Date
July 19, 2025, 11:12 p.m.
Environment | |
---|---|
qemu-x86_64 |
[ 14.102866] ================================================================== [ 14.103154] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 14.103688] Write of size 8 at addr ffff888101df6d68 by task kunit_try_catch/278 [ 14.104032] [ 14.104116] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.104160] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.104171] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.104190] Call Trace: [ 14.104201] <TASK> [ 14.104214] dump_stack_lvl+0x73/0xb0 [ 14.104240] print_report+0xd1/0x610 [ 14.104261] ? __virt_addr_valid+0x1db/0x2d0 [ 14.104282] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 14.104306] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.104339] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 14.104411] kasan_report+0x141/0x180 [ 14.104475] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 14.104507] kasan_check_range+0x10c/0x1c0 [ 14.104530] __kasan_check_write+0x18/0x20 [ 14.104548] kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 14.104573] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.104598] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.104650] ? trace_hardirqs_on+0x37/0xe0 [ 14.104671] ? kasan_bitops_generic+0x92/0x1c0 [ 14.104697] kasan_bitops_generic+0x116/0x1c0 [ 14.104719] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.104743] ? __pfx_read_tsc+0x10/0x10 [ 14.104763] ? ktime_get_ts64+0x86/0x230 [ 14.104813] kunit_try_run_case+0x1a5/0x480 [ 14.104836] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.104857] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.104880] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.104902] ? __kthread_parkme+0x82/0x180 [ 14.104921] ? preempt_count_sub+0x50/0x80 [ 14.104974] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.104997] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.105031] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.105053] kthread+0x337/0x6f0 [ 14.105071] ? trace_preempt_on+0x20/0xc0 [ 14.105092] ? __pfx_kthread+0x10/0x10 [ 14.105112] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.105132] ? calculate_sigpending+0x7b/0xa0 [ 14.105154] ? __pfx_kthread+0x10/0x10 [ 14.105174] ret_from_fork+0x116/0x1d0 [ 14.105223] ? __pfx_kthread+0x10/0x10 [ 14.105243] ret_from_fork_asm+0x1a/0x30 [ 14.105272] </TASK> [ 14.105282] [ 14.115071] Allocated by task 278: [ 14.115205] kasan_save_stack+0x45/0x70 [ 14.115597] kasan_save_track+0x18/0x40 [ 14.115886] kasan_save_alloc_info+0x3b/0x50 [ 14.116190] __kasan_kmalloc+0xb7/0xc0 [ 14.116450] __kmalloc_cache_noprof+0x189/0x420 [ 14.116712] kasan_bitops_generic+0x92/0x1c0 [ 14.116953] kunit_try_run_case+0x1a5/0x480 [ 14.117180] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.117478] kthread+0x337/0x6f0 [ 14.117773] ret_from_fork+0x116/0x1d0 [ 14.117998] ret_from_fork_asm+0x1a/0x30 [ 14.118151] [ 14.118221] The buggy address belongs to the object at ffff888101df6d60 [ 14.118221] which belongs to the cache kmalloc-16 of size 16 [ 14.118949] The buggy address is located 8 bytes inside of [ 14.118949] allocated 9-byte region [ffff888101df6d60, ffff888101df6d69) [ 14.119693] [ 14.119791] The buggy address belongs to the physical page: [ 14.120075] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101df6 [ 14.120503] flags: 0x200000000000000(node=0|zone=2) [ 14.120887] page_type: f5(slab) [ 14.121035] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.121295] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.121998] page dumped because: kasan: bad access detected [ 14.122268] [ 14.122360] Memory state around the buggy address: [ 14.122514] ffff888101df6c00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc [ 14.122835] ffff888101df6c80: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 14.123241] >ffff888101df6d00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 14.123704] ^ [ 14.124063] ffff888101df6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.124468] ffff888101df6e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.124787] ================================================================== [ 14.125314] ================================================================== [ 14.125608] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 14.126417] Write of size 8 at addr ffff888101df6d68 by task kunit_try_catch/278 [ 14.126685] [ 14.126792] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.126900] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.126912] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.126931] Call Trace: [ 14.126944] <TASK> [ 14.126957] dump_stack_lvl+0x73/0xb0 [ 14.126984] print_report+0xd1/0x610 [ 14.127016] ? __virt_addr_valid+0x1db/0x2d0 [ 14.127038] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 14.127061] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.127083] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 14.127140] kasan_report+0x141/0x180 [ 14.127163] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 14.127215] kasan_check_range+0x10c/0x1c0 [ 14.127238] __kasan_check_write+0x18/0x20 [ 14.127256] kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 14.127281] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.127305] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.127327] ? trace_hardirqs_on+0x37/0xe0 [ 14.127348] ? kasan_bitops_generic+0x92/0x1c0 [ 14.127420] kasan_bitops_generic+0x116/0x1c0 [ 14.127444] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.127467] ? __pfx_read_tsc+0x10/0x10 [ 14.127486] ? ktime_get_ts64+0x86/0x230 [ 14.127509] kunit_try_run_case+0x1a5/0x480 [ 14.127569] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.127592] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.127614] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.127636] ? __kthread_parkme+0x82/0x180 [ 14.127655] ? preempt_count_sub+0x50/0x80 [ 14.127676] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.127729] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.127753] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.127775] kthread+0x337/0x6f0 [ 14.127793] ? trace_preempt_on+0x20/0xc0 [ 14.127814] ? __pfx_kthread+0x10/0x10 [ 14.127834] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.127853] ? calculate_sigpending+0x7b/0xa0 [ 14.127906] ? __pfx_kthread+0x10/0x10 [ 14.127926] ret_from_fork+0x116/0x1d0 [ 14.127944] ? __pfx_kthread+0x10/0x10 [ 14.127963] ret_from_fork_asm+0x1a/0x30 [ 14.127992] </TASK> [ 14.128002] [ 14.137440] Allocated by task 278: [ 14.137721] kasan_save_stack+0x45/0x70 [ 14.137895] kasan_save_track+0x18/0x40 [ 14.138137] kasan_save_alloc_info+0x3b/0x50 [ 14.138370] __kasan_kmalloc+0xb7/0xc0 [ 14.138650] __kmalloc_cache_noprof+0x189/0x420 [ 14.138878] kasan_bitops_generic+0x92/0x1c0 [ 14.139158] kunit_try_run_case+0x1a5/0x480 [ 14.139650] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.140092] kthread+0x337/0x6f0 [ 14.140217] ret_from_fork+0x116/0x1d0 [ 14.140350] ret_from_fork_asm+0x1a/0x30 [ 14.140930] [ 14.141105] The buggy address belongs to the object at ffff888101df6d60 [ 14.141105] which belongs to the cache kmalloc-16 of size 16 [ 14.142473] The buggy address is located 8 bytes inside of [ 14.142473] allocated 9-byte region [ffff888101df6d60, ffff888101df6d69) [ 14.143213] [ 14.143292] The buggy address belongs to the physical page: [ 14.143834] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101df6 [ 14.144643] flags: 0x200000000000000(node=0|zone=2) [ 14.145195] page_type: f5(slab) [ 14.145523] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.146141] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.146416] page dumped because: kasan: bad access detected [ 14.147047] [ 14.147237] Memory state around the buggy address: [ 14.147853] ffff888101df6c00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc [ 14.148607] ffff888101df6c80: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 14.148868] >ffff888101df6d00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 14.149527] ^ [ 14.150122] ffff888101df6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.150920] ffff888101df6e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.151211] ================================================================== [ 14.023742] ================================================================== [ 14.023975] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 14.024555] Write of size 8 at addr ffff888101df6d68 by task kunit_try_catch/278 [ 14.024789] [ 14.024875] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.024918] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.024929] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.024950] Call Trace: [ 14.024963] <TASK> [ 14.024984] dump_stack_lvl+0x73/0xb0 [ 14.025024] print_report+0xd1/0x610 [ 14.025045] ? __virt_addr_valid+0x1db/0x2d0 [ 14.025066] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 14.025117] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.025139] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 14.025163] kasan_report+0x141/0x180 [ 14.025200] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 14.025244] kasan_check_range+0x10c/0x1c0 [ 14.025267] __kasan_check_write+0x18/0x20 [ 14.025298] kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 14.025336] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.025467] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.025494] ? trace_hardirqs_on+0x37/0xe0 [ 14.025514] ? kasan_bitops_generic+0x92/0x1c0 [ 14.025541] kasan_bitops_generic+0x116/0x1c0 [ 14.025563] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.025588] ? __pfx_read_tsc+0x10/0x10 [ 14.025607] ? ktime_get_ts64+0x86/0x230 [ 14.025631] kunit_try_run_case+0x1a5/0x480 [ 14.025654] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.025697] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.025720] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.025742] ? __kthread_parkme+0x82/0x180 [ 14.025761] ? preempt_count_sub+0x50/0x80 [ 14.025784] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.025808] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.025847] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.025870] kthread+0x337/0x6f0 [ 14.025889] ? trace_preempt_on+0x20/0xc0 [ 14.025909] ? __pfx_kthread+0x10/0x10 [ 14.025929] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.025949] ? calculate_sigpending+0x7b/0xa0 [ 14.025972] ? __pfx_kthread+0x10/0x10 [ 14.025993] ret_from_fork+0x116/0x1d0 [ 14.026039] ? __pfx_kthread+0x10/0x10 [ 14.026059] ret_from_fork_asm+0x1a/0x30 [ 14.026089] </TASK> [ 14.026098] [ 14.040283] Allocated by task 278: [ 14.040724] kasan_save_stack+0x45/0x70 [ 14.041118] kasan_save_track+0x18/0x40 [ 14.041545] kasan_save_alloc_info+0x3b/0x50 [ 14.041947] __kasan_kmalloc+0xb7/0xc0 [ 14.042300] __kmalloc_cache_noprof+0x189/0x420 [ 14.042805] kasan_bitops_generic+0x92/0x1c0 [ 14.043209] kunit_try_run_case+0x1a5/0x480 [ 14.043677] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.043864] kthread+0x337/0x6f0 [ 14.043986] ret_from_fork+0x116/0x1d0 [ 14.044134] ret_from_fork_asm+0x1a/0x30 [ 14.044272] [ 14.044343] The buggy address belongs to the object at ffff888101df6d60 [ 14.044343] which belongs to the cache kmalloc-16 of size 16 [ 14.044704] The buggy address is located 8 bytes inside of [ 14.044704] allocated 9-byte region [ffff888101df6d60, ffff888101df6d69) [ 14.045267] [ 14.045535] The buggy address belongs to the physical page: [ 14.046094] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101df6 [ 14.046864] flags: 0x200000000000000(node=0|zone=2) [ 14.047322] page_type: f5(slab) [ 14.047707] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.048588] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.049275] page dumped because: kasan: bad access detected [ 14.049862] [ 14.050059] Memory state around the buggy address: [ 14.050564] ffff888101df6c00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc [ 14.051185] ffff888101df6c80: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 14.051867] >ffff888101df6d00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 14.052553] ^ [ 14.052895] ffff888101df6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.053132] ffff888101df6e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.053551] ================================================================== [ 14.080466] ================================================================== [ 14.080807] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50 [ 14.081183] Write of size 8 at addr ffff888101df6d68 by task kunit_try_catch/278 [ 14.081647] [ 14.081736] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.081777] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.081788] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.081808] Call Trace: [ 14.081820] <TASK> [ 14.081835] dump_stack_lvl+0x73/0xb0 [ 14.081863] print_report+0xd1/0x610 [ 14.081884] ? __virt_addr_valid+0x1db/0x2d0 [ 14.081906] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 14.081929] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.081951] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 14.081975] kasan_report+0x141/0x180 [ 14.081996] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 14.082040] kasan_check_range+0x10c/0x1c0 [ 14.082063] __kasan_check_write+0x18/0x20 [ 14.082082] kasan_bitops_modify.constprop.0+0x373/0xd50 [ 14.082106] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.082131] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.082153] ? trace_hardirqs_on+0x37/0xe0 [ 14.082175] ? kasan_bitops_generic+0x92/0x1c0 [ 14.082201] kasan_bitops_generic+0x116/0x1c0 [ 14.082223] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.082247] ? __pfx_read_tsc+0x10/0x10 [ 14.082266] ? ktime_get_ts64+0x86/0x230 [ 14.082289] kunit_try_run_case+0x1a5/0x480 [ 14.082312] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.082334] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.082392] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.082439] ? __kthread_parkme+0x82/0x180 [ 14.082481] ? preempt_count_sub+0x50/0x80 [ 14.082527] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.082550] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.082594] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.082639] kthread+0x337/0x6f0 [ 14.082658] ? trace_preempt_on+0x20/0xc0 [ 14.082679] ? __pfx_kthread+0x10/0x10 [ 14.082720] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.082834] ? calculate_sigpending+0x7b/0xa0 [ 14.082858] ? __pfx_kthread+0x10/0x10 [ 14.082879] ret_from_fork+0x116/0x1d0 [ 14.082896] ? __pfx_kthread+0x10/0x10 [ 14.082917] ret_from_fork_asm+0x1a/0x30 [ 14.082946] </TASK> [ 14.082954] [ 14.092851] Allocated by task 278: [ 14.093117] kasan_save_stack+0x45/0x70 [ 14.093318] kasan_save_track+0x18/0x40 [ 14.093655] kasan_save_alloc_info+0x3b/0x50 [ 14.093888] __kasan_kmalloc+0xb7/0xc0 [ 14.094095] __kmalloc_cache_noprof+0x189/0x420 [ 14.094315] kasan_bitops_generic+0x92/0x1c0 [ 14.094624] kunit_try_run_case+0x1a5/0x480 [ 14.094779] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.094954] kthread+0x337/0x6f0 [ 14.095085] ret_from_fork+0x116/0x1d0 [ 14.095219] ret_from_fork_asm+0x1a/0x30 [ 14.095524] [ 14.095642] The buggy address belongs to the object at ffff888101df6d60 [ 14.095642] which belongs to the cache kmalloc-16 of size 16 [ 14.096728] The buggy address is located 8 bytes inside of [ 14.096728] allocated 9-byte region [ffff888101df6d60, ffff888101df6d69) [ 14.097387] [ 14.097507] The buggy address belongs to the physical page: [ 14.097764] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101df6 [ 14.098135] flags: 0x200000000000000(node=0|zone=2) [ 14.098302] page_type: f5(slab) [ 14.098626] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.098913] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.099150] page dumped because: kasan: bad access detected [ 14.099358] [ 14.099501] Memory state around the buggy address: [ 14.099793] ffff888101df6c00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc [ 14.100178] ffff888101df6c80: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 14.100721] >ffff888101df6d00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 14.101095] ^ [ 14.101359] ffff888101df6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.101759] ffff888101df6e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.102051] ================================================================== [ 14.003493] ================================================================== [ 14.004069] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 14.004322] Write of size 8 at addr ffff888101df6d68 by task kunit_try_catch/278 [ 14.004988] [ 14.005107] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.005150] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.005163] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.005183] Call Trace: [ 14.005195] <TASK> [ 14.005209] dump_stack_lvl+0x73/0xb0 [ 14.005237] print_report+0xd1/0x610 [ 14.005259] ? __virt_addr_valid+0x1db/0x2d0 [ 14.005280] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 14.005304] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.005325] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 14.005349] kasan_report+0x141/0x180 [ 14.005371] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 14.005575] kasan_check_range+0x10c/0x1c0 [ 14.005603] __kasan_check_write+0x18/0x20 [ 14.005622] kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 14.005646] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.005672] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.005696] ? trace_hardirqs_on+0x37/0xe0 [ 14.005718] ? kasan_bitops_generic+0x92/0x1c0 [ 14.005745] kasan_bitops_generic+0x116/0x1c0 [ 14.005768] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.005793] ? __pfx_read_tsc+0x10/0x10 [ 14.005814] ? ktime_get_ts64+0x86/0x230 [ 14.005837] kunit_try_run_case+0x1a5/0x480 [ 14.005861] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.005883] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.005907] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.005929] ? __kthread_parkme+0x82/0x180 [ 14.005948] ? preempt_count_sub+0x50/0x80 [ 14.005972] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.005996] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.006033] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.006059] kthread+0x337/0x6f0 [ 14.006078] ? trace_preempt_on+0x20/0xc0 [ 14.006099] ? __pfx_kthread+0x10/0x10 [ 14.006119] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.006140] ? calculate_sigpending+0x7b/0xa0 [ 14.006163] ? __pfx_kthread+0x10/0x10 [ 14.006183] ret_from_fork+0x116/0x1d0 [ 14.006200] ? __pfx_kthread+0x10/0x10 [ 14.006219] ret_from_fork_asm+0x1a/0x30 [ 14.006249] </TASK> [ 14.006259] [ 14.014844] Allocated by task 278: [ 14.015039] kasan_save_stack+0x45/0x70 [ 14.015190] kasan_save_track+0x18/0x40 [ 14.015324] kasan_save_alloc_info+0x3b/0x50 [ 14.015470] __kasan_kmalloc+0xb7/0xc0 [ 14.015602] __kmalloc_cache_noprof+0x189/0x420 [ 14.015755] kasan_bitops_generic+0x92/0x1c0 [ 14.015901] kunit_try_run_case+0x1a5/0x480 [ 14.016068] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.016242] kthread+0x337/0x6f0 [ 14.016412] ret_from_fork+0x116/0x1d0 [ 14.017000] ret_from_fork_asm+0x1a/0x30 [ 14.017210] [ 14.017304] The buggy address belongs to the object at ffff888101df6d60 [ 14.017304] which belongs to the cache kmalloc-16 of size 16 [ 14.017827] The buggy address is located 8 bytes inside of [ 14.017827] allocated 9-byte region [ffff888101df6d60, ffff888101df6d69) [ 14.018632] [ 14.018705] The buggy address belongs to the physical page: [ 14.018874] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101df6 [ 14.019121] flags: 0x200000000000000(node=0|zone=2) [ 14.019572] page_type: f5(slab) [ 14.019750] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.020107] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.020566] page dumped because: kasan: bad access detected [ 14.020823] [ 14.020895] Memory state around the buggy address: [ 14.021119] ffff888101df6c00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc [ 14.021439] ffff888101df6c80: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 14.021725] >ffff888101df6d00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 14.022031] ^ [ 14.022300] ffff888101df6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.023131] ffff888101df6e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.023368] ================================================================== [ 14.152546] ================================================================== [ 14.153224] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50 [ 14.154212] Write of size 8 at addr ffff888101df6d68 by task kunit_try_catch/278 [ 14.155075] [ 14.155280] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.155324] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.155336] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.155357] Call Trace: [ 14.155371] <TASK> [ 14.155385] dump_stack_lvl+0x73/0xb0 [ 14.155413] print_report+0xd1/0x610 [ 14.155435] ? __virt_addr_valid+0x1db/0x2d0 [ 14.155455] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 14.155509] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.155530] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 14.155554] kasan_report+0x141/0x180 [ 14.155575] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 14.155604] kasan_check_range+0x10c/0x1c0 [ 14.155626] __kasan_check_write+0x18/0x20 [ 14.155644] kasan_bitops_modify.constprop.0+0x547/0xd50 [ 14.155669] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.155694] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.155716] ? trace_hardirqs_on+0x37/0xe0 [ 14.155737] ? kasan_bitops_generic+0x92/0x1c0 [ 14.155763] kasan_bitops_generic+0x116/0x1c0 [ 14.155785] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.155808] ? __pfx_read_tsc+0x10/0x10 [ 14.155828] ? ktime_get_ts64+0x86/0x230 [ 14.155851] kunit_try_run_case+0x1a5/0x480 [ 14.155873] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.155895] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.155917] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.155939] ? __kthread_parkme+0x82/0x180 [ 14.155958] ? preempt_count_sub+0x50/0x80 [ 14.155980] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.156003] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.156035] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.156057] kthread+0x337/0x6f0 [ 14.156104] ? trace_preempt_on+0x20/0xc0 [ 14.156124] ? __pfx_kthread+0x10/0x10 [ 14.156144] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.156164] ? calculate_sigpending+0x7b/0xa0 [ 14.156187] ? __pfx_kthread+0x10/0x10 [ 14.156208] ret_from_fork+0x116/0x1d0 [ 14.156225] ? __pfx_kthread+0x10/0x10 [ 14.156245] ret_from_fork_asm+0x1a/0x30 [ 14.156274] </TASK> [ 14.156284] [ 14.169223] Allocated by task 278: [ 14.169366] kasan_save_stack+0x45/0x70 [ 14.169556] kasan_save_track+0x18/0x40 [ 14.169724] kasan_save_alloc_info+0x3b/0x50 [ 14.169913] __kasan_kmalloc+0xb7/0xc0 [ 14.170099] __kmalloc_cache_noprof+0x189/0x420 [ 14.170305] kasan_bitops_generic+0x92/0x1c0 [ 14.170591] kunit_try_run_case+0x1a5/0x480 [ 14.170744] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.170936] kthread+0x337/0x6f0 [ 14.171119] ret_from_fork+0x116/0x1d0 [ 14.171327] ret_from_fork_asm+0x1a/0x30 [ 14.171708] [ 14.171828] The buggy address belongs to the object at ffff888101df6d60 [ 14.171828] which belongs to the cache kmalloc-16 of size 16 [ 14.172207] The buggy address is located 8 bytes inside of [ 14.172207] allocated 9-byte region [ffff888101df6d60, ffff888101df6d69) [ 14.172683] [ 14.172781] The buggy address belongs to the physical page: [ 14.173042] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101df6 [ 14.173272] flags: 0x200000000000000(node=0|zone=2) [ 14.173660] page_type: f5(slab) [ 14.173830] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.174231] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.174617] page dumped because: kasan: bad access detected [ 14.174833] [ 14.174923] Memory state around the buggy address: [ 14.175148] ffff888101df6c00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc [ 14.175356] ffff888101df6c80: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 14.176112] >ffff888101df6d00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 14.176532] ^ [ 14.176855] ffff888101df6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.177094] ffff888101df6e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.177393] ================================================================== [ 13.984212] ================================================================== [ 13.984782] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50 [ 13.985105] Write of size 8 at addr ffff888101df6d68 by task kunit_try_catch/278 [ 13.985534] [ 13.985658] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 13.985703] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.985714] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.985734] Call Trace: [ 13.985745] <TASK> [ 13.985760] dump_stack_lvl+0x73/0xb0 [ 13.985788] print_report+0xd1/0x610 [ 13.985810] ? __virt_addr_valid+0x1db/0x2d0 [ 13.985832] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 13.985856] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.985877] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 13.985902] kasan_report+0x141/0x180 [ 13.985923] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 13.985952] kasan_check_range+0x10c/0x1c0 [ 13.985975] __kasan_check_write+0x18/0x20 [ 13.985994] kasan_bitops_modify.constprop.0+0x101/0xd50 [ 13.986031] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 13.986057] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.986080] ? trace_hardirqs_on+0x37/0xe0 [ 13.986102] ? kasan_bitops_generic+0x92/0x1c0 [ 13.986128] kasan_bitops_generic+0x116/0x1c0 [ 13.986151] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.986175] ? __pfx_read_tsc+0x10/0x10 [ 13.986195] ? ktime_get_ts64+0x86/0x230 [ 13.986219] kunit_try_run_case+0x1a5/0x480 [ 13.986242] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.986264] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.986286] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.986309] ? __kthread_parkme+0x82/0x180 [ 13.986328] ? preempt_count_sub+0x50/0x80 [ 13.986351] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.986447] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.986471] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.986493] kthread+0x337/0x6f0 [ 13.986512] ? trace_preempt_on+0x20/0xc0 [ 13.986533] ? __pfx_kthread+0x10/0x10 [ 13.986553] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.986573] ? calculate_sigpending+0x7b/0xa0 [ 13.986606] ? __pfx_kthread+0x10/0x10 [ 13.986627] ret_from_fork+0x116/0x1d0 [ 13.986644] ? __pfx_kthread+0x10/0x10 [ 13.986664] ret_from_fork_asm+0x1a/0x30 [ 13.986694] </TASK> [ 13.986703] [ 13.995031] Allocated by task 278: [ 13.995212] kasan_save_stack+0x45/0x70 [ 13.995454] kasan_save_track+0x18/0x40 [ 13.995620] kasan_save_alloc_info+0x3b/0x50 [ 13.995813] __kasan_kmalloc+0xb7/0xc0 [ 13.995998] __kmalloc_cache_noprof+0x189/0x420 [ 13.996205] kasan_bitops_generic+0x92/0x1c0 [ 13.996413] kunit_try_run_case+0x1a5/0x480 [ 13.996587] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.996818] kthread+0x337/0x6f0 [ 13.996940] ret_from_fork+0x116/0x1d0 [ 13.997143] ret_from_fork_asm+0x1a/0x30 [ 13.997342] [ 13.997493] The buggy address belongs to the object at ffff888101df6d60 [ 13.997493] which belongs to the cache kmalloc-16 of size 16 [ 13.997967] The buggy address is located 8 bytes inside of [ 13.997967] allocated 9-byte region [ffff888101df6d60, ffff888101df6d69) [ 13.998652] [ 13.998762] The buggy address belongs to the physical page: [ 13.999029] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101df6 [ 13.999279] flags: 0x200000000000000(node=0|zone=2) [ 13.999607] page_type: f5(slab) [ 13.999859] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.000120] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.000615] page dumped because: kasan: bad access detected [ 14.000827] [ 14.000920] Memory state around the buggy address: [ 14.001105] ffff888101df6c00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc [ 14.001321] ffff888101df6c80: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 14.001535] >ffff888101df6d00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 14.001746] ^ [ 14.002015] ffff888101df6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.002631] ffff888101df6e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.002945] ================================================================== [ 14.057107] ================================================================== [ 14.057949] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 14.058888] Write of size 8 at addr ffff888101df6d68 by task kunit_try_catch/278 [ 14.059826] [ 14.059916] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.059958] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.059969] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.059990] Call Trace: [ 14.060001] <TASK> [ 14.060030] dump_stack_lvl+0x73/0xb0 [ 14.060059] print_report+0xd1/0x610 [ 14.060080] ? __virt_addr_valid+0x1db/0x2d0 [ 14.060101] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 14.060125] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.060147] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 14.060171] kasan_report+0x141/0x180 [ 14.060192] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 14.060221] kasan_check_range+0x10c/0x1c0 [ 14.060243] __kasan_check_write+0x18/0x20 [ 14.060261] kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 14.060285] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.060311] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.060333] ? trace_hardirqs_on+0x37/0xe0 [ 14.060354] ? kasan_bitops_generic+0x92/0x1c0 [ 14.060381] kasan_bitops_generic+0x116/0x1c0 [ 14.060403] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.060426] ? __pfx_read_tsc+0x10/0x10 [ 14.060446] ? ktime_get_ts64+0x86/0x230 [ 14.060493] kunit_try_run_case+0x1a5/0x480 [ 14.060531] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.060554] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.060577] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.060599] ? __kthread_parkme+0x82/0x180 [ 14.060619] ? preempt_count_sub+0x50/0x80 [ 14.060641] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.060663] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.060686] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.060708] kthread+0x337/0x6f0 [ 14.060726] ? trace_preempt_on+0x20/0xc0 [ 14.060747] ? __pfx_kthread+0x10/0x10 [ 14.060779] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.060801] ? calculate_sigpending+0x7b/0xa0 [ 14.060839] ? __pfx_kthread+0x10/0x10 [ 14.060860] ret_from_fork+0x116/0x1d0 [ 14.060877] ? __pfx_kthread+0x10/0x10 [ 14.060897] ret_from_fork_asm+0x1a/0x30 [ 14.060926] </TASK> [ 14.060935] [ 14.070640] Allocated by task 278: [ 14.071043] kasan_save_stack+0x45/0x70 [ 14.071287] kasan_save_track+0x18/0x40 [ 14.071679] kasan_save_alloc_info+0x3b/0x50 [ 14.071919] __kasan_kmalloc+0xb7/0xc0 [ 14.072066] __kmalloc_cache_noprof+0x189/0x420 [ 14.072222] kasan_bitops_generic+0x92/0x1c0 [ 14.072373] kunit_try_run_case+0x1a5/0x480 [ 14.072617] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.072870] kthread+0x337/0x6f0 [ 14.073251] ret_from_fork+0x116/0x1d0 [ 14.073574] ret_from_fork_asm+0x1a/0x30 [ 14.073818] [ 14.073914] The buggy address belongs to the object at ffff888101df6d60 [ 14.073914] which belongs to the cache kmalloc-16 of size 16 [ 14.074355] The buggy address is located 8 bytes inside of [ 14.074355] allocated 9-byte region [ffff888101df6d60, ffff888101df6d69) [ 14.074879] [ 14.074978] The buggy address belongs to the physical page: [ 14.075245] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101df6 [ 14.075787] flags: 0x200000000000000(node=0|zone=2) [ 14.076054] page_type: f5(slab) [ 14.076169] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.076766] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.077198] page dumped because: kasan: bad access detected [ 14.077545] [ 14.077682] Memory state around the buggy address: [ 14.077912] ffff888101df6c00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc [ 14.078239] ffff888101df6c80: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 14.078615] >ffff888101df6d00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 14.078951] ^ [ 14.079257] ffff888101df6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.079712] ffff888101df6e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.079982] ==================================================================