pfx_read_tsc+0x10/0x10 [ 14.273754] ? ktime_get_ts64+0x86/0x230 [ 14.273778] kunit_try_run_case+0x1a5/0x480 [ 14.273802] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.273824] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.273848] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.273872] ? __kthread_parkme+0x82/0x180 [ 14.273892] ? preempt_count_sub+0x50/0x80 [ 14.273916] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.273939] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.273963] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.273988] kthread+0x337/0x6f0 [ 14.274007] ? trace_preempt_on+0x20/0xc0 [ 14.274046] ? __pfx_kthread+0x10/0x10 [ 14.274066] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.274087] ? calculate_sigpending+0x7b/0xa0 [ 14.274111] ? __pfx_kthread+0x10/0x10 [ 14.274132] ret_from_fork+0x116/0x1d0 [ 14.274151] ? __pfx_kthread+0x10/0x10 [ 14.274171] ret_from_fork_asm+0x1a/0x30 [ 14.274201] </TASK> [ 14.274211] [ 14.284484] Allocated by task 280: [ 14.284727] kasan_save_stack+0x45/0x70 [ 14.284935] kasan_save_track+0x18/0x40 [ 14.285361] kasan_save_alloc_info+0x3b/0x50 [ 14.285580] __kasan_kmalloc+0xb7/0xc0 [ 14.285880] __kmalloc_cache_noprof+0x189/0x420 [ 14.286099] kasan_bitops_generic+0x92/0x1c0 [ 14.286356] kunit_try_run_case+0x1a5/0x480 [ 14.286505] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.287090] kthread+0x337/0x6f0 [ 14.287533] ret_from_fork+0x116/0x1d0 [ 14.287733] ret_from_fork_asm+0x1a/0x30 [ 14.287904] [ 14.287976] The buggy address belongs to the object at ffff8881025c7500 [ 14.287976] which belongs to the cache kmalloc-16 of size 16 [ 14.288466] The buggy address is located 8 bytes inside of [ 14.288466] allocated 9-byte region [ffff8881025c7500, ffff8881025c7509) [ 14.289334] [ 14.289420] The buggy address belongs to the physical page: [ 14.289748] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025c7 [ 14.290112] flags: 0x200000000000000(node=0|zone=2) [ 14.290422] page_type: f5(slab) [ 14.290706] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.291042] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.291480] page dumped because: kasan: bad access detected [ 14.291750] [ 14.291835] Memory state around the buggy address: [ 14.292271] ffff8881025c7400: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc [ 14.292636] ffff8881025c7480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.292893] >ffff8881025c7500: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.293429] ^ [ 14.293602] ffff8881025c7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.293948] ffff8881025c7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.294490] ================================================================== [ 14.294949] ================================================================== [ 14.295400] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 14.295792] Write of size 8 at addr ffff8881025c7508 by task kunit_try_catch/280 [ 14.296276] [ 14.296404] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.296446] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.296457] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.296477] Call Trace: [ 14.296493] <TASK> [ 14.296507] dump_stack_lvl+0x73/0xb0 [ 14.296571] print_report+0xd1/0x610 [ 14.296592] ? __virt_addr_valid+0x1db/0x2d0 [ 14.296613] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 14.296639] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.296662] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 14.296718] kasan_report+0x141/0x180 [ 14.296741] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 14.296771] kasan_check_range+0x10c/0x1c0 [ 14.296795] __kasan_check_write+0x18/0x20 [ 14.296814] kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 14.296840] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.296894] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.296918] ? trace_hardirqs_on+0x37/0xe0 [ 14.296939] ? kasan_bitops_generic+0x92/0x1c0 [ 14.296974] kasan_bitops_generic+0x116/0x1c0 [ 14.296997] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.297069] ? __pfx_read_tsc+0x10/0x10 [ 14.297090] ? ktime_get_ts64+0x86/0x230 [ 14.297114] kunit_try_run_case+0x1a5/0x480 [ 14.297138] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.297193] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.297241] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.297289] ? __kthread_parkme+0x82/0x180 [ 14.297343] ? preempt_count_sub+0x50/0x80 [ 14.297368] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.297393] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.297441] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.297488] kthread+0x337/0x6f0 [ 14.297507] ? trace_preempt_on+0x20/0xc0 [ 14.297528] ? __pfx_kthread+0x10/0x10 [ 14.297549] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.297570] ? calculate_sigpending+0x7b/0xa0 [ 14.297603] ? __pfx_kthread+0x10/0x10 [ 14.297625] ret_from_fork+0x116/0x1d0 [ 14.297643] ? __pfx_kthread+0x10/0x10 [ 14.297663] ret_from_fork_asm+0x1a/0x30 [ 14.297693] </TASK> [ 14.297702] [ 14.308103] Allocated by task 280: [ 14.308319] kasan_save_stack+0x45/0x70 [ 14.308607] kasan_save_track+0x18/0x40 [ 14.308800] kasan_save_alloc_info+0x3b/0x50 [ 14.309066] __kasan_kmalloc+0xb7/0xc0 [ 14.309315] __kmalloc_cache_noprof+0x189/0x420 [ 14.309676] kasan_bitops_generic+0x92/0x1c0 [ 14.309868] kunit_try_run_case+0x1a5/0x480 [ 14.310017] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.310193] kthread+0x337/0x6f0 [ 14.310356] ret_from_fork+0x116/0x1d0 [ 14.310544] ret_from_fork_asm+0x1a/0x30 [ 14.310837] [ 14.310931] The buggy address belongs to the object at ffff8881025c7500 [ 14.310931] which belongs to the cache kmalloc-16 of size 16 [ 14.311772] The buggy address is located 8 bytes inside of [ 14.311772] allocated 9-byte region [ffff8881025c7500, ffff8881025c7509) [ 14.312431] [ 14.312510] The buggy address belongs to the physical page: [ 14.312753] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025c7 [ 14.313237] flags: 0x200000000000000(node=0|zone=2) [ 14.313569] page_type: f5(slab) [ 14.313850] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.314242] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.314599] page dumped because: kasan: bad access detected [ 14.314887] [ 14.314963] Memory state around the buggy address: [ 14.315203] ffff8881025c7400: 00 01 fc fc 00 01 fc fc 00 04 fc fc 00 04 fc fc [ 14.315655] ffff8881025c7480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.315875] >ffff8881025c7500: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.316363] ^ [ 14.316620] ffff8881025c7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.316931] ffff8881025c7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.317274] ==================================================================