Date
July 20, 2025, 11:12 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 17.726524] ================================================================== [ 17.727520] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc0 [ 17.727610] Write of size 8 at addr fff00000c3fc6228 by task kunit_try_catch/261 [ 17.727679] [ 17.727712] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 17.727797] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.727825] Hardware name: linux,dummy-virt (DT) [ 17.727858] Call trace: [ 17.727977] show_stack+0x20/0x38 (C) [ 17.728029] dump_stack_lvl+0x8c/0xd0 [ 17.728076] print_report+0x118/0x5d0 [ 17.728158] kasan_report+0xdc/0x128 [ 17.728205] kasan_check_range+0x100/0x1a8 [ 17.728286] __kasan_check_write+0x20/0x30 [ 17.728333] kasan_bitops_modify.constprop.0+0x344/0xbc0 [ 17.728415] kasan_bitops_generic+0x110/0x1c8 [ 17.728474] kunit_try_run_case+0x170/0x3f0 [ 17.728527] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.728598] kthread+0x328/0x630 [ 17.728834] ret_from_fork+0x10/0x20 [ 17.728891] [ 17.728918] Allocated by task 261: [ 17.728957] kasan_save_stack+0x3c/0x68 [ 17.729119] kasan_save_track+0x20/0x40 [ 17.729161] kasan_save_alloc_info+0x40/0x58 [ 17.729249] __kasan_kmalloc+0xd4/0xd8 [ 17.729312] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.729471] kasan_bitops_generic+0xa0/0x1c8 [ 17.729514] kunit_try_run_case+0x170/0x3f0 [ 17.729594] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.730308] kthread+0x328/0x630 [ 17.730384] ret_from_fork+0x10/0x20 [ 17.730423] [ 17.730445] The buggy address belongs to the object at fff00000c3fc6220 [ 17.730445] which belongs to the cache kmalloc-16 of size 16 [ 17.730505] The buggy address is located 8 bytes inside of [ 17.730505] allocated 9-byte region [fff00000c3fc6220, fff00000c3fc6229) [ 17.730658] [ 17.730692] The buggy address belongs to the physical page: [ 17.730725] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103fc6 [ 17.730800] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.730875] page_type: f5(slab) [ 17.730945] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 17.731120] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 17.731168] page dumped because: kasan: bad access detected [ 17.731286] [ 17.731309] Memory state around the buggy address: [ 17.731354] fff00000c3fc6100: 00 06 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 17.731458] fff00000c3fc6180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 17.731558] >fff00000c3fc6200: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 17.731624] ^ [ 17.731659] fff00000c3fc6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.731711] fff00000c3fc6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.731751] ================================================================== [ 17.702049] ================================================================== [ 17.702113] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc0 [ 17.702169] Write of size 8 at addr fff00000c3fc6228 by task kunit_try_catch/261 [ 17.702222] [ 17.702746] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 17.702967] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.703001] Hardware name: linux,dummy-virt (DT) [ 17.703101] Call trace: [ 17.703127] show_stack+0x20/0x38 (C) [ 17.703440] dump_stack_lvl+0x8c/0xd0 [ 17.703512] print_report+0x118/0x5d0 [ 17.703807] kasan_report+0xdc/0x128 [ 17.704114] kasan_check_range+0x100/0x1a8 [ 17.704236] __kasan_check_write+0x20/0x30 [ 17.704629] kasan_bitops_modify.constprop.0+0x320/0xbc0 [ 17.704803] kasan_bitops_generic+0x110/0x1c8 [ 17.704856] kunit_try_run_case+0x170/0x3f0 [ 17.705329] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.705396] kthread+0x328/0x630 [ 17.705441] ret_from_fork+0x10/0x20 [ 17.705955] [ 17.706051] Allocated by task 261: [ 17.706155] kasan_save_stack+0x3c/0x68 [ 17.706493] kasan_save_track+0x20/0x40 [ 17.706538] kasan_save_alloc_info+0x40/0x58 [ 17.706947] __kasan_kmalloc+0xd4/0xd8 [ 17.707051] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.707103] kasan_bitops_generic+0xa0/0x1c8 [ 17.707232] kunit_try_run_case+0x170/0x3f0 [ 17.707276] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.707320] kthread+0x328/0x630 [ 17.707660] ret_from_fork+0x10/0x20 [ 17.707783] [ 17.707833] The buggy address belongs to the object at fff00000c3fc6220 [ 17.707833] which belongs to the cache kmalloc-16 of size 16 [ 17.707967] The buggy address is located 8 bytes inside of [ 17.707967] allocated 9-byte region [fff00000c3fc6220, fff00000c3fc6229) [ 17.708563] [ 17.708591] The buggy address belongs to the physical page: [ 17.708793] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103fc6 [ 17.709128] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.709227] page_type: f5(slab) [ 17.709336] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 17.709620] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 17.709879] page dumped because: kasan: bad access detected [ 17.709969] [ 17.710071] Memory state around the buggy address: [ 17.710411] fff00000c3fc6100: 00 06 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 17.710464] fff00000c3fc6180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 17.710579] >fff00000c3fc6200: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 17.710679] ^ [ 17.710714] fff00000c3fc6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.711179] fff00000c3fc6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.711320] ================================================================== [ 17.662436] ================================================================== [ 17.662765] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc0 [ 17.663143] Write of size 8 at addr fff00000c3fc6228 by task kunit_try_catch/261 [ 17.663490] [ 17.663528] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 17.663931] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.664039] Hardware name: linux,dummy-virt (DT) [ 17.664654] Call trace: [ 17.664807] show_stack+0x20/0x38 (C) [ 17.664912] dump_stack_lvl+0x8c/0xd0 [ 17.664959] print_report+0x118/0x5d0 [ 17.665007] kasan_report+0xdc/0x128 [ 17.665053] kasan_check_range+0x100/0x1a8 [ 17.665103] __kasan_check_write+0x20/0x30 [ 17.665516] kasan_bitops_modify.constprop.0+0x1dc/0xbc0 [ 17.666200] kasan_bitops_generic+0x110/0x1c8 [ 17.666462] kunit_try_run_case+0x170/0x3f0 [ 17.666964] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.667143] kthread+0x328/0x630 [ 17.667267] ret_from_fork+0x10/0x20 [ 17.667427] [ 17.667786] Allocated by task 261: [ 17.667835] kasan_save_stack+0x3c/0x68 [ 17.667972] kasan_save_track+0x20/0x40 [ 17.668121] kasan_save_alloc_info+0x40/0x58 [ 17.668169] __kasan_kmalloc+0xd4/0xd8 [ 17.668780] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.668830] kasan_bitops_generic+0xa0/0x1c8 [ 17.669275] kunit_try_run_case+0x170/0x3f0 [ 17.669582] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.670029] kthread+0x328/0x630 [ 17.670266] ret_from_fork+0x10/0x20 [ 17.670433] [ 17.671090] The buggy address belongs to the object at fff00000c3fc6220 [ 17.671090] which belongs to the cache kmalloc-16 of size 16 [ 17.671221] The buggy address is located 8 bytes inside of [ 17.671221] allocated 9-byte region [fff00000c3fc6220, fff00000c3fc6229) [ 17.671287] [ 17.671335] The buggy address belongs to the physical page: [ 17.671658] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103fc6 [ 17.671730] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.671781] page_type: f5(slab) [ 17.671822] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 17.672267] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 17.672322] page dumped because: kasan: bad access detected [ 17.672760] [ 17.672830] Memory state around the buggy address: [ 17.673169] fff00000c3fc6100: 00 06 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 17.673319] fff00000c3fc6180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 17.673638] >fff00000c3fc6200: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 17.673947] ^ [ 17.674081] fff00000c3fc6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.674132] fff00000c3fc6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.674457] ================================================================== [ 17.712446] ================================================================== [ 17.712499] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaec/0xbc0 [ 17.712554] Read of size 8 at addr fff00000c3fc6228 by task kunit_try_catch/261 [ 17.712609] [ 17.714017] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 17.714326] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.714359] Hardware name: linux,dummy-virt (DT) [ 17.714395] Call trace: [ 17.714421] show_stack+0x20/0x38 (C) [ 17.714475] dump_stack_lvl+0x8c/0xd0 [ 17.714523] print_report+0x118/0x5d0 [ 17.715613] kasan_report+0xdc/0x128 [ 17.715718] __asan_report_load8_noabort+0x20/0x30 [ 17.715912] kasan_bitops_modify.constprop.0+0xaec/0xbc0 [ 17.716197] kasan_bitops_generic+0x110/0x1c8 [ 17.716515] kunit_try_run_case+0x170/0x3f0 [ 17.717049] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.717555] kthread+0x328/0x630 [ 17.717918] ret_from_fork+0x10/0x20 [ 17.718033] [ 17.718056] Allocated by task 261: [ 17.718564] kasan_save_stack+0x3c/0x68 [ 17.719080] kasan_save_track+0x20/0x40 [ 17.719152] kasan_save_alloc_info+0x40/0x58 [ 17.719349] __kasan_kmalloc+0xd4/0xd8 [ 17.719629] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.719814] kasan_bitops_generic+0xa0/0x1c8 [ 17.720076] kunit_try_run_case+0x170/0x3f0 [ 17.720132] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.720647] kthread+0x328/0x630 [ 17.720709] ret_from_fork+0x10/0x20 [ 17.720746] [ 17.720768] The buggy address belongs to the object at fff00000c3fc6220 [ 17.720768] which belongs to the cache kmalloc-16 of size 16 [ 17.721154] The buggy address is located 8 bytes inside of [ 17.721154] allocated 9-byte region [fff00000c3fc6220, fff00000c3fc6229) [ 17.721452] [ 17.721607] The buggy address belongs to the physical page: [ 17.721646] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103fc6 [ 17.722090] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.722457] page_type: f5(slab) [ 17.722520] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 17.722736] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 17.722783] page dumped because: kasan: bad access detected [ 17.723237] [ 17.723264] Memory state around the buggy address: [ 17.723646] fff00000c3fc6100: 00 06 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 17.723712] fff00000c3fc6180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 17.724571] >fff00000c3fc6200: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 17.724689] ^ [ 17.724732] fff00000c3fc6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.724780] fff00000c3fc6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.725504] ================================================================== [ 17.633100] ================================================================== [ 17.633171] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 17.633233] Write of size 8 at addr fff00000c3fc6228 by task kunit_try_catch/261 [ 17.634754] [ 17.634822] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 17.635031] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.635061] Hardware name: linux,dummy-virt (DT) [ 17.635094] Call trace: [ 17.635156] show_stack+0x20/0x38 (C) [ 17.635674] dump_stack_lvl+0x8c/0xd0 [ 17.635745] print_report+0x118/0x5d0 [ 17.635919] kasan_report+0xdc/0x128 [ 17.635969] kasan_check_range+0x100/0x1a8 [ 17.636213] __kasan_check_write+0x20/0x30 [ 17.636599] kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 17.636897] kasan_bitops_generic+0x110/0x1c8 [ 17.637379] kunit_try_run_case+0x170/0x3f0 [ 17.637552] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.638061] kthread+0x328/0x630 [ 17.638135] ret_from_fork+0x10/0x20 [ 17.638630] [ 17.638795] Allocated by task 261: [ 17.639112] kasan_save_stack+0x3c/0x68 [ 17.639172] kasan_save_track+0x20/0x40 [ 17.639283] kasan_save_alloc_info+0x40/0x58 [ 17.639449] __kasan_kmalloc+0xd4/0xd8 [ 17.639726] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.639792] kasan_bitops_generic+0xa0/0x1c8 [ 17.639834] kunit_try_run_case+0x170/0x3f0 [ 17.640223] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.640300] kthread+0x328/0x630 [ 17.640336] ret_from_fork+0x10/0x20 [ 17.640806] [ 17.640833] The buggy address belongs to the object at fff00000c3fc6220 [ 17.640833] which belongs to the cache kmalloc-16 of size 16 [ 17.640989] The buggy address is located 8 bytes inside of [ 17.640989] allocated 9-byte region [fff00000c3fc6220, fff00000c3fc6229) [ 17.641450] [ 17.641623] The buggy address belongs to the physical page: [ 17.641961] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103fc6 [ 17.642127] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.642610] page_type: f5(slab) [ 17.642858] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 17.643065] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 17.643294] page dumped because: kasan: bad access detected [ 17.643544] [ 17.643728] Memory state around the buggy address: [ 17.644223] fff00000c3fc6100: 00 06 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 17.644475] fff00000c3fc6180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 17.644710] >fff00000c3fc6200: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 17.644751] ^ [ 17.645047] fff00000c3fc6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.645440] fff00000c3fc6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.645489] ================================================================== [ 17.739559] ================================================================== [ 17.739612] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa20/0xbc0 [ 17.739753] Read of size 8 at addr fff00000c3fc6228 by task kunit_try_catch/261 [ 17.739817] [ 17.739862] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 17.740107] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.740241] Hardware name: linux,dummy-virt (DT) [ 17.740296] Call trace: [ 17.740320] show_stack+0x20/0x38 (C) [ 17.740478] dump_stack_lvl+0x8c/0xd0 [ 17.740590] print_report+0x118/0x5d0 [ 17.740641] kasan_report+0xdc/0x128 [ 17.740702] __asan_report_load8_noabort+0x20/0x30 [ 17.740754] kasan_bitops_modify.constprop.0+0xa20/0xbc0 [ 17.740809] kasan_bitops_generic+0x110/0x1c8 [ 17.740858] kunit_try_run_case+0x170/0x3f0 [ 17.740916] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.740973] kthread+0x328/0x630 [ 17.741027] ret_from_fork+0x10/0x20 [ 17.741078] [ 17.741098] Allocated by task 261: [ 17.741129] kasan_save_stack+0x3c/0x68 [ 17.741170] kasan_save_track+0x20/0x40 [ 17.741215] kasan_save_alloc_info+0x40/0x58 [ 17.741257] __kasan_kmalloc+0xd4/0xd8 [ 17.741295] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.741349] kasan_bitops_generic+0xa0/0x1c8 [ 17.741391] kunit_try_run_case+0x170/0x3f0 [ 17.741436] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.741480] kthread+0x328/0x630 [ 17.741515] ret_from_fork+0x10/0x20 [ 17.741551] [ 17.741581] The buggy address belongs to the object at fff00000c3fc6220 [ 17.741581] which belongs to the cache kmalloc-16 of size 16 [ 17.741651] The buggy address is located 8 bytes inside of [ 17.741651] allocated 9-byte region [fff00000c3fc6220, fff00000c3fc6229) [ 17.742217] [ 17.742393] The buggy address belongs to the physical page: [ 17.742494] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103fc6 [ 17.742555] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.742632] page_type: f5(slab) [ 17.742937] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 17.743212] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 17.743267] page dumped because: kasan: bad access detected [ 17.743328] [ 17.743514] Memory state around the buggy address: [ 17.743654] fff00000c3fc6100: 00 06 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 17.743895] fff00000c3fc6180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 17.744080] >fff00000c3fc6200: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 17.744232] ^ [ 17.744395] fff00000c3fc6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.744758] fff00000c3fc6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.745554] ================================================================== [ 17.651642] ================================================================== [ 17.651724] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 17.652035] Read of size 8 at addr fff00000c3fc6228 by task kunit_try_catch/261 [ 17.652166] [ 17.652203] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 17.652557] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.652864] Hardware name: linux,dummy-virt (DT) [ 17.652904] Call trace: [ 17.652968] show_stack+0x20/0x38 (C) [ 17.653368] dump_stack_lvl+0x8c/0xd0 [ 17.653648] print_report+0x118/0x5d0 [ 17.654007] kasan_report+0xdc/0x128 [ 17.654120] __asan_report_load8_noabort+0x20/0x30 [ 17.654369] kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 17.654605] kasan_bitops_generic+0x110/0x1c8 [ 17.654766] kunit_try_run_case+0x170/0x3f0 [ 17.654816] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.654871] kthread+0x328/0x630 [ 17.654914] ret_from_fork+0x10/0x20 [ 17.655494] [ 17.655531] Allocated by task 261: [ 17.655616] kasan_save_stack+0x3c/0x68 [ 17.655675] kasan_save_track+0x20/0x40 [ 17.655839] kasan_save_alloc_info+0x40/0x58 [ 17.655945] __kasan_kmalloc+0xd4/0xd8 [ 17.656307] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.656357] kasan_bitops_generic+0xa0/0x1c8 [ 17.656890] kunit_try_run_case+0x170/0x3f0 [ 17.656944] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.657162] kthread+0x328/0x630 [ 17.657316] ret_from_fork+0x10/0x20 [ 17.657723] [ 17.657885] The buggy address belongs to the object at fff00000c3fc6220 [ 17.657885] which belongs to the cache kmalloc-16 of size 16 [ 17.658018] The buggy address is located 8 bytes inside of [ 17.658018] allocated 9-byte region [fff00000c3fc6220, fff00000c3fc6229) [ 17.658084] [ 17.658687] The buggy address belongs to the physical page: [ 17.658878] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103fc6 [ 17.658940] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.658996] page_type: f5(slab) [ 17.659737] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 17.659799] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 17.659925] page dumped because: kasan: bad access detected [ 17.659989] [ 17.660038] Memory state around the buggy address: [ 17.660141] fff00000c3fc6100: 00 06 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 17.660420] fff00000c3fc6180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 17.660472] >fff00000c3fc6200: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 17.660511] ^ [ 17.660546] fff00000c3fc6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.660589] fff00000c3fc6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.660632] ================================================================== [ 17.675765] ================================================================== [ 17.677014] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbc0 [ 17.677099] Read of size 8 at addr fff00000c3fc6228 by task kunit_try_catch/261 [ 17.677198] [ 17.677234] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 17.677316] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.677347] Hardware name: linux,dummy-virt (DT) [ 17.677381] Call trace: [ 17.677405] show_stack+0x20/0x38 (C) [ 17.677455] dump_stack_lvl+0x8c/0xd0 [ 17.677504] print_report+0x118/0x5d0 [ 17.677552] kasan_report+0xdc/0x128 [ 17.677601] __asan_report_load8_noabort+0x20/0x30 [ 17.677654] kasan_bitops_modify.constprop.0+0xa80/0xbc0 [ 17.678054] kasan_bitops_generic+0x110/0x1c8 [ 17.678434] kunit_try_run_case+0x170/0x3f0 [ 17.678489] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.678791] kthread+0x328/0x630 [ 17.678917] ret_from_fork+0x10/0x20 [ 17.679240] [ 17.679311] Allocated by task 261: [ 17.679345] kasan_save_stack+0x3c/0x68 [ 17.679392] kasan_save_track+0x20/0x40 [ 17.679430] kasan_save_alloc_info+0x40/0x58 [ 17.680135] __kasan_kmalloc+0xd4/0xd8 [ 17.680199] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.680581] kasan_bitops_generic+0xa0/0x1c8 [ 17.680638] kunit_try_run_case+0x170/0x3f0 [ 17.680946] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.680996] kthread+0x328/0x630 [ 17.681054] ret_from_fork+0x10/0x20 [ 17.681469] [ 17.681495] The buggy address belongs to the object at fff00000c3fc6220 [ 17.681495] which belongs to the cache kmalloc-16 of size 16 [ 17.681997] The buggy address is located 8 bytes inside of [ 17.681997] allocated 9-byte region [fff00000c3fc6220, fff00000c3fc6229) [ 17.682214] [ 17.682241] The buggy address belongs to the physical page: [ 17.682568] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103fc6 [ 17.682916] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.683113] page_type: f5(slab) [ 17.683228] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 17.683290] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 17.683747] page dumped because: kasan: bad access detected [ 17.683791] [ 17.683820] Memory state around the buggy address: [ 17.684201] fff00000c3fc6100: 00 06 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 17.684551] fff00000c3fc6180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 17.685052] >fff00000c3fc6200: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 17.685492] ^ [ 17.685672] fff00000c3fc6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.685768] fff00000c3fc6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.686230] ================================================================== [ 17.687843] ================================================================== [ 17.688797] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc0 [ 17.688902] Write of size 8 at addr fff00000c3fc6228 by task kunit_try_catch/261 [ 17.688979] [ 17.689108] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 17.689559] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.689765] Hardware name: linux,dummy-virt (DT) [ 17.690117] Call trace: [ 17.690154] show_stack+0x20/0x38 (C) [ 17.690209] dump_stack_lvl+0x8c/0xd0 [ 17.690257] print_report+0x118/0x5d0 [ 17.690306] kasan_report+0xdc/0x128 [ 17.690352] kasan_check_range+0x100/0x1a8 [ 17.691178] __kasan_check_write+0x20/0x30 [ 17.691283] kasan_bitops_modify.constprop.0+0x2b4/0xbc0 [ 17.691410] kasan_bitops_generic+0x110/0x1c8 [ 17.691583] kunit_try_run_case+0x170/0x3f0 [ 17.691631] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.692286] kthread+0x328/0x630 [ 17.692388] ret_from_fork+0x10/0x20 [ 17.692593] [ 17.692896] Allocated by task 261: [ 17.692934] kasan_save_stack+0x3c/0x68 [ 17.693306] kasan_save_track+0x20/0x40 [ 17.693398] kasan_save_alloc_info+0x40/0x58 [ 17.693443] __kasan_kmalloc+0xd4/0xd8 [ 17.693725] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.694075] kasan_bitops_generic+0xa0/0x1c8 [ 17.694164] kunit_try_run_case+0x170/0x3f0 [ 17.694620] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.694772] kthread+0x328/0x630 [ 17.694810] ret_from_fork+0x10/0x20 [ 17.695136] [ 17.695160] The buggy address belongs to the object at fff00000c3fc6220 [ 17.695160] which belongs to the cache kmalloc-16 of size 16 [ 17.695221] The buggy address is located 8 bytes inside of [ 17.695221] allocated 9-byte region [fff00000c3fc6220, fff00000c3fc6229) [ 17.695285] [ 17.695308] The buggy address belongs to the physical page: [ 17.695813] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103fc6 [ 17.696155] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.696522] page_type: f5(slab) [ 17.696738] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 17.697114] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 17.697261] page dumped because: kasan: bad access detected [ 17.697558] [ 17.697581] Memory state around the buggy address: [ 17.697948] fff00000c3fc6100: 00 06 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 17.698156] fff00000c3fc6180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 17.698214] >fff00000c3fc6200: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 17.698639] ^ [ 17.698843] fff00000c3fc6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.698913] fff00000c3fc6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.699265] ================================================================== [ 17.732274] ================================================================== [ 17.732329] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc0 [ 17.732390] Write of size 8 at addr fff00000c3fc6228 by task kunit_try_catch/261 [ 17.732441] [ 17.732472] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 17.732553] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.732581] Hardware name: linux,dummy-virt (DT) [ 17.732614] Call trace: [ 17.732638] show_stack+0x20/0x38 (C) [ 17.732702] dump_stack_lvl+0x8c/0xd0 [ 17.732750] print_report+0x118/0x5d0 [ 17.733393] kasan_report+0xdc/0x128 [ 17.733483] kasan_check_range+0x100/0x1a8 [ 17.733620] __kasan_check_write+0x20/0x30 [ 17.733684] kasan_bitops_modify.constprop.0+0x3b0/0xbc0 [ 17.733737] kasan_bitops_generic+0x110/0x1c8 [ 17.733836] kunit_try_run_case+0x170/0x3f0 [ 17.733924] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.734021] kthread+0x328/0x630 [ 17.734091] ret_from_fork+0x10/0x20 [ 17.734202] [ 17.734227] Allocated by task 261: [ 17.734261] kasan_save_stack+0x3c/0x68 [ 17.734469] kasan_save_track+0x20/0x40 [ 17.734622] kasan_save_alloc_info+0x40/0x58 [ 17.734686] __kasan_kmalloc+0xd4/0xd8 [ 17.734726] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.734866] kasan_bitops_generic+0xa0/0x1c8 [ 17.734918] kunit_try_run_case+0x170/0x3f0 [ 17.734959] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.735014] kthread+0x328/0x630 [ 17.735048] ret_from_fork+0x10/0x20 [ 17.735087] [ 17.735109] The buggy address belongs to the object at fff00000c3fc6220 [ 17.735109] which belongs to the cache kmalloc-16 of size 16 [ 17.735353] The buggy address is located 8 bytes inside of [ 17.735353] allocated 9-byte region [fff00000c3fc6220, fff00000c3fc6229) [ 17.736233] [ 17.736313] The buggy address belongs to the physical page: [ 17.736433] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103fc6 [ 17.736589] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.737003] page_type: f5(slab) [ 17.737056] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 17.737276] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 17.737478] page dumped because: kasan: bad access detected [ 17.737577] [ 17.737696] Memory state around the buggy address: [ 17.737752] fff00000c3fc6100: 00 06 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 17.737830] fff00000c3fc6180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 17.738218] >fff00000c3fc6200: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 17.738290] ^ [ 17.738429] fff00000c3fc6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.738522] fff00000c3fc6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.738652] ==================================================================
[ 14.376415] ================================================================== [ 14.376748] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 14.377145] Write of size 8 at addr ffff888100fffac8 by task kunit_try_catch/279 [ 14.377899] [ 14.378029] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.378089] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.378101] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.378121] Call Trace: [ 14.378137] <TASK> [ 14.378152] dump_stack_lvl+0x73/0xb0 [ 14.378181] print_report+0xd1/0x610 [ 14.378203] ? __virt_addr_valid+0x1db/0x2d0 [ 14.378224] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 14.378248] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.378270] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 14.378294] kasan_report+0x141/0x180 [ 14.378317] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 14.378347] kasan_check_range+0x10c/0x1c0 [ 14.378369] __kasan_check_write+0x18/0x20 [ 14.378388] kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 14.378412] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.378437] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.378460] ? trace_hardirqs_on+0x37/0xe0 [ 14.378480] ? kasan_bitops_generic+0x92/0x1c0 [ 14.378507] kasan_bitops_generic+0x116/0x1c0 [ 14.378529] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.378555] ? __pfx_read_tsc+0x10/0x10 [ 14.378575] ? ktime_get_ts64+0x86/0x230 [ 14.378598] kunit_try_run_case+0x1a5/0x480 [ 14.378621] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.378642] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.378664] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.378686] ? __kthread_parkme+0x82/0x180 [ 14.378705] ? preempt_count_sub+0x50/0x80 [ 14.378727] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.378750] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.378772] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.378807] kthread+0x337/0x6f0 [ 14.378826] ? trace_preempt_on+0x20/0xc0 [ 14.378847] ? __pfx_kthread+0x10/0x10 [ 14.378866] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.378887] ? calculate_sigpending+0x7b/0xa0 [ 14.378919] ? __pfx_kthread+0x10/0x10 [ 14.378940] ret_from_fork+0x116/0x1d0 [ 14.378957] ? __pfx_kthread+0x10/0x10 [ 14.378977] ret_from_fork_asm+0x1a/0x30 [ 14.379006] </TASK> [ 14.379016] [ 14.390679] Allocated by task 279: [ 14.391083] kasan_save_stack+0x45/0x70 [ 14.391383] kasan_save_track+0x18/0x40 [ 14.391863] kasan_save_alloc_info+0x3b/0x50 [ 14.392222] __kasan_kmalloc+0xb7/0xc0 [ 14.392664] __kmalloc_cache_noprof+0x189/0x420 [ 14.392866] kasan_bitops_generic+0x92/0x1c0 [ 14.393095] kunit_try_run_case+0x1a5/0x480 [ 14.393288] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.393850] kthread+0x337/0x6f0 [ 14.394166] ret_from_fork+0x116/0x1d0 [ 14.394351] ret_from_fork_asm+0x1a/0x30 [ 14.394771] [ 14.394861] The buggy address belongs to the object at ffff888100fffac0 [ 14.394861] which belongs to the cache kmalloc-16 of size 16 [ 14.395341] The buggy address is located 8 bytes inside of [ 14.395341] allocated 9-byte region [ffff888100fffac0, ffff888100fffac9) [ 14.396322] [ 14.396755] The buggy address belongs to the physical page: [ 14.397014] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100fff [ 14.397527] flags: 0x200000000000000(node=0|zone=2) [ 14.397893] page_type: f5(slab) [ 14.398176] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.398639] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.399153] page dumped because: kasan: bad access detected [ 14.399664] [ 14.399854] Memory state around the buggy address: [ 14.400069] ffff888100fff980: fa fb fc fc fa fb fc fc 00 02 fc fc 00 02 fc fc [ 14.400735] ffff888100fffa00: 00 06 fc fc 00 06 fc fc fa fb fc fc fa fb fc fc [ 14.401025] >ffff888100fffa80: 00 05 fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 14.401470] ^ [ 14.401858] ffff888100fffb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.402316] ffff888100fffb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.402800] ================================================================== [ 14.321124] ================================================================== [ 14.322236] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50 [ 14.322514] Write of size 8 at addr ffff888100fffac8 by task kunit_try_catch/279 [ 14.322740] [ 14.322826] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.322870] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.322881] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.322901] Call Trace: [ 14.322957] <TASK> [ 14.322972] dump_stack_lvl+0x73/0xb0 [ 14.323026] print_report+0xd1/0x610 [ 14.323047] ? __virt_addr_valid+0x1db/0x2d0 [ 14.323075] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 14.323099] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.323162] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 14.323189] kasan_report+0x141/0x180 [ 14.323210] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 14.323239] kasan_check_range+0x10c/0x1c0 [ 14.323262] __kasan_check_write+0x18/0x20 [ 14.323280] kasan_bitops_modify.constprop.0+0x101/0xd50 [ 14.323305] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.323403] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.323427] ? trace_hardirqs_on+0x37/0xe0 [ 14.323448] ? kasan_bitops_generic+0x92/0x1c0 [ 14.323503] kasan_bitops_generic+0x116/0x1c0 [ 14.323526] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.323550] ? __pfx_read_tsc+0x10/0x10 [ 14.323570] ? ktime_get_ts64+0x86/0x230 [ 14.323594] kunit_try_run_case+0x1a5/0x480 [ 14.323619] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.323642] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.323671] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.323733] ? __kthread_parkme+0x82/0x180 [ 14.323777] ? preempt_count_sub+0x50/0x80 [ 14.323801] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.323823] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.323846] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.323868] kthread+0x337/0x6f0 [ 14.323888] ? trace_preempt_on+0x20/0xc0 [ 14.323920] ? __pfx_kthread+0x10/0x10 [ 14.323940] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.323960] ? calculate_sigpending+0x7b/0xa0 [ 14.323983] ? __pfx_kthread+0x10/0x10 [ 14.324004] ret_from_fork+0x116/0x1d0 [ 14.324021] ? __pfx_kthread+0x10/0x10 [ 14.324040] ret_from_fork_asm+0x1a/0x30 [ 14.324070] </TASK> [ 14.324080] [ 14.334229] Allocated by task 279: [ 14.334501] kasan_save_stack+0x45/0x70 [ 14.334674] kasan_save_track+0x18/0x40 [ 14.334892] kasan_save_alloc_info+0x3b/0x50 [ 14.335068] __kasan_kmalloc+0xb7/0xc0 [ 14.335259] __kmalloc_cache_noprof+0x189/0x420 [ 14.335547] kasan_bitops_generic+0x92/0x1c0 [ 14.335756] kunit_try_run_case+0x1a5/0x480 [ 14.335913] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.336087] kthread+0x337/0x6f0 [ 14.336207] ret_from_fork+0x116/0x1d0 [ 14.336426] ret_from_fork_asm+0x1a/0x30 [ 14.336624] [ 14.336738] The buggy address belongs to the object at ffff888100fffac0 [ 14.336738] which belongs to the cache kmalloc-16 of size 16 [ 14.337268] The buggy address is located 8 bytes inside of [ 14.337268] allocated 9-byte region [ffff888100fffac0, ffff888100fffac9) [ 14.337883] [ 14.337993] The buggy address belongs to the physical page: [ 14.338213] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100fff [ 14.338603] flags: 0x200000000000000(node=0|zone=2) [ 14.338794] page_type: f5(slab) [ 14.338976] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.339325] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.339762] page dumped because: kasan: bad access detected [ 14.339989] [ 14.340060] Memory state around the buggy address: [ 14.340283] ffff888100fff980: fa fb fc fc fa fb fc fc 00 02 fc fc 00 02 fc fc [ 14.340663] ffff888100fffa00: 00 06 fc fc 00 06 fc fc fa fb fc fc fa fb fc fc [ 14.340983] >ffff888100fffa80: 00 05 fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 14.341271] ^ [ 14.341551] ffff888100fffb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.341793] ffff888100fffb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.342014] ================================================================== [ 14.403802] ================================================================== [ 14.404123] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 14.405009] Write of size 8 at addr ffff888100fffac8 by task kunit_try_catch/279 [ 14.405626] [ 14.405751] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.405895] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.405921] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.405942] Call Trace: [ 14.405957] <TASK> [ 14.405971] dump_stack_lvl+0x73/0xb0 [ 14.405999] print_report+0xd1/0x610 [ 14.406021] ? __virt_addr_valid+0x1db/0x2d0 [ 14.406042] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 14.406067] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.406088] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 14.406112] kasan_report+0x141/0x180 [ 14.406133] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 14.406163] kasan_check_range+0x10c/0x1c0 [ 14.406185] __kasan_check_write+0x18/0x20 [ 14.406203] kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 14.406228] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.406253] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.406276] ? trace_hardirqs_on+0x37/0xe0 [ 14.406297] ? kasan_bitops_generic+0x92/0x1c0 [ 14.406323] kasan_bitops_generic+0x116/0x1c0 [ 14.406407] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.406433] ? __pfx_read_tsc+0x10/0x10 [ 14.406453] ? ktime_get_ts64+0x86/0x230 [ 14.406476] kunit_try_run_case+0x1a5/0x480 [ 14.406498] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.406520] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.406543] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.406565] ? __kthread_parkme+0x82/0x180 [ 14.406584] ? preempt_count_sub+0x50/0x80 [ 14.406606] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.406629] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.406651] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.406673] kthread+0x337/0x6f0 [ 14.406692] ? trace_preempt_on+0x20/0xc0 [ 14.406712] ? __pfx_kthread+0x10/0x10 [ 14.406732] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.406752] ? calculate_sigpending+0x7b/0xa0 [ 14.406774] ? __pfx_kthread+0x10/0x10 [ 14.406795] ret_from_fork+0x116/0x1d0 [ 14.406811] ? __pfx_kthread+0x10/0x10 [ 14.406831] ret_from_fork_asm+0x1a/0x30 [ 14.406861] </TASK> [ 14.406871] [ 14.419975] Allocated by task 279: [ 14.420361] kasan_save_stack+0x45/0x70 [ 14.420870] kasan_save_track+0x18/0x40 [ 14.421197] kasan_save_alloc_info+0x3b/0x50 [ 14.421589] __kasan_kmalloc+0xb7/0xc0 [ 14.421812] __kmalloc_cache_noprof+0x189/0x420 [ 14.422035] kasan_bitops_generic+0x92/0x1c0 [ 14.422260] kunit_try_run_case+0x1a5/0x480 [ 14.422902] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.423163] kthread+0x337/0x6f0 [ 14.423519] ret_from_fork+0x116/0x1d0 [ 14.423892] ret_from_fork_asm+0x1a/0x30 [ 14.424204] [ 14.424307] The buggy address belongs to the object at ffff888100fffac0 [ 14.424307] which belongs to the cache kmalloc-16 of size 16 [ 14.425133] The buggy address is located 8 bytes inside of [ 14.425133] allocated 9-byte region [ffff888100fffac0, ffff888100fffac9) [ 14.425955] [ 14.426220] The buggy address belongs to the physical page: [ 14.426540] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100fff [ 14.427145] flags: 0x200000000000000(node=0|zone=2) [ 14.427649] page_type: f5(slab) [ 14.427841] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.428230] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.428866] page dumped because: kasan: bad access detected [ 14.429186] [ 14.429262] Memory state around the buggy address: [ 14.429623] ffff888100fff980: fa fb fc fc fa fb fc fc 00 02 fc fc 00 02 fc fc [ 14.430130] ffff888100fffa00: 00 06 fc fc 00 06 fc fc fa fb fc fc fa fb fc fc [ 14.430660] >ffff888100fffa80: 00 05 fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 14.431043] ^ [ 14.431402] ffff888100fffb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.431715] ffff888100fffb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.432339] ================================================================== [ 14.473468] ================================================================== [ 14.473827] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 14.474097] Write of size 8 at addr ffff888100fffac8 by task kunit_try_catch/279 [ 14.474502] [ 14.474620] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.474662] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.474674] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.474694] Call Trace: [ 14.474708] <TASK> [ 14.474723] dump_stack_lvl+0x73/0xb0 [ 14.474749] print_report+0xd1/0x610 [ 14.474772] ? __virt_addr_valid+0x1db/0x2d0 [ 14.474794] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 14.474818] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.474840] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 14.474865] kasan_report+0x141/0x180 [ 14.474887] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 14.474928] kasan_check_range+0x10c/0x1c0 [ 14.474951] __kasan_check_write+0x18/0x20 [ 14.474970] kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 14.474995] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.475020] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.475043] ? trace_hardirqs_on+0x37/0xe0 [ 14.475067] ? kasan_bitops_generic+0x92/0x1c0 [ 14.475093] kasan_bitops_generic+0x116/0x1c0 [ 14.475116] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.475139] ? __pfx_read_tsc+0x10/0x10 [ 14.475158] ? ktime_get_ts64+0x86/0x230 [ 14.475181] kunit_try_run_case+0x1a5/0x480 [ 14.475203] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.475224] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.475246] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.475268] ? __kthread_parkme+0x82/0x180 [ 14.475287] ? preempt_count_sub+0x50/0x80 [ 14.475309] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.475332] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.475353] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.475423] kthread+0x337/0x6f0 [ 14.475446] ? trace_preempt_on+0x20/0xc0 [ 14.475467] ? __pfx_kthread+0x10/0x10 [ 14.475486] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.475506] ? calculate_sigpending+0x7b/0xa0 [ 14.475528] ? __pfx_kthread+0x10/0x10 [ 14.475548] ret_from_fork+0x116/0x1d0 [ 14.475566] ? __pfx_kthread+0x10/0x10 [ 14.475585] ret_from_fork_asm+0x1a/0x30 [ 14.475615] </TASK> [ 14.475625] [ 14.484289] Allocated by task 279: [ 14.484421] kasan_save_stack+0x45/0x70 [ 14.484567] kasan_save_track+0x18/0x40 [ 14.484701] kasan_save_alloc_info+0x3b/0x50 [ 14.484848] __kasan_kmalloc+0xb7/0xc0 [ 14.486277] __kmalloc_cache_noprof+0x189/0x420 [ 14.486876] kasan_bitops_generic+0x92/0x1c0 [ 14.487812] kunit_try_run_case+0x1a5/0x480 [ 14.488834] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.489729] kthread+0x337/0x6f0 [ 14.490181] ret_from_fork+0x116/0x1d0 [ 14.491069] ret_from_fork_asm+0x1a/0x30 [ 14.491676] [ 14.492046] The buggy address belongs to the object at ffff888100fffac0 [ 14.492046] which belongs to the cache kmalloc-16 of size 16 [ 14.493215] The buggy address is located 8 bytes inside of [ 14.493215] allocated 9-byte region [ffff888100fffac0, ffff888100fffac9) [ 14.493583] [ 14.493656] The buggy address belongs to the physical page: [ 14.494306] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100fff [ 14.495262] flags: 0x200000000000000(node=0|zone=2) [ 14.495863] page_type: f5(slab) [ 14.496214] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.497160] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.497960] page dumped because: kasan: bad access detected [ 14.498139] [ 14.498207] Memory state around the buggy address: [ 14.498410] ffff888100fff980: fa fb fc fc fa fb fc fc 00 02 fc fc 00 02 fc fc [ 14.499241] ffff888100fffa00: 00 06 fc fc 00 06 fc fc fa fb fc fc fa fb fc fc [ 14.500027] >ffff888100fffa80: 00 05 fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 14.500918] ^ [ 14.501465] ffff888100fffb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.501980] ffff888100fffb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.502198] ================================================================== [ 14.453427] ================================================================== [ 14.453702] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 14.454081] Write of size 8 at addr ffff888100fffac8 by task kunit_try_catch/279 [ 14.454405] [ 14.454508] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.454550] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.454560] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.454580] Call Trace: [ 14.454595] <TASK> [ 14.454609] dump_stack_lvl+0x73/0xb0 [ 14.454634] print_report+0xd1/0x610 [ 14.454656] ? __virt_addr_valid+0x1db/0x2d0 [ 14.454677] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 14.454706] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.454728] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 14.454753] kasan_report+0x141/0x180 [ 14.454773] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 14.454804] kasan_check_range+0x10c/0x1c0 [ 14.454826] __kasan_check_write+0x18/0x20 [ 14.455036] kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 14.455076] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.455103] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.455126] ? trace_hardirqs_on+0x37/0xe0 [ 14.455146] ? kasan_bitops_generic+0x92/0x1c0 [ 14.455172] kasan_bitops_generic+0x116/0x1c0 [ 14.455195] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.455219] ? __pfx_read_tsc+0x10/0x10 [ 14.455238] ? ktime_get_ts64+0x86/0x230 [ 14.455261] kunit_try_run_case+0x1a5/0x480 [ 14.455285] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.455306] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.455328] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.455351] ? __kthread_parkme+0x82/0x180 [ 14.455429] ? preempt_count_sub+0x50/0x80 [ 14.455452] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.455474] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.455497] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.455519] kthread+0x337/0x6f0 [ 14.455537] ? trace_preempt_on+0x20/0xc0 [ 14.455558] ? __pfx_kthread+0x10/0x10 [ 14.455577] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.455597] ? calculate_sigpending+0x7b/0xa0 [ 14.455619] ? __pfx_kthread+0x10/0x10 [ 14.455639] ret_from_fork+0x116/0x1d0 [ 14.455656] ? __pfx_kthread+0x10/0x10 [ 14.455675] ret_from_fork_asm+0x1a/0x30 [ 14.455704] </TASK> [ 14.455713] [ 14.464201] Allocated by task 279: [ 14.464444] kasan_save_stack+0x45/0x70 [ 14.464622] kasan_save_track+0x18/0x40 [ 14.464844] kasan_save_alloc_info+0x3b/0x50 [ 14.465006] __kasan_kmalloc+0xb7/0xc0 [ 14.465136] __kmalloc_cache_noprof+0x189/0x420 [ 14.465290] kasan_bitops_generic+0x92/0x1c0 [ 14.465437] kunit_try_run_case+0x1a5/0x480 [ 14.465581] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.465756] kthread+0x337/0x6f0 [ 14.465876] ret_from_fork+0x116/0x1d0 [ 14.466216] ret_from_fork_asm+0x1a/0x30 [ 14.466539] [ 14.466639] The buggy address belongs to the object at ffff888100fffac0 [ 14.466639] which belongs to the cache kmalloc-16 of size 16 [ 14.467386] The buggy address is located 8 bytes inside of [ 14.467386] allocated 9-byte region [ffff888100fffac0, ffff888100fffac9) [ 14.468516] [ 14.468627] The buggy address belongs to the physical page: [ 14.468996] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100fff [ 14.469247] flags: 0x200000000000000(node=0|zone=2) [ 14.469557] page_type: f5(slab) [ 14.469728] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.470169] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.470470] page dumped because: kasan: bad access detected [ 14.470684] [ 14.470836] Memory state around the buggy address: [ 14.471031] ffff888100fff980: fa fb fc fc fa fb fc fc 00 02 fc fc 00 02 fc fc [ 14.471308] ffff888100fffa00: 00 06 fc fc 00 06 fc fc fa fb fc fc fa fb fc fc [ 14.471703] >ffff888100fffa80: 00 05 fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 14.472018] ^ [ 14.472197] ffff888100fffb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.472460] ffff888100fffb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.472780] ================================================================== [ 14.502618] ================================================================== [ 14.503092] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50 [ 14.503396] Write of size 8 at addr ffff888100fffac8 by task kunit_try_catch/279 [ 14.504326] [ 14.504520] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.504562] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.504574] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.504594] Call Trace: [ 14.504607] <TASK> [ 14.504621] dump_stack_lvl+0x73/0xb0 [ 14.504648] print_report+0xd1/0x610 [ 14.504669] ? __virt_addr_valid+0x1db/0x2d0 [ 14.504690] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 14.504714] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.504735] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 14.504760] kasan_report+0x141/0x180 [ 14.504781] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 14.504810] kasan_check_range+0x10c/0x1c0 [ 14.504831] __kasan_check_write+0x18/0x20 [ 14.504849] kasan_bitops_modify.constprop.0+0x547/0xd50 [ 14.504873] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.504919] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.504942] ? trace_hardirqs_on+0x37/0xe0 [ 14.504962] ? kasan_bitops_generic+0x92/0x1c0 [ 14.505000] kasan_bitops_generic+0x116/0x1c0 [ 14.505021] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.505045] ? __pfx_read_tsc+0x10/0x10 [ 14.505065] ? ktime_get_ts64+0x86/0x230 [ 14.505088] kunit_try_run_case+0x1a5/0x480 [ 14.505112] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.505133] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.505155] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.505177] ? __kthread_parkme+0x82/0x180 [ 14.505206] ? preempt_count_sub+0x50/0x80 [ 14.505228] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.505251] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.505283] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.505306] kthread+0x337/0x6f0 [ 14.505324] ? trace_preempt_on+0x20/0xc0 [ 14.505344] ? __pfx_kthread+0x10/0x10 [ 14.505372] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.505393] ? calculate_sigpending+0x7b/0xa0 [ 14.505415] ? __pfx_kthread+0x10/0x10 [ 14.505444] ret_from_fork+0x116/0x1d0 [ 14.505462] ? __pfx_kthread+0x10/0x10 [ 14.505482] ret_from_fork_asm+0x1a/0x30 [ 14.505521] </TASK> [ 14.505530] [ 14.520769] Allocated by task 279: [ 14.521106] kasan_save_stack+0x45/0x70 [ 14.521585] kasan_save_track+0x18/0x40 [ 14.521979] kasan_save_alloc_info+0x3b/0x50 [ 14.522496] __kasan_kmalloc+0xb7/0xc0 [ 14.522932] __kmalloc_cache_noprof+0x189/0x420 [ 14.523265] kasan_bitops_generic+0x92/0x1c0 [ 14.523713] kunit_try_run_case+0x1a5/0x480 [ 14.523927] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.524422] kthread+0x337/0x6f0 [ 14.524693] ret_from_fork+0x116/0x1d0 [ 14.525023] ret_from_fork_asm+0x1a/0x30 [ 14.525356] [ 14.525427] The buggy address belongs to the object at ffff888100fffac0 [ 14.525427] which belongs to the cache kmalloc-16 of size 16 [ 14.525858] The buggy address is located 8 bytes inside of [ 14.525858] allocated 9-byte region [ffff888100fffac0, ffff888100fffac9) [ 14.526792] [ 14.526987] The buggy address belongs to the physical page: [ 14.527489] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100fff [ 14.528225] flags: 0x200000000000000(node=0|zone=2) [ 14.528395] page_type: f5(slab) [ 14.528514] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.529258] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.530062] page dumped because: kasan: bad access detected [ 14.530641] [ 14.530820] Memory state around the buggy address: [ 14.531349] ffff888100fff980: fa fb fc fc fa fb fc fc 00 02 fc fc 00 02 fc fc [ 14.531885] ffff888100fffa00: 00 06 fc fc 00 06 fc fc fa fb fc fc fa fb fc fc [ 14.532410] >ffff888100fffa80: 00 05 fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 14.532749] ^ [ 14.533287] ffff888100fffb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.533605] ffff888100fffb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.534289] ================================================================== [ 14.344343] ================================================================== [ 14.346296] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 14.347737] Write of size 8 at addr ffff888100fffac8 by task kunit_try_catch/279 [ 14.348095] [ 14.348187] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.348231] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.348243] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.348263] Call Trace: [ 14.348274] <TASK> [ 14.348288] dump_stack_lvl+0x73/0xb0 [ 14.348315] print_report+0xd1/0x610 [ 14.348336] ? __virt_addr_valid+0x1db/0x2d0 [ 14.348662] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 14.348690] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.348711] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 14.348736] kasan_report+0x141/0x180 [ 14.348758] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 14.348787] kasan_check_range+0x10c/0x1c0 [ 14.348809] __kasan_check_write+0x18/0x20 [ 14.348827] kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 14.348852] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.348877] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.348900] ? trace_hardirqs_on+0x37/0xe0 [ 14.348937] ? kasan_bitops_generic+0x92/0x1c0 [ 14.348964] kasan_bitops_generic+0x116/0x1c0 [ 14.348986] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.349010] ? __pfx_read_tsc+0x10/0x10 [ 14.349029] ? ktime_get_ts64+0x86/0x230 [ 14.349052] kunit_try_run_case+0x1a5/0x480 [ 14.349074] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.349096] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.349118] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.349140] ? __kthread_parkme+0x82/0x180 [ 14.349159] ? preempt_count_sub+0x50/0x80 [ 14.349181] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.349204] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.349226] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.349249] kthread+0x337/0x6f0 [ 14.349270] ? trace_preempt_on+0x20/0xc0 [ 14.349294] ? __pfx_kthread+0x10/0x10 [ 14.349316] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.349337] ? calculate_sigpending+0x7b/0xa0 [ 14.349415] ? __pfx_kthread+0x10/0x10 [ 14.349436] ret_from_fork+0x116/0x1d0 [ 14.349454] ? __pfx_kthread+0x10/0x10 [ 14.349473] ret_from_fork_asm+0x1a/0x30 [ 14.349503] </TASK> [ 14.349512] [ 14.362066] Allocated by task 279: [ 14.362553] kasan_save_stack+0x45/0x70 [ 14.362788] kasan_save_track+0x18/0x40 [ 14.363260] kasan_save_alloc_info+0x3b/0x50 [ 14.363822] __kasan_kmalloc+0xb7/0xc0 [ 14.364038] __kmalloc_cache_noprof+0x189/0x420 [ 14.364316] kasan_bitops_generic+0x92/0x1c0 [ 14.364745] kunit_try_run_case+0x1a5/0x480 [ 14.365107] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.365353] kthread+0x337/0x6f0 [ 14.365502] ret_from_fork+0x116/0x1d0 [ 14.366020] ret_from_fork_asm+0x1a/0x30 [ 14.366215] [ 14.366288] The buggy address belongs to the object at ffff888100fffac0 [ 14.366288] which belongs to the cache kmalloc-16 of size 16 [ 14.367239] The buggy address is located 8 bytes inside of [ 14.367239] allocated 9-byte region [ffff888100fffac0, ffff888100fffac9) [ 14.368208] [ 14.368304] The buggy address belongs to the physical page: [ 14.368861] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100fff [ 14.369379] flags: 0x200000000000000(node=0|zone=2) [ 14.369709] page_type: f5(slab) [ 14.370048] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.370564] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.370993] page dumped because: kasan: bad access detected [ 14.371332] [ 14.371450] Memory state around the buggy address: [ 14.371940] ffff888100fff980: fa fb fc fc fa fb fc fc 00 02 fc fc 00 02 fc fc [ 14.372348] ffff888100fffa00: 00 06 fc fc 00 06 fc fc fa fb fc fc fa fb fc fc [ 14.373071] >ffff888100fffa80: 00 05 fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 14.373380] ^ [ 14.373614] ffff888100fffb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.374172] ffff888100fffb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.374621] ================================================================== [ 14.433266] ================================================================== [ 14.434030] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50 [ 14.434370] Write of size 8 at addr ffff888100fffac8 by task kunit_try_catch/279 [ 14.434815] [ 14.435049] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.435097] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.435110] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.435133] Call Trace: [ 14.435144] <TASK> [ 14.435159] dump_stack_lvl+0x73/0xb0 [ 14.435186] print_report+0xd1/0x610 [ 14.435208] ? __virt_addr_valid+0x1db/0x2d0 [ 14.435229] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 14.435253] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.435274] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 14.435299] kasan_report+0x141/0x180 [ 14.435319] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 14.435349] kasan_check_range+0x10c/0x1c0 [ 14.435371] __kasan_check_write+0x18/0x20 [ 14.435389] kasan_bitops_modify.constprop.0+0x373/0xd50 [ 14.435414] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.435439] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.435462] ? trace_hardirqs_on+0x37/0xe0 [ 14.435483] ? kasan_bitops_generic+0x92/0x1c0 [ 14.435509] kasan_bitops_generic+0x116/0x1c0 [ 14.435531] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.435555] ? __pfx_read_tsc+0x10/0x10 [ 14.435574] ? ktime_get_ts64+0x86/0x230 [ 14.435597] kunit_try_run_case+0x1a5/0x480 [ 14.435619] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.435640] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.435663] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.435687] ? __kthread_parkme+0x82/0x180 [ 14.435705] ? preempt_count_sub+0x50/0x80 [ 14.435728] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.435751] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.435773] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.435795] kthread+0x337/0x6f0 [ 14.435814] ? trace_preempt_on+0x20/0xc0 [ 14.435834] ? __pfx_kthread+0x10/0x10 [ 14.435854] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.435875] ? calculate_sigpending+0x7b/0xa0 [ 14.435897] ? __pfx_kthread+0x10/0x10 [ 14.435984] ret_from_fork+0x116/0x1d0 [ 14.436003] ? __pfx_kthread+0x10/0x10 [ 14.436022] ret_from_fork_asm+0x1a/0x30 [ 14.436052] </TASK> [ 14.436061] [ 14.444864] Allocated by task 279: [ 14.445063] kasan_save_stack+0x45/0x70 [ 14.445225] kasan_save_track+0x18/0x40 [ 14.445504] kasan_save_alloc_info+0x3b/0x50 [ 14.445753] __kasan_kmalloc+0xb7/0xc0 [ 14.445926] __kmalloc_cache_noprof+0x189/0x420 [ 14.446109] kasan_bitops_generic+0x92/0x1c0 [ 14.446310] kunit_try_run_case+0x1a5/0x480 [ 14.446582] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.446817] kthread+0x337/0x6f0 [ 14.446998] ret_from_fork+0x116/0x1d0 [ 14.447153] ret_from_fork_asm+0x1a/0x30 [ 14.447288] [ 14.447356] The buggy address belongs to the object at ffff888100fffac0 [ 14.447356] which belongs to the cache kmalloc-16 of size 16 [ 14.447696] The buggy address is located 8 bytes inside of [ 14.447696] allocated 9-byte region [ffff888100fffac0, ffff888100fffac9) [ 14.448183] [ 14.448275] The buggy address belongs to the physical page: [ 14.448701] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100fff [ 14.449053] flags: 0x200000000000000(node=0|zone=2) [ 14.449240] page_type: f5(slab) [ 14.449355] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.449577] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.450344] page dumped because: kasan: bad access detected [ 14.450650] [ 14.450837] Memory state around the buggy address: [ 14.451079] ffff888100fff980: fa fb fc fc fa fb fc fc 00 02 fc fc 00 02 fc fc [ 14.451346] ffff888100fffa00: 00 06 fc fc 00 06 fc fc fa fb fc fc fa fb fc fc [ 14.451653] >ffff888100fffa80: 00 05 fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 14.451996] ^ [ 14.452190] ffff888100fffb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.452617] ffff888100fffb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.453073] ==================================================================