Date
July 9, 2025, 12:11 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 21.938848] ================================================================== [ 21.938932] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 21.939178] Write of size 8 at addr fff00000c63901c8 by task kunit_try_catch/262 [ 21.939308] [ 21.939365] CPU: 1 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 21.939550] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.939586] Hardware name: linux,dummy-virt (DT) [ 21.939636] Call trace: [ 21.939663] show_stack+0x20/0x38 (C) [ 21.939765] dump_stack_lvl+0x8c/0xd0 [ 21.939852] print_report+0x118/0x608 [ 21.939905] kasan_report+0xdc/0x128 [ 21.939973] kasan_check_range+0x100/0x1a8 [ 21.940327] __kasan_check_write+0x20/0x30 [ 21.940411] kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 21.940564] kasan_bitops_generic+0x110/0x1c8 [ 21.940654] kunit_try_run_case+0x170/0x3f0 [ 21.941029] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.941277] kthread+0x328/0x630 [ 21.941420] ret_from_fork+0x10/0x20 [ 21.941631] [ 21.941712] Allocated by task 262: [ 21.941842] kasan_save_stack+0x3c/0x68 [ 21.941917] kasan_save_track+0x20/0x40 [ 21.942171] kasan_save_alloc_info+0x40/0x58 [ 21.942327] __kasan_kmalloc+0xd4/0xd8 [ 21.942492] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.942569] kasan_bitops_generic+0xa0/0x1c8 [ 21.942657] kunit_try_run_case+0x170/0x3f0 [ 21.942781] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.942850] kthread+0x328/0x630 [ 21.942905] ret_from_fork+0x10/0x20 [ 21.943238] [ 21.943344] The buggy address belongs to the object at fff00000c63901c0 [ 21.943344] which belongs to the cache kmalloc-16 of size 16 [ 21.943459] The buggy address is located 8 bytes inside of [ 21.943459] allocated 9-byte region [fff00000c63901c0, fff00000c63901c9) [ 21.943612] [ 21.943646] The buggy address belongs to the physical page: [ 21.943680] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106390 [ 21.943760] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.943822] page_type: f5(slab) [ 21.943864] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 21.943916] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.943969] page dumped because: kasan: bad access detected [ 21.944013] [ 21.944043] Memory state around the buggy address: [ 21.944255] fff00000c6390080: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc [ 21.944326] fff00000c6390100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.944508] >fff00000c6390180: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 21.944555] ^ [ 21.944595] fff00000c6390200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.944849] fff00000c6390280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.944985] ================================================================== [ 21.988350] ================================================================== [ 21.988601] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc0 [ 21.988678] Write of size 8 at addr fff00000c63901c8 by task kunit_try_catch/262 [ 21.988774] [ 21.988811] CPU: 1 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 21.988897] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.989041] Hardware name: linux,dummy-virt (DT) [ 21.989081] Call trace: [ 21.989106] show_stack+0x20/0x38 (C) [ 21.989161] dump_stack_lvl+0x8c/0xd0 [ 21.989284] print_report+0x118/0x608 [ 21.989356] kasan_report+0xdc/0x128 [ 21.989606] kasan_check_range+0x100/0x1a8 [ 21.989734] __kasan_check_write+0x20/0x30 [ 21.989792] kasan_bitops_modify.constprop.0+0x344/0xbc0 [ 21.989855] kasan_bitops_generic+0x110/0x1c8 [ 21.989960] kunit_try_run_case+0x170/0x3f0 [ 21.990034] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.990100] kthread+0x328/0x630 [ 21.990292] ret_from_fork+0x10/0x20 [ 21.990426] [ 21.990509] Allocated by task 262: [ 21.990559] kasan_save_stack+0x3c/0x68 [ 21.990612] kasan_save_track+0x20/0x40 [ 21.990715] kasan_save_alloc_info+0x40/0x58 [ 21.990763] __kasan_kmalloc+0xd4/0xd8 [ 21.990809] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.990851] kasan_bitops_generic+0xa0/0x1c8 [ 21.991152] kunit_try_run_case+0x170/0x3f0 [ 21.991220] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.991340] kthread+0x328/0x630 [ 21.991382] ret_from_fork+0x10/0x20 [ 21.991449] [ 21.991587] The buggy address belongs to the object at fff00000c63901c0 [ 21.991587] which belongs to the cache kmalloc-16 of size 16 [ 21.991729] The buggy address is located 8 bytes inside of [ 21.991729] allocated 9-byte region [fff00000c63901c0, fff00000c63901c9) [ 21.991855] [ 21.991881] The buggy address belongs to the physical page: [ 21.991930] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106390 [ 21.991990] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.992187] page_type: f5(slab) [ 21.992440] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 21.992517] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.992595] page dumped because: kasan: bad access detected [ 21.992704] [ 21.992772] Memory state around the buggy address: [ 21.992815] fff00000c6390080: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc [ 21.993092] fff00000c6390100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.993179] >fff00000c6390180: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 21.993221] ^ [ 21.993259] fff00000c6390200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.993304] fff00000c6390280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.993346] ================================================================== [ 21.954595] ================================================================== [ 21.954840] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc0 [ 21.955161] Write of size 8 at addr fff00000c63901c8 by task kunit_try_catch/262 [ 21.955244] [ 21.955307] CPU: 1 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 21.955395] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.955605] Hardware name: linux,dummy-virt (DT) [ 21.955722] Call trace: [ 21.955798] show_stack+0x20/0x38 (C) [ 21.955873] dump_stack_lvl+0x8c/0xd0 [ 21.955930] print_report+0x118/0x608 [ 21.955978] kasan_report+0xdc/0x128 [ 21.956163] kasan_check_range+0x100/0x1a8 [ 21.956337] __kasan_check_write+0x20/0x30 [ 21.956425] kasan_bitops_modify.constprop.0+0x1dc/0xbc0 [ 21.956551] kasan_bitops_generic+0x110/0x1c8 [ 21.956607] kunit_try_run_case+0x170/0x3f0 [ 21.956662] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.956911] kthread+0x328/0x630 [ 21.957043] ret_from_fork+0x10/0x20 [ 21.957119] [ 21.957149] Allocated by task 262: [ 21.957180] kasan_save_stack+0x3c/0x68 [ 21.957224] kasan_save_track+0x20/0x40 [ 21.957265] kasan_save_alloc_info+0x40/0x58 [ 21.957307] __kasan_kmalloc+0xd4/0xd8 [ 21.957351] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.957430] kasan_bitops_generic+0xa0/0x1c8 [ 21.957475] kunit_try_run_case+0x170/0x3f0 [ 21.957517] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.957566] kthread+0x328/0x630 [ 21.957620] ret_from_fork+0x10/0x20 [ 21.957659] [ 21.957682] The buggy address belongs to the object at fff00000c63901c0 [ 21.957682] which belongs to the cache kmalloc-16 of size 16 [ 21.957743] The buggy address is located 8 bytes inside of [ 21.957743] allocated 9-byte region [fff00000c63901c0, fff00000c63901c9) [ 21.957807] [ 21.957846] The buggy address belongs to the physical page: [ 21.957880] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106390 [ 21.957947] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.958010] page_type: f5(slab) [ 21.958051] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 21.958114] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.958161] page dumped because: kasan: bad access detected [ 21.958198] [ 21.958221] Memory state around the buggy address: [ 21.958271] fff00000c6390080: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc [ 21.958318] fff00000c6390100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.958364] >fff00000c6390180: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 21.958417] ^ [ 21.958464] fff00000c6390200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.958520] fff00000c6390280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.958577] ================================================================== [ 21.975038] ================================================================== [ 21.975159] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc0 [ 21.975214] Write of size 8 at addr fff00000c63901c8 by task kunit_try_catch/262 [ 21.975315] [ 21.975374] CPU: 1 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 21.975548] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.975580] Hardware name: linux,dummy-virt (DT) [ 21.975623] Call trace: [ 21.975813] show_stack+0x20/0x38 (C) [ 21.975885] dump_stack_lvl+0x8c/0xd0 [ 21.976120] print_report+0x118/0x608 [ 21.976282] kasan_report+0xdc/0x128 [ 21.976391] kasan_check_range+0x100/0x1a8 [ 21.976572] __kasan_check_write+0x20/0x30 [ 21.976622] kasan_bitops_modify.constprop.0+0x320/0xbc0 [ 21.976859] kasan_bitops_generic+0x110/0x1c8 [ 21.977052] kunit_try_run_case+0x170/0x3f0 [ 21.977170] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.977354] kthread+0x328/0x630 [ 21.977475] ret_from_fork+0x10/0x20 [ 21.977584] [ 21.977813] Allocated by task 262: [ 21.978016] kasan_save_stack+0x3c/0x68 [ 21.978206] kasan_save_track+0x20/0x40 [ 21.978249] kasan_save_alloc_info+0x40/0x58 [ 21.978436] __kasan_kmalloc+0xd4/0xd8 [ 21.978573] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.978701] kasan_bitops_generic+0xa0/0x1c8 [ 21.978789] kunit_try_run_case+0x170/0x3f0 [ 21.978916] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.979014] kthread+0x328/0x630 [ 21.979081] ret_from_fork+0x10/0x20 [ 21.979178] [ 21.979202] The buggy address belongs to the object at fff00000c63901c0 [ 21.979202] which belongs to the cache kmalloc-16 of size 16 [ 21.979456] The buggy address is located 8 bytes inside of [ 21.979456] allocated 9-byte region [fff00000c63901c0, fff00000c63901c9) [ 21.979655] [ 21.979760] The buggy address belongs to the physical page: [ 21.979828] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106390 [ 21.979960] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.980065] page_type: f5(slab) [ 21.980145] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 21.980201] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.980475] page dumped because: kasan: bad access detected [ 21.980617] [ 21.980648] Memory state around the buggy address: [ 21.980684] fff00000c6390080: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc [ 21.980731] fff00000c6390100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.980776] >fff00000c6390180: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 21.980831] ^ [ 21.980869] fff00000c6390200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.980916] fff00000c6390280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.980966] ================================================================== [ 22.000942] ================================================================== [ 22.000994] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa20/0xbc0 [ 22.001047] Read of size 8 at addr fff00000c63901c8 by task kunit_try_catch/262 [ 22.001105] [ 22.001135] CPU: 1 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 22.001218] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.001248] Hardware name: linux,dummy-virt (DT) [ 22.001280] Call trace: [ 22.001303] show_stack+0x20/0x38 (C) [ 22.001354] dump_stack_lvl+0x8c/0xd0 [ 22.001414] print_report+0x118/0x608 [ 22.001465] kasan_report+0xdc/0x128 [ 22.001514] __asan_report_load8_noabort+0x20/0x30 [ 22.001568] kasan_bitops_modify.constprop.0+0xa20/0xbc0 [ 22.001622] kasan_bitops_generic+0x110/0x1c8 [ 22.001675] kunit_try_run_case+0x170/0x3f0 [ 22.001725] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.001782] kthread+0x328/0x630 [ 22.001827] ret_from_fork+0x10/0x20 [ 22.001878] [ 22.001898] Allocated by task 262: [ 22.001928] kasan_save_stack+0x3c/0x68 [ 22.001971] kasan_save_track+0x20/0x40 [ 22.002012] kasan_save_alloc_info+0x40/0x58 [ 22.002055] __kasan_kmalloc+0xd4/0xd8 [ 22.002095] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.002136] kasan_bitops_generic+0xa0/0x1c8 [ 22.002177] kunit_try_run_case+0x170/0x3f0 [ 22.002217] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.002263] kthread+0x328/0x630 [ 22.002299] ret_from_fork+0x10/0x20 [ 22.002337] [ 22.002357] The buggy address belongs to the object at fff00000c63901c0 [ 22.002357] which belongs to the cache kmalloc-16 of size 16 [ 22.003508] The buggy address is located 8 bytes inside of [ 22.003508] allocated 9-byte region [fff00000c63901c0, fff00000c63901c9) [ 22.003594] [ 22.003615] The buggy address belongs to the physical page: [ 22.003649] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106390 [ 22.003714] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.003765] page_type: f5(slab) [ 22.003806] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 22.003859] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 22.003902] page dumped because: kasan: bad access detected [ 22.003934] [ 22.003953] Memory state around the buggy address: [ 22.003987] fff00000c6390080: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc [ 22.004034] fff00000c6390100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.005087] >fff00000c6390180: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 22.005132] ^ [ 22.005172] fff00000c6390200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.005530] fff00000c6390280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.005580] ================================================================== [ 21.947748] ================================================================== [ 21.947822] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 21.947897] Read of size 8 at addr fff00000c63901c8 by task kunit_try_catch/262 [ 21.947952] [ 21.948227] CPU: 1 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 21.948442] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.948507] Hardware name: linux,dummy-virt (DT) [ 21.948888] Call trace: [ 21.948920] show_stack+0x20/0x38 (C) [ 21.948978] dump_stack_lvl+0x8c/0xd0 [ 21.949036] print_report+0x118/0x608 [ 21.949092] kasan_report+0xdc/0x128 [ 21.949204] __asan_report_load8_noabort+0x20/0x30 [ 21.949563] kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 21.949670] kasan_bitops_generic+0x110/0x1c8 [ 21.949811] kunit_try_run_case+0x170/0x3f0 [ 21.949871] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.949934] kthread+0x328/0x630 [ 21.949981] ret_from_fork+0x10/0x20 [ 21.950030] [ 21.950051] Allocated by task 262: [ 21.950083] kasan_save_stack+0x3c/0x68 [ 21.950137] kasan_save_track+0x20/0x40 [ 21.950178] kasan_save_alloc_info+0x40/0x58 [ 21.950220] __kasan_kmalloc+0xd4/0xd8 [ 21.950270] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.950312] kasan_bitops_generic+0xa0/0x1c8 [ 21.950361] kunit_try_run_case+0x170/0x3f0 [ 21.950541] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.950825] kthread+0x328/0x630 [ 21.951024] ret_from_fork+0x10/0x20 [ 21.951236] [ 21.951458] The buggy address belongs to the object at fff00000c63901c0 [ 21.951458] which belongs to the cache kmalloc-16 of size 16 [ 21.951601] The buggy address is located 8 bytes inside of [ 21.951601] allocated 9-byte region [fff00000c63901c0, fff00000c63901c9) [ 21.951670] [ 21.951694] The buggy address belongs to the physical page: [ 21.951903] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106390 [ 21.952220] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.952346] page_type: f5(slab) [ 21.952436] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 21.952569] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.952658] page dumped because: kasan: bad access detected [ 21.952757] [ 21.952817] Memory state around the buggy address: [ 21.952972] fff00000c6390080: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc [ 21.953058] fff00000c6390100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.953186] >fff00000c6390180: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 21.953263] ^ [ 21.953303] fff00000c6390200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.953349] fff00000c6390280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.953544] ================================================================== [ 21.960349] ================================================================== [ 21.960411] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbc0 [ 21.960467] Read of size 8 at addr fff00000c63901c8 by task kunit_try_catch/262 [ 21.960886] [ 21.960934] CPU: 1 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 21.961108] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.961168] Hardware name: linux,dummy-virt (DT) [ 21.961365] Call trace: [ 21.961462] show_stack+0x20/0x38 (C) [ 21.961583] dump_stack_lvl+0x8c/0xd0 [ 21.961848] print_report+0x118/0x608 [ 21.961978] kasan_report+0xdc/0x128 [ 21.962065] __asan_report_load8_noabort+0x20/0x30 [ 21.962215] kasan_bitops_modify.constprop.0+0xa80/0xbc0 [ 21.962311] kasan_bitops_generic+0x110/0x1c8 [ 21.962716] kunit_try_run_case+0x170/0x3f0 [ 21.962804] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.962919] kthread+0x328/0x630 [ 21.963016] ret_from_fork+0x10/0x20 [ 21.963170] [ 21.963278] Allocated by task 262: [ 21.963336] kasan_save_stack+0x3c/0x68 [ 21.963459] kasan_save_track+0x20/0x40 [ 21.963541] kasan_save_alloc_info+0x40/0x58 [ 21.963618] __kasan_kmalloc+0xd4/0xd8 [ 21.963786] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.963947] kasan_bitops_generic+0xa0/0x1c8 [ 21.964068] kunit_try_run_case+0x170/0x3f0 [ 21.964236] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.964361] kthread+0x328/0x630 [ 21.964457] ret_from_fork+0x10/0x20 [ 21.964589] [ 21.964612] The buggy address belongs to the object at fff00000c63901c0 [ 21.964612] which belongs to the cache kmalloc-16 of size 16 [ 21.964683] The buggy address is located 8 bytes inside of [ 21.964683] allocated 9-byte region [fff00000c63901c0, fff00000c63901c9) [ 21.964921] [ 21.965089] The buggy address belongs to the physical page: [ 21.965212] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106390 [ 21.965327] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.965472] page_type: f5(slab) [ 21.965556] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 21.965654] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.965699] page dumped because: kasan: bad access detected [ 21.965773] [ 21.965926] Memory state around the buggy address: [ 21.966055] fff00000c6390080: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc [ 21.966129] fff00000c6390100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.966376] >fff00000c6390180: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 21.966527] ^ [ 21.966601] fff00000c6390200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.966738] fff00000c6390280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.966815] ================================================================== [ 21.982320] ================================================================== [ 21.982490] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaec/0xbc0 [ 21.982578] Read of size 8 at addr fff00000c63901c8 by task kunit_try_catch/262 [ 21.982633] [ 21.982697] CPU: 1 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 21.983030] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.983075] Hardware name: linux,dummy-virt (DT) [ 21.983110] Call trace: [ 21.983173] show_stack+0x20/0x38 (C) [ 21.983259] dump_stack_lvl+0x8c/0xd0 [ 21.983508] print_report+0x118/0x608 [ 21.983725] kasan_report+0xdc/0x128 [ 21.984009] __asan_report_load8_noabort+0x20/0x30 [ 21.984148] kasan_bitops_modify.constprop.0+0xaec/0xbc0 [ 21.984224] kasan_bitops_generic+0x110/0x1c8 [ 21.984367] kunit_try_run_case+0x170/0x3f0 [ 21.984514] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.984632] kthread+0x328/0x630 [ 21.984762] ret_from_fork+0x10/0x20 [ 21.984819] [ 21.984839] Allocated by task 262: [ 21.984890] kasan_save_stack+0x3c/0x68 [ 21.984934] kasan_save_track+0x20/0x40 [ 21.984975] kasan_save_alloc_info+0x40/0x58 [ 21.985219] __kasan_kmalloc+0xd4/0xd8 [ 21.985446] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.985582] kasan_bitops_generic+0xa0/0x1c8 [ 21.985678] kunit_try_run_case+0x170/0x3f0 [ 21.985774] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.985831] kthread+0x328/0x630 [ 21.985878] ret_from_fork+0x10/0x20 [ 21.985916] [ 21.985938] The buggy address belongs to the object at fff00000c63901c0 [ 21.985938] which belongs to the cache kmalloc-16 of size 16 [ 21.986011] The buggy address is located 8 bytes inside of [ 21.986011] allocated 9-byte region [fff00000c63901c0, fff00000c63901c9) [ 21.986075] [ 21.986101] The buggy address belongs to the physical page: [ 21.986144] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106390 [ 21.986202] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.986261] page_type: f5(slab) [ 21.986302] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 21.986355] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.986410] page dumped because: kasan: bad access detected [ 21.986443] [ 21.986462] Memory state around the buggy address: [ 21.986853] fff00000c6390080: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc [ 21.986989] fff00000c6390100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.987085] >fff00000c6390180: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 21.987167] ^ [ 21.987208] fff00000c6390200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.987273] fff00000c6390280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.987520] ================================================================== [ 21.993827] ================================================================== [ 21.993878] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc0 [ 21.993929] Write of size 8 at addr fff00000c63901c8 by task kunit_try_catch/262 [ 21.993981] [ 21.994013] CPU: 1 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 21.994097] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.994125] Hardware name: linux,dummy-virt (DT) [ 21.994157] Call trace: [ 21.994180] show_stack+0x20/0x38 (C) [ 21.994231] dump_stack_lvl+0x8c/0xd0 [ 21.994281] print_report+0x118/0x608 [ 21.994339] kasan_report+0xdc/0x128 [ 21.994389] kasan_check_range+0x100/0x1a8 [ 21.994798] __kasan_check_write+0x20/0x30 [ 21.995128] kasan_bitops_modify.constprop.0+0x3b0/0xbc0 [ 21.995195] kasan_bitops_generic+0x110/0x1c8 [ 21.995261] kunit_try_run_case+0x170/0x3f0 [ 21.995316] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.995391] kthread+0x328/0x630 [ 21.995659] ret_from_fork+0x10/0x20 [ 21.995734] [ 21.995843] Allocated by task 262: [ 21.995878] kasan_save_stack+0x3c/0x68 [ 21.995924] kasan_save_track+0x20/0x40 [ 21.996016] kasan_save_alloc_info+0x40/0x58 [ 21.996104] __kasan_kmalloc+0xd4/0xd8 [ 21.996182] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.996438] kasan_bitops_generic+0xa0/0x1c8 [ 21.996535] kunit_try_run_case+0x170/0x3f0 [ 21.996663] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.996737] kthread+0x328/0x630 [ 21.997022] ret_from_fork+0x10/0x20 [ 21.997383] [ 21.997482] The buggy address belongs to the object at fff00000c63901c0 [ 21.997482] which belongs to the cache kmalloc-16 of size 16 [ 21.997588] The buggy address is located 8 bytes inside of [ 21.997588] allocated 9-byte region [fff00000c63901c0, fff00000c63901c9) [ 21.997751] [ 21.997830] The buggy address belongs to the physical page: [ 21.997919] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106390 [ 21.997989] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.998180] page_type: f5(slab) [ 21.998389] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 21.998536] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.998617] page dumped because: kasan: bad access detected [ 21.998730] [ 21.998779] Memory state around the buggy address: [ 21.998947] fff00000c6390080: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc [ 21.999034] fff00000c6390100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.999383] >fff00000c6390180: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 21.999453] ^ [ 21.999554] fff00000c6390200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.999636] fff00000c6390280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.999702] ================================================================== [ 21.967757] ================================================================== [ 21.967813] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc0 [ 21.968057] Write of size 8 at addr fff00000c63901c8 by task kunit_try_catch/262 [ 21.968203] [ 21.968284] CPU: 1 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 21.968372] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.968706] Hardware name: linux,dummy-virt (DT) [ 21.968809] Call trace: [ 21.968870] show_stack+0x20/0x38 (C) [ 21.968973] dump_stack_lvl+0x8c/0xd0 [ 21.969133] print_report+0x118/0x608 [ 21.969218] kasan_report+0xdc/0x128 [ 21.969351] kasan_check_range+0x100/0x1a8 [ 21.969445] __kasan_check_write+0x20/0x30 [ 21.969561] kasan_bitops_modify.constprop.0+0x2b4/0xbc0 [ 21.969628] kasan_bitops_generic+0x110/0x1c8 [ 21.969908] kunit_try_run_case+0x170/0x3f0 [ 21.970045] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.970149] kthread+0x328/0x630 [ 21.970250] ret_from_fork+0x10/0x20 [ 21.970358] [ 21.970482] Allocated by task 262: [ 21.970571] kasan_save_stack+0x3c/0x68 [ 21.970901] kasan_save_track+0x20/0x40 [ 21.971021] kasan_save_alloc_info+0x40/0x58 [ 21.971107] __kasan_kmalloc+0xd4/0xd8 [ 21.971198] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.971357] kasan_bitops_generic+0xa0/0x1c8 [ 21.971481] kunit_try_run_case+0x170/0x3f0 [ 21.971550] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.971736] kthread+0x328/0x630 [ 21.971860] ret_from_fork+0x10/0x20 [ 21.972003] [ 21.972055] The buggy address belongs to the object at fff00000c63901c0 [ 21.972055] which belongs to the cache kmalloc-16 of size 16 [ 21.972223] The buggy address is located 8 bytes inside of [ 21.972223] allocated 9-byte region [fff00000c63901c0, fff00000c63901c9) [ 21.972338] [ 21.972484] The buggy address belongs to the physical page: [ 21.972550] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106390 [ 21.972672] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.972725] page_type: f5(slab) [ 21.972776] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 21.972848] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.973044] page dumped because: kasan: bad access detected [ 21.973223] [ 21.973338] Memory state around the buggy address: [ 21.973426] fff00000c6390080: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc [ 21.973501] fff00000c6390100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.973617] >fff00000c6390180: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 21.973660] ^ [ 21.973699] fff00000c6390200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.973891] fff00000c6390280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.974019] ==================================================================
[ 14.731885] ================================================================== [ 14.732596] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50 [ 14.732977] Write of size 8 at addr ffff888102574308 by task kunit_try_catch/278 [ 14.733296] [ 14.733397] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.733443] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.733455] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.733477] Call Trace: [ 14.733489] <TASK> [ 14.733506] dump_stack_lvl+0x73/0xb0 [ 14.733537] print_report+0xd1/0x650 [ 14.733560] ? __virt_addr_valid+0x1db/0x2d0 [ 14.733585] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 14.733612] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.733635] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 14.733662] kasan_report+0x141/0x180 [ 14.733683] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 14.733715] kasan_check_range+0x10c/0x1c0 [ 14.733738] __kasan_check_write+0x18/0x20 [ 14.733757] kasan_bitops_modify.constprop.0+0x101/0xd50 [ 14.733784] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.733812] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.733837] ? trace_hardirqs_on+0x37/0xe0 [ 14.733860] ? kasan_bitops_generic+0x92/0x1c0 [ 14.733888] kasan_bitops_generic+0x116/0x1c0 [ 14.733912] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.734336] ? __pfx_read_tsc+0x10/0x10 [ 14.734374] ? ktime_get_ts64+0x86/0x230 [ 14.734402] kunit_try_run_case+0x1a5/0x480 [ 14.734429] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.734453] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.734479] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.734504] ? __kthread_parkme+0x82/0x180 [ 14.734527] ? preempt_count_sub+0x50/0x80 [ 14.734551] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.734576] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.734601] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.734626] kthread+0x337/0x6f0 [ 14.734645] ? trace_preempt_on+0x20/0xc0 [ 14.734669] ? __pfx_kthread+0x10/0x10 [ 14.734689] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.734717] ? calculate_sigpending+0x7b/0xa0 [ 14.734742] ? __pfx_kthread+0x10/0x10 [ 14.734762] ret_from_fork+0x116/0x1d0 [ 14.734780] ? __pfx_kthread+0x10/0x10 [ 14.734801] ret_from_fork_asm+0x1a/0x30 [ 14.734831] </TASK> [ 14.734841] [ 14.743276] Allocated by task 278: [ 14.743424] kasan_save_stack+0x45/0x70 [ 14.743849] kasan_save_track+0x18/0x40 [ 14.744080] kasan_save_alloc_info+0x3b/0x50 [ 14.744307] __kasan_kmalloc+0xb7/0xc0 [ 14.744501] __kmalloc_cache_noprof+0x189/0x420 [ 14.744656] kasan_bitops_generic+0x92/0x1c0 [ 14.744882] kunit_try_run_case+0x1a5/0x480 [ 14.745185] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.745377] kthread+0x337/0x6f0 [ 14.745559] ret_from_fork+0x116/0x1d0 [ 14.745749] ret_from_fork_asm+0x1a/0x30 [ 14.745910] [ 14.746014] The buggy address belongs to the object at ffff888102574300 [ 14.746014] which belongs to the cache kmalloc-16 of size 16 [ 14.746354] The buggy address is located 8 bytes inside of [ 14.746354] allocated 9-byte region [ffff888102574300, ffff888102574309) [ 14.746685] [ 14.746765] The buggy address belongs to the physical page: [ 14.746951] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102574 [ 14.747191] flags: 0x200000000000000(node=0|zone=2) [ 14.748373] page_type: f5(slab) [ 14.749293] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.750544] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.752367] page dumped because: kasan: bad access detected [ 14.752943] [ 14.753704] Memory state around the buggy address: [ 14.754331] ffff888102574200: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 14.754555] ffff888102574280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.754776] >ffff888102574300: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.754997] ^ [ 14.755120] ffff888102574380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.755341] ffff888102574400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.755590] ================================================================== [ 14.758647] ================================================================== [ 14.759591] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 14.760483] Write of size 8 at addr ffff888102574308 by task kunit_try_catch/278 [ 14.760955] [ 14.761055] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.761101] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.761113] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.761135] Call Trace: [ 14.761147] <TASK> [ 14.761165] dump_stack_lvl+0x73/0xb0 [ 14.761198] print_report+0xd1/0x650 [ 14.761221] ? __virt_addr_valid+0x1db/0x2d0 [ 14.761244] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 14.761470] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.761499] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 14.761526] kasan_report+0x141/0x180 [ 14.761549] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 14.761581] kasan_check_range+0x10c/0x1c0 [ 14.761605] __kasan_check_write+0x18/0x20 [ 14.761624] kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 14.761651] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.761679] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.761705] ? trace_hardirqs_on+0x37/0xe0 [ 14.761729] ? kasan_bitops_generic+0x92/0x1c0 [ 14.761758] kasan_bitops_generic+0x116/0x1c0 [ 14.761781] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.761807] ? __pfx_read_tsc+0x10/0x10 [ 14.761829] ? ktime_get_ts64+0x86/0x230 [ 14.761853] kunit_try_run_case+0x1a5/0x480 [ 14.761879] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.761902] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.761928] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.762021] ? __kthread_parkme+0x82/0x180 [ 14.762044] ? preempt_count_sub+0x50/0x80 [ 14.762069] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.762094] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.762120] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.762145] kthread+0x337/0x6f0 [ 14.762164] ? trace_preempt_on+0x20/0xc0 [ 14.762187] ? __pfx_kthread+0x10/0x10 [ 14.762207] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.762229] ? calculate_sigpending+0x7b/0xa0 [ 14.762254] ? __pfx_kthread+0x10/0x10 [ 14.762275] ret_from_fork+0x116/0x1d0 [ 14.762294] ? __pfx_kthread+0x10/0x10 [ 14.762314] ret_from_fork_asm+0x1a/0x30 [ 14.762346] </TASK> [ 14.762357] [ 14.777293] Allocated by task 278: [ 14.777514] kasan_save_stack+0x45/0x70 [ 14.777718] kasan_save_track+0x18/0x40 [ 14.777886] kasan_save_alloc_info+0x3b/0x50 [ 14.778631] __kasan_kmalloc+0xb7/0xc0 [ 14.778840] __kmalloc_cache_noprof+0x189/0x420 [ 14.779335] kasan_bitops_generic+0x92/0x1c0 [ 14.779556] kunit_try_run_case+0x1a5/0x480 [ 14.779890] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.780571] kthread+0x337/0x6f0 [ 14.780767] ret_from_fork+0x116/0x1d0 [ 14.781249] ret_from_fork_asm+0x1a/0x30 [ 14.781577] [ 14.781680] The buggy address belongs to the object at ffff888102574300 [ 14.781680] which belongs to the cache kmalloc-16 of size 16 [ 14.782148] The buggy address is located 8 bytes inside of [ 14.782148] allocated 9-byte region [ffff888102574300, ffff888102574309) [ 14.782596] [ 14.782696] The buggy address belongs to the physical page: [ 14.783523] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102574 [ 14.783833] flags: 0x200000000000000(node=0|zone=2) [ 14.784303] page_type: f5(slab) [ 14.784666] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.785332] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.785772] page dumped because: kasan: bad access detected [ 14.786442] [ 14.786553] Memory state around the buggy address: [ 14.786875] ffff888102574200: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 14.787416] ffff888102574280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.787836] >ffff888102574300: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.788359] ^ [ 14.788532] ffff888102574380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.788833] ffff888102574400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.789510] ================================================================== [ 14.848347] ================================================================== [ 14.848881] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50 [ 14.849458] Write of size 8 at addr ffff888102574308 by task kunit_try_catch/278 [ 14.849989] [ 14.850437] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.850486] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.850499] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.850521] Call Trace: [ 14.850540] <TASK> [ 14.850558] dump_stack_lvl+0x73/0xb0 [ 14.850591] print_report+0xd1/0x650 [ 14.850615] ? __virt_addr_valid+0x1db/0x2d0 [ 14.850639] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 14.850665] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.850688] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 14.850723] kasan_report+0x141/0x180 [ 14.850745] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 14.850776] kasan_check_range+0x10c/0x1c0 [ 14.850800] __kasan_check_write+0x18/0x20 [ 14.850819] kasan_bitops_modify.constprop.0+0x373/0xd50 [ 14.850846] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.850875] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.850900] ? trace_hardirqs_on+0x37/0xe0 [ 14.850923] ? kasan_bitops_generic+0x92/0x1c0 [ 14.851056] kasan_bitops_generic+0x116/0x1c0 [ 14.851081] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.851107] ? __pfx_read_tsc+0x10/0x10 [ 14.851129] ? ktime_get_ts64+0x86/0x230 [ 14.851154] kunit_try_run_case+0x1a5/0x480 [ 14.851180] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.851203] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.851228] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.851253] ? __kthread_parkme+0x82/0x180 [ 14.851282] ? preempt_count_sub+0x50/0x80 [ 14.851306] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.851332] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.851357] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.851383] kthread+0x337/0x6f0 [ 14.851402] ? trace_preempt_on+0x20/0xc0 [ 14.851424] ? __pfx_kthread+0x10/0x10 [ 14.851445] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.851467] ? calculate_sigpending+0x7b/0xa0 [ 14.851492] ? __pfx_kthread+0x10/0x10 [ 14.851512] ret_from_fork+0x116/0x1d0 [ 14.851530] ? __pfx_kthread+0x10/0x10 [ 14.851551] ret_from_fork_asm+0x1a/0x30 [ 14.851581] </TASK> [ 14.851592] [ 14.865744] Allocated by task 278: [ 14.866313] kasan_save_stack+0x45/0x70 [ 14.866532] kasan_save_track+0x18/0x40 [ 14.866685] kasan_save_alloc_info+0x3b/0x50 [ 14.866917] __kasan_kmalloc+0xb7/0xc0 [ 14.867562] __kmalloc_cache_noprof+0x189/0x420 [ 14.867854] kasan_bitops_generic+0x92/0x1c0 [ 14.868278] kunit_try_run_case+0x1a5/0x480 [ 14.868631] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.868996] kthread+0x337/0x6f0 [ 14.869365] ret_from_fork+0x116/0x1d0 [ 14.869650] ret_from_fork_asm+0x1a/0x30 [ 14.869838] [ 14.869911] The buggy address belongs to the object at ffff888102574300 [ 14.869911] which belongs to the cache kmalloc-16 of size 16 [ 14.870775] The buggy address is located 8 bytes inside of [ 14.870775] allocated 9-byte region [ffff888102574300, ffff888102574309) [ 14.871787] [ 14.871897] The buggy address belongs to the physical page: [ 14.872492] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102574 [ 14.872946] flags: 0x200000000000000(node=0|zone=2) [ 14.873365] page_type: f5(slab) [ 14.873634] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.874223] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.874661] page dumped because: kasan: bad access detected [ 14.875253] [ 14.875359] Memory state around the buggy address: [ 14.875558] ffff888102574200: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 14.876193] ffff888102574280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.876672] >ffff888102574300: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.877231] ^ [ 14.877582] ffff888102574380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.878011] ffff888102574400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.878524] ================================================================== [ 14.939458] ================================================================== [ 14.939782] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50 [ 14.940923] Write of size 8 at addr ffff888102574308 by task kunit_try_catch/278 [ 14.941375] [ 14.941614] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.941663] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.941782] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.941805] Call Trace: [ 14.941827] <TASK> [ 14.941847] dump_stack_lvl+0x73/0xb0 [ 14.941882] print_report+0xd1/0x650 [ 14.941906] ? __virt_addr_valid+0x1db/0x2d0 [ 14.941928] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 14.941982] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.942005] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 14.942032] kasan_report+0x141/0x180 [ 14.942053] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 14.942085] kasan_check_range+0x10c/0x1c0 [ 14.942108] __kasan_check_write+0x18/0x20 [ 14.942129] kasan_bitops_modify.constprop.0+0x547/0xd50 [ 14.942158] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.942187] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.942212] ? trace_hardirqs_on+0x37/0xe0 [ 14.942234] ? kasan_bitops_generic+0x92/0x1c0 [ 14.942263] kasan_bitops_generic+0x116/0x1c0 [ 14.942287] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.942312] ? __pfx_read_tsc+0x10/0x10 [ 14.942333] ? ktime_get_ts64+0x86/0x230 [ 14.942358] kunit_try_run_case+0x1a5/0x480 [ 14.942385] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.942408] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.942433] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.942457] ? __kthread_parkme+0x82/0x180 [ 14.942478] ? preempt_count_sub+0x50/0x80 [ 14.942502] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.942526] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.942551] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.942576] kthread+0x337/0x6f0 [ 14.942594] ? trace_preempt_on+0x20/0xc0 [ 14.942616] ? __pfx_kthread+0x10/0x10 [ 14.942636] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.942657] ? calculate_sigpending+0x7b/0xa0 [ 14.942681] ? __pfx_kthread+0x10/0x10 [ 14.942702] ret_from_fork+0x116/0x1d0 [ 14.942727] ? __pfx_kthread+0x10/0x10 [ 14.942747] ret_from_fork_asm+0x1a/0x30 [ 14.942778] </TASK> [ 14.942788] [ 14.956819] Allocated by task 278: [ 14.957277] kasan_save_stack+0x45/0x70 [ 14.957487] kasan_save_track+0x18/0x40 [ 14.957653] kasan_save_alloc_info+0x3b/0x50 [ 14.957869] __kasan_kmalloc+0xb7/0xc0 [ 14.958456] __kmalloc_cache_noprof+0x189/0x420 [ 14.958650] kasan_bitops_generic+0x92/0x1c0 [ 14.959144] kunit_try_run_case+0x1a5/0x480 [ 14.959542] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.959918] kthread+0x337/0x6f0 [ 14.960460] ret_from_fork+0x116/0x1d0 [ 14.960626] ret_from_fork_asm+0x1a/0x30 [ 14.961108] [ 14.961208] The buggy address belongs to the object at ffff888102574300 [ 14.961208] which belongs to the cache kmalloc-16 of size 16 [ 14.962114] The buggy address is located 8 bytes inside of [ 14.962114] allocated 9-byte region [ffff888102574300, ffff888102574309) [ 14.962818] [ 14.962918] The buggy address belongs to the physical page: [ 14.963130] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102574 [ 14.964229] flags: 0x200000000000000(node=0|zone=2) [ 14.964751] page_type: f5(slab) [ 14.964883] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.965595] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.965849] page dumped because: kasan: bad access detected [ 14.966224] [ 14.966402] Memory state around the buggy address: [ 14.966818] ffff888102574200: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 14.967645] ffff888102574280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.968175] >ffff888102574300: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.969051] ^ [ 14.969372] ffff888102574380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.969586] ffff888102574400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.969799] ================================================================== [ 14.790572] ================================================================== [ 14.790907] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 14.791519] Write of size 8 at addr ffff888102574308 by task kunit_try_catch/278 [ 14.792197] [ 14.792686] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.792737] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.792749] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.792771] Call Trace: [ 14.792791] <TASK> [ 14.792810] dump_stack_lvl+0x73/0xb0 [ 14.792845] print_report+0xd1/0x650 [ 14.792869] ? __virt_addr_valid+0x1db/0x2d0 [ 14.792892] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 14.792918] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.793122] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 14.793155] kasan_report+0x141/0x180 [ 14.793178] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 14.793210] kasan_check_range+0x10c/0x1c0 [ 14.793233] __kasan_check_write+0x18/0x20 [ 14.793253] kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 14.793293] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.793321] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.793346] ? trace_hardirqs_on+0x37/0xe0 [ 14.793370] ? kasan_bitops_generic+0x92/0x1c0 [ 14.793398] kasan_bitops_generic+0x116/0x1c0 [ 14.793422] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.793448] ? __pfx_read_tsc+0x10/0x10 [ 14.793470] ? ktime_get_ts64+0x86/0x230 [ 14.793494] kunit_try_run_case+0x1a5/0x480 [ 14.793519] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.793542] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.793568] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.793591] ? __kthread_parkme+0x82/0x180 [ 14.793612] ? preempt_count_sub+0x50/0x80 [ 14.793636] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.793661] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.793686] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.793711] kthread+0x337/0x6f0 [ 14.793730] ? trace_preempt_on+0x20/0xc0 [ 14.793752] ? __pfx_kthread+0x10/0x10 [ 14.793773] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.793795] ? calculate_sigpending+0x7b/0xa0 [ 14.793821] ? __pfx_kthread+0x10/0x10 [ 14.793842] ret_from_fork+0x116/0x1d0 [ 14.793861] ? __pfx_kthread+0x10/0x10 [ 14.793882] ret_from_fork_asm+0x1a/0x30 [ 14.793913] </TASK> [ 14.793923] [ 14.806105] Allocated by task 278: [ 14.806287] kasan_save_stack+0x45/0x70 [ 14.806572] kasan_save_track+0x18/0x40 [ 14.806778] kasan_save_alloc_info+0x3b/0x50 [ 14.806990] __kasan_kmalloc+0xb7/0xc0 [ 14.807506] __kmalloc_cache_noprof+0x189/0x420 [ 14.807831] kasan_bitops_generic+0x92/0x1c0 [ 14.808240] kunit_try_run_case+0x1a5/0x480 [ 14.808538] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.808776] kthread+0x337/0x6f0 [ 14.808901] ret_from_fork+0x116/0x1d0 [ 14.809509] ret_from_fork_asm+0x1a/0x30 [ 14.809723] [ 14.809822] The buggy address belongs to the object at ffff888102574300 [ 14.809822] which belongs to the cache kmalloc-16 of size 16 [ 14.810852] The buggy address is located 8 bytes inside of [ 14.810852] allocated 9-byte region [ffff888102574300, ffff888102574309) [ 14.811704] [ 14.811812] The buggy address belongs to the physical page: [ 14.812356] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102574 [ 14.812821] flags: 0x200000000000000(node=0|zone=2) [ 14.813057] page_type: f5(slab) [ 14.813214] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.813602] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.814418] page dumped because: kasan: bad access detected [ 14.814696] [ 14.814786] Memory state around the buggy address: [ 14.815286] ffff888102574200: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 14.815714] ffff888102574280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.816208] >ffff888102574300: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.816663] ^ [ 14.816813] ffff888102574380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.817404] ffff888102574400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.817816] ================================================================== [ 14.909849] ================================================================== [ 14.910629] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 14.911497] Write of size 8 at addr ffff888102574308 by task kunit_try_catch/278 [ 14.911817] [ 14.911922] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.912345] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.912360] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.912382] Call Trace: [ 14.912404] <TASK> [ 14.912423] dump_stack_lvl+0x73/0xb0 [ 14.912458] print_report+0xd1/0x650 [ 14.912481] ? __virt_addr_valid+0x1db/0x2d0 [ 14.912505] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 14.912531] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.912554] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 14.912582] kasan_report+0x141/0x180 [ 14.912603] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 14.912634] kasan_check_range+0x10c/0x1c0 [ 14.912657] __kasan_check_write+0x18/0x20 [ 14.912677] kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 14.912704] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.912734] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.912759] ? trace_hardirqs_on+0x37/0xe0 [ 14.912781] ? kasan_bitops_generic+0x92/0x1c0 [ 14.912809] kasan_bitops_generic+0x116/0x1c0 [ 14.912832] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.912858] ? __pfx_read_tsc+0x10/0x10 [ 14.912879] ? ktime_get_ts64+0x86/0x230 [ 14.912905] kunit_try_run_case+0x1a5/0x480 [ 14.912929] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.913019] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.913045] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.913069] ? __kthread_parkme+0x82/0x180 [ 14.913091] ? preempt_count_sub+0x50/0x80 [ 14.913114] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.913139] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.913164] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.913189] kthread+0x337/0x6f0 [ 14.913208] ? trace_preempt_on+0x20/0xc0 [ 14.913230] ? __pfx_kthread+0x10/0x10 [ 14.913251] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.913273] ? calculate_sigpending+0x7b/0xa0 [ 14.913297] ? __pfx_kthread+0x10/0x10 [ 14.913320] ret_from_fork+0x116/0x1d0 [ 14.913338] ? __pfx_kthread+0x10/0x10 [ 14.913359] ret_from_fork_asm+0x1a/0x30 [ 14.913389] </TASK> [ 14.913400] [ 14.926134] Allocated by task 278: [ 14.926490] kasan_save_stack+0x45/0x70 [ 14.926805] kasan_save_track+0x18/0x40 [ 14.927102] kasan_save_alloc_info+0x3b/0x50 [ 14.927302] __kasan_kmalloc+0xb7/0xc0 [ 14.927812] __kmalloc_cache_noprof+0x189/0x420 [ 14.928402] kasan_bitops_generic+0x92/0x1c0 [ 14.928635] kunit_try_run_case+0x1a5/0x480 [ 14.928918] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.929171] kthread+0x337/0x6f0 [ 14.929624] ret_from_fork+0x116/0x1d0 [ 14.929817] ret_from_fork_asm+0x1a/0x30 [ 14.930144] [ 14.930224] The buggy address belongs to the object at ffff888102574300 [ 14.930224] which belongs to the cache kmalloc-16 of size 16 [ 14.931328] The buggy address is located 8 bytes inside of [ 14.931328] allocated 9-byte region [ffff888102574300, ffff888102574309) [ 14.931847] [ 14.931953] The buggy address belongs to the physical page: [ 14.932547] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102574 [ 14.933011] flags: 0x200000000000000(node=0|zone=2) [ 14.933501] page_type: f5(slab) [ 14.933775] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.934322] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.934759] page dumped because: kasan: bad access detected [ 14.935006] [ 14.935362] Memory state around the buggy address: [ 14.935704] ffff888102574200: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 14.936397] ffff888102574280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.936811] >ffff888102574300: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.937315] ^ [ 14.937613] ffff888102574380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.938222] ffff888102574400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.938692] ================================================================== [ 14.818773] ================================================================== [ 14.819429] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 14.819883] Write of size 8 at addr ffff888102574308 by task kunit_try_catch/278 [ 14.820600] [ 14.820715] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.820762] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.820773] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.820794] Call Trace: [ 14.820814] <TASK> [ 14.820832] dump_stack_lvl+0x73/0xb0 [ 14.820863] print_report+0xd1/0x650 [ 14.820910] ? __virt_addr_valid+0x1db/0x2d0 [ 14.820945] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 14.821059] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.821084] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 14.821111] kasan_report+0x141/0x180 [ 14.821134] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 14.821166] kasan_check_range+0x10c/0x1c0 [ 14.821190] __kasan_check_write+0x18/0x20 [ 14.821210] kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 14.821236] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.821353] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.821381] ? trace_hardirqs_on+0x37/0xe0 [ 14.821406] ? kasan_bitops_generic+0x92/0x1c0 [ 14.821434] kasan_bitops_generic+0x116/0x1c0 [ 14.821458] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.821484] ? __pfx_read_tsc+0x10/0x10 [ 14.821506] ? ktime_get_ts64+0x86/0x230 [ 14.821530] kunit_try_run_case+0x1a5/0x480 [ 14.821555] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.821579] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.821604] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.821629] ? __kthread_parkme+0x82/0x180 [ 14.821650] ? preempt_count_sub+0x50/0x80 [ 14.821675] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.821701] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.821730] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.821757] kthread+0x337/0x6f0 [ 14.821776] ? trace_preempt_on+0x20/0xc0 [ 14.821797] ? __pfx_kthread+0x10/0x10 [ 14.821818] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.821840] ? calculate_sigpending+0x7b/0xa0 [ 14.821865] ? __pfx_kthread+0x10/0x10 [ 14.821887] ret_from_fork+0x116/0x1d0 [ 14.821904] ? __pfx_kthread+0x10/0x10 [ 14.821925] ret_from_fork_asm+0x1a/0x30 [ 14.821985] </TASK> [ 14.821996] [ 14.835688] Allocated by task 278: [ 14.835870] kasan_save_stack+0x45/0x70 [ 14.836388] kasan_save_track+0x18/0x40 [ 14.836611] kasan_save_alloc_info+0x3b/0x50 [ 14.836929] __kasan_kmalloc+0xb7/0xc0 [ 14.837342] __kmalloc_cache_noprof+0x189/0x420 [ 14.837665] kasan_bitops_generic+0x92/0x1c0 [ 14.837870] kunit_try_run_case+0x1a5/0x480 [ 14.838385] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.838746] kthread+0x337/0x6f0 [ 14.838928] ret_from_fork+0x116/0x1d0 [ 14.839243] ret_from_fork_asm+0x1a/0x30 [ 14.839645] [ 14.839764] The buggy address belongs to the object at ffff888102574300 [ 14.839764] which belongs to the cache kmalloc-16 of size 16 [ 14.840517] The buggy address is located 8 bytes inside of [ 14.840517] allocated 9-byte region [ffff888102574300, ffff888102574309) [ 14.841381] [ 14.841490] The buggy address belongs to the physical page: [ 14.841703] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102574 [ 14.842369] flags: 0x200000000000000(node=0|zone=2) [ 14.842736] page_type: f5(slab) [ 14.842922] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.843501] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.843998] page dumped because: kasan: bad access detected [ 14.844300] [ 14.844588] Memory state around the buggy address: [ 14.844830] ffff888102574200: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 14.845403] ffff888102574280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.845712] >ffff888102574300: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.846357] ^ [ 14.846525] ffff888102574380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.847051] ffff888102574400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.847578] ================================================================== [ 14.879482] ================================================================== [ 14.879795] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 14.880658] Write of size 8 at addr ffff888102574308 by task kunit_try_catch/278 [ 14.881157] [ 14.881446] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.881500] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.881513] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.881534] Call Trace: [ 14.881555] <TASK> [ 14.881574] dump_stack_lvl+0x73/0xb0 [ 14.881607] print_report+0xd1/0x650 [ 14.881632] ? __virt_addr_valid+0x1db/0x2d0 [ 14.881656] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 14.881683] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.881706] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 14.881733] kasan_report+0x141/0x180 [ 14.881755] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 14.881786] kasan_check_range+0x10c/0x1c0 [ 14.881810] __kasan_check_write+0x18/0x20 [ 14.881830] kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 14.881857] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.881885] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.881909] ? trace_hardirqs_on+0x37/0xe0 [ 14.881952] ? kasan_bitops_generic+0x92/0x1c0 [ 14.881981] kasan_bitops_generic+0x116/0x1c0 [ 14.882006] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.882032] ? __pfx_read_tsc+0x10/0x10 [ 14.882055] ? ktime_get_ts64+0x86/0x230 [ 14.882080] kunit_try_run_case+0x1a5/0x480 [ 14.882105] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.882129] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.882154] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.882179] ? __kthread_parkme+0x82/0x180 [ 14.882200] ? preempt_count_sub+0x50/0x80 [ 14.882224] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.882248] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.882274] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.882299] kthread+0x337/0x6f0 [ 14.882318] ? trace_preempt_on+0x20/0xc0 [ 14.882339] ? __pfx_kthread+0x10/0x10 [ 14.882360] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.882380] ? calculate_sigpending+0x7b/0xa0 [ 14.882405] ? __pfx_kthread+0x10/0x10 [ 14.882426] ret_from_fork+0x116/0x1d0 [ 14.882444] ? __pfx_kthread+0x10/0x10 [ 14.882463] ret_from_fork_asm+0x1a/0x30 [ 14.882495] </TASK> [ 14.882505] [ 14.896198] Allocated by task 278: [ 14.896496] kasan_save_stack+0x45/0x70 [ 14.896696] kasan_save_track+0x18/0x40 [ 14.896874] kasan_save_alloc_info+0x3b/0x50 [ 14.897144] __kasan_kmalloc+0xb7/0xc0 [ 14.897787] __kmalloc_cache_noprof+0x189/0x420 [ 14.898028] kasan_bitops_generic+0x92/0x1c0 [ 14.898521] kunit_try_run_case+0x1a5/0x480 [ 14.898833] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.899458] kthread+0x337/0x6f0 [ 14.899725] ret_from_fork+0x116/0x1d0 [ 14.899891] ret_from_fork_asm+0x1a/0x30 [ 14.900472] [ 14.900579] The buggy address belongs to the object at ffff888102574300 [ 14.900579] which belongs to the cache kmalloc-16 of size 16 [ 14.901257] The buggy address is located 8 bytes inside of [ 14.901257] allocated 9-byte region [ffff888102574300, ffff888102574309) [ 14.902222] [ 14.902515] The buggy address belongs to the physical page: [ 14.902772] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102574 [ 14.903440] flags: 0x200000000000000(node=0|zone=2) [ 14.903755] page_type: f5(slab) [ 14.904217] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.904549] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.905133] page dumped because: kasan: bad access detected [ 14.905495] [ 14.905606] Memory state around the buggy address: [ 14.905885] ffff888102574200: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 14.906666] ffff888102574280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.907367] >ffff888102574300: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.907813] ^ [ 14.908222] ffff888102574380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.908644] ffff888102574400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.909193] ==================================================================