Date
July 17, 2025, 11:10 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 17.879288] ================================================================== [ 17.879373] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbc0 [ 17.879432] Read of size 8 at addr fff00000c433ec88 by task kunit_try_catch/262 [ 17.879509] [ 17.879566] CPU: 0 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 17.879678] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.879747] Hardware name: linux,dummy-virt (DT) [ 17.879806] Call trace: [ 17.879879] show_stack+0x20/0x38 (C) [ 17.879960] dump_stack_lvl+0x8c/0xd0 [ 17.880051] print_report+0x118/0x5d0 [ 17.880117] kasan_report+0xdc/0x128 [ 17.880187] __asan_report_load8_noabort+0x20/0x30 [ 17.880241] kasan_bitops_modify.constprop.0+0xa80/0xbc0 [ 17.880313] kasan_bitops_generic+0x110/0x1c8 [ 17.880542] kunit_try_run_case+0x170/0x3f0 [ 17.880652] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.880718] kthread+0x328/0x630 [ 17.880790] ret_from_fork+0x10/0x20 [ 17.880882] [ 17.880995] Allocated by task 262: [ 17.881038] kasan_save_stack+0x3c/0x68 [ 17.881082] kasan_save_track+0x20/0x40 [ 17.881122] kasan_save_alloc_info+0x40/0x58 [ 17.881162] __kasan_kmalloc+0xd4/0xd8 [ 17.881200] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.881251] kasan_bitops_generic+0xa0/0x1c8 [ 17.881292] kunit_try_run_case+0x170/0x3f0 [ 17.881474] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.881552] kthread+0x328/0x630 [ 17.881636] ret_from_fork+0x10/0x20 [ 17.881746] [ 17.881804] The buggy address belongs to the object at fff00000c433ec80 [ 17.881804] which belongs to the cache kmalloc-16 of size 16 [ 17.881952] The buggy address is located 8 bytes inside of [ 17.881952] allocated 9-byte region [fff00000c433ec80, fff00000c433ec89) [ 17.882031] [ 17.882052] The buggy address belongs to the physical page: [ 17.882085] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10433e [ 17.882142] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.882378] page_type: f5(slab) [ 17.882459] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 17.882542] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 17.882612] page dumped because: kasan: bad access detected [ 17.882657] [ 17.882678] Memory state around the buggy address: [ 17.882712] fff00000c433eb80: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 17.882882] fff00000c433ec00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 17.882957] >fff00000c433ec80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.883010] ^ [ 17.883060] fff00000c433ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.883117] fff00000c433ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.883160] ================================================================== [ 17.884159] ================================================================== [ 17.884219] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc0 [ 17.884272] Write of size 8 at addr fff00000c433ec88 by task kunit_try_catch/262 [ 17.884325] [ 17.884358] CPU: 0 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 17.884455] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.884484] Hardware name: linux,dummy-virt (DT) [ 17.884518] Call trace: [ 17.884541] show_stack+0x20/0x38 (C) [ 17.884589] dump_stack_lvl+0x8c/0xd0 [ 17.884638] print_report+0x118/0x5d0 [ 17.884685] kasan_report+0xdc/0x128 [ 17.884732] kasan_check_range+0x100/0x1a8 [ 17.884780] __kasan_check_write+0x20/0x30 [ 17.884840] kasan_bitops_modify.constprop.0+0x2b4/0xbc0 [ 17.884902] kasan_bitops_generic+0x110/0x1c8 [ 17.884950] kunit_try_run_case+0x170/0x3f0 [ 17.885010] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.885062] kthread+0x328/0x630 [ 17.885340] ret_from_fork+0x10/0x20 [ 17.885524] [ 17.885605] Allocated by task 262: [ 17.885645] kasan_save_stack+0x3c/0x68 [ 17.885687] kasan_save_track+0x20/0x40 [ 17.885727] kasan_save_alloc_info+0x40/0x58 [ 17.885878] __kasan_kmalloc+0xd4/0xd8 [ 17.885991] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.886073] kasan_bitops_generic+0xa0/0x1c8 [ 17.886183] kunit_try_run_case+0x170/0x3f0 [ 17.886318] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.886445] kthread+0x328/0x630 [ 17.887132] The buggy address is located 8 bytes inside of [ 17.887132] allocated 9-byte region [fff00000c433ec80, fff00000c433ec89) [ 17.888652] >fff00000c433ec80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.889596] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc0 [ 17.890331] print_report+0x118/0x5d0 [ 17.891054] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.892166] The buggy address is located 8 bytes inside of [ 17.892166] allocated 9-byte region [fff00000c433ec80, fff00000c433ec89) [ 17.892488] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 17.892799] fff00000c433ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.893782] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.894085] kasan_report+0xdc/0x128 [ 17.894679] ret_from_fork+0x10/0x20 [ 17.895318] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.895836] [ 17.896334] page_type: f5(slab) [ 17.896446] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 17.896932] fff00000c433ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.897917] CPU: 0 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 17.899678] kasan_save_track+0x20/0x40 [ 17.900334] The buggy address belongs to the object at fff00000c433ec80 [ 17.900334] which belongs to the cache kmalloc-16 of size 16 [ 17.900914] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 17.901796] ================================================================== [ 17.874106] ================================================================== [ 17.874169] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc0 [ 17.874222] Write of size 8 at addr fff00000c433ec88 by task kunit_try_catch/262 [ 17.874309] [ 17.874341] CPU: 0 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 17.874464] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.874621] Hardware name: linux,dummy-virt (DT) [ 17.874678] Call trace: [ 17.874718] show_stack+0x20/0x38 (C) [ 17.874769] dump_stack_lvl+0x8c/0xd0 [ 17.874856] print_report+0x118/0x5d0 [ 17.874911] kasan_report+0xdc/0x128 [ 17.874960] kasan_check_range+0x100/0x1a8 [ 17.875021] __kasan_check_write+0x20/0x30 [ 17.875067] kasan_bitops_modify.constprop.0+0x1dc/0xbc0 [ 17.875120] kasan_bitops_generic+0x110/0x1c8 [ 17.875195] kunit_try_run_case+0x170/0x3f0 [ 17.875250] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.875342] kthread+0x328/0x630 [ 17.875386] ret_from_fork+0x10/0x20 [ 17.875436] [ 17.875471] Allocated by task 262: [ 17.875501] kasan_save_stack+0x3c/0x68 [ 17.875544] kasan_save_track+0x20/0x40 [ 17.875600] kasan_save_alloc_info+0x40/0x58 [ 17.875643] __kasan_kmalloc+0xd4/0xd8 [ 17.875680] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.875761] kasan_bitops_generic+0xa0/0x1c8 [ 17.875800] kunit_try_run_case+0x170/0x3f0 [ 17.875943] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.876035] kthread+0x328/0x630 [ 17.876253] ret_from_fork+0x10/0x20 [ 17.876464] [ 17.876512] The buggy address belongs to the object at fff00000c433ec80 [ 17.876512] which belongs to the cache kmalloc-16 of size 16 [ 17.876576] The buggy address is located 8 bytes inside of [ 17.876576] allocated 9-byte region [fff00000c433ec80, fff00000c433ec89) [ 17.876823] [ 17.876912] The buggy address belongs to the physical page: [ 17.877155] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10433e [ 17.877407] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.877643] page_type: f5(slab) [ 17.877722] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 17.877813] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 17.877921] page dumped because: kasan: bad access detected [ 17.878042] [ 17.878087] Memory state around the buggy address: [ 17.878122] fff00000c433eb80: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 17.878187] fff00000c433ec00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 17.878385] >fff00000c433ec80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.878542] ^ [ 17.878601] fff00000c433ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.878852] fff00000c433ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.878913] ================================================================== [ 17.863492] ================================================================== [ 17.863556] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 17.863614] Write of size 8 at addr fff00000c433ec88 by task kunit_try_catch/262 [ 17.863670] [ 17.863788] CPU: 0 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 17.863874] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.863949] Hardware name: linux,dummy-virt (DT) [ 17.864104] Call trace: [ 17.864134] show_stack+0x20/0x38 (C) [ 17.864188] dump_stack_lvl+0x8c/0xd0 [ 17.864235] print_report+0x118/0x5d0 [ 17.864342] kasan_report+0xdc/0x128 [ 17.864388] kasan_check_range+0x100/0x1a8 [ 17.864466] __kasan_check_write+0x20/0x30 [ 17.864571] kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 17.864645] kasan_bitops_generic+0x110/0x1c8 [ 17.864708] kunit_try_run_case+0x170/0x3f0 [ 17.864759] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.864914] kthread+0x328/0x630 [ 17.865008] ret_from_fork+0x10/0x20 [ 17.865060] [ 17.865207] Allocated by task 262: [ 17.865282] kasan_save_stack+0x3c/0x68 [ 17.865359] kasan_save_track+0x20/0x40 [ 17.865480] kasan_save_alloc_info+0x40/0x58 [ 17.865575] __kasan_kmalloc+0xd4/0xd8 [ 17.865688] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.865812] kasan_bitops_generic+0xa0/0x1c8 [ 17.865952] kunit_try_run_case+0x170/0x3f0 [ 17.866018] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.866064] kthread+0x328/0x630 [ 17.866254] ret_from_fork+0x10/0x20 [ 17.866300] [ 17.866321] The buggy address belongs to the object at fff00000c433ec80 [ 17.866321] which belongs to the cache kmalloc-16 of size 16 [ 17.866384] The buggy address is located 8 bytes inside of [ 17.866384] allocated 9-byte region [fff00000c433ec80, fff00000c433ec89) [ 17.866598] [ 17.866681] The buggy address belongs to the physical page: [ 17.866749] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10433e [ 17.866838] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.866930] page_type: f5(slab) [ 17.866969] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 17.867067] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 17.867226] page dumped because: kasan: bad access detected [ 17.867261] [ 17.867292] Memory state around the buggy address: [ 17.867560] fff00000c433eb80: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 17.867656] fff00000c433ec00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 17.867770] >fff00000c433ec80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.867859] ^ [ 17.867913] fff00000c433ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.868034] fff00000c433ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.868137] ================================================================== [ 17.869746] ================================================================== [ 17.869799] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 17.869916] Read of size 8 at addr fff00000c433ec88 by task kunit_try_catch/262 [ 17.869975] [ 17.870020] CPU: 0 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 17.870245] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.870314] Hardware name: linux,dummy-virt (DT) [ 17.870351] Call trace: [ 17.870379] show_stack+0x20/0x38 (C) [ 17.870451] dump_stack_lvl+0x8c/0xd0 [ 17.870507] print_report+0x118/0x5d0 [ 17.870573] kasan_report+0xdc/0x128 [ 17.870621] __asan_report_load8_noabort+0x20/0x30 [ 17.870700] kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 17.870813] kasan_bitops_generic+0x110/0x1c8 [ 17.870899] kunit_try_run_case+0x170/0x3f0 [ 17.870971] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.871039] kthread+0x328/0x630 [ 17.871094] ret_from_fork+0x10/0x20 [ 17.871151] [ 17.871171] Allocated by task 262: [ 17.871210] kasan_save_stack+0x3c/0x68 [ 17.871252] kasan_save_track+0x20/0x40 [ 17.871291] kasan_save_alloc_info+0x40/0x58 [ 17.871331] __kasan_kmalloc+0xd4/0xd8 [ 17.871369] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.871410] kasan_bitops_generic+0xa0/0x1c8 [ 17.871453] kunit_try_run_case+0x170/0x3f0 [ 17.871500] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.871554] kthread+0x328/0x630 [ 17.871600] ret_from_fork+0x10/0x20 [ 17.871642] [ 17.871664] The buggy address belongs to the object at fff00000c433ec80 [ 17.871664] which belongs to the cache kmalloc-16 of size 16 [ 17.871725] The buggy address is located 8 bytes inside of [ 17.871725] allocated 9-byte region [fff00000c433ec80, fff00000c433ec89) [ 17.871807] [ 17.871837] The buggy address belongs to the physical page: [ 17.871871] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10433e [ 17.871927] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.871995] page_type: f5(slab) [ 17.872034] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 17.872087] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 17.872701] page dumped because: kasan: bad access detected [ 17.872832] [ 17.872868] Memory state around the buggy address: [ 17.872917] fff00000c433eb80: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 17.873027] fff00000c433ec00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 17.873081] >fff00000c433ec80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.873130] ^ [ 17.873235] fff00000c433ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.873326] fff00000c433ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.873396] ==================================================================
[ 15.161091] ================================================================== [ 15.161366] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 15.161816] Write of size 8 at addr ffff888101679da8 by task kunit_try_catch/278 [ 15.162161] [ 15.162360] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.162408] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.162419] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.162441] Call Trace: [ 15.162455] <TASK> [ 15.162471] dump_stack_lvl+0x73/0xb0 [ 15.162498] print_report+0xd1/0x610 [ 15.162520] ? __virt_addr_valid+0x1db/0x2d0 [ 15.162542] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 15.162582] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.162607] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 15.162634] kasan_report+0x141/0x180 [ 15.162656] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 15.162687] kasan_check_range+0x10c/0x1c0 [ 15.162712] __kasan_check_write+0x18/0x20 [ 15.162731] kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 15.162758] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 15.162787] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.162813] ? kasan_bitops_generic+0x92/0x1c0 [ 15.162840] kasan_bitops_generic+0x116/0x1c0 [ 15.162864] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 15.162926] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 15.162980] kunit_try_run_case+0x1a5/0x480 [ 15.163004] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.163027] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.163052] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.163075] ? __kthread_parkme+0x82/0x180 [ 15.163097] ? preempt_count_sub+0x50/0x80 [ 15.163121] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.163146] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.163171] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.163228] kthread+0x337/0x6f0 [ 15.163299] ? trace_preempt_on+0x20/0xc0 [ 15.163325] ? __pfx_kthread+0x10/0x10 [ 15.163347] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.163406] ? calculate_sigpending+0x7b/0xa0 [ 15.163431] ? __pfx_kthread+0x10/0x10 [ 15.163461] ret_from_fork+0x116/0x1d0 [ 15.163481] ? __pfx_kthread+0x10/0x10 [ 15.163502] ret_from_fork_asm+0x1a/0x30 [ 15.163533] </TASK> [ 15.163543] [ 15.172952] Allocated by task 278: [ 15.173181] kasan_save_stack+0x45/0x70 [ 15.173435] kasan_save_track+0x18/0x40 [ 15.173660] kasan_save_alloc_info+0x3b/0x50 [ 15.173943] __kasan_kmalloc+0xb7/0xc0 [ 15.174159] __kmalloc_cache_noprof+0x189/0x420 [ 15.174347] kasan_bitops_generic+0x92/0x1c0 [ 15.174724] kunit_try_run_case+0x1a5/0x480 [ 15.174922] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.175178] kthread+0x337/0x6f0 [ 15.175382] ret_from_fork+0x116/0x1d0 [ 15.175791] ret_from_fork_asm+0x1a/0x30 [ 15.176010] [ 15.176153] The buggy address belongs to the object at ffff888101679da0 [ 15.176153] which belongs to the cache kmalloc-16 of size 16 [ 15.176807] The buggy address is located 8 bytes inside of [ 15.176807] allocated 9-byte region [ffff888101679da0, ffff888101679da9) [ 15.177432] [ 15.177527] The buggy address belongs to the physical page: [ 15.177806] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101679 [ 15.178149] flags: 0x200000000000000(node=0|zone=2) [ 15.178494] page_type: f5(slab) [ 15.178816] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 15.179093] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 15.179353] page dumped because: kasan: bad access detected [ 15.179708] [ 15.179807] Memory state around the buggy address: [ 15.179965] ffff888101679c80: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 05 fc fc [ 15.180225] ffff888101679d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 15.180939] >ffff888101679d80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 15.181220] ^ [ 15.181367] ffff888101679e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.181868] ffff888101679e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.182325] ================================================================== [ 15.139390] ================================================================== [ 15.139849] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 15.140223] Write of size 8 at addr ffff888101679da8 by task kunit_try_catch/278 [ 15.140797] [ 15.140882] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.140924] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.140935] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.140956] Call Trace: [ 15.140968] <TASK> [ 15.140981] dump_stack_lvl+0x73/0xb0 [ 15.141011] print_report+0xd1/0x610 [ 15.141067] ? __virt_addr_valid+0x1db/0x2d0 [ 15.141119] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 15.141146] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.141170] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 15.141197] kasan_report+0x141/0x180 [ 15.141219] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 15.141251] kasan_check_range+0x10c/0x1c0 [ 15.141275] __kasan_check_write+0x18/0x20 [ 15.141368] kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 15.141396] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 15.141425] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.141450] ? kasan_bitops_generic+0x92/0x1c0 [ 15.141479] kasan_bitops_generic+0x116/0x1c0 [ 15.141504] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 15.141529] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 15.141573] kunit_try_run_case+0x1a5/0x480 [ 15.141598] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.141622] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.141646] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.141670] ? __kthread_parkme+0x82/0x180 [ 15.141691] ? preempt_count_sub+0x50/0x80 [ 15.141715] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.141740] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.141765] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.141791] kthread+0x337/0x6f0 [ 15.141811] ? trace_preempt_on+0x20/0xc0 [ 15.141835] ? __pfx_kthread+0x10/0x10 [ 15.141856] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.141878] ? calculate_sigpending+0x7b/0xa0 [ 15.141902] ? __pfx_kthread+0x10/0x10 [ 15.141924] ret_from_fork+0x116/0x1d0 [ 15.141943] ? __pfx_kthread+0x10/0x10 [ 15.141964] ret_from_fork_asm+0x1a/0x30 [ 15.141994] </TASK> [ 15.142005] [ 15.150918] Allocated by task 278: [ 15.151456] kasan_save_stack+0x45/0x70 [ 15.151679] kasan_save_track+0x18/0x40 [ 15.151900] kasan_save_alloc_info+0x3b/0x50 [ 15.152126] __kasan_kmalloc+0xb7/0xc0 [ 15.152400] __kmalloc_cache_noprof+0x189/0x420 [ 15.152704] kasan_bitops_generic+0x92/0x1c0 [ 15.152896] kunit_try_run_case+0x1a5/0x480 [ 15.153046] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.153219] kthread+0x337/0x6f0 [ 15.153455] ret_from_fork+0x116/0x1d0 [ 15.153765] ret_from_fork_asm+0x1a/0x30 [ 15.153963] [ 15.154058] The buggy address belongs to the object at ffff888101679da0 [ 15.154058] which belongs to the cache kmalloc-16 of size 16 [ 15.154746] The buggy address is located 8 bytes inside of [ 15.154746] allocated 9-byte region [ffff888101679da0, ffff888101679da9) [ 15.155166] [ 15.155296] The buggy address belongs to the physical page: [ 15.155919] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101679 [ 15.156216] flags: 0x200000000000000(node=0|zone=2) [ 15.156650] page_type: f5(slab) [ 15.156854] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 15.157100] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 15.157717] page dumped because: kasan: bad access detected [ 15.157921] [ 15.157989] Memory state around the buggy address: [ 15.158190] ffff888101679c80: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 05 fc fc [ 15.158739] ffff888101679d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 15.159036] >ffff888101679d80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 15.159473] ^ [ 15.159775] ffff888101679e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.160096] ffff888101679e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.160445] ================================================================== [ 15.094507] ================================================================== [ 15.095000] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50 [ 15.095336] Write of size 8 at addr ffff888101679da8 by task kunit_try_catch/278 [ 15.095705] [ 15.095817] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.095860] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.095872] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.095892] Call Trace: [ 15.095905] <TASK> [ 15.095920] dump_stack_lvl+0x73/0xb0 [ 15.095951] print_report+0xd1/0x610 [ 15.095973] ? __virt_addr_valid+0x1db/0x2d0 [ 15.095997] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 15.096025] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.096048] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 15.096082] kasan_report+0x141/0x180 [ 15.096104] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 15.096136] kasan_check_range+0x10c/0x1c0 [ 15.096160] __kasan_check_write+0x18/0x20 [ 15.096180] kasan_bitops_modify.constprop.0+0x101/0xd50 [ 15.096208] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 15.096237] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.096301] ? kasan_bitops_generic+0x92/0x1c0 [ 15.096331] kasan_bitops_generic+0x116/0x1c0 [ 15.096382] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 15.096409] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 15.096451] kunit_try_run_case+0x1a5/0x480 [ 15.096476] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.096500] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.096525] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.096558] ? __kthread_parkme+0x82/0x180 [ 15.096580] ? preempt_count_sub+0x50/0x80 [ 15.096605] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.096630] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.096655] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.096681] kthread+0x337/0x6f0 [ 15.096701] ? trace_preempt_on+0x20/0xc0 [ 15.096724] ? __pfx_kthread+0x10/0x10 [ 15.096745] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.096767] ? calculate_sigpending+0x7b/0xa0 [ 15.096792] ? __pfx_kthread+0x10/0x10 [ 15.096814] ret_from_fork+0x116/0x1d0 [ 15.096834] ? __pfx_kthread+0x10/0x10 [ 15.096855] ret_from_fork_asm+0x1a/0x30 [ 15.096886] </TASK> [ 15.096898] [ 15.107537] Allocated by task 278: [ 15.107874] kasan_save_stack+0x45/0x70 [ 15.108127] kasan_save_track+0x18/0x40 [ 15.108267] kasan_save_alloc_info+0x3b/0x50 [ 15.108788] __kasan_kmalloc+0xb7/0xc0 [ 15.108943] __kmalloc_cache_noprof+0x189/0x420 [ 15.109208] kasan_bitops_generic+0x92/0x1c0 [ 15.109488] kunit_try_run_case+0x1a5/0x480 [ 15.109701] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.109932] kthread+0x337/0x6f0 [ 15.110094] ret_from_fork+0x116/0x1d0 [ 15.110226] ret_from_fork_asm+0x1a/0x30 [ 15.110425] [ 15.110565] The buggy address belongs to the object at ffff888101679da0 [ 15.110565] which belongs to the cache kmalloc-16 of size 16 [ 15.111320] The buggy address is located 8 bytes inside of [ 15.111320] allocated 9-byte region [ffff888101679da0, ffff888101679da9) [ 15.112050] [ 15.112179] The buggy address belongs to the physical page: [ 15.112377] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101679 [ 15.112871] flags: 0x200000000000000(node=0|zone=2) [ 15.113128] page_type: f5(slab) [ 15.113298] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 15.113724] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 15.113967] page dumped because: kasan: bad access detected [ 15.114177] [ 15.114270] Memory state around the buggy address: [ 15.114683] ffff888101679c80: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 05 fc fc [ 15.114969] ffff888101679d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 15.115421] >ffff888101679d80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 15.115699] ^ [ 15.115955] ffff888101679e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.116643] ffff888101679e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.116934] ================================================================== [ 15.227909] ================================================================== [ 15.228337] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 15.228714] Write of size 8 at addr ffff888101679da8 by task kunit_try_catch/278 [ 15.229027] [ 15.229119] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.229161] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.229173] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.229195] Call Trace: [ 15.229209] <TASK> [ 15.229287] dump_stack_lvl+0x73/0xb0 [ 15.229322] print_report+0xd1/0x610 [ 15.229345] ? __virt_addr_valid+0x1db/0x2d0 [ 15.229368] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 15.229396] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.229419] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 15.229464] kasan_report+0x141/0x180 [ 15.229486] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 15.229519] kasan_check_range+0x10c/0x1c0 [ 15.229543] __kasan_check_write+0x18/0x20 [ 15.229572] kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 15.229600] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 15.229630] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.229658] ? kasan_bitops_generic+0x92/0x1c0 [ 15.229688] kasan_bitops_generic+0x116/0x1c0 [ 15.229714] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 15.229739] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 15.229768] kunit_try_run_case+0x1a5/0x480 [ 15.229793] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.229816] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.229841] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.229865] ? __kthread_parkme+0x82/0x180 [ 15.229887] ? preempt_count_sub+0x50/0x80 [ 15.229912] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.229938] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.229964] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.229990] kthread+0x337/0x6f0 [ 15.230009] ? trace_preempt_on+0x20/0xc0 [ 15.230033] ? __pfx_kthread+0x10/0x10 [ 15.230054] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.230076] ? calculate_sigpending+0x7b/0xa0 [ 15.230100] ? __pfx_kthread+0x10/0x10 [ 15.230121] ret_from_fork+0x116/0x1d0 [ 15.230140] ? __pfx_kthread+0x10/0x10 [ 15.230160] ret_from_fork_asm+0x1a/0x30 [ 15.230190] </TASK> [ 15.230200] [ 15.238024] Allocated by task 278: [ 15.238201] kasan_save_stack+0x45/0x70 [ 15.238489] kasan_save_track+0x18/0x40 [ 15.238695] kasan_save_alloc_info+0x3b/0x50 [ 15.238888] __kasan_kmalloc+0xb7/0xc0 [ 15.239022] __kmalloc_cache_noprof+0x189/0x420 [ 15.239179] kasan_bitops_generic+0x92/0x1c0 [ 15.239566] kunit_try_run_case+0x1a5/0x480 [ 15.239784] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.240040] kthread+0x337/0x6f0 [ 15.240216] ret_from_fork+0x116/0x1d0 [ 15.240401] ret_from_fork_asm+0x1a/0x30 [ 15.240578] [ 15.240679] The buggy address belongs to the object at ffff888101679da0 [ 15.240679] which belongs to the cache kmalloc-16 of size 16 [ 15.241078] The buggy address is located 8 bytes inside of [ 15.241078] allocated 9-byte region [ffff888101679da0, ffff888101679da9) [ 15.241628] [ 15.241819] The buggy address belongs to the physical page: [ 15.242038] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101679 [ 15.242455] flags: 0x200000000000000(node=0|zone=2) [ 15.242677] page_type: f5(slab) [ 15.242829] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 15.243137] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 15.243481] page dumped because: kasan: bad access detected [ 15.243670] [ 15.243742] Memory state around the buggy address: [ 15.243952] ffff888101679c80: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 05 fc fc [ 15.244350] ffff888101679d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 15.244711] >ffff888101679d80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 15.245028] ^ [ 15.245540] ffff888101679e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.245918] ffff888101679e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.246291] ================================================================== [ 15.182825] ================================================================== [ 15.183230] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50 [ 15.183616] Write of size 8 at addr ffff888101679da8 by task kunit_try_catch/278 [ 15.183989] [ 15.184136] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.184179] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.184190] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.184210] Call Trace: [ 15.184223] <TASK> [ 15.184238] dump_stack_lvl+0x73/0xb0 [ 15.184352] print_report+0xd1/0x610 [ 15.184376] ? __virt_addr_valid+0x1db/0x2d0 [ 15.184400] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 15.184477] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.184501] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 15.184528] kasan_report+0x141/0x180 [ 15.184562] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 15.184595] kasan_check_range+0x10c/0x1c0 [ 15.184651] __kasan_check_write+0x18/0x20 [ 15.184671] kasan_bitops_modify.constprop.0+0x373/0xd50 [ 15.184699] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 15.184728] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.184753] ? kasan_bitops_generic+0x92/0x1c0 [ 15.184807] kasan_bitops_generic+0x116/0x1c0 [ 15.184832] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 15.184857] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 15.184887] kunit_try_run_case+0x1a5/0x480 [ 15.184912] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.184935] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.184960] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.184986] ? __kthread_parkme+0x82/0x180 [ 15.185007] ? preempt_count_sub+0x50/0x80 [ 15.185032] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.185057] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.185082] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.185109] kthread+0x337/0x6f0 [ 15.185128] ? trace_preempt_on+0x20/0xc0 [ 15.185152] ? __pfx_kthread+0x10/0x10 [ 15.185173] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.185195] ? calculate_sigpending+0x7b/0xa0 [ 15.185220] ? __pfx_kthread+0x10/0x10 [ 15.185308] ret_from_fork+0x116/0x1d0 [ 15.185332] ? __pfx_kthread+0x10/0x10 [ 15.185354] ret_from_fork_asm+0x1a/0x30 [ 15.185385] </TASK> [ 15.185394] [ 15.194892] Allocated by task 278: [ 15.195065] kasan_save_stack+0x45/0x70 [ 15.195267] kasan_save_track+0x18/0x40 [ 15.195534] kasan_save_alloc_info+0x3b/0x50 [ 15.195772] __kasan_kmalloc+0xb7/0xc0 [ 15.195965] __kmalloc_cache_noprof+0x189/0x420 [ 15.196219] kasan_bitops_generic+0x92/0x1c0 [ 15.196563] kunit_try_run_case+0x1a5/0x480 [ 15.196736] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.196942] kthread+0x337/0x6f0 [ 15.197133] ret_from_fork+0x116/0x1d0 [ 15.197324] ret_from_fork_asm+0x1a/0x30 [ 15.197467] [ 15.197539] The buggy address belongs to the object at ffff888101679da0 [ 15.197539] which belongs to the cache kmalloc-16 of size 16 [ 15.200176] The buggy address is located 8 bytes inside of [ 15.200176] allocated 9-byte region [ffff888101679da0, ffff888101679da9) [ 15.201455] [ 15.201539] The buggy address belongs to the physical page: [ 15.201721] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101679 [ 15.201957] flags: 0x200000000000000(node=0|zone=2) [ 15.202117] page_type: f5(slab) [ 15.202235] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 15.203515] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 15.204545] page dumped because: kasan: bad access detected [ 15.205438] [ 15.205782] Memory state around the buggy address: [ 15.206403] ffff888101679c80: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 05 fc fc [ 15.206761] ffff888101679d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 15.207095] >ffff888101679d80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 15.207424] ^ [ 15.207638] ffff888101679e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.207956] ffff888101679e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.208275] ================================================================== [ 15.246770] ================================================================== [ 15.247112] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50 [ 15.247533] Write of size 8 at addr ffff888101679da8 by task kunit_try_catch/278 [ 15.247856] [ 15.247957] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.248000] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.248011] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.248033] Call Trace: [ 15.248045] <TASK> [ 15.248065] dump_stack_lvl+0x73/0xb0 [ 15.248092] print_report+0xd1/0x610 [ 15.248113] ? __virt_addr_valid+0x1db/0x2d0 [ 15.248135] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 15.248163] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.248186] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 15.248214] kasan_report+0x141/0x180 [ 15.248306] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 15.248339] kasan_check_range+0x10c/0x1c0 [ 15.248363] __kasan_check_write+0x18/0x20 [ 15.248384] kasan_bitops_modify.constprop.0+0x547/0xd50 [ 15.248411] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 15.248456] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.248482] ? kasan_bitops_generic+0x92/0x1c0 [ 15.248509] kasan_bitops_generic+0x116/0x1c0 [ 15.248534] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 15.248568] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 15.248598] kunit_try_run_case+0x1a5/0x480 [ 15.248622] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.248646] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.248671] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.248696] ? __kthread_parkme+0x82/0x180 [ 15.248717] ? preempt_count_sub+0x50/0x80 [ 15.248742] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.248767] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.248794] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.248821] kthread+0x337/0x6f0 [ 15.248839] ? trace_preempt_on+0x20/0xc0 [ 15.248863] ? __pfx_kthread+0x10/0x10 [ 15.248883] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.248905] ? calculate_sigpending+0x7b/0xa0 [ 15.248928] ? __pfx_kthread+0x10/0x10 [ 15.248950] ret_from_fork+0x116/0x1d0 [ 15.248969] ? __pfx_kthread+0x10/0x10 [ 15.248989] ret_from_fork_asm+0x1a/0x30 [ 15.249020] </TASK> [ 15.249030] [ 15.257094] Allocated by task 278: [ 15.257444] kasan_save_stack+0x45/0x70 [ 15.257651] kasan_save_track+0x18/0x40 [ 15.257791] kasan_save_alloc_info+0x3b/0x50 [ 15.257965] __kasan_kmalloc+0xb7/0xc0 [ 15.258154] __kmalloc_cache_noprof+0x189/0x420 [ 15.258468] kasan_bitops_generic+0x92/0x1c0 [ 15.258700] kunit_try_run_case+0x1a5/0x480 [ 15.258907] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.259150] kthread+0x337/0x6f0 [ 15.259354] ret_from_fork+0x116/0x1d0 [ 15.259576] ret_from_fork_asm+0x1a/0x30 [ 15.259717] [ 15.259787] The buggy address belongs to the object at ffff888101679da0 [ 15.259787] which belongs to the cache kmalloc-16 of size 16 [ 15.260190] The buggy address is located 8 bytes inside of [ 15.260190] allocated 9-byte region [ffff888101679da0, ffff888101679da9) [ 15.260800] [ 15.260897] The buggy address belongs to the physical page: [ 15.261086] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101679 [ 15.261332] flags: 0x200000000000000(node=0|zone=2) [ 15.261547] page_type: f5(slab) [ 15.261722] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 15.262056] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 15.262388] page dumped because: kasan: bad access detected [ 15.262645] [ 15.262737] Memory state around the buggy address: [ 15.262951] ffff888101679c80: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 05 fc fc [ 15.263213] ffff888101679d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 15.263499] >ffff888101679d80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 15.263839] ^ [ 15.264045] ffff888101679e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.264457] ffff888101679e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.264796] ================================================================== [ 15.208890] ================================================================== [ 15.209183] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 15.209749] Write of size 8 at addr ffff888101679da8 by task kunit_try_catch/278 [ 15.210049] [ 15.210160] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.210203] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.210214] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.210306] Call Trace: [ 15.210322] <TASK> [ 15.210337] dump_stack_lvl+0x73/0xb0 [ 15.210366] print_report+0xd1/0x610 [ 15.210389] ? __virt_addr_valid+0x1db/0x2d0 [ 15.210411] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 15.210456] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.210480] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 15.210507] kasan_report+0x141/0x180 [ 15.210529] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 15.210571] kasan_check_range+0x10c/0x1c0 [ 15.210595] __kasan_check_write+0x18/0x20 [ 15.210615] kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 15.210642] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 15.210671] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.210697] ? kasan_bitops_generic+0x92/0x1c0 [ 15.210724] kasan_bitops_generic+0x116/0x1c0 [ 15.210749] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 15.210774] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 15.210804] kunit_try_run_case+0x1a5/0x480 [ 15.210829] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.210852] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.210876] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.210901] ? __kthread_parkme+0x82/0x180 [ 15.210921] ? preempt_count_sub+0x50/0x80 [ 15.210945] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.210970] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.210995] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.211021] kthread+0x337/0x6f0 [ 15.211039] ? trace_preempt_on+0x20/0xc0 [ 15.211062] ? __pfx_kthread+0x10/0x10 [ 15.211083] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.211105] ? calculate_sigpending+0x7b/0xa0 [ 15.211128] ? __pfx_kthread+0x10/0x10 [ 15.211150] ret_from_fork+0x116/0x1d0 [ 15.211169] ? __pfx_kthread+0x10/0x10 [ 15.211189] ret_from_fork_asm+0x1a/0x30 [ 15.211220] </TASK> [ 15.211288] [ 15.219361] Allocated by task 278: [ 15.219519] kasan_save_stack+0x45/0x70 [ 15.219724] kasan_save_track+0x18/0x40 [ 15.219885] kasan_save_alloc_info+0x3b/0x50 [ 15.220102] __kasan_kmalloc+0xb7/0xc0 [ 15.220247] __kmalloc_cache_noprof+0x189/0x420 [ 15.220407] kasan_bitops_generic+0x92/0x1c0 [ 15.220809] kunit_try_run_case+0x1a5/0x480 [ 15.221029] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.221357] kthread+0x337/0x6f0 [ 15.221570] ret_from_fork+0x116/0x1d0 [ 15.221749] ret_from_fork_asm+0x1a/0x30 [ 15.221925] [ 15.222001] The buggy address belongs to the object at ffff888101679da0 [ 15.222001] which belongs to the cache kmalloc-16 of size 16 [ 15.222537] The buggy address is located 8 bytes inside of [ 15.222537] allocated 9-byte region [ffff888101679da0, ffff888101679da9) [ 15.223077] [ 15.223173] The buggy address belongs to the physical page: [ 15.223514] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101679 [ 15.223859] flags: 0x200000000000000(node=0|zone=2) [ 15.224077] page_type: f5(slab) [ 15.224286] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 15.224624] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 15.224922] page dumped because: kasan: bad access detected [ 15.225118] [ 15.225187] Memory state around the buggy address: [ 15.225627] ffff888101679c80: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 05 fc fc [ 15.225953] ffff888101679d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 15.226295] >ffff888101679d80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 15.226613] ^ [ 15.226788] ffff888101679e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.227008] ffff888101679e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.227378] ================================================================== [ 15.117463] ================================================================== [ 15.117750] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 15.118115] Write of size 8 at addr ffff888101679da8 by task kunit_try_catch/278 [ 15.118373] [ 15.118623] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.118682] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.118693] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.118714] Call Trace: [ 15.118729] <TASK> [ 15.118745] dump_stack_lvl+0x73/0xb0 [ 15.118773] print_report+0xd1/0x610 [ 15.118796] ? __virt_addr_valid+0x1db/0x2d0 [ 15.118818] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 15.118845] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.118869] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 15.118897] kasan_report+0x141/0x180 [ 15.118919] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 15.118951] kasan_check_range+0x10c/0x1c0 [ 15.118975] __kasan_check_write+0x18/0x20 [ 15.118996] kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 15.119023] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 15.119052] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.119078] ? kasan_bitops_generic+0x92/0x1c0 [ 15.119131] kasan_bitops_generic+0x116/0x1c0 [ 15.119156] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 15.119192] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 15.119222] kunit_try_run_case+0x1a5/0x480 [ 15.119247] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.119270] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.119296] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.119321] ? __kthread_parkme+0x82/0x180 [ 15.119341] ? preempt_count_sub+0x50/0x80 [ 15.119366] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.119391] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.119484] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.119525] kthread+0x337/0x6f0 [ 15.119545] ? trace_preempt_on+0x20/0xc0 [ 15.119577] ? __pfx_kthread+0x10/0x10 [ 15.119598] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.119620] ? calculate_sigpending+0x7b/0xa0 [ 15.119645] ? __pfx_kthread+0x10/0x10 [ 15.119667] ret_from_fork+0x116/0x1d0 [ 15.119687] ? __pfx_kthread+0x10/0x10 [ 15.119708] ret_from_fork_asm+0x1a/0x30 [ 15.119738] </TASK> [ 15.119748] [ 15.128999] Allocated by task 278: [ 15.129234] kasan_save_stack+0x45/0x70 [ 15.129515] kasan_save_track+0x18/0x40 [ 15.129666] kasan_save_alloc_info+0x3b/0x50 [ 15.129898] __kasan_kmalloc+0xb7/0xc0 [ 15.130308] __kmalloc_cache_noprof+0x189/0x420 [ 15.130589] kasan_bitops_generic+0x92/0x1c0 [ 15.130806] kunit_try_run_case+0x1a5/0x480 [ 15.130986] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.131185] kthread+0x337/0x6f0 [ 15.131535] ret_from_fork+0x116/0x1d0 [ 15.131838] ret_from_fork_asm+0x1a/0x30 [ 15.132062] [ 15.132171] The buggy address belongs to the object at ffff888101679da0 [ 15.132171] which belongs to the cache kmalloc-16 of size 16 [ 15.132811] The buggy address is located 8 bytes inside of [ 15.132811] allocated 9-byte region [ffff888101679da0, ffff888101679da9) [ 15.133565] [ 15.133641] The buggy address belongs to the physical page: [ 15.133855] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101679 [ 15.134253] flags: 0x200000000000000(node=0|zone=2) [ 15.134604] page_type: f5(slab) [ 15.134759] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 15.135041] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 15.135664] page dumped because: kasan: bad access detected [ 15.135917] [ 15.136011] Memory state around the buggy address: [ 15.136213] ffff888101679c80: 00 04 fc fc 00 04 fc fc fa fb fc fc 00 05 fc fc [ 15.136634] ffff888101679d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 15.137029] >ffff888101679d80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 15.137619] ^ [ 15.137827] ffff888101679e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.138200] ffff888101679e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.138756] ==================================================================