Date
July 1, 2025, 12:10 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 19.745225] ================================================================== [ 19.745355] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 19.745422] Write of size 8 at addr fff00000c3f30b28 by task kunit_try_catch/261 [ 19.745510] [ 19.745550] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 19.745635] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.745665] Hardware name: linux,dummy-virt (DT) [ 19.745703] Call trace: [ 19.745729] show_stack+0x20/0x38 (C) [ 19.745782] dump_stack_lvl+0x8c/0xd0 [ 19.745834] print_report+0x118/0x608 [ 19.745894] kasan_report+0xdc/0x128 [ 19.745943] kasan_check_range+0x100/0x1a8 [ 19.745993] __kasan_check_write+0x20/0x30 [ 19.746040] kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 19.746094] kasan_bitops_generic+0x110/0x1c8 [ 19.746153] kunit_try_run_case+0x170/0x3f0 [ 19.746213] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.746269] kthread+0x328/0x630 [ 19.746314] ret_from_fork+0x10/0x20 [ 19.746364] [ 19.746385] Allocated by task 261: [ 19.746427] kasan_save_stack+0x3c/0x68 [ 19.746832] kasan_save_track+0x20/0x40 [ 19.747340] kasan_save_alloc_info+0x40/0x58 [ 19.747524] __kasan_kmalloc+0xd4/0xd8 [ 19.747569] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.747613] kasan_bitops_generic+0xa0/0x1c8 [ 19.747791] kunit_try_run_case+0x170/0x3f0 [ 19.748199] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.748284] kthread+0x328/0x630 [ 19.748492] ret_from_fork+0x10/0x20 [ 19.748550] [ 19.748984] The buggy address belongs to the object at fff00000c3f30b20 [ 19.748984] which belongs to the cache kmalloc-16 of size 16 [ 19.749063] The buggy address is located 8 bytes inside of [ 19.749063] allocated 9-byte region [fff00000c3f30b20, fff00000c3f30b29) [ 19.749267] [ 19.749294] The buggy address belongs to the physical page: [ 19.749351] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f30 [ 19.749566] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.749787] page_type: f5(slab) [ 19.749887] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 19.750081] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 19.750129] page dumped because: kasan: bad access detected [ 19.750519] [ 19.750560] Memory state around the buggy address: [ 19.750772] fff00000c3f30a00: 00 05 fc fc fa fb fc fc 00 02 fc fc fa fb fc fc [ 19.750905] fff00000c3f30a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 19.751133] >fff00000c3f30b00: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 19.751182] ^ [ 19.751218] fff00000c3f30b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.751512] fff00000c3f30c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.751671] ================================================================== [ 19.753257] ================================================================== [ 19.753367] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 19.753703] Read of size 8 at addr fff00000c3f30b28 by task kunit_try_catch/261 [ 19.753791] [ 19.753993] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 19.754223] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.754346] Hardware name: linux,dummy-virt (DT) [ 19.754419] Call trace: [ 19.754459] show_stack+0x20/0x38 (C) [ 19.754836] dump_stack_lvl+0x8c/0xd0 [ 19.754914] print_report+0x118/0x608 [ 19.754964] kasan_report+0xdc/0x128 [ 19.755412] __asan_report_load8_noabort+0x20/0x30 [ 19.755997] kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 19.756175] kasan_bitops_generic+0x110/0x1c8 [ 19.756293] kunit_try_run_case+0x170/0x3f0 [ 19.756406] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.756889] kthread+0x328/0x630 [ 19.757131] ret_from_fork+0x10/0x20 [ 19.757386] [ 19.757490] Allocated by task 261: [ 19.757607] kasan_save_stack+0x3c/0x68 [ 19.757724] kasan_save_track+0x20/0x40 [ 19.757921] kasan_save_alloc_info+0x40/0x58 [ 19.758170] __kasan_kmalloc+0xd4/0xd8 [ 19.758393] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.758783] kasan_bitops_generic+0xa0/0x1c8 [ 19.759061] kunit_try_run_case+0x170/0x3f0 [ 19.759215] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.759270] kthread+0x328/0x630 [ 19.759687] ret_from_fork+0x10/0x20 [ 19.759761] [ 19.759787] The buggy address belongs to the object at fff00000c3f30b20 [ 19.759787] which belongs to the cache kmalloc-16 of size 16 [ 19.759859] The buggy address is located 8 bytes inside of [ 19.759859] allocated 9-byte region [fff00000c3f30b20, fff00000c3f30b29) [ 19.759954] [ 19.759976] The buggy address belongs to the physical page: [ 19.760020] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f30 [ 19.760093] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.760159] page_type: f5(slab) [ 19.760200] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 19.760256] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 19.760301] page dumped because: kasan: bad access detected [ 19.760337] [ 19.760363] Memory state around the buggy address: [ 19.760414] fff00000c3f30a00: 00 05 fc fc fa fb fc fc 00 02 fc fc fa fb fc fc [ 19.760475] fff00000c3f30a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 19.760529] >fff00000c3f30b00: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 19.760571] ^ [ 19.760621] fff00000c3f30b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.760667] fff00000c3f30c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.760709] ================================================================== [ 19.772629] ================================================================== [ 19.772686] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbc0 [ 19.772742] Read of size 8 at addr fff00000c3f30b28 by task kunit_try_catch/261 [ 19.772795] [ 19.772827] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 19.772927] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.772961] Hardware name: linux,dummy-virt (DT) [ 19.772995] Call trace: [ 19.773018] show_stack+0x20/0x38 (C) [ 19.773069] dump_stack_lvl+0x8c/0xd0 [ 19.773119] print_report+0x118/0x608 [ 19.773169] kasan_report+0xdc/0x128 [ 19.773217] __asan_report_load8_noabort+0x20/0x30 [ 19.773268] kasan_bitops_modify.constprop.0+0xa80/0xbc0 [ 19.773322] kasan_bitops_generic+0x110/0x1c8 [ 19.773371] kunit_try_run_case+0x170/0x3f0 [ 19.773421] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.775225] kthread+0x328/0x630 [ 19.775389] ret_from_fork+0x10/0x20 [ 19.775462] [ 19.775516] Allocated by task 261: [ 19.775551] kasan_save_stack+0x3c/0x68 [ 19.775597] kasan_save_track+0x20/0x40 [ 19.775894] kasan_save_alloc_info+0x40/0x58 [ 19.776151] __kasan_kmalloc+0xd4/0xd8 [ 19.776482] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.776620] kasan_bitops_generic+0xa0/0x1c8 [ 19.776697] kunit_try_run_case+0x170/0x3f0 [ 19.776740] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.776978] kthread+0x328/0x630 [ 19.777053] ret_from_fork+0x10/0x20 [ 19.777247] [ 19.777364] The buggy address belongs to the object at fff00000c3f30b20 [ 19.777364] which belongs to the cache kmalloc-16 of size 16 [ 19.777543] The buggy address is located 8 bytes inside of [ 19.777543] allocated 9-byte region [fff00000c3f30b20, fff00000c3f30b29) [ 19.777690] [ 19.778031] The buggy address belongs to the physical page: [ 19.778143] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f30 [ 19.778213] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.778272] page_type: f5(slab) [ 19.778311] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 19.778397] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 19.778457] page dumped because: kasan: bad access detected [ 19.778793] [ 19.778815] Memory state around the buggy address: [ 19.778987] fff00000c3f30a00: 00 05 fc fc fa fb fc fc 00 02 fc fc fa fb fc fc [ 19.779119] fff00000c3f30a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 19.779332] >fff00000c3f30b00: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 19.779419] ^ [ 19.779526] fff00000c3f30b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.779711] fff00000c3f30c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.781408] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc0 [ 19.782099] dump_stack_lvl+0x8c/0xd0 [ 19.782492] __kasan_check_write+0x20/0x30 [ 19.782705] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.783342] __kasan_kmalloc+0xd4/0xd8 [ 19.784136] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.785374] The buggy address is located 8 bytes inside of [ 19.785374] allocated 9-byte region [fff00000c3f30b20, fff00000c3f30b29) [ 19.786380] Memory state around the buggy address: [ 19.786413] fff00000c3f30a00: 00 05 fc fc fa fb fc fc 00 02 fc fc fa fb fc fc [ 19.786563] ^ [ 19.786652] fff00000c3f30c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.788248] Write of size 8 at addr fff00000c3f30b28 by task kunit_try_catch/261 [ 19.789440] Hardware name: linux,dummy-virt (DT) [ 19.790084] kasan_report+0xdc/0x128 [ 19.790831] kunit_try_run_case+0x170/0x3f0 [ 19.791994] __kasan_kmalloc+0xd4/0xd8 [ 19.792042] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.792711] kthread+0x328/0x630 [ 19.793717] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.793962] [ 19.793991] Memory state around the buggy address: [ 19.794036] fff00000c3f30a00: 00 05 fc fc fa fb fc fc 00 02 fc fc fa fb fc fc [ 19.794214] fff00000c3f30b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.795947] Read of size 8 at addr fff00000c3f30b28 by task kunit_try_catch/261 [ 19.797122] print_report+0x118/0x608 [ 19.797476] kasan_bitops_modify.constprop.0+0xaec/0xbc0 [ 19.797646] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.798628] kunit_try_run_case+0x170/0x3f0 [ 19.799367] [ 19.799649] [ 19.800255] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.801020] [ 19.801206] Memory state around the buggy address: [ 19.801329] fff00000c3f30a00: 00 05 fc fc fa fb fc fc 00 02 fc fc fa fb fc fc [ 19.801740] >fff00000c3f30b00: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 19.802663] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc0 [ 19.803283] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.803568] Call trace: [ 19.803990] dump_stack_lvl+0x8c/0xd0 [ 19.804639] __kasan_check_write+0x20/0x30 [ 19.805123] kunit_try_run_case+0x170/0x3f0 [ 19.806072] kasan_save_track+0x20/0x40 [ 19.807022] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.807351] [ 19.807419] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f30 [ 19.807732] [ 19.807753] Memory state around the buggy address: [ 19.807807] fff00000c3f30a00: 00 05 fc fc fa fb fc fc 00 02 fc fc fa fb fc fc [ 19.807865] fff00000c3f30a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 19.808105] ================================================================== [ 19.762719] ================================================================== [ 19.762797] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc0 [ 19.762850] Write of size 8 at addr fff00000c3f30b28 by task kunit_try_catch/261 [ 19.762902] [ 19.763156] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 19.763295] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.763560] Hardware name: linux,dummy-virt (DT) [ 19.763613] Call trace: [ 19.763658] show_stack+0x20/0x38 (C) [ 19.763873] dump_stack_lvl+0x8c/0xd0 [ 19.764215] print_report+0x118/0x608 [ 19.764327] kasan_report+0xdc/0x128 [ 19.764520] kasan_check_range+0x100/0x1a8 [ 19.764636] __kasan_check_write+0x20/0x30 [ 19.764872] kasan_bitops_modify.constprop.0+0x1dc/0xbc0 [ 19.765140] kasan_bitops_generic+0x110/0x1c8 [ 19.765221] kunit_try_run_case+0x170/0x3f0 [ 19.765439] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.765756] kthread+0x328/0x630 [ 19.766141] ret_from_fork+0x10/0x20 [ 19.766627] [ 19.766669] Allocated by task 261: [ 19.766870] kasan_save_stack+0x3c/0x68 [ 19.766923] kasan_save_track+0x20/0x40 [ 19.767317] kasan_save_alloc_info+0x40/0x58 [ 19.767384] __kasan_kmalloc+0xd4/0xd8 [ 19.767805] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.767967] kasan_bitops_generic+0xa0/0x1c8 [ 19.768163] kunit_try_run_case+0x170/0x3f0 [ 19.768610] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.768805] kthread+0x328/0x630 [ 19.769050] ret_from_fork+0x10/0x20 [ 19.769574] [ 19.769768] The buggy address belongs to the object at fff00000c3f30b20 [ 19.769768] which belongs to the cache kmalloc-16 of size 16 [ 19.770062] The buggy address is located 8 bytes inside of [ 19.770062] allocated 9-byte region [fff00000c3f30b20, fff00000c3f30b29) [ 19.770435] [ 19.770571] The buggy address belongs to the physical page: [ 19.770613] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f30 [ 19.770820] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.771023] page_type: f5(slab) [ 19.771094] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 19.771762] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 19.771816] page dumped because: kasan: bad access detected [ 19.771852] [ 19.771874] Memory state around the buggy address: [ 19.771913] fff00000c3f30a00: 00 05 fc fc fa fb fc fc 00 02 fc fc fa fb fc fc [ 19.771961] fff00000c3f30a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 19.772008] >fff00000c3f30b00: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 19.772049] ^ [ 19.772085] fff00000c3f30b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.772130] fff00000c3f30c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.772171] ==================================================================
[ 13.513502] ================================================================== [ 13.513822] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 13.514100] Write of size 8 at addr ffff8881027a1108 by task kunit_try_catch/278 [ 13.514323] [ 13.514431] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.514473] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.514485] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.514505] Call Trace: [ 13.514517] <TASK> [ 13.514532] dump_stack_lvl+0x73/0xb0 [ 13.514556] print_report+0xd1/0x650 [ 13.514577] ? __virt_addr_valid+0x1db/0x2d0 [ 13.514598] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 13.514623] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.514644] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 13.514668] kasan_report+0x141/0x180 [ 13.514689] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 13.514719] kasan_check_range+0x10c/0x1c0 [ 13.514742] __kasan_check_write+0x18/0x20 [ 13.514761] kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 13.514785] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 13.514811] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.514834] ? finish_task_switch.isra.0+0x156/0x700 [ 13.514855] ? kasan_bitops_generic+0x92/0x1c0 [ 13.514883] kasan_bitops_generic+0x116/0x1c0 [ 13.514905] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.514930] ? __pfx_read_tsc+0x10/0x10 [ 13.514949] ? ktime_get_ts64+0x86/0x230 [ 13.514972] kunit_try_run_case+0x1a5/0x480 [ 13.514993] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.515015] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.515079] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.515101] ? __kthread_parkme+0x82/0x180 [ 13.515121] ? preempt_count_sub+0x50/0x80 [ 13.515162] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.515185] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.515207] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.515229] kthread+0x337/0x6f0 [ 13.515248] ? trace_preempt_on+0x20/0xc0 [ 13.515269] ? __pfx_kthread+0x10/0x10 [ 13.515290] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.515310] ? calculate_sigpending+0x7b/0xa0 [ 13.515333] ? __pfx_kthread+0x10/0x10 [ 13.515354] ret_from_fork+0x116/0x1d0 [ 13.515372] ? __pfx_kthread+0x10/0x10 [ 13.515392] ret_from_fork_asm+0x1a/0x30 [ 13.515421] </TASK> [ 13.515432] [ 13.523237] Allocated by task 278: [ 13.523401] kasan_save_stack+0x45/0x70 [ 13.523565] kasan_save_track+0x18/0x40 [ 13.523744] kasan_save_alloc_info+0x3b/0x50 [ 13.523894] __kasan_kmalloc+0xb7/0xc0 [ 13.524035] __kmalloc_cache_noprof+0x189/0x420 [ 13.524215] kasan_bitops_generic+0x92/0x1c0 [ 13.524392] kunit_try_run_case+0x1a5/0x480 [ 13.524569] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.524797] kthread+0x337/0x6f0 [ 13.524963] ret_from_fork+0x116/0x1d0 [ 13.525105] ret_from_fork_asm+0x1a/0x30 [ 13.525263] [ 13.525334] The buggy address belongs to the object at ffff8881027a1100 [ 13.525334] which belongs to the cache kmalloc-16 of size 16 [ 13.525787] The buggy address is located 8 bytes inside of [ 13.525787] allocated 9-byte region [ffff8881027a1100, ffff8881027a1109) [ 13.526341] [ 13.526412] The buggy address belongs to the physical page: [ 13.526583] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027a1 [ 13.526821] flags: 0x200000000000000(node=0|zone=2) [ 13.526983] page_type: f5(slab) [ 13.527188] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.527536] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.527879] page dumped because: kasan: bad access detected [ 13.528160] [ 13.528256] Memory state around the buggy address: [ 13.528490] ffff8881027a1000: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 13.528808] ffff8881027a1080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.529150] >ffff8881027a1100: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.529385] ^ [ 13.529505] ffff8881027a1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.529753] ffff8881027a1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.530087] ================================================================== [ 13.493938] ================================================================== [ 13.494811] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50 [ 13.495238] Write of size 8 at addr ffff8881027a1108 by task kunit_try_catch/278 [ 13.495520] [ 13.495630] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.495670] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.495682] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.495703] Call Trace: [ 13.495716] <TASK> [ 13.495731] dump_stack_lvl+0x73/0xb0 [ 13.495756] print_report+0xd1/0x650 [ 13.495778] ? __virt_addr_valid+0x1db/0x2d0 [ 13.495799] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 13.495824] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.495846] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 13.495872] kasan_report+0x141/0x180 [ 13.495892] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 13.495922] kasan_check_range+0x10c/0x1c0 [ 13.495945] __kasan_check_write+0x18/0x20 [ 13.495964] kasan_bitops_modify.constprop.0+0x373/0xd50 [ 13.495988] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 13.496015] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.496051] ? finish_task_switch.isra.0+0x156/0x700 [ 13.496073] ? kasan_bitops_generic+0x92/0x1c0 [ 13.496100] kasan_bitops_generic+0x116/0x1c0 [ 13.496122] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.496147] ? __pfx_read_tsc+0x10/0x10 [ 13.496167] ? ktime_get_ts64+0x86/0x230 [ 13.496190] kunit_try_run_case+0x1a5/0x480 [ 13.496213] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.496234] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.496257] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.496279] ? __kthread_parkme+0x82/0x180 [ 13.496299] ? preempt_count_sub+0x50/0x80 [ 13.496321] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.496344] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.496366] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.496388] kthread+0x337/0x6f0 [ 13.496407] ? trace_preempt_on+0x20/0xc0 [ 13.496429] ? __pfx_kthread+0x10/0x10 [ 13.496449] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.496470] ? calculate_sigpending+0x7b/0xa0 [ 13.496492] ? __pfx_kthread+0x10/0x10 [ 13.496513] ret_from_fork+0x116/0x1d0 [ 13.496530] ? __pfx_kthread+0x10/0x10 [ 13.496550] ret_from_fork_asm+0x1a/0x30 [ 13.496579] </TASK> [ 13.496590] [ 13.504392] Allocated by task 278: [ 13.504585] kasan_save_stack+0x45/0x70 [ 13.504749] kasan_save_track+0x18/0x40 [ 13.504938] kasan_save_alloc_info+0x3b/0x50 [ 13.505124] __kasan_kmalloc+0xb7/0xc0 [ 13.505294] __kmalloc_cache_noprof+0x189/0x420 [ 13.505522] kasan_bitops_generic+0x92/0x1c0 [ 13.505690] kunit_try_run_case+0x1a5/0x480 [ 13.505836] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.506008] kthread+0x337/0x6f0 [ 13.506139] ret_from_fork+0x116/0x1d0 [ 13.506270] ret_from_fork_asm+0x1a/0x30 [ 13.506407] [ 13.506477] The buggy address belongs to the object at ffff8881027a1100 [ 13.506477] which belongs to the cache kmalloc-16 of size 16 [ 13.506826] The buggy address is located 8 bytes inside of [ 13.506826] allocated 9-byte region [ffff8881027a1100, ffff8881027a1109) [ 13.507934] [ 13.508049] The buggy address belongs to the physical page: [ 13.508298] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027a1 [ 13.508644] flags: 0x200000000000000(node=0|zone=2) [ 13.508945] page_type: f5(slab) [ 13.509125] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.509475] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.509767] page dumped because: kasan: bad access detected [ 13.509939] [ 13.510010] Memory state around the buggy address: [ 13.510210] ffff8881027a1000: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 13.510537] ffff8881027a1080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.510852] >ffff8881027a1100: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.511246] ^ [ 13.511425] ffff8881027a1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.511686] ffff8881027a1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.511941] ================================================================== [ 13.457159] ================================================================== [ 13.457511] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 13.458253] Write of size 8 at addr ffff8881027a1108 by task kunit_try_catch/278 [ 13.458477] [ 13.458559] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.458598] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.458610] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.458631] Call Trace: [ 13.458644] <TASK> [ 13.458657] dump_stack_lvl+0x73/0xb0 [ 13.458684] print_report+0xd1/0x650 [ 13.458706] ? __virt_addr_valid+0x1db/0x2d0 [ 13.458727] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 13.458751] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.458773] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 13.458799] kasan_report+0x141/0x180 [ 13.458821] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 13.458850] kasan_check_range+0x10c/0x1c0 [ 13.458873] __kasan_check_write+0x18/0x20 [ 13.458892] kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 13.458916] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 13.458942] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.458966] ? finish_task_switch.isra.0+0x156/0x700 [ 13.458987] ? kasan_bitops_generic+0x92/0x1c0 [ 13.459014] kasan_bitops_generic+0x116/0x1c0 [ 13.459049] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.459077] ? __pfx_read_tsc+0x10/0x10 [ 13.459097] ? ktime_get_ts64+0x86/0x230 [ 13.459120] kunit_try_run_case+0x1a5/0x480 [ 13.459143] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.459164] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.459186] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.459211] ? __kthread_parkme+0x82/0x180 [ 13.459230] ? preempt_count_sub+0x50/0x80 [ 13.459252] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.459275] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.459299] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.459335] kthread+0x337/0x6f0 [ 13.459354] ? trace_preempt_on+0x20/0xc0 [ 13.459376] ? __pfx_kthread+0x10/0x10 [ 13.459396] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.459416] ? calculate_sigpending+0x7b/0xa0 [ 13.459439] ? __pfx_kthread+0x10/0x10 [ 13.459460] ret_from_fork+0x116/0x1d0 [ 13.459477] ? __pfx_kthread+0x10/0x10 [ 13.459497] ret_from_fork_asm+0x1a/0x30 [ 13.459526] </TASK> [ 13.459537] [ 13.467259] Allocated by task 278: [ 13.467437] kasan_save_stack+0x45/0x70 [ 13.467578] kasan_save_track+0x18/0x40 [ 13.467711] kasan_save_alloc_info+0x3b/0x50 [ 13.467857] __kasan_kmalloc+0xb7/0xc0 [ 13.467989] __kmalloc_cache_noprof+0x189/0x420 [ 13.468285] kasan_bitops_generic+0x92/0x1c0 [ 13.468497] kunit_try_run_case+0x1a5/0x480 [ 13.468709] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.468965] kthread+0x337/0x6f0 [ 13.469146] ret_from_fork+0x116/0x1d0 [ 13.469343] ret_from_fork_asm+0x1a/0x30 [ 13.469503] [ 13.469573] The buggy address belongs to the object at ffff8881027a1100 [ 13.469573] which belongs to the cache kmalloc-16 of size 16 [ 13.469963] The buggy address is located 8 bytes inside of [ 13.469963] allocated 9-byte region [ffff8881027a1100, ffff8881027a1109) [ 13.471035] [ 13.471113] The buggy address belongs to the physical page: [ 13.471285] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027a1 [ 13.471522] flags: 0x200000000000000(node=0|zone=2) [ 13.471681] page_type: f5(slab) [ 13.471936] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.472476] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.472744] page dumped because: kasan: bad access detected [ 13.472916] [ 13.472984] Memory state around the buggy address: [ 13.473148] ffff8881027a1000: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 13.473469] ffff8881027a1080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.473789] >ffff8881027a1100: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.474114] ^ [ 13.474423] ffff8881027a1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.474690] ffff8881027a1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.474901] ================================================================== [ 13.438923] ================================================================== [ 13.439624] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 13.439956] Write of size 8 at addr ffff8881027a1108 by task kunit_try_catch/278 [ 13.440318] [ 13.440411] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.440452] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.440463] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.440483] Call Trace: [ 13.440494] <TASK> [ 13.440507] dump_stack_lvl+0x73/0xb0 [ 13.440531] print_report+0xd1/0x650 [ 13.440552] ? __virt_addr_valid+0x1db/0x2d0 [ 13.440574] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 13.440599] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.440620] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 13.440646] kasan_report+0x141/0x180 [ 13.440667] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 13.440697] kasan_check_range+0x10c/0x1c0 [ 13.440719] __kasan_check_write+0x18/0x20 [ 13.440738] kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 13.440763] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 13.440789] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.440813] ? finish_task_switch.isra.0+0x156/0x700 [ 13.440835] ? kasan_bitops_generic+0x92/0x1c0 [ 13.440861] kasan_bitops_generic+0x116/0x1c0 [ 13.440884] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.440908] ? __pfx_read_tsc+0x10/0x10 [ 13.440928] ? ktime_get_ts64+0x86/0x230 [ 13.440951] kunit_try_run_case+0x1a5/0x480 [ 13.440974] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.440996] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.441018] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.441053] ? __kthread_parkme+0x82/0x180 [ 13.441073] ? preempt_count_sub+0x50/0x80 [ 13.441095] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.441118] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.441140] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.441176] kthread+0x337/0x6f0 [ 13.441195] ? trace_preempt_on+0x20/0xc0 [ 13.441218] ? __pfx_kthread+0x10/0x10 [ 13.441238] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.441259] ? calculate_sigpending+0x7b/0xa0 [ 13.441281] ? __pfx_kthread+0x10/0x10 [ 13.441301] ret_from_fork+0x116/0x1d0 [ 13.441319] ? __pfx_kthread+0x10/0x10 [ 13.441338] ret_from_fork_asm+0x1a/0x30 [ 13.441367] </TASK> [ 13.441378] [ 13.449363] Allocated by task 278: [ 13.449590] kasan_save_stack+0x45/0x70 [ 13.449769] kasan_save_track+0x18/0x40 [ 13.449905] kasan_save_alloc_info+0x3b/0x50 [ 13.450136] __kasan_kmalloc+0xb7/0xc0 [ 13.450337] __kmalloc_cache_noprof+0x189/0x420 [ 13.450556] kasan_bitops_generic+0x92/0x1c0 [ 13.450751] kunit_try_run_case+0x1a5/0x480 [ 13.450908] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.451172] kthread+0x337/0x6f0 [ 13.451313] ret_from_fork+0x116/0x1d0 [ 13.451494] ret_from_fork_asm+0x1a/0x30 [ 13.451659] [ 13.451743] The buggy address belongs to the object at ffff8881027a1100 [ 13.451743] which belongs to the cache kmalloc-16 of size 16 [ 13.452101] The buggy address is located 8 bytes inside of [ 13.452101] allocated 9-byte region [ffff8881027a1100, ffff8881027a1109) [ 13.452448] [ 13.452518] The buggy address belongs to the physical page: [ 13.452687] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027a1 [ 13.452921] flags: 0x200000000000000(node=0|zone=2) [ 13.453164] page_type: f5(slab) [ 13.453334] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.453671] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.454001] page dumped because: kasan: bad access detected [ 13.454309] [ 13.454399] Memory state around the buggy address: [ 13.454623] ffff8881027a1000: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 13.454937] ffff8881027a1080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.455420] >ffff8881027a1100: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.455636] ^ [ 13.455757] ffff8881027a1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.455969] ffff8881027a1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.456294] ================================================================== [ 13.421285] ================================================================== [ 13.421726] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50 [ 13.422074] Write of size 8 at addr ffff8881027a1108 by task kunit_try_catch/278 [ 13.422434] [ 13.422564] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.422608] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.422620] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.422642] Call Trace: [ 13.422654] <TASK> [ 13.422668] dump_stack_lvl+0x73/0xb0 [ 13.422694] print_report+0xd1/0x650 [ 13.422716] ? __virt_addr_valid+0x1db/0x2d0 [ 13.422737] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 13.422761] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.422782] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 13.422807] kasan_report+0x141/0x180 [ 13.422828] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 13.422857] kasan_check_range+0x10c/0x1c0 [ 13.422880] __kasan_check_write+0x18/0x20 [ 13.422899] kasan_bitops_modify.constprop.0+0x101/0xd50 [ 13.422924] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 13.422949] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.422973] ? finish_task_switch.isra.0+0x156/0x700 [ 13.422996] ? kasan_bitops_generic+0x92/0x1c0 [ 13.423022] kasan_bitops_generic+0x116/0x1c0 [ 13.423061] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.423086] ? __pfx_read_tsc+0x10/0x10 [ 13.423106] ? ktime_get_ts64+0x86/0x230 [ 13.423129] kunit_try_run_case+0x1a5/0x480 [ 13.423152] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.423173] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.423195] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.423217] ? __kthread_parkme+0x82/0x180 [ 13.423237] ? preempt_count_sub+0x50/0x80 [ 13.423274] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.423298] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.423319] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.423342] kthread+0x337/0x6f0 [ 13.423361] ? trace_preempt_on+0x20/0xc0 [ 13.423383] ? __pfx_kthread+0x10/0x10 [ 13.423404] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.423424] ? calculate_sigpending+0x7b/0xa0 [ 13.423448] ? __pfx_kthread+0x10/0x10 [ 13.423469] ret_from_fork+0x116/0x1d0 [ 13.423486] ? __pfx_kthread+0x10/0x10 [ 13.423506] ret_from_fork_asm+0x1a/0x30 [ 13.423535] </TASK> [ 13.423546] [ 13.431233] Allocated by task 278: [ 13.431392] kasan_save_stack+0x45/0x70 [ 13.431581] kasan_save_track+0x18/0x40 [ 13.431745] kasan_save_alloc_info+0x3b/0x50 [ 13.431932] __kasan_kmalloc+0xb7/0xc0 [ 13.432119] __kmalloc_cache_noprof+0x189/0x420 [ 13.432335] kasan_bitops_generic+0x92/0x1c0 [ 13.432496] kunit_try_run_case+0x1a5/0x480 [ 13.432641] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.432896] kthread+0x337/0x6f0 [ 13.433074] ret_from_fork+0x116/0x1d0 [ 13.433310] ret_from_fork_asm+0x1a/0x30 [ 13.433455] [ 13.433543] The buggy address belongs to the object at ffff8881027a1100 [ 13.433543] which belongs to the cache kmalloc-16 of size 16 [ 13.434067] The buggy address is located 8 bytes inside of [ 13.434067] allocated 9-byte region [ffff8881027a1100, ffff8881027a1109) [ 13.434539] [ 13.434614] The buggy address belongs to the physical page: [ 13.434785] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027a1 [ 13.435023] flags: 0x200000000000000(node=0|zone=2) [ 13.435324] page_type: f5(slab) [ 13.435491] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.435828] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.436182] page dumped because: kasan: bad access detected [ 13.436415] [ 13.436489] Memory state around the buggy address: [ 13.436644] ffff8881027a1000: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 13.436858] ffff8881027a1080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.437165] >ffff8881027a1100: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.437479] ^ [ 13.437653] ffff8881027a1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.437973] ffff8881027a1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.438282] ================================================================== [ 13.530974] ================================================================== [ 13.531382] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 13.531680] Write of size 8 at addr ffff8881027a1108 by task kunit_try_catch/278 [ 13.531952] [ 13.532042] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.532081] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.532092] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.532112] Call Trace: [ 13.532126] <TASK> [ 13.532160] dump_stack_lvl+0x73/0xb0 [ 13.532187] print_report+0xd1/0x650 [ 13.532209] ? __virt_addr_valid+0x1db/0x2d0 [ 13.532232] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 13.532257] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.532279] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 13.532304] kasan_report+0x141/0x180 [ 13.532325] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 13.532354] kasan_check_range+0x10c/0x1c0 [ 13.532377] __kasan_check_write+0x18/0x20 [ 13.532396] kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 13.532420] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 13.532446] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.532469] ? finish_task_switch.isra.0+0x156/0x700 [ 13.532490] ? kasan_bitops_generic+0x92/0x1c0 [ 13.532516] kasan_bitops_generic+0x116/0x1c0 [ 13.532538] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.532562] ? __pfx_read_tsc+0x10/0x10 [ 13.532583] ? ktime_get_ts64+0x86/0x230 [ 13.532604] kunit_try_run_case+0x1a5/0x480 [ 13.532627] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.532648] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.532669] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.532691] ? __kthread_parkme+0x82/0x180 [ 13.532711] ? preempt_count_sub+0x50/0x80 [ 13.532733] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.532756] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.532777] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.532800] kthread+0x337/0x6f0 [ 13.532819] ? trace_preempt_on+0x20/0xc0 [ 13.532840] ? __pfx_kthread+0x10/0x10 [ 13.532861] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.532881] ? calculate_sigpending+0x7b/0xa0 [ 13.532904] ? __pfx_kthread+0x10/0x10 [ 13.532926] ret_from_fork+0x116/0x1d0 [ 13.532943] ? __pfx_kthread+0x10/0x10 [ 13.532963] ret_from_fork_asm+0x1a/0x30 [ 13.532991] </TASK> [ 13.533002] [ 13.540653] Allocated by task 278: [ 13.540826] kasan_save_stack+0x45/0x70 [ 13.540978] kasan_save_track+0x18/0x40 [ 13.541124] kasan_save_alloc_info+0x3b/0x50 [ 13.541292] __kasan_kmalloc+0xb7/0xc0 [ 13.541482] __kmalloc_cache_noprof+0x189/0x420 [ 13.541704] kasan_bitops_generic+0x92/0x1c0 [ 13.541914] kunit_try_run_case+0x1a5/0x480 [ 13.542160] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.542416] kthread+0x337/0x6f0 [ 13.542582] ret_from_fork+0x116/0x1d0 [ 13.542740] ret_from_fork_asm+0x1a/0x30 [ 13.542878] [ 13.542948] The buggy address belongs to the object at ffff8881027a1100 [ 13.542948] which belongs to the cache kmalloc-16 of size 16 [ 13.543385] The buggy address is located 8 bytes inside of [ 13.543385] allocated 9-byte region [ffff8881027a1100, ffff8881027a1109) [ 13.543907] [ 13.544003] The buggy address belongs to the physical page: [ 13.544282] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027a1 [ 13.544551] flags: 0x200000000000000(node=0|zone=2) [ 13.544712] page_type: f5(slab) [ 13.544830] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.545119] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.545481] page dumped because: kasan: bad access detected [ 13.545728] [ 13.545820] Memory state around the buggy address: [ 13.546051] ffff8881027a1000: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 13.546390] ffff8881027a1080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.546675] >ffff8881027a1100: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.546955] ^ [ 13.547122] ffff8881027a1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.547413] ffff8881027a1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.547703] ================================================================== [ 13.475391] ================================================================== [ 13.475901] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 13.476633] Write of size 8 at addr ffff8881027a1108 by task kunit_try_catch/278 [ 13.476929] [ 13.477011] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.477067] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.477131] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.477164] Call Trace: [ 13.477178] <TASK> [ 13.477194] dump_stack_lvl+0x73/0xb0 [ 13.477224] print_report+0xd1/0x650 [ 13.477246] ? __virt_addr_valid+0x1db/0x2d0 [ 13.477269] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 13.477294] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.477316] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 13.477341] kasan_report+0x141/0x180 [ 13.477363] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 13.477392] kasan_check_range+0x10c/0x1c0 [ 13.477415] __kasan_check_write+0x18/0x20 [ 13.477435] kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 13.477461] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 13.477487] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.477511] ? finish_task_switch.isra.0+0x156/0x700 [ 13.477532] ? kasan_bitops_generic+0x92/0x1c0 [ 13.477558] kasan_bitops_generic+0x116/0x1c0 [ 13.477581] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.477606] ? __pfx_read_tsc+0x10/0x10 [ 13.477626] ? ktime_get_ts64+0x86/0x230 [ 13.477649] kunit_try_run_case+0x1a5/0x480 [ 13.477673] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.477694] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.477716] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.477738] ? __kthread_parkme+0x82/0x180 [ 13.477758] ? preempt_count_sub+0x50/0x80 [ 13.477780] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.477802] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.477825] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.477848] kthread+0x337/0x6f0 [ 13.477866] ? trace_preempt_on+0x20/0xc0 [ 13.477888] ? __pfx_kthread+0x10/0x10 [ 13.477908] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.477928] ? calculate_sigpending+0x7b/0xa0 [ 13.477952] ? __pfx_kthread+0x10/0x10 [ 13.477973] ret_from_fork+0x116/0x1d0 [ 13.477991] ? __pfx_kthread+0x10/0x10 [ 13.478010] ret_from_fork_asm+0x1a/0x30 [ 13.478052] </TASK> [ 13.478062] [ 13.485958] Allocated by task 278: [ 13.486134] kasan_save_stack+0x45/0x70 [ 13.486336] kasan_save_track+0x18/0x40 [ 13.486533] kasan_save_alloc_info+0x3b/0x50 [ 13.486743] __kasan_kmalloc+0xb7/0xc0 [ 13.486913] __kmalloc_cache_noprof+0x189/0x420 [ 13.487108] kasan_bitops_generic+0x92/0x1c0 [ 13.487396] kunit_try_run_case+0x1a5/0x480 [ 13.487585] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.487802] kthread+0x337/0x6f0 [ 13.487924] ret_from_fork+0x116/0x1d0 [ 13.488064] ret_from_fork_asm+0x1a/0x30 [ 13.488346] [ 13.488441] The buggy address belongs to the object at ffff8881027a1100 [ 13.488441] which belongs to the cache kmalloc-16 of size 16 [ 13.488977] The buggy address is located 8 bytes inside of [ 13.488977] allocated 9-byte region [ffff8881027a1100, ffff8881027a1109) [ 13.489482] [ 13.489581] The buggy address belongs to the physical page: [ 13.489797] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027a1 [ 13.490043] flags: 0x200000000000000(node=0|zone=2) [ 13.490205] page_type: f5(slab) [ 13.490324] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.490580] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.490949] page dumped because: kasan: bad access detected [ 13.491215] [ 13.491307] Memory state around the buggy address: [ 13.491525] ffff8881027a1000: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 13.491837] ffff8881027a1080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.492063] >ffff8881027a1100: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.492599] ^ [ 13.492770] ffff8881027a1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.493072] ffff8881027a1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.493405] ================================================================== [ 13.548654] ================================================================== [ 13.549007] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50 [ 13.549389] Write of size 8 at addr ffff8881027a1108 by task kunit_try_catch/278 [ 13.549717] [ 13.549803] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 13.549844] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.549860] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.549880] Call Trace: [ 13.549894] <TASK> [ 13.549908] dump_stack_lvl+0x73/0xb0 [ 13.549935] print_report+0xd1/0x650 [ 13.549957] ? __virt_addr_valid+0x1db/0x2d0 [ 13.549978] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 13.550003] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.550037] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 13.550063] kasan_report+0x141/0x180 [ 13.550086] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 13.550116] kasan_check_range+0x10c/0x1c0 [ 13.550159] __kasan_check_write+0x18/0x20 [ 13.550178] kasan_bitops_modify.constprop.0+0x547/0xd50 [ 13.550205] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 13.550231] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.550254] ? finish_task_switch.isra.0+0x156/0x700 [ 13.550276] ? kasan_bitops_generic+0x92/0x1c0 [ 13.550302] kasan_bitops_generic+0x116/0x1c0 [ 13.550325] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.550349] ? __pfx_read_tsc+0x10/0x10 [ 13.550369] ? ktime_get_ts64+0x86/0x230 [ 13.550392] kunit_try_run_case+0x1a5/0x480 [ 13.550414] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.550435] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.550457] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.550479] ? __kthread_parkme+0x82/0x180 [ 13.550498] ? preempt_count_sub+0x50/0x80 [ 13.550520] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.550543] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.550564] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.550586] kthread+0x337/0x6f0 [ 13.550605] ? trace_preempt_on+0x20/0xc0 [ 13.550627] ? __pfx_kthread+0x10/0x10 [ 13.550647] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.550667] ? calculate_sigpending+0x7b/0xa0 [ 13.550689] ? __pfx_kthread+0x10/0x10 [ 13.550709] ret_from_fork+0x116/0x1d0 [ 13.550727] ? __pfx_kthread+0x10/0x10 [ 13.550747] ret_from_fork_asm+0x1a/0x30 [ 13.550777] </TASK> [ 13.550787] [ 13.558290] Allocated by task 278: [ 13.558464] kasan_save_stack+0x45/0x70 [ 13.558664] kasan_save_track+0x18/0x40 [ 13.558852] kasan_save_alloc_info+0x3b/0x50 [ 13.559070] __kasan_kmalloc+0xb7/0xc0 [ 13.559283] __kmalloc_cache_noprof+0x189/0x420 [ 13.559472] kasan_bitops_generic+0x92/0x1c0 [ 13.559677] kunit_try_run_case+0x1a5/0x480 [ 13.559828] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.560003] kthread+0x337/0x6f0 [ 13.560149] ret_from_fork+0x116/0x1d0 [ 13.560320] ret_from_fork_asm+0x1a/0x30 [ 13.560519] [ 13.560613] The buggy address belongs to the object at ffff8881027a1100 [ 13.560613] which belongs to the cache kmalloc-16 of size 16 [ 13.561128] The buggy address is located 8 bytes inside of [ 13.561128] allocated 9-byte region [ffff8881027a1100, ffff8881027a1109) [ 13.561592] [ 13.561687] The buggy address belongs to the physical page: [ 13.561893] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027a1 [ 13.562242] flags: 0x200000000000000(node=0|zone=2) [ 13.562440] page_type: f5(slab) [ 13.562590] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.562893] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.563225] page dumped because: kasan: bad access detected [ 13.563440] [ 13.563508] Memory state around the buggy address: [ 13.563672] ffff8881027a1000: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc [ 13.563898] ffff8881027a1080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 13.564195] >ffff8881027a1100: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.564507] ^ [ 13.564679] ffff8881027a1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.564991] ffff8881027a1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.565333] ==================================================================