Date
July 13, 2025, 11:09 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 18.114808] ================================================================== [ 18.114862] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 18.114944] Read of size 8 at addr fff00000c5809588 by task kunit_try_catch/262 [ 18.114996] [ 18.115116] CPU: 0 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.115331] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.115411] Hardware name: linux,dummy-virt (DT) [ 18.115714] Call trace: [ 18.115768] show_stack+0x20/0x38 (C) [ 18.116024] dump_stack_lvl+0x8c/0xd0 [ 18.116078] print_report+0x118/0x5d0 [ 18.116155] kasan_report+0xdc/0x128 [ 18.116212] __asan_report_load8_noabort+0x20/0x30 [ 18.116266] kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 18.116320] kasan_bitops_generic+0x110/0x1c8 [ 18.116368] kunit_try_run_case+0x170/0x3f0 [ 18.116453] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.116708] kthread+0x328/0x630 [ 18.116807] ret_from_fork+0x10/0x20 [ 18.116860] [ 18.116879] Allocated by task 262: [ 18.116927] kasan_save_stack+0x3c/0x68 [ 18.116969] kasan_save_track+0x20/0x40 [ 18.117109] kasan_save_alloc_info+0x40/0x58 [ 18.117334] __kasan_kmalloc+0xd4/0xd8 [ 18.117441] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.117562] kasan_bitops_generic+0xa0/0x1c8 [ 18.117639] kunit_try_run_case+0x170/0x3f0 [ 18.117916] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.119049] page_type: f5(slab) [ 18.121845] Write of size 8 at addr fff00000c5809588 by task kunit_try_catch/262 [ 18.123016] kunit_try_run_case+0x170/0x3f0 [ 18.123715] kasan_bitops_generic+0xa0/0x1c8 [ 18.124259] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.124785] page dumped because: kasan: bad access detected [ 18.126042] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbc0 [ 18.128162] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.129340] page dumped because: kasan: bad access detected [ 18.134113] [ 18.135140] kasan_check_range+0x100/0x1a8 [ 18.137171] kasan_bitops_generic+0xa0/0x1c8 [ 18.138220] page_type: f5(slab) [ 18.138356] page dumped because: kasan: bad access detected [ 18.140017] ================================================================== [ 18.110062] ================================================================== [ 18.110127] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 18.110182] Write of size 8 at addr fff00000c5809588 by task kunit_try_catch/262 [ 18.110259] [ 18.110291] CPU: 0 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.110376] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.110405] Hardware name: linux,dummy-virt (DT) [ 18.110437] Call trace: [ 18.110462] show_stack+0x20/0x38 (C) [ 18.110512] dump_stack_lvl+0x8c/0xd0 [ 18.110712] print_report+0x118/0x5d0 [ 18.110801] kasan_report+0xdc/0x128 [ 18.110851] kasan_check_range+0x100/0x1a8 [ 18.110918] __kasan_check_write+0x20/0x30 [ 18.111000] kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 18.111055] kasan_bitops_generic+0x110/0x1c8 [ 18.111325] kunit_try_run_case+0x170/0x3f0 [ 18.111386] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.111440] kthread+0x328/0x630 [ 18.111567] ret_from_fork+0x10/0x20 [ 18.111635] [ 18.111679] Allocated by task 262: [ 18.111757] kasan_save_stack+0x3c/0x68 [ 18.111802] kasan_save_track+0x20/0x40 [ 18.111878] kasan_save_alloc_info+0x40/0x58 [ 18.111940] __kasan_kmalloc+0xd4/0xd8 [ 18.111978] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.112026] kasan_bitops_generic+0xa0/0x1c8 [ 18.112093] kunit_try_run_case+0x170/0x3f0 [ 18.112133] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.112237] kthread+0x328/0x630 [ 18.112274] ret_from_fork+0x10/0x20 [ 18.112618] [ 18.112683] The buggy address belongs to the object at fff00000c5809580 [ 18.112683] which belongs to the cache kmalloc-16 of size 16 [ 18.112841] The buggy address is located 8 bytes inside of [ 18.112841] allocated 9-byte region [fff00000c5809580, fff00000c5809589) [ 18.112959] [ 18.113007] The buggy address belongs to the physical page: [ 18.113122] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105809 [ 18.113209] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.113260] page_type: f5(slab) [ 18.113310] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 18.113363] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 18.113429] page dumped because: kasan: bad access detected [ 18.113464] [ 18.113483] Memory state around the buggy address: [ 18.113517] fff00000c5809480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 18.113563] fff00000c5809500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 18.113608] >fff00000c5809580: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.113649] ^ [ 18.113679] fff00000c5809600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.113723] fff00000c5809680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.113764] ==================================================================
[ 19.011345] ================================================================== [ 19.011438] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 19.011512] Write of size 8 at addr fff00000c44abae8 by task kunit_try_catch/262 [ 19.011568] [ 19.011610] CPU: 1 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.011699] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.011727] Hardware name: linux,dummy-virt (DT) [ 19.011761] Call trace: [ 19.011792] show_stack+0x20/0x38 (C) [ 19.011844] dump_stack_lvl+0x8c/0xd0 [ 19.011894] print_report+0x118/0x5d0 [ 19.011940] kasan_report+0xdc/0x128 [ 19.022479] kasan_check_range+0x100/0x1a8 [ 19.023056] __kasan_check_write+0x20/0x30 [ 19.024587] kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 19.024663] kasan_bitops_generic+0x110/0x1c8 [ 19.024714] kunit_try_run_case+0x170/0x3f0 [ 19.025478] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.026126] kthread+0x328/0x630 [ 19.026330] ret_from_fork+0x10/0x20 [ 19.026888] [ 19.027231] Allocated by task 262: [ 19.029143] kasan_save_stack+0x3c/0x68 [ 19.029417] kasan_save_track+0x20/0x40 [ 19.029797] kasan_save_alloc_info+0x40/0x58 [ 19.029949] __kasan_kmalloc+0xd4/0xd8 [ 19.032653] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.033096] kasan_bitops_generic+0xa0/0x1c8 [ 19.033514] kunit_try_run_case+0x170/0x3f0 [ 19.033576] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.033778] kthread+0x328/0x630 [ 19.033910] ret_from_fork+0x10/0x20 [ 19.034795] [ 19.034937] The buggy address belongs to the object at fff00000c44abae0 [ 19.034937] which belongs to the cache kmalloc-16 of size 16 [ 19.035151] The buggy address is located 8 bytes inside of [ 19.035151] allocated 9-byte region [fff00000c44abae0, fff00000c44abae9) [ 19.035230] [ 19.035256] The buggy address belongs to the physical page: [ 19.035295] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1044ab [ 19.035356] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.035762] page_type: f5(slab) [ 19.035810] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 19.035864] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 19.037316] page dumped because: kasan: bad access detected [ 19.037924] [ 19.038168] Memory state around the buggy address: [ 19.038478] fff00000c44ab980: 00 00 fc fc 00 00 fc fc fa fb fc fc fa fb fc fc [ 19.039360] fff00000c44aba00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 19.040093] >fff00000c44aba80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 19.040149] ^ [ 19.040403] fff00000c44abb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.044386] fff00000c44abb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.044658] ================================================================== [ 19.046294] ================================================================== [ 19.046407] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 19.046610] Read of size 8 at addr fff00000c44abae8 by task kunit_try_catch/262 [ 19.047026] [ 19.047463] CPU: 1 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.047975] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.048008] Hardware name: linux,dummy-virt (DT) [ 19.048225] Call trace: [ 19.048253] show_stack+0x20/0x38 (C) [ 19.048323] dump_stack_lvl+0x8c/0xd0 [ 19.048372] print_report+0x118/0x5d0 [ 19.048826] kasan_report+0xdc/0x128 [ 19.049431] __asan_report_load8_noabort+0x20/0x30 [ 19.049501] kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 19.051221] kasan_bitops_generic+0x110/0x1c8 [ 19.051307] kunit_try_run_case+0x170/0x3f0 [ 19.051497] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.052011] kthread+0x328/0x630 [ 19.052577] ret_from_fork+0x10/0x20 [ 19.053326] [ 19.053362] Allocated by task 262: [ 19.053463] kasan_save_stack+0x3c/0x68 [ 19.053780] kasan_save_track+0x20/0x40 [ 19.055126] kasan_save_alloc_info+0x40/0x58 [ 19.055193] __kasan_kmalloc+0xd4/0xd8 [ 19.055776] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.055832] kasan_bitops_generic+0xa0/0x1c8 [ 19.056066] kunit_try_run_case+0x170/0x3f0 [ 19.056350] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.056649] kthread+0x328/0x630 [ 19.056894] ret_from_fork+0x10/0x20 [ 19.056940] [ 19.059874] The buggy address belongs to the object at fff00000c44abae0 [ 19.059874] which belongs to the cache kmalloc-16 of size 16 [ 19.059962] The buggy address is located 8 bytes inside of [ 19.059962] allocated 9-byte region [fff00000c44abae0, fff00000c44abae9) [ 19.060030] [ 19.060052] The buggy address belongs to the physical page: [ 19.060110] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1044ab [ 19.060203] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.060511] page_type: f5(slab) [ 19.060684] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 19.060799] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 19.060846] page dumped because: kasan: bad access detected [ 19.060892] [ 19.060914] Memory state around the buggy address: [ 19.061211] fff00000c44ab980: 00 00 fc fc 00 00 fc fc fa fb fc fc fa fb fc fc [ 19.062193] fff00000c44aba00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 19.062252] >fff00000c44aba80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 19.063232] ^ [ 19.063332] fff00000c44abb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.063579] fff00000c44abb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.063623] ================================================================== [ 19.067435] ================================================================== [ 19.067617] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc0 [ 19.067691] Write of size 8 at addr fff00000c44abae8 by task kunit_try_catch/262 [ 19.067847] [ 19.067925] CPU: 1 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.068335] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.068677] Hardware name: linux,dummy-virt (DT) [ 19.068714] Call trace: [ 19.069144] show_stack+0x20/0x38 (C) [ 19.069651] dump_stack_lvl+0x8c/0xd0 [ 19.069990] print_report+0x118/0x5d0 [ 19.071293] kasan_report+0xdc/0x128 [ 19.071344] kasan_check_range+0x100/0x1a8 [ 19.071406] __kasan_check_write+0x20/0x30 [ 19.071949] kasan_bitops_modify.constprop.0+0x1dc/0xbc0 [ 19.072011] kasan_bitops_generic+0x110/0x1c8 [ 19.072061] kunit_try_run_case+0x170/0x3f0 [ 19.072110] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.072163] kthread+0x328/0x630 [ 19.072279] ret_from_fork+0x10/0x20 [ 19.072513] [ 19.072554] Allocated by task 262: [ 19.072585] kasan_save_stack+0x3c/0x68 [ 19.074074] kasan_save_track+0x20/0x40 [ 19.074171] kasan_save_alloc_info+0x40/0x58 [ 19.074238] __kasan_kmalloc+0xd4/0xd8 [ 19.074277] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.074333] kasan_bitops_generic+0xa0/0x1c8 [ 19.074379] kunit_try_run_case+0x170/0x3f0 [ 19.074420] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.074474] kthread+0x328/0x630 [ 19.074667] The buggy address is located 8 bytes inside of [ 19.074667] allocated 9-byte region [fff00000c44abae0, fff00000c44abae9) [ 19.075466] ==================================================================
[ 14.826844] ================================================================== [ 14.827135] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 14.827592] Write of size 8 at addr ffff888102676248 by task kunit_try_catch/279 [ 14.828035] [ 14.828176] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.828247] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.828261] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.828288] Call Trace: [ 14.828315] <TASK> [ 14.828329] dump_stack_lvl+0x73/0xb0 [ 14.828359] print_report+0xd1/0x610 [ 14.828382] ? __virt_addr_valid+0x1db/0x2d0 [ 14.828423] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 14.828458] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.828482] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 14.828536] kasan_report+0x141/0x180 [ 14.828572] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 14.828603] kasan_check_range+0x10c/0x1c0 [ 14.828627] __kasan_check_write+0x18/0x20 [ 14.828647] kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 14.828675] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.828706] ? ret_from_fork_asm+0x1a/0x30 [ 14.828729] ? kthread+0x337/0x6f0 [ 14.828753] kasan_bitops_generic+0x116/0x1c0 [ 14.828777] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.828805] ? __pfx_read_tsc+0x10/0x10 [ 14.828826] ? ktime_get_ts64+0x86/0x230 [ 14.828850] kunit_try_run_case+0x1a5/0x480 [ 14.828874] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.828897] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.828922] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.828947] ? __kthread_parkme+0x82/0x180 [ 14.828968] ? preempt_count_sub+0x50/0x80 [ 14.828992] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.829017] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.829041] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.829067] kthread+0x337/0x6f0 [ 14.829086] ? trace_preempt_on+0x20/0xc0 [ 14.829109] ? __pfx_kthread+0x10/0x10 [ 14.829130] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.829151] ? calculate_sigpending+0x7b/0xa0 [ 14.829176] ? __pfx_kthread+0x10/0x10 [ 14.829197] ret_from_fork+0x116/0x1d0 [ 14.829216] ? __pfx_kthread+0x10/0x10 [ 14.829236] ret_from_fork_asm+0x1a/0x30 [ 14.829267] </TASK> [ 14.829277] [ 14.839291] Allocated by task 279: [ 14.839642] kasan_save_stack+0x45/0x70 [ 14.839883] kasan_save_track+0x18/0x40 [ 14.840066] kasan_save_alloc_info+0x3b/0x50 [ 14.840324] __kasan_kmalloc+0xb7/0xc0 [ 14.840698] __kmalloc_cache_noprof+0x189/0x420 [ 14.840924] kasan_bitops_generic+0x92/0x1c0 [ 14.841148] kunit_try_run_case+0x1a5/0x480 [ 14.841348] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.841752] kthread+0x337/0x6f0 [ 14.841925] ret_from_fork+0x116/0x1d0 [ 14.842110] ret_from_fork_asm+0x1a/0x30 [ 14.842307] [ 14.842419] The buggy address belongs to the object at ffff888102676240 [ 14.842419] which belongs to the cache kmalloc-16 of size 16 [ 14.843252] The buggy address is located 8 bytes inside of [ 14.843252] allocated 9-byte region [ffff888102676240, ffff888102676249) [ 14.843952] [ 14.844068] The buggy address belongs to the physical page: [ 14.844322] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102676 [ 14.844836] flags: 0x200000000000000(node=0|zone=2) [ 14.845076] page_type: f5(slab) [ 14.845254] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.845765] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.846108] page dumped because: kasan: bad access detected [ 14.846373] [ 14.846494] Memory state around the buggy address: [ 14.846758] ffff888102676100: 00 06 fc fc 00 00 fc fc fa fb fc fc fa fb fc fc [ 14.847088] ffff888102676180: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.847746] >ffff888102676200: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 14.848109] ^ [ 14.848350] ffff888102676280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.848885] ffff888102676300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.849169] ================================================================== [ 14.728381] ================================================================== [ 14.729209] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 14.730213] Write of size 8 at addr ffff888102676248 by task kunit_try_catch/279 [ 14.731106] [ 14.731341] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.731389] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.731401] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.731441] Call Trace: [ 14.731470] <TASK> [ 14.731488] dump_stack_lvl+0x73/0xb0 [ 14.731519] print_report+0xd1/0x610 [ 14.731542] ? __virt_addr_valid+0x1db/0x2d0 [ 14.731566] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 14.731697] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.731725] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 14.731753] kasan_report+0x141/0x180 [ 14.731776] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 14.731807] kasan_check_range+0x10c/0x1c0 [ 14.731832] __kasan_check_write+0x18/0x20 [ 14.731853] kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 14.731881] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.731910] ? ret_from_fork_asm+0x1a/0x30 [ 14.731933] ? kthread+0x337/0x6f0 [ 14.731958] kasan_bitops_generic+0x116/0x1c0 [ 14.731982] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.732008] ? __pfx_read_tsc+0x10/0x10 [ 14.732030] ? ktime_get_ts64+0x86/0x230 [ 14.732054] kunit_try_run_case+0x1a5/0x480 [ 14.732079] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.732103] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.732128] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.732152] ? __kthread_parkme+0x82/0x180 [ 14.732173] ? preempt_count_sub+0x50/0x80 [ 14.732197] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.732222] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.732247] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.732274] kthread+0x337/0x6f0 [ 14.732296] ? trace_preempt_on+0x20/0xc0 [ 14.732321] ? __pfx_kthread+0x10/0x10 [ 14.732341] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.732363] ? calculate_sigpending+0x7b/0xa0 [ 14.732421] ? __pfx_kthread+0x10/0x10 [ 14.732444] ret_from_fork+0x116/0x1d0 [ 14.732606] ? __pfx_kthread+0x10/0x10 [ 14.732630] ret_from_fork_asm+0x1a/0x30 [ 14.732676] </TASK> [ 14.732686] [ 14.747801] Allocated by task 279: [ 14.747935] kasan_save_stack+0x45/0x70 [ 14.748082] kasan_save_track+0x18/0x40 [ 14.748214] kasan_save_alloc_info+0x3b/0x50 [ 14.748367] __kasan_kmalloc+0xb7/0xc0 [ 14.748729] __kmalloc_cache_noprof+0x189/0x420 [ 14.749367] kasan_bitops_generic+0x92/0x1c0 [ 14.749959] kunit_try_run_case+0x1a5/0x480 [ 14.750389] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.751101] kthread+0x337/0x6f0 [ 14.751620] ret_from_fork+0x116/0x1d0 [ 14.752011] ret_from_fork_asm+0x1a/0x30 [ 14.752405] [ 14.752675] The buggy address belongs to the object at ffff888102676240 [ 14.752675] which belongs to the cache kmalloc-16 of size 16 [ 14.753591] The buggy address is located 8 bytes inside of [ 14.753591] allocated 9-byte region [ffff888102676240, ffff888102676249) [ 14.754253] [ 14.754333] The buggy address belongs to the physical page: [ 14.754554] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102676 [ 14.754948] flags: 0x200000000000000(node=0|zone=2) [ 14.755435] page_type: f5(slab) [ 14.755756] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.755983] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.756201] page dumped because: kasan: bad access detected [ 14.756370] [ 14.756493] Memory state around the buggy address: [ 14.756991] ffff888102676100: 00 06 fc fc 00 00 fc fc fa fb fc fc fa fb fc fc [ 14.757992] ffff888102676180: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.758723] >ffff888102676200: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 14.759355] ^ [ 14.759992] ffff888102676280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.760678] ffff888102676300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.761083] ================================================================== [ 14.761487] ================================================================== [ 14.762135] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50 [ 14.763206] Write of size 8 at addr ffff888102676248 by task kunit_try_catch/279 [ 14.764008] [ 14.764199] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.764244] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.764256] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.764277] Call Trace: [ 14.764296] <TASK> [ 14.764312] dump_stack_lvl+0x73/0xb0 [ 14.764341] print_report+0xd1/0x610 [ 14.764363] ? __virt_addr_valid+0x1db/0x2d0 [ 14.764386] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 14.764441] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.764476] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 14.764504] kasan_report+0x141/0x180 [ 14.764538] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 14.764570] kasan_check_range+0x10c/0x1c0 [ 14.764594] __kasan_check_write+0x18/0x20 [ 14.764613] kasan_bitops_modify.constprop.0+0x373/0xd50 [ 14.764651] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.764682] ? ret_from_fork_asm+0x1a/0x30 [ 14.764704] ? kthread+0x337/0x6f0 [ 14.764728] kasan_bitops_generic+0x116/0x1c0 [ 14.764752] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.764778] ? __pfx_read_tsc+0x10/0x10 [ 14.764800] ? ktime_get_ts64+0x86/0x230 [ 14.764825] kunit_try_run_case+0x1a5/0x480 [ 14.764850] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.764873] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.764898] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.764923] ? __kthread_parkme+0x82/0x180 [ 14.764943] ? preempt_count_sub+0x50/0x80 [ 14.764967] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.764992] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.765016] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.765043] kthread+0x337/0x6f0 [ 14.765062] ? trace_preempt_on+0x20/0xc0 [ 14.765086] ? __pfx_kthread+0x10/0x10 [ 14.765107] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.765129] ? calculate_sigpending+0x7b/0xa0 [ 14.765153] ? __pfx_kthread+0x10/0x10 [ 14.765175] ret_from_fork+0x116/0x1d0 [ 14.765194] ? __pfx_kthread+0x10/0x10 [ 14.765215] ret_from_fork_asm+0x1a/0x30 [ 14.765247] </TASK> [ 14.765256] [ 14.780921] Allocated by task 279: [ 14.781287] kasan_save_stack+0x45/0x70 [ 14.781763] kasan_save_track+0x18/0x40 [ 14.782222] kasan_save_alloc_info+0x3b/0x50 [ 14.782712] __kasan_kmalloc+0xb7/0xc0 [ 14.783018] __kmalloc_cache_noprof+0x189/0x420 [ 14.783545] kasan_bitops_generic+0x92/0x1c0 [ 14.783799] kunit_try_run_case+0x1a5/0x480 [ 14.784217] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.784779] kthread+0x337/0x6f0 [ 14.784941] ret_from_fork+0x116/0x1d0 [ 14.785128] ret_from_fork_asm+0x1a/0x30 [ 14.785601] [ 14.785765] The buggy address belongs to the object at ffff888102676240 [ 14.785765] which belongs to the cache kmalloc-16 of size 16 [ 14.786723] The buggy address is located 8 bytes inside of [ 14.786723] allocated 9-byte region [ffff888102676240, ffff888102676249) [ 14.787635] [ 14.787862] The buggy address belongs to the physical page: [ 14.788383] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102676 [ 14.789059] flags: 0x200000000000000(node=0|zone=2) [ 14.789273] page_type: f5(slab) [ 14.789393] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.790233] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.791061] page dumped because: kasan: bad access detected [ 14.791408] [ 14.791498] Memory state around the buggy address: [ 14.791730] ffff888102676100: 00 06 fc fc 00 00 fc fc fa fb fc fc fa fb fc fc [ 14.792387] ffff888102676180: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.793035] >ffff888102676200: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 14.793536] ^ [ 14.794095] ffff888102676280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.794464] ffff888102676300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.795178] ================================================================== [ 14.671650] ================================================================== [ 14.671968] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 14.672252] Write of size 8 at addr ffff888102676248 by task kunit_try_catch/279 [ 14.672910] [ 14.673027] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.673071] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.673083] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.673104] Call Trace: [ 14.673119] <TASK> [ 14.673135] dump_stack_lvl+0x73/0xb0 [ 14.673165] print_report+0xd1/0x610 [ 14.673188] ? __virt_addr_valid+0x1db/0x2d0 [ 14.673212] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 14.673240] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.673266] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 14.673293] kasan_report+0x141/0x180 [ 14.673316] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 14.673349] kasan_check_range+0x10c/0x1c0 [ 14.673373] __kasan_check_write+0x18/0x20 [ 14.673393] kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 14.673432] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.673477] ? ret_from_fork_asm+0x1a/0x30 [ 14.673500] ? kthread+0x337/0x6f0 [ 14.673524] kasan_bitops_generic+0x116/0x1c0 [ 14.673549] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.673811] ? __pfx_read_tsc+0x10/0x10 [ 14.673834] ? ktime_get_ts64+0x86/0x230 [ 14.673861] kunit_try_run_case+0x1a5/0x480 [ 14.673887] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.673912] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.673938] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.673964] ? __kthread_parkme+0x82/0x180 [ 14.673985] ? preempt_count_sub+0x50/0x80 [ 14.674010] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.674035] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.674061] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.674088] kthread+0x337/0x6f0 [ 14.674107] ? trace_preempt_on+0x20/0xc0 [ 14.674131] ? __pfx_kthread+0x10/0x10 [ 14.674152] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.674174] ? calculate_sigpending+0x7b/0xa0 [ 14.674200] ? __pfx_kthread+0x10/0x10 [ 14.674222] ret_from_fork+0x116/0x1d0 [ 14.674241] ? __pfx_kthread+0x10/0x10 [ 14.674262] ret_from_fork_asm+0x1a/0x30 [ 14.674293] </TASK> [ 14.674303] [ 14.683016] Allocated by task 279: [ 14.683198] kasan_save_stack+0x45/0x70 [ 14.683400] kasan_save_track+0x18/0x40 [ 14.683667] kasan_save_alloc_info+0x3b/0x50 [ 14.683835] __kasan_kmalloc+0xb7/0xc0 [ 14.684017] __kmalloc_cache_noprof+0x189/0x420 [ 14.684173] kasan_bitops_generic+0x92/0x1c0 [ 14.684346] kunit_try_run_case+0x1a5/0x480 [ 14.684869] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.685141] kthread+0x337/0x6f0 [ 14.685304] ret_from_fork+0x116/0x1d0 [ 14.685527] ret_from_fork_asm+0x1a/0x30 [ 14.685775] [ 14.685867] The buggy address belongs to the object at ffff888102676240 [ 14.685867] which belongs to the cache kmalloc-16 of size 16 [ 14.686338] The buggy address is located 8 bytes inside of [ 14.686338] allocated 9-byte region [ffff888102676240, ffff888102676249) [ 14.686922] [ 14.687020] The buggy address belongs to the physical page: [ 14.687240] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102676 [ 14.687634] flags: 0x200000000000000(node=0|zone=2) [ 14.687935] page_type: f5(slab) [ 14.688089] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.688405] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.688757] page dumped because: kasan: bad access detected [ 14.688928] [ 14.688998] Memory state around the buggy address: [ 14.689150] ffff888102676100: 00 06 fc fc 00 00 fc fc fa fb fc fc fa fb fc fc [ 14.689505] ffff888102676180: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.690264] >ffff888102676200: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 14.690698] ^ [ 14.690960] ffff888102676280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.691174] ffff888102676300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.691383] ================================================================== [ 14.651695] ================================================================== [ 14.652129] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50 [ 14.652496] Write of size 8 at addr ffff888102676248 by task kunit_try_catch/279 [ 14.652769] [ 14.652911] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.652958] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.652970] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.652993] Call Trace: [ 14.653005] <TASK> [ 14.653023] dump_stack_lvl+0x73/0xb0 [ 14.653055] print_report+0xd1/0x610 [ 14.653078] ? __virt_addr_valid+0x1db/0x2d0 [ 14.653103] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 14.653131] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.653156] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 14.653183] kasan_report+0x141/0x180 [ 14.653205] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 14.653237] kasan_check_range+0x10c/0x1c0 [ 14.653262] __kasan_check_write+0x18/0x20 [ 14.653282] kasan_bitops_modify.constprop.0+0x101/0xd50 [ 14.653310] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.653339] ? ret_from_fork_asm+0x1a/0x30 [ 14.653363] ? kthread+0x337/0x6f0 [ 14.653389] kasan_bitops_generic+0x116/0x1c0 [ 14.653413] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.653439] ? __pfx_read_tsc+0x10/0x10 [ 14.653474] ? ktime_get_ts64+0x86/0x230 [ 14.653500] kunit_try_run_case+0x1a5/0x480 [ 14.653527] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.653552] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.653578] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.653604] ? __kthread_parkme+0x82/0x180 [ 14.653627] ? preempt_count_sub+0x50/0x80 [ 14.653653] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.653694] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.653719] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.653748] kthread+0x337/0x6f0 [ 14.653767] ? trace_preempt_on+0x20/0xc0 [ 14.653793] ? __pfx_kthread+0x10/0x10 [ 14.653815] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.653837] ? calculate_sigpending+0x7b/0xa0 [ 14.653863] ? __pfx_kthread+0x10/0x10 [ 14.653884] ret_from_fork+0x116/0x1d0 [ 14.653903] ? __pfx_kthread+0x10/0x10 [ 14.653924] ret_from_fork_asm+0x1a/0x30 [ 14.653955] </TASK> [ 14.653966] [ 14.662270] Allocated by task 279: [ 14.662417] kasan_save_stack+0x45/0x70 [ 14.662651] kasan_save_track+0x18/0x40 [ 14.662786] kasan_save_alloc_info+0x3b/0x50 [ 14.662935] __kasan_kmalloc+0xb7/0xc0 [ 14.663111] __kmalloc_cache_noprof+0x189/0x420 [ 14.663331] kasan_bitops_generic+0x92/0x1c0 [ 14.663613] kunit_try_run_case+0x1a5/0x480 [ 14.663761] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.664323] kthread+0x337/0x6f0 [ 14.664588] ret_from_fork+0x116/0x1d0 [ 14.665145] ret_from_fork_asm+0x1a/0x30 [ 14.665289] [ 14.665363] The buggy address belongs to the object at ffff888102676240 [ 14.665363] which belongs to the cache kmalloc-16 of size 16 [ 14.665729] The buggy address is located 8 bytes inside of [ 14.665729] allocated 9-byte region [ffff888102676240, ffff888102676249) [ 14.666575] [ 14.666672] The buggy address belongs to the physical page: [ 14.666926] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102676 [ 14.667279] flags: 0x200000000000000(node=0|zone=2) [ 14.667497] page_type: f5(slab) [ 14.667633] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.668180] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.668686] page dumped because: kasan: bad access detected [ 14.668868] [ 14.668937] Memory state around the buggy address: [ 14.669094] ffff888102676100: 00 06 fc fc 00 00 fc fc fa fb fc fc fa fb fc fc [ 14.669332] ffff888102676180: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.669943] >ffff888102676200: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 14.670273] ^ [ 14.670548] ffff888102676280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.670831] ffff888102676300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.671111] ================================================================== [ 14.795907] ================================================================== [ 14.796145] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 14.796407] Write of size 8 at addr ffff888102676248 by task kunit_try_catch/279 [ 14.796842] [ 14.797164] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.797212] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.797224] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.797245] Call Trace: [ 14.797260] <TASK> [ 14.797275] dump_stack_lvl+0x73/0xb0 [ 14.797305] print_report+0xd1/0x610 [ 14.797328] ? __virt_addr_valid+0x1db/0x2d0 [ 14.797350] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 14.797378] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.797401] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 14.797467] kasan_report+0x141/0x180 [ 14.797490] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 14.797533] kasan_check_range+0x10c/0x1c0 [ 14.797557] __kasan_check_write+0x18/0x20 [ 14.797577] kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 14.797605] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.797634] ? ret_from_fork_asm+0x1a/0x30 [ 14.797657] ? kthread+0x337/0x6f0 [ 14.797681] kasan_bitops_generic+0x116/0x1c0 [ 14.797705] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.797852] ? __pfx_read_tsc+0x10/0x10 [ 14.797881] ? ktime_get_ts64+0x86/0x230 [ 14.797907] kunit_try_run_case+0x1a5/0x480 [ 14.797957] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.797981] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.798007] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.798032] ? __kthread_parkme+0x82/0x180 [ 14.798053] ? preempt_count_sub+0x50/0x80 [ 14.798077] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.798102] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.798128] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.798154] kthread+0x337/0x6f0 [ 14.798173] ? trace_preempt_on+0x20/0xc0 [ 14.798196] ? __pfx_kthread+0x10/0x10 [ 14.798216] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.798238] ? calculate_sigpending+0x7b/0xa0 [ 14.798263] ? __pfx_kthread+0x10/0x10 [ 14.798285] ret_from_fork+0x116/0x1d0 [ 14.798303] ? __pfx_kthread+0x10/0x10 [ 14.798323] ret_from_fork_asm+0x1a/0x30 [ 14.798354] </TASK> [ 14.798364] [ 14.813777] Allocated by task 279: [ 14.813912] kasan_save_stack+0x45/0x70 [ 14.814054] kasan_save_track+0x18/0x40 [ 14.814186] kasan_save_alloc_info+0x3b/0x50 [ 14.814330] __kasan_kmalloc+0xb7/0xc0 [ 14.814516] __kmalloc_cache_noprof+0x189/0x420 [ 14.815026] kasan_bitops_generic+0x92/0x1c0 [ 14.815550] kunit_try_run_case+0x1a5/0x480 [ 14.816039] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.816758] kthread+0x337/0x6f0 [ 14.817172] ret_from_fork+0x116/0x1d0 [ 14.817575] ret_from_fork_asm+0x1a/0x30 [ 14.818091] [ 14.818286] The buggy address belongs to the object at ffff888102676240 [ 14.818286] which belongs to the cache kmalloc-16 of size 16 [ 14.819296] The buggy address is located 8 bytes inside of [ 14.819296] allocated 9-byte region [ffff888102676240, ffff888102676249) [ 14.820383] [ 14.820581] The buggy address belongs to the physical page: [ 14.821133] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102676 [ 14.821692] flags: 0x200000000000000(node=0|zone=2) [ 14.822138] page_type: f5(slab) [ 14.822373] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.823002] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.823233] page dumped because: kasan: bad access detected [ 14.823402] [ 14.823489] Memory state around the buggy address: [ 14.823738] ffff888102676100: 00 06 fc fc 00 00 fc fc fa fb fc fc fa fb fc fc [ 14.824164] ffff888102676180: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.824406] >ffff888102676200: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 14.825003] ^ [ 14.825320] ffff888102676280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.825726] ffff888102676300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.826205] ================================================================== [ 14.849840] ================================================================== [ 14.850133] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50 [ 14.850576] Write of size 8 at addr ffff888102676248 by task kunit_try_catch/279 [ 14.851110] [ 14.851229] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.851306] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.851318] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.851339] Call Trace: [ 14.851354] <TASK> [ 14.851379] dump_stack_lvl+0x73/0xb0 [ 14.851427] print_report+0xd1/0x610 [ 14.851458] ? __virt_addr_valid+0x1db/0x2d0 [ 14.851482] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 14.851509] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.851534] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 14.851567] kasan_report+0x141/0x180 [ 14.851590] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 14.851622] kasan_check_range+0x10c/0x1c0 [ 14.851645] __kasan_check_write+0x18/0x20 [ 14.851665] kasan_bitops_modify.constprop.0+0x547/0xd50 [ 14.851693] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.851722] ? ret_from_fork_asm+0x1a/0x30 [ 14.851745] ? kthread+0x337/0x6f0 [ 14.851768] kasan_bitops_generic+0x116/0x1c0 [ 14.851792] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.851818] ? __pfx_read_tsc+0x10/0x10 [ 14.851839] ? ktime_get_ts64+0x86/0x230 [ 14.851862] kunit_try_run_case+0x1a5/0x480 [ 14.851887] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.851910] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.851935] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.851959] ? __kthread_parkme+0x82/0x180 [ 14.851979] ? preempt_count_sub+0x50/0x80 [ 14.852003] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.852028] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.852054] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.852079] kthread+0x337/0x6f0 [ 14.852099] ? trace_preempt_on+0x20/0xc0 [ 14.852122] ? __pfx_kthread+0x10/0x10 [ 14.852143] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.852165] ? calculate_sigpending+0x7b/0xa0 [ 14.852189] ? __pfx_kthread+0x10/0x10 [ 14.852211] ret_from_fork+0x116/0x1d0 [ 14.852230] ? __pfx_kthread+0x10/0x10 [ 14.852251] ret_from_fork_asm+0x1a/0x30 [ 14.852286] </TASK> [ 14.852296] [ 14.861241] Allocated by task 279: [ 14.861465] kasan_save_stack+0x45/0x70 [ 14.861773] kasan_save_track+0x18/0x40 [ 14.861963] kasan_save_alloc_info+0x3b/0x50 [ 14.862141] __kasan_kmalloc+0xb7/0xc0 [ 14.862274] __kmalloc_cache_noprof+0x189/0x420 [ 14.862463] kasan_bitops_generic+0x92/0x1c0 [ 14.862769] kunit_try_run_case+0x1a5/0x480 [ 14.862985] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.863239] kthread+0x337/0x6f0 [ 14.863672] ret_from_fork+0x116/0x1d0 [ 14.863909] ret_from_fork_asm+0x1a/0x30 [ 14.864071] [ 14.864142] The buggy address belongs to the object at ffff888102676240 [ 14.864142] which belongs to the cache kmalloc-16 of size 16 [ 14.864776] The buggy address is located 8 bytes inside of [ 14.864776] allocated 9-byte region [ffff888102676240, ffff888102676249) [ 14.865365] [ 14.865489] The buggy address belongs to the physical page: [ 14.865781] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102676 [ 14.866086] flags: 0x200000000000000(node=0|zone=2) [ 14.866336] page_type: f5(slab) [ 14.866732] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.867077] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.867387] page dumped because: kasan: bad access detected [ 14.867740] [ 14.867815] Memory state around the buggy address: [ 14.867987] ffff888102676100: 00 06 fc fc 00 00 fc fc fa fb fc fc fa fb fc fc [ 14.868346] ffff888102676180: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.868792] >ffff888102676200: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 14.869106] ^ [ 14.869362] ffff888102676280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.869792] ffff888102676300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.870045] ================================================================== [ 14.691934] ================================================================== [ 14.692393] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 14.692771] Write of size 8 at addr ffff888102676248 by task kunit_try_catch/279 [ 14.693198] [ 14.693289] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.693332] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.693343] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.693364] Call Trace: [ 14.693380] <TASK> [ 14.693395] dump_stack_lvl+0x73/0xb0 [ 14.693427] print_report+0xd1/0x610 [ 14.693464] ? __virt_addr_valid+0x1db/0x2d0 [ 14.693488] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 14.693515] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.693540] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 14.693567] kasan_report+0x141/0x180 [ 14.693590] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 14.693622] kasan_check_range+0x10c/0x1c0 [ 14.693646] __kasan_check_write+0x18/0x20 [ 14.693666] kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 14.693694] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.693724] ? ret_from_fork_asm+0x1a/0x30 [ 14.693748] ? kthread+0x337/0x6f0 [ 14.693772] kasan_bitops_generic+0x116/0x1c0 [ 14.693797] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.693824] ? __pfx_read_tsc+0x10/0x10 [ 14.693846] ? ktime_get_ts64+0x86/0x230 [ 14.693871] kunit_try_run_case+0x1a5/0x480 [ 14.693896] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.693921] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.693945] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.693970] ? __kthread_parkme+0x82/0x180 [ 14.693992] ? preempt_count_sub+0x50/0x80 [ 14.694016] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.694041] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.694066] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.694092] kthread+0x337/0x6f0 [ 14.694112] ? trace_preempt_on+0x20/0xc0 [ 14.694136] ? __pfx_kthread+0x10/0x10 [ 14.694157] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.694179] ? calculate_sigpending+0x7b/0xa0 [ 14.694204] ? __pfx_kthread+0x10/0x10 [ 14.694226] ret_from_fork+0x116/0x1d0 [ 14.694341] ? __pfx_kthread+0x10/0x10 [ 14.694366] ret_from_fork_asm+0x1a/0x30 [ 14.694398] </TASK> [ 14.694408] [ 14.711993] Allocated by task 279: [ 14.712431] kasan_save_stack+0x45/0x70 [ 14.712949] kasan_save_track+0x18/0x40 [ 14.713099] kasan_save_alloc_info+0x3b/0x50 [ 14.713250] __kasan_kmalloc+0xb7/0xc0 [ 14.713382] __kmalloc_cache_noprof+0x189/0x420 [ 14.714241] kasan_bitops_generic+0x92/0x1c0 [ 14.714742] kunit_try_run_case+0x1a5/0x480 [ 14.715277] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.715915] kthread+0x337/0x6f0 [ 14.716352] ret_from_fork+0x116/0x1d0 [ 14.716763] ret_from_fork_asm+0x1a/0x30 [ 14.717233] [ 14.717395] The buggy address belongs to the object at ffff888102676240 [ 14.717395] which belongs to the cache kmalloc-16 of size 16 [ 14.718102] The buggy address is located 8 bytes inside of [ 14.718102] allocated 9-byte region [ffff888102676240, ffff888102676249) [ 14.719380] [ 14.719679] The buggy address belongs to the physical page: [ 14.720043] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102676 [ 14.720293] flags: 0x200000000000000(node=0|zone=2) [ 14.720494] page_type: f5(slab) [ 14.721037] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.721894] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.722725] page dumped because: kasan: bad access detected [ 14.723380] [ 14.723674] Memory state around the buggy address: [ 14.724021] ffff888102676100: 00 06 fc fc 00 00 fc fc fa fb fc fc fa fb fc fc [ 14.724241] ffff888102676180: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.724629] >ffff888102676200: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 14.725519] ^ [ 14.726116] ffff888102676280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.726894] ffff888102676300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.727397] ==================================================================
[ 14.889596] ================================================================== [ 14.890114] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50 [ 14.890662] Write of size 8 at addr ffff8881016acd88 by task kunit_try_catch/280 [ 14.891192] [ 14.891436] CPU: 0 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.891540] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.891554] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.891577] Call Trace: [ 14.891589] <TASK> [ 14.891604] dump_stack_lvl+0x73/0xb0 [ 14.891636] print_report+0xd1/0x610 [ 14.891661] ? __virt_addr_valid+0x1db/0x2d0 [ 14.891693] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 14.891721] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.891745] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 14.891775] kasan_report+0x141/0x180 [ 14.891798] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 14.891831] kasan_check_range+0x10c/0x1c0 [ 14.891855] __kasan_check_write+0x18/0x20 [ 14.891875] kasan_bitops_modify.constprop.0+0x101/0xd50 [ 14.891903] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.891933] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.891959] ? trace_hardirqs_on+0x37/0xe0 [ 14.891982] ? kasan_bitops_generic+0x92/0x1c0 [ 14.892012] kasan_bitops_generic+0x116/0x1c0 [ 14.892037] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.892076] ? __pfx_read_tsc+0x10/0x10 [ 14.892098] ? ktime_get_ts64+0x86/0x230 [ 14.892137] kunit_try_run_case+0x1a5/0x480 [ 14.892164] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.892188] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.892213] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.892238] ? __kthread_parkme+0x82/0x180 [ 14.892259] ? preempt_count_sub+0x50/0x80 [ 14.892283] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.892309] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.892334] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.892361] kthread+0x337/0x6f0 [ 14.892381] ? trace_preempt_on+0x20/0xc0 [ 14.892405] ? __pfx_kthread+0x10/0x10 [ 14.892425] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.892447] ? calculate_sigpending+0x7b/0xa0 [ 14.892472] ? __pfx_kthread+0x10/0x10 [ 14.892494] ret_from_fork+0x116/0x1d0 [ 14.892512] ? __pfx_kthread+0x10/0x10 [ 14.892534] ret_from_fork_asm+0x1a/0x30 [ 14.892566] </TASK> [ 14.892575] [ 14.904626] Allocated by task 280: [ 14.904919] kasan_save_stack+0x45/0x70 [ 14.905324] kasan_save_track+0x18/0x40 [ 14.905529] kasan_save_alloc_info+0x3b/0x50 [ 14.905726] __kasan_kmalloc+0xb7/0xc0 [ 14.905895] __kmalloc_cache_noprof+0x189/0x420 [ 14.906442] kasan_bitops_generic+0x92/0x1c0 [ 14.906654] kunit_try_run_case+0x1a5/0x480 [ 14.907012] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.907295] kthread+0x337/0x6f0 [ 14.907602] ret_from_fork+0x116/0x1d0 [ 14.907745] ret_from_fork_asm+0x1a/0x30 [ 14.907888] [ 14.907975] The buggy address belongs to the object at ffff8881016acd80 [ 14.907975] which belongs to the cache kmalloc-16 of size 16 [ 14.910265] The buggy address is located 8 bytes inside of [ 14.910265] allocated 9-byte region [ffff8881016acd80, ffff8881016acd89) [ 14.910639] [ 14.910721] The buggy address belongs to the physical page: [ 14.910900] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1016ac [ 14.911167] flags: 0x200000000000000(node=0|zone=2) [ 14.911336] page_type: f5(slab) [ 14.911458] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.911691] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.911918] page dumped because: kasan: bad access detected [ 14.913213] [ 14.913473] Memory state around the buggy address: [ 14.914477] ffff8881016acc80: 00 00 fc fc 00 04 fc fc 00 04 fc fc fa fb fc fc [ 14.915419] ffff8881016acd00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.916712] >ffff8881016acd80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.917714] ^ [ 14.918300] ffff8881016ace00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.919352] ffff8881016ace80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.920452] ================================================================== [ 15.034485] ================================================================== [ 15.034785] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 15.035205] Write of size 8 at addr ffff8881016acd88 by task kunit_try_catch/280 [ 15.035457] [ 15.035541] CPU: 0 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.035583] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.035595] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.035615] Call Trace: [ 15.035628] <TASK> [ 15.035641] dump_stack_lvl+0x73/0xb0 [ 15.035669] print_report+0xd1/0x610 [ 15.035691] ? __virt_addr_valid+0x1db/0x2d0 [ 15.035714] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 15.035742] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.035767] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 15.035795] kasan_report+0x141/0x180 [ 15.035818] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 15.035853] kasan_check_range+0x10c/0x1c0 [ 15.035879] __kasan_check_write+0x18/0x20 [ 15.035951] kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 15.035982] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 15.036010] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.036037] ? trace_hardirqs_on+0x37/0xe0 [ 15.036072] ? kasan_bitops_generic+0x92/0x1c0 [ 15.036101] kasan_bitops_generic+0x116/0x1c0 [ 15.036127] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 15.036153] ? __pfx_read_tsc+0x10/0x10 [ 15.036175] ? ktime_get_ts64+0x86/0x230 [ 15.036198] kunit_try_run_case+0x1a5/0x480 [ 15.036223] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.036246] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.036272] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.036296] ? __kthread_parkme+0x82/0x180 [ 15.036317] ? preempt_count_sub+0x50/0x80 [ 15.036460] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.036488] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.036514] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.036564] kthread+0x337/0x6f0 [ 15.036586] ? trace_preempt_on+0x20/0xc0 [ 15.036609] ? __pfx_kthread+0x10/0x10 [ 15.036630] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.036718] ? calculate_sigpending+0x7b/0xa0 [ 15.036743] ? __pfx_kthread+0x10/0x10 [ 15.036764] ret_from_fork+0x116/0x1d0 [ 15.036785] ? __pfx_kthread+0x10/0x10 [ 15.036806] ret_from_fork_asm+0x1a/0x30 [ 15.036838] </TASK> [ 15.036848] [ 15.045905] Allocated by task 280: [ 15.046135] kasan_save_stack+0x45/0x70 [ 15.046301] kasan_save_track+0x18/0x40 [ 15.046440] kasan_save_alloc_info+0x3b/0x50 [ 15.046593] __kasan_kmalloc+0xb7/0xc0 [ 15.046786] __kmalloc_cache_noprof+0x189/0x420 [ 15.047294] kasan_bitops_generic+0x92/0x1c0 [ 15.047521] kunit_try_run_case+0x1a5/0x480 [ 15.047761] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.047940] kthread+0x337/0x6f0 [ 15.048350] ret_from_fork+0x116/0x1d0 [ 15.048576] ret_from_fork_asm+0x1a/0x30 [ 15.048967] [ 15.049084] The buggy address belongs to the object at ffff8881016acd80 [ 15.049084] which belongs to the cache kmalloc-16 of size 16 [ 15.049494] The buggy address is located 8 bytes inside of [ 15.049494] allocated 9-byte region [ffff8881016acd80, ffff8881016acd89) [ 15.050166] [ 15.050243] The buggy address belongs to the physical page: [ 15.050560] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1016ac [ 15.050978] flags: 0x200000000000000(node=0|zone=2) [ 15.051188] page_type: f5(slab) [ 15.051372] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 15.051913] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 15.052314] page dumped because: kasan: bad access detected [ 15.052542] [ 15.052630] Memory state around the buggy address: [ 15.052881] ffff8881016acc80: 00 00 fc fc 00 04 fc fc 00 04 fc fc fa fb fc fc [ 15.053287] ffff8881016acd00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 15.053623] >ffff8881016acd80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.053929] ^ [ 15.054150] ffff8881016ace00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.054449] ffff8881016ace80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.054855] ================================================================== [ 14.951399] ================================================================== [ 14.951772] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 14.952386] Write of size 8 at addr ffff8881016acd88 by task kunit_try_catch/280 [ 14.952644] [ 14.952940] CPU: 0 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.952988] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.953000] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.953022] Call Trace: [ 14.953035] <TASK> [ 14.953063] dump_stack_lvl+0x73/0xb0 [ 14.953096] print_report+0xd1/0x610 [ 14.953118] ? __virt_addr_valid+0x1db/0x2d0 [ 14.953143] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 14.953171] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.953196] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 14.953224] kasan_report+0x141/0x180 [ 14.953246] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 14.953279] kasan_check_range+0x10c/0x1c0 [ 14.953302] __kasan_check_write+0x18/0x20 [ 14.953322] kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 14.953351] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.953380] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.953405] ? trace_hardirqs_on+0x37/0xe0 [ 14.953430] ? kasan_bitops_generic+0x92/0x1c0 [ 14.953459] kasan_bitops_generic+0x116/0x1c0 [ 14.953483] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.953510] ? __pfx_read_tsc+0x10/0x10 [ 14.953533] ? ktime_get_ts64+0x86/0x230 [ 14.953558] kunit_try_run_case+0x1a5/0x480 [ 14.953585] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.953609] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.953634] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.953733] ? __kthread_parkme+0x82/0x180 [ 14.953757] ? preempt_count_sub+0x50/0x80 [ 14.953783] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.953808] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.953834] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.953861] kthread+0x337/0x6f0 [ 14.953880] ? trace_preempt_on+0x20/0xc0 [ 14.953904] ? __pfx_kthread+0x10/0x10 [ 14.953925] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.953948] ? calculate_sigpending+0x7b/0xa0 [ 14.953974] ? __pfx_kthread+0x10/0x10 [ 14.953996] ret_from_fork+0x116/0x1d0 [ 14.954015] ? __pfx_kthread+0x10/0x10 [ 14.954036] ret_from_fork_asm+0x1a/0x30 [ 14.954081] </TASK> [ 14.954091] [ 14.962682] Allocated by task 280: [ 14.962978] kasan_save_stack+0x45/0x70 [ 14.963294] kasan_save_track+0x18/0x40 [ 14.963435] kasan_save_alloc_info+0x3b/0x50 [ 14.963584] __kasan_kmalloc+0xb7/0xc0 [ 14.963715] __kmalloc_cache_noprof+0x189/0x420 [ 14.963869] kasan_bitops_generic+0x92/0x1c0 [ 14.964095] kunit_try_run_case+0x1a5/0x480 [ 14.964719] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.964981] kthread+0x337/0x6f0 [ 14.965288] ret_from_fork+0x116/0x1d0 [ 14.965485] ret_from_fork_asm+0x1a/0x30 [ 14.965749] [ 14.965872] The buggy address belongs to the object at ffff8881016acd80 [ 14.965872] which belongs to the cache kmalloc-16 of size 16 [ 14.966260] The buggy address is located 8 bytes inside of [ 14.966260] allocated 9-byte region [ffff8881016acd80, ffff8881016acd89) [ 14.966956] [ 14.967128] The buggy address belongs to the physical page: [ 14.967405] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1016ac [ 14.967777] flags: 0x200000000000000(node=0|zone=2) [ 14.968133] page_type: f5(slab) [ 14.968298] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.968605] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.968884] page dumped because: kasan: bad access detected [ 14.969365] [ 14.969464] Memory state around the buggy address: [ 14.969711] ffff8881016acc80: 00 00 fc fc 00 04 fc fc 00 04 fc fc fa fb fc fc [ 14.969966] ffff8881016acd00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.970352] >ffff8881016acd80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.970693] ^ [ 14.970924] ffff8881016ace00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.971166] ffff8881016ace80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.971456] ================================================================== [ 14.921911] ================================================================== [ 14.922280] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 14.922723] Write of size 8 at addr ffff8881016acd88 by task kunit_try_catch/280 [ 14.923225] [ 14.923342] CPU: 0 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.923387] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.923400] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.923737] Call Trace: [ 14.923759] <TASK> [ 14.923777] dump_stack_lvl+0x73/0xb0 [ 14.923808] print_report+0xd1/0x610 [ 14.923832] ? __virt_addr_valid+0x1db/0x2d0 [ 14.923856] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 14.924042] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.924084] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 14.924112] kasan_report+0x141/0x180 [ 14.924146] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 14.924179] kasan_check_range+0x10c/0x1c0 [ 14.924203] __kasan_check_write+0x18/0x20 [ 14.924223] kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 14.924252] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.924282] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.924307] ? trace_hardirqs_on+0x37/0xe0 [ 14.924332] ? kasan_bitops_generic+0x92/0x1c0 [ 14.924360] kasan_bitops_generic+0x116/0x1c0 [ 14.924385] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.924412] ? __pfx_read_tsc+0x10/0x10 [ 14.924434] ? ktime_get_ts64+0x86/0x230 [ 14.924458] kunit_try_run_case+0x1a5/0x480 [ 14.924483] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.924507] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.924532] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.924557] ? __kthread_parkme+0x82/0x180 [ 14.924577] ? preempt_count_sub+0x50/0x80 [ 14.924603] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.924628] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.924664] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.924691] kthread+0x337/0x6f0 [ 14.924711] ? trace_preempt_on+0x20/0xc0 [ 14.924734] ? __pfx_kthread+0x10/0x10 [ 14.924755] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.924777] ? calculate_sigpending+0x7b/0xa0 [ 14.924802] ? __pfx_kthread+0x10/0x10 [ 14.924824] ret_from_fork+0x116/0x1d0 [ 14.924844] ? __pfx_kthread+0x10/0x10 [ 14.924865] ret_from_fork_asm+0x1a/0x30 [ 14.924897] </TASK> [ 14.924907] [ 14.937913] Allocated by task 280: [ 14.938050] kasan_save_stack+0x45/0x70 [ 14.938394] kasan_save_track+0x18/0x40 [ 14.938965] kasan_save_alloc_info+0x3b/0x50 [ 14.939298] __kasan_kmalloc+0xb7/0xc0 [ 14.939498] __kmalloc_cache_noprof+0x189/0x420 [ 14.939870] kasan_bitops_generic+0x92/0x1c0 [ 14.940096] kunit_try_run_case+0x1a5/0x480 [ 14.940558] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.941026] kthread+0x337/0x6f0 [ 14.941296] ret_from_fork+0x116/0x1d0 [ 14.941584] ret_from_fork_asm+0x1a/0x30 [ 14.941979] [ 14.942092] The buggy address belongs to the object at ffff8881016acd80 [ 14.942092] which belongs to the cache kmalloc-16 of size 16 [ 14.943003] The buggy address is located 8 bytes inside of [ 14.943003] allocated 9-byte region [ffff8881016acd80, ffff8881016acd89) [ 14.943791] [ 14.943897] The buggy address belongs to the physical page: [ 14.944423] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1016ac [ 14.944985] flags: 0x200000000000000(node=0|zone=2) [ 14.945362] page_type: f5(slab) [ 14.945622] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.945949] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.946487] page dumped because: kasan: bad access detected [ 14.947021] [ 14.947117] Memory state around the buggy address: [ 14.947618] ffff8881016acc80: 00 00 fc fc 00 04 fc fc 00 04 fc fc fa fb fc fc [ 14.948190] ffff8881016acd00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.948585] >ffff8881016acd80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.948998] ^ [ 14.949196] ffff8881016ace00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.949709] ffff8881016ace80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.950247] ================================================================== [ 15.013438] ================================================================== [ 15.013679] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 15.014801] Write of size 8 at addr ffff8881016acd88 by task kunit_try_catch/280 [ 15.015093] [ 15.015329] CPU: 0 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.015373] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.015408] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.015429] Call Trace: [ 15.015443] <TASK> [ 15.015457] dump_stack_lvl+0x73/0xb0 [ 15.015489] print_report+0xd1/0x610 [ 15.015511] ? __virt_addr_valid+0x1db/0x2d0 [ 15.015535] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 15.015562] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.015606] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 15.015634] kasan_report+0x141/0x180 [ 15.015657] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 15.015734] kasan_check_range+0x10c/0x1c0 [ 15.015781] __kasan_check_write+0x18/0x20 [ 15.015802] kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 15.015830] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 15.015859] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.015884] ? trace_hardirqs_on+0x37/0xe0 [ 15.015908] ? kasan_bitops_generic+0x92/0x1c0 [ 15.015955] kasan_bitops_generic+0x116/0x1c0 [ 15.015980] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 15.016007] ? __pfx_read_tsc+0x10/0x10 [ 15.016028] ? ktime_get_ts64+0x86/0x230 [ 15.016064] kunit_try_run_case+0x1a5/0x480 [ 15.016089] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.016113] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.016148] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.016173] ? __kthread_parkme+0x82/0x180 [ 15.016193] ? preempt_count_sub+0x50/0x80 [ 15.016218] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.016243] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.016268] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.016294] kthread+0x337/0x6f0 [ 15.016333] ? trace_preempt_on+0x20/0xc0 [ 15.016357] ? __pfx_kthread+0x10/0x10 [ 15.016378] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.016400] ? calculate_sigpending+0x7b/0xa0 [ 15.016423] ? __pfx_kthread+0x10/0x10 [ 15.016446] ret_from_fork+0x116/0x1d0 [ 15.016464] ? __pfx_kthread+0x10/0x10 [ 15.016485] ret_from_fork_asm+0x1a/0x30 [ 15.016517] </TASK> [ 15.016527] [ 15.025570] Allocated by task 280: [ 15.025782] kasan_save_stack+0x45/0x70 [ 15.026110] kasan_save_track+0x18/0x40 [ 15.026250] kasan_save_alloc_info+0x3b/0x50 [ 15.026397] __kasan_kmalloc+0xb7/0xc0 [ 15.026565] __kmalloc_cache_noprof+0x189/0x420 [ 15.026789] kasan_bitops_generic+0x92/0x1c0 [ 15.027033] kunit_try_run_case+0x1a5/0x480 [ 15.027186] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.027357] kthread+0x337/0x6f0 [ 15.027472] ret_from_fork+0x116/0x1d0 [ 15.027833] ret_from_fork_asm+0x1a/0x30 [ 15.028063] [ 15.028159] The buggy address belongs to the object at ffff8881016acd80 [ 15.028159] which belongs to the cache kmalloc-16 of size 16 [ 15.028979] The buggy address is located 8 bytes inside of [ 15.028979] allocated 9-byte region [ffff8881016acd80, ffff8881016acd89) [ 15.029568] [ 15.029715] The buggy address belongs to the physical page: [ 15.029947] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1016ac [ 15.030354] flags: 0x200000000000000(node=0|zone=2) [ 15.030526] page_type: f5(slab) [ 15.030646] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 15.030994] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 15.031417] page dumped because: kasan: bad access detected [ 15.031792] [ 15.031885] Memory state around the buggy address: [ 15.032041] ffff8881016acc80: 00 00 fc fc 00 04 fc fc 00 04 fc fc fa fb fc fc [ 15.032266] ffff8881016acd00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 15.032527] >ffff8881016acd80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.032948] ^ [ 15.033284] ffff8881016ace00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.033632] ffff8881016ace80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.034020] ================================================================== [ 14.972010] ================================================================== [ 14.972480] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 14.973030] Write of size 8 at addr ffff8881016acd88 by task kunit_try_catch/280 [ 14.973342] [ 14.973440] CPU: 0 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.973483] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.973494] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.973515] Call Trace: [ 14.973529] <TASK> [ 14.973543] dump_stack_lvl+0x73/0xb0 [ 14.973573] print_report+0xd1/0x610 [ 14.973597] ? __virt_addr_valid+0x1db/0x2d0 [ 14.973621] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 14.973694] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.973720] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 14.973749] kasan_report+0x141/0x180 [ 14.973772] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 14.973805] kasan_check_range+0x10c/0x1c0 [ 14.973830] __kasan_check_write+0x18/0x20 [ 14.973850] kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 14.973878] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.973907] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.973933] ? trace_hardirqs_on+0x37/0xe0 [ 14.974002] ? kasan_bitops_generic+0x92/0x1c0 [ 14.974031] kasan_bitops_generic+0x116/0x1c0 [ 14.974069] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.974096] ? __pfx_read_tsc+0x10/0x10 [ 14.974118] ? ktime_get_ts64+0x86/0x230 [ 14.974143] kunit_try_run_case+0x1a5/0x480 [ 14.974167] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.974191] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.974216] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.974241] ? __kthread_parkme+0x82/0x180 [ 14.974263] ? preempt_count_sub+0x50/0x80 [ 14.974288] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.974313] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.974348] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.974374] kthread+0x337/0x6f0 [ 14.974395] ? trace_preempt_on+0x20/0xc0 [ 14.974418] ? __pfx_kthread+0x10/0x10 [ 14.974440] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.974462] ? calculate_sigpending+0x7b/0xa0 [ 14.974487] ? __pfx_kthread+0x10/0x10 [ 14.974510] ret_from_fork+0x116/0x1d0 [ 14.974530] ? __pfx_kthread+0x10/0x10 [ 14.974551] ret_from_fork_asm+0x1a/0x30 [ 14.974584] </TASK> [ 14.974593] [ 14.983645] Allocated by task 280: [ 14.983935] kasan_save_stack+0x45/0x70 [ 14.984182] kasan_save_track+0x18/0x40 [ 14.984337] kasan_save_alloc_info+0x3b/0x50 [ 14.984552] __kasan_kmalloc+0xb7/0xc0 [ 14.984767] __kmalloc_cache_noprof+0x189/0x420 [ 14.984925] kasan_bitops_generic+0x92/0x1c0 [ 14.985086] kunit_try_run_case+0x1a5/0x480 [ 14.985271] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.985763] kthread+0x337/0x6f0 [ 14.986153] ret_from_fork+0x116/0x1d0 [ 14.986366] ret_from_fork_asm+0x1a/0x30 [ 14.986545] [ 14.986734] The buggy address belongs to the object at ffff8881016acd80 [ 14.986734] which belongs to the cache kmalloc-16 of size 16 [ 14.987157] The buggy address is located 8 bytes inside of [ 14.987157] allocated 9-byte region [ffff8881016acd80, ffff8881016acd89) [ 14.987806] [ 14.987928] The buggy address belongs to the physical page: [ 14.988233] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1016ac [ 14.988584] flags: 0x200000000000000(node=0|zone=2) [ 14.988889] page_type: f5(slab) [ 14.989015] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.989308] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.989666] page dumped because: kasan: bad access detected [ 14.989851] [ 14.989920] Memory state around the buggy address: [ 14.990083] ffff8881016acc80: 00 00 fc fc 00 04 fc fc 00 04 fc fc fa fb fc fc [ 14.990579] ffff8881016acd00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.991263] >ffff8881016acd80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.991567] ^ [ 14.991839] ffff8881016ace00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.992076] ffff8881016ace80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.992729] ================================================================== [ 14.993200] ================================================================== [ 14.993533] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50 [ 14.993809] Write of size 8 at addr ffff8881016acd88 by task kunit_try_catch/280 [ 14.994364] [ 14.994483] CPU: 0 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.994525] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.994537] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.994557] Call Trace: [ 14.994572] <TASK> [ 14.994586] dump_stack_lvl+0x73/0xb0 [ 14.994617] print_report+0xd1/0x610 [ 14.994692] ? __virt_addr_valid+0x1db/0x2d0 [ 14.994724] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 14.994752] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.994776] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 14.994805] kasan_report+0x141/0x180 [ 14.994827] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 14.994859] kasan_check_range+0x10c/0x1c0 [ 14.994884] __kasan_check_write+0x18/0x20 [ 14.994904] kasan_bitops_modify.constprop.0+0x373/0xd50 [ 14.994932] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.994961] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.994986] ? trace_hardirqs_on+0x37/0xe0 [ 14.995008] ? kasan_bitops_generic+0x92/0x1c0 [ 14.995037] kasan_bitops_generic+0x116/0x1c0 [ 14.995074] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.995101] ? __pfx_read_tsc+0x10/0x10 [ 14.995144] ? ktime_get_ts64+0x86/0x230 [ 14.995169] kunit_try_run_case+0x1a5/0x480 [ 14.995194] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.995217] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.995243] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.995267] ? __kthread_parkme+0x82/0x180 [ 14.995288] ? preempt_count_sub+0x50/0x80 [ 14.995313] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.995338] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.995364] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.995391] kthread+0x337/0x6f0 [ 14.995412] ? trace_preempt_on+0x20/0xc0 [ 14.995436] ? __pfx_kthread+0x10/0x10 [ 14.995457] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.995479] ? calculate_sigpending+0x7b/0xa0 [ 14.995504] ? __pfx_kthread+0x10/0x10 [ 14.995525] ret_from_fork+0x116/0x1d0 [ 14.995545] ? __pfx_kthread+0x10/0x10 [ 14.995567] ret_from_fork_asm+0x1a/0x30 [ 14.995599] </TASK> [ 14.995608] [ 15.004445] Allocated by task 280: [ 15.004577] kasan_save_stack+0x45/0x70 [ 15.005046] kasan_save_track+0x18/0x40 [ 15.005295] kasan_save_alloc_info+0x3b/0x50 [ 15.005511] __kasan_kmalloc+0xb7/0xc0 [ 15.005694] __kmalloc_cache_noprof+0x189/0x420 [ 15.005947] kasan_bitops_generic+0x92/0x1c0 [ 15.006331] kunit_try_run_case+0x1a5/0x480 [ 15.006499] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.006815] kthread+0x337/0x6f0 [ 15.006959] ret_from_fork+0x116/0x1d0 [ 15.007105] ret_from_fork_asm+0x1a/0x30 [ 15.007340] [ 15.007433] The buggy address belongs to the object at ffff8881016acd80 [ 15.007433] which belongs to the cache kmalloc-16 of size 16 [ 15.007900] The buggy address is located 8 bytes inside of [ 15.007900] allocated 9-byte region [ffff8881016acd80, ffff8881016acd89) [ 15.008482] [ 15.008555] The buggy address belongs to the physical page: [ 15.008839] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1016ac [ 15.009334] flags: 0x200000000000000(node=0|zone=2) [ 15.009567] page_type: f5(slab) [ 15.009920] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 15.010172] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 15.010587] page dumped because: kasan: bad access detected [ 15.010830] [ 15.010900] Memory state around the buggy address: [ 15.011107] ffff8881016acc80: 00 00 fc fc 00 04 fc fc 00 04 fc fc fa fb fc fc [ 15.011420] ffff8881016acd00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 15.011712] >ffff8881016acd80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.011992] ^ [ 15.012199] ffff8881016ace00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.012525] ffff8881016ace80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.012892] ================================================================== [ 15.055330] ================================================================== [ 15.055711] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50 [ 15.056069] Write of size 8 at addr ffff8881016acd88 by task kunit_try_catch/280 [ 15.056463] [ 15.056600] CPU: 0 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 15.056644] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.056945] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.056969] Call Trace: [ 15.056985] <TASK> [ 15.056999] dump_stack_lvl+0x73/0xb0 [ 15.057031] print_report+0xd1/0x610 [ 15.057069] ? __virt_addr_valid+0x1db/0x2d0 [ 15.057113] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 15.057140] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.057164] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 15.057192] kasan_report+0x141/0x180 [ 15.057214] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 15.057247] kasan_check_range+0x10c/0x1c0 [ 15.057271] __kasan_check_write+0x18/0x20 [ 15.057291] kasan_bitops_modify.constprop.0+0x547/0xd50 [ 15.057319] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 15.057347] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.057372] ? trace_hardirqs_on+0x37/0xe0 [ 15.057395] ? kasan_bitops_generic+0x92/0x1c0 [ 15.057423] kasan_bitops_generic+0x116/0x1c0 [ 15.057447] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 15.057474] ? __pfx_read_tsc+0x10/0x10 [ 15.057495] ? ktime_get_ts64+0x86/0x230 [ 15.057520] kunit_try_run_case+0x1a5/0x480 [ 15.057544] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.057569] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.057595] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.057619] ? __kthread_parkme+0x82/0x180 [ 15.057640] ? preempt_count_sub+0x50/0x80 [ 15.057665] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.057710] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.057736] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.057762] kthread+0x337/0x6f0 [ 15.057781] ? trace_preempt_on+0x20/0xc0 [ 15.057870] ? __pfx_kthread+0x10/0x10 [ 15.057892] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.057914] ? calculate_sigpending+0x7b/0xa0 [ 15.057939] ? __pfx_kthread+0x10/0x10 [ 15.057960] ret_from_fork+0x116/0x1d0 [ 15.057981] ? __pfx_kthread+0x10/0x10 [ 15.058002] ret_from_fork_asm+0x1a/0x30 [ 15.058034] </TASK> [ 15.058043] [ 15.067513] Allocated by task 280: [ 15.067739] kasan_save_stack+0x45/0x70 [ 15.067925] kasan_save_track+0x18/0x40 [ 15.068105] kasan_save_alloc_info+0x3b/0x50 [ 15.068355] __kasan_kmalloc+0xb7/0xc0 [ 15.068530] __kmalloc_cache_noprof+0x189/0x420 [ 15.068740] kasan_bitops_generic+0x92/0x1c0 [ 15.068894] kunit_try_run_case+0x1a5/0x480 [ 15.069041] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.069334] kthread+0x337/0x6f0 [ 15.069507] ret_from_fork+0x116/0x1d0 [ 15.069695] ret_from_fork_asm+0x1a/0x30 [ 15.069853] [ 15.069924] The buggy address belongs to the object at ffff8881016acd80 [ 15.069924] which belongs to the cache kmalloc-16 of size 16 [ 15.070850] The buggy address is located 8 bytes inside of [ 15.070850] allocated 9-byte region [ffff8881016acd80, ffff8881016acd89) [ 15.071396] [ 15.071538] The buggy address belongs to the physical page: [ 15.071773] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1016ac [ 15.072156] flags: 0x200000000000000(node=0|zone=2) [ 15.072417] page_type: f5(slab) [ 15.072573] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 15.073005] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 15.073315] page dumped because: kasan: bad access detected [ 15.073485] [ 15.073554] Memory state around the buggy address: [ 15.073794] ffff8881016acc80: 00 00 fc fc 00 04 fc fc 00 04 fc fc fa fb fc fc [ 15.074121] ffff8881016acd00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 15.074497] >ffff8881016acd80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.074845] ^ [ 15.074996] ffff8881016ace00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.075537] ffff8881016ace80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.075884] ==================================================================