Date
July 20, 2025, 11:12 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 18.871377] ================================================================== [ 18.871429] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbc0 [ 18.871489] Read of size 8 at addr fff00000c59ab9a8 by task kunit_try_catch/261 [ 18.871574] [ 18.871704] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 18.871840] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.871868] Hardware name: linux,dummy-virt (DT) [ 18.871926] Call trace: [ 18.871949] show_stack+0x20/0x38 (C) [ 18.872002] dump_stack_lvl+0x8c/0xd0 [ 18.872148] print_report+0x118/0x5d0 [ 18.872323] kasan_report+0xdc/0x128 [ 18.872402] __asan_report_load8_noabort+0x20/0x30 [ 18.872568] kasan_bitops_modify.constprop.0+0xa80/0xbc0 [ 18.872812] kasan_bitops_generic+0x110/0x1c8 [ 18.873100] kunit_try_run_case+0x170/0x3f0 [ 18.873153] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.873210] kthread+0x328/0x630 [ 18.873499] ret_from_fork+0x10/0x20 [ 18.873643] [ 18.873663] Allocated by task 261: [ 18.873693] kasan_save_stack+0x3c/0x68 [ 18.873735] kasan_save_track+0x20/0x40 [ 18.873828] kasan_save_alloc_info+0x40/0x58 [ 18.873875] __kasan_kmalloc+0xd4/0xd8 [ 18.873934] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.873977] kasan_bitops_generic+0xa0/0x1c8 [ 18.874044] kunit_try_run_case+0x170/0x3f0 [ 18.874085] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.874367] kthread+0x328/0x630 [ 18.874559] ret_from_fork+0x10/0x20 [ 18.874656] [ 18.874794] The buggy address belongs to the object at fff00000c59ab9a0 [ 18.874794] which belongs to the cache kmalloc-16 of size 16 [ 18.874883] The buggy address is located 8 bytes inside of [ 18.874883] allocated 9-byte region [fff00000c59ab9a0, fff00000c59ab9a9) [ 18.875128] [ 18.875159] The buggy address belongs to the physical page: [ 18.875190] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059ab [ 18.875286] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.875374] page_type: f5(slab) [ 18.875537] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 18.875654] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 18.875725] page dumped because: kasan: bad access detected [ 18.875799] [ 18.875860] Memory state around the buggy address: [ 18.875893] fff00000c59ab880: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 18.876293] fff00000c59ab900: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 18.876348] >fff00000c59ab980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 18.876634] ^ [ 18.876691] fff00000c59aba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.876738] fff00000c59aba80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.876877] ================================================================== [ 18.861329] ================================================================== [ 18.861381] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 18.861434] Read of size 8 at addr fff00000c59ab9a8 by task kunit_try_catch/261 [ 18.861484] [ 18.861526] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 18.861757] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.861856] Hardware name: linux,dummy-virt (DT) [ 18.861889] Call trace: [ 18.861921] show_stack+0x20/0x38 (C) [ 18.861971] dump_stack_lvl+0x8c/0xd0 [ 18.862020] print_report+0x118/0x5d0 [ 18.862068] kasan_report+0xdc/0x128 [ 18.862555] __asan_report_load8_noabort+0x20/0x30 [ 18.862609] kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 18.862670] kasan_bitops_generic+0x110/0x1c8 [ 18.862723] kunit_try_run_case+0x170/0x3f0 [ 18.862774] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.862831] kthread+0x328/0x630 [ 18.862875] ret_from_fork+0x10/0x20 [ 18.863164] [ 18.863185] Allocated by task 261: [ 18.863215] kasan_save_stack+0x3c/0x68 [ 18.863436] kasan_save_track+0x20/0x40 [ 18.863499] kasan_save_alloc_info+0x40/0x58 [ 18.863612] __kasan_kmalloc+0xd4/0xd8 [ 18.863702] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.863765] kasan_bitops_generic+0xa0/0x1c8 [ 18.863856] kunit_try_run_case+0x170/0x3f0 [ 18.864149] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.864205] kthread+0x328/0x630 [ 18.864287] ret_from_fork+0x10/0x20 [ 18.864392] [ 18.864443] The buggy address belongs to the object at fff00000c59ab9a0 [ 18.864443] which belongs to the cache kmalloc-16 of size 16 [ 18.864516] The buggy address is located 8 bytes inside of [ 18.864516] allocated 9-byte region [fff00000c59ab9a0, fff00000c59ab9a9) [ 18.864676] [ 18.864704] The buggy address belongs to the physical page: [ 18.864735] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059ab [ 18.864807] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.864913] page_type: f5(slab) [ 18.864956] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 18.865010] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 18.865054] page dumped because: kasan: bad access detected [ 18.865095] [ 18.865114] Memory state around the buggy address: [ 18.865148] fff00000c59ab880: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 18.865507] fff00000c59ab900: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 18.865625] >fff00000c59ab980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 18.865694] ^ [ 18.865731] fff00000c59aba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.865806] fff00000c59aba80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.865848] ================================================================== [ 18.884442] ================================================================== [ 18.884713] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc0 [ 18.884769] Write of size 8 at addr fff00000c59ab9a8 by task kunit_try_catch/261 [ 18.884822] [ 18.884851] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 18.884955] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.885103] Hardware name: linux,dummy-virt (DT) [ 18.885263] Call trace: [ 18.885347] show_stack+0x20/0x38 (C) [ 18.885440] dump_stack_lvl+0x8c/0xd0 [ 18.885665] print_report+0x118/0x5d0 [ 18.885775] kasan_report+0xdc/0x128 [ 18.885874] kasan_check_range+0x100/0x1a8 [ 18.886195] __kasan_check_write+0x20/0x30 [ 18.886470] kasan_bitops_modify.constprop.0+0x320/0xbc0 [ 18.886567] kasan_bitops_generic+0x110/0x1c8 [ 18.886619] kunit_try_run_case+0x170/0x3f0 [ 18.886950] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.887085] kthread+0x328/0x630 [ 18.887133] ret_from_fork+0x10/0x20 [ 18.887223] [ 18.887244] Allocated by task 261: [ 18.887356] kasan_save_stack+0x3c/0x68 [ 18.887399] kasan_save_track+0x20/0x40 [ 18.887439] kasan_save_alloc_info+0x40/0x58 [ 18.887482] __kasan_kmalloc+0xd4/0xd8 [ 18.887774] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.887822] kasan_bitops_generic+0xa0/0x1c8 [ 18.887928] kunit_try_run_case+0x170/0x3f0 [ 18.887990] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.888084] kthread+0x328/0x630 [ 18.888186] ret_from_fork+0x10/0x20 [ 18.888223] [ 18.888254] The buggy address belongs to the object at fff00000c59ab9a0 [ 18.888254] which belongs to the cache kmalloc-16 of size 16 [ 18.888332] The buggy address is located 8 bytes inside of [ 18.888332] allocated 9-byte region [fff00000c59ab9a0, fff00000c59ab9a9) [ 18.888451] [ 18.888474] The buggy address belongs to the physical page: [ 18.888508] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059ab [ 18.888712] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.888982] page_type: f5(slab) [ 18.889085] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 18.889170] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 18.889349] fff00000c59ab900: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 18.891030] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaec/0xbc0 [ 18.892618] kasan_bitops_modify.constprop.0+0xaec/0xbc0 [ 18.893069] kasan_save_track+0x20/0x40 [ 18.894125] [ 18.894343] The buggy address is located 8 bytes inside of [ 18.894343] allocated 9-byte region [fff00000c59ab9a0, fff00000c59ab9a9) [ 18.895117] page dumped because: kasan: bad access detected [ 18.895916] ^ [ 18.896581] Write of size 8 at addr fff00000c59ab9a8 by task kunit_try_catch/261 [ 18.898572] kasan_bitops_modify.constprop.0+0x344/0xbc0 [ 18.900105] kthread+0x328/0x630 [ 18.900578] The buggy address belongs to the physical page: [ 18.901333] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 18.902017] fff00000c59ab900: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 18.903205] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc0 [ 18.903827] Hardware name: linux,dummy-virt (DT) [ 18.904863] kasan_check_range+0x100/0x1a8 [ 18.905960] [ 18.906151] kasan_save_stack+0x3c/0x68 [ 18.906716] kthread+0x328/0x630 [ 18.907494] The buggy address is located 8 bytes inside of [ 18.907494] allocated 9-byte region [fff00000c59ab9a0, fff00000c59ab9a9) [ 18.908361] [ 18.908992] >fff00000c59ab980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 18.909727] fff00000c59aba80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.916371] [ 18.916488] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.918613] dump_stack_lvl+0x8c/0xd0 [ 18.922570] kasan_save_stack+0x3c/0x68 [ 18.927348] The buggy address is located 8 bytes inside of [ 18.927348] allocated 9-byte region [fff00000c59ab9a0, fff00000c59ab9a9) [ 18.932678] >fff00000c59ab980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 18.933854] fff00000c59aba80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.934289] ================================================================== [ 18.877597] ================================================================== [ 18.877650] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc0 [ 18.877702] Write of size 8 at addr fff00000c59ab9a8 by task kunit_try_catch/261 [ 18.877756] [ 18.877828] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 18.878060] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.878245] Hardware name: linux,dummy-virt (DT) [ 18.878286] Call trace: [ 18.878345] show_stack+0x20/0x38 (C) [ 18.878398] dump_stack_lvl+0x8c/0xd0 [ 18.878743] print_report+0x118/0x5d0 [ 18.878862] kasan_report+0xdc/0x128 [ 18.878979] kasan_check_range+0x100/0x1a8 [ 18.879029] __kasan_check_write+0x20/0x30 [ 18.879075] kasan_bitops_modify.constprop.0+0x2b4/0xbc0 [ 18.879452] kasan_bitops_generic+0x110/0x1c8 [ 18.879546] kunit_try_run_case+0x170/0x3f0 [ 18.879646] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.879704] kthread+0x328/0x630 [ 18.879847] ret_from_fork+0x10/0x20 [ 18.880084] [ 18.880178] Allocated by task 261: [ 18.880212] kasan_save_stack+0x3c/0x68 [ 18.880556] kasan_save_track+0x20/0x40 [ 18.880638] kasan_save_alloc_info+0x40/0x58 [ 18.880740] __kasan_kmalloc+0xd4/0xd8 [ 18.880823] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.880865] kasan_bitops_generic+0xa0/0x1c8 [ 18.881072] kunit_try_run_case+0x170/0x3f0 [ 18.881118] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.881165] kthread+0x328/0x630 [ 18.881387] ret_from_fork+0x10/0x20 [ 18.881429] [ 18.881492] The buggy address belongs to the object at fff00000c59ab9a0 [ 18.881492] which belongs to the cache kmalloc-16 of size 16 [ 18.881852] The buggy address is located 8 bytes inside of [ 18.881852] allocated 9-byte region [fff00000c59ab9a0, fff00000c59ab9a9) [ 18.881966] [ 18.881988] The buggy address belongs to the physical page: [ 18.882021] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059ab [ 18.882101] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.882151] page_type: f5(slab) [ 18.882482] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 18.882674] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 18.882973] page dumped because: kasan: bad access detected [ 18.883022] [ 18.883042] Memory state around the buggy address: [ 18.883076] fff00000c59ab880: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 18.883124] fff00000c59ab900: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 18.883286] >fff00000c59ab980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 18.883487] ^ [ 18.883566] fff00000c59aba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.883651] fff00000c59aba80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.883691] ================================================================== [ 18.855404] ================================================================== [ 18.855466] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 18.855518] Write of size 8 at addr fff00000c59ab9a8 by task kunit_try_catch/261 [ 18.855570] [ 18.855601] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 18.855687] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.855925] Hardware name: linux,dummy-virt (DT) [ 18.855970] Call trace: [ 18.855995] show_stack+0x20/0x38 (C) [ 18.856047] dump_stack_lvl+0x8c/0xd0 [ 18.856365] print_report+0x118/0x5d0 [ 18.856477] kasan_report+0xdc/0x128 [ 18.856775] kasan_check_range+0x100/0x1a8 [ 18.856942] __kasan_check_write+0x20/0x30 [ 18.857175] kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 18.857236] kasan_bitops_generic+0x110/0x1c8 [ 18.857345] kunit_try_run_case+0x170/0x3f0 [ 18.857467] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.857523] kthread+0x328/0x630 [ 18.857566] ret_from_fork+0x10/0x20 [ 18.857621] [ 18.857643] Allocated by task 261: [ 18.857683] kasan_save_stack+0x3c/0x68 [ 18.857728] kasan_save_track+0x20/0x40 [ 18.857767] kasan_save_alloc_info+0x40/0x58 [ 18.857882] __kasan_kmalloc+0xd4/0xd8 [ 18.857932] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.858014] kasan_bitops_generic+0xa0/0x1c8 [ 18.858231] kunit_try_run_case+0x170/0x3f0 [ 18.858309] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.858356] kthread+0x328/0x630 [ 18.858509] ret_from_fork+0x10/0x20 [ 18.858554] [ 18.858647] The buggy address belongs to the object at fff00000c59ab9a0 [ 18.858647] which belongs to the cache kmalloc-16 of size 16 [ 18.858714] The buggy address is located 8 bytes inside of [ 18.858714] allocated 9-byte region [fff00000c59ab9a0, fff00000c59ab9a9) [ 18.858820] [ 18.858907] The buggy address belongs to the physical page: [ 18.858958] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059ab [ 18.859045] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.859149] page_type: f5(slab) [ 18.859260] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 18.859331] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 18.859529] page dumped because: kasan: bad access detected [ 18.859589] [ 18.859609] Memory state around the buggy address: [ 18.859654] fff00000c59ab880: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 18.859701] fff00000c59ab900: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 18.859748] >fff00000c59ab980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 18.859789] ^ [ 18.860100] fff00000c59aba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.860243] fff00000c59aba80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.860352] ================================================================== [ 18.866456] ================================================================== [ 18.866518] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc0 [ 18.866711] Write of size 8 at addr fff00000c59ab9a8 by task kunit_try_catch/261 [ 18.866764] [ 18.866812] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 18.867010] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.867109] Hardware name: linux,dummy-virt (DT) [ 18.867144] Call trace: [ 18.867169] show_stack+0x20/0x38 (C) [ 18.867220] dump_stack_lvl+0x8c/0xd0 [ 18.867268] print_report+0x118/0x5d0 [ 18.867314] kasan_report+0xdc/0x128 [ 18.867362] kasan_check_range+0x100/0x1a8 [ 18.867413] __kasan_check_write+0x20/0x30 [ 18.867460] kasan_bitops_modify.constprop.0+0x1dc/0xbc0 [ 18.867512] kasan_bitops_generic+0x110/0x1c8 [ 18.867561] kunit_try_run_case+0x170/0x3f0 [ 18.867612] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.867667] kthread+0x328/0x630 [ 18.867712] ret_from_fork+0x10/0x20 [ 18.867762] [ 18.867789] Allocated by task 261: [ 18.867912] kasan_save_stack+0x3c/0x68 [ 18.867955] kasan_save_track+0x20/0x40 [ 18.867994] kasan_save_alloc_info+0x40/0x58 [ 18.868038] __kasan_kmalloc+0xd4/0xd8 [ 18.868079] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.868123] kasan_bitops_generic+0xa0/0x1c8 [ 18.868163] kunit_try_run_case+0x170/0x3f0 [ 18.868287] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.868528] kthread+0x328/0x630 [ 18.868568] ret_from_fork+0x10/0x20 [ 18.868861] [ 18.868995] The buggy address belongs to the object at fff00000c59ab9a0 [ 18.868995] which belongs to the cache kmalloc-16 of size 16 [ 18.869260] The buggy address is located 8 bytes inside of [ 18.869260] allocated 9-byte region [fff00000c59ab9a0, fff00000c59ab9a9) [ 18.869395] [ 18.869458] The buggy address belongs to the physical page: [ 18.869509] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059ab [ 18.869611] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.869661] page_type: f5(slab) [ 18.869700] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 18.869755] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 18.870111] page dumped because: kasan: bad access detected [ 18.870152] [ 18.870192] Memory state around the buggy address: [ 18.870297] fff00000c59ab880: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 18.870373] fff00000c59ab900: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 18.870418] >fff00000c59ab980: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 18.870460] ^ [ 18.870494] fff00000c59aba00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.870540] fff00000c59aba80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.870615] ==================================================================
[ 19.118866] ================================================================== [ 19.118921] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 19.118977] Read of size 8 at addr fff00000c1375bc8 by task kunit_try_catch/261 [ 19.119030] [ 19.119063] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 19.119174] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.119214] Hardware name: linux,dummy-virt (DT) [ 19.119247] Call trace: [ 19.119270] show_stack+0x20/0x38 (C) [ 19.119323] dump_stack_lvl+0x8c/0xd0 [ 19.119375] print_report+0x118/0x5d0 [ 19.119425] kasan_report+0xdc/0x128 [ 19.119473] __asan_report_load8_noabort+0x20/0x30 [ 19.119527] kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 19.119582] kasan_bitops_generic+0x110/0x1c8 [ 19.119646] kunit_try_run_case+0x170/0x3f0 [ 19.119696] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.119751] kthread+0x328/0x630 [ 19.119796] ret_from_fork+0x10/0x20 [ 19.119847] [ 19.119867] Allocated by task 261: [ 19.119900] kasan_save_stack+0x3c/0x68 [ 19.119943] kasan_save_track+0x20/0x40 [ 19.119984] kasan_save_alloc_info+0x40/0x58 [ 19.120025] __kasan_kmalloc+0xd4/0xd8 [ 19.120065] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.120108] kasan_bitops_generic+0xa0/0x1c8 [ 19.120176] kunit_try_run_case+0x170/0x3f0 [ 19.120334] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.120381] kthread+0x328/0x630 [ 19.120417] ret_from_fork+0x10/0x20 [ 19.120467] [ 19.120490] The buggy address belongs to the object at fff00000c1375bc0 [ 19.120490] which belongs to the cache kmalloc-16 of size 16 [ 19.120575] The buggy address is located 8 bytes inside of [ 19.120575] allocated 9-byte region [fff00000c1375bc0, fff00000c1375bc9) [ 19.120662] [ 19.120691] The buggy address belongs to the physical page: [ 19.120725] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101375 [ 19.120800] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.120851] page_type: f5(slab) [ 19.120891] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 19.120990] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 19.121036] page dumped because: kasan: bad access detected [ 19.121070] [ 19.121092] Memory state around the buggy address: [ 19.121126] fff00000c1375a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 19.121201] fff00000c1375b00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 19.121326] >fff00000c1375b80: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 19.121397] ^ [ 19.121483] fff00000c1375c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.121590] fff00000c1375c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.121663] ================================================================== [ 19.129863] ================================================================== [ 19.129912] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc0 [ 19.129958] Write of size 8 at addr fff00000c1375bc8 by task kunit_try_catch/261 [ 19.130010] [ 19.130039] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 19.130123] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.130152] Hardware name: linux,dummy-virt (DT) [ 19.130186] Call trace: [ 19.130209] show_stack+0x20/0x38 (C) [ 19.130260] dump_stack_lvl+0x8c/0xd0 [ 19.130311] print_report+0x118/0x5d0 [ 19.130360] kasan_report+0xdc/0x128 [ 19.130408] kasan_check_range+0x100/0x1a8 [ 19.130458] __kasan_check_write+0x20/0x30 [ 19.130506] kasan_bitops_modify.constprop.0+0x2b4/0xbc0 [ 19.130558] kasan_bitops_generic+0x110/0x1c8 [ 19.130606] kunit_try_run_case+0x170/0x3f0 [ 19.130796] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.130917] kthread+0x328/0x630 [ 19.131146] ret_from_fork+0x10/0x20 [ 19.131205] [ 19.131226] Allocated by task 261: [ 19.131257] kasan_save_stack+0x3c/0x68 [ 19.131309] kasan_save_track+0x20/0x40 [ 19.131507] kasan_save_alloc_info+0x40/0x58 [ 19.131558] __kasan_kmalloc+0xd4/0xd8 [ 19.131879] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.131961] kasan_bitops_generic+0xa0/0x1c8 [ 19.132035] kunit_try_run_case+0x170/0x3f0 [ 19.132153] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.132328] kthread+0x328/0x630 [ 19.132402] ret_from_fork+0x10/0x20 [ 19.132444] [ 19.132513] The buggy address belongs to the object at fff00000c1375bc0 [ 19.132513] which belongs to the cache kmalloc-16 of size 16 [ 19.132856] The buggy address is located 8 bytes inside of [ 19.132856] allocated 9-byte region [fff00000c1375bc0, fff00000c1375bc9) [ 19.132972] [ 19.133017] The buggy address belongs to the physical page: [ 19.133094] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101375 [ 19.133211] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.133381] page_type: f5(slab) [ 19.133451] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 19.133538] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 19.133581] page dumped because: kasan: bad access detected [ 19.133910] [ 19.134030] Memory state around the buggy address: [ 19.134087] fff00000c1375a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 19.134264] fff00000c1375b00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 19.134361] >fff00000c1375b80: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 19.134499] ^ [ 19.134577] fff00000c1375c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.134873] fff00000c1375c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.134950] ================================================================== [ 19.143243] ================================================================== [ 19.143298] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaec/0xbc0 [ 19.143352] Read of size 8 at addr fff00000c1375bc8 by task kunit_try_catch/261 [ 19.143406] [ 19.143437] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 19.143522] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.143551] Hardware name: linux,dummy-virt (DT) [ 19.143602] Call trace: [ 19.143642] show_stack+0x20/0x38 (C) [ 19.143703] dump_stack_lvl+0x8c/0xd0 [ 19.143754] print_report+0x118/0x5d0 [ 19.143813] kasan_report+0xdc/0x128 [ 19.143862] __asan_report_load8_noabort+0x20/0x30 [ 19.143916] kasan_bitops_modify.constprop.0+0xaec/0xbc0 [ 19.143971] kasan_bitops_generic+0x110/0x1c8 [ 19.144022] kunit_try_run_case+0x170/0x3f0 [ 19.144081] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.144137] kthread+0x328/0x630 [ 19.144182] ret_from_fork+0x10/0x20 [ 19.144232] [ 19.144253] Allocated by task 261: [ 19.144285] kasan_save_stack+0x3c/0x68 [ 19.144330] kasan_save_track+0x20/0x40 [ 19.144370] kasan_save_alloc_info+0x40/0x58 [ 19.144414] __kasan_kmalloc+0xd4/0xd8 [ 19.144453] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.144506] kasan_bitops_generic+0xa0/0x1c8 [ 19.144557] kunit_try_run_case+0x170/0x3f0 [ 19.144605] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.145057] kthread+0x328/0x630 [ 19.145098] ret_from_fork+0x10/0x20 [ 19.145193] [ 19.145242] The buggy address belongs to the object at fff00000c1375bc0 [ 19.145242] which belongs to the cache kmalloc-16 of size 16 [ 19.145444] The buggy address is located 8 bytes inside of [ 19.145444] allocated 9-byte region [fff00000c1375bc0, fff00000c1375bc9) [ 19.145550] [ 19.145591] The buggy address belongs to the physical page: [ 19.145702] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101375 [ 19.146089] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.146400] page_type: f5(slab) [ 19.146785] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 19.146891] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 19.147023] page dumped because: kasan: bad access detected [ 19.147131] [ 19.147222] Memory state around the buggy address: [ 19.147356] fff00000c1375a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 19.147443] fff00000c1375b00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 19.147666] >fff00000c1375b80: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 19.147713] ^ [ 19.147795] fff00000c1375c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.147860] fff00000c1375c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.147950] ================================================================== [ 19.126742] ================================================================== [ 19.126793] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbc0 [ 19.126847] Read of size 8 at addr fff00000c1375bc8 by task kunit_try_catch/261 [ 19.126898] [ 19.126929] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 19.127013] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.127042] Hardware name: linux,dummy-virt (DT) [ 19.127090] Call trace: [ 19.127130] show_stack+0x20/0x38 (C) [ 19.127181] dump_stack_lvl+0x8c/0xd0 [ 19.127234] print_report+0x118/0x5d0 [ 19.127284] kasan_report+0xdc/0x128 [ 19.127333] __asan_report_load8_noabort+0x20/0x30 [ 19.127387] kasan_bitops_modify.constprop.0+0xa80/0xbc0 [ 19.127442] kasan_bitops_generic+0x110/0x1c8 [ 19.127493] kunit_try_run_case+0x170/0x3f0 [ 19.127548] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.127614] kthread+0x328/0x630 [ 19.128329] ret_from_fork+0x10/0x20 [ 19.128381] [ 19.128486] Allocated by task 261: [ 19.128519] kasan_save_stack+0x3c/0x68 [ 19.128565] kasan_save_track+0x20/0x40 [ 19.128605] kasan_save_alloc_info+0x40/0x58 [ 19.128658] __kasan_kmalloc+0xd4/0xd8 [ 19.128697] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.128739] kasan_bitops_generic+0xa0/0x1c8 [ 19.128780] kunit_try_run_case+0x170/0x3f0 [ 19.128819] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.128865] kthread+0x328/0x630 [ 19.128901] ret_from_fork+0x10/0x20 [ 19.128945] [ 19.128965] The buggy address belongs to the object at fff00000c1375bc0 [ 19.128965] which belongs to the cache kmalloc-16 of size 16 [ 19.129024] The buggy address is located 8 bytes inside of [ 19.129024] allocated 9-byte region [fff00000c1375bc0, fff00000c1375bc9) [ 19.129088] [ 19.129109] The buggy address belongs to the physical page: [ 19.129142] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101375 [ 19.129199] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.129262] page_type: f5(slab) [ 19.129300] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 19.129354] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 19.129398] page dumped because: kasan: bad access detected [ 19.129433] [ 19.129452] Memory state around the buggy address: [ 19.129486] fff00000c1375a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 19.129532] fff00000c1375b00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 19.129578] >fff00000c1375b80: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 19.129627] ^ [ 19.129665] fff00000c1375c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.129712] fff00000c1375c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.129754] ================================================================== [ 19.122313] ================================================================== [ 19.122367] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc0 [ 19.122420] Write of size 8 at addr fff00000c1375bc8 by task kunit_try_catch/261 [ 19.122471] [ 19.122538] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 19.122658] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.122687] Hardware name: linux,dummy-virt (DT) [ 19.122719] Call trace: [ 19.122874] show_stack+0x20/0x38 (C) [ 19.123027] dump_stack_lvl+0x8c/0xd0 [ 19.123079] print_report+0x118/0x5d0 [ 19.123146] kasan_report+0xdc/0x128 [ 19.123206] kasan_check_range+0x100/0x1a8 [ 19.123257] __kasan_check_write+0x20/0x30 [ 19.123303] kasan_bitops_modify.constprop.0+0x1dc/0xbc0 [ 19.123374] kasan_bitops_generic+0x110/0x1c8 [ 19.123441] kunit_try_run_case+0x170/0x3f0 [ 19.123508] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.123564] kthread+0x328/0x630 [ 19.123607] ret_from_fork+0x10/0x20 [ 19.123766] [ 19.123787] Allocated by task 261: [ 19.123835] kasan_save_stack+0x3c/0x68 [ 19.123930] kasan_save_track+0x20/0x40 [ 19.124066] kasan_save_alloc_info+0x40/0x58 [ 19.124115] __kasan_kmalloc+0xd4/0xd8 [ 19.124167] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.124235] kasan_bitops_generic+0xa0/0x1c8 [ 19.124278] kunit_try_run_case+0x170/0x3f0 [ 19.124335] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.124413] kthread+0x328/0x630 [ 19.124448] ret_from_fork+0x10/0x20 [ 19.124505] [ 19.124543] The buggy address belongs to the object at fff00000c1375bc0 [ 19.124543] which belongs to the cache kmalloc-16 of size 16 [ 19.124603] The buggy address is located 8 bytes inside of [ 19.124603] allocated 9-byte region [fff00000c1375bc0, fff00000c1375bc9) [ 19.124788] [ 19.124811] The buggy address belongs to the physical page: [ 19.124950] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101375 [ 19.125006] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.125093] page_type: f5(slab) [ 19.125181] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 19.125237] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 19.125341] page dumped because: kasan: bad access detected [ 19.125409] [ 19.125430] Memory state around the buggy address: [ 19.125486] fff00000c1375a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 19.125535] fff00000c1375b00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 19.125763] >fff00000c1375b80: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 19.125910] ^ [ 19.125977] fff00000c1375c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.126098] fff00000c1375c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.126150] ================================================================== [ 19.114307] ================================================================== [ 19.114374] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 19.114558] Write of size 8 at addr fff00000c1375bc8 by task kunit_try_catch/261 [ 19.114722] [ 19.114766] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 19.114869] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.114926] Hardware name: linux,dummy-virt (DT) [ 19.114963] Call trace: [ 19.114989] show_stack+0x20/0x38 (C) [ 19.115072] dump_stack_lvl+0x8c/0xd0 [ 19.115124] print_report+0x118/0x5d0 [ 19.115191] kasan_report+0xdc/0x128 [ 19.115244] kasan_check_range+0x100/0x1a8 [ 19.115295] __kasan_check_write+0x20/0x30 [ 19.115341] kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 19.115396] kasan_bitops_generic+0x110/0x1c8 [ 19.115452] kunit_try_run_case+0x170/0x3f0 [ 19.115715] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.115790] kthread+0x328/0x630 [ 19.115883] ret_from_fork+0x10/0x20 [ 19.115935] [ 19.115974] Allocated by task 261: [ 19.116024] kasan_save_stack+0x3c/0x68 [ 19.116069] kasan_save_track+0x20/0x40 [ 19.116110] kasan_save_alloc_info+0x40/0x58 [ 19.116344] __kasan_kmalloc+0xd4/0xd8 [ 19.116391] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.116442] kasan_bitops_generic+0xa0/0x1c8 [ 19.116512] kunit_try_run_case+0x170/0x3f0 [ 19.116570] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.116662] kthread+0x328/0x630 [ 19.116698] ret_from_fork+0x10/0x20 [ 19.116754] [ 19.116782] The buggy address belongs to the object at fff00000c1375bc0 [ 19.116782] which belongs to the cache kmalloc-16 of size 16 [ 19.116843] The buggy address is located 8 bytes inside of [ 19.116843] allocated 9-byte region [fff00000c1375bc0, fff00000c1375bc9) [ 19.117119] [ 19.117170] The buggy address belongs to the physical page: [ 19.117247] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101375 [ 19.117350] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.117405] page_type: f5(slab) [ 19.117466] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 19.117522] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 19.117566] page dumped because: kasan: bad access detected [ 19.117601] [ 19.117631] Memory state around the buggy address: [ 19.117668] fff00000c1375a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 19.117714] fff00000c1375b00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 19.117760] >fff00000c1375b80: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 19.117847] ^ [ 19.117935] fff00000c1375c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.118044] fff00000c1375c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.118122] ================================================================== [ 19.148644] ================================================================== [ 19.148778] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc0 [ 19.148863] Write of size 8 at addr fff00000c1375bc8 by task kunit_try_catch/261 [ 19.148930] [ 19.149042] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 19.149231] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.149300] Hardware name: linux,dummy-virt (DT) [ 19.149463] Call trace: [ 19.149687] show_stack+0x20/0x38 (C) [ 19.149799] dump_stack_lvl+0x8c/0xd0 [ 19.149877] print_report+0x118/0x5d0 [ 19.150024] kasan_report+0xdc/0x128 [ 19.150111] kasan_check_range+0x100/0x1a8 [ 19.150343] __kasan_check_write+0x20/0x30 [ 19.150513] kasan_bitops_modify.constprop.0+0x344/0xbc0 [ 19.150610] kasan_bitops_generic+0x110/0x1c8 [ 19.150790] kunit_try_run_case+0x170/0x3f0 [ 19.150869] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.151144] kthread+0x328/0x630 [ 19.151263] ret_from_fork+0x10/0x20 [ 19.151339] [ 19.151366] Allocated by task 261: [ 19.151615] kasan_save_stack+0x3c/0x68 [ 19.151748] kasan_save_track+0x20/0x40 [ 19.151910] kasan_save_alloc_info+0x40/0x58 [ 19.151976] __kasan_kmalloc+0xd4/0xd8 [ 19.152225] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.152350] kasan_bitops_generic+0xa0/0x1c8 [ 19.152460] kunit_try_run_case+0x170/0x3f0 [ 19.152765] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.152847] kthread+0x328/0x630 [ 19.152964] ret_from_fork+0x10/0x20 [ 19.153048] [ 19.153164] The buggy address belongs to the object at fff00000c1375bc0 [ 19.153164] which belongs to the cache kmalloc-16 of size 16 [ 19.153250] The buggy address is located 8 bytes inside of [ 19.153250] allocated 9-byte region [fff00000c1375bc0, fff00000c1375bc9) [ 19.153552] [ 19.153608] The buggy address belongs to the physical page: [ 19.153660] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101375 [ 19.153813] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.153950] page_type: f5(slab) [ 19.154004] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 19.154241] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 19.154378] page dumped because: kasan: bad access detected [ 19.154432] [ 19.154533] Memory state around the buggy address: [ 19.154610] fff00000c1375a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 19.154741] fff00000c1375b00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 19.154789] >fff00000c1375b80: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 19.155077] ^ [ 19.155172] fff00000c1375c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.155271] fff00000c1375c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.155354] ================================================================== [ 19.163221] ================================================================== [ 19.163431] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa20/0xbc0 [ 19.163523] Read of size 8 at addr fff00000c1375bc8 by task kunit_try_catch/261 [ 19.163585] [ 19.163694] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 19.163785] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.163913] Hardware name: linux,dummy-virt (DT) [ 19.163968] Call trace: [ 19.163996] show_stack+0x20/0x38 (C) [ 19.164199] dump_stack_lvl+0x8c/0xd0 [ 19.164279] print_report+0x118/0x5d0 [ 19.164348] kasan_report+0xdc/0x128 [ 19.164406] __asan_report_load8_noabort+0x20/0x30 [ 19.164539] kasan_bitops_modify.constprop.0+0xa20/0xbc0 [ 19.164615] kasan_bitops_generic+0x110/0x1c8 [ 19.164716] kunit_try_run_case+0x170/0x3f0 [ 19.164769] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.164824] kthread+0x328/0x630 [ 19.165159] ret_from_fork+0x10/0x20 [ 19.165285] [ 19.165355] Allocated by task 261: [ 19.165388] kasan_save_stack+0x3c/0x68 [ 19.165449] kasan_save_track+0x20/0x40 [ 19.165495] kasan_save_alloc_info+0x40/0x58 [ 19.165734] __kasan_kmalloc+0xd4/0xd8 [ 19.165806] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.165961] kasan_bitops_generic+0xa0/0x1c8 [ 19.166079] kunit_try_run_case+0x170/0x3f0 [ 19.166355] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.166424] kthread+0x328/0x630 [ 19.166703] ret_from_fork+0x10/0x20 [ 19.166783] [ 19.166845] The buggy address belongs to the object at fff00000c1375bc0 [ 19.166845] which belongs to the cache kmalloc-16 of size 16 [ 19.166927] The buggy address is located 8 bytes inside of [ 19.166927] allocated 9-byte region [fff00000c1375bc0, fff00000c1375bc9) [ 19.167042] [ 19.167071] The buggy address belongs to the physical page: [ 19.167123] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101375 [ 19.167183] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.167234] page_type: f5(slab) [ 19.167275] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 19.167330] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 19.167383] page dumped because: kasan: bad access detected [ 19.167426] [ 19.167461] Memory state around the buggy address: [ 19.167496] fff00000c1375a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 19.167544] fff00000c1375b00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 19.167591] >fff00000c1375b80: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 19.167649] ^ [ 19.167685] fff00000c1375c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.167731] fff00000c1375c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.167782] ================================================================== [ 19.156073] ================================================================== [ 19.156130] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc0 [ 19.156350] Write of size 8 at addr fff00000c1375bc8 by task kunit_try_catch/261 [ 19.156461] [ 19.156513] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 19.156608] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.156704] Hardware name: linux,dummy-virt (DT) [ 19.156742] Call trace: [ 19.156768] show_stack+0x20/0x38 (C) [ 19.156898] dump_stack_lvl+0x8c/0xd0 [ 19.156954] print_report+0x118/0x5d0 [ 19.157232] kasan_report+0xdc/0x128 [ 19.157366] kasan_check_range+0x100/0x1a8 [ 19.157497] __kasan_check_write+0x20/0x30 [ 19.157676] kasan_bitops_modify.constprop.0+0x3b0/0xbc0 [ 19.157871] kasan_bitops_generic+0x110/0x1c8 [ 19.158040] kunit_try_run_case+0x170/0x3f0 [ 19.158146] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.158459] kthread+0x328/0x630 [ 19.158542] ret_from_fork+0x10/0x20 [ 19.158648] [ 19.158672] Allocated by task 261: [ 19.158924] kasan_save_stack+0x3c/0x68 [ 19.159048] kasan_save_track+0x20/0x40 [ 19.159137] kasan_save_alloc_info+0x40/0x58 [ 19.159317] __kasan_kmalloc+0xd4/0xd8 [ 19.159496] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.159611] kasan_bitops_generic+0xa0/0x1c8 [ 19.159749] kunit_try_run_case+0x170/0x3f0 [ 19.159838] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.160135] kthread+0x328/0x630 [ 19.160188] ret_from_fork+0x10/0x20 [ 19.160289] [ 19.160347] The buggy address belongs to the object at fff00000c1375bc0 [ 19.160347] which belongs to the cache kmalloc-16 of size 16 [ 19.160490] The buggy address is located 8 bytes inside of [ 19.160490] allocated 9-byte region [fff00000c1375bc0, fff00000c1375bc9) [ 19.160747] [ 19.160788] The buggy address belongs to the physical page: [ 19.160873] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101375 [ 19.160971] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.161097] page_type: f5(slab) [ 19.161203] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 19.161376] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 19.161541] page dumped because: kasan: bad access detected [ 19.161656] [ 19.161717] Memory state around the buggy address: [ 19.161862] fff00000c1375a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 19.161970] fff00000c1375b00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 19.162263] >fff00000c1375b80: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 19.162335] ^ [ 19.162425] fff00000c1375c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.162541] fff00000c1375c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.162654] ================================================================== [ 19.136022] ================================================================== [ 19.136107] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc0 [ 19.136248] Write of size 8 at addr fff00000c1375bc8 by task kunit_try_catch/261 [ 19.136307] [ 19.136340] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 19.136679] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.136741] Hardware name: linux,dummy-virt (DT) [ 19.136790] Call trace: [ 19.136816] show_stack+0x20/0x38 (C) [ 19.136870] dump_stack_lvl+0x8c/0xd0 [ 19.136922] print_report+0x118/0x5d0 [ 19.137078] kasan_report+0xdc/0x128 [ 19.137223] kasan_check_range+0x100/0x1a8 [ 19.137331] __kasan_check_write+0x20/0x30 [ 19.137389] kasan_bitops_modify.constprop.0+0x320/0xbc0 [ 19.137723] kasan_bitops_generic+0x110/0x1c8 [ 19.137814] kunit_try_run_case+0x170/0x3f0 [ 19.137983] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.138151] kthread+0x328/0x630 [ 19.138249] ret_from_fork+0x10/0x20 [ 19.138354] [ 19.138376] Allocated by task 261: [ 19.138670] kasan_save_stack+0x3c/0x68 [ 19.138743] kasan_save_track+0x20/0x40 [ 19.139009] kasan_save_alloc_info+0x40/0x58 [ 19.139156] __kasan_kmalloc+0xd4/0xd8 [ 19.139328] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.139464] kasan_bitops_generic+0xa0/0x1c8 [ 19.139504] kunit_try_run_case+0x170/0x3f0 [ 19.139911] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.140009] kthread+0x328/0x630 [ 19.140092] ret_from_fork+0x10/0x20 [ 19.140239] [ 19.140298] The buggy address belongs to the object at fff00000c1375bc0 [ 19.140298] which belongs to the cache kmalloc-16 of size 16 [ 19.140466] The buggy address is located 8 bytes inside of [ 19.140466] allocated 9-byte region [fff00000c1375bc0, fff00000c1375bc9) [ 19.140557] [ 19.140813] The buggy address belongs to the physical page: [ 19.140855] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101375 [ 19.141029] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.141139] page_type: f5(slab) [ 19.141243] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 19.141332] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 19.141411] page dumped because: kasan: bad access detected [ 19.141507] [ 19.141531] Memory state around the buggy address: [ 19.141565] fff00000c1375a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 19.141646] fff00000c1375b00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 19.141693] >fff00000c1375b80: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 19.141927] ^ [ 19.142156] fff00000c1375c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.142365] fff00000c1375c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.142459] ==================================================================
[ 14.881997] ================================================================== [ 14.882233] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50 [ 14.882548] Write of size 8 at addr ffff888101b1cc08 by task kunit_try_catch/279 [ 14.882906] [ 14.883044] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 14.883087] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.883099] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.883120] Call Trace: [ 14.883135] <TASK> [ 14.883150] dump_stack_lvl+0x73/0xb0 [ 14.883178] print_report+0xd1/0x610 [ 14.883244] ? __virt_addr_valid+0x1db/0x2d0 [ 14.883281] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 14.883308] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.883330] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 14.883357] kasan_report+0x141/0x180 [ 14.883379] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 14.883421] kasan_check_range+0x10c/0x1c0 [ 14.883445] __kasan_check_write+0x18/0x20 [ 14.883464] kasan_bitops_modify.constprop.0+0x547/0xd50 [ 14.883489] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.883515] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.883540] ? trace_hardirqs_on+0x37/0xe0 [ 14.883561] ? kasan_bitops_generic+0x92/0x1c0 [ 14.883590] kasan_bitops_generic+0x116/0x1c0 [ 14.883613] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.883638] ? __pfx_read_tsc+0x10/0x10 [ 14.883660] ? ktime_get_ts64+0x86/0x230 [ 14.883683] kunit_try_run_case+0x1a5/0x480 [ 14.883709] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.883731] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 14.883766] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.883790] ? __kthread_parkme+0x82/0x180 [ 14.883810] ? preempt_count_sub+0x50/0x80 [ 14.883846] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.883870] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.883894] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.883918] kthread+0x337/0x6f0 [ 14.883937] ? trace_preempt_on+0x20/0xc0 [ 14.883959] ? __pfx_kthread+0x10/0x10 [ 14.883989] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.884010] ? calculate_sigpending+0x7b/0xa0 [ 14.884034] ? __pfx_kthread+0x10/0x10 [ 14.884067] ret_from_fork+0x116/0x1d0 [ 14.884118] ? __pfx_kthread+0x10/0x10 [ 14.884140] ret_from_fork_asm+0x1a/0x30 [ 14.884172] </TASK> [ 14.884192] [ 14.893939] Allocated by task 279: [ 14.894076] kasan_save_stack+0x45/0x70 [ 14.894228] kasan_save_track+0x18/0x40 [ 14.894431] kasan_save_alloc_info+0x3b/0x50 [ 14.894639] __kasan_kmalloc+0xb7/0xc0 [ 14.894828] __kmalloc_cache_noprof+0x189/0x420 [ 14.895335] kasan_bitops_generic+0x92/0x1c0 [ 14.895564] kunit_try_run_case+0x1a5/0x480 [ 14.895865] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.896318] kthread+0x337/0x6f0 [ 14.896505] ret_from_fork+0x116/0x1d0 [ 14.897432] ret_from_fork_asm+0x1a/0x30 [ 14.898050] [ 14.898169] The buggy address belongs to the object at ffff888101b1cc00 [ 14.898169] which belongs to the cache kmalloc-16 of size 16 [ 14.899388] The buggy address is located 8 bytes inside of [ 14.899388] allocated 9-byte region [ffff888101b1cc00, ffff888101b1cc09) [ 14.899988] [ 14.900134] The buggy address belongs to the physical page: [ 14.900370] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b1c [ 14.901210] flags: 0x200000000000000(node=0|zone=2) [ 14.901453] page_type: f5(slab) [ 14.901858] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.902730] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.903619] page dumped because: kasan: bad access detected [ 14.903944] [ 14.904049] Memory state around the buggy address: [ 14.904540] ffff888101b1cb00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc [ 14.905187] ffff888101b1cb80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.905854] >ffff888101b1cc00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.906389] ^ [ 14.906815] ffff888101b1cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.907436] ffff888101b1cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.907950] ================================================================== [ 14.818894] ================================================================== [ 14.819250] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50 [ 14.819625] Write of size 8 at addr ffff888101b1cc08 by task kunit_try_catch/279 [ 14.819994] [ 14.820184] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 14.820229] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.820241] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.820263] Call Trace: [ 14.820275] <TASK> [ 14.820292] dump_stack_lvl+0x73/0xb0 [ 14.820321] print_report+0xd1/0x610 [ 14.820344] ? __virt_addr_valid+0x1db/0x2d0 [ 14.820375] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 14.820419] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.820443] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 14.820469] kasan_report+0x141/0x180 [ 14.820492] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 14.820523] kasan_check_range+0x10c/0x1c0 [ 14.820547] __kasan_check_write+0x18/0x20 [ 14.820576] kasan_bitops_modify.constprop.0+0x373/0xd50 [ 14.820602] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.820629] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.820664] ? trace_hardirqs_on+0x37/0xe0 [ 14.820692] ? kasan_bitops_generic+0x92/0x1c0 [ 14.820722] kasan_bitops_generic+0x116/0x1c0 [ 14.820745] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.820771] ? __pfx_read_tsc+0x10/0x10 [ 14.820791] ? ktime_get_ts64+0x86/0x230 [ 14.820816] kunit_try_run_case+0x1a5/0x480 [ 14.820841] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.820863] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 14.820888] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.820911] ? __kthread_parkme+0x82/0x180 [ 14.820933] ? preempt_count_sub+0x50/0x80 [ 14.820957] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.820982] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.821014] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.821099] kthread+0x337/0x6f0 [ 14.821120] ? trace_preempt_on+0x20/0xc0 [ 14.821143] ? __pfx_kthread+0x10/0x10 [ 14.821165] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.821187] ? calculate_sigpending+0x7b/0xa0 [ 14.821212] ? __pfx_kthread+0x10/0x10 [ 14.821234] ret_from_fork+0x116/0x1d0 [ 14.821253] ? __pfx_kthread+0x10/0x10 [ 14.821274] ret_from_fork_asm+0x1a/0x30 [ 14.821306] </TASK> [ 14.821316] [ 14.831010] Allocated by task 279: [ 14.831143] kasan_save_stack+0x45/0x70 [ 14.831290] kasan_save_track+0x18/0x40 [ 14.831514] kasan_save_alloc_info+0x3b/0x50 [ 14.831729] __kasan_kmalloc+0xb7/0xc0 [ 14.831954] __kmalloc_cache_noprof+0x189/0x420 [ 14.832487] kasan_bitops_generic+0x92/0x1c0 [ 14.832700] kunit_try_run_case+0x1a5/0x480 [ 14.832853] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.833031] kthread+0x337/0x6f0 [ 14.833154] ret_from_fork+0x116/0x1d0 [ 14.833288] ret_from_fork_asm+0x1a/0x30 [ 14.833494] [ 14.833591] The buggy address belongs to the object at ffff888101b1cc00 [ 14.833591] which belongs to the cache kmalloc-16 of size 16 [ 14.834341] The buggy address is located 8 bytes inside of [ 14.834341] allocated 9-byte region [ffff888101b1cc00, ffff888101b1cc09) [ 14.835979] [ 14.836312] The buggy address belongs to the physical page: [ 14.836574] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b1c [ 14.836945] flags: 0x200000000000000(node=0|zone=2) [ 14.837328] page_type: f5(slab) [ 14.837518] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.837870] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.838143] page dumped because: kasan: bad access detected [ 14.838481] [ 14.838578] Memory state around the buggy address: [ 14.838756] ffff888101b1cb00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc [ 14.839148] ffff888101b1cb80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.839419] >ffff888101b1cc00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.839767] ^ [ 14.839962] ffff888101b1cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.840390] ffff888101b1cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.840701] ================================================================== [ 14.861959] ================================================================== [ 14.862472] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 14.862949] Write of size 8 at addr ffff888101b1cc08 by task kunit_try_catch/279 [ 14.863365] [ 14.863488] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 14.863535] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.863547] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.863568] Call Trace: [ 14.863582] <TASK> [ 14.863598] dump_stack_lvl+0x73/0xb0 [ 14.863626] print_report+0xd1/0x610 [ 14.863648] ? __virt_addr_valid+0x1db/0x2d0 [ 14.863671] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 14.863696] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.863718] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 14.863744] kasan_report+0x141/0x180 [ 14.863767] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 14.863798] kasan_check_range+0x10c/0x1c0 [ 14.863822] __kasan_check_write+0x18/0x20 [ 14.863841] kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 14.863869] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.863896] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.863921] ? trace_hardirqs_on+0x37/0xe0 [ 14.863943] ? kasan_bitops_generic+0x92/0x1c0 [ 14.863971] kasan_bitops_generic+0x116/0x1c0 [ 14.863994] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.864020] ? __pfx_read_tsc+0x10/0x10 [ 14.864041] ? ktime_get_ts64+0x86/0x230 [ 14.864094] kunit_try_run_case+0x1a5/0x480 [ 14.864120] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.864144] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 14.864174] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.864198] ? __kthread_parkme+0x82/0x180 [ 14.864219] ? preempt_count_sub+0x50/0x80 [ 14.864243] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.864267] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.864291] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.864314] kthread+0x337/0x6f0 [ 14.864333] ? trace_preempt_on+0x20/0xc0 [ 14.864355] ? __pfx_kthread+0x10/0x10 [ 14.864377] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.864407] ? calculate_sigpending+0x7b/0xa0 [ 14.864430] ? __pfx_kthread+0x10/0x10 [ 14.864453] ret_from_fork+0x116/0x1d0 [ 14.864471] ? __pfx_kthread+0x10/0x10 [ 14.864493] ret_from_fork_asm+0x1a/0x30 [ 14.864524] </TASK> [ 14.864535] [ 14.873495] Allocated by task 279: [ 14.873692] kasan_save_stack+0x45/0x70 [ 14.873908] kasan_save_track+0x18/0x40 [ 14.874161] kasan_save_alloc_info+0x3b/0x50 [ 14.874386] __kasan_kmalloc+0xb7/0xc0 [ 14.874586] __kmalloc_cache_noprof+0x189/0x420 [ 14.874794] kasan_bitops_generic+0x92/0x1c0 [ 14.875005] kunit_try_run_case+0x1a5/0x480 [ 14.875279] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.875522] kthread+0x337/0x6f0 [ 14.875711] ret_from_fork+0x116/0x1d0 [ 14.875846] ret_from_fork_asm+0x1a/0x30 [ 14.876013] [ 14.876178] The buggy address belongs to the object at ffff888101b1cc00 [ 14.876178] which belongs to the cache kmalloc-16 of size 16 [ 14.876767] The buggy address is located 8 bytes inside of [ 14.876767] allocated 9-byte region [ffff888101b1cc00, ffff888101b1cc09) [ 14.877341] [ 14.877456] The buggy address belongs to the physical page: [ 14.877722] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b1c [ 14.878177] flags: 0x200000000000000(node=0|zone=2) [ 14.878408] page_type: f5(slab) [ 14.878537] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.879001] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.879345] page dumped because: kasan: bad access detected [ 14.879538] [ 14.879611] Memory state around the buggy address: [ 14.879769] ffff888101b1cb00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc [ 14.879988] ffff888101b1cb80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.880217] >ffff888101b1cc00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.880537] ^ [ 14.880993] ffff888101b1cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.881328] ffff888101b1cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.881652] ================================================================== [ 14.723825] ================================================================== [ 14.724469] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50 [ 14.725234] Write of size 8 at addr ffff888101b1cc08 by task kunit_try_catch/279 [ 14.725545] [ 14.725636] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 14.725682] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.725694] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.725715] Call Trace: [ 14.725730] <TASK> [ 14.725747] dump_stack_lvl+0x73/0xb0 [ 14.725778] print_report+0xd1/0x610 [ 14.725801] ? __virt_addr_valid+0x1db/0x2d0 [ 14.725825] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 14.725850] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.725873] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 14.725899] kasan_report+0x141/0x180 [ 14.725922] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 14.725953] kasan_check_range+0x10c/0x1c0 [ 14.725977] __kasan_check_write+0x18/0x20 [ 14.725996] kasan_bitops_modify.constprop.0+0x101/0xd50 [ 14.726022] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.726101] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.726128] ? trace_hardirqs_on+0x37/0xe0 [ 14.726151] ? kasan_bitops_generic+0x92/0x1c0 [ 14.726181] kasan_bitops_generic+0x116/0x1c0 [ 14.726205] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.726231] ? __pfx_read_tsc+0x10/0x10 [ 14.726252] ? ktime_get_ts64+0x86/0x230 [ 14.726278] kunit_try_run_case+0x1a5/0x480 [ 14.726304] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.726327] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 14.726351] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.726375] ? __kthread_parkme+0x82/0x180 [ 14.726410] ? preempt_count_sub+0x50/0x80 [ 14.726438] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.726463] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.726487] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.726511] kthread+0x337/0x6f0 [ 14.726532] ? trace_preempt_on+0x20/0xc0 [ 14.726554] ? __pfx_kthread+0x10/0x10 [ 14.726576] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.726598] ? calculate_sigpending+0x7b/0xa0 [ 14.726622] ? __pfx_kthread+0x10/0x10 [ 14.726645] ret_from_fork+0x116/0x1d0 [ 14.726664] ? __pfx_kthread+0x10/0x10 [ 14.726686] ret_from_fork_asm+0x1a/0x30 [ 14.726718] </TASK> [ 14.726728] [ 14.735995] Allocated by task 279: [ 14.736188] kasan_save_stack+0x45/0x70 [ 14.736382] kasan_save_track+0x18/0x40 [ 14.736547] kasan_save_alloc_info+0x3b/0x50 [ 14.736914] __kasan_kmalloc+0xb7/0xc0 [ 14.737154] __kmalloc_cache_noprof+0x189/0x420 [ 14.737318] kasan_bitops_generic+0x92/0x1c0 [ 14.737485] kunit_try_run_case+0x1a5/0x480 [ 14.737644] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.737896] kthread+0x337/0x6f0 [ 14.738114] ret_from_fork+0x116/0x1d0 [ 14.738300] ret_from_fork_asm+0x1a/0x30 [ 14.738458] [ 14.738534] The buggy address belongs to the object at ffff888101b1cc00 [ 14.738534] which belongs to the cache kmalloc-16 of size 16 [ 14.739506] The buggy address is located 8 bytes inside of [ 14.739506] allocated 9-byte region [ffff888101b1cc00, ffff888101b1cc09) [ 14.740000] [ 14.740211] The buggy address belongs to the physical page: [ 14.740441] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b1c [ 14.740898] flags: 0x200000000000000(node=0|zone=2) [ 14.741140] page_type: f5(slab) [ 14.741308] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.741772] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.742183] page dumped because: kasan: bad access detected [ 14.742415] [ 14.742514] Memory state around the buggy address: [ 14.742797] ffff888101b1cb00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc [ 14.743167] ffff888101b1cb80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.743442] >ffff888101b1cc00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.743751] ^ [ 14.743922] ffff888101b1cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.744362] ffff888101b1cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.744677] ================================================================== [ 14.769764] ================================================================== [ 14.770021] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 14.770763] Write of size 8 at addr ffff888101b1cc08 by task kunit_try_catch/279 [ 14.771185] [ 14.771380] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 14.771439] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.771451] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.771473] Call Trace: [ 14.771490] <TASK> [ 14.771505] dump_stack_lvl+0x73/0xb0 [ 14.771697] print_report+0xd1/0x610 [ 14.771722] ? __virt_addr_valid+0x1db/0x2d0 [ 14.771746] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 14.771772] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.771794] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 14.771820] kasan_report+0x141/0x180 [ 14.771843] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 14.771874] kasan_check_range+0x10c/0x1c0 [ 14.771898] __kasan_check_write+0x18/0x20 [ 14.771917] kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 14.771943] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.771969] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.771993] ? trace_hardirqs_on+0x37/0xe0 [ 14.772016] ? kasan_bitops_generic+0x92/0x1c0 [ 14.772097] kasan_bitops_generic+0x116/0x1c0 [ 14.772122] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.772147] ? __pfx_read_tsc+0x10/0x10 [ 14.772169] ? ktime_get_ts64+0x86/0x230 [ 14.772195] kunit_try_run_case+0x1a5/0x480 [ 14.772219] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.772242] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 14.772266] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.772289] ? __kthread_parkme+0x82/0x180 [ 14.772309] ? preempt_count_sub+0x50/0x80 [ 14.772334] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.772359] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.772383] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.772418] kthread+0x337/0x6f0 [ 14.772438] ? trace_preempt_on+0x20/0xc0 [ 14.772461] ? __pfx_kthread+0x10/0x10 [ 14.772482] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.772504] ? calculate_sigpending+0x7b/0xa0 [ 14.772528] ? __pfx_kthread+0x10/0x10 [ 14.772551] ret_from_fork+0x116/0x1d0 [ 14.772570] ? __pfx_kthread+0x10/0x10 [ 14.772591] ret_from_fork_asm+0x1a/0x30 [ 14.772623] </TASK> [ 14.772634] [ 14.781514] Allocated by task 279: [ 14.781970] kasan_save_stack+0x45/0x70 [ 14.782302] kasan_save_track+0x18/0x40 [ 14.782520] kasan_save_alloc_info+0x3b/0x50 [ 14.782708] __kasan_kmalloc+0xb7/0xc0 [ 14.782843] __kmalloc_cache_noprof+0x189/0x420 [ 14.783129] kasan_bitops_generic+0x92/0x1c0 [ 14.783357] kunit_try_run_case+0x1a5/0x480 [ 14.783581] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.783806] kthread+0x337/0x6f0 [ 14.783983] ret_from_fork+0x116/0x1d0 [ 14.784204] ret_from_fork_asm+0x1a/0x30 [ 14.784419] [ 14.784512] The buggy address belongs to the object at ffff888101b1cc00 [ 14.784512] which belongs to the cache kmalloc-16 of size 16 [ 14.784987] The buggy address is located 8 bytes inside of [ 14.784987] allocated 9-byte region [ffff888101b1cc00, ffff888101b1cc09) [ 14.785546] [ 14.785667] The buggy address belongs to the physical page: [ 14.785880] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b1c [ 14.786380] flags: 0x200000000000000(node=0|zone=2) [ 14.786614] page_type: f5(slab) [ 14.786773] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.787179] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.787485] page dumped because: kasan: bad access detected [ 14.787746] [ 14.787821] Memory state around the buggy address: [ 14.787978] ffff888101b1cb00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc [ 14.788197] ffff888101b1cb80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.788424] >ffff888101b1cc00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.788726] ^ [ 14.789042] ffff888101b1cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.789363] ffff888101b1cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.789714] ================================================================== [ 14.790166] ================================================================== [ 14.790524] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 14.791821] Write of size 8 at addr ffff888101b1cc08 by task kunit_try_catch/279 [ 14.792992] [ 14.793413] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 14.793465] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.793478] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.793501] Call Trace: [ 14.793514] <TASK> [ 14.793530] dump_stack_lvl+0x73/0xb0 [ 14.793561] print_report+0xd1/0x610 [ 14.793584] ? __virt_addr_valid+0x1db/0x2d0 [ 14.793607] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 14.793631] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.793654] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 14.793955] kasan_report+0x141/0x180 [ 14.793988] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 14.794023] kasan_check_range+0x10c/0x1c0 [ 14.794100] __kasan_check_write+0x18/0x20 [ 14.794124] kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 14.794150] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.794178] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.794203] ? trace_hardirqs_on+0x37/0xe0 [ 14.794227] ? kasan_bitops_generic+0x92/0x1c0 [ 14.794256] kasan_bitops_generic+0x116/0x1c0 [ 14.794280] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.794306] ? __pfx_read_tsc+0x10/0x10 [ 14.794327] ? ktime_get_ts64+0x86/0x230 [ 14.794352] kunit_try_run_case+0x1a5/0x480 [ 14.794378] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.794413] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 14.794437] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.794461] ? __kthread_parkme+0x82/0x180 [ 14.794482] ? preempt_count_sub+0x50/0x80 [ 14.794508] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.794533] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.794557] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.794581] kthread+0x337/0x6f0 [ 14.794601] ? trace_preempt_on+0x20/0xc0 [ 14.794624] ? __pfx_kthread+0x10/0x10 [ 14.794645] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.794666] ? calculate_sigpending+0x7b/0xa0 [ 14.794690] ? __pfx_kthread+0x10/0x10 [ 14.794712] ret_from_fork+0x116/0x1d0 [ 14.794731] ? __pfx_kthread+0x10/0x10 [ 14.794752] ret_from_fork_asm+0x1a/0x30 [ 14.794785] </TASK> [ 14.794796] [ 14.809818] Allocated by task 279: [ 14.810006] kasan_save_stack+0x45/0x70 [ 14.810199] kasan_save_track+0x18/0x40 [ 14.810382] kasan_save_alloc_info+0x3b/0x50 [ 14.810546] __kasan_kmalloc+0xb7/0xc0 [ 14.810830] __kmalloc_cache_noprof+0x189/0x420 [ 14.811070] kasan_bitops_generic+0x92/0x1c0 [ 14.811225] kunit_try_run_case+0x1a5/0x480 [ 14.811524] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.811869] kthread+0x337/0x6f0 [ 14.812227] ret_from_fork+0x116/0x1d0 [ 14.812385] ret_from_fork_asm+0x1a/0x30 [ 14.812562] [ 14.812722] The buggy address belongs to the object at ffff888101b1cc00 [ 14.812722] which belongs to the cache kmalloc-16 of size 16 [ 14.813347] The buggy address is located 8 bytes inside of [ 14.813347] allocated 9-byte region [ffff888101b1cc00, ffff888101b1cc09) [ 14.813828] [ 14.813931] The buggy address belongs to the physical page: [ 14.814193] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b1c [ 14.814585] flags: 0x200000000000000(node=0|zone=2) [ 14.814832] page_type: f5(slab) [ 14.815003] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.815446] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.815728] page dumped because: kasan: bad access detected [ 14.815921] [ 14.816018] Memory state around the buggy address: [ 14.816323] ffff888101b1cb00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc [ 14.816583] ffff888101b1cb80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.816908] >ffff888101b1cc00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.817413] ^ [ 14.817563] ffff888101b1cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.817920] ffff888101b1cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.818243] ================================================================== [ 14.841238] ================================================================== [ 14.841882] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 14.842332] Write of size 8 at addr ffff888101b1cc08 by task kunit_try_catch/279 [ 14.842717] [ 14.842855] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 14.842902] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.842914] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.842936] Call Trace: [ 14.842952] <TASK> [ 14.842968] dump_stack_lvl+0x73/0xb0 [ 14.842997] print_report+0xd1/0x610 [ 14.843019] ? __virt_addr_valid+0x1db/0x2d0 [ 14.843042] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 14.843068] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.843117] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 14.843144] kasan_report+0x141/0x180 [ 14.843215] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 14.843247] kasan_check_range+0x10c/0x1c0 [ 14.843271] __kasan_check_write+0x18/0x20 [ 14.843290] kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 14.843316] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.843342] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.843367] ? trace_hardirqs_on+0x37/0xe0 [ 14.843389] ? kasan_bitops_generic+0x92/0x1c0 [ 14.843427] kasan_bitops_generic+0x116/0x1c0 [ 14.843451] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.843476] ? __pfx_read_tsc+0x10/0x10 [ 14.843498] ? ktime_get_ts64+0x86/0x230 [ 14.843522] kunit_try_run_case+0x1a5/0x480 [ 14.843547] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.843570] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 14.843594] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.843617] ? __kthread_parkme+0x82/0x180 [ 14.843639] ? preempt_count_sub+0x50/0x80 [ 14.843663] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.843687] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.843720] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.843744] kthread+0x337/0x6f0 [ 14.843763] ? trace_preempt_on+0x20/0xc0 [ 14.843796] ? __pfx_kthread+0x10/0x10 [ 14.843818] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.843838] ? calculate_sigpending+0x7b/0xa0 [ 14.843862] ? __pfx_kthread+0x10/0x10 [ 14.843884] ret_from_fork+0x116/0x1d0 [ 14.843903] ? __pfx_kthread+0x10/0x10 [ 14.843923] ret_from_fork_asm+0x1a/0x30 [ 14.843955] </TASK> [ 14.843966] [ 14.852907] Allocated by task 279: [ 14.853150] kasan_save_stack+0x45/0x70 [ 14.853357] kasan_save_track+0x18/0x40 [ 14.853558] kasan_save_alloc_info+0x3b/0x50 [ 14.853771] __kasan_kmalloc+0xb7/0xc0 [ 14.853939] __kmalloc_cache_noprof+0x189/0x420 [ 14.854169] kasan_bitops_generic+0x92/0x1c0 [ 14.854392] kunit_try_run_case+0x1a5/0x480 [ 14.854637] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.854862] kthread+0x337/0x6f0 [ 14.855105] ret_from_fork+0x116/0x1d0 [ 14.855286] ret_from_fork_asm+0x1a/0x30 [ 14.855453] [ 14.855528] The buggy address belongs to the object at ffff888101b1cc00 [ 14.855528] which belongs to the cache kmalloc-16 of size 16 [ 14.856090] The buggy address is located 8 bytes inside of [ 14.856090] allocated 9-byte region [ffff888101b1cc00, ffff888101b1cc09) [ 14.856785] [ 14.856866] The buggy address belongs to the physical page: [ 14.857042] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b1c [ 14.857284] flags: 0x200000000000000(node=0|zone=2) [ 14.857527] page_type: f5(slab) [ 14.857694] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.858036] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.858466] page dumped because: kasan: bad access detected [ 14.858727] [ 14.858800] Memory state around the buggy address: [ 14.858958] ffff888101b1cb00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc [ 14.859742] ffff888101b1cb80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.860076] >ffff888101b1cc00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.860389] ^ [ 14.860525] ffff888101b1cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.861014] ffff888101b1cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.861348] ================================================================== [ 14.745226] ================================================================== [ 14.745594] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 14.745922] Write of size 8 at addr ffff888101b1cc08 by task kunit_try_catch/279 [ 14.746265] [ 14.746387] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 14.746442] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.746455] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.746477] Call Trace: [ 14.746489] <TASK> [ 14.746504] dump_stack_lvl+0x73/0xb0 [ 14.746534] print_report+0xd1/0x610 [ 14.746556] ? __virt_addr_valid+0x1db/0x2d0 [ 14.746579] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 14.746604] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.746626] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 14.746653] kasan_report+0x141/0x180 [ 14.746675] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 14.746708] kasan_check_range+0x10c/0x1c0 [ 14.746732] __kasan_check_write+0x18/0x20 [ 14.746751] kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 14.746777] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.746804] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.746828] ? trace_hardirqs_on+0x37/0xe0 [ 14.746850] ? kasan_bitops_generic+0x92/0x1c0 [ 14.746878] kasan_bitops_generic+0x116/0x1c0 [ 14.746901] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.746927] ? __pfx_read_tsc+0x10/0x10 [ 14.746949] ? ktime_get_ts64+0x86/0x230 [ 14.746973] kunit_try_run_case+0x1a5/0x480 [ 14.747000] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.747023] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 14.747047] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.747071] ? __kthread_parkme+0x82/0x180 [ 14.747092] ? preempt_count_sub+0x50/0x80 [ 14.747157] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.747186] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.747209] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.747234] kthread+0x337/0x6f0 [ 14.747254] ? trace_preempt_on+0x20/0xc0 [ 14.747277] ? __pfx_kthread+0x10/0x10 [ 14.747298] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.747320] ? calculate_sigpending+0x7b/0xa0 [ 14.747344] ? __pfx_kthread+0x10/0x10 [ 14.747367] ret_from_fork+0x116/0x1d0 [ 14.747386] ? __pfx_kthread+0x10/0x10 [ 14.747418] ret_from_fork_asm+0x1a/0x30 [ 14.747451] </TASK> [ 14.747462] [ 14.756456] Allocated by task 279: [ 14.756618] kasan_save_stack+0x45/0x70 [ 14.756827] kasan_save_track+0x18/0x40 [ 14.756990] kasan_save_alloc_info+0x3b/0x50 [ 14.757234] __kasan_kmalloc+0xb7/0xc0 [ 14.757463] __kmalloc_cache_noprof+0x189/0x420 [ 14.757627] kasan_bitops_generic+0x92/0x1c0 [ 14.757786] kunit_try_run_case+0x1a5/0x480 [ 14.757939] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.758118] kthread+0x337/0x6f0 [ 14.758241] ret_from_fork+0x116/0x1d0 [ 14.758375] ret_from_fork_asm+0x1a/0x30 [ 14.759537] [ 14.760161] The buggy address belongs to the object at ffff888101b1cc00 [ 14.760161] which belongs to the cache kmalloc-16 of size 16 [ 14.762014] The buggy address is located 8 bytes inside of [ 14.762014] allocated 9-byte region [ffff888101b1cc00, ffff888101b1cc09) [ 14.762964] [ 14.763074] The buggy address belongs to the physical page: [ 14.763339] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b1c [ 14.763725] flags: 0x200000000000000(node=0|zone=2) [ 14.763973] page_type: f5(slab) [ 14.764141] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.764595] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.764840] page dumped because: kasan: bad access detected [ 14.765457] [ 14.765601] Memory state around the buggy address: [ 14.765948] ffff888101b1cb00: 00 02 fc fc 00 02 fc fc 00 02 fc fc fa fb fc fc [ 14.766479] ffff888101b1cb80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.766948] >ffff888101b1cc00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.767469] ^ [ 14.767810] ffff888101b1cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.768535] ffff888101b1cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.769094] ==================================================================
[ 14.992176] ================================================================== [ 14.993011] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50 [ 14.993917] Write of size 8 at addr ffff88810210ec88 by task kunit_try_catch/279 [ 14.994817] [ 14.995055] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 14.995102] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.995115] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.995137] Call Trace: [ 14.995166] <TASK> [ 14.995184] dump_stack_lvl+0x73/0xb0 [ 14.995214] print_report+0xd1/0x610 [ 14.995236] ? __virt_addr_valid+0x1db/0x2d0 [ 14.995259] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 14.995284] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.995305] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 14.995370] kasan_report+0x141/0x180 [ 14.995392] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 14.995433] kasan_check_range+0x10c/0x1c0 [ 14.995456] __kasan_check_write+0x18/0x20 [ 14.995475] kasan_bitops_modify.constprop.0+0x547/0xd50 [ 14.995499] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.995525] ? ret_from_fork_asm+0x1a/0x30 [ 14.995547] ? kthread+0x337/0x6f0 [ 14.995573] kasan_bitops_generic+0x116/0x1c0 [ 14.995596] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.995618] ? trace_hardirqs_on+0x37/0xe0 [ 14.995642] ? __pfx_read_tsc+0x10/0x10 [ 14.995662] ? ktime_get_ts64+0x86/0x230 [ 14.995684] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 14.995709] kunit_try_run_case+0x1a5/0x480 [ 14.995735] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.995758] ? queued_spin_lock_slowpath+0x116/0xb40 [ 14.995782] ? __kthread_parkme+0x82/0x180 [ 14.995802] ? preempt_count_sub+0x50/0x80 [ 14.995825] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.995848] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.995872] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.995895] kthread+0x337/0x6f0 [ 14.995914] ? trace_preempt_on+0x20/0xc0 [ 14.995935] ? __pfx_kthread+0x10/0x10 [ 14.995955] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.995976] ? calculate_sigpending+0x7b/0xa0 [ 14.996000] ? __pfx_kthread+0x10/0x10 [ 14.996021] ret_from_fork+0x116/0x1d0 [ 14.996039] ? __pfx_kthread+0x10/0x10 [ 14.996059] ret_from_fork_asm+0x1a/0x30 [ 14.996089] </TASK> [ 14.996100] [ 15.008984] Allocated by task 279: [ 15.009121] kasan_save_stack+0x45/0x70 [ 15.009278] kasan_save_track+0x18/0x40 [ 15.009437] kasan_save_alloc_info+0x3b/0x50 [ 15.009665] __kasan_kmalloc+0xb7/0xc0 [ 15.009863] __kmalloc_cache_noprof+0x189/0x420 [ 15.010085] kasan_bitops_generic+0x92/0x1c0 [ 15.010268] kunit_try_run_case+0x1a5/0x480 [ 15.010493] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.010861] kthread+0x337/0x6f0 [ 15.011030] ret_from_fork+0x116/0x1d0 [ 15.011215] ret_from_fork_asm+0x1a/0x30 [ 15.011507] [ 15.011602] The buggy address belongs to the object at ffff88810210ec80 [ 15.011602] which belongs to the cache kmalloc-16 of size 16 [ 15.012131] The buggy address is located 8 bytes inside of [ 15.012131] allocated 9-byte region [ffff88810210ec80, ffff88810210ec89) [ 15.012705] [ 15.012806] The buggy address belongs to the physical page: [ 15.013130] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10210e [ 15.013500] flags: 0x200000000000000(node=0|zone=2) [ 15.013730] page_type: f5(slab) [ 15.013849] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 15.014180] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 15.014525] page dumped because: kasan: bad access detected [ 15.014780] [ 15.014890] Memory state around the buggy address: [ 15.015087] ffff88810210eb80: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 15.015422] ffff88810210ec00: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 15.015753] >ffff88810210ec80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.016020] ^ [ 15.016140] ffff88810210ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.016577] ffff88810210ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.016896] ================================================================== [ 14.866393] ================================================================== [ 14.866731] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 14.867662] Write of size 8 at addr ffff88810210ec88 by task kunit_try_catch/279 [ 14.867915] [ 14.868011] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 14.868056] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.868069] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.868091] Call Trace: [ 14.868110] <TASK> [ 14.868125] dump_stack_lvl+0x73/0xb0 [ 14.868168] print_report+0xd1/0x610 [ 14.868190] ? __virt_addr_valid+0x1db/0x2d0 [ 14.868212] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 14.868237] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.868259] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 14.868284] kasan_report+0x141/0x180 [ 14.868305] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 14.868339] kasan_check_range+0x10c/0x1c0 [ 14.868363] __kasan_check_write+0x18/0x20 [ 14.868383] kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 14.868801] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.868829] ? ret_from_fork_asm+0x1a/0x30 [ 14.868873] ? kthread+0x337/0x6f0 [ 14.868899] kasan_bitops_generic+0x116/0x1c0 [ 14.868922] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.868946] ? trace_hardirqs_on+0x37/0xe0 [ 14.868969] ? __pfx_read_tsc+0x10/0x10 [ 14.868991] ? ktime_get_ts64+0x86/0x230 [ 14.869011] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 14.869038] kunit_try_run_case+0x1a5/0x480 [ 14.869062] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.869085] ? queued_spin_lock_slowpath+0x116/0xb40 [ 14.869109] ? __kthread_parkme+0x82/0x180 [ 14.869128] ? preempt_count_sub+0x50/0x80 [ 14.869161] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.869184] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.869208] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.869231] kthread+0x337/0x6f0 [ 14.869250] ? trace_preempt_on+0x20/0xc0 [ 14.869271] ? __pfx_kthread+0x10/0x10 [ 14.869291] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.869319] ? calculate_sigpending+0x7b/0xa0 [ 14.869342] ? __pfx_kthread+0x10/0x10 [ 14.869363] ret_from_fork+0x116/0x1d0 [ 14.869381] ? __pfx_kthread+0x10/0x10 [ 14.869402] ret_from_fork_asm+0x1a/0x30 [ 14.869431] </TASK> [ 14.869441] [ 14.887216] Allocated by task 279: [ 14.887473] kasan_save_stack+0x45/0x70 [ 14.887894] kasan_save_track+0x18/0x40 [ 14.888394] kasan_save_alloc_info+0x3b/0x50 [ 14.888555] __kasan_kmalloc+0xb7/0xc0 [ 14.888691] __kmalloc_cache_noprof+0x189/0x420 [ 14.888860] kasan_bitops_generic+0x92/0x1c0 [ 14.889319] kunit_try_run_case+0x1a5/0x480 [ 14.889764] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.890492] kthread+0x337/0x6f0 [ 14.890829] ret_from_fork+0x116/0x1d0 [ 14.891387] ret_from_fork_asm+0x1a/0x30 [ 14.891761] [ 14.892010] The buggy address belongs to the object at ffff88810210ec80 [ 14.892010] which belongs to the cache kmalloc-16 of size 16 [ 14.892655] The buggy address is located 8 bytes inside of [ 14.892655] allocated 9-byte region [ffff88810210ec80, ffff88810210ec89) [ 14.893357] [ 14.893520] The buggy address belongs to the physical page: [ 14.894024] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10210e [ 14.894701] flags: 0x200000000000000(node=0|zone=2) [ 14.895335] page_type: f5(slab) [ 14.895643] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.896482] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.896715] page dumped because: kasan: bad access detected [ 14.896892] [ 14.896963] Memory state around the buggy address: [ 14.897243] ffff88810210eb80: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.897654] ffff88810210ec00: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 14.897900] >ffff88810210ec80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.898196] ^ [ 14.898443] ffff88810210ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.898849] ffff88810210ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.899231] ================================================================== [ 14.842296] ================================================================== [ 14.842648] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 14.843330] Write of size 8 at addr ffff88810210ec88 by task kunit_try_catch/279 [ 14.843574] [ 14.843689] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 14.843732] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.843744] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.843767] Call Trace: [ 14.843782] <TASK> [ 14.843797] dump_stack_lvl+0x73/0xb0 [ 14.843825] print_report+0xd1/0x610 [ 14.843846] ? __virt_addr_valid+0x1db/0x2d0 [ 14.843921] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 14.843946] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.843969] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 14.843993] kasan_report+0x141/0x180 [ 14.844015] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 14.844044] kasan_check_range+0x10c/0x1c0 [ 14.844067] __kasan_check_write+0x18/0x20 [ 14.844086] kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 14.844112] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.844137] ? ret_from_fork_asm+0x1a/0x30 [ 14.844175] ? kthread+0x337/0x6f0 [ 14.844199] kasan_bitops_generic+0x116/0x1c0 [ 14.844222] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.844246] ? trace_hardirqs_on+0x37/0xe0 [ 14.844269] ? __pfx_read_tsc+0x10/0x10 [ 14.844290] ? ktime_get_ts64+0x86/0x230 [ 14.844309] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 14.844350] kunit_try_run_case+0x1a5/0x480 [ 14.844374] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.844398] ? queued_spin_lock_slowpath+0x116/0xb40 [ 14.844421] ? __kthread_parkme+0x82/0x180 [ 14.844441] ? preempt_count_sub+0x50/0x80 [ 14.844464] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.844487] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.844510] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.844535] kthread+0x337/0x6f0 [ 14.844554] ? trace_preempt_on+0x20/0xc0 [ 14.844575] ? __pfx_kthread+0x10/0x10 [ 14.844596] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.844616] ? calculate_sigpending+0x7b/0xa0 [ 14.844640] ? __pfx_kthread+0x10/0x10 [ 14.844661] ret_from_fork+0x116/0x1d0 [ 14.844679] ? __pfx_kthread+0x10/0x10 [ 14.844699] ret_from_fork_asm+0x1a/0x30 [ 14.844729] </TASK> [ 14.844738] [ 14.853367] Allocated by task 279: [ 14.853556] kasan_save_stack+0x45/0x70 [ 14.853760] kasan_save_track+0x18/0x40 [ 14.854076] kasan_save_alloc_info+0x3b/0x50 [ 14.854307] __kasan_kmalloc+0xb7/0xc0 [ 14.854501] __kmalloc_cache_noprof+0x189/0x420 [ 14.854662] kasan_bitops_generic+0x92/0x1c0 [ 14.854812] kunit_try_run_case+0x1a5/0x480 [ 14.855393] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.855939] kthread+0x337/0x6f0 [ 14.856086] ret_from_fork+0x116/0x1d0 [ 14.856238] ret_from_fork_asm+0x1a/0x30 [ 14.856387] [ 14.856538] The buggy address belongs to the object at ffff88810210ec80 [ 14.856538] which belongs to the cache kmalloc-16 of size 16 [ 14.857457] The buggy address is located 8 bytes inside of [ 14.857457] allocated 9-byte region [ffff88810210ec80, ffff88810210ec89) [ 14.857982] [ 14.858071] The buggy address belongs to the physical page: [ 14.858308] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10210e [ 14.859609] flags: 0x200000000000000(node=0|zone=2) [ 14.860087] page_type: f5(slab) [ 14.860291] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.860614] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.861227] page dumped because: kasan: bad access detected [ 14.861519] [ 14.861614] Memory state around the buggy address: [ 14.861821] ffff88810210eb80: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.862181] ffff88810210ec00: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 14.862810] >ffff88810210ec80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.863784] ^ [ 14.864295] ffff88810210ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.864623] ffff88810210ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.865191] ================================================================== [ 14.821959] ================================================================== [ 14.822683] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50 [ 14.823273] Write of size 8 at addr ffff88810210ec88 by task kunit_try_catch/279 [ 14.823585] [ 14.823700] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 14.823749] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.823762] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.823786] Call Trace: [ 14.823799] <TASK> [ 14.823817] dump_stack_lvl+0x73/0xb0 [ 14.823849] print_report+0xd1/0x610 [ 14.823872] ? __virt_addr_valid+0x1db/0x2d0 [ 14.823896] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 14.823921] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.823943] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 14.823967] kasan_report+0x141/0x180 [ 14.823989] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 14.824019] kasan_check_range+0x10c/0x1c0 [ 14.824042] __kasan_check_write+0x18/0x20 [ 14.824061] kasan_bitops_modify.constprop.0+0x101/0xd50 [ 14.824086] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.824112] ? ret_from_fork_asm+0x1a/0x30 [ 14.824134] ? kthread+0x337/0x6f0 [ 14.824173] kasan_bitops_generic+0x116/0x1c0 [ 14.824196] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.824218] ? trace_hardirqs_on+0x37/0xe0 [ 14.824243] ? __pfx_read_tsc+0x10/0x10 [ 14.824265] ? ktime_get_ts64+0x86/0x230 [ 14.824288] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 14.824313] kunit_try_run_case+0x1a5/0x480 [ 14.824344] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.824369] ? queued_spin_lock_slowpath+0x116/0xb40 [ 14.824394] ? __kthread_parkme+0x82/0x180 [ 14.824413] ? preempt_count_sub+0x50/0x80 [ 14.824437] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.824460] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.824484] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.824507] kthread+0x337/0x6f0 [ 14.824526] ? trace_preempt_on+0x20/0xc0 [ 14.824547] ? __pfx_kthread+0x10/0x10 [ 14.824567] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.824589] ? calculate_sigpending+0x7b/0xa0 [ 14.824614] ? __pfx_kthread+0x10/0x10 [ 14.824635] ret_from_fork+0x116/0x1d0 [ 14.824653] ? __pfx_kthread+0x10/0x10 [ 14.824674] ret_from_fork_asm+0x1a/0x30 [ 14.824703] </TASK> [ 14.824713] [ 14.832807] Allocated by task 279: [ 14.832946] kasan_save_stack+0x45/0x70 [ 14.833132] kasan_save_track+0x18/0x40 [ 14.833328] kasan_save_alloc_info+0x3b/0x50 [ 14.833540] __kasan_kmalloc+0xb7/0xc0 [ 14.833724] __kmalloc_cache_noprof+0x189/0x420 [ 14.833952] kasan_bitops_generic+0x92/0x1c0 [ 14.834200] kunit_try_run_case+0x1a5/0x480 [ 14.834660] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.835035] kthread+0x337/0x6f0 [ 14.835216] ret_from_fork+0x116/0x1d0 [ 14.835414] ret_from_fork_asm+0x1a/0x30 [ 14.835558] [ 14.835632] The buggy address belongs to the object at ffff88810210ec80 [ 14.835632] which belongs to the cache kmalloc-16 of size 16 [ 14.836473] The buggy address is located 8 bytes inside of [ 14.836473] allocated 9-byte region [ffff88810210ec80, ffff88810210ec89) [ 14.836944] [ 14.837046] The buggy address belongs to the physical page: [ 14.837239] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10210e [ 14.837814] flags: 0x200000000000000(node=0|zone=2) [ 14.838182] page_type: f5(slab) [ 14.838309] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.838548] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.838780] page dumped because: kasan: bad access detected [ 14.839003] [ 14.839097] Memory state around the buggy address: [ 14.839582] ffff88810210eb80: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.840247] ffff88810210ec00: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 14.840473] >ffff88810210ec80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.840690] ^ [ 14.840816] ffff88810210ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.841327] ffff88810210ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.841658] ================================================================== [ 14.919003] ================================================================== [ 14.919314] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50 [ 14.919663] Write of size 8 at addr ffff88810210ec88 by task kunit_try_catch/279 [ 14.920165] [ 14.920271] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 14.920316] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.920332] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.920356] Call Trace: [ 14.920372] <TASK> [ 14.920386] dump_stack_lvl+0x73/0xb0 [ 14.920414] print_report+0xd1/0x610 [ 14.920436] ? __virt_addr_valid+0x1db/0x2d0 [ 14.920458] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 14.920482] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.920504] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 14.920529] kasan_report+0x141/0x180 [ 14.920551] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 14.920581] kasan_check_range+0x10c/0x1c0 [ 14.920604] __kasan_check_write+0x18/0x20 [ 14.920624] kasan_bitops_modify.constprop.0+0x373/0xd50 [ 14.920649] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.920675] ? ret_from_fork_asm+0x1a/0x30 [ 14.920697] ? kthread+0x337/0x6f0 [ 14.920721] kasan_bitops_generic+0x116/0x1c0 [ 14.920744] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.920766] ? trace_hardirqs_on+0x37/0xe0 [ 14.920791] ? __pfx_read_tsc+0x10/0x10 [ 14.920811] ? ktime_get_ts64+0x86/0x230 [ 14.920832] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 14.921049] kunit_try_run_case+0x1a5/0x480 [ 14.921077] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.921101] ? queued_spin_lock_slowpath+0x116/0xb40 [ 14.921125] ? __kthread_parkme+0x82/0x180 [ 14.921159] ? preempt_count_sub+0x50/0x80 [ 14.921182] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.921206] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.921228] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.921252] kthread+0x337/0x6f0 [ 14.921271] ? trace_preempt_on+0x20/0xc0 [ 14.921292] ? __pfx_kthread+0x10/0x10 [ 14.921312] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.921333] ? calculate_sigpending+0x7b/0xa0 [ 14.921357] ? __pfx_kthread+0x10/0x10 [ 14.921378] ret_from_fork+0x116/0x1d0 [ 14.921396] ? __pfx_kthread+0x10/0x10 [ 14.921416] ret_from_fork_asm+0x1a/0x30 [ 14.921445] </TASK> [ 14.921455] [ 14.929460] Allocated by task 279: [ 14.929637] kasan_save_stack+0x45/0x70 [ 14.930031] kasan_save_track+0x18/0x40 [ 14.930232] kasan_save_alloc_info+0x3b/0x50 [ 14.930442] __kasan_kmalloc+0xb7/0xc0 [ 14.930600] __kmalloc_cache_noprof+0x189/0x420 [ 14.930765] kasan_bitops_generic+0x92/0x1c0 [ 14.930974] kunit_try_run_case+0x1a5/0x480 [ 14.931188] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.931470] kthread+0x337/0x6f0 [ 14.931609] ret_from_fork+0x116/0x1d0 [ 14.931777] ret_from_fork_asm+0x1a/0x30 [ 14.931949] [ 14.932027] The buggy address belongs to the object at ffff88810210ec80 [ 14.932027] which belongs to the cache kmalloc-16 of size 16 [ 14.932546] The buggy address is located 8 bytes inside of [ 14.932546] allocated 9-byte region [ffff88810210ec80, ffff88810210ec89) [ 14.933001] [ 14.933096] The buggy address belongs to the physical page: [ 14.933336] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10210e [ 14.933669] flags: 0x200000000000000(node=0|zone=2) [ 14.934004] page_type: f5(slab) [ 14.934170] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.934482] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.934711] page dumped because: kasan: bad access detected [ 14.934883] [ 14.934953] Memory state around the buggy address: [ 14.935110] ffff88810210eb80: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.935338] ffff88810210ec00: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 14.935586] >ffff88810210ec80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.935909] ^ [ 14.936089] ffff88810210ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.936543] ffff88810210ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.936856] ================================================================== [ 14.955716] ================================================================== [ 14.956026] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 14.956412] Write of size 8 at addr ffff88810210ec88 by task kunit_try_catch/279 [ 14.956698] [ 14.956806] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 14.956850] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.956862] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.956883] Call Trace: [ 14.956899] <TASK> [ 14.956913] dump_stack_lvl+0x73/0xb0 [ 14.956940] print_report+0xd1/0x610 [ 14.956962] ? __virt_addr_valid+0x1db/0x2d0 [ 14.956983] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 14.957007] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.957029] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 14.957053] kasan_report+0x141/0x180 [ 14.957075] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 14.957104] kasan_check_range+0x10c/0x1c0 [ 14.957127] __kasan_check_write+0x18/0x20 [ 14.957156] kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 14.957181] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.957207] ? ret_from_fork_asm+0x1a/0x30 [ 14.957228] ? kthread+0x337/0x6f0 [ 14.957253] kasan_bitops_generic+0x116/0x1c0 [ 14.957276] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.957297] ? trace_hardirqs_on+0x37/0xe0 [ 14.957331] ? __pfx_read_tsc+0x10/0x10 [ 14.957351] ? ktime_get_ts64+0x86/0x230 [ 14.957372] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 14.957399] kunit_try_run_case+0x1a5/0x480 [ 14.957423] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.957448] ? queued_spin_lock_slowpath+0x116/0xb40 [ 14.957471] ? __kthread_parkme+0x82/0x180 [ 14.957490] ? preempt_count_sub+0x50/0x80 [ 14.957513] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.957537] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.957560] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.957582] kthread+0x337/0x6f0 [ 14.957601] ? trace_preempt_on+0x20/0xc0 [ 14.957622] ? __pfx_kthread+0x10/0x10 [ 14.957642] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.957663] ? calculate_sigpending+0x7b/0xa0 [ 14.957685] ? __pfx_kthread+0x10/0x10 [ 14.957706] ret_from_fork+0x116/0x1d0 [ 14.957725] ? __pfx_kthread+0x10/0x10 [ 14.957744] ret_from_fork_asm+0x1a/0x30 [ 14.957773] </TASK> [ 14.957784] [ 14.973861] Allocated by task 279: [ 14.974483] kasan_save_stack+0x45/0x70 [ 14.975371] kasan_save_track+0x18/0x40 [ 14.976021] kasan_save_alloc_info+0x3b/0x50 [ 14.976587] __kasan_kmalloc+0xb7/0xc0 [ 14.977185] __kmalloc_cache_noprof+0x189/0x420 [ 14.977765] kasan_bitops_generic+0x92/0x1c0 [ 14.977932] kunit_try_run_case+0x1a5/0x480 [ 14.978092] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.978985] kthread+0x337/0x6f0 [ 14.979557] ret_from_fork+0x116/0x1d0 [ 14.980207] ret_from_fork_asm+0x1a/0x30 [ 14.980813] [ 14.981234] The buggy address belongs to the object at ffff88810210ec80 [ 14.981234] which belongs to the cache kmalloc-16 of size 16 [ 14.982588] The buggy address is located 8 bytes inside of [ 14.982588] allocated 9-byte region [ffff88810210ec80, ffff88810210ec89) [ 14.983087] [ 14.983180] The buggy address belongs to the physical page: [ 14.983839] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10210e [ 14.985109] flags: 0x200000000000000(node=0|zone=2) [ 14.985706] page_type: f5(slab) [ 14.986228] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.986557] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.986794] page dumped because: kasan: bad access detected [ 14.986969] [ 14.987044] Memory state around the buggy address: [ 14.987220] ffff88810210eb80: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.987951] ffff88810210ec00: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 14.988803] >ffff88810210ec80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.989577] ^ [ 14.989943] ffff88810210ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.990766] ffff88810210ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.991467] ================================================================== [ 14.899819] ================================================================== [ 14.900169] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 14.900549] Write of size 8 at addr ffff88810210ec88 by task kunit_try_catch/279 [ 14.900871] [ 14.900971] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 14.901014] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.901026] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.901049] Call Trace: [ 14.901063] <TASK> [ 14.901079] dump_stack_lvl+0x73/0xb0 [ 14.901107] print_report+0xd1/0x610 [ 14.901128] ? __virt_addr_valid+0x1db/0x2d0 [ 14.901162] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 14.901189] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.901210] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 14.901236] kasan_report+0x141/0x180 [ 14.901258] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 14.901287] kasan_check_range+0x10c/0x1c0 [ 14.901310] __kasan_check_write+0x18/0x20 [ 14.901330] kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 14.901355] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.901462] ? ret_from_fork_asm+0x1a/0x30 [ 14.901487] ? kthread+0x337/0x6f0 [ 14.901512] kasan_bitops_generic+0x116/0x1c0 [ 14.901535] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.901559] ? trace_hardirqs_on+0x37/0xe0 [ 14.901582] ? __pfx_read_tsc+0x10/0x10 [ 14.901603] ? ktime_get_ts64+0x86/0x230 [ 14.901623] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 14.901651] kunit_try_run_case+0x1a5/0x480 [ 14.901675] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.901699] ? queued_spin_lock_slowpath+0x116/0xb40 [ 14.901724] ? __kthread_parkme+0x82/0x180 [ 14.901744] ? preempt_count_sub+0x50/0x80 [ 14.901767] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.901790] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.901813] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.901836] kthread+0x337/0x6f0 [ 14.901855] ? trace_preempt_on+0x20/0xc0 [ 14.901876] ? __pfx_kthread+0x10/0x10 [ 14.901897] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.901917] ? calculate_sigpending+0x7b/0xa0 [ 14.901941] ? __pfx_kthread+0x10/0x10 [ 14.901961] ret_from_fork+0x116/0x1d0 [ 14.901980] ? __pfx_kthread+0x10/0x10 [ 14.901999] ret_from_fork_asm+0x1a/0x30 [ 14.902029] </TASK> [ 14.902039] [ 14.910430] Allocated by task 279: [ 14.910557] kasan_save_stack+0x45/0x70 [ 14.910752] kasan_save_track+0x18/0x40 [ 14.910939] kasan_save_alloc_info+0x3b/0x50 [ 14.911165] __kasan_kmalloc+0xb7/0xc0 [ 14.911348] __kmalloc_cache_noprof+0x189/0x420 [ 14.911567] kasan_bitops_generic+0x92/0x1c0 [ 14.911965] kunit_try_run_case+0x1a5/0x480 [ 14.912157] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.912350] kthread+0x337/0x6f0 [ 14.912524] ret_from_fork+0x116/0x1d0 [ 14.912713] ret_from_fork_asm+0x1a/0x30 [ 14.913061] [ 14.913161] The buggy address belongs to the object at ffff88810210ec80 [ 14.913161] which belongs to the cache kmalloc-16 of size 16 [ 14.913640] The buggy address is located 8 bytes inside of [ 14.913640] allocated 9-byte region [ffff88810210ec80, ffff88810210ec89) [ 14.914235] [ 14.914315] The buggy address belongs to the physical page: [ 14.914543] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10210e [ 14.914816] flags: 0x200000000000000(node=0|zone=2) [ 14.915104] page_type: f5(slab) [ 14.915298] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.915541] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.915762] page dumped because: kasan: bad access detected [ 14.915928] [ 14.915996] Memory state around the buggy address: [ 14.916156] ffff88810210eb80: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.916479] ffff88810210ec00: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 14.917112] >ffff88810210ec80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.917534] ^ [ 14.917661] ffff88810210ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.917952] ffff88810210ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.918286] ================================================================== [ 14.937304] ================================================================== [ 14.937544] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 14.937799] Write of size 8 at addr ffff88810210ec88 by task kunit_try_catch/279 [ 14.938322] [ 14.938439] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT(voluntary) [ 14.938481] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.938493] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.938515] Call Trace: [ 14.938528] <TASK> [ 14.938542] dump_stack_lvl+0x73/0xb0 [ 14.938568] print_report+0xd1/0x610 [ 14.938590] ? __virt_addr_valid+0x1db/0x2d0 [ 14.938613] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 14.938637] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.938660] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 14.938685] kasan_report+0x141/0x180 [ 14.938706] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 14.938735] kasan_check_range+0x10c/0x1c0 [ 14.938758] __kasan_check_write+0x18/0x20 [ 14.938776] kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 14.938802] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.938827] ? ret_from_fork_asm+0x1a/0x30 [ 14.938849] ? kthread+0x337/0x6f0 [ 14.938872] kasan_bitops_generic+0x116/0x1c0 [ 14.938895] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.938917] ? trace_hardirqs_on+0x37/0xe0 [ 14.938939] ? __pfx_read_tsc+0x10/0x10 [ 14.938959] ? ktime_get_ts64+0x86/0x230 [ 14.938979] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 14.939005] kunit_try_run_case+0x1a5/0x480 [ 14.939028] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.939052] ? queued_spin_lock_slowpath+0x116/0xb40 [ 14.939076] ? __kthread_parkme+0x82/0x180 [ 14.939095] ? preempt_count_sub+0x50/0x80 [ 14.939118] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.939141] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.939176] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.939198] kthread+0x337/0x6f0 [ 14.939217] ? trace_preempt_on+0x20/0xc0 [ 14.939238] ? __pfx_kthread+0x10/0x10 [ 14.939259] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.939280] ? calculate_sigpending+0x7b/0xa0 [ 14.939302] ? __pfx_kthread+0x10/0x10 [ 14.939324] ret_from_fork+0x116/0x1d0 [ 14.939342] ? __pfx_kthread+0x10/0x10 [ 14.939362] ret_from_fork_asm+0x1a/0x30 [ 14.939392] </TASK> [ 14.939401] [ 14.947538] Allocated by task 279: [ 14.947673] kasan_save_stack+0x45/0x70 [ 14.947823] kasan_save_track+0x18/0x40 [ 14.947963] kasan_save_alloc_info+0x3b/0x50 [ 14.948115] __kasan_kmalloc+0xb7/0xc0 [ 14.948312] __kmalloc_cache_noprof+0x189/0x420 [ 14.948545] kasan_bitops_generic+0x92/0x1c0 [ 14.948758] kunit_try_run_case+0x1a5/0x480 [ 14.948972] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.949246] kthread+0x337/0x6f0 [ 14.949521] ret_from_fork+0x116/0x1d0 [ 14.949707] ret_from_fork_asm+0x1a/0x30 [ 14.949875] [ 14.949971] The buggy address belongs to the object at ffff88810210ec80 [ 14.949971] which belongs to the cache kmalloc-16 of size 16 [ 14.950399] The buggy address is located 8 bytes inside of [ 14.950399] allocated 9-byte region [ffff88810210ec80, ffff88810210ec89) [ 14.951236] [ 14.951315] The buggy address belongs to the physical page: [ 14.951529] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10210e [ 14.951834] flags: 0x200000000000000(node=0|zone=2) [ 14.952080] page_type: f5(slab) [ 14.952255] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.952563] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.952845] page dumped because: kasan: bad access detected [ 14.953096] [ 14.953202] Memory state around the buggy address: [ 14.953536] ffff88810210eb80: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.953829] ffff88810210ec00: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 14.954093] >ffff88810210ec80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.954438] ^ [ 14.954615] ffff88810210ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.954880] ffff88810210ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.955180] ==================================================================