Date
July 9, 2025, 12:11 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 22.011638] ================================================================== [ 22.011691] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0 [ 22.011746] Read of size 8 at addr fff00000c63901c8 by task kunit_try_catch/262 [ 22.011806] [ 22.011844] CPU: 1 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 22.011998] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.012052] Hardware name: linux,dummy-virt (DT) [ 22.012104] Call trace: [ 22.012207] show_stack+0x20/0x38 (C) [ 22.012315] dump_stack_lvl+0x8c/0xd0 [ 22.012415] print_report+0x118/0x608 [ 22.012481] kasan_report+0xdc/0x128 [ 22.012551] __asan_report_load8_noabort+0x20/0x30 [ 22.012793] kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0 [ 22.012966] kasan_bitops_generic+0x11c/0x1c8 [ 22.013093] kunit_try_run_case+0x170/0x3f0 [ 22.013180] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.013285] kthread+0x328/0x630 [ 22.013479] ret_from_fork+0x10/0x20 [ 22.013673] [ 22.013745] Allocated by task 262: [ 22.013872] kasan_save_stack+0x3c/0x68 [ 22.013957] kasan_save_track+0x20/0x40 [ 22.014044] kasan_save_alloc_info+0x40/0x58 [ 22.014130] __kasan_kmalloc+0xd4/0xd8 [ 22.014197] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.014279] kasan_bitops_generic+0xa0/0x1c8 [ 22.014360] kunit_try_run_case+0x170/0x3f0 [ 22.014464] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.014582] kthread+0x328/0x630 [ 22.014647] ret_from_fork+0x10/0x20 [ 22.014687] [ 22.014749] The buggy address belongs to the object at fff00000c63901c0 [ 22.014749] which belongs to the cache kmalloc-16 of size 16 [ 22.015073] The buggy address is located 8 bytes inside of [ 22.015073] allocated 9-byte region [fff00000c63901c0, fff00000c63901c9) [ 22.015165] [ 22.015266] The buggy address belongs to the physical page: [ 22.015343] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106390 [ 22.015429] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.015543] page_type: f5(slab) [ 22.015615] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 22.015745] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 22.015823] page dumped because: kasan: bad access detected [ 22.015888] [ 22.015909] Memory state around the buggy address: [ 22.015943] fff00000c6390080: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc [ 22.016166] fff00000c6390100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.016227] >fff00000c6390180: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 22.016311] ^ [ 22.016530] fff00000c6390200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.016580] fff00000c6390280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.016623] ================================================================== [ 22.020468] ================================================================== [ 22.020518] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0 [ 22.020572] Read of size 8 at addr fff00000c63901c8 by task kunit_try_catch/262 [ 22.020624] [ 22.020653] CPU: 1 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 22.020736] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.020766] Hardware name: linux,dummy-virt (DT) [ 22.020799] Call trace: [ 22.020823] show_stack+0x20/0x38 (C) [ 22.020873] dump_stack_lvl+0x8c/0xd0 [ 22.020923] print_report+0x118/0x608 [ 22.020971] kasan_report+0xdc/0x128 [ 22.021021] __asan_report_load8_noabort+0x20/0x30 [ 22.021081] kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0 [ 22.021138] kasan_bitops_generic+0x11c/0x1c8 [ 22.021189] kunit_try_run_case+0x170/0x3f0 [ 22.021238] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.021295] kthread+0x328/0x630 [ 22.021340] ret_from_fork+0x10/0x20 [ 22.021390] [ 22.021442] Allocated by task 262: [ 22.021471] kasan_save_stack+0x3c/0x68 [ 22.021545] kasan_save_track+0x20/0x40 [ 22.021587] kasan_save_alloc_info+0x40/0x58 [ 22.021664] __kasan_kmalloc+0xd4/0xd8 [ 22.021741] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.021846] kasan_bitops_generic+0xa0/0x1c8 [ 22.021922] kunit_try_run_case+0x170/0x3f0 [ 22.021992] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.022083] kthread+0x328/0x630 [ 22.022153] ret_from_fork+0x10/0x20 [ 22.022255] [ 22.022313] The buggy address belongs to the object at fff00000c63901c0 [ 22.022313] which belongs to the cache kmalloc-16 of size 16 [ 22.022441] The buggy address is located 8 bytes inside of [ 22.022441] allocated 9-byte region [fff00000c63901c0, fff00000c63901c9) [ 22.022556] [ 22.022704] The buggy address belongs to the physical page: [ 22.022738] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106390 [ 22.022921] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.023044] page_type: f5(slab) [ 22.023122] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 22.023179] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 22.023342] page dumped because: kasan: bad access detected [ 22.023429] [ 22.023552] Memory state around the buggy address: [ 22.023670] fff00000c6390080: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc [ 22.023736] fff00000c6390100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.023802] >fff00000c6390180: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 22.023898] ^ [ 22.023966] fff00000c6390200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.024094] fff00000c6390280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.024179] ================================================================== [ 22.024826] ================================================================== [ 22.024877] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc0 [ 22.024928] Write of size 8 at addr fff00000c63901c8 by task kunit_try_catch/262 [ 22.025200] [ 22.025260] CPU: 1 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 22.025372] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.025435] Hardware name: linux,dummy-virt (DT) [ 22.025470] Call trace: [ 22.025510] show_stack+0x20/0x38 (C) [ 22.025563] dump_stack_lvl+0x8c/0xd0 [ 22.025610] print_report+0x118/0x608 [ 22.025690] kasan_report+0xdc/0x128 [ 22.025756] kasan_check_range+0x100/0x1a8 [ 22.025808] __kasan_check_write+0x20/0x30 [ 22.025968] kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc0 [ 22.026029] kasan_bitops_generic+0x11c/0x1c8 [ 22.026104] kunit_try_run_case+0x170/0x3f0 [ 22.026174] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.026277] kthread+0x328/0x630 [ 22.026322] ret_from_fork+0x10/0x20 [ 22.026390] [ 22.026440] Allocated by task 262: [ 22.026472] kasan_save_stack+0x3c/0x68 [ 22.026530] kasan_save_track+0x20/0x40 [ 22.026573] kasan_save_alloc_info+0x40/0x58 [ 22.026632] __kasan_kmalloc+0xd4/0xd8 [ 22.026675] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.026717] kasan_bitops_generic+0xa0/0x1c8 [ 22.026877] kunit_try_run_case+0x170/0x3f0 [ 22.026929] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.026977] kthread+0x328/0x630 [ 22.027073] ret_from_fork+0x10/0x20 [ 22.027134] [ 22.027163] The buggy address belongs to the object at fff00000c63901c0 [ 22.027163] which belongs to the cache kmalloc-16 of size 16 [ 22.027225] The buggy address is located 8 bytes inside of [ 22.027225] allocated 9-byte region [fff00000c63901c0, fff00000c63901c9) [ 22.027296] [ 22.027319] The buggy address belongs to the physical page: [ 22.027351] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106390 [ 22.027509] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.027580] page_type: f5(slab) [ 22.027726] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 22.027798] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 22.027864] page dumped because: kasan: bad access detected [ 22.027899] [ 22.027935] Memory state around the buggy address: [ 22.027971] fff00000c6390080: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc [ 22.028017] fff00000c6390100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.028077] >fff00000c6390180: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 22.028126] ^ [ 22.028181] fff00000c6390200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.028236] fff00000c6390280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.028278] ================================================================== [ 22.017032] ================================================================== [ 22.017091] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc0 [ 22.017143] Write of size 8 at addr fff00000c63901c8 by task kunit_try_catch/262 [ 22.017195] [ 22.017224] CPU: 1 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 22.017309] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.017338] Hardware name: linux,dummy-virt (DT) [ 22.017371] Call trace: [ 22.017395] show_stack+0x20/0x38 (C) [ 22.017474] dump_stack_lvl+0x8c/0xd0 [ 22.017522] print_report+0x118/0x608 [ 22.017572] kasan_report+0xdc/0x128 [ 22.017619] kasan_check_range+0x100/0x1a8 [ 22.017670] __kasan_check_write+0x20/0x30 [ 22.017718] kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc0 [ 22.017775] kasan_bitops_generic+0x11c/0x1c8 [ 22.017825] kunit_try_run_case+0x170/0x3f0 [ 22.017875] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.017932] kthread+0x328/0x630 [ 22.017978] ret_from_fork+0x10/0x20 [ 22.018029] [ 22.018050] Allocated by task 262: [ 22.018081] kasan_save_stack+0x3c/0x68 [ 22.018124] kasan_save_track+0x20/0x40 [ 22.018183] kasan_save_alloc_info+0x40/0x58 [ 22.018232] __kasan_kmalloc+0xd4/0xd8 [ 22.018273] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.018315] kasan_bitops_generic+0xa0/0x1c8 [ 22.018357] kunit_try_run_case+0x170/0x3f0 [ 22.018409] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.018456] kthread+0x328/0x630 [ 22.018492] ret_from_fork+0x10/0x20 [ 22.018531] [ 22.018551] The buggy address belongs to the object at fff00000c63901c0 [ 22.018551] which belongs to the cache kmalloc-16 of size 16 [ 22.018617] The buggy address is located 8 bytes inside of [ 22.018617] allocated 9-byte region [fff00000c63901c0, fff00000c63901c9) [ 22.018688] [ 22.018710] The buggy address belongs to the physical page: [ 22.018744] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106390 [ 22.018800] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.018850] page_type: f5(slab) [ 22.018888] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 22.018942] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 22.018987] page dumped because: kasan: bad access detected [ 22.019021] [ 22.019050] Memory state around the buggy address: [ 22.019085] fff00000c6390080: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc [ 22.019130] fff00000c6390100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.019173] >fff00000c6390180: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 22.019214] ^ [ 22.019251] fff00000c6390200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.019296] fff00000c6390280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.019346] ================================================================== [ 22.028851] ================================================================== [ 22.028931] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0 [ 22.028985] Read of size 8 at addr fff00000c63901c8 by task kunit_try_catch/262 [ 22.029039] [ 22.029099] CPU: 1 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 22.029183] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.029211] Hardware name: linux,dummy-virt (DT) [ 22.029245] Call trace: [ 22.029365] show_stack+0x20/0x38 (C) [ 22.029451] dump_stack_lvl+0x8c/0xd0 [ 22.029573] print_report+0x118/0x608 [ 22.029633] kasan_report+0xdc/0x128 [ 22.029691] __asan_report_load8_noabort+0x20/0x30 [ 22.029765] kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0 [ 22.029858] kasan_bitops_generic+0x11c/0x1c8 [ 22.029914] kunit_try_run_case+0x170/0x3f0 [ 22.029967] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.030023] kthread+0x328/0x630 [ 22.030190] ret_from_fork+0x10/0x20 [ 22.030242] [ 22.030262] Allocated by task 262: [ 22.030291] kasan_save_stack+0x3c/0x68 [ 22.030334] kasan_save_track+0x20/0x40 [ 22.030391] kasan_save_alloc_info+0x40/0x58 [ 22.030447] __kasan_kmalloc+0xd4/0xd8 [ 22.030514] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.030557] kasan_bitops_generic+0xa0/0x1c8 [ 22.030616] kunit_try_run_case+0x170/0x3f0 [ 22.030689] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.030735] kthread+0x328/0x630 [ 22.030771] ret_from_fork+0x10/0x20 [ 22.030808] [ 22.030837] The buggy address belongs to the object at fff00000c63901c0 [ 22.030837] which belongs to the cache kmalloc-16 of size 16 [ 22.031024] The buggy address is located 8 bytes inside of [ 22.031024] allocated 9-byte region [fff00000c63901c0, fff00000c63901c9) [ 22.031121] [ 22.031245] The buggy address belongs to the physical page: [ 22.031312] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106390 [ 22.031387] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.031457] page_type: f5(slab) [ 22.031498] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 22.031552] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 22.031622] page dumped because: kasan: bad access detected [ 22.031657] [ 22.031682] Memory state around the buggy address: [ 22.031716] fff00000c6390080: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc [ 22.031861] fff00000c6390100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.031928] >fff00000c6390180: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 22.032075] ^ [ 22.032127] fff00000c6390200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.032190] fff00000c6390280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.032274] ================================================================== [ 22.039989] ================================================================== [ 22.040030] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0 [ 22.040077] Read of size 8 at addr fff00000c63901c8 by task kunit_try_catch/262 [ 22.040129] [ 22.040160] CPU: 1 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 22.040299] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.040554] Hardware name: linux,dummy-virt (DT) [ 22.040592] Call trace: [ 22.040617] show_stack+0x20/0x38 (C) [ 22.040671] dump_stack_lvl+0x8c/0xd0 [ 22.040720] print_report+0x118/0x608 [ 22.040768] kasan_report+0xdc/0x128 [ 22.040817] __asan_report_load8_noabort+0x20/0x30 [ 22.040870] kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0 [ 22.040928] kasan_bitops_generic+0x11c/0x1c8 [ 22.040980] kunit_try_run_case+0x170/0x3f0 [ 22.041030] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.041097] kthread+0x328/0x630 [ 22.041142] ret_from_fork+0x10/0x20 [ 22.041191] [ 22.041213] Allocated by task 262: [ 22.041243] kasan_save_stack+0x3c/0x68 [ 22.041287] kasan_save_track+0x20/0x40 [ 22.041328] kasan_save_alloc_info+0x40/0x58 [ 22.041370] __kasan_kmalloc+0xd4/0xd8 [ 22.041424] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.041466] kasan_bitops_generic+0xa0/0x1c8 [ 22.041507] kunit_try_run_case+0x170/0x3f0 [ 22.041548] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.041594] kthread+0x328/0x630 [ 22.041630] ret_from_fork+0x10/0x20 [ 22.041671] [ 22.041691] The buggy address belongs to the object at fff00000c63901c0 [ 22.041691] which belongs to the cache kmalloc-16 of size 16 [ 22.041751] The buggy address is located 8 bytes inside of [ 22.041751] allocated 9-byte region [fff00000c63901c0, fff00000c63901c9) [ 22.041817] [ 22.041838] The buggy address belongs to the physical page: [ 22.041871] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106390 [ 22.041927] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.041979] page_type: f5(slab) [ 22.042017] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 22.042073] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 22.042117] page dumped because: kasan: bad access detected [ 22.042151] [ 22.042171] Memory state around the buggy address: [ 22.042204] fff00000c6390080: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc [ 22.042249] fff00000c6390100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.042295] >fff00000c6390180: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 22.042334] ^ [ 22.042371] fff00000c6390200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.044319] fff00000c6390280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.044368] ================================================================== [ 22.008163] ================================================================== [ 22.008225] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0 [ 22.008281] Write of size 8 at addr fff00000c63901c8 by task kunit_try_catch/262 [ 22.008333] [ 22.008367] CPU: 1 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 22.008468] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.008497] Hardware name: linux,dummy-virt (DT) [ 22.008529] Call trace: [ 22.008555] show_stack+0x20/0x38 (C) [ 22.008606] dump_stack_lvl+0x8c/0xd0 [ 22.008655] print_report+0x118/0x608 [ 22.008702] kasan_report+0xdc/0x128 [ 22.008751] kasan_check_range+0x100/0x1a8 [ 22.008800] __kasan_check_write+0x20/0x30 [ 22.008847] kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0 [ 22.008905] kasan_bitops_generic+0x11c/0x1c8 [ 22.008955] kunit_try_run_case+0x170/0x3f0 [ 22.009004] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.009059] kthread+0x328/0x630 [ 22.009114] ret_from_fork+0x10/0x20 [ 22.009164] [ 22.009187] Allocated by task 262: [ 22.009217] kasan_save_stack+0x3c/0x68 [ 22.009261] kasan_save_track+0x20/0x40 [ 22.009302] kasan_save_alloc_info+0x40/0x58 [ 22.009345] __kasan_kmalloc+0xd4/0xd8 [ 22.009384] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.009467] kasan_bitops_generic+0xa0/0x1c8 [ 22.009509] kunit_try_run_case+0x170/0x3f0 [ 22.009729] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.009791] kthread+0x328/0x630 [ 22.009827] ret_from_fork+0x10/0x20 [ 22.009870] [ 22.009892] The buggy address belongs to the object at fff00000c63901c0 [ 22.009892] which belongs to the cache kmalloc-16 of size 16 [ 22.009956] The buggy address is located 8 bytes inside of [ 22.009956] allocated 9-byte region [fff00000c63901c0, fff00000c63901c9) [ 22.010100] [ 22.010137] The buggy address belongs to the physical page: [ 22.010172] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106390 [ 22.010232] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.010322] page_type: f5(slab) [ 22.010373] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 22.010591] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 22.010635] page dumped because: kasan: bad access detected [ 22.010701] [ 22.010802] Memory state around the buggy address: [ 22.010844] fff00000c6390080: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc [ 22.010930] fff00000c6390100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.011006] >fff00000c6390180: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 22.011047] ^ [ 22.011099] fff00000c6390200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.011144] fff00000c6390280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.011186] ================================================================== [ 22.032647] ================================================================== [ 22.032696] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x334/0xbc0 [ 22.032748] Write of size 8 at addr fff00000c63901c8 by task kunit_try_catch/262 [ 22.032944] [ 22.033000] CPU: 1 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 22.033143] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.033175] Hardware name: linux,dummy-virt (DT) [ 22.033215] Call trace: [ 22.033268] show_stack+0x20/0x38 (C) [ 22.033321] dump_stack_lvl+0x8c/0xd0 [ 22.033388] print_report+0x118/0x608 [ 22.033480] kasan_report+0xdc/0x128 [ 22.033535] kasan_check_range+0x100/0x1a8 [ 22.033587] __kasan_check_write+0x20/0x30 [ 22.033749] kasan_bitops_test_and_modify.constprop.0+0x334/0xbc0 [ 22.033811] kasan_bitops_generic+0x11c/0x1c8 [ 22.033861] kunit_try_run_case+0x170/0x3f0 [ 22.033929] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.034068] kthread+0x328/0x630 [ 22.034150] ret_from_fork+0x10/0x20 [ 22.034217] [ 22.034245] Allocated by task 262: [ 22.034293] kasan_save_stack+0x3c/0x68 [ 22.034377] kasan_save_track+0x20/0x40 [ 22.034454] kasan_save_alloc_info+0x40/0x58 [ 22.034498] __kasan_kmalloc+0xd4/0xd8 [ 22.034540] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.034581] kasan_bitops_generic+0xa0/0x1c8 [ 22.034638] kunit_try_run_case+0x170/0x3f0 [ 22.034680] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.034725] kthread+0x328/0x630 [ 22.034884] ret_from_fork+0x10/0x20 [ 22.034952] [ 22.035048] The buggy address belongs to the object at fff00000c63901c0 [ 22.035048] which belongs to the cache kmalloc-16 of size 16 [ 22.035114] The buggy address is located 8 bytes inside of [ 22.035114] allocated 9-byte region [fff00000c63901c0, fff00000c63901c9) [ 22.035198] [ 22.035249] The buggy address belongs to the physical page: [ 22.035283] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106390 [ 22.035338] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.035388] page_type: f5(slab) [ 22.035436] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 22.035576] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 22.035639] page dumped because: kasan: bad access detected [ 22.035698] [ 22.035724] Memory state around the buggy address: [ 22.035801] fff00000c6390080: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc [ 22.035864] fff00000c6390100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.035910] >fff00000c6390180: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 22.035956] ^ [ 22.036011] fff00000c6390200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.036085] fff00000c6390280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.036162] ================================================================== [ 22.036542] ================================================================== [ 22.036598] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0 [ 22.036700] Read of size 8 at addr fff00000c63901c8 by task kunit_try_catch/262 [ 22.036775] [ 22.036824] CPU: 1 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 22.036909] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.036938] Hardware name: linux,dummy-virt (DT) [ 22.037083] Call trace: [ 22.037131] show_stack+0x20/0x38 (C) [ 22.037191] dump_stack_lvl+0x8c/0xd0 [ 22.037316] print_report+0x118/0x608 [ 22.037387] kasan_report+0xdc/0x128 [ 22.037455] __asan_report_load8_noabort+0x20/0x30 [ 22.037536] kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0 [ 22.037596] kasan_bitops_generic+0x11c/0x1c8 [ 22.037663] kunit_try_run_case+0x170/0x3f0 [ 22.037716] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.037784] kthread+0x328/0x630 [ 22.037829] ret_from_fork+0x10/0x20 [ 22.037881] [ 22.037901] Allocated by task 262: [ 22.037933] kasan_save_stack+0x3c/0x68 [ 22.038003] kasan_save_track+0x20/0x40 [ 22.038050] kasan_save_alloc_info+0x40/0x58 [ 22.038094] __kasan_kmalloc+0xd4/0xd8 [ 22.038134] __kmalloc_cache_noprof+0x16c/0x3c0 [ 22.038276] kasan_bitops_generic+0xa0/0x1c8 [ 22.038326] kunit_try_run_case+0x170/0x3f0 [ 22.038482] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.038560] kthread+0x328/0x630 [ 22.038624] ret_from_fork+0x10/0x20 [ 22.038671] [ 22.038695] The buggy address belongs to the object at fff00000c63901c0 [ 22.038695] which belongs to the cache kmalloc-16 of size 16 [ 22.038760] The buggy address is located 8 bytes inside of [ 22.038760] allocated 9-byte region [fff00000c63901c0, fff00000c63901c9) [ 22.038855] [ 22.038906] The buggy address belongs to the physical page: [ 22.038955] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106390 [ 22.039029] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.039083] page_type: f5(slab) [ 22.039238] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 22.039291] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 22.039457] page dumped because: kasan: bad access detected [ 22.039509] [ 22.039547] Memory state around the buggy address: [ 22.039582] fff00000c6390080: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc [ 22.039647] fff00000c6390100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.039711] >fff00000c6390180: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 22.039753] ^ [ 22.039791] fff00000c6390200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.039836] fff00000c6390280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.039879] ==================================================================
[ 15.044020] ================================================================== [ 15.044607] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 15.044892] Write of size 8 at addr ffff888102574308 by task kunit_try_catch/278 [ 15.045232] [ 15.045405] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.045450] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.045462] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.045482] Call Trace: [ 15.045501] <TASK> [ 15.045519] dump_stack_lvl+0x73/0xb0 [ 15.045551] print_report+0xd1/0x650 [ 15.045573] ? __virt_addr_valid+0x1db/0x2d0 [ 15.045596] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 15.045626] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.045648] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 15.045678] kasan_report+0x141/0x180 [ 15.045701] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 15.045735] kasan_check_range+0x10c/0x1c0 [ 15.045758] __kasan_check_write+0x18/0x20 [ 15.045777] kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 15.045806] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 15.045837] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.045862] ? trace_hardirqs_on+0x37/0xe0 [ 15.045885] ? kasan_bitops_generic+0x92/0x1c0 [ 15.045912] kasan_bitops_generic+0x121/0x1c0 [ 15.045948] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 15.045973] ? __pfx_read_tsc+0x10/0x10 [ 15.045995] ? ktime_get_ts64+0x86/0x230 [ 15.046019] kunit_try_run_case+0x1a5/0x480 [ 15.046044] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.046066] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.046092] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.046117] ? __kthread_parkme+0x82/0x180 [ 15.046137] ? preempt_count_sub+0x50/0x80 [ 15.046161] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.046187] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.046212] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.046237] kthread+0x337/0x6f0 [ 15.046256] ? trace_preempt_on+0x20/0xc0 [ 15.046363] ? __pfx_kthread+0x10/0x10 [ 15.046388] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.046409] ? calculate_sigpending+0x7b/0xa0 [ 15.046434] ? __pfx_kthread+0x10/0x10 [ 15.046455] ret_from_fork+0x116/0x1d0 [ 15.046474] ? __pfx_kthread+0x10/0x10 [ 15.046494] ret_from_fork_asm+0x1a/0x30 [ 15.046525] </TASK> [ 15.046536] [ 15.055357] Allocated by task 278: [ 15.055492] kasan_save_stack+0x45/0x70 [ 15.055641] kasan_save_track+0x18/0x40 [ 15.055774] kasan_save_alloc_info+0x3b/0x50 [ 15.055921] __kasan_kmalloc+0xb7/0xc0 [ 15.056927] __kmalloc_cache_noprof+0x189/0x420 [ 15.057168] kasan_bitops_generic+0x92/0x1c0 [ 15.057381] kunit_try_run_case+0x1a5/0x480 [ 15.057587] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.057835] kthread+0x337/0x6f0 [ 15.058594] ret_from_fork+0x116/0x1d0 [ 15.058918] ret_from_fork_asm+0x1a/0x30 [ 15.059419] [ 15.059641] The buggy address belongs to the object at ffff888102574300 [ 15.059641] which belongs to the cache kmalloc-16 of size 16 [ 15.060583] The buggy address is located 8 bytes inside of [ 15.060583] allocated 9-byte region [ffff888102574300, ffff888102574309) [ 15.061498] [ 15.061601] The buggy address belongs to the physical page: [ 15.061835] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102574 [ 15.062752] flags: 0x200000000000000(node=0|zone=2) [ 15.063402] page_type: f5(slab) [ 15.063579] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 15.063898] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 15.064605] page dumped because: kasan: bad access detected [ 15.064859] [ 15.065213] Memory state around the buggy address: [ 15.065600] ffff888102574200: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 15.065903] ffff888102574280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 15.066133] >ffff888102574300: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.066446] ^ [ 15.066623] ffff888102574380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.066904] ffff888102574400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.067402] ================================================================== [ 15.126309] ================================================================== [ 15.126607] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 15.127185] Read of size 8 at addr ffff888102574308 by task kunit_try_catch/278 [ 15.127468] [ 15.127561] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.127602] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.127614] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.127635] Call Trace: [ 15.127653] <TASK> [ 15.127671] dump_stack_lvl+0x73/0xb0 [ 15.127703] print_report+0xd1/0x650 [ 15.127725] ? __virt_addr_valid+0x1db/0x2d0 [ 15.127748] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 15.127777] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.127800] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 15.127829] kasan_report+0x141/0x180 [ 15.127851] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 15.127885] kasan_check_range+0x10c/0x1c0 [ 15.127907] __kasan_check_read+0x15/0x20 [ 15.127927] kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 15.128046] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 15.128077] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.128102] ? trace_hardirqs_on+0x37/0xe0 [ 15.128124] ? kasan_bitops_generic+0x92/0x1c0 [ 15.128152] kasan_bitops_generic+0x121/0x1c0 [ 15.128175] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 15.128201] ? __pfx_read_tsc+0x10/0x10 [ 15.128222] ? ktime_get_ts64+0x86/0x230 [ 15.128247] kunit_try_run_case+0x1a5/0x480 [ 15.128271] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.128294] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.128338] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.128362] ? __kthread_parkme+0x82/0x180 [ 15.128385] ? preempt_count_sub+0x50/0x80 [ 15.128408] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.128433] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.128457] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.128483] kthread+0x337/0x6f0 [ 15.128503] ? trace_preempt_on+0x20/0xc0 [ 15.128525] ? __pfx_kthread+0x10/0x10 [ 15.128546] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.128568] ? calculate_sigpending+0x7b/0xa0 [ 15.128593] ? __pfx_kthread+0x10/0x10 [ 15.128614] ret_from_fork+0x116/0x1d0 [ 15.128632] ? __pfx_kthread+0x10/0x10 [ 15.128652] ret_from_fork_asm+0x1a/0x30 [ 15.128683] </TASK> [ 15.128693] [ 15.137269] Allocated by task 278: [ 15.137450] kasan_save_stack+0x45/0x70 [ 15.137598] kasan_save_track+0x18/0x40 [ 15.137731] kasan_save_alloc_info+0x3b/0x50 [ 15.137908] __kasan_kmalloc+0xb7/0xc0 [ 15.138165] __kmalloc_cache_noprof+0x189/0x420 [ 15.138421] kasan_bitops_generic+0x92/0x1c0 [ 15.138632] kunit_try_run_case+0x1a5/0x480 [ 15.138850] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.139274] kthread+0x337/0x6f0 [ 15.139447] ret_from_fork+0x116/0x1d0 [ 15.139629] ret_from_fork_asm+0x1a/0x30 [ 15.139826] [ 15.139905] The buggy address belongs to the object at ffff888102574300 [ 15.139905] which belongs to the cache kmalloc-16 of size 16 [ 15.140482] The buggy address is located 8 bytes inside of [ 15.140482] allocated 9-byte region [ffff888102574300, ffff888102574309) [ 15.140828] [ 15.140899] The buggy address belongs to the physical page: [ 15.141205] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102574 [ 15.141577] flags: 0x200000000000000(node=0|zone=2) [ 15.141805] page_type: f5(slab) [ 15.142037] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 15.142404] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 15.142708] page dumped because: kasan: bad access detected [ 15.142906] [ 15.143177] Memory state around the buggy address: [ 15.143402] ffff888102574200: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 15.143689] ffff888102574280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 15.143919] >ffff888102574300: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.144338] ^ [ 15.144523] ffff888102574380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.144746] ffff888102574400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.145065] ================================================================== [ 15.024189] ================================================================== [ 15.024586] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 15.024911] Write of size 8 at addr ffff888102574308 by task kunit_try_catch/278 [ 15.025323] [ 15.025430] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.025475] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.025486] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.025507] Call Trace: [ 15.025525] <TASK> [ 15.025542] dump_stack_lvl+0x73/0xb0 [ 15.025574] print_report+0xd1/0x650 [ 15.025596] ? __virt_addr_valid+0x1db/0x2d0 [ 15.025618] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 15.025646] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.025670] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 15.025699] kasan_report+0x141/0x180 [ 15.025720] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 15.025753] kasan_check_range+0x10c/0x1c0 [ 15.025776] __kasan_check_write+0x18/0x20 [ 15.025795] kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 15.025824] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 15.025855] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.025880] ? trace_hardirqs_on+0x37/0xe0 [ 15.025904] ? kasan_bitops_generic+0x92/0x1c0 [ 15.025930] kasan_bitops_generic+0x121/0x1c0 [ 15.025986] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 15.026013] ? __pfx_read_tsc+0x10/0x10 [ 15.026036] ? ktime_get_ts64+0x86/0x230 [ 15.026062] kunit_try_run_case+0x1a5/0x480 [ 15.026087] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.026109] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.026135] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.026159] ? __kthread_parkme+0x82/0x180 [ 15.026180] ? preempt_count_sub+0x50/0x80 [ 15.026204] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.026229] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.026253] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.026336] kthread+0x337/0x6f0 [ 15.026357] ? trace_preempt_on+0x20/0xc0 [ 15.026380] ? __pfx_kthread+0x10/0x10 [ 15.026400] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.026422] ? calculate_sigpending+0x7b/0xa0 [ 15.026446] ? __pfx_kthread+0x10/0x10 [ 15.026468] ret_from_fork+0x116/0x1d0 [ 15.026487] ? __pfx_kthread+0x10/0x10 [ 15.026507] ret_from_fork_asm+0x1a/0x30 [ 15.026538] </TASK> [ 15.026550] [ 15.035061] Allocated by task 278: [ 15.035252] kasan_save_stack+0x45/0x70 [ 15.035459] kasan_save_track+0x18/0x40 [ 15.035771] kasan_save_alloc_info+0x3b/0x50 [ 15.035969] __kasan_kmalloc+0xb7/0xc0 [ 15.036100] __kmalloc_cache_noprof+0x189/0x420 [ 15.036259] kasan_bitops_generic+0x92/0x1c0 [ 15.036661] kunit_try_run_case+0x1a5/0x480 [ 15.036870] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.037307] kthread+0x337/0x6f0 [ 15.037566] ret_from_fork+0x116/0x1d0 [ 15.037701] ret_from_fork_asm+0x1a/0x30 [ 15.037838] [ 15.037907] The buggy address belongs to the object at ffff888102574300 [ 15.037907] which belongs to the cache kmalloc-16 of size 16 [ 15.038586] The buggy address is located 8 bytes inside of [ 15.038586] allocated 9-byte region [ffff888102574300, ffff888102574309) [ 15.039121] [ 15.039221] The buggy address belongs to the physical page: [ 15.039606] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102574 [ 15.039913] flags: 0x200000000000000(node=0|zone=2) [ 15.040360] page_type: f5(slab) [ 15.040536] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 15.040833] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 15.041208] page dumped because: kasan: bad access detected [ 15.041447] [ 15.041540] Memory state around the buggy address: [ 15.041740] ffff888102574200: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 15.042235] ffff888102574280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 15.042583] >ffff888102574300: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.042807] ^ [ 15.042943] ffff888102574380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.043166] ffff888102574400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.043469] ================================================================== [ 14.970353] ================================================================== [ 14.970740] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 14.971046] Write of size 8 at addr ffff888102574308 by task kunit_try_catch/278 [ 14.971791] [ 14.972159] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.972208] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.972220] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.972240] Call Trace: [ 14.972257] <TASK> [ 14.972275] dump_stack_lvl+0x73/0xb0 [ 14.972308] print_report+0xd1/0x650 [ 14.972331] ? __virt_addr_valid+0x1db/0x2d0 [ 14.972356] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 14.972386] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.972411] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 14.972442] kasan_report+0x141/0x180 [ 14.972464] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 14.972497] kasan_check_range+0x10c/0x1c0 [ 14.972522] __kasan_check_write+0x18/0x20 [ 14.972542] kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 14.972571] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 14.972601] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.972627] ? trace_hardirqs_on+0x37/0xe0 [ 14.972650] ? kasan_bitops_generic+0x92/0x1c0 [ 14.972677] kasan_bitops_generic+0x121/0x1c0 [ 14.972701] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.972727] ? __pfx_read_tsc+0x10/0x10 [ 14.972748] ? ktime_get_ts64+0x86/0x230 [ 14.972773] kunit_try_run_case+0x1a5/0x480 [ 14.972798] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.972821] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.972847] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.972870] ? __kthread_parkme+0x82/0x180 [ 14.972892] ? preempt_count_sub+0x50/0x80 [ 14.972915] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.972974] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.972999] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.973025] kthread+0x337/0x6f0 [ 14.973044] ? trace_preempt_on+0x20/0xc0 [ 14.973066] ? __pfx_kthread+0x10/0x10 [ 14.973087] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.973109] ? calculate_sigpending+0x7b/0xa0 [ 14.973134] ? __pfx_kthread+0x10/0x10 [ 14.973155] ret_from_fork+0x116/0x1d0 [ 14.973174] ? __pfx_kthread+0x10/0x10 [ 14.973194] ret_from_fork_asm+0x1a/0x30 [ 14.973226] </TASK> [ 14.973237] [ 14.987590] Allocated by task 278: [ 14.988144] kasan_save_stack+0x45/0x70 [ 14.988570] kasan_save_track+0x18/0x40 [ 14.988910] kasan_save_alloc_info+0x3b/0x50 [ 14.989228] __kasan_kmalloc+0xb7/0xc0 [ 14.989588] __kmalloc_cache_noprof+0x189/0x420 [ 14.989915] kasan_bitops_generic+0x92/0x1c0 [ 14.990198] kunit_try_run_case+0x1a5/0x480 [ 14.990585] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.991095] kthread+0x337/0x6f0 [ 14.991335] ret_from_fork+0x116/0x1d0 [ 14.991676] ret_from_fork_asm+0x1a/0x30 [ 14.991840] [ 14.991912] The buggy address belongs to the object at ffff888102574300 [ 14.991912] which belongs to the cache kmalloc-16 of size 16 [ 14.993613] The buggy address is located 8 bytes inside of [ 14.993613] allocated 9-byte region [ffff888102574300, ffff888102574309) [ 14.994370] [ 14.994535] The buggy address belongs to the physical page: [ 14.995082] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102574 [ 14.995755] flags: 0x200000000000000(node=0|zone=2) [ 14.995927] page_type: f5(slab) [ 14.996411] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.997141] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.997711] page dumped because: kasan: bad access detected [ 14.997883] [ 14.998017] Memory state around the buggy address: [ 14.998465] ffff888102574200: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 14.999202] ffff888102574280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.999922] >ffff888102574300: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.000653] ^ [ 15.000788] ffff888102574380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.001135] ffff888102574400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.001897] ================================================================== [ 15.002885] ================================================================== [ 15.003553] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 15.004529] Write of size 8 at addr ffff888102574308 by task kunit_try_catch/278 [ 15.004780] [ 15.004871] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.004917] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.004929] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.004963] Call Trace: [ 15.004983] <TASK> [ 15.005001] dump_stack_lvl+0x73/0xb0 [ 15.005035] print_report+0xd1/0x650 [ 15.005058] ? __virt_addr_valid+0x1db/0x2d0 [ 15.005081] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 15.005110] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.005133] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 15.005162] kasan_report+0x141/0x180 [ 15.005183] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 15.005217] kasan_check_range+0x10c/0x1c0 [ 15.005240] __kasan_check_write+0x18/0x20 [ 15.005259] kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 15.005289] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 15.005320] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.005345] ? trace_hardirqs_on+0x37/0xe0 [ 15.005368] ? kasan_bitops_generic+0x92/0x1c0 [ 15.005395] kasan_bitops_generic+0x121/0x1c0 [ 15.005419] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 15.005444] ? __pfx_read_tsc+0x10/0x10 [ 15.005466] ? ktime_get_ts64+0x86/0x230 [ 15.005490] kunit_try_run_case+0x1a5/0x480 [ 15.005514] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.005538] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.005563] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.005587] ? __kthread_parkme+0x82/0x180 [ 15.005608] ? preempt_count_sub+0x50/0x80 [ 15.005633] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.005658] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.005684] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.005721] kthread+0x337/0x6f0 [ 15.005739] ? trace_preempt_on+0x20/0xc0 [ 15.005770] ? __pfx_kthread+0x10/0x10 [ 15.005791] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.005812] ? calculate_sigpending+0x7b/0xa0 [ 15.005837] ? __pfx_kthread+0x10/0x10 [ 15.005858] ret_from_fork+0x116/0x1d0 [ 15.005877] ? __pfx_kthread+0x10/0x10 [ 15.005898] ret_from_fork_asm+0x1a/0x30 [ 15.005929] </TASK> [ 15.005950] [ 15.012961] Allocated by task 278: [ 15.013149] kasan_save_stack+0x45/0x70 [ 15.013353] kasan_save_track+0x18/0x40 [ 15.013654] kasan_save_alloc_info+0x3b/0x50 [ 15.013871] __kasan_kmalloc+0xb7/0xc0 [ 15.014025] __kmalloc_cache_noprof+0x189/0x420 [ 15.014181] kasan_bitops_generic+0x92/0x1c0 [ 15.016119] kunit_try_run_case+0x1a5/0x480 [ 15.016292] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.016470] kthread+0x337/0x6f0 [ 15.016590] ret_from_fork+0x116/0x1d0 [ 15.016727] ret_from_fork_asm+0x1a/0x30 [ 15.016865] [ 15.016953] The buggy address belongs to the object at ffff888102574300 [ 15.016953] which belongs to the cache kmalloc-16 of size 16 [ 15.017310] The buggy address is located 8 bytes inside of [ 15.017310] allocated 9-byte region [ffff888102574300, ffff888102574309) [ 15.018349] [ 15.018433] The buggy address belongs to the physical page: [ 15.018606] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102574 [ 15.018856] flags: 0x200000000000000(node=0|zone=2) [ 15.019091] page_type: f5(slab) [ 15.019259] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 15.019603] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 15.020063] page dumped because: kasan: bad access detected [ 15.021163] [ 15.021245] Memory state around the buggy address: [ 15.021560] ffff888102574200: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 15.021783] ffff888102574280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 15.022057] >ffff888102574300: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.022571] ^ [ 15.022829] ffff888102574380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.023414] ffff888102574400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.023680] ================================================================== [ 15.106778] ================================================================== [ 15.107307] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 15.107649] Write of size 8 at addr ffff888102574308 by task kunit_try_catch/278 [ 15.108025] [ 15.108140] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.108184] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.108196] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.108218] Call Trace: [ 15.108237] <TASK> [ 15.108257] dump_stack_lvl+0x73/0xb0 [ 15.108309] print_report+0xd1/0x650 [ 15.108332] ? __virt_addr_valid+0x1db/0x2d0 [ 15.108355] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 15.108384] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.108407] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 15.108437] kasan_report+0x141/0x180 [ 15.108458] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 15.108492] kasan_check_range+0x10c/0x1c0 [ 15.108515] __kasan_check_write+0x18/0x20 [ 15.108535] kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 15.108563] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 15.108593] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.108619] ? trace_hardirqs_on+0x37/0xe0 [ 15.108641] ? kasan_bitops_generic+0x92/0x1c0 [ 15.108668] kasan_bitops_generic+0x121/0x1c0 [ 15.108691] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 15.108717] ? __pfx_read_tsc+0x10/0x10 [ 15.108738] ? ktime_get_ts64+0x86/0x230 [ 15.108762] kunit_try_run_case+0x1a5/0x480 [ 15.108786] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.108808] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.108833] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.108856] ? __kthread_parkme+0x82/0x180 [ 15.108877] ? preempt_count_sub+0x50/0x80 [ 15.108902] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.108926] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.109025] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.109050] kthread+0x337/0x6f0 [ 15.109069] ? trace_preempt_on+0x20/0xc0 [ 15.109091] ? __pfx_kthread+0x10/0x10 [ 15.109113] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.109134] ? calculate_sigpending+0x7b/0xa0 [ 15.109157] ? __pfx_kthread+0x10/0x10 [ 15.109179] ret_from_fork+0x116/0x1d0 [ 15.109197] ? __pfx_kthread+0x10/0x10 [ 15.109217] ret_from_fork_asm+0x1a/0x30 [ 15.109248] </TASK> [ 15.109258] [ 15.117799] Allocated by task 278: [ 15.118058] kasan_save_stack+0x45/0x70 [ 15.118256] kasan_save_track+0x18/0x40 [ 15.118479] kasan_save_alloc_info+0x3b/0x50 [ 15.118686] __kasan_kmalloc+0xb7/0xc0 [ 15.118823] __kmalloc_cache_noprof+0x189/0x420 [ 15.119173] kasan_bitops_generic+0x92/0x1c0 [ 15.119390] kunit_try_run_case+0x1a5/0x480 [ 15.119616] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.119870] kthread+0x337/0x6f0 [ 15.120129] ret_from_fork+0x116/0x1d0 [ 15.120351] ret_from_fork_asm+0x1a/0x30 [ 15.120553] [ 15.120647] The buggy address belongs to the object at ffff888102574300 [ 15.120647] which belongs to the cache kmalloc-16 of size 16 [ 15.121245] The buggy address is located 8 bytes inside of [ 15.121245] allocated 9-byte region [ffff888102574300, ffff888102574309) [ 15.121604] [ 15.121677] The buggy address belongs to the physical page: [ 15.121882] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102574 [ 15.122241] flags: 0x200000000000000(node=0|zone=2) [ 15.122471] page_type: f5(slab) [ 15.122636] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 15.123157] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 15.123458] page dumped because: kasan: bad access detected [ 15.123702] [ 15.123793] Memory state around the buggy address: [ 15.124031] ffff888102574200: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 15.124271] ffff888102574280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 15.124576] >ffff888102574300: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.124896] ^ [ 15.125134] ffff888102574380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.125477] ffff888102574400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.125775] ================================================================== [ 15.145571] ================================================================== [ 15.145904] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 15.146569] Read of size 8 at addr ffff888102574308 by task kunit_try_catch/278 [ 15.146846] [ 15.147119] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.147165] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.147177] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.147198] Call Trace: [ 15.147216] <TASK> [ 15.147232] dump_stack_lvl+0x73/0xb0 [ 15.147291] print_report+0xd1/0x650 [ 15.147313] ? __virt_addr_valid+0x1db/0x2d0 [ 15.147336] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 15.147366] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.147390] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 15.147419] kasan_report+0x141/0x180 [ 15.147440] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 15.147473] __asan_report_load8_noabort+0x18/0x20 [ 15.147498] kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 15.147527] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 15.147557] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.147581] ? trace_hardirqs_on+0x37/0xe0 [ 15.147604] ? kasan_bitops_generic+0x92/0x1c0 [ 15.147631] kasan_bitops_generic+0x121/0x1c0 [ 15.147654] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 15.147680] ? __pfx_read_tsc+0x10/0x10 [ 15.147701] ? ktime_get_ts64+0x86/0x230 [ 15.147724] kunit_try_run_case+0x1a5/0x480 [ 15.147749] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.147772] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.147796] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.147819] ? __kthread_parkme+0x82/0x180 [ 15.147840] ? preempt_count_sub+0x50/0x80 [ 15.147864] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.147888] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.147913] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.147963] kthread+0x337/0x6f0 [ 15.147982] ? trace_preempt_on+0x20/0xc0 [ 15.148004] ? __pfx_kthread+0x10/0x10 [ 15.148025] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.148046] ? calculate_sigpending+0x7b/0xa0 [ 15.148070] ? __pfx_kthread+0x10/0x10 [ 15.148092] ret_from_fork+0x116/0x1d0 [ 15.148110] ? __pfx_kthread+0x10/0x10 [ 15.148130] ret_from_fork_asm+0x1a/0x30 [ 15.148162] </TASK> [ 15.148172] [ 15.156561] Allocated by task 278: [ 15.156769] kasan_save_stack+0x45/0x70 [ 15.157076] kasan_save_track+0x18/0x40 [ 15.157272] kasan_save_alloc_info+0x3b/0x50 [ 15.157425] __kasan_kmalloc+0xb7/0xc0 [ 15.157631] __kmalloc_cache_noprof+0x189/0x420 [ 15.157848] kasan_bitops_generic+0x92/0x1c0 [ 15.158126] kunit_try_run_case+0x1a5/0x480 [ 15.158309] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.158592] kthread+0x337/0x6f0 [ 15.158752] ret_from_fork+0x116/0x1d0 [ 15.158881] ret_from_fork_asm+0x1a/0x30 [ 15.159237] [ 15.159353] The buggy address belongs to the object at ffff888102574300 [ 15.159353] which belongs to the cache kmalloc-16 of size 16 [ 15.159888] The buggy address is located 8 bytes inside of [ 15.159888] allocated 9-byte region [ffff888102574300, ffff888102574309) [ 15.160404] [ 15.160480] The buggy address belongs to the physical page: [ 15.160645] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102574 [ 15.160879] flags: 0x200000000000000(node=0|zone=2) [ 15.161234] page_type: f5(slab) [ 15.161438] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 15.161780] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 15.162215] page dumped because: kasan: bad access detected [ 15.162495] [ 15.162611] Memory state around the buggy address: [ 15.162813] ffff888102574200: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 15.163339] ffff888102574280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 15.163622] >ffff888102574300: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.164007] ^ [ 15.164192] ffff888102574380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.164533] ffff888102574400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.164789] ================================================================== [ 15.067855] ================================================================== [ 15.068292] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 15.068658] Write of size 8 at addr ffff888102574308 by task kunit_try_catch/278 [ 15.068922] [ 15.069106] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.069152] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.069164] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.069185] Call Trace: [ 15.069204] <TASK> [ 15.069221] dump_stack_lvl+0x73/0xb0 [ 15.069276] print_report+0xd1/0x650 [ 15.069300] ? __virt_addr_valid+0x1db/0x2d0 [ 15.069323] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 15.069351] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.069375] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 15.069404] kasan_report+0x141/0x180 [ 15.069426] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 15.069459] kasan_check_range+0x10c/0x1c0 [ 15.069483] __kasan_check_write+0x18/0x20 [ 15.069502] kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 15.069532] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 15.069562] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.069586] ? trace_hardirqs_on+0x37/0xe0 [ 15.069609] ? kasan_bitops_generic+0x92/0x1c0 [ 15.069637] kasan_bitops_generic+0x121/0x1c0 [ 15.069661] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 15.069686] ? __pfx_read_tsc+0x10/0x10 [ 15.069707] ? ktime_get_ts64+0x86/0x230 [ 15.069732] kunit_try_run_case+0x1a5/0x480 [ 15.069758] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.069782] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.069809] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.069837] ? __kthread_parkme+0x82/0x180 [ 15.069857] ? preempt_count_sub+0x50/0x80 [ 15.069881] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.069906] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.070006] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.070039] kthread+0x337/0x6f0 [ 15.070059] ? trace_preempt_on+0x20/0xc0 [ 15.070083] ? __pfx_kthread+0x10/0x10 [ 15.070103] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.070125] ? calculate_sigpending+0x7b/0xa0 [ 15.070150] ? __pfx_kthread+0x10/0x10 [ 15.070171] ret_from_fork+0x116/0x1d0 [ 15.070189] ? __pfx_kthread+0x10/0x10 [ 15.070210] ret_from_fork_asm+0x1a/0x30 [ 15.070241] </TASK> [ 15.070251] [ 15.078817] Allocated by task 278: [ 15.079190] kasan_save_stack+0x45/0x70 [ 15.079431] kasan_save_track+0x18/0x40 [ 15.079592] kasan_save_alloc_info+0x3b/0x50 [ 15.079765] __kasan_kmalloc+0xb7/0xc0 [ 15.080044] __kmalloc_cache_noprof+0x189/0x420 [ 15.080285] kasan_bitops_generic+0x92/0x1c0 [ 15.080465] kunit_try_run_case+0x1a5/0x480 [ 15.080611] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.080864] kthread+0x337/0x6f0 [ 15.081105] ret_from_fork+0x116/0x1d0 [ 15.081306] ret_from_fork_asm+0x1a/0x30 [ 15.081504] [ 15.081599] The buggy address belongs to the object at ffff888102574300 [ 15.081599] which belongs to the cache kmalloc-16 of size 16 [ 15.082054] The buggy address is located 8 bytes inside of [ 15.082054] allocated 9-byte region [ffff888102574300, ffff888102574309) [ 15.082404] [ 15.082492] The buggy address belongs to the physical page: [ 15.082744] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102574 [ 15.083350] flags: 0x200000000000000(node=0|zone=2) [ 15.083548] page_type: f5(slab) [ 15.083723] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 15.084082] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 15.084399] page dumped because: kasan: bad access detected [ 15.084649] [ 15.084743] Memory state around the buggy address: [ 15.085051] ffff888102574200: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 15.085396] ffff888102574280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 15.085674] >ffff888102574300: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.086029] ^ [ 15.086205] ffff888102574380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.086493] ffff888102574400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.086760] ================================================================== [ 15.087502] ================================================================== [ 15.087811] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 15.088273] Write of size 8 at addr ffff888102574308 by task kunit_try_catch/278 [ 15.088586] [ 15.088676] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.088720] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.088731] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.088753] Call Trace: [ 15.088772] <TASK> [ 15.088790] dump_stack_lvl+0x73/0xb0 [ 15.088821] print_report+0xd1/0x650 [ 15.088844] ? __virt_addr_valid+0x1db/0x2d0 [ 15.088867] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 15.088896] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.088920] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 15.089024] kasan_report+0x141/0x180 [ 15.089047] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 15.089080] kasan_check_range+0x10c/0x1c0 [ 15.089104] __kasan_check_write+0x18/0x20 [ 15.089123] kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 15.089152] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 15.089182] ? __kmalloc_cache_noprof+0x189/0x420 [ 15.089207] ? trace_hardirqs_on+0x37/0xe0 [ 15.089230] ? kasan_bitops_generic+0x92/0x1c0 [ 15.089257] kasan_bitops_generic+0x121/0x1c0 [ 15.089280] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 15.089330] ? __pfx_read_tsc+0x10/0x10 [ 15.089353] ? ktime_get_ts64+0x86/0x230 [ 15.089377] kunit_try_run_case+0x1a5/0x480 [ 15.089402] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.089425] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.089450] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.089474] ? __kthread_parkme+0x82/0x180 [ 15.089495] ? preempt_count_sub+0x50/0x80 [ 15.089518] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.089542] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.089568] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.089593] kthread+0x337/0x6f0 [ 15.089612] ? trace_preempt_on+0x20/0xc0 [ 15.089634] ? __pfx_kthread+0x10/0x10 [ 15.089655] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.089676] ? calculate_sigpending+0x7b/0xa0 [ 15.089701] ? __pfx_kthread+0x10/0x10 [ 15.089722] ret_from_fork+0x116/0x1d0 [ 15.089741] ? __pfx_kthread+0x10/0x10 [ 15.089761] ret_from_fork_asm+0x1a/0x30 [ 15.089792] </TASK> [ 15.089802] [ 15.098261] Allocated by task 278: [ 15.098414] kasan_save_stack+0x45/0x70 [ 15.098620] kasan_save_track+0x18/0x40 [ 15.098832] kasan_save_alloc_info+0x3b/0x50 [ 15.099224] __kasan_kmalloc+0xb7/0xc0 [ 15.099454] __kmalloc_cache_noprof+0x189/0x420 [ 15.099678] kasan_bitops_generic+0x92/0x1c0 [ 15.099891] kunit_try_run_case+0x1a5/0x480 [ 15.100172] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.100461] kthread+0x337/0x6f0 [ 15.100631] ret_from_fork+0x116/0x1d0 [ 15.100769] ret_from_fork_asm+0x1a/0x30 [ 15.101042] [ 15.101146] The buggy address belongs to the object at ffff888102574300 [ 15.101146] which belongs to the cache kmalloc-16 of size 16 [ 15.101641] The buggy address is located 8 bytes inside of [ 15.101641] allocated 9-byte region [ffff888102574300, ffff888102574309) [ 15.102094] [ 15.102193] The buggy address belongs to the physical page: [ 15.102414] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102574 [ 15.102702] flags: 0x200000000000000(node=0|zone=2) [ 15.103169] page_type: f5(slab) [ 15.103360] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 15.103659] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 15.104051] page dumped because: kasan: bad access detected [ 15.104278] [ 15.104375] Memory state around the buggy address: [ 15.104554] ffff888102574200: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 15.104769] ffff888102574280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 15.105081] >ffff888102574300: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.105419] ^ [ 15.105592] ffff888102574380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.105899] ffff888102574400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.106282] ==================================================================